Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 691
- Application software 556
- Management 480
- Engineering & Applied Sciences 453
- History 380
- Computer networks 299
- Computer programs 291
- Computer Science 278
- Data processing 255
- Design 238
- Photography 235
- Cloud computing 234
- Python (Computer program language) 234
- Leadership 233
- Digital techniques 217
- Programming 212
- Computer programming 202
- Taxation 196
- Security measures 193
- Computer software 192
- Computer security 188
- Web site development 187
- Examinations 186
- Historia 184
- Database management 180
- Artificial intelligence 178
- Business & Economics 177
- Operating systems (Computers) 175
- Web sites 166
- Machine learning 149
-
5781por Eggins, Brian R.“…An invaluable distance learning bookApplications orientated providing invaluable aid for anyone wishing to use chemical and biosensors Key features and subjects covered include the following:Sensors based on both electrochemical and photometric transducersMass-sensitive sensorsThermal-sensitive sensorsPerformance factors for sensorsExamples o…”
Publicado 2002
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
5782Publicado 2019“…This book contains 37 papers by 73 renowned experts from 13 countries around the world, on following topics: neutrosophic set; neutrosophic rings; neutrosophic quadruple rings; idempotents; neutrosophic extended triplet group; hypergroup; semihypergroup; neutrosophic extended triplet group; neutrosophic extended triplet semihypergroup and hypergroup; neutrosophic offset; uninorm; neutrosophic offuninorm and offnorm; neutrosophic offconorm; implicator; prospector; n-person cooperative game; ordinary single-valued neutrosophic (co)topology; ordinary single-valued neutrosophic subspace; ?…”
Libro electrónico -
5783Publicado 2017“…Thus, it includes studies answering the following questions: What determines a person's willingness to take preventive actions in areas susceptible to severe flooding? …”
Libro electrónico -
5784Publicado 2011“…This new edition features the following new techniques/methodologies:. Support Vector Machines (SVM)--developed based on statistical learning theory, they have a large potential for applications in predictive data mining. …”
Libro electrónico -
5785Publicado 2018“…An emphasis on microeconomic foundations better integrates the study of macroeconomics with approaches learned in microeconomics and field courses in economics. By following an approach to macroeconomics that is consistent with current macroeconomic research, students become better prepared for advanced study in economics. …”
Libro electrónico -
5786Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Bypassing Network Access Control -- Technical requirements -- Bypassing MAC filtering - considerations for the physical assessor -- Configuring a Kali wireless access point to bypass MAC filtering -- Design weaknesses - exploiting weak authentication mechanisms -- Capturing captive portal authentication conversations in the clear -- Layer-2 attacks against the network -- Bypassing validation checks -- Confirming the Organizationally Unique Identifier -- Passive Operating system Fingerprinter -- Spoofing the HTTP User-Agent -- Breaking out of jail - masquerading the stack -- Following the rules spoils the fun - suppressing normal TCP replies -- Fabricating the handshake with Scapy and Python -- Summary -- Questions -- Further reading -- Chapter 2: Sniffing and Spoofing -- Technical requirements -- Advanced Wireshark - going beyond simple captures -- Passive wireless analysis -- Targeting WLANs with the Aircrack-ng suite -- WLAN analysis with Wireshark -- Active network analysis with Wireshark -- Advanced Ettercap - the man-in-the-middle Swiss Army Knife -- Bridged sniffing and the malicious access point -- Ettercap filters - fine-tuning your analysis -- Killing connections with Ettercap filters -- Getting better - spoofing with BetterCAP -- ICMP redirection with BetterCAP -- Summary -- Questions -- Further reading -- Chapter 3: Windows Passwords on the Network -- Technical requirements -- Understanding Windows passwords -- A crash course on hash algorithms -- Password hashing methods in Windows -- If it ends with 1404EE, then it's easy for me - understanding LM hash flaws -- Authenticating over the network-a different game altogether -- Capturing Windows passwords on the network…”
Libro electrónico -
5787Publicado 2017“…The main definitions and notations of copula models are summarized followed by discussions of real-world cases that address particular risk management problems. …”
Libro electrónico -
