Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Psychodiagnostics 19
- History 16
- Operating systems (Computers) 15
- Counseling of 14
- Linux 14
- Security measures 11
- Social aspects 11
- Post-traumatic stress disorder 10
- Psychological aspects 10
- Computer networks 8
- Suicidal behavior 8
- Testing 8
- Computer security 7
- Development 7
- Management 7
- Diagnosis 6
- Veterans 6
- Application software 5
- Depressed persons 5
- Depression, Mental 5
- Prevention 5
- Programming 5
- Suicide 5
- Adjustment disorders 4
- Computer programming 4
- Drug addicts 4
- Government policy 4
- Mac OS 4
- Marketing 4
- Microsoft Windows (Computer file) 4
-
61
-
62Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting the Lab Ready and Attacking Exchange Server -- Technical requirements -- Lab architecture and deployment -- Active Directory kill chain -- Why we will not cover initial access and host-related topics -- Attacking Exchange Server -- User enumeration and password spraying -- Dumping and exfiltrating -- Zero2Hero exploits -- Gaining a foothold -- Summary -- Further reading -- Chapter 2: Defense Evasion -- Technical requirements -- AMSI, PowerShell CLM, and AppLocker -- Antimalware Scan Interface -- Way 1 - Error forcing -- Way 2 - Obfuscation -- Way 3 - Memory patch -- AppLocker and PowerShell CLM -- PowerShell Enhanced Logging and Sysmon -- Event Tracing for Windows (ETW) -- Summary -- References -- Further reading -- Chapter 3: Domain Reconnaissance and Discovery -- Technical requirements -- Enumeration using built-in capabilities -- PowerShell cmdlet -- WMI -- net.exe -- LDAP -- Enumeration tools -- SharpView/PowerView -- BloodHound -- Enumerating services and hunting for users -- SPN -- The file server -- User hunting -- Enumeration detection evasion -- Microsoft ATA -- Honey tokens -- Summary -- References -- Further reading -- Chapter 4: Credential Access in Domain -- Technical requirements -- Clear-text credentials in the domain -- Old, but still worth trying -- Password in the description field -- Password spray -- Capture the hash -- Forced authentication -- MS-RPRN abuse (PrinterBug) -- MS-EFSR abuse (PetitPotam) -- WebDAV abuse -- MS-FSRVP abuse (ShadowCoerce) -- MS-DFSNM abuse (DFSCoerce) -- Roasting the three-headed dog -- Kerberos 101 -- ASREQRoast -- KRB_AS_REP roasting (ASREPRoast) -- Kerberoasting -- Automatic password management in the domain -- LAPS -- gMSA -- NTDS secrets -- DCSync…”
Libro electrónico -
63Publicado 2015Libro electrónico
-
64Publicado 2022Libro electrónico
-
65
-
66por Rickels, Laurence A. 1954- Verfasser“…In addition to the deadening end that can only be postponed – the killing off of the dead until dead dead – there is another second death that concludes the wish for fame with a ritual stripping of badges and insignia. …”
Publicado 2021
Libro electrónico -
67por Pike, Robert W.Tabla de Contenidos: “…; Game #22: Body Parts; Game #23: Group Shuffle; Game #24: Tag Team Role Plays; Game #25: Word Games; Game #26: Sea If Ewe Can Find the Errers; Game #27: Connect the Dots; Game #28: Experience Levels; Game #29: Pennies Puzzler; Game #30: Killing Closed-Ended Questions; Game #31: Name that Part; Game #32: Playing the Numbers; Game #33: On the Other Hand; Game #34: Point of View; Game #35: Question of the Week; Game #36: Opening Scavenger Hunt; Game #37: Shake Hands; Game #38: 30 Seconds; Game #39: Elevator Speech…”
Publicado 2004
Libro electrónico -
68Publicado 2017Tabla de Contenidos: “…-- Understanding new database administration functions -- Killing idle sessions -- Finding more detailed information in pg_stat_activity -- Tracking vaccum progress -- Improving vacuum speed -- Digging into new SQL and developer-related functions -- Using new backup and replication functionality -- Streamlining wal_level and monitoring -- Using multiple synchronous standby servers -- Understanding performance-related features -- Improving relation extensions -- Checkpoint sorting and kernel interaction -- Using more advanced foreign data wrappers -- Introducing parallel queries -- Adding snapshot too old -- Summary -- Chapter 2: Understanding Transactions and Locking -- Working with PostgreSQL transactions -- Handling errors inside a transaction -- Making use of savepoints -- Transactional DDLs -- Understanding