Mostrando 26,861 - 26,880 Resultados de 32,755 Para Buscar '"Oriente"', tiempo de consulta: 0.21s Limitar resultados
  1. 26861
    Publicado 2020
    Tabla de Contenidos: “…Acceptance/Rejection Decision -- Prolonging Negotiation and Renegotiation -- Chapter Capstone -- Part II: Negotiation Skills -- Chapter 5: Understanding Personality and Motivation -- Individual Differences -- Implicit Theories -- Acoustic and Visual Cues -- "Big 5" Personality Traits -- Psychopathic Personality Traits -- Dyadic Interaction -- Attachment Style -- Motivational Orientation -- Cooperative Negotiator -- Competitive Negotiator -- Individualistic Negotiator -- Strategic Issues concerning Motivational Style -- Gender and Negotiation -- Economic Outcomes -- Opening Offers -- Initiating Negotiations -- The Backlash Effect -- The Costs of "Leaning In" -- Lying and Misrepresentation -- Discrimination -- Gender and Third-Party Dispute Resolution -- Leveling the Playing Field -- Chapter Capstone -- Chapter 6: Managing Emotions and Contentious Negotiations -- Emotions -- Genuine versus Strategic Emotion -- Anger -- Disappointment -- Sadness -- Ambivalence -- Positive Emotion -- Happiness -- Emotional Consistency -- Emotional Intelligence -- Managing Emotions at the Table -- Disputes -- Interests, Rights, and Power Model -- Time Course of Interests, Rights, and Power -- Strategic Issues concerning Interests, Rights, and Power -- Refocusing -- High Costs Associated with Power and Rights -- When to Use Rights and Power -- How to Use Rights and Power -- Social Dilemmas -- Social Dilemmas in Business -- Prisoner's Dilemma -- Actual Behavior in Dilemmas -- Tit-for-Tat -- Inducing Trust and Cooperation in Social Dilemmas -- Restoring Broken Trust -- How to Encourage Cooperation in Social Dilemmas When Parties Should Not Collude -- Chapter Capstone -- Chapter 7: Establishing Trust and Building Relationships -- Money versus Relationships -- Subjective Value -- Rapport -- Sequential Negotiations and Bargaining History -- Trust and Temptation…”
    Libro electrónico
  2. 26862
    Publicado 2023
    Tabla de Contenidos: “…11.4.2 Innovation Design Feasibility -- 11.4.3 Innovation Design Stages -- 11.4.4 Innovation Compatibility -- 11.4.5 Administrative Compatibility -- 11.4.6 Technical Compatibility -- 11.4.7 Workforce Integration Strategies -- 11.4.8 Hybridization of Innovation Cultures -- 11.5 Innovation Quality Interfaces -- 11.5.1 Innovation Accountability -- 11.5.2 Design of Quality -- 11.5.3 Evaluation of Innovation Quality -- 11.5.4 Justification of Innovation -- 11.5.5 Earned Value Technique for Innovation -- 11.5.6 Integration of Innovation -- 11.6 Badiru's Umbrella Model for Innovation Management -- 11.6.1 Umbrella Theory for Innovation -- 11.7 Innovation Readiness Measure -- References -- Chapter 12 Learning Curves in Research Management -- 12.1 Introduction -- 12.2 Badiru's Half-Life Theory of Learning Curves -- 12.3 Human-Technology Performance Degradation -- 12.4 Half-Life Derivations -- 12.4.1 Half-life of the Log-Linear Model -- 12.5 Half-Life Computational Examples -- 12.6 Half-Life of Decline Curves -- 12.7 Research Learning Perspective -- References -- Appendix A: Research-oriented Academies of the World -- Appendix B: Conversion Factors for Research Management -- Index…”
    Libro electrónico
  3. 26863
    Publicado 2024
    Tabla de Contenidos: “…Building future-proof extendable and reusable architecture -- Ensuring architectural interoperability and portability -- Making applications interoperable -- Making applications portable -- Applying automation everywhere -- Plan for business continuity -- Design for operation -- Overcoming architectural constraints -- Taking the MVP approach -- Summary -- Chapter 3: Cloud Migration and Cloud Architecture Design -- Public, private, and hybrid clouds -- Solution architecture in the public cloud -- The public cloud architecture -- Popular public cloud providers -- Cloud-native architecture -- Designing cloud-native architecture -- Creating a cloud migration strategy -- Lift and shift migration -- Rehost -- Replatform -- Relocate -- The cloud-native approach -- Refactor -- Repurchase -- Retain or retire -- Retain -- Retire -- Choosing a cloud migration strategy -- Steps for