Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 405
- Computer Science 319
- Development 162
- Application software 119
- Electrical & Computer Engineering 88
- Telecommunications 85
- Operating systems (Computers) 75
- Management 68
- Design 64
- Cloud computing 61
- Database management 60
- Computer software 59
- Web site development 58
- Examinations 55
- Java (Computer program language) 55
- Microsoft .NET Framework 54
- Web sites 53
- Computer networks 49
- Películas cinematográficas 49
- Client/server computing 48
- Computer programs 48
- Historia 41
- Computer security 39
- Microsoft Windows (Computer file) 38
- Business & Economics 37
- Linux 37
- Computer programming 36
- Programming 35
- Certification 33
- Web servers 33
-
2261
-
2262Publicado 2020Libro electrónico
-
2263Publicado 2018Tabla de Contenidos: “…NGOs Roles in Norways International Climate and Forest Initiative doi:10.3390/f8030064 -- Jovanka Spiric, Esteve Corbera, Victoria Reyes-García and Luciana Porter-Bolland A Dominant Voice amidst Not Enough People: Analysing the Legitimacy of Mexicos REDD+ Readiness Process doi:10.3390/f7120313 -- Sam Airey and Torsten Krause Georgetown aint got a tree. …”
Libro electrónico -
2264
-
2265
-
2266
-
2267Publicado 2018Tabla de Contenidos: “…Private subnet -- Bastion subnet -- Bastion host -- Security groups -- Infrastructure as Code -- Setting up CloudFormation -- Centralized logging -- Setting up CloudWatch -- Summary -- Chapter 8: Designing a Big Data Application -- Introducing big data applications -- AWS components used in big data applications -- Analyzing streaming data with Amazon Kinesis -- Best practices for serverless big data applications -- Best practices for using Amazon EMR -- Understanding common EMR use cases -- Lowering EMR costs -- Using Amazon EC2 Spot and Auto Scaling -- Best practices for distributed machine learning and predictive analytics -- Using Amazon SageMaker for machine learning -- Understanding Amazon SageMaker algorithms and features -- Security overview for big data applications -- Securing the EMR cluster -- Encryption -- Authentication -- Authorization -- Securing serverless applications -- Understanding serverless application authentication and authorization -- Configuring and using EMR-Spark clusters -- Summary -- Chapter 9: Implementing a Big Data Application -- Setting up an Amazon Kinesis Stream -- Creating an AWS Lambda function -- Using Amazon Kinesis Firehose -- Using AWS Glue and Amazon Athena -- Using Amazon SageMaker -- Summary -- Chapter 10: Deploying a Big Data System -- Using CloudFormation templates -- Creating a data lake using a CloudFormation template -- Authoring and deploying serverless applications -- Understanding AWS SAM -- Understanding the SAM template -- Introducing SAM Local -- Developing serverless applications using AWS Cloud9 -- Automating serverless application deployments -- Using AWS Serverless Application Repository -- Summary -- Other Books You May Enjoy -- Leave a review - let other readers know what you think -- Index…”
Libro electrónico -
2268Publicado 2005Tabla de Contenidos: “…Acknowledgments; Contents; Foreword; Introduction; Wherein We Begin Life on the Road; James Harms-Morgantown, West Virginia; David Citino-Columbus, Ohio; Martha Collins-Oberlin, Ohio; Linda Gregerson-Ann Arbor, Michigan; Richard Tillinghast-Ann Arbor, Michigan; Winnie Cooper; Orlando Ricardo Menes-South Bend, Indiana; Mark Strand-Chicago, Illinois; Karen Volkman-Chicago, Illinois; Lisa Samuels-Milwaukee, Wisconsin; Marvin Bell-Iowa City, Iowa; Dust, Corn, and Popcorn People; Michael Dennis Browne-Minneapolis, Minnesota; David Allan Evans-Brookings, South Dakota -- David Romtvedt-Buffalo, WyomingThe West; Sandra Alcosser-Lolo, Montana; Robert Wrigley-Moscow, Idaho; Nance Van Winckel-Liberty Lake, Washington; Christopher Howell-Spokane, Washington; Wherein the Author Ruminates on RV Life; Mark Halperin-Ellensburg, Washington; Jana Harris-Sultan, Washington; Sam Hamill-Port Townsend, Washington; The Day I Did Winnie Cooper Wrong; Barbara Drake-Yamhill, Oregon; Floyd Skloot-Amity, Oregon; Suddenly in California; Ralph Angel-South Pasadena, California; Carol Muske-Dukes-Los Angeles, California; David St. …”
Libro electrónico -
2269por Wheatley-Liss, Deirdre R. authorTabla de Contenidos: “…t Forget About Your Spouse""; ""Creditors Come First""; ""Uncle Sam""; ""What Is Equal and Fair?""…”
Publicado 2013
Libro electrónico -
2270por Reimer, StanTabla de Contenidos: “…Windows Server 2003 Active Directory Overview; Windows NT and SAM; Windows 2000 and Active Directory; Windows Server 2003 Domains and Active Directory; Active Directory Open Standards; Lightweight Directory Access Protocol (LDAP); Key Features and Benefits of Active Directory; Single Sign-On; Delegated Administration; Common Management Interface; Integrated Security; Scalability; What's New in Windows Server 2003 Active Directory…”
Publicado 2009
Libro electrónico -
2271Publicado 2015Tabla de Contenidos: “…Moore; 70 Melanie Mikecz; 71 Michelle Nilson; 72 Miranda Skoczek; 73 Mónica Muñoz; 74 Muovo; 75 Nancy Wolff; 76 Nineteen Seventy Three; 77 Pattern State; 78 Rachael Taylor; 79 Rachel Westhead; 80 Rashida Coleman-Hale; 81 Sam Osborne; 82 Samantha Cisneros; 83 Sanna Annukka; 84 Sarah Walsh; 85 Sian Elin; 86 Simi Gauba; 87 Simon C Page; 88 Studio Boot; 89 Sunny Todd Prints; 90 Susse Linton; 91 Suzanne Lefebvre; 92 Suzie-Q; 93 Tamasyn Gambell; 94 Tammie Bennett; 95 Thereza Rowe; 96 Three of the Possessed; 97 Vasare Nar…”
Libro electrónico -
2272Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Endorsement -- Copyright and Credits -- Chapter 1: Introduction -- Chapter 2: Overview of AI Concepts and Technology Stack -- Chapter 3: Sam Liang -- CEO of Otter.ai -- Chapter 4: Amr Awadallah -- Founder and CEO at Vectara -- Chapter 5: Philipp Heltewig -- Co-Founder and CEO at Cognigy -- Chapter 6: Miao Song -- Chief Information Officer at GLP -- Chapter 7: Ruben Ortega -- General Partner at Enjoy the Work -- Chapter 8: Joshua Rubin -- Principal AI Scientist at Fiddler AI -- Chapter 9: Nadine Thomson -- Global Chief Technology Officer at GroupM (WPP) -- Chapter 10: Sarvarth Misra -- Co-Founder and CEO of ContractPodAi -- Chapter 11: Edward Fine -- AI and Data Science Consultant, Technologist, and Instructor -- Chapter 12: Sanjeevan Bala -- Group Chief Data and AI Officer at ITV -- Chapter 13: Nathalie Gaveau -- AI Tech Entrepreneur and Board Member -- Chapter 14: Phil Harvey -- Applied AI Architect -- Chapter 15: Elizabeth Ajayi -- Director, Intelligent Industry at Capgemini Invent -- Chapter 16: Louis DiCesari -- Head of