Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Society & social sciences 164
- Cloud computing 121
- Educación pedagogía 93
- Amazon Web Services (Firm) 86
- Descripción y viajes 72
- Historia 71
- Development 60
- Web services 58
- Humanities 51
- Application software 47
- Historia / General 43
- Computer networks 36
- Ciencias Políticas / General 33
- Derecho comunitario 31
- Examinations 31
- Certification 29
- Usos y costumbres 29
- Electronic data processing personnel 28
- Història 28
- Computer security 27
- Economics, finance, business & management 27
- Comunidad Económica Europea 25
- Governance 25
- Security measures 24
- Competencia económica 23
- Computer software 22
- Business & Economics 20
- Management 20
- Engineering & Applied Sciences 18
- Amazon.com (Firm) 17
-
2181
-
2182
-
2183
-
2184
-
2185
-
2186
-
2187
-
2188
-
2189Publicado 2018Tabla de Contenidos: “…-- How to get Docker -- How to use Docker -- Dockerfile -- Docker commands -- Setting up Docker Tooling in Eclipse -- Creating a Docker network -- Creating MySQL container -- Deploying microservices in a Docker container -- Running containers using Docker Compose -- Summary -- Chapter 13: Deploying JEE Applications in the Cloud -- Deploying in the cloud -- Deploying in AWS Cloud -- Creating the user group and user -- Installing the AWS Toolkit for Eclipse -- Launching the EC2 instance -- Installing the CourseManagement EJB application in the EC2 instance -- Installing the GlassFish 5 Server -- Installing the MySQL server -- Configuring the datasource in the GlassFish 5 Server -- Installing the CourseManagmenet REST service using Elastic Beanstalk -- Creating Elastic Beanstalk application from Eclipse -- Deploying in Google Cloud -- Setting up Google Cloud Tools -- Installing the Google Cloud SDK -- Installing Java extensions for the App Engine SDK -- Installing Google Cloud Tools for Eclipse -- Setting Eclipse Preferences for Google Cloud Tools -- Deploying the application in Google Compute Engine -- Creating a VM instance in Google Compute Engine -- Installing Docker in a VM instance -- Deploying the application in Google App Engine -- Summary -- Chapter 14: Securing JEE Applications -- Authentication and authorization in JEE -- Modifying a database to save authentication information -- Securing applications in GlassFish -- Protecting access to folders in web applications…”
Libro electrónico -
2190Publicado 2023Tabla de Contenidos: “…Part 2 of 3 - Pivoting to attack other resources -- Part 3 of 3 - Obtaining the second flag -- Cleaning up -- Summary -- Further reading -- Part 3: Exploring Advanced Strategies and Best Practices in Lab Environment Design -- Chapter 7: Setting Up an IAM Privilege Escalation Lab -- Technical requirements -- Preparing the Cloud9 environment -- Part 1 of 3 - Preparing the EC2 instance role -- Part 2 of 3 - Launching the Cloud9 environment -- Part 3 of 3 - Attaching the IAM role to the EC2 instance of the Cloud9 environment -- Setting up cloud resources and flags manually -- Part 1 of 3 - Preparing the QLDB resource with the first flag -- Part 2 of 3 - Setting up an S3 bucket with the second flag -- Part 3 of 3 - Creating a vulnerable Lambda execution role -- Leveraging Terraform to automatically set up target resources -- Part 1 of 4 - Setting up the file and folder structure -- Part 2 of 4 - Defining the iam_workshop_user module resources -- Part 3 of 4 - Defining the notebook_instance_role module resources -- Part 4 of 4 - Defining the notebook_instance module resources -- Using generative AI tools for exploit code generation -- Part 1 of 3 - Generating a Python function that returns an AWS account ID -- Part 2 of 3 - Generating a Python function that generates a random password -- Part 3 of 3 - Generating Python code that creates a new IAM user -- Simulating penetration testing in the lab environment -- Part 1 of 4 - Retrieving the flag from the S3 bucket -- Part 2 of 4 - Looking for vulnerable resources -- Part 3 of 4 - Using the Lambda execution role for privilege escalation -- Part 4 of 4 - Retrieving the flag from the ledger database -- Cleaning up -- Summary -- Further reading -- Chapter 8: Designing and Building a Vulnerable Active Directory Lab -- Technical requirements -- Preparing the necessary components and prerequisites…”
Libro electrónico -
