Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Development 355
- History 349
- Application software 303
- Engineering & Applied Sciences 237
- Computer Science 177
- Filosofía 152
- Computer programs 138
- Management 129
- Crítica e interpretación 124
- Computer networks 113
- Computer security 113
- Web site development 109
- Java (Computer program language) 107
- Security measures 102
- Computer programming 97
- Cloud computing 94
- Computer software 94
- Microsoft .NET Framework 94
- Historia y crítica 93
- Internet programming 80
- Programming 76
- Biblia 75
- Software engineering 71
- Cristianismo 70
- Artificial intelligence 69
- Job hunting 68
- History and criticism 66
- Design 65
- Business & Economics 63
-
9881Publicado 2021“…The Academic Program for Stone Age Research at the Museum of Cultural History comprises a general overview of excavations, carried out between 2000–2017, of 430 sites, graves, depots, hunting pits and other sites, and presents a broad and updated report on the status of research relating to the Stone Age (c. 9500–1700 BC) in the region.Insufficient knowledge has been the impetus for identification of four main areas for concerted prospective effort:• Technology• Settlement and land use• Subsistence and economy• Rituals and their practiceAlso presented in this program for Stone Age research are concrete strategies and initiatives that will contribute to filling in these knowledge gaps, advancing the field, and laying foundations for further research.The Stone Age in Southeastern Norway has been written with researchers, managers of cultural heritage and students in mind, as well as all others interested in a deep dive into our earliest history. …”
Libro electrónico -
9882Publicado 2005“…Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and 4.1 Review content from the first edition that has been fully revised and updated to CallManager release 4.1 Learn how to deploy and manage a CallManager solution Understand the components that make up CallManager call routing through the use of basic to advanced examples that solve enterprise call routing problems Gain a full understanding of how CallManager manages media resources and processes information for conferencing, transcoding, annunciation, and more Learn detailed information about North American and international dial plans, trunk and station devices, media resources, and much more Cisco CallManager Fundamentals , Second Edition, provides examples and reference information about Cisco® CallManager, the call-processing component of the Cisco IP Communications solution. …”
Libro electrónico -
9883Publicado 2020“…Whether you're new to the field or an experienced practitioner, you'll come away with fresh insights each and every time. Dave Thomas and Andy Hunt wrote the first edition of this influential book in 1999 to help their clients create better software and rediscover the joy of coding. …”
Libro electrónico -
9884Publicado 2020“…As you progress, you'll learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools and components. …”
Libro electrónico -
9885Publicado 2023“…Next, you'll learn how SOAR works and what its benefits are, including optimized threat intelligence, incident response, and utilizing threat hunting in investigations. You'll also get to grips with advanced automated scenarios and explore useful tools such as Microsoft Sentinel, Splunk SOAR, and Google Chronicle SOAR. …”
Libro electrónico -
9886Publicado 2022“…What you will learn Understand Cloud Security Alliance (CSA) and the FedRAMP programs Respond to Advanced Persistent Threats (APT) by deploying hunt teams Understand the Cyber Kill Chain framework as well as MITRE ATT&CK and Diamond Models Deploy advanced cryptographic solutions using the latest FIPS standards Understand compliance requirements for GDPR, PCI, DSS, and COPPA Secure Internet of Things (IoT), Industrial control systems (ICS), and SCADA Plan for incident response and digital forensics using advanced tools Who this book is for This CompTIA book is for CASP+ CAS-004 exam candidates who want to achieve CASP+ certification to advance their career. …”
Libro electrónico -
9887Publicado 2024Tabla de Contenidos: “…Microsoft 365's Security and Compliance Center (Microsoft Purview) -- Google Workspace Admin console and security features -- Summary -- Further reading -- Part 3: Cloud Forensic Analysis - Responding to an Incident in the Cloud -- Chapter 8: The Digital Forensics and Incident Response Process -- The basics of the incident response process -- Tools and techniques for digital forensic investigations -- Prerequisites -- Cloud host forensics -- Memory forensics -- Live forensic analysis and threat hunting -- EDR-based threat hunting -- Hunting for malware -- Common persistence mechanisms -- Network forensics -- Basic networking concepts -- Cloud network forensics - log sources and tools -- Network investigation tools -- Malware investigations -- Setting up your malware analysis lab -- Working with packed malware -- Binary comparison -- Traditional forensics versus cloud forensics -- Summary -- Further reading -- Chapter 9: Common Attack Vectors and TTPs -- MITRE ATT& -- CK framework -- Forensic triage