Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Música 229
- Música orquestal 194
- Development 189
- Engineering & Applied Sciences 188
- Historia 184
- Application software 176
- Computer programs 141
- Management 127
- Suites (Orquesta) 125
- Data processing 121
- History 110
- Computer Science 105
- Computer networks 94
- Business & Economics 91
- Security measures 85
- Web sites 85
- Computer graphics 81
- Operating systems (Computers) 78
- Design 77
- Computer software 76
- Business 75
- Cloud computing 74
- Música instrumental 74
- Database management 73
- Computer security 68
- Electrical & Computer Engineering 68
- Telecommunications 65
- Computer programming 63
- Economic conditions 61
- Suites (Piano) 54
-
3541por Altar, Sylvie, 1965-“…Son surnom Gueule tordue —est dû à une paralysie faciale, suite à un accident de voiture au moment de l'adolescence—, restera associé à un homme à l'engagement brutal. …”
Publicado 2020
Libro -
3542Publicado 1993“…La lecture extrêmement attentive que Husserl fit aussitôt de ce petit livre eut sur toute la suite de son évolution une importance capitale, puisqu'après avoir rejeté, dans un long fragment inédit intitulé Objets intentionnels, la fameuse "triade" introduite par Twardowski, il devait la réintroduire en 1913 dans les Idées I, avec la notion de noème, pour finir même, dans la Crise de 1936, par attribuer une fonction initiatique primordiale au non moins fameux " paradoxe des représentations sans objets ". …”
Libro -
3543Publicado 2023“…Le " problème " autour duquel tourne ce colloque tenu les 13 et 14 janvier 2022 à Paris est celui de la forme que les rapports entre l'Église catholique romaine et l'État ont prise en France : les " libertés de l'Église gallicane ", autrement dit, le " gallicanisme " selon le néologisme forgé au cours de la querelle qui renaît à la suite de l'instauration du Concordat de 1801 signé entre Bonaparte et Pie VII. …”
Libro -
3544por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Recommandations pour la poursuite de la réforme structurelle (suite) -- Tableau 17. Recommandations pour la poursuite de la réforme structurelle (suite) -- III. …”
Publicado 2002
Libro electrónico -
3545Publicado 2021Tabla de Contenidos: “…Bypassing JavaScript Validation -- SQL Injection -- Querying the Database -- Bypassing the Login Page -- Execute Database Commands Using SQLi -- SQL Injection Automation with SQLMap -- Testing for SQL Injection -- Command Injection -- File Inclusion -- Local File Inclusion -- Remote File Inclusion -- Cross-Site Request Forgery -- The Attacker Scenario -- The Victim Scenario -- File Upload -- Simple File Upload -- Bypassing Validation -- Encoding -- OWASP Top 10 -- Summary -- Chapter 9 Web Penetration Testing and Secure Software Development Lifecycle -- Web Enumeration and Exploitation -- Burp Suite Pro -- Web Pentest Using Burp Suite -- More Enumeration -- Nmap -- Crawling -- Vulnerability Assessment -- Manual Web Penetration Testing Checklist -- Common Checklist -- Special Pages Checklist -- Secure Software Development Lifecycle -- Analysis/Architecture Phase -- Application Threat Modeling -- Assets -- Entry Points -- Third Parties -- Trust Levels -- Data Flow Diagram -- Development Phase -- Testing Phase -- Production Environment (Final Deployment) -- Summary -- Chapter 10 Linux Privilege Escalation -- Introduction to Kernel Exploits and Missing Configurations -- Kernel Exploits -- Kernel Exploit: Dirty Cow -- SUID Exploitation -- Overriding the Passwd Users File -- CRON Jobs Privilege Escalation -- CRON Basics -- Crontab -- Anacrontab -- Enumerating and Exploiting CRON -- sudoers -- sudo Privilege Escalation -- Exploiting the Find Command -- Editing the sudoers File -- Exploiting Running Services -- Automated Scripts -- Summary -- Chapter 11 Windows Privilege Escalation -- Windows System Enumeration -- System Information -- Windows Architecture -- Listing the Disk Drives -- Installed Patches -- Who Am I? …”
Libro electrónico -