cloud migration -- Discovering your portfolio and workloads -- Analyzing the information -- Creating a migration plan -- Designing the application -- Executing application migration to the cloud -- Data migration -- Server migration -- Integrating, validating, and cutover -- Validation -- Integration -- The cutover process -- Operating the cloud application -- Application optimization in the cloud -- Creating a hybrid cloud architecture -- Taking a multi-cloud approach -- Implementing CloudOps -- CloudOps pillars -- Summary -- Further reading -- Chapter 4: Solution Architecture Design Patterns -- Building an n-tier layered architecture -- The web layer -- The application layer -- The database layer -- Creating a multi-tenant SaaS-based architecture -- Understanding service-oriented architecture -- RESTful web service architecture -- Building a RESTful-architecture-based e-commerce website -- Building a cache-based architecture…”
    Libro electrónico
  4. 26864
    Publicado 2022
    Tabla de Contenidos: “…-- Zachman Framework -- The Open Group Architecture Framework -- Military-Oriented Architecture Frameworks -- Other Frameworks -- ITIL -- Six Sigma…”
    Libro electrónico
  5. 26865
    por Varma, Sumati
    Publicado 2015
    Tabla de Contenidos: “…INTERNATIONAL TRADE CREDIT -- TRADE PROMOTION IN INDIA -- Organizations for Export Promotion -- Export Incentives -- Marketing Assistance -- Market Development Assistance -- Market Access Initiative -- Foreign Exchange -- Trade Fairs and Exhibitions -- Export Risk Insurance -- Production Assistance/Facilities -- Special Economic Zones (SEZs) -- Export Processing Zones -- Free Trade Zone (Ftz) -- Export-oriented Unit (Eou) -- Export Houses -- Special Economic Zone -- KEY TERMS -- DISCUSSION QUESTIONS -- Chapter 8 REGIONAL ECONOMIC INTEGRATION -- INTRODUCTION -- LEVELS OF ECONOMIC INTEGRATION -- Free Trade Area (FTA) -- Customs Union -- Common Market -- Economic Union -- Political Union -- EFFECTS OF INTEGRATION -- Trade Creation and Trade Diversion -- Reduced Import Prices -- Increased Competition and Economies of Scale -- Higher Factor Productivity -- REGIONAL TRADING AGREEMENTS-A GLOBAL OVERVIEW -- European Union (EU) -- Euro -- NORTH AMERICAN FREE TRADE AGREEMENT (NAFTA) -- NAFTA Provisions -- Importance of NAFTA -- CARICOM -- MERCOSUR -- ANDEAN PACT -- ASSOCIATION OF SOUTHEAST ASIAN NATIONS (ASEAN) -- Objectives of ASEAN -- ASEAN Achievements -- ASIA-PACIFIC ECONOMIC COOPERATION FORUM (APEC) -- SOUTH ASIAN ASSOCIATION FOR REGIONALCOOPERATION (SAARC) -- CLOSER ECONOMIC RELATIONS (CER) -- AFRICA -- COMMODITY ARRANGEMENTS -- Multi Fibre Arrangement (MFA) -- Organization of Petroleum Exporting Countries (OPEC) -- KEY TERMS -- DISCUSSION QUESTIONS -- Chapter 9 INTERNATIONAL FINANCIAL SYSTEM -- INTRODUCTION -- BASICS OF FOREIGN EXCHANGE -- Exchange Rate Determination -- Fixed and Flexible Exchange Rate Systems -- Currency Convertibility -- EVOLUTION OF THE MONETARY SYSTEM -- The Gold Standard (1876-1914) -- The Inter-war Years and World War II (1914-44) -- The Bretton Woods System (1944-73) -- The Post-Bretton Woods System:1973-Present…”
    Libro electrónico
  6. 26866
    Publicado 2020
    Tabla de Contenidos: “…-- Le poids financier des Guerres civiles -- Un monnayage particulier : les émissions au type de Marcus Tullius Cicéron -- La Lydie face au régime du Principat -- L'organisation administrative de la Lydie au ter siècle -- Le koinon d'Asie -- Les conuentus "lydiens" -- Innovation romaine et héritage attalide -- Une répartition à l'image de la mosaïque lydienne -- Poliadisation et "hellénisation" de la Lydie -- Fondation ou élévation civique : les témoignages monétaires -- Une "hellénisation" qui progresse : le cas des monétaires -- Du chalque à l'assarion -- Les conséquences de la réforme monétaire d'Auguste en Orient -- Les principales caractéristiques du système monétaire provincial -- Les ateliers lydiens au début du Principat -- Le Princeps, un basileus de plus ? …”
    Libro
  7. 26867
    Publicado 2014
    Tabla de Contenidos: “…Chatzinikolaou Reconstructing Early Colonial Identity: Funerary Space in Archaic Gela (Sicily): Claudia Lambrugo El área funeraria del suburbio oriental de Tarraco (siglos I-III d.C.): Judit Ciurana, Emilio Provinciale, Maite Salagaray…”
