Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 16,533
- Biblia 6,638
- Filosofía 4,691
- Universidad Pontificia de Salamanca (España) 4,581
- Crítica e interpretación 4,081
- Derecho 3,744
- RELIGION 3,643
- Educación 3,560
- Història 3,432
- Iglesia Católica 3,122
- Ciencias sociales 2,924
- Moral cristiana 2,558
- Teología dogmática 2,461
- Psicología 2,349
- Teología 2,325
- Sermones 2,215
- Management 2,201
- Development 2,161
- Derecho canónico 2,114
- History 1,989
- Derecho civil 1,960
- Education 1,951
- Documentales 1,893
- Universidad Pontificia de Salamanca, Facultad de Educación 1,877
- Engineering & Applied Sciences 1,850
- Medicina 1,762
- Tecnología 1,716
- Philosophy 1,704
- Application software 1,700
- Economía 1,618
-
641921
-
641922
-
641923
-
641924
-
641925
-
641926Publicado 2021Tabla de Contenidos: “…4.2.2.8 SRv6 End.X SID TLV -- 4.2.2.9 SRv6 LAN End.X SID TLV -- 4.2.2.10 SRv6 Locator TLV -- 4.3 PCEP FOR SRv6 -- 4.3.1 PCE Overview -- 4.3.2 Stateful PCE -- 4.3.3 PCEP Extensions for SRv6 -- 4.3.3.1 SRv6 PATH-SETUP-TYPE -- 4.3.3.2 SRv6 PCE Capability Sub-TLV -- 4.3.3.3 SRv6-ERO Subobject -- 4.3.3.4 SRv6-RRO Subobject -- 4.4 SRv6 POLICY -- 4.4.1 SRv6 Policy Model -- 4.4.1.1 Keys -- 4.4.1.2 Candidate Paths -- 4.4.1.3 Segment Lists -- 4.4.2 SRv6 Policy Path Computation -- 4.4.2.1 Manual Configuration -- 4.4.2.2 Headend Computation -- 4.4.2.3 Centralized Computation -- 4.4.3 Traffic Steering into an SRv6 Policy -- 4.4.3.1 Binding SID-Based Traffic Steering -- 4.4.3.2 Color-Based Traffic Steering -- 4.4.3.3 DSCP-Based Traffic Steering -- 4.4.4 Data Forwarding over an SRv6 Policy -- 4.4.5 SRv6 Policy Fault Detection -- 4.4.5.1 SBFD for SRv6 Policy -- 4.4.5.2 Headend-Based Fault Detection -- 4.4.6 SRv6 Policy Switchover -- 4.5 BGP SRv6 POLICY -- 4.5.1 SRv6 Policy SAFI and NLRI -- 4.5.2 SR Policy and Tunnel Encaps Attribute -- 4.5.3 Binding SID Sub-TLV -- 4.5.4 Preference Sub-TL V -- 4.5.5 Segment List Sub-TLV -- 4.5.6 Weight Sub-TLV -- 4.5.7 Segment Sub-TLV -- 4.5.8 Policy Priority Sub-TLV -- 4.5.9 Policy Name Sub-TLV -- 4.6 STORIES BEHIND SRv6 DESIGN -- REFERENCES -- Chapter 5 ◾ SRv6 VPN -- 5.1 VPN OVERVIEW -- 5.1.1 Basic VPN Model -- 5.1.2 VPN Service Types -- 5.1.2.1 L3VPN -- 5.1.2.2 L2VPN and EVPN -- 5.2 SRv6 VPN PROTOCOL EXTENSIONS -- 5.2.1 SRv6 Services TLV -- 5.2.2 SRv6 SID Information Sub-TLV -- 5.2.3 SRv6 SID Structure Sub-Sub-TLV -- 5.3 SRv6 L3VPN -- 5.3.1 Principles of L3VPN over SRv6 BE -- 5.3.1.1 Workflow of L3VPN over SRv6 BE in the Control Plane -- 5.3.1.2 Workflow of L3VPN over SRv6 BE in the Forwarding Plane -- 5.3.2 Principles of L3VPN over SRv6 TE -- 5.3.2.1 Workflow of L3VPN over SRv6 Policy in the Control Plane…”
Libro electrónico -
641927
-
641928
-
641929
-
641930
-
641931Publicado 2020“…What you'll learn--and how you can apply it Learn the difference between architecture decisions and technology decisions Establish techniques for architecture refactoring Leverage checklists effectively by finding a balance between usefulness and overhead Manage your personal productivity, such as interacting with business stakeholders and other architects The process for several certification programs, as well as architectural certification pros and cons What continuous delivery means to an architect How to develop your career path Exercises included Self-Paced Exercise: Charting Your Career (Building Your Own Radar) This learning path is for you because... …”
