Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,650
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 354
- Música 346
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
32041Publicado 2022“…While the three compositions narrate the same basic story and work to shape ethical subjects, they do so in different ways and with different visions of what a moral person actually is. …”
Libro electrónico -
32042Publicado 2002“…Still, I am sure that Emilion will do as well as Michel did in inspiring fruitful discussions among us. …”
Libro electrónico -
32043
-
32044por Izquierdo i Capdevila, Joan, 1752-1808Accés lliure
Publicado 1803
Accés lliure
991005279549706719 -
32045por Crespí de Valldaura i Brizuela, Cristòfor, 1599-1672
Publicado 1662Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Biblioteca Universitat Ramon Llull)Libro -
32046
-
32047Publicado 2007“…The Easy, Example-Based Guide to Ajax for E very Web Developer Using Ajax, you can build Web applications with the sophistication and usability of traditional desktop applications and you can do it using standards and open source software. …”
Libro electrónico -
32048Publicado 2005“…Gaming Hacks shows you how to do things you didn't know could be done. If you want more than your average gamer--you want to explore and experiment, unearth shortcuts, make your games do what you want them to do Gaming Hacks will show you how. …”
Libro electrónico -
32049Publicado 2006“…Too often, they spend their time doing repetitive, time-wasting tasks such as placing and replacing images, correcting errors in text, cutting and pasting, and preparing files for printing. …”
Libro electrónico -
32050Publicado 2003“…Adobe Photoshop is one of those programs that both dazzles and dismays: You can do extraordinary things with it--as long as you don't get lost in its maze of palettes and toolbars. …”
Libro electrónico -
32051Publicado 2004“…Modding Mac OS X starts out with the very basics of showing you how to configure your Mac and do simple things like change Finder views, use an image from iPhoto's library on your desktop, and how to find and use screen savers. …”
Libro electrónico -
32052Publicado 2005“…A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues Operate and maintain a secure MPLS core with industry best practices Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS) Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. …”
Libro electrónico -
32053por Levison, Louise“…The first, most crucial step in making a film is finding the funds to do it. Let Louise Levison, who wrote the innovative business plan for ""The Blair Witch Project,"" show you how. …”
Publicado 2007
Libro electrónico -
32054por Barnett, Ryan C.“…Preventing Web Attacks with Apache brings together all the information you’ll need to do that: step-by-step guidance, hands-on examples, and tested configuration files. …”
Publicado 2005
Libro electrónico -
32055por Skoudis, Ed“…—Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. …”
Publicado 2004
Libro electrónico -
32056Publicado 2006“…Jeffrey Russell, Managing Partner, Supply Chain Asia Pacific, Accenture The challenge of supply chains has long been omnipresent, but as our world becomes more complex and our supply lines longer, the power of our supply chain management capabilities to create and destroy value is magnified. Why do our supply chains succeed or fail? The answer lies in alignment. …”
Libro electrónico -
32057Publicado 2005“…An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. …”
Libro electrónico -
32058Publicado 2004“…—Joseph Bergin, professor of computer science, Pace University, New York “If change is the only guarantee in life, why is it so hard to do? As this book points out, people are not so much resistant to change itself as they are to being changed. …”
Libro electrónico -
32059por Weisberg, Herbert I., 1944-“…A one-of-a-kind resource on identifying and dealing with bias in statistical research on causal effects Do cell phones cause cancer? Can a new curriculum increase student achievement? …”
Publicado 2010
Libro electrónico -
32060Publicado 2013“…This video tutorial is designed for the beginner, and you do not require any previous Acrobat experience to get the most from this training. …”