Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Música 229
- Música orquestal 194
- Development 189
- Engineering & Applied Sciences 188
- Historia 184
- Application software 176
- Computer programs 141
- Management 127
- Suites (Orquesta) 125
- Data processing 121
- History 110
- Computer Science 105
- Computer networks 94
- Business & Economics 91
- Security measures 85
- Web sites 85
- Computer graphics 81
- Operating systems (Computers) 78
- Design 77
- Computer software 76
- Business 75
- Cloud computing 74
- Música instrumental 74
- Database management 73
- Computer security 68
- Electrical & Computer Engineering 68
- Telecommunications 65
- Computer programming 63
- Economic conditions 61
- Suites (Piano) 54
-
3721por Padova, TedTabla de Contenidos: “…Chapter 8: Using Acrobat PDFMaker with Microsoft ProgramsSetting Up the Environment; Using Acrobat with Microsoft Word; Converting Microsoft Excel Files to PDF; Converting Microsoft PowerPoint Files to PDF; Converting Microsoft Publisher Files; Microsoft Visio and PDF Creation; Converting Web Pages from Internet Explorer to PDF (Windows Only); Converting Microsoft Outlook Emails to PDF (Windows Only); Summary; Chapter 9: Exporting to PDF from Authoring Applications; Setting Up the Environment; Working with Acrobat and the Adobe Creative Suite; Using Acrobat with Non-Adobe Programs; Summary…”
Publicado 2008
Libro electrónico -
3722Publicado 2008Tabla de Contenidos: “…Front Cover; OS X Exploits and Defense; Copyright Page; Contributing Authors; Technical Editor; Contents; Chapter 1: Macintosh OS X Boot Process and Forensic Software; Introduction; The Boot Process; The Macintosh Boot Process; EFI and BIOS: Similar but Different; DARWIN; The OS X Kernel; Macintosh Forensic Software; BlackBag Forensic Suite; Directory Scan; FileSpy; HeaderBuilder; Other Tools; Carbon Copy Cloner; MacDrive6/7; Summary; Chapter 2: Past and Current Threats; Before the Flood; The 21st Century Threatscape; Apple Vulnerability/Update Retrospective; Exploit Development and Research…”
Libro electrónico -
3723por Shavers, BrettTabla de Contenidos: “…Front Cover; X-Ways Forensics Practitioner's Guide; Copyright; Contents; Acknowledgments; About the Authors; Foreword; Introduction; Introduction; Intended audience; Brief history of X-Ways Forensics; Comparisons to ``other ́ ́ forensic suites; Organization of this book; Chapter 1: Installation and configuration of X-Ways Forensics; Chapter 2: Case management and imaging; Chapter 3: Navigating the X-Ways Forensics interface; Chapter 4: Refine volume Snapshot; Chapter 5: The XWF internal hash database and registry viewer; Chapter 6: Searching in X-Ways Forensics; Chapter 7: Advanced use of XWF…”
Publicado 2014
Libro electrónico -
3724por Padova, TedTabla de Contenidos: “…Converting Microsoft PowerPointFiles to PDFChanging Microsoft Publisher Files to PDF; Converting Web Pages from Internet Explorer to PDF (Windows Only); Converting Microsoft Outlook Emails to PDF (Windows Only); Summary; Chapter 9: Exporting to PDF from Authoring Applications; Working with Acrobat and the Adobe Creative Suite; Using Acrobat with Non-Adobe Programs; Summary; Chapter 10: Exporting PDF Content; Saving PDF Files; Exporting to PDF; Exporting Data to Different Formats; Summary; Part III: Editing PDFs; Chapter 11: Combining, Packaging, and Attaching PDFs…”
Publicado 2011
Libro electrónico -
3725Publicado 2012Tabla de Contenidos: “…1.6 Laser-based materials processing for photonics1.7 Specific laser processing schemes for photonics applications; 1.8 A suite of emerging concepts driving future trends; 1.9 Acknowledgements; 1.10 References; Part I Laser-induced growth of materials and surface structures; 2 Emerging pulsed laser deposition techniques; 2.1 Current state-of-the-art in pulsed laser deposition (PLD); 2.2 Problems for growth of thick films and designer refractive index profiles; 2.3 Multi-beam PLD; 2.4 Use of three different targets: combinatorial growth; 2.5 Future work in complex PLD geometries…”
