Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Arquitectura 2,869
- Development 1,164
- Application software 993
- Engineering & Applied Sciences 988
- Arquitectura moderna 850
- Architecture 835
- Cloud computing 697
- Computer networks 609
- Computer Science 592
- Art, Architecture & Applied Arts 519
- Management 506
- Visual Arts 476
- Historia 475
- Data processing 430
- Photography 430
- Computer architecture 406
- Software architecture 397
- Computer software 395
- Database management 384
- Security measures 376
- Electrical & Computer Engineering 362
- History 335
- Obras 328
- Java (Computer program language) 326
- Telecommunications 317
- Arquitectes 313
- Diseños y planos 299
- Artificial intelligence 296
- Computer programs 296
- Computer security 295
-
21021Publicado 2003“…Taking a practical, applied approach to building security into networks, the book shows you how to build secure network architectures from the ground up. Security aspects of routing protocols, Layer 2 threats, and switch security features are all analyzed. …”
Libro electrónico -
21022Publicado 2012“…Along the way, you'll explore practical matters like architecture, unit testing, and set-up as you build a scalable web application that includes custom DSLs, Hadoop, HBase, and RabbitMQ. …”
Libro electrónico -
21023“…Efficiently install, configure, and troubleshoot Cisco Wireless LAN Controllers Move autonomous wireless network solutions to LWAPP/CAPWAP Integrate LWAPP/CAPWAP solutions into existing wired networks Understand the next-generation WLC architecture Use Hybrid REAP and Home AP solutions to centrally configure and control branch/remote access points without deploying controllers in every location Use Mobility Groups to provide system-wide mobility easily and cost-effectively Use Cisco WLC troubleshooting tools, and resolve client-related problems Maximize quality in wireless voice applications Build efficient wireless mesh networks Use RRM to manage RF in real-time, optimizing efficiency and performance Reference the comprehensive WLC and AP debugging guide Part of the CCIE Professional Development Series, this is the first book to offer authoritative training for the new CCIE Wireless Exam. …”
Libro electrónico -
21024Publicado 2017“…Style and approach This clear, practical guide illustrates the advanced functionalities of Ansible, its system architecture, and design aspects that will help you to master Ansible with ease. …”
Libro electrónico -
21025Publicado 2017“…By the end of this book, you will have an in-depth knowledge of the implementation of the Elasticsearch architecture and will be able to manage data efficiently and effectively with Elasticsearch. …”
Libro electrónico -
21026Publicado 2017“…You will then dive deep into the latest design patterns, network architecture, and topologies. We will show you how you can integrate NAV with the Microsoft platform, and secure your deployment by managing roles and permissions. …”
Libro electrónico -
21027por Sullivan, Dan, 1962-“…In this book the author shares proven strategies for: Organizing information in an intuitive, coherent manner Creating a modular, adaptable framework for application integration Developing a robust, scalable architecture I..…”
Publicado 2003
Libro electrónico -
21028Publicado 2022“…You will learn different concepts of Spring Framework and RESTful webservices, different design patterns like Singleton, Prototype, Factory, MVC, Adapter, and so on, and create a production-ready application in a layered architecture. You will also look at ORM and Spring data JPA (Java Persistence API), Entity Relationship in Spring Data JPA, and implement Swagger API documentation. …”
Video -
21029por Alexandre Bidon, Danièle“…Excavation work undertaken in 1993-1994 prior to the construction of a shopping centre in the Velotte quarter of the Saint-Martin district has enabled archeologists to define seven build periods of architectural development covering both buildings and the urban defense system. …”
Publicado 2021
Electrónico -
21030Publicado 2019“…Skill Level Beginner to intermediate data analytics/machine learning knowledge Learn How To * Understand how static and real-time streaming data is collected, analyzed, and used * Understand the key tools and methods that enable machines to learn and mimic human thinking * Bring together unstructured data in preparation for analysis and visualization * Compare and contrast the various big data architectures * Apply supervised learning/linear regression, data fitting, and reinforcement learning to machines to yield the information results you’re looking for * Apply classification techniques to machine learning to better analyze your data * Exploit the benefits of unsupervised learning to glean data you didn’t even know you were looking for * Understand how artificial neural networks (ANNs) perform deep learning with surprising (and useful) results * Apply principal components analysis (PCA) to improve the management of data analysis * Understand the key approaches to implementing machine learning on real systems and the considerations you must make when undertaking a machine learning project Who Should Take This Course * Anyone who wants to learn about machine learni..…”
-
21031Publicado 2020“…Skill Level Intermediate Learn How To Build deep learning models in all the major libraries: TensorFlow, Keras, and PyTorch Understand the language and theory of artificial neural networks Excel across a broad range of computational problems including machine vision, natural language processing, and reinforcement learning Create algorithms with state-of-the-art performance by fine-tuning model architectures Self-direct and complete your own Deep Learning projects Who Should Take This Course Software engineers, data scientists, analysts, and statisticians with an interest in deep learning. …”
-
21032Publicado 2024“…What You Will Learn Understand the five security principles and how to use them to drive the development of modern security architectures in Google Cloud Secure identities with Cloud Identity and Identity & Access Management (IAM) Secure the network with segmentation and private connectivity Protect sensitive data with the Data Loss Prevention (DLP) API and encryption Monitor, log, audit, and troubleshoot security incidents with the Google Cloud Operations Suite Ensure compliance and address regulatory concerns…”
Libro electrónico -
21033por Teare, Diane“…For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. …”
Publicado 2005
Libro electrónico -
21034Publicado 2004“…Frame Relay users have found that it provides a number of benefits over alternative technologies: Lower cost of ownership Well-established and widely adopted standards that allow open architecture and plug-and-play service implementation Low overhead combined with high reliability Network scalability, flexibility, and disaster recovery Interworking with other new services and applications, such as ATM Along with these benefits and the growing popularity of Frame Relay comes the need for information and solutions to design issues, implementation, quality of service, and high availability. …”
Libro electrónico -
21035por Hucaby, Dave“…Firewalls have emerged as the essential foundation component in any network security architecture. Cisco ASA and PIX Firewall Handbook is a guide for the most commonly implemented features of the popular Cisco Systems® firewall security solutions. …”
Publicado 2004
Libro electrónico -
21036por Inmon, William H.“…Coverage includes What unstructured data is, and how it differs from structured data First generation technology for handling unstructured data, from search engines to ECM--and its limitations Integrating text so it can be analyzed with a common, colloquial vocabulary: integration engines, ontologies, glossaries, and taxonomies Processing semistructured data: uncovering patterns, words, identifiers, and conflicts Novel processing opportunities that arise when text is freed from context Architecture and unstructured data: Data Warehousing 2.0 Building unstructured relational databases and linking them to structured data Visualizations and Self-Organizing Map..…”
Publicado 2008
Libro electrónico -
21037por Dowd, Mark“…Coverage includes • Code auditing: theory, practice, proven methodologies, and secrets of the trade • Bridging the gap between secure software design and post-implementation review • Performing architectural assessment: design review, threat modeling, and operational review • Identifying vulnerabilities related to memory management, data types, and malformed data • UNIX/Linux assessment: privileges, files, and processes • Windows-specific issues, including objects and the filesystem • Auditing interprocess communication, synchronization, and state • Evaluating network software: IP stacks, firewalls, and common application protocols • Auditing Web applications and technologies This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike. …”
Publicado 2007
Libro electrónico -
21038por Gupta, Ajay“…Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio..…”
Publicado 2004
Libro electrónico -
21039Publicado 2007“…Introduces you to WCF and then takes you deep inside the technology Gives you nearly 100 best practices for programming with WCF Provides detailed coverage on how to version services that you will not find anywhere else Delves into using WCF together with Windows Workflow Foundation and Windows CardSpace Provides detailed coverage of the new high-performance data contract serializer for .NET Walks you through how to do secure, reliable, transacted messaging, and how to understand the options available Introduces you to federated, claims-based security, and shows you how to incorporate SAML and WS-Trust security token services into your architecture Provides step-by-step instructions for how to customize every aspect of WCF Shows you how to add your own behaviors, communication channels, message encoders, and transports Gives you options for implementing publish/subscribe solutions Walks you through how to do peer-to-peer communications with WCF As evangelists at Microsoft for WCF, Craig McMurtry, Marc Mercuri, Nigel Watl..…”
Libro electrónico -
21040Publicado 2002“…Contents include: An introduction to RAID and Linux Planning and architecture of your RAID system Building a software RAID Software RAID tools and references Building a hardware RAID Performance and tuning of your RAID system RAID has become the low-cost solution of choice to deal with the ever-increasing demand for data storage space. …”
Libro electrónico