Mostrando 34,841 - 34,860 Resultados de 34,876 Para Buscar 'Horgoš~', tiempo de consulta: 1.30s Limitar resultados
  1. 34841
    “…Y no cabe duda de que el don recibido también puede ser objeto de corrosión, de disolución o de explotación. Comprender la propia existencia desde la lógica del don significa percatarse de que el fin esencial de vivir consiste en dar lo que uno es, en exteriorizarlo, pueso solo de ese modo se enriquece cualitativamente la realidad, se hace más bella, más plural, se continúa el proceso creativo del mundo. …”
    Libro
  2. 34842
    por Gay, Peter, 1923-
    Publicado 1989
    “…Le vemos trabajar en la época de la decadencia del liberalismo, entre los horrores de la guerra, las dificultades de la paz, la subida al poder de Hitler y la caída de Austria. …”
    Libro
  3. 34843
    Publicado 2017
    “…Next, you'll get to know about Lists, the work horse data type for most functional languages. We show what structu..…”
    Libro electrónico
  4. 34844
    por Seethaler, Sherry, 1970-
    Publicado 2010
    “…• Is one “horsepower” really equal to the power of one horse? • Why can’t you sneeze with your eyes open? …”
    Libro electrónico
  5. 34845
    Publicado 2016
    “…Approaches to exposure, composition, and color as they relate to pet photography Light, including shooting with both natural and artificial light Shooting on location, including outdoors and in pet owners’ homes How to direct and pose both animals and their owners to elicit engaged and authentic responses Photographing different kinds of animals, with entire chapters devoted to dogs, cats, and horses How to “give back” with non-profit pet photography (creating images for shelters, adoption, foster care, special events) — TABLE OF CONTENTS Discovering the Opportunities, Challenges, and Rewards Bringing Your Gear and Your Bag of Tricks Expos..…”
    Libro electrónico
  6. 34846
    por Whitaker, Andrew
    Publicado 2005
    “…The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. …”
    Libro electrónico
  7. 34847
    por Deal, Richard A.
    Publicado 2005
    “…Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. …”
    Libro electrónico
  8. 34848
    Publicado 2007
    “…Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. …”
    Libro electrónico
  9. 34849
    por Kovsky, Steven D.
    Publicado 2002
    “…Choosing the right game console - You might not know it, we are amid a hardware slugfest between Nintendo, Sony and the dark horse, Microsoft. It's likely to be a battle as bloody as any depicted on the game consoles themselves. …”
    Libro electrónico
  10. 34850
    “…The Nazi elevation of youth to superego in the Heimat of the Teen Age neutralized adolescent innovation by forgoing the Hamletian stage of metabolization of the death wish. …”
    Libro electrónico
  11. 34851
    Publicado 2024
    “…L’intreccio di creatività e avversità di cui parla la motivazione dell’Oscar al film sembra dipingere il tradizionale stereotipo dell’italiano che se la cava in qualche modo, si arrangia e alla fine o sparisce nel gorgo luciferino della miseria o, baciato dalla fortuna, conquista il successo. …”
    Libro
  12. 34852
    Publicado 2013
    “…Poetas, pintores, escultores, na Antiguidade, familiarizados com mitos antigos de deuses e de homens, que cristalizavam experiências, interrogações, respostas quanto à existência do homem no tempo e no mundo, neles se inspiraram, em contínua criação-recriação para neles verterem a sua própria experiência temporal, com todos os desassossegos e inquietações, com todo o espanto, horror ou encan­tamento pela excepcionalidade da acção humana, que rasga ou ilumina fronteiras de finitude. …”
    Libro electrónico
  13. 34853
    Publicado 2020
    Tabla de Contenidos: “…Cabezos Bernal, p. 661; Las cicatrices urbanas de los bombardeos de Madrid / Luis de Sobrón Martínez i Enrique Bordes Cabrera, p. 665; El dibujo de la arquitectura en el paisaje / Juan Manuel Báez Mezquita, p. 669; La rappresentazione della Via Latina e della Via Apia Antica neii'evoluzione cartografica dell' Agro Romano / Simona Rinaldi, p. 673; Conocimiento del territorio a través del dibujo en el Frente de Aragón durante la Guerra Civil Española / Santiago Elía García, Ana Ruiz Varona, p. 677; Farsi di/segno La Calzada de Béjar narrazione grafica di un borgo / Claudio Javier Patané Aráoz, David Marcos González, José Martínez Rubio, Juan José Fernández Martín, Jesús San José Alonso, Francisco M. …”
    Libro
  14. 34854
  15. 34855
    por Cabaret, Dominique-Marie
    Publicado 2020
    “…. -- L’auteur bouleverse la vision de la Jérusalem antique. Son habileté d’horloger excelle à décrire les grilles d’urbanisme et à placer les unes par rapport aux autres. …”
    Libro
  16. 34856
    Publicado 2018
    “…The subject’s age, gender, hormonal levels may affect an individual’s cortical excitability. …”
    Libro electrónico
  17. 34857
    Publicado 2023
    “…This brings them face-to-face with the horror of anti-Black violence, not as just another resource to strip-mine, but as an unavoidable abyss that confines all thought. …”
    Libro electrónico
  18. 34858
    por Bordoni, Andrea Verónica
    Publicado 2010
    “…La glicobiología de D-Galf es un tema de gran interés ya que éste azúcar únicamente se encuentra en glicoconjugados de bacterias, protozoarios y hongos, muchos de ellos patógenos, mientras que en mamíferos se presenta sólo en configuración piranósica. …”
    Enlace del recurso
    Tesis
  19. 34859
    Publicado 2010
    Libro electrónico
  20. 34860
    Publicado 2023
    “…You'll also discover: The real secrets to selling more in a crisis The difference between rainmakers and rain barrels and how to find opportunity in adversity Why you must stop swimming naked and put your bathing suit on Why you don't get into buckets with crabs How to be a RIGHT NOW sales professional 7 Steps of Effective Prospecting Sequences and how to be professionally persistent How to adjust sales messaging to meet the moment The sales secrets of frogs, squirrels, and horses Sutton's Law and why you must go where the money is Why you need more than charm and a great personality to close sales in a crisis The five questions you must answer in the affirmative for every stakeholder How to handle buying commitment objections in a crisis How to protect your turf from competitors and your profits from price decreases Five ways to protect and advancing your career How to be bold and always trust your cape And so much more . . . …”
    Libro electrónico