Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,954
- Publicaciones periódicas 1,946
- Educación 1,465
- Teología 1,214
- Education 1,119
- Psicología 1,091
- Periodicals 1,069
- Derecho 1,066
- Economía 1,005
- Filosofía 1,003
- Revistes 893
- Ciencias sociales 878
- Social sciences 762
- Medicina 688
- Humanidades 655
- Información general 575
- Psychology 572
- Agricultura 552
- Literatura 536
- Science 533
- Agriculture 494
- Psicología industrial 475
- Technology 473
- Tecnología 470
- Arquitectura 459
- Ciencia 459
- Psychology, Industrial 451
- Work 444
- Història 439
- Articulos Publicaciones periodicas 431
-
65861por Xifra, JordiTabla de Contenidos: “…Documents de l'organització; 2.1. El fullet; 2.2. La revista d'empresa; 2.3. La memòria anual; 2.4. El llibre corporatiu…”
Publicado 2007
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
65862por Glondys, OlgaTabla de Contenidos:
Publicado 2012Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
65863por Hidalgo, ManuelTabla de Contenidos: “…CIBERTELEVISIÓN A LA CARTA -- 4. WEBS Y REVISTAS -- 5. RIESGOS DE «INFOXICACIÓN» -- 9. TELERREALIDAD, NUEVOS FORMATOS Y TRATAMIENTOS -- 1. …”
Publicado 2006
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
65864Publicado 2017Tabla de Contenidos: “…3 Handling Evidence 4 Cryptographic Hashes 5 Chain of Custody 8 Incident Response 8 The Need for Network Forensic Practitioners 10 Summary 11 References 12 2 Networking Basics 13 Protocols 14 Open Systems Interconnection (OSI) Model 16 TCP/IP Protocol Suite 18 Protocol Data Units 19 Request for Comments 20 Internet Registries 23 Internet Protocol and Addressing 25 Internet Protocol Addresses 28 Internet Control Message Protocol (ICMP) 31 Internet Protocol Version 6 (IPv6) 31 Transmission Control Protocol (TCP) 33 Connection-Oriented Transport 36 User Datagram Protocol (UDP) 38 Connectionless Transport 39 Ports 40 Domain Name System 42 Support Protocols (DHCP) 46 Support Protocols (ARP) 48 Summary 49 References 51 3 Host-Side Artifacts 53 Services 54 Connections 60 Tools 62 netstat 63 nbstat 66 ifconfi g/ipconfi g 68 Sysinternals 69 ntop 73 Task Manager/Resource Monitor 75 ARP 77 /proc Filesystem 78 Summary 79 4 Packet Capture and Analysis 81 Capturing Packets 82 Tcpdump/Tshark 84 Wireshark 89 Taps 91 Port Spanning 93 ARP Spoofi ng 94 Passive Scanning 96 Packet Analysis with Wireshark 98 Packet Decoding 98 Filtering 101 Statistics 102 Following Streams 105 Gathering Files 106 Network Miner 108 Summary 110 5 Attack Types 113 Denial of Service Attacks 114 SYN Floods 115 Malformed Packets 118 UDP Floods 122 Amplifi cation Attacks 124 Distributed Attacks 126 Backscatter 128 Vulnerability Exploits 130 Insider Threats 132 Evasion 134 Application Attacks 136 Summary 140 6 Location Awareness 143 Time Zones 144 Using whois 147 Traceroute 150 Geolocation 153 Location-Based Services 156 WiFi Positioning 157 Summary 158 7 Preparing for Attacks 159 NetFlow 160 Logging 165 Syslog 166 Windows Event Logs 171 Firewall Logs 173 Router and Switch Logs 177 Log Servers and Monitors 178 Antivirus 180 Incident Response Preparation 181 Google Rapid Response 182 Commercial Offerings 182 Security Information and Event Management 183 Summary 185 8 Intrusion Detection Systems 187 Detection Styles 188 Signature-Based 188 Heuristic 189 Host-Based versus Network-Based 190 Snort 191 Suricata and Sagan 201 Bro 203 Tripwire 205 OSSEC 206 Architecture 206 Alerting 207 Summary 208 9 Using Firewall and Application Logs 211 Syslog 212 Centralized Logging 216 Reading Log Messages 220 LogWatch 222 Event Viewer 224 Querying Event Logs 227 Clearing Event Logs 231 Firewall Logs 233 Proxy Logs 236 Web Application Firewall Logs 238 Common Log Format 240 Summary 243 10 Correlating Attacks 245 Time Synchronization 246 Time Zones 246 Network Time Protocol 247 Packet Capture Times 249 Log Aggregation and Management 251 Windows Event Forwarding 251 Syslog 252 Log Management Offerings 