Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 61,960
- Història 30,425
- Biblia 21,411
- Filosofía 18,685
- Crítica e interpretación 17,252
- Iglesia Católica 12,422
- Crítica i interpretació 11,199
- Universidad Pontificia de Salamanca (España) 10,417
- Teología 10,113
- Església Catòlica 9,063
- History 8,877
- Derecho 8,187
- Engineering & Applied Sciences 7,650
- Bíblia 6,909
- Educación 6,443
- Biografia 6,258
- Historia y crítica 5,698
- Derecho canónico 5,654
- Liturgia 5,561
- Biografías 5,441
- Espiritualidad 5,415
- Literatura 5,395
- Cristianismo 5,345
- Computer Science 5,287
- Política 5,228
- Religión 5,188
- Psicología 5,146
- Arquitectura 5,061
- Management 4,959
- Teología dogmática 4,955
-
4701Publicado 2008Tabla de Contenidos: “…Microsoft® SQL Server® 2008 ALL - IN - ONE DESK REFERENCE; Table of Contents; Introduction; Book I Essential Concepts; Book II Designing and Using Databases; Book III Interacting with Your Data; Book IV Database Programming; Book V Reporting Services; Book VI Analysis Services; Book VII Performance Tips and Tricks; Book VIII Database Administration; Book IX Appendixes; Index…”
Libro electrónico -
4702
-
4703Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Planning and Engagement -- Governance, Risk, and Compliance -- Testing Limitations -- Contracts and Documentation -- Scope and Requirements -- Professionalism and Integrity -- Chapter Review -- References -- Chapter 2 Information Gathering and Vulnerability Scanning -- Passive Reconnaissance -- Active Reconnaissance -- Vulnerability Scanning and Analysis -- Chapter Review -- References -- Chapter 3 Network-Based Attacks -- Name Resolution Exploits -- Password Attacks -- Stress Testing Applications and Protocols -- Network Packet Manipulation -- Layer 2 Attacks -- Researching an Attack -- Chapter Review -- Chapter 4 Wireless and RF Attacks -- 802.11 Wireless -- Attacking Bluetooth -- RFID and NFC -- Chapter Review -- References -- Chapter 5 Web and Database Attacks -- OWASP Top Ten -- Injection Attacks -- Attacking Authentication and Session Management -- Data Exposure and Insecure Configuration -- Inclusion Attacks -- Race Conditions -- Chapter Review -- Chapter 6 Attacking the Cloud -- Account and Privilege Attacks -- Misconfigured Cloud Assets -- Cloud-Centric Attacks -- Chapter Review -- Chapter 7 Specialized and Fragile Systems -- Mobile Devices -- Virtual and Containerized Systems -- Other Nontraditional Systems -- Chapter Review -- Chapter 8 Social Engineering and Physical Attacks -- Physical Security and Social Engineering -- Social Engineering and Physical Attacks -- Countermeasures -- Chapter Review -- References -- Chapter 9 Post-Exploitation -- Enumeration -- Privilege Escalation -- Covert Channels and Data Exfiltration -- Lateral Movement -- Maintaining Persistence -- Covering Your Tracks -- Chapter Review -- Chapter 10 Post-Engagement Activities -- The Anatomy of a Pentest Report -- Findings, Recommendations, and Analysis -- Post-Engagement Activities -- Chapter Review -- References -- Chapter 11 Tools and Code Analysis -- Logic Constructs -- Data Structures -- Other Programming Concepts -- Practical Examples -- Specialized Examples -- Chapter Review -- Chapter 12 Tools Inventory -- Appendix A Objective Map -- Objective Map: Exam PT0-002 -- Appendix B About the Online Content -- System Requirements -- Your Total Seminars Training Hub Account -- Single User License Terms and Conditions -- TotalTester Online -- Other Book Resources -- Technical Support -- Glossary -- Index…”
Libro electrónico -
4704Publicado 2010Tabla de Contenidos: “…bk. 1. Adobe Creative Suite 5 basics -- bk. 2. InDesign CS5 -- bk. 3. …”
Libro electrónico -
4705Publicado 2020“…Oracle Database running on Linux is available for deployment on IBM LinuxONE by using Redhat Enterprise Linux (RHEL) or SUSE Linux Enterprise Server (SLES). …”
Libro electrónico -
4706
-
4707
-
4708por Hostetler, GlennTabla de Contenidos: “…Configuring and tuning Technology Foundation for high transaction volumes -- 4.1 pSeries benchmark -- 4.1.1 Physical architecture -- 4.1.2 Detailed logical architecture -- 4.2 Recommended parameter values and reasoning -- 4.2.1 Tuning parameters that prevent dropped transactions at high volumes -- 4.2.2 Parameters that enhance response time -- 4.2.3 Tempting but insignificant parameters -- 4.3 xSeries -- 4.4 iSeries -- 4.5 Miscellaneous tuning tips -- 4.5.1 Database configuration changes…”
Publicado 2005
Libro electrónico -
4709Publicado 2024“…Key Features Step-by-step guidance from basic to advanced SQL techniques Comprehensive coverage of MySQL, a leading database management system Practical exercises with solutions to reinforce learning Book Description Learn SQL (using MySQL) in One Day and Learn It Well is the ultimate guide for beginners aiming to grasp the complexities of SQL through hands-on learning. …”
Libro electrónico -
4710Publicado 2017“…Why cannot we have more than one digital strategy?…”
Libro electrónico -
4711
-
4712
-
4713
-
4714
-
4715
-
4716
-
4717
-
4718
-
4719por Chichiercha Raventós, OlgaMaterias: “…Filtres d'ones acústiques de superfície PFC…”
Publicado 1997
Tesis -
4720