Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Philosophy 424
- Engineering & Applied Sciences 307
- History 299
- Development 292
- Management 275
- Application software 234
- Religion 233
- Web sites 230
- Design 227
- Computer networks 219
- Data processing 206
- Social sciences 194
- Economics 187
- Research 184
- Computer programs 178
- Web site development 174
- Computer Science 167
- Education 158
- Electrical & Computer Engineering 152
- Mathematics 147
- Social aspects 138
- Telecommunications 138
- Ethics 135
- Historia 135
- Business & Economics 124
- Security measures 123
- Economic aspects 118
- Social Sciences 115
- Operating systems (Computers) 110
- Religion and sociology 110
-
5401Publicado 2013Tabla de Contenidos: “…An Overview of the Collections Framework 15.2. Linked Lists 15.3. Stacks, Queues, and Priority Queues 15.4. …”
Libro electrónico -
5402Publicado 2013Tabla de Contenidos: “…Dateneingabe und -bearbeitung im Formular steuern -- Die Datensatzquelle für ein Formular ändern -- Mit Navigationsformularen arbeiten -- In der Entwurfsansicht Felder in ein Formular einfügen -- In der Layoutansicht Felder in ein Formular einfügen -- Ein Unterformular in ein Formular einfügen -- Steuerelemente effektiv einsetzen -- Bezeichnungs- und Textfelder erstellen -- Linien und Rechtecke zeichnen -- Kontrollkästchen, Optionsfelder und Umschaltflächen erstellen -- Optionsgruppen einfügen -- Listenfelder erstellen -- Kombinationsfelder erstellen -- Links definieren -- Logos und Titel erstellen -- Gebundene und ungebundene Objektfelder erstellen -- Bildsteuerelemente erstellen -- Anlagen erstellen -- Webbrowsersteuerelemente erstellen -- Registersteuerelemente erstellen -- Befehlsschaltflächen erstellen -- Steuerelementvorgaben festlegen -- Office-Designs verwenden -- Daten in Berichten präsentieren -- Tabellarische Berichte mit mehreren Tabellen erstellen -- Die Darstellung von Steuerelementen anpassen -- Mit Steuerelementen und Bereichen arbeiten -- Mit den Eigenschaften »Vergrößerbar« und »Verkleinerbar« arbeiten -- Laufende Summen bilden -- Seitenumbrüche steuern -- Gruppierungen und Sortierungen hinzufügen -- Leere Seiten vermeiden -- Bedingte Formatierungen verwenden -- Einspaltige Berichte mit dem Berichts-Assistenten erstellen -- Berichte mit Unterbericht erstellen -- Etiketten - Spalten- und Zeilengestaltung -- Layoutansicht, Berichtsansicht und Seitenansicht -- Daten austauschen -- Daten und Objekte aus Access-Datenbank importieren -- Access-Daten verknüpfen -- Daten aus Excel importieren -- Daten mit Excel verknüpfen -- Verknüpfte Tabellen nach Änderungen aktualisieren -- Textdateien mit bestimmtem Format importieren -- Daten für Excel exportieren -- Mit gespeicherten Im- und Exporten arbeiten -- Daten als PDF-Dokument exportieren…”
Libro electrónico -
5403Publicado 2014Tabla de Contenidos: “…-- 1.6 Die Dropbox-AGB -- Kapitel 2: Applikation und Webdienst -- 2.1 Desktop-Applikation -- 2.1.1 Der Dropbox-Ordner -- 2.1.2 Kamera-Import -- 2.1.3 Dropbox-Einstellungen (der Desktop-Applikation) -- 2.2 Dropbox-Webdienst -- 2.2.1 Navigieren auf der Dropbox-Website -- Kapitel 3: Dropbox mobil -- 3.1 Die Dropbox-Apps für Smartphone und Tablet -- 3.2 Installation der App -- 3.2.1 Einrichtung -- 3.3 App auf dem Smartphone oder Tablet verwenden -- 3.3.1 Generelle Bedienung der mobilen Dropbox-App -- 3.3.2 Dateien betrachten -- 3.3.3 PDF-Viewer -- 3.3.4 Fotoansicht -- 3.3.5 Dateiarten, die direkt in der Dropbox-App betrachtet werden können -- 3.3.6 Favoriten -- 3.3.7 Dateien verschieben, löschen -- 3.3.8 Dateien in die Dropbox hochladen -- 3.3.9 Dateien freigeben -- 3.3.10 Einstellungen -- Kapitel 4: Freigaben -- 4.1 Freigabe per Link -- 4.2 Beispiel für die Freigabe per Link -- 4.3 Freigegebene Ordner -- 4.4 Beispiel für das Teilen von Dokumenten über freigegebene Ordner -- 4.5 Freigegebenen Ordner erstellen -- 4.5.1 Unterscheidung persönlicher und freigegebener Ordner -- 4.5.2 RSS-Feeds der Änderungen abonnieren -- 4.5.3 Freigegebene Ordner umbenennen oder verschieben -- 4.5.4 Freigegebene Ordner werden auf das eigene Speicherkontingent angerechnet…”
