Mostrando 161 - 180 Resultados de 190 Para Buscar '"Sid ', tiempo de consulta: 0.10s Limitar resultados
  1. 161
  2. 162
    Publicado 2021
    Tabla de Contenidos: “…Abd al-Malik (1782-1783) -- 6.2.1.4 Hach Ben Mohamet (1782-1783) -- 6.2.1.5 Sid Amar Ben Ayà (1783) -- 6.2.1.6 Muhammad b. al-Hadi al-Hafi (1784-1789) -- 6.2.1.7 Allal al-Awdi and Qaddur al-Awdi (1784) -- 6.2.1.8 Muhammad b. …”
    Libro electrónico
  3. 163
    Publicado 2006
    Tabla de Contenidos: “…Kahn : Indian Institute of Management, Ahmedabad ; Paul Rudolph : University of Massachusetts Dartmouth, North Dartmouth, Massachusetts ; Arthur Erickson, Geoffrey Massey : Simon Fraser University, Burnaby, British Columbia ; John Andrews : Scarborough Campus, University of Toronto, Toronto, Ontario ; Kevin Roche, John Dinkeloo : Fine Arts Center, University of Massachusetts Amherst, Amherst, Massachusetts ; Paul Rudolph : Sid W. Richardson Physical Sciences Building, Texas Christian University, Fort Worth, Texas ; Arthur Erickson : University of Lethbridge, Alberta ; John Andrews, Anderson, Baldwin : George Gund Hall, Harvard University, Boston, Massachusetts ; Henning Larsen : University of Trondheim, Trondheim ; Craig Ellwood : Hillside Campus, Art Center College of Design, Pasadena, California ; Ralph Erskine : Frescati Campus, Stockholm University, Stockholm ; James Stirling, Michael Wilford : Rice School of Architecture, Rice University, Houston, Texas ; Frank O. …”
    Libro
  4. 164
    Publicado 1998
    Tabla de Contenidos: “…. -- 1924. -- Intèrprets: Sid Smiths, Cliff Bowes. Chasing choo choos / director Harry Set. -- (22 min). -- 1927. -- Intèrprets: Monty Banks, Virginia Craig. …”
    Libro
  5. 165
    991005024249706719
  6. 166
    Publicado 2023
    Tabla de Contenidos: “…-- Using the Browser Task Manager -- Advanced Management of Windows Processes and Services -- Managing and Troubleshooting Services -- Managing and Troubleshooting Processes and Services with PowerShell -- Troubleshooting Processes and Services with Microsoft Sysinternals -- PsTools -- PsExec -- PsFile -- PsGetSid -- PsInfo -- PsPing -- PsKill -- PsList -- PsLoggedOn -- PsLogList -- PsPasswd -- PsService -- PsShutdown -- PsSuspend -- AutoRuns -- Handle -- ListDLLs -- Portmon -- ProcDump -- Process Explorer -- Process Monitor -- ShellRunas -- VMMap -- Summary -- Chapter 14: Network and Internet Troubleshooting -- Prevention Is Better Than Cure -- Configuring Network Settings -- Wi-Fi Settings -- Managing Data Usage for Cellular and Other Networks -- Managing Advanced Network Settings -- Resetting the Network Adapters…”
    Libro electrónico
  7. 167
    por Viega, John
    Publicado 2003
    Tabla de Contenidos: “…Modifying a process&s primary token; 1.2.3.3. Working with SID_AND_ATTRIBUTES structures; 1.2.3.4. Working with LUID_AND_ATTRIBUTES structures; 1.2.4. …”
    Libro electrónico
  8. 168
    por Burleson, Donald K.
