Mostrando 61 - 80 Resultados de 280 Para Buscar 'A View to a Kill', tiempo de consulta: 0.09s Limitar resultados
  1. 61
    Publicado 2014
    Vídeo online
  2. 62
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting the Lab Ready and Attacking Exchange Server -- Technical requirements -- Lab architecture and deployment -- Active Directory kill chain -- Why we will not cover initial access and host-related topics -- Attacking Exchange Server -- User enumeration and password spraying -- Dumping and exfiltrating -- Zero2Hero exploits -- Gaining a foothold -- Summary -- Further reading -- Chapter 2: Defense Evasion -- Technical requirements -- AMSI, PowerShell CLM, and AppLocker -- Antimalware Scan Interface -- Way 1 - Error forcing -- Way 2 - Obfuscation -- Way 3 - Memory patch -- AppLocker and PowerShell CLM -- PowerShell Enhanced Logging and Sysmon -- Event Tracing for Windows (ETW) -- Summary -- References -- Further reading -- Chapter 3: Domain Reconnaissance and Discovery -- Technical requirements -- Enumeration using built-in capabilities -- PowerShell cmdlet -- WMI -- net.exe -- LDAP -- Enumeration tools -- SharpView/PowerView -- BloodHound -- Enumerating services and hunting for users -- SPN -- The file server -- User hunting -- Enumeration detection evasion -- Microsoft ATA -- Honey tokens -- Summary -- References -- Further reading -- Chapter 4: Credential Access in Domain -- Technical requirements -- Clear-text credentials in the domain -- Old, but still worth trying -- Password in the description field -- Password spray -- Capture the hash -- Forced authentication -- MS-RPRN abuse (PrinterBug) -- MS-EFSR abuse (PetitPotam) -- WebDAV abuse -- MS-FSRVP abuse (ShadowCoerce) -- MS-DFSNM abuse (DFSCoerce) -- Roasting the three-headed dog -- Kerberos 101 -- ASREQRoast -- KRB_AS_REP roasting (ASREPRoast) -- Kerberoasting -- Automatic password management in the domain -- LAPS -- gMSA -- NTDS secrets -- DCSync…”
    Libro electrónico
  3. 63
    Publicado 2015
    Libro electrónico
  4. 64
    Publicado 2022
    Libro electrónico
  5. 65
  6. 66
    “…In addition to the deadening end that can only be postponed – the killing off of the dead until dead dead – there is another second death that concludes the wish for fame with a ritual stripping of badges and insignia. …”
    Libro electrónico
  7. 67
    por Pike, Robert W.
    Publicado 2004
    Tabla de Contenidos: “…; Game #22: Body Parts; Game #23: Group Shuffle; Game #24: Tag Team Role Plays; Game #25: Word Games; Game #26: Sea If Ewe Can Find the Errers; Game #27: Connect the Dots; Game #28: Experience Levels; Game #29: Pennies Puzzler; Game #30: Killing Closed-Ended Questions; Game #31: Name that Part; Game #32: Playing the Numbers; Game #33: On the Other Hand; Game #34: Point of View; Game #35: Question of the Week; Game #36: Opening Scavenger Hunt; Game #37: Shake Hands; Game #38: 30 Seconds; Game #39: Elevator Speech…”
    Libro electrónico
  8. 68
    Publicado 2017
    Tabla de Contenidos: “…-- Understanding new database administration functions -- Killing idle sessions -- Finding more detailed information in pg_stat_activity -- Tracking vaccum progress -- Improving vacuum speed -- Digging into new SQL and developer-related functions -- Using new backup and replication functionality -- Streamlining wal_level and monitoring -- Using multiple synchronous standby servers -- Understanding performance-related features -- Improving relation extensions -- Checkpoint sorting and kernel interaction -- Using more advanced foreign data wrappers -- Introducing parallel queries -- Adding snapshot too old -- Summary -- Chapter 2: Understanding Transactions and Locking -- Working with PostgreSQL transactions -- Handling errors inside a transaction -- Making use of savepoints -- Transactional DDLs -- Understanding basic locking -- Avoiding typical mistakes and explicit locking -- Considering alternative solutions -- Making use of FOR SHARE and FOR UPDATE -- Understanding transaction isolation levels -- Considering SSI transactions -- Observing deadlocks and similar issues -- Utilizing advisory locks -- Optimizing storage and managing cleanup -- Configuring VACUUM and autovacuum -- Digging into transaction wraparound-related issues -- A word on VACUUM FULL -- Watching VACUUM at work -- Making use of snapshot too old -- Summary -- Chapter 3: Making Use of Indexes -- Understanding simple queries and the cost model -- Making use of EXPLAIN -- Digging into the PostgreSQL cost model -- Deploying simple indexes -- Making use of sorted output -- Using more than one index at a time -- Using bitmap scans effectively…”
