Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 816
- Application software 751
- Computer programs 441
- Engineering & Applied Sciences 367
- Operating systems (Computers) 349
- Cloud computing 330
- Programming 327
- Management 281
- Web site development 271
- Computer networks 262
- Design 244
- Python (Computer program language) 237
- Computer Science 234
- Web sites 226
- Data processing 211
- Computer software 197
- Database management 184
- Open source software 179
- Linux 178
- Computer programming 177
- Security measures 174
- Web applications 168
- Photography 161
- Java (Computer program language) 155
- Digital techniques 148
- Computer graphics 141
- JavaScript (Computer program language) 141
- Microsoft Windows (Computer file) 135
- Electrical & Computer Engineering 126
- Mobile computing 124
-
4561Publicado 2003“…In the Appendix, you will find details on how to set up and configure both the development and runtime environments for the sample application discussed in this book. …”
Libro electrónico -
4562Publicado 2012“…Essential Skills for SAP Professionals: Plan, prepare, and install SAP NetWeaver Application Server Set up, configure, and troubleshoot Java and ABAP stacks Establish server infrastructure and efficiently balance workloads Incorporate transport management and software logistics Resolve performance issues and startup problems Access SAP support infrastructure through SAP Service Marketplace Manage and back up Oracle databases using BR*TOOLS Perform system copies, stack upgrades, and OS/DB migrations…”
Libro electrónico -
4563Publicado 2004Tabla de Contenidos: “…B.4.4 Test the table-structured file nickname -- B.5 Microsoft Excel data source -- B.5.1 Microsoft Excel data source considerations -- B.5.2 Set up Excel ODBC data source name on Windows -- B.5.3 Create the ODBC wrapper -- B.5.4 Create the ODBC server definition -- B.5.5 Create the ODBC nickname -- B.5.6 Test the ODBC nickname -- B.6 WebSphere MQ data source -- B.6.1 Install WebSphere MQ AMI -- B.6.2 Enable the federated database for WebSphere MQ UDFs -- B.6.3 Setup access to your WebSphere MQ queues -- B.7 DB2 UDB for z/OS data source -- B.7.1 Catalog DB2 UDB for z/OS -- B.7.2 Create the DB2 UDB for z/OS wrapper -- B.7.3 Create the DB2 UDB for z/OS server definition -- B.7.4 Create the DB2 UDB for z/OS user mappings -- B.7.5 Create the DB2 UDB for z/OS nickname -- B.7.6 Test the DB2 UDB for z/OS nickname -- B.8 Lotus Extended Search data source -- B.8.1 Create the LES wrapper -- B.8.2 Create the LES server definition -- B.8.3 Create the LES user mappings -- B.8.4 Create the LES nickname -- B.8.5 Test the LES nickname -- B.8.6 Register the Extended Search custom function -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover…”
Libro electrónico -
4564Publicado 2022Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Introduction to Warps in Illustrator -- Illustrator Warps and Distorts -- Resources -- System Requirements -- Set Up the Workspace and Review the Main Panels and Tools -- Illustrator Panels -- Toolbars -- Control -- Color -- Color Guide -- Swatches -- Brushes -- Symbols -- Stroke -- Gradients -- Transparency -- Appearance -- Graphic Styles -- Layers -- Asset Export -- Artboards -- Comments -- Properties -- Libraries -- Adding Rulers -- Menus -- Saving Your File -- Saving Duplicates of Your File -- Color Conversion from CMYK to RGB for Consistency -- New History Panel -- Summary -- Chapter 2: Pen and Shape Tools Review -- Pen Tools and Curvature Tool -- Pen Tool (P) Review -- Join Points on an Open Path -- Add Anchor Point Tool (+) Review -- Delete Anchor Point Tool (-) Review -- Anchor Point Tool (Shift +C) Review -- Curvature Tool (Shift +~) Review -- Swapping Fill and Stroke Colors with the Pen Tool -- Selection, Direct Selection, and Group Selection Tools -- Selection Tool (V) -- Control Panel Options for Paths -- Direct Selection Tool (A) -- Control Panel Options for Anchor Points -- Group Selection Tool -- Adjusting Scale of Paths -- Additional Properties Panel and Transform Panel Options -- Shape Tools (Rectangle, Rounded Rectangle, Ellipse, etc.) -- Rectangle Tool (M) -- Control Panel Options -- Rounded Rectangle Tool -- Control Panel Options -- Ellipse Tool (L) -- Control Panel Options -- Polygon Tool -- Control Panel Options -- Star Tool -- Control Panel Options -- Flare Tool -- Lens Flare Properties -- Line Segment Tool (\) -- Control Panel Options -- Arc Tool -- Control Panel Options -- Spiral Tool -- Control Panel Options -- Rectangular Grid Tool -- Control Panel Options -- Polar Grid Tool…”
