Mostrando 4,361 - 4,380 Resultados de 6,504 Para Buscar '"The Set Up"', tiempo de consulta: 0.19s Limitar resultados
  1. 4361
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Started - Setting Up an Environment -- Introduction -- Installing Kali Linux on Cloud - Amazon AWS -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing Kali Linux on Docker -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing NetHunter on OnePlus One -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing Kali Linux on a virtual machine -- Getting ready -- How to do it... -- How it works... -- Customizing Kali Linux for faster package updates -- Getting ready -- How to do it... -- How it works... -- Customizing Kali Linux for faster operations -- Getting ready -- How to do it... -- How it works... -- Configuring remote connectivity services - HTTP, TFTP, and SSH -- Getting ready -- How to do it... -- How it works... -- Configuring Nessus and Metasploit -- Getting ready -- How to do it... -- How it works... -- There's more... -- Configuring third-party tools -- Getting ready -- How to do it... -- How it works... -- Installing Docker on Kali Linux -- Getting ready -- How to do it... -- How it works... -- Chapter 2: Network Information Gathering -- Introduction -- Discovering live servers over the network -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Bypassing IDS/IPS/firewall -- Getting ready -- How to do it... -- How it works... -- There's more... -- Discovering ports over the network -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using unicornscan for faster port scanning -- Getting ready -- How to do it... -- How it works... -- There's more... -- Service fingerprinting -- Getting ready…”
    Libro electrónico
  2. 4362
    Publicado 2016
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- About the Author -- Preface -- Introduction-What Is Fund Administration and Custody -- Agreements -- Advantages of 3rd Party Administrators and Custodians -- Fund Relationship Structure -- Administration Structure -- Comparison With Retail/Mutual Funds -- Fund Set Up -- Custody and Depositary Services -- What is the Role of a Depositary? …”
    Libro electrónico
  3. 4363
    Publicado 2017
    Tabla de Contenidos: “…Identifying a severely overloaded storage -- Getting ready -- How to do it... -- Setting up VVols -- Getting ready -- How to do it... -- Introduction to vSAN -- Getting ready -- How to do it... -- Health check for vSAN -- Getting ready -- How to do it... -- Chapter 7: Designing vCenter on Windows for Best Performance -- Introduction -- Things to bear in mind while designing the vCenter platform -- How to do it... -- Deploying Platform Services Controller -- Getting ready -- How to do it... -- Deploying the vCenter server components -- Getting ready -- How to do it... -- Designing vCenter server for redundancy -- How to do it... -- Designing a highly available vCenter database -- How to do it... -- vCenter database size and location affects performance -- How to do it... -- Using vSphere 6.x Certificate Manager for certificates -- Getting ready -- How to do it... -- See also -- Designing vCenter server for Auto Deploy -- Getting ready -- How to do it... -- Chapter 8: Designing VCSA for Best Performance -- Introduction -- Deploying Platform Services Controller -- Getting ready -- How to do it... -- Deploying VCSA server components -- Getting ready -- How to do it... -- Setting up vCenter Server High Availability -- Getting ready -- How to do it... -- Adding VCSA to your Windows domain and adding users -- Getting ready -- How to do it... -- Checking VCSA performance using vimtop -- Getting ready -- How to do it... -- Checking VCSA performance using the GUI -- Getting ready -- How to do it... -- Chapter 9: Virtual Machine and Virtual Environment Performance Design -- Introduction -- Setting the right time in Guest OS -- Getting ready -- How to do it... -- Virtual NUMA considerations -- Getting ready -- How to do it... -- See also -- Choosing the SCSI controller for storage -- Getting ready -- How to do it... -- Impact of VM swap file placement -- Getting ready -- How to do it...…”
    Libro electrónico
  4. 4364
    Publicado 2017
    Tabla de Contenidos: “…. -- See also -- Chapter 3: Common Frameworks -- Introduction -- Setting up Django with NGINX -- Getting ready -- How to do it... -- How it works.... -- See also -- Setting up NGINX with Express -- Getting ready -- How to do it... -- How it works.... -- See also -- Running Ruby on Rails with NGINX -- Getting ready -- How to do it... -- How it works... -- See also -- Easy Flask with NGINX -- Getting ready -- How to do it... -- How it works... -- Laravel via NGINX -- Getting ready -- How to do it... -- How it works... -- See also -- Meteor applications with NGINX…”
    Libro electrónico
  5. 4365
    por Clarke, Glen E.
