Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- TFM 2,694
- Gestió de projectes 1,302
- Empreses 1,057
- Universidad Pontificia de Salamanca (España) 987
- Direcció i administració 882
- Planificació estratègica 792
- Development 785
- TFMP 721
- Application software 720
- Engineering & Applied Sciences 583
- Planificació 566
- Management 423
- Computer programs 420
- Computer Science 404
- Computer networks 359
- Examinations 350
- Data processing 338
- Python (Computer program language) 328
- Computer programming 304
- Arquitectura 298
- Edificis 297
- Sistemes d'informació per a la gestió 294
- Design 281
- History 277
- Indústria i comerç 274
- Comerç electrònic 273
- Cloud computing 269
- Certification 266
- Photography 262
- Operating systems (Computers) 259
-
18641Publicado 2017Tabla de Contenidos: “…-- 9: Mobilize Hearts and Minds Forward -- Leave the Abstract and Make an Impression -- End the Suspense: Make the Unknown Future Known -- How to Mobilize Hearts and Minds Forward -- What Does Your Team Anticipate? -- To Execute Masterfully, Use These Classes Of Mobilizing Questions -- Achieve Something Bigger -- 10: Is Your Team Ready to Do Big Things? …”
Libro electrónico -
18642Publicado 2010Tabla de Contenidos: “…Binding Data to a Control -- Summary -- Chapter 11: Bringing It All Together -- Adding Reusable Assets with Component Screens -- Adding Annotations to Our Project -- Creating Documentation -- Summary -- Part III: Understanding SketchFlow -- Chapter 12: The SketchFlow Interface -- The Workspace -- The Tools Panel -- The Projects Panel -- The Assets Panel -- The States Panel -- Objects in the Objects and Timeline Panel -- Timelines in the Objects and Timeline Panel -- SketchFlow Animation Panel -- Artboard Panel -- SketchFlow Map -- The Results Panel -- The Properties Panel -- The Resources Panel -- The Data Panel -- The Feedback Panel -- Application Menus -- Summary -- Chapter 13: Assets, Styles, and Components -- SketchFlow Style Assets -- Working with Styles -- Understanding Styles, Templates, and Resources -- Working with Components -- Summary -- Chapter 14: SketchFlow Animation and States -- Animation Models in SketchFlow and Expression Blend -- SketchFlow Animation -- States -- Keyframe Animation and Storyboards -- Summary -- Chapter 15: SketchFlow Behaviors -- How Behaviors Work -- Triggers and Actions -- Behavior -- Adding Behaviors and Setting Properties -- Summary -- Chapter 16: Data -- Understanding Data and Binding -- The Data Panel -- Creating Data Resources for SketchFlow Projects -- Working with Data in SketchFlow -- Summary -- Chapter 17: Annotating Your Work, Getting Feedback, and Creating Documentation -- Adding Annotations to Your Project -- Getting Feedback with the SketchFlow Player -- Navigation in the SketchFlow Player -- Importing Feedback into Your Project -- Creating Documentation -- Summary -- Part IV: Applied Knowledge -- Chapter 18: Project Brief and Sketches -- Project Brief -- Loyal Customer Survey -- Sketching Ideas -- Refinement and Master Sketches -- Summary -- Chapter 19: Navigation Via Component Screens…”
Libro electrónico -
18643Publicado 2022Tabla de Contenidos: “…Server software component (T1505) -- Escalating privileges -- Exploiting for privilege escalation (T1068) -- Creating or modifying system process (T1543) -- Process injection (T1055) -- Abuse elevation control mechanism (T1548) -- Bypassing defenses -- Exploiting for defense evasion (T1211) -- Deobfuscating/decoding files or information (T1140) -- File and directory permissions modification (T1222) -- Impairing defenses (T1562) -- Indicator removal on host (T1070) -- Signed binary proxy execution (T1218) -- Accessing credentials -- Brute force (T1110) -- OS credential dumping (T1003) -- Steal or forge Kerberos tickets (T1558) -- Moving laterally -- Exploiting remote services (T1210) -- Remote services (T1021) -- Using alternate authentication material (T1550) -- Collecting and exfiltrating data -- Data from local system (T1005) -- Data from network shared drives (T1039) -- Email collection (T1114) -- Archive collected data (T1560) -- Exfiltration over web service (T1567) -- Automated exfiltration (T1020) -- Ransomware deployment -- Inhibit system recovery (T1490) -- Data encrypted for impact (T1490) -- Summary -- Chapter 6: Collecting Ransomware-Related Cyber Threat Intelligence -- Threat research reports -- Community -- Threat actors -- Summary -- Section 3: Practical Incident Response -- Chapter 7: Digital Forensic Artifacts and Their Main Sources -- Volatile memory collection and analysis -- Non-volatile data collection -- Master file table -- Prefetch files -- LNK files -- Jump lists -- SRUM -- Web browsers -- Windows Registry -- Windows event logs -- Other log sources -- Summary -- Chapter 8: Investigating Initial Access Techniques -- Collecting data sources for an external remote service abuse investigation -- Investigating an RDP brute-force attack -- Collecting data sources for a phishing attack investigation…”
Libro electrónico -
