Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Ayuda humanitaria 14
- Médicos sin Fronteras 8
- Computer networks 6
- Guipúzcoa 6
- Security measures 6
- Engineering & Applied Sciences 5
- Computer security 4
- Organizaciones no gubernamentales 4
- Virgen María 4
- Abastecimiento de alimentos 3
- Computer software 3
- Development 3
- Devoción a la Virgen 3
- Electrical & Computer Engineering 3
- Hacking 3
- José 3
- Metges sense Fronteres (Associació) 3
- Microsoft Visual studio 3
- Misiones 3
- Teams in the workplace 3
- Telecommunications 3
- Access control 2
- Ajuda humanitària 2
- Biblia 2
- Computer Science 2
- Computers 2
- Cooperación internacional 2
- Espiritualidad 2
- Kali Linux 2
- Local area networks (Computer networks) 2
-
101Publicado 2001Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro
-
102
-
103Digital interface design and applicationDigital Interface Design and ApplicationPublicado 2015Tabla de Contenidos: “…7.1.3 Programming Challenge: A 360° Servo -- 7.2 The MSF Time Decoder -- 7.2.1 MSF Receiver Circuit Arrangement -- 7.2.2 Program Design -- 7.2.3 Setting up for an Interrupt -- 7.2.4 Acquiring the Data Bits -- 7.2.5 Decoding the MSF Data -- 7.2.6 Displaying the MSF Time Data -- 7.3 Decoding GPS Signals -- 7.3.1 Acquiring the GPS Message -- 7.3.2 Decoding the GPS Message -- 7.3.3 Selecting the Massage Stream -- 7.4 Conclusion -- References -- Appendix A: uVision IDE Notes -- A.1 Getting Started -- A.2 Help -- A.3 Project Development -- A.4 Debug Facilities -- A.5 Conclusion -- Appendix B: STM Discovery Examples Library -- B.1 Peripheral Examples -- B.2 Example Application -- Appendix C: DAC and ADC Support Software -- C.1 DAC Peripheral Features -- C.2 How to Use the DAC Driver -- C.3 ADC Peripheral Features -- C.4 How to Use the ADC driver -- C.5 Files for Reference -- Appendix D: Example Keyboard Interface -- Index -- EULA…”
Libro electrónico -
104por Maynor, David“…This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. …”
Publicado 2007
Libro electrónico -
105por Semeniuk, JoelTabla de Contenidos: “…Chapter 2: Project Management Features of Visual Studio Team SystemIntroduction to Visual Studio Team System; Feature Summary; How Visual Studio Team System Supports the Project Management Role; Standards and Governance; Managing Team Communication; Managing Time and Money; Managing Quality; Managing Scope; Managing Risk; Summary of the Visual Studio Team System Impact; Summary; Chapter 3: Project Initiation; Initiating a Project; Introduction to the Narratives; Project Initiation and MSF; Before You Create a New Team Project; Team Project Creation Checklist; Selecting a Process Template…”
Publicado 2007
Libro electrónico -
106Publicado 2016“…It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. …”
Libro electrónico -
107por Resnick, SteveTabla de Contenidos: “…The Product BacklogSprint Synchronization; Common Architecture; Comparing MSF and Scrum; The Product Manager; The Program Manager; The Development Manager; Quality Assurance Manager; The Training Manager; Release Management; IT Roles in Scrum; The Project Manager; The Architect; Release Management; The QA Manager; Transitioning to Scrum; Increasing User Involvement; Decreasing Documentation; Simplifying the Schedule; Finding Problems Earlier; Summary; Chapter 3: Tracking What's Important in Team Foundation Server; Understanding Your Data in TFS; Reporting Capabilities in TFS; Choosing Scrum…”
Publicado 2011
Libro electrónico -
108Publicado 2020Tabla de Contenidos: “…. -- 666 -- a brief history of measuring instruments for solar radiation pp 714687 2020 Authors CC BY 40 International DOI 1036253978885518147167 -- 676 -- an opportunity to assess -- 688 -- Julie Droit Areening areas in marinas anchorages and private shipyards Status of implementation of the MSFD measure pp 736704 2020 Authors CC ... -- 698 -- Federico Figueredo Federico Girolametti Silvia Illuminati Cristina Truzzi Anna Annibaldi Sabina Susmel Electrochemical phosphate detection in olig ... -- 705 -- Pianosa island Tuscany and Piscinas Sard -- 713 -- Pierfranco Ventura Manlio Palmarocchi New coastal protection and sea energy production pp 761735 2020 Authors CC BY 40 International DOI 1 ... -- 723.…”