    Publicado 2012
    Tabla de Contenidos: “…Exercise 8-3 Configuring NAT on Windows Server -- Certification Summary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 9: Wireless Networking -- Wireless Basics -- Securing Wireless -- Implementing a Wireless Network -- Exercise 9-1 Configuring a Wireless Network -- Infrared and Bluetooth -- Certification Summary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 10: Remote Access and VPN Connectivity -- Remote Connectivity Concepts -- Remote Access Service (RAS) -- Exercise 10-1 Enable Modem Logging in Windows -- Dial-Up Networking -- Exercise 10-2 Creating a PPP Dial-Up Connection -- Virtual Private Networks (VPNs) -- Exercise 10-3 Setting Up a VPN Server -- Exercise 10-4 Setting Up a VPN Client -- Remote Access Technologies -- Exercise 10-5 Using Remote Desktop -- Certification Summary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 11: Wide Area Network Technologies -- Packet-Switching vs. …”
    Libro electrónico
  6. 4366
    Publicado 2017
    Tabla de Contenidos: “…. -- Chapter 12: Choosing and Using a Source Control Strategy -- Introduction -- Setting up Visual Studio account management and determining which source control solution is best for you -- Getting ready -- How to do it... -- How it works... -- Setting up Visual Studio GitHub integration, checking in code for the first time, and checking in changes -- Getting ready -- How to do it... -- How it works... -- Working as a team using GitHub, handling and resolving conflicts in code -- Getting ready -- How to do it... -- How it works... -- Chapter 13: Creating a Mobile Application in Visual Studio -- Introduction -- Installing Xamarin and other required components on your Windows PC and Mac -- Getting ready -- How to do it... -- How it works... -- Creating a mobile application using Apache Cordova -- Getting ready -- How to do it... -- How it works... -- Creating an iOS application using Xamarin.Forms and Visual Studio for Mac -- Getting ready -- How to do it... -- How it works... -- Chapter 14: Writing Secure Code and Debugging in Visual Studio -- Introduction -- Encrypting and storing passwords correctly -- Getting ready -- How to do it... -- How it works…”
    Libro electrónico
  7. 4367
    por Das, Subhajit
    Publicado 2024
    Tabla de Contenidos: “…-- Definition and overview -- The importance of mediation analysis -- Identifying mediation effects -- Criteria for mediation -- Testing for mediation -- Mediation analysis in R -- Setting up the R environment -- Preparing data for mediation analysis -- Conducting mediation analysis -- Interpretation and further steps -- Advanced mediation models -- Summary -- References -- Chapter 12: Exploring Sensitivity Analysis -- Technical requirements -- Introduction to sensitivity analysis -- Why do we need sensitivity analysis? …”
    Libro electrónico
  8. 4368
    Publicado 2022
    Tabla de Contenidos: “…Selecting a Viable Location -- Vet your home for cryptocurrency mining -- Communication requirements -- Power source thoughts -- Data centers and other dedicated commercial locations -- Chapter 10 Setting Up Your Mining Hardware -- ASIC Mining Rigs -- Racks -- Power supply -- PDUs -- Network and Ethernet connection -- A computer to control your rig -- GPU Mining Rigs -- Getting your GPU rig online -- Building your own GPU miner -- CPU Mining -- Mining Software -- Pool mining -- Solo mining -- Part 4 The Economics of Mining -- Chapter 11 Running the Numbers: Is It Worth It? …”
    Libro electrónico
  9. 4369
    Publicado 2023
    Tabla de Contenidos: “…Tagging ADefenseTower and APlayerAvatar member functions as UFUNCTION macros -- Adding components to the new actors -- Including component header files -- Defining private properties for these two components -- Adding public getter functions to the components -- Creating components in the class constructor -- Creating blueprints from the new actor classes -- Learning about the Unreal gameplay framework classes -- Locating and creating gameplay framework classes in Pangaea -- Learning about the PlayerController class -- Learning about the GameModeBase class -- GameState -- GameInstance -- Retrieving class instances from your code -- Using the Cast template function -- Summary -- Chapter 6: Creating Game Actors -- Technical