Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 11,181
- Crítica e interpretación 4,335
- Biblia 3,585
- Història 3,399
- Filosofía 3,211
- History 2,152
- Colecciones 2,041
- Aristóteles 1,888
- Teología 1,650
- Iglesia Católica 1,576
- Bíblia 1,569
- Engineering & Applied Sciences 1,489
- Església Catòlica 1,373
- Historia y crítica 1,323
- Literatura latina clásica 1,317
- Derecho canónico 1,220
- Management 1,181
- Platón 1,136
- Development 1,091
- Computer Science 1,077
- Filosofía antigua 1,057
- Política 1,044
- Filosofía griega 1,036
- Sermones 1,015
- Política y gobierno 968
- Moral cristiana 961
- Derecho 956
- Obres anteriors al 1800 922
- Crítica i interpretació 914
- Espiritualidad 886
-
302881Publicado 2022“…About The Author Amit Diwan: Studyopedia was founded by Amit Diwan in 2018 after working for Tutorialspoint , IIT, IASRI, Sitepoint, DU, and C# Corner. Studyopedia sells courses on Udemy, Tutorialspoint, Geeksforgeeks, and Skillshare, providing video courses to master various technologies and programming languages, databases, frameworks, Python, data science, machine learning, Java, Android, C/C++, HTML5, Bootstrap, JavaScript, jQuery, PHP, CSS, WordPress, Drupal, Joomla, Magento, osCommerce, OpenCart, PrestaShop, and other disciplines. …”
Video -
302882Publicado 2022“…About The Author Amit Diwan: Studyopedia was founded by Amit Diwan in 2018 after working for Tutorialspoint , IIT, IASRI, Sitepoint, DU, and C# Corner. Studyopedia sells courses on Udemy, Tutorialspoint, Geeksforgeeks, and Skillshare, providing video courses to master various technologies and programming languages, databases, frameworks, Python, data science, machine learning, Java, Android, C/C++, HTML5, Bootstrap, JavaScript, jQuery, PHP, CSS, WordPress, Drupal, Joomla, Magento, osCommerce, OpenCart, PrestaShop, and other disciplines. …”
Video -
302883Publicado 2017“…., he has delivered Java, C#, Visual Basic, C++, C and Internet programming courses to industry clients, including Cisco, IBM, Sun Micro systems, Dell, Siemens, Lucent Technologies, Fidelity, NASA at the Kennedy Space Center, the National Severe Storm Laboratory, White Sands Missile Range, Rogue Wave Software, Boeing, SunGard Higher Education, Stratus, Cambridge Technology Partners, One Wave, Hyperion Software, Adra Systems, Entergy, CableData Systems, Nortel Networks, Puma, iRobot, Invensys and many more. …”
-
302884Publicado 2015“…Course Requirements The audience background, or prerequisite is a basic knowledge of Java, but if not, then knowledge on another object-oriented programming language in the syntactic traditions of C/C++. For example, a candidate with a good knowledge of C# should be able to benefit from this material, even if they do not have prior experience in Java. …”
-
302885Publicado 2017“…It is no longer necessary to learn C/C++ to develop resource intensive and low-level systems applications. …”
Libro electrónico -
302886Publicado 2015“…It is increasingly being adopted in Python for development. OpenCV has C++/C, Python, and Java interfaces with support for Windows, Linux, Mac, iOS, and Android. …”
Libro electrónico -
302887Publicado 2011“…Diann Sloan has R.N., B.S.N., M.S.N., F.N.C., as well as MS. Ed. and Ph.D. in Education degrees. …”
CDROM -
302888Publicado 2010“…For modern SoC design, practical applications are usually speed hungry. …”
Libro electrónico -
302889Publicado 2020“…Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland Barmak Meftah, President, ATamp;T Cybersecurity Cleve Adams, CEO, Site 1001 (AI and big data based smart building company) Ann Johnson, Corporate Vice President - Cybersecurity Solutions Group, Microsoft Barbara Humpton, CEO, Siemens USA Businesses and states depend on effective cybersecurity. …”
Libro electrónico -
302890Publicado 2019“…., he has delivered Java, C#, Visual Basic, C++, C and Internet programming courses to industry clients, including Cisco, IBM, Sun Micro systems, Dell, Siemens, Lucent Technologies, Fidelity, NASA at the Kennedy Space Center, the National Severe Storm Laboratory, White Sands Missile Range, Rogue Wave Software, Boeing, SunGard Higher Education, Stratus, Cambridge Technology Partners, One Wave, Hyperion Software, Adra Systems, Entergy, CableData Systems, Nortel Networks, Puma, iRobot, Invensys and many more. …”