Libro electrónico -
3726Publicado 2012Tabla de Contenidos: “…Creating Your Crisis Response SystemPart III: Listening Is Love; Chapter 5: Choosing Your Best Monitoring Tools; Monitoring Matters; Introducing the Tools; Chapter 6: Researching Your SEO Keywords; Defining Social SEO; Improving Your SEO and Why It's Important; Building a Solid SEO Foundation for Your Site; Assessing Your Competition; Researching Your SEO Keywords; Incorporating Your Keywords; Taking Advantage of Trends; Chapter 7: Setting Up Your Listening Tools; Creating Your Google Alerts; Setting Up Your Google Analytics; Saying Hello to HootSuite; Introducing Yahoo! Pipes…”
Libro electrónico -
3727Publicado 2015Tabla de Contenidos: “…Data analysis using pivot facetingGraphs for analytics; Getting started with Highcharts; Displaying Solr data using Highcharts; Summary; Chapter 5: Solr in E-commerce; Designing an e-commerce search; Handling unclean data; Handling variations in the product; Sorting; Problems and solutions of flash sale searches; Faceting with the option of multi-select; Faceting with hierarchical taxonomy; Faceting with size; Implementing semantic search; Optimizations; Summary; Chapter 6: Solr for Spatial Search; Features of spatial search; Java Topology Suite; Well-known Text; The Spatial4j library…”
Libro electrónico -
3728Publicado 2015Tabla de Contenidos: “…Working on pages with AJAXWorking with AJAX applications; Storing information from the page in the test; Debugging tests; Creating test suites; Parameterization; Selenium IDE Configuration; Generating source code from Selenium IDE; Saving tests; What you cannot record; Summary; Self-test questions; Chapter 2: Locators; Locating elements by ID; Finding IDs of elements on the page with Firebug; Finding elements by ID; Moving elements on the page; Finding elements by name; Adding filters to the name; Finding elements by link text; Finding elements by accessing the DOM via JavaScript…”
Libro electrónico -
3729por Minella, Michael T.Tabla de Contenidos: “…Job ExecutionParallelization; Multithreaded Steps; Parallel Steps; Remote Chunking; Partitioning; Batch Administration; Documentation; Project Setup; Obtaining Spring Batch; Using the SpringSource Tool Suite; Downloading the Zip Distribution; Checking Out from Git; Configuring Maven; It's the Law: Hello, World!…”
Publicado 2011
Libro electrónico -
3730por Lowe, Scott J.Tabla de Contenidos: “…Mastering VMware vSphere® 5; Contents; Introduction; Chapter 1 Introducing VMware vSphere 5; Exploring VMware vSphere 5; Examining the Products in the vSphere Suite; Examining the Features in VMware vSphere; Why Choose vSphere?…”
Publicado 2011
Libro electrónico -
3731por Lowe, Scott, 1970-Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; Chapter 1 Introducing VMware vSphere 5.5; Exploring VMware vSphere 5.5; Examining the Products in the vSphere Suite; Examining the Features in VMware vSphere; Licensing VMware vSphere; Why Choose vSphere?…”
Publicado 2013
Libro electrónico -
3732por Rowell, EricTabla de Contenidos: “…Working with custom shapes and fill stylesFun with Bezier curves: drawing a cloud; Drawing transparent shapes; Working with the context state stack to save and restore styles; Working with composite operations; Creating patterns with loops: drawing a gear; Randomizing shape properties: drawing a field of flowers; Creating custom shape functions: playing card suits; Putting it all together: drawing a jet; Chapter 3: Working with Images and Videos; Introduction; Drawing an image; Cropping an image; Copying and pasting sections of the canvas; Working with video; Getting image data…”
Publicado 2011
Libro electrónico -
