Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 361
- Development 296
- History 270
- Engineering & Applied Sciences 250
- Application software 219
- Computer Science 184
- Computer networks 179
- Artificial intelligence 169
- Data processing 152
- Historia 149
- Leadership 148
- Technological innovations 126
- Business & Economics 120
- Organizational change 113
- Computer software 111
- Education 108
- Security measures 104
- Information technology 102
- Economic conditions 99
- Computer security 98
- Machine learning 96
- Social aspects 96
- Design 95
- Research & information: general 93
- Climatic changes 87
- Technology: general issues 87
- Software engineering 86
- History of engineering & technology 85
- Economic policy 84
- Computer programs 80
-
7161Publicado 2008Tabla de Contenidos: “…Inter-VLAN Communication Using an External Router: Router-on-a-Stick -- Inter-VLAN Communication Tips -- Configuration Example: Inter-VLAN Communication -- Chapter 14 STP and EtherChannel -- Spanning Tree Protocol -- EtherChannel -- Part VI: Extending the LAN -- Chapter 15 Implementing a Wireless LAN -- Wireless Access Point Configuration: Linksys 300N Access Point -- Wireless Client Configuration: Linksys Wireless-N Notebook Adapter -- Part VII: Network Administration and Troubleshooting -- Chapter 16 Backing Up and Restoring Cisco IOS Software and Configurations -- Boot System Commands -- The Cisco IOS File System -- Backing Up Configurations to a TFTP Server -- Restoring Configurations from a TFTP Server -- Backing Up the Cisco IOS Software to a TFTP Server -- Restoring/Upgrading the Cisco IOS Software from a TFTP Server -- Restoring the Cisco IOS Software from ROM Monitor Mode Using Xmodem -- Restoring the Cisco IOS Software Using the ROM Monitor Environmental Variables and tftpdnld Command -- Chapter 17 Password-Recovery Procedures and the Configuration Register -- The Configuration Register -- Password-Recovery Procedures for Cisco Routers -- Password Recovery for 2960 Series Switches -- Chapter 18 Cisco Discovery Protocol (CDP) -- Cisco Discovery Protocol -- Chapter 19 Telnet and SSH -- Using Telnet to Remotely Connect to Other Devices -- Configuring the Secure Shell Protocol (SSH) -- Chapter 20 The ping and traceroute Commands -- ICMP Redirect Messages -- The ping Command -- Examples of Using the ping and the Extended ping Commands -- The traceroute Command -- Chapter 21 SNMP and Syslog -- Configuring SNMP -- Configuring Syslog -- Chapter 22 Basic Troubleshooting -- Viewing the Routing Table -- Determining the Gateway of Last Resort -- Determining the Last Routing Update -- OSI Layer 3 Testing -- OSI Layer 7 Testing…”
Libro electrónico -
7162por White, BillTabla de Contenidos: “…3.4.2 ESCON channel -- 3.4.3 FICON channel -- 3.4.4 OSA-Express adapter -- 3.4.5 Coupling Facility links -- 3.4.6 External Time Reference (ETR) feature -- 3.4.7 Cryptographic features -- Chapter 4. …”
Publicado 2004
Libro electrónico -
7163Publicado 2003Tabla de Contenidos: “…Business logic -- PiggyBank business layer -- Preparing Application Developer -- Workspace -- Preferences -- Import required projects -- Implementing the components -- Implementing the framework project -- Creating the Java project -- Tailoring the logging implementation -- Creating the packages -- Creating the classes -- Creating the IPiggyBankBusinessDelegate interface -- Creating the BusinessDelegateFactory -- Implementing the business delegate project -- Creating the Java project -- Creating the packages -- Creating the classes -- Creating the PiggyBankEJBDelegateImpl -- Creating the PiggyBankEJBDelegateFactory -- Creating an enterprise application for the EJBs -- Creating an EAR project with an EJB module -- Preparing the WebSphere test environment -- Server project -- WebSphere Version 5.0.2 server -- Adding the enterprise application to the server -- Configuring the server with a data source -- Define an authentication alias -- Define a data source -- Setting the server class path -- Enabling security for the server -- Disable security for now -- Utility projects -- Adding a utility project to an enterprise application -- Module dependency -- Implementing the EJB project -- Project properties -- Creating the packages -- Reviewing the model -- Creating the transfer objects -- Creating the CMP entity beans -- Create the Customer entity bean -- Create the CmpEntityAdapter…”