Libro electrónico -
5404Tabla de Contenidos: “…Case Study: Server Health for Virtual Hosting -- Case Study: HTTP and HTTPS -- Summary -- Chapter 18 Session Tracking and Cookies -- What a Session Is and Why It Matters -- Cookies -- How Servers Track User Sessions -- Session Persistence for Server Clusters -- Summary -- For Further Reading -- Chapter 19 Persistence Mechanisms on Load Balancers -- The Concept of Session Persistence -- Persistence Considerations for Clients Using Proxy Servers -- Persistence Using Session Sharing Servers -- Session Persistence Mechanisms -- Source IP Sticky -- Cookie Sticky -- URL Sticky -- HTTP Redirection Sticky -- SSL Sticky -- Case Study -- Summary -- Part V: Data Center Design -- Chapter 20 Designing the Data Center Infrastructure -- Topology Overview -- Switching Paths -- Using VLANs to Virtualize the Physical Data Center Infrastructure -- Link Redundancy and Load Distribution -- Spanning-Tree Considerations -- Internal Redundancy Considerations -- Layer 2 Data Center Design -- Layer 3 Data Center Design -- Summary -- Chapter 21 Integrating Security into the Infrastructure -- Defining Security Zones -- Internet Edge -- Campus Core -- Intranet Server Farms -- Server-Farm Design Alternatives -- Management Network -- Summary -- Chapter 22 Performance Metrics of Data Center Devices -- Traffic Patterns Overview -- Performance Metrics Overview -- Load Balancer and SSL Offloader Metrics -- Testing Performance Metrics -- Summary -- Part VI: Appendixes -- Appendix A: Character Sets -- Appendix B: HTTP Header Fields -- Appendix C: Video Encoding Mechanisms -- Appendix D: Loopback Interface Configuration Procedures -- Appendix E: Configuring Servers to Insert Cookies -- Appendix F: Client-Side and Server-Side Programming -- Index…”
Libro electrónico -
5405Publicado 2019Tabla de Contenidos: “…Start-to-Finish Relationship -- 3.4.9. Links to/from Summary Activities -- 3.4.10. Schedule Resource Analysis -- 3.4.11. …”
Libro electrónico -
5406Publicado 2018Tabla de Contenidos: “…Summary -- Chapter 8: Man-in-the-Middle Attacks -- Man-in-the-middle attacks -- ARP spoofing using arpspoof -- ARP spoofing using MITMf -- Bypassing HTTPS -- Session hijacking -- DNS spoofing -- MITMf screenshot keylogger -- MITMf code injection -- MITMf against a real network -- Wireshark -- Wireshark basics -- Wireshark filters -- Summary -- Chapter 9: Network Penetration Testing, Detection, and Security -- Detecting ARP poisoning -- Detecting suspicious behavior -- Summary -- Chapter 10: Gaining Access to Computer Devices -- Introduction to gaining access -- Server side -- Client side -- Post-exploitation -- Sever-side attacks -- Server-side attack basics -- Server-side attacks - Metasploit basics -- Metasploit remote code execution -- Summary -- Chapter 11: Scanning Vulnerabilities Using Tools -- Installing MSFC -- MSFC scan -- MSFC analysis -- Installing Nexpose -- Running Nexpose -- Nexpose analysis -- Summary -- Chapter 12: Client-Side Attacks -- Client-side attacks -- Installing Veil -- Payloads overview -- Generating a Veil backdoor -- Listening for connections -- Testing the backdoor -- Fake bdm1 updates -- Client-side attacks using the bdm2 BDFProxy -- Protection against delivery methods -- Summary -- Chapter 13: Client-Side Attacks - Social Engineering -- Client-side attacks using social engineering -- Maltego overview -- Social engineering - linking accounts -- Social engineering - Twitter -- Social engineering - emails -- Social engineering - summary -- Downloading and executing AutoIt -- Changing the icon and compiling the payload -- Changing extensions -- Client-side attacks - TDM email spoofing -- Summary -- Chapter 14: Attack and Detect Trojans with BeEF -- The BeEF tool -- BeEF - hook using a MITMf -- BeEF - basic commands -- BeEF - Pretty Theft -- BeEF - Meterpreter 1 -- Detecting Trojans manually…”