    Publicado 2001
    Tabla de Contenidos: “…Ensure That Only the Oracle User Can Run a Script; 1.4.8. Validate an Oracle SID Passed to a Unix Script; 1.4.9. Loop Between Unix Servers; 1.4.10. …”
    Libro electrónico
  9. 169
    Publicado 2025
    Tabla de Contenidos: “…MANAGING AN INTRUSION DETECTION SYSTEM IN A NETWORK SECURITY MONITORING FRAMEWORK -- Configuring the Intrusion Detection System -- Rules and Filters -- Managing Sensors -- Sensor Check -- External Detection -- Internal Detection -- Manual Changes to Rules -- /usr/bin/rule-update -- /etc/nsm/rules/downloaded.rules -- /etc/nsm/rules/local.rules -- /etc/nsm/pulledpork/disablesid.conf -- /etc/nsm/pulledpork/pulledpork.conf -- /var/log/nsm/sid_changes.log -- /etc/nsm/templates/snort/snort.conf -- /etc/nsm/HOSTNAME-INTERFACE/snort.conf -- /etc/nsm/rules/bpf.conf -- /etc/nsm/securityonion.conf -- /etc/nsm/pulledpork/enablesid.conf -- /etc/nsm/pulledpork/dropsid.conf -- /etc/nsm/pulledpork/modifysid.conf -- /etc/nsm/rules/threshold.conf -- Log Files -- After the Changes -- Useful File Manipulation Commands -- How to Add Rules -- How to Disable a Single Rule or Range Rules -- Edit the /etc/nsm/pulledpork/disablesid.conf File -- 9. …”
    Libro electrónico
  10. 170
    Publicado 2005
    Tabla de Contenidos: “…CVII de Jerónimo / Josefa Cantó Llorca pags. 63-74 ; Valentiniano I y Amiano Marcelino / Gregorio Carrasco Serrano pags. 75-86 ; Amiano entre historia y sátira (Res gestae XIV 6) / Carmen Castillo pags. 87-94 ; Pompa... Veneris (Sid. Ap. Cartas IV 20) / María Concepción Fernández López pags. 95-104 ; Palabras menores: la reproducción de las palabras del emperador en la sección privada del discurso de "gratiarum actio" consular / María Isabel Gómez Santamaría pags. 105-114 ; Mantuanus vates excelsus. …”
    Libro
  11. 171
    Publicado 2016
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: The Anatomy of Games -- Not just pixels and programming -- Finding your preferred type -- Playing to learn -- Minecraft -- Kerbal Space Program -- Sid Meier's Civilization -- Stop kidding around, be serious! …”
    Libro electrónico
  12. 172
    Publicado 2018
    Tabla de Contenidos: “…Connecting to SQL instances - the SqlInstance parameter -- Running manual queries -- PowerShell to SQL -- Navigating the module -- Backup, restore, and test -- Deploying maintenance insight tools -- Migrations made easy -- Working with the Reporting Services module -- Connecting to the Reporting Services server -- Administrating the service -- Managing the data in the service -- Working with content -- Navigating the structure -- Exporting content -- Importing content -- Configuring SSRS servers -- Working with the dbachecks module -- Configuration -- Feel the power -- Summary -- Questions -- Chapter 17: PowerShell Deep Dives -- Creating XAML GUIs with PSGUI -- Scalable DSC configuration -- The problem -- The setup -- Configuration data -- Configurations -- Build -- ConvertFrom-String -- LINQ -- OpenFileDialog -- Username to Security Identifier (SID) -- SHiPS -- PSDefaultParameterValues and PSBoundParameters -- PSDefaultParameterValues -- PSBoundParameters -- ConvertTo-Breakpoint -- Summary -- Questions -- Further reading -- Appendix A: PowerShell ISE Hotkeys -- Keyboard shortcuts for editing text -- Keyboard shortcuts for running scripts -- Keyboard shortcuts for customizing the view -- Keyboard shortcuts for debugging scripts -- Keyboard shortcuts for Windows PowerShell tabs -- Keyboard shortcuts for starting and exiting -- References -- VSCode Hotkeys -- Default keyboard shortcuts -- Basic editing -- Rich languages editing -- Navigation -- Editor/Window management -- File management -- Display -- Search -- Preferences -- Debug -- Tasks -- Extensions -- References -- Assessments -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  13. 173