Libro electrónico -
7164Publicado 2017Tabla de Contenidos: “…Chapter 11: Orchestrating cloud resources -- Introducing the cloud -- Automating cloud provisioning -- Using CloudFormation -- Using Terraform -- Using Puppet -- Setting up an Amazon AWS account -- Creating an AWS account -- Creating an IAM policy -- Creating an IAM user -- Storing your AWS credentials -- Getting ready to use puppetlabs/aws -- Creating a key pair -- Installing the puppetlabs/aws module -- Installing the AWS SDK gem -- Creating EC2 instances with Puppet -- Choosing an Amazon Machine Image (AMI) -- Creating the EC2 instance -- Accessing your EC2 instance -- VPCs, subnets, and security groups -- The ec2_securitygroup resource -- The ec2_instance resource -- Managing custom VPCs and subnets -- Creating an instance in a custom VPC -- The ec2_vpc resource -- The ec2_vpc_internet_gateway resource -- The ec2_vpc_routetable resource -- The ec2_vpc_subnet resource -- Other AWS resource types -- Provisioning AWS resources from Hiera data -- Iterating over Hiera data to create resources -- Cleaning up unused resources -- Summary -- Chapter 12: Putting it all together -- Getting the demo repo -- Copying the repo -- Understanding the demo repo -- The control repo -- Module management -- Classes -- Roles -- Profiles -- Users and access control -- SSH configuration -- Sudoers configuration -- Time zone and clock synchronization -- Puppet configuration -- The bootstrap process -- Adapting the repo for your own use -- Configuring users -- Adding per-node data files and role classes -- Modifying the bootstrap credentials -- Bootstrapping a new node -- Bootstrapping a Vagrant VM -- Bootstrapping physical or cloud nodes -- Using other distributions and providers -- Summary -- The beginning -- Index…”
Libro electrónico -
7165Publicado 2011Tabla de Contenidos: “…-- Adding a Blend Behavior in Code -- Creating a New Blend Behavior -- Finding More Information -- Summary -- 12 Sketching User Experience -- Sketching as a Discovery Process -- Using Sketching and Wireframing Tools -- Other Kinds of Sketching -- Discovering SketchFlow -- Creating a New SketchFlow Application -- Checking the Panels -- Creating and Connecting Screens -- Building the UI -- Creating a Component Screen -- Using Sketch Controls -- Exploring the Sketch Controls -- Creating States and Transitions -- Building an Animation -- Deploying the SketchFlow Application -- Running the Prototype -- Giving Feedback -- Importing and Managing User Feedback -- Importing and Exporting -- Importing from Photoshop and Illustrator -- Importing from PowerPoint -- Exporting to Word -- Integrating and Collaborating -- Integrating into SharePoint -- Integrating into Team Foundation Server -- Summary -- 13 Creating Line-of-Business Applications -- Preparing the Server-Side -- Prerequisites -- Preparing the Server-Side Application -- Creating the Silverlight Client -- Bringing the Client and the Server Together -- Adding a Domain Service -- Inspecting the Domain Service Class -- Inspecting the Metadata -- Creating a New Server-Side Query -- Working with the Visual Designer -- Understanding the DomainDataSource -- Calling a Query with Parameter -- Sorting the Data -- Adding a Pager -- Refactoring the Application to MVVM -- Adding a View-model -- Adapting the XAML Markup -- Customizing the Columns -- Localizing the User Interface -- Adding a RelayCommand Class -- Executing the CRUD Operations in Code -- Displaying Messages from the View-model -- Deleting an Order -- Validating the Values…”
Libro electrónico -
7166Publicado 2015Tabla de Contenidos: “…ROLE PROFILE -- Categories of Working Roles -- COMMON ROLES INVOLVED WITH ROLE MODELING -- ROLES WITHIN BPM -- TYPICAL BPM COE ROLES -- BPM CoE Stakeholders -- Process Owner -- BPM CoE Manager -- Business Process Portfolio Manager -- Process Project Manager -- Process Expert -- Business Process Analyst -- Process Engineer -- Process Architect -- Enterprise Architect -- Process Support Desk -- Methods and Tools Specialist -- Business Process Management Tool Administrator -- Training Specialist -- ADDITIONAL ROLES -- ROLE PROFILE WITHIN BPM COE -- ROLE PROFILE WITHIN BPM PROJECTS -- CONCLUSION -- End Notes -- Working with the Business Process Management (BPM) Life Cycle -- INTRODUCTION -- PHASE 1: ANALYZE-PROJECT PREPARATION AND BLUEPRINT -- Step 1: Identify Critical Business Factors -- Step 2: Describe Process Goals -- Step 3: Choose Building -- Step 4: Check for Process Reference Content -- Step 4a: Process Reference Content Available -- Step 4b: Define High-Level Process Landscape Based on Process Reference Content -- Step 4c: Analyze Match of Process Reference Content -- Step 4d: Processes That Do Not Match Process Reference Content -- Step 4e: Understand As-Is High-Level Process Landscape -- Step 5: No Process Reference Content Available -- PHASE 2: DESIGN-PROJECT REALIZATION AND DESIGN -- Step 6: Process Planning and Design -- Step 7: Define Process Map -- Step 8: Design Solution -- Step 9: Case-Based Process Concept -- Step 10: Value-Based Process Concept -- Step 11: Standardize and Integrate -- Step 12: Process Requirement Management -- Step 13: Processes Cannot Be Adapted -- PHASE 3: BUILD-FINAL PROJECT PREPARATION -- Step 14: As-Is Analysis -- Step 15: To-Be Value-Driven Process Design -- Step 16: Harmonize Variants Based on Value-Driven Process Design -- Step 17: To-Be Documentation and To-Be Organizational Structure…”
Libro electrónico -
7167Publicado 2004Tabla de Contenidos: “…Fundamental concepts in process integration -- 2.1 The need for a unifying technique -- 2.1.1 Similarities between intra- and inter-enterprise integration -- 2.1.2 Summary -- 2.2 Process integration concepts and notations -- 2.2.1 Collaboration and interaction -- 2.2.2 Connectors and adapters -- 2.2.3 Classification of interaction between subsystems -- 2.3 QoS capabilities framework -- 2.3.1 Operability -- 2.3.2 Availability -- 2.3.3 Federation -- 2.3.4 Performance -- 2.3.5 Security -- 2.3.6 Standards compliance -- 2.3.7 Transactionality -- 2.4 Application patterns for Application Integration -- 2.5 Application patterns for Extended Enterprise -- 2.6 Summary -- Chapter 3. …”
Libro electrónico -
7168Publicado 2022Tabla de Contenidos: “…3.2.4 Rehabilitation Robot for Gait Training -- 3.3 Solutions and Methods for the Rehabilitation Process -- 3.3.1 Gait Analysis -- 3.3.2 Methods Based on Deep Learning -- 3.3.3 Use of Convolutional Neural Networks -- 3.4 Proposed System -- 3.4.1 Detection of Motion and Rehabilitation Mechanism -- 3.4.2 Data Collection Using Wearable Sensors -- 3.4.3 Raspberry Pi -- 3.4.4 Pre-Processing of the Data -- 3.5 Analysis of the Data -- 3.5.1 Feature Extraction -- 3.5.2 Machine Learning Approach -- 3.5.3 Remote Rehabilitation Mode -- 3.6 Results and Discussion -- 3.7 Conclusion -- References -- 4 Smart Sensors for Activity Recognition -- 4.1 Introduction -- 4.2 Wearable Biosensors for Activity Recognition -- 4.3 Smartphones for Activity Recognition -- 4.3.1 Early Analysis Activity Recognition -- 4.3.2 Similar Approaches Activity Recognition -- 4.3.3 Multi-Sensor Approaches Activity Recognition -- 4.3.4 Fitness Systems in Activity Recognition -- 4.3.5 Human-Computer Interaction Processes in Activity Recognition -- 4.3.6 Healthcare Monitoring in Activity Recognition -- 4.4 Machine Learning Techniques -- 4.4.1 Decision Trees Algorithms for Activity Reorganization -- 4.4.2 Adaptive Boost Algorithms for Activity Reorganization -- 4.4.3 Random Forest Algorithms for Activity Reorganization -- 4.4.4 Support Vector Machine (SVM) Algorithms for Activity Reorganization -- 4.5 Other Applications -- 4.6 Limitations -- 4.6.1 Policy Implications and Recommendations -- 4.7 Discussion -- 4.8 Conclusion -- References -- 5 Use of Assistive Techniques for the Visually Impaired People -- 5.1 Introduction -- 5.2 Rehabilitation Procedure -- 5.3 Development of Applications for Visually Impaired -- 5.4 Academic Research and Development for Assisting Visually Impaired -- 5.5 Conclusion -- References -- 6 IoT-Assisted Smart Device for Blind People -- 6.1 Introduction…”
Libro electrónico -
