Mostrando 641,921 - 641,940 Resultados de 650,569 Para Buscar 'C5N~', tiempo de consulta: 1.74s Limitar resultados
  1. 641921
    por Gioberti, Vincenzo, 1801-1852
    Publicado 1843
    Libro
  2. 641922
    por Consejo de Navarra
    Publicado 2000
    Seriadas
  3. 641923
    Libro
  4. 641924
    por Turoldo, David Maria, 1916-1992
    Publicado 1995
    Libro
  5. 641925
    por Munsó Cabús, Joan
    Publicado 2006
    “…Diccionario de películas : el cine musical…”
    Libro
  6. 641926
    Publicado 2021
    Tabla de Contenidos: “…4.2.2.8 SRv6 End.X SID TLV -- 4.2.2.9 SRv6 LAN End.X SID TLV -- 4.2.2.10 SRv6 Locator TLV -- 4.3 PCEP FOR SRv6 -- 4.3.1 PCE Overview -- 4.3.2 Stateful PCE -- 4.3.3 PCEP Extensions for SRv6 -- 4.3.3.1 SRv6 PATH-SETUP-TYPE -- 4.3.3.2 SRv6 PCE Capability Sub-TLV -- 4.3.3.3 SRv6-ERO Subobject -- 4.3.3.4 SRv6-RRO Subobject -- 4.4 SRv6 POLICY -- 4.4.1 SRv6 Policy Model -- 4.4.1.1 Keys -- 4.4.1.2 Candidate Paths -- 4.4.1.3 Segment Lists -- 4.4.2 SRv6 Policy Path Computation -- 4.4.2.1 Manual Configuration -- 4.4.2.2 Headend Computation -- 4.4.2.3 Centralized Computation -- 4.4.3 Traffic Steering into an SRv6 Policy -- 4.4.3.1 Binding SID-Based Traffic Steering -- 4.4.3.2 Color-Based Traffic Steering -- 4.4.3.3 DSCP-Based Traffic Steering -- 4.4.4 Data Forwarding over an SRv6 Policy -- 4.4.5 SRv6 Policy Fault Detection -- 4.4.5.1 SBFD for SRv6 Policy -- 4.4.5.2 Headend-Based Fault Detection -- 4.4.6 SRv6 Policy Switchover -- 4.5 BGP SRv6 POLICY -- 4.5.1 SRv6 Policy SAFI and NLRI -- 4.5.2 SR Policy and Tunnel Encaps Attribute -- 4.5.3 Binding SID Sub-TLV -- 4.5.4 Preference Sub-TL V -- 4.5.5 Segment List Sub-TLV -- 4.5.6 Weight Sub-TLV -- 4.5.7 Segment Sub-TLV -- 4.5.8 Policy Priority Sub-TLV -- 4.5.9 Policy Name Sub-TLV -- 4.6 STORIES BEHIND SRv6 DESIGN -- REFERENCES -- Chapter 5 ◾ SRv6 VPN -- 5.1 VPN OVERVIEW -- 5.1.1 Basic VPN Model -- 5.1.2 VPN Service Types -- 5.1.2.1 L3VPN -- 5.1.2.2 L2VPN and EVPN -- 5.2 SRv6 VPN PROTOCOL EXTENSIONS -- 5.2.1 SRv6 Services TLV -- 5.2.2 SRv6 SID Information Sub-TLV -- 5.2.3 SRv6 SID Structure Sub-Sub-TLV -- 5.3 SRv6 L3VPN -- 5.3.1 Principles of L3VPN over SRv6 BE -- 5.3.1.1 Workflow of L3VPN over SRv6 BE in the Control Plane -- 5.3.1.2 Workflow of L3VPN over SRv6 BE in the Forwarding Plane -- 5.3.2 Principles of L3VPN over SRv6 TE -- 5.3.2.1 Workflow of L3VPN over SRv6 Policy in the Control Plane…”
    Libro electrónico
  7. 641927
    Libro
  8. 641928
    por Moke, H. G. 1803-1862
    Publicado 1848
    Libro
  9. 641929
    por Sánchez Pérez, José Augusto
    Publicado 1943
    Libro
  10. 641930
    por Serra, Aristide, 1937-
    Publicado 1989
    Libro
  11. 641931
    Publicado 2020
    “…What you'll learn--and how you can apply it Learn the difference between architecture decisions and technology decisions Establish techniques for architecture refactoring Leverage checklists effectively by finding a balance between usefulness and overhead Manage your personal productivity, such as interacting with business stakeholders and other architects The process for several certification programs, as well as architectural certification pros and cons What continuous delivery means to an architect How to develop your career path Exercises included Self-Paced Exercise: Charting Your Career (Building Your Own Radar) This learning path is for you because... …”
