Mostrando 5,741 - 5,760 Resultados de 9,986 Para Buscar 'Huntik~', tiempo de consulta: 1.45s Limitar resultados
  1. 5741
    Publicado 2021
    Tabla de Contenidos: “…NAVARRO -- PRÓLOGO. GEORG HENRIK VON WRIGHT -- INTRODUCCIÓN A LA PRIMERA EDICIÓN ESPAÑOLA (1991) -- PARTE I. …”
    Libro electrónico
  2. 5742
  3. 5743
    Publicado 2003
    Libro electrónico
  4. 5744
    Publicado 2022
    Tabla de Contenidos: “…Public Key Infrastructure -- Security Monitoring and Enforcement -- Privileged Access Management -- Security Information and Event Management -- Database Activity Monitoring -- Single Sign-on -- Risk Register -- Chapter 5: Corporate Information Security Processes and Services -- Security Governance -- Policies and Procedures -- Cybersecurity and Risk Assessment -- Penetration Testing -- Red Teaming -- Code Review and Testing -- Compliance Scans -- Vulnerability Scans -- CVSS: Common Vulnerability Scoring System -- CVE: Common Vulnerabilities and Exposures -- CCE: Common Configuration Enumeration -- CPE: Common Platform Enumeration -- XCCDF: Extensible Configuration Checklist Description Format -- OVAL: Open Vulnerability and Assessment Language -- Vulnerability Scanning Procedures -- Firewalls and Network Devices Assurance -- Security Operations Center -- Incident Response and Recovery -- Preparation -- Detection and Analysis -- Containment, Eradication, and Recovery -- Post-Incident Activity -- Threat Hunting -- Threat Intelligence -- Security Engineering -- Asset Management -- Media Sanitation -- Configuration and Patch Management -- Security Architecture -- Chapter 6: People -- Security Awareness -- Security Training -- Chapter 7: Security Metrics -- Governance and Oversight -- Antivirus and Anti-Malware Metrics -- Clean Pipes -- Network Security -- Internet Access: Proxy and Content Filtering -- Security Awareness and Training -- Firewall Management -- Enterprise Mobility Management -- Incident Management and Response -- Vulnerability Management -- Penetration Testing, Code Review, and Security Assessments -- Change Management -- Access Control -- Other Metrics -- Summary -- Chapter 8: Case Studies -- Target Data Breach -- DynDNS Distributed Denial-of-Service Attack -- NHS WannaCry Ransomware…”
    Libro electrónico
  5. 5745
    por Epictetus
    Publicado 2013
    Tabla de Contenidos: “…IV 1) / Von der politisch-sozialen zur ethischen Bedeutung von Freiheit -- Die Bestimmung des Wollens -- Die Rezeption nichtstoischer Begriffe -- Zum dialektischen Charakter des Textes -- Das Eigene und das Fremde -- Der Bereich des Eigenen -- Der Begriff der prohairesis -- Die Freiheit von Affekten -- Philosophie macht frei -- Menschliche Freiheit und göttlicher Wille -- Freiheit und Determinismus -- Lebenskunst als Gottesdienst : Epiktets Theologie und ihr Verhältnis zum Neuen Testament / Paulus statt Sokrates : Antike christliche Relektüren der Texte Epiktets -- Gottesmann und Engel statt Diogenes und Herakles : die Encheiridion-Version von Ps.…”
    Libro electrónico
  6. 5746
    Publicado 2007
