Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 868
- Operating systems (Computers) 676
- Computer Science 672
- Microsoft Windows (Computer file) 602
- Application software 563
- Development 555
- Computer networks 365
- Computer programs 333
- Microsoft .NET Framework 315
- Examinations 265
- Programming 250
- Cloud computing 241
- Microsoft Windows server 234
- Certification 230
- Security measures 229
- Computer security 226
- Database management 207
- Electronic data processing personnel 206
- Client/server computing 198
- Windows Azure 196
- Management 195
- Data processing 185
- Microsoft software 184
- Electrical & Computer Engineering 178
- Linux 173
- Historia 170
- Computer programming 163
- Design 162
- Web site development 159
- Telecommunications 154
-
6721Publicado 2013“…FULL COLOR Covers iTunes 11 and iCloud for Mac and Windows Make the most of iTunes® or iCloud®–without being a technical expert! …”
Libro electrónico -
6722Publicado 2000“…By far its greatest strength for me has been the outstanding analogies—tracer bullets, broken windows, and the fabulous helicopter-based explanation of the need for orthogonality, especially in a crisis situation. …”
Libro electrónico -
6723Publicado 2023“…Modern X86 Assembly Language Programming, Third Edition includes source code for both Windows and Linux. The source code elucidates current x86-64 assembly language programming practices, run-time calling conventions, and the latest generation of software development tools. …”
Libro electrónico -
6724por Choi, Brendan“…Part I serves as an Ansible primer, guiding you through Linux basics using WSL on Windows 11 and assisting in the setup of your learning environment. …”
Publicado 2023
Libro electrónico -
6725por National Research Council (U.S.).Tabla de Contenidos: “…""Cross-Species Extrapolation""""Exposure Duration""; ""Windows of Vulnerability""; ""Additivity""; ""QUANTITATIVE EVALUATION""; ""Identification of the NOAEL and LOAEL""; ""Calculation of the Benchmark Dose""; ""Duration Adjustment""; ""Uncertainty Factors""; ""Calculation of the Unlikely Effect Level""; ""Calculation of the Margin of Exposure (MOE)""; ""Assessing a Degree of Concern""; ""Application of Reproductive and Developmental Toxicity Data to Various Exposure Scenarios""; ""Critical Data Needs""; ""SUMMARY""; ""4 Incomplete or Insufficient Data Sets ""…”
Publicado 2001
Libro electrónico -
6726por Goldstein, E. Bruce, 1941-
Publicado 2011Biblioteca de la Universidad de Navarra (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Conectar con la versión electrónica en ingles
Libro -
6727por Kammermann, MarkusTabla de Contenidos: “…11.2 Dynamic Host Configuration Protocol -- 11.3 DNS (Domain Name System) -- 11.3.1 hosts -- 11.3.2 Der Windows Internet Naming Service (WINS) -- 11.3.3 Das Domain Name System -- 11.3.4 Der Aufbau von DNS -- 11.3.5 Das Konzept des dynamischen DNS -- 11.4 Web- und Mail-Protokolle -- 11.4.1 HTTP -- 11.4.2 FTP -- 11.4.3 TFTP -- 11.4.4 NNTP -- 11.4.5 SMTP -- 11.4.6 POP3 und IMAP4 -- 11.5 Weitere Dienstprotokolle -- 11.5.1 NTP -- 11.5.2 SSH -- 11.5.3 Telnet -- 11.6 Fragen zu diesem Kapitel -- Kapitel 12: Netzwerke betreiben -- 12.1 Grundlagen der Verwaltung -- 12.1.1 Arbeitsgruppen und Domänen -- 12.1.2 Der Client/Server-Ansatz -- 12.1.3 Client/Server-Bausteine -- 12.1.4 Wichtige Fragen zum Einsatz eines NOS -- 12.2 Verschiedene Systeme kurz vorgestellt -- 12.2.1 Apple -- 12.2.2 Unix -- 12.2.3 Linux -- 12.2.4 Von Windows NT bis Windows 2022 -- 12.2.5 Citrix und VMWare -- 12.2.6 Die Bedeutung von SMB über Betriebssysteme hinweg -- 12.3 Die Virtualisierung -- 12.4 Cloud Computing -- 12.4.1 Servicemodelle in der Cloud -- 12.4.2 Betriebsmodelle -- 12.4.3 Angebote aus der Cloud -- 12.5 Ein Wort zum Thema Speicher -- 12.6 Sicherheitsfragen zu Cloud-Modellen und Rechenzentren -- 12.7 Die Administration des Netzwerks -- 12.8 Ressourcen im Netzwerk teilen -- 12.9 Identifikation und Rechte im Netzwerk -- 12.9.1 Benutzer einrichten -- 12.9.2 Das Erstellen von Gruppen -- 12.9.3 Datei- und Ordnerrechte -- 12.9.4 Drucken im Netzwerk -- 12.10 Fragen zu diesem Kapitel -- Kapitel 13: Sicherheitsverfahren im Netzwerkverkehr -- 13.1 Identifikation und Authentifikation -- 13.1.1 Aller Anfang ist ... das Passwort -- 13.1.2 Das Zero Trust-Konzept -- 13.2 Authentifikationsverfahren -- 13.2.1 Single Sign On und Mehr-Faktor-Authentifizierung -- 13.2.2 PAP und CHAP -- 13.2.3 EAP -- 13.2.4 Kerberos -- 13.2.5 RADIUS -- 13.3 Die Hash-Funktion -- 13.4 Verschlüsselung…”
