Mostrando 6,701 - 6,720 Resultados de 9,070 Para Buscar '"Windows"', tiempo de consulta: 0.13s Limitar resultados
  1. 6701
    Publicado 2015
    Tabla de Contenidos: “…Front Cover; Contents; To the Reader; Editor; Contributors; Chapter 1: Biological Windows : A Tribute to Ross Adey; Chapter 2: Replication and Extension of Adey Group's Calcium Efflux Results; Chapter 3: Benefit and Hazard of Electromagnetic Fields; Chapter 4: Pulsed Electromagnetic Fields : From Signaling to Healing; Chapter 5: Biophysical Mechanisms for Nonthermal Microwave Effects; Chapter 6: Engineering Problems in Bioelectromagnetics; Chapter 7: Signal Design : Step by Step; Chapter 8: Magnetic Field Influences on the Microcirculation…”
    Libro electrónico
  2. 6702
    Publicado 2022
    Tabla de Contenidos: “…Like a Brick through the Overton Window: Re-orienting Our Politics, From the House of Commons to the Tiny House Phil Henderson; 15. …”
    Libro electrónico
  3. 6703
    Publicado 2024
    Tabla de Contenidos: “…Low -- Chapter 10 The Foggy Window: Passive empathy and the fight for testimonial reading in neoliberal higher education -- Chapter 11 Performing empathy with neoliberalism, or Kendall Jenneron the streets, Thomas Gradgrind in the sheets: a response to Lauren Weber -- Chapter 12 Understanding higher education enrolment through Michel Foucault’s biopolitics -- Chapter 13 Students, biopolitics, and state racism: a response to Ren-Hao Xu -- Chapter 14 Wrestling with monsters: critique, climate change, and comets -- Chapter 15 Still wrestling with monsters: a response to Pat Norman -- Chapter 16 Dialogues between activist knowledge and Southern Theory -- Chapter 17 Approximate Geographies: a response to José Fernando Serrano Amaya -- Chapter 18 The historian as pedagogue: on Hayden White’s practical past -- Chapter 19 What stories to tell: a response to Remy Low -- Chapter 20 The good university? …”
    Libro electrónico
  4. 6704
    por Marco Gomez, Jordi
    Publicado 2006
    Tabla de Contenidos: “…Aula politècnica/informàtica 126 ; Página legal; Continguts; Introducció; Sessió1; 1.1 Objectius; 1.2 Continguts; 1.3 Temporització; 1.4 Explicacions prèvies; 1.4.1 Introducció al sistema operatiu Windows; 1.4.2 Resum del sistema operatiu Windows; 1.4.3 Introducció a Eclipse; 1.4.4 Estructura general d'un programa en C++; 1.5 Guió de la sessió; 1.5.1 Primers passos amb Eclipse; 1.5.2 Creació i execució d'un programa; 1.5.3 El depurador; 1.5.4 Programes d'exemple; 1.5.5 Segona part: programes per completar…”
    Libro electrónico
  5. 6705
    Publicado 2017