254 Timelines 257 Plaso 258 PacketTotal 259 Wireshark 261 Security Information and Event Management 262 Summary 263 11 Network Scanning 265 Port Scanning 266 Operating System Analysis 271 Scripts 273 Banner Grabbing 275 Ping Sweeps 278 Vulnerability Scanning 280 Port Knocking 285 Tunneling 286 Passive Data Gathering 287 Summary 289 12 Final Considerations 291 Encryption 292 Keys 293 Symmetric 294 Asymmetric 295 Hybrid 296 SSL/TLS 297 Cloud Computing 306 Infrastructure as a Service 306 Storage as a Service 309 Software as a Service 310 Other Factors 311 The Onion Router (TOR) 314 Summary 317 Index 319.…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
65865por Tabakman, RoxanaTabla de Contenidos: “…Referencias1.3.1.Qué es noticia en salud; Recuadro: El médico de la TV; 2.1.1 Expertos; 2.2.1 Revistas científicas y de divulgación; 2.2.2. Comunicados de prensa; 2.2.3 Congresos, simposios y conferencias; 2.2.4. …”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
65866Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Introduction -- Audience -- Organization -- Chapter 1 Starting the Project -- 1.1 Project Proposal -- Tailoring Tips -- Alignment -- Description -- 1.2 Business Case -- Tailoring Tips -- Alignment -- Description -- 1.3 Project Startup Canvas -- Tailoring Tips -- Alignment -- Description -- 1.4 Project Vision Statement -- Tailoring Tips -- Alignment -- Description -- 1.5 Project Charter -- Tailoring Tips -- Alignment -- Description -- 1.6 Project Brief -- Tailoring Tips -- Alignment -- Description -- 1.7 Project Roadmap -- Tailoring Tips -- Alignment -- Description -- Chapter 2 Project Plans -- 2.1 Scope Management Plan -- Tailoring Tips -- Alignment -- Description -- 2.2 Requirements Management Plan -- Tailoring Tips -- Alignment -- Description -- 2.3 Schedule Management Plan -- Tailoring Tips -- Alignment -- Description -- 2.4 Release Plan -- Tailoring Tips -- Alignment -- Description -- 2.5 Cost Management Plan -- Tailoring Tips -- Alignment -- Description -- 2.6 Quality Management Plan -- Tailoring Tips -- Alignment -- Description -- 2.7 Resource Management Plan -- Tailoring Tips -- Alignment -- Description -- 2.8 Communication Plan -- Tailoring Tips -- Alignment -- Description -- 2.9 Risk Management Plan -- Tailoring Tips -- Alignment -- Description -- 2.10 Procurement Management Plan -- Tailoring Tips -- Alignment -- Description -- 2.11 Stakeholder Engagement Plan -- Tailoring Tips -- Alignment -- Description -- 2.12 Change Management Plan -- Tailoring Tips -- Alignment -- Description -- 2.13 Project Management Plan -- Tailoring Tips -- Alignment -- Description -- Chapter 3 Project Documents -- 3.1 Change Request -- Tailoring Tips -- Alignment -- Description -- 3.2 Requirements Documentation -- Tailoring Tips -- Alignment -- Description…”
Libro electrónico -
65867Publicado 2015Tabla de Contenidos: “…: UNCITRAL Rules provide the solution / Abdel Hamid El Ahdab -- Arbitration of disputes relating to administrative contracts : the requirement of approval by the competent minister / Borhan Amrallah -- The concept of the arbitration agreement / Hamzah Haddad -- The scope of the judge's discretion in examining the request for annulment of an arbitration award / Fathi Waly -- The multiplicity of sources of the rules applicable to an international arbitration agreement : is there still hope for unification of the rules? …”
Libro electrónico -
65868por Jorreto Paniagua, Manuel autTabla de Contenidos: “…. -- cuaderno 37: Clases palacianas / José María Nogués -- cuaderno 38: Viajes, jornadas y etiquetas a bordo / por Bernardino Martín Rodriguez -- cuaderno 39: Revistas e inaguraciones / Antonio Blázquez -- cuaderno 40: Juramentos y Consejos de ministros / Antonio Sanchez Pérez -- cuaderno 41: Archivo de la Real Casa y Biblioteca particular de S.M. / por José María Nogués -- cuaderno 42: Régimen interno de Palacio / José María Nogués -- cuaderno 43: Juramento de fueros y constituciones por los reyes / por Cesar Antonio de Arruche -- cuaderno 44: Patronato y patrimonio reales / Emili Francos -- cuaderno 45: Educación referente a los reyes y príncipes / José María Nogués…”