requirements -- Setting up the player avatar -- Adding SpringArmComponent and CameraComponent to PlayerAvatar -- Initializing the player avatar -- Setting up the character's SkeletalMeshComponent -- Importing the character model -- Using the Hero skeletal mesh in BP_PlayerAvatar -- Replacing the game's player pawn -- Creating the player avatar's animation blueprint -- Creating the PlayerAvatarAnimInstance class -- Creating the ABP_PlayerAvatar blueprint -- Creating the State Machine on ABP_PlayerAvatar -- Syncing the movement speed with the animation instance -- Summary -- Chapter 7: Controlling Characters -- Technical requirements -- Controlling the player character to attack -- Adding the Attack action to the action map -- Binding the handler function to the Attack action -- Implementing the OnAttackPressed() action handler function -- Implementing the CanAttack() and Attack() functions -- Processing non-loop animations -- Implementing the OnStateAnimationEnds function -- Destroying actors -- Creating the enemy character -- Creating the Enemy class -- Creating the EnemyController class -- Creating the ABP_Enemy animation blueprint…”
    Libro electrónico
  10. 4370
    Publicado 2024
    Tabla de Contenidos: “…-- DynamoDB case studies -- Amazon retail -- Disney+ -- Workloads not suited for DynamoDB -- Summary -- References -- Chapter 2: The AWS Management Console and SDKs -- Working with the AWS Management Console -- Creating and using a DynamoDB table -- Navigating and working with items -- A brief overview of how throughput is charged -- Getting familiar with the AWS SDK -- Using the AWS SDK -- Using AWS Lambda and installing DynamoDB local -- Installing DynamoDB local -- Summary -- References -- Chapter 3: NoSQL Workbench for DynamoDB -- Technical requirements -- Setting up NoSQL Workbench -- Downloading NoSQL Workbench -- Installing NoSQL Workbench -- Viewing an existing data model -- Tool overview -- Diving deeper into the tool -- Making changes to the Employee data model -- Adding additional data -- Committing the model to DynamoDB -- Summary -- References -- Part 2: Core Data Modeling -- Chapter 4: Simple Key-Value -- What is key-value? …”
    Libro electrónico
  11. 4371
    por Marchioni, Francesco
    Publicado 2013
    Tabla de Contenidos: “…Securing JBoss AS 7 Applications -- Approaching the Java security API -- JBoss AS 7 security subsystem -- Setting up your first login module -- Using the login module in the Ticket web application -- Switching to FORM-based security…”
    Libro electrónico
  12. 4372
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Introduction to R -- What R is and what it isn't -- The inspiration for R - the S language -- R is a high quality statistical computing system -- R is a flexible programming language -- R is free, as in freedom and as in free beer -- What R is not good for -- Comparing R with other software -- The interpreter and the console -- Tools to work efficiently with R -- Pick an IDE or a powerful editor -- The send to console functionality -- The efficient write-execute loop -- Executing R code in non-interactive sessions -- How to use this book -- Tracking state with symbols and variables -- Working with data types and data structures -- Numerics -- Special values -- Characters -- Logicals -- Vectors -- Factors -- Matrices -- Lists -- Data frames -- Divide and conquer with functions -- Optional arguments -- Functions as arguments -- Operators are functions -- Coercion -- Complex logic with control structures -- If... else conditionals -- For loops -- While loops -- The examples in this book -- Summary -- Chapter 2: Understanding Votes with Descriptive Statistics -- This chapter's required packages -- The Brexit votes example -- Cleaning and setting up the data -- Summarizing the data into a data frame -- Getting intuition with graphs and correlations -- Visualizing variable distributions -- Using matrix scatter plots for a quick overview -- Getting a better look with detailed scatter plots -- Understanding interactions with correlations -- Creating a new dataset with what we've learned -- Building new variables with principal components -- Putting it all together into high-quality code -- Planning before programming -- Understanding the fundamentals of high-quality code…”
    Libro electrónico