    Tabla de Contenidos: “…3 Handling Evidence 4 Cryptographic Hashes 5 Chain of Custody 8 Incident Response 8 The Need for Network Forensic Practitioners 10 Summary 11 References 12 2 Networking Basics 13 Protocols 14 Open Systems Interconnection (OSI) Model 16 TCP/IP Protocol Suite 18 Protocol Data Units 19 Request for Comments 20 Internet Registries 23 Internet Protocol and Addressing 25 Internet Protocol Addresses 28 Internet Control Message Protocol (ICMP) 31 Internet Protocol Version 6 (IPv6) 31 Transmission Control Protocol (TCP) 33 Connection-Oriented Transport 36 User Datagram Protocol (UDP) 38 Connectionless Transport 39 Ports 40 Domain Name System 42 Support Protocols (DHCP) 46 Support Protocols (ARP) 48 Summary 49 References 51 3 Host-Side Artifacts 53 Services 54 Connections 60 Tools 62 netstat 63 nbstat 66 ifconfi g/ipconfi g 68 Sysinternals 69 ntop 73 Task Manager/Resource Monitor 75 ARP 77 /proc Filesystem 78 Summary 79 4 Packet Capture and Analysis 81 Capturing Packets 82 Tcpdump/Tshark 84 Wireshark 89 Taps 91 Port Spanning 93 ARP Spoofi ng 94 Passive Scanning 96 Packet Analysis with Wireshark 98 Packet Decoding 98 Filtering 101 Statistics 102 Following Streams 105 Gathering Files 106 Network Miner 108 Summary 110 5 Attack Types 113 Denial of Service Attacks 114 SYN Floods 115 Malformed Packets 118 UDP Floods 122 Amplifi cation Attacks 124 Distributed Attacks 126 Backscatter 128 Vulnerability Exploits 130 Insider Threats 132 Evasion 134 Application Attacks 136 Summary 140 6 Location Awareness 143 Time Zones 144 Using whois 147 Traceroute 150 Geolocation 153 Location-Based Services 156 WiFi Positioning 157 Summary 158 7 Preparing for Attacks 159 NetFlow 160 Logging 165 Syslog 166 Windows Event Logs 171 Firewall Logs 173 Router and Switch Logs 177 Log Servers and Monitors 178 Antivirus 180 Incident Response Preparation 181 Google Rapid Response 182 Commercial Offerings 182 Security Information and Event Management 183 Summary 185 8 Intrusion Detection Systems 187 Detection Styles 188 Signature-Based 188 Heuristic 189 Host-Based versus Network-Based 190 Snort 191 Suricata and Sagan 201 Bro 203 Tripwire 205 OSSEC 206 Architecture 206 Alerting 207 Summary 208 9 Using Firewall and Application Logs 211 Syslog 212 Centralized Logging 216 Reading Log Messages 220 LogWatch 222 Event Viewer 224 Querying Event Logs 227 Clearing Event Logs 231 Firewall Logs 233 Proxy Logs 236 Web Application Firewall Logs 238 Common Log Format 240 Summary 243 10 Correlating Attacks 245 Time Synchronization 246 Time Zones 246 Network Time Protocol 247 Packet Capture Times 249 Log Aggregation and Management 251 Windows Event Forwarding 251 Syslog 252 Log Management Offerings 254 Timelines 257 Plaso 258 PacketTotal 259 Wireshark 261 Security Information and Event Management 262 Summary 263 11 Network Scanning 265 Port Scanning 266 Operating System Analysis 271 Scripts 273 Banner Grabbing 275 Ping Sweeps 278 Vulnerability Scanning 280 Port Knocking 285 Tunneling 286 Passive Data Gathering 287 Summary 289 12 Final Considerations 291 Encryption 292 Keys 293 Symmetric 294 Asymmetric 295 Hybrid 296 SSL/TLS 297 Cloud Computing 306 Infrastructure as a Service 306 Storage as a Service 309 Software as a Service 310 Other Factors 311 The Onion Router (TOR) 314 Summary 317 Index 319.…”
    Libro electrónico
  6. 6706
    por Zwicky, Elizabeth D.
