Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Psychodiagnostics 19
- History 16
- Operating systems (Computers) 15
- Counseling of 14
- Linux 14
- Security measures 11
- Social aspects 11
- Post-traumatic stress disorder 10
- Psychological aspects 10
- Computer networks 8
- Suicidal behavior 8
- Testing 8
- Computer security 7
- Development 7
- Management 7
- Diagnosis 6
- Veterans 6
- Application software 5
- Depressed persons 5
- Depression, Mental 5
- Prevention 5
- Programming 5
- Suicide 5
- Adjustment disorders 4
- Computer programming 4
- Drug addicts 4
- Government policy 4
- Mac OS 4
- Marketing 4
- Microsoft Windows (Computer file) 4
-
141Publicado 2022Libro electrónico
-
142
-
143Publicado 2015Libro electrónico
-
144Publicado 2008Libro electrónico
-
145
-
146Publicado 2016Tabla de Contenidos: “…; Google Glass; Street View; Android; What Does all this Mean?; Shady Areas and Creepy Lines; Appetite for Information; Yosemite Wham Bam Thank you Sam; References; Chapter 5 - Social Media and the Dangers of Over-Sharing; Launching Thefacebook and Dropping The 'The'; Social Media: Both a Blessing and a Curse…”
Libro electrónico -
147Tabla de Contenidos: “…Making Use of Our New Directory, Using the mv Command Time for Some Cloning, How to use the cp Command; The Power to Destroy, Using the rm Command; Fully Qualified and Relative Paths; Users and Groups; File Permissions; Setting File Permissions; Shortcuts and Links; Summary; Chapter 5: Essential Commands ; Become the Boss; RTFM; System Resource Monitoring; Uptime and Load Average; Tasks; CPU Utilization Percentage; Memory Usage; Process Table ; Using free to View Memory Allocation ; Disk Usage ; Managing Processes; Killing a Process; Reading Information in / proc…”
Libro electrónico -
148
-
149Publicado 2017“…Overall, this book will give the reader a clear and global view on this important mycotoxin produced by Fusarium species which is responsible for huge economic loss and health issues. …”
Libro electrónico -
150por Long, Leland. authorTabla de Contenidos: “…Contents at a Glance; Introduction; Chapter 1: Hello World; We Love Games; Tradition; Setup; Summary; Chapter 2: SKActions and SKTextures: Your First Animated Sprite; Humble Beginnings; Removing Unnecessary Tidbits; Device Orientation; Slight View Controller Changes; More Unneeded Template Text; Images Available for Download; Background Color; The Splash Screen; Anchor Points; Back to the Splash Screen; Moving Between Scenes; Creating a New Scene; Animated Transitions Using SKActions; Grouping Multiple Actions; Animation Frames Using SKTextures; Summary…”
Publicado 2014
Libro electrónico -
151
-
152
-
153por Liberty, JesseTabla de Contenidos: “…Creating the Web Services Client -- Creating the Amazon proxy -- Creating the desktop application -- Displaying the Output -- Implementing the Grid -- Handling the RowDataBound Event -- Searching by Category -- Part III -- Assemblies and Versioning -- PE Files -- Metadata -- Security Boundary -- Manifests -- Multimodule Assemblies -- Building a Multimodule Assembly -- Testing the assembly -- Loading the assembly -- Private Assemblies -- Shared Assemblies -- The End of DLL Hell -- Versions -- Strong Names -- The Global Assembly Cache -- Building a Shared Assembly -- Step 1: Create a strong name -- Step 2: Put the shared assembly in the GAC -- Other Required Assemblies -- Attributes and Reflection -- Attributes -- Attributes -- Attribute targets -- Applying attributes -- Custom Attributes -- Declaring an attribute -- Naming an attribute -- Constructing an attribute -- Using an attribute -- Reflection -- Viewing Metadata -- Type Discovery -- Reflecting on a Type -- Finding all type members -- Finding type methods -- Finding particular type members -- Late Binding -- Marshaling and Remoting -- Application Domains -- Creating and Using App Domains -- Marshaling Across App Domain Boundaries -- Understanding marshaling with proxies -- Specifying the marshaling method -- Context -- Context-Bound and Context-Agile Objects -- Marshaling Across Context Boundaries -- Remoting -- Understanding Server Object Types -- Specifying a Server with an Interface -- Building a Server -- Building the Client -- Using SingleCall -- Understanding RegisterWellKnownServiceType -- Understanding Endpoints -- Threads and Synchronization -- Threads -- Starting Threads -- Joining Threads -- Blocking Threads with Sleep -- Killing Threads -- Synchronization -- Using Interlocked -- Using Locks -- Using Monitors -- Race Conditions and Deadlocks -- Race Conditions -- Deadlock -- Streams…”
Publicado 2001
Libro electrónico -
154Publicado 2016Electrónico
-
155Publicado 2011Tabla de Contenidos: “…Dumping the Password HashPass the Hash; Privilege Escalation; Token Impersonation; Using ps; Pivoting onto Other Systems; Using Meterpreter Scripts; Migrating a Process; Killing Antivirus Software; Obtaining System Password Hashes; Viewing All Traffic on a Target Machine; Scraping a System; Using Persistence; Leveraging Post Exploitation Modules; Upgrading Your Command Shell to Meterpreter; Manipulating Windows APIs with the Railgun Add-On; Wrapping Up; 7: Avoiding Detection; Creating Stand-Alone Binaries with MSFpayload; Evading Antivirus Detection; Encoding with MSFencode; Multi-encoding…”
Libro electrónico -
156por Morgan, John, 1961-Tabla de Contenidos: “…Longing to Belong; 32. Brand Without a Cause; 33. Why Your Website Sucks; 34. Misunderstood; 35. …”
Publicado 2012
Libro electrónico -
157Publicado 2015Libro electrónico
-
158Publicado 2016Tabla de Contenidos: “…Encrypting and decrypting disks with LUKS -- Locking down sudo -- Summary -- Chapter 13: Troubleshooting Ubuntu Servers -- Evaluating the problem space -- Conducting a root-cause analysis -- Viewing system logs -- Tracing network issues -- Troubleshooting resource issues -- Diagnosing defective RAM -- Summary -- Chapter 14: Preventing and Recovering from Disasters -- Preventing disasters -- Utilizing Git for configuration management -- Implementing a backup plan -- Creating system images with Clonezilla live -- Utilizing bootable recovery media -- Summary -- Index…”
Libro electrónico -
159
-
160