Mostrando 1,681 - 1,700 Resultados de 2,147 Para Buscar '"The Grid"', tiempo de consulta: 0.13s Limitar resultados
  1. 1681
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Contents -- Introduction -- 1 Getting Started with Flash CS5 -- Preparing to Install Flash -- Installing Flash -- Starting Flash -- Viewing the Flash Window -- Creating a Project Plan -- Building a Flash Project -- Creating a New Document -- Creating a New Document from a Template -- Opening an Existing Document -- Changing Document Properties -- Working with Document Windows -- Saving a Document -- Saving a Document in Different Formats -- Getting Help While You Work -- Getting Online Updates and Support -- Finishing Up -- 2 Working Within the Flash Environment -- Examining the Flash Window -- Using the Timeline -- Working with Layers -- Viewing Layers -- Organizing Layers -- Changing Layer Properties -- Using Guide Layers -- Working with Frames -- Working with Scenes -- Using the Edit Bar -- Using the Main Toolbar -- Resizing Panels -- Using the Tools Panel -- Working with Panels -- Docking and Undocking Panels -- Grouping and Ungrouping Panels -- Creating a Workspace -- Creating Keyboard Shortcuts -- Setting General Preferences -- Setting Text Preferences -- Setting Clipboard Preferences -- Setting Warning Preferences -- Working with Page Setup in Macintosh -- Working with Page Setup in Windows -- Printing a Document in Macintosh -- Printing a Document in Windows -- 3 Creating Graphics -- Working with Object Drawing -- Drawing with the Line Tool -- Drawing with the Pencil Tool -- Drawing Shapes with the Rectangle and Oval Tools -- Using the Polystar Tool -- Understanding Selections -- Selecting Strokes with the Selection Tool -- Selecting Strokes and Fills with the Selection Tool -- Making Selections with the Lasso Tool -- Zooming In and Out with the Magnifying Glass -- Moving Around with the Hand Tool -- Displaying Rulers -- Using Grids and Guides -- Modifying Grid and Guide Settings -- Using Snap Align…”
    Libro electrónico
  2. 1682
    Publicado 2023
    Tabla de Contenidos: “…-- Summary -- Chapter 12: Superhero Landing - Setting Up Flexible Navigation Options -- Technical requirements -- Using system variables -- Adding data configuration files -- Where data is stored for test use -- Organizing test data -- Setting up TypeScript configuration -- Reading data from files -- Using test data in tests -- Beyond masking - making confidential data invisible -- Spec and Allure - cub reporter versus star journalist -- Configuring Allure reporting -- Adding custom comments to the Allure report -- Webhooks and screen captures -- Summary -- Chapter 13: The Multiverses - Cross-Browser Testing and Cross-Environment Testing -- Horizontal scaling - cross-browser testing -- Using built-in functionality via the wdio config file -- Extending the wdio config file so that it supports multiple browsers -- Handling browser-specific issues -- Test responsiveness -- Using LambdaTest online to automate the browser testing grid -- Live interactive testing -- Automated screenshot testing -- Using Selenium Standalone server to locally build the testing grid -- Cross-environment testing with a shared configuration file -- Avoiding the rabbit hole of horizontal scaling…”
    Libro electrónico
  3. 1683
    Publicado 2021
    Tabla de Contenidos: “…Introducing the WCT -- Origins of the WCT -- Reviewing recent toolkit releases -- Exploring the Windows Community Toolkit Sample App -- Installing and launching the sample app -- Controls -- WPF and WinForms controls -- Using controls from the toolkit -- Creating the WinUI in Desktop project -- Referencing the WCT packages -- Adding data to the DataGrid -- Adding controls to the MainWindow -- Exploring the toolkit's helpers, services, and extensions -- Helpers -- Services -- MVVM -- Extensions -- Summary -- Questions -- Chapter 10: Modernizing Existing Win32 Applications with XAML Islands -- Technical requirements -- What is XAML Islands? …”
    Libro electrónico
  4. 1684
    Publicado 2021