    Tabla de Contenidos: “…Cover; Titel; Impressum; Vorwort; Inhalt; 1 Kindstod und Kindstötung in der Kunst; Joachim Gunkel; 2 Kindstötung in der Literatur; Günther Häßler, Frank Häßler; 2.1 Medea - Kindermord aus Rache; 2.2 Im Sturm und Drang vom Mädchen zur Kindermörderin; 2.3 Kein Ende mit dem Kindermord in der Moderne; 3 Kindstötung in der Rechtsgeschichte; Günther Häßler, Frank Häßler; 3.1 Römische Antike; 3.2 Germanen ; 3.3 Das Recht im Mittelalter; 3.4 Kindsmord und Kirchenrecht; 3.5 Die Carolina; 3.6 Kindstötung in der frühen Neuzeit; 3.7 Die Täterinnen; 3.8 Die Strafverfolgung…”
    Libro electrónico
  7. 5747
    por Caspari, Volker
    Publicado 2020
    Tabla de Contenidos: “…Allgemeiner ideengeschichtlicher Hintergrund -- a) Schottische Aufklärung -- b) Antike griechische Philosophie -- 2. Systematische Analogien in TMS und WN -- III. …”
    Libro electrónico
  8. 5748
    Publicado 2023
    Tabla de Contenidos: “…Theologische Hintergründe, Aspekte und Perspektiven / Wolfgang Thönissen -- Freiheit als personales Geschehen zwischen Gott und Mensch / Nicole Grochowina -- Freiheit und Autarkie -- Antike Vorstellungen eines selbstbestimmten Lebens / Barbara Zehnpfennig -- III Akzentuierungen der Freiheit: negativ, positiv, sozial, radikaldemokratisch -- Negative und positive Freiheit / Georg Kohler -- Politische Freiheitsrechte in der Demokratie / Michael Krennerich -- Konzepte sozialer Freiheit / Nicole J. …”
    Libro electrónico
  9. 5749
    por Klump, Rainer
    Publicado 2024
    Tabla de Contenidos: “…Einleitung -- II. ‚Antike Philosophie' -- III. Bildung und ideengeschichtlicher Hintergrund von Adam Smith -- IV. …”
    Libro electrónico
  10. 5750
    Publicado 2023
    Tabla de Contenidos: “…-- 6.1.1 Images contain content owned by multiple user identifiers (UIDs) -- 6.2 Rootless Podman under the covers -- 6.2.1 Pulling the image -- 6.2.2 Creating a container -- 6.2.3 Setting up the network -- 6.2.4 Starting the container monitor: conmon -- 6.2.5 Launching the OCI runtime -- 6.2.6 The containerized application runs until completion -- Summary -- Part 3. …”
    Libro electrónico
  11. 5751
    por Gurfinkel, Arie
    Publicado 2024
    Tabla de Contenidos: “…3.3 Decidability and Finite Counterexamples via EPR -- 4 Invariant Inference -- 5 Designing mypyvy's Internals -- 6 Works Using mypyvy -- 7 Related Work -- References -- Efficient Implementation of an Abstract Domain of Quantified First-Order Formulas -- 1 Introduction -- 2 Background -- 3 Subsumption-Based Representation of Sets of Formulas -- 3.1 Bounded First-Order Languages -- 3.2 Syntactic Subsumption -- 3.3 Canonicalization -- 3.4 Representing Sets of Formulas -- 4 The Weaken Operator -- 4.1 Weakening a Single Canonical Formula -- 4.2 Weakening Sets of Formulas -- 4.3 Design Consideration and Tradeoffs -- 5 Data Structure for Sets of Formulas -- 6 Implementation and Evaluation -- 6.1 Implementation -- 6.2 Experiments -- 6.3 Results -- 7 Related Work -- 8 Conclusion -- References -- Verifying Cake-Cutting, Faster -- 1 Introduction -- 2 Cake-Cutting Preliminaries -- 3 Language and Type System -- 3.1 Syntax of Base Slice -- 3.2 A Linear Type System for Slice -- 3.3 Semantics -- 3.4 Disjointness -- 4 Constraints -- 5 Piecewise Uniform Reduction -- 5.1 Replicating Protocol Executions -- 5.2 Piecewise Uniform Valuations -- 5.3 Piecewise Uniform Replacement -- 6 Implementation and Evaluation -- 7 Related and Future Work -- References -- Runtime Verification and Monitoring -- General Anticipatory Runtime Verification -- 1 Introduction -- 2 Lola Monitoring Revisited -- 2.1 Recurrent Monitoring -- 2.2 Lola -- 3 Lola Recurrent Online Monitoring Semantics -- 4 An Abstraction Framework for Lola Monitoring -- 5 Abstraction-Based Recurrent Lola Monitoring -- 6 Symbolic Recurrent Lola Monitoring -- 7 Empirical Evaluation -- 8 Conclusion -- References -- Proactive Real-Time First-Order Enforcement -- 1 Introduction -- 2 Preliminaries -- 3 Proactive, Real-Time, First-Order Enforcement -- 3.1 System Model -- 3.2 Enforcers -- 4 Enforceable MFOTL Formulae…”
