Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,667
- Bible 1,923
- Bíblia 1,428
- Historia 1,218
- RELIGION 1,042
- Development 808
- Application software 802
- Engineering & Applied Sciences 770
- Management 648
- Crítica e interpretación 560
- Computer Science 516
- Història 511
- History 455
- Computer networks 447
- Mss 430
- Data processing 412
- Cloud computing 375
- Criticism, interpretation, etc 374
- Computer programs 371
- Operating systems (Computers) 348
- Programming 343
- Comentarios 304
- Security measures 276
- Artificial intelligence 272
- Business & Economics 271
- Crítica, interpretación, etc 266
- Database management 262
- Testigos de Jehová 262
- iOS (Electronic resource) 261
- Crítica, interpretació, etc 249
-
5501Publicado 2021Tabla de Contenidos: “…Nmap Advanced Enumeration -- Enumerating Users -- POP3 (Port 110) and IMAP4 (Port 143) -- Brute-Forcing POP3 E-mail Accounts -- Database Protocols -- Microsoft SQL Server (Port 1433) -- Oracle Database Server (Port 1521) -- MySQL (Port 3306) -- CI/CD Protocols -- Docker (Port 2375) -- Jenkins (Port 8080/50000) -- Brute-Forcing a Web Portal Using Hydra -- Step 1: Enable a Proxy -- Step 2: Intercept the Form Request -- Step 3: Extracting Form Data and Brute-Forcing with Hydra -- Web Protocols 80/443 -- Graphical Remoting Protocols -- RDP (Port 3389) -- RDP Brute-Force -- VNC (Port 5900) -- File Sharing Protocols -- SMB (Port 445) -- Brute-Forcing SMB -- SNMP (Port UDP 161) -- SNMP Enumeration -- Summary -- Chapter 7 Exploitation Phase -- Vulnerabilities Assessment -- Vulnerability Assessment Workflow -- Vulnerability Scanning with OpenVAS -- Installing OpenVAS -- Scanning with OpenVAS -- Exploits Research -- SearchSploit -- Services Exploitation -- Exploiting FTP Service -- FTP Login -- Remote Code Execution -- Spawning a Shell -- Exploiting SSH Service -- SSH Login -- Telnet Service Exploitation -- Telnet Login -- Sniffing for Cleartext Information -- E-mail Server Exploitation -- Docker Exploitation -- Testing the Docker Connection -- Creating a New Remote Kali Container -- Getting a Shell into the Kali Container -- Docker Host Exploitation -- Exploiting Jenkins -- Reverse Shells -- Using Shells with Metasploit -- Exploiting the SMB Protocol -- Connecting to SMB Shares -- SMB Eternal Blue Exploit -- Summary -- Chapter 8 Web Application Vulnerabilities -- Web Application Vulnerabilities -- Mutillidae Installation -- Apache Web Server Installation -- Firewall Setup -- Installing PHP -- Database Installation and Setup -- Mutillidae Installation -- Cross-Site Scripting -- Reflected XSS -- Stored XSS -- Exploiting XSS Using the Header…”
Libro electrónico -
5502
-
5503Publicado 2022Tabla de Contenidos: “…Chapter 1: Azure Arc as an Extension of the Azure Control Plane -- Chapter 2: Azure Resource Manager Insights -- Chapter 3: Azure Management Insights -- Chapter 4: Azure Arc Servers: Getting Started -- Chapter 5: Azure Arc Servers: Using at Scale -- Chapter 6: Hybrid Server Monitoring Solution -- Chapter 7: Regulatory and Security Compliance for Azure Arc Servers -- Chapter 8: GitOps Insights -- Chapter 9: Azure Arc Enabled Kubernetes: Getting Started…”
Libro electrónico -
5504Publicado 2021Tabla de Contenidos: “…3.4 Machine Learning Algorithms -- 3.4.1 Linear Regression -- 3.4.2 Logistic Regression -- 3.4.3 K-NN or K Nearest Neighbor -- 3.4.4 Decision Tree -- 3.4.5 Random Forest -- 3.5 Analysis and Prediction of COVID-19 Data -- 3.5.1 Methodology Adopted -- 3.6 Analysis Using Machine Learning Models -- 3.6.1 Splitting of Data into Training and Testing Data Set -- 3.6.2 Training of Machine Learning Models -- 3.6.3 Calculating the Score -- 3.7 Conclusion & -- Future Scope -- References -- 4 Rapid Forecasting of Pandemic Outbreak Using Machine Learning -- 4.1 Introduction -- 4.2 Effect of COVID-19 on Different Sections of Society -- 4.2.1 Effect of COVID-19 on Mental Health of Elder People -- 4.2.2 Effect of COVID-19 on our Environment -- 4.2.3 Effect of COVID-19 on International Allies and Healthcare -- 4.2.4 Therapeutic Approaches Adopted by Different Countries to Combat COVID-19 -- 4.2.5 Effect of COVID-19 on Labor Migrants -- 4.2.6 Impact of COVID-19 on our Economy -- 4.3 Definition and Types of Machine Learning -- 4.3.1 Machine Learning & -- Its Types -- 4.3.2 Applications of Machine Learning -- 4.4 Machine Learning Approaches for COVID-19 -- 4.4.1 Enabling Organizations to Regulate and Scale -- 4.4.2 Understanding About COVID-19 Infections -- 4.4.3 Gearing Up Study and Finding Treatments -- 4.4.4 Predicting Treatment and Healing Outcomes -- 4.4.5 Testing Patients and Diagnosing COVID-19 -- References -- 5 Rapid Forecasting of Pandemic Outbreak Using Machine Learning: The Case of COVID-19 -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Suggested Methodology -- 5.4 Models in Epidemiology -- 5.4.1 Bayesian Inference Models -- 5.5 Particle Filtering Algorithm -- 5.6 MCM Model Implementation -- 5.6.1 Reproduction Number -- 5.7 Diagnosis of COVID-19 -- 5.7.1 Predicting Outbreaks Through Social Media Analysis -- 5.8 Conclusion -- References…”
Libro electrónico -
5505Publicado 2016Tabla de Contenidos: “…Iziko: Insurrection and resurrection -- Introduction -- Theological rationale to the Bible study -- Bible study -- On Iziko: A black African concept for insurrection andresurrection -- Un-concluding thoughts -- References -- 7. …”
Libro electrónico -
5506
-
5507por Diaz-Bonilla, Eugenio“…The key contribution of this report lies in developing a typology to structure the components of the enabling environment for agricultural growth and competitiveness, and in constructing an illustrative Agricultural Growth Enabling Index (AGEI) to summarise a wide array of available information in a coherent manner. …”
Publicado 2014
Capítulo de libro electrónico -
5508por Fisher, Kenn“…This article examines the emergence of technology-enabled active learning environments and the reasons for their appearance. …”
Publicado 2010
Capítulo de libro electrónico -
5509Publicado 2017“…Windows ten anniversary update bible…”
Libro electrónico -
5510
-
5511Publicado 2018“…Understanding the motivators behind the current state of BIM-enabled projects facilitates the design of incentive structures for future BIM projects. …”
Libro electrónico -
5512
-
5513Publicado 2015“…Once you have completed this computer based training course, you will be fully capable of navigating the Yosemite operating system, and be able to take full advantage of the powerful features included in Apple's latest OS X release…”
-
5514
-
5515
-
5516
-
5517
-
5518Publicado 2024“…AI-Enabled Programming, Networking, and Cybersecurity is for programmers, developers, networking, or security professionals looking to use AI tools. …”
Vídeo online -
5519
-
5520