    Libro
  8. 26868
    Publicado 1990
    Revista
  9. 26869
    Publicado 1936
    Libro
  10. 26870
    Publicado 2020
    Tabla de Contenidos: “…Democracy -- 2.2. Japanese group-oriented culture -- 3. Material and method -- 3.1. …”
    Libro electrónico
  11. 26871
    Publicado 1947
    Tabla de Contenidos: “…Les esglésies romàniques del Maresme Oriental / per J. M. Pons i Guri. Saint-Mokios de Constantinople, refuge de l'astrologie / per Gabriel Millet. …”
    Libro
  12. 26872
    por Ratcliff, Marc J.
    Publicado 2019
    Tabla de Contenidos: “…L'historiographie de la découverte et du laboratoire -- Une méthodologie entre microgenèse et microhistoire -- Les transformations du savant -- Les deux modes du contrôle de l'action : descendant (top-down) et ascendant (bottom-up) -- Dynamique de confinement et dynamique de relation -- De la retraite hors du social à la dynamique de confinement -- Confinement et relation, principes de l'auteur et de l'acteur -- La dynamique de relation -- Des objets de langage aux processus textuels -- Dynamique de confinement de la transmission du savoir à la construction de la découverte -- Les organismes invisibles au dix-huitième siècle -- L'héritage d'une historiographie -- Le renouveau des recherches microscopiques des années 1740 -- De nouveaux instruments et un nouveau marché -- L'effet Trembley et la circulation du protocole expérimental antispontanéiste -- La recherche microscopique de 1745 à 1765 -- Les travaux de John Turberville Needham -- Les détournements de la communication scientifique -- La recherche microscopique : un enjeu européen -- Les premières recherches microscopiques de Saussure -- La réponse épistémologique : les Considérations de Bonnet -- Épistémologie et découverte -- La formation de Saussure -- Les principes épistémologiques des sciences de la vie au dix-huitième siècle -- La "règle de l'exception" face aux "théories de la génération" -- Le principe de ségrégation des espèces -- Le principe de Bonnet -- "L'observation chargée de théorie" au dix-huitième siècle -- Esprit d'observation et esprit de système -- Le principe de Bonnet : une protection contre l'"observation chargée de théorie" -- Le principe de subordination de la théorie à la méthode -- Les intérêts transversaux au dix-huitième siècle -- Théories de la génération et principes épistémologiques -- Construction, découverte et confinement -- L'entrée en confinement -- Le processus textuel souche : la consignation immédiate des traces -- Les préparations empiriques -- L'organisation du texte comme obstacle -- Le déroulement de l'enquête -- Des schémas empiriques stables -- Procédures et catégories -- Une nouvelle orientation : le Saggio de Spallanzani -- La rupture du 16 septembre : les ascriptions de la découverte -- Nommer l'espèce -- Les contrepoints de l'expérimentation -- Les transformations du savant -- Le confinement comme régulation sociale -- Envisionnement et transformations catégoréelles -- Disjoindre la catégoréalité, construire le contexte de réalité -- Confiner l'invisible -- La conversion du causal dans l'agir téléonomique -- La sémantisation de l'enquête -- Dits et silences de l'expérience du texte -- L'invention de la procédure de réclusion -- La prudence épistémologique au coeur de l'héritage bonnetien -- Les ascriptions du cadre théorique -- Conceptualiser la division : le retour du contrôle descendant -- Épilogue : La reprise des observations sur la génération spontanée -- Conclusion : Un parcours oublié : agir, écrire, penser -- Une triade d'expériences pour affronter l'inconnu -- De l'auteur à l'acteur : la tri-construction de la découverte -- Saussure en perspective : retour sur les modèles contemporains de la découverte…”
    Electrónico
  13. 26873
    por Mueller, John Paul
    Publicado 2020