    Libro electrónico
  12. 5752
    Publicado 2002
    Tabla de Contenidos: “…-- Conventions Used in This Book -- Comments and Questions -- Acknowledgments -- Queries -- 1.1 Specify Query Criteria at Runtime -- Problem -- Solution -- Discussion -- 1.2 Using a Form-Based Parameter Query -- Problem -- Solution -- Discussion -- 1.3 Limit the Items in One Combo Box Based on the Selected Item in Another -- Problem -- Solution -- Discussion -- See Also -- 1.4 Make Formatted Date Columns Sort Correctly in a Crosstab Query -- Problem -- Solution -- Discussion -- 1.5 Group Mailing Labels by Address -- Problem -- Solution -- Discussion -- See Also -- 1.6 Use a Field in One Table to Update a Field in Another Table -- Problem -- Solution -- Discussion -- 1.7 Use a VBA Variable to Filter a Query -- Problem -- Solution -- Discussion -- See Also -- 1.8 Use a Query to Retrieve a Random Set of Rows -- Problem -- Solution -- Discussion -- 1.9 Create a Query That Will Show Aging of Receivables -- Problem -- Solution -- Discussion -- See Also -- 1.10 Create a Join That's Based on a Comparison Other than Equality -- Problem -- Solution -- Discussion -- 1.11 Create a Query to Combine Data from Two Tables with Similar Structures -- Problem -- Solution -- Discussion -- 1.12 Create a Combo Box That Allows a User to Select N/A -- Problem -- Solution…”
    Libro electrónico
  13. 5753
    Publicado 2004
    Tabla de Contenidos: “…Overview of WebSphere Application Server V5 -- 2.1 Java 2 Enterprise Edition (J2EE) overview -- 2.1.1 J2EE platform roles -- 2.1.2 J2EE benefits -- 2.1.3 Application components and their containers -- 2.1.4 Standard services -- 2.1.5 J2EE packaging -- 2.2 WebSphere Application Server V5 product family -- 2.3 WebSphere Application Server runtime architecture -- 2.3.1 WAS Version 5 base runtime architecture -- 2.3.2 WAS Version 5 Network Deployment runtime architecture -- 2.3.3 Architectural features -- 2.4 WebSphere Application Server V5 tools -- 2.4.1 Tools for installing, upgrading, and migrating -- 2.4.2 Tools for assembling applications -- 2.4.3 Tools for deploying and administering -- 2.4.4 Tools for monitoring and tuning -- 2.4.5 Tools for troubleshooting -- 2.5 WAS V5.0.2 and Supported J2EE APIs -- 2.5.1 What is new in WebSphere Application Server V5.0.2 -- 2.5.2 Supported J2EE APIs in WAS 5.0.2 -- Chapter 3. …”
    Libro electrónico
  14. 5754
    por Alonso, Hector
    Publicado 2006
    Tabla de Contenidos: “….) ; Los tres finales de Grandes ilusiones; Sátiras; Cómo se hundió el Titanic: nuevas revelaciones; Extrañas consecuencias de un nuevo virus; Cartas; Cartas de lectores 1 ; Medicina alternativa…”
    Libro electrónico
  15. 5755
    Publicado 2021