Libro electrónico -
5407Publicado 2020Tabla de Contenidos: “…-- Maintainer Mode -- Cutting Through the Noise -- Nonrecursive Automake -- Summary -- 7 BUILDING LIBRARIES WITH LIBTOOL -- The Benefits of Shared Libraries -- How Shared Libraries Work -- Using Libtool -- Installing Libtool -- Adding Shared Libraries to Jupiter -- Summary -- 8 LIBRARY INTERFACE VERSIONING AND RUNTIME DYNAMIC LINKING -- System-Specific Versioning -- The Libtool Library Versioning Scheme -- Using libltdl -- Converting to Libtool's ltdl Library -- Summary -- 9 UNIT AND INTEGRATION TESTING WITH AUTOTEST -- Autotest Overview -- Wiring Up Autotest -- Adding a Test -- Unit Testing vs. …”
Libro electrónico -
5408por Richter, JeffreyTabla de Contenidos: “…Sharing data between apps -- Apps transfer data via a DataPackage -- Sharing via the clipboard -- Sharing via the Share charm -- Implementing a share source app -- Delayed rendering of shared content -- Implementing a share target app -- Implementing an extended (lengthy) share operation -- Share target app quick links -- Debugging share target apps -- 11. Windows Store -- Submitting a Windows Store app to the Windows Store -- Submitting your app -- Testing your app -- Monitoring your app -- Updating your app -- The Windows Store commerce engine -- The Windows Store commerce engine WinRT APIs -- App trials and purchasing an app license -- Purchasing durable in-app product licenses -- Purchasing consumable in-app products -- Purchasing consumable in-app product offers -- A. …”
Publicado 2013
Libro electrónico -
5409Publicado 1988Tabla de Contenidos: “…-- TERMINOLOGY AND MEASURES -- CURRENT PATTERNS OF USE -- Racial and Ethnic Subgroups -- Age -- Education -- Birth Order -- Marital Status -- Income -- RELATIONSHIPS AMONG DEMOGRAPHIC RISK FACTORS -- GEOGRAPHIC POCKETS OF NEED -- TRENDS IN THE USE OF PRENATAL CARE -- SUMMARY -- REFERENCES AND NOTES -- Chapter 2 Barriers to the Use of Prenatal Care -- FINANCIAL BARRIERS -- Private Insurance -- Eligibility for Coverage -- Scope and Depth of Coverage -- Patient Cost-Sharing -- Medicaid -- Uninsured Women -- INADEQUATE SYSTEM CAPACITY -- Services in Organized Settings -- Maternity Care Providers -- Malpractice -- ORGANIZATION, PRACTICES, AND ATMOSPHERE OF PRENATAL SERVICES -- Links Among Services -- Medicaid Application Procedures -- Classic Barriers to Access -- CULTURAL AND PERSONAL BARRIERS -- SUMMARY -- REFERENCES AND NOTES -- Chapter 3 Women's Perceptions of Barriers to Care -- SELECTION AND SYNTHESIS OF STUDIES -- Studies of Women with Insufficient Prenatal Care…”
Libro electrónico -
5410por International Business Machines Corporation, International Technical Support Organization StaffTabla de Contenidos: “…How to achieve business flexibility through integration -- 3.1 How to simplify building, developing, and deploying on demand business applications -- 3.1.1 Vision -- 3.1.2 How to get started today -- 3.2 How to improve communication and collaboration within and beyond the enterprise -- 3.2.1 Vision -- 3.2.2 How to get started today -- 3.3 How to react quickly to changes in the marketplace by modifying business processes rapidly -- 3.3.1 Vision -- 3.3.2 How to get started today -- 3.4 How to instrument applications and analyze events they generate to understand business process impacts -- 3.4.1 Vision -- 3.4.2 How to get started today -- 3.5 How to create links between new and existing applications -- 3.5.1 Vision -- 3.5.2 How to get started today -- 3.6 How to react in real-time by ensuring seamless flow of information -- 3.6.1 Vision -- 3.6.2 How to get started today -- 3.7 Summary -- Chapter 4. …”
