Mostrando 2,321 - 2,340 Resultados de 2,961 Para Buscar '"Apple"', tiempo de consulta: 0.07s Limitar resultados
  1. 2321
    Revista digital
  2. 2322
    Publicado 1996
    Revista digital
  3. 2323
    Publicado 2003
    Seriada digital
  4. 2324
    por Kammermann, Markus
    Publicado 2022
    Tabla de Contenidos: “…11.2 Dynamic Host Configuration Protocol -- 11.3 DNS (Domain Name System) -- 11.3.1 hosts -- 11.3.2 Der Windows Internet Naming Service (WINS) -- 11.3.3 Das Domain Name System -- 11.3.4 Der Aufbau von DNS -- 11.3.5 Das Konzept des dynamischen DNS -- 11.4 Web- und Mail-Protokolle -- 11.4.1 HTTP -- 11.4.2 FTP -- 11.4.3 TFTP -- 11.4.4 NNTP -- 11.4.5 SMTP -- 11.4.6 POP3 und IMAP4 -- 11.5 Weitere Dienstprotokolle -- 11.5.1 NTP -- 11.5.2 SSH -- 11.5.3 Telnet -- 11.6 Fragen zu diesem Kapitel -- Kapitel 12: Netzwerke betreiben -- 12.1 Grundlagen der Verwaltung -- 12.1.1 Arbeitsgruppen und Domänen -- 12.1.2 Der Client/Server-Ansatz -- 12.1.3 Client/Server-Bausteine -- 12.1.4 Wichtige Fragen zum Einsatz eines NOS -- 12.2 Verschiedene Systeme kurz vorgestellt -- 12.2.1 Apple -- 12.2.2 Unix -- 12.2.3 Linux -- 12.2.4 Von Windows NT bis Windows 2022 -- 12.2.5 Citrix und VMWare -- 12.2.6 Die Bedeutung von SMB über Betriebssysteme hinweg -- 12.3 Die Virtualisierung -- 12.4 Cloud Computing -- 12.4.1 Servicemodelle in der Cloud -- 12.4.2 Betriebsmodelle -- 12.4.3 Angebote aus der Cloud -- 12.5 Ein Wort zum Thema Speicher -- 12.6 Sicherheitsfragen zu Cloud-Modellen und Rechenzentren -- 12.7 Die Administration des Netzwerks -- 12.8 Ressourcen im Netzwerk teilen -- 12.9 Identifikation und Rechte im Netzwerk -- 12.9.1 Benutzer einrichten -- 12.9.2 Das Erstellen von Gruppen -- 12.9.3 Datei- und Ordnerrechte -- 12.9.4 Drucken im Netzwerk -- 12.10 Fragen zu diesem Kapitel -- Kapitel 13: Sicherheitsverfahren im Netzwerkverkehr -- 13.1 Identifikation und Authentifikation -- 13.1.1 Aller Anfang ist ... das Passwort -- 13.1.2 Das Zero Trust-Konzept -- 13.2 Authentifikationsverfahren -- 13.2.1 Single Sign On und Mehr-Faktor-Authentifizierung -- 13.2.2 PAP und CHAP -- 13.2.3 EAP -- 13.2.4 Kerberos -- 13.2.5 RADIUS -- 13.3 Die Hash-Funktion -- 13.4 Verschlüsselung…”
    Libro electrónico
  5. 2325
    Publicado 1980
    Revista digital
  6. 2326
    Publicado 1990
    Revista digital
  7. 2327
    Publicado 1985
    Revista digital
  8. 2328
    Publicado 1986
    Revista digital
  9. 2329
    Publicado 1989
    Revista digital
  10. 2330
    Publicado 2011
    Revista digital
  11. 2331
    Publicado 2024
    Tabla de Contenidos: “…Implementing CRUD operations -- CRUD operations of items -- Adding a new item -- Editing or deleting an item -- CRUD operations of fields -- Refactoring Razor components -- Creating the Navbar component -- Creating a Dropdown component for the context menu -- Using templated components -- Creating a ListView component -- Using the ListView component -- Accessing a native API from Blazor Hybrid apps -- Summary -- Part 3: Testing and Deployment -- Chapter 11: Developing Unit Tests -- Technical requirements -- Unit testing in .NET -- Setting up the unit test project -- Developing test cases for the model -- Sharing context between tests -- Sharing using a constructor -- Sharing using class fixtures -- Sharing using collection fixtures -- Mock .NET MAUI components -- Razor component testing using bUnit -- Changing the project configuration for bUnit -- Creating a bUnit test case -- Creating test cases in Razor files -- Using the RenderFragment delegate -- Testing Razor pages -- Summary -- Further reading -- Chapter 12: Deploying and Publishing in App Stores -- Technical requirements -- Preparing application packages for publishing -- Preparing for publishing -- Publishing to Microsoft Store -- Publishing to Google Play Store -- Publishing to Apple's App Store -- GitHub Actions -- Understanding GitHub Actions -- Workflows -- Events -- Jobs -- Runners -- Steps -- Summary -- Further reading -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  12. 2332
