Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 616
- Historia 581
- Development 437
- Social aspects 425
- Application software 372
- Management 322
- RELIGION 247
- Computer networks 241
- Social conditions 238
- Filosofía 224
- Leadership 219
- Engineering & Applied Sciences 214
- Psychological aspects 189
- Examinations 182
- Business & Economics 179
- Operating systems (Computers) 178
- Computer security 168
- Cloud computing 163
- Security measures 162
- Artificial intelligence 158
- Certification 158
- Economic conditions 156
- Design 155
- Philosophy 153
- History and criticism 148
- Crítica e interpretación 147
- Aspectos sociales 141
- Computer software 138
- Computer programs 137
- Psychology 136
-
11161por Daniel, LarryTabla de Contenidos: “…; 4.3 Summary of Best Practices; 4.3.1 Volatile data and live forensics; 4.3.2 Preservation best practices; 4.3.3 Acquisition best practices; 4.4 What Really Happens in Many Cases; Summary; 5 Overview of Digital Forensics Tools; Introduction; 5.1 What Makes a Tool Forensically Sound?…”
Publicado 2011
Libro electrónico -
11162Publicado 2010“…Matchmoving has become a standard visual effects procedure for almost every situation where live action materials and CG get combined. It allows virtual and real scenes that have been composited together to seamlessly appear as though they are from the same perspective. …”
Libro electrónico -
11163por Schoonhoven, DaanTabla de Contenidos: “…-- 2.4.2 Makroschlitten -- 2.4.3 Live-View -- 2.4.4 Abstützen -- 2.4.5 Bohnensack -- 2.4.6 Stativ -- 2.4.7 Stativkopf -- 2.4.8 Schnellkupplung -- Tiefe Kamerastandpunkte -- Abstützen oder nicht? …”
Publicado 2022
Libro electrónico -
11164Publicado 2012Tabla de Contenidos: “…35 Small economies won't make you wealthy but they will make you miserable -- 36 Real wealth comes from deals not fees -- 37 Understand that working for others won't necessarily make you rich - but it might -- 38 Don't waste time procrastinating - make money decisions quickly -- 39 Work as if you didn't need the money -- 40 Spend less than you earn -- 41 Don't borrow money - unless you really, really have to -- 42 Consider consolidating debts -- 43 Cultivate a skill and it'll repay you over and over again -- 44 Pay off your loans and debts as a priority -- 45 Don't be too busy earning a living to make some money -- 46 Save in big chunks - or should you? …”
Libro electrónico -
11165por Klein, Tobias“…Whether by browsing source code, poring over disassembly, or fuzzing live programs, readers get an over-the-shoulder glimpse into the world of a bug hunter as Klein unearths security flaws and uses them to take control of affected systems. …”
Publicado 2011
Libro electrónico -
11166Publicado 2018Tabla de Contenidos: “…-- Open Source Licensing -- Legal Issues -- Alternatives to Linux -- FreeRTOS -- MicroC/OS -- Resources -- 2 Installing linux -- Distributions -- Linux Mint -- Debian GNU/Linux -- Ubuntu -- Red Hat Enterprise Linux -- Fedora -- CentOS -- SUSE -- Hardware Requirements -- Installation Scenarios -- Stand-Alone -- Dual-Booting -- Virtualization -- Installing VirtualBox -- DVD or Live CD? -- Installation Process -- Resources -- 3 Introducing linux -- Running Linux-KDE -- File Manager -- Shell Window -- Linux Features -- Protected Mode Architecture -- Real Mode -- Protected Mode -- "Flat" Versus Segmented Memory Models -- Paging -- 64-Bit Paging -- The Linux Process Model -- The Fork() Function -- The Execve() Function -- The Linux File System -- File Permissions -- The "Root" User -- The /Proc File System -- The Filesystem Hierarchy Standard -- The /usr hierarchy -- "Mounting" File Systems -- System Configuration -- The Shell -- Getting Help -- Resources -- 4 The host development environment -- Cross-Development Tools: the GNU Tool Chain -- Gnu Compiler Collection -- Make -- Gnu DeBugger -- Getting and Installing the Software -- Install Cross-Tool Chain -- The Terminal Emulator, minicom -- Networking -- Network Address -- What About Wireless? …”
Libro electrónico -
11167Publicado 2019Tabla de Contenidos: “…-- About this book -- RxJava 2 and Android -- Setting up the Android environment -- Java 8 lambdas -- Deep dive into Rx: Live search -- Conditions for triggering search -- Project setup -- Text input as an emitter of data -- The publish-subscribe pattern -- Text input as an observable -- Filtering observables -- Bending time -- Bending time to your benefit -- Debounce: The bus stop operator -- Putting your code into Android -- Coffee break -- Principles of reactive programming -- Events and marble diagrams -- Summary -- Chapter 2. …”
