Mostrando 32,041 - 32,060 Resultados de 44,865 Para Buscar '".do"', tiempo de consulta: 0.15s Limitar resultados
  1. 32041
    Publicado 2022
    “…While the three compositions narrate the same basic story and work to shape ethical subjects, they do so in different ways and with different visions of what a moral person actually is. …”
    Libro electrónico
  2. 32042
    Publicado 2002
    “…Still, I am sure that Emilion will do as well as Michel did in inspiring fruitful discussions among us. …”
    Libro electrónico
  3. 32043
  4. 32044
  5. 32045
  6. 32046
    por Iglesia Católica.
    Publicado 1618
    Libro
  7. 32047
    Publicado 2007
    “…The Easy, Example-Based Guide to Ajax for E very Web Developer Using Ajax, you can build Web applications with the sophistication and usability of traditional desktop applications and you can do it using standards and open source software. …”
    Libro electrónico
  8. 32048
    Publicado 2005
    “…Gaming Hacks shows you how to do things you didn't know could be done. If you want more than your average gamer--you want to explore and experiment, unearth shortcuts, make your games do what you want them to do Gaming Hacks will show you how. …”
    Libro electrónico
  9. 32049
    Publicado 2006
    “…Too often, they spend their time doing repetitive, time-wasting tasks such as placing and replacing images, correcting errors in text, cutting and pasting, and preparing files for printing. …”
    Libro electrónico
  10. 32050
    Publicado 2003
    “…Adobe Photoshop is one of those programs that both dazzles and dismays: You can do extraordinary things with it--as long as you don't get lost in its maze of palettes and toolbars. …”
    Libro electrónico
  11. 32051
    Publicado 2004
    “…Modding Mac OS X starts out with the very basics of showing you how to configure your Mac and do simple things like change Finder views, use an image from iPhoto's library on your desktop, and how to find and use screen savers. …”
    Libro electrónico
  12. 32052
    Publicado 2005
    “…A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues Operate and maintain a secure MPLS core with industry best practices Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS) Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. …”
    Libro electrónico
  13. 32053
    por Levison, Louise
    Publicado 2007
    “…The first, most crucial step in making a film is finding the funds to do it. Let Louise Levison, who wrote the innovative business plan for ""The Blair Witch Project,"" show you how. …”
    Libro electrónico
  14. 32054
    por Barnett, Ryan C.
    Publicado 2005
    “…Preventing Web Attacks with Apache brings together all the information you’ll need to do that: step-by-step guidance, hands-on examples, and tested configuration files. …”
    Libro electrónico
  15. 32055
    por Skoudis, Ed
    Publicado 2004
    “…—Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. …”
    Libro electrónico
  16. 32056
    Publicado 2006
    “…Jeffrey Russell, Managing Partner, Supply Chain Asia Pacific, Accenture The challenge of supply chains has long been omnipresent, but as our world becomes more complex and our supply lines longer, the power of our supply chain management capabilities to create and destroy value is magnified. Why do our supply chains succeed or fail? The answer lies in alignment. …”
    Libro electrónico
  17. 32057
    Publicado 2005
    “…An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. …”
    Libro electrónico
  18. 32058
    Publicado 2004
    “…—Joseph Bergin, professor of computer science, Pace University, New York “If change is the only guarantee in life, why is it so hard to do? As this book points out, people are not so much resistant to change itself as they are to being changed. …”
    Libro electrónico
  19. 32059
    por Weisberg, Herbert I., 1944-
    Publicado 2010
    “…A one-of-a-kind resource on identifying and dealing with bias in statistical research on causal effects Do cell phones cause cancer? Can a new curriculum increase student achievement? …”
    Libro electrónico
  20. 32060
    Publicado 2013
    “…This video tutorial is designed for the beginner, and you do not require any previous Acrobat experience to get the most from this training. …”
    Video