Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 16
- Novela francesa 16
- Política y gobierno 9
- Biografia 6
- Història 6
- Arqueología 5
- Crítica e interpretación 5
- Law 5
- Mozart, Wolfgang Amadeus 5
- Literatura griega clásica 4
- Novela libanesa (Francés) 4
- Griego 3
- Judaisme 3
- Novela italiana 3
- Python (Computer program language) 3
- Vida intelectual 3
- -Religión 2
- Análisis matemático 2
- Archaeology 2
- Arqueología clásica 2
- Arte 2
- Aspectos psicológicos 2
- Aspectos sociales 2
- Business communication 2
- Cocteau, Jean 2
- Computer crimes 2
- Computer graphics 2
- Computer security 2
- Comunismo 2
- Cultural property 2
-
321
-
322
-
323
-
324Publicado 2011Tabla de Contenidos: “…Identity and alternative versions of the past in New Zealand; 2. The Latte Period in Marianas prehistory Who is interpreting it, why and how?…”
Libro electrónico -
325
-
326
-
327
-
328
-
329
-
330
-
331
-
332Publicado 2015Tabla de Contenidos: “…Time for action - orchestrating a Mis-Association attackThe Caffe Latte attack; Time for action - conducting a Caffe Latte attack; Deauthentication and disassociation attacks; Time for action - deauthenticating the client; The Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7: Advanced WLAN Attacks; A man-in-the-middle attack; Time for action - man-in-the-middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session hijacking over wireless…”
Libro electrónico -
333Publicado 2013Tabla de Contenidos: “…; Section 1: Collection Tools; Commercial Triage Tools; EnCase Portable, Guidance Software, Inc.; US-LATT, WetStone Technologies, Inc.; Section 2: Memory Analysis; Introduction; RAM Analysis; Data Carving Tools and Techniques; Disk Digger; GetDataBack for NTFS and FAT; Mandiant's Redline; Memoryze; Audit Viewer; Redline; HBGary Responder Community Edition; References; 5 Network Analysis; Introduction…”
Libro electrónico -
334
-
335Publicado 2023Tabla de Contenidos: “…Writing the Shaker add-on info -- Writing the Add Object Shake operator class -- Writing the operator methods -- Adding menu items -- Finding the class names of context menus -- Registering the Shaker add-on -- Using the Shaker add-on -- Summary -- Questions -- Chapter 9: Animation Drivers -- Technical requirements -- Creating drivers -- Creating quick drivers via the right-click menu -- Setting up a wheel with the Drivers Editor -- Creating driver expressions in properties -- Driving a cyclic motion -- Changing the rotation pivot via constraints -- Controlling the period of the sin function -- Implementing the pendulum equation -- Controlling the amplitude -- Writing the pendulum add-on -- Setting the environment -- Writing the information -- Writing the Operator class -- Writing the menu and registering the class -- Summary -- Questions -- Chapter 10: Advanced and Modal Operators -- Technical requirements -- Understanding the operator flow -- Steps of execution -- Writing the "PunchClock" add-on -- Creating the add-on script -- Using invoke to initialize properties -- Ensuring default invoke in pop-up menus -- Adding modal behavior -- Adding the operator to the modal handlers -- Writing the modal method -- Styling the operator panel -- Writing the draw method -- Summary -- Questions -- Part 3: Delivering Output -- Chapter 11: Object Modifiers -- Technical requirements -- Understanding object modifiers -- Adding modifiers -- Subdividing an object -- Changing the object's shape using Cast -- Adding modifiers in Python -- Finding collection-type items -- Using modifiers.new -- Deformation objects -- Using the Lattice modifier -- Writing the Latte Express add-on -- Setting the environment -- Writing the Latte Express information -- Writing the Latte Express operator -- Finding the center of a model -- Adding a Create Lattice menu item…”
Libro electrónico -
336
-
337
-
338
-
339por Alamanni, MarcoTabla de Contenidos: “…""Honeypot access points and Evil Twin attacks""""The Evil Twin attack in practice""; ""Man-in-the-middle attacks""; ""Ghost phisher""; ""The Caffe Latte attack""; ""The Hirte attack""; ""Cracking WPA keys without the AP""; ""Summary""; ""Chapter 8: Reporting and Conclusions""; ""The four stages of report writing""; ""Report planning""; ""Information collection""; ""Documentation tools""; ""Writing the first draft""; ""Review and finalization""; ""The report format""; ""The executive summary""; ""The technical report""; ""Summary""; ""Conclusions""; ""Appendix: References""; ""Index""…”
Publicado 2015
Libro electrónico -
340por Yu, Xin“…C’est à travers quelques exemples rendus révélateurs que l’on appréhende le mieux la circulation des objets culturels d’un bout à l’autre de l’ancien « Turkestan oriental » : un humble légume recèle des mystères ; la physiognomonie du cheval relève d’un art divinatoire dont témoignent des ouvrages sur lattes de bambou ; des poupées retrouvées le long de la route de la Soie conservent la mémoire de pratiques d’exorcisme... …”
Publicado 2020
Electrónico