    Publicado 2000
    Tabla de Contenidos: “…Remote Graphic Interfaces for Microsoft Operating Systems; 2.5.3. Network Window Systems…”
    Libro electrónico
  7. 6707
    por Charnes, John
    Publicado 2012
    Tabla de Contenidos: “…Financial Modeling with Crystal Ball and Excel; Contents; Preface; Acknowledgments; About the Author; CHAPTER 1 Introduction; 1.1 FINANCIAL MODELING; 1.2 RISK ANALYSIS; 1.3 MONTE CARLO SIMULATION; 1.4 RISK MANAGEMENT; 1.5 BENEFITS AND LIMITATIONS OF USING CRYSTAL BALL; 1.5.1 Benefits; 1.5.2 Limitations; CHAPTER 2 Analyzing Crystal Ball Forecasts; 2.1 SIMULATING A 50-50 PORTFOLIO; 2.1.1 Accumulate.xls; 2.1.2 Frequency Chart; 2.1.3 Cumulative Frequency Chart; 2.1.4 Statistics View; 2.1.5 Forecast Window Percentiles View; 2.2 VARYING THE ALLOCATIONS; 2.2.1 Decision Table Tool; 2.2.2 Trend Chart…”
    Libro electrónico
  8. 6708
    por Neuburg, Matt
    Publicado 2013
    Tabla de Contenidos: “…II IDE -- 6.Anatomy of an Xcode Project -- New Project -- The Project Window -- The Navigator Pane -- The Utilities Pane -- The Editor -- The Project File and Its Dependents -- The Target -- Build Phases -- Build Settings -- Configurations -- Schemes and Destinations -- Renaming Parts of a Project -- From Project to Running App -- Build Settings -- Property List Settings -- Nib Files -- Additional Resources -- Code and the App Launch Process -- Frameworks and SDKs -- 7.Nib Management -- A Tour of the Nib Editor Interface -- The Document Outline -- Canvas -- Inspectors and Libraries -- Nib Loading -- Outlets and the Nib Owner -- Creating an Outlet -- Misconfiguring an Outlet -- Deleting an Outlet -- More Ways to Create Outlets -- Outlet Collections -- Action Connections -- Additional Initialization of Nib-Based Instances -- 8.Documentation -- The Documentation Window -- Class Documentation Pages -- Sample Code -- Other Resources -- Quick Help -- Symbols -- Header Files -- Internet Resources -- 9.Life Cycle of a Project -- Device Architecture and Conditional Code -- Version Control -- Editing Your Code -- Autocompletion -- Snippets -- Fix-it and Live Syntax Checking -- Navigating Your Code -- Running in the Simulator -- Debugging -- Caveman Debugging -- The Xcode Debugger -- Unit Testing -- Static Analyzer -- Clean -- Running on a Device -- Obtaining a Certificate -- Obtaining a Development Provisioning Profile -- Running the App -- Profile and Device Management -- Gauges and Instruments -- Localization -- Archiving and Distribution -- Ad Hoc Distribution -- Final App Preparations -- Icons in the App -- Other Icons -- Launch Images -- Screenshots -- Property List Settings -- Submission to the App Store -- pt. …”
    Libro electrónico
  9. 6709
    Publicado 2018
    Tabla de Contenidos: “…-- PostgreSQL 10.x and NoSQL -- PostgreSQL as HUB -- PostgreSQL tools -- PostgreSQL contrib -- Finding contrib modules on your system -- Installing a contrib module from source -- Using a contrib module -- pgFoundry -- PGXN -- Additional PostgreSQL-related software -- PostgreSQL application scaling life cycle -- Performance tuning as a practice -- Summary -- Chapter 2: Database Hardware -- Balancing hardware spending -- CPUs -- Memory -- Disks -- RAID -- Drive error handling -- Hard drive reliability studies -- Drive firmware and RAID -- SSDs -- Disk controllers -- Hardware and software RAID -- Recommended disk controllers -- Attached storage - SAN and NAS -- Reliable controller and disk setup -- Write-back caches -- Sources of write-back caching -- Disk controller monitoring -- Disabling drive write caches -- Performance impact of write-through caching -- Summary -- Chapter 3: Database Hardware Benchmarking -- CPU and memory benchmarking -- Memtest86+ -- STREAM memory testing -- STREAM and Intel versus AMD -- CPU benchmarking -- Sources of slow memory and processors -- Physical disk performance -- Random access and input/outputs per second -- Sequential access and ZCAV -- Short stroking -- Commit rate -- PostgreSQL test_fsync -- INSERT rate -- Windows commit rate -- Disk benchmarking tools -- HD Tune -- Short stroking tests -- IOPS -- Unpredictable performance and Windows…”