Publicado 1895
Libro -
65869Publicado 2018Tabla de Contenidos: “…Thread safety -- Threads are expensive -- Coroutines -- Starting coroutines -- Jobs -- Coroutine starvation -- Coroutines under the hood -- Fixing starvation -- Waiting for a coroutine -- Canceling a coroutine -- Returning results -- Setting timeouts -- Parent jobs -- Channels -- Producers -- Actors -- Summary -- Chapter 9: Designed for Concurrency -- Active Object -- Testing -- Deferred value -- Barrier -- CountDownLatch -- Data class as Barrier -- Scheduler -- Understanding contexts -- Pipelines -- Establishing a pipeline -- The fan-out design pattern -- The fan-in design pattern -- Managing workers -- Buffered channels -- Unbiased select -- Mutexes -- Selecting on close -- Sidekick channel -- Deferred channel -- Summary -- Chapter 10: Idioms and Anti-Patterns -- Let -- Apply -- Also -- Run -- With -- Instance checks -- Try-with-resources -- Inline functions -- Reified -- Constants -- Constructor overload -- Dealing with nulls -- Explicit async -- Validation -- Sealed, not enumerated -- More companions -- Scala functions -- Summary -- Chapter 11: Reactive Microservices with Kotlin -- Getting started with Vert.x -- Routing -- Handling requests -- Verticles -- Subrouting -- Testing -- Helper methods -- Working with databases -- Managing configuration -- Managing the database -- EventBus -- Consumer -- Producer -- More testing -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
65870por Rumsey, FrancisTabla de Contenidos: “…4.3 MIDI and digital audio contrasted4.4 Basic MIDI principles; 4.4.1 System specifications; 4.4.2 Simple interconnection; 4.4.3 MIDI channels; 4.4.4 Message format; 4.5 MIDI messages in detail; 4.5.1 Channel and system messages contrasted; 4.5.2 Note on and note off messages; 4.5.3 Velocity information; 4.5.4 Running status; 4.5.5 Polyphonic key pressure (aftertouch); 4.5.6 Control change; 4.5.7 Channel modes; 4.5.8 Program change; 4.5.9 Channel aftertouch; 4.5.10 Pitch bend wheel; 4.5.11 System exclusive; 4.5.12 Universal system exclusive messages; 4.5.13 Tune request; 4.5.14 Active sensing…”
Publicado 2004
Libro electrónico -
65871Publicado 2013Tabla de Contenidos: “…Required Multi-Master Configuration Settings -- Optional Multi-Master Configuration Settings -- Other Configuration Variables to Consider -- Example Configuration -- Replication Setup -- Multi-Master Replication Verification -- Manual Failover Process -- Real World Usage Complications -- Additional Slave Servers -- Read and Write Load Balancing -- Circular Replication -- Other Replication Topologies -- Automating High Availability Failovers -- Conclusion -- Chapter 5: MySQL Replication Tools -- Various MySQL Toolkits -- Openark Kit -- Percona Toolkit -- MySQL Workbench Utilities -- Replication Failover Managers -- MySQL MHA -- MMM -- Flipper -- Cluster Control -- Cluster Management -- Percona Replication Manager (PRM) -- Replication Prefetch -- MySQL Patches and Variants -- Independent Community Users -- Commercial Organizations -- Conclusion -- Chapter 6: Extending Replication for Practical Needs -- Highly Requested Replication Features -- MySQL Cluster -- Galera Cluster for MySQL -- Current Limitations -- References -- Installation -- Percona XtraDB Cluster -- MariaDB Galera Cluster -- Galera Wrap-Up -- Tungsten Replicator -- Features -- References -- Prerequisites -- Installation with Tungsten Sandbox -- Manual Tungsten Installation -- Alternative Tungsten Deployments -- Unique Characteristics -- Continuent Tungsten -- Continuent Wrap-Up -- SchoonerSQL -- MySQL Replication Listener -- MySQL in the Cloud -- Amazon RDS for MySQL -- Google Cloud SQL -- Other Offerings -- Conclusion -- Chapter 7: MySQL Configuration Options -- About MySQL System Variables -- Binary Logging -- MySQL Replication -- Semisynchronous Replication -- Security -- MySQL Server Variables -- InnoDB Variables -- MySQL 5.6 Features -- Universally Unique Identifier (UUID) -- Crash-Safe Slaves -- Replication Checksums -- Multi-Threaded Slaves -- Global Transaction Identifier (GTID)…”