Libro electrónico -
4565Publicado 2024Tabla de Contenidos: “…Strengthening security through logging and monitoring -- Importance in cloud security -- Evolution of AWS services for logging and monitoring -- Integrated approach -- Key considerations for unified logging and monitoring -- Beyond basic auditing with CloudTrail -- Best practices for configuring CloudTrail trails -- Anomaly detection with CloudTrail Insights -- Advanced data analysis with CloudTrail Lake -- Advanced security monitoring with CloudWatch -- Enhancing application security monitoring with CloudWatch -- Building security dashboards in CloudWatch -- Integration with diverse log sources for comprehensive monitoring -- Developer best practices for security monitoring -- Practical use cases -- Empowering security logs integration and analytics -- Understanding Security Lake -- Leveraging Athena for log analytics -- Best practices for integrating Security Lake and Athena -- Summary -- Questions -- Answers -- Further reading -- Chapter 11: Security Compliance with AWS Config, AWS Security Hub, and Automated Remediation -- Continuous compliance monitoring and assessment -- Overview of compliance with Config -- Setting up Config -- Monitoring compliance -- Managing multi-account compliance -- Best practices for Config -- Automated remediation -- Understanding automated remediation -- Designing automated remediation strategies -- Tools for automation -- Tips for effective automated remediation -- Case study - automated remediation scenario -- Centralized compliance management and integration -- Integrating Config with Security Hub -- Utilizing Security Hub for compliance benchmarking -- Managing security standards -- Creating custom insights -- Summary -- Questions -- Answers -- Further reading -- Chapter 12: DevSecOps - Integrating Security into CI/CD Pipelines -- DevSecOps in the modern software supply chain -- Understanding DevSecOps…”
Libro electrónico -
4566Publicado 2023“…This book will help you design, set up, and configure your first application by writing simple formulas. …”
Libro electrónico -
4567Publicado 2023“…The next set of chapters will help you set up a new Visual Studio environment, develop a new desktop project, incorporate the Model-View-ViewModel (MVVM) pattern in a WinUI project, and develop unit tests for ViewModel commands. …”
Libro electrónico -
4568Publicado 2024Tabla de Contenidos: “…Intro -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 - A Whirlwind of Stable Diffusion -- Chapter 1: Introducing Stable Diffusion -- Evolution of the Diffusion model -- Before Transformer and Attention -- Transformer transforms machine learning -- CLIP from OpenAI makes a big difference -- Generate images -- DALL-E 2 and Stable Diffusion -- Why Stable Diffusion -- Which Stable Diffusion to use -- Why this book -- References -- Chapter 2: Setting Up the Environment for Stable Diffusion -- Hardware requirements to run Stable Diffusion -- GPU -- System memory -- Storage -- Software requirements -- CUDA installation -- Installing Python for Windows, Linux, and macOS -- Installing PyTorch -- Running a Stable Diffusion pipeline -- Using Google Colaboratory -- Using Google Colab to run a Stable Diffusion pipeline -- Summary -- References -- Chapter 3: Generating Images Using Stable Diffusion -- Logging in to Hugging Face -- Generating an image -- Generation seed -- Sampling scheduler -- Changing a model -- Guidance scale -- Summary -- References -- Chapter 4: Understanding the Theory Behind Diffusion Models -- Understanding the image-to-noise process -- A more efficient forward diffusion process -- The noise-to-image training process -- The noise-to-image sampling process -- Understanding Classifier Guidance denoising -- Summary -- References -- Chapter 5: Understanding How Stable Diffusion Works -- Stable Diffusion in latent space -- Generating latent vectors using diffusers -- Generating text embeddings using CLIP -- Initializing time step embeddings -- Initializing the Stable Diffusion UNet -- Implementing a text-to-image Stable Diffusion inference pipeline -- Implementing a text-guided image-to-image Stable Diffusion inference pipeline -- Summary -- References…”