    Libro electrónico
  9. 69
    Publicado 2013
    “…An attempt is made in this book to review what is known about past volcanic eruptions and disasters with a view to determining how best volcanic risk can be reduced today in this tectonically complex and volcanically threatening region…”
    Libro electrónico
  10. 70
    Publicado 2014
    Tabla de Contenidos: “…Modifying the background color of the status barReloading the configuration; Changing the foreground color of the status bar; Highlighting the active window; Binding keys; Viewing current bindings; Chaining multiple commands to a single key; Comments in the configuration file; Binding a new prefix key; Binding keys without the prefix key; Unbinding keys; Status bar revisited; Option types; Handy configuration tips; Binding the double tapping of the prefix key to last-window; Changing the escape time; Lengthening the history limit; Lengthening the display time; Starting the base index at 1…”
    Libro electrónico
  11. 71
    Publicado 2016
    Tabla de Contenidos: “…Creating the ground using the BSP Box brushUseful tip - selecting an object easily; Useful tip - changing View Mode to aid visuals; Adding light to a level; Useful tip - positioning objects in a level; Adding the sky to a level; Adding Player Start; Useful tip - rotating objects in a level; Viewing a level that's been created; Saving a level; Configuring a map as a start level; Adding material to the ground; Adding a wall; Duplicating a wall; Creating an opening for a door; Adding materials to the walls; Sealing a room; Adding props or a static mesh to the room…”
    Libro electrónico
  12. 72
    Publicado 2018
    Tabla de Contenidos: “…Connecting an Android device to a workstation -- Identifying the device cable -- Installing the device drivers -- Accessing the connected device -- The Android Debug Bridge -- USB debugging -- Accessing the device using adb -- Detecting connected devices -- Killing the local adb server -- Accessing the adb shell -- Basic Linux commands -- Handling an Android device -- Screen lock bypassing techniques -- Using adb to bypass the screen lock -- Deleting the gesture.key file -- Updating the settings.db file -- Checking for the modified recovery mode and adb connection -- Flashing a new recovery partition -- Using automated tools -- Using Android Device Manager -- Smudge attack -- Using the Forgot Password/Forgot Pattern option -- Bypassing third-party lock screens by booting into safe mode -- Securing the USB debugging bypass using adb keys -- Securing the USB debugging bypass in Android 4.4.2 -- Crashing the lock screen UI in Android 5.x -- Other techniques -- Gaining root access -- What is rooting? …”
    Libro electrónico
  13. 73
    por Jung, Berenike
    Publicado 2010
    Tabla de Contenidos: “…2.1.4 Résumé for V for Vendetta2.2 Narrating Violence in Munich; 2.2.1 Types of Violence; 2.2.1.1 Terrorism and the Media; 2.2.1.2 Targeted Killings: The Response; 2.2.2 Cinematic Narration; 2.2.2.1 Flashbacks: Visualizing Violence with Latency; 2.2.2.2 Point of View: Heroes and Enemies; 2.2.2.3 Docudrama; 2.2.3 Narrative Challenges; 2.2.3.1 9/11: Depicting Images of Atrocity; 2.2.3.2 The Media and the Response to 9/11; 2.2.4 Résumé for Munich; 2.3 Narrating Violence in Children of Men; 2.3.1 Types of Violence; 2.3.1.1 Terrorism: The Fishes; 2.3.1.2 War; 2.3.1.3 A Biological Threat…”
    Libro electrónico
  14. 74
    Publicado 2016
    Libro electrónico
  15. 75
  16. 76
    Publicado 2015
    Libro electrónico
  17. 77
  18. 78
  19. 79
  20. 80
    por Gaiman, Neil
    Publicado 2017
    Libro electrónico