Mostrando 4,321 - 4,340 Resultados de 1,765,516 Para Buscar '"s. I"', tiempo de consulta: 1.60s Limitar resultados
  1. 4321
    Revista digital
  2. 4322
    Revista digital
  3. 4323
    Revista digital
  4. 4324
    Revista digital
  5. 4325
    Revista digital
  6. 4326
    Publicado 2008
    “…Teach yourself Adobe Creative Suite 3 all in one…”
    Libro electrónico
  7. 4327
    Publicado 2008
    “…Teach yourself Mac OS X Leopard all in one…”
    Libro electrónico
  8. 4328
    Publicado 2006
    Tabla de Contenidos: “…ASP.NET 2.0 All-In-One Desk Reference For Dummies; About the Author; Dedication; Author's Acknowledgments; Table of Contents; Introduction; About This Book; How to Use This Book; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Book I: ASP.NET Basics; Contents at a Glance; Contents at a Glance; Chapter 1: Welcome to ASP.NET Programming; What Is ASP.NET, and Why Is It So Great?…”
    Libro electrónico
  9. 4329
    Publicado 2009
    Tabla de Contenidos: “…bk. 1. Adobe Creative Suite 4 basics -- bk. 2. InDesign CS4 -- bk. 3. …”
    Libro electrónico
  10. 4330
    Publicado 2009
    Tabla de Contenidos: “…Mac OS X Leopard All-In-One Desk Reference For Dummies; About the Author; Dedication; Author's Acknowledgments; Contents at a Glance; Table of Contents; Introduction; What's Really Required; About This Book; Conventions Used in This Book; How This Book Is Organized; Icons Used in This Book; Book I Introducing Mac OS X; Chapter 1: Shaking Hands with Mac OS X; Convince Me: Why Mac OS X?…”
    Libro electrónico
  11. 4331
    Publicado 2008
    Tabla de Contenidos: “…Microsoft® SQL Server® 2008 ALL - IN - ONE DESK REFERENCE; Table of Contents; Introduction; Book I Essential Concepts; Book II Designing and Using Databases; Book III Interacting with Your Data; Book IV Database Programming; Book V Reporting Services; Book VI Analysis Services; Book VII Performance Tips and Tricks; Book VIII Database Administration; Book IX Appendixes; Index…”
    Libro electrónico
  12. 4332
    por Ness, Robyn
    Publicado 2004
    “…Sams teach yourself ... all-in-one…”
    Libro electrónico
  13. 4333
    Publicado 2009
    “…All-in-one CBAP, Certified Business Analysis Professional exam guide…”
    Libro electrónico
  14. 4334
    por Correll, Robert
    Publicado 2013
    Tabla de Contenidos: “…About the Author; Contents at a Glance; Table of Contents; Introduction; About This Book; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Book I: Getting Started with Digital SLRs; Contents at a Glance; Chapter 1: What's So Special about Digital SLRs?…”
    Libro electrónico
  15. 4335
    Publicado 2012
    Tabla de Contenidos: “…Cover -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Security Fundamentals -- Reviewing the Requirements for SSCP -- Registering for the Exam -- Have One Year of Experience -- Passing the Exam -- Maintaining Your SSCP Certification -- Understanding the Main Goals of Information Security -- Availability -- Integrity -- Confidentiality -- Exploring Fundamentals of Security -- Defense in Depth -- AAAs of Security -- Accountability -- Nonrepudiation -- Least Privilege -- Separation of Duties -- Due Diligence -- Due Care -- Questions -- Answers -- Chapter 2 Access Controls -- Comparing Identification and Authentication -- Authentication -- Three Factors of Authentication -- Single Sign-on Authentication -- Centralized Verse Decentralized Authentication -- Offline Authentication -- One-Time Passwords -- Implementing Access Controls -- Comparing Subjects and Objects -- Logical Access Control -- Physical Access Control -- Access Control Models -- DAC -- Non-DAC -- MAC -- RBAC -- Implementing Identity Management -- Provisioning -- Maintenance -- De-provisioning -- Entitlement -- Understanding Cloud Computing -- Virtualization -- Storage -- Privacy and Data Control -- Compliance -- Questions -- Answers -- Chapter 3 Basic Networking and Communications -- The OSI Model -- The Physical Layer (Layer 1) -- The Data Link Layer (Layer 2) -- The Network Layer (Layer 3) -- The Transport Layer (Layer 4) -- The Session Layer (Layer 5) -- The Presentation Layer (Layer 6) -- The Application Layer (Layer 7) -- Comparing the OSI and TCP/IP Models -- Network Topographies -- Ethernet -- Bus -- Star -- Token Ring -- Reviewing Basic Protocols and Ports -- Address Resolution Protocol -- Internet Control Message Protocol -- Internet Group Message Protocol -- Dynamic Host Configuration Protocol -- Simple Network Management Protocol…”
    Libro electrónico
  16. 4336
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Planning and Engagement -- Governance, Risk, and Compliance -- Testing Limitations -- Contracts and Documentation -- Scope and Requirements -- Professionalism and Integrity -- Chapter Review -- References -- Chapter 2 Information Gathering and Vulnerability Scanning -- Passive Reconnaissance -- Active Reconnaissance -- Vulnerability Scanning and Analysis -- Chapter Review -- References -- Chapter 3 Network-Based Attacks -- Name Resolution Exploits -- Password Attacks -- Stress Testing Applications and Protocols -- Network Packet Manipulation -- Layer 2 Attacks -- Researching an Attack -- Chapter Review -- Chapter 4 Wireless and RF Attacks -- 802.11 Wireless -- Attacking Bluetooth -- RFID and NFC -- Chapter Review -- References -- Chapter 5 Web and Database Attacks -- OWASP Top Ten -- Injection Attacks -- Attacking Authentication and Session Management -- Data Exposure and Insecure Configuration -- Inclusion Attacks -- Race Conditions -- Chapter Review -- Chapter 6 Attacking the Cloud -- Account and Privilege Attacks -- Misconfigured Cloud Assets -- Cloud-Centric Attacks -- Chapter Review -- Chapter 7 Specialized and Fragile Systems -- Mobile Devices -- Virtual and Containerized Systems -- Other Nontraditional Systems -- Chapter Review -- Chapter 8 Social Engineering and Physical Attacks -- Physical Security and Social Engineering -- Social Engineering and Physical Attacks -- Countermeasures -- Chapter Review -- References -- Chapter 9 Post-Exploitation -- Enumeration -- Privilege Escalation -- Covert Channels and Data Exfiltration -- Lateral Movement -- Maintaining Persistence -- Covering Your Tracks -- Chapter Review -- Chapter 10 Post-Engagement Activities -- The Anatomy of a Pentest Report -- Findings, Recommendations, and Analysis -- Post-Engagement Activities -- Chapter Review -- References -- Chapter 11 Tools and Code Analysis -- Logic Constructs -- Data Structures -- Other Programming Concepts -- Practical Examples -- Specialized Examples -- Chapter Review -- Chapter 12 Tools Inventory -- Appendix A Objective Map -- Objective Map: Exam PT0-002 -- Appendix B About the Online Content -- System Requirements -- Your Total Seminars Training Hub Account -- Single User License Terms and Conditions -- TotalTester Online -- Other Book Resources -- Technical Support -- Glossary -- Index…”
    Libro electrónico
  17. 4337
    Publicado 2011
    “…HTML, CSS, and JavaScript all in one…”
    Libro electrónico
  18. 4338
    Publicado 2010
    Tabla de Contenidos: “…bk. 1. Adobe Creative Suite 5 basics -- bk. 2. InDesign CS5 -- bk. 3. …”
    Libro electrónico
  19. 4339
    Publicado 2020
    “…Oracle Database running on Linux is available for deployment on IBM LinuxONE by using Redhat Enterprise Linux (RHEL) or SUSE Linux Enterprise Server (SLES). …”
    Libro electrónico
  20. 4340
    Publicado 2010
    Libro electrónico