    Publicado 2023
    Tabla de Contenidos: “…-- Running PowerShell without powershell.exe -- Using "living off the land" binaries to call assembly functions -- Binary executables -- Executing PowerShell from .NET Framework using C# -- Summary -- Further reading -- Chapter 6: Active Directory - Attacks and Mitigation -- Technical requirements -- Introduction to Active Directory from a security point of view -- How attacks work in a corporate environment -- ADSI, ADSI accelerators, LDAP, and the System.DirectoryServices namespace -- Enumeration -- Enumerating user accounts -- Enumerating GPOs -- Enumerating groups -- Privileged accounts and groups -- Built-in privileged groups in AD -- Password spraying -- Mitigation -- Access rights -- What is a SID? -- Access control lists -- OU ACLs -- GPO ACLs -- Domain ACLs -- Domain trusts -- Credential theft -- Authentication protocols -- Attacking AD authentication - credential theft and lateral movement -- Mitigation -- Microsoft baselines and the security compliance toolkit -- Summary -- Further reading -- Chapter 7: Hacking the Cloud - Exploiting Azure Active Directory/Entra ID -- Technical requirements -- Differentiating between AD and AAD -- Authentication in AAD -- Device identity - connecting devices to AAD -- Hybrid identity -- Protocols and concepts -- Privileged accounts and roles -- Accessing AAD using PowerShell -- The Azure CLI -- Azure PowerShell -- Attacking AAD -- Anonymous enumeration -- Password spraying -- Authenticated enumeration -- Credential theft -- Token theft -- Consent grant attack - persistence through app permissions -- Abusing AAD SSO -- Exploiting Pass-through Authentication (PTA) -- Mitigations -- Summary -- Further reading -- Chapter 8: Red Team Tasks and Cookbook -- Technical requirements -- Phases of an attack -- Common PowerShell red team tools -- PowerSploit -- Invoke-Mimikatz…”
    Libro electrónico
  14. 174
    por Martínez Sánchez, Rubén
    Publicado 2014
    Tabla de Contenidos: “…3.1.2 ESCANEADORES DE VULNERABILIDADES -- 3.1.3 EXPLOTANDO LA VULNERABILIDAD -- 3.1.4 UTILIZACIÓN DE SHELL COMO PAYLOAD -- 3.2 METASPLOIT FRAMEWORK -- 3.2.1 CONFIGURANDO UN EXPLOIT -- 3.3.2 DESCARGA DE HERRAMIENTAS MEDIANTE UN SCRIPT -- 3.3.3 TRANSFIRIENDO ARCHIVOS CON METERPRETER3.3.3 TRANSFIRIENDO ARCHIVOS CON METERPRETER -- 3.4 VALIDACIÓN TRANSPARENTE EN LOS SISTEMAS -- 3.4.1 VALIDACIÓN MEDIANTE FUERZA BRUTA -- 3.4.2 ROBANDO LAS CONTRASEÑAS CON UN KEYLOGGER -- 3.5 CONCLUSIONES -- 4 HACKING EN SISTEMAS WINDOWS -- 4.1 PENETRANDO EN SISTEMAS MICROSOFT -- 4.2 RECONOCIMIENTO DEL OBJETIVO -- 4.2.1 USO DE COMANDOS NET -- 4.2.1.1 NULL SESSION (SESIÓN NULA) -- 4.2.1.2 NET VIEW -- 4.2.1.3 NET ACCOUNTS -- 4.2.1.4 NET GROUP -- 4.2.1.5 NET LOCALGROUP -- 4.2.1.6 NET START -- 4.2.2 ASEGURAMIENTO CONTRA SESIONES NULAS -- 4.2.3 ENUMERACIÓN A TRAVÉS DE LA TABLA NETBIOS -- 4.2.4 ENUMERACIÓN USANDO EL PROTOCOLO SNMP -- 4.2.5 ENUMERANDO EL REGISTRO DE WINDOWS 4.2.5 ENUMERANDO EL REGISTRO DE WINDOWS -- 4.2.6 USO DE PROGRAMAS PARA ENUMERAR4.2.6 USO DE PROGRAMAS PARA ENUMERAR -- 4.2.6.1 USER2SID -- 4.2.6.2 SID2USER -- 4.2.6.3 CAIN &amp -- ABEL -- 4.2.6.4 NBTDUMP -- 4.2.6.5 USERDUMP -- 4.2.6.6 USERINFO -- 4.2.6.7 IP NETWORK BROWSER -- 4.2.6.8 ENUM -- 4.2.6.9 DUMPACL/DUMPSEC -- 4.2.6.10 FOCA -- 4.3 ESCANEO DEL OBJETIVO -- 4.4 CONSOLIDANDO EL ACCESO AL SISTEMA -- 4.2.1 USO DE COMANDOS NET -- 4.2.2 ASEGURAMIENTO CONTRA SESIONES NULAS4.2.2 ASEGURAMIENTO CONTRA SESIONES NULAS -- 4.4.2.1 EL SISTEMA SYSKEY -- 4.2.3 ENUMERACIÓN A TRAVÉS DE LA TABLA NETBIOSv -- 4.4.3.1 EXTRAER EL SAM CON DISCOS DE ARRANQUE -- 4.4.3.2 EXTRAER EL SAM CON PWDUMP -- 4.4.3.3 EXTRAER EL SAM UTILIZANDO CAIN &amp -- ABEL -- 4.4.3.4 EXTRAER EL SAM DEL DIRECTORIO REPAIR -- 4.2.4 ENUMERACIÓN USANDO EL PROTOCOLO SNMP4.2.4 ENUMERACIÓN USANDO EL PROTOCOLO SNMP -- 4.2.5 ENUMERANDO EL REGISTRO DE WINDOWS…”