5788Publicado 2019Tabla de Contenidos: “…Default Deny -- TCP Wrappers -- Packet Filtering -- Blacklistd(8) -- Public-Key Encryption -- Global Security Settings -- Preparing for Intrusions with mtree(1) -- Monitoring System Security -- Package Security -- If You're Hacked -- 20 SMALL SYSTEM SERVICES -- Secure Shell -- Email -- Network Time -- Name Service Switching -- inetd -- DHCP -- Printing and Print Servers -- TFTP -- Scheduling Tasks -- 21 SYSTEM PERFORMANCE AND MONITORING -- Computer Resources -- Checking the Network -- General Bottleneck Analysis with vmstat(8) -- Disk I/O -- CPU, Memory, and I/O with top(1) -- Following Processes -- Paging and Swapping -- Performance Tuning -- Status Mail -- Logging with syslogd -- Log File Management -- FreeBSD and SNMP -- 22 JAILS -- Jail Basics -- Jail Host Server Setup -- Jail Setup -- Managing Jails -- More Jail Options -- Jailing Ancient FreeBSD -- Last Jail Notes -- 23 THE FRINGE OF FREEBSD -- Terminals -- Managing Cloudy FreeBSD -- Diskless FreeBSD -- Diskless Farm Configuration -- Finalizing Setup -- Storage Encryption -- 24 PROBLEM REPORTS AND PANICS -- Bug Reports -- System Panics -- Recognizing Panics -- Responding to a Panic -- AFTERWORD -- The FreeBSD Community -- Why Do We Do It? …”
Libro electrónico -
5789Publicado 2021Tabla de Contenidos: “…Cover -- Title Page -- Copyrights -- Dedication -- Contributors -- Table of Contents -- Preface -- Section 1: Concepts and Components of Software Architecture -- Chapter 1: Importance of Software Architecture and Principles of Great Design -- Technical requirements -- Understanding software architecture -- Different ways to look at architecture -- Learning the importance of proper architecture -- Software decay -- Accidental architecture -- Exploring the fundamentals of good architecture -- Architecture context -- Stakeholders -- Business and technical environments -- Developing architecture using Agile principles -- Domain-driven design -- The philosophy of C++ -- Following the SOLID and DRY principles -- Single responsibility principle -- Open-closed principle -- Liskov substitution principle -- Interface segregation principle -- Dependency inversion principle -- The DRY rule -- Coupling and cohesion -- Coupling -- Cohesion -- Summary -- Questions -- Further reading -- Chapter 2: Architectural Styles -- Technical requirements -- Deciding between stateful and stateless approaches -- Stateless and stateful services -- Understanding monoliths-why they should be avoided, and recognizing exceptions -- Understanding services and microservices -- Microservices -- Benefits and disadvantages of microservices -- Characteristics of microservices -- Microservices and other architectural styles -- Scaling microservices -- Transitioning to microservices -- Exploring event-based architecture -- Common event-based topologies -- Event sourcing -- Understanding layered architecture -- Backends for Frontends -- Learning module-based architecture -- Summary -- Questions -- Further reading -- Chapter 3: Functional and Nonfunctional Requirements -- Technical requirements documentation from sources, you must have -- Understanding the types of requirements…”
Libro electrónico -
5790por Ritchie, Kyle J.Tabla de Contenidos: “…Understanding strategic sourcing -- Establishing ethics -- Exploring certifications and standards -- Chapter 14 Circular Materials, Products, and Packaging -- Redesigning Materials and Products: The Transition from Linear to Circular -- "Less bad" does not equal "good" -- Planning for material reincarnation -- How To Keep Materials In Use Forever -- Why things break -- From planned obsolescence to planned permanence -- Shipping Global versus Producing Local -- Building a regional economy: A shipping substitute -- You've got to be shipping me -- Permanent packaging -- Part 4 Redesigning the Future to be Circular -- Chapter 15 The Circular Economy of Food Production -- Examining the Two Ways of Producing Food -- Investigating the Hidden Costs of Agriculture -- Food waste: Expending money, time, and resources unnecessarily -- Environmental degeneration: Damaging the planet with increasing speed -- Permaculture to the Rescue -- Following nature's lead: Permaculture design principles -- Taking a look at permaculture management zones -- Chapter 16 Circularity for Design -- Redesigning Design -- Understanding circular design -- Designing out waste -- Keeping products and materials in use -- Regenerating natural systems -- Recognizing the Problems Designers Face -- We're being overtaken by trash -- We're running out of materials -- We're choking on carbon -- Creating a Framework for Circular Design -- Applying the ReSOLVE framework to buildings -- Layers of useful life -- Putting the pieces together -- Chapter 17 Circular Economy for Builders, Makers, and Manufacturers -- Assessing a Building's Lifecycle -- Defining construction and demolition debris -- Gauging the economic opportunities of C& -- D waste -- Measuring C& -- D waste impact -- Defining lifecycle impacts -- Identifying human health hazards and promoting transparency…”
Publicado 2021
Libro electrónico -
5791por OECDTabla de Contenidos: “…Critical infrastructure operators put pandemic response plans in place following the outbreak of COVID-19 and successfully avoided large-scale disruptions -- 2.3.3. …”
Publicado 2022
Libro electrónico -
5792
-
