Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Història 23
- Engineering & Applied Sciences 11
- Electrical & Computer Engineering 9
- iPhone (Smartphone) 8
- Development 7
- Fonts 7
- Internet telephony 7
- Telecommunications 7
- Application software 6
- Església Catòlica 6
- Smartphones 6
- C# (Computer program language) 5
- Computer software 4
- Historia 4
- Java (Computer program language) 4
- Llucifer 4
- Microsoft .NET Framework 4
- Mobile computing 4
- Security measures 4
- Teologia 4
- Asterisk (Computer file) 3
- Computer networks 3
- Computer programs 3
- Congressos 3
- Cultura sarda 3
- Fonts històriques 3
- Pocket computers 3
- Alberti, Ottorino Pietro 2
- Castell de Càller (Sardenya, Itàlia) 2
- Catecismes 2
-
141por Minessale, AnthonyTabla de Contenidos: “…exit-soundtimeout; inter-digit-timeout; max-failures; max-timeouts; digit-len; tts-voice; tts-engine; confirm-key; IVR menu destinations; menu-exec-app; menu-exec-api; menu-play-sound; menu-back; menu-top; Routing calls to your IVR; Nesting IVRs; Using phrases with IVRs; Calling Phrase Macros; Phrase Macro examples: voicemail; Advanced routing; Summary; Chapter 7: Building IVR Applications with Lua; Getting started with Lua; Running Lua scripts from the Dialplan; Basic Lua syntax; Building voice applications; Simple IVR-interacting with the caller; Conditions and looping…”
Publicado 2010
Libro electrónico -
142por Gralla, PrestonTabla de Contenidos: “…Google TalkChapter 3; Phone Calls; Placing a Phone Call; Dialing a Call; Managing Contacts; Designating Favorites; Answering Calls; Conference Calling; Visual Voicemail; Call Waiting; Call Forwarding; Caller ID; Bluetooth Earpieces; Chapter 4; Music; Where to Get Music; Using the Music App; Playing Your Music; Creating Playlists; More Music Options; Using Your Droid X2 While Playing Music; Playing Music and Media on Other Devices; Google Music Cloud Player; Chapter 5; Camera, Photos, and Video; Opening the Gallery; Editing Photos, Slideshows, and More; Working with Multiple Photos…”
Publicado 2011
Libro electrónico -
143por Gralla, PrestonTabla de Contenidos: “…Phone CallsPlacing a Phone Call; Dialing a Call; Managing Contacts; Designating Favorites; Setting Up Speed Dial; Answering Calls; Conference Calling; Visual Voicemail; Call Waiting; Call Forwarding; Caller ID; Bluetooth Earpieces; Chapter 4; Music; Where to Get Music; Using the Music App; Playing Your Music; Creating Playlists; More Music Options; Using Your Droid X While Playing Music; Playing Music and Media on Other Devices; Chapter 5; Camera, Photos, and Video; Opening the Gallery; Editing Photos, Sharing Photos, and More; Working with Multiple Photos; Videos in the Gallery…”
Publicado 2011
Libro electrónico -
144Publicado 2010Tabla de Contenidos: “…Voicemail, Texting, & Other Phone Tricks; Visual Voicemail; Text Messages (SMS); Chat Programs; Call Waiting; Call Forwarding; Caller ID; Bluetooth Earpieces and Car Kits; Custom Ringtones; GarageBand Ringtones; Nike + iPhone; Talking Buttons-and Accessibility; 5. …”
Libro electrónico -
145por Hamill, Paul, 1970-Tabla de Contenidos: “…CppUnit Class Reference; AutoRegisterSuite; CompilerOutputter; Exception; Exception::Type; ExpectedExceptionTraits; NamedRegistries; NotEqualException; Orthodox; Outputter; RepeatedTest; SourceLine; SynchronizedObject; SynchronizedObject::ExclusiveZone; SynchronizedObject::SynchronizationObject; Test; TestCaller; TestCase; TestDecorator; TestFactory; TestFactoryRegistry; TestFailure; TestFixture; TestFixtureFactory; TestListener; TestResult; TestResultCollector; TestRunner; TestSetUp; TestSucessListener; TestSuite…”
Publicado 2005
Libro electrónico -
