Mostrando 6,921 - 6,940 Resultados de 9,070 Para Buscar '"Windows"', tiempo de consulta: 0.12s Limitar resultados
  1. 6921
    Publicado 2017
    Tabla de Contenidos: “…Saving the Scene -- Building a quick demo with ARToolkit -- Identifying the AR Marker -- Adding an AR Tracked Object -- Adding a cube -- Summary -- Chapter 3: Building Your App -- Identifying your platform and toolkits -- Building and running from Unity -- Targeting Android -- Installing Java Development Kit (JDK) -- About your JDK location -- Installing an Android SDK -- Installing via Android Studio -- Installing via command-line tools -- About your Android SDK root path location -- Installing USB device, debugging and connection -- Configuring Unity's external tools -- Configuring a Unity platform and player for Android -- Building and running -- Troubleshooting -- Android SDK path error -- Plugins colliding error -- Using Google ARCore for Unity -- Targeting iOS -- Having an Apple ID -- Installing Xcode -- Configuring the Unity player settings for iOS -- ARToolkit player settings -- Building and running -- Troubleshooting -- Plugins colliding error -- Recommended project settings warning -- Requires development team error -- Linker failed error -- No video feed on the iOS device -- Using Apple ARKit for Unity -- Targeting Microsoft HoloLens -- Having a Microsoft developer account -- Enabling Windows 10 Hyper-V -- Installing Visual Studio -- Installing the HoloLens emulator -- Setting up and pairing the HoloLens device for development -- Configuring Unity's external tools -- Configuring the Unity platform and player for the UWP holographic -- Build settings -- Quality settings -- Player settings - capabilities -- Player settings - other settings -- Vuforia settings for HoloLens -- Enabling extended tracking -- Adding HoloLensCamera to the Scene -- Binding the HoloLens Camera -- Building and running -- Holographic emulation within Unity -- MixedRealityToolkit for Unity -- Summary -- Chapter 4: Augmented Business Cards…”
    Libro electrónico
  2. 6922
    Publicado 2004
    Tabla de Contenidos: “…Configuration and administration of WBI Event Broker -- 7.1 Creating the default configuration -- 7.1.1 Using the Getting Started Wizard -- 7.2 Creating a broker from the command line -- 7.2.1 Creating a Configuration Manager on Windows -- 7.2.2 Creating a broker on Windows -- 7.3 Configuration of the Broker -- 7.3.1 Examining the Toolkit view -- 7.3.2 Creating a ServerProject -- 7.3.3 Creating a new message flow project -- 7.3.4 Creating a message flow -- 7.3.5 Building the message flow -- 7.3.6 Connecting the nodes -- 7.3.7 Setting node properties -- 7.3.8 Multicasting the brokers -- 7.3.9 Creating the broker archive file -- 7.3.10 Creating a Message Broker Archive -- 7.3.11 Connecting to a Configuration Manager -- 7.3.12 Deploying a bar file -- 7.3.13 Checking the deployment -- 7.3.14 Creation of topics -- Chapter 8. …”
    Libro electrónico
  3. 6923
    Publicado 2024
    Tabla de Contenidos: “…Version History with Trimble Connect -- Modeling real-life elements with Match Photo -- Summary -- Part 2: Working with Floor Plans -- Chapter 4: Importing and Exporting a Drawing -- Technical requirements -- Importing an image of a drawing -- Importing a PDF file -- Importing a 2D AutoCAD file -- Importing a Revit drawing -- Exporting a SketchUp file to AutoCAD -- Working with someone else's SketchUp model -- Summary -- Chapter 5: Creating the As-Built Floor Plan -- Technical requirements -- Creating walls and floors by tracing an AutoCAD plan -- Tracing the drawing in 2D -- Extruding walls -- How to cut in window and door openings -- Making the shape for the windows and doors -- Creating the holes for the windows and doors -- Constructing stairs -- Constructing basic stairs -- Creating a staircase using components -- Summary -- Chapter 6: Building Exterior Elements and Using the Extension Warehouse -- Technical requirements -- Creating a flat roof with a plain parapet -- An introduction to extensions and plugins -- The Extension Warehouse -- The Extension Manager -- Adding architectural elements to a building's exterior -- Creating