Publicado 2022
Libro electrónico -
6728por Ebner, JürgenTabla de Contenidos: “…3.3.4 Installation abschließen und neu starten -- 3.4 Dual-Boot - Kali Linux und Windows -- 3.5 Installation auf einem vollständig verschlüsselten Dateisystem -- 3.5.1 Einführung in LVM -- 3.5.2 Einführung in LUKS -- 3.5.3 Konfigurieren verschlüsselter Partitionen -- 3.6 Kali Linux auf Windows Subsystem for Linux -- 3.6.1 Win-KeX -- 3.7 Kali Linux auf einem Raspberry Pi -- 3.8 Systemeinstellungen und Updates -- 3.8.1 Repositories -- 3.8.2 NVIDIA-Treiber für Kali Linux installieren -- 3.8.3 Terminal als Short-Cut (Tastenkombination) -- 3.9 Fehlerbehebung bei der Installation -- 3.9.1 Einsatz der Installer-Shell zur Fehlerbehebung -- 3.10 Zusammenfassung -- Kapitel 4: Erste Schritte mit Kali -- 4.1 Konfiguration von Kali Linux -- 4.1.1 Netzwerkeinstellungen -- 4.1.2 Verwalten von Benutzern und Gruppen -- 4.1.3 Services konfigurieren -- 4.2 Managing Services -- 4.3 Hacking-Labor einrichten -- 4.3.1 Kali Linux - Test Lab Environment -- 4.4 Sichern und Überwachen mit Kali Linux -- 4.4.1 Sicherheitsrichtlinien definieren -- 4.4.2 Mögliche Sicherheitsmaßnahmen -- 4.4.3 Netzwerkservices absichern -- 4.4.4 Firewall- oder Paketfilterung -- 4.5 Weitere Tools installieren -- 4.5.1 Meta-Packages mit kali-tweaks installieren -- 4.5.2 Terminator statt Terminal -- 4.5.3 OpenVAS zur Schwachstellenanalyse -- 4.5.4 SSLstrip2 -- 4.5.5 Dns2proxy -- 4.6 Kali Linux ausschalten -- 4.7 Zusammenfassung -- Teil II: Einführung in Penetration Testing -- Kapitel 5: Einführung in Security Assessments -- 5.1 Kali Linux in einem Assessment -- 5.2 Arten von Assessments -- 5.2.1 Schwachstellenanalyse -- 5.2.2 Compliance-Test -- 5.2.3 Traditioneller Penetrationstest -- 5.2.4 Applikations-Assessment -- 5.3 Normierung der Assessments -- 5.4 Arten von Attacken -- 5.4.1 Denial of Services (DoS) -- 5.4.2 Speicherbeschädigungen -- 5.4.3 Schwachstellen von Webseiten…”
Publicado 2023
Libro electrónico -
6729por Aubury, SimonTabla de Contenidos: “…Common table expressions -- Pivot tables -- Joining data from multiple tables -- New York taxi data -- Reading remote files with the HTTPFS extension -- Location lookup -- Taxi trip cost and tipping -- Finding the most expensive trip with window functions -- Summary -- Chapter 4: DuckDB Operations and Performance -- Technical requirements -- Exploring DuckDB indexes -- Downloading the book review dataset from Kaggle -- Preparing the book review dataset -- Reviewing and indexing the book review dataset -- Explaining the query plan -- Creating an index -- Optimizing the file read performance of DuckDB -- File partitioning -- Parquet predicate pushdown -- Run-time profiling exercise -- Working with timestamps -- TIMESTAMP -- TIMESTAMPTZ - Timestamps with time zones -- Exploring timestamps with time zone functions -- Binning and functions using time zone functions -- Time and window functions -- The Apollo 11 mission -- Interval data -- The LEAD and LAG window functions -- Summary -- Chapter 5: DuckDB Extensions -- Technical requirements -- Expanding DuckDB capabilities with extensions -- Available extensions in DuckDB -- The SQLite extension -- Reading and writing remote files using the HTTPFS extension -- Full-text search indexes -- Working with geospatial data -- The spatial extension -- Reading Microsoft Excel files -- Points within a polygon -- Summary -- Chapter 6: Semi-Structured Data Manipulation -- Technical requirements -- Exploring nested data types -- The LIST data type -- The MAP data type -- The STRUCT data type -- Working with lists -- Preparing the data -- List aggregation -- List functions -- List comprehensions -- Working with JSON -- The JSON extension -- Creating JSON objects -- Importing JSON data -- Unpacking lists with the unnest function -- Working with inconsistent schemas -- Querying JSON data from an API -- Summary…”