Libro electrónico -
109Publicado 2015Tabla de Contenidos: “….); GARANTIZAR LA INTEGRIDAD DEL INSTRUMENTO: (...); EL MSF EN TANTO QUE UN PLANTEAMIENTO DEL (...); ESTRATEGIAS DE FEEDBACK EN UN PROGRAMA (...); UN EJEMPLO DE MODELO DE FACILITACIÓN DEL (...); IMPLICACIONES PRÁCTICAS PARA IMPLEMENTAR (...); 11. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
110Publicado 2009Tabla de Contenidos: “…Elements of a Complete BI Solution -- Reporting-Deciding Who Will Use the Solution -- ETL-Getting the Solution Implemented -- Data Mining-Don't Leave It Out -- Common Business Challenges and BI Solutions -- Measuring the ROI of BI Solutions -- Summary -- Chapter 3: Building Effective Business Intelligence Processes -- Software Development Life Cycle for BI Projects -- Microsoft Solutions Framework -- Microsoft Solutions Framework for Agile Software Development -- Applying MSF to BI Projects -- Phases and Deliverables in the Microsoft Solutions Framework -- Skills Necessary for BI Projects -- Required Skills -- Optional Skills -- Forming Your Team -- Roles and Responsibilities Needed When Working with MSF -- Summary -- Chapter 4: Physical Architecture in Business Intelligence Solutions -- Planning for Physical Infrastructure Change -- Creating Accurate Baseline Surveys -- Assessing Current Service Level Agreements -- Determining the Optimal Number and Placement of Servers -- Considerations for Physical Servers -- Considerations for Logical Servers and Services -- Understanding Security Requirements -- Security Requirements for BI Solutions -- Backup and Restore -- Backing Up SSAS -- Backing Up SSIS -- Backing Up SSRS -- Auditing and Compliance -- Auditing Features in SQL Server 2008 -- Source Control -- Summary -- Chapter 5: Logical OLAP Design Concepts for Architects -- Designing Basic OLAP Cubes -- Star Schemas -- Denormalization -- Back to the Star -- Other Design Tips -- Modeling Snowflake Dimensions -- More About Dimensional Modeling -- Understanding Fact (Measure) Modeling -- Other Considerations in BI Modeling -- Summary -- Part II: Microsoft SQL Server 2008 Analysis Services for Developers -- Chapter 6: Understanding SSAS in SSMS and SQL Server Profiler -- Core Tools in SQL Server Analysis Services -- Baseline Service Configuration…”
Libro electrónico -
111por Duan, WenhuiTabla de Contenidos: “…1 Introduction -- 2 Methods -- 2.1 Materials and Sample Preparation -- 2.2 Self-sensing Test -- 3 Results and Discussion -- 3.1 Materials Characterization -- 3.2 Effect of Fine Aggregate and CNT Content on Electrical and Piezoresistive Properties -- 3.3 Effect of Test Setup on Electrical and Piezoresistive Properties -- 4 Conclusions -- References -- Effect of Carbonation on the Microstructure and Phase Development of High-Slag Binders -- 1 Introduction -- 2 Methods -- 2.1 Raw Materials -- 2.2 Carbonation Test -- 2.3 Characterization of the Mortars -- 3 Results and Discussion -- 4 Conclusions -- References -- A New Dispersion Strategy to Achieve High Performance Graphene-Based Cement Material -- 1 Introduction -- 2 Methods -- 2.1 Materials -- 2.2 Sample Preparation -- 2.3 Experimental Methods -- 3 Results and Discussion -- 3.1 Characterization of GC Material -- 3.2 Mechanical Properties of GC Material -- 3.3 Dispersion Effect -- 4 Conclusions -- References -- Accelerated Mortar Bar Test to Assess the Effect of Alkali Concentration on the Alkali-Silica Reaction -- 1 Introduction -- 2 Methods -- 3 Results and Discussion -- 4 Conclusions -- References -- Development of High-Strength Light-Weight Cementitious Composites with Hollow Glass Microspheres -- 1 Introduction -- 2 Methods -- 2.1 Raw Materials -- 2.2 Mix Proportions -- 2.3 Experimental Methods -- 3 Results and Discussion -- 3.1 Density, Strength and Structural Efficiency -- 3.2 SEM Analysis -- 4 Conclusions -- References -- Co-effects of Graphene Oxide and Silica Fume on the Rheological Properties of Cement Paste -- 1 Introduction -- 2 Methods -- 2.1 Materials -- 2.2 Preparation of GO-Coated SF and Cement Paste -- 2.3 Testing Methods -- 3 Results and Discussion -- 3.1 Evaluation of the Surface Properties of MSF Particles and the MSF@GO -- 3.2 Rheological Properties -- 4 Conclusions -- References…”
