Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 128
- Application software 121
- Operating systems (Computers) 97
- Engineering & Applied Sciences 69
- Computer programs 63
- Computer Science 58
- Management 58
- Cloud computing 52
- Programming 51
- Database management 47
- Java (Computer program language) 37
- Microsoft Windows (Computer file) 37
- Linux 36
- Web site development 34
- Client/server computing 33
- Computer programming 33
- Computer software 33
- Data processing 31
- Computer networks 29
- Macintosh (Computer) 29
- JavaScript (Computer program language) 27
- Design 25
- WebSphere 24
- Mac OS 22
- Open source software 22
- Business 20
- Python (Computer program language) 20
- Electronic data processing 19
- Internet programming 19
- Microsoft .NET Framework 19
-
841
-
842
-
843por Himschoot, Peter. author“…You will: Build user interfaces and display data for users to edit Capture the user’s changes via data binding Transfer data back and forth between server and client Communicate with microservices and database services Develop reusable components and assemble them into bigger components Use routing to build single-page applications (SPAs) Build Blazor libraries that are reusable across applications…”
Publicado 2020
Libro electrónico -
844
-
845Publicado 2017Libro electrónico
-
846Publicado 2024Libro electrónico
-
847
-
848Publicado 2018Libro electrónico
-
849
-
850Publicado 2018Tabla de Contenidos: “…A real-world pen test scenario - the chatty printer -- Configuring our SMB listener -- Authentication capture -- Hash capture with LLMNR/NetBIOS NS spoofing -- Let it rip - cracking Windows hashes -- The two philosophies of password cracking -- John the Ripper cracking with a wordlist -- John the Ripper cracking with masking -- Reviewing your progress with the show flag -- Summary -- Questions -- Further reading -- Chapter 4: Advanced Network Attacks -- Technical requirements -- Binary injection with BetterCAP proxy modules -- The Ruby file injection proxy module - replace_file.rb -- Creating the payload and connect-back listener with Metasploit -- HTTP downgrading attacks with sslstrip -- Removing the need for a certificate - HTTP downgrading -- Understanding HSTS bypassing with DNS spoofing -- HTTP downgrade attacks with BetterCAP ARP/DNS spoofing -- The evil upgrade - attacking software update mechanisms -- Exploring ISR Evilgrade -- Configuring the payload and upgrade module -- Spoofing ARP/DNS and injecting the payload -- IPv6 for hackers -- IPv6 addressing basics -- Local IPv6 reconnaissance and the Neighbor Discovery Protocol -- IPv6 man-in-the-middle - attacking your neighbors -- Living in an IPv4 world - creating a local 4-to-6 proxy for your tools -- Summary -- Questions -- Further reading -- Chapter 5: Cryptography and the Penetration Tester -- Technical requirements -- Flipping the bit - integrity attacks against CBC algorithms -- Block ciphers and modes of operation -- Introducing block chaining -- Setting up your bit-flipping lab -- Manipulating the IV to generate predictable results -- Flipping to root - privilege escalation via CBC bit-flipping -- Sneaking your data in - hash length extension attacks -- Setting up your hash attack lab -- Understanding SHA-1's running state and compression function…”
Libro electrónico -
851Publicado 2017“…Viktor Farcic's latest book, The DevOps 2.1 Toolkit: Docker Swarm, shows you how to successfully integrate Docker Swarm into your DevOps toolset. …”
Libro electrónico -
852Publicado 2019“…This Learning Path includes content from the following Packt products: AWS Administration: The Definitive Guide, Second Edition by Yohan Wadia AWS Administration Cookbook by Rowan Udell, Lucas Chan Mastering AWS Lambda by Yohan Wadia, Udita Gupta What you will learn Explore the benefits of serverless computing and applications Deploy apps with AWS Elastic Beanstalk and Amazon Elastic File System Secure environments with AWS CloudTrail, AWSConfig, and AWS Shield Run big data analytics with Amazon EMR and Amazon Redshift Back up and safeguard data using AWS Data Pipeline Create monitoring and alerting dashboards using CloudWatch Effectively monitor and troubleshoot serverless applications with AWS Design serverless apps via AWS Lambda, DynamoDB, and API Gateway Who this book is for This Learning Path is specifically designed for IT system and network administrators, AWS architects, and DevOps engineers who want to effectively implement AWS in their organization and easily manage daily activities. …”
Libro electrónico -
853
-
854Publicado 2004Libro electrónico
-
855Publicado 2018Tabla de Contenidos: “…-- Fortune Cookie architectural topology in Microsoft Azure -- Deploying a Fortune Cookie webhook to Microsoft Azure -- Updating Fortune Cookie's Node.js webhook code -- Testing a webhook locally -- Creating a web.config to run Node.js in Microsoft Azure -- Creating Microsoft Azure App Service to host a Node.js webhook -- Configuring Dialogflow webhook -- Securing the Node.js webhook for Dialogflow -- Storing Quotes in Cosmos DB -- Creating Cosmos DB -- Importing the Fortune Cookie quotes -- Updating the Node.js webhook to use Cosmos DB -- Installing a new component on Microsoft Node.js -- Managing the Microsoft Azure Node.js service -- Creating a backup of the service -- Scaling up or scaling out -- Managing Cosmos DB -- Scaling out Cosmos DB -- Geo-replicating Cosmos DB -- Creating end-to-end tests using the Dialogflow client SDK…”
Libro electrónico -
856por Scott, John Edward“…APEX is an application development framework for developing database–backed applications. It's easy enough to get started in that power users can quit storing data in random spreadsheets and instead centralize their data in the powerful Oracle database, all without developer help. …”
Publicado 2008
Libro electrónico -
857Publicado 2024Libro electrónico
-
858Publicado 2013Libro electrónico
-
859Publicado 2002Tabla de Contenidos: “…Intro -- Table of Contents -- Preface -- What This Book Is About -- Promotes Creative Use of the Product -- Uses the Tools at Hand -- Follows a Problem-Solution Format -- Who This Book Is For -- What You Need to Use This Book -- How This Book Is Organized -- What We Left Out -- How Do I Set Control Properties? …”
Libro electrónico -
860Publicado 2018Tabla de Contenidos: “…-- 1.3 Why a book on JavaScript data wrangling? -- 1.4 What will you get out of this book? -- 1.5 Why use JavaScript for data wrangling? …”
Libro electrónico