Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,593
- History 1,521
- Development 893
- Engineering & Applied Sciences 704
- Application software 691
- Management 612
- Filosofía 514
- Crítica e interpretación 497
- Computer Science 466
- Computer networks 358
- Philosophy 339
- Computer programming 330
- Cloud computing 325
- Història 316
- Design 311
- Education 305
- Computer software 303
- Feminism 297
- Politics and government 296
- Business & Economics 294
- Data processing 291
- Lenin, Vladimir Il'ich 289
- Computer programs 284
- Python (Computer program language) 278
- Política y gobierno 269
- History and criticism 267
- Programming 250
- Social aspects 250
- Web sites 248
- Java (Computer program language) 247
-
42301Publicado 2024“…Chapter by chapter, you'll refine that app and its core logic to spin up new and exciting WebRTC-powered apps that will have your users sharing all manner of data with one another, all in real time. …”
Libro electrónico -
42302Publicado 2017“…By the end of the book you will gain the following: -Master the basics of Wireshark -Explore the virtual w4sp-lab environment that mimics a real-world network -Gain experience using the Debian-based Kali OS among other systems -Understand the technical details behind network attacks -Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark -Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark…”
Libro electrónico -
42303Publicado 2024“…In the past, landscape photography largely ended when the last light of dusk faded from the sky. Today it's only beginning. The latest digital cameras have made it much easier to create images of the landscape at night that film and early digital photographers could only dream of. …”
Libro electrónico -
42304Publicado 2024“…The course begins by establishing a foundational understanding of IoT, addressing common terms, benefits, and challenges. …”
Video -
42305Publicado 2004“…Even more, still today people use some of the terms and the practices coming from the Aristotelian physics, for instance in astronomy.However, new disciplines are often subjects to fads. At the beginning it is difficult to distinguish what is true science from what is the result of witchcraft. …”
Libro electrónico -
42306Publicado 2007“…Cristiandad reedita este clásico escrito en 1925 por el genial escritor inglés, con la novedad de incorporar un prólogo de Juan Manuel de Prada. Éste define a El hombre eterno como “pináculo” con el que culmina la experiencia que llevó a Chesterton a la conversión al catolicismo. …”
991006332289706719 -
42307Publicado 2013“…Europa ha comprendido que la innovación tecnológica y económica se convierte en instrumento de explotación de los débiles, si, al mismo tiempo, no se desarrollan unas relaciones humanas basadas en la cooperación, la igualdad y la utilización de las diferencias para promover la creación de verdades y de valores compartidos. …”
Sumari (accés lliure)
991008847129706719 -
42308Publicado 2003“…Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. …”
Libro electrónico -
42309Publicado 2007“…They demonstrate how to utilize Six Sigma’s Define, Measure, Analyze, Improve, and Control (DMAIC) process to address even the most challenging problems. …”
Libro electrónico -
42310Publicado 2019“…You'll be learning how to deliver features quickly by building systems, which retain the scalability and benefits of serverless. You'll begin your journey by learning how to build a simple, completely serverless application. …”
Libro electrónico -
42311Publicado 2019“…The book helps the reader learn how to use PowerShell and manage core roles, features, and services of Windows Server 2019. You will begin with creating a PowerShell Administrative Environment that has updated versions of PowerShell and the Windows Management Framework, updated versions of the .NET Framework, and third-party modules. …”
Libro electrónico -
42312Publicado 2019“…Fanatical Military Recruiting begins where the Recruiting and Retention colleges of the various branches of the military leave off. …”
Libro electrónico -
42313Publicado 2013“…¿Qué es lo que hace que un líder sea verdaderamente excepcional? Sin duda, los líderes necesitan don de gentes, habilidades de ejecución, un conocimiento profundo de las tendencias de la industria, y la capacidad de articular una visión; y más aún: deben ser competentes. …”
Libro electrónico -
42314Publicado 2017“…This second edition of Cisco ISE for BYOD and Secure Unified Access contains more than eight brand-new chapters as well as extensively updated coverage of all the previous topics in the first edition book to reflect the latest technologies, features, and best practices of the ISE solution. It begins by reviewing today’s business case for identity solutions. …”
Libro electrónico -
42315Publicado 2018Tabla de Contenidos: “…Check Points -- 7.4. Defining a Time-Voltage Stimulus Using Text Files -- 7.5. …”
Libro electrónico -
42316Publicado 2019“…Hands-On Business Intelligence with Qlik Sense begins by helping you get to grips with underlying Qlik concepts and gives you an overview of all Qlik Sense's features. …”
Libro electrónico -
42317Publicado 2018“…What you will learn Understand the differences between Clip Studio Paint Pro and EX Discover how to navigate and customize the user interface Creating custom tools that fit your unique style of illustration Using the ruler tools to create intricate perspective shots and complex symmetry Discover how to use 3D elements in your work Learn how to create lettering and word balloons to bring your comic stories to life Understand the process of digital art creation from pencils to inks to color Understand how to use the animation tools available in Clip Studio Paint Who this book is for If you are a beginning digital artist or are switching to Clip Studio from another graphics software, this book is for you. …”
Libro electrónico -
42318Publicado 2017“…What You Will Learn Customize the ServiceNow dashboard to meet your business requirements Use Administration and Security Controls to add roles and ensure proper access Manage tables and columns using data dictionaries Learn how application scopes are defined within ServiceNow Configure different types of table to design your application Start using the different types of scripting options available in ServiceNow Design and create workflows for task tables Use debugging techniques available in ServiceNow to easily resolve script-related issues Run scripts at regular time intervals using the Scheduled Script Execution module In Detail ServiceNow provides service management for every department in the enterprise, including IT, Human Resources, Facilities, Field Service, and more. …”
Libro electrónico -
42319Publicado 2017“…This course is a hands-on tutorial on working with a real Dynamics NAV implementation. It begins by providing an insight into the different tools available to migrate data from client legacy systems into Microsoft Dynamics NAV. …”
Libro electrónico -
42320Publicado 2017“…Integration Cloud Service (ICS) provides a cloud hosted means to integrate systems together using a graphical means to define and represent integrations. This book will be a comprehensive, hands-on guide to building successful, high-availability integrations on ICS. …”
Libro electrónico