Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Jazz 10
- Bebop (Música) 6
- Engineering & Applied Sciences 6
- Computer security 5
- History 5
- Management 5
- Computer Science 4
- Cuentos 4
- Història 4
- Information display systems 4
- Literatura infantil 4
- SIDS 4
- Development 3
- Electrónica 3
- Operating systems (Computers) 3
- Películas cinematográficas 3
- Politics and government 3
- Programación neurolingüística 3
- Research & information: general 3
- climate change 3
- Alimentos 2
- Biografías 2
- Business & Economics 2
- Computer networks 2
- Computer software 2
- Condicions econòmiques 2
- Cristianisme 2
- Derecho comparado 2
- Diseases 2
- Economics 2
-
161por Dumont, Jean, 1923-2001
Publicado 1987Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de Pastoral Madrid, Biblioteca de la Universidad Pontificia de Salamanca, Red de bibliotecas Iglesia Navarra, Biblioteca Seminario Metropolitano de Oviedo, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Biblioteca Universidad de Deusto, Biblioteca Universitat Ramon Llull, Biblioteca Diocesana Bilbao, Biblioteca Central de Capuchinos de España, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca de la Universidad de Navarra)Libro -
162Publicado 2021Tabla de Contenidos: “…Abd al-Malik (1782-1783) -- 6.2.1.4 Hach Ben Mohamet (1782-1783) -- 6.2.1.5 Sid Amar Ben Ayà (1783) -- 6.2.1.6 Muhammad b. al-Hadi al-Hafi (1784-1789) -- 6.2.1.7 Allal al-Awdi and Qaddur al-Awdi (1784) -- 6.2.1.8 Muhammad b. …”
Libro electrónico -
163Publicado 2006Tabla de Contenidos: “…Kahn : Indian Institute of Management, Ahmedabad ; Paul Rudolph : University of Massachusetts Dartmouth, North Dartmouth, Massachusetts ; Arthur Erickson, Geoffrey Massey : Simon Fraser University, Burnaby, British Columbia ; John Andrews : Scarborough Campus, University of Toronto, Toronto, Ontario ; Kevin Roche, John Dinkeloo : Fine Arts Center, University of Massachusetts Amherst, Amherst, Massachusetts ; Paul Rudolph : Sid W. Richardson Physical Sciences Building, Texas Christian University, Fort Worth, Texas ; Arthur Erickson : University of Lethbridge, Alberta ; John Andrews, Anderson, Baldwin : George Gund Hall, Harvard University, Boston, Massachusetts ; Henning Larsen : University of Trondheim, Trondheim ; Craig Ellwood : Hillside Campus, Art Center College of Design, Pasadena, California ; Ralph Erskine : Frescati Campus, Stockholm University, Stockholm ; James Stirling, Michael Wilford : Rice School of Architecture, Rice University, Houston, Texas ; Frank O. …”
Libro -
164Publicado 1998Tabla de Contenidos: “…. -- 1924. -- Intèrprets: Sid Smiths, Cliff Bowes. Chasing choo choos / director Harry Set. -- (22 min). -- 1927. -- Intèrprets: Monty Banks, Virginia Craig. …”
Libro -
165
-
166Troubleshooting and supporting Windows 11 creating robust, reliable, sustainable, and secure systemsPublicado 2023Tabla de Contenidos: “…-- Using the Browser Task Manager -- Advanced Management of Windows Processes and Services -- Managing and Troubleshooting Services -- Managing and Troubleshooting Processes and Services with PowerShell -- Troubleshooting Processes and Services with Microsoft Sysinternals -- PsTools -- PsExec -- PsFile -- PsGetSid -- PsInfo -- PsPing -- PsKill -- PsList -- PsLoggedOn -- PsLogList -- PsPasswd -- PsService -- PsShutdown -- PsSuspend -- AutoRuns -- Handle -- ListDLLs -- Portmon -- ProcDump -- Process Explorer -- Process Monitor -- ShellRunas -- VMMap -- Summary -- Chapter 14: Network and Internet Troubleshooting -- Prevention Is Better Than Cure -- Configuring Network Settings -- Wi-Fi Settings -- Managing Data Usage for Cellular and Other Networks -- Managing Advanced Network Settings -- Resetting the Network Adapters…”
Libro electrónico -