    Tabla de Contenidos: “…Part 6 Molding Teams to Fit Your Unique Organization -- Chapter 15 Using Teams in Small and Medium-Sized Organizations -- Focusing on the Internet -- Understanding How Teams Fits Your Organization -- Keeping it simple (1 or 2 people) -- Taking your organization to the next level (2 to 25 people) -- Growing large (25 to 250 people) -- Chapter 16 Unleashing Features Designed for Large Enterprises -- Managing Large Numbers of Teams -- Archiving a team -- Deleting a team -- Bringing in the Network Engineers -- Dividing and Conquering with Fine-Tuned Admin Roles -- Creating a Policy to Retain or Delete Content -- Exploring Enterprise Voice Features -- Reporting and Analytics -- Upgrading from Skype for Business to Teams -- Getting Help from the Experts -- Chapter 17 Learning How Teams Embraces Industry-Specific Needs -- Getting the Most from Teams for Education -- Creating a team from a class list -- Using Insights to assess student engagement -- Using FlipGrid -- Using Teams in Government Agencies -- Leveraging Teams for Consulting and Service-Based Companies -- Empowering Healthcare Providers -- Modernizing Retail Stores -- Tapping into Teams for Firstline Workers -- Part 7 The Part of Tens -- Chapter 18 Ten Tips for Better Teams Meetings -- Chatting During a Meeting -- Capturing a Meeting with a Recording -- Keeping Noise Under Control with Mute -- Blurring Your Background -- Taking Notes -- Using a Whiteboard -- Sharing Your Screen -- Taking Control of Someone Else's Screen -- Organizing Teams to Fit Your Meeting Needs -- Using Teams While a Meeting Is in Progress -- Chapter 19 Ten Teams Apps Worth Discovering -- Microsoft Office -- Task Management -- Design -- Customer Service -- Development -- Education -- Social Media -- Survey -- Marketing -- Miscellaneous -- Chapter 20 Ten Ways to Learn More About Teams -- Get Information Directly from Microsoft…”
    Libro electrónico
  5. 1685
    Publicado 2019
    Tabla de Contenidos: “…5.3.1 Clip Slots/Session Grid5.3.2 Launching Clips; 5.3.3 Basic Editing; 5.4 Tracks versus Scenes; 5.4.1 Launching Scenes; 5.4.2 Select on Launch; 5.5 Track Status Display; 5.6.1 Audio Clips; 5.6.2 MIDI Clips; 5.6.3 Crossfader Section; 5.7 Sessions into Arrangements; 5.7.1 Capturing a Session Performance; 5.7.2 Playing Back a Performance; 5.8 Musical Concepts; 5.8.1 Produce: Submixing with Return Tracks; Scene 6 Arrangement View Concepts; 6.1 Musical Timeline; 6.2 Layout; 6.3 Navigating; 6.3.1 Scroll and Zoom; 6.3.2 Transport; 6.3.3 Locators; 6.4 Working in the Arrangement View…”
    Libro electrónico
  6. 1686
    Publicado 2015
    Tabla de Contenidos: “…-- Data Storage and Analysis -- Querying All Your Data -- Beyond Batch -- Comparison with Other Systems -- Relational Database Management Systems -- Grid Computing -- Volunteer Computing -- A Brief History of Apache Hadoop -- What's in This Book? …”
    Libro electrónico
  7. 1687
    Publicado 2023
    Tabla de Contenidos: “…Virtualization -- Serverless -- High-Performance Computing (HPC) and Grid Computing -- Peer-to-Peer -- Thin Clients -- Diskless Workstations -- Thin Client Applications -- Embedded Systems and The Internet of Things (IoT) -- Distributed Systems and Edge Computing Systems -- Industrial Control Systems (ICS) -- System Vulnerabilities, Threats, and Countermeasures -- Emanations -- Covert Channels -- Covert Storage Channels -- Covert Timing Channels -- Backdoors -- Malicious Code (Malware) -- Computer Viruses -- Worms -- Trojans -- Rootkits -- Packers -- Logic Bombs -- Antivirus Software -- Server-Side Attacks -- Client-Side Attacks -- Web Architecture and Attacks -- Applets -- Java -- ActiveX -- OWASP -- XML -- Service Oriented Architecture (SOA) -- Database Security -- Polyinstantiation -- Inference and Aggregation -- Inference and Aggregation Controls -- Data Mining -- Data Analytics -- Countermeasures -- Mobile Device Attacks -- Mobile Device Defenses -- Cornerstone Cryptographic Concepts -- Key Terms -- Confidentiality, Integrity, Authentication, and Non-repudiation -- Confusion, Diffusion, Substitution, and Permutation -- Cryptographic Strength -- Monoalphabetic and Polyalphabetic Ciphers -- Modular Math -- Exclusive Or (XOR) -- Data at Rest and Data in Motion -- Protocol Governance -- Types of Cryptography -- Symmetric Encryption -- Stream and Block Ciphers -- Initialization Vectors and Chaining -- DES -- Modes of DES -- Electronic Code Book (ECB) -- Cipher Block Chaining (CBC) -- Cipher Feedback (CFB) -- Output Feedback (OFB) -- Counter Mode (CTR) -- Single DES -- Triple DES -- International Data Encryption Algorithm (IDEA) -- Advanced Encryption Standard (AES) -- Choosing AES…”
