Mostrando 2,681 - 2,700 Resultados de 5,617 Para Buscar '"hardware"', tiempo de consulta: 0.08s Limitar resultados
  1. 2681
    Publicado 2019
    “…Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest.Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. …”
    Grabación musical
  2. 2682
    Publicado 2019
    “…Written in easy-to-understand language, this book targets directors and executives who want to protect themselves from risks ranging from massive cyber security breaches to digital infrastructure investment mistakes.Most board members don't have the information they need to understand digital information systems, modern high-speed networks, and rapidly evolving software and hardware ecosystems. They also don't have the time to seek out or filter what they need from the many diverse sources. …”
    Grabación musical
  3. 2683
    por Meyers, Mike
    Publicado 2022
    “…Created and edited by the leading authority on CompTIA A+ certification and training, this four-color guide will help you pass CompTIA A+ exams 220-1101 and 220-1102 and become a certified IT professional with proven expertise in hardware and software. Mike Meyers' CompTIA A+" Guide to Managing and Troubleshooting PCs, Seventh Edition offers complete coverage of the latest exam objectives. …”
    Libro electrónico
  4. 2684
    Publicado 2024
    “…What's Inside Writing and running concurrent programs Patterns for performance, scalability, and resilience Choosing the right hardware Asynchronous communication About the Reader Examples in Python. …”
    Grabación no musical
  5. 2685
    Publicado 2018
    “…The author discusses the range of applications, from the assessment of different architectures and their suitability, to the collaboration between system engineering, specialties such as safety or security, subsystems engineering teams, software and hardware. This is illustrated by several examples of representative models which constitute a common thread…”
    Libro
  6. 2686
    Publicado 2013
    “…Los dispositivos móviles están formados por un conjunto de componentes de hardware capaces de soportar una gran variedad de tecnologías inalámbricas (GSM, UMTS, Wifi, Bluetooth, etc.), donde destaca uno o varios procesadores de altas prestaciones que permiten ejecutar un sistema operativo muy complejo y un gran número de aplicaciones que requieren una gran capacidad de cálculo. …”
    Clic para texto completo. Acceso usuarios UPSA
    Clic para texto completo. Acceso fuera UPSA
    Libro electrónico
  7. 2687
    por Térmens, Miquel
    Publicado 2013
    “…La sociedad actual depende de la información digital, pero esta a su vez depende de formatos de ficheros, de software y de hardware que pueden ser alterados y que se vuelven obsoletos con el paso del tiempo y el impacto del cambio tecnológico. …”
    Enlace del recurso
    Libro electrónico
  8. 2688
    por Lázaro Domínguez, Francisco
    Publicado 2015
    Tabla de Contenidos: “…Investigación forense de dispositivos móviles Android -- Página legal -- Índice -- Introducción -- Capítulo 1 -- 1.1 un ordenador -- 1.2 Hardware -- 1.3 S oftware -- 1.4 A rquitectura -- 1.5 ¿Cómo es una aplicación Android -- 1.6 Si stemas de archivos -- Capítulo 2 -- 2.1 Máquinas -- 2.2 VM ware Workstation -- 2.3 Vi rtualBox -- 2.4 A ndroid -- 2.5 Li nux -- Capítulo 3 -- 3.1 Desafíos de la movilidad -- 3.2 Previsualización -- 3.3 tarjeta de memoria -- 3.4 D ata Carving -- 3.5 A cceso mediante -- 3.6 Extrayendo información -- 3.7 R ooting -- Capítulo 4 -- 4.1 Cadena de custodia -- 4.2 Particiones Recovery -- 4.3 A dquisición por hardware -- Capítulo 5 -- 5.1 estructuras -- 5.2 XML -- 5.3 Ingeniería inversa -- 5.4 SQLi te -- 5.5 A nálisis de aplicaciones -- 5.6 Herramientas -- 5.7 YAFFS/YAFFS2 -- Capítulo 6 -- 6.1 M odelo de seguridad -- 6.2 A taques contra -- 6.3 Vu lnerabilidades -- 6.4 Software malicioso -- 6.5 V ectores de ataque -- 6.6 Ejemplos de aplicaciones -- 6.7 Espionaje -- Capítulo 7 -- 7.1 V entajas del software -- 7.2 C ellebrite UFED Touch -- 7.3 O xygen Forensic -- 7.4 ADEL -- Capítulo 8 -- 8.1 Análisis de dispositivos -- 8.2 E quipamiento -- 8.3 i nvestigación convencional -- 8.4 OTROS Aspectos -- Bibliografía -- Índice alfabético…”
    Libro electrónico
  9. 2689
    por Plattner, Hasso. author
    Publicado 2013
    Tabla de Contenidos: “…Introduction -- The Future of Enterprise Computing: New Requirements for Enterprise Computing -- Enterprise Application Characteristics -- Changes in Hardware -- A Blueprint of SanssouciDB -- Foundations of Database Storage Techniques: Dictionary Encoding -- Compression -- Data Layout in Main Memory -- Partitioning -- In-Memory Database Operators: Delete.- Insert -- Update.- Tuple Reconstruction -- Scan Performance -- Select -- Materialization Strategies.- Parallel Data Processing -- Indices -- Join -- Aggregate Functions -- Parallel Select -- Workload Management and Scheduling -- Parallel Join -- Parallel Aggregation -- Advanced Database Storage Techniques: Differential Buffer -- Insert- Only -- The Merge Process -- Logging -- Recovery -- On-the-fly Database Reorganization -- Foundations for a New Enterprise Application Development Era: Implications on Application Development -- Database Views -- Handling Business Objects -- Bypass Solution -- Self Test Solution…”
    Libro electrónico
  10. 2690
    por Goodman, Danny
    Publicado 2011
    Tabla de Contenidos: “…Using an app offline ; More access to the hardware ; More access to the software ; What you lose ; Taking the plunge -- Welcome to the iOS SDK. …”
    Libro electrónico
  11. 2691
    Publicado 2016
    “…This book guides you through the design of both the physical hardware cluster and the infrastructure services you'll need to create a custom cloud platform. …”
    Libro electrónico
  12. 2692
    Publicado 2020
    “…This term has evolved from Radio Frequency Identifier (RFID) which represented a hardware related break-through that aimed to connect everyday objects in a network. …”
    Libro electrónico
  13. 2693
    Publicado 2015
    “…You'll start by understanding the capabilities of the Rift hardware. Then you'll follow interesting and instantly relevant examples that walk you through programming real applications using the Oculus SDK. …”
    Libro electrónico
  14. 2694
    por Kwong, Wing C.