-
302891Publicado 2016“…., he has delivered Java, C#, Visual Basic, C++, C and Internet programming courses to industry clients, including Cisco, IBM, Sun Micro systems, Dell, Siemens, Lucent Technologies, Fidelity, NASA at the Kennedy Space Center, the National Severe Storm Laboratory, White Sands Missile Range, Rogue Wave Software, Boeing, SunGard Higher Education, Stratus, Cambridge Technology Partners, One Wave, Hyperion Software, Adra Systems, Entergy, CableData Systems, Nortel Networks, Puma, iRobot, Invensys and many more. …”
-
302892Publicado 2021“…The book climaxes with two chapter-length explorations of Sedgwick's own late-life book-art practice: her panda Valentine alphabet cards (c. 1996) and her Last Days of Pompeii/Cavafy unique artist's book (c. 2007)…”
Libro electrónico -
302893Publicado 2007“…Install, configure, and maintain UNIX on your PC or workstation Work with files, directories, commands, and the UNIX shell Create and modify text files using powerful text editors Use UNIX desktops, including GNOME, CDE, and KDE, as an end user or system administrator Use and manage e-mail, TCP/IP networking, and Internet services Protect and maintain the security of your UNIX system and network Share devices, printers, and files between Windows and UNIX systems Use powerful UNIX tools, including awk, sed, and grep Develop your own shell, Python, and Perl scripts, and Java, C, and C++ programs under UNIX Set up Apache Web servers and develop browser-independent Web sites and applications…”
Libro electrónico -
302894Publicado 2016“…Students should have basic familiarity with C or C++. MasteringEngineering® not included. …”
Libro electrónico -
302895Publicado 2002“…McManus Joshua Meyrowitz C. Wright Mills Merrill Morris John C. Nerone W. …”
Libro -
302896Publicado 2005“…Munoz; M. Papageorgiou; C. Piazza; S.E. Shladover; D.M. Stipanovic; T.M. …”
Libro -
302897Publicado 2018Tabla de Contenidos: “…Attacks 102 -- 5.3 The Business Model Approach 103 -- 5.3.1 The 4C Typology of the ICT Business Model 104 -- 5.3.2 Business Models in the Context of Cyber Preparedness 105 -- 5.4 The Business Case of Cyber Security in the Era of 5G 106 -- 5.4.1 The Users and Issues of Cyber Security in 5G 108 -- 5.4.2 Scenarios for 5G Security Provisioning 109 -- 5.4.3 Delivering Cyber Security in 5G 110 -- 5.5 Business Model Options in 5G Cyber Security 112 -- 5.6 Acknowledgment 114 -- References 114 -- Part II 5G Network Security 117 -- 6 Physical Layer Security 119 /Simone Soderi, Lorenzo Mucchi, Matti Hämäläinen, Alessandro Piva, and Jari Iinatti -- 6.1 Introduction 119 -- 6.1.1 Physical Layer Security in 5G Networks 120 -- 6.1.2 Related Work 121 -- 6.1.3 Motivation 121 -- 6.2 WBPLSec System Model 123 -- 6.2.1 Transmitter 124 -- 6.2.2 Jamming Receiver 126 -- 6.2.3 Secrecy Metrics 126 -- 6.2.4 Secrecy Capacity of WBPLSec 128 -- 6.2.5 Secrecy Capacity of iJAM 129 -- 6.3 Outage Probability of Secrecy Capacity of a Jamming Receiver 131 -- 6.3.1 Simulation Scenario for Secrecy Capacity 134 -- 6.4 WBPLSec Applied to 5G networks 136 -- 6.5 Conclusions 138 -- References 139 -- 7 5G?]…”
Libro electrónico -
302898por Zorrila de San Martin, JosephTabla de Contenidos: “…Id. tipográfica: a.s. n-n- els. a-ue(C) 1766 Q Teatro-Madrid-Legislación-S. XVIII. …”
Publicado 1731
Colección -
302899Publicado 1751Tabla de Contenidos: “…Ruano (margen de las h . 165 r.-166 r.) . c) Notizias de la Puente Don Gonzalo (h . 169 r.…”
Manuscrito -
302900Publicado 2014“…Interactive Simulations: 2-1: Identifying Malware Types 2-2: Securing the BIOS 2-4: Filtering E-mails 3-3: Stopping Services in the Command Prompt 4-1: Securing Web Browsers 5-1: Creating a DMZ 5-3: Defending against the Web Shell 6-1a: Understanding Port Numbers, Part A 6-1b: Understanding Port Numbers, Part B 6-1c: Understanding Port Numbers, Part C 6-2a: Identifying Network Attacks, Part A 6-2b: Identifying Network Attacks, Part B 6-2c: Identifying Network Attacks, Par..…”
Libro electrónico