    Libro electrónico
  8. 1688
    Publicado 2023
    Tabla de Contenidos: “…Using the Camera -- Opening the Camera App -- Navigating the Camera Interface -- Settings -- Flash -- Top Shot -- Timer -- Ratio -- Save location/last image taken/sharing -- Image view finder/grid lines -- Zoom -- Camera selector -- Shutter -- Camera modes -- Night Sight -- Portrait -- Camera -- Video -- Panorama -- Photo Sphere -- Lens -- Holding Your Phone for the Best Shot -- Editing Your Images -- Crop -- Blur -- Brightness and contrast -- Warmth and tint -- Markup -- Snapseed -- Part 4 Personalizing Just the Way You Like It -- Chapter 18 Customizing Your Device -- Setting Custom Ring Tones and Notification Sounds -- Change your ringtone -- Assign different ringtones to different people -- Change text notification sounds -- Adding a Splash of Color -- Setting Wallpaper Images -- Changing the Font Size -- Chapter 19 Saying 'Hey' to Google -- Getting the Most from Your Smartphone with Google Assistant -- Setting Up Google Assistant -- Google Assistant settings -- Lock screen -- Tap to wake -- Personal results -- 'Hey, Google' and other magic commands -- Creating Google Assistant Routines -- Part 5 The Part of Tens -- Chapter 20 Ten Cool Tips and Tricks -- Send Someone Your Current Location -- Double-Tap to Wake Up -- Turn Your Smartphone into a Ruler -- Take a Screenshot -- Access App Context Menus -- Switch to One-Handed Mode -- Screencast -- Tap and Zoom -- Disable App Notifications -- Use the Two-Finger Swipe -- Chapter 21 Ten Settings to Enable -- Skip Lock Screen -- Wireless Emergency Alerts -- Battery Percentage -- Dial Pad (DTMF) Tones -- Screen Timeout -- Night Light -- Auto-Rotate Screen…”
    Libro electrónico
  9. 1689
    Publicado 2016
    Tabla de Contenidos: “…Routing -- Default Configuration and Route -- Creating a Navigational Structure -- Programmatic Redirection -- Programmatically Redirecting the Client to a Different Page -- Server-Side Redirects -- Practical Tips on Navigation -- Summary -- Chapter 9 Displaying and Updating Data -- Working with SQL Server Express -- Installation -- SQL Server Management Studio -- Connecting in Visual Studio -- Entity Framework Approach to Data Access -- Data First -- Code First -- Selecting Data from the Database -- Data Controls in Web Forms -- Details View -- Web Form GridView -- Data Display in MVC -- List Display in MVC -- Details Views -- Summary -- Chapter 10 Working with Data-Advanced Topics -- Sorting and Pagination -- Sorting and Pagination in Web Form Server Controls -- Sorting and Pagination in MVC Lists -- Updating and/or Inserting Data -- A Non-Code First Approach to Database Access -- Using SQL Queries and Stored Procedures -- Caching -- Different Ways to Cache Data in ASP.NET Applications -- Common Pitfalls with Caching Data -- Summary -- Chapter 11 User Controls and Partial Views -- Introduction to User Controls -- Creating User Controls -- Adding User Controls -- Sitewide Registration of a User Control -- Managing the IDs of Any Controls -- Adding Logic to Your User Controls -- Using Partial Views -- Adding a Partial View -- Managing the Controller for a Partial View -- Templates -- Summary -- Chapter 12 Validating User Input -- Gathering Data from the User -- Validating User Input in Web Forms -- Understanding Request Validation -- Validating User Input in MVC -- Model Attribution -- Client-Side Validation -- Request Validation in ASP.NET MVC -- Validation Tips -- Summary -- Chapter 13 ASP.NET AJAX -- Introducing the Concept of AJAX -- F12 Developer Tools -- Using ASP.NET AJAX in Web Forms -- The Initial AJAX Experience…”
    Libro electrónico
  10. 1690
    Publicado 2024