architectural elements from scratch -- Downloading architectural elements from 3D Warehouse -- Carrying a client's brand from inside to outside -- Text options in SketchUp -- Adding 3D text -- Inserting a client's logo -- Including sections -- Other valuable exterior tools -- Summary -- Part 3: Adding Designer Details to a SketchUp Model -- Chapter 7: Adding Interior Elements and 3D Warehouse Furnishings -- Technical requirements -- Building a room using imported AutoCAD elevations -- Setting up the elevations -- Reviewing the practice model -- Cutting an opening for the pocket doors -- Creating interior architectural details from imported AutoCAD elevations -- Building the pocket doors -- Building the baseboards…”
    Libro electrónico
  4. 6924
    Publicado 2021
    Tabla de Contenidos: “…Command Injection Attacks -- LDAP Injection Attacks -- Exploiting Authentication Vulnerabilities -- Password Authentication -- Session Attacks -- Kerberos Exploits -- Exploiting Authorization Vulnerabilities -- Insecure Direct Object References -- Directory Traversal -- File Inclusion -- Privilege Escalation -- Exploiting Web Application Vulnerabilities -- Cross-Site Scripting (XSS) -- Request Forgery -- Clickjacking -- Unsecure Coding Practices -- Source Code Comments -- Error Handling -- Hard-Coded Credentials -- Race Conditions -- Unprotected APIs -- Unsigned Code -- Steganography -- Application Testing Tools -- Static Application Security Testing (SAST) -- Dynamic Application Security Testing (DAST) -- Mobile Tools -- Summary -- Exam Essentials -- Lab Exercises -- Activity 9.1: Application Security Testing Techniques -- Activity 9.2: Using the ZAP Proxy -- Activity 9.3: Creating a Cross-Site Scripting Vulnerability -- Review Questions -- Chapter 10 Attacking Hosts, Cloud Technologies, and Specialized Systems -- Attacking Hosts -- Linux -- Windows -- Cross-Platform Exploits -- Credential Attacks and Testing Tools -- Credential Acquisition -- Offline Password Cracking -- Credential Testing and Brute-Forcing Tools -- Wordlists and Dictionaries -- Remote Access -- SSH -- NETCAT and Ncat -- Metasploit and Remote Access -- Proxies and Proxychains -- Attacking Virtual Machines and Containers -- Virtual Machine Attacks -- Containerization Attacks -- Attacking Cloud Technologies -- Attacking Cloud Accounts -- Attacking and Using Misconfigured Cloud Assets -- Other Cloud Attacks -- Tools for Cloud Technology Attacks -- Attacking Mobile Devices -- Attacking IoT, ICS, Embedded Systems, and SCADA Devices -- Attacking Data Storage -- Summary -- Exam Essentials -- Lab Exercises -- Activity 10.1: Dumping and Cracking the Windows SAM and Other Credentials…”
    Libro electrónico
  5. 6925
    por Wesselius, Jaap
    Publicado 2023
    Tabla de Contenidos: “…Implementing DMARC -- DMARC Reporting -- DNSSEC and DANE -- DNSSEC -- DANE -- MTA-STS -- Summary -- Chapter 8: Message Hygiene and Security -- Exchange Online Protection Introduction -- Connection Filtering -- IP Allow and IP Block Lists -- Tenant Allow/Block Lists (TABL) -- Allow or Block Addresses and Domains -- Spoofed Senders -- Antimalware -- Content Filtering -- Anti-spam -- Anti-phishing -- Preset Security Policies -- Directory-Based Edge Blocking (DBEB) -- Summary -- Chapter 9: Authentication -- Hybrid Modern Authentication -- Configuring an Enterprise Application -- Multifactor Authentication -- Conditional Access -- Client Access Rules -- SMTP AUTH -- Certificate Authentication -- Windows Extended Protection -- PowerShell Serialization Payload Signing -- Summary -- Chapter 10: Permissions and Access Control -- Role-Based Access Control -- RBAC Components -- The Who -- Custom Role Group -- Linked Role Groups -- The What -- Management Roles and Management Role Entries -- Custom Management Roles -- Managing Parameters -- Unscoped Top-Level Management Roles -- Clean Up Unscoped Top-Level Management Roles -- The Where -- Regular Scopes -- Implicit Scopes -- Explicit Scopes -- Custom Scopes -- Management Scopes -- Exclusive Scopes -- 1+1+1=3: Management Role Assignments -- Role Assignment Policy -- Split Permissions -- RBAC Split Permissions -- Active Directory Split Permissions -- Summary -- Part IV: Compliance -- Chapter 11: Backup and Restore -- Back Up an Exchange Server -- Backup Technologies -- VSS Backup -- Back Up a Mailbox Database -- Using Windows Server Backup in PowerShell -- Using Windows Server Backup GUI -- Back Up Other Configuration Information -- Restoring Exchange Server -- Restoring to Its Original Location -- Restoring to Another Location -- The Restore Process -- Recovery Database -- Dial-Tone Recovery…”