Publicado 2024
Libro electrónico -
6730por Waard, Fransje deTabla de Contenidos: “…5 Nuances and amendments6 Pathology in the second person singular; 7 Madness from the inside; 8 Doubt, scepticism and transparency; 9 The big question; 10 The subject and the methodology; Frans (1941); Sandra (1973); Karin (1955); 3: Window on the God-experience -- Beyond the Precincts of the Church; 1 Mystical empiricism; 2 Describing the ineffable; 3 Visions in many senses; 4 Love and mania; 5 Divine madness; 6 Conversion and classification; 7 The G-word; 8 Gnosis and orthodoxy; 9 The God affair; 10 Psychology of religion; 11 Sanctity; 12 The journeying soul; 13 Fathers of introspection…”
Publicado 2010
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
6731por Wolf, Mark J. P.Tabla de Contenidos: “…The Story of the World: "Making Of " Documentation5 Subcreation within Subcreated Worlds; Importance of the Word; Self-reflexivity; Subcreated Subcreators and Diegetic World-building; Evil Subcreators; 6 Transmedial Growth and Adaptation; The Nature of Transmediality; Windows on the World: Words, Images, Objects, Sounds, and Interactions; Transmedial Expansion; Description; Visualization; Auralization; Interactivation; Deinteractivation; Encountering Transmedial Worlds; 7 Circles of Authorship; Open and Closed Worlds; Levels of Canonicity; Originator and Main Author…”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
6732Publicado 2010Tabla de Contenidos: “…How E-research Might Change Technology-Enhanced Learning Research -- Designing Higher Education Courses Using Open Educational Resources -- The Evolution of an Automated Reading Strategy Tutor: From the Classroom to a Game-Enhanced Automated System -- Experiences in the Field: The Evolution of a Technology-Oriented Teacher Professional Development Model -- A Dialogic Approach to Technology-Enhanced Education for the Global Knowledge Society -- Conceptual Representation Embodied in Hypermedia: An Approach to Promoting Knowledge Co-Construction -- Virtual Worlds for Young People in a Program Context: Lessons from Four Case Studies -- New Technologies, Learning Systems, and Communication: Reducing Complexity in the Educational System -- Collaboration and New Science of Learning -- Fostering Higher Levels of Learning Using Diverse Instructional Strategies with Internet Communication Tools -- Windows into Teaching and Learning Through Social Annotation Practices -- Orchestrating Learning in a One-to-One Technology Classroom -- Designing Online Learning Environments for Professional Development -- Knowledge Building/Knowledge Forum®: The Transformation of Classroom Discourse -- Digital Video Tools in the Classroom: How to Support Meaningful Collaboration and Critical Advanced Thinking of Students? …”
Libro electrónico -
6733por Davis, GeneTabla de Contenidos: “…Chapter 4: Building Basic Projects Building Xcode Projects; Writing Ant Build Files; Compiling from the Terminal; Summary; Chapter 5: Deploying Applications; Learning Application Bundle Basics; Creating Icons; Creating Packages with Jar Bundler; Producing Installations; Summary; Part II: Bringing Guidelines, APIs, and Languages Together; Chapter 6: Porting and Designing; Exploring Mac OS X Structure; Using Darwin; Learning the Human Interface Guidelines; Summary; Chapter 7: Integrating Windows, Menus, and Dialog Boxes; Learning com.apple.eio.FileManager; Investigating com.apple.eawt Classes…”
Publicado 2010
Libro electrónico -