5793Publicado 2017Tabla de Contenidos: “…-- Lab 1-installing Snort and creating ICMP rules lab -- Lab 2-create the following snort.conf and icmp.rules files -- Rule options -- Lab 3-execute Snort -- Show log alert -- Alert explanation -- Lab 4-execute Snort as Daemon -- Summary -- Chapter 16: Advance Wireless Security Lab Using the Wi-Fi Pineapple Nano/Tetra -- The history of Wi-Fi - the WLAN standard -- Wireless vulnerability -- The Wi-Fi Pineapple -- For penetration testing -- Lab 1-how to set up -- Getting connected -- Performing a scan -- Getting connected, managing your network, and broadcasting Wi-Fi -- Reporting data -- Logging data with Pineapple -- Reporting data -- Enabling the landing page -- Summary -- Chapter 17: Offensive Security and Threat Hunting -- What is offensive security? …”
Libro electrónico -
5794Publicado 2016Tabla de Contenidos: “…-- Conclusions on the UK and Seveso Picture -- Australia -- Conclusions for Australia -- North America -- Canada -- The US -- Standards -- A Safety Case Regime for the US? -- Developments Following the West Fertilizer Company Explosion -- Conclusions for North America -- What Does "Good" Look Like for Regulation? …”
Libro electrónico -
5795Publicado 2018“…After a brisk introduction to modern C++ (C++17), you'll be taken through language-level concurrency and the lock-free programming model to set the stage for our foray into the Functional Programming model. Following this, you'll be introduced to RxCpp and its programming model. …”
Libro electrónico -
5796Publicado 2014“…Funds: Private Equity, Hedge and All Core Structures is a practical introductory guide to the legal and commercial context in which funds are raised and invest their money, with examinations of the tax and regulatory background, and an analysis of the key themes and trends that the funds industry face following the financial crisis. The book looks at asset classes, investor return models, the commercial and legal pressures d…”
Libro electrónico -
5797Publicado 2012Tabla de Contenidos: “…-- Agile Manifesto Values and Principles -- Individuals and Interactions over Processes and Tools -- Working Software over Comprehensive Documentation -- Customer Collaboration over Contract Negotiation -- Responding to Change over Following a Plan -- Agile Methodologies -- Examples…”
Libro electrónico -
5798
-
5799Publicado 2010Tabla de Contenidos: “…Changing the Default Document -- Editing Content in the Browser -- Summary -- Chapter 29: Using Library Items and Server-side Includes -- Dreamweaver Library Items -- Using the Library Assets Panel -- Editing a Library Item -- Updating Your Web Sites with Libraries -- Applying Server-Side Includes -- Summary -- Chapter 30: Maximizing Cross-Browser Compatibility -- Converting Pages in Dreamweaver -- Validating Your Code -- Checking Your Page for Compatibility -- Summary -- Chapter 31: Building Web Sites with a Team -- Following Check In/Check Out Procedures -- Keeping Track with Design Notes -- Browsing File View Columns -- Generating Reports -- Administering Adobe Contribute Sites -- Communicating with WebDAV -- Version Control with Subversion -- Summary -- Chapter 32: Integrating with XML and XSLT -- Understanding XML -- Exporting XML -- Importing XML -- Building Your Own XML Files -- Styling with XSL -- Summary -- Part VII: Extending Dreamweaver -- Chapter 33: Customizing Dreamweaver -- Adding New Commands -- Managing Menus and Keyboard Shortcuts -- Working with Custom Tags -- Customizing Property Inspectors -- Making Custom Floating Panels -- Developing Translators -- Extending C-Level Libraries -- Customizing Your Tag Libraries -- Summary -- Chapter 34: Handling Server Behaviors -- Understanding Server Behaviors -- Applying and Managing Server Behaviors -- Standard Server Behaviors -- Installing Additional Server Behaviors -- Creating Custom Server Behaviors -- Summary -- Chapter 35: Creating Adobe AIR Applications -- About Adobe AIR -- Installing AIR into Dreamweaver -- Designing for AIR -- Packaging Your AIR Application -- Summary -- Appendix A: What's New in Dreamweaver CS5 -- Dynamic Scope Expanded -- Totally Revamped Site Setup -- CSS Integration Enhanced -- Online Services Take Off -- Older Features Removed…”
Libro electrónico -
5800Publicado 2010“…Topics intended for beginners and advanced readers are clearly marked, and the book includes indexes of C# versions (2.0, 3.0, and 4.0), which make it easy for readers to reference topics specific to a given release of C#. Following an introduction to C#, readers learn about Best practices for object-oriented programming in C# C# primitive data types, value and reference types, implicitly typed variables, anonymous types, plus dynamic typing in C# 4.0 Methods and parameters–including extension methods, partial methods, and C# 4.0’s optional and named parameters Generics, concurrent collections, and custom collections with iterators Delegates, events, and lambda expressions Collection interfaces and standard query operators Query expressions and the tree expressions on which LINQ providers are based Reflection, attributes, and dynamic programming Parallel Query Processing with PLINQ Multithreaded programming with the Task Parallel Library Platform interoperability and unsafe code The Common Language Infrastructure that underlies C# Whether you’re just starting out, are an experienced developer moving to C#, or are a seasoned C# programmer seeking to master C# 4.0’s most valuable enhancements, Essential C# 4.0 will help you write high-quality, highly effective code…”
Libro electrónico