    Video
  12. 641932
    Tabla de Contenidos: “…SWOT analysis of the National Strategy for Social Entrepreneurship in the Republic of Croatia -- Lessons learnt and conditions for potential replicability -- Conditions for potential replicability -- Possible challenges to replication -- Notes -- References -- Chapter 5 Copenhagen Project House (KPH): An incubator for social start-ups, Denmark -- Summary -- Key facts -- Objectives -- Rationale -- Activities -- Challenges encountered and impact -- Challenges -- Impact -- Table 5.1. …”
    Libro electrónico
  13. 641933
    Publicado 2022
    Tabla de Contenidos: “…Transparent Systems in Which an Investor's Holdings are Held by an Intermediary in an Omnibus Account at the CSD -- C. Summary and Evaluation -- Part II - Reports on National, Regional, and International Substantive Law Rules in Respect of Security Interests in Intermediated Securities -- Chapter 1: The Pledge of Securities Accounts under the OHADA Uniform Act on Security Interests -- A. …”
    Libro electrónico
  14. 641934
    Publicado 2017
    Tabla de Contenidos: “…Research Methods -- 5 Strategy and Techniques -- 5.1 Strategy -- 16 Towards a Domestication Strategy for Indigenous Fruit Trees in the Tropics -- Introduction -- Developing a Strategy for Creating New "Cultivars" Vegetatively -- Methods of Propagation and the Cloning Process -- Appropriate Technology -- Choice Between Mature and Juvenile Tissues -- The Use of Juvenile Tissues -- The Use of Mature Tissues -- Developing a Strategy for Clonal Selection -- Opportunities for Introducing New Variation -- The Wise Use of Genetic Variability -- Establishing a Gene Bank (Ex situ Conservation) -- The Wise Utilization of Genetic Resources in Cultivation (Circa situ Conservation) -- Protecting Some Wild Populations (In situ Conservation) -- Socioeconomic and Environmental Context for This Strategy -- Conclusions -- 5.2 Techniques: Vegetative Propagation -- 17 Low-Technology Techniques for the Vegetative Propagation of Tropical Trees -- Summary -- Introduction -- Materials and Methods -- General -- Preparation of Cuttings -- The Nonmist Propagator -- Results -- The Propagator Environment -- Rooting Tests -- Discussion -- 18 Stockplant Factors Affecting Root Initiation in Cuttings of Triplochiton scleroxylon K. …”
    Libro electrónico
  15. 641935
    Publicado 2013
    Tabla de Contenidos: “…-- Rückgängig zu machende Aktionen von 20 auf 150 erhöhen -- Sieben auf einen Streich -- Tipps zum Markieren -- Flexible und unflexible Textfelder -- Objektmodus: Formatieren ohne Markieren -- Mehrere Formen hintereinander zeichnen -- Eine Form in eine andere Form umwandeln -- Textumbruch in Formen -- Die Form an den Inhalt anpassen -- Exaktes Positionieren mit der Tastatur -- Exaktes Positionieren mit der Maus -- Formen proportional vergrößern und verkleinern -- Kreis, Quadrat und gerade Linie zeichnen -- Vordergrund und Hintergrund: Objekte stapeln…”
    Libro electrónico
  16. 641936
    Publicado 2003