Publicado 2004
Libro electrónico -
5411por Lanier, LeeTabla de Contenidos: “…Emulating Natural Light Sources -- Sidebar: Source Models and Textures -- Mid-day Sun -- Sidebar: PBR Options -- Sunset -- Candle Flame -- Diffuse Window Light -- Emulating Artificial Light Sources -- Table Lamp -- Sidebar: Selective Shadow Casting -- Neon Sign -- Christmas Lights -- Lighting a Character with Different Light Sources -- Sidebar: Light and Shadow Linking -- Chapter 5: Working with PBR Systems -- Choosing PBR -- Review of Common Rendering Systems -- Scanline -- Ray Tracing -- Overview of PBR Systems -- Review of Common PBR Systems -- GI -- Photon Mapping -- Final Gather -- Radiosity -- Point Cloud -- Irradiance Cache -- Path Tracing / Monte Carlo Ray Tracing -- IBL -- Sky Systems -- Sidebar: Overview of Advanced 3D Renderers -- Sidebar: Unbiased vs. …”
Publicado 2018
Libro electrónico -
5412Publicado 2022Tabla de Contenidos: “…Communication bottlenecks in data parallel training -- Analyzing the communication workloads -- Parameter server architecture -- The All-Reduce architecture -- The inefficiency of state-of-the-art communication schemes -- Leveraging idle links and host resources -- Tree All-Reduce -- Hybrid data transfer over PCIe and NVLink -- On-device memory bottlenecks -- Recomputation and quantization -- Recomputation -- Quantization -- Summary -- Section 2 - Model Parallelism -- Chapter 5: Splitting the Model -- Technical requirements -- Single-node training error - out of memory -- Fine-tuning BERT on a single GPU -- Trying to pack a giant model inside one state-of-the-art GPU -- ELMo, BERT, and GPT -- Basic concepts -- RNN -- ELMo -- BERT -- GPT -- Pre-training and fine-tuning -- State-of-the-art hardware -- P100, V100, and DGX-1 -- NVLink -- A100 and DGX-2 -- NVSwitch -- Summary -- Chapter 6: Pipeline Input and Layer Split -- Vanilla model parallelism is inefficient -- Forward propagation -- Backward propagation -- GPU idle time between forward and backward propagation -- Pipeline input -- Pros and cons of pipeline parallelism -- Advantages of pipeline parallelism -- Disadvantages of pipeline parallelism -- Layer split -- Notes on intra-layer model parallelism -- Summary -- Chapter 7: Implementing Model Parallel Training and Serving Workflows -- Technical requirements -- Wrapping up the whole model parallelism pipeline -- A model parallel training overview -- Implementing a model parallel training pipeline -- Specifying communication protocol among GPUs -- Model parallel serving -- Fine-tuning transformers -- Hyperparameter tuning in model parallelism -- Balancing the workload among GPUs -- Enabling/disabling pipeline parallelism -- NLP model serving -- Summary -- Chapter 8: Achieving Higher Throughput and Lower Latency -- Technical requirements…”
Libro electrónico -
5413Publicado 2006Tabla de Contenidos: “…-- Introduction -- Verbal interference effects -- Verbal mechanisms in remembering objects and object-position links -- Remembering locations when focusing on time -- Conclusions -- Acknowledgements -- Note -- References -- Variations on the image scanning paradigm -- Introduction -- Wider implications of the findings of image scanning experiments -- Two contrasting scanning processes -- Scanning along straight or complex paths -- Conclusion -- References -- The use of transcranial magnetic stimulation in spatial cognition -- Introduction -- TMS studies of spatial extinction -- Suppression of extinction with TMS in patients with unilateral brain damage -- TMS studies of visual spatial neglect -- Suppression of visual neglect with TMS in patients with unilateral brain damage -- Conclusions -- References -- Models and components of imagery and visuo-spatial processes…”
Libro electrónico -
5414Publicado 2023Tabla de Contenidos: “…2 A Company, a Shareholders Bank, and a Spanish Crown Bank -- 3 The Heterogeneous World of Silver Ore Producers and Rescatistas: Azogueros, k'ajchas, Trapicheros, and Metals from Outside the City -- 4 Azogueros: A Unifying and Homogenizing Name -- 5 The k'ajchas, trapiches, and trapicheros -- 6 Reconsidering the Second Boom in Potosí and Its Causes -- 7 Conclusion -- Primary Sources -- Bibliography -- Part 4 Local, Regional and Global Impacts -- Chapter 9 Local Links behind a Global Scandal: The Audiencia de Charcas and the Great Potosí Mint Fraud, ca. 1650 -- 1 Introduction -- 2 The Audiencia and the Mint Fraud before the Arrival of Nestares Marín -- 3 The Visita General of Nestares Marín and the Audiencia de Charcas -- 4 Merits and Demerits of Pedro de Azaña -- 5 Conclusion -- Acknowledgements -- Primary Sources -- Bibliography -- Chapter 10 The Hangover: Global Consequences of the Great Potosí Mint Fraud, c. 1650-1675 -- 1 Introduction -- 2 Total Recall -- 3 Genoa -- 4 Portugal -- 5 France -- 6 Flanders -- 7 The Baltic -- 8 New England -- 9 The Wreck of the Vergulde Draeck -- 10 East and South Asia -- 11 Conclusion -- Primary Sources -- Bibliography -- Chapter 11 From the Ratio to Rothschild: Silver and Quicksilver-Recovering the Past for the Future in Nineteenth-Century Potosí (1800-1858) -- 1 Introduction -- 2 From Colonial Reform to War -- 2.1 From Almadén to Potosí: New Routes -- 2.2 Periodizing the Ratio, 1800-1822 -- 3 The Republic -- 3.1 The Republican Ratio -- 3.2 The visita of the Potosí Rivera, 1837-1838 -- 4 Balance and Projections -- Primary Sources -- Bibliography -- Index…”
Libro electrónico -
5415Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Microsoft 365 -- Chapter 1: Getting Started with Microsoft 365 Security and Compliance -- Technical requirements -- Introduction to Microsoft 365 offers, plans, and licenses -- Microsoft 365 plans and components -- Microsoft 365 licensing -- Introduction to Microsoft 365 security -- Introduction to Microsoft 365 compliance -- Summary -- Chapter 2: The Role of Microsoft Entra ID in Microsoft 365 Security -- Technical requirements -- Microsoft Entra ID plans and features -- Microsoft Entra ID roles and groups -- Azure roles, or Azure RBAC roles -- Microsoft Entra ID roles -- Classic roles -- Microsoft 365 roles in Microsoft Entra ID -- Best practices for roles -- Microsoft 365 groups -- Microsoft Entra ID Protection -- Summary -- Part 2: Microsoft 365 Security -- Chapter 3: Microsoft Defender for Office 365 -- Technical requirements -- Getting started with Microsoft Defender for Office 365 -- Protecting assets with Microsoft Defender for Office 365 -- Quarantine policy -- Anti-phishing -- Anti-spam -- Anti-malware -- Safe Attachment -- Safe Links -- Rules -- Attack simulation training -- Responding to alerts and mitigating threats -- Summary -- Chapter 4: Microsoft Defender for Endpoint -- Introducing Microsoft Defender for Endpoint -- Technical and license requirements -- Configuring Microsoft Defender for Endpoint -- Microsoft Defender Vulnerability Management dashboard -- Microsoft Defender for Endpoint Device inventory -- Windows devices -- Configuring advanced features in Microsoft Defender for Endpoint -- Security recommendations -- The Microsoft Defender for Endpoint configuration management dashboard -- Microsoft Defender for Endpoint Tutorials & -- simulations…”
Libro electrónico -
