Mostrando 6,421 - 6,440 Resultados de 71,188 Para Buscar 'SCTV~', tiempo de consulta: 1.48s Limitar resultados
  1. 6421
    Publicado 2018
    “…Natural secondary metabolite products, which are isolated from plants, animals, microorganisms, et cetera, are classified as polyketides, isoprenoids, aromatics (phenylpropanoids), alkaloids, et cetera Their chemical diversity and variety of biological activities have attracted the attention of chemists, biochemists, biologists, et cetera The Special Issue on "Biological Activity of Natural Secondary Metabolite Products" is intended to offer biological active natural products as candidates and/or leads for pharmaceuticals, dietary supplements, functional foods, cosmetics, food additives, et cetera The research fields of this Special Issue include natural products chemistry, phytochemistry, pharmacognosy, food chemistry, bioorganic synthetic chemistry, chemical biology, molecular biology, molecular pharmacology, and other related research fields of bioactive natural secondary metabolite products. …”
    Libro electrónico
  2. 6422
    Publicado 2020
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- List of figures -- List of tables -- List of acronyms -- List of Contributors -- Acknowledgements -- Introduction: Critical dialogues of urban governance, development and activism in London and Toronto: -- Why Toronto and London? …”
    Libro electrónico
  3. 6423
    Publicado 2021
    “…Sports psychology is an interdisciplinary science for the purpose of increased participation in sports and physical activity to improve health and wellbeing. It addresses everything from optimal performance and wellbeing of athletes to developing mental and social aspects of participation to systemic issues associated with sports settings and organizations. …”
    Libro electrónico
  4. 6424
    Publicado 2023
    “…The special ecological conditions of mangroves include high salinity, nutrient limitation, tidal gradients, high temperatures, excessively high light, and muddy anaerobic or sandy soil, which lead to various morphological and physiological adaptations of inhabiting species and act as an effective selector for the metabolic pathway via the generation of unique functional metabolites with highly unique chemical scaffolds and pharmaceutical application potential. …”
    Libro electrónico
  5. 6425
    Publicado 2015
    Libro electrónico
  6. 6426
    Publicado 2020
    Libro electrónico
  7. 6427
    Publicado 2023
    Tabla de Contenidos: “…THEFT5 - NTLM credential theft via PKINIT (nPAC-the-hash) -- Account persistence -- PERSIST1 - Active user credential theft via certificates -- PERSIST2 - Machine persistence via certificates -- PERSIST3 - Account persistence via certificate renewal -- Shadow credentials -- Domain privilege escalation -- Certifried (CVE-2022-26923) -- Template and extension misconfigurations -- Improper access controls -- CA misconfiguration -- Relay attacks -- Domain persistence -- DPERSIST1 - Forge certificates with stolen CA certificate -- DPERSIST2 - Trusting rogue CA certificates -- DPERSIST3 - Malicious misconfiguration -- Summary -- References -- Chapter 9: Compromise Microsoft SQL Server -- Technical requirements -- Introduction, discovery, and enumeration -- SQL Server introduction -- Discovery -- Brute force -- Database enumeration -- Privilege escalation -- Impersonation -- TRUSTWORTHY misconfiguration -- UNC path injection -- From a service account to SYSTEM -- From a local administrator to sysadmin -- OS command execution -- xp_cmdshell -- A custom extended stored procedure -- Custom CLR assemblies -- OLE automation procedures -- Agent jobs -- External scripts -- Lateral movement -- Shared service accounts -- Database links -- Persistence -- File and registry autoruns -- Startup stored procedures -- Malicious triggers -- Summary -- Further reading -- Chapter 10: Taking Over WSUS and SCCM -- Technical requirements -- Abusing WSUS -- Introduction to MECM/SCCM -- Deployment -- Reconnaissance -- Privilege escalation -- Client push authentication coercion -- Credential harvesting -- Lateral movement -- Client push authentication relay attack -- Site takeover -- Abuse of Microsoft SQL Server -- Deploying an application -- Defensive recommendations -- Summary -- References -- Further reading -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  8. 6428
    Publicado 2023
    Libro electrónico
  9. 6429
    por European Investment Bank
    Publicado 2022
    “…The EU bank tackled these hazards by thinking hard and moving fast - in new directions. The Activity Report highlights our emergency response to COVID-19 through the unique European Guarantee Fund, as well as our support for healthcare companies working on cures and therapies for the disease. …”
    Libro electrónico
  10. 6430
    Publicado 2022
    Materias:
    Libro electrónico
  11. 6431
    Libro electrónico
  12. 6432
    Publicado 1980
    Libro
  13. 6433
    Publicado 1912
    Libro
  14. 6434
    por Beckett, Samuel, 1906-1989
    Publicado 1965
    “…Acto sin palabras…”
    Libro
  15. 6435
    Libro
  16. 6436
    Publicado 2007
    Libro
  17. 6437
  18. 6438
    “…Acta primorum martyrum…”
    Acceso a copia digital - Google Books
    Libro
  19. 6439
    Publicado 1852
    Libro
  20. 6440