Libro electrónico -
65872Publicado 2023Tabla de Contenidos: “…Action area 3: Enhance international institutions to maximise the mobilisation potential of public climate finance -- Recommendation 8: Request clearly-defined institutional private finance mobilisation targets from MDBs, while safeguarding development objectives and avoiding unintended consequences -- Recommendation 9: Encourage MDBs to further use or develop risk transfer mechanisms and provide local currency financing -- Recommendation 10: Further improve data disclosure and transparency on accounting methodologies relating to public climate finance and the private finance it mobilises -- References -- Note -- Annex A. …”
Libro electrónico -
65873por Freeman, AdamTabla de Contenidos: “…Permissions; 7.1.2. Requesting Permissions; 7.1.3. Permission Types; 7.1.3.2. …”
Publicado 2003
Libro electrónico -
65874por Karp, David A.Tabla de Contenidos: “…Windows XP Annoyances for Geeks, 2nd Edition; How This Book Came to Be; Organization of This Book; Getting the Most Out of This Book; Software Depository; Using Code Examples; Conventions Used in This Book; Request for Comments; Acknowledgments; 1. Getting Started with Windows XP; 1.2. …”
Publicado 2005
Libro electrónico -
65875por Vossen, GottfriedTabla de Contenidos: “…1.4 Merging the streams: the arrival of ""Web 2.0""Chapter 2 A Review of the Technological Stream; 2.1 Developments in Web technology; 2.1.1 HTML; 2.1.2 XML; 2.1.3 CSS; 2.1.4 Scripting technologies; 2.2 Web applications of XML; 2.2.1 Web services; 2.2.2 Web feed formats; 2.3 P2P; 2.3.1 P2P file-sharing networks; 2.3.2 Other P2P applications; 2.4 Summary; Chapter 3 Enabling Techniques and Technologies; 3.1 Rich Internet Applications; 3.1.1 Sample RIAs: e-mail applications; 3.1.2 XMLHttpRequest, the link needed for Ajax; 3.1.3 More RIAs: Office and map applications…”
Publicado 2007
Libro electrónico -
65876por Flanagan, DavidTabla de Contenidos: “…Java Examples in a Nutshell, 3rd Edition; Java Examples Online; Related Books from O&Reilly; Conventions Used in This Book; Request for Comments; Acknowledgments; I. Learning Java; 1.2. …”
Publicado 2004
Libro electrónico -
65877Publicado 2010Tabla de Contenidos: “…Tcl Example Used to Check the CPU Utilization -- Summary -- References -- Chapter 5 Advanced Tcl Operation in Cisco IOS -- Introduction to the Syslog Protocol -- Configuring Syslog Server Parameters in Cisco IOS -- Syslog Tcl Script Example -- Syslog Tcl Script Sample Output -- Sending Syslog Messages to a File -- Syslog Server Script Procedures -- Syslog Server Script Body -- Putting the Syslog Script into Operation -- Introduction to Embedded Syslog Manager -- Filtering Syslog Messages -- ESM Global Variables -- Rebuilding a Syslog Message from Its Components -- Displaying/Adding ESM Tcl Script Filters -- Introduction to Embedded Menu Manager -- Using Tcl as a Web Server -- Obtaining a Free Web Server Application -- Reverse Engineering the Web Server -- Creating Your Own Simple Web Page -- Creating a Web Page Using IOS show Commands -- Adding User Input to the Web Page -- Introduction to IP SLA -- Adding the IP SLA Measurement to the Web Page -- Tcl Script Refresh Policy -- SNMP Proxy Event Detector -- Remote-Procedure Call Requests -- Multiple-Event Support for Event Correlation -- Using the clear Command -- Summary -- References -- Chapter 6 Tcl Script Examples -- Creating an Application from Start to Finish -- Determine What You Want to Accomplish -- Creating a Flowchart -- Deciding What the User Interface Should Look Like -- Write the Code in Pseudo-Code -- Before You Begin -- Starting to Program the Application -- Troubleshooting as You Go -- Using Tcl to Troubleshoot Network Problems -- Monitoring the Console for Events -- Creating a Web Application for Remote SNMP Graphing -- Summary -- References -- Chapter 7 Security in Tcl Scripts -- Introduction to PKI Infrastructure -- PKI Prerequisite -- Confidentiality with PKI -- Digital Signatures with PKI -- Using Digital Signatures to Sign a Tcl Script…”
