Search alternatives:
"regularity" » "regularly"

1
by Forta, Ben
Published 2018
Addison-Wesley
Subjects: ...Regular expressions (Computer science) / http://id.loc.gov/authorities/subjects/sh2018002310...

2
by Lockhart, Andrew
Published 2006
O'Reilly
Subjects: ...Computer security...

3
by Verma, Piyush
Published 2015
Packt Publishing
Table of Contents: ... and regular expressions -- Regular expressions -- Nailing the CTF challenge -- Summary -- Chapter 4 : Probing...

4
by Witte, Greg
Published 2012
McGraw-Hill
Table of Contents: ... -- Granularity -- Customization -- Performance -- Regular Expressions -- Chapter 8: Putting Security Automation...

5
by Binnie, Chris, McCune, Rory
Published 2021
John Wiley & Sons
Table of Contents: ... Security Settings 229 -- Automated S3 Attacks 231 -- Storage Hunting 234 -- Summary 236 -- Part IV Advanced...

6
by Vehent, Julien
Published 2018
Manning Publications
Table of Contents: ... -- 11.7.2 Revisiting risks regularly -- Summary -- Chapter 12: Testing security -- 12.1 Maintaining security...

7
by Arnett, George W.
Published 2011
John Wiley & Sons
Table of Contents: ... of the World Markets -- Transfer of Securities and Perfection of Collateral -- Margin -- Short Selling...

8
by Babbin, Jacob
Published 2006
Syngress
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

9
by Vora, Zeal
Published 2017
Packt Publishing
Table of Contents: ... -- Best practices -- Application layer security -- Intrusion Prevention Systems -- Overview architecture...

10
by Seacord, Robert C.
Published 2015
Addison-Wesley Professional
... Secure Coding Standard for Java, demonstrating common Java programming errors and their consequences...

11
by Wenz, Christian
Published 2022
Manning Publications
Subjects: ...Web sites / Security measures...

12
by Hope, Paco
Published 2008
O'Reilly Media
Subjects: ...Web sites / Security measures / blmlsh...

13
by McNeela, Thomas
Published 2020
Packt Publishing
... security tasks About This Video Learn individual information security techniques using Python Use several...

14
by Windham, K. Matthew
Published 2018
SAS Institute
Table of Contents: ... and Data; SAS University Edition; Acknowledgments; Chapter 1: Getting Started with Regular Expressions...

15
Published 2023
Pearson
Subjects: ...Computer networks / Security measures / Examinations / fast...

16
by Cross, Michael
Published 2007
Syngress Pub.
Table of Contents: ...: Securing Your Java Code; Chapter 8: Securing XML; Chapter 9: Building Safe ActiveX Internet Controls...

17
by Birrane, Edward
Published 2022
John Wiley & Sons, Inc.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

18
Published 2022
Addison-Wesley Professional

19
by Ahmad, David R. Mirza
Published 2002
Syngress
Table of Contents: ...</br><br>Chapter 2 The Laws of Security</br><br> Introduction</br><br> Knowing the Laws of Security</br...

20
by Dulaney, Emmett A.
Published 2011
Wiley Pub.
Table of Contents: ...CompTIA Discount Coupon; CompTIA Security+ Deluxe Study Guide; Contents; Foreword; Introduction...