    Tabla de Contenidos: “…115 EJERCICIOS RESUELTOS DE PROGRAMACIÓN C++ -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1- GENERALIDADES DEL LENGUAJE DE PROGRAMACIÓN C++ -- CARACTERÍSTICAS -- ELEMENTOS BÁSICOS DE UN PROGRAMA -- INSTRUCCIONES -- DATOS Y TIPOS -- BIBLIOTECAS -- CONSTANTES SIMBÓLICAS Y CONSTANTES LITERALES -- IDENTIFICADORES -- COMENTARIOS -- DELIMITADORES -- OPERADORES -- VARIABLES -- ENTRADA / SALIDA -- ASIGNACIÓN -- PALABRAS RESERVADAS -- SECUENCIAS DE ESCAPE -- TABLA ASCII -- FASES DE LA EJECUCIÓN DE UN PROGRAMA -- TIPOS DE ERRORES EN LA EJECUCIÓN DE UN PROGRAMA -- ERRORES DE TIEMPO DE COMPILACIÓN -- ERRORES DE TIEMPO DE ENLAZADO -- ERRORES DE TIEMPO DE EJECUCIÓN (RUNTIME) -- EJEMPLO DE UN PROGRAMA -- 2- ESTRUCTURAS SECUENCIALES -- SENTENCIA -- ESTRUCTURA SECUENCIAL -- EJERCICIOS RESUELTOS DE ESTRUCTURAS SECUENCIALES -- 3- ESTRUCTURAS SELECTIVAS IF, IF - ELSE, IF ANIDADOS -- ESTRUCTURA IF -- ESTRUCTURA IF - ELSE -- ESTRUCTURA IF - ELSE ANIDADA -- EJERCICIOS RESUELTOS DE ESTRUCTURAS SELECTIVAS -- 4- ESTRUCTURA SELECTIVA SWITCH -- ESTRUCTURA SELECTIVA SWITCH -- EJERCICIOS RESUELTOS DE ESTRUCTURA SELECTIVA SWITCH -- 5- ESTRUCTURAS REPETITIVAS -- ESTRUCTURA FOR -- ESTRUCTURA WHILE -- ESTRUCTURA DO - WHILE -- EJERCICIOS RESUELTOS DE ESTRUCTURAS REPETITIVAS -- 6- ARREGLOS UNIDIMENSIONALES (VECTORES) -- CONCEPTO -- DECLARACIÓN -- INICIALIZAR ELEMENTOS DEL VECTOR -- INICIALIZACIÓN DE ELEMENTOS DEL VECTOR EN SU DECLARACIÓN -- INICIALIZACIÓN DE ELEMENTOS DEL VECTOR MEDIANTE ASIGNACIÓN EN FORMA ALEATORIA -- INICIALIZACIÓN DE ELEMENTOS DEL VECTOR MEDIANTE ASIGNACIÓN POR CAPTURA DE DATOS -- EJERCICIOS RESUELTOS DE VECTORES -- 7- ARREGLOS MULTIDIMENSIONALES -- CONCEPTO DE ARREGLOS MULTIDIMENSIONALES -- DECLARACIÓN DE UNA MATRIZ O ARREGLO BIDIMENSIONAL -- INICIALIZACIÓN DE LOS ELEMENTOS DE UNA MATRIZ O TABLA -- INICIALIZAR ELEMENTOS DE LA TABLA EN SU DECLARACIÓN…”
    Libro electrónico
  16. 5756
    por Mensch & Computer 2015
    Publicado 2015
    Tabla de Contenidos: “…Frontmatter -- Inhaltsverzeichnis -- Vorwort -- Mensch-Computer-Interaktion und Social Computing in sicherheitskritischen Systemen -- Editorial: Mensch-Computer- Interaktion und Social Computing in sicherheitskritischen Systemen / Reuter, Christian / Mentler, Tilo / Geisler, Stefan / Herczeg, Michael / Ludwig, Thomas / Pipek, Volkmar / Nestler, Simon / Sautter, Johannes -- Nutzeranforderungen eines Systems zur automatischen Helferbereitstellung / Detjen, Henrik / Geisler, Stefan / Bumiller, Gerd -- Public Displays zur Koordinierung ungebundener Helfer in Schadenslagen / Ludwig, Thomas / Kotthaus, Christoph / Dongen, Sören van -- Begleiter und Helfer in der Not - Apps für Krisen und Gefahrenlagen / Karl, Inga / Rother, Kristian / Nestler, Simon -- Betriebliches Kontinuitätsmanagement in kleinen und mittleren Unternehmen - Smart Services für die Industrie 4.0 / Reuter, Christian -- Entwicklung eines HCD-Leitfadens für Krisenmanagementsysteme / Orlowski, Daniel / Sautter, Johannes -- Ein Interaktionskonzept zur Simulation und Analyse von MANV-Einsätzen / Sautter, Johannes / Böspflug, Lars / Schneider, Friederike -- Gaze Guiding zur Unterstützung der Bedienung technischer Systeme / Bischof, Kathrin / Weyers, Benjamin / Frank, Barbara / Kluge, Annette -- Virtual Reality Crisis Simulation for Usability Testing of Mobile Apps / Rother, Kristian / Karl, Inga / Nestler, Simon -- U(X) in Health Design. …”
    Libro electrónico
  17. 5757
    por Finnegan, Ruth H.