  13. 4373
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Approaching a Penetration Test Using Metasploit -- Organizing a penetration test -- Preinteractions -- Intelligence gathering/reconnaissance phase -- Threat modeling -- Vulnerability analysis -- Exploitation and post-exploitation -- Reporting -- Mounting the environment -- Setting up Kali Linux in a virtual environment -- The fundamentals of Metasploit -- Conducting a penetration test with Metasploit -- Recalling the basics of Metasploit -- Benefits of penetration testing using Metasploit -- Open source -- Support for testing large networks and natural naming conventions -- Smart payload generation and switching mechanism -- Cleaner exits -- The GUI environment -- Case study - diving deep into an unknown network -- Gathering intelligence -- Using databases in Metasploit -- Modeling threats -- Vulnerability analysis - arbitrary file upload (unauthenticated) -- Attacking mechanism on the PhpCollab 2.5.1 application -- Exploitation and gaining access -- Escalating privileges with local root exploits -- Maintaining access with Metasploit -- Post-exploitation and pivoting -- Vulnerability analysis - SEH based buffer overflow -- Exploiting human errors by compromising Password Managers -- Revisiting the case study -- Revising the approach -- Summary and exercises -- Chapter 2: Reinventing Metasploit -- Ruby - the heart of Metasploit -- Creating your first Ruby program -- Interacting with the Ruby shell -- Defining methods in the shell -- Variables and data types in Ruby -- Working with strings -- Concatenating strings -- The substring function -- The split function -- Numbers and conversions in Ruby -- Conversions in Ruby -- Ranges in Ruby -- Arrays in Ruby -- Methods in Ruby -- Decision-making operators -- Loops in Ruby…”
    Libro electrónico
  14. 4374
    Publicado 2017
    Tabla de Contenidos: “…Commands for Cleaning Up -- clean -- gc -- notes -- Advanced Topics -- filter-branch -- rev-list -- bisect -- rerere -- Summary -- About Connected Lab 7: Deleting, Renaming, and Stashing -- Connected Lab 7 Deleting, Renaming, and Stashing -- Prerequisites -- Steps -- Chapter 12: Understanding Remotes-Branches and Operations -- Remotes -- Remote Access Protocols -- The Remote Command -- How Git Interacts with the Remote Environment -- Remote Tracking Branches -- Git Clone -- Viewing Information about Remote Branches -- Push -- Fetch -- Pull -- Summary -- About Connected Lab 8: Setting Up a GitHub Account and Cloning a Repository -- Connected Lab 8 Setting up a Github Account and Cloning a Repository -- Prerequisites -- Steps -- Chapter 13: Understanding Remotes-Workflows for Changes -- The Basic Conflict and Merge Resolution Workflow in Git -- How the Remote Side Handles Conflicts -- Hosted Repositories -- Models for Collaboration with Git -- Putting It All Together -- Summary -- About Connected Lab 9: Using the Overall Workflow with a Remote Repository -- Connected Lab 9 Using The Overall Workflow with a Remote Repository -- Prerequisites -- Steps -- Chapter 14: Working with Trees and Modules in Git -- Worktrees -- Adding a Worktree -- Listing Out the Working Trees -- Pruning a Worktree -- Submodules -- Understanding How Submodules Work -- Adding a Submodule -- Determining Submodule Status -- Processing Multiple Submodules -- Updating Submodules from Their Remotes -- Viewing Submodule Differences -- Superproject versus Submodules -- The Problem with Submodules -- Updating the Submodule References -- Updating Submodules When the Superproject Is Updated -- Pushing Changes from Submodules -- Submodules and Merging -- Unregistering a Submodule -- Subtrees -- Adding a Project as a Subtree -- Updating a Subtree -- Using the Subtree Split Functionality…”
    Libro electrónico
  15. 4375
    Publicado 2022