    Libro electrónico
  6. 6926
    Publicado 2016
    Tabla de Contenidos: “…Restoring a Previous Version of a Report -- Setting Check-out and Check-in Policies -- Applying Labels -- Synchronizing Content -- Deploying an Individual Report -- Deploying a Suite of Reports -- Checking for Build Errors -- Excluding a Report from a Deployment -- Managing Server Content -- Checking the Deployment Location -- Managing Content in Native Mode -- Managing Content in SharePoint -- Report Builder and Self-Service Reporting Strategies -- Report Builder and Semantic Model History -- Planning a Self-Service Reporting Environment -- You Need a Plan -- Design Approaches and Usage Scenarios -- Define Ownership -- Data Governance -- Data Source Access and Security -- User Education -- Data Source and Query Options -- User Report Migration Strategies -- Review -- Consolidate -- Design -- Test -- Maintain -- Summary -- Chapter 14: Report Solutions, Patterns, and Recipes -- Super Reports -- Working with the Strengths and Limitations of the Reporting Services Architecture -- Seeking the Excel Export Holy Grail -- Report Recipes: Building on Basic Skills -- Dashboard Solution Data Sources and Datasets -- KPI Scorecard -- Gauges -- Interactive Sparkline and Chart -- Thumbnail Map with Drill-Through Navigation -- Summary -- Part V: Reporting Services Custom Programming -- Chapter 15: Integra Ting Reports Into Custom Applications -- URL Access -- URL Syntax -- Accessing Reporting Services Objects -- Reporting Services URL Parameters -- Passing Report Information Through the URL -- Programmatic Rendering -- Common Scenarios -- Rendering Through Windows -- Rendering to the Web -- Using the ReportViewer Control -- Embedding a Server-Side Report in a Windows Application -- Summary -- Chapter 16: Extending Reporting Services -- Extension Through Interfaces -- What Is an Interface? …”
    Libro electrónico
  7. 6927
    Publicado 2014
    Tabla de Contenidos: “…How to Rename Columns in Desktop -- How to Rename Columns in Plus -- Rearranging the Order of the Output -- How to Rearrange Columns -- Formatting Data -- Formatting Tools -- Format Data Dialog Box -- Formatting Columns -- Formatting Column Headings -- Formatting Multiple Headings and Columns in Plus -- Deleting Columns from a Worksheet -- How to Delete a Column -- Resizing Columns -- Formatting Totals -- Formatting Totals Using the Format Data Dialog Box -- Formatting Totals from the Formatting Bar -- Formatting Exceptions -- Adding a Title to Your Query -- Editing the Title -- Suppressing a Title from Displaying -- Adding a Background Bitmap (Desktop Only) -- Setting a Background -- Clearing a Background -- Summary -- Chapter 7: Using Graphs to Present Data -- The Available Graph Styles -- Bar (Desktop and Plus) -- Combination (Plus Only) -- Cube (Grouped with 3-D Options in Plus) -- Doughnut (Desktop), Ring (Grouped with Pie in Plus) -- Horizontal Bar (Desktop and Plus) -- Line (Desktop and Plus) -- Pie (Desktop and Plus) -- The Discoverer Desktop Graph Window -- The Features of the Discoverer Desktop Graph Window -- Creating a Graph in Desktop -- The Desktop Graph Wizard -- Graphing in Discoverer Plus -- Creating a Graph in the Plus Workbook Wizard -- Creating a Graph in Plus after a Query Has Been Generated -- Modifying a Graph in Plus -- Modifying a Graph in Desktop -- To Modify the Graph from the Worksheet -- To Modify the Graph from the Graph Window -- Summary -- Chapter 8: Turning a Discoverer Query into a Report -- A Workflow for Building Reports -- Report Workflow -- Formatting the Report for Printing -- Print Setup in Desktop -- Print Setup in Plus -- Page Setup -- The Sheet Tab in Desktop -- The Worksheet Tab in Plus -- The Table/Crosstab Tab in Plus -- Headers and Footers -- Table and Crosstab Gridlines -- Table Gridlines…”
