Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,716
- Application software 1,430
- Engineering & Applied Sciences 1,425
- Management 1,220
- Computer Science 958
- Computer programs 908
- Computer networks 883
- Data processing 880
- Computer software 661
- Security measures 654
- Design 634
- Computer security 607
- Artificial intelligence 591
- Cloud computing 591
- Web sites 554
- Operating systems (Computers) 548
- Python (Computer program language) 545
- Web site development 514
- Database management 496
- Examinations 492
- Programming 490
- Computer programming 485
- Computer graphics 463
- Digital techniques 448
- Photography 436
- Java (Computer program language) 412
- Business & Economics 395
- Electrical & Computer Engineering 395
- Information technology 388
- Certification 372
-
2361Publicado 2023Libro electrónico
-
2362Publicado 2022Capítulo
-
2363Publicado 2023“…Are there aspects about the process that are hiding beneath the surface, unknown to even experienced negotiators? Or insider tools that would change your game considerably? The answer is yes-and they're all revealed in this practical guide from a world-renowned negotiation expert. …”
Grabación no musical -
2364Publicado 2024Libro electrónico
-
2365
-
2366Publicado 2022Tabla de Contenidos: “…A combined diamond model and kill chain intrusion analysis -- Attribution -- Summary -- Questions -- Part 2: Evidence Acquisition -- Chapter 5: Collecting Network Evidence -- An overview of network evidence -- Preparation -- A network diagram -- Configuration -- Firewalls and proxy logs -- Firewalls -- Web application firewalls -- Web proxy servers -- NetFlow -- Packet capture -- tcpdump -- WinPcap and RawCap -- Wireshark -- Evidence collection -- Summary -- Questions -- Further reading -- Chapter 6: Acquiring Host-Based Evidence -- Preparation -- Order of volatility -- Evidence acquisition -- Evidence collection procedures -- Acquiring volatile memory -- FTK Imager -- WinPmem -- RAM Capturer -- Virtual systems -- Acquiring non-volatile evidence -- FTK obtaining protected files -- The CyLR response tool -- Kroll Artifact Parser and Extractor -- Summary -- Questions -- Further reading -- Chapter 7: Remote Evidence Collection -- Enterprise incident response challenges -- Endpoint detection and response -- Velociraptor overview and deployment -- Velociraptor server -- Velociraptor Windows collector -- Velociraptor scenarios -- Velociraptor evidence collection -- CyLR -- WinPmem -- Summary -- Questions -- Chapter 8: Forensic Imaging -- Understanding forensic imaging -- Image versus copy -- Logical versus physical volumes -- Types of image files -- SSD versus HDD -- Tools for imaging -- Preparing a staging drive -- Using write blockers -- Imaging techniques -- Dead imaging -- Live imaging -- Virtual systems -- Linux imaging -- Summary -- Questions -- Further reading -- Part 3: Evidence Analysis -- Chapter 9: Analyzing Network Evidence -- Network evidence overview -- Analyzing firewall and proxy logs -- SIEM tools -- The Elastic Stack -- Analyzing NetFlow -- Analyzing packet captures -- Command-line tools -- Real Intelligence Threat Analytics…”
Libro electrónico -
2367Publicado 2012Libro electrónico
-
2368Publicado 2014“…DH-CASE II : Collaborative Annotations in Shared Environments: metadata, tools and techniques in the digital humanities : Fort Collins, CA, USA, September 16, 2014…”
Libro electrónico -
2369
-
2370
-
2371
-
2372
-
2373
-
2374
-
2375
-
2376Publicado 1990Tabla de Contenidos: “…Hannigan -- Refugees from the national myth : the English Catholic odyssey / Roger O'Toole -- The quandary of dissent on the Catholic right / William D. …”
Libro -
2377
-
2378
-
2379Publicado 1989Red de bibliotecas Iglesia Navarra (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro
-
2380