Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 16,533
- Biblia 6,638
- Filosofía 4,691
- Universidad Pontificia de Salamanca (España) 4,581
- Crítica e interpretación 4,081
- Derecho 3,744
- RELIGION 3,643
- Educación 3,560
- Història 3,432
- Iglesia Católica 3,122
- Ciencias sociales 2,924
- Moral cristiana 2,558
- Teología dogmática 2,461
- Psicología 2,349
- Teología 2,325
- Sermones 2,215
- Management 2,201
- Development 2,161
- Derecho canónico 2,114
- History 1,989
- Derecho civil 1,960
- Education 1,951
- Documentales 1,893
- Universidad Pontificia de Salamanca, Facultad de Educación 1,877
- Engineering & Applied Sciences 1,850
- Medicina 1,762
- Tecnología 1,716
- Philosophy 1,704
- Application software 1,700
- Economía 1,618
-
642081por Cerrolaza Gili, Óscar“…Para quienes deseen comprobar los conocimientos adquiridos con este Diccionario práctico de gramática, para quienes realicen cursos de gramática o para quienes, de forma autónoma, se acerquen a este curso gramatical, se ha diseñado un libro que en paralelo propone ejercicios y actividades de práctica y reutilización de todos los contenidos presentados en este libro…”
Publicado 2013
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
642082
-
642083
-
642084Publicado 1993Tabla de Contenidos: “…Conté: 1. Archivos, instituciones, cultura e influencia de castilla y León en el Nuevo Mundo. 2. …”
Libro -
642085
-
642086Publicado 2014“…You’ll learn about different abstractions, their pros and cons, and how to effectively choose between them. …”
-
642087
-
642088Publicado 2022“…I am honored to undertake the work for Guest Editor for this Special Issue of EPR Effect-Based Tumor Targeted Nanomedicine for the Journal of Personalized Medicine. It has already been 35 years since we published the concept of the EPR effect for the first time. …”
Libro electrónico -
642089Publicado 2003“…This book answers the questions MFC developers have about .NET, including: What are the key issues when combining MFC and Managed Extensions? Page 15 How can Regular Expressions be used to parse a document for multiple complex pattern types, such as email addresses? …”
Libro electrónico -
642090por Beffa, Federico“…The authors show how they can be described by a set of linear equivalent circuits which can be manipulated in the usual way. …”
Publicado 2024
Libro electrónico -
642091Manuscrito
-
642092por Espinalt i Garcia, BernatTabla de Contenidos: “…Conté: v. 1. Reyno de Murcia -- v. 2. Reynos de Aragon y Mallorca. …”
Publicado 1778
Libro -
642093por Bosch, AgustíTabla de Contenidos: “…Sistema de partit únic; 5.5.2. Sistema de partit hegemònic; 5.5.3. Sistema de partit dominant; 5.5.4. …”
Publicado 2011
Libro electrónico -
642094por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Mise en place d'un cadre de dépenses à moyen terme -- Intégration des fonds extrabudgétaires dans le cadre des dépenses à moyen terme -- Améliorer l'efficacité des dépenses publiques -- Graphique 21. …”
Publicado 2001
Libro electrónico -
642095Publicado 2017Tabla de Contenidos: “…. -- There's more... -- Chapter 5: Administration of Tabular Models -- Introduction -- Managing tabular model properties -- [Changing data backup locations] -- Changing data backup locations -- Changing DirectQuery mode -- Changing workspace retention -- Changing workspace server -- Managing perspectives -- Getting ready -- How to do it... -- Adding a new perspective -- Editing a perspective -- Renaming a perspective -- Deleting a perspective -- Copying a perspective -- Managing partitions -- How to do it... -- Creating a Partition -- Editing a partition -- Processing partitions -- How it works... -- Managing roles -- Getting ready -- How to do it... -- Creating Admin role -- Creating a Read role -- Creating a read and process role…”
Libro electrónico -
642096Publicado 2018Tabla de Contenidos: “…. -- See also -- Pain Point #5: Utilizing alternate sources for trained images -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Pain Point #6: Prioritizing high-level libraries for CNNs -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also…”
Libro electrónico -