3546Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- Foreword -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Review of TCP/IP Protocol Suite and Python Language -- The internet overview -- Servers, hosts, and network components -- The rise of datacenter -- Enterprise datacenters -- Cloud datacenters -- Edge datacenters -- The OSI model -- Client server models -- Network protocol suites -- The Transmission Control Protocol (TCP) -- Functions and Characteristics of TCP -- TCP messages and data transfer -- User Datagram Protocol (UDP) -- The Internet Protocol (IP) -- The IP NAT and security -- IP routing concepts -- Python language overview -- Python versions -- Operating system -- Running a Python program -- Python built-In types -- The None type -- Numerics -- Sequences -- Mapping -- Sets -- Python operators -- Python control flow tools -- Python functions -- Python classes -- Python modules and packages -- Summary -- Chapter 2: Low-Level Network Device Interactions -- The challenges of CLI -- Constructing a virtual lab -- Cisco Virtual Internet Routing Lab (VIRL) -- VIRL tips -- Cisco DevNet and dCloud -- GNS3 -- Python Pexpect Library -- Installation -- The Pexpect overview -- Our first Expect program -- More Pexpect features -- Pexpect and SSH -- Putting things together for Pexpect -- The Python Paramiko library -- Installating Paramiko -- The Paramiko overview -- Our first Paramiko program -- More Paramiko features -- Paramiko for Servers -- Putting things together for Paramiko -- Looking ahead -- Downsides of Pexpect and Paramiko compared to other tools -- Idempotent network device interaction -- Bad automation speeds bad things up -- Summary -- Chapter 3: API and Intent-Driven Networking -- Infrastructure as the Python code -- Screen scraping versus API structured output…”
Libro electrónico -
3547Publicado 1995Tabla de Contenidos: “…No ordinary : B.S.O. de la película "Una proposición indecente" / Jurassic Park Suite B.S.O. de la película " ; Oh, pretty woman / Moon river : B.S.O. de la película "Desayuno con diamantes" / My baby just cares for me : B.S.O. de la película "Los amigos de Peter" / I get around : B.S.O. de la película "Good morning Vietnam" / Amacord : B.S.O. de la película "Amacord" ; Three coins in the fountain : B.S.O. de la película "Creemos en el amor" / Adventures on earth : B.S.O. de la película "E.T." / María : B.S.O. de la película "West side history" ; More, ti garderö nel cuore : B.S.O. de la película "Este perro mundo" / High noon (do not forsake me) : B.S.O. de la película "Solo ante el peligro" / Garbrel's Oboe : B.S.O. de la película "La misión" / Born free : B.S.O. de la película "Nacida libre" The guns of Navarone : B.S.O. de la película "Los cañones de Navarone" / The hanging tree : B.S.O. de la película "El árbol del ahorcado" / New York, New York : B.S.O. de la película "Un día en Nueva York" / Smile : B.S.O. de la película "Chaplin" / Send in the clowns : B.S.O. de la película "A little night music" / Así habló Zarathustra : B.S.O. de la película "2001, una odisea en el espacio" ; Chapel of love : B.S.O. de la película "La chaqueta metálica" / Main title theme : B.S.O. de la película "El último emperador" ; Johnny guitar : B.S.O. de la película "Johnny guittar" / Otto e mezzo : B.S.O. de la película "Ocho y medio" ; Sinfonía n{486} 5, adagietto de la película "Muerte en venecia"…”
CDROM -
3548por Oliva, ÁngelaTabla de Contenidos: “…Astarida ""El Pechuga""; Los Parachokes; Karletes "Parachokes"; David Zapata; Ramón Arias; Surrounders; Rafael Calderón y Javier Durá; Manuel Dostis; Ramón Ramos; Antonio Bello Blues band; Antonio Bello; Álvaro Padrós; Sstefano; Nani Conde; Nacho Collado; Jose Luis Suero; Compañía Malpaso; EPI Malpaso; Chuma; Chiqui; Alvaro Suite; Charly Cepeda; Jose Casas Y la Pistolade Papá; Tony Gavilán; Álvaro; Dani Kinda y Julio Zabalá…”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
3549Publicado 2010Tabla de Contenidos: “…; Detailed Costumes; Outlining the Garment; The Details; CHAPTER 6 RENDERING TECHNIQUES; Creating Highlights and Shadows; Characteristics of Materials and Drawing Strokes; Painting Costumes; Painting from Light to Dark; Rendering Sheer Material; Painting from Dark to Light; Painting with Markers; Creating Texture; Creating a Pinstriped Suit and Plaid Dress; Creating Rough-Texture Fabrics; Painting the Head and Face; Decorating the Background of the Costume Design; Drawing Supplies…”
Libro electrónico -
