Mostrando 681 - 700 Resultados de 722 Para Buscar '"The Hole"', tiempo de consulta: 0.07s Limitar resultados
  1. 681
    Publicado 2011
    “…With parts, you will learn about extruded, lofted and revolved Boss features, holes, patterning, and more. With assemblies, you will learn to create complete assemblies, as well as explode and select individual components. …”
    Video
  2. 682
    Publicado 2021
    “…Finally, Pastels and Pedophiles lays out what can be done about QAnon's corrosive effect on society to bring Q followers out of the rabbit hole back into the light"--Sitio web del editor…”
    Libro
  3. 683
    Publicado 2019
    “…You’ll learn how to: •Design a moving robotic arm, a door hinge, a teapot, and a 20-sided die •Create professional technical drawings for manufacturing and patent applications •Model springs and other complex curves to create realistic designs •Use basic Fusion 360 tools like Extrude, Revolve, and Hole •Master advanced tools like Coil and Thread Whether you’re a maker, hobbyist, or artist, A Beginner’s Guide to 3D Modeling is certain to show you how to turn your ideas into professional models. …”
    Libro electrónico
  4. 684
    Publicado 2015
    “…Assemble a wireless attack toolkit and master the hacker’s weapons Effectively scan and enumerate WiFi networks and client devices Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite Develop and launch client-side attacks using Ettercap and the WiFi Pineapple Hack cellular networks with Airprobe, Kraken, Pytacle, and YateBTS Exploit holes in WPA and WPA2 personal and enterprise security schemes Leverage rogue hotspots to deliver remote access software through fraudulent software updates Eavesdrop on Bluetooth Classic and Bluetooth Low Energy traffic Capture and evaluate proprietary wireless technology with Software Defined Radio tools Explore vulnerabilities in ZigBee and Z-Wave-connected smart homes and offices Attack remote wireless networks using compromised Windows systems and built-in tools…”
    Libro electrónico
  5. 685
    Publicado 2011
    “…Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. …”
    Libro electrónico
  6. 686
    Publicado 2014
    “…Here's a small sample of what you'll learn: Set up your Minecraft server and mod development tools Master Java basics every Minecraft game modder needs to know Read, write, store, and change information throughout your mod Build mods that can make decisions and respond to player actions Understand object-oriented programming and the objects you can program in Minecraft Handle errors without crashing the Minecraft game Use threads to create mobs that can do many things at once Customize your mobs, and build on existing objects to write new mods Spawn new mobs, find hidden mobs, and make one mob ride another Dig holes and build structures Create projectile weapons and potion effects Share your mods with the world…”
    Libro electrónico
  7. 687
    Publicado 2017
    “…But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? …”
    Libro electrónico
  8. 688
    Publicado 2020
    “…Use code coverage to find holes in your test suites. Learn how to identify hard dependencies. …”
    Libro electrónico
  9. 689
    Publicado 2012
    “…Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself…”
    Libro electrónico
  10. 690
    por Currie, Janet M.
    Publicado 2006
    “…The book concludes with an overview of an integrated safety net that would fight poverty more effectively and prevent children from slipping through holes in the net. (For example, Currie recommends the implementation of a benefit "debit card" that would provide benefits with less administrative burden on the recipient.) …”
    Libro
  11. 691
  12. 692
    Publicado 2004
    “…Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs—IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. …”
    Libro electrónico
  13. 693
    Publicado 2016
    “…Learn to sketch, build, and edit 3D models of solids, surfaces, and free-form sculpted forms Understand how to add features like fillets, chamfers, holes, and threads to your 3D models Explore sketching techniques for drawing 2D geometry like lines, arcs, circles, and ellipses Learn to define the size of the geometry by applying rules, constraints, and dimensions Create and define surfaces using the patch workspace and learn to fix imported models Create free-form smooth and organic shapes with the embedded T-Splines technology Understand the CAM environment, how to configure the tool library, and learn to generate the tool paths and NC codes required to get parts manufactured Mike Thomas actively contributes to Design & Motion's blog where knowledge and expertise on a wide range of technological and industry happenings is shared. …”
    Video
  14. 694
    Publicado 2016
    “…A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything , author Douglas W. …”
    Libro electrónico
  15. 695
    Publicado 2023
    “…Contending with competitive card games, tricky tonics, and Swampshire's infamous squelch holes, Beatrice must rise above decorum and decency to pursue justice and her own desires-before anyone else is murdered"--…”
    Libro
  16. 696
    por Duncan, Christopher. author
    Publicado 2013
    “…That’s why the accountants hang together in the break room, while developers talk shop and geek culture in a watering hole down the street. Yet the job of leaders is to build a cohesive, powerful, and enduring empire by bringing all groups together in service to a shared, inspiring mission. …”
    Libro electrónico
  17. 697
    Publicado 2016
    “…Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement security best practices and effective countermeasures. …”
    Libro electrónico
  18. 698
    Publicado 2017
    “…Delve into one of the world's least-understood but highest-impact industries Understand the key principles of quantitative finance and the evolution of the field Learn what quantitative finance has become, and how it affects us all Discover how the industry's next steps dictate the economy's future How do you create a quadrillion dollars out of nothing, blow it away and leave a hole so large that even years of "quantitative easing" can't fill it - and then go back to doing the same thing? …”
    Libro electrónico
  19. 699
    por Levit, Alexandra, 1976-
    Publicado 2009
    “…. • Landing the job of your dreams by avoiding the “black hole” of HR. • Establishing a strong reputation by encouraging others to like and cooperate with you. • Navigating your organization’s social scene and practicing cringe-free networking. • Mastering skills that will take you anywhere, such as goal-setting and self-promotion. • Combating negativity and coping with difficult personalities. …”
    Libro electrónico
  20. 700
    Publicado 2020
    “…Plus, over 43 projects including: Block ads across your entire home network with the Pi-hole ad blocker Use code to make beautiful topographical maps of the Moon, Mars, and more Create a swirling stormy snow globe with LED-lit rheoscopic fluid Build a DIY mobile handwashing station for your community Tips and builds for exercising your constitutional right to protest safely and effectively Macramé an adorable Bay Yoda from The Mandalorian And much more!…”
    Libro electrónico