    Tabla de Contenidos: “…Part 2: Bringing Brands Front and Center -- 4 -- Building Brand Mock-Ups and Prototypes -- Technical requirements -- Applying branding to perspective -- Adding a logo to a bag in perspective -- Creating a mural mock-up -- Wrapping artwork around curved surfaces -- Applying a cylinder warp -- Warping artwork across book designs -- Replacing device screens with your own artwork -- Creating an iPad mock-up -- Creating a smartphone mock-up -- Adding screen reflections -- Creating clothing and soft furnishing mock-ups -- Applying original designs to a T-shirt -- Adding pattern designs to a cushion -- Summary -- 5 -- Creating Printed Marketing Collateral -- Technical requirements -- Creating new print projects -- Color -- Printers' marks -- Folds -- Setting up a Photoshop grid system -- Building a new A4 poster document -- Creating a new business card template -- Building a new z-fold brochure -- Importing artwork and formatting types -- Creating a business card design using only vector assets -- Synchronizing fonts from Creative Cloud -- Adding a type to the z-fold brochure -- Creating and applying paragraph styles -- Adding artwork to the brochure -- Exporting documents for professional print -- Exporting to Adobe PDF -- Export to the Tag Image File Format -- Saving as a JPG -- Summary -- 6 -- From Pixels to Post: Images for Social Media -- Technical requirements -- Creating new documents for screen and web -- Creating artwork for Facebook -- Creating artwork for Twitter -- Creating artwork for Instagram -- Creating artwork for Pinterest -- Creating artwork for LinkedIn -- Social media sizes -- Working with artboards -- Adding a header image -- Creating a tweet template -- Adding text to the artboard -- Duplicating artboards -- Exporting and scheduling posts -- Batch export artboards -- Scheduling posts with Adobe Express -- Summary -- 7.…”
    Libro electrónico
  11. 1691
    Publicado 2024
    Tabla de Contenidos: “…Written Lab -- Review Questions -- Chapter 9 Security Vulnerabilities, Threats, and Countermeasures -- Shared Responsibility -- Data Localization and Data Sovereignty -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Hardware -- Firmware -- Client-Based Systems -- Mobile Code -- Local Caches -- Server-Based Systems -- Large-Scale Parallel Data Systems -- Grid Computing -- Peer to Peer -- Industrial Control Systems -- Distributed Systems -- High-Performance Computing (HPC) Systems -- Real-Time Operating Systems -- Internet of Things -- Edge and Fog Computing -- Embedded Devices and Cyber-Physical Systems -- Static Systems -- Cyber-Physical Systems -- Security Concerns of Embedded and Static Systems -- Microservices -- Infrastructure as Code -- Immutable Architecture -- Virtualized Systems -- Virtual Software -- Virtualized Networking -- Software-Defined Everything -- Virtualization Security Management -- Containerization -- Mobile Devices -- Mobile Device Security Features -- Mobile Device Deployment Policies -- Essential Security Protection Mechanisms -- Process Isolation -- Hardware Segmentation -- Root of Trust -- System Security Policy -- Common Security Architecture Flaws and Issues -- Covert Channels -- Attacks Based on Design or Coding Flaws -- Rootkits -- Incremental Attacks -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 10 Physical Security Requirements -- Apply Security Principles to Site and Facility Design -- Secure Facility Plan -- Site Selection -- Facility Design -- Implement Site and Facility Security Controls -- Equipment Failure -- Wiring Closets -- Server Rooms/Data Centers -- Intrusion Detection Systems -- Cameras -- Access Abuses -- Media Storage Facilities -- Evidence Storage -- Work Area Security -- Utility Considerations…”
    Libro electrónico
  12. 1692
    Publicado 2014
