Mostrando 81 - 100 Resultados de 118 Para Buscar 'MSF60~', tiempo de consulta: 0.88s Limitar resultados
  1. 81
    Publicado 2011
    Tabla de Contenidos: “…5: The Joy of ExploitationBasic Exploitation; msf> show exploits; msf> show auxiliary; msf> show options; msf> show payloads; msf> show targets; info; set and unset; setg and unsetg; save; Exploiting Your First Machine; Exploiting an Ubuntu Machine; All-Ports Payloads: Brute Forcing Ports; Resource Files; Wrapping Up; 6: Meterpreter; Compromising a Windows XP Virtual Machine; Scanning for Ports with Nmap; Attacking MS SQL; Brute Forcing MS SQL Server; The xp_cmdshell; Basic Meterpreter Commands; Capturing Keystrokes; Dumping Usernames and Passwords; Extracting the Password Hashes…”
    Libro electrónico
  2. 82
    por Salignon, Pierre
    Publicado 2002
    Libro
  3. 83
    por Quintana, Stella
    Publicado 2002
    Libro
  4. 84
    por Zamboni, Luca
    Publicado 2013
    Tabla de Contenidos: “…Using the Model -- The external software - a Qt5 application -- The Swiss army knife - S-functions -- The simulation phases -- Level 2 MATLAB S-function callbacks -- The mandatory callbacks -- The most useful optional callbacks -- The work vector - DWork -- MATLAB S-functions - file source and sink blocks -- The filesink_msfun block -- The MATLAB code -- The filesource_msfun block -- The MATLAB code -- A quick test -- Simulink and the real world -- Forcing Simulink to sync -- Preparing the cruise controller model -- Running the simulation on the target application -- Going further - C MEX S-functions -- Setting up the mex tool -- UNIX-like systems (GNU/Linux in particular) -- Microsoft Windows systems -- How C MEX S-functions work -- The required callbacks -- mdlInitializeSizes -- mdlInitializeSampleTimes -- mdlOutputs -- mdlTerminate -- The most useful optional callbacks -- mdlStart -- mdlInitializeConditions -- mdlUpdate -- The DWork vector -- The elementary work vectors -- The filesource S-function -- The beginning - headers and includes -- Block properties and memory usage - mdlInitializeSizes -- Timings - mdlInitializeSampleTimes -- Initial tasks - mdlStart -- Core logic - mdlOutputs -- Update memories - mdlUpdate -- Cleanup - mdlTerminate -- The happy ending -- Compiling the S-function -- Exercise - the filesink S-function -- A quick test -- Go for another ride -- Summary -- Index…”
    Libro electrónico
  5. 85
    por González Bustelo, Mabel
    Publicado 2001
    Libro
  6. 86
    por Lapeyre, Bernard
    Publicado 2001
    Libro
  7. 87
    por Raich, Jordi
    Publicado 2003
    Libro
  8. 88
    por Hernández, Francisca
    Publicado 2001
    Libro
  9. 89
    Publicado 2001
    Libro
  10. 90
    Publicado 2016
    Tabla de Contenidos: “…The Most Strings With Few Bad Columns Problem; 4.1. The MSFBC problem; 4.1.1. Literature review; 4.2. An ILP model for the MSFBC problem; 4.3. …”
    Libro electrónico
  11. 91
    Publicado 2019
    Tabla de Contenidos: “…Front Matter -- Copyright page -- Preface / Illustrations -- Table of Cases -- Table of Legislation -- Notes on Contributors -- The Ecosystem Approach in Ocean Planning and Governance: An Introduction / Cross-Cutting and Critical Perspectives -- Resilience and Adaptive Capacity of Aquatic Environmental Law in the EU: An Evaluation and Comparison of the WFD, MSFD, and MSPD / The Ecosystem Approach as a Basis for Managerial Compliance: An Example from the Regulatory Development in the Baltic Sea Region / Delimiting Marine Areas: Ecosystem Approach(es?) …”
    Libro electrónico
  12. 92
    Publicado 2018
    Tabla de Contenidos: “…Summary -- Chapter 8: Man-in-the-Middle Attacks -- Man-in-the-middle attacks -- ARP spoofing using arpspoof -- ARP spoofing using MITMf -- Bypassing HTTPS -- Session hijacking -- DNS spoofing -- MITMf screenshot keylogger -- MITMf code injection -- MITMf against a real network -- Wireshark -- Wireshark basics -- Wireshark filters -- Summary -- Chapter 9: Network Penetration Testing, Detection, and Security -- Detecting ARP poisoning -- Detecting suspicious behavior -- Summary -- Chapter 10: Gaining Access to Computer Devices -- Introduction to gaining access -- Server side -- Client side -- Post-exploitation -- Sever-side attacks -- Server-side attack basics -- Server-side attacks - Metasploit basics -- Metasploit remote code execution -- Summary -- Chapter 11: Scanning Vulnerabilities Using Tools -- Installing MSFC -- MSFC scan -- MSFC analysis -- Installing Nexpose -- Running Nexpose -- Nexpose analysis -- Summary -- Chapter 12: Client-Side Attacks -- Client-side attacks -- Installing Veil -- Payloads overview -- Generating a Veil backdoor -- Listening for connections -- Testing the backdoor -- Fake bdm1 updates -- Client-side attacks using the bdm2 BDFProxy -- Protection against delivery methods -- Summary -- Chapter 13: Client-Side Attacks - Social Engineering -- Client-side attacks using social engineering -- Maltego overview -- Social engineering - linking accounts -- Social engineering - Twitter -- Social engineering - emails -- Social engineering - summary -- Downloading and executing AutoIt -- Changing the icon and compiling the payload -- Changing extensions -- Client-side attacks - TDM email spoofing -- Summary -- Chapter 14: Attack and Detect Trojans with BeEF -- The BeEF tool -- BeEF - hook using a MITMf -- BeEF - basic commands -- BeEF - Pretty Theft -- BeEF - Meterpreter 1 -- Detecting Trojans manually…”
