Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
7741Publicado 2024Tabla de Contenidos: “…Bouncing -- In-line consoles -- The recording aspects -- Going in-line -- In-line consoles and mixing -- The monitor section -- The monitor output -- Additional controls -- Solos -- Destructive solo -- Nondestructive solo -- Solo safe -- Which solo? …”
Libro electrónico -
7742por Blyth, AndrewTabla de Contenidos: “…Assessing LDAP permissions -- Testing LDAP authentication -- Identifying unsecured LDAP ports -- Monitoring LDAP traffic -- Testing LDAP with LDAPS -- Identifying anomalies with PowerShell scripts -- PowerShell and Kerberos -- The enumeration of Kerberos tickets -- Service Principal Name (SPN) enumeration -- Credential harvesting with Mimikatz -- Detecting golden ticket attacks -- Kerberos ticket renewal analysis -- Analyzing event logs -- Password spray attacks -- Summary -- Chapter 7: Databases: MySQL, PostgreSQL, and MSSQL -- Accessing SQL databases using PowerShell -- PowerShell and MySQL -- Introduction to PowerShell and MySQL -- Connecting to MySQL with PowerShell -- Vulnerability assessment -- Penetration testing -- Access control verification -- Security policy testing -- Data protection and encryption -- Logging and monitoring -- PowerShell and PostgreSQL -- Introduction to PowerShell and PostgreSQL -- Connecting to PostgreSQL with PowerShell -- Vulnerability assessment -- Penetration testing -- Access control verification -- Security policy testing -- Data protection and encryption -- Logging and monitoring -- PowerShell and Microsoft SQL (MSSQL) -- Vulnerability assessment -- Penetration testing -- Access control verification -- Security policy testing -- Data protection and encryption -- Logging and monitoring -- Summary -- Chapter 8: Email Services: Exchange, SMTP, IMAP, and POP -- PowerShell and Exchange -- Enumeration with PowerShell -- Autodiscover enumeration -- Exploitation with PowerShell -- PowerShell and SMTP -- Enumeration with PowerShell -- Exploitation with PowerShell -- PowerShell and IMAP -- Vulnerabilities in IMAP servers -- Establishing an IMAP connection -- Scanning for IMAP servers -- PowerShell and POP -- Port identification -- Authentication checks -- Brute-forcing -- Banner grabbing -- Summary…”
Publicado 2024
Libro electrónico -
7743Publicado 2023Tabla de Contenidos: “…Triggers and User-Defined Functions -- Summary -- Chapter 9: Design and Implement a Replication Strategy -- Global Distribution -- Data Consistency -- Global Distribution Configurations in the SDK -- Summary -- Chapter 10: Design and Implement Multi-region Write -- When to Use Multi-region Write -- Implement Multi-region Write -- Conflict Resolution -- Summary -- Chapter 11: Enable Analytical Workloads -- Hybrid Transaction and Analytical Platform -- Azure Synapse Link -- Working with the Analytical Store -- Synapse Link for Serverless SQL -- Synapse Link for Synapse Spark -- Summary -- Chapter 12: Design and Implement Change Feeds -- Common Change Feed Use Cases -- Processing the Change Feed -- Using Azure Functions -- Summary -- Chapter 13: Implement Solutions Across Services -- Event-Driven Architecture -- Implement the Event-Driven Architecture -- Azure Cognitive Search -- Summary -- Chapter 14: Define and Implement an Indexing Strategy -- Indexes in Azure Cosmos DB -- Range, Spatial, and Composite Indexes -- Monitoring Index Usage -- Summary -- Chapter 15: Monitor and Troubleshoot an Azure Cosmos DB Solution -- Diagnostic Setting -- Response Status Codes and Failure Metrics -- Monitoring Insights -- Querying Logs and Configuring Alerts -- Summary -- Chapter 16: Implement Backup and Restore -- Backup Modes -- Configure Backup -- Restore from Backup -- Summary -- Chapter 17: Implement Security -- Secure Access to Azure Cosmos DB -- Secure Access to Data -- Network Security -- Data Encryption -- Configure Cross-Origin Resource Sharing -- Summary -- Chapter 18: Implement Data Movement -- Programmatic Data Movement -- Low-Code Pipelines -- Streaming Data -- Summary -- Chapter 19: Implementing a DevOps Process -- Overview of DevOps in Azure -- Common Tasks in PowerShell -- Common Tasks in Azure CLI -- Deploy Using ARM Template -- Summary -- Index…”