    Tabla de Contenidos: “…Cover -- About the Authors -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Part I: Critical Database Concepts -- 1 Oracle Database 12c Architecture Options -- Databases and Instances -- Inside the Database -- Choosing Architectures and Options -- 2 Installing Oracle Database 12c and Creating a Database -- Overview of Licensing and Installation Options -- Installing the Oracle Software -- 3 Upgrading to Oracle Database 12c -- Choosing an Upgrade Method -- Before Upgrading -- Upgrading the Grid Infrastructure and Database -- After Upgrading -- 4 Planning Oracle Applications-Approaches, Risks, and Standards -- The Cooperative Approach -- Everyone Has "Data" -- The Familiar Language of Oracle -- Some Common, Everyday Examples -- What Are the Risks? …”
    Libro electrónico
  13. 1693
    Publicado 2018
    Tabla de Contenidos: “…Creating an input form using the RecordEdit and Lightning input field components -- Introducing events and attributes in Lightning record edit form and input field -- Creating a contact edit form using the Lightning input field and RecordEditForm components -- Using the Lightning output field component -- The list view component -- Creating a tree view using the tree and tree grid components -- Formatting output data using Lightning base components -- Using the datatable component -- Using Lightning input components -- Using the carousel component -- Summary -- Chapter 7: Using External JavaScript Libraries in Lightning Components -- Third-party JavaScript libraries in Lightning Components -- Attributes -- Events -- Integrating a third-party library into Lightning Components -- Integrating the Select2 JavaScript library into Lightning Components -- Integrating the MomentJs library into Lightning Components -- Creating a Locker Service-compliant JavaScript bundle using webpack -- Introduction to webpack -- Entry -- Output -- Loaders -- Plugins -- Integrating choices.js into Lightning Components -- Structuring a JS-heavy project in Salesforce DX -- Creating a Locker Service-compatible bundle with webpack -- ChartJs in Lightning Components -- Making client-side calls to external sites using JavaScript -- Communication between the Lightning main frame and iframe -- Communication from the Visualforce page to the Lightning Component -- Communication from the Lightning Component to the Visualforce page -- Rendering a React application in a Lightning Component using Lightning:container -- Rendering reactApp using the LCC npm module in a Lightning Component -- Limitations of Lightning:container -- Summary -- Chapter 8: Debugging Lightning Components -- Enabling Debug Mode -- Salesforce Lightning Inspector -- Lightning Salesforce Inspector tabs…”
    Libro electrónico
  14. 1694
    Publicado 2004
    Tabla de Contenidos: “…DB2 Information Integration architecture overview -- 2.1 Introduction -- 2.2 Current business trends -- 2.2.1 Grid computing -- 2.2.2 Data federation -- 2.2.3 Information integration -- 2.3 IBM's DB2 Information Integration overview -- 2.3.1 Data consolidation or placement -- 2.3.2 Distributed access (federation) -- 2.3.3 DB2 Information Integrator portfolio -- 2.4 DB2 Information Integrator V8.1 -- 2.4.1 DB2 II V8.1 overview -- 2.4.2 DB2 II components -- 2.4.3 Configuring the federated system -- 2.4.4 Performance considerations -- Chapter 3. …”
    Libro electrónico
  15. 1695
    Publicado 2024
    Tabla de Contenidos: “…Chapter 9: Understanding Feature Engineering and Preparing Data for Modeling -- Chapter 10: Mastering Machine Learning Concepts -- Introducing the machine learning workflow -- Problem statement -- Model selection -- Model tuning -- Model predictions -- Getting started with supervised machine learning -- Regression versus classification -- Linear regression - regression -- Logistic regression -- k-nearest neighbors (k-NN) -- Random forest -- Extreme Gradient Boosting (XGBoost) -- Getting started with unsupervised machine learning -- K-means -- Density-based spatial clustering of applications with noise (DBSCAN) -- Other clustering algorithms -- Evaluating clusters -- Summarizing other notable machine learning models -- Understanding the bias-variance trade-off -- Tuning with hyperparameters -- Grid search -- Random search -- Bayesian optimization -- Summary -- Chapter 11: Building Networks with Deep Learning -- Introducing neural networks and deep learning -- Weighing in on weights and biases -- Introduction to weights -- Introduction to biases -- Activating neurons with activation functions -- Common activation functions -- Choosing the right activation function -- Unraveling backpropagation -- Gradient descent -- What is backpropagation? …”