3550Publicado 2019Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- About the Author -- About the Technical Editor -- Credits -- Acknowledgments -- Contents at a glance -- Contents -- Foreword -- Introduction -- Chapter 1 Fundamental Networking and Security Tools -- Ping -- IPConfig -- NSLookup -- Tracert -- NetStat -- PuTTY -- Chapter 2 Troubleshooting Microsoft Windows -- RELI -- PSR -- PathPing -- MTR -- Sysinternals -- The Legendary God Mode -- Chapter 3 Nmap-The Network Mapper -- Network Mapping -- Port Scanning -- Services Running -- Operating Systems -- Zenmap -- Chapter 4 Vulnerability Management -- Managing Vulnerabilities -- OpenVAS -- Nexpose Community -- Chapter 5 Monitoring with OSSEC -- Log-Based Intrusion Detection Systems -- Agents -- Adding an Agent -- Extracting the Key for an Agent -- Removing an Agent -- Log Analysis -- Chapter 6 Protecting Wireless Communication -- 802.11 -- inSSIDer -- Wireless Network Watcher -- Hamachi -- Tor -- Chapter 7 Wireshark -- Wireshark -- OSI Model -- Capture -- Filters and Colors -- Inspection -- Chapter 8 Access Management -- AAA -- Least Privilege -- Single Sign-On -- JumpCloud -- Chapter 9 Managing Logs -- Windows Event Viewer -- Windows PowerShell -- BareTail -- Syslog -- SolarWinds Kiwi -- Chapter 10 Metasploit -- Reconnaissance -- Installation -- Gaining Access -- Metasploitable2 -- Vulnerable Web Services -- Meterpreter -- Chapter 11 Web Application Security -- Web Development -- Information Gathering -- DNS -- Defense in Depth -- Burp Suite -- Chapter 12 Patch and Configuration Management -- Patch Management -- Configuration Management -- Clonezilla Live -- Chapter 13 Securing OSI Layer 8 -- Human Nature -- Human Attacks -- Education -- The Social Engineer Toolkit -- Chapter 14 Kali Linux -- Virtualization -- Optimizing Kali Linux -- Using Kali Linux Tools -- Maltego -- Recon-ng -- Sparta -- MacChanger -- Nikto…”
Libro electrónico -
3551por Familiar, Bob. authorTabla de Contenidos: “…ConfigM InterfacesConfigM Services; ConfigM APIs; ConfigM SDKs; The ConfigM Administrator Console; Summary; Chapter 7: IoT and Microservices; IoT Capabilities; Azure IoT Services; Custom Development; IoT Hub; Scripted Scenario; IoT Suite; The Reference Implementation IoT Capabilities; Device Management; Telemetry Ingestion; The BioMax-Home Device Simulator; Telemetry Transformation and Storage; Stream Analytics Queries; Real-Time Notifications; Biometrics Alarm Worker; Testing Push Notifications; Real-Time Data Visualization; Biometrics API; Summary; Chapter 8: Service Fabric…”
Publicado 2015
Libro electrónico -
3552Publicado 2020Tabla de Contenidos: “…-- Participation is the exercise of legal rights -- Participation enables decision making -- Participation legitimates the judicial process and outcomes Participation provides (potential) therapeutic benefits -- Barriers to and facilitators of participation -- Remote court attendance -- Practitioners as facilitators -- Conclusion -- Notes -- References -- FOUR Observed Realities of Participation -- Introduction -- Observing court proceedings -- Institutional parameters of participation -- Observed commonalities: stories of conflict, loss and disadvantage -- Conflict -- Loss and disadvantage -- Telling the stories of conflict, loss and disadvantage -- Supporting and facilitating participation -- Responsiveness to vulnerabilities and need Assisting litigants-in-person -- Humanising and sympathetic responses -- Translation and disconnection -- Complexity -- Silencing of court users -- Underlining the disparities -- Disconnection -- Conclusion -- Notes -- References -- FIVE Looking Ahead -- Introduction -- International review -- Methodology for the literature search -- Witness intermediaries -- Ground rules hearings -- Court 'facility dogs' -- Pre-recording witness testimony in full -- Specialist hearing suites -- Specialist judicial guidance -- Reflections on innovative support for participation…”
Libro electrónico -
3553por Padova, TedTabla de Contenidos: “…Chapter 33: Working with DatabasesChapter 34: Introducing LiveCycle Enterprise Suite; Chapter 35: Getting More Help with LiveCycle Designer; Appendix A: Using the CD-ROM…”
Publicado 2009
Libro electrónico -
