Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Mac OS 4
- Macintosh (Computer) 3
- Operating systems (Computers) 3
- Computer Science 2
- Engineering & Applied Sciences 2
- AppleScript (Computer program language) 1
- Computers 1
- Digital mapping 1
- Diseñadores 1
- Geographic information systems 1
- Hackers 1
- Historia 1
- Imaginary places in mass media 1
- Kali Linux 1
- Mass media 1
- Penetration testing (Computer security) 1
- Programming 1
- Social aspects 1
- Storytelling in mass media 1
- Vestuario cinematográfico 1
-
1Publicado 2012“…This landmark book celebrates, for the very first time, the costume designer's contribution to the telling of the cinematic story in 100 years of Hollywood. …”
Libro -
2por Pogue, David, 1963-“…New York Times computer columnist David Pogue has just updated his bestselling Mac OS X: The Missing Manual! …”
Publicado 2002
Libro electrónico -
3
-
4Publicado 2017Tabla de Contenidos: “…Worlds, today / The aesthetics of proliferation / Building science-fiction worlds / "He doesn't look like Sherlock Holmes": the truth value and existential status of fictional worlds and their characters / "Visible world": the atlas as a visual form of knowledge and narrative paradigm in contemporary art / A world of Disney: building a transmedia storyworld for Mickey and his friends / World-building logics and copyright: the Dark Knight and the Great Detective / Battleworlds: the management of multiplicity in the media industries / Platform producer meets game master: on the conditions for the media mix / Narrative ecosystems: a multidisciplinary approach to media worlds / The building and blurring of worlds: sound, space, and complex narrative cinema / Beyond immersion: absorption, saturation, and overflow in the building of imaginary worlds / Zombie escape and survival plans: mapping the transmedial world of the dead / MMORPG as locally realized worlds of action / The worries of the world(s): cartoons and cinema / Linguistic terrain and world time: Chinese media theories and their world imaginations / The worlds align: media convergence and complementary storyworlds in Marvel's Thor: The Dark World / World building and metafiction in contemporary comic books: metalepsis and figurative process of graphic fiction / The monster at the end of this book: metalepsis, fandom, and world making in contemporary TV series / Traversing the "Whoniverse": Doctor Who's hyperdiegesis and transmedia discontinuity/diachrony / Transmediaphilia, world building, and the pleasures of the personal digital archive / The politics of world building: heteroglossia in Janelle Monáe's Afrofuturist WondaLand…”
Libro electrónico -
5Publicado 2015“…Raffles stories rivaled Conan Doyle's Sherlock Cover His Brother's BloodHolmes in popularity. …”
Libro electrónico -
6Publicado 2003“…This practical, how-to guide covers all of the exciting new features in Mac OS X 10.2, including the revamped Finder, new instant messaging client, global address book, spam-blocking email program, QuickTime 6, Sherlock 3, and more. Robin doesn't neglect the basics either. …”
Libro electrónico -
7por Gray, Patrick, 1977-Tabla de Contenidos: “…; A Brief History of IT; Shifting the Focus: Moving IT from Service Provider to Strategic Asset; Calling Sherlock Holmes: Finding Continuing Operations; Changing the Source: What to Do with Continuing Operations; Chapter 3: ET Phone Home; Free at Last; Separating Process from Technology; Where the Rubber Meets the Road: Partnering with the CEO…”
Publicado 2007
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8Publicado 2018“…How Hansel and Gretel, Sherlock Holmes, the movie Groundhog Day, Harry Potter, and other familiar stories illustrate the concepts of computing. …”
Grabación no musical -
9por Erle, SchuylerTabla de Contenidos: “…; Getting the Data; More Information; Publish Maps of Your Photos on the Web; Track the Friendly Skies with Sherlock; How Does This Work?; Georeference Digital Photos; How Does This Work?…”
Publicado 2005
Libro electrónico -
10Publicado 2001“…As the Macintosh continues to expand and solidify its base in the multimedia and publishing industries, AppleScript is the tool of choice on this platform for creating sophisticated time- and money-saving workflow applications (applets). …”
Libro electrónico -
11Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Ethical Hacking -- Understanding the need for cybersecurity -- Exploring cybersecurity terminology -- Identifying threat actors and their intent -- Understanding what matters to threat actors -- Time -- Resources -- Financial factors -- Hack value -- Exploring the importance of penetration testing -- Penetration testing methodologies -- Pre-engagement phase -- Information-gathering phase -- Threat modeling -- Vulnerability analysis -- Exploitation -- Post-exploitation -- Report writing -- Discovering penetration testing approaches -- Types of penetration testing -- Web application penetration testing -- Mobile application penetration testing -- Social engineering penetration testing -- Network penetration testing (external and internal) -- Cloud penetration testing -- Physical penetration testing -- Exploring the phases of penetration testing -- Reconnaissance -- Scanning and enumeration -- Gaining access (exploitation) -- Maintaining access -- Covering your tracks -- Understanding the Cyber Kill Chain framework -- Reconnaissance -- Weaponization -- Delivery -- Exploitation -- Installation -- Command and Control (C2) -- Actions on objectives -- Summary -- Further reading -- Chapter 2: Building a Penetration Testing Lab -- Technical requirements -- An overview of the lab setup and technologies used -- Setting up a hypervisor and virtual networks -- Part 1 - setting up the hypervisor -- Part 2 - creating virtually isolated networks -- Setting up and working with Kali Linux -- Part 1 - deploying Kali Linux as a virtual machine -- Part 2 - customizing Kali Linux and its network adapters -- Part 3 - getting started with Kali Linux -- Part 4 - updating repository sources and packages -- Setting up a vulnerable web application…”
Libro electrónico