Video -
641932por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…SWOT analysis of the National Strategy for Social Entrepreneurship in the Republic of Croatia -- Lessons learnt and conditions for potential replicability -- Conditions for potential replicability -- Possible challenges to replication -- Notes -- References -- Chapter 5 Copenhagen Project House (KPH): An incubator for social start-ups, Denmark -- Summary -- Key facts -- Objectives -- Rationale -- Activities -- Challenges encountered and impact -- Challenges -- Impact -- Table 5.1. …”
Publicado 2017
Libro electrónico -
641933Publicado 2022Tabla de Contenidos: “…Transparent Systems in Which an Investor's Holdings are Held by an Intermediary in an Omnibus Account at the CSD -- C. Summary and Evaluation -- Part II - Reports on National, Regional, and International Substantive Law Rules in Respect of Security Interests in Intermediated Securities -- Chapter 1: The Pledge of Securities Accounts under the OHADA Uniform Act on Security Interests -- A. …”
Libro electrónico -
641934Publicado 2017Tabla de Contenidos: “…Research Methods -- 5 Strategy and Techniques -- 5.1 Strategy -- 16 Towards a Domestication Strategy for Indigenous Fruit Trees in the Tropics -- Introduction -- Developing a Strategy for Creating New "Cultivars" Vegetatively -- Methods of Propagation and the Cloning Process -- Appropriate Technology -- Choice Between Mature and Juvenile Tissues -- The Use of Juvenile Tissues -- The Use of Mature Tissues -- Developing a Strategy for Clonal Selection -- Opportunities for Introducing New Variation -- The Wise Use of Genetic Variability -- Establishing a Gene Bank (Ex situ Conservation) -- The Wise Utilization of Genetic Resources in Cultivation (Circa situ Conservation) -- Protecting Some Wild Populations (In situ Conservation) -- Socioeconomic and Environmental Context for This Strategy -- Conclusions -- 5.2 Techniques: Vegetative Propagation -- 17 Low-Technology Techniques for the Vegetative Propagation of Tropical Trees -- Summary -- Introduction -- Materials and Methods -- General -- Preparation of Cuttings -- The Nonmist Propagator -- Results -- The Propagator Environment -- Rooting Tests -- Discussion -- 18 Stockplant Factors Affecting Root Initiation in Cuttings of Triplochiton scleroxylon K. …”
Libro electrónico -
641935Publicado 2013Tabla de Contenidos: “…-- Rückgängig zu machende Aktionen von 20 auf 150 erhöhen -- Sieben auf einen Streich -- Tipps zum Markieren -- Flexible und unflexible Textfelder -- Objektmodus: Formatieren ohne Markieren -- Mehrere Formen hintereinander zeichnen -- Eine Form in eine andere Form umwandeln -- Textumbruch in Formen -- Die Form an den Inhalt anpassen -- Exaktes Positionieren mit der Tastatur -- Exaktes Positionieren mit der Maus -- Formen proportional vergrößern und verkleinern -- Kreis, Quadrat und gerade Linie zeichnen -- Vordergrund und Hintergrund: Objekte stapeln…”
Libro electrónico -