    Libro electrónico
  8. 6928
    Publicado 2017
    Tabla de Contenidos: “…Bucketing on geo-spatial data -- Geo distance aggregation -- GeoHash grid aggregation -- Pipeline aggregations -- Calculating the cumulative sum of usage over time -- Summary -- Chapter 5: Analyzing Log Data -- Log analysis challenges -- Logstash -- Installation and configuration -- Prerequisites -- Downloading and installing Logstash -- Installing on Windows -- Installing on Linux -- Running Logstash -- Logstash architecture -- Overview of Logstash plugins -- Installing or updating plugins -- Input plugins -- Output plugins -- Filter plugins -- Codec plugins -- Exploring plugins -- Exploring Input plugins -- File -- Beats -- JDBC -- IMAP -- Output plugins -- Elasticsearch -- CSV -- Kafka -- PagerDuty -- Codec plugins -- JSON -- Rubydebug -- Multiline -- Filter plugins -- Ingest node -- Defining a pipeline -- Ingest APIs -- Put pipeline API -- Get Pipeline API -- Delete pipeline API -- Simulate pipeline API -- Summary -- Chapter 6: Building Data Pipelines with Logstash -- Parsing and enriching logs using Logstash -- Filter plugins -- CSV filter -- Mutate filter -- Grok filter -- Date filter -- Geoip filter -- Useragent filter -- Introducing Beats -- Beats by Elastic.co -- Filebeat -- Metricbeat -- Packetbeat -- Heartbeat -- Winlogbeat -- Auditbeat -- Community Beats -- Logstash versus Beats -- Filebeat -- Downloading and installing Filebeat -- Installing on Windows -- Installing on Linux -- Architecture -- Configuring Filebeat -- Filebeat prospectors -- Filebeat global options -- Filebeat general options -- Output configuration -- Filebeat modules -- Summary -- Chapter 7: Visualizing data with Kibana -- Downloading and installing Kibana -- Installing on Windows -- Installing on Linux -- Configuring Kibana -- Data preparation -- Kibana UI -- User interaction -- Configuring the index pattern -- Discover -- Elasticsearch query string…”
    Libro electrónico
  9. 6929
    Publicado 2003
    Tabla de Contenidos: “…7.4 IBM HTTP Server performance tuning -- 7.5 ITLM components performance considerations -- 7.6 Operating system performance tuning -- 7.6.1 Windows environments -- 7.6.2 AIX environments -- Appendix A. …”
    Libro electrónico
  10. 6930
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Copyright -- Contibutors -- Table of Contents -- Preface -- Section 1: Importing and Organizing -- Chapter 1: Quick Start: An Introduction to FCP -- A brief history of editing -- Interface basics -- Overview -- In the central bar -- In the Browser -- In the Viewer pane -- Other important windows and controls -- Controlling the main window -- The Touch Bar -- An editing workflow overview -- Terminology -- Workflow -- Part 1: Importing and Organizing -- Part 2: Rough Cut to Fine Cut -- Part 3: Finishing and Exporting -- Hardware recommendations -- A Mac -- Active media storage -- Backup storage -- Displays -- Audio -- Media card reader -- Miscellaneous USB gear -- Anything else? …”
    Libro electrónico
  11. 6931
    Publicado 2011
    Tabla de Contenidos: “…Chiu, Zhihui Helen Zha ng, and Kevin McElhaney -- Desirable difficulties and studying in the region of proximal learning / Janet Metcalfe -- Data entry : a window to principles of training / Alice F. Healy, James A. …”
    Libro electrónico
  12. 6932
    Publicado 2013
    Tabla de Contenidos: “…Ordenador PC -- 3. Entorno Windows y MS - DOS -- 4. Gestión de carpetas o directorios -- 5. …”
    Libro electrónico
  13. 6933
    Publicado 2013
    Tabla de Contenidos: “…Eliot and William Force Stead / David Bradshaw -- Playing with Voices and with Doubles in Two of Yeats's Plays: The Words upon the Window-pane and A Full Moon in March / Pierre Longuenesse -- The Mask of Derision in Yeats's Prologue to A Vision (1937) / Elizabeth Műller -- A Vision and Yeats's Late Masks / Margaret Mills Harper -- The Mask of A Vision / Neil Mann -- 'I beg your pardon?'…”
    Libro electrónico
  14. 6934
    Publicado 2021