Publicado 2023
Libro electrónico -
112Publicado 2017Tabla de Contenidos: “…. -- Vulnerability scanning with MSF auxiliary modules -- Getting ready -- How to do it... -- How it works... -- Creating scan policies with Nessus -- Getting ready -- How to do it... -- How it works... -- Vulnerability scanning with Nessus -- Getting ready -- How to do it... -- How it works... -- Vulnerability scanning with OpenVAS -- Getting ready -- How to do it... -- How it works... -- Validating vulnerabilities with HTTP interaction -- Getting ready -- How to do it... -- How it works... -- Validating vulnerabilities with ICMP interaction -- Getting ready -- How to do it... -- How it works... -- Chapter 7: Denial of Service -- Introduction -- Fuzz testing to identify buffer overflows -- Getting ready -- How to do it... -- How it works... -- Remote FTP service buffer-overflow DoS -- Getting ready -- How to do it... -- How it works... -- Smurf DoS attack -- Getting ready -- How to do it... -- How it works... -- DNS amplification DoS attacks -- Getting ready -- How to do it... -- How it works... -- SNMP amplification DoS attack -- Getting ready -- How to do it... -- How it works... -- SYN flood DoS attack -- Getting ready -- How to do it... -- How it works... -- Sock stress DoS attack -- Getting ready -- How to do it... -- How it works... -- DoS attacks with Nmap NSE -- Getting ready -- How to do it... -- How it works... -- DoS attacks with Metasploit -- Getting ready -- How to do it... -- How it works... -- DoS attacks with the exploit database -- Getting ready -- How to do it... -- How it works... -- Chapter 8: Working with Burp Suite -- Introduction -- Configuring Burp Suite on Kali Linux -- Getting ready -- How to do it... -- How it works... -- Defining a web application target with Burp Suite -- Getting ready -- How to do it... -- How it works... -- Using Burp Suite Spider -- Getting ready -- How to do it...…”
Libro electrónico -
113Publicado 2024Tabla de Contenidos: “…_Int_yrbDRWGx -- _Int_mvWxOBgk -- _Int_e1ynDwng -- _Int_E5WPbRvd -- _Int_ik07RnQT -- _Int_uixqLP4p -- _Int_MQCIDSbu -- _Int_vW101Fs3 -- _Int_MECdmoIg -- _Int_il1DBMWc -- _Int_im4ch9Qs -- _Int_KjAnUAkS -- _Int_RQnK0GqL -- _Int_MqK5ubgh -- _Int_pcKZkOxh -- _Int_nVxBbOCf -- _Int_OhycVcV5 -- _Int_MdzmHSAR -- _Int_WMRKuNSs -- _Int_CbYOG8Xf -- _Int_rMoP6Y4c -- _Int_ryKbdLPF -- _Int_q4kK1Ige -- _Int_uNRm8pdn -- _Int_qQYLWHFL -- _Int_g6u1uoJ1 -- OLE_LINK6 -- _Int_plBgvcrr -- _Int_EBC0KAuq -- _Int_UwUd5a5S -- _Int_OURbvCOX -- _Int_SGc11RZW -- _Int_0luoJlVa -- _Int_ytaf4YEa -- _Int_DyeYW99t -- _Int_X7oA6gKG -- _Int_91RIYQKN -- _Int_1sbY7MpC -- _Int_SUH43hNk -- _Int_dk4CsUJz -- _Int_zOmEaDJc -- OLE_LINK14 -- OLE_LINK16 -- OLE_LINK17 -- _Int_iOPc4I79 -- _Int_vObvpBwX -- _Int_Sh0PvUCQ -- _Int_FkbdxX9t -- _Int_xqObit9S -- OLE_LINK19 -- _Hlk149855058 -- _Int_W5E01Lay -- _Int_9YpkIXGW -- _Int_k3fsPxvI -- _Int_D56ZjsqT -- _Int_Q5LrUWR3 -- _Int_bkaDCfSC -- _Int_2yOM05By -- _Int_rNsi5wbp -- _Int_KyRSlOuT -- _Int_P00FIjSH -- _Int_CencMsfh -- _Int_3lslfkJe -- _Int_7oSSbBgT -- OLE_LINK22 -- _Int_0M403O60 -- _Int_GmK1TWt6 -- _Int_6DkODWnF -- _Int_1A9bfKrt -- _Int_SkAVqdcG -- OLE_LINK9 -- _Hlk151532699 -- OLE_LINK10 -- OLE_LINK5 -- OLE_LINK11 -- _Hlk151709071 -- OLE_LINK8 -- _Hlk154054230 -- OLE_LINK12 -- OLE_LINK13 -- OLE_LINK15 -- OLE_LINK17 -- __codelineno-0-1 -- OLE_LINK18 -- _Hlk154408967 -- OLE_LINK1 -- OLE_LINK2 -- OLE_LINK3 -- OLE_LINK4 -- OLE_LINK5 -- OLE_LINK7 -- _Hlk162119449 -- OLE_LINK10 -- OLE_LINK12 -- OLE_LINK11 -- OLE_LINK1 -- OLE_LINK4 -- OLE_LINK7 -- _Hlk162119449 -- OLE_LINK10 -- OLE_LINK12 -- OLE_LINK11 -- _Hlk162122907 -- OLE_LINK9 -- OLE_LINK1 -- OLE_LINK18 -- OLE_LINK19 -- OLE_LINK21 -- OLE_LINK22 -- OLE_LINK23 -- OLE_LINK24 -- OLE_LINK20 -- OLE_LINK29 -- _Hlk167132856 -- OLE_LINK25 -- _Hlk167133000 -- _Hlk167133017 -- OLE_LINK26 -- OLE_LINK27…”
