Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Application software 285
- iOS (Electronic resource) 241
- Programming 215
- Mac OS 211
- Development 210
- Macintosh (Computer) 193
- Engineering & Applied Sciences 180
- iPhone (Smartphone) 167
- Operating systems (Computers) 154
- Computer Science 142
- Apple computer 141
- iPad (Computer) 119
- Mobile computing 104
- Apple and iOS 101
- Data processing 87
- Digital video 80
- Editing 78
- Photography 76
- Management 63
- Digital techniques 60
- Final cut (Electronic resource) 59
- Swift (Computer program language) 58
- Computer programming 50
- Computer programs 45
- Tablet computers 42
- Art, Architecture & Applied Arts 41
- Visual Arts 41
- Computer networks 40
- Electrical & Computer Engineering 39
- Computer science 36
-
2321
-
2322
-
2323
-
2324por Kammermann, MarkusTabla de Contenidos: “…11.2 Dynamic Host Configuration Protocol -- 11.3 DNS (Domain Name System) -- 11.3.1 hosts -- 11.3.2 Der Windows Internet Naming Service (WINS) -- 11.3.3 Das Domain Name System -- 11.3.4 Der Aufbau von DNS -- 11.3.5 Das Konzept des dynamischen DNS -- 11.4 Web- und Mail-Protokolle -- 11.4.1 HTTP -- 11.4.2 FTP -- 11.4.3 TFTP -- 11.4.4 NNTP -- 11.4.5 SMTP -- 11.4.6 POP3 und IMAP4 -- 11.5 Weitere Dienstprotokolle -- 11.5.1 NTP -- 11.5.2 SSH -- 11.5.3 Telnet -- 11.6 Fragen zu diesem Kapitel -- Kapitel 12: Netzwerke betreiben -- 12.1 Grundlagen der Verwaltung -- 12.1.1 Arbeitsgruppen und Domänen -- 12.1.2 Der Client/Server-Ansatz -- 12.1.3 Client/Server-Bausteine -- 12.1.4 Wichtige Fragen zum Einsatz eines NOS -- 12.2 Verschiedene Systeme kurz vorgestellt -- 12.2.1 Apple -- 12.2.2 Unix -- 12.2.3 Linux -- 12.2.4 Von Windows NT bis Windows 2022 -- 12.2.5 Citrix und VMWare -- 12.2.6 Die Bedeutung von SMB über Betriebssysteme hinweg -- 12.3 Die Virtualisierung -- 12.4 Cloud Computing -- 12.4.1 Servicemodelle in der Cloud -- 12.4.2 Betriebsmodelle -- 12.4.3 Angebote aus der Cloud -- 12.5 Ein Wort zum Thema Speicher -- 12.6 Sicherheitsfragen zu Cloud-Modellen und Rechenzentren -- 12.7 Die Administration des Netzwerks -- 12.8 Ressourcen im Netzwerk teilen -- 12.9 Identifikation und Rechte im Netzwerk -- 12.9.1 Benutzer einrichten -- 12.9.2 Das Erstellen von Gruppen -- 12.9.3 Datei- und Ordnerrechte -- 12.9.4 Drucken im Netzwerk -- 12.10 Fragen zu diesem Kapitel -- Kapitel 13: Sicherheitsverfahren im Netzwerkverkehr -- 13.1 Identifikation und Authentifikation -- 13.1.1 Aller Anfang ist ... das Passwort -- 13.1.2 Das Zero Trust-Konzept -- 13.2 Authentifikationsverfahren -- 13.2.1 Single Sign On und Mehr-Faktor-Authentifizierung -- 13.2.2 PAP und CHAP -- 13.2.3 EAP -- 13.2.4 Kerberos -- 13.2.5 RADIUS -- 13.3 Die Hash-Funktion -- 13.4 Verschlüsselung…”
Publicado 2022
Libro electrónico -
2325
-
2326
-
2327
-
2328
-
2329
-
2330
-
2331Publicado 2024Tabla de Contenidos: “…Implementing CRUD operations -- CRUD operations of items -- Adding a new item -- Editing or deleting an item -- CRUD operations of fields -- Refactoring Razor components -- Creating the Navbar component -- Creating a Dropdown component for the context menu -- Using templated components -- Creating a ListView component -- Using the ListView component -- Accessing a native API from Blazor Hybrid apps -- Summary -- Part 3: Testing and Deployment -- Chapter 11: Developing Unit Tests -- Technical requirements -- Unit testing in .NET -- Setting up the unit test project -- Developing test cases for the model -- Sharing context between tests -- Sharing using a constructor -- Sharing using class fixtures -- Sharing using collection fixtures -- Mock .NET MAUI components -- Razor component testing using bUnit -- Changing the project configuration for bUnit -- Creating a bUnit test case -- Creating test cases in Razor files -- Using the RenderFragment delegate -- Testing Razor pages -- Summary -- Further reading -- Chapter 12: Deploying and Publishing in App Stores -- Technical requirements -- Preparing application packages for publishing -- Preparing for publishing -- Publishing to Microsoft Store -- Publishing to Google Play Store -- Publishing to Apple's App Store -- GitHub Actions -- Understanding GitHub Actions -- Workflows -- Events -- Jobs -- Runners -- Steps -- Summary -- Further reading -- Other Books You May Enjoy -- Index…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2332Publicado 2021Tabla de Contenidos: “…Web Application Vulnerability Scanning -- Developing a Remediation Workflow -- Prioritizing Remediation -- Testing and Implementing Fixes -- Overcoming Barriers to Vulnerability Scanning -- Summary -- Exam Essentials -- Lab Exercises -- Activity 4.1: Installing a Vulnerability Scanner -- Activity 4.2: Running a Vulnerability Scan -- Activity 4.3: Developing a Penetration Test Vulnerability Scanning Plan -- Review Questions -- Chapter 5 Analyzing Vulnerability Scans -- Reviewing and Interpreting Scan Reports -- Understanding CVSS -- Validating Scan Results -- False Positives -- Documented Exceptions -- Understanding Informational Results -- Reconciling Scan Results with Other Data Sources -- Trend Analysis -- Common Vulnerabilities -- Server and Endpoint Vulnerabilities -- Network Vulnerabilities -- Virtualization Vulnerabilities -- Internet of Things (IoT) -- Web Application Vulnerabilities -- Summary -- Exam Essentials -- Lab Exercises -- Activity 5.1: Interpreting a Vulnerability Scan -- Activity 5.2: Analyzing a CVSS Vector -- Activity 5.3: Developing a Penetration Testing Plan -- Review Questions -- Chapter 6 Exploiting and Pivoting -- Exploits and Attacks -- Choosing Targets -- Enumeration -- Identifying the Right Exploit -- Exploit Resources -- Exploitation Toolkits -- Metasploit -- PowerSploit -- BloodHound -- Exploit Specifics -- RPC/DCOM -- PsExec -- PS Remoting/WinRM -- WMI -- Fileless Malware and Living Off the Land -- Scheduled Tasks and cron Jobs -- SMB -- DNS -- RDP -- Apple Remote Desktop -- VNC -- SSH -- Network Segmentation Testing and Exploits -- Leaked Keys -- Leveraging Exploits -- Common Post-Exploit Attacks -- Cross Compiling -- Privilege Escalation -- Social Engineering -- Escaping and Upgrading Limited Shells -- Persistence and Evasion -- Scheduled Jobs and Scheduled Tasks -- Inetd Modification -- Daemons and Services…”
Libro electrónico -
2333Publicado 2012Tabla de Contenidos: “…Controller Based -- SSID, BSSID, MAC Address -- Beacons and Broadcasts -- Associating and Authenticating -- Encryption -- We've Covered -- The 11 security principles -- Wireless networking basic concepts -- Chapter 2: Wireless Tools and Gadgets -- We'll Cover -- A Lab of Your Own -- Client Devices -- Phones -- Printers -- Access Points -- DD-WRT -- WRT54G -- Apple Airport Express -- Mini Access Points -- Mobile Hotspots -- Smartphones -- Enterprise-Grade Access Points -- Antennas -- Types of Antennas -- Gadgets -- GPS -- Smartphones and PDAs -- Pocket Wireless Scanners -- Spectrum Analyzer -- Operating System of Choice -- We've Covered -- Creating a lab environment -- Client devices -- Access points -- Antennas -- Wireless gadgets -- Choosing a wireless operating system -- Part II: Know Thy Enemy…”
Libro electrónico -
2334
-
2335
-
2336
-
2337
-
2338
-
2339
-
2340