    Tabla de Contenidos: “…Microsoft Cognitive Toolkit/CNTK -- Understanding TensorFlow -- Grasping why TensorFlow is so good -- Making TensorFlow easier by using TFLearn -- Using Keras as the best simplifier -- Getting your copy of TensorFlow and Keras -- Fixing the C++ build tools error in Windows -- Accessing your new environment in Notebook -- Book 2 Interacting with Data Storage -- Chapter 1 Manipulating Raw Data -- Defining the Data Sources -- Obtaining data locally -- Using online data sources -- Employing dynamic data sources -- Considering other kinds of data sources -- Considering the Data Forms -- Working with pure text -- Accessing formatted text -- Deciphering binary data -- Understanding the Need for Data Reliability -- Chapter 2 Using Functional Programming Techniques -- Defining Functional Programming -- Differences with other programming paradigms -- Understanding its goals -- Understanding Pure and Impure Languages -- Using the pure approach -- Using the impure approach -- Comparing the Functional Paradigm -- Imperative -- Procedural -- Object-oriented -- Declarative -- Using Python for Functional Programming Needs -- Understanding How Functional Data Works -- Working with immutable data -- Considering the role of state -- Eliminating side effects -- Passing by reference versus by value -- Working with Lists and Strings -- Creating lists -- Evaluating lists -- Performing common list manipulations -- Understanding the Dict and Set alternatives -- Considering the use of strings -- Employing Pattern Matching -- Looking for patterns in data -- Understanding regular expressions -- Using pattern matching in analysis -- Working with pattern matching -- Working with Recursion -- Performing tasks more than once -- Understanding recursion -- Using recursion on lists -- Considering advanced recursive tasks -- Passing functions instead of variables…”
    Libro electrónico
  14. 26874
    Publicado 2018
    Tabla de Contenidos: “…Code injection fundamentals - fine-tuning with BDF -- Trojan engineering with BDF and IDA -- Summary -- Questions -- Further reading -- Chapter 11: Bypassing Protections with ROP -- Technical requirements -- DEP and ASLR - the intentional and the unavoidable -- Understanding DEP -- Understanding ASLR -- Testing DEP protection with WinDbg -- Demonstrating ASLR on Kali Linux with C -- Introducing return-oriented programming -- Borrowing chunks and returning to libc - turning the code against itself -- The basic unit of ROP - gadgets -- Getting cozy with our tools - MSFrop and ROPgadget -- Metasploit Framework's ROP tool - MSFrop -- Your sophisticated ROP lab - ROPgadget -- Creating our vulnerable C program without disabling protections -- No PIE for you - compiling your vulnerable executable without ASLR hardening -- Generating a ROP chain -- Getting hands-on with the return-to-PLT attack -- Extracting gadget information for building your payload -- Finding the .bss address -- Finding a pop pop ret structure -- Finding addresses for system@plt and strcpy@plt functions -- Finding target characters in memory with ROPgadget and Python -- Go, go, gadget ROP chain - bringing it together for the exploit -- Finding the offset to return with gdb -- Writing the Python exploit -- Summary -- Questions -- Further reading -- Chapter 12: Fuzzing Techniques -- Technical requirements -- Network fuzzing - mutation fuzzing with Taof proxying -- Configuring the Taof proxy to target the remote service -- Fuzzing by proxy - generating legitimate traffic -- Hands-on fuzzing with Kali and Python -- Picking up where Taof left off with Python - fuzzing the vulnerable FTP server -- The other side - fuzzing a vulnerable FTP client -- Writing a bare-bones FTP fuzzer service in Python -- Crashing the target with the Python fuzzer -- Fuzzy registers - the low-level perspective…”
    Libro electrónico
  15. 26875
    Publicado 2018
    Tabla de Contenidos: “…The uses of proxies -- Summary -- Chapter 8: Classes -- Understanding object-oriented JavaScript -- The JavaScript data types -- Creating objects -- Understanding the prototypal inheritance model -- The constructors of primitive data types -- Using classes -- Defining a class -- The class declaration -- The class expression -- The prototype methods -- Getters and setters -- The generator method -- Static methods -- Implementing inheritance in classes -- Computed method names -- The attributes of properties -- Classes are not hoisted! …”
    Libro electrónico
  16. 26876
    Publicado 2018
