Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 18
- Mecánica 8
- History 7
- Tragedia griega 7
- Crítica e interpretación 6
- Biblia 5
- Cervantes Saavedra, Miguel de 5
- Droit 5
- Economía 5
- Geografía histórica 5
- Law 5
- Química analítica 5
- Bibliotecas 4
- Bíblia 4
- Computer programming 4
- Construcción 4
- Descripción 4
- Disciplina escolar 4
- Materiales 4
- Novela inglesa 4
- Química 4
- Recht 4
- Calor y frio industrial 3
- Correspondencia comercial 3
- Crítica i interpretació 3
- Descripción y viajes 3
- Descubrimientos y exploraciones 3
- Edición 3
- Fascismo 3
- Finance 3
-
501Publicado 2019“…Common Law, Civil Law, and Colonial Law builds upon the legal historian F.W. Maitland's famous observation that history involves comparison, and that those who ignore every system but their own 'hardly came in sight of the idea of legal history'. …”
Libro electrónico -
502Publicado 2010Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
503por Rash, MichaelTabla de Contenidos: “…INTRODUCING FWKNOP -- fwknop Installation -- fwknop Configuration -- /etc/fwknop/fwknop.conf -- AUTH_MODE -- PCAP_INTF -- PCAP_FILTER -- ENABLE_PCAP_PROMISC -- FIREWALL_TYPE -- PCAP_PKT_FILE -- IPT_AUTO_CHAIN1 -- ENABLE_MD5_PERSISTENCE -- MAX_SPA_PACKET_AGE -- ENABLE_SPA_PACKET_AGING -- REQUIRE_SOURCE_ADDRESS -- EMAIL_ADDRESSES -- GPG_DEFAULT_HOME_DIR -- ENABLE_TCP_SERVER -- TCPSERV_PORT -- /etc/fwknop/access.conf -- SOURCE -- OPEN_PORTS -- PERMIT_CLIENT_PORTS -- ENABLE_CMD_EXEC -- CMD_REGEX -- DATA_COLLECT_MODE -- REQUIRE_USERNAME -- FW_ACCESS_TIMEOUT -- KEY -- GPG_DECRYPT_ID -- GPG_DECRYPT_PW -- GPG_REMOTE_ID -- Example /etc/fwknop/access.conf File -- fwknop SPA Packet Format -- Deploying fwknop -- SPA via Symmetric Encryption -- SPA via Asymmetric Encryption -- GnuPG Key Exchange for fwknop…”
Publicado 2007
Libro electrónico -
504Publicado 2023Tabla de Contenidos: “…5.2.1 Management -- 5.2.2 Workers -- 5.2.3 Data -- 5.2.4 IT -- 5.3 A Brief Review of IoT's Involvement in the Food Industry -- 5.4 Challenges to the Food Industry and Role of IoT -- 5.4.1 Handling and Sorting Complex Data -- 5.4.2 A Retiring Skilled Workforce -- 5.4.3 Alternatives for Supply Chain Management -- 5.4.4 Implementation of IoT in Food and Beverage Manufacturing -- 5.4.5 Pilot -- 5.4.6 Plan -- 5.4.7 Proliferate -- 5.5 Applications of IoT in a Food Industry -- 5.5.1 IoT for Handling of Raw Material and Inventory Control -- 5.5.2 Factory Operations and Machine Conditions Using IoT -- 5.5.3 Quality Control With the IoT -- 5.5.4 IoT for Safety -- 5.5.5 The Internet of Things and Sustainability -- 5.5.6 IoT for Product Delivery and Packaging -- 5.5.7 IoT for Vehicle Optimization -- 5.5.8 IoT-Based Water Monitoring Architecture in the Food and Beverage Industry -- 5.6 A FW Tracking System Methodology Based on IoT -- 5.7 Designing an IoT-Based Digital FW Monitoring and Tracking System -- 5.8 The Internet of Things (IoT) Architecture for a Digitized Food Waste System -- 5.9 Hardware Design: Intelligent Scale -- 5.10 Software Design -- References -- Chapter 6 Opportunities: Machine Learning for Industrial IoT Applications -- 6.1 Introduction -- 6.2 I-IoT Applications -- 6.3 Machine Learning Algorithms for Industrial IoT -- 6.3.1 Supervised Learning -- 6.3.2 Semisupervised Learning -- 6.3.3 Unsupervised Learning -- 6.3.4 Reinforcement Learning -- 6.3.5 The Most Common and Popular Machine Learning Algorithms -- 6.4 I-IoT Data Analytics -- 6.4.1 Tools for IoT Analytics -- 6.4.2 Choosing the Right IoT Data Analytics Platforms -- 6.5 Conclusion -- References -- Chapter 7 Role of IoT in Industry Predictive Maintenance -- 7.1 Introduction -- 7.2 Predictive Maintenance -- 7.3 IPdM Systems Framework and Few Key Methodologies…”
Libro electrónico -