Libro electrónico -
65878por Das, Sajal K.Tabla de Contenidos: “…3.5.2 Convolution Codes3.5.3 Turbo Codes; 3.6 Automatic Repeat Request (ARQ) and Incremental Redundancy; 3.7 Interleaving; 3.8 Modulation; 3.8.1 Analog Modulation; 3.8.2 Digital Modulation; 3.9 Bit Rate, Baud Rate, and Symbol Rate; 3.10 Inband Signaling; Further Reading; 4 Mobile RF Transmitter and Receiver Design Solutions; 4.1 Introduction to RF Transceiver; 4.2 Mixer Implementations; 4.2.1 Design Parameters; 4.3 Receiver Front-End Architecture; 4.3.1 Different Types of RF Down Conversion Techniques; 4.3.2 Homodyne Receiver; 4.3.3 Low-IF Receiver; 4.3.4 Wideband-IF Receiver…”
Publicado 2009
Libro electrónico -
65879Containers in OpenStack leverage OpenStack services to make the most of Docker, Kubernetes and MesosPublicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Working with Containers -- The historical context of virtualization -- Introduction to containers -- Container components -- Types of containers -- Machine containers -- Application containers -- Types of container runtime tools -- Docker -- Rocket -- LXD -- OpenVZ -- Windows Server containers -- Hyper-V containers -- Clear container -- Installation of Docker -- Docker hands-on -- Working with Docker images -- Listing images -- Getting new images -- Searching Docker images -- Deleting images -- Working with Docker containers -- Creating containers -- Listing containers -- Checking container's logs -- Starting containers -- Deleting containers -- Summary -- Chapter 2: Working with Container Orchestration Engines -- Introduction to COE -- Docker Swarm -- Docker Swarm components -- Node -- Manager node -- Worker node -- Tasks -- Services -- Discovery service -- Scheduler -- Swarm mode -- Apache Mesos -- Apache Mesos and its components -- Master -- Slaves -- Frameworks -- Offer -- Tasks -- Zookeeper -- Kubernetes -- Kubernetes architecture -- External request -- Master node -- kube-apiserver -- etcd -- kube-controller-manager -- kube-scheduler -- Worker nodes -- kubelet -- kube-proxy -- Container runtime -- supervisord -- fluentd -- Concepts in Kubernetes -- Pod -- Replica sets and replication controllers -- Deployments -- Secrets -- Labels and selectors -- Services -- Volumes -- Kubernetes installation -- Kubernetes hands-on -- Summary -- Chapter 3: OpenStack Architecture -- Introduction to OpenStack -- OpenStack architecture -- Introduction to KeyStone, the OpenStack identity service -- Introduction to Nova, the OpenStack compute service…”
Libro electrónico -
65880Publicado 2011Tabla de Contenidos: “…Locales in XPages -- Deprecated Locale Codes -- Conclusion -- Part VI: Performance, Scalability, and Security -- Chapter 16 Application Performance and Scalability -- Golden Rules -- Understanding the Request Processing Lifecycle -- Reducing CPU Utilization -- Reducing Memory Utilization -- Conclusion -- Chapter 17 Security -- Notes/Domino Security and XPages -- Let's Get Started -- Programmability Restrictions -- Restricted Operation -- XPages Security Checking -- XPages Security in the Notes Client -- Active Content Filtering -- Public Access -- SessionAsSigner -- Troubleshooting XPages Java Security Exceptions -- Conclusion -- Part VII: Appendixes -- Appendix A: XSP Programming Reference -- XSP Tag Reference -- XSP Java Classes -- Notes/Domino Java API Classes -- XSP JavaScript Pseudo Classes -- Appendix B: XSP Style Class Reference -- XSP CSS Files -- XSP Style Classes -- Appendix C: Useful XPages Sites on the Net -- Index…”
Libro electrónico