Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 185
- Historia 161
- Management 84
- Development 82
- Operating systems (Computers) 75
- Filosofía 74
- Social aspects 64
- Computer networks 63
- Application software 62
- Engineering & Applied Sciences 61
- Philosophy 60
- Linux 58
- RELIGION 54
- Security measures 54
- Data processing 50
- Leadership 49
- Computer security 47
- Computer Science 43
- Computer software 40
- Politics and government 40
- Política y gobierno 39
- Mathematics 37
- Computer programming 36
- Crítica e interpretación 35
- Cloud computing 34
- History and criticism 34
- Psychological aspects 34
- Research & information: general 34
- Business & Economics 31
- Computer programs 31
-
2641por Gasston, PeterTabla de Contenidos: “…Other Pseudo-classestarget; empty; root; not; UI Element States; Pseudo-elements; The selection pseudo-element; Summary; DOM and Attribute Selectors: Browser Support; 5: Web Fonts; The @font-face Rule; Defining Different Faces; True vs. …”
Publicado 2011
Libro electrónico -
2642por Delisle, MarcTabla de Contenidos: “…Order of interpretation for rulesBlocking root access; Protecting in-transit data; Summary; Chapter 3:Over Viewing the Interface; Over viewing panels and windows; Login panels; Navigation and main panels; Home page; Views; Query window; Starting page; Customizing general settings; Configuring window title; Natural sort order for database and table names; Creating site-specific header and footer; Themes; Configuring themes; Selecting themes; Selecting a language; Slider; Restricting the list of databases; Deactivating Ajax; Character sets and collations; Effective character sets and collations…”
Publicado 2012
Libro electrónico -
2643por Etheridge, DeniseTabla de Contenidos: “…Trace Precedents and DependentsChapter 5: Using Functions; Understanding the Function Wizard; Round a Number; Create a Conditional Formula; Calculate a Conditional Sum; Calculate a Conditional Count; Find the Square Root; Retrieve Column or Row Numbers; Using VLOOKUP; Determine the Location of a Value; Using INDEX; Perform Date and Time Calculations; Chapter 6: Using Financial Functions; Calculate Future Value; Calculate Present Value; Calculate Loan Payments; Calculate Principal or Interest; Calculate the Interest Rate; Calculate the Internal Rate of Return…”
Publicado 2010
Libro electrónico -
2644Publicado 2015Tabla de Contenidos: “…Overview for the optimization of HBM Data structures: Locality done right; Thread parallelism in HBM ; Data parallelism: SIMD vectorization; Trivial obstacles; Premature abstraction is the root of all evil; Results; Profiling details; Scaling on processor vs. coprocessor; Contiguous attribute; Summary; References; Chapter 4: Optimizing for Reacting Navier-Stokes Equations; Getting started; Version 1.0: Baseline; Version 2.0: ThreadBox ; Version 3.0: Stack memory; Version 4.0: Blocking; Version 5.0: Vectorization; Intel Xeon Phi coprocessor results; Summary…”
Libro electrónico -
2645Publicado 2015Tabla de Contenidos: “…Associations Generating the Model; Adding Associations; Using Associations; Summary; Exercises; Chapter 4: Controllers; Representational State Transfer; Routing; Resources; Custom Routes; The Root Route; Paths and URLs; Controller Actions; A Brief Detour from Actions; Back to Controller Actions; Adding Comments; Summary; Exercises; Chapter 5: Views; Embedded Ruby; Output; Control Flow; Comments; Helpers; URL Helpers; Number Helpers; Your Own Helpers; The Posts Index Page; Layouts; Asset Tag Helpers; CSRF Meta Tags Helper; Yield; Partials; Collections; Showing Comments; Forms; Form Helpers…”
Libro electrónico -
2646Publicado 2015Tabla de Contenidos: “…Connecting the BeagleBone Black via Serial over USBWindows; Mac OS X and Linux; Part II: Covering the Basics; Chapter 4: Introducing the Linux Shell; Examining the Prompt; Introducing the root superuser; Exploring the Linux File System; Listing files and directories; Understanding the directory tree; Changing directories; Understanding relative and absolute paths; Checking file types; Creating directories; Creating, editing, and viewing text files; Removing files and directories; Copying and renaming files; Selecting multiple files in Linux; Using long-listing format and permissions…”
Libro electrónico -
2647por Garofalo, RaffaeleTabla de Contenidos: “…Title Page; Copyright Page; Dedication; Contents at a Glance; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Introducing WPF and XAML; The XAML Syntax; Namespaces and Root Elements; Objects and Common Elements; The Code Behind; Attached Properties; Introduction to WPF; WPF Architecture; WPF 4 Tools; Summary; Chapter 2: Sample Application: Overview and Getting Started; Requirements; Tools and Software; Icons and Templates; Third-Party Library and Control; Application Overview; Application Architecture; User Stories; Domain Model…”