    Publicado 2012
    Tabla de Contenidos: “…Hunting poetry: Yoruba ijala; Ambo hunters' songs. …”
    Libro electrónico
  18. 5758
    Publicado 2022
    Tabla de Contenidos: “…-- Understanding Problems that Docker Solves -- Containerization Through the Years -- 1979: chroot -- 2000: FreeBSD Jails -- 2005: OpenVZ -- 2006: cgroups -- 2008: LXC -- Containers and Virtual Machines -- Container Runtimes -- OCI and CRI -- Docker and Kubernetes -- Summary -- Chapter 2: Docker 101 -- Installing Docker -- Installing Docker on Windows -- Installing Docker on Windows Using WSL2 Backend -- About WSL -- Requirements for Installing and Enabling WSL2 -- Installing on macOS -- Installing on Linux -- Additional Steps -- Understanding Jargon Around Docker -- Layers -- Docker Image -- Docker Tags -- Docker Container -- Bind Mounts and Volumes -- Docker Repository -- Docker Registry -- Dockerfile -- Docker Engine -- Docker Daemon -- Docker CLI -- Docker API -- Docker Compose -- Docker Machine -- Hands-on Docker -- Working with Docker Images -- Working with a Real-World Docker Image -- Summary -- Chapter 3: Building the Python App -- About the Project -- Setting Up Telegram Messenger -- BotFather: Telegram's Bot Creation Interface -- Creating the Bot with BotFather -- Newsbot: The Python App -- Getting Started with Newsbot -- Running Newsbot -- Sending Messages to Newsbot -- Summary -- Chapter 4: Understanding the Dockerfile -- Dockerfile Primer -- Build Context -- Dockerignore -- BuildKit -- Building Using Docker Build -- Tags -- Dockerfile Instructions -- FROM -- WORKDIR -- ADD and COPY -- RUN -- Layer Caching -- CMD and ENTRYPOINT -- ENV -- VOLUME -- EXPOSE -- LABEL -- Guidelines and Recommendations for Writing Dockerfiles -- Using Multi-Stage Builds -- Exercises -- Summary -- Chapter 5: Understanding Docker Volumes -- Data Persistence…”
    Libro electrónico
  19. 5759
    Tabla de Contenidos: “…B. Manneschmidt, H. T. Hunter, B. L. Kirk, E. Sartori, P. Vaz -- PENELOPE: Taking Advantage of Class II Simulation by F. …”
    Libro electrónico
  20. 5760
    por Benito, Andres Del Rio
    Publicado 2013
    Tabla de Contenidos: “…The fault message concept -- Fault messages originated by the messaging runtime -- Fault messages explicitly instantiated in code -- Fault messages published by other systems through the ESB Exceptions Service -- The fault canonical schema -- Exception Handling API main methods -- Consuming fault messages -- The ESB Fault Processor pipeline -- ESB Exception Encoder component -- ESB BAM Tracker component -- ESB Dispatcher -- Consuming a fault in an orchestration -- The ESB Management Portal -- Fault reports -- Faults list -- Alerts -- Exceptions web service -- Summary -- 4. …”
    Libro electrónico