Mostrando 642,081 - 642,100 Resultados de 650,569 Para Buscar 'C5N~', tiempo de consulta: 2.12s Limitar resultados
  1. 642081
    por Cerrolaza Gili, Óscar
    Publicado 2013
    “…Para quienes deseen comprobar los conocimientos adquiridos con este Diccionario práctico de gramática, para quienes realicen cursos de gramática o para quienes, de forma autónoma, se acerquen a este curso gramatical, se ha diseñado un libro que en paralelo propone ejercicios y actividades de práctica y reutilización de todos los contenidos presentados en este libro…”
    Libro
  2. 642082
  3. 642083
    por Noguer y Musqueras, Tomás
    Publicado 1967
    Libro
  4. 642084
    Publicado 1993
    Tabla de Contenidos: “…Conté: 1. Archivos, instituciones, cultura e influencia de castilla y León en el Nuevo Mundo. 2. …”
    Libro
  5. 642085
    por Balzac, Honoré de, 1799-1850
    Publicado 1837
    Libro
  6. 642086
    Publicado 2014
    “…You’ll learn about different abstractions, their pros and cons, and how to effectively choose between them. …”
    Video
  7. 642087
    Publicado 1926
    Tesis
  8. 642088
    Publicado 2022
    “…I am honored to undertake the work for Guest Editor for this Special Issue of EPR Effect-Based Tumor Targeted Nanomedicine for the Journal of Personalized Medicine. It has already been 35 years since we published the concept of the EPR effect for the first time. …”
    Libro electrónico
  9. 642089
    Publicado 2003
    “…This book answers the questions MFC developers have about .NET, including: What are the key issues when combining MFC and Managed Extensions? Page 15 How can Regular Expressions be used to parse a document for multiple complex pattern types, such as email addresses? …”
    Libro electrónico
  10. 642090
    por Beffa, Federico
    Publicado 2024
    “…The authors show how they can be described by a set of linear equivalent circuits which can be manipulated in the usual way. …”
    Libro electrónico
  11. 642091
    Tabla de Contenidos:
    Manuscrito
  12. 642092
    por Espinalt i Garcia, Bernat
    Publicado 1778
    Tabla de Contenidos: “…Conté: v. 1. Reyno de Murcia -- v. 2. Reynos de Aragon y Mallorca. …”
    Libro
  13. 642093
    por Bosch, Agustí
    Publicado 2011
    Tabla de Contenidos: “…Sistema de partit únic; 5.5.2. Sistema de partit hegemònic; 5.5.3. Sistema de partit dominant; 5.5.4. …”
    Libro electrónico
  14. 642094
    Tabla de Contenidos: “…Mise en place d'un cadre de dépenses à moyen terme -- Intégration des fonds extrabudgétaires dans le cadre des dépenses à moyen terme -- Améliorer l'efficacité des dépenses publiques -- Graphique 21. …”
    Libro electrónico
  15. 642095
    Publicado 2017
    Tabla de Contenidos: “…. -- There's more... -- Chapter 5: Administration of Tabular Models -- Introduction -- Managing tabular model properties -- [Changing data backup locations] -- Changing data backup locations -- Changing DirectQuery mode -- Changing workspace retention -- Changing workspace server -- Managing perspectives -- Getting ready -- How to do it... -- Adding a new perspective -- Editing a perspective -- Renaming a perspective -- Deleting a perspective -- Copying a perspective -- Managing partitions -- How to do it... -- Creating a Partition -- Editing a partition -- Processing partitions -- How it works... -- Managing roles -- Getting ready -- How to do it... -- Creating Admin role -- Creating a Read role -- Creating a read and process role…”
    Libro electrónico
  16. 642096
    Publicado 2018
    Tabla de Contenidos: “…. -- See also -- Pain Point #5: Utilizing alternate sources for trained images -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Pain Point #6: Prioritizing high-level libraries for CNNs -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also…”
    Libro electrónico
  17. 642097
    Publicado 2023
