Mostrando 321 - 340 Resultados de 374 Para Buscar '"Lattes"', tiempo de consulta: 0.06s Limitar resultados
  1. 321
    por Boyle, Andrew, 1919-
    Publicado 1980
    Libro
  2. 322
    por Gailledrat, Éric
    Publicado 1997
    Libro
  3. 323
  4. 324
    Publicado 2011
    Tabla de Contenidos: “…Identity and alternative versions of the past in New Zealand; 2. The Latte Period in Marianas prehistory Who is interpreting it, why and how?…”
    Libro electrónico
  5. 325
    por Eurípides
    Publicado 1956
    Libro
  6. 326
    por Virgilio Marón, Publio
    Publicado 1938
    Libro
  7. 327
    Libro
  8. 328
  9. 329
    Publicado 1995
    Libro
  10. 330
    Publicado 2005
    991005689159706719
  11. 331
  12. 332
    Publicado 2015
    Tabla de Contenidos: “…Time for action - orchestrating a Mis-Association attackThe Caffe Latte attack; Time for action - conducting a Caffe Latte attack; Deauthentication and disassociation attacks; Time for action - deauthenticating the client; The Hirte attack; Time for action - cracking WEP with the Hirte attack; AP-less WPA-Personal cracking; Time for action - AP-less WPA cracking; Summary; Chapter 7: Advanced WLAN Attacks; A man-in-the-middle attack; Time for action - man-in-the-middle attack; Wireless Eavesdropping using MITM; Time for action - Wireless Eavesdropping; Session hijacking over wireless…”
    Libro electrónico
  13. 333
    Publicado 2013
    Tabla de Contenidos: “…; Section 1: Collection Tools; Commercial Triage Tools; EnCase Portable, Guidance Software, Inc.; US-LATT, WetStone Technologies, Inc.; Section 2: Memory Analysis; Introduction; RAM Analysis; Data Carving Tools and Techniques; Disk Digger; GetDataBack for NTFS and FAT; Mandiant's Redline; Memoryze; Audit Viewer; Redline; HBGary Responder Community Edition; References; 5 Network Analysis; Introduction…”
    Libro electrónico
  14. 334
  15. 335
    Publicado 2023
    Tabla de Contenidos: “…Writing the Shaker add-on info -- Writing the Add Object Shake operator class -- Writing the operator methods -- Adding menu items -- Finding the class names of context menus -- Registering the Shaker add-on -- Using the Shaker add-on -- Summary -- Questions -- Chapter 9: Animation Drivers -- Technical requirements -- Creating drivers -- Creating quick drivers via the right-click menu -- Setting up a wheel with the Drivers Editor -- Creating driver expressions in properties -- Driving a cyclic motion -- Changing the rotation pivot via constraints -- Controlling the period of the sin function -- Implementing the pendulum equation -- Controlling the amplitude -- Writing the pendulum add-on -- Setting the environment -- Writing the information -- Writing the Operator class -- Writing the menu and registering the class -- Summary -- Questions -- Chapter 10: Advanced and Modal Operators -- Technical requirements -- Understanding the operator flow -- Steps of execution -- Writing the "PunchClock" add-on -- Creating the add-on script -- Using invoke to initialize properties -- Ensuring default invoke in pop-up menus -- Adding modal behavior -- Adding the operator to the modal handlers -- Writing the modal method -- Styling the operator panel -- Writing the draw method -- Summary -- Questions -- Part 3: Delivering Output -- Chapter 11: Object Modifiers -- Technical requirements -- Understanding object modifiers -- Adding modifiers -- Subdividing an object -- Changing the object's shape using Cast -- Adding modifiers in Python -- Finding collection-type items -- Using modifiers.new -- Deformation objects -- Using the Lattice modifier -- Writing the Latte Express add-on -- Setting the environment -- Writing the Latte Express information -- Writing the Latte Express operator -- Finding the center of a model -- Adding a Create Lattice menu item…”
    Libro electrónico
  16. 336
    Publicado 2023
    Libro
  17. 337
    Publicado 2011
    Libro
  18. 338
  19. 339
    por Alamanni, Marco
    Publicado 2015
    Tabla de Contenidos: “…""Honeypot access points and Evil Twin attacks""""The Evil Twin attack in practice""; ""Man-in-the-middle attacks""; ""Ghost phisher""; ""The Caffe Latte attack""; ""The Hirte attack""; ""Cracking WPA keys without the AP""; ""Summary""; ""Chapter 8: Reporting and Conclusions""; ""The four stages of report writing""; ""Report planning""; ""Information collection""; ""Documentation tools""; ""Writing the first draft""; ""Review and finalization""; ""The report format""; ""The executive summary""; ""The technical report""; ""Summary""; ""Conclusions""; ""Appendix: References""; ""Index""…”
    Libro electrónico
  20. 340
    por Yu, Xin
    Publicado 2020
    “…C’est à travers quelques exemples rendus révélateurs que l’on appréhende le mieux la circulation des objets culturels d’un bout à l’autre de l’ancien « Turkestan oriental » : un humble légume recèle des mystères ; la physiognomonie du cheval relève d’un art divinatoire dont témoignent des ouvrages sur lattes de bambou ; des poupées retrouvées le long de la route de la Soie conservent la mémoire de pratiques d’exorcisme... …”
    Electrónico