Search alternatives:
"actor" » "factor", "autor"
"actors" » "factors", "autors"

161
by Selmanaj, Drinor
Published 2024
O'Reilly Media, Inc.
... threat actors capable of harming an organization. Author Drinor Selmanaj demonstrates adversary emulation...

162
by Yehoshua, Nir, Kosayev, Uriel
Published 2021
Packt Publishing Limited
Table of Contents: ... -- Process doppelgänging -- Process injection used by threat actors -- Antivirus bypass using a DLL...

163
by Snell, James
Published 2002
O'Reilly & Associates
Table of Contents: ...; MustUnderstand Faults; Custom Faults; The SOAP Message Exchange Model; Message Paths and Actors; The SOAP Routing...

164
by Martin, Jeff
Published 2014
Packt Pub.
Table of Contents: ...Using asynchrony with web applicationsWorking with actors and the TPL Dataflow Library; Chapter 7...

166
by Archer, Gary, Kahrer, Judith, Trojanowski, Michał
Published 2025
O'Reilly Media, Inc.
... everything work. But security often lags behind, making APIs an attractive target for bad actors looking...

167
by Palacin, Valentina
Published 2021
Packt Publishing

168
by Raychaudhuri, Nilanjan
Published 2013
Manning Publications
..., type-safe code, which is crucial for enterprise applications. Scala implements Actor-based concurrency...

169
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Messaging for Open and Scalable Distributed Sensing Applications -- On Actors and the REST -- Development...

170
by Hooks, Joel
Published 2011
O'Reilly
Table of Contents: ...; Your models and services are 'Actors' in your app...

171
by Siriwardena, Prabath
Published 2020
Apress L.P.
Table of Contents: ... 2.0 Fundamentals -- Understanding OAuth 2.0 -- OAuth 2.0 Actors -- Grant Types -- Authorization Code...

172
by Rodas de Paz, Alejandro, Howse, Joseph
Published 2015
Packt Publishing
Table of Contents: ... scenes; Game over cut scene; The tower defense actors; Turrets and slots; Enemies; Bunker; Game scene...

173
by Dunkerley, Dawn, Meyers, Mike
Published 2021
McGraw-Hill Education
Table of Contents: ... potential indicators associated with network attacks -- Objective 1.5 Explain different threat actors...

174
by Yu, Eric S. K.
Published 2011
MIT Press
...-based information systems as being situated in environments in which social actors relate to each other...

175
by Baumann, Franziska
Published 2023
Springer International Publishing
... institutions as well as actors and dramaturgs in a music context....

176
by Haber, Morey J.
Published 2020
Apress
.... It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least...

177
by Kossak, Felix, Illibauer, Christa, Geist, Verena, Kubovy, Jan
Published 2014
Springer International Publishing
... with proposing extensions that address actor modeling (including an intuitive way to denote permissions...

178
by Troncone, Paul, Albing, Carl
Published 2020
Orairī Japan
...If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your...

179
by Kumar, Ram Shankar Siva, Anderson, Hyrum S.
Published 2023
Ascent Audio
...'s cafeteria-recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes...

180
Published 2018
Springer International Publishing
Table of Contents: ...-Performance Python.-Actor Model of a New Functional Language – Anemone -- Almost Optimal Column-wise Prefix...