Mostrando 18,641 - 18,660 Resultados de 22,101 Para Buscar '"Máster"', tiempo de consulta: 0.12s Limitar resultados
  1. 18641
    Publicado 2017
    Tabla de Contenidos: “…-- 9: Mobilize Hearts and Minds Forward -- Leave the Abstract and Make an Impression -- End the Suspense: Make the Unknown Future Known -- How to Mobilize Hearts and Minds Forward -- What Does Your Team Anticipate? -- To Execute Masterfully, Use These Classes Of Mobilizing Questions -- Achieve Something Bigger -- 10: Is Your Team Ready to Do Big Things? …”
    Libro electrónico
  2. 18642
    Publicado 2010
    Tabla de Contenidos: “…Binding Data to a Control -- Summary -- Chapter 11: Bringing It All Together -- Adding Reusable Assets with Component Screens -- Adding Annotations to Our Project -- Creating Documentation -- Summary -- Part III: Understanding SketchFlow -- Chapter 12: The SketchFlow Interface -- The Workspace -- The Tools Panel -- The Projects Panel -- The Assets Panel -- The States Panel -- Objects in the Objects and Timeline Panel -- Timelines in the Objects and Timeline Panel -- SketchFlow Animation Panel -- Artboard Panel -- SketchFlow Map -- The Results Panel -- The Properties Panel -- The Resources Panel -- The Data Panel -- The Feedback Panel -- Application Menus -- Summary -- Chapter 13: Assets, Styles, and Components -- SketchFlow Style Assets -- Working with Styles -- Understanding Styles, Templates, and Resources -- Working with Components -- Summary -- Chapter 14: SketchFlow Animation and States -- Animation Models in SketchFlow and Expression Blend -- SketchFlow Animation -- States -- Keyframe Animation and Storyboards -- Summary -- Chapter 15: SketchFlow Behaviors -- How Behaviors Work -- Triggers and Actions -- Behavior -- Adding Behaviors and Setting Properties -- Summary -- Chapter 16: Data -- Understanding Data and Binding -- The Data Panel -- Creating Data Resources for SketchFlow Projects -- Working with Data in SketchFlow -- Summary -- Chapter 17: Annotating Your Work, Getting Feedback, and Creating Documentation -- Adding Annotations to Your Project -- Getting Feedback with the SketchFlow Player -- Navigation in the SketchFlow Player -- Importing Feedback into Your Project -- Creating Documentation -- Summary -- Part IV: Applied Knowledge -- Chapter 18: Project Brief and Sketches -- Project Brief -- Loyal Customer Survey -- Sketching Ideas -- Refinement and Master Sketches -- Summary -- Chapter 19: Navigation Via Component Screens…”
    Libro electrónico
  3. 18643
    Publicado 2022
    Tabla de Contenidos: “…Server software component (T1505) -- Escalating privileges -- Exploiting for privilege escalation (T1068) -- Creating or modifying system process (T1543) -- Process injection (T1055) -- Abuse elevation control mechanism (T1548) -- Bypassing defenses -- Exploiting for defense evasion (T1211) -- Deobfuscating/decoding files or information (T1140) -- File and directory permissions modification (T1222) -- Impairing defenses (T1562) -- Indicator removal on host (T1070) -- Signed binary proxy execution (T1218) -- Accessing credentials -- Brute force (T1110) -- OS credential dumping (T1003) -- Steal or forge Kerberos tickets (T1558) -- Moving laterally -- Exploiting remote services (T1210) -- Remote services (T1021) -- Using alternate authentication material (T1550) -- Collecting and exfiltrating data -- Data from local system (T1005) -- Data from network shared drives (T1039) -- Email collection (T1114) -- Archive collected data (T1560) -- Exfiltration over web service (T1567) -- Automated exfiltration (T1020) -- Ransomware deployment -- Inhibit system recovery (T1490) -- Data encrypted for impact (T1490) -- Summary -- Chapter 6: Collecting Ransomware-Related Cyber Threat Intelligence -- Threat research reports -- Community -- Threat actors -- Summary -- Section 3: Practical Incident Response -- Chapter 7: Digital Forensic Artifacts and Their Main Sources -- Volatile memory collection and analysis -- Non-volatile data collection -- Master file table -- Prefetch files -- LNK files -- Jump lists -- SRUM -- Web browsers -- Windows Registry -- Windows event logs -- Other log sources -- Summary -- Chapter 8: Investigating Initial Access Techniques -- Collecting data sources for an external remote service abuse investigation -- Investigating an RDP brute-force attack -- Collecting data sources for a phishing attack investigation…”
    Libro electrónico
  4. 18644
    Publicado 2023
    Tabla de Contenidos: “…Part Three: Growing creative-destructive alignment (2017-present) -- The new international competition in green technologies and domestic environmental problems -- The creative and destructive elements of the third Five-Year Plan for Green Growth (2019-2023) -- The Second Five-Year Master Plan for smart grids -- Smart cities: National pilot smart cities -- Hybridized industrial ecosystems -- Destructive ambitions in action: Korea's efforts to phase out coal -- Concluding remarks -- 7 Creative-Destruction in China's Strong and Smart Grid Initiatives: The Shift to Ultra-High Voltage -- The pattern -- The puzzle -- China's electrification strategy -- Part One: The developmental origins of China's `strong and smart' grid focus (1990s-2006) -- Part Two: Developmental-environmentalism and the emergent greening of China's electric power grid (2007-2015) -- The shift to a UHV grid -- Executing the UHV strategic shift -- Part Three: Growing creative-destructive alignment (2015-present) -- Creating a hybridized industrial ecosystem for the grid: The building of an electric power equipment industry in China -- The full flowering of creative-destructive alignment: Internationalization of State Grid Corporation of China and the Chinese power industry -- Concluding remarks -- 8 Drivers and Dynamics of Northeast Asia's Green Energy Shift: A Comparative Strategic Analysis -- East Asian approaches to the green energy transition -- Grid hypermodernization -- Greening of transport: The shift to electric vehicles -- Dramatic incursion by Northeast Asian economies: Leapfrogging strategy -- Developmental environmentalism in action -- Aspect One: Developmental environmentalism as mindset and ambition driving the green energy transition -- Aspect Two: Developmental environmentalism as legitimation strategy…”