641936Publicado 2003Tabla de Contenidos: “…Keeping the transaction monitoring environment fit -- 6.1 Basic maintenance for the TMTP WTP environment -- 6.1.1 Checking MBeans -- 6.2 Configuring the ARM Agent -- 6.3 J2EE monitoring maintenance -- 6.4 TMTP TDW maintenance tips -- 6.5 Uninstalling the TMTP Management Server -- 6.5.1 The right way to uninstall on UNIX -- 6.5.2 The wrong way to uninstall on UNIX -- 6.5.3 Removing GenWin from a Management Agent -- 6.5.4 Removing the J2EE component manually -- 6.6 TMTP Version 5.2 best practices -- Part 3 Using TMTP to measure transaction performance -- Chapter 7. …”
Libro electrónico -
641937Publicado 2018Tabla de Contenidos: “…Basic post-exploitation commands -- The help menu -- The background command -- Reading from a channel -- File operation commands -- Desktop commands -- Screenshots and camera enumeration -- Advanced post-exploitation with Metasploit -- Obtaining system privileges -- Changing access, modification, and creation time with timestomp -- Additional post-exploitation modules -- Gathering wireless SSIDs with Metasploit -- Gathering Wi-Fi passwords with Metasploit -- Getting the applications list -- Gathering Skype passwords -- Gathering USB history -- Searching files with Metasploit -- Wiping logs from the target with the clearev command -- Advanced extended features of Metasploit -- Using pushm and popm commands -- Speeding up development using the reload, edit, and reload_all commands -- Making use of resource scripts -- Using AutoRunScript in Metasploit -- Using the multiscript module in AutoRunScript option -- Privilege escalation using Metasploit -- Finding passwords in clear text using mimikatz -- Sniffing traffic with Metasploit -- Host file injection with Metasploit -- Phishing Windows login passwords -- Summary and exercises -- Chapter 9: Evasion with Metasploit -- Evading Meterpreter using C wrappers and custom encoders -- Writing a custom Meterpreter encoder/decoder in C -- Evading intrusion detection systems with Metasploit -- Using random cases for fun and profit -- Using fake relatives to fool IDS systems -- Bypassing Windows firewall blocked ports -- Using the reverse Meterpreter on all ports -- Summary and exercises -- Chapter 10: Metasploit for Secret Agents -- Maintaining anonymity in Meterpreter sessions -- Maintaining access using vulnerabilities in common software -- DLL search order hijacking -- Using code caves for hiding backdoors -- Harvesting files from target systems -- Using venom for obfuscation…”
Libro electrónico -
641938por Simovic, VladimirTabla de Contenidos: “…-- 3.1.1 Beiträge -- 3.1.2 Seiten -- 3.2 Der Gutenberg-Editor -- 3.2.1 Ansicht anpassen -- 3.3 Blöcke hinzufügen und Inhalte gestalten -- 3.4 Text-Blöcke -- 3.4.1 Absatz -- 3.4.2 Classic -- 3.4.3 Code -- 3.4.4 Liste -- 3.4.5 Pullquote (»Schönes Zitat«) -- 3.4.6 Tabelle -- 3.4.7 Überschrift -- 3.4.8 Vers -- 3.4.9 Vorformatiert -- 3.4.10 Zitat -- 3.5 Medien-Blöcke -- 3.5.1 Audio -- 3.5.2 Bild -- 3.5.3 Datei -- 3.5.4 Galerie -- 3.5.5 Medien und Text -- 3.5.6 Titelbild (Cover) -- 3.5.7 Video -- 3.6 Design-Blöcke -- 3.6.1 Abstandshalter -- 3.6.2 Buttons -- 3.6.3 Gruppe -- 3.6.4 Mehr -- 3.6.5 Seitenumbruch -- 3.6.6 Spalten -- 3.6.7 Stapel -- 3.6.8 Trenner -- 3.6.9 Zeile -- 3.7 Widgets -- 3.7.1 Archive…”
Publicado 2022
Libro electrónico -
641939
-
641940por Place, M.M.Noël Et de la“…Fons Google Books (Biblioteca de Montserrat)…”
Publicado 1848
Accés Lliure
Libro