Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
2281Publicado 2006“…With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. …”
Libro electrónico -
2282Publicado 2003“…Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. …”
Libro electrónico -
2283Publicado 2005“…By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." …”
Libro electrónico -
2284por Soper, Mark Edward“…Learn how to use Microsoft’s free Windows ® Live tools to stay connected, make the most of your media, and stay safe online. Don’t just read about it: See it and hear it, with step-by-step video tutorials and valuable audio sidebars delivered through the Free Web Edition that comes with every Using eBook. …”
Publicado 2010
Libro electrónico -
2285Publicado 2022“…This helps you create your own safe hacking lab environment. - Network basics: Here you will learn the basics of networks that will help you understand what should be done before network security testing. - Gather AP information before cracking: In this section, you will learn how you can enumerate the target access point such as ESSID-BSSID-Channel-Encryption type, and so on. …”
Video -
2286Publicado 2022“…But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? …”
Libro electrónico -
2287Publicado 2018“…DS2 provides simple, safe syntax for performing complex data transformations in parallel and enables manipulation of native database data types at full precision. …”
Libro electrónico -
2288Publicado 2004“…A new edition of this title is available, ISBN-10: 0132354799 ISBN-13: 9780132354790 Completely revised and up-to-date coverage of Multithreading –including the java.util.concurrent library, locks, condition objects, futures, thread pools, thread-safe collections, threads and Swing Collection classes –collections framework, concrete collections, and generic utility methods Annotations and metadata –using annotations to automate programming tasks, JDKTM 5.0 standard annotations, the apt tool for source-level annotation processing, and bytecode engineering Advanced Swing and AWT –lists, trees, tables, and other advanced components; image processing and printing JavaBeansTM –including property editors, customizers, and long-term persistence XML –DOM and SAX parsers, XPath, and XSL transformations The seventh edition of Core JavaTM 2, Volume II, covers advanced user-interface programming and the enterprise features of the Java 2 Platform, Standard Edition (J2SETM). …”
Libro electrónico -
2289Publicado 2003“…The CLI, at its heart, is an approach to building software that enables code from many independent sources to co-exist and interoperate safely. Shared Source CLI Essentials is a companion guide to Rotor's code. …”
Libro electrónico -
2290por Mak, Ronald, 1953-“…Without getting lost in mathematical detail, you'll learn practical numerical algorithms for safely summing numbers, finding roots of equations, interpolation and approximation, numerical integration, solving differential equations, matrix operations, and solving sets of simultaneous equations. …”
Publicado 2003
Libro electrónico -
2291Publicado 2009“…. • Improving life on the Web: what’s new and different about Chrome, and why you care • Getting from Chrome newbie to power user—fast! • Browsing more safely in the Web jungle • Spit-shining Chrome: making a good-looking browser look spectacular • Optimizing your own web site to make the most of Google Chrome • Tweaking tabs, and more: customizing Chrome to your heart’s content • Saving time with Google Chrome keyboard shortcuts • Troubleshooting problems with Google Chrome, step-by-step • Learning about Chromium (the foundation on which Google Chrome is built) and its components, WebKit, WebKit Core, WebKit Port, and WebKit Glue. …”
Libro electrónico -
2292por Stroustrup, Bjarne“…For example: abstract classes as interfaces class hierarchies for object-oriented programming templates as the basis for type-safe generic software exceptions for regular error handling namespaces for modularity in large-scale software run-time type identification for loosely coupled systems the C subset of C++ for C compatibility and system-level work standard containers and algorithms standard strings, I/O streams, and numerics C compatibility, internationalization, and exception safety Bjarne Stroustrup makes C++ even more accessible to those new to the language, while adding advanced information and techniques that even expert C++ programmers will find invaluable…”
Publicado 2000
Libro electrónico -
2293por Wake, William C., 1960-“…You’ll discover how to recognize “code smells,” which signal opportunities for improvement, and then perfect your program’s design one small, safe step at a time. The book shows you when and how to refactor with both legacy code and during new test-driven development, and walks you through real-world refactoring in detail. …”
Publicado 2010
Libro electrónico -
2294Publicado 2011“…Today's nuclear reactors are safe and highly efficient energy systems that offer electricity and a multitude of co-generation energy products ranging from potable water to heat for industrial applications. …”
Libro electrónico -
2295Publicado 2017“…What You Will Learn Deep dive into the details of the how various operating systems currently implement multithreading Choose the best multithreading APIs when designing a new application Explore the use of mutexes, spin-locks, and other synchronization concepts and see how to safely pass data between threads Understand the level of API support provided by various C++ toolchains Resolve common issues in multithreaded code and recognize common pitfalls using tools such as Memcheck, CacheGrind, DRD, Helgrind, and more Discover the nature of atomic operations and understand how they can be useful in optimizing code Implement a multithreaded application in a distributed computing environment Design a C++-based GPGPU application that employs multithreading In Detail Multithreaded applications execute multiple threads in a single processor environment, allowing developers achieve concurrency. …”
Libro electrónico -
2296Executive's guide to personal securityExecutive's Guide to Personal SecurityExecutive's Guide to Personal SecurityPublicado 2020“…You will learn how to analyze risks, prepare for emergencies, travel safely, and utilize counter-surveillance techniques to enable you to recognize if you are being followed or targeted. …”
Libro electrónico -
2297Publicado 2019“…You’ll begin with basics like creating functions, choosing data types, and binding variables and then move on to more advanced concepts, such as: •Ownership and borrowing, lifetimes, and traits •Using Rust’s memory safety guarantees to build fast, safe programs •Testing, error handling, and effective refactoring •Generics, smart pointers, multithreading, trait objects, and advanced pattern matching •Using Cargo, Rust’s built-in package manager, to build, test, and document your code and manage dependencies •How best to use Rust’s advanced compiler with compiler-led programming techniques You’ll find plenty of code examples throughout the book, as well as three chapters dedicated to building complete projects to test your learning: a number guessing game, a Rust implementation of a command line tool, and a multithreaded server. …”
Libro electrónico -
2298Publicado 2020“…This book includes: A concise account of the invention and modification of the chrysotype process, including early discoveries about gold and colour and the significance of moisture for printing in gold How to set up your workspace for printing, including useful equipment and materials Advice on safe chemical practice A step-by-step guide to creating suitable digital and film negatives Guidance on paper selection and how to successfully coat paper An overview guide to creating a chrysotype print Step-by step directions for creating the chrysotype solutions An explanation of mixing ratios and solution volumes that control contrast An illustrated explanation of the effect of humidity on colour, including split tone colours and ways to control humidity Step-by-step directions on post-exposure hydration to lengthen tonal range and lower contrast Step-by-step tray processing directions Advanced techniques such as handling translucent papers, additional chrysotype formulas and procedures, and alternative developing agents that support longer development, colour formation and remedy problems that affect image quality Troubleshooting chrysotype printing, including advice and photographic examples Illustrated profiles of contemporary artists making chrysotype prints, including their methods and tips Chrysotype serves to inform, encourage and challenge a new generation of alternate process practitioners and a growing chrysotype community, from the newly curious to the experienced professional…”
Libro electrónico -
2299Publicado 2020“…The platform supports business value delivery in agile frameworks such as LeSS, DAD, and SAFe. It also caters to organizations that mix agile with waterfall to support scaled bimodal delivery. …”
Libro electrónico -
2300Publicado 2020“…You’ll not only learn the fundamentals of Solidity but also get to grips with its safe handling and best practices. This course avoids extensive theory by giving you a direct lab entry where you’ll learn by doing. …”