Mostrando 2,181 - 2,200 Resultados de 2,871 Para Buscar '".ec"', tiempo de consulta: 0.08s Limitar resultados
  1. 2181
    por VV. AA
    Publicado 2016
    Texto completo en Odilo
    Otros
  2. 2182
    por Jorge Cachinero
    Publicado 2017
    Texto completo en Odilo
    Otros
  3. 2183
  4. 2184
    por Michael Bohne
    Publicado 2015
    Texto completo en Odilo
    Otros
  5. 2185
    por Gloria de la Llave Cuevas
    Publicado 2017
    Texto completo en Odilo
    Otros
  6. 2186
  7. 2187
  8. 2188
  9. 2189
    Publicado 2018
    Tabla de Contenidos: “…-- How to get Docker -- How to use Docker -- Dockerfile -- Docker commands -- Setting up Docker Tooling in Eclipse -- Creating a Docker network -- Creating MySQL container -- Deploying microservices in a Docker container -- Running containers using Docker Compose -- Summary -- Chapter 13: Deploying JEE Applications in the Cloud -- Deploying in the cloud -- Deploying in AWS Cloud -- Creating the user group and user -- Installing the AWS Toolkit for Eclipse -- Launching the EC2 instance -- Installing the CourseManagement EJB application in the EC2 instance -- Installing the GlassFish 5 Server -- Installing the MySQL server -- Configuring the datasource in the GlassFish 5 Server -- Installing the CourseManagmenet REST service using Elastic Beanstalk -- Creating Elastic Beanstalk application from Eclipse -- Deploying in Google Cloud -- Setting up Google Cloud Tools -- Installing the Google Cloud SDK -- Installing Java extensions for the App Engine SDK -- Installing Google Cloud Tools for Eclipse -- Setting Eclipse Preferences for Google Cloud Tools -- Deploying the application in Google Compute Engine -- Creating a VM instance in Google Compute Engine -- Installing Docker in a VM instance -- Deploying the application in Google App Engine -- Summary -- Chapter 14: Securing JEE Applications -- Authentication and authorization in JEE -- Modifying a database to save authentication information -- Securing applications in GlassFish -- Protecting access to folders in web applications…”
    Libro electrónico
  10. 2190
    Publicado 2023
    Tabla de Contenidos: “…Part 2 of 3 - Pivoting to attack other resources -- Part 3 of 3 - Obtaining the second flag -- Cleaning up -- Summary -- Further reading -- Part 3: Exploring Advanced Strategies and Best Practices in Lab Environment Design -- Chapter 7: Setting Up an IAM Privilege Escalation Lab -- Technical requirements -- Preparing the Cloud9 environment -- Part 1 of 3 - Preparing the EC2 instance role -- Part 2 of 3 - Launching the Cloud9 environment -- Part 3 of 3 - Attaching the IAM role to the EC2 instance of the Cloud9 environment -- Setting up cloud resources and flags manually -- Part 1 of 3 - Preparing the QLDB resource with the first flag -- Part 2 of 3 - Setting up an S3 bucket with the second flag -- Part 3 of 3 - Creating a vulnerable Lambda execution role -- Leveraging Terraform to automatically set up target resources -- Part 1 of 4 - Setting up the file and folder structure -- Part 2 of 4 - Defining the iam_workshop_user module resources -- Part 3 of 4 - Defining the notebook_instance_role module resources -- Part 4 of 4 - Defining the notebook_instance module resources -- Using generative AI tools for exploit code generation -- Part 1 of 3 - Generating a Python function that returns an AWS account ID -- Part 2 of 3 - Generating a Python function that generates a random password -- Part 3 of 3 - Generating Python code that creates a new IAM user -- Simulating penetration testing in the lab environment -- Part 1 of 4 - Retrieving the flag from the S3 bucket -- Part 2 of 4 - Looking for vulnerable resources -- Part 3 of 4 - Using the Lambda execution role for privilege escalation -- Part 4 of 4 - Retrieving the flag from the ledger database -- Cleaning up -- Summary -- Further reading -- Chapter 8: Designing and Building a Vulnerable Active Directory Lab -- Technical requirements -- Preparing the necessary components and prerequisites…”
    Libro electrónico
  11. 2191
    Publicado 2017