    Tabla de Contenidos: “…Keeping the transaction monitoring environment fit -- 6.1 Basic maintenance for the TMTP WTP environment -- 6.1.1 Checking MBeans -- 6.2 Configuring the ARM Agent -- 6.3 J2EE monitoring maintenance -- 6.4 TMTP TDW maintenance tips -- 6.5 Uninstalling the TMTP Management Server -- 6.5.1 The right way to uninstall on UNIX -- 6.5.2 The wrong way to uninstall on UNIX -- 6.5.3 Removing GenWin from a Management Agent -- 6.5.4 Removing the J2EE component manually -- 6.6 TMTP Version 5.2 best practices -- Part 3 Using TMTP to measure transaction performance -- Chapter 7. …”
    Libro electrónico
  17. 641937
    Publicado 2018
    Tabla de Contenidos: “…Basic post-exploitation commands -- The help menu -- The background command -- Reading from a channel -- File operation commands -- Desktop commands -- Screenshots and camera enumeration -- Advanced post-exploitation with Metasploit -- Obtaining system privileges -- Changing access, modification, and creation time with timestomp -- Additional post-exploitation modules -- Gathering wireless SSIDs with Metasploit -- Gathering Wi-Fi passwords with Metasploit -- Getting the applications list -- Gathering Skype passwords -- Gathering USB history -- Searching files with Metasploit -- Wiping logs from the target with the clearev command -- Advanced extended features of Metasploit -- Using pushm and popm commands -- Speeding up development using the reload, edit, and reload_all commands -- Making use of resource scripts -- Using AutoRunScript in Metasploit -- Using the multiscript module in AutoRunScript option -- Privilege escalation using Metasploit -- Finding passwords in clear text using mimikatz -- Sniffing traffic with Metasploit -- Host file injection with Metasploit -- Phishing Windows login passwords -- Summary and exercises -- Chapter 9: Evasion with Metasploit -- Evading Meterpreter using C wrappers and custom encoders -- Writing a custom Meterpreter encoder/decoder in C -- Evading intrusion detection systems with Metasploit -- Using random cases for fun and profit -- Using fake relatives to fool IDS systems -- Bypassing Windows firewall blocked ports -- Using the reverse Meterpreter on all ports -- Summary and exercises -- Chapter 10: Metasploit for Secret Agents -- Maintaining anonymity in Meterpreter sessions -- Maintaining access using vulnerabilities in common software -- DLL search order hijacking -- Using code caves for hiding backdoors -- Harvesting files from target systems -- Using venom for obfuscation…”
    Libro electrónico
  18. 641938
    por Simovic, Vladimir
    Publicado 2022
    Tabla de Contenidos: “…-- 3.1.1 Beiträge -- 3.1.2 Seiten -- 3.2 Der Gutenberg-Editor -- 3.2.1 Ansicht anpassen -- 3.3 Blöcke hinzufügen und Inhalte gestalten -- 3.4 Text-Blöcke -- 3.4.1 Absatz -- 3.4.2 Classic -- 3.4.3 Code -- 3.4.4 Liste -- 3.4.5 Pullquote (»Schönes Zitat«) -- 3.4.6 Tabelle -- 3.4.7 Überschrift -- 3.4.8 Vers -- 3.4.9 Vorformatiert -- 3.4.10 Zitat -- 3.5 Medien-Blöcke -- 3.5.1 Audio -- 3.5.2 Bild -- 3.5.3 Datei -- 3.5.4 Galerie -- 3.5.5 Medien und Text -- 3.5.6 Titelbild (Cover) -- 3.5.7 Video -- 3.6 Design-Blöcke -- 3.6.1 Abstandshalter -- 3.6.2 Buttons -- 3.6.3 Gruppe -- 3.6.4 Mehr -- 3.6.5 Seitenumbruch -- 3.6.6 Spalten -- 3.6.7 Stapel -- 3.6.8 Trenner -- 3.6.9 Zeile -- 3.7 Widgets -- 3.7.1 Archive…”
    Libro electrónico
  19. 641939
    Publicado 1847
    “…Fons Google Books (Biblioteca de Montserrat)…”
    Accés Lliure
    Libro
  20. 641940
    por Place, M.M.Noël Et de la
    Publicado 1848
    “…Fons Google Books (Biblioteca de Montserrat)…”
    Accés Lliure
    Libro