Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 30
- Computer security 26
- Environmental aspects 23
- carbon footprint 21
- Management 20
- Penetration testing (Computer security) 20
- sustainability 20
- Security measures 19
- Application software 18
- Technology: general issues 16
- Development 15
- History of engineering & technology 14
- climate change 14
- Engineering & Applied Sciences 13
- Data processing 12
- Information technology 12
- Hackers 10
- Certification 9
- Computer-aided design 9
- IBM computers 9
- Research & information: general 9
- Sustainability 9
- Sustainable development 9
- Architectural drawing 8
- Autodesk Revit 8
- China 8
- Cloud computing 8
- Computer graphics 8
- circular economy 8
- energy efficiency 8
-
461Operations management for dummiesOperations Management For DummiesPublicado 2022“…Other new stuff inside: supply chain traceability, ethical sourcing and carbon footprint, business resiliency, and modularizing the supply chain. …”
Libro electrónico -
462Publicado 2011“…The goal of the book is to bring nuclear power to our readers as one of the promising energy sources that has a unique potential to meet energy demands with minimized environmental impact, near-zero carbon footprint, and competitive economics via robust potential applications. …”
Libro electrónico -
463Publicado 2018“…By using this concept and focusing on real-world problems exemplified by sports data sets and statistics, this book seeks to help you take advantage of the hash object productively, in particular, but not limited to, the following tasks: select proper hash tools to perform hash table operations use proper hash table operations to support specific data management tasks use the dynamic, run-time nature of hash object programming understand the algorithmic principles behind hash table data look-up, retrieval, and aggregation learn how to perform data aggregation, for which the hash object is exceptionally well suited manage the hash table memory footprint, especially when processing big data use hash object techniques for other data processing tasks, such as filtering, combining, splitting, sorting, and unduplicating. …”
Libro electrónico -
464Publicado 2022“…Every feature of this book supports both efficient exam preparation and long-term mastery: * Opening topics lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives * Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success * Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career * Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including * Ethical hacking basics * Technical foundations of hacking * Footprinting and scanning * Enumeration and system hacking * Social engineering, malware threats, and vulnerability analysis * Sniffers, session hijacking, and denial of service * Web server hacking, web applications, and database attacks * Wireless technologies, mobile security, and mobile attacks * IDS, firewalls, and honeypots * Cryptographic attacks and defenses * Cloud computing, IoT, and botnets…”
Libro electrónico -
465Publicado 2017“…The heavier the digital footprint, the more complicated it is to rein it all in. …”
Libro electrónico -
466Publicado 2020“…Every feature of this book supports both efficient exam preparation and long-term mastery: · Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives · Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success · Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career · Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including · Ethical hacking basics · Technical foundations of hacking · Footprinting and scanning · Enumeration and system hacking · Social engineering, malware threats, and vulnerability analysis · Sniffers, session hijacking, and denial of service · Web server hacking, web applications, and database attacks · Wireless technologies, mobile security, and mobile attacks · IDS, firewalls, and honeypots · Cryptographic attacks and defenses · Cloud computing, IoT, and botnets…”
Libro electrónico -
467por Forthun, Colin“…Going forward, the government needs to contain public expenditure growth and improve public administration efficiency to reduce the public “footprint” on the economy and allow lower taxes. Key areas that warrant intensified efforts are public administration and health. …”
Publicado 2010
Capítulo de libro electrónico -
468por Kornilov, Dmitry“…This book will show you how to take full advantage of the cloud by optimizing applications with fast start times, low memory consumption, and a small disk footprint. The open-source Helidon framework provides all that, and more. …”
Publicado 2023
Libro electrónico -
469Publicado 2003“…The result is a highly portable, small-footprint application development environment that brings the unique capabilities of Java technology, including platform independence and enhanced security, to the rapidly growing wireless market. …”
Libro electrónico -
470Publicado 2011“…Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authentication technologies See how real-world session attacks leak sensitive data and how to fortify your applications Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments Safety deploy XML, social networking, cloud computing, and Web 2.0 services Defend against RIA, Ajax, UGC, and browser-based, client-side exploits Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures…”
Libro electrónico -
471Publicado 2014“…These benefits include better user experience, server and application consolidation, development cycle reduction, application scalability, data center footprint savings, and improved price performance economics. …”
Libro electrónico -
472Publicado 2018“…The z14 ZR1 is designed for enhanced modularity, in an industry standard footprint. A data-centric infrastructure must always be available with a 99.999% or better availability, have flawless data integrity, and be secured from misuse. …”
Libro electrónico -
473Publicado 2019“…Two integrated memory controllers that allow double the memory footprint of IBM POWER8® processor-based servers. An integrated I/O subsystem and hot-pluggable Peripheral Component Interconnect Express (PCIe) Gen4 and Gen3 I/O slots. …”
Libro electrónico -
474Publicado 2024“…Elixir is a functional language with a fairly small footprint. This makes it easier to learn and put into production than other languages. …”
Libro electrónico -
475Publicado 2002“…With the SAX2 API, developers have access to the information in XML documents as they are read, without imposing major memory constraints or a large code footprint. SAX2 is often used by other APIs "under the covers", and provides a foundation for processing and creating both XML and non-XML information. …”
Libro electrónico -
476Publicado 2022“…This comprehensive guide is written by two data literacy pioneers, each with a thorough footprint within the data and analytics commercial world and lectures at top universities in the US and the Netherlands. …”
Grabación no musical -
477“…This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. …”
Libro electrónico -
478por Prag, Andrew“…Although difficult to demonstrate empirically, the conditions that could lead to such effects are described conceptually in the report, noting particularities of certain types of schemes such as quantitative footprints. The report also documents a range of ways that government and non-government bodies have responded to ELIS multiplication, such as mutual recognition of schemes and creation of “focal” schemes or standards that can lead to market convergence. …”
Publicado 2016
Capítulo de libro electrónico -
479Publicado 2016“…A major change with the introduction of the DS8880 is the reduction of the footprint to a 19-inch rack. Like its predecessors, the DS8880 supports advanced disaster recovery (DR) solutions, business continuity solutions, and thin provisioning. …”
Libro electrónico -
480Publicado 2014“…The MQTT protocol is simple, which results in a client library with a low footprint. MQTT was proposed as an Organization for the Advancement of Structured Information Standards (OASIS) standard. …”
Libro electrónico