Mostrando 13,121 - 13,140 Resultados de 13,921 Para Buscar 'Idmón~', tiempo de consulta: 1.12s Limitar resultados
  1. 13121
    “…By the end of the book you’ll will have developed a personal blog complete with a password protected admin module. PHP for Absolute Beginners won't swamp you with every detail of the full PHP language up front – instead, you’ll be introduced to a small, versatile subset of PHP and learn to use it creatively to develop dynamic web sites. …”
    Libro electrónico
  2. 13122
    Publicado 2017
    Tabla de Contenidos: “…Pérez Mancilla -- El concepto de la música en las cartas-oración mesopotámicas / Daniel Sánchez Muñoz -- Algunas cartas del Che Guevara / Mariapia Ciaghi -- Cartas entre Barrada y Chukri: Rosas y cenizas / Maribel Lázaro Durán -- Las "cartas de zorzal": unas originales epístolas exclusivas de Al-Andaluz / Desiré López Bernal -- De Constantinopla a Roma: el humanismo en la correspondencia de Demetrio Cidones y Manuel II Paleólogo / Carlos Martínez Carrasco -- El género epistolar, legado de Roma / María Nieves Muñoz Martín -- Las cartas de (y a) Teixeira de Pascoaes / Andrés J. …”
    Libro electrónico
  3. 13123
    Publicado 2014
    Tabla de Contenidos: “…Linux Environments -- Differences between Linux and Microsoft -- The setup -- Scenario 1 - learn Samba and other dance forms -- Setup -- Configuration -- Testing -- Variations -- Information disclosure -- File upload -- Scenario 2 - turning on a LAMP -- Setup -- The PHP -- Variations -- Out-of-date versions -- Login bypass -- SQL injection -- Dangerous PHP -- PHPMyAdmin -- Scenario 3 - destructible distros -- Setup -- Variations -- Scenario 4 - tearing it up with Telnet -- Setup -- Variations -- Default credentials -- Buffer overflows -- Flag placement and design…”
    Libro electrónico
  4. 13124
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  5. 13125
    Publicado 2017
    Tabla de Contenidos: “…The Economic Case for SEL, Damon Jones, Mark T. Greenberg, & Max Crowley -- 8. …”
    Libro
  6. 13126
    por Klidas, Angelika
    Publicado 2022
    Tabla de Contenidos: “…Identifying data literacy technical skills -- Data literacy soft skills -- Data literacy mindsets -- Summary -- References -- Chapter 12: Assessing Your Data Literacy Maturity -- Assessing individual data literacy -- Assessing organizational data literacy -- Basic organizational data literacy assessment -- Robust organizational data literacy maturity assessment -- Summary -- Chapter 13: Managing Data and Analytics Projects -- Discovering why data and analytics projects fail -- Understanding four typical data and analytics project characteristics -- Understanding data and analytics project blockers -- Pitfalls in data and analytics projects -- Lack of expertise -- The technical architecture -- Time and money -- Unfolding the data and analytics project approach -- Unfolding the data and analytics project framework -- Intermezzo 2 - successfully managing a data and analytics project -- Mitigating typical data and analytics project risks -- Project risks -- Technical risks -- Cultural risks -- Content risks -- Determining roles in data and analytics projects (and teams) -- Managing data and analytics projects -- Writing a successful data and analytics business case -- A chapter layout for your business case -- Finding financial justification for your project -- Argumentation for one-time project costs -- Annual recurring costs -- Argumentation for annual recurring costs -- The quantitative benefits -- ROI -- Conclusion and advice -- Summary -- Chapter 14: Appendix A - Templates -- Project intake form -- STARR TEMPLATE -- Layout for a business case -- Layout for a business case scenario description -- A business case financial analysis -- Layout for a risk assessment -- Layout for a summary business case -- Layout information and measure plan -- Layout for a KPI description -- Table with the Inmon groups and a description of their roles…”
    Libro electrónico
  7. 13127
    Publicado 2018