    Publicado 2013
    Tabla de Contenidos: “…Fundamental Materials and Tools Galois Fields Vector Space Matrix Theory Hamming Distance and Weight Correlation Functions Cardinality Upper Bound Markov Chain Algebraic Tools for Performance Analysis Summary Optical Coding Schemes 1-D Temporal Amplitude Coding 1-D Temporal Phase Coding 1-D Spectral Phase Coding 1-D Spectral Amplitude Coding 2-D Spatial-Temporal Amplitude Coding 2-D Spectral-Temporal Amplitude Coding Three-Dimensional Coding Multirate and Multiple-QoS Coding Multicode Keying and Shifted-Code Keying Enabling Hardware Technologies Potential Applications Summary 1-D Asynchronous Prime Codes Original Prime Codes Extended Prime Codes Generalized Prime Codes 2 n Prime Codes Optical Orthogonal Codes Summary 1-D Synchronous Prime Codes Synchronous Prime Codes Synchronous Multilevel Prime Codes Synchronous Coding Applications Summary 2-D Asynchronous Prime Codes Carrier-Hopping Prime Codes Multilevel Carrier-Hopping Prime Codes Shifted Carrier-Hopping Prime Codes Extended Carrier-Hopping Prime Codes Expanded Carrier-Hopping Prime Codes Quadratic-Congruence Carrier-Hopping Prime Codes Prime-Permuted Codes with Unipolar Codes Prime-Permuted Codes with Bipolar Codes Quadratic-Congruence-Permuted Codes 2-D Optical Orthogonal Codes Summary 2-D Synchronous Prime Codes Synchronous Original, Expanded, and Quadratic-Congruence Carrier-Hopping Prime Codes Synchronous Multilevel Carrier-Hopping Prime Codes Synchronous Prime-Permuted Codes Summary Multilength Prime Codes Multilength Carrier-Hopping Prime Codes Multilength Expanded Carrier-Hopping Prime Codes Multilength Quadratic-Congruence Carrier-Hopping Prime Codes 2-D Multilength Prime-Permuted Codes Variable-Weight Coding with Same Bit Power Multilength 1-D Optical Orthogonal Codes Summary 3-D Prime Codes Concatenated Prime Codes Multicarrier Prime Codes Summary Index…”
    Libro electrónico
  15. 2695
    por Giddings, Seth
    Publicado 2014
    “…The 'gameworlds' title indicates both the virtual world designed into the videogame and the wider environments in which play is manifested: social relationships between players; hardware and software; between the virtual worlds of the game and the media universes they extend (e.g. …”
    Libro electrónico
  16. 2696
    Publicado 2022
    “…This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. …”
    Libro electrónico
  17. 2697
    Publicado 2018
    “…On the other hand, the term cognitive computing is generally used to refer to new hardware and/or software that mimics the functioning of the human brain and helps to improve human decision-making. …”
    Libro electrónico
  18. 2698
    Publicado 2019
    Tabla de Contenidos: “…Evidenced-based practice -- The audiologist and hearing aid provision -- Understanding the hearing aid candidate -- Speech acoustics -- Pre-fitting tests using frequency-specific measures -- Pre-fitting testing using speech material -- Self-assessment scales for pre-fitting testing -- Hearing aid styles and fitting applications -- Ear impressions, earmolds, and associated plumbing -- Hearing aid hardware and software : the basics -- Signal classification and sound cleaning technologies -- More hearing aid features and algorithms -- Electroacoustic (and other) quality control techniques -- Prescriptive formulas and programming -- Behavioral assessment during clinical fittings -- Probe-microphone measures : rationale and procedures -- Probe microphone clinical uses -- Hearing aid orientation and troubleshooting -- Validation : self-report outcomes -- Supplemental information : corrections, conversions, and calculations…”
    Libro
  19. 2699
    Publicado 2002
    Tabla de Contenidos: “…Cover; Table of Contents; Foreword v 1.0; Foreword v 1.5; Chapter 1 How To Hack; Chapter 2 The Laws of Security; Chapter 3 Classes of Attack; Chapter 4 Methodology; Chapter 5 Diffing; Chapter 6 Cryptography; Chapter 7 Unexpected Input; Chapter 8 Buffer Overflow; Chapter 9 Format Strings; Chapter 10 Sniffing; Chapter 11 Session Hijacking; Chapter 12 Spoofing: Attacks on Trusted Identity; Chapter 13 Tunneling; Chapter 14 Hardware Hacking; Chapter 15 Viruses, Trojan Horses