    Tabla de Contenidos: “…Starting Nexpose -- Start a scan -- Exploitation -- Post-exploitation -- Infrastructure analysis -- Pillaging -- High-profile targets -- Data exfiltration -- Persistence -- Further penetration into infrastructure -- Cleanup -- Reporting -- Executive summary -- Technical report -- Penetration testing limitations and challenges -- Pentesting maturity and scoring model -- Realism -- Methodology -- Reporting -- Summary -- Chapter 2: Advanced Linux Exploitation -- Linux basics -- Linux commands -- Streams -- Redirection -- Linux directory structure -- Users and groups -- Permissions -- The chmod command -- The chown command -- The chroot command -- The power of the find command -- Jobs, cron, and crontab -- Security models -- Security controls -- Access control models -- Linux attack vectors -- Linux enumeration with LinEnum -- OS detection with Nmap -- Privilege escalation -- Linux privilege checker -- Linux kernel exploitation -- UserLand versus kernel land -- System calls -- Linux kernel subsystems -- Process -- Threads -- Security-Enhanced Linux -- Memory models and the address spaces -- Linux kernel vulnerabilities -- NULL pointer dereference -- Arbitrary kernel read/write -- Case study CVE-2016-2443 Qualcomm MSM debug fs kernel arbitrary write -- Memory corruption vulnerabilities -- Kernel stack vulnerabilities -- Kernel heap vulnerabilities -- Race conditions -- Logical and hardware-related bugs -- Case study CVE-2016-4484 - Cryptsetup Initrd root Shell -- Linux Exploit Suggester -- Buffer overflow prevention techniques -- Address space layout randomization -- Stack canaries -- Non-executable stack -- Linux return oriented programming -- Linux hardening -- Summary -- Chapter 3: Corporate Network and Database Exploitation -- Networking fundamentals -- Network topologies -- Bus topology -- Star topology -- Ring topology -- Tree topology…”
    Libro electrónico
  17. 26877
    Publicado 2018
    Tabla de Contenidos: “…. -- Chapter 4: Understanding OOP Concepts -- Object-oriented programming -- Creating a class -- Using the built-in class attributes -- Accessing class variables in instance methods -- Instances -- Using classes in GUI -- How to do it... -- How it works... -- Making the application more elaborate -- Inheritance -- Types of inheritance -- Using single inheritance -- Getting ready -- How to do it... -- How it works... -- Using multilevel inheritance -- Getting ready -- How to do it... -- How it works... -- Using multiple inheritance -- Getting ready -- How to do it... -- How it works... -- Chapter 5: Understanding Dialogs -- Introduction -- The input dialog box -- Using the input dialog -- How to do it... -- How it works... -- Using the color dialog -- How to do it... -- How it works... -- Using the font dialog -- How to do it... -- How it works... -- Using the file dialog -- Getting ready -- How to do it... -- How it works... -- Chapter 6: Understanding Layouts -- Understanding layouts -- Spacers -- Using Horizontal Layout -- How to do it…”
    Libro electrónico
  18. 26878
    Publicado 2017
    Tabla de Contenidos: “…. -- B The Steele Progeny: A Motley Crew of Circuit Court Tests -- III Doctrinal Analysis: Use-Based Rights and Commercial Effects -- A The Common Law Roots of Lanham Act Subject-Matter Jurisdiction -- B An Element of Modernity: The Effects-on-Commerce Factor -- IV A Bird's-Eye View: Taking Stock of Lanham Act Extraterritoriality -- A The Antitrust Gene: A Dominance of Effects -- B Common Law Goodwill Protection: Tea Rose/Rectanus Goes Global -- V Summary: An Era of International Trademark Propertization -- Conclusions -- 3 A Ragged Landscape of Theories -- Introduction -- Section 1 Traditional Civil Law Trademark Conflicts -- I The Principle of Territoriality -- II Analysis: The Curse of Formal Reasoning and Conduct Orientation -- Section 2 Modern Civil Law Unfair Competition Conflicts -- I The Marketplace Principle, Determination of Effects, and the De Minimis Rule -- A Collision-of-Interests and Substantive-Purpose Analysis -- B Multistate Scenarios: Determination of Marketplace Effects and De Minimis Limitations -- II Analysis: The Obsolescence of Tort Foundations -- Section 3 The New Paradigm-A Law of Market Regulation -- I Antitrust Conflicts Reloaded: The Effects Principle -- II Analysis: The Unboundedness of Unqualified Effects -- Section 4 Modern Soft Law-WIPO Recommendation, ALI Principles, and Others -- I Nonbinding Suggestions of Substantive Law and Conflicts Resolution -- A The Joint Recommendation Concerning Provisions on the Protection of Marks, and Other Industrial Property Rights in Signs, on the Internet -- B ALI Principles, CLIP Principles, and the Japanese Transparency Proposal -- II Analysis: "Chips off the Old Block" -- A The Joint Recommendation…”