18644Publicado 2023Tabla de Contenidos: “…Part Three: Growing creative-destructive alignment (2017-present) -- The new international competition in green technologies and domestic environmental problems -- The creative and destructive elements of the third Five-Year Plan for Green Growth (2019-2023) -- The Second Five-Year Master Plan for smart grids -- Smart cities: National pilot smart cities -- Hybridized industrial ecosystems -- Destructive ambitions in action: Korea's efforts to phase out coal -- Concluding remarks -- 7 Creative-Destruction in China's Strong and Smart Grid Initiatives: The Shift to Ultra-High Voltage -- The pattern -- The puzzle -- China's electrification strategy -- Part One: The developmental origins of China's `strong and smart' grid focus (1990s-2006) -- Part Two: Developmental-environmentalism and the emergent greening of China's electric power grid (2007-2015) -- The shift to a UHV grid -- Executing the UHV strategic shift -- Part Three: Growing creative-destructive alignment (2015-present) -- Creating a hybridized industrial ecosystem for the grid: The building of an electric power equipment industry in China -- The full flowering of creative-destructive alignment: Internationalization of State Grid Corporation of China and the Chinese power industry -- Concluding remarks -- 8 Drivers and Dynamics of Northeast Asia's Green Energy Shift: A Comparative Strategic Analysis -- East Asian approaches to the green energy transition -- Grid hypermodernization -- Greening of transport: The shift to electric vehicles -- Dramatic incursion by Northeast Asian economies: Leapfrogging strategy -- Developmental environmentalism in action -- Aspect One: Developmental environmentalism as mindset and ambition driving the green energy transition -- Aspect Two: Developmental environmentalism as legitimation strategy…”
Libro electrónico -
18645Publicado 2023Tabla de Contenidos: “…Understanding the Player scene -- Gauging the Asteroid scene -- Unraveling the quest system -- Breaking down the World scene -- Logging the player in to the server -- Authenticating players -- Syncing the World scenes -- Separating server and client responsibilities -- Shooting bullets on all instances -- Calculating an asteroid's damage -- Storing and retrieving data on the server -- Implementing the quest system's client side -- Implementing the quest system's server side -- Summary -- Part 3: Optimizing the Online Experience -- Chapter 10: Debugging and Profiling the Network -- Technical requirements -- Introducing Godot's Debugger -- Mastering the Stack Trace tab -- Debugging with the Errors tab -- Exploring the Profiler tab -- Exploring the Visual Profiler tab -- Exploring the Monitors tab -- Getting to know the Video RAM tab -- Grasping the Misc tab -- Understanding the Network Profiler -- Identifying the project's bottlenecks -- Using the Network Profiler -- Using the Monitors tab -- Summary -- Chapter 11: Optimizing Data Requests -- Technical requirements -- Understanding network resources -- Decreasing the requests count -- Reducing the weapon fire count -- Decreasing Asteroid's syncing count -- Compressing data with the ENetConnection class -- Summary -- Chapter 12: Implementing Lag Compensation -- Technical requirements -- Introducing lag issues -- Dealing with unreliable packets -- Common compensation techniques -- Implementing server-side motion -- Bridging the gaps with interpolation -- Playing ahead with prediction -- Gazing into the future with extrapolation -- Summary -- Chapter 13: Caching Data to Decrease Bandwidth -- Technical requirements -- Understanding caching -- Setting up the HTTPRequest node -- Understanding the HTTP protocol -- Setting up the scenes and database -- Implementing texture caching…”
Libro electrónico -
18646Publicado 2024Tabla de Contenidos: “…Understanding hidden sources -- Diving into the deep and dark web -- Let's make sure we understand the internet -- Harvesting more with theHarvester -- Shodan -- Automating OSINT collection and analysis -- Summary -- Chapter 4: Exploring the Unknown - How Discovery Tools Reveal Hidden Information -- Introduction to discovery tools -- Unlocking network secrets -- Domain and IP address analysis -- Understanding the DNA of WHOIS - Its definition and purpose -- Applicability - Not just domains but IP blocks too -- The online magnifying glasses - Popular WHOIS lookup platforms -- Finding the connections -- The darker side - When attackers use WHOIS -- DNS and IP analysis - Connecting domains to infrastructure -- Traceroute and network mapping - Navigating the vast cyber seas -- Website reconnaissance - Mastering the unseen layers -- Web page scraping and analysis -- Document and metadata analysis -- Identifying hidden information in documents and files -- Analyzing document contents for valuable clues -- OSINT data visualization -- Tools and techniques for visualizing OSINT data -- Best practices for using discovery tools -- Summary -- Chapter 5: From Recon-ng to Trace Labs - A Tour of the Best Open Source Intelligence Tools -- Recon-ng - A powerful OSINT framework -- Running modules and gathering information with Recon-ng -- Maltego - Visualizing OSINT data and connections -- Getting started with Maltego for OSINT investigations -- Discovering the infrastructure -- Shodan - The search engine for IoT -- Getting started with Shodan -- Using Shodan's API -- Trace Labs - A powerful OS designed just for OSINT -- Overview of the Aircrack-ng suite -- Airmon-ng -- Airodump-ng -- Aireplay-ng -- Aircrack-ng -- Airbase-ng -- Airgraph-ng -- Finding hidden networks -- Additional open source OSINT tools -- SpiderFoot -- Twint -- Some final thoughts on tools…”
Libro electrónico -
18647por Carr, OliviaTabla de Contenidos: “…-- Your journey will look different -- Being comfortable on your journey -- Chapter 9 Mastering your mindset: Overcoming obstacles and unleashing your full potential -- So what is a growth mindset? …”
Publicado 2023
Libro electrónico -
18648
-
18649
-
18650
-
18651
-
18652
-
18653
-
18654
-
18655
-
18656
-
18657
-
18658
-
18659por Espinosa Manfugás, Julia
Publicado 2007Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
18660Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico