Mostrando 61 - 80 Resultados de 123 Para Buscar '"The Black Hole"', tiempo de consulta: 0.11s Limitar resultados
  1. 61
    por Deal, Richard A.
    Publicado 2005
    “…Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. …”
    Libro electrónico
  2. 62
    Publicado 2014
    Tabla de Contenidos: “…Size Matters: Quantify Your ImpactPart-Time Jobs and Internships; Extracurriculars; Volunteering; Start Something; Questions and Answers; Well, There Go the College Hires; Will Code for Food; The Un-manager; Chapter 3: Getting in the Door; The Black Hole: Online Job Submission; Making the Best of the Black Hole; Getting a Personal Referral; The Informational Interview; Reach Out to Recruiters; Alumni Network and Beyond; Career Fairs; Professional Recruiters; When Things Get Ugly: What to Watch Out For; Additional Avenues; Start Elsewhere; Contract Roles; Get Creative; Official Groups…”
    Libro electrónico
  3. 63
    Publicado 2014
    Tabla de Contenidos: “…The Voice of the Rising Generation: Family Wealth and Wisdom; Contents; Preface; Acknowledgments; Introduction; A Well-Known Family; The Challenge; The Journey; Our Approach; Aids to Navigation; Chapter 1: Setting Sail; The Black Hole; Talking about Silence; The Very Good Steward; The Meteor; Froggy; The Parallel Universe; The Anxious Heir; Mr. …”
    Libro electrónico
  4. 64
    Publicado 2004
    “…The book concludes with a discussion of black hole solutions of the supergravity theory that approximates string theory at low energies and the insight that string theory affords into the microscopic origin of the Bekenstein-Hawking entropy.Cosmology in Gauge Field Theory and String Theory provides a modern introduction to these important problems from a particle physicist's perspective. …”
    Libro electrónico
  5. 65
    Publicado 2018
    Tabla de Contenidos: “…MPLS VPN -- VPN Design -- IKE V1 versus IKE V2 -- WAN Encryption technique -- IPsec Layer-3 encryption -- MACsec-Layer-2 Encryption -- Optical Network-Layer-1 Encryption -- Summary -- Questions -- Further Reading -- Chapter 12: Summary and Scope of Security Technologies -- DDoS protection -- Remotely triggered black hole routing (RTBH) -- Black hole traffic from the source of the attack -- Black hole traffic to the destination of the attack -- BGP FlowSpec -- DDoS scrubbing -- Blockchain Technology for Fighting DDoS Attacks -- AI in cyber security -- Next Gen SIEM -- Software Defined Networking Firewall -- Bring-Your-Own-Identity (BYOI) -- Summary -- Further reading -- Assessment -- Other Books you may enjoy -- Index…”
    Libro electrónico
  6. 66
    Publicado 2014
    Tabla de Contenidos: “…Front Cover; Contents; Preface; Contributors; Chapter 1: Taxonomy and Holistic Detection of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks; Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks; Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks; Chapter 5: Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks; Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network…”
    Libro electrónico
  7. 67
    por Doglio, Fernando. author
    Publicado 2018
    “…Pro REST API Development with Node.js shines light into that black hole of modules for the developers trying to create an API. …”
    Libro electrónico
  8. 68
    Publicado 2023
    Tabla de Contenidos: “…Adding a Collapsing Glowing Color -- Summary -- Chapter 6: Distortion Shaders -- Ice Texture Refraction -- Initial Setup -- Modify the Scene Color to Create Distortion -- Use an Ice Texture to Modify the Scene Color -- Customize the Shader with the Ice Texture and Color -- Black Hole Distortion -- Creation of the Center of the Black Hole -- Using Particle Systems for a Billboard Effect -- Creating a Spiral Texture Using the Twirl Node -- Modifying the Scene Color Using the Spiral Texture -- Masking the Spiral Texture -- Adding Dynamic Rotation to the Spiral Texture -- Summary -- Chapter 7: Advanced Shaders -- Cartoon Water Shader -- Initial Setup -- Accessing the Depth Buffer to Create Foam with the Scene Depth Node -- Scene Depth Node -- Implementing the Depth Information in the Shader -- Controlling the Depth Gradient with Divide Node -- Create Water Caustics -- Using the Voronoi Noise Node -- Using SubGraph to Reuse Groups of Nodes -- Add Radial Deformation Using Radial Shear -- Adding Movement to the Voronoi Cells -- Adding Extra Caustic Layers -- Adding Color to the Water Caustics Texture -- Deforming the Vertices of the Water Surface -- Iridescent Bubble Shader -- Initial Setup -- Create and Set Up Reflections -- Reflection Probes and Reflection Cubemaps -- Creating an Iridescent Dynamic Pattern -- Adding Thin-Film Interference Gradient -- Adding Rim Transparency and Color -- Adding Random Vertex Displacement -- Summary -- Chapter 8: Interactive Snow Effect -- Scene Setup -- Give Movement to the Character -- Set Up Your IDE -- Create a Character Movement Script -- Snow Plane 3D Object -- Subdivided Plane Creation -- Import the Plane to Unity -- Interactive Snow Shader Graph -- Shader Graph Setup -- Apply Displacement Using Noise -- Apply Snow Color and Occlusion -- Interact with the Snow -- Using a Render Texture -- Painting the Character Path…”
    Libro electrónico
  9. 69
    Publicado 2011
    Tabla de Contenidos: “…Phenomena Discovered from General RelativityBending of Light (Gravitational Lensing) Near a Large Mass (Such as the Sun); Anomalous Perihelion Precession of Mercury; Black Holes; Global Positioning System and Relativity; Epilogue; Index…”
    Libro electrónico
  10. 70
    por Fine, Ben
    Publicado 2010
    Tabla de Contenidos: “…The BBI Syndrome -- 4.1 Introduction -- 4.2 Social Capital as Black Hole -- 4.3 BBI Gender on the Dark Side -- 4.4 Social Capital in Context - Or Vice Versa -- 4.5 BBBI by Way of Concluding Remarks -- 5. …”
    Libro electrónico
  11. 71
    por Alberro, Heather
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Endorsements Page -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Editor Bios -- Contributor Bios -- Introduction: Entangled Futurities -- Part 1 Monsters and Monstrosity -- 1 "In the Woods the Tox is Still Wild": The EcoGothic in Rory Power's Wilder Girls -- 2 The Human/Un(human): Monster, Ecophobia, and the Posthuman Horror(scape) in Dibakar Banerjee's "Monster," Ghost Stories -- 3 A Scourge Even Worse Than Disease: Richard Matheson's I Am Legend as Pandemic Political Allegory -- Part 2 Intersectional Critique -- 4 Fungal Imaginaries: The Reconfiguration of Post-Pandemic Society in Severance and The Last of Us -- 5 Five Hundred Years of Plague: Indigenous Apocalypse in Joca Reiners Terron's Death and the Meteor -- 6 Corruption and Cleansing: An Eco-Feminist Approach to the Nature/Culture Dichotomy in Naomi Novik's Uprooted -- 7 Through Currents of Contamination: The Failure of Immunizing Insularity in Sophie Mackintosh's The Water Cure -- Part 3 More-Than-Human Mutual Aid and Eco-Justice -- 8 Dystopian Prohibitions and Utopian Possibilities in Edmonton, Canada, at the Onset of the COVID-19 Pandemic -- 9 Affiliation as Environmental Justice in Three Climate Novels -- 10 "A vortex of Summons and Repulsion": The Productive Abject, Posthumanisms, and the Weird in Charles Burns' Black Hole -- 11 (Un)Caring Borders: More-Than-Human Solidarities in the Bialowieza Forest -- Part 4 Creative Resistance and Utopian Glimmers -- 12 "Preservation is an Action, not a State": DIY Utopian Enclaves and Ways out of Post-Pandemic Surveillance Capitalism in Sarah Pinsker's A Song for a New Day -- 13 Pandemic Dramaturgy: Co-Designing the Performance Dying Together/Futures with COVID-19 -- 14 Vitality of Nonhuman Entities: Plagues and Pandemics as Hyperobjects in Defoe, Camus, and Pamuk…”