7169Publicado 2022Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Algorithms -- Chapter 1 Introducing Algorithms -- Describing Algorithms -- The right way to make toast: Defining algorithm uses -- Finding algorithms everywhere -- Using Computers to Solve Problems -- Getting the most out of modern CPUs and GPUs -- Working with special-purpose chips -- Networks: Sharing is more than caring -- Leveraging available data -- Distinguishing between Issues and Solutions -- Being correct and efficient -- Discovering there is no free lunch -- Adapting the strategy to the problem -- Describing algorithms in a lingua franca -- Facing problems that are like brick walls, only harder -- Structuring Data to Obtain a Solution -- Understanding a computer's point of view -- Arranging data makes the difference -- Chapter 2 Considering Algorithm Design -- Starting to Solve a Problem -- Modeling real-world problems -- Finding solutions and counterexamples -- Standing on the shoulders of giants -- Dividing and Conquering -- Avoiding brute-force solutions -- Keeping it simple, silly (KISS) -- Breaking down a problem is usually better -- Learning that Greed Can Be Good -- Applying greedy reasoning -- Reaching a good solution -- Computing Costs and Following Heuristics -- Representing the problem as a space -- Going random and being blessed by luck -- Using a heuristic and a cost function -- Evaluating Algorithms -- Simulating using abstract machines -- Getting even more abstract -- Working with functions -- Chapter 3 Working with Google Colab -- Defining Google Colab -- Understanding what Google Colab does -- Getting familiar with Google Colab features -- Working with Notebooks -- Creating a new notebook…”
Libro electrónico -
7170Project managementProject Management For DummiesPublicado 2022Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Project Management -- Chapter 1 Project Management: The Key to Achieving Results -- Determining What Makes a Project a Project -- Understanding the three main components that define a project -- Recognizing the diversity of projects -- Describing the four phases of a project life cycle -- Adopting a Principled Approach to Project Management -- Starting with stewardship and leadership -- Continuing with team and stakeholders -- Delivering value and quality -- Handling complexity, opportunities, and threats -- Exhibiting adaptability and resilience -- Thinking holistically and enabling change -- What Happened to Process Groups and Knowledge Areas? …”
Libro electrónico -
7171Publicado 2024Tabla de Contenidos: “…Modeling data for operational performance -- Nodes, edges, and aggregates -- Sharding and partition keys -- Single table design examples -- Restaurant service -- Customer service -- Cart service -- Delivery service -- Leveraging change data capture -- Database-first event sourcing -- Soft deletes -- Latching -- Summary -- Chapter 6: A Best Friend for the Frontend -- Focusing on user activities -- A BFF service is responsible for a single user activity -- A BFF service is owned by the frontend team -- A BFF service is decoupled, autonomous, and resilient -- Dissecting the Backend for Frontend pattern -- Datastore -- API gateway -- Query and command functions -- Listener function -- Trigger function -- Dissecting function-level nano architecture -- Models -- Connectors -- Handlers -- Choosing between REST and GraphQL -- REST -- GraphQL -- Implementing different kinds of BFF services -- CRUD BFF services -- List-of-values (Lov) BFF services -- Task BFF services -- Search BFF services -- Action BFF services -- Dashboard BFF services -- Reporting BFF services -- Archive BFF services -- Summary -- Chapter 7: Bridging Intersystem Gaps -- Creating an anti-corruption layer -- Macro-level ports and adapters -- Substitution principle -- External bulkhead -- Dissecting the External Service Gateway pattern -- Connectivity -- Semantic transformation -- Ingress -- Egress -- Packaging -- Separate cloud accounts -- Integrating with third-party systems -- Egress - API call -- Ingress - webhook -- Asynchronous request response -- Synchronous ESG/BFF hybrid -- Integrating with other subsystems -- Egress - upstream subsystem -- Ingress - downstream subsystem -- Integrating across cloud providers -- Integrating with legacy systems -- Ingress - Change Data Capture -- Egress - Direct SQL -- Egress - circuit breaker -- Ingress - relay -- Providing an open API and SPI…”
Libro electrónico -