    Tabla de Contenidos: “…Extending community cookbooks by using application wrapper cookbooks -- Creating custom Ohai plugins -- Creating custom knife plugins -- Chapter 4: Writing Better Cookbooks -- Introduction -- Setting environment variables -- Passing arguments to shell commands -- Overriding attributes -- Using search to find nodes -- Using data bags -- Using search to find data bag items -- Using encrypted data bag items -- Accessing data bag values from external scripts -- Getting information about the environment -- Writing cross-platform cookbooks -- Making recipes idempotent by using conditional execution -- Chapter 5: Working with Files and Packages -- Introduction -- Creating configuration files using templates -- Using pure Ruby in templates for conditionals and iterations -- Installing packages from a third-party repository -- Installing software from source -- Running a command when a file is updated -- Distributing directory trees -- Cleaning up old files -- Distributing different files based on the target platform -- Chapter 6: Users and Applications -- Introduction -- Creating users from data bags -- Securing the Secure Shell daemon -- Enabling passwordless sudo -- Managing NTP -- Installing nginx from source -- Creating nginx virtual hosts -- Creating MySQL databases and users -- Managing Ruby on Rails applications -- Managing Varnish -- Managing your local workstation with Chef Pantry -- Chapter 7: Servers and Cloud Infrastructure -- Introduction -- Creating cookbooks from a running system with Blueprint -- Running the same command on many machines at once -- Setting up SNMP for external monitoring services -- Deploying a Nagios monitoring server -- Using HAProxy to load-balance multiple web servers -- Using custom bootstrap scripts -- Managing firewalls with iptables -- Managing fail2ban to ban malicious IP addresses -- Managing Amazon EC2 instances…”
    Libro electrónico
  12. 2192
    Publicado 2014
    Tabla de Contenidos: “…3.2 FATF Recommendations; 3.3 FATF High-Risk Countries; 3.4 Sound Management of Risks Related to Money Laundering and Financing of Terrorism; 3.4.1 The First Line of Defence; 3.4.2 The Second Line of Defence; 3.4.4 Risk Assessment and Management; 3.4.5 Policies and Procedures; Chapter 4 The EC Money Laundering Directives; 4.1 The Third Money Laundering Directive; 4.1.1 Background to the Directive; 4.1.2 Aims of the Directive; 4.1.3 The UK Implementation of the Directive; 4.1.4 Key Provisions of the Directive; 4.1.5 Overview of the Directive…”
    Libro electrónico
  13. 2193
    Publicado 2016
    Tabla de Contenidos: “…7.3 Programmed I/O -- 7.4 Interrupt-Driven I/O -- 7.5 Direct Memory Access -- 7.6 Direct Cache Access -- 7.7 I/O Channels and Processors -- 7.8 External Interconnection Standards -- 7.9 IBM zEnterprise EC12 I/O Structure -- 7.10 Key Terms, Review Questions, and Problems -- Chapter 8 Operating System Support -- 8.1 Operating System Overview -- 8.2 Scheduling -- 8.3 Memory Management -- 8.4 Intel x86 Memory Management -- 8.5 Arm Memory Management -- 8.6 Key Terms, Review Questions, and Problems -- Part Three Arithmetic and Logic -- Chapter 9 Number Systems -- 9.1 The Decimal System -- 9.2 Positional Number Systems -- 9.3 The Binary System -- 9.4 Converting Between Binary and Decimal -- 9.5 Hexadecimal Notation -- 9.6 Key Terms and Problems -- Chapter 10 Computer Arithmetic -- 10.1 The Arithmetic and Logic Unit -- 10.2 Integer Representation -- 10.3 Integer Arithmetic -- 10.4 Floating- Point Representation -- 10.5 Floating-Point Arithmetic -- 10.6 Key Terms, Review Questions, and Problems -- Chapter 11 Digital Logic -- 11.1 Boolean Algebra -- 11.2 Gates -- 11.3 Combinational Circuits -- 11.4 Sequential Circuits -- 11.5 Programmable Logic Devices -- 11.6 Key Terms and Problems -- Part Four The Central Processing Unit -- Chapter 12 Instruction Sets: Characteristics and Functions -- 12.1 Machine Instruction Characteristics -- 12.2 Types of Operands -- 12.3 Intel x86 and ARM Data Types -- 12.4 Types of Operations -- 12.5 Intel x86 and ARM Operation Types -- 12.6 Key Terms, Review Questions, and Problems -- Appendix 12A Little-, Big-, and Bi-Endian -- Chapter 13 Instruction Sets: Addressing Modes and Formats -- 13.1 Addressing Modes -- 13.2 x86 and ARM Addressing Modes -- 13.3 Instruction Formats -- 13.4 x86 and ARM Instruction Formats -- 13.5 Assembly Language -- 13.6 Key Terms, Review Questions, and Problems -- Chapter 14 Processor Structure and Function…”
    Libro electrónico
  14. 2194
    por Dale Carnegie
    Publicado 2015
    Texto completo en Odilo
    Otros
  15. 2195
    por Walter Isaacson
    Publicado 2016
    Texto completo en Odilo
    Otros
  16. 2196
    Publicado 2011
    Texto completo en Odilo
    Otros
  17. 2197
    por Vived, Elías
    Publicado 2012
    Texto completo en Odilo
    Otros
  18. 2198
    por Ticknor, George
    Publicado 2013
    Texto completo en Odilo
    Otros
  19. 2199
    por Calvo Carilla, José Luis
    Publicado 2013
    Texto completo en Odilo
    Otros
  20. 2200
    por Ruiz de Velasco, Ruperto
    Publicado 2013
    Texto completo en Odilo
    Otros