    Libro electrónico
  16. 1696
    Publicado 2023
    Tabla de Contenidos: “…Accountable and open to inspection modeling -- Data and model governance -- Summary -- Questions -- References -- Part 2: Improving Machine Learning Models -- Chapter 4: Detecting Performance and Efficiency Issues in Machine Learning Models -- Technical requirements -- Performance and error assessment measures -- Classification -- Regression -- Clustering -- Visualization for performance assessment -- Summary metrics are not enough -- Visualizations could be misleading -- Don't interpret your plots as you wish -- Bias and variance diagnosis -- Model validation strategy -- Error analysis -- Beyond performance -- Summary -- Questions -- References -- Chapter 5: Improving the Performance of Machine Learning Models -- Technical requirements -- Options for improving model performance -- Grid search -- Random search -- Bayesian search -- Successive halving -- Synthetic data generation -- Oversampling for imbalanced data -- Improving pre-training data processing -- Anomaly detection and outlier removal -- Benefitting from data of lower quality or relevance -- Regularization to improve model generalizability -- Summary -- Questions -- References -- Chapter 6: Interpretability and Explainability in Machine Learning Modeling -- Technical requirements -- Interpretable versus black-box machine learning -- Interpretable machine learning models -- Explainability for complex models -- Explainability methods in machine learning -- Local explainability techniques -- Global explanation -- Practicing machine learning explainability in Python -- Explanations in SHAP -- Explanations using LIME -- Counterfactual generation using Diverse Counterfactual Explanations (DiCE) -- Reviewing why having explainability is not enough -- Summary -- Questions -- References -- Chapter 7: Decreasing Bias and Achieving Fairness -- Technical requirements…”
    Libro electrónico
  17. 1697
    Publicado 2023
    Tabla de Contenidos: “…Co-op advertising -- Tactical marketing -- B2B advertising -- Corporate image advertising -- Corporate image advertising and brand strategy -- Brand awareness and brand attitude strategy -- Brand awareness strategy -- Recognition brand awareness -- Recall awareness -- Awareness and corporate image advertising -- Brand attitude strategy -- Involvement -- Motivation -- Attitude and corporate image advertising -- The Rossiter-Percy grid -- Summary -- Review questions -- References -- 5. …”
    Libro electrónico
  18. 1698
    Publicado 2018
    Tabla de Contenidos: “…The case study of Tor Vergata (Rome, Italy) -- chapter New ornaments’ influence on the character of modern cities -- part, History and arts -- chapter Arabian urban text art: Between cultural identity and artistic identity -- chapter The remaining houses of the two pearl merchants Ahmed Munawar Rifai and Hussein Bin Yahiya Rifai in the Farasan Islands in the 14th century AH/20th century AD: A study of aesthetic and artistic values -- part, City as an organism -- part, Architecture -- chapter Architecture of the 21st century museum as a catalytic phenomenon in the evolving cultural identity of a city -- chapter Conserving historical areas through the roles of main cities: Urban identity in the era of globalisation -- chapter Entrance gateway of Kerala temples: Assessing the form of a Kerala temple gopuram through material and construction -- chapter Expression of cultural identity in the contemporary urban built form of Kathmandu -- chapter Reimagining city identity through safe and sustainable public environments -- chapter Smart grids, smart cities, interior spaces and human behaviour: An interactive development process -- part, History and arts -- chapter Identity in transformation of rural Egyptian villages -- chapter Metaphysics and identity in architecture: Peter Eisenman’s Wexner Center for the Arts as case study -- chapter Immersing the landscape in its music: The case of iso-polyphony in South Albania -- chapter The changing image of Istanbul through its monuments (1923–1973) -- chapter The cumulative effect of an interdisciplinary project -- chapter Unearthing the spatial archetypes of two indigenous South Asian cities: The walled city of Old Delhi and Old Dhaka -- part, Planning and approaching the city…”