    Publicado 2021
    Tabla de Contenidos: “…Web Application Vulnerability Scanning -- Developing a Remediation Workflow -- Prioritizing Remediation -- Testing and Implementing Fixes -- Overcoming Barriers to Vulnerability Scanning -- Summary -- Exam Essentials -- Lab Exercises -- Activity 4.1: Installing a Vulnerability Scanner -- Activity 4.2: Running a Vulnerability Scan -- Activity 4.3: Developing a Penetration Test Vulnerability Scanning Plan -- Review Questions -- Chapter 5 Analyzing Vulnerability Scans -- Reviewing and Interpreting Scan Reports -- Understanding CVSS -- Validating Scan Results -- False Positives -- Documented Exceptions -- Understanding Informational Results -- Reconciling Scan Results with Other Data Sources -- Trend Analysis -- Common Vulnerabilities -- Server and Endpoint Vulnerabilities -- Network Vulnerabilities -- Virtualization Vulnerabilities -- Internet of Things (IoT) -- Web Application Vulnerabilities -- Summary -- Exam Essentials -- Lab Exercises -- Activity 5.1: Interpreting a Vulnerability Scan -- Activity 5.2: Analyzing a CVSS Vector -- Activity 5.3: Developing a Penetration Testing Plan -- Review Questions -- Chapter 6 Exploiting and Pivoting -- Exploits and Attacks -- Choosing Targets -- Enumeration -- Identifying the Right Exploit -- Exploit Resources -- Exploitation Toolkits -- Metasploit -- PowerSploit -- BloodHound -- Exploit Specifics -- RPC/DCOM -- PsExec -- PS Remoting/WinRM -- WMI -- Fileless Malware and Living Off the Land -- Scheduled Tasks and cron Jobs -- SMB -- DNS -- RDP -- Apple Remote Desktop -- VNC -- SSH -- Network Segmentation Testing and Exploits -- Leaked Keys -- Leveraging Exploits -- Common Post-Exploit Attacks -- Cross Compiling -- Privilege Escalation -- Social Engineering -- Escaping and Upgrading Limited Shells -- Persistence and Evasion -- Scheduled Jobs and Scheduled Tasks -- Inetd Modification -- Daemons and Services…”
    Libro electrónico
  13. 2333
    Publicado 2012
    Tabla de Contenidos: “…Controller Based -- SSID, BSSID, MAC Address -- Beacons and Broadcasts -- Associating and Authenticating -- Encryption -- We've Covered -- The 11 security principles -- Wireless networking basic concepts -- Chapter 2: Wireless Tools and Gadgets -- We'll Cover -- A Lab of Your Own -- Client Devices -- Phones -- Printers -- Access Points -- DD-WRT -- WRT54G -- Apple Airport Express -- Mini Access Points -- Mobile Hotspots -- Smartphones -- Enterprise-Grade Access Points -- Antennas -- Types of Antennas -- Gadgets -- GPS -- Smartphones and PDAs -- Pocket Wireless Scanners -- Spectrum Analyzer -- Operating System of Choice -- We've Covered -- Creating a lab environment -- Client devices -- Access points -- Antennas -- Wireless gadgets -- Choosing a wireless operating system -- Part II: Know Thy Enemy…”
    Libro electrónico
  14. 2334
    Publicado 2008
    Revista digital
  15. 2335
    Publicado 1999
    Tesis
  16. 2336
    Publicado 1998
    Revista digital
  17. 2337
    Publicado 1985
    Revista digital
  18. 2338
    Publicado 1995
    Tesis
  19. 2339
    Publicado 2005
    Revista digital
  20. 2340
    Publicado 2004
    Revista digital