505Publicado 2023Tabla de Contenidos: “…5.2.1 Management -- 5.2.2 Workers -- 5.2.3 Data -- 5.2.4 IT -- 5.3 A Brief Review of IoT's Involvement in the Food Industry -- 5.4 Challenges to the Food Industry and Role of IoT -- 5.4.1 Handling and Sorting Complex Data -- 5.4.2 A Retiring Skilled Workforce -- 5.4.3 Alternatives for Supply Chain Management -- 5.4.4 Implementation of IoT in Food and Beverage Manufacturing -- 5.4.5 Pilot -- 5.4.6 Plan -- 5.4.7 Proliferate -- 5.5 Applications of IoT in a Food Industry -- 5.5.1 IoT for Handling of Raw Material and Inventory Control -- 5.5.2 Factory Operations and Machine Conditions Using IoT -- 5.5.3 Quality Control With the IoT -- 5.5.4 IoT for Safety -- 5.5.5 The Internet of Things and Sustainability -- 5.5.6 IoT for Product Delivery and Packaging -- 5.5.7 IoT for Vehicle Optimization -- 5.5.8 IoT-Based Water Monitoring Architecture in the Food and Beverage Industry -- 5.6 A FW Tracking System Methodology Based on IoT -- 5.7 Designing an IoT-Based Digital FW Monitoring and Tracking System -- 5.8 The Internet of Things (IoT) Architecture for a Digitized Food Waste System -- 5.9 Hardware Design: Intelligent Scale -- 5.10 Software Design -- References -- Chapter 6 Opportunities: Machine Learning for Industrial IoT Applications -- 6.1 Introduction -- 6.2 I-IoT Applications -- 6.3 Machine Learning Algorithms for Industrial IoT -- 6.3.1 Supervised Learning -- 6.3.2 Semisupervised Learning -- 6.3.3 Unsupervised Learning -- 6.3.4 Reinforcement Learning -- 6.3.5 The Most Common and Popular Machine Learning Algorithms -- 6.4 I-IoT Data Analytics -- 6.4.1 Tools for IoT Analytics -- 6.4.2 Choosing the Right IoT Data Analytics Platforms -- 6.5 Conclusion -- References -- Chapter 7 Role of IoT in Industry Predictive Maintenance -- 7.1 Introduction -- 7.2 Predictive Maintenance -- 7.3 IPdM Systems Framework and Few Key Methodologies…”
Libro electrónico -
506
-
507
-
508Publicado 2015Tabla de Contenidos: “…Machine generated contents note: Foreword Ulf Ewaldsson, VP, Ericsson Foreword Lauri Oksanen, VP, Nokia Networks Part 1 : Introduction 1 Overview Madhusanka Liyanage, Mika Ylianttila, Andrei Gurtov 1.1 Present Mobile networks and its Limitations 1.2 Software Defined Mobile Network 1.3 Key Benefits of SDMN 1.4 Conclusion 2 Mobile Network History Brian Brown, Rob Gonzalez, Brian Stanford 2.1 Chapter Overview 2.2 The Evolution of the Mobile Network 2.3 Limitations and Challenges in Current Mobile Networks 2.4 Requirement in future mobile networks 3 Software Defined Networking Concepts Xenofon Foukas, Mahesh K -- Marina, Kimon Kontovasilis 3.1 Introduction 3.2 SDN History and Evolution 3.3 SDN Paradigm and Applications 3.4 Impact of SDN to Research and Industry 4 Wireless Software Defined Networking Claude Chaudet, Yoram Haddad 4.1 Introduction 4.2 SDN for wireless 4.3 Related Works 4.4 Wireless SDN opportunities 4.5 Wireless SDN challenges 4.6 Conclusion 5 Leveraging SDN for The 5G Networks: Trends, Prospects and Challenges Akram Hakiri, Pascal Berthou 5.1 Introduction 5.2 Evolution of the Wireless Communication towards the 5G 5.3 Software-Defined Networks 5.4 Network Function Virtualization 5.5 Information-Centric Networking 5.6 Mobile and Wireless Networks 5.7 Cooperative Cellular Networks 5.8 Unification of the control plane 5.9 Supporting automatic QoS provisioning 5.10 Cognitive Network Management and Operation 5.11 Role of Satellites in the 5G networks 5.12 Conclusion Part II : SDMN Architectures and Network implementation 6 LTE architecture integration with SDN Jose Costa-Requena, Raimo Kantola, Jesús Llorente Santos, Vicent Ferrer Guasch, Maël Kimmerlin, Antti Mikola, Jukka Manner 6.1 Chapter Overview 6.2 Restructuring mobile networks to SDN 6.3 Mobile Backhaul Scaling 6.4 Security and distributed FW 6.5 SDN and LTE integration benefits 6.6 SDN and LTE integration benefits for end users 6.7 Related work and Research questions 6.8 Conclusions 7 EPC in the Cloud James Kempf, Kumar Balachandran 7.1 Introduction 7.1.3 SDN and Cross-domain Service Development 7.2 EPC in the Cloud Version 1.0 7.3 EPC in the Cloud Version 2.0? …”
Libro electrónico -