    Tabla de Contenidos: “…-- Writing our data sources for Power BI -- Understanding the script UI window using the Data-Shapes package -- Collecting and filtering all the Revit rooms -- Exporting room data to Excel -- Processing room boundary geometry -- Generating the Shape file -- Manipulating the shape file to include metadata -- Setting up Power BI with the Synoptic Panel -- Visualizing our data in Power BI -- Summary…”
    Libro electrónico
  15. 6935
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Inhalt -- Danksagung -- Einführung -- Unendliche Möglichkeiten -- Die Masse macht's -- Teile und Zubehör -- Benötigte Software -- macOS -- Windows 10 -- Ubuntu Linux -- Sicherheit -- Ausblick -- Ein genauerer Blick auf den Arduino und die IDE -- Der Arduino -- Die IDE -- Der Befehlsbereich -- Der Textbereich -- Der Meldungsbereich -- Ein erster Sketch in der IDE -- Kommentare -- Die Einrichtungsfunktion -- Die Hardware steuern -- Die Schleifenfunktion -- Den Sketch überprüfen -- Den Sketch hochladen und ausführen -- Den Sketch bearbeiten -- Ausblick -- Erste Schritte…”
    Libro electrónico
  16. 6936
    Tabla de Contenidos: “…Fatigue Analysis of the Spallation Module of a High PowerAccelerator-driven Demonstrator SystemPreliminary Analysis of Beam Trip and Beam Jump Events in an ADSPrototype; Structural Response of the EADF Target Beam Window to Beam Interruptions:Transient Thermo-mechanical Computations; Responses of ADS Plant to Accelerator Beam Transients; Session V Interface Technology and Requirements; Neutron Kinetics Developments of the SIMMER-III Safety Codefor ADS Application; Dimensioning Parameters of Operation for an Under-critical Core:Constraints Related to the Accelerator…”
    Libro electrónico
  17. 6937
    por Oshana, Robert
    Publicado 2013
    Tabla de Contenidos: “…Based on signal sample, time to perform actions before next sample arrivesHard real-time systems; Real-time event characteristics; Real-time event categories; Efficient execution and the execution environment; Efficiency overview; Resource management; Challenges in real-time system design; Response time; Recovering from failures; The embedded system software build process; Distributed and multi-processor architectures; Software for embedded systems; Super loop architecture; Power-save super loop; Window lift embedded design; Hardware abstraction layers (HAL) for embedded systems; Summary…”
    Libro electrónico
  18. 6938
    por A., Jesin
    Publicado 2014
    Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Packet Tracer; Protocols supported by Packet Tracer; Installing Packet Tracer; Windows; Linux; Interface overview; Creating a simple topology; Summary; Chapter 2: Network Devices; Cisco devices and Packet Tracer devices; Routers; Switches; Other devices; Customizing devices with modules; Naming convention; Create a custom device; Emulating WAN; Accessing the CLI; The CLI tab; Console Port; Configuring network devices; Global settings; Routing…”
    Libro electrónico
  19. 6939
    por Stanek, William R.
    Publicado 2003
    Tabla de Contenidos: “…; Conventions Used in This Book; Support; Part I: Microsoft Windows Server 2003 Web Administration Fundamentals; Chapter 1: Overview of Microsoft Web Services; Introducing IIS 6; IIS 6 Request Processing Architecture; IIS 6 Security Architecture; Additional IIS 6 Features; Choosing Appropriate Web Server Hardware; Choosing the Server Operating System; Working with IIS 6: What You Need to Know Right Now…”
    Libro electrónico
  20. 6940
    Publicado 2016
    Tabla de Contenidos: “…The Monitoring workspaceAlerts; System status; Log files; Client log files; Server log files; Summary; Chapter 3 : Troubleshooting Configuration Manager Clients; Client installation; The Configuration Manager client; Hidden files; Trigger client actions; Apple Mac OSX client; Unix and Linux clients; Client log files; Application management; Package delivery; Software Center; General client activity; Extended logging; Common problems; External factors; Windows Management Instrumentation; Background Intelligent Transfer Service; Certificates; Summary…”
    Libro electrónico