146Publicado 2010Tabla de Contenidos: “…Cover -- Contents -- Getting Started -- Chapter 1: Meet the iPhone -- iPod, Phone, Internet Device, and More -- Boxed In -- On the Face of It -- Up front -- On top -- Down below -- To the left -- The back -- Applications -- The Big Four -- The stores -- The Littler 14 (plus 1) -- Full Gestures -- Tap -- Tap and hold -- Double tap -- Flick -- Two-finger flick -- Three-finger flick -- Drag -- Three-finger drag -- Rotor -- Stretch/pinch -- Touch and drag -- Entering and Editing Text -- Touch typing -- Editing text -- Cut, Copy, and Paste -- Editing text -- Copying Safari text -- Copying Safari images -- Chapter 2: Setup, Sync, and Settings -- Setting Up the iPhone -- Get iTunes -- Plug in the iPhone -- Tabtastic -- Summary -- Info -- Ringtones -- Music -- Photos -- Podcasts -- Video -- Applications -- Settings -- Airplane Mode -- Wi-Fi -- Sounds -- Brightness -- Wallpaper -- General -- And more -- Chapter 3: Phone and Messaging -- Calling All Callers -- Call the old-fashioned way -- Connect with Contacts -- Revisit Recents -- Favor Favorites -- Command it (iPhone 3GS only) -- Exploring In-Call Options -- Mute -- Keypad -- Speaker -- Add Call -- Hold -- Contacts -- Other buttons -- Managing Your Calling Plan -- Keypad -- Voicemail -- Recents -- Favorites -- Contacts -- Working with Contacts -- Entering the people you know -- Organizing contacts in groups -- Making contacts -- Sending Them Messages -- Sending text messages -- Sending MMS messages -- Receiving messages -- Chapter 4: Mail and Calendar -- Using Mail -- Creating an account -- Configuring an Exchange account -- Configuring MobileMe, Gmail, Yahoo, and AOL accounts -- Configuring POP and IMAP accounts -- Configuring further -- Understanding Mail, Contacts, Calendars behavior -- Sending and Receiving Mail -- Receiving email -- Navigating the Message screen -- Creating and sending email…”
Libro electrónico -
147Publicado 2017Tabla de Contenidos: “…Identifying the Players -- Smart(er) VBA Document Deployment -- Email and Saved Passwords -- Keyloggers and Cookies -- Bringing It All Together -- Summary -- Exercises -- Chapter 6: Criminal Intelligence -- Payload Delivery Part VI: Deploying with HTA -- Malware Detection -- Privilege Escalation in Microsoft Windows -- Escalating Privileges with Local Exploits -- Exploiting Automated OS Installations -- Exploiting the Task Scheduler -- Exploiting Vulnerable Services -- Hijacking DLLs -- Mining the Windows Registry -- Command and Control Part VI: The Creeper Box -- Creeper Box Specification -- Introducing the Raspberry Pi and Its Components -- GPIO -- Choosing an OS -- Configuring Full-Disk Encryption -- A Word on Stealth -- Configuring Out-of-Band Command and Control Using 3G/4G -- Creating a Transparent Bridge -- Using a Pi as a Wireless AP to Provision Access by Remote Keyloggers -- The Attack -- Spoofing Caller ID and SMS Messages -- Summary -- Exercises -- Chapter 7: War Games -- Background and Mission Briefing -- Payload Delivery Part VII: USB Shotgun Attack -- USB Media -- A Little Social Engineering -- Command and Control Part VII: Advanced Autonomous Data Exfiltration -- What We Mean When We Talk About "Autonomy" -- Means of Egress -- The Attack -- Constructing a Payload to Attack a Classified Network -- Stealthy 3G/4G Software Install -- Attacking the Target and Deploying the Payload -- Efficient "Burst-Rate" Data Exfiltration -- Summary -- Exercises -- Chapter 8: Hack Journalists -- Briefing -- Advanced Concepts in Social Engineering -- Cold Reading -- C2 Part VIII: Experimental Concepts in Command and Control -- Scenario 1: C2 Server Guided Agent Management -- Scenario 2: Semi-Autonomous C2 Agent Management -- Payload Delivery Part VIII: Miscellaneous Rich Web Content -- Java Web Start -- Adobe AIR -- A Word on HTML5 -- The Attack…”
Libro electrónico -
148por Krikorian, RaffiTabla de Contenidos: “…Capturing Closed Captioning; Showing Closed Captioning on Your Television; 43. Caller ID on Your TV; 44. Running the Same Thing Over and Over...; 45. …”