167por Viega, JohnTabla de Contenidos: “…Modifying a process&s primary token; 1.2.3.3. Working with SID_AND_ATTRIBUTES structures; 1.2.3.4. Working with LUID_AND_ATTRIBUTES structures; 1.2.4. …”
Publicado 2003
Libro electrónico -
168por Burleson, Donald K.Tabla de Contenidos: “…Ensure That Only the Oracle User Can Run a Script; 1.4.8. Validate an Oracle SID Passed to a Unix Script; 1.4.9. Loop Between Unix Servers; 1.4.10. …”
Publicado 2001
Libro electrónico -
169Publicado 2025Tabla de Contenidos: “…MANAGING AN INTRUSION DETECTION SYSTEM IN A NETWORK SECURITY MONITORING FRAMEWORK -- Configuring the Intrusion Detection System -- Rules and Filters -- Managing Sensors -- Sensor Check -- External Detection -- Internal Detection -- Manual Changes to Rules -- /usr/bin/rule-update -- /etc/nsm/rules/downloaded.rules -- /etc/nsm/rules/local.rules -- /etc/nsm/pulledpork/disablesid.conf -- /etc/nsm/pulledpork/pulledpork.conf -- /var/log/nsm/sid_changes.log -- /etc/nsm/templates/snort/snort.conf -- /etc/nsm/HOSTNAME-INTERFACE/snort.conf -- /etc/nsm/rules/bpf.conf -- /etc/nsm/securityonion.conf -- /etc/nsm/pulledpork/enablesid.conf -- /etc/nsm/pulledpork/dropsid.conf -- /etc/nsm/pulledpork/modifysid.conf -- /etc/nsm/rules/threshold.conf -- Log Files -- After the Changes -- Useful File Manipulation Commands -- How to Add Rules -- How to Disable a Single Rule or Range Rules -- Edit the /etc/nsm/pulledpork/disablesid.conf File -- 9. …”
Libro electrónico -
170Publicado 2005Tabla de Contenidos: “…CVII de Jerónimo / Josefa Cantó Llorca pags. 63-74 ; Valentiniano I y Amiano Marcelino / Gregorio Carrasco Serrano pags. 75-86 ; Amiano entre historia y sátira (Res gestae XIV 6) / Carmen Castillo pags. 87-94 ; Pompa... Veneris (Sid. Ap. Cartas IV 20) / María Concepción Fernández López pags. 95-104 ; Palabras menores: la reproducción de las palabras del emperador en la sección privada del discurso de "gratiarum actio" consular / María Isabel Gómez Santamaría pags. 105-114 ; Mantuanus vates excelsus. …”
Libro -
171Publicado 2016Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: The Anatomy of Games -- Not just pixels and programming -- Finding your preferred type -- Playing to learn -- Minecraft -- Kerbal Space Program -- Sid Meier's Civilization -- Stop kidding around, be serious! …”
Libro electrónico -
172Publicado 2018Tabla de Contenidos: “…Connecting to SQL instances - the SqlInstance parameter -- Running manual queries -- PowerShell to SQL -- Navigating the module -- Backup, restore, and test -- Deploying maintenance insight tools -- Migrations made easy -- Working with the Reporting Services module -- Connecting to the Reporting Services server -- Administrating the service -- Managing the data in the service -- Working with content -- Navigating the structure -- Exporting content -- Importing content -- Configuring SSRS servers -- Working with the dbachecks module -- Configuration -- Feel the power -- Summary -- Questions -- Chapter 17: PowerShell Deep Dives -- Creating XAML GUIs with PSGUI -- Scalable DSC configuration -- The problem -- The setup -- Configuration data -- Configurations -- Build -- ConvertFrom-String -- LINQ -- OpenFileDialog -- Username to Security Identifier (SID) -- SHiPS -- PSDefaultParameterValues and PSBoundParameters -- PSDefaultParameterValues -- PSBoundParameters -- ConvertTo-Breakpoint -- Summary -- Questions -- Further reading -- Appendix A: PowerShell ISE Hotkeys -- Keyboard shortcuts for editing text -- Keyboard shortcuts for running scripts -- Keyboard shortcuts for customizing the view -- Keyboard shortcuts for debugging scripts -- Keyboard shortcuts for Windows PowerShell tabs -- Keyboard shortcuts for starting and exiting -- References -- VSCode Hotkeys -- Default keyboard shortcuts -- Basic editing -- Rich languages editing -- Navigation -- Editor/Window management -- File management -- Display -- Search -- Preferences -- Debug -- Tasks -- Extensions -- References -- Assessments -- Other Books You May Enjoy -- Index…”