    Libro electrónico
  10. 6710
    Publicado 2010
    Tabla de Contenidos: “…Detect if Database Connection Is Available -- Automatically Map Data to Objects with the Entity Framework -- 14 XML -- Serialize an Object to and from XML -- Write XML from Scratch -- Read an XML File -- Validate an XML Document -- Query XML Using XPath -- Transform Database Data to XML -- Transform XML to HTML -- Part III: User Interaction -- 15 Delegates, Events, and Anonymous Methods -- Decide Which Method to Call at Runtime -- Subscribe to an Event -- Publish an Event -- Ensure UI Updates Occur on UI Thread -- Assign an Anonymous Method to a Delegate -- Use Anonymous Methods as Quick-and-Easy Event Handlers -- Take Advantage of Contravariance -- 16 Windows Forms -- Create Modal and Modeless Forms -- Add a Menu Bar -- Disable Menu Items Dynamically -- Add a Status Bar -- Add a Toolbar -- Create a Split Window Interface -- Inherit a Form -- Create a User Control -- Use a Timer -- Use Application and User Configuration Values -- Use ListView Efficiently in Virtual Mode -- Take Advantage of Horizontal Wheel Tilt -- Cut and Paste -- Automatically Ensure You Reset the Wait Cursor -- 17 Graphics with Windows Forms and GDI+ -- Understand Colors -- Use the System Color Picker -- Convert Colors Between RGB to HSV -- Draw Shapes -- Create Pens -- Create Custom Brushes -- Use Transformations -- Draw Text -- Draw Text Diagonally -- Draw Images -- Draw Transparent Images -- Draw to an Off-Screen Buffer -- Access a Bitmap's Pixels Directly for Performance -- Draw with Anti-Aliasing -- Draw Flicker-Free -- Resize an Image -- Create a Thumbnail of an Image -- Take a Multiscreen Capture -- Get the Distance from the Mouse Cursor to a Point -- Determine if a Point Is Inside a Rectangle -- Determine if a Point Is Inside a Circle -- Determine if a Point Is Inside an Ellipse -- Determine if Two Rectangles Intersect -- Print and Print Preview -- 18 WPF -- Show a Window…”
    Libro electrónico
  11. 6711
    por Roldan, Maria C.
    Publicado 2013
    Tabla de Contenidos: “…Time for action - avoiding errors while converting the estimated time from string to integer -- The error handling functionality -- Time for action - configuring the error handling to see the description of the errors -- Personalizing the error handling -- Summary -- Chapter 3: Manipulating Real-world Data -- Reading data from files -- Time for action - reading results of football matches from files -- Input files -- Input steps -- Reading several files at once -- Time for action - reading all your files at a time using a single text file input step -- Time for action - reading all your files at a time using a single text file input step and regular expressions -- Regular expressions -- Troubleshooting reading files -- Sending data to files -- Time for action - sending the results of matches to a plain file -- Output files -- Output steps -- Getting system information -- Time for action - reading and writing matches files with flexibility -- The Get System Info step -- Running transformations from a terminal window -- Time for action - running the matches transformation from a terminal window -- XML files -- Time for action - getting data from an XML file with information about countries -- What is XML? …”
    Libro electrónico
  12. 6712