    Libro electrónico
  12. 72
    Publicado 2007
    Tabla de Contenidos: “…Physics -- Gravitational Wave Signals from Simulations of Black Hole Dynamics -- The SuperN-Project: Understanding Core Collapse Supernovae -- MHD Code Optimizations and Jets in Dense Gaseous Halos -- Anomalous Water Optical Absorption: Large-Scale First-Principles Simulations -- The Electronic Structures of Nanosystems: Calculating the Ground States of Sodium Nanoclusters and the Actuation of Carbon Nanotubes -- Object-Oriented SPH-Simulations with Surface Tension -- Simulations of Particle Suspensions at the Institute for Computational Physics -- Solid State Physics -- Nano-Systems in External Fields and Reduced Geometry: Numerical Investigations -- Signal Transport and Finite Bias Conductance in and Through Correlated Nanostructures -- Atomistic Simulations of Dislocation — Crack Interaction -- Monte Carlo Simulations of Strongly Correlated and Frustrated Quantum Systems -- Chemistry -- Characterization of Catalyst Surfaces by STM Image Calculations -- Theoretical Investigation of the Self-Diffusion on Au(100) -- TrpAQP: Computer Simulations to Determine the Selectivity of Aquaporins -- Computational Fluid Dynamics -- Direct Numerical Simulation and Analysis of the Flow Field Around a Swept Laminar Separation Bubble -- Direct Numerical Simulation of Primary Breakup Phenomena in Liquid Sheets -- Direct Numerical Simulation of Mixing and Chemical Reactions in a Round Jet into a Crossflow — a Benchmark -- Numerical Simulation of the Bursting of a Laminar Separation Bubble -- Parallel Large Eddy Simulation with UG -- LES and DNS of Melt Flow and Heat Transfer in Czochralski Crystal Growth -- Efficient Implementation of Nonlinear Deconvolution Methods for Implicit Large-Eddy Simulation -- Large-Eddy Simulation of Tundish Flow -- Large Eddy Simulation of Open-Channel Flow Over Spheres -- Prediction of the Resonance Characteristics of Combustion Chambers on the Basis of Large-Eddy Simulation -- Investigations of Flow and Species Transport in Packed Beds by Lattice Boltzmann Simulations -- Rheological Properties of Binary and Ternary Amphiphilic Fluid Mixtures -- The Effects of Vortex Generator Arrays on Heat Transfer and Flow Field -- Investigation of the Influence of the Inlet Geometry on the Flow in a Swirl Burner -- Numerical Investigation and Simulation of Transition Effects in Hypersonic Intake Flows -- Aeroelastic Simulations of Isolated Rotors Using Weak Fluid-Structure Coupling -- Computational Study of the Aeroelastic Equilibrium Configuration of a Swept Wind Tunnel Wing Model in Subsonic Flow -- Structural Mechanics -- Numerical Prediction of the Residual Stress State after Shot Peening -- Computer-Aided Destruction of Complex Structures by Blasting -- Wave Propagation in Automotive Structures Induced by Impact Events -- Miscellaneous Topics -- Continental Growth and Thermal Convection in the Earth’s Mantle -- Efficient Satellite Based Geopotential Recovery -- Molecular Modeling of Hydrogen Bonding Fluids: Monomethylamine, Dimethylamine, and Water Revised -- The Application of a Black-Box Solver with Error Estimate to Different Systems of PDEs -- Scalable Parallel Suffix Array Construction…”
    Libro electrónico
  13. 73
    Publicado 2013