509Publicado 2018Tabla de Contenidos: “…Launching the network device -- The VyOS role -- Running the playbook -- Summary -- Questions -- Further reading -- Chapter 8: Moving to the Cloud -- Technical requirements -- Interacting with DigitalOcean -- Generating a personal access token -- Installing dopy -- Launching a Droplet -- Running the playbook -- WordPress on DigitalOcean -- The host inventory -- Variables -- The playbook -- The droplet role -- Running the playbook -- Summary -- Questions -- Further reading -- Chapter 9: Building Out a Cloud Network -- Technical requirements -- An introduction to AWS -- Amazon Virtual Private Cloud overview -- Creating an access key and secret -- The VPC playbook -- The VPC role -- The subnets role -- The internet gateway role -- The security group role -- The ELB role -- Summary -- Questions -- Further reading -- Chapter 10: Highly Available Cloud Deployments -- Technical requirements -- Planning the deployment -- Costing the deployment -- WordPress considerations and high availability -- The playbook -- Amazon VPC -- Amazon RDS -- Amazon EFS -- Testing the playbook -- Terminating resources -- EC2 instances -- Instance discovery -- New deployment -- Existing deployment -- Stack -- Default variables -- Deploy -- WordPress -- AMI -- Autoscaling -- Running the playbook -- Terminating all the resources -- Summary -- Questions -- Further reading -- Chapter 11: Building Out a VMware Deployment -- Technical requirements -- An introduction to VMware -- The VMware modules -- Requirements -- vCloud Air -- The vca_fw module -- The vca_nat module -- The vca_vapp module -- VMware vSphere -- The vmware_cluster module -- The vmware_datacenter module -- The vmware_vm_facts module -- The vmware_vm_shell module -- The vmware_vm_vm_drs_rule module -- The vmware_vm_vss_dvs_migrate module -- The vsphere_copy module -- The vsphere_guest module -- VMware vCentre…”
Libro electrónico -
510Publicado 2023Tabla de Contenidos: “…Tracing and analyzing debug logs -- Real-time resolution using ChatGPT -- Debugging best practices and continuous improvement -- Summary -- 14 -- What You've Learned and What's Next -- A journey recapped -- The current landscape of generative AI -- Conjectures on generative AI's evolution -- The future of Salesforce development with generative AI -- Appendix A: Case Study -- Problem statement -- Assumptions -- Creating epics -- User stories -- Decomposing user stories -- Integrate Snowflake data with Salesforce account pages -- Display Snowflake information on Salesforce account pages -- Email functionality with Snowflake data -- Feedback mechanism for incorrect Snowflake information -- Integrate the Snowflake summary with Slack -- Providing reporting capabilities for the account and Snowflake information -- Compliance, security, and performance considerations -- User training and documentation -- Appendix B: A Deep Dive Into ChatGPT and User Stories -- Defining the process -- Sample user stories -- Requirements for user stories -- Index -- Other Books You May Enjoy -- _k8rm0fhhz2ea -- _xawt0n4enz72 -- _u4perea5435d -- _24dd1sp141ej -- _5llc259z0o2s -- _49k8v3yix0qq -- _prw104f50ez4 -- _kmiiy977wqaq -- _hnhfhv3mo3j1 -- _w7dxkr8nrdul -- _xyxm94aeqlbm -- _esok6g8djui1 -- _hn4v23h4s0dk -- _57w050msxawk -- _z8pcmfrbiry2 -- _46o0bkjfpehn -- _7ap5asnwo398 -- _7zcbyt2rmj8c -- _fc0satk9k3mn -- _sgqpe5s8ssmr -- _97z54wj6tc8u -- _u6wa4xch17mm -- _agxs3t9iecpv -- _mrsrmzpqtpx -- _d7f8ya60t4qh -- _mjz67uf1mm2q -- _t3jlpasccmx3 -- _l55ii0qz54e3 -- _iq9ve278gdrj -- _n43rkj6l6wra -- _5vmogh4dqw8w -- _yw7z06c8dyxm -- _4s8zsuf61cle -- _ciqpwlsh1287 -- _7fu2fh8cqitm -- _uqzgmo74pp9 -- _q2859qwjutpe -- _v8cym3r5ntej -- _4l9tnbyn5gen -- _o9kr5c68fw7a -- _fi1ypgi2xpl8 -- _7fo5yqqwuq3d -- _32fycl8z376u -- _iddrt8o5gve2 -- _bazb0q6ytq7y -- _1949k9g8e7jw…”
Libro electrónico -
511Publicado 2023“…By the end of this book, you’ll have learned how to analyze popular systems and security appliance logs that exist in any environment and explore various attackers' techniques to detect and investigate them with ease.What you will learnGet familiarized with and investigate various threat types and attacker techniquesAnalyze email security solution logs and understand email flow and headersPractically investigate various Windows threats and attacksAnalyze web proxy logs to investigate C&C communication attributesLeverage WAF and FW logs and CTI to investigate various cyber attacksWho this book is forThis book is for Security Operation Center (SOC) analysts, security professionals, cybersecurity incident investigators, incident handlers, incident responders, or anyone looking to explore attacker techniques and delve deeper into detecting and investigating attacks. …”
Libro electrónico