Publicado 2003
Libro electrónico -
149Publicado 2013Tabla de Contenidos: “…-- Spotlight: global search -- Phone Calls & Face Time: -- Dialing from the phone app -- Favorites list -- Recents list -- Contacts -- Keypad -- Answering call -- Not answering call -- Do not disturb -- Fun with phone calls -- FaceTime video calls -- FaceTime audio calls -- Speech Recognition-And Siri: -- Speak to type -- Siri voice command -- Advanced Siri -- Voice control (iPhone 4) -- Voicemail, Texting & Other Phone Tricks: -- Visual voicemail -- Text messages (SMS) -- iMessages -- Text messages: details and misc -- Free text messages -- Chat programs -- Call waiting -- Call forwarding -- Caller ID -- Bluetooth accessories -- Custom ringtones -- Kiosk mode, large type & accessibility -- Part 2: iPhone As iPod: -- iPhone as iPod: -- List land -- iTunes radio -- Playlists -- Genius playlists -- Artists, songs -- Album mosaic -- Playback control: now playing -- Multi(music) tasking -- Speakers and headphones -- Familiar iPod features -- iTunes store -- Videos app -- Camera, Photos & Video: -- Camera app -- Still photos -- Square photos -- Filters -- Panoramas -- Photos app -- 14 ways to use photos and videos -- My photo stream -- Shared photo streams -- Editing photos -- Geotagging -- Recording video -- Capturing the screen -- All About Apps: -- Two ways to the app store -- Organizing your apps -- Folders -- App preferences -- App updates -- How to find good apps -- Multitasking -- App switcher -- AirPrint: printing from the phone -- Share sheet -- AirDrop -- Troubleshooting apps -- Built-In Apps: -- Calculator -- Calendar -- Clock -- Compass -- Game center -- iBooks -- Maps -- Newsstand -- Notes -- Passbook -- Reminders -- Stocks -- Voice memos -- Weather -- More standard apps -- iPhone Online: -- Getting online: -- Tale of two connections -- Part 3: iPhone Online: -- Getting online: -- Tale of two connections -- Sequence of connections -- List of hotspots -- Commercial hotspots -- Airplane mode and WiFi off mode -- Personal hotspot (tethering) -- Twitter and Facebook -- Web: -- Safari tour -- Zooming and scrolling -- Full-screen mode -- Typing a web address -- Bookmarks -- Reading list -- Shared links -- Web clips -- History list -- Tapping links -- Saving graphics -- Saved passwords & credit cards -- Manipulating multiple pages -- Favorites page -- Reader -- Web security -- Email: -- Setting up your account -- Downloading mail -- VIPs and flagged messages -- What to do with a message -- Writing messages -- Surviving email overload -- Part 4: Connections: -- Syncing with iTunes: -- Three faces of iTunes -- Library -- iTunes store -- Syncing the iPhone -- iTunes tabs -- Summary tab -- Info tab -- Apps tab -- Tones tab -- Music tab -- Movies and TV shows tabs -- Podcast tab -- Books tab -- Photo tab (computer-iPhone) -- On this phone -- On iPhone, multiple computers -- One computer, multiple iPhones -- One-way emergency sync -- Backing up the iPhone -- iCloud: -- What iCoud giveth -- iCoud sync -- Photo stream, photo sharing -- Find my iPhone -- Email -- Video, music, apps: locker in the sky -- iTunes match -- Price of free -- Corporate iPhone: -- Perks -- Setup -- Exchange + your stuff -- Word on troubleshooting -- Virtual private networking (VPN) -- Setting: -- Two new settings tricks -- Airplane mode -- WiFi -- Carrier -- Bluetooth -- Cellular -- Personal hotspot -- Notification center -- Control center -- Do not disturb -- General -- Sounds -- Wallpapers & brightness -- Privacy -- iCloud -- Mail, contacts, calendars -- Notes -- Reminders -- Phone -- Messages -- FaceTime -- Maps -- Compass -- Safari -- iTunes & app store -- Music -- Videos -- Photos & camera -- iBooks -- Game center -- Twitter, Facebook, Flickr, Vimeo -- App preferences -- Part 5: Appendixes: -- Appendix A: Signup & setup: -- Buying a new iPhone -- Setting up a new phone -- Upgrading an older iPhone to iOS 7 -- Software updates -- Restrictions an parental controls -- Cases & accessories -- Appendix B: Troubleshooting & maintenance: -- First rule: Install the updates -- Seven ways to reset the phone -- iPhone doesn't turn on -- Battery life is terrible -- Out of space -- Phone and internet problems -- Email problems -- Warranty and repair -- Battery replacement program -- Where to go from here -- Index…”