    Tabla de Contenidos: “…. -- Using WinKey + X for quick admin tasks -- Getting ready -- How to do it... -- How it works... -- Using the search function to launch applications quickly -- Getting ready -- How to do it... -- How it works... -- Managing remote servers from a single pane with Server Manager -- Getting ready -- How to do it... -- How it works... -- See also -- Using PowerShell to accomplish any function in Windows Server -- Getting ready -- How to do it... -- How it works... -- Installing a role or feature -- Getting ready -- How to do it... -- How it works... -- Administering Server 2016 from a Windows 10 machine -- Getting ready -- How to do it... -- How it works... -- See also -- Identifying useful keyboard shortcuts in Server 2016 -- Getting ready -- How to do it... -- How it works... -- Setting your PowerShell Execution Policy -- Getting ready -- How to do it... -- How it works... -- Building and executing your first PowerShell script -- Getting ready -- How to do it... -- How it works... -- Searching for PowerShell cmdlets with Get-Help -- Getting ready -- How to do it... -- How it works... -- Chapter 2: Core Infrastructure Tasks -- Introduction -- Configuring a combination Domain Controller, DNS server, and DHCP server -- Getting ready -- How to do it... -- How it works... -- See also -- Adding a second Domain Controller -- Getting ready -- How to do it... -- How it works... -- Organizing your computers with Organizational Units -- Getting ready -- How to do it... -- How it works…”
    Libro electrónico
  8. 13128
    Publicado 2018
    Tabla de Contenidos: “…File structure -- Server-side source code -- Java source -- Resources -- client-side source code -- Starting the application -- Application modules -- Home and Login modules -- Account modules -- Settings -- Password -- Registration -- Admin module -- User management -- Metrics -- Health -- Configuration -- Audits -- Logs -- API -- Running generated tests -- Server-side tests -- Client-side tests -- Summary -- Chapter 4: Entity Modeling with JHipster Domain Language -- Introduction to JDL -- DSL grammar for JDL -- Entity modeling with JDL -- Relationship management -- DTO, service, and pagination options -- JDL Studio -- Use case entity model with explanation -- Entities -- Relationships -- Options for entities -- Entity generation with JHipster -- Generated code walkthrough -- Server-side source code -- Domain class for the entity -- Repository interface for the entity -- Service class for the entity -- Resource class for the entity -- Client side -- TypeScript model class for the entity -- Angular services for the entity -- Angular components of the entity -- Angular route for the entity -- Angular module for the entity -- Generated pages -- Running generated tests -- Summary -- Chapter 5: Customization and Further Development -- Live reload for development -- Spring Boot DevTools -- Webpack dev server and BrowserSync -- Setting up live reload for an application -- Customizing the Angular frontend for an entity -- Editing an entity using the JHipster entity sub-generator -- Changing the look and feel of the application -- Adding a new i18n language -- Authorization with Spring Security -- Limiting access to entities -- Limiting access to create/edit/delete entities -- Limiting access to data of other users -- Summary -- Chapter 6: Testing and Continuous Integration -- Fixing and running tests -- Continuous integration -- CI/CD tools -- Jenkins…”
    Libro electrónico
  9. 13129
    Publicado 2017
    Tabla de Contenidos: “…. -- Reverting to NX-OS mode -- ACI fabric overlay -- An introduction to the GUI -- System menu -- Tenants menu -- Fabric menu -- VM Networking -- L4-L7 Services -- Admin -- Operations -- Chapter 2: Configuring Policies and Tenants -- Introduction -- Creating fabric policies -- How to do it... -- How it works... -- Creating access policies -- How to do it... -- How it works... -- There's more... -- Creating tenants -- How to do it... -- How it works... -- Configuring bridge domains -- How to do it... -- How it works... -- Configuring contexts -- How to do it... -- How it works... -- There's more... -- Creating application network profiles -- How to do it... -- Creating endpoint groups -- How to do it... -- How it works... -- Using contracts between tenants -- How to do it... -- How it works... -- Creating filters -- How to do it... -- Creating contracts within tenants -- How to do it... -- Creating management contracts -- How to do it... -- How it works... -- Chapter 3: Hypervisor Integration (and Other Third Parties) -- Introduction -- Installing device packages -- How to do it... -- How it works... -- There's more…”
    Libro electrónico
  10. 13130
    Publicado 2018
    Tabla de Contenidos: “…GlassFish dependencies -- Performing the installation -- Starting GlassFish -- Deploying our first Java EE application -- Deploying an application through the web console -- Undeploying an application through the GlassFish Admin Console -- Deploying an application through the command line -- The Autodeploy directory -- The asadmin command-line utility -- GlassFish domains -- Creating domains -- Deleting domains -- Stopping a domain -- Setting up database connectivity -- Setting up connection pools -- Setting up data sources -- Setting JMS resources -- Setting up a JMS connection factory -- Setting up a JMS message queue -- Setting up a JMS message topic -- Configuring durable subscribers -- Summary -- Index…”
    Libro electrónico
  11. 13131
    Publicado 2018
    Tabla de Contenidos: “…Improving our application forms - Validators -- Preparing for war - Getting the validation plugin -- First steps - Defining our rules -- Manipulating the DOM - Custom attributes -- Understanding how computed properties work -- Summary -- Chapter 8: Security -- Understanding JSON Web Tokens -- JWT -- Custom authentication and authorization -- Implementing authentication -- The authentication logic -- Generating the token -- The authentication REST controller -- Implementing authorization -- Creating the Admin API -- Managing matches -- Creating the Match schema -- Creating the REST controller -- Creating Matches -- List Matches -- Updating the Scores -- Securing the REST controller -- Validate token -- Validate permissions -- Introducing Auth0 -- A simple example -- Creating an account -- Registering an Auth0 client application -- Exploring our example application -- Social Login with Auth0 -- Single sign-on -- Summary -- Chapter 9: Running E2E Tests -- Integration testing - Multiple services, one application -- Configuring applications for integration testing -- Mocking external dependencies -- Calculating code coverage -- Does our app meet our business requirements? …”
    Libro electrónico
  12. 13132
    Publicado 2017
    Tabla de Contenidos: “…Performing Actions -- Test your activities in isolation with Espresso Intents -- Testing WebViews with Espresso Web -- Verifying Results -- Testing UI for Multiple Apps -- Set Up the UI Automator -- Inspecting the UI on a device -- Ensuring your Activity is accessible -- Selector Specification -- Performing Actions -- Tools and Techniques: Espresso and Monkeyrunner -- Robotium -- The UI Animator -- Espresso -- Monkeyrunner -- Summary -- Chapter 15: Preparing for Google Play -- Versioning Your App -- Generating a signed APK -- Preconfiguring to automatically Sign Your APK -- Android Instant Apps -- Alpha and Beta testing the App -- Preparing App Store Listing -- Device Catalog -- App signing -- Android Vitals -- User Feedback and Analytics -- Summary -- Chapter 16: Understanding App Store Analytics for Optimization -- Keep an eye on Google Play policies -- Get your app title right -- Effectively using keywords in description -- Does your icon reflect the app theme? -- Are your app screenshots nailing it? …”
    Libro electrónico
  13. 13133
    por Von Hagen, William
    Publicado 2005
    “…And while this helps, it's not enough: any sys admin knows there are many more hacks, cool tips, and ways of solving problems than can fit in a single volume (one that mere mortals can lift, that is). …”
    Libro electrónico
  14. 13134
    Publicado 2017
    Tabla de Contenidos: “…. -- Creating&amp -- #160 -- an admin user in AWS -- Getting ready -- How to do it... -- There's more... -- Creating a VPC and a subnet with IPv6 -- Getting ready -- How to do it... -- Creating an EC2 with an IPv6 address -- Getting ready -- How to do it... -- How it works... -- Creating NAT on EC2 instance -- Getting ready -- How to do it... -- How it works... -- There's more... -- Working with network interfaces -- Getting ready -- How to do it... -- Configuring AWS CLI -- Getting ready -- How to do it... -- Chapter 2: Building Your Own Custom VPC -- Introduction -- Managing a&amp -- #160 -- VPC -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing public and private subnets -- Getting ready -- How to do it... -- There's more... -- Managing a Network ACL -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing a Security Group -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing an Internet Gateway -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing a NAT Gateway -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing a Route Table -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing EC2 instances -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 3: VPC Advanced Components -- Introduction -- Assigning multiple IPs to an instance and ENI -- Getting ready -- How to do it…”
    Libro electrónico
  15. 13135
    Publicado 2018