7172por Rajendran, SathiyarajTabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Artificial Intelligence in Autonomous Vehicles-A Survey of Trends and Challenges -- 1.1 Introduction -- 1.2 Research Trends of AI for AV -- 1.3 AV-Pipeline Activities -- 1.3.1 Vehicle Detection -- 1.3.2 Rear-End Collision Avoidance -- 1.3.3 Traffic Signal and Sign Recognition -- 1.3.4 Lane Detection and Tracking -- 1.3.5 Pedestrian Detection -- 1.4 Datasets in the Literature of Autonomous Vehicles -- 1.4.1 Stereo and 3D Reconstruction -- 1.4.2 Optical Flow -- 1.4.3 Recognition and Segmentation of Objects -- 1.4.4 Tracking Datasets -- 1.4.5 Datasets for Aerial Images -- 1.4.6 Sensor Synchronization Datasets -- 1.5 Current Industry Standards in AV -- 1.6 Challenges and Opportunities in AV -- 1.6.1 Cost -- 1.6.2 Security Concerns -- 1.6.3 Standards and Regulations -- 1.7 Conclusion -- References -- Chapter 2 Age of Computational AI for Autonomous Vehicles -- 2.1 Introduction -- 2.1.1 Autonomous Vehicles -- 2.1.2 AI in Autonomous Vehicles -- 2.1.2.1 Functioning of AI in Autonomous Vehicles -- 2.2 Autonomy -- 2.2.1 Autonomy Phases -- 2.2.2 Learning Methodologies for Incessant Learning in Real-Life Autonomy Systems -- 2.2.2.1 Supervised Learning -- 2.2.2.2 Unsupervised Learning -- 2.2.2.3 Reinforcement Learning -- 2.2.3 Advancements in Intelligent Vehicles -- 2.2.3.1 Integration of Technologies -- 2.2.3.2 Earlier Application of AI in Automated Driving -- 2.3 Classification of Technological Advances in Vehicle Technology -- 2.4 Vehicle Architecture Adaptation -- 2.5 Future Directions of Autonomous Driving -- 2.6 Conclusion -- References -- Chapter 3 State of the Art of Artificial Intelligence Approaches Toward Driverless Technology -- 3.1 Introduction -- 3.2 Role of AI in Driverless Cars -- 3.2.1 What is Artificial Intelligence? …”
Publicado 2024
Libro electrónico -
7173Publicado 2023Tabla de Contenidos: “…Considering the characteristics of the literary novel -- Exploring experimental fiction -- Creating Entertaining Commercial Fiction -- Romancing the fiction -- Conforming to the basic requirements of romantic fiction -- Playing with variations on the romantic theme -- Uncovering crime and detective fiction -- Increasing the excitement with thrillers and adventure stories -- Imagining science fiction and fantasy -- Categorizing science fiction -- Focusing on fantasy -- Embracing horror -- Trying erotic fiction -- Chapter 13 Once Upon a Time: Writing for Children -- Dispelling the "It's Easy to Write for Kids" Myth -- Before Schooling Begins: Writing for the Under 5s -- Following the three "Rs" -- Feeling the rhythm -- Taking time to rhyme -- Repeating yourself -- Sounding out words -- Making objects come to life -- Showing coping skills -- Learning to Read Alone: Writing for 5- to 9-Year-Olds -- Captivating the Confident Reader: Age 9 to 13 -- Moving Toward More Mature Themes: Teenage Readers -- Crossover fiction -- Retelling old tales -- Exploring the Variety of Books for Children -- Crafting comic books -- Considering nonfiction for children -- Chapter 14 Penning Plays -- Setting Up the Dramatic Structure -- Going over some ground rules -- Sticking with the classic three-act structure -- Getting Started and Developing Your Play -- Putting a Play Together: The Artistic Process -- Sorting Out Types of Play -- Formatting Your Script -- Seeing Theater Spaces -- Writing for Radio -- Creating interest with sound -- Conveying mood with music -- Getting Your Work Out There -- Chapter 15 Writing Screenplays -- Writing a Screenplay: The Stages -- Crafting an enticing logline -- Expanding on your idea with the synopsis -- Giving your idea the full treatment -- Preparing for the Collaborative Process -- Adapting an Existing Story -- Securing options…”
Libro electrónico -
7174por Scott, Sharon M.Tabla de Contenidos: “…-- Finding a Studio Location -- Considering Interior Spaces -- Soundproofing -- Sound dampening -- Installing Studio Furniture -- Selecting Studio Equipment -- Audio console -- Microphones -- Mic booms -- On-air light -- Headphones -- Headphone amp -- Studio monitors -- Turntables -- CD players -- Cassette players -- Computers -- Webcaster -- Archiver -- Player -- Computer cables -- Accessories and adapters…”
Publicado 2023
Libro electrónico -