    Libro electrónico
  19. 1699
    Publicado 2022
    Tabla de Contenidos: “…Padma Pooja -- 5.1 Introduction -- 5.2 IoT Components, Layered Architectures, Security Threats -- 5.3 Taxonomy of DDoS Attacks and Its Working Mechanism in IoT -- 5.4 Existing Solution Mechanisms Against DDoS Over IoT -- 5.5 Challenges and Research Directions -- 5.6 Conclusion -- 6 Machine Learning and Deep Learning Techniques for Phishing Threats and Challenges 123 Bhimavarapu Usharani -- 6.1 Introduction -- 6.2 Phishing Threats -- 6.3 Deep Learning Architectures -- 6.4 Related Work -- 6.5 Analysis Report -- 6.6 Current Challenges -- 6.7 Conclusions -- 7 Novel Defending and Prevention Technique for Man-in-the-Middle Attacks in Cyber-Physical Networks 147 Gaurav Narula, Preeti Nagrath, Drishti Hans and Anand Nayyar -- 7.1 Introduction -- 7.2 Literature Review -- 7.3 Classification of Attacks -- 7.4 Proposed Algorithm of Detection and Prevention -- 7.5 Results and Discussion -- 7.6 Conclusion and Future Scope -- 8 Fourth Order Interleaved Boost Converter With PID, Type II and Type III Controllers for Smart Grid Applications 179 Saurav S. and Arnab Ghosh -- 8.1 Introduction -- 8.2 Modeling of Fourth Order Interleaved Boost Converter -- 8.3 Controller Design for FIBC -- 8.4 Computational Results -- 8.5 Conclusion -- 9 Industry 4.0 in Healthcare IoT for Inventory and Supply Chain Management 209 Somya Goyal -- 9.1 Introduction -- 9.2 Benefits and Barriers in Implementation of RFID -- 9.3 IoT-Based Inventory Management--Case Studies -- 9.4 Proposed Model for RFID-Based Hospital Management -- 9.5 Conclusion and Future Scope -- 10 A Systematic Study of Security of Industrial IoT 229 Ravi Gedam and Surendra Rahamatkar -- 10.1 Introduction -- 10.2 Overview of Industrial Internet of Things (Smart Manufacturing) -- 10.3 Industrial Reference Architecture -- 10.4 FIWARE Generic Enabler (FIWARE GE) -- 10.5 Discussion -- 10.6 Conclusion -- 11 Investigation of Holistic Approaches for Privacy Aware Design of Cyber-Physical Systems 257 Manas Kumar Yogi, A.S.N. …”
    Libro electrónico
  20. 1700
    Publicado 2019
    Tabla de Contenidos: “…POST Requests -- Performing Blind SSRFs -- Attacking Users with SSRF Responses -- ESEA SSRF and Querying AWS Metadata -- Google Internal DNS SSRF -- Internal Port Scanning Using Webhooks -- Summary -- 11 XML External Entity -- eXtensible Markup Language -- How XXE Attacks Work -- Read Access to Google -- Facebook XXE with Microsoft Word -- Wikiloc XXE -- Summary -- 12 Remote Code Execution -- Executing Shell Commands -- Executing Functions -- Strategies for Escalating Remote Code Execution -- Polyvore ImageMagick -- Algolia RCE on facebooksearch.algolia.com -- RCE Through SSH -- Summary -- 13 Memory Vulnerabilities -- Buffer Overflows -- Read Out of Bounds -- PHP ftp_genlist() Integer Overflow -- Python Hotshot Module -- Libcurl Read Out of Bounds -- Summary -- 14 Subdomain Takeover -- Understanding Domain Names -- How Subdomain Takeovers Work -- Ubiquiti Subdomain Takeover -- Scan.me Pointing to Zendesk -- Shopify Windsor Subdomain Takeover -- Snapchat Fastly Takeover -- Legal Robot Takeover -- Uber SendGrid Mail Takeover -- Summary -- 15 Race Conditions -- Accepting a HackerOne Invite Multiple Times -- Exceeding Keybase Invitation Limits -- HackerOne Payments Race Condition -- Shopify Partners Race Condition -- Summary -- 16 Insecure Direct Object References -- Finding Simple IDORs -- Finding More Complex IDORs -- Binary.com Privilege Escalation -- Moneybird App Creation -- Twitter Mopub API Token Theft -- ACME Customer Information Disclosure -- Summary -- 17 OAuth Vulnerabilities -- The OAuth Workflow -- Stealing Slack OAuth Tokens -- Passing Authentication with Default Passwords…”
    Libro electrónico