    Tabla de Contenidos: “…SOCIO-ENVIRONMENTAL APPROACHES POINT OUT NEW WAYS TOWARD LOCAL HARM REDUCTION 203 8.1 A "BLACK HOLE" IN EUROPE? THE SOCIAL AND DISCURSIVE REALITY OF CRIME IN BOSNIA-HERZEGOVINA AND THE INTERNATIONAL COMMUNITY'S TACIT COMPLICITY 211 8.2 TRAFFICKING IN ORGANS, TISSUES, AND CELLS IS SOMETIMES PART OF HUMAN TRAFFICKING 233 9.1 ORGANIZED CRIME AND CORRUPTION - NATIONAL AND EUROPEAN PERSPECTIVES 239 10.1 CIVIL SOCIETY'S ROLE IN THE FIGHT AGAINST THE 'NDRANGHETA 267 10.2 AN ALTERNATIVE METHOD TO COMBAT THE MAFIA: CONFISCATION OF CRIMINAL ASSETS 277 11.1 THE MAFIA AND ORGANIZED CRIME IN GERMANY 285 IV. …”
    Libro electrónico
  14. 74
    Tabla de Contenidos: “…-- 13 Loop quantum gravity and exploding black holes -- Quatrième partie Une nouvelle révolution scientifique à l'horizon ? …”
    Libro electrónico
  15. 75
    Publicado 2011
    “…The enormous losses of territory and population in Austria’s post-Habsburg state of existence, however, did not result in a political, economic, cultural, and intellectual black hole. The essays in the twentieth anniversary volume of Contemporary Austrian Studies argue that the small Austrian nation found its place in the global arena of the twentieth century and made a mark both on Europe and the world. …”
    Libro electrónico
  16. 76
    Publicado 2010
    “…The enormous losses of territory and population in Austria’s post-Habsburg state of existence, however, did not result in a political, economic, cultural, and intellectual black hole. The essays in the twentieth anniversary volume of Contemporary Austrian Studies argue that the small Austrian nation found its place in the global arena of the twentieth century and made a mark both on Europe and the world. …”
    Libro electrónico
  17. 77
    por Holtsnider, Bill, 1956-
    Publicado 2010
    Tabla de Contenidos: “…Why Other Agile Methodologies Often FailWhy Waterfall Processes Often Fail; High Visibility; Death March; Man in a Room; The Rogue Developer; ""Are you Done Yet?""; Budget Black Hole; Why the Six Week Solution is Different; Chapter 3: Expectations: What It Meansfor Software to Succeed; Introduction; Software Development Sometimes (Accidentally) Succeeds; Is Aligned With Business Needs; Manages the Cost of Change; Is Built in an Automated Way; Factors Quality Into the Core of the Process; Is Not Constantly Being Redeployed; Progress is Constantly Being Made; Delivers Something of Value…”
    Libro electrónico
  18. 78
    Publicado 2010
    Tabla de Contenidos: “…Cover; Automated Lighting; Title Page; Copyright Page; Table of Contents; Foreword; SECTION 1: Introduction to Automated Lighting; Chapter 1 Automated Lighting in the Third Millennium; Chapter 2 The Foundation of the Automated Lighting Industry; The Genesis of the Automated Lighting Industry; Synchronicity; "If We Can Make It Change Color ..."; The Black Hole; For Sale: Automated Lighting; Sue Me, Sue You Blues; The Future of Automated Lighting; Chapter 3 Automated Lighting Systems; Systems Overview; Rigging Systems; Aluminum Structures; Theatrical Rigging; Rigging Hardware…”
    Libro electrónico
  19. 79
    Publicado 2011
    Tabla de Contenidos:
    Libro electrónico
  20. 80
    Publicado 2015
    Tabla de Contenidos: “…Yes, the Media Are Still Important Press Releases and the Journalistic Black Hole; The Old Rules of PR; Learn to Ignore the Old Rules; Chapter 2: The New Rules of Marketing and PR; The Most Important Communication Revolution in Human History; Open for Business; The Long Tail of Marketing; Tell Me Something I Don't Know, Please; Bricks-and-Mortar News; The Long Tail of PR; The New Rules of Marketing and PR; The Convergence of Marketing and PR on the Web; Chapter 3: Reaching Your Buyers Directly; The Right Marketing in a Wired World; Let the World Know about Your Expertise…”
    Libro electrónico