7175por Birt, NateTabla de Contenidos: “…Crest-climbing insight No. 4: Your flawed fear needs a free ride home -- Crest-climbing insight No. 5: You can't climb all the hills today -- Great social impact communicators build a resilient mindset to keep going in the face of adversity -- Act with integrity -- Lead with humility -- Be scientific in your approach -- Stay skeptical -- Communicate with transparency and openness -- After your hike past the crest, learn to navigate the cloud forest beyond -- Wait -- Analyze -- Take Gratitude -- Evaluate Options -- Run Again -- The watchout and the opportunity -- Key Questions -- Chapter 6: Secret #6: Highly effective social impact communicators ... cede perfection to the messy reality of change-making -- How messy looks for social impact communicators -- Paint the vision, not Van Gogh -- Why you should embrace satisfied persistence rather than perfection -- Stop trying to tie up all the loose ends -- Move ahead instead of around in circles -- When the dust flies, remember it will settle -- Capture attention and direct focus rather than sowing chaos -- Turn panic into peaceful action -- Guard the silent moments -- Engage in regular conversation that sparks ideas and opportunities -- Trade predictability for adaptability -- Key Questions -- Chapter 7: Secret #7: Highly effective social impact communicators ... build personal and professional legacies that outlive them and their careers -- First principles of legacy building for social impact communicators -- Principle No. 1: Legacy is the ripple effect of our actions -- Principle No. 2: Legacy is shiftable, not set in stone -- Principle No. 3: Legacy exists beyond our lifetime -- Principle No. 4: Legacy can be a blessing or a byword -- Principle No. 5: Legacy persists in the background -- How you can create a legacy that outlives you -- Legacy Builder 1: Give away your grace and mercy liberally…”
Publicado 2023
Libro electrónico -
7176Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to WinUI and Windows Applications -- Chapter 1: Introduction to WinUI -- Technical requirements -- Before UWP - Windows 8 XAML applications -- Windows application UI design -- Windows Runtime (WinRT) -- User backlash and the path forward to Windows 10 -- Windows 10 and UWP application development -- Language choice with UWP development -- Lifting app restrictions -- UWP backward compatibility -- What is XAML? -- Creating an adaptive UI for any device -- Powerful data binding -- Styling your UI with XAML -- Separating presentation from business logic -- What is WinUI? …”
Libro electrónico -
7177por Blyth, AndrewTabla de Contenidos: “…Logging and reporting -- Adapting to web service specifics -- Handling CAPTCHA and multifactor authentication -- Iterating and refining -- Bruteforcing a hash -- Understanding hash brute forcing -- Setting up the environment -- Hash types and hashcat -- PowerShell script for hash brute forcing -- Customization for different hash algorithms -- Salting -- Handling larger character sets and optimizing -- Summary -- Chapter 11: PowerShell and Remote Control and Administration -- Remote access and PowerShell -- Enabling PowerShell remoting -- Configuring WinRM -- Connecting to a remote machine -- Executing commands on remote machines -- Remoting with credentials -- Configuring trusted hosts -- Session configuration -- Parallel remoting -- PowerShell and remote administration -- Establishing remote sessions -- Executing commands on remote machines -- Remote variable usage -- Remote script execution -- Handling background jobs -- Parallel remoting -- Remote registry manipulation -- Remote event log retrieval -- Remote service management -- Remote software installation -- Remoting to Azure virtual machines -- Remote network configuration -- Remote user management -- Security considerations -- Remote file copy -- Using PowerShell for SNMP -- SNMP module installation -- SNMP agent query -- SNMP walking -- SNMP settings -- SNMP trap handling -- SNMP bulk requests -- SNMP monitoring with PowerShell -- SNMP and PowerShell integration -- SNMP and graphical interfaces -- SNMP and logging -- Summary -- Part 3: Penetration Testing on Azure and AWS cloud Environments -- Chapter 12: Using PowerShell in Azure -- Introduction to Azure -- Azure architecture and governance -- Azure Policy enforcement -- Role-based access control (RBAC) -- Resource tagging -- Resource locking -- Azure blueprint deployment -- Compliance reporting -- Accessing Azure…”
Publicado 2024
Libro electrónico -
7178
-
7179
-
7180