Libro electrónico -
150por Wells, ChristopherTabla de Contenidos: “…Session management; 2.3.4.5. Don&t let an old caller back in; 2.3.5. Cross-Site Scripting (XSS); 2.3.6. …”
Publicado 2007
Libro electrónico -
151Publicado 2001Tabla de Contenidos: “…Time-of-Check, Time-of-Use -- Broken passwd -- Avoiding TOCTOU Problems -- Secure File Access -- Temporary Files -- File Locking -- Other Race Conditions -- Conclusion -- 10 Randomness and Determinism -- Pseudo-random Number Generators -- Examples of PRNGs -- The Blum-Blum-Shub PRNG -- The Tiny PRNG -- Attacks Against PRNGs -- How to Cheat in On-line Gambling -- Statistical Tests on PRNGs -- Entropy Gathering and Estimation -- Hardware Solutions -- Software Solutions -- Poor Entropy Collection: How to Read "Secret" Netscape Messages -- Handling Entropy -- Practical Sources of Randomness -- Tiny -- Random Numbers for Windows -- Random Numbers for Linux -- Random Numbers in Java -- Conclusion -- 11 Applying Cryptography -- General Recommendations -- Developers Are Not Cryptographers -- Data Integrity -- Export Laws -- Common Cryptographic Libraries -- Cryptlib -- OpenSSL -- Crypto++ -- BSAFE -- Cryptix -- Programming with Cryptography -- Encryption -- Hashing -- Public Key Encryption -- Threading -- Cookie Encryption -- More Uses for Cryptographic Hashes -- SSL and TLS (Transport Layer Security) -- Stunnel -- One-Time Pads -- Conclusion -- 12 Trust Management and Input Validation -- A Few Words on Trust -- Examples of Misplaced Trust -- Trust Is Transitive -- Protection from Hostile Callers -- Invoking Other Programs Safely -- Problems from the Web -- Client-side Security -- Perl Problems -- Format String Attacks -- Automatically Detecting Input Problems -- Conclusion -- 13 Password Authentication -- Password Storage -- Adding Users to a Password Database -- Password Authentication -- Password Selection -- More Advice -- Throwing Dice -- Passphrases -- Application-Selected Passwords -- One-Time Passwords -- Conclusion -- 14 Database Security -- The Basics -- Access Control -- Using Views for Access Control -- Field Protection…”
Libro electrónico -
152Publicado 2023Tabla de Contenidos: “…Writing readable assertions with FluentAssertions -- Testing performance with Shouldly -- Generating test data with Bogus -- Mocking dependencies with Moq and NSubstitute -- Understanding the need for mocking libraries -- Creating mock objects with Moq -- Programming Moq return values -- Verifying Moq calls -- Mocking with NSubstitute -- Pinning tests with Snapper -- Experimenting with Scientist .NET -- Summary -- Questions -- Further reading -- Chapter 10: Defensive Coding Techniques -- Technical requirements -- Introducing the Cloudy Skies API -- Validating inputs -- Performing basic validation -- Using the nameof keyword -- Validation with guard clauses -- Guard clauses with the GuardClauses library -- Using CallerMemberInformation attributes -- Protecting against null -- Enabling nullability analysis in C# -- Using nullability operators -- Moving beyond classes -- Preferring immutable classes -- Using required and init-only properties -- Primary constructors -- Converting classes into record classes -- Cloning objects using with expressions -- Advanced type usage -- Exploring pattern matching -- Using generics to reduce duplication -- Introducing type