6734Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Writing Queries with T-SQL -- Before starting - installing SQL Server -- SQL Server setup -- Core T-SQL SELECT statement elements -- The simplest form of the SELECT statement -- Joining multiple tables -- Grouping and aggregating data -- Advanced SELECT techniques -- Introducing subqueries -- Window functions -- Common table expressions -- Finding top n rows and using the APPLY operator -- Summary -- Chapter 2: Introducing R -- Obtaining R -- Your first line R of code in R -- Learning the basics of the R language -- Using R data structures -- Summary -- Chapter 3: Getting Familiar with Python -- Selecting the Python environment -- Writing your first python code -- Using functions, branches, and loops -- Organizing the data -- Integrating SQL Server and ML -- Summary -- Chapter 4: Data Overview -- Getting familiar with a data science project life cycle -- Ways to measure data values -- Introducing descriptive statistics for continuous variables -- Calculating centers of a distribution -- Measuring the spread -- Higher population moments -- Using frequency tables to understand discrete variables -- Showing associations graphically -- Summary -- Chapter 5: Data Preparation -- Handling missing values -- Creating dummies -- Discretizing continuous variables -- Equal width discretization -- Equal height discretization -- Custom discretization -- The entropy of a discrete variable -- Advanced data preparation topics -- Efficient grouping and aggregating in T-SQL -- Leveraging Microsoft scalable libraries in Python -- Using the dplyr package in R -- Summary -- Chapter 6: Intermediate Statistics and Graphs -- Exploring associations between continuous variables -- Measuring dependencies between discrete variables…”
Libro electrónico -
6735por Sutherland, KeithTabla de Contenidos: “…; Summary; Name Resolution; Chapter 3 DNS (Domain Name System); Computer Names; Structured Names; Flexible Names; The Lower-level Domains; Chapter 4 WINS (Windows Internet Naming System); More Computer Names; Expanding the Business; Chapter 5 FTP (File Transfer Protocol)…”
Publicado 2000
Libro electrónico -
6736Publicado 2007Tabla de Contenidos: “…Firefox Password ManagerSeXXS Offenders; Equifraked; Owning the Cingular Xpress Mail User; Alternate XSS: Outside the BoXXS; XSS Old School- Windows Mobile PIE 4.2; XSSing Firefox Extensions; XSS Exploitation: Point-Click-Own with EZPhotoSales; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. …”
Libro electrónico -
6737por Carver, GavinTabla de Contenidos: “…Viewing the work - display systems and printersInput devices; 4 Navigating the computer space; Representing three dimensions on two; Understanding co-ordinates; Understanding viewports; Placing the origin; Making models; Drawing aids: grids, snaps and selections; Materials; Lighting; Rendering; 5 The basics of modelling; Using primitives; Transforms; Some uses of simple primitive designs; More modifications and deformations; Boolean; AEC elements: doors, windows and AEC extended; Exercises in exploratory modelling; Abstract Bauprobe; A word about flats and box sets…”
Publicado 2003
Libro electrónico -
6738Publicado 2007Tabla de Contenidos: “…; Groups of Pictures and Why They Matter; MPEG; Microsoft Windows Media and VC-1; Other Compression Technologies; Digital Turnaround; Reality Check; Summary…”
Libro electrónico -
6739por Ralston, BarryTabla de Contenidos: “…Chapter 4 Data Analysis ExpressionsFundamentals of DAX; Calculated Columns; Table Relationships; Calculated Measures from Multiple Data Sources; Filter Context; Summary; Chapter 5 A Method to the Madness; Justification for a Method; Principles; Practices; Summary; Chapter 6 Installing PowerPivot for SharePoint; Getting Started; Existing SharePoint 2010 Installation; Virtual Success; Running PowerPivot for SharePoint on Windows 7; Fun with PowerPivot and SharePoint; Potential Errors; Summary; Chapter 7 Collaboration, Version Control, and Management; Sharing Solutions; Publishing…”
Publicado 2011
Libro electrónico -
6740por McCann, TysonTabla de Contenidos: “…Mixing and MatchingSummary; Chapter 4: Knowing Your Customer; Understanding App Store Demographics; Meeting Your Customer's Expectations; Summary; Chapter 5: Plotting the Stages of Development; Leadership and Your Team; Concept through Release; Summary; Chapter 6; Guidelines and Expectations for Developing Your App; Potential Risk and Reward; App Store Business Models; Creating for a Multitasking World; The Half-Second Window; Depicting the Physical World; Summary; Chapter 7: Creating Free and Freemium Apps; App Revenue Terminology; Business Reasons behind Revenue Models…”
Publicado 2012
Libro electrónico