642097Publicado 2023Tabla de Contenidos: “…Hands-on lab - creating your GPG keys -- Hands-on lab - symmetrically encrypting your own files -- Hands-on lab - encrypting files with public keys -- Hands-on lab - signing a file without encryption -- Encrypting partitions with Linux Unified Key Setup (LUKS) -- Disk encryption during operating system installation -- Hands-on lab - adding an encrypted partition with LUKS -- Configuring the LUKS partition to mount automatically -- Hands-on lab - configuring the LUKS partition to mount automatically -- Encrypting directories with eCryptfs -- Hands-on lab - encrypting a home directory for a new user account -- Creating a private directory within an existing home directory -- Hands-on lab - encrypting other directories with eCryptfs -- Encrypting the swap partition with eCryptfs -- Using VeraCrypt for cross-platform sharing of encrypted containers -- Hands-on lab - getting and installing VeraCrypt -- Hands-on lab - creating and mounting a VeraCrypt volume in console mode -- Using VeraCrypt in GUI mode -- OpenSSL and the Public Key Infrastructure -- Commercial certificate authorities -- Creating keys, certificate signing requests, and certificates -- Creating a self-signed certificate with an RSA key -- Creating a self-signed certificate with an Elliptic Curve key -- Creating an RSA key and a Certificate Signing Request -- Creating an EC key and a CSR -- Creating an on-premises CA -- Hands-on lab - setting up a Dogtag CA -- Adding a CA to an operating system -- Hands-on lab - exporting and importing the Dogtag CA certificate -- Importing the CA into Windows -- OpenSSL and the Apache webserver -- Hardening Apache SSL/TLS on Ubuntu -- Hardening Apache SSL/TLS on RHEL 9/AlmaLinux 9 -- Setting FIPS mode on RHEL 9/AlmaLinux 9 -- Hardening Apache SSL/TLS on RHEL 7/CentOS 7 -- Setting up mutual authentication…”
Libro electrónico -
642098Publicado 2023Tabla de Contenidos: “…. -- How it works... -- Giving users their own private databases -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running multiple servers on one system -- Getting ready -- How to do it... -- How it works... -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Running multiple PgBouncer on the same port to leverage multiple cores -- Getting ready -- How to do it...…”
Libro electrónico -
642099Publicado 1660Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Biblioteca Universitat Ramon Llull)Libro
-
642100Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Dedication -- Table of Contents -- Preface -- Chapter 1: IoT Penetration Testing -- Introduction -- Defining the IoT ecosystem and penetration testing life cycle -- Penetration testing approaches -- Black box -- White box -- Grey box -- Firmware 101 -- Digging deeper into firmware -- Development supply chain of firmware -- Web applications in IoT -- Web communication -- Mobile applications in IoT -- Hybrid -- Native applications -- Device basics -- Hardware inputs -- Introduction to IoT's wireless communications -- Wi-Fi -- ZigBee -- Z-Wave -- Bluetooth -- Setting up an IoT pen testing lab -- Software tool requirements -- Firmware software tools -- Web application software tools -- Mobile application software tools -- Android -- iOS -- Hardware analysis tool requirements -- Hardware tools -- Hardware analysis software -- Radio analysis tool requirements -- Radio analysis hardware -- Radio analysis software -- Chapter 2: IoT Threat Modeling -- Introduction -- Getting familiar with threat modeling concepts -- Getting ready -- How to do it... -- Anatomy of threat modeling an IoT device -- How to do it... -- Step 1 - identifying the assets -- Step 2 - creating an IoT device architecture overview -- Step 3 - decomposing the IoT device -- Step 4 - identifying threats -- Step 5 - documenting threats -- Threat #1 -- Threat #2 -- Threat #3 -- Step 6 - rating the threats -- Threat modeling firmware -- Getting ready -- How to do it... -- Step 1 - identifying the assets -- Steps 2 and 3 - creating an architecture overview and decomposition -- Step 4 - identifying threats -- Step 5 - documenting threats -- Threat #1 -- Threat #2 -- Threat #3 -- Step 6 - rating the threats -- Threat modeling of an IoT web application -- How to do it…”
Libro electrónico