aliases with the using directive -- Summary -- Questions -- Further reading -- Part 3: Advanced Refactoring with AI and Code Analysis -- Chapter 11: AI-Assisted Refactoring with GitHub Copilot -- Technical requirements -- Introducing GitHub Copilot -- Understanding GitHub's predictive model -- Starting the conversation with GitHub Copilot Chat -- Getting started with GitHub Copilot in Visual Studio -- Installing and activating GitHub Copilot -- Getting access to GitHub Copilot -- Generating suggestions with GitHub Copilot -- Interacting with GitHub Copilot Chat -- Refactoring with GitHub Copilot Chat -- GitHub Copilot Chat as a code reviewer -- Targeted refactoring with GitHub Copilot Chat…”
Libro electrónico -
153Publicado 2010Tabla de Contenidos: “…5.1 Programming "How-To -- 5.1.1 Program Structure -- 5.1.2 Using Set() -- 5.1.3 Labels and Goto() -- 5.1.4 While() Loops -- 5.1.5 GotoIf() Conditional -- 5.1.6 Gosub() Subroutines -- 5.2 Variables -- 5.2.1 Expanding Variables in an Extension -- 5.2.2 General Considerations -- 5.2.3 Defining Global Variables in extensions.conf -- 5.2.4 Defining Variables with Set() -- 5.2.5 Inheritance of Channel Variables -- 5.2.6 System Channel Variables -- 5.2.7 Manipulating Variables -- 5.3 Special Extensions -- 5.3.1 The h Extension -- 5.3.2 The i Extension -- 5.3.3 The o and a Extensions -- 5.3.4 The t and T Extensions -- 5.3.5 The s Extension -- 5.4 Macros -- 5.5 Deprecated Features -- Chapter 6 Asterisk Extension Language -- 6.1 CLI Commands for AEL -- 6.2 aelparse -- 6.3 Comparing extensions.conf with extensions.ael -- 6.3.1 Line Termination -- 6.3.2 Contexts, Extensions, and Priorities -- 6.3.3 Comments -- 6.3.4 Includes -- 6.3.5 Global Variables -- 6.3.6 Expressions and Variable Assignment -- 6.3.7 Labels, goto, and jump -- 6.3.8 Conditionals -- 6.3.9 Loops -- 6.3.10 Macros -- 6.3.11 Hints -- 6.3.12 Filtering by Caller ID -- 6.4 Choosing between extensions.ael and extensions.conf -- Chapter 7 Protocols -- 7.1 Network Protocols -- 7.1.1 Transmission Control Protocol -- 7.1.2 User Datagram Protocol -- 7.2 Channels -- 7.3 Peers, Users, and Friends -- 7.4 IAX Versus SIP -- Chapter 8 Making Connections -- 8.1 Codecs -- 8.1.1 What Does a Codec Do? …”
Libro electrónico -
154Publicado 2022Tabla de Contenidos: “…Part 1 Getting to Know Apple Watch -- Chapter 1 Watch This: Introducing Apple Watch -- Exploring the Apple Watch Collections -- Figuring Out What Apple Watch Can Do -- Watch faces -- Timers and alarms -- Caller ID or even calls -- Walkie-Talkie -- Health and wellness -- Emergency SOS -- Text messages and instant messages -- Email -- Wrist-to-wrist communication -- Dock -- Calendars -- Maps -- Siri -- Fitness -- Music connectivity and more -- Apple Pay -- Other apps -- Other functions -- Bonus tips -- Determining What You Need for Your Apple Watch -- Getting to Know Apple Watch's Home Screen -- Learning about Apple Watch's Parts -- Watch face -- Digital Crown button -- Side button -- Back sensors/charger -- Watch band -- Using Apple Watch's Touchscreen -- Understanding Apple Watch's Wireless Functions and Internal Sensors -- Bluetooth 5.0 -- Wi-Fi -- Cellular -- NFC -- GPS -- Ultra Wideband (Apple Watch Series 7 only) -- Accelerometer, gyroscope, barometric altimeter, and compass -- Heart-rate sensor -- Electrocardiogram -- Blood-oxygen monitor (pulse oximeter) -- Ambient light sensor -- Tapping with Apple Watch's Haptic Feedback -- Chapter 2 Time Out: Setting Up Your Apple Watch -- Setting Up Apple Watch -- Pairing Apple Watch with the iPhone -- Choosing a passcode for Apple Watch -- Setting up cellular connectivity on Apple Watch -- Family Setup: Setting up Apple Watch for family members -- Enabling Schooltime on a family member's Apple Watch -- Monitoring the Apple Watch battery -- Understanding the Home Screen -- Maintaining Your Apple Watch -- Avoiding water (original Apple Watch) -- Avoiding extreme temps…”
