Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 61,960
- Història 30,425
- Biblia 21,411
- Filosofía 18,685
- Crítica e interpretación 17,252
- Iglesia Católica 12,422
- Crítica i interpretació 11,199
- Universidad Pontificia de Salamanca (España) 10,417
- Teología 10,113
- Església Catòlica 9,063
- History 8,877
- Derecho 8,187
- Engineering & Applied Sciences 7,650
- Bíblia 6,909
- Educación 6,443
- Biografia 6,258
- Historia y crítica 5,698
- Derecho canónico 5,654
- Liturgia 5,561
- Biografías 5,441
- Espiritualidad 5,415
- Literatura 5,395
- Cristianismo 5,345
- Computer Science 5,287
- Política 5,228
- Religión 5,188
- Psicología 5,146
- Arquitectura 5,061
- Management 4,959
- Teología dogmática 4,955
-
4321
-
4322
-
4323
-
4324
-
4325
-
4326Publicado 2008“…Teach yourself Adobe Creative Suite 3 all in one…”
Libro electrónico -
4327Publicado 2008“…Teach yourself Mac OS X Leopard all in one…”
Libro electrónico -
4328Publicado 2006Tabla de Contenidos: “…ASP.NET 2.0 All-In-One Desk Reference For Dummies; About the Author; Dedication; Author's Acknowledgments; Table of Contents; Introduction; About This Book; How to Use This Book; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Book I: ASP.NET Basics; Contents at a Glance; Contents at a Glance; Chapter 1: Welcome to ASP.NET Programming; What Is ASP.NET, and Why Is It So Great?…”
Libro electrónico -
4329Publicado 2009Tabla de Contenidos: “…bk. 1. Adobe Creative Suite 4 basics -- bk. 2. InDesign CS4 -- bk. 3. …”
Libro electrónico -
4330Publicado 2009Tabla de Contenidos: “…Mac OS X Leopard All-In-One Desk Reference For Dummies; About the Author; Dedication; Author's Acknowledgments; Contents at a Glance; Table of Contents; Introduction; What's Really Required; About This Book; Conventions Used in This Book; How This Book Is Organized; Icons Used in This Book; Book I Introducing Mac OS X; Chapter 1: Shaking Hands with Mac OS X; Convince Me: Why Mac OS X?…”
Libro electrónico -
4331Publicado 2008Tabla de Contenidos: “…Microsoft® SQL Server® 2008 ALL - IN - ONE DESK REFERENCE; Table of Contents; Introduction; Book I Essential Concepts; Book II Designing and Using Databases; Book III Interacting with Your Data; Book IV Database Programming; Book V Reporting Services; Book VI Analysis Services; Book VII Performance Tips and Tricks; Book VIII Database Administration; Book IX Appendixes; Index…”
Libro electrónico -
4332
-
4333Publicado 2009“…All-in-one CBAP, Certified Business Analysis Professional exam guide…”
Libro electrónico -
4334por Correll, RobertTabla de Contenidos: “…About the Author; Contents at a Glance; Table of Contents; Introduction; About This Book; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Book I: Getting Started with Digital SLRs; Contents at a Glance; Chapter 1: What's So Special about Digital SLRs?…”
Publicado 2013
Libro electrónico -
4335Publicado 2012Tabla de Contenidos: “…Cover -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Security Fundamentals -- Reviewing the Requirements for SSCP -- Registering for the Exam -- Have One Year of Experience -- Passing the Exam -- Maintaining Your SSCP Certification -- Understanding the Main Goals of Information Security -- Availability -- Integrity -- Confidentiality -- Exploring Fundamentals of Security -- Defense in Depth -- AAAs of Security -- Accountability -- Nonrepudiation -- Least Privilege -- Separation of Duties -- Due Diligence -- Due Care -- Questions -- Answers -- Chapter 2 Access Controls -- Comparing Identification and Authentication -- Authentication -- Three Factors of Authentication -- Single Sign-on Authentication -- Centralized Verse Decentralized Authentication -- Offline Authentication -- One-Time Passwords -- Implementing Access Controls -- Comparing Subjects and Objects -- Logical