Libro electrónico -
11168Publicado 2019Tabla de Contenidos: “…Intro -- Titlepage -- Copyright -- Dedication -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- about the author -- about the cover illustration -- Part 1: The building blocks of scalable computing -- Chapter 1: Why scalable computing matters -- 1.1 Why Dask? …”
Libro electrónico -
11169Publicado 2020Tabla de Contenidos: “…Intro -- Elm in Action -- Copyright -- Dedication -- Brief Table of Contents -- Table of Contents -- front matter -- Preface -- Acknowledgments -- About this book -- Who should read this book -- How this book is organized: a roadmap -- About the code -- liveBook discussion forum -- Other online resources -- About the author -- About the cover illustration -- Turkey/Ottoman Empire collection -- Part 1. …”
Libro electrónico -
11170Publicado 2020Tabla de Contenidos: “…Intro -- Copyright -- contents -- dedication -- preface -- Our obsession with technology and automation -- Ethics, legal matters, and our responsibility -- Intention and impact: Understanding your vision and goals -- Unintended use: Protecting against malicious use -- Unintended bias: Building solutions for everyone -- The law, privacy, and consent: Knowing the importance of core values -- Singularity: Exploring the unknown -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A roadmap -- About the Code -- liveBook discussion forum -- Other online resources -- about the author -- 1 Intuition of artificial intelligence -- What is artificial intelligence? …”
Libro electrónico -
11171Ubuntu 22.04 Schnelleinstieg Der einfache Einstieg in die Linux-Welt. Inkl. Ubuntu 22.04 LTS auf DVDpor Gödl, Robert“…Sie lernen die verschiedenen Installationsm̲glichkeiten von Ubuntu kennen (Live-Version, Festinstallation, Ubuntu als einziges oder als zweites Betriebssystem parallel zu Windows). …”
Publicado 2022
Libro electrónico -
11172Publicado 2024Tabla de Contenidos: “…Microsoft 365's Security and Compliance Center (Microsoft Purview) -- Google Workspace Admin console and security features -- Summary -- Further reading -- Part 3: Cloud Forensic Analysis - Responding to an Incident in the Cloud -- Chapter 8: The Digital Forensics and Incident Response Process -- The basics of the incident response process -- Tools and techniques for digital forensic investigations -- Prerequisites -- Cloud host forensics -- Memory forensics -- Live forensic analysis and threat hunting -- EDR-based threat hunting -- Hunting for malware -- Common persistence mechanisms -- Network forensics -- Basic networking concepts -- Cloud network forensics - log sources and tools -- Network investigation tools -- Malware investigations -- Setting up your malware analysis lab -- Working with packed malware -- Binary comparison -- Traditional forensics versus cloud forensics -- Summary -- Further reading -- Chapter 9: Common Attack Vectors and TTPs -- MITRE ATT& -- CK framework -- Forensic triage collections -- Host-based forensics -- Evidence of intrusion -- Prefetch analysis -- AmCache analysis -- ShimCache analysis -- Windows Event Logs -- Analyzing memory dumps -- Misconfigured virtual machine instances -- Unnecessary ports left open -- Default credentials left unchanged -- Outdated or unpatched software -- Publicly exposed sensitive data (or metadata) -- Misconfigured storage buckets -- Public permissions -- Exposed API keys or credentials -- Improper use of IAM policies -- Cloud administrator portal breach -- Summary -- Further reading -- Chapter 10: Cloud Evidence Acquisition -- Forensic acquisition of AWS instance -- Step 1 - creating EC2 volume snapshots -- Step 2 - acquiring OS memory images -- Step 3 - creating a forensic collector instance -- Step 4 - creating and attaching infected volume from snapshots…”
Libro electrónico -
11173Publicado 2023“…This introductory textbook is written for mathematics students interested in physics and physics students interested in exact mathematical formulations (or for anyone with a scientific mind who is curious to know more of the world we live in), recent remarkable experimental and observational results which confirm the theory are clearly described and no specialised physics knowledge is required…”
Libro electrónico -