3554Publicado 2015Tabla de Contenidos: “…Working with declarative Spring transactionExploring transaction attributes; Using the @Transactional annotation; Working with a programmatic Spring transaction; Using TransactionTemplate; Using PlatformTransactionManager; Building an MVC application with Spring; Summary; Chapter 2: Working with JUnit and Mockito; Learning unit testing; Working with the JUnit framework; Configuring Eclipse; Examining annotations; Verifying an expectation with an assertion; Examining exception handling; Working with the @RunWith annotation; Working with test suites; Working with assertThat…”
Libro electrónico -
3555Publicado 2022Tabla de Contenidos: “…Beham -- The significance of state consent for the legitimate authority of customary international law / Andreas Føllesdal -- Custom and the regulation of 'the sources of international law' / Diego Mejía-Lemos -- The ILC's new way of codifying international law, the motives behind it, and the interpretive approach best suited to it / Luigi Crema -- Beyond formalism : reviving the legacy of sir henry Maine for customary international law / Andreas Hadjigeorgiou -- Enkapsis and the development of customary international law : an encyclopedic approach to inter-legality / Romel Regalado Bagares -- Customary international law in the reasoning of international courts and tribunals / Vladyslav Lanovoy -- Eureka! …”
Libro electrónico -
3556Publicado 2014Tabla de Contenidos: “…The end of mandatory rules in the employment contract law: on ready-made suits, goods made to measure and fashion trends; Schutz und kollektive Privatautonomie - das Arbeitsverhaltnis in seiner Besonderheit; Self-Employment and Economic Dependency in the light of the Social Contract Law; Tarifautonomie und Vertragsgerechtigkeit: Der Beitrag des kollektiven Arbeitsrechts zur Vertragstheorie; Part III: Consumer Credit Contracts; Darlehensvertrag als Kapitalmiete (locatio conductio specialis); Change of circumstances in consumer credit contracts - the United Kingdom experience and a call for the maintenance of sector specific rules; The EU Consumer Credit Directive 2008 in the light of the EuSoCo Principles; Access to long-term banking services in the Nordic States; A contractual approach to overindebtedness: rebus sic stantibus instead of bankruptcy; Responsible bankruptcy; Part IV: Residential Tenancy Contracts; Das Recht auf Wohnraum und der Wohnraummietvertrag Towards a Common Core of Residential Tenancy Law in Europe? …”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
3557Publicado 2015Tabla de Contenidos: “…2.3.1 Social Media as Cloud Storage2.3.2 Case Studies: Comparison of Social Media Security (Facebook and Twitter); 2.3.2.1 Questions; 2.3.2.2 Security Concepts; 2.3.2.3 Methods and Results; 2.3.2.4 Twitter; 2.3.2.5 Twitter Privacy Policy; 2.3.2.6 Facebook; 2.3.2.7 How Facebook Uses Data They Collect; 2.3.2.8 Conclusion; 2.4 Office Suites; 2.4.1 Background; 2.4.2 Case Studies: Comparison of Cloud-Based Office Suite Security (Microsoft Office 365 and Google Docs); 2.4.2.1 Questions; 2.4.2.2 Security Concepts; 2.4.2.3 Google Docs; 2.4.2.4 Privacy; 2.4.2.5 Microsoft Office 365; 2.4.2.6 Privacy…”
Libro electrónico -
3558por Viega, JohnTabla de Contenidos: “…Step 3: SSL Options and Cipher Suites5.1.4.2. Ephemeral keying; 5.1.4.3. Cipher suite selection; 5.1.4.4. …”
Publicado 2002
Libro electrónico -
3559por Berthiaume, Rachel“…Un colloque intitulé « Approche cognitive de l’apprentissage de la langue écrite » (Rennes, octobre 2006) avait pourtant permis de montrer une cohésion et une collaboration fécondes entre les nombreux chercheurs français et étrangers qui y participaient. Suite à ce constat, nous souhaitions présenter les avancées récentes de la communauté scientifique internationale dans le domaine de l’apprentissage des procédures de lecture (de l’identification des mots à la compréhension des textes écrits) et de productions des mots écrits (du geste graphique au code orthographique). …”
Publicado 2018
Electrónico -
3560Publicado 2000“…C'est pour tenter de donner une réalité à cet imaginaire, mais aussi pour actualiser notre connaissance d'un pays qui condense les mutations actuelles de l'Amérique latine, que ce livre a vu lejour à la suite d'un colloque international organisé à Lorient par l'Université de Bretagne-Sud (novembre 1999). …”
Libro electrónico