| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990009757080403321 |
|
|
Autore |
Sanson, Andrè <1826-1902> |
|
|
Titolo |
4.: Applications de la zootechnie : boeuf, mouton, chévre, porc / André Sanson |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Paris : Librairie agricole de la maison rustique, 1867 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
|
|
Collocazione |
|
da collocare |
60 636.08 C 9 |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910136527903321 |
|
|
Autore |
Grose Michael (Lawyer) |
|
|
Titolo |
Construction law in the United Arab Emirates and the Gulf / / Michael Grose |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken : , : Wiley, , [2016] |
|
©2016 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-119-08595-0 |
1-119-08594-2 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (424 pages) |
|
|
|
|
|
|
Classificazione |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Construction industry - Law and legislation - United Arab Emirates |
Construction contracts - United Arab Emirates |
Construction industry - Law and legislation - Persian Gulf Coast (Persian Gulf States) |
Construction contracts - Persian Gulf Coast (Persian Gulf States) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Sommario/riassunto |
|
"The book is an authoritative guide to construction law in the United Arab Emirates and the Gulf. The principal theme is the contrast between construction law in an Islamic civil law jurisdiction and construction law in a common law jurisdiction. There is a tendency for these differences to be glossed over due to a lack of any detailed comparative analysis. The book provides the first authoritative text on the application of the laws of the UAE, and to a lesser extent of the wider Gulf region, to the most commonly occurring issues of controversy arising from construction projects. There are extensive extracts from the region's applicable laws, all translated from the original Arabic, and hundreds of judgments of the most senior courts used to back up the analysis provided. The text is presented in two parts: A narrative covering the main areas of practical concern to those dealing with construction contract and disputes; and A commentary on the standard FIDIC conditions that are widely employed on construction contracts in the Gulf region, applying principles from the narrative wherever relevant. The sources of information contained in the book are not readily available to those without access to a database of relevant laws and judgments"-- |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910792485103321 |
|
|
Autore |
Broad James |
|
|
Titolo |
Hacking with Kali : practical penetration testing techniques / / James Broad, Andrew Bindner |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Waltham, MA : , : Syngress, , 2014 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[First edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (ix, 227 pages) : illustrations (some color) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Penetration testing (Computer security) |
Computer hackers |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Hacking with Kali; Copyright Page; Dedication; Contents; 1 Introduction; Book Overview and Key Learning Points; Book Audience; Technical Professionals; Security Engineers; Students in Information Security and Information Assurance Programs; Who This Book Is Not for; Diagrams, Figures, and Screen Captures; Welcome; Penetration Testing Lifecycle; Terms; Penetration Testing, Pentesting; Red Team, Red Teaming; Ethical Hacking; White Hat; Black Hat; Grey Hat; Vulnerability Assessment, Vulnerability Analysis; Security Controls Assessment; Malicious User Testing, Mal User Testing |
Social Engineering Phishing; Spear Phishing; Dumpster Diving; Live CD, Live Disk, or LiveOS; Kali History; References; 2 Download and Install Kali Linux; Chapter Overview and Key Learning Points; Kali Linux; System Information; Selecting a Hardware Platform for Installation; Hard Drive Selection; Partitioning the Hard Drive; Security During Installation; Downloading Kali; Hard Drive Installation; Booting Kali for the First Time; Installation-Setting the Defaults; Installation-Initial Network Setup; Passwords; Configuring the System Clock; Partitioning Disks; Configure the Package Manager |
Installing the GRUB Loader Completing the Installation; Thumb Drive Installation; Windows (Nonpersistent); Linux (Persistent); SD Card Installation; Summary; 3 Software, Patches, and Upgrades; Chapter Overview and Key Learning Points; APT Package Handling Utility; Installing Applications or Packages; Update; Upgrade; Distribution |
|
|
|
|
|
|
|
|
|
|
|
Upgrade; Remove; Auto Remove; Purge; Clean; Autoclean; Putting It All Together; Debian Package Manager; Install; Remove; Checking for Installed Package; Tarballs; Creation of a Tarball; Extracting Files from a Tarball; Compressing a Tarball |
A Practical Guide to Installing Nessus Update and Clean the System Prior to Installing Nessus; Install and Configure Nessus; Conclusion; 4 Configuring Kali Linux; Chapter Overview and Key Learning Points; About This Chapter; The Basics of Networking; Private Addressing; Default Gateway; Name Server; DHCP; Basic Subnetting; Kali Linux Default Settings; Using the Graphical User Interface to Configure Network Interfaces; Using the Command Line to Configure Network Interfaces; Starting and Stopping the Interface; DHCP from the Command Prompt; Using the GUI to Configure Wireless Cards |
Connection Name Connect Automatically Checkbox; Wireless Tab; Service Set Identifier; Mode; Basic Service Set Identification; Device MAC Address; Cloned MAC Address; Maximum Transmission Unit; Wireless Security Tab; Security Drop Down; Wired Equivalent Privacy; Lightweight Extensible Authentication Protocol; WiFi Protected Access; Passwords and Keys; IPv4 Settings Tab; Save; Web Server; Using the GUI to Start, Stop, or Restart the Apache Server; Starting, Stopping, and Restarting Apache at the Command Prompt; The Default Web Page; FTP Server; SSH Server; Generate SSH Keys |
Managing the SSH Service from the Kali GUI |
|
|
|
|
|
|
Sommario/riassunto |
|
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration |
|
|
|
|
|
|
|
| |