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: The Basics of PyCharm -- Introduction to PyCharm -- the Most Popular IDE for Python -- Technical requirements -- The continued success of Python -- The philosophy of IDEs -- PyCharm as a Python IDE -- Intelligent coding assistance -- Streamlined programming tools -- Web development options -- Scientific computing support -- Understanding the Professional, Community, and Educational editions -- Summary -- Questions -- Further reading -- Installing and Configuring PyCharm -- Technical requirements -- Downloading PyCharm the traditional way -- JetBrains Toolbox -- Installing Toolbox in Windows -- Installing Toolbox in macOS -- Installing PyCharm with Toolbox -- Launching PyCharm using Toolbox -- Installing an alternate version or uninstalling -- Updating PyCharm using Toolbox -- Launching and registering PyCharm -- Setting up PyCharm -- Appearance and behavior -- Working with projects -- Creating a new project -- Running a PyCharm project -- Cloning this book's code from GitHub -- Setting up your GitHub account -- Cloning the book's repository -- Summary -- Questions -- Further reading -- Part 2: Improving Your Productivity -- Customizing Interpreters and Virtual Environments -- Technical requirements -- Virtual environments -- Creating a virtual environment by hand -- Creating a project in PyCharm (revisited) -- Using an existing virtual environment -- Changing the interpreter for a project -- Activating virtualenv -- Using the integrated terminal -- Working with the REPL in the console window -- Working with third-party package libraries -- Adding third-party libraries in PyCharm -- Removing third-party libraries in PyCharm -- Using a requirements.txt file -- The new Python Packages window…”
    Libro electrónico
  13. 6713
    Publicado 2018
    “…A continuación, descubrirá los principales elementos tecnológicos que le facilitarán la comunicación con sus allegados: el correo electrónico (aplicación Correo de Windows 10 y Gmail, el webmail de Google) y la mensajería instantánea o el chat (Skype). …”
    Acceso con credenciales UPSA.
    Libro electrónico
  14. 6714
    “…Las respuestas a los diferentes test se podrán encontrar recopiladas al final de la obra.Durante todo el proceso de redacción se ha tenido en cuenta a los sistemas operativos Microsoft Windows y GNU/Linux centrándonos en las distribuciones Ubuntu y Fedora por su amplia presencia entre los usuarios de este sistema operativo, así como la compatibilidad de los programas planteados en ambos sistemas operativos…”
    Libro electrónico
  15. 6715
    por Molina Robles, Francisco
    Publicado 2015
    Tabla de Contenidos: “…Planificación y administración de redes -- Página legal -- Índice -- Capítulo 1 -- 1.1Sistemas de numeración -- 1.2 Introducción a la comunicación -- Capítulo 2 -- 2.1Introducción -- 2.2 Ejemplos de arquitecturas -- 2.3 Ejemplos de redes de transmisiónde datos -- Capítulo 3 -- 3.1 Características de las señales -- 3.2 Tipos de transmisión -- 3.3 Tipos de cableado -- 3.4 Ruido y capacidad de transmisiónde un medio -- 3.5 Comprobación del cableado -- Capítulo 4 -- 4.1 Elementos básicos deinterconexión -- 4.2Interconexión de redes distintas -- 4.3 Otros dispositivos de interconexión de -- 4.4 Comparación entre los dispositivosde interconexión -- 4.5 I nstalación de dispositivos de interconexión -- Capítulo 5 -- 5.1 Direccionamiento a nivel de enlacede datos -- 5.2Direccionamiento -- 5.3 Direccionamiento a nivel detransporte -- 5.4 Direccionamiento a nivel deaplicación -- 5.5 Coordinación entre los distintosniveles -- Capítulo 6 -- 6.1Introducción -- 6.2 Co nfiguración de red en MicrosoftWindows -- 6.3 Configuración de reden Linux -- Capítulo 7 -- 7.1Introducción -- 7.2 Boson NetSim -- 7.3 Packet Tracer -- 7.4 Kiva NS -- 7.5 GNS3 -- Capítulo 8 -- 8.1 Introducción -- 8.2 Co nfiguración de un concentrador de cableado -- 8.3 Configuración -- 8.4 Configuración de un punto de acceso inalámbrico -- Capítulo 9 -- 9.1 ntroducción -- 9.2 Modos de trabajo -- 9.3 Configuración -- 9.4 Listas de control -- 9.5 Configuración del encaminamiento -- Capítulo 10 -- 10.1 Características de lo protocolos -- 10.2 T ipos de protocolos deencaminamiento -- 10.4 Máscaras de red de longitud variable -- 10.5 Encaminamiento RIP -- 10.6 Encaminamiento -- 10.7 Encaminamiento -- Capítulo 11 -- 11.1 Tecnologías -- 11.2 Direccionamiento -- 11.3 Asignación dinámica dedirecciones -- Capítulo 12 -- 12.1 Herramientas de monitorización de red…”
