Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
2321Publicado 2022Tabla de Contenidos: “…Communication -- 14. Hardware -- 15. Testing -- 16. Troubleshooting -- 17. …”
Libro electrónico -
2322por Westerfield, Mike“…Learn how to build these and other cool things by using iOS device sensors and inexpensive hardware such as Arduino and a Bluetooth Low Energy (LE) Shield. …”
Publicado 2013
Libro electrónico -
2323por Ball, Stuart R.Tabla de Contenidos: “…General Debugging Tips; Debugging: General Strategies; Debugging Step by Step; Chapter 4. Hardware Debug; Tests; Hardware Problems and Solutions; EMI Problems; Chapter 5. …”
Publicado 1998
Libro electrónico -
2324Publicado 2015Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - A Primer on Detection for Security -- 1.1 Today's approach: "compromise-first detection" -- Chapter 2 - 2014 Endpoint Exploitation Trends -- 2.1 Zero-day trends -- 2.3 Emerging zero-day exploitation techniques -- Chapter 3 - The Proposed Solution -- 3.1 The principle of least privilege -- 3.2 Detection's folly -- Chapter 4 - Protection's Weak Link -- 4.1 Desktop virtualization does not secure the endpoint -- 4.2 Detection and isolation using VMs -- Chapter 5 - Micro-Virtualization -- 5.1 Related work -- 5.2 A practical example -- 5.3 Hardware-enforced task isolation -- 5.4 Hardware virtualization technology -- 5.5 Micro-virtualization at work -- 5.6 The microvisor -- 5.7 Memory and CPU isolation -- 5.8 Virtualized file system (VFS) -- 5.9 Virtualized IP networking - the mobile SDN -- 5.10 Virtualized desktop services -- 5.11 Creation and management of micro-VMs -- 5.12 Reducing the attack surface -- Chapter 6 - Advanced Forensics and Analysis -- 6.1 Micro-VM behavioral analysis -- 6.2 Advanced live forensics -- 6.3 LAVA architecture -- 6.4 Conclusion…”
Libro electrónico -
2325por Gay, Warren“…Each chapter contains clear explanations of the STM32 hardware capabilities to help get you started with the device, including GPIO and several other ST Microelectronics peripherals like USB and CAN bus controller. …”
Publicado 2024
Libro electrónico -
2326Publicado 2002Tabla de Contenidos: “…AIX device drivers reference -- Matching AIX device drivers to devices -- PCI-attached hardware -- MCA-attached hardware -- SP Switch Attachment Adapters -- Other attached hardware -- Miscellaneous hardware -- Not supported on AIX 4 and AIX 5L -- Artic device family -- Drivers with other naming conventions -- List of common devices -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover…”
Libro electrónico -
2327Publicado 2017Tabla de Contenidos: “…Adding and managing Windows 10 applications ; Installing and upgrading Legacy programs ; Getting older programs to run ; Repairing and removing programs ; Setting default programs ; Managing programs and processes ; Troubleshooting software problems -- Hardware and performance tuning. Installing and removing hardware ; Using wireless bluetooth devices ; Performance-tuning your system ; Troubleshooting hardware and performance -- Networking and sharing. …”
Libro electrónico -
2328Publicado 2015Tabla de Contenidos: “…Density Parity Check Codes 175 -- 6.3.1 LDPC Encoding and Decoding Algorithms 175 -- 6.3.2 Example of LDPC Encoding and Decoding 191 -- 6.3.3 Hardware Implementation of LDPC Encoding and Decoding 199 -- 6.4 Problems 205 -- References 206 -- 7 Orthogonal Frequency?]…”
Libro electrónico -
2329por Chambers, Mark L.Tabla de Contenidos: “…PCs ALL-IN-ONE For Dummies®; About the Author; Dedication; Author's Acknowledgments; Introduction; Book I: PC Hardware; Book II: Windows 7; Book III: The Internet; Book IV: PC Troubleshooting and Maintanence; Book V: Office 2010; Book VI: Fun with Movies, Music, and Photos; Book VII: Upgrading and Supercharging; Book VIII: Home Networking; Index…”
Publicado 2010
Libro electrónico -
2330Publicado 2018“…In this work, the measurement system ResoCable®, consisting of hardware and software, was developed with the implementation and evaluation of the frequency measurements of external tendons and cables. …”
Libro electrónico -
2331Publicado 2021“…With the ability to confocally address any locations within the measurement volume, the AdaScope provides the hardware foundation for a cascade measurement strategy to be developed, dramatically accelerating the speed of 3D confocal microscopy…”
Libro electrónico -
2332Publicado 2012“…The algorithms are 10-100 times as fast as existing software, sometimes even outperforming FGPA/GPU hardware, because they are designed to suit the computer architecture. …”
Libro electrónico -
2333Publicado 2023“…The book teaches both beginners and longtime electronics enthusiasts the basic C programming skills and hardware knowledge required to build over 55 projects with these popular and inexpensive microcontrollers"--…”
Libro electrónico -
2334Publicado 2016“…In this episode of the Hardware podcast, Jon Bruner and David Cranor talk with Cameron Turner, co-founder and principal at The Data Guild. …”
Grabación de sonido -
2335
-
2336por Bahmanyar, Mir“…It also discusses the Anti-Terror Coalition's tactical approach to clearing these complexes, analyzing the military hardware and the assault teams tasked with dislodging the enemy from these fortified positions…”
Publicado 2004
Libro -
2337por Térmens Graells, Miquel“…La sociedad actual depende de la información digital, pero esta a su vez depende de formatos de ficheros, de software y de hardware que pueden ser alterados y que se vuelven obsoletos con el paso del tiempo y el impacto del cambio tecnológico. …”
Publicado 2013
Texto completo en Odilo
Otros -
2338“…Optimization discussions dive into native code, hardware acceleration, and advanced profiling of multimedia applications. …”
Libro electrónico -
2339Publicado 2020“…System programming is about designing and writing computer programs that interact closely with the underlying operating system and allow computer hardware to interface with the programmer and the user. …”
Libro electrónico -
2340Publicado 2017“…Better, because you don't own the hardware, you only pay for the computing power you need! …”
Libro electrónico