Publicado 2011
Libro electrónico -
2648Publicado 2014Tabla de Contenidos: “…Starting with a Simple Trade-Off Representing the Problem as a Polytope; Solving by Sliding the Level Set; The Simplex Method: Rooting around the Corners; Working in Excel; There's a Monster at the End of This Chapter; Fresh from the Grove to Your Glass...with a Pit Stop Through a Blending Model; You Use a Blending Model; Let's Start with Some Specs; Coming Back to Consistency; Putting the Data into Excel; Setting Up the Problem in Solver; Lowering Your Standards; Dead Squirrel Removal: The Minimax Formulation; If-Then and the "Big M" Constraint…”
Libro electrónico -
2649Tabla de Contenidos: “…Case 1: Single Laptop System for Mainframe DeveloperCase 2: Server Class Machine Hosting Multiple Mainframe Systems for Software QA Testing; Chapter 3: Building the Hypervisor Host; Networking Design Considerations; Remote Access to the Physical Server; Network KVM; RAC; Network Connectivity Planning; Physical Network Connections; IP Configuration; Hard Drive Configuration; RAID Configuration Consideration; Other Storage Technologies; Installing the Linux Operating System; Network Time Protocol Server; File System Creation; Swap File System; Root File System; Virtual System Data…”
Libro electrónico -
2650Publicado 2014Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introspecting Maya, Python, and PyMEL; Creating your library; Using the interpreter; Finding a place for our library; Choosing a development root; Creating a function in your IDE; Reloading code changes; Exploring Maya and PyMEL; Creating an introspection function; Understanding Python and MEL types; Using the method resolution order; PyNodes all the way down; Understanding PyMEL data and math types; Leveraging the REPL; Building the pmhelp function…”
Libro electrónico -
2651por Nolan, GodfreyTabla de Contenidos: “…Breaking the DEX File into Its Constituent PartsThe Header Section; Magic; Checksum; Header_size; Endian_tag; The string_ids Section; The type_ids Section; The proto_ids Section; The field_ids Section; The method_ids Section; The class_defs Section; The data Section; class_data_item; code_item; Summary; Chapter 4 Tools of the Trade; Downloading the APK; Backing Up the APK; Forums; Platform Tools; Rooting the Phone; Installing and Using the Platform Tools; Decompiling an APK; What's in an APK File?…”
Publicado 2012
Libro electrónico -
2652por Suvak, Janine. authorTabla de Contenidos: “…Create an Animator ControllerRun Zombie Run; Run Like a Zombie; More Animations; Configure the Animations; Root Motion; OnAnimatorMove; Transitions; Any State; User Input and the Input Manager; Blend Trees; Don't Reinvent the Wheel; Summary; Chapter 6: Starting with Coding Physics; Rigidbodies; Rigidbody Properties; Controlling a Rigidbody with Forces; Colliders; OnCollision; The Other GameObject; Target Practice; Physic Materials; Bounciness; LookAt; Accessing Other Game Objects; Triggers; OnTrigger; Rapid Prototyping; Spawning and Spawn Points; Changing the Character Model; Summary…”
Publicado 2014
Libro electrónico -
2653Publicado 2015Tabla de Contenidos:Libro electrónico
-
2654por Von Hagen, WilliamTabla de Contenidos: “…Chapter 5: Configuring and Booting Virtual Machines Virtual Machine Requirements; Obtaining Sample Xen Filesystem Images; Defining and Starting a Paravir tualized VM; Defining and Starting Xen Hardware Virtual Machines; Automatically Starting Xen Domains at Boot Time; Troubleshooting Configuration Files and Guest Domains; Summary; Chapter 6: Building Filesystems for Virtual Machines; Linux Storage and Filesystems; Filesystem Choices, Locations, and Flexibility; Building Virtual Machine Filesystems; Creating Swap Filesystems for Xen; Adding Applications to a Xen Root Filesystem…”
Publicado 2008
Libro electrónico -
2655por Van Bergen, ChrisTabla de Contenidos: “…-- Standards: The Rule Book to Follow -- Setting the Standard -- Auditing -- The Impact of Assessments -- The Educational Benefit of Compliance -- Ongoing Challenges and Evolution -- Shifting to Root Causes and Shared Ownership -- Notes -- 5 Wake‐Up Calls: The Dual Disasters of Rana Plaza and COVID‐19 -- The Tragedy at Rana Plaza -- Why Bangladesh? …”
Publicado 2023
Libro electrónico -
