Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 496
- Engineering & Applied Sciences 474
- Filosofía 453
- Application software 431
- Management 426
- History 420
- Historia 409
- Computer Science 340
- Computer networks 312
- Examinations 277
- Cloud computing 272
- Artificial intelligence 240
- Data processing 227
- Certification 226
- Python (Computer program language) 224
- Machine learning 214
- Security measures 208
- Computer security 185
- Computer programming 184
- Computer software 172
- Design 172
- Computer programs 170
- Electronic data processing personnel 170
- Information technology 161
- Leadership 159
- Philosophy 159
- Database management 145
- Microsoft .NET Framework 142
- RELIGION 140
- Big data 139
-
13601
-
13602
-
13603
-
13604
-
13605
-
13606
-
13607
-
13608Publicado 2021Libro electrónico
-
13609
-
13610por Leirvik, Ryan“…When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. …”
Publicado 2023
Libro electrónico -
13611por Smart, Julian“…–Mitch Kapor, founder of Lotus Software and the Open Source Applications Foundation Build advanced cross-platform applications that support native look-and-feel on Windows, Linux, Unix, Mac OS X, and even Pocket PC Master wxWidgets from start to finish–even if you've never built GUI applications before Leverage advanced wxWidgets capabilities: networking, multithreading, streaming, and more CD-ROM: library of development tools, source code, and sample applications Foreword by Mitch Kapor, founder, Lotus Development and Open Source Application Foundation wxWidgets is an easy-to-use, open source C++ API for writing GUI applications that run on Windows, Linux, Unix, Mac OS X, and even Pocket PC–supporting each platform's native look and feel with virtually no additional coding. …”
Publicado 2005
Libro electrónico -
13612Publicado 2007“…Foundation Learning for CCVP IP Telephony Jeremy Cioara, CCIE® No. 11,727 Cisco IP Telephony (CIPT) , Second Edition, is a Cisco®-authorized, self-paced learning tool for CCVP IP telephony foundation learning. …”
Libro electrónico -
13613
-
13614
-
13615por Barragán, Luis, 1902-1988“…Por primera vez desde el fallecimiento de Barragán, el acervo de dibujos, documentos y fotografías originales de sus archivos, conservados en la Barragan Foundation, Suiza, ha sido puesto a disposición de un grupo de estudiosos de prestigio internacional para una investigación sistemática. …”
Publicado 2001
Libro -
13616por Teare, Diane“…For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. …”
Publicado 2005
Libro electrónico -
13617Publicado 2013“…And they are the rock-solid foundation on which stand leadership success and all that comes with it. …”
Libro electrónico -
13618Publicado 2017Tabla de Contenidos: “…2.2.2 The Role of Networks 47 -- 2.2.3 The Role of Apps 50 -- 2.2.4 UE Application Development 52 -- 2.2.5 Developers 55 -- 2.2.6 The Role of the SIM/UICC 56 -- 2.2.7 Challenges of Legislation 57 -- 2.2.8 Updating Standards 58 -- 2.2.9 3GPP System Evolution 58 -- 2.3 GSM 59 -- 2.3.1 The SIM 60 -- 2.3.2 Authentication and Authorization 62 -- 2.3.3 Encryption of the Radio Interface 63 -- 2.3.4 Encryption of IMSI 65 -- 2.3.5 Other GSM Security Aspects 65 -- 2.4 UMTS/HSPA 66 -- 2.4.1 Principles of 3G Security 66 -- 2.4.2 Key Utilization 68 -- 2.4.3 3G Security Procedures 69 -- 2.5 Long Term Evolution 71 -- 2.5.1 Protection and Security Principles 71 -- 2.5.2 X.509 Certificates and Public Key Infrastructure (PKI) 71 -- 2.5.3 IPsec and Internet Key Exchange (IKE) for LTE Transport Security 72 -- 2.5.4 Traffic Filtering 73 -- 2.5.5 LTE Radio Interface Security 74 -- 2.5.6 Authentication and Authorization 78 -- 2.5.7 LTE/SAE Service Security / Case Examples 79 -- 2.5.8 Multimedia Broadcast and Multicast Service (MBMS) and enhanced MBMS (eMBMS) 83 -- 2.6 Security Aspects of Other Networks 91 -- 2.6.1 CDMA (IS‐95) 91 -- 2.6.2 CDMA2000 93 -- 2.6.3 Broadcast Systems 94 -- 2.6.4 Satellite Systems 94 -- 2.6.5 Terrestrial Trunked Radio (TETRA) 95 -- 2.6.6 Wireless Local Area Network (WLAN) 96 -- 2.7 Interoperability 102 -- 2.7.1 Simultaneous Support for LTE/SAE and 2G/3G 102 -- 2.7.2 VoLTE 105 -- 2.7.3 CS Fallback 105 -- 2.7.4 Inter‐operator Security Aspects 106 -- 2.7.5 Wi‐Fi Networks and Offload 106 -- 2.7.6 Femtocell Architecture 108 -- References 109 -- 3 Internet of Things 112 -- 3.1 Overview 112 -- 3.2 Foundation 113 -- 3.2.1 Definitions 113 -- 3.2.2 Security Considerations of IoT 115 -- 3.2.3 The Role of IoT 115 -- 3.2.4 IoT Environment 117 -- 3.2.5 IoT Market 120 -- 3.2.6 Connectivity 121 -- 3.2.7 Regulation 122 -- 3.2.8 Security Risks 123 -- 3.2.9 Cloud 128 -- 3.2.10 Cellular Connectivity 129 -- 3.2.11 WLAN 133 -- 3.2.12 Low‐Range Systems 133 -- 3.3 Development of IoT 140.…”
Libro electrónico -
13619por Cheng, Siu-Wing“…In addition to introducing the theoretical foundation of meshing, the text discusses practical issues associated with the use of these algorithms and explores new developments in guaranteed meshing. …”
Publicado 2013
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
13620por Sirczuk, Matías“…This book by Matías Sirczuk explores the themes of foundation and legitimacy in modern political thought through the works of Carl Schmitt, Hannah Arendt, and Claude Lefort. …”
Publicado 2017
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico