Mostrando 81 - 100 Resultados de 17,395 Para Buscar 'UNFP~', tiempo de consulta: 1.39s Limitar resultados
  1. 81
    por Borrow, George Henry, 1803-1881
    Publicado 1844
    Libro
  2. 82
    por Glasenapp, Helmuth von
    Publicado 1979
    Libro
  3. 83
    por Glasenapp, Helmuth von
    Publicado 1963
    Libro
  4. 84
    Tabla de Contenidos: “…V : Kleine Schriften, Autobiographisches, Dichtungen, Briefe, Kommentare und Anmerkungen zu Band I-V, Anhang…”
    Libro
  5. 85
    Publicado 2019
    “…Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing. Creating Info We Trust is a craft that puts the world into forms that are strong and true. …”
    Libro
  6. 86
    Publicado 2000
    Libro
  7. 87
    por Budde, Karl
    Publicado 1898
    Libro
  8. 88
    por Claudel, Paul, 1868-1955
    Publicado 1939
    Libro
  9. 89
    Libro
  10. 90
    Publicado 1975
    Libro
  11. 91
    por Lucia, Sr.M. Ocd
    Publicado 1972
    Libro
  12. 92
    por Würthwein, Ernst
    Publicado 1969
    Libro
  13. 93
    Publicado 1961
    Libro
  14. 94
    por Gietmann, G. 1845-1912
    Publicado 1899
    Libro
  15. 95
    Tabla de Contenidos: “…Business Continuity Plan Validation & Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors…”
    Libro electrónico
  16. 96
    Libro electrónico
  17. 97
    Publicado 2003
    Revista digital
  18. 98
    Publicado 2016
    Tabla de Contenidos: “…; Conventions Used in This Book; Safari® Books Online; How to Contact Us; Chapter 1. Juniper MX Architecture; Junos OS; One Junos; Software Releases; Junos Continuity-JAM; Software Architecture; Routing Sockets; Junos OS Modernization; Juniper MX Chassis; vMX; MX80; Midrange; MX104; MX240; MX480; MX960; MX2010 and MX2020; Trio; Trio Architecture; Trio Generations; Buffering Block; Lookup Block…”
    Libro electrónico
  19. 99
    Publicado 2019
    Tabla de Contenidos: “…Preface : Ancient roots: spirits of information and trust -- Origin : The goal of our craft: data, story, and the adventure ahead -- Data shadows: numbers and the past they come from -- Information murmurs: arranging data in forms we can read -- Metaphorical : Embodied encoding: the power of metaphor -- Counting time: how we experience numbers and time -- World building: grids and other homes for data -- Infuse meaning: up, down, and other spatial meaning -- True colors: the eye's seductive potential -- Mathemagical : Explore to create: seek comparisons and patterns -- Create to explore: translate and transform to learn more -- Uncertain honesty: the challenge of qualifying truthfulness -- Sensational : Encounter: experience design with museums -- Listen: story design with natural selection -- Freeze: graphic design with propaganda -- Connect: emotional design with roughness -- Make: explanation design with diagrams -- Informational : Inspire trust: design for believing minds -- Imagination to image: explore visual story possibilities -- Focus attention: workshop to the audience -- Onward : Creative routines: daily practices for making new views -- Finale : Beautiful tomorrow: push forward together…”
    Libro electrónico
  20. 100
    Publicado 2016
    Libro electrónico