    Libro electrónico
  15. 175
    Publicado 2017
    Tabla de Contenidos: “…Notes on resultatives and pseudo-resultatives -- 4.1 (Pseudo-)resultatives in SIDs -- 4.2 The agreement of (pseudo-)resultatives -- 5. …”
    Libro electrónico
  16. 176
    “…Small Island Developing States (SIDS) stand at a critical juncture on their paths to sustainable development. …”
    Libro electrónico
  17. 177
    Publicado 2011
    Tabla de Contenidos: “…Quiz -- Types of Trust Relationships -- Transitive Trusts -- Forest Trusts -- External Trusts and Realm Trusts -- Shortcut Trusts -- Creating and Configuring Trust Relationships -- Creating a Forest Trust Relationship -- Creating External Trust Relationships -- Creating Realm Trust Relationships -- Creating Shortcut Trust Relationships -- Managing Trust Relationships -- Validating Trust Relationships -- Authentication Scope -- SID Filtering -- Removing a Cross-forest Trust Relationship -- Review All the Key Topics -- Complete the Tables and Lists from Memory -- Definitions of Key Terms -- Chapter 11 Creating and Applying Group Policy Objects -- "Do I Know This Already?" …”
    Libro electrónico
  18. 178
    “…This report examines the nature, scope and volume of concessional finance directed to SIDS to build resilience to climate change and natural disasters. …”
    Libro electrónico
  19. 179
    Publicado 2017
    Tabla de Contenidos: “…MANAGING AN INTRUSION DETECTION SYSTEM IN A NETWORK SECURITY MONITORING FRAMEWORK -- Configuring the Intrusion Detection System -- Rules and Filters -- Managing Sensors -- Sensor Check -- External Detection -- Internal Detection -- Manual Changes to Rules -- /usr/bin/rule-update -- /etc/nsm/rules/downloaded.rules -- /etc/nsm/rules/local.rules -- /etc/nsm/pulledpork/disablesid.conf -- /etc/nsm/pulledpork/pulledpork.conf -- /var/log/nsm/sid_changes.log -- /etc/nsm/templates/snort/snort.conf -- /etc/nsm/HOSTNAME-INTERFACE/snort.conf -- /etc/nsm/rules/bpf.conf -- /etc/nsm/securityonion.conf -- /etc/nsm/pulledpork/enablesid.conf -- /etc/nsm/pulledpork/dropsid.conf -- /etc/nsm/pulledpork/modifysid.conf -- /etc/nsm/rules/threshold.conf -- Log Files -- After the Changes -- Useful File Manipulation Commands -- How to Add Rules -- How to Disable a Single Rule or Range Rules -- Edit the /etc/nsm/pulledpork/disablesid.conf File -- 9. …”
    Libro electrónico
  20. 180
    por Rash, Michael
    Publicado 2007
    Tabla de Contenidos: “…-- psad Features -- psad Installation -- psad Administration -- Starting and Stopping psad -- Daemon Process Uniqueness -- iptables Policy Configuration -- syslog Configuration -- syslogd -- syslog-ng -- whois Client -- psad Configuration -- /etc/psad/psad.conf -- EMAIL_ADDRESSES -- DANGER_LEVEL{n} -- HOME_NET -- EXTERNAL_NET -- SYSLOG_DAEMON -- CHECK_INTERVAL -- SCAN_TIMEOUT -- ENABLE_PERSISTENCE -- PORT_RANGE_SCAN_THRESHOLD -- EMAIL_ALERT_DANGER_LEVEL -- MIN_DANGER_LEVEL -- SHOW_ALL_SIGNATURES -- ALERT_ALL -- SNORT_SID_STR -- ENABLE_AUTO_IDS -- IMPORT_OLD_SCANS -- ENABLE_DSHIELD_ALERTS -- IGNORE_PORTS -- IGNORE_PROTOCOLS -- IGNORE_LOG_PREFIXES -- EMAIL_LIMIT -- ALERTING_METHODS -- FW_MSG_SEARCH -- /etc/psad/auto_dl -- /etc/psad/signatures -- /etc/psad/snort_rule_dl -- /etc/psad/ip_options -- /etc/psad/pf.os -- Concluding Thoughts -- 6. …”
    Libro electrónico