Libro electrónico -
7744por Collins, Mike, 1949-Tabla de Contenidos: “…; Pro Tools LE Software; Pro Tools M-Powered Software; Transfers; Included Software; Even more software; What you don't get in Pro Tools LE and M-Powered; What's in the book; 1 Hardware Options for Pro Tools LE and M-Powered Systems; Digi 001; Low Latency Monitoring on the Digi 001; Monitoring latency and MIDI…”
Publicado 2006
Libro electrónico -
7745Publicado 2009Tabla de Contenidos: “…2.8 CHOOSING TO COLLECT STATISTICS2.9 POLICY CONTROL; CHAPTER 3: IP-Based Service Implementation and Network Management; 3.1 SIMPLE NETWORK MANAGEMENT PROTOCOL; 3.2 IP-BASED SERVICE IMPLEMENTATION-OSS; 3.3 PROVISIONING ISSUES; 3.4 NETWORK MANAGEMENT ISSUES; 3.5 OSS ARCHITECTURE; 3.6 SUMMARY; CHAPTER 4: Network Management Architecture; 4.1 BACKGROUND; 4.2 DEFINING NETWORK MANAGEMENT; 4.3 NETWORK MANAGEMENT MECHANISMS; 4.4 ARCHITECTURAL CONSIDERATIONS; 4.5 SUMMARY; CHAPTER 5: SLA and Network Monitoring; 5.1 APPROACHES FOR NETWORK MONITORING; 5.2 PASSIVE NETWORK MONITORING…”
Libro electrónico -
7746Publicado 2014Tabla de Contenidos: “…Sample Case, Phase 10 -- Form 11: Control and Monitoring -- Form 12: Budget Deviation Analysis -- Index…”
Libro electrónico -
7747por Ramaswami, RajivTabla de Contenidos: “…Transmission System Engineering; 5.1 System Model; 5.2 Power Penalty; 5.3 Transmitter; 5.4 Receiver; 5.5 Optical Amplifiers; 5.6 Crosstalk; 5.7 Dispersion; 5.8 Fiber Nonlinearities; 5.9 Wavelength Stabilization; 5.10 Design of Soliton Systems; 5.11 Design of Dispersion-Managed Soliton Systems; 5.12 Overall Design Considerations; Summary; Further Reading; Problems; References; Part II: Networks…”
Publicado 2010
Libro electrónico -
7748Publicado 2015Tabla de Contenidos: “…Chapter 16: Physical Regulation in Cartilage and Bone RepairChapter 17: Magnetic Fields for Pain Control; Chapter 18: Electromagnetic Fields in Plastic Surgery : Application to Plastic and Reconstructive Surgical Procedures; Chapter 19: Daily Exposure to a Pulsed Electromagnetic Field for Inhibition of Cancer Growth : Therapeutic Implications; Chapter 20: Nonionizing Radiation : Exposure Assessment and Risk; Chapter 21: Environmental and Safety Aspects of the Use of EMF in Medical Environment…”
Libro electrónico -
7749Publicado 2012Tabla de Contenidos: “…1 Bildgebung bei Übergewichtigen2 Monitoring bei Adipositas in AINS; XI Analgesie und Sedierung; 1 Analgosedierung bei Adipositas; 2 Akutschmerztherapie und postoperative Schmerztherapie bei adipösen Patienten; 3 Chronische Schmerztherapie bei Adipositas; XII Anästhesie; 1 Prämedikationsvisite; 2 Pharmakologie/Narkoseführung; 3 Perioperative respiratorische Komplikationen; 4 Atemwegsmanagement - intraoperative Beatmung; 5 Regionalanästhesie; 6 Postoperatives Management; XIII Notfallmedizin; 1 Rettungs- und Notarztdienst - Was ist anders?…”
Libro electrónico -
7750Publicado 2019Tabla de Contenidos: “…Automata and Timed Systems -- Symbolic Register Automata -- Abstraction Refinement Algorithms for Timed Automata -- Fast Algorithms for Handling Diagonal Constraints in Timed Automata -- Safety and co-safety comparator automata for discounted-sum inclusion -- Clock Bound Repair for Timed Systems -- Verifying Asynchronous Interactions via Communicating Session Automata -- Security and Hyperproperties -- Verifying Hyperliveness -- Quantitative Mitigation of Timing Side Channels -- Property Directed Self Composition -- Security-Aware Synthesis Using Delayed-Action Games -- Automated Hypersafety Verification -- Automated Synthesis of Secure Platform Mappings -- Synthesis -- Synthesizing Approximate Implementations for Unrealizable Specifications -- Quantified Invariants via Syntax-Guided Synthesis -- Efficient Synthesis with Probabilistic Constraints -- Membership-based Synthesis of Linear Hybrid Automata -- Overfitting in Synthesis: Theory and Practice -- Proving Unrealizability for Syntax-Guided Synthesis -- Model Checking -- BMC for Weak Memory Models: Relation Analysis for Compact SMT Encodings -- When Human Intuition Fails: Using Formal Methods to Find an Error in the "Proof" of a Multi-Agent Protocol -- Extending NUXMV with Timed Transition Systems and Timed Temporal Properties -- Cerberus-BMC: a Principled Reference Semantics and Exploration Tool for Concurrent and Sequential C -- Cyber-physical Systems and Machine Learning -- Multi-Armed Bandits for Boolean Connectives in Hybrid System Falsification -- StreamLAB: Stream-based Monitoring of Cyber-Physical Systems -- VerifAI: A Toolkit for the Formal Design and Analysis of Artificial Intelligence-Based Systems -- The Marabou Framework for Verification and Analysis of Deep Neural Networks -- Probabilistic Systems, Runtime Techniques -- Probabilistic Bisimulation for Parameterized Systems -- Semi-Quantitative Abstraction and Analysis of Chemical Reaction Networks -- PAC Statistical Model Checking for Markov Decision Processes and Stochastic Games -- Symbolic Monitoring against Specifications Parametric in Time and Data -- STAMINA: STochastic Approximate Model-checker for INfinite-state Analysis -- Dynamical, Hybrid, and Reactive Systems -- Local and Compositional Reasoning For Optimized Reactive Systems -- Robust Controller Synthesis in Timed Büchi Automata: A Symbolic Approach -- Flexible Computational Pipelines for Robust Abstraction-based Control Synthesis -- Temporal Stream Logic: Synthesis beyond the Bools -- Run-Time Optimization for Learned Controllers through Quantitative Games -- Taming Delays in Dynamical Systems: Unbounded Verification of Delay Differential Equations…”
Libro electrónico -
7751Publicado 2013Tabla de Contenidos: “…Sustainable financing / Catarina Fonseca, Kwabena Nyarko, André Uandela and Guy Norman -- 20. Monitoring sanitation in Africa ongoing initiatives and lessons from the field / Abdou-Salam Savadogo -- 21. …”
Libro electrónico -
7752por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Policy for Troubled Companies -- An Early-Warning System for Genreal Insurance Companies by Chia Sow Chan -- Monitoring the Financial Health of Life Insurers during the Financial Crisis by Nishit Piyush Majmudar -- Policyholders' Protection Funds in OECD Countries by Alan Sekiguchi -- Policyholders' Protection Measures in Japan by Nobuo Hara -- Liquidation and Involvent Companies by Jean-Louis Bellando…”
Publicado 1999
Libro electrónico -
7753Publicado 2015Tabla de Contenidos: “…Spring Boot environment config hierarchy and precedenceExternalizing environmental config using property files; Externalizing environmental config using environment variables; Externalizing environmental config using Java system properties; Setting up Consul; Externalizing environmental config using Consul and envconsul; Chapter 7: Health Monitoring and Data Visualization; Introduction; Writing custom health indicators; Emitting metrics; Monitoring Spring Boot via JMX; Management of Spring Boot via CRaSH and writing custom remote shell commands…”
Libro electrónico -