Libro electrónico -
173Publicado 2023Tabla de Contenidos: “…-- Running PowerShell without powershell.exe -- Using "living off the land" binaries to call assembly functions -- Binary executables -- Executing PowerShell from .NET Framework using C# -- Summary -- Further reading -- Chapter 6: Active Directory - Attacks and Mitigation -- Technical requirements -- Introduction to Active Directory from a security point of view -- How attacks work in a corporate environment -- ADSI, ADSI accelerators, LDAP, and the System.DirectoryServices namespace -- Enumeration -- Enumerating user accounts -- Enumerating GPOs -- Enumerating groups -- Privileged accounts and groups -- Built-in privileged groups in AD -- Password spraying -- Mitigation -- Access rights -- What is a SID? -- Access control lists -- OU ACLs -- GPO ACLs -- Domain ACLs -- Domain trusts -- Credential theft -- Authentication protocols -- Attacking AD authentication - credential theft and lateral movement -- Mitigation -- Microsoft baselines and the security compliance toolkit -- Summary -- Further reading -- Chapter 7: Hacking the Cloud - Exploiting Azure Active Directory/Entra ID -- Technical requirements -- Differentiating between AD and AAD -- Authentication in AAD -- Device identity - connecting devices to AAD -- Hybrid identity -- Protocols and concepts -- Privileged accounts and roles -- Accessing AAD using PowerShell -- The Azure CLI -- Azure PowerShell -- Attacking AAD -- Anonymous enumeration -- Password spraying -- Authenticated enumeration -- Credential theft -- Token theft -- Consent grant attack - persistence through app permissions -- Abusing AAD SSO -- Exploiting Pass-through Authentication (PTA) -- Mitigations -- Summary -- Further reading -- Chapter 8: Red Team Tasks and Cookbook -- Technical requirements -- Phases of an attack -- Common PowerShell red team tools -- PowerSploit -- Invoke-Mimikatz…”
Libro electrónico -
174por Martínez Sánchez, RubénTabla de Contenidos: “…3.1.2 ESCANEADORES DE VULNERABILIDADES -- 3.1.3 EXPLOTANDO LA VULNERABILIDAD -- 3.1.4 UTILIZACIÓN DE SHELL COMO PAYLOAD -- 3.2 METASPLOIT FRAMEWORK -- 3.2.1 CONFIGURANDO UN EXPLOIT -- 3.3.2 DESCARGA DE HERRAMIENTAS MEDIANTE UN SCRIPT -- 3.3.3 TRANSFIRIENDO ARCHIVOS CON METERPRETER3.3.3 TRANSFIRIENDO ARCHIVOS CON METERPRETER -- 3.4 VALIDACIÓN TRANSPARENTE EN LOS SISTEMAS -- 3.4.1 VALIDACIÓN MEDIANTE FUERZA BRUTA -- 3.4.2 ROBANDO LAS CONTRASEÑAS CON UN KEYLOGGER -- 3.5 CONCLUSIONES -- 4 HACKING EN SISTEMAS WINDOWS -- 4.1 PENETRANDO EN SISTEMAS MICROSOFT -- 4.2 RECONOCIMIENTO DEL OBJETIVO -- 4.2.1 USO DE COMANDOS NET -- 4.2.1.1 NULL SESSION (SESIÓN NULA) -- 4.2.1.2 NET VIEW -- 4.2.1.3 NET ACCOUNTS -- 4.2.1.4 NET GROUP -- 4.2.1.5 NET LOCALGROUP -- 4.2.1.6 NET START -- 4.2.2 ASEGURAMIENTO CONTRA SESIONES NULAS -- 4.2.3 ENUMERACIÓN A TRAVÉS DE LA TABLA NETBIOS -- 4.2.4 ENUMERACIÓN USANDO EL PROTOCOLO SNMP -- 4.2.5 ENUMERANDO EL REGISTRO DE WINDOWS 4.2.5 ENUMERANDO EL REGISTRO DE WINDOWS -- 4.2.6 USO DE PROGRAMAS PARA ENUMERAR4.2.6 USO DE PROGRAMAS PARA ENUMERAR -- 4.2.6.1 USER2SID -- 4.2.6.2 SID2USER -- 4.2.6.3 CAIN & -- ABEL -- 4.2.6.4 NBTDUMP -- 4.2.6.5 USERDUMP -- 4.2.6.6 USERINFO -- 4.2.6.7 IP NETWORK BROWSER -- 4.2.6.8 ENUM -- 4.2.6.9 DUMPACL/DUMPSEC -- 4.2.6.10 FOCA -- 4.3 ESCANEO DEL OBJETIVO -- 4.4 CONSOLIDANDO EL ACCESO AL SISTEMA -- 4.2.1 USO DE COMANDOS NET -- 4.2.2 ASEGURAMIENTO CONTRA SESIONES NULAS4.2.2 ASEGURAMIENTO CONTRA SESIONES NULAS -- 4.4.2.1 EL SISTEMA SYSKEY -- 4.2.3 ENUMERACIÓN A TRAVÉS DE LA TABLA NETBIOSv -- 4.4.3.1 EXTRAER EL SAM CON DISCOS DE ARRANQUE -- 4.4.3.2 EXTRAER EL SAM CON PWDUMP -- 4.4.3.3 EXTRAER EL SAM UTILIZANDO CAIN & -- ABEL -- 4.4.3.4 EXTRAER EL SAM DEL DIRECTORIO REPAIR -- 4.2.4 ENUMERACIÓN USANDO EL PROTOCOLO SNMP4.2.4 ENUMERACIÓN USANDO EL PROTOCOLO SNMP -- 4.2.5 ENUMERANDO EL REGISTRO DE WINDOWS…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