11174por Knapp, Eric D.Tabla de Contenidos: “…Scanning of industrial networks -- Device scanners -- Vulnerability scanners -- Traffic scanners -- Live host identification -- "Quiet"/"friendly" scanning techniques -- Potentially "noisy"/"dangerous" scanning techniques -- Port mirroring and span ports -- Command line tools -- Hardware and software inventory -- Data flow analysis -- Threat identification -- Threat actors/sources -- Threat vectors -- Threat events -- Identification of threats during security assessments -- Vulnerability identification -- Vulnerability scanning -- Configuration auditing -- Vulnerability prioritization -- Common vulnerability scoring system -- Process vulnerabilities -- Risk classification and ranking -- Consequences and impact -- How to estimate consequences and likelihood? …”
Publicado 2024
Libro electrónico -
11175por Cossin, DidierTabla de Contenidos: “…Preventing Injustice: Broaden the Notion of Conflict of Interest -- Preventing Lax Oversight: Build Appropriate Frameworks -- Preventing Toxic Behaviours: Create a Positive Culture -- Strengthen Board Oversight Expertise with Special Focus on Legal, Compliance, Risk, Fraud, and Financial Reporting -- Tools for Anti-fraud Activities: Assessment, Prevention, Detection, and Investigation -- Assessment -- Prevention -- Detection -- Investigation -- Part III Board Leadership -- Joanne Marker and Board Values at Comfre -- Chapter 15 Board Leadership and Values -- Quality Boards Live and Breathe Integrity -- Which and Whose Values? …”
Publicado 2024
Libro electrónico -
11176Publicado 2019Tabla de Contenidos: “…The Right Time for Motherhood -- 3.1.1. Living a 'Life Unexpected' -- 3.2. Perceptions and Representations of Older Motherhood -- 3.3. …”
Libro electrónico -
11177Publicado 2021Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Preface -- Chapter 1: Web Development -- Machine Learning Overview -- Web Communication -- Organizing the Web with HTML -- Web Development Using IDEs/Editors -- Building Blocks of Web Development -- HTML and CSS Programming -- Dynamic HTML -- Cascading Style Sheets -- Inline Style Sheets -- Embedded Style Sheets -- External Style Sheets -- JavaScript Basics -- Including the JavaScript -- Where to Insert JS Scripts -- JavaScript for an Event-Driven Process -- Document Object Model Manipulation -- Introduction to jQuery -- Summary -- References -- Chapter 2: Browser-Based Data Processing -- JavaScript Libraries and API for ML on the Web -- W3C WebML CG (Community Group) -- Manipulating HTML Elements Using JS Libraries -- p5.js -- Drawing Graphical Objects -- Manipulating DOM Objects -- DOM onEvent(mousePressed) Handling -- Multiple DOM Objects onEvent Handling -- HTML Interactive Elements -- Interaction with HTML and CSS Elements -- Hierarchical (Parent-Child) Interaction of DOM Elements -- Accessing DOM Parent-Child Elements Using Variables -- Graphics and Interactive Processing in the Browser Using p5.js -- Interactive Graphics Application -- Object Instance, Storage of Multiple Values, and Loop Through Object -- Getting Started with Machine Learning in the Browser Using ml5.js and p5.js -- Design, Develop, and Execute Programs Locally -- Method 1: Using Python - HTTP Server -- Method 2: Using Visual Studio Code Editor with Node.js Live Server -- Summary -- References -- Chapter 3: Human Pose Estimation in the Browser -- Human Pose at a Glance -- PoseNet vs. …”
Libro electrónico -
11178Publicado 2021Tabla de Contenidos: “…Legal and procurement -- Action points -- Chapter 6: Risk characterisation -- Living with risk -- Understanding project materiality -- Completion of the BCMR form -- BCMR - Seven headings for review -- 1. …”
Libro electrónico -
11179Publicado 2021Tabla de Contenidos: “…Intro -- Contents -- Illustrations -- Acknowledgments -- Chapter 1 Learning About Campus Life from Black Engineering Majors -- Studying Black Campus Life through Social Worlds -- Racial Realities on Campus -- Examining Two Crises -- Project Description -- Studying Black Student Life -- Thinking with Theories -- Using Pierre Bourdieu's Theory of Practice -- Critical Race Theory -- Making Black Lives Matter in Research -- The Organization of Black Campus Life -- Chapter 2 Understanding the Past and Present of West Side University -- Campus Life and Shifting Campus Color Lines -- The History of Caldwell School of Engineering -- When WSU Engineers Were White and Asian Men -- The Short History of Black People in Engineering at WSU -- Diversity and Caldwell -- Introducing Four Social Worlds and Four