3733por Farber, RobTabla de Contenidos: “…An Example Objective FunctionA Complete Functor for Multiple GPU Devices and the Host Processors; Brief Discussion of a Complete Nelder-Mead Optimization Code; Performance Results on XOR; Performance Discussion; Summary; The C++ Nelder-Mead Template; 3 The CUDA Tool Suite: Profiling a PCA/NLPCA Functor; PCA and NLPCA; Autoencoders; An Example Functor for PCA Analysis; An Example Functor for NLPCA Analysis; Obtaining Basic Profile Information; Gprof: A Common UNIX Profiler; The NVIDIA Visual Profiler: Computeprof; Parallel Nsight for Microsoft Visual Studio; The Nsight Timeline Analysis…”
Publicado 2012
Libro electrónico -
3734Publicado 2011Tabla de Contenidos: “…Getting Ready to Start-Setting Up Image PlanesStarting to Build the Character; Expert Mode, Hotkeys, and Scripting; Viewport Preference Settings; Getting the Basic Proportions Right; Cutting in More Detail; The High-Resolution Mesh: Breaking Up the Shapes; The Shell Modifier; The High-Resolution Mesh: Adding More Detail; Helmet; Mask; Vest; Shoulder Pads; Forearm Pad and Kneepad; Gas Tank; Glove; Belt and Details; Codpiece and Other Details; Shin Pads; Kneepad and Shoe; Chemical Suit; Breathing Pipe; Subdividing Your Model with TurboSmooth; Microbeveling; Microbeveling the Shoe Edges…”
Libro electrónico -
3735por Arnaud, Remi. author, Ardolino, Alessandro. author, Franco, Simon. author, Herubel, Adrien. author, McCutchan, John. author, Nedelcu, Nicusor. author, Nitschke, Benjamin. author, Olmstead, Don. author, Robinet, Fabrice. author, Ronchi, Christian. author, Turkowski, Rita. author, Walter, Robert. author, Samour, Gustavo. authorTabla de Contenidos: “…Parallel WorkflowMerging; Conclusion; Chapter 6: Building a Rock-Solid Content Pipeline with the COLLADA Conformance Test Suite; Things You Need to Know About the Tests; Blessed Images; Types of Tests; Two Cycles; Dataset for Input and Output; Getting Started; Downloading and Installing the CTS; Prerequisites; Python-related Tools; .NET Framework; Integration; The Config File; The Python Script; The FApplication Script as a Model; Creating and Running the Tests; Creating a Test Procedure; Adding Tests; The Grid; Running the Tests; Selecting Tests; While the Tests Are Running; Canceling Tests…”
Publicado 2014
Libro electrónico -
3736Publicado 2015Tabla de Contenidos: “…BenefitsCapital growth - making a profit; Income; Company benefits to shareholders; Risks; The risk of capital loss; Volatility risk; Timing risk; The risk of poor-quality advice; Legislative risk; Currency risk; Individual or personal risk; Chapter 5 How to buy and sell shares; Stockbrokers; A stockbroker acts as your agent; A stockbroker to suit your needs; Large versus small stockbroking firms; Discount and internet stockbroking firms; Full-service stockbroking firms; Finding a broker; Is my broker a 'participant'?…”
Libro electrónico -
3737Publicado 2014Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Configuring a Spring Development Environment; Setting up Java; Time for action - installing JDK; Time for action - setting up environment variables; Configuring a build tool; Time for action - installing the Maven build tool; Installing a web server; Time for action - installing the Tomcat web server; Configuring a development environment; Time for action - installing Spring Tool Suite; Time for action - configuring Tomcat on STS…”
Libro electrónico -
3738Publicado 2018Tabla de Contenidos: “…-- How to Use This Book -- Contact Me -- Chapter 1: The Basics of Networking -- Network Architecture and Protocols -- The Internet Protocol Suite -- Data Encapsulation -- Headers, Footers, and Addresses -- Data Transmission -- Network Routing -- My Model for Network Protocol Analysis -- Final Words -- Chapter 2: Capturing Application Traffic -- Passive Network Traffic Capture -- Quick Primer for Wireshark -- Alternative Passive Capture Techniques -- System Call Tracing -- The strace Utility on Linux -- Monitoring Network Connections with DTrace -- Process