Mostrando 841 - 860 Resultados de 978 Para Buscar 'Running Back to You', tiempo de consulta: 0.12s Limitar resultados
  1. 841
    Publicado 2009
    Libro electrónico
  2. 842
    por Young, Rick, 1967-
    Publicado 2010
    Libro electrónico
  3. 843
    por Himschoot, Peter. author
    Publicado 2020
    “…You will: Build user interfaces and display data for users to edit Capture the user’s changes via data binding Transfer data back and forth between server and client Communicate with microservices and database services Develop reusable components and assemble them into bigger components Use routing to build single-page applications (SPAs) Build Blazor libraries that are reusable across applications…”
    Libro electrónico
  4. 844
    por Rash, Michael
    Publicado 2007
    Libro electrónico
  5. 845
    Publicado 2017
    Libro electrónico
  6. 846
    Publicado 2024
    Libro electrónico
  7. 847
    por Brindley, Keith
    Publicado 2011
    Libro electrónico
  8. 848
    Publicado 2018
    Libro electrónico
  9. 849
  10. 850
    Publicado 2018
    Tabla de Contenidos: “…A real-world pen test scenario - the chatty printer -- Configuring our SMB listener -- Authentication capture -- Hash capture with LLMNR/NetBIOS NS spoofing -- Let it rip - cracking Windows hashes -- The two philosophies of password cracking -- John the Ripper cracking with a wordlist -- John the Ripper cracking with masking -- Reviewing your progress with the show flag -- Summary -- Questions -- Further reading -- Chapter 4: Advanced Network Attacks -- Technical requirements -- Binary injection with BetterCAP proxy modules -- The Ruby file injection proxy module - replace_file.rb -- Creating the payload and connect-back listener with Metasploit -- HTTP downgrading attacks with sslstrip -- Removing the need for a certificate - HTTP downgrading -- Understanding HSTS bypassing with DNS spoofing -- HTTP downgrade attacks with BetterCAP ARP/DNS spoofing -- The evil upgrade - attacking software update mechanisms -- Exploring ISR Evilgrade -- Configuring the payload and upgrade module -- Spoofing ARP/DNS and injecting the payload -- IPv6 for hackers -- IPv6 addressing basics -- Local IPv6 reconnaissance and the Neighbor Discovery Protocol -- IPv6 man-in-the-middle - attacking your neighbors -- Living in an IPv4 world - creating a local 4-to-6 proxy for your tools -- Summary -- Questions -- Further reading -- Chapter 5: Cryptography and the Penetration Tester -- Technical requirements -- Flipping the bit - integrity attacks against CBC algorithms -- Block ciphers and modes of operation -- Introducing block chaining -- Setting up your bit-flipping lab -- Manipulating the IV to generate predictable results -- Flipping to root - privilege escalation via CBC bit-flipping -- Sneaking your data in - hash length extension attacks -- Setting up your hash attack lab -- Understanding SHA-1's running state and compression function…”
    Libro electrónico
  11. 851
    Publicado 2017
    “…Viktor Farcic's latest book, The DevOps 2.1 Toolkit: Docker Swarm, shows you how to successfully integrate Docker Swarm into your DevOps toolset. …”
    Libro electrónico
  12. 852
    Publicado 2019
    “…This Learning Path includes content from the following Packt products: AWS Administration: The Definitive Guide, Second Edition by Yohan Wadia AWS Administration Cookbook by Rowan Udell, Lucas Chan Mastering AWS Lambda by Yohan Wadia, Udita Gupta What you will learn Explore the benefits of serverless computing and applications Deploy apps with AWS Elastic Beanstalk and Amazon Elastic File System Secure environments with AWS CloudTrail, AWSConfig, and AWS Shield Run big data analytics with Amazon EMR and Amazon Redshift Back up and safeguard data using AWS Data Pipeline Create monitoring and alerting dashboards using CloudWatch Effectively monitor and troubleshoot serverless applications with AWS Design serverless apps via AWS Lambda, DynamoDB, and API Gateway Who this book is for This Learning Path is specifically designed for IT system and network administrators, AWS architects, and DevOps engineers who want to effectively implement AWS in their organization and easily manage daily activities. …”
    Libro electrónico
  13. 853
    por DuBois, Paul, 1956-
    Publicado 2009
    Libro electrónico
  14. 854
    Publicado 2004
    Libro electrónico
  15. 855
    Publicado 2018
    Tabla de Contenidos: “…-- Fortune Cookie architectural topology in Microsoft Azure -- Deploying a Fortune Cookie webhook to Microsoft Azure -- Updating Fortune Cookie's Node.js webhook code -- Testing a webhook locally -- Creating a web.config to run Node.js in Microsoft Azure -- Creating Microsoft Azure App Service to host a Node.js webhook -- Configuring Dialogflow webhook -- Securing the Node.js webhook for Dialogflow -- Storing Quotes in Cosmos DB -- Creating Cosmos DB -- Importing the Fortune Cookie quotes -- Updating the Node.js webhook to use Cosmos DB -- Installing a new component on Microsoft Node.js -- Managing the Microsoft Azure Node.js service -- Creating a backup of the service -- Scaling up or scaling out -- Managing Cosmos DB -- Scaling out Cosmos DB -- Geo-replicating Cosmos DB -- Creating end-to-end tests using the Dialogflow client SDK…”
    Libro electrónico
  16. 856
    por Scott, John Edward
    Publicado 2008
    “…APEX is an application development framework for developing database–backed applications. It's easy enough to get started in that power users can quit storing data in random spreadsheets and instead centralize their data in the powerful Oracle database, all without developer help. …”
    Libro electrónico
  17. 857
    Publicado 2024
    Libro electrónico
  18. 858
    Publicado 2013
    Libro electrónico
  19. 859
    Publicado 2002
    Tabla de Contenidos: “…Intro -- Table of Contents -- Preface -- What This Book Is About -- Promotes Creative Use of the Product -- Uses the Tools at Hand -- Follows a Problem-Solution Format -- Who This Book Is For -- What You Need to Use This Book -- How This Book Is Organized -- What We Left Out -- How Do I Set Control Properties? …”
    Libro electrónico
  20. 860
    Publicado 2018
    Tabla de Contenidos: “…-- 1.3 Why a book on JavaScript data wrangling? -- 1.4 What will you get out of this book? -- 1.5 Why use JavaScript for data wrangling? …”
    Libro electrónico