7754Publicado 2015Tabla de Contenidos: “…Developing Roles and Responsibilities -- Establishing Goals and Plans -- Revising or Developing Guidelines and Procedures -- Preparing the Team -- Initiating ROI Studies -- Preparing the Clients and Executives -- Removing Obstacles -- Monitoring Progress -- Final Thoughts -- Part II: Evaluation in Action: Case Studies Describing the Evaluation of Leadership Development Programs -- Chapter 8 Measuring ROI in Leadership for Performance for Store Managers -- Chapter 9 Measuring ROI in a Supervisory Leadership Development Program. -- Chapter 10 Measuring ROI in Fundamentals of Business Leadership. -- Chapter 11 Measuring ROI in a Selection and Onboarding Program for New Leaders -- Chapter 12 Measuring ROI in Safety Leadership for Construction Project Leaders -- Chapter 13 Measuring ROI in an Operations Manager Development Program -- About the ROI Institute -- About the Authors -- Index…”
Libro electrónico -
7755Publicado 2016Tabla de Contenidos: “…; Manipulating output; Show commands; Logging; Changing time zones; Application commands; Other tools; Examples; Getting Tech Support Info; Create Another Admin; Chapter 18 - ISE Administration; Authenticating to ISE; RBAC; API; Monitoring REST API; External restful API; pxGRID; Subject Index; Back Cover…”
Libro electrónico -
7756por Sherman, William R.Tabla de Contenidos: “…Interface to the Virtual World-Input; User Monitoring (User Input to the Virtual World); World Monitoring (Dynamic Input to the Virtual World); Chapter Summary; CHAPTER 4. …”
Publicado 2003
Libro electrónico -
7757por Ibryam, BilginTabla de Contenidos: “…. -- Dynamic multicasting -- Wire Tap -- Error handling and monitoring (Advanced) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Exception Clause -- Java style error handling -- Monitoring and logging -- Testing the messaging applications (Advanced) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing applications written in Spring XML DSL -- Other tools for testing…”
Publicado 2013
Libro electrónico -
7758por Bijaoui, PierreTabla de Contenidos: “…Optimizing Exchange 20035.1 Introduction to Exchange 2003 Optimization; 5.2 System Optimization for Exchange 2003; 5.3 Memory Optimization for Exchange 2003; 5.4 Network Optimization for Exchange 2003; 5.5 Storage Optimization for Exchange 2003; 5.6 Mail Transport Optimization; 5.7 In Summary; Chapter 6. Performance and Monitoring; 6.1 The Challenge; 6.2 Exchange Workload Simulation; 6.3 Monitoring Exchange 2003 Performance; 6.4 In Summary; Chapter 7. …”
Publicado 2007
Libro electrónico -
7759por Jackman, John, 1957-Tabla de Contenidos: “…Make Location LemonadeLow-Budget Lighting Principles; Low-Budget Lighting Process; Using Existing Light and Improvised Cheap Lighting; CHAPTER 12Specialized Lighting; Product Shots; Food Shots; Lightning and Fire; Automobile Interiors; Blue- and Greenscreen; Church and Wedding Lighting; Live Theatre Taping; CHAPTER 13Imagination and Invention; APPENDIX 1 Using a Light Meter for Video; Light Meter Basics; APPENDIX 2 Basic Primer in Signal Monitoring; Waveform Monitor; Vectorscope; APPENDIX3 Addresses of Manufacturers; Glossary; Index…”
Publicado 2010
Libro electrónico -
7760por Young, MarcusTabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction; Introduction to AWS; Cloud computing service models; Infrastructure as a Service; Platform as a Service; Software as a Service; Benefits of moving to the cloud; Common problems encountered at AWS; Underlying hardware failures; Over-provisioning; Under-provisioning; Replication; Redundancy; Improving the end-user experience; Monitoring and log-gathering; Summary; Chapter 2: Basic Patterns; Introducing Vagrant; Snapshot pattern; Stamp pattern; Scale up pattern…”
Publicado 2015
Libro electrónico