Libro electrónico -
114Publicado 1985Tabla de Contenidos: “…-- Electrophoretic characterization of lymphocyte separated on Percoll density gradients / Enrichment of chicken peripheral blood B lymphocytes by preparative free flow electrophoresis / A method of analysing a polymodal histogram of electrophoretic mobility / Malignant transformation - cell characterization in leukemia -- Differences in the electrophoretic mobilities of pigmented and non-pigmented melanoma cells / Electrophoresis of mouse leukocytes and leukemia cells / Application of the cell electrophoresis for characterisation of leukemic cells / Electrophoretic mobility distribution of cells in leukemia / Electrophoretic mobility distributions and membrane phenotypes of some hemopoietic cell lines and fresh leukemic cells / Electrophoresis of leukemic white blood cells with Lazypher / Cell electrophoretic and size distribution investigations of thrombocytes of patients with acute leukemia and hemorrhagic diathesis / Influence of exogenic factors: radiation, stress, antibodies, drugs, mitogens -- Cell electrophoretic mobility as an aid to study biological systems / The biochemical and morphologic blood analysis and electrophoretic behaviour of rat erythrocytes after gamma irradiation / Electrophoretic mobility of erythrocytes from gamma - or alpha-irradiated rats protected by adeturone / The use of the electrophoretic microscope PARMOQUANT 2 for the investigation of erythrocytes in dynamics in the therapy of patients with psoriasis / Effect of ultraviolet irradiation on electrophoretic behaviour of red blood cells / Stress induced alterations in electrophoretic and morphological properties of thymus cells / Erythrocyte electrophoretic mobility and its membrane state in conditions of adrenalin stress / Some aspects of cell electrophoresis application in immunological investigations / Application of antibodies to cell electrophoresis / In vitro differential effects of chlorpromazine on the surface charge of murine T cell subsets / Purification of intestinal intraepithelial lymphocytes by preparative electrophoresis / Microelectrophoresis of epithelial cells and lymphocytes / Monitoring of ATG production using cell electrophoresis / Cell electrophoretic detection of pregnancy factors / Isolation of cationic proteins from bovine allantoic fluid - A preliminary study of their biological properties / Preliminary investigation of the effect of chinese herbs on lymphocyte stimulation by cell electrophoresis / The variation in the electrophoretic mobility of erythrocytes after massive blood replacement by "Perftoran" / The application of cell electrophoresis to the production of erythrocyte diagnostic preparations / Electrophoretic mobility, ecto-ATPase activity and mitotic rate of thymocytes after treatment of mice with immunosuppressive drugs / On the sensitivity of several indicators of cytotoxic drug effects of thymocytes in vitro / Discrimination between functional and non-functional ConA-receptors by means of cell electrophoresis / Mechanism of cell charge alteration of T lymphocytes after ConA stimulation / The effect of peanut agglutinin on the electrophoretic mobility of lymphocyte populations / Phytohaemagglutinin-induced changes of electrophoretic mobility and functional activity of PEA chloroplasts / Cell electrophoretic detection of the influence of transfer factor on trypsinated T lymphocytes / Detection of multiple sclerosis -- Family studies in multiple sclerosis: Frequency amongst relatives of a proband / Multiple sclerosis: Diagnosis by He-Ne laser irradiation of erythrocytes / Laser Cytopherometry in multiple sclerosis / Detection of lymphokines: methodical aspects, cancer, renal transplantation, drugs -- The macrophage electrophoretic mobility test : Clinical applications: A guide / Enrichment and