Search Results - (((((((ant OR mantis) OR file) OR swantis) OR cantor) OR anne) OR halted) OR wanting) algorithms.

  1. 101
  2. 102
  3. 103
  4. 104
  5. 105
  6. 106

    Mastering Active Directory by Francis, Dishan

    Published 2017
    Table of Contents: “…-- The update sequence number -- Directory Service Agent GUID and invocation ID -- The high watermark vector table -- The up-to-dateness vector table -- The read-only domain controllers -- Active Directory database maintenance -- The ntds.dit file -- The edb.log file -- The edb.chk file -- The temp.edb file -- Offline defragmentation -- Active Directory backup and recovery -- Preventing accidental deletion of objects -- Active Directory Recycle Bin -- Active Directory snapshots -- Active Directory system state backup -- Active Directory recovery from system state backup -- Summary -- Chapter 12: Active Directory Certificate Services -- PKI in action -- Symmetric keys versus asymmetric keys -- Digital encryption -- Digital signatures -- Signing, encryption, and decryption -- Secure Sockets Layer certificates -- Types of certification authorities -- How do certificates work with digital signatures and encryption? …”
    Full text (MFA users only)
    Electronic eBook
  7. 107
  8. 108

    Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis by Bramwell, Phil

    Published 2018
    Table of Contents: “…A real-world pen test scenario -- the chatty printerConfiguring our SMB listener; Authentication capture; Hash capture with LLMNR/NetBIOS NS spoofing; Let it rip -- cracking Windows hashes; The two philosophies of password cracking; John the Ripper cracking with a wordlist; John the Ripper cracking with masking; Reviewing your progress with the show flag; Summary; Questions; Further reading; Chapter 4: Advanced Network Attacks; Technical requirements; Binary injection with BetterCAP proxy modules; The Ruby file injection proxy module -- replace_file.rb…”
    Full text (MFA users only)
    Electronic eBook
  9. 109
  10. 110
  11. 111
  12. 112
  13. 113

    Tolerance graphs by Golumbic, Martin Charles

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  14. 114
  15. 115

    Deterministic Network Calculus. by Bouillard, Anne

    Published 2018
    Full text (MFA users only)
    Electronic eBook
  16. 116

    Nuclear reactor physics and engineering by Lee, John C., 1941-

    Published 2020
    Full text (MFA users only)
    Electronic eBook
  17. 117

    Energy efficiency in manufacturing systems by Thiede, Sebastian

    Published 2012
    Full text (MFA users only)
    Electronic eBook
  18. 118

    Introduction to GIS programming and fundamentals with Python and ArcGIS by Yang, Chaowei

    Published 2017
    Table of Contents: “…File Input/Output --…”
    Full text (MFA users only)
    Electronic eBook
  19. 119

    In the tradition of Ahlfors and Bers : proceedings of the First Ahlfors-Bers Colloquium, Ahlfors-Bers Colloquium, November 6-8, 1998, State University of New York at Stony Brook

    Published 2000
    Table of Contents: “…Coverings of Cantor sets /…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  20. 120

    Genomic Perl : from bioinformatics basics to working code by Dwyer, Rex A.

    Published 2003
    Table of Contents: “…Reading Sequence Files in Perl --…”
    Full text (MFA users only)
    Electronic eBook