Libro electrónico -
4569Publicado 2024Tabla de Contenidos: “…. -- See also -- Triggering jobs based on file arrival -- Getting ready -- How to do it... -- See also -- Setting up workflow alerts and notifications -- How to do it... -- There's more... -- See also -- Troubleshooting and repairing failures in Databricks Workflows -- How to do it... -- See also -- Chapter 9: Building Data Pipelines with Delta Live Tables -- Technical requirements -- Creating a multi-hop medallion architecture data pipeline with Delta Live Tables in Databricks -- How to do it... -- How it works... -- See also -- Building a data pipeline with Delta Live Tables on Databricks -- How to do it... -- See also -- Implementing data quality and validation rules with Delta Live Tables in Databricks -- How to do it... -- How it works... -- See also -- Quarantining bad data with Delta Live Tables in Databricks -- How to do it... -- See also -- Monitoring Delta Live Tables pipelines -- How to do it... -- See also -- Deploying Delta Live Tables pipelines with Databricks Asset Bundles -- Getting ready -- How to do it... -- There's more... -- See also -- Applying changes (CDC) to Delta tables with Delta Live Tables -- How to do it... -- See also -- Chapter 10: Data Governance with Unity Catalog -- Technical requirements -- Connecting to cloud object storage using Unity Catalog -- Getting ready -- How to do it... -- See also -- Creating and managing catalogs, schemas, volumes, and tables using Unity Catalog -- Getting ready -- How to do it... -- See also -- Defining and applying fine-grained access control policies using Unity Catalog -- Getting ready -- How to do it... -- See also…”
Libro electrónico -
4570Publicado 2023Tabla de Contenidos: “…-- 9.4 Using docker-compose with the Podman service -- 9.5 podman - -remote -- 9.5.1 Local connections -- 9.5.2 Remote connections -- 9.5.3 Setting up SSH on the client machine -- 9.5.4 Configuring a connection -- Summary -- Part 4. …”
Libro electrónico -
4571Publicado 2018Tabla de Contenidos: “…-- 9.3 Scanning endpoints for IOCs -- 9.4 Inspecting network traffic with Suricata -- 9.4.1 Setting up Suricata -- 9.4.2 Monitoring the network…”
Libro electrónico -
4572Tabla de Contenidos: “…Controlling Mail Flow for Office 365 Migration Options -- Cutover Mail Flow -- Simple coexistence mail flow -- Hybrid Coexistence Mail Flow -- Mail Flow Options Based on Organization Size -- Sample Migration Plan -- Step 5: Microsoft Account and Organizational Account -- Step 6: SkyDrive and SkyDrive Pro -- Step 7: Windows Intune -- Deployment -- Step 1: Verify Your Environment -- Step 2: Add Domain Name Service (DNS) Information -- Autodiscover -- SRV Records -- Step 3: Configure Lync -- Step 4: Initial User Load -- Step 5: Pilot/Test Group -- Step 6: Inform Your Users -- Step 7: Train Your Users -- Step 8: E-mail Migration-Moving Historical E-mail (Migration) Options -- Do Nothing -- Third-Party Tools -- Office 365 with DirSync -- PST Export/Import -- Step 9: Set Up Workstations -- Step 10: Configure External Devices -- Step 11: Cutover -- Post-deployment -- Step 1: Hosted SharePoint Domain Name -- Step 2: Hosted SharePoint Initial Configuration -- Step 3: Hosted SharePoint Planning -- What Is SharePoint? …”
Libro electrónico -
4573Publicado 2018“…They are used by almost every sound reinforcement system, and by almost every recording studio monitoring set-up. There is also a big usage of active crossovers in car audio, with the emphasis on routing the bass to enormous low-frequency loudspeakers. …”
Libro electrónico -
4574por Chin, Robert. authorTabla de Contenidos: “…Intro -- Beginning Android 3D Game Development -- Contents at a Glance -- Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Let's Meet the Android -- Overview of Android -- Overview of the Android SDK -- Android Software Development Kit (SDK) Requirements -- Android SDK Components Overview -- Eclipse with Android Development Tools Plug-in -- Android SDK Manager -- Android Virtual Device -- How to Set Up for Development -- Android Development Tools Integrated Development Environment (IDE) Overview -- Package Explorer -- Source Code Area -- Outline -- Dalvik Debug Monitor Server (DDMS) -- LogCat Window -- Launching the SDK Manager and AVD Manager from Eclipse -- Hands-on Example: Non-OpenGL ES Text "Hello World" Program -- Creating a New Android Project -- Running on an Android Emulator -- Running on an Actual Android Device -- The Main Source Code -- The Graphical Layout -- The Actual "Hello World" Data -- Summary -- Chapter 2: Java for Android -- Overview of the Java Language -- Java Comments -- Java Basic Data Types -- Arrays -- Data Modifiers -- Java Operators -- Arithmetic Operators -- Unary Operators -- Conditional Operators -- Bitwise and Bit Shift Operators -- Java Flow Control Statements -- Java Classes -- Packages and Classes -- Accessing Classes in Packages -- Java Interfaces -- Accessing Class Variables and Functions -- Java Functions -- Calling the Parent Function -- The Basic Android Java Program Framework -- Android Activity Life Cycle Overview -- Key Activity Life Cycle Cases -- Seeing the Activity Life Cycle in Action -- The Basic Android Java OpenGL Framework -- Basic Android OpenGL ES Framework for a Single-View OpenGL ES Application -- The Custom GLSurfaceView -- The Custom Renderer -- Basic Android OpenGL ES Framework for a Multiple View OpenGL ES Application…”
Publicado 2014
Libro electrónico -
4575Publicado 2018“…The book explains how to enter schematics in Capture, set up project types, project libraries and prepare circuits for PSpice simulation. …”
Libro electrónico -
4576Publicado 2012Tabla de Contenidos: “…Chapter 16: Troubleshooting Networks -- Questions -- Objective 802: 4.5 Given a Scenario, Troubleshoot Wired and Wireless Networks with Appropriate Tools -- Quick Answer Key -- In-Depth Answers -- Chapter 17: Computer Security Fundamentals -- Questions -- Objective 802: 2.1 Apply and Use Common Prevention Methods -- Objective 802: 2.2 Compare and Contrast Common Security Threats -- Objective 802: 2.4 Given a Scenario, Use the Appropriate Data Destruction/Disposal Method -- Quick Answer Key -- In-Depth Answers -- Chapter 18: Implementing Digital Security -- Questions -- Objective 802: 4.7 Given a Scenario, Troubleshoot Common Security Issues with Appropriate Tools and Best Practices -- Objective 802: 2.3 Implement Security Best Practices to Secure a Workstation -- Quick Answer Key -- In-Depth Answers -- Chapter 19: Configuring and Troubleshooting Windows Clients -- Questions -- Objective 802: 1.6 Set Up and Configure Windows Networking on a Client/Desktop -- Objective 802: 1.8 Explain the Differences Among Basic OS Security Settings -- Quick Answer Key -- In-Depth Answers -- Chapter 20: Supporting Mobile Devices -- Questions -- Objective 802: 3.1 Explain the Basic Features of Mobile Operating Systems -- Objective 802: 3.2 Establish Basic Network Connectivity and Configure E-mail -- Objective 802: 3.3 Compare and Contrast Methods for Securing Mobile Devices -- Objective 802: 3.4 Compare and Contrast Hardware Differences in Regards to Tablets and Laptops -- Objective 802: 3.5 Execute and Configure Mobile Device Synchronization -- Quick Answer Key -- In-Depth Answers -- Chapter 21: Using and Supporting Printers -- Questions -- Objective 801: 4.1 Explain the Differences Between the Various Printer Types and Summarize the Associated Imaging Process -- Objective 801: 4.2 Given a Scenario, Install and Configure Printers…”
Libro electrónico -
4577Publicado 2018Tabla de Contenidos: “…Appendix B List of Symbols -- References -- 3 Endogenous Firm Dynamics and Labor Flows via Heterogeneous Agents -- 1 Introduction -- 2 Dynamics of Team Production -- 2.1 Equilibrium of the Team Production Game -- Singleton Firms -- Nash Equilibrium -- Homogeneous Teams -- 2.2 Stability of Nash Equilibrium, Dependence on Team Size -- Unstable Equilibria and Pattern Formation Far from Agent Level Equilibria -- 3 From One Team to Six Million Firms, Computationally -- 3.1 Set-up of the Computational Model Using Agents -- 3.2 A Typical Realization of the Model: Agents Form Firms -- 3.3 An Aggregate Steady-State Emerges: Properties -- Number of Firms, Entrance and Exit, and Average Firm Size -- Typical Effort and Utility Levels -- Labor Flows -- 3.4 The Steady-State Population of Firms: Sizes, Productivities, Ages, Survival Rates, Lifetimes, and Growth Rates -- Firm Sizes (by Employees and