2191Publicado 2017Tabla de Contenidos: “…Extending community cookbooks by using application wrapper cookbooks -- Creating custom Ohai plugins -- Creating custom knife plugins -- Chapter 4: Writing Better Cookbooks -- Introduction -- Setting environment variables -- Passing arguments to shell commands -- Overriding attributes -- Using search to find nodes -- Using data bags -- Using search to find data bag items -- Using encrypted data bag items -- Accessing data bag values from external scripts -- Getting information about the environment -- Writing cross-platform cookbooks -- Making recipes idempotent by using conditional execution -- Chapter 5: Working with Files and Packages -- Introduction -- Creating configuration files using templates -- Using pure Ruby in templates for conditionals and iterations -- Installing packages from a third-party repository -- Installing software from source -- Running a command when a file is updated -- Distributing directory trees -- Cleaning up old files -- Distributing different files based on the target platform -- Chapter 6: Users and Applications -- Introduction -- Creating users from data bags -- Securing the Secure Shell daemon -- Enabling passwordless sudo -- Managing NTP -- Installing nginx from source -- Creating nginx virtual hosts -- Creating MySQL databases and users -- Managing Ruby on Rails applications -- Managing Varnish -- Managing your local workstation with Chef Pantry -- Chapter 7: Servers and Cloud Infrastructure -- Introduction -- Creating cookbooks from a running system with Blueprint -- Running the same command on many machines at once -- Setting up SNMP for external monitoring services -- Deploying a Nagios monitoring server -- Using HAProxy to load-balance multiple web servers -- Using custom bootstrap scripts -- Managing firewalls with iptables -- Managing fail2ban to ban malicious IP addresses -- Managing Amazon EC2 instances…”
Libro electrónico -
2192Publicado 2014Tabla de Contenidos: “…3.2 FATF Recommendations; 3.3 FATF High-Risk Countries; 3.4 Sound Management of Risks Related to Money Laundering and Financing of Terrorism; 3.4.1 The First Line of Defence; 3.4.2 The Second Line of Defence; 3.4.4 Risk Assessment and Management; 3.4.5 Policies and Procedures; Chapter 4 The EC Money Laundering Directives; 4.1 The Third Money Laundering Directive; 4.1.1 Background to the Directive; 4.1.2 Aims of the Directive; 4.1.3 The UK Implementation of the Directive; 4.1.4 Key Provisions of the Directive; 4.1.5 Overview of the Directive…”
Libro electrónico -
2193Publicado 2016Tabla de Contenidos: “…7.3 Programmed I/O -- 7.4 Interrupt-Driven I/O -- 7.5 Direct Memory Access -- 7.6 Direct Cache Access -- 7.7 I/O Channels and Processors -- 7.8 External Interconnection Standards -- 7.9 IBM zEnterprise EC12 I/O Structure -- 7.10 Key Terms, Review Questions, and Problems -- Chapter 8 Operating System Support -- 8.1 Operating System Overview -- 8.2 Scheduling -- 8.3 Memory Management -- 8.4 Intel x86 Memory Management -- 8.5 Arm Memory Management -- 8.6 Key Terms, Review Questions, and Problems -- Part Three Arithmetic and Logic -- Chapter 9 Number Systems -- 9.1 The Decimal System -- 9.2 Positional Number Systems -- 9.3 The Binary System -- 9.4 Converting Between Binary and Decimal -- 9.5 Hexadecimal Notation -- 9.6 Key Terms and Problems -- Chapter 10 Computer Arithmetic -- 10.1 The Arithmetic and Logic Unit -- 10.2 Integer Representation -- 10.3 Integer Arithmetic -- 10.4 Floating- Point Representation -- 10.5 Floating-Point Arithmetic -- 10.6 Key Terms, Review Questions, and Problems -- Chapter 11 Digital Logic -- 11.1 Boolean Algebra -- 11.2 Gates -- 11.3 Combinational Circuits -- 11.4 Sequential Circuits -- 11.5 Programmable Logic Devices -- 11.6 Key Terms and Problems -- Part Four The Central Processing Unit -- Chapter 12 Instruction Sets: Characteristics and Functions -- 12.1 Machine Instruction Characteristics -- 12.2 Types of Operands -- 12.3 Intel x86 and ARM Data Types -- 12.4 Types of Operations -- 12.5 Intel x86 and ARM Operation Types -- 12.6 Key Terms, Review Questions, and Problems -- Appendix 12A Little-, Big-, and Bi-Endian -- Chapter 13 Instruction Sets: Addressing Modes and Formats -- 13.1 Addressing Modes -- 13.2 x86 and ARM Addressing Modes -- 13.3 Instruction Formats -- 13.4 x86 and ARM Instruction Formats -- 13.5 Assembly Language -- 13.6 Key Terms, Review Questions, and Problems -- Chapter 14 Processor Structure and Function…”
Libro electrónico -
2194
-
2195
-
2196
-
2197
-
2198
-
2199
-
2200