Libro electrónico -
155Publicado 2018Tabla de Contenidos: “…-- Processes, threads, and coroutines -- Processes -- Threads -- Coroutines -- Putting things together -- Introduction to concurrency -- Concurrency is not parallelism -- CPU-bound and I/O-bound -- CPU-bound -- I/O-bound -- Concurrency versus parallelism in CPU-bound algorithms -- Single-core execution -- Parallel execution -- Concurrency versus parallelism in I/O-bound algorithms -- Why concurrency is often feared -- Race conditions -- Atomicity violation -- Deadlocks -- Livelocks -- Concurrency in Kotlin -- Non-blocking -- Being explicit -- Readable -- Leveraged -- Flexible -- Concepts and terminology -- Suspending computations -- Suspending functions -- Suspending lambdas -- Coroutine dispatcher -- Coroutine builders -- Summary -- Chapter 2: Coroutines in Action -- Downloading and installing Android Studio -- Creating a Kotlin project -- Adding support for coroutines -- Android's UI thread -- CalledFromWrongThreadException -- NetworkOnMainThreadException -- Requesting in the background, updating in the UI thread -- Creating a thread -- CoroutineDispatcher -- Attaching a coroutine to a dispatcher -- Starting a coroutine with async -- Starting a coroutine with launch -- Using a specific dispatcher when starting the coroutine -- Adding networking permissions -- Creating a coroutine to call a service -- Adding UI elements -- What happens when the UI is blocked -- Displaying the amount of news that were processed -- Using a UI dispatcher -- Platform-specific UI libraries -- Adding the dependency -- Using Android's UI coroutine dispatcher -- Creating an asynchronous function to hold the request... or not -- A synchronous function wrapped in an asynchronous caller…”
Libro electrónico -
156por Pozoblanco, Francisco Manuel de Velasco y Estrada, Marqués deTabla de Contenidos: “…[Carta, 1733 diciembre 21, Caller, al Marqués de Pozoblanco / Thomas Nin] (h . 79 r.) . 78 . …”
Publicado 1734
Manuscrito -
157por Rajkumar, K.Tabla de Contenidos: “…11.3 Filling and Copying Arrays -- 11.4 Comparing Arrays -- 11.5 Sorting Primitive Arrays -- 11.6 Sorting String Objects -- 11.7 Array Sorting Using Comparable -- 11.8 Array Sorting Using Comparator -- 11.9 Searching Sorted Arrays -- 11.10 Sorting and Searching Using Collections Class -- 11.11 Sorting Lists Using Comparable -- 11.12 Sorting Lists Using Comparator -- 11.13 Summary -- Key Terms -- Review Questions -- Exercises -- Part IV - Java Threads and IO Streams -- Chapter 12: Concurrency Using Threads -- 12.1 Introduction -- 12.2 Multithreading Using Thread Class -- 12.3 Making Threads to Sleep -- 12.4 Yielding Control to Other Threads -- 12.5 Problem: Multithreaded Adder -- 12.6 Suspending Caller Thread -- 12.7 Daemon Threads -- 12.8 Thread Priority -- 12.9 Multithreading Using Runnable -- 12.10 Thread Synchronization for Resource Sharing -- 12.11 Synchronized Methods -- 12.12 Synchronized Block -- 12.13 Cordination Among Threads -- 12.14 Problem: Car Dealer Application -- 12.15 Threads Life -- 12.16 Concurrent Programming Packages -- 12.17 The Concurrent Package -- 12.18 The Concurrent.Atomic Package -- 12.19 Problem: Random Strings Generator -- 12.20 The Concurrent.locks Package -- 12.21 Summary -- Key Terms -- Review Questions -- Exercises -- Chapter 13: Processing Byte and Object Streams -- 13.1 Introduction -- 13.2 The File Class -- 13.3 Filtering File Names -- 13.4 Filtering Absolute File Paths -- 13.5 Types of Input Streams -- 13.5.1 Reading Files as Bytes -- 13.5.2 Reading Files into Byte Array -- 13.5.3 Reading Strings as Bytes -- 13.6 Types of Output Streams -- 13.6.1 Writing to Files as Bytes -- 13.6.2 Writing to Byte Array as Bytes -- 13.7 Problem: Copy Files as Bytes -- 13.8 Processing Primitive Data Types -- 13.9 Problem: Generating Students Mark List -- 13.10 Serializing Objects…”