collections -- Host-based forensics -- Evidence of intrusion -- Prefetch analysis -- AmCache analysis -- ShimCache analysis -- Windows Event Logs -- Analyzing memory dumps -- Misconfigured virtual machine instances -- Unnecessary ports left open -- Default credentials left unchanged -- Outdated or unpatched software -- Publicly exposed sensitive data (or metadata) -- Misconfigured storage buckets -- Public permissions -- Exposed API keys or credentials -- Improper use of IAM policies -- Cloud administrator portal breach -- Summary -- Further reading -- Chapter 10: Cloud Evidence Acquisition -- Forensic acquisition of AWS instance -- Step 1 - creating EC2 volume snapshots -- Step 2 - acquiring OS memory images -- Step 3 - creating a forensic collector instance -- Step 4 - creating and attaching infected volume from snapshots…”
Libro electrónico -
9888Publicado 2016“…Como decía Sean Maguire -Robin Williams- en El indomable Will Hunting: "No eres perfecto amigo. Y voy a ahorrarte el suspense. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
9889Publicado 2015“…The field has established cyclic GMP as an ubiquitous intracellular second messenger, playing a critical role in the control of many physiological processes, including cardiac vasculature, smooth muscle relaxation, blood volume, cellular growth, sensory transduction, neural plasticity, learning and memory. Unlike the three-component design of its predecessor: adenylate cyclase, G-protein and G-protein coupled receptor, the membrane guanylate cyclase transduction system consists of a single entity, a trans-membrane-spanning protein that serves as both a receptor and a signal transducer. …”
Libro electrónico -
9890Publicado 2014“…He had a long and prolific career in the prisons field: director of several prisons (The Model Prison of Madrid, amongst others); General Surveyor of Prisons during twenty five years (the third most important position, under the Minister of Grace and Justice and the General Director); representative of Spain in four international prison congresses; he established the progressive system in prisons, which lasted until the sanction of the Prison General Organic Law in 1979; he carried out field trips in several European nations and in the United States of America, from which he imported the model of the reformatory for adults established in Ocaña (province of Toledo); he collaborated in the bill of probation; he was the Head of the Criminology School; and his resume still goes on. …”
Libro electrónico -
9891Publicado 2015“…The CDE, a conference that sought to build confidence and promote disarmament, first convened in Stockholm in 1984, yet it was not possible to break the deadlock in negotiations over nuclear weapons until after the death of Andropov and Reagan's election victory. …”
Libro electrónico -
9892por Rickels, Laurence A. 1954- Verfasser“…In addition to the deadening end that can only be postponed – the killing off of the dead until dead dead – there is another second death that concludes the wish for fame with a ritual stripping of badges and insignia. …”
Publicado 2021
Libro electrónico -
9893por Occhetta, Francesco“…Il quadro del centrosinistra ha invece contorni meno delineati: è vero che ha perso 14 punti in 5 anni, ma molte liste civiche erano liste satellite. …”
Publicado 2017
Artículo -
9894por Sale, Giovanni, 1958- aut“…Fino all’affermarsi del cosiddetto «Stato Islamico» (2014), la lotta contro il nemico sionista infatti è stato uno dei punti centrali dei programmi dei movimenti islamici radicali e del terrorismo transnazionale (come al Qaeda). …”
Publicado 2017
Artículo -
9895por Sale, Giovanni, 1958- aut“…Questo spiega perché uno dei pochi punti chiari dell’agenda politica di Trump riguarda la lotta al terrorismo internazionale e, in particolare, all’Isis. …”
Publicado 2017
Artículo -
9896Publicado 2018“…"This book addresses political conflicts in Norway through an extended time span, from the late autocracy of the 18th century until the democratic challenges of today. The book holds eight articles focusing on historical phases which have been particularly influenced by social and political mobilization. …”
Libro electrónico -
9897Publicado 2023“…Changes are commonly initiated by the parents' decreasing health, directly affecting the parents ability of care intensity . Until now, science and practice have not developed suitable offers of support. …”
Libro electrónico -
9898Publicado 2008“…He, therefore, sheds ligtht on a topic that had been ignored by official Greece until a few years ago. The book is structured into three chapters: 1. …”
Libro electrónico -
9899Publicado 2022“…Covers the history and the techniques of cryptography in a way I never thought I needed--until I read this book! - Matthew Harvell, AbacusNext…”
Grabación no musical -
9900por Olsen, Henry“…Olsen cuts through political mythology to set the record straight, revealing how Reagan--a longtime Democrat until FDR's successors lost his vision in the 1960s--saw himself as FDR's natural heir, carrying forward the basic promises of the New Deal: that every American deserves comfort, dignity, and respect provided they work to the best of their ability. …”
Publicado 2017
Libro