Monitor on Windows -- Advantages and Disadvantages of Passive Capture -- Active Network Traffic Capture -- Network Proxies -- Port-Forwarding Proxy -- SOCKS Proxy -- HTTP Proxies -- Forwarding an HTTP Proxy -- Reverse HTTP Proxy -- Final Words -- Chapter 3: Network Protocol Structures -- Binary Protocol Structures -- Numeric Data -- Booleans -- Bit Flags -- Binary Endian -- Text and Human-Readable Data -- Variable Binary Length Data -- Dates and Times -- POSIX/Unix Time -- Windows FILETIME -- Tag, Length, Value Pattern -- Multiplexing and Fragmentation -- Network Address Information -- Structured Binary Formats -- Text Protocol Structures -- Numeric Data -- Text Booleans -- Dates and Times -- Variable-Length Data -- Structured Text Formats -- Encoding Binary Data -- Hex Encoding -- Base64 -- Final Words -- Chapter 4: Advanced Application Traffic Capture -- Rerouting Traffic -- Using Traceroute -- Routing Tables -- Configuring a Router -- Enabling Routing on Windows -- Enabling Routing on *nix -- Network Address Translation -- Enabling SNAT…”
Libro electrónico -
3739Publicado 2024Tabla de Contenidos: “…Business logic vulnerabilities -- Preview of the Open Worldwide Application Security Project API Security Top 10 2023 -- Summary -- Further reading -- Chapter 4: Investigating Recent Breaches -- The importance of learning from mistakes -- Examining 10 high-profile API breaches from 2022 -- 1-Global shipping company -- 2-Campus access control -- 3-Microbrewery application -- 4-Cryptocurrency portal -- 5-Dating application -- 6-The All in One SEO WordPress plugin -- 7-X account information leakage -- 8-Home router -- 9-Remote access to two popular vehicles -- 10-Smart Scale -- Key takeaways and learning -- Summary -- Further reading -- Part 2: Attacking APIs -- Chapter 5: Foundations of Attacking APIs -- Technical requirements -- Understanding API attackers and their methods -- Interacting with APIs -- Finding API keys -- Enumeration and discovery of APIs -- Fuzzing API endpoints -- Attacking JWTs -- Mastering the tools of the trade -- CLI clients (HTTPie/cURL) -- Postman -- Browser tools -- Burp Suite -- Reverse proxies -- Learning the key skills of API attacking -- Building a laboratory -- Hacking vulnerable APIs -- Training courses -- Summary -- Further reading -- Chapter 6: Discovering APIs -- Technical requirements -- Passive discovery -- Google -- Offensive security Google database -- Other API-specific searchable databases -- Code analysis techniques -- Active discovery -- Network discovery and scan -- OWASP ZAP -- Burp Suite -- Reverse-engineering mobile apps -- Postman -- Implementation analysis -- Verbose error and debug messages -- OS and framework enumeration -- Timing or volume attacks -- Utilizing online tools such as BuiltWith or Wappalyzer -- Evading common defenses -- Summary -- Further reading -- Chapter 7: Attacking APIs -- Technical requirements -- Authentication attacks -- Insecure implementation logic…”
Libro electrónico -
3740Publicado 2018Tabla de Contenidos: “…-- 4.1.1 Components vs. directives -- 4.1.2 Different directives -- 4.2 Testing attribute directives -- 4.2.1 Introducing the favorite icon directive -- 4.2.2 Creating tests for FavoriteIconDirective -- 4.2.3 Setting up the FavoriteIconDirective test suite -- 4.2.4 Creating the FavoriteIconDirective tests -- 4.3 Testing structural directives -- 4.3.1 Introducing ShowContactsDirective -- 4.3.2 Creating your tests for ShowContactsDirective -- 4.3.3 Setting up the ShowContactsDirective test suite -- 4.3.4 Creating the ShowContactsDirective tests -- Summary -- Chapter 5: Testing pipes -- 5.1 Introducing PhoneNumberPipe -- 5.2 Testing PhoneNumberPipe -- 5.2.1 Testing the default usage for a pipe -- 5.2.2 Testing a pipe with a single parameter -- 5.2.3 Pipes with multiple parameters -- Summary -- Chapter 6: Testing services -- 6.1 What are services? …”
Libro electrónico