    Tabla de Contenidos: “…Hands-on lab - creating your GPG keys -- Hands-on lab - symmetrically encrypting your own files -- Hands-on lab - encrypting files with public keys -- Hands-on lab - signing a file without encryption -- Encrypting partitions with Linux Unified Key Setup (LUKS) -- Disk encryption during operating system installation -- Hands-on lab - adding an encrypted partition with LUKS -- Configuring the LUKS partition to mount automatically -- Hands-on lab - configuring the LUKS partition to mount automatically -- Encrypting directories with eCryptfs -- Hands-on lab - encrypting a home directory for a new user account -- Creating a private directory within an existing home directory -- Hands-on lab - encrypting other directories with eCryptfs -- Encrypting the swap partition with eCryptfs -- Using VeraCrypt for cross-platform sharing of encrypted containers -- Hands-on lab - getting and installing VeraCrypt -- Hands-on lab - creating and mounting a VeraCrypt volume in console mode -- Using VeraCrypt in GUI mode -- OpenSSL and the Public Key Infrastructure -- Commercial certificate authorities -- Creating keys, certificate signing requests, and certificates -- Creating a self-signed certificate with an RSA key -- Creating a self-signed certificate with an Elliptic Curve key -- Creating an RSA key and a Certificate Signing Request -- Creating an EC key and a CSR -- Creating an on-premises CA -- Hands-on lab - setting up a Dogtag CA -- Adding a CA to an operating system -- Hands-on lab - exporting and importing the Dogtag CA certificate -- Importing the CA into Windows -- OpenSSL and the Apache webserver -- Hardening Apache SSL/TLS on Ubuntu -- Hardening Apache SSL/TLS on RHEL 9/AlmaLinux 9 -- Setting FIPS mode on RHEL 9/AlmaLinux 9 -- Hardening Apache SSL/TLS on RHEL 7/CentOS 7 -- Setting up mutual authentication…”
    Libro electrónico
  18. 642098
    Publicado 2023
    Tabla de Contenidos: “…. -- How it works... -- Giving users their own private databases -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running multiple servers on one system -- Getting ready -- How to do it... -- How it works... -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Running multiple PgBouncer on the same port to leverage multiple cores -- Getting ready -- How to do it...…”
    Libro electrónico
  19. 642099
  20. 642100
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: IoT Penetration Testing -- Introduction -- Defining the IoT ecosystem and penetration testing life cycle -- Penetration testing approaches -- Black box -- White box -- Grey box -- Firmware 101 -- Digging deeper into firmware -- Development supply chain of firmware -- Web applications in IoT -- Web communication -- Mobile applications in IoT -- Hybrid -- Native applications -- Device basics -- Hardware inputs -- Introduction to IoT's wireless communications -- Wi-Fi -- ZigBee -- Z-Wave -- Bluetooth -- Setting up an IoT pen testing lab -- Software tool requirements -- Firmware software tools -- Web application software tools -- Mobile application software tools -- Android -- iOS -- Hardware analysis tool requirements -- Hardware tools -- Hardware analysis software -- Radio analysis tool requirements -- Radio analysis hardware -- Radio analysis software -- Chapter 2: IoT Threat Modeling -- Introduction -- Getting familiar with threat modeling concepts -- Getting ready -- How to do it... -- Anatomy of threat modeling an IoT device -- How to do it... -- Step 1 - identifying the assets -- Step 2 - creating an IoT device architecture overview -- Step 3 - decomposing the IoT device -- Step 4 - identifying threats -- Step 5 - documenting threats -- Threat #1 -- Threat #2 -- Threat #3 -- Step 6 - rating the threats -- Threat modeling firmware -- Getting ready -- How to do it... -- Step 1 - identifying the assets -- Steps 2 and 3 - creating an architecture overview and decomposition -- Step 4 - identifying threats -- Step 5 - documenting threats -- Threat #1 -- Threat #2 -- Threat #3 -- Step 6 - rating the threats -- Threat modeling of an IoT web application -- How to do it…”
    Libro electrónico