Publicado 2013
Libro electrónico -
158Publicado 2021Tabla de Contenidos: “…Chapter 10 Bringing Teams into the Physical World -- Discovering How Teams Is More Than Software -- Going Hands Free with Teams -- Getting Visual with Cameras -- Using Desktop Phones for Teams -- Turning a Conference Room into a Teams Room -- Part 4 Taking Communication to the Next Level with Voice -- Chapter 11 Making and Receiving Calls -- Making Phone Calls in Teams -- Calling another Teams user -- Finding the Calls dashboard -- Receiving a Call in Teams -- Using Teams with Phone Numbers -- Adding Phone Numbers to Teams -- Obtaining a license and dial plan -- Signing up for a new phone number -- Assigning a phone number to a Teams user -- Bringing an existing phone number to Teams -- Unassigning or changing the phone number assigned to a user -- Setting Up a Teams Phone -- Chapter 12 Letting Teams Be Your Personal Operator -- Setting Up Audio Devices in Teams -- Customizing How You Receive Calls -- Restricting Calls with Do Not Disturb -- Delegating Access to Others -- Digging into Modern Voicemail -- Understanding Phone Number Types -- Taking calls in an orderly fashion with call queues -- Routing callers with auto attendants -- Part 5 Becoming a Microsoft Teams Administrator -- Chapter 13 Getting to Know the Teams Admin Center -- Finding and Signing In to the Teams Admin Center -- Getting Familiar with the Teams Admin Center -- Adding New Users to Microsoft 365 and Teams -- Managing Teams Users -- Chapter 14 Digging into Teams Administration -- Configuring Teams -- Making Configuration Changes for Meetings -- Conference bridges -- Meeting policies -- Meeting settings -- Live events policies -- Live events settings -- Adjusting Settings for the Entire Organization -- Identifying Locations of Offices and Buildings -- Adding Default Teams Apps -- Setting Policies for Chat and Channels -- Managing Devices for Your Organization…”
Libro electrónico -
159Publicado 2018Tabla de Contenidos: “…-- Maltego for network data gathering -- Step 1 - opening Maltego -- Step 2 - choosing a machine -- Step 3 - choosing a target -- Step 4 - results -- Using Maltego to collect data on an individual -- Step 1 - selecting the machine -- Step 2 - specifying a target -- Step 3 - results -- Google -- Hacking personal information -- Hacking servers -- Apache servers -- Microsoft servers -- Oracle servers -- IBM servers -- Netscape servers -- Red Hat servers -- System reports -- Error message queries -- Social engineer toolkit (SET) -- Spear phishing -- Web attack vector -- Infectious media generator -- SMS spoofing attack vector -- Wireless access point attack vector -- QRCode attack vector -- Third-party modules - fast track exploitation -- Create a payload and listener -- Mass mailer attack -- Phone tools -- Caller ID spoofing -- Scripts -- The way back machine -- Spokeo -- Metagoofil -- Fingerprinting Organizations with Collected Archives (FOCA) -- The credential harvester attack method -- Social engineering exercise -- Phishing with BeEF -- Zabasearch.com -- Job postings -- Shodan.io -- Default passwords -- Hardware keyloggers -- Toll-free number providers -- Netcraft website -- Netcraft toolbar -- Microsoft Edge SmartScreen -- Windows Defender application guard -- SmartScreen filter -- Windows Defender network protection -- Highly recommended -- Ask the experts -- Tips -- Summary -- Chapter 9: Prevention and Mitigation -- Learning to identify social engineering attacks…”
Libro electrónico -
160Publicado 2021“…The first group consists of the QRs with categorical variables, caller ANOVA QRs, where ordinal variables are treated as nominal variables and the numerical independent variables (IVs) are transformed to ordinal variables. …”
Libro electrónico