Access Control -- Physical Access Control -- Access Control Models -- DAC -- Non-DAC -- MAC -- RBAC -- Implementing Identity Management -- Provisioning -- Maintenance -- De-provisioning -- Entitlement -- Understanding Cloud Computing -- Virtualization -- Storage -- Privacy and Data Control -- Compliance -- Questions -- Answers -- Chapter 3 Basic Networking and Communications -- The OSI Model -- The Physical Layer (Layer 1) -- The Data Link Layer (Layer 2) -- The Network Layer (Layer 3) -- The Transport Layer (Layer 4) -- The Session Layer (Layer 5) -- The Presentation Layer (Layer 6) -- The Application Layer (Layer 7) -- Comparing the OSI and TCP/IP Models -- Network Topographies -- Ethernet -- Bus -- Star -- Token Ring -- Reviewing Basic Protocols and Ports -- Address Resolution Protocol -- Internet Control Message Protocol -- Internet Group Message Protocol -- Dynamic Host Configuration Protocol -- Simple Network Management Protocol…”
Libro electrónico -
4336Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Planning and Engagement -- Governance, Risk, and Compliance -- Testing Limitations -- Contracts and Documentation -- Scope and Requirements -- Professionalism and Integrity -- Chapter Review -- References -- Chapter 2 Information Gathering and Vulnerability Scanning -- Passive Reconnaissance -- Active Reconnaissance -- Vulnerability Scanning and Analysis -- Chapter Review -- References -- Chapter 3 Network-Based Attacks -- Name Resolution Exploits -- Password Attacks -- Stress Testing Applications and Protocols -- Network Packet Manipulation -- Layer 2 Attacks -- Researching an Attack -- Chapter Review -- Chapter 4 Wireless and RF Attacks -- 802.11 Wireless -- Attacking Bluetooth -- RFID and NFC -- Chapter Review -- References -- Chapter 5 Web and Database Attacks -- OWASP Top Ten -- Injection Attacks -- Attacking Authentication and Session Management -- Data Exposure and Insecure Configuration -- Inclusion Attacks -- Race Conditions -- Chapter Review -- Chapter 6 Attacking the Cloud -- Account and Privilege Attacks -- Misconfigured Cloud Assets -- Cloud-Centric Attacks -- Chapter Review -- Chapter 7 Specialized and Fragile Systems -- Mobile Devices -- Virtual and Containerized Systems -- Other Nontraditional Systems -- Chapter Review -- Chapter 8 Social Engineering and Physical Attacks -- Physical Security and Social Engineering -- Social Engineering and Physical Attacks -- Countermeasures -- Chapter Review -- References -- Chapter 9 Post-Exploitation -- Enumeration -- Privilege Escalation -- Covert Channels and Data Exfiltration -- Lateral Movement -- Maintaining Persistence -- Covering Your Tracks -- Chapter Review -- Chapter 10 Post-Engagement Activities -- The Anatomy of a Pentest Report -- Findings, Recommendations, and Analysis -- Post-Engagement Activities -- Chapter Review -- References -- Chapter 11 Tools and Code Analysis -- Logic Constructs -- Data Structures -- Other Programming Concepts -- Practical Examples -- Specialized Examples -- Chapter Review -- Chapter 12 Tools Inventory -- Appendix A Objective Map -- Objective Map: Exam PT0-002 -- Appendix B About the Online Content -- System Requirements -- Your Total Seminars Training Hub Account -- Single User License Terms and Conditions -- TotalTester Online -- Other Book Resources -- Technical Support -- Glossary -- Index…”
Libro electrónico -
4337Publicado 2011“…HTML, CSS, and JavaScript all in one…”
Libro electrónico -
4338Publicado 2010Tabla de Contenidos: “…bk. 1. Adobe Creative Suite 5 basics -- bk. 2. InDesign CS5 -- bk. 3. …”
Libro electrónico -
4339Publicado 2020“…Oracle Database running on Linux is available for deployment on IBM LinuxONE by using Redhat Enterprise Linux (RHEL) or SUSE Linux Enterprise Server (SLES). …”
Libro electrónico -
4340