Students -- The Black WSU Social World -- The Black Engineering Social World -- The Engineering School Social World -- The Mainstream WSU Social World -- The Black Community -- Chapter 3 The Time and Space to Engage in the Black Community -- Black Places on Campus -- The Black Community and a Sense of Place -- The Stoop -- Engaging in the Black Community -- Tensions between Collective and Individual Interests -- The Midnight Brunch -- The Black Community Social World: In Summary -- Centering Black Campus Communities -- Chapter 4 Johnson's Story -- The Black Community -- The Black Engineering Community -- The Engineering School Community -- The Mainstream WSU Community -- The Black Engineering Community -- Chapter 5 Examining NSBE: How Black Engineers Do It for the Culture -- The NSBE Community at a Glance -- NSBE Structure -- Tension between the Engagement and Burdens of Being an NSBE Member -- The Potential Burdens -- Tension between Strategic Essentialism and Antiessentialism -- Tension between a Family Focus and an Engineering Career Focus -- Brown Sugar. -- The Black Engineering Social World: In Summary -- Chapter 6 Jasmine's Story -- The Black Engineering Community -- The Black Community -- The Engineering School Community -- The Mainstream WSU Community -- The Engineering School Community -- Chapter 7 Organizational Involvement: Diversity Dilution and Antiblackness -- Caldwell at a Glance -- Different Majors, Different Experiences -- The Caldwell Racial Climate -- The Tension between Diversity and Invisibility -- Experiencing Hypervisibility -- Experiencing Institutional Invisibility -- The Multicultural Engineering Office and Diversity Dilution -- The Tension between Membership in NSBE and Other Engineering Organizations -- Identity‐based Engineering Organizations -- NSBE and SWE -- NSBE and SHPE -- Engineering Societies -- Caldwell Organizational Involvement: In Summary -- Chapter 8 Informal Relationships: The (Im)Possibility of Peer Collaboration -- The Tension between Group Work and Being the Only One -- The Importance of Groups -- Forming Study Groups and Working Alone -- Cheating and Collaboration in Caldwell -- Tension between Expecting and Experiencing Racism -- Study Days -- The Caldwell Social World: In Summary -- The Boundary of Antiblackness -- Chapter 9 Nina's Story -- The Engineering School and Black Engineering Community -- The Black Community -- The Mainstream WSU Community -- Chapter 10 Negotiating Racism: Is Mainstream Campus Life for White Students? …”
Libro electrónico -
11180Publicado 2025Tabla de Contenidos: “…Refresher Connection: Costs of Sales Revenue, Inventory, Accounts Payable, and Other Expenses -- Accounting Policies and Procedures Summary -- Let's Crunch Some Numbers -- Inventory Control and Management -- Accounting Issues -- Chapter 8 Long-Term Assets, Useful Lives, and Non-cash Expenses -- Intangible Assets Basics -- Refresher Connection: Long-Term Capital Assets and Depreciation and Amortization Expense -- Accounting Policies and Procedures Summary -- Let's Crunch Some Numbers -- Accounting Issues -- Chapter 9 Other Current Liabilities: A Breeding Ground for Abuse -- Refresher Connection: Accrued Liabilities, Other Current Liabilities, Sales Revenue, and Expenses -- Accounting Policies and Procedures Summary -- Let's Crunch Some Numbers -- Accounting Issues -- Chapter 10 Bringing It All Togetherwith Cash -- Accounting Adjustment Cheat Sheet -- Comparing the Income Statements -- Comparing the Balance Sheets and Statements of Cash Flow -- History, Cash, and Artistry -- Part Three Financial Analysis and Bonus Material -- Chapter 11 Financial Statement Ratios and Analysis: Strength -- Financial Reporting Ground Rules -- Financial Statement Preliminaries -- Benchmark Financial Ratios: Strength -- Final Comments -- Chapter 12 Financial Statement Ratios and Analysis: Performance -- Financial Performance versus Financial Strength -- Two Cash Flow Ratios to Chew On -- Chapter 13 How to Manufacture Cash from the Balance Sheet -- When Capital Markets Turn Hostile -- Crunching the Numbers: Let's Visualize SEB's Efforts -- PEB's Unintended Consequences -- Raising Cash Quickly, Not for the Faint of Heart -- Chapter 14 Net Profits and Cash Flow: Real or Imaginary -- Fixed, Variable, and Semi-Variable Expenses -- Generating Real Profits -- Manufacturing Imaginary Profits -- Cash Flow as Our Validation -- Chapter 15 Deciphering the Cap Table and Cap Stack…”
Libro electrónico