    Tabla de Contenidos: “…-- Space-Truckers: The Video Game Design -- Landing -- Splash Screen -- Menus -- Route Planning -- Driving and Scoring -- Space-Truckers: The Repository -- Summary -- Chapter 2: Ramping up on Babylon.js -- Technical Requirements -- Catching up or Refreshing on Babylon.js -- The Basics of BJS -- Get Started with Getting Started -- Tools for the Toolbox -- The Asset Types of BJS -- Building the Playground Scene -- Establishing the AppStartScene -- Animating the Orbits -- Putting Spin on the Star and Planets -- Making Orbital Motion -- Orbit Lines -- Shining up with GlowLayer -- Extended Topics -- Summary -- Further Reading -- Chapter 3: Establishing the Development Workflow -- Technical Requirements -- A Note for TypeScript Users -- Setting up the Environment -- Preparatory Steps -- Initialize All the Things -- Scripts and ESLint Configuration -- Configuring Webpack -- Crafting a PG Snippet -- Cleaning up the BABYLON Namespace Prefix -- Extracting Magic Strings -- Transitioning from the PG to the Application -- Creating the Engine Instance -- Adding and Importing the StartScene -- Exporting and Importing the Start Scene -- Constructing the Landing Page -- The Concept (Art) -- Sticking the Landing -- Summary -- Extended Topics -- Chapter 4: Creating the Application -- Technical Requirements -- Adding a Custom Loading UI -- Solo Exercise: Refactoring the StartScene to Extract the AstroFactory -- The CustomLoadingScreen Type -- Enhancing the Loading Screen with Progress Display -- Space-Truckers: The State Machine -- Logging Interlude…”
    Libro electrónico
  16. 4376
    Publicado 2022
    Tabla de Contenidos: “…3.3.2 Weighing words with inverse document frequency -- 3.4 Practical use of the search algorithm -- 3.4.1 Retrieval of the most similar documents -- 3.4.2 Evaluation of the results -- 3.4.3 Deploying search algorithm in practice -- Summary -- Solutions to miscellaneous exercises -- 4 Information extraction -- 4.1 Use cases -- 4.1.1 Case 1 -- 4.1.2 Case 2 -- 4.1.3 Case 3 -- 4.2 Understanding the task -- 4.3 Detecting word types with part-of-speech tagging -- 4.3.1 Understanding word types -- 4.3.2 Part-of-speech tagging with spaCy -- 4.4 Understanding sentence structure with syntactic parsing -- 4.4.1 Why sentence structure is important -- 4.4.2 Dependency parsing with spaCy -- 4.5 Building your own information extraction algorithm -- Summary -- Solutions to miscellaneous exercises -- 5 Author profiling as a machine-learning task -- 5.1 Understanding the task -- 5.1.1 Case 1: Authorship attribution -- 5.1.2 Case 2: User profiling -- 5.2 Machine-learning pipeline at first glance -- 5.2.1 Original data -- 5.2.2 Testing generalization behavior -- 5.2.3 Setting up the benchmark -- 5.3 A closer look at the machine-learning pipeline -- 5.3.1 Decision Trees classifier basics -- 5.3.2 Evaluating which tree is better using node impurity -- 5.3.3 Selection of the best split in Decision Trees -- 5.3.4 Decision Trees on language data -- Summary -- Solutions to miscellaneous exercises -- 6 Linguistic feature engineering for author profiling -- 6.1 Another close look at the machine-learning pipeline -- 6.1.1 Evaluating the performance of your classifier -- 6.1.2 Further evaluation measures -- 6.2 Feature engineering for authorship attribution -- 6.2.1 Word and sentence length statistics as features -- 6.2.2 Counts of stopwords and proportion of stopwords as features -- 6.2.3 Distributions of parts of speech as features…”
    Libro electrónico
  17. 4377
    Publicado 2023
    Tabla de Contenidos: “…features you can use in your component -- Adding an ACL to our component -- Setting up Joomla! user groups and viewing access levels -- Adding the permissions configuration -- Honoring the permissions in our extensions -- Defining custom actions for our component -- Using Joomla! …”
    Libro electrónico
  18. 4378
    Publicado 2024
    Tabla de Contenidos: “…-- Programming languages - a choice to make -- Now what? -- Setting up your development environment -- Chapter 1: The One with the Low-Level Secrets -- Technical requirements -- What are low-level APIs, and how do they differ from higher-level abstractions? …”
    Libro electrónico
  19. 4379
    por Tsuji, Koichi
    Publicado 2023
    Tabla de Contenidos: “…-- Steps for a Task or Data change action -- Adding a new step to a Process -- Setting up a task in a Step -- Data change actions -- Learning about Bot setup through a practical example…”
    Libro electrónico
  20. 4380
    Publicado 2018
    Tabla de Contenidos: “…Types Of Malware Analysis -- 5. Setting Up The Lab Environment -- 5.1 Lab Requirements -- 5.2 Overview Of Lab Architecture -- 5.3 Setting Up And Configuring Linux VM -- 5.4 Setting Up And Configuring Windows VM -- 6. …”
    Libro electrónico