2656por Boyraz, GuvenTabla de Contenidos: “…Cover -- Copyright -- Contributors -- About the reviewers -- Table of Contents -- Preface -- Part 1: The Fundamentals of Endpoint Security and EDR -- Chapter 1: Introducing Endpoint Security and EDR -- An overview of modern cybersecurity threats and challenges -- Importance of endpoint security in modern IT environments -- EDR tools versus traditional anti-virus - navigating the new world of endpoint security -- Evolution of EDR technologies -- Summary -- Chapter 2: EDR Architecture and Its Key Components -- Definition and core concepts of EDR -- Endpoints -- Endpoint visibility (monitoring) -- Detection -- Response -- EDR architecture -- Key features and capabilities of EDR tools -- An overview of popular EDR tools -- Microsoft Defender for Endpoint -- SentinelOne -- CrowdStrike Falcon Insight -- Summary -- Chapter 3: EDR Implementation and Deployment -- The planning and considerations before deploying EDR and deployment models -- On-premises EDR -- Cloud-based EDR -- Hybrid EDR -- Lab experiment - hands-on deployment of SentinelOne Singularity EDR/XDR -- Use cases -- Use case 1 -- Use case 2 -- Use case 3 -- Summary -- Part 2: Advanced Endpoint Security Techniques and Best Practices -- Chapter 4: Unlocking Synergy - EDR Use Cases and ChatGPT Integration -- DFIR life cycle -- Use case 1 - identifying the source and root cause of data leakage in the cyber incidents -- Objective -- Background -- Integration process -- Analysis and correlation -- Benefits -- Conclusion -- Use case 2 - endpoint management with EDR -- Objectives -- Policy definition and deployment -- Benefits -- Conclusion -- Use case 3 - safeguarding your company against WannaCry using EDR -- Background -- Incident timeline -- Outcomes and lessons learned -- Use case 4 - email security -- Use case 5 - ransomware incident -- Use case 6 - man-in-the-middle attack -- Summary…”
Publicado 2024
Libro electrónico -
2657Publicado 2018Tabla de Contenidos: “…XOR Encryption -- Random Number Generators -- Symmetric Key Cryptography -- Block Ciphers -- Block Cipher Modes -- Block Cipher Padding -- Padding Oracle Attack -- Stream Ciphers -- Asymmetric Key Cryptography -- RSA Algorithm -- RSA Padding -- Diffie-Hellman Key Exchange -- Signature Algorithms -- Cryptographic Hashing Algorithms -- Asymmetric Signature Algorithms -- Message Authentication Codes -- Public Key Infrastructure -- X.509 Certificates -- Verifying a Certificate Chain -- Case Study: Transport Layer Security -- The TLS Handshake -- Initial Negotiation -- Endpoint Authentication -- Establishing Encryption -- Meeting Security Requirements -- Final Words -- Chapter 8: Implementing the Network Protocol -- Replaying Existing Captured Network Traffic -- Capturing Traffic with Netcat -- Using Python to Resend Captured UDP Traffic -- Repurposing Our Analysis Proxy -- Repurposing Existing Executable Code -- Repurposing Code in .NET Applications -- Repurposing Code in Java Applications -- Unmanaged Executables -- Encryption and Dealing with TLS -- Learning About the Encryption In Use -- Decrypting the TLS Traffic -- Final Words -- Chapter 9: The Root Causes of Vulnerabilities -- Vulnerability Classes -- Remote Code Execution -- Denial-of-Service -- Information Disclosure -- Authentication Bypass -- Authorization Bypass -- Memory Corruption Vulnerabilities -- Memory-Safe vs. …”
Libro electrónico -
2658Publicado 2018Tabla de Contenidos: “…C4) -- BeagleBoard-xM -- BeagleBone -- BeagleBone Black -- Gumstix -- Additional specifications -- Raspberry Pi -- Specifications -- Setting up the BeagleBone Black -- Flash Memory and File Systems -- BeagleBone Black Memory Configuration -- Preparing the Board -- Caveat -- The Boot Process -- Differences Between Version 7.4 and Version 8.7 -- The Root File System Image -- Boot to the NFS File System -- What Can Go Wrong? …”
Libro electrónico -
2659Publicado 2010Tabla de Contenidos: “…-- Browser Style Sheets -- User Settings -- User Style Sheets -- Rendering Modes -- Standards Mode -- Almost Standards Mode -- Quirks Mode -- Choosing Modes with a DOCTYPE Switch -- X-UA-Compatible -- Specific Mode Differences -- Targeting Browsers -- Targeting with Selectors -- Targeting with Syntax Hacks -- Microsoft Conditional Comments -- IE and hasLayout -- Browser Grading -- A-Grade Browsers -- B-Grade Browsers -- F-Grade Browsers -- X-Grade Browsers -- A+-Grade Browsers -- CSS Support via JavaScript -- Chapter 3: Selectors -- E (Type Selectors) -- * (Universal Selector) -- #id (ID Selector) -- .class (Class Selector) -- Attribute Selectors -- [att] -- [att=val] -- [att~=val] -- [att|=val] -- [att^=val] -- [att=val] -- [att*=val] -- Pseudo-class Selectors -- :link, :visited (Link Pseudo-classes) -- :hover, :active, :focus (Action Pseudo-classes) -- :target (Target Pseudo-class) -- :enabled, :disabled, :checked (UI Pseudo-classes) -- :lang() (Language Pseudo-class) -- :root (Root Element Pseudo-class) -- :nth-child(), :nth-last-child() (Nth Child Pseudo-classes) -- :first-child, :last-child (First and Last Child Pseudo-classes)…”
Libro electrónico -
2660