5416Publicado 2023Tabla de Contenidos: “…Cover -- Endorsement -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Contributors -- 1 Introduction -- Why the Essay -- Why the Journey -- Questions for the Rising Generation of Teacher-Scholars in Business Communication and in Other Academic Disciplines -- Lessons Learned From the Essays -- Collaborative Work -- An "Unending Conversation" -- References -- 2 Take Two Xanax and Call Me in the Morning -- Or, Career Tension in Business Communication -- First Conference and First Academic Job -- Assistant Professor -- Associate Professor With Tenure -- Full Professor-A New Set of Tensions -- A 17-Year Administrative Aside-1988-2005 -- The Final Chapters: 2005- -- Wrap Up -- References -- 3 Cultivating a Liberal Arts Perspective On Workplace Communication -- The Journey -- A Writing-Centered Career -- Material Culture and Rhetoric -- The Journal -- Business Communication at the University of Delaware -- Material Culture Studies: A New Position -- Rhetoric and Material Culture Studies: Research On the Workplace -- From Context to Community: Revisiting a Textbook After 20 Years -- This Is Not a Box -- Learn With Your Students -- Learn With Your Colleagues -- Work Smart -- Integrate Your Teaching and Research -- Write, Read, and Support the Writing of Colleagues -- Take a Broad Perspective -- References -- 4 "Only Connect" Between Personal Life and Professional Choice, Scholarship and Teaching, My Generation and the Next -- Connections Between the Personal and the Professional -- Links Between a Business School's Mission and the Discipline of Business Communication -- An Entrepreneurial Frame of Mind and Moment -- Translation as Cross-Cultural Communication and Political Act -- Connections Between My Students and My Work as a Teacher-Scholar: Observe, Listen, Respond, and be Entrepreneurial…”
Libro electrónico -
5417por Calderari, CaioTabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started with Bubble.io - Exploring Bubble's Features -- Introduction to the Bubble.io platform -- Setting up an account and project workspace -- New project setup - application assistant -- Step 1 - favicon and application name -- Step 2 - default font -- Step 3 - default colors -- Step 4 - choosing plugins -- Finishing the application assistant -- Navigating the Bubble.io interface -- 1 - the top bar -- 2 - the sidebar -- 3 - the page -- 4 - the property editor -- Understanding the main areas of the editor and key features -- Design -- Workflow -- Data -- Styles -- Plugins -- Settings -- Logs -- A quick tour of the main areas of your account -- Apps -- Account -- Templates marketplace -- Plugins marketplace -- Support -- Forum and community -- Summary -- Chapter 2: Navigating the UI Builder Components Tab -- Presenting the UI Builder components tab and the sidebar -- Quick tips about the Elements Tree -- Presenting UI components -- Visual Elements -- Containers -- Input forms -- Reusable elements -- Install More -- Summary -- Chapter 3: Building Blocks - Exploring Bubble's UI Components -- Diving deep into UI elements -- Visual elements -- Text -- Button -- Icon -- Link -- Image -- Shape -- Alert -- Video -- HTML -- Map -- BuiltonBubble -- Containers -- Group -- RepeatingGroup -- Popup -- FloatingGroup -- GroupFocus -- Table -- Input forms -- Input -- Multiline input -- Checkbox -- Dropdown -- SearchBox -- RadioButtons -- SliderInput -- Date/TimePicker -- PictureUploader -- FileUploader -- How to create a reusable element -- Useful reusable elements - Header, Footer, Signup, and Login -- Header -- Footer -- Signup / Login Popup -- How to install new components -- Summary…”
Publicado 2024
Libro electrónico -