    Libro electrónico
  19. 26879
    Android smartphones for seniors
    Android Smartphones For Seniors For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Exercise Your Android Camera's Capabilities -- Just point-and-shoot either stills or video -- Add interest with your camera's tools -- Expand your reach with Google Lens -- Access camera features on the scrolling menu -- Go Pro with Pro Mode -- Discovering the Pro settings -- Applying the Pro settings -- Edit Your Photos -- Finding editing options -- Applying the photo editor's tools -- Playing with filters, colors, and more -- Part 4 Exploring Android Apps -- Chapter 13 Preinstalled Tools You Want to Use -- Take a Shortcut to Features with Android Quick Settings -- Customizing the Quick Settings -- Meeting popular Quick Settings -- Quick Settings That Offer Valuable Options -- Opting for Dark mode -- Maximizing eye comfort -- Avoiding interruptions -- Sharing with "close" friends -- Phone-Resident Android Apps -- Recording your voice -- Taking a screen shot -- Staying on task with Google Calendar -- Frequenting the Google Play Store -- Chapter 14 Google Mobile Services Apps for Android -- Find Popular Google Apps -- Google Photos -- Storing and retrieving -- Syncing and deleting -- Sharing -- Searching -- Google Maps -- Finding your way to an appointment -- Employing the Directions screen options -- Find My Device -- Take Note(s) with Google Keep -- Chapter 15 Apps You Might Like in Google Play Store -- Establish App Privacy Permissions -- Connect to Radio (Yes, Radio), Podcasts, and Music -- Configuring your speakers' volume -- Making a wired connection -- Using a Bluetooth connection -- Find Favorite and Fun Apps - a Consensus -- Radio, podcasts, and music -- Video apps -- Travel -- Games -- News -- Books -- Engage Social Media -- Try Out the Android Accessibility Suite -- Part 5 Android Today and Tomorrow -- Chapter 16 Marsha's MUST-DO Things for Your Phone -- Make the Orientation Decision -- Configure Do Not Disturb…”
    Libro electrónico
  20. 26880
    Publicado 2022
    Tabla de Contenidos: “…Problems SMEs Face in Adopting Big Data Analytics -- Best Practices in Data Analytics for SMEs -- Summary -- Sample Questions -- Notes -- Chapter 8 Industrial Internet of Things (IIoT) Sensors -- Introduction -- PLCs -- Carnegie Mellon -- Consumer-Oriented IoT -- Webcams -- IIoT-Enabling Technologies -- IIoT Platform Building Blocks -- IIoT Sensors -- Application Areas for IIoT -- Industries Where IIoT Can and Does Play a Role -- Future Trends in IIoT -- Summary -- Sample Questions -- Notes -- Chapter 9 Artificial Intelligence, Machine Learning, and Computer Vision -- Introduction -- History of AI and Computer Vision -- Understanding Machine Learning and Computer Vision -- Types of Machine Learning -- Common Computer Vision Tasks -- Building a Model -- Machine Learning Pipelines -- Issues with Artificial Intelligence -- Conclusion -- Sample Questions -- Notes -- Chapter 10 Networking for Mobile Edge Computing -- Introduction -- Brief History of Networking -- Basic Networking Concepts, Architecture, and Capabilities -- Network Address Management -- Subnets -- Network Address Translation -- Ports -- Autoconfiguration of Networks -- Security and Reliability -- Introduction to the OSI Model -- Basic Wi-Fi Concepts, Architecture, and Capabilities -- Mobile Cell Phone Concepts, Architecture, and Capabilities -- Mobile Generations -- Cell Architectural Concepts -- Mobile Networking Security and Reliability -- Future Evolution of Mobile Networking -- IT and Telecommunications Networking Convergence -- Convergence of the Internet and Telephony -- Capabilities and Benefits of Mobile Edge Networking -- Summary -- Sample Questions -- References -- Popular Acronyms Used in Networking and Mobile Computing -- Notes -- Chapter 11 Edge Computing -- Introduction: What Is Edge Computing? …”
    Libro electrónico