    Libro electrónico
  13. 93
    por Rey Marcos, Francisco
    Publicado 2002
    Libro
  14. 94
    por Raich, Jordi
    Publicado 2002
    Libro
  15. 95
    Publicado 2025
    Tabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright -- Dedication -- Contents -- List of Figures -- List of Tables -- List of Symbols -- Preface -- Acknowledgement -- Foreword -- List of Contributors -- Chapter 1 Introduction -- 1.1 Canonical MSFF Schemes -- 1.1.1 Centralized Filtering Fusion -- 1.1.2 Information Filtering Fusion -- 1.1.3 Sequential Filtering Fusion -- 1.1.4 Weighted Filtering Fusion -- 1.1.5 Covariance Intersection Fusion -- 1.1.6 Federated Filtering Fusion -- 1.2 Censored Measurements -- 1.2.1 One-Side Censored Measurements -- 1.2.2 Two-Side Censored Measurements -- 1.2.3 Kalman Filtering with Censored Measurements -- 1.3 Communication Constraints -- 1.3.1 Communication Delays -- 1.3.2 Fading Measurements -- 1.3.3 Nonlinear Disturbances -- 1.3.4 Quantized Measurements -- 1.3.5 Disordered Measurements -- 1.4 Outline -- Chapter 2 Optimal Filtering for Networked Systems with Channel Fading and Measurement Censoring -- 2.1 Problem Formulation -- 2.2 Tobit Kalman Filter with Fading Measurements -- 2.3 Illustrative Examples -- 2.3.1 Oscillator Example -- 2.3.2 Radar Tracking Example -- 2.4 Summary -- Chapter 3 Tobit Kalman Filter with Time-Correlated Multiplicative Sensor Noises under Redundant Channel Transmission -- 3.1 Problem Formulation -- 3.2 State-Dependent TKF under Redundant Channels -- 3.3 An Illustrative Example -- 3.4 Summary -- Chapter 4 State Estimation under Non-Gaussian Lévy and Time-Correlated Additive Sensor Noises: A Modified Tobit Kalman Filtering Approach -- 4.1 Problem Formulation -- 4.2 A Modified Tobit Kalman Filter -- 4.3 An Illustrative Example -- 4.4 Summary -- Chapter 5 Protocol-Based Filter Design under Integral Measurements and Probabilistic Sensor Failures: The Censored Data Case -- 5.1 Problem Formulation -- 5.2 Protocol-Based Tobit Kalman Filter -- 5.3 Self-Propagating Lower and Upper Bounds…”
    Libro electrónico
  16. 96
    por Chevalier, Eveline
    Publicado 2001
    Libro
  17. 97
    por Clark, Kennedy
    Publicado 1999
    “…The most complete guide to Cisco Catalyst(r) switch network design, operation, and configuration Master key foundation topics such as high-speed LAN technologies, LAN segmentation, bridging, the Catalyst command-line environment, and VLANs Improve the performance of your campus network by utilizing effective Cisco Catalyst design, configuration, and troubleshooting techniques Benefit from the most comprehensive coverage of Spanning-Tree Protocol, including invaluable information on troubleshooting common Spanning Tree problems Master trunking concepts and applications, including ISL, 802.1Q, LANE, and MPOA Understand when and how to utilize Layer 3 switching techniques for maximum effect Understand Layer 2 and Layer 3 switching configuration with the Catalyst 6000 family, including coverage of the powerful MSFC Native IOS Mode Cisco LAN Switching provides the most comprehensive coverage of the best methods for designing, utilizing, and deploying LAN switching devices and technologies in a modern campus network. …”
    Libro electrónico
  18. 98
    Publicado 2003
    “…End-to-end QoS deployment techniques for Cisco Catalyst series switches Examine various QoS components, including congestion management, congestion avoidance, shaping, policing/admission control, signaling, link efficiency mechanisms, and classification and marking Map specified class of service (CoS) values to various queues and maintain CoS values through the use of 802.1q tagging on the Cisco Catalyst 2900XL, 3500XL and Catalyst 4000 and 2948G/2980G CatOS Family of Switches Learn about classification and rewrite capabilities and queue scheduling on the Cisco Catalyst 5000 Implement ACLs, ACPs, ACEs, and low-latency queuing on the Cisco Catalyst 2950 and 3550 Family of Switches Understand classification, policying, and scheduling capabilities of the Catalyst 4000 and 4500 IOS Family of Switches Configure QoS in both Hybrid and Native mode on the Catalyst 6500 Family of Switches Utilize Layer 3 QoS to classify varying levels of service with the Catalyst 6500 MSFC and Flexwan Understand how to apply QoS in campus network designs by examining end-to-end case studies Quality of service (QoS) is the set of techniques designed to manage network resources. …”
    Libro electrónico
  19. 99
    por David, Jean-Luc, 1971-
    Publicado 2007
    Tabla de Contenidos: “…Team Foundation Server Security Model OverviewManaging Security Groups in Team Foundation Server; Common Security Access Problems; Security Best Practices; Summary; Chapter 5: Team Foundation Server Backup and Recovery; Disaster Recovery Overview; Backing Up Team Foundation Server; Restoring Team Foundation Server to the Same Server; Restoring Team Foundation Server to a Different Server; Summary; Part II: Project Creation; Chapter 6: Incorporating Your Process Using Microsoft Solutions Framework; Understanding the Need for MSF; MSF for Agile Software Development…”
    Libro electrónico
  20. 100
    por Abaakouk, Zohra
    Publicado 2001
    Libro