Mostrando 561 - 580 Resultados de 608 Para Buscar '"The Hole"', tiempo de consulta: 0.07s Limitar resultados
  1. 561
    por Malthe-Sørenssen, Anders
    Publicado 2024
    “…This course-based open access textbook delves into percolation theory, examining the physical properties of random media—materials characterized by varying sizes of holes and pores. The focus is on both the mathematical foundations and the computational and statistical methods used in this field. …”
    Libro electrónico
  2. 562
    Publicado 2010
    “…Ultimately, the Large Hadron Collider may prove the model correct, helping so many realize their greatest dreams ... or it might poke holes in the model, leaving us to wonder an even more exciting possibility: that the answers lie in possibilities so unique that we have not even dreamt of them…”
    Libro electrónico
  3. 563
    Publicado 2006
    “…You will learn how to setup your computers to: Share printers, files, and Internet connections IM one another instantly Get your e-mail in and out of your network Create a network jukebox Roam your house with wireless You'll also get tips on choosing the right networking equipment, hiding wires and patching holes in your drywall, and when to call the pros. …”
    Libro electrónico
  4. 564
    por Robin, Jennifer, 1974-
    Publicado 2013
    “…Authors Jennifer Robin and Michael Burchell poke holes in every single excuse. Whether the reasons involve the organization's leadership, employees, environment, or any other factor, the authors explain that if managers lead people properly, they can create a great workplace. …”
    Libro electrónico
  5. 565
    Hacking
    Hacking For Dummies
    Publicado 2022
    “…Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. …”
    Libro electrónico
  6. 566
    Publicado 2022
    “…The material represented in these proceedings cover the following topics: accretion, active galactic nuclei, alternative theories of gravity, black holes (theory, observations and experiments), binaries, boson stars, cosmic microwave background, cosmic strings, dark energy and large scale structure, dark matter, education, exact solutions, early universe, fundamental interactions and stellar evolution, fast transients, gravitational waves, high energy physics, history of relativity, neutron stars, precision tests, quantum gravity, strong fields, and white dwarf; all of them represented by a large number of contributions. …”
    Libro electrónico
  7. 567
    Publicado 2022
    “…The Special Issue consists of ten peer-reviewed papers on plant communities in a variety of ecosystems - from the small kettle-holes in the lowlands of northern Germany to the river Danube - the largest river within the European Union, and from different wetland types in Central Europe to the Donggting Lake - fourth largest lake in China…”
    Libro electrónico
  8. 568
    Publicado 2021
    “…Its construction is extremely rational and efficient, but at the same time its structure, its volumes and holes are matched with an unusual plasticity and generate a markedly dreamlike atmosphere. …”
    Acceso con credenciales UPSA
    Libro electrónico
  9. 569
    Publicado 2020
    “…You’ll see how to take advantage of the security layer in order to avoid unwanted security holes, and how to use TypeScript to develop your applications without having to manually set up a build process. …”
    Libro electrónico
  10. 570
    Publicado 2011
    “…With parts, you will learn about extruded, lofted and revolved Boss features, holes, patterning, and more. With assemblies, you will learn to create complete assemblies, as well as explode and select individual components. …”
    Video
  11. 571
    Publicado 2021
    “…Finally, Pastels and Pedophiles lays out what can be done about QAnon's corrosive effect on society to bring Q followers out of the rabbit hole back into the light"--Sitio web del editor…”
    Libro
  12. 572
    Publicado 2019
    “…You’ll learn how to: •Design a moving robotic arm, a door hinge, a teapot, and a 20-sided die •Create professional technical drawings for manufacturing and patent applications •Model springs and other complex curves to create realistic designs •Use basic Fusion 360 tools like Extrude, Revolve, and Hole •Master advanced tools like Coil and Thread Whether you’re a maker, hobbyist, or artist, A Beginner’s Guide to 3D Modeling is certain to show you how to turn your ideas into professional models. …”
    Libro electrónico
  13. 573
    Publicado 2015
    “…Assemble a wireless attack toolkit and master the hacker’s weapons Effectively scan and enumerate WiFi networks and client devices Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite Develop and launch client-side attacks using Ettercap and the WiFi Pineapple Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS Exploit holes in WPA and WPA2 personal and enterprise security schemes Leverage rogue hotspots to deliver remote access software through fraudulent software updates Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic Capture and evaluate proprietary wireless technology with Software Defined Radio tools Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices Attack remote wireless networks using compromised Windows systems and built-in tools…”
    Libro electrónico
  14. 574
    Publicado 2011
    “…Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. …”
    Libro electrónico
  15. 575
  16. 576
    Publicado 2014
    “…Here's a small sample of what you'll learn: Set up your Minecraft server and mod development tools Master Java basics every Minecraft game modder needs to know Read, write, store, and change information throughout your mod Build mods that can make decisions and respond to player actions Understand object-oriented programming and the objects you can program in Minecraft Handle errors without crashing the Minecraft game Use threads to create mobs that can do many things at once Customize your mobs, and build on existing objects to write new mods Spawn new mobs, find hidden mobs, and make one mob ride another Dig holes and build structures Create projectile weapons and potion effects Share your mods with the world…”
    Libro electrónico
  17. 577
    Publicado 2017
    “…But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? …”
    Libro electrónico
  18. 578
    Publicado 2020
    “…Use code coverage to find holes in your test suites. Learn how to identify hard dependencies. …”
    Libro electrónico
  19. 579
    Publicado 2012
    “…Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself…”
    Libro electrónico
  20. 580
    Publicado 2004
    “…Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs—IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. …”
    Libro electrónico