Search alternatives:
blues » blue

101
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...-Restricted MST and Red-Blue Separation Problem -- Approximating Steiner k-Cuts -- MAX k-CUT and Approximating...

102
by Tripathi, Alok Mani
Published 2018
Packt Publishing
Table of Contents: ... and plugins -- Bot runner -- Control center -- RPA platforms -- Automation Anywhere -- UiPath -- Blue Prism...

103
by Howard, Richard
Published 2023
John Wiley & Sons, Incorporated
Table of Contents: ...Red/Blue/Purple Team Operations: A Tactic for Intrusion Kill Chain Prevention -- Intelligence...

104
by Death, Darren
Published 2017
Packt Publishing
Table of Contents: ... -- White hat or ethical hacker -- Blue hat hacker -- Grey hat hacker -- Penetration testing -- Hacktivist...

105
by Zanon, Diego
Published 2017
Packt Publishing
Table of Contents: ... -- Development workflow -- Blue-green deployment -- Deploying new versions with a different database model...

106
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... probes for virtual environments -- A gang-scheduling system for ASCI blue-pacific -- Towards quality...

107
by Soni, Mitesh, Berg, Alan Mark
Published 2017
Packt Publishing
Table of Contents: ...-to-end automation -- Getting ready -- How to do it... -- Getting started with the Blue Ocean dashboard...

108
by Chebbi, Chiheb
Published 2018
Packt Publishing
Table of Contents: ... testing teams -- Red teaming -- Blue teaming -- Purple teaming -- Pentesting standards and guidance...

109
by Kumar, Neeraj, Miglani, Arzoo
Published 2020
CRC Press
Table of Contents: ... Filter -- 10.2.3.9. Hierarchical BF -- 10.2.3.10. Stochastic Fair Blue -- 10.3. Quotient Filter -- 10.4...

110
by Haines, Michael
Published 2004
Prentice Hall PTR
... performance LDAP in the Solaris Operating Environment is a follow-on to the Sun BluePrints book Solaris...

111
by Wylie, Phillip L.
Published 2021
John Wiley
...The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply...

112
by Parker, Carey
Published 2018
Apress
... most people, you have no clue how these things work and don't know the real threats. Protecting your...

113
by Orzach, Yoram
Published 2022
Packt Publishing Limited
... and email services Who this book is for This book is for red team and blue team pentesters, security...

114
by Mark, David, LaMarche, Jeff
Published 2009
Apress
... variety of networking mechanisms, from GameKit’s relatively simple BlueTooth peer-to-peer model...

115
by Sage, Kingsley
Published 2019
Springer International Publishing
... of programming languages, and a concise introduction to programming in Java using BlueJ. Discusses classes...

116
Published 2022
Pearson IT Certification
... Kubernetes Use the Helm Package Manager Work with custom resources Implement blue/green deployments Implement...

117
by Pillay, Rishalin, Abutheraa, Mohammed
Published 2023
Packt Publishing
... are looking to learn about ethical hacking. Individuals who are part of security teams, blue teams, purple...

118
by Cattell, R. G. G., Partners, Jim
Published 2001
Addison-Wesley Professional
... International used the HP BlueStone J2EE platform to implement the Web's first online catalog shopping portal...

119
by Borges, Dan
Published 2022
Packt Publishing

120
by Silberschatz, Abraham
Published 2008
J. Wiley & Sons
... sports substantive revisions and organizational changes that clue you in to such cutting-edge...