175Publicado 2017Tabla de Contenidos: “…Notes on resultatives and pseudo-resultatives -- 4.1 (Pseudo-)resultatives in SIDs -- 4.2 The agreement of (pseudo-)resultatives -- 5. …”
Libro electrónico -
176por Organisation for Economic Co-operation and Development“…Small Island Developing States (SIDS) stand at a critical juncture on their paths to sustainable development. …”
Publicado 2018
Libro electrónico -
177Publicado 2011Tabla de Contenidos: “…Quiz -- Types of Trust Relationships -- Transitive Trusts -- Forest Trusts -- External Trusts and Realm Trusts -- Shortcut Trusts -- Creating and Configuring Trust Relationships -- Creating a Forest Trust Relationship -- Creating External Trust Relationships -- Creating Realm Trust Relationships -- Creating Shortcut Trust Relationships -- Managing Trust Relationships -- Validating Trust Relationships -- Authentication Scope -- SID Filtering -- Removing a Cross-forest Trust Relationship -- Review All the Key Topics -- Complete the Tables and Lists from Memory -- Definitions of Key Terms -- Chapter 11 Creating and Applying Group Policy Objects -- "Do I Know This Already?" …”
Libro electrónico -
178por Organisation for Economic Co-operation and Development.“…This report examines the nature, scope and volume of concessional finance directed to SIDS to build resilience to climate change and natural disasters. …”
Publicado 2016
Libro electrónico -
179Publicado 2017Tabla de Contenidos: “…MANAGING AN INTRUSION DETECTION SYSTEM IN A NETWORK SECURITY MONITORING FRAMEWORK -- Configuring the Intrusion Detection System -- Rules and Filters -- Managing Sensors -- Sensor Check -- External Detection -- Internal Detection -- Manual Changes to Rules -- /usr/bin/rule-update -- /etc/nsm/rules/downloaded.rules -- /etc/nsm/rules/local.rules -- /etc/nsm/pulledpork/disablesid.conf -- /etc/nsm/pulledpork/pulledpork.conf -- /var/log/nsm/sid_changes.log -- /etc/nsm/templates/snort/snort.conf -- /etc/nsm/HOSTNAME-INTERFACE/snort.conf -- /etc/nsm/rules/bpf.conf -- /etc/nsm/securityonion.conf -- /etc/nsm/pulledpork/enablesid.conf -- /etc/nsm/pulledpork/dropsid.conf -- /etc/nsm/pulledpork/modifysid.conf -- /etc/nsm/rules/threshold.conf -- Log Files -- After the Changes -- Useful File Manipulation Commands -- How to Add Rules -- How to Disable a Single Rule or Range Rules -- Edit the /etc/nsm/pulledpork/disablesid.conf File -- 9. …”
Libro electrónico -
180por Rash, MichaelTabla de Contenidos: “…-- psad Features -- psad Installation -- psad Administration -- Starting and Stopping psad -- Daemon Process Uniqueness -- iptables Policy Configuration -- syslog Configuration -- syslogd -- syslog-ng -- whois Client -- psad Configuration -- /etc/psad/psad.conf -- EMAIL_ADDRESSES -- DANGER_LEVEL{n} -- HOME_NET -- EXTERNAL_NET -- SYSLOG_DAEMON -- CHECK_INTERVAL -- SCAN_TIMEOUT -- ENABLE_PERSISTENCE -- PORT_RANGE_SCAN_THRESHOLD -- EMAIL_ALERT_DANGER_LEVEL -- MIN_DANGER_LEVEL -- SHOW_ALL_SIGNATURES -- ALERT_ALL -- SNORT_SID_STR -- ENABLE_AUTO_IDS -- IMPORT_OLD_SCANS -- ENABLE_DSHIELD_ALERTS -- IGNORE_PORTS -- IGNORE_PROTOCOLS -- IGNORE_LOG_PREFIXES -- EMAIL_LIMIT -- ALERTING_METHODS -- FW_MSG_SEARCH -- /etc/psad/auto_dl -- /etc/psad/signatures -- /etc/psad/snort_rule_dl -- /etc/psad/ip_options -- /etc/psad/pf.os -- Concluding Thoughts -- 6. …”
Publicado 2007
Libro electrónico