    Libro electrónico
  5. 18645
    Publicado 2023
    Tabla de Contenidos: “…Understanding the Player scene -- Gauging the Asteroid scene -- Unraveling the quest system -- Breaking down the World scene -- Logging the player in to the server -- Authenticating players -- Syncing the World scenes -- Separating server and client responsibilities -- Shooting bullets on all instances -- Calculating an asteroid's damage -- Storing and retrieving data on the server -- Implementing the quest system's client side -- Implementing the quest system's server side -- Summary -- Part 3: Optimizing the Online Experience -- Chapter 10: Debugging and Profiling the Network -- Technical requirements -- Introducing Godot's Debugger -- Mastering the Stack Trace tab -- Debugging with the Errors tab -- Exploring the Profiler tab -- Exploring the Visual Profiler tab -- Exploring the Monitors tab -- Getting to know the Video RAM tab -- Grasping the Misc tab -- Understanding the Network Profiler -- Identifying the project's bottlenecks -- Using the Network Profiler -- Using the Monitors tab -- Summary -- Chapter 11: Optimizing Data Requests -- Technical requirements -- Understanding network resources -- Decreasing the requests count -- Reducing the weapon fire count -- Decreasing Asteroid's syncing count -- Compressing data with the ENetConnection class -- Summary -- Chapter 12: Implementing Lag Compensation -- Technical requirements -- Introducing lag issues -- Dealing with unreliable packets -- Common compensation techniques -- Implementing server-side motion -- Bridging the gaps with interpolation -- Playing ahead with prediction -- Gazing into the future with extrapolation -- Summary -- Chapter 13: Caching Data to Decrease Bandwidth -- Technical requirements -- Understanding caching -- Setting up the HTTPRequest node -- Understanding the HTTP protocol -- Setting up the scenes and database -- Implementing texture caching…”
    Libro electrónico
  6. 18646
    Publicado 2024
    Tabla de Contenidos: “…Understanding hidden sources -- Diving into the deep and dark web -- Let's make sure we understand the internet -- Harvesting more with theHarvester -- Shodan -- Automating OSINT collection and analysis -- Summary -- Chapter 4: Exploring the Unknown - How Discovery Tools Reveal Hidden Information -- Introduction to discovery tools -- Unlocking network secrets -- Domain and IP address analysis -- Understanding the DNA of WHOIS - Its definition and purpose -- Applicability - Not just domains but IP blocks too -- The online magnifying glasses - Popular WHOIS lookup platforms -- Finding the connections -- The darker side - When attackers use WHOIS -- DNS and IP analysis - Connecting domains to infrastructure -- Traceroute and network mapping - Navigating the vast cyber seas -- Website reconnaissance - Mastering the unseen layers -- Web page scraping and analysis -- Document and metadata analysis -- Identifying hidden information in documents and files -- Analyzing document contents for valuable clues -- OSINT data visualization -- Tools and techniques for visualizing OSINT data -- Best practices for using discovery tools -- Summary -- Chapter 5: From Recon-ng to Trace Labs - A Tour of the Best Open Source Intelligence Tools -- Recon-ng - A powerful OSINT framework -- Running modules and gathering information with Recon-ng -- Maltego - Visualizing OSINT data and connections -- Getting started with Maltego for OSINT investigations -- Discovering the infrastructure -- Shodan - The search engine for IoT -- Getting started with Shodan -- Using Shodan's API -- Trace Labs - A powerful OS designed just for OSINT -- Overview of the Aircrack-ng suite -- Airmon-ng -- Airodump-ng -- Aireplay-ng -- Aircrack-ng -- Airbase-ng -- Airgraph-ng -- Finding hidden networks -- Additional open source OSINT tools -- SpiderFoot -- Twint -- Some final thoughts on tools…”
    Libro electrónico
  7. 18647
    por Carr, Olivia
    Publicado 2023
    Tabla de Contenidos: “…-- Your journey will look different -- Being comfortable on your journey -- Chapter 9 Mastering your mindset: Overcoming obstacles and unleashing your full potential -- So what is a growth mindset? …”
    Libro electrónico
  8. 18648
    por Romero García, Eladio
    Publicado 2016
    Texto completo en Odilo
    Otros
  9. 18649
    por Pastrana Piñero, Juan
    Publicado 2017
    Texto completo en Odilo
    Otros
  10. 18650
    por Luis Moya Albiol
    Publicado 2016
    Texto completo en Odilo
    Otros
  11. 18651
    por Eduard Beltran
    Publicado 2017
    Texto completo en Odilo
    Otros
  12. 18652
    por Romero García, Eladio
    Publicado 2017
    Texto completo en Odilo
    Otros
  13. 18653
    por Lierni Irizar
    Publicado 2017
    Texto completo en Odilo
    Otros
  14. 18654
    por Pablo Iglesias Turrión
    Publicado 2015
    Texto completo en Odilo
    Otros
  15. 18655
    Publicado 2015
    Texto completo en Odilo
    Otros
  16. 18656
  17. 18657
    por Waltzer Moscowic, Alejandra
    Publicado 2009
    Texto completo en Odilo
    Otros
  18. 18658
    Texto completo en Odilo
    Otros
  19. 18659
  20. 18660