Mostrando 34,221 - 34,240 Resultados de 34,263 Para Buscar 'Horgoš~', tiempo de consulta: 1.43s Limitar resultados
  1. 34221
    Publicado 1974
    “…We see him as a student cutting lab classes to attend an afternoon concert of the Boston Symphony, as a young man growing a van Dyke beard to make himself look older for his first job as an engineer with General Electric, and as a new assistant professor at Kansas State, courting his schoolteacher-sweetheart in a horse and buggy. His contributions to the engineering profession are many. …”
    Libro electrónico
  2. 34222
    Publicado 2019
    “…“No one who met Booth Tarkington ever forgot him,” says his great-niece. So, she introduces the reader to this multifaceted individual: the young man-about-town, the prankster, the writer of humorous letters (who drew caricatures in the margins), the bereaved father, the inspiration of the affection of three women (simultaneously), and the lover and collector of art objects and portraits. …”
    Libro electrónico
  3. 34223
  4. 34224
    Publicado 2024
    “…"Majestuosos navíos surcando la mar, tremendos duelos artilleros, abordajes despiadados o el horror de la mesa del cirujano eran escenas que, hasta ahora, solo podíamos recrear con la imaginación. …”
    Libro
  5. 34225
    Publicado 2015
    “…The obstructions include metrics-obsessed academia, circular and incestuous peer review, digitalization of research as stalking horse for text- and data-mining, and violation by global corporate fiat of Intellectual Property Rights and the Moral Rights of Authors. …”
    Libro electrónico
  6. 34226
    Publicado 2023
    “…The old SWOT (strengths, weaknesses, opportunities, threats) approaches are currently equivalent to riding down the freeway on a horse. We must drop the hubris that has led us to believe we can see years ahead and anticipate what's coming. …”
    Libro electrónico
  7. 34227
    por Landa Aizpuru, Jesús
    Publicado 2016
    “…Erosión por cavitación y corrosión.<br />- Materiales y tratamientos térmicos. …”
    Texto completo en Odilo
    Otros
  8. 34228
    “…Y no cabe duda de que el don recibido también puede ser objeto de corrosión, de disolución o de explotación. Comprender la propia existencia desde la lógica del don significa percatarse de que el fin esencial de vivir consiste en dar lo que uno es, en exteriorizarlo, pueso solo de ese modo se enriquece cualitativamente la realidad, se hace más bella, más plural, se continúa el proceso creativo del mundo. …”
    Libro
  9. 34229
    por Gay, Peter, 1923-
    Publicado 1989
    “…Le vemos trabajar en la época de la decadencia del liberalismo, entre los horrores de la guerra, las dificultades de la paz, la subida al poder de Hitler y la caída de Austria. …”
    Libro
  10. 34230
    Publicado 2017
    “…Next, you'll get to know about Lists, the work horse data type for most functional languages. We show what structu..…”
    Libro electrónico
  11. 34231
    por Seethaler, Sherry, 1970-
    Publicado 2010
    “…• Is one “horsepower” really equal to the power of one horse? • Why can’t you sneeze with your eyes open? …”
    Libro electrónico
  12. 34232
    Publicado 2016
    “…Approaches to exposure, composition, and color as they relate to pet photography Light, including shooting with both natural and artificial light Shooting on location, including outdoors and in pet owners’ homes How to direct and pose both animals and their owners to elicit engaged and authentic responses Photographing different kinds of animals, with entire chapters devoted to dogs, cats, and horses How to “give back” with non-profit pet photography (creating images for shelters, adoption, foster care, special events) — TABLE OF CONTENTS Discovering the Opportunities, Challenges, and Rewards Bringing Your Gear and Your Bag of Tricks Expos..…”
    Libro electrónico
  13. 34233
    por Whitaker, Andrew
    Publicado 2005
    “…The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. …”
    Libro electrónico
  14. 34234
    por Deal, Richard A.
    Publicado 2005
    “…Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. …”
    Libro electrónico
  15. 34235
    Publicado 2007
    “…Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. …”
    Libro electrónico
  16. 34236
    por Kovsky, Steven D.
    Publicado 2002
    “…Choosing the right game console - You might not know it, we are amid a hardware slugfest between Nintendo, Sony and the dark horse, Microsoft. It's likely to be a battle as bloody as any depicted on the game consoles themselves. …”
    Libro electrónico
  17. 34237
    Publicado 2020
    Tabla de Contenidos: “…Cabezos Bernal, p. 661; Las cicatrices urbanas de los bombardeos de Madrid / Luis de Sobrón Martínez i Enrique Bordes Cabrera, p. 665; El dibujo de la arquitectura en el paisaje / Juan Manuel Báez Mezquita, p. 669; La rappresentazione della Via Latina e della Via Apia Antica neii'evoluzione cartografica dell' Agro Romano / Simona Rinaldi, p. 673; Conocimiento del territorio a través del dibujo en el Frente de Aragón durante la Guerra Civil Española / Santiago Elía García, Ana Ruiz Varona, p. 677; Farsi di/segno La Calzada de Béjar narrazione grafica di un borgo / Claudio Javier Patané Aráoz, David Marcos González, José Martínez Rubio, Juan José Fernández Martín, Jesús San José Alonso, Francisco M. …”
    Libro
  18. 34238
    “…The Nazi elevation of youth to superego in the Heimat of the Teen Age neutralized adolescent innovation by forgoing the Hamletian stage of metabolization of the death wish. …”
    Libro electrónico
  19. 34239
    Publicado 2024
    “…L’intreccio di creatività e avversità di cui parla la motivazione dell’Oscar al film sembra dipingere il tradizionale stereotipo dell’italiano che se la cava in qualche modo, si arrangia e alla fine o sparisce nel gorgo luciferino della miseria o, baciato dalla fortuna, conquista il successo. …”
    Libro
  20. 34240
    Publicado 2013
    “…Poetas, pintores, escultores, na Antiguidade, familiarizados com mitos antigos de deuses e de homens, que cristalizavam experiências, interrogações, respostas quanto à existência do homem no tempo e no mundo, neles se inspiraram, em contínua criação-recriação para neles verterem a sua própria experiência temporal, com todos os desassossegos e inquietações, com todo o espanto, horror ou encan­tamento pela excepcionalidade da acção humana, que rasga ou ilumina fronteiras de finitude. …”
    Libro electrónico