    Libro electrónico
  16. 6716
    Publicado 2022
    “…Experienced programmers making the transition to C# will benefit from the author's in-depth explorations to create Web- and Windows applications using ASP.NET Core, Blazor, and WinUI using modern application patterns and new features offered by .NET including Microservices deployed to Docker images, GRPC, localization, asynchronous streaming, and much more. …”
    Libro electrónico
  17. 6717
    Publicado 2023
    “…Figma's design handoff and design system management features can help bridge the gap between design and development. It's available for Windows, macOS, and as a browser app. In this book, we'll immerse ourselves in everything Figma has to offer as we design a simple web page…”
    Libro electrónico
  18. 6718
    Publicado 2024
    “…Through deep archival research, she has carefully reconstructed the sensorial texture of the city, from the posters plastered on walls, to the shop windows' displays, the badges worn by passers-by, and the crowds gathering for protest or celebration. …”
    Libro electrónico
  19. 6719
    Publicado 2025
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents at a Glance -- Contents -- Introduction -- What to Expect -- Chapter 1 The Human Years -- The Odyssey 2 -- The Commodore 64 -- Newb Before It Was a Thing -- Windows into the Corporate World -- A Hacker Is Born -- A Life Divided -- Flesh Is Stronger Than Steel -- Chapter 2 A Change in Direction -- Into the Light -- Road Warrior -- Chapter 3 Symbiotic Attack Vector -- Tap-to-Pwn -- My First Attack: Dinner and a Show -- Chapter 4 Transhumanism: We Who Are Not As Others -- A Brief History of Transhumanism -- I, Cyborg -- Bad Intentions -- Notes -- Chapter 5 Using Their Laws Against Them -- Prepare for Takeoff Seat Backs and Tray Tables -- Obfuscation by Law -- Chapter 6 A Technological Rebirth -- Finding My Techno-shaman -- Honey, We Need to Talk -- Chapter 7 My First Installs -- Human MFA -- Touching Digital -- Cyberpunk in Downtown Austin -- I Am Machine -- Physical Meets Biological -- Digital Lockpicks -- Magnetic Vision -- My Tools -- Note -- Chapter 8 I Am the Cyber Threat -- Mobile Devices -- L3pr@cy Attack -- Fl3h-H00k Attack -- Implant a Man-in-the-Middle Attack -- Implant Phishing/Smishing Attack -- Implant Automation Attack -- Physical Access -- H@nd-h@k3 -- Magnetic Tracing -- Notes -- Chapter 9 Living the Transhuman Life -- VivoKey Chips -- VivoKey Spark 2 -- VivoKey Apex -- Cheeseburger Use Cases -- Walletmor -- NeXT Chip and BioMagnet -- Chapter 10 I'm Hackable -- Identity Evolution -- Cultural Significance -- What Is "Acceptable"? …”
    Libro electrónico
  20. 6720
    por Mason, Brian
    Publicado 2012
    Tabla de Contenidos: “…Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Designing a System Center 2012 Configuration Manager Infrastructure; Introduction; Dividing up site system roles; Creating migration jobs; Installing SQL the right way; Managing Internet-facing clients; Using remote and workstation distribution points, and BranchCache; Chapter 2: Deploying Windows 7 with Operating System Deployment; Introduction; Creating an OSD test environment; Leveraging the build and capture process; Migrating user state; Managing drivers…”
    Libro electrónico