    Tabla de Contenidos: “….movingaverage() -- .trend() -- .range() -- .precision() -- Data source functions -- Elasticsearch -- Static/value -- World bank -- Setting the offset for data sources -- Saving Timelion graph -- Timelion sheet option -- Deleting Timelion sheet -- Timelion help -- Function reference -- Keyboard tips -- Timelion auto-refresh -- Summary -- Chapter 7: Interact with Your Data Using Dev Tools -- Console -- Copy as cURL -- Auto indent -- Multiple requests in console -- Profiling queries -- Query profile -- Aggregation profile -- Grok debugger -- Summary -- Chapter 8: Tweaking Your Configuration with Kibana Management -- Index pattern -- Creating the index pattern -- Setting the default index pattern -- Refreshing index pattern fields -- Deleting an index pattern -- Managing fields -- String -- Dates -- Geographic point field -- Numbers -- Saved objects -- Dashboards -- Searches -- Visualizations -- Advanced settings -- xPack:defaultAdminEmail -- search:queryLanguage -- search:queryLanguage:switcher:enable -- dateFormat -- dateFormat:tz -- dateFormat:dow -- defaultIndex -- Reporting -- Security -- Roles -- Users -- Watcher -- Creating the watch -- Threshold alert -- Advanced watch -- Deleting the watch -- Summary -- Chapter 9: Understanding X-Pack Features -- Installing X-Pack -- Installing X-Pack into Elasticsearch -- Installing X-Pack into Kibana -- Features of X-Pack -- Monitoring -- Elasticsearch monitoring -- Kibana monitoring -- Security settings -- Users -- Roles -- Machine learning -- Other options of X-Pack -- Application Performance Monitoring -- Logging -- Apache logs -- MySQL logs -- Nginx logs -- System logs -- Metrics -- Apache metrics -- Docker metrics -- Kubernetes metrics -- MySQL metrics -- Nginx metrics -- Redis metrics -- System metrics -- Summary -- Chapter 10: Machine Learning with Kibana -- Machine learning jobs -- Single metric Jobs…”
    Libro electrónico
  16. 13136
    Publicado 2024
    Tabla de Contenidos: “…Microsoft 365's Security and Compliance Center (Microsoft Purview) -- Google Workspace Admin console and security features -- Summary -- Further reading -- Part 3: Cloud Forensic Analysis - Responding to an Incident in the Cloud -- Chapter 8: The Digital Forensics and Incident Response Process -- The basics of the incident response process -- Tools and techniques for digital forensic investigations -- Prerequisites -- Cloud host forensics -- Memory forensics -- Live forensic analysis and threat hunting -- EDR-based threat hunting -- Hunting for malware -- Common persistence mechanisms -- Network forensics -- Basic networking concepts -- Cloud network forensics - log sources and tools -- Network investigation tools -- Malware investigations -- Setting up your malware analysis lab -- Working with packed malware -- Binary comparison -- Traditional forensics versus cloud forensics -- Summary -- Further reading -- Chapter 9: Common Attack Vectors and TTPs -- MITRE ATT&amp -- CK framework -- Forensic triage collections -- Host-based forensics -- Evidence of intrusion -- Prefetch analysis -- AmCache analysis -- ShimCache analysis -- Windows Event Logs -- Analyzing memory dumps -- Misconfigured virtual machine instances -- Unnecessary ports left open -- Default credentials left unchanged -- Outdated or unpatched software -- Publicly exposed sensitive data (or metadata) -- Misconfigured storage buckets -- Public permissions -- Exposed API keys or credentials -- Improper use of IAM policies -- Cloud administrator portal breach -- Summary -- Further reading -- Chapter 10: Cloud Evidence Acquisition -- Forensic acquisition of AWS instance -- Step 1 - creating EC2 volume snapshots -- Step 2 - acquiring OS memory images -- Step 3 - creating a forensic collector instance -- Step 4 - creating and attaching infected volume from snapshots…”
    Libro electrónico
  17. 13137
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Book 1: Laying the Groundwork -- Chapter 1: Preparing for Business -- Getting in Shape to Start Up -- Confirming Viability -- Getting Help -- Entering an Incubator -- Assisting Inventors -- Chapter 2: Arranging the Foundations -- Structuring Your Business -- Safeguarding Your Business Assets -- Working from Home -- Chapter 3: Can You Do the Business? …”
    Libro electrónico
  18. 13138
    por Institute of Medicine (U.S.).
    Publicado 1991
    Libro electrónico
  19. 13139
    Publicado 2018
    Tabla de Contenidos: “…-- Network basics -- Connecting to a wireless adapter -- MAC addresses -- Wireless modes - managed and monitor -- Enabling monitor mode manually -- Enabling monitor mode using airmon-ng -- Summary -- Chapter 5: Pre-Connection Attacks -- Packet sniffing basics -- Targeted packet sniffing -- Deauthentication attack -- What is a fake access point? …”
    Libro electrónico
  20. 13140
    Publicado 2015
    Tabla de Contenidos: “…«De edificiis per eum conditis»: gli edifici civili e le dimore -- 2. «De cura et restitutione sacrarum edium»: gli edifici sacri -- 3. …”
    Libro electrónico