characterization of the macrophage slowing factor released by mononuclear blood cells upon contact with CEA or teratoma - derived proteins / Characterization of the phytohaemagglutinin-induced macrophage slowing factor (PHA-MSF) / Failure of the MEM test for cancer diagnosis / Long-time study in melanoma patients with TAA-melanoma and PPD 8 years after primary operation by MEM-test / Investigation of obliterative vascular diseases with the PARMOQUANT 2 / The transfer of cellular immunity in the in vitro MEM test by immune RNA isolated from guinea-pigs immunized with basic protein of human glioma / Alteration of electrophoretic mobility of guinea pig peritoneal macrophages by carrageenan / The tanned erythrocyte electrophoretic mobility (TEEM) test…”
Libro electrónico -
115por Orzach, YoramTabla de Contenidos: “…Encryption basics and protocols -- Services provided by encryption -- Stream versus block ciphers -- Symmetric versus asymmetric encryption -- Public key infrastructure and certificate authorities -- Authentication basics and protocols -- Authentication types -- Username/password with IP address identification authentication -- Encrypted username/password authentication -- Extensible authentication protocol (EAP) -- Authorization and access protocols -- Hash functions and message digests -- IPSec and key management protocols -- VPNs -- IPSec principles of operation -- IPSec tunnel establishment -- IPSec modes of operation -- IPSec authentication and encryption protocols -- IPSec AH protocol -- IPSec ESP protocol -- SSL/TLS and proxies -- Protocol basics -- The handshake protocol -- Network security components - RADIUS/TACACS+, FWs, IDS/IPSs, NAC, and WAFs -- Firewalls -- RADIUS, NAC, and other authentication features -- Web application firewalls (WAFs) -- Summary -- Questions -- Chapter 4: Using Network Security Tools, Scripts, and Code -- Commercial, open source, and Linux-based tools -- Open source tools -- Commercial tools -- Information gathering and packet analysis tools -- Basic network scanners -- Network analysis and management tools -- Protocol discovery tools -- Vulnerability analysis tools -- Nikto -- Legion -- Exploitation tools -- The Metasploit Framework (MSF) -- Stress testing tools -- Windows tools -- Kali Linux tools -- Network forensics tools -- Wireshark and packet capture tools -- Summary -- Questions -- Chapter 5: Finding Protocol Vulnerabilities -- Black box, white box, and gray box testing -- Black box and fuzzing -- Enterprise networks testing -- Provider networks testing -- Fuzzing phases -- Common vulnerabilities -- Layer 2-based vulnerabilities -- Layer 3-based vulnerabilities -- Layer 4-based vulnerabilities…”
Publicado 2022
Libro electrónico -
116Publicado 2019“…In the relevant sections, you'll learn about subjects such as Kali Linux, Wireshark, Maltego, net discover, MSFC, Trojan, Backdoor, Veil, Metasploitable, SQLi, MITMf, Crunch, Meterpreter, Beef, Apache, Nmap, SQLMap, Python, Socket, Scapy, Pynput, Keylogger, and more. …”
-
117por Amberg, EricTabla de Contenidos: “…-- 7.4.2 Erste Schritte mit Metasploit (MSF) -- 7.4.3 Nmap in Metasploit nutzen -- 7.5 Weitere Tools und Verfahren -- 7.5.1 Paketerstellung und Scanning mit hping3 -- 7.5.2 Weitere Packet-Crafting-Tools -- 7.5.3 Banner Grabbing mit Telnet und Netcat -- 7.5.4 Scannen von IPv6-Netzwerken -- 7.6 Gegenmaßnahmen gegen Portscanning und Banner Grabbing…”
Publicado 2024
Libro electrónico -
118por Gill, Tyson“…Coverage includes: Understanding the planning process-and why it so often fails Getting the planning process "just right" and identifying the best lifecycle approach Optimizing the communication that is critical to successful planning 13 powerful strategies for more effective requirements development Planning in the context of leading software process models: CMM, MSF, UML, and RUP Recognizing and making effective use of planning metadata Planning Smarter is an invaluable resource for every member of the software development project team. …”
Publicado 2002
Libro electrónico