Output) -- Labor Productivity -- Firm Ages, Survival Rates, and Lifetimes -- Joint Distribution of Firms by Size and Age -- Firm Growth Rates -- 3.5 The Steady-State Population of Agents: Wages Earned, Job Tenure, and Employment as a Function of Firm Size and Age -- Wage Distribution -- Job Tenure Distribution -- Employment as a Function of Firm Size and Age -- 3.6 Steady-State Job-to-Job Flows: The Labor Flow Network -- 3.7 Steady-State Agent Welfare -- 4 Model Variations: Sensitivity and Robustness -- 5 Summary and Conclusions -- 5.1 Emergence of Firms, Out of Microeconomic Equilibrium -- 5.2 From Theories of the Firm to a Theory of Firms -- 5.3 Economics of Computation and Computational Economics -- Appendix A Generalized Preference Speci cations -- Appendix B Generalized Compensation and Nash Stability -- Appendix C Sensitivity to `Sticky' Effort Adjustment -- Appendix D Extension: Stabilizing Effect of Agent Loyalty -- Appendix E Extension: Hiring…”
Libro electrónico -
4578por Jasperneite, JürgenTabla de Contenidos: “…Intro -- Preface -- Organisation -- Communication in Automation - KommA 2020 -- Conference Chairs -- Program Committee -- Organising Committee -- Organisation -- Image Processing in Automation - BVAu 2020 -- Conference Chair -- Program Committee -- Inhaltsverzeichnis -- Contributors -- Part I Communication in Automation -- A Remote Attack Tool Against Siemens S7-300 Controllers: A Practical Report -- 1 Introduction -- 2 Related Work -- 3 Experimental Set-up -- 3.1 The Physical Process to Be Controlled -- 3.2 Hardware Equipment -- 3.3 Attacker Model and Attack Surface -- 4 Attack Details, Implementation and Results -- 4.1 Reconnaissance Attack -- 4.2 Scanning the PLC In-depth -- 4.3 Authentication Bypass Attack -- 4.4 Replay Attacks -- 4.4.1 Set/Update the password of PLCs -- 4.4.2 Clear PLC's Memory Blocks -- 4.4.3 Start/Stop the PLC -- 4.5 Control Hijacking Attack -- 5 Possible Mitigation Solutions -- 6 Conclusion and Future Work -- References -- Konzept und Implementierung einer kommunikationsgetriebenen Verwaltungsschale auf effizienten Geräten in Industrie 4.0 Kommunikationssystemen -- 1 Einleitung -- 2 Industrieller Use Case -- 3 Stand der Technik -- 3.1 Time-sensitive Networking -- 3.2 OPC UA -- 4 Related Work -- 4.1 Administration Shell -- 4.2 OPC UA und TSN -- 5 Konzept und Implementierung -- 5.1 Konzept Communication Administration Shell -- 5.2 Implementierung der CAS und Datenservices für Produktionsgeräte -- 5.3 Integration in industriellen Use Case -- 6 Validierung -- 7 Fazit -- Literatur -- Device Management in Industrial IoT -- 1 Introduction -- 2 Aufgaben von und Anforderungen an IoT Gerätemanagement -- 2.1 Gruppe 1: Bereitstellung und Registrierung -- 2.2 Gruppe 2: Konfiguration und Steuerung -- 2.3 Gruppe 3: Aktualisierung und Wartung -- 2.4 Gruppe 4: Monitoring und Diagnose -- 2.5 Gruppe 5: Hilfsfunktionen…”
Publicado 2022
Libro electrónico -
4579Publicado 2022Tabla de Contenidos: “…-- How to Use This Book -- Interactive Online Learning Environment and Test Bank -- Tips for Taking the A+ Exams -- CompTIA A+ 1100 Series Exam Objectives -- Part I CompTIA A+ Core 1 Exam 220-1101 -- Chapter 1 Mobile Devices -- 1.1 Given a scenario, install and configure laptop hardware and components -- Hardware/device replacement -- Physical privacy and security components -- Exam essentials -- 1.2 Compare and contrast the display components of mobile devices -- Types -- Mobile display components -- Exam essentials -- 1.3 Given a scenario, set up and configure accessories and ports of mobile devices -- Connection methods -- Accessories -- Exam essentials -- 1.4 Given a scenario, configure basic mobile-device network connectivity and application support -- Wireless/cellular data network (enable/disable) -- Bluetooth -- Location services -- Mobile device management (MDM)/mobile application management (MAM) -- Mobile device synchronization -- Exam essentials -- Review Questions -- Chapter 2 Networking -- 2.1 Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes -- Ports and protocols -- TCP vs. …”
Libro electrónico -
4580Publicado 2023Tabla de Contenidos: “…-- 5 Maker Education and School Subjects -- 6 Maker Education and Environmental Sustainability -- 7 Set-up and Structure of This Book -- Notes -- References -- 2. …”
Libro electrónico