basic locking -- Avoiding typical mistakes and explicit locking -- Considering alternative solutions -- Making use of FOR SHARE and FOR UPDATE -- Understanding transaction isolation levels -- Considering SSI transactions -- Observing deadlocks and similar issues -- Utilizing advisory locks -- Optimizing storage and managing cleanup -- Configuring VACUUM and autovacuum -- Digging into transaction wraparound-related issues -- A word on VACUUM FULL -- Watching VACUUM at work -- Making use of snapshot too old -- Summary -- Chapter 3: Making Use of Indexes -- Understanding simple queries and the cost model -- Making use of EXPLAIN -- Digging into the PostgreSQL cost model -- Deploying simple indexes -- Making use of sorted output -- Using more than one index at a time -- Using bitmap scans effectively…”
Libro electrónico -
69Publicado 2013“…An attempt is made in this book to review what is known about past volcanic eruptions and disasters with a view to determining how best volcanic risk can be reduced today in this tectonically complex and volcanically threatening region…”
Libro electrónico -
70Publicado 2014Tabla de Contenidos: “…Modifying the background color of the status barReloading the configuration; Changing the foreground color of the status bar; Highlighting the active window; Binding keys; Viewing current bindings; Chaining multiple commands to a single key; Comments in the configuration file; Binding a new prefix key; Binding keys without the prefix key; Unbinding keys; Status bar revisited; Option types; Handy configuration tips; Binding the double tapping of the prefix key to last-window; Changing the escape time; Lengthening the history limit; Lengthening the display time; Starting the base index at 1…”
Libro electrónico -
71Publicado 2016Tabla de Contenidos: “…Creating the ground using the BSP Box brushUseful tip - selecting an object easily; Useful tip - changing View Mode to aid visuals; Adding light to a level; Useful tip - positioning objects in a level; Adding the sky to a level; Adding Player Start; Useful tip - rotating objects in a level; Viewing a level that's been created; Saving a level; Configuring a map as a start level; Adding material to the ground; Adding a wall; Duplicating a wall; Creating an opening for a door; Adding materials to the walls; Sealing a room; Adding props or a static mesh to the room…”
Libro electrónico -
72Publicado 2018Tabla de Contenidos: “…Connecting an Android device to a workstation -- Identifying the device cable -- Installing the device drivers -- Accessing the connected device -- The Android Debug Bridge -- USB debugging -- Accessing the device using adb -- Detecting connected devices -- Killing the local adb server -- Accessing the adb shell -- Basic Linux commands -- Handling an Android device -- Screen lock bypassing techniques -- Using adb to bypass the screen lock -- Deleting the gesture.key file -- Updating the settings.db file -- Checking for the modified recovery mode and adb connection -- Flashing a new recovery partition -- Using automated tools -- Using Android Device Manager -- Smudge attack -- Using the Forgot Password/Forgot Pattern option -- Bypassing third-party lock screens by booting into safe mode -- Securing the USB debugging bypass using adb keys -- Securing the USB debugging bypass in Android 4.4.2 -- Crashing the lock screen UI in Android 5.x -- Other techniques -- Gaining root access -- What is rooting? …”
Libro electrónico -
73por Jung, BerenikeTabla de Contenidos: “…2.1.4 Résumé for V for Vendetta2.2 Narrating Violence in Munich; 2.2.1 Types of Violence; 2.2.1.1 Terrorism and the Media; 2.2.1.2 Targeted Killings: The Response; 2.2.2 Cinematic Narration; 2.2.2.1 Flashbacks: Visualizing Violence with Latency; 2.2.2.2 Point of View: Heroes and Enemies; 2.2.2.3 Docudrama; 2.2.3 Narrative Challenges; 2.2.3.1 9/11: Depicting Images of Atrocity; 2.2.3.2 The Media and the Response to 9/11; 2.2.4 Résumé for Munich; 2.3 Narrating Violence in Children of Men; 2.3.1 Types of Violence; 2.3.1.1 Terrorism: The Fishes; 2.3.1.2 War; 2.3.1.3 A Biological Threat…”
Publicado 2010
Libro electrónico -
74Publicado 2016Libro electrónico
-
75
-
76Publicado 2015Libro electrónico
-
77
-
78
-
79
-
80por Gaiman, Neil
Publicado 2017Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico