Search alternatives:
"actor" » "factor", "actors", "autor"

181
by Soshin, Alexey
Published 2018
Packt Publishing
Table of Contents: ... coroutine -- Returning results -- Setting timeouts -- Parent jobs -- Channels -- Producers -- Actors...

182
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Transactional Behavior Using Event Calculus -- Matching Cognitive Characteristics of Actors and Tasks...

183
by Contos, Brian T.
Published 2006
Syngress
Table of Contents: ... Zoning and Global Positioning System Data -- o Active Lists -- o Actors -- o Data Content -- o...

184 Table of Contents: ... of Actors -- Security Trends -- Targets and Attacks -- Approaches to Computer Security -- Ethics...

185
Published 2018
Springer New York
Table of Contents: ... Storage -- Active XML -- Activity -- Activity Diagrams -- Actors/Agents/Roles -- Adaptive Interfaces...

186
by Peiris, Chris, Kudrati, Abbas, Pillai, Binil
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ... Cyberthreats and Threat Actors 7 -- Phishing 7 -- Ransomware 8 -- Nation State 10 -- The Necessity of Threat...

187
by Haber, Morey J., Rolls, Darran
Published 2024
Apress
...Today, it's easier for threat actors to simply log in versus hack in. As cyberattacks continue...

188
by Butcher, Paul
Published 2014
The Pragmatic Programmers
... identity and state, actors, sequential processes, data parallelism, and the lambda architecture. Learn...

189
by DiMaggio, Jon
Published 2022
No Starch Press Inc.
...-state actors and other advanced organizations and informs how defenders can track and attribute future...

191
by Subramaniam, Venkat
Published 2015
Pragmatic Bookshelf
... actors, parallel collections, and tail call optimization, this book will show you how to create stellar...

192
by Al-khateeb, Samer, Agarwal, Nitin
Published 2019
Springer International Publishing
... depicting flows of information among the actors such as tweets, replies, retweets, mentions, and hyperlinks...

193 ... an organization will be breached. Threat actors typically target the path of least resistance...

194
by Muthiyalu, Bhupesh Guptha
Published 2022
Packt Publishing, Limited
... model, runtime, virtual actors, hosting, and deployment. As you advance, you'll become well-versed...

195
by Vitalis, André
Published 2016
Iste Wiley
..., to institutional decision-makers and actors in policy or business, all members of today's digital society will take...

196
by Selmanaj, Drinor
Published 2024
O'Reilly Media, Inc.
... threat actors capable of harming an organization. Author Drinor Selmanaj demonstrates adversary emulation...

197
Published 2016
Springer International Publishing
... abstractions; communication protocols and behavioural types; actors and concurrent objects; tuple spaces; games...

199
by Archer, Gary, Kahrer, Judith, Trojanowski, Michał
Published 2025
O'Reilly Media, Inc.
... everything work. But security often lags behind, making APIs an attractive target for bad actors looking...

200
by Yu, Eric S. K.
Published 2011
MIT Press
...-based information systems as being situated in environments in which social actors relate to each other...