Mostrando 35,261 - 35,280 Resultados de 35,306 Para Buscar 'Horgoš~', tiempo de consulta: 1.30s Limitar resultados
  1. 35261
  2. 35262
    Publicado 2015
    “…The obstructions include metrics-obsessed academia, circular and incestuous peer review, digitalization of research as stalking horse for text- and data-mining, and violation by global corporate fiat of Intellectual Property Rights and the Moral Rights of Authors. …”
    Libro electrónico
  3. 35263
    Publicado 2023
    “…The old SWOT (strengths, weaknesses, opportunities, threats) approaches are currently equivalent to riding down the freeway on a horse. We must drop the hubris that has led us to believe we can see years ahead and anticipate what's coming. …”
    Libro electrónico
  4. 35264
    Publicado 1609
    Manuscrito
  5. 35265
    por Landa Aizpuru, Jesús
    Publicado 2016
    “…Erosión por cavitación y corrosión.<br />- Materiales y tratamientos térmicos. …”
    Texto completo en Odilo
    Otros
  6. 35266
    “…Y no cabe duda de que el don recibido también puede ser objeto de corrosión, de disolución o de explotación. Comprender la propia existencia desde la lógica del don significa percatarse de que el fin esencial de vivir consiste en dar lo que uno es, en exteriorizarlo, pueso solo de ese modo se enriquece cualitativamente la realidad, se hace más bella, más plural, se continúa el proceso creativo del mundo. …”
    Libro
  7. 35267
    por Gay, Peter, 1923-
    Publicado 1989
    “…Le vemos trabajar en la época de la decadencia del liberalismo, entre los horrores de la guerra, las dificultades de la paz, la subida al poder de Hitler y la caída de Austria. …”
    Libro
  8. 35268
    Publicado 2017
    “…Next, you'll get to know about Lists, the work horse data type for most functional languages. We show what structu..…”
    Libro electrónico
  9. 35269
    por Seethaler, Sherry, 1970-
    Publicado 2010
    “…• Is one “horsepower” really equal to the power of one horse? • Why can’t you sneeze with your eyes open? …”
    Libro electrónico
  10. 35270
    Publicado 2016
    “…Approaches to exposure, composition, and color as they relate to pet photography Light, including shooting with both natural and artificial light Shooting on location, including outdoors and in pet owners’ homes How to direct and pose both animals and their owners to elicit engaged and authentic responses Photographing different kinds of animals, with entire chapters devoted to dogs, cats, and horses How to “give back” with non-profit pet photography (creating images for shelters, adoption, foster care, special events) — TABLE OF CONTENTS Discovering the Opportunities, Challenges, and Rewards Bringing Your Gear and Your Bag of Tricks Expos..…”
    Libro electrónico
  11. 35271
    por Whitaker, Andrew
    Publicado 2005
    “…The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. …”
    Libro electrónico
  12. 35272
    por Deal, Richard A.
    Publicado 2005
    “…Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. …”
    Libro electrónico
  13. 35273
    Publicado 2007
    “…Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. …”
    Libro electrónico
  14. 35274
    por Kovsky, Steven D.
    Publicado 2002
    “…Choosing the right game console - You might not know it, we are amid a hardware slugfest between Nintendo, Sony and the dark horse, Microsoft. It's likely to be a battle as bloody as any depicted on the game consoles themselves. …”
    Libro electrónico
  15. 35275
    “…The Nazi elevation of youth to superego in the Heimat of the Teen Age neutralized adolescent innovation by forgoing the Hamletian stage of metabolization of the death wish. …”
    Libro electrónico
  16. 35276
    Publicado 2024
    “…L’intreccio di creatività e avversità di cui parla la motivazione dell’Oscar al film sembra dipingere il tradizionale stereotipo dell’italiano che se la cava in qualche modo, si arrangia e alla fine o sparisce nel gorgo luciferino della miseria o, baciato dalla fortuna, conquista il successo. …”
    Libro
  17. 35277
    Publicado 2013
    “…Poetas, pintores, escultores, na Antiguidade, familiarizados com mitos antigos de deuses e de homens, que cristalizavam experiências, interrogações, respostas quanto à existência do homem no tempo e no mundo, neles se inspiraram, em contínua criação-recriação para neles verterem a sua própria experiência temporal, com todos os desassossegos e inquietações, com todo o espanto, horror ou encan­tamento pela excepcionalidade da acção humana, que rasga ou ilumina fronteiras de finitude. …”
    Libro electrónico
  18. 35278
    Publicado 2020
    Tabla de Contenidos: “…Cabezos Bernal, p. 661; Las cicatrices urbanas de los bombardeos de Madrid / Luis de Sobrón Martínez i Enrique Bordes Cabrera, p. 665; El dibujo de la arquitectura en el paisaje / Juan Manuel Báez Mezquita, p. 669; La rappresentazione della Via Latina e della Via Apia Antica neii'evoluzione cartografica dell' Agro Romano / Simona Rinaldi, p. 673; Conocimiento del territorio a través del dibujo en el Frente de Aragón durante la Guerra Civil Española / Santiago Elía García, Ana Ruiz Varona, p. 677; Farsi di/segno La Calzada de Béjar narrazione grafica di un borgo / Claudio Javier Patané Aráoz, David Marcos González, José Martínez Rubio, Juan José Fernández Martín, Jesús San José Alonso, Francisco M. …”
    Libro
  19. 35279
  20. 35280
    Publicado 1701
    Manuscrito