5418Publicado 2023Tabla de Contenidos: “…challenge -- Summary -- Chapter 4: Getting Started with a Data Quality Initiative -- The first few weeks after budget approval -- Key activities in those early weeks -- Understanding data quality workstreams -- Workstreams required early on -- Identifying the right people for your team -- Mapping resources to the workstreams -- Summary -- Part 2 - Understanding and Monitoring the Data That Matters -- Chapter 5: Data Discovery -- An overview of the data discovery process -- Understanding business strategy, objectives, and challenges -- Approaches to stakeholder identification -- Content of stakeholder conversations -- The hierarchy of strategy, objectives, processes, analytics, and data -- Prioritizing using strategy -- Linking challenges to processes, data, and reporting -- Basics of data profiling -- Typical tool data profiling capabilities -- Using these capabilities -- Connecting to data -- Summary -- Chapter 6: Data Quality Rules -- An introduction to data quality rules -- Rule scope -- The key features of data quality rules -- Rule weightings -- Rule dimensions -- Rule priorities -- Rule thresholds -- Cost per failure -- Implementing data quality rules -- Designing rules -- Building data quality rules -- Testing data quality rules -- Summary -- Chapter 7: Monitoring Data Against Rules -- Introduction to data quality reporting -- Different levels of reporting -- Data security considerations -- Designing a high-level data quality dashboard -- Dimensions and filters -- Designing a Rule Results Report -- Typical features of the Rule Results Report -- Designing Failed Data Reports -- Typical features of the Failed Data Reports -- Re-using Failed Data Reports -- Multiple Failed Data Reports -- Exporting Failed Data Reports…”
Libro electrónico -
5419por Ulaby, FawwazTabla de Contenidos: “…Satellite Communication Systems and Radar Sensors -- 10-1 Satellite Communication Systems -- 10-2 Satellite Transponders -- 10-3 Communication-Link Power Budget -- 10-4 Antenna Beams -- 10-5 Radar Sensors -- 10-6 Target Detection -- 10-7 Doppler Radar -- 10-8 Monopulse Radar -- Appendix A: Symbols, Quantities, and Units -- Appendix B: Material Constants of Some Common Materials -- Appendix C: Mathematical Formulas -- Appendix D: Fundamental Constants and Units -- Appendix E: Answers to Selected Problems -- Bibliography -- Index -- Tables for Reference…”
Publicado 2022
Libro electrónico -
5420Publicado 2023Tabla de Contenidos: “…THEFT5 - NTLM credential theft via PKINIT (nPAC-the-hash) -- Account persistence -- PERSIST1 - Active user credential theft via certificates -- PERSIST2 - Machine persistence via certificates -- PERSIST3 - Account persistence via certificate renewal -- Shadow credentials -- Domain privilege escalation -- Certifried (CVE-2022-26923) -- Template and extension misconfigurations -- Improper access controls -- CA misconfiguration -- Relay attacks -- Domain persistence -- DPERSIST1 - Forge certificates with stolen CA certificate -- DPERSIST2 - Trusting rogue CA certificates -- DPERSIST3 - Malicious misconfiguration -- Summary -- References -- Chapter 9: Compromise Microsoft SQL Server -- Technical requirements -- Introduction, discovery, and enumeration -- SQL Server introduction -- Discovery -- Brute force -- Database enumeration -- Privilege escalation -- Impersonation -- TRUSTWORTHY misconfiguration -- UNC path injection -- From a service account to SYSTEM -- From a local administrator to sysadmin -- OS command execution -- xp_cmdshell -- A custom extended stored procedure -- Custom CLR assemblies -- OLE automation procedures -- Agent jobs -- External scripts -- Lateral movement -- Shared service accounts -- Database links -- Persistence -- File and registry autoruns -- Startup stored procedures -- Malicious triggers -- Summary -- Further reading -- Chapter 10: Taking Over WSUS and SCCM -- Technical requirements -- Abusing WSUS -- Introduction to MECM/SCCM -- Deployment -- Reconnaissance -- Privilege escalation -- Client push authentication coercion -- Credential harvesting -- Lateral movement -- Client push authentication relay attack -- Site takeover -- Abuse of Microsoft SQL Server -- Deploying an application -- Defensive recommendations -- Summary -- References -- Further reading -- Index -- Other Books You May Enjoy…”
Libro electrónico