Data, Analytics and AI at Levi Strauss & -- Co. -- Chapter 17: Vickey Rodrigues -- CTO/CDO in Insuretech, Payments, and Healthtech -- Chapter 18: Sean McDonald -- Former Global Chief Innovation Officer at McCann Worldgroup -- Chapter 19: Julie Gray -- Head of Data and Internal Systems at Agilio -- Chapter 20: Peter Jackson -- Chief Data and Technology Officer at Outra -- Chapter 21: Mark Beckwith -- Director of Data Governance and Architecture at the Financial Times -- Chapter 22: Kshira Saagar -- Data Science at Wolt and Doordash -- Chapter 23: Joe Romata -- Global Head of Customer Experience at a multinational energy company -- Chapter 24: Tomasz Ullman -- Former Global Head of Data Science and Strategy at Ford Pro -- Chapter 25: Oz Krakowski -- Chief Business Development Officer at Deepdub…”
Libro electrónico -
2273Publicado 2012Tabla de Contenidos: “…s Dream Comes to Life: DRAWING FROM THE WELL OF YOUTHFUL IMAGINATION""""Mini Mount of Olives""; ""Uncle Sam Wants You: VIEWING THE SOLDIER""; ""Types of Cameras: DIFFERENT POINTS OF VIEW""; ""Thomas Wedgwood: IMAGE RECORDING PIONEER""; ""Richard Avedon (1923â€?…”
Libro electrónico -
2274por Van Tassel, Joan M.Tabla de Contenidos: “…Financial Management; Chapter Objectives; Introduction; Structures for Managing Finances; Fundamental Financial Concepts; Key Financial Statements; Financial Responsibilities in the Age of Sarbanes-Oxley; A Day in the Life of Sam Bush; Financial Management Systems; Managerial Finance: Strategic Planning and Budgeting; Financial Strategies…”
Publicado 2010
Libro electrónico -
2275Publicado 2015Tabla de Contenidos: “…El cómic (Javier Mariscal, 1999) -- DVD 2: Cortos 2001-2015; Francesc lo Valent (Carles Porta, 2001) Profesor Nefario (Fran Bravo, 2001) How to Cope with Death (Ignacio ferreras, 2002) Encarna (Sam, 2003) Minotauromaquia: Pablo en el laberinto (Juan Pablo Etcheverry, 2004) Cada día paso por aquí (Raúl Arroyo, 2004) Cirugía (Alberto González Vázquez, 2006) Alma (Rodrigo Blaas, 2009) Birdboy (Predo Rivero y Alberto Vázquez, 2010) Estado de cambio (David Bestué y Marc Vives, 2010) Ámár (Isabel Herguera, 2010) El viaje de María (Miguel Gallardo, 2010) Doomed (Guillermo García Carsí, 2011) Écart de conduite (Rocío Álvarez, 2012) El ruido del mundo (Coke Riobóo, 2013) Hotzanak, for your own safety (Izibene Oñederra, 2013) Canis (Anna Solanas y Marc Riba (2013) Zepo (César Díaz Meléndez, 2014) Princesa china (Tomás Bases, 2014) Estela (Frederic Amat, 2015) -- DVD 3: Historias de amor y masacre; Pioneros Spots Estudios Moro; Extras; Historias de amor y masacre (Jordi Amorós, 1979) Le théâtre éatre électrique de Bob (Segundo de Chomón, 1909) La bronca (Anónimo, 1917) Cambó i l’Autonomia. …”
DVD -
2276por Martínez Sánchez, RubénTabla de Contenidos: “…3.1.2 ESCANEADORES DE VULNERABILIDADES -- 3.1.3 EXPLOTANDO LA VULNERABILIDAD -- 3.1.4 UTILIZACIÓN DE SHELL COMO PAYLOAD -- 3.2 METASPLOIT FRAMEWORK -- 3.2.1 CONFIGURANDO UN EXPLOIT -- 3.3.2 DESCARGA DE HERRAMIENTAS MEDIANTE UN SCRIPT -- 3.3.3 TRANSFIRIENDO ARCHIVOS CON METERPRETER3.3.3 TRANSFIRIENDO ARCHIVOS CON METERPRETER -- 3.4 VALIDACIÓN TRANSPARENTE EN LOS SISTEMAS -- 3.4.1 VALIDACIÓN MEDIANTE FUERZA BRUTA -- 3.4.2 ROBANDO LAS CONTRASEÑAS CON UN KEYLOGGER -- 3.5 CONCLUSIONES -- 4 HACKING EN SISTEMAS WINDOWS -- 4.1 PENETRANDO EN SISTEMAS MICROSOFT -- 4.2 RECONOCIMIENTO DEL OBJETIVO -- 4.2.1 USO DE COMANDOS NET -- 4.2.1.1 NULL SESSION (SESIÓN NULA) -- 4.2.1.2 NET VIEW -- 4.2.1.3 NET ACCOUNTS -- 4.2.1.4 NET GROUP -- 4.2.1.5 NET LOCALGROUP -- 4.2.1.6 NET START -- 4.2.2 ASEGURAMIENTO CONTRA SESIONES NULAS -- 4.2.3 ENUMERACIÓN A TRAVÉS DE LA TABLA NETBIOS -- 4.2.4 ENUMERACIÓN USANDO EL PROTOCOLO SNMP -- 4.2.5 ENUMERANDO EL REGISTRO DE WINDOWS 4.2.5 ENUMERANDO EL REGISTRO DE WINDOWS -- 4.2.6 USO DE PROGRAMAS PARA ENUMERAR4.2.6 USO DE PROGRAMAS PARA ENUMERAR -- 4.2.6.1 USER2SID -- 4.2.6.2 SID2USER -- 4.2.6.3 CAIN & -- ABEL -- 4.2.6.4 NBTDUMP -- 4.2.6.5 USERDUMP -- 4.2.6.6 USERINFO -- 4.2.6.7 IP NETWORK BROWSER -- 4.2.6.8 ENUM -- 4.2.6.9 DUMPACL/DUMPSEC -- 4.2.6.10 FOCA -- 4.3 ESCANEO DEL OBJETIVO -- 4.4 CONSOLIDANDO EL ACCESO AL SISTEMA -- 4.2.1 USO DE COMANDOS NET -- 4.2.2 ASEGURAMIENTO CONTRA SESIONES NULAS4.2.2 ASEGURAMIENTO CONTRA SESIONES NULAS -- 4.4.2.1 EL SISTEMA SYSKEY -- 4.2.3 ENUMERACIÓN A TRAVÉS DE LA TABLA NETBIOSv -- 4.4.3.1 EXTRAER EL SAM CON DISCOS DE ARRANQUE -- 4.4.3.2 EXTRAER EL SAM CON PWDUMP -- 4.4.3.3 EXTRAER EL SAM UTILIZANDO CAIN & -- ABEL -- 4.4.3.4 EXTRAER EL SAM DEL DIRECTORIO REPAIR -- 4.2.4 ENUMERACIÓN USANDO EL PROTOCOLO SNMP4.2.4 ENUMERACIÓN USANDO EL PROTOCOLO SNMP -- 4.2.5 ENUMERANDO EL REGISTRO DE WINDOWS…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2277por Guillén Núñez, PedroTabla de Contenidos: “….) -- 3.2.1 Instalación -- 3.2.2 Buscar sistemas vulnerables -- 3.2.2 Buscar sistemas vulnerables -- 3.2.3 Utilización mediante consola -- 3.2.4 Utilización mediante interfaz web -- 3.2.5 Contramedidas -- 3.2.5 Contramedidas -- 3.3 ATAQUES CONTRA CONTRASEÑAS DE SISTEMAS WINDOWS -- 3.3.1 Obtención del fichero Sam -- 3.3.2 Crackeando el Sam (...) -- 3.3.3 Obtener la contraseña -- 3.3.4 Postexplotación -- 3.3.5 LiveCD ophcrack -- 3.3.6 Contramedidas -- 3.4 ATAQUES CONTRA CONTRASEÑAS DE SISTEMAS GNU/LINUX -- 3.4.1 John the Ripper -- 3.4.2 @stack LC5 -- 3.4.3 Contramedidas -- 4 HACKING DE REDES -- 4.1 INTRODUCCIÓN -- 4.2 MAN IN THE MIDDLE -- 4.3 ¿CÓMO FUNCIONA ARP? …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2278Publicado 2005Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
2279Publicado 2013“…The pages are crammed with 500 full-color pictures, tips from the pros, resources, checklists and charts, making it easy to find what you need fast.The DVD includes:* Video and audio tutorials, useful forms, and interviews with leading documentary filmmakers like Albert Maysles (Grey Gardens), Sam Pollard (4 Little Girls), and others 50+ Crazy Phat Bonus pages with jump start charts, online resources, releases, storyboards, checklists, equipment guides, and shooting proceduresHere's just a small sampling of what's inside the book: Putting together a crewChoosing a camera* New HDV and 24P cameras* Shooting in rough neighborhoods. …”
Libro electrónico -
2280Publicado 2019“…Throughout his career, Cohen has collected first-hand knowledge from meetings with such real estate titans as Ronald Terwilliger, Sam Zell, Joseph Sitt, and numerous others. Cohen wanted to understand how these real estate giants became so successful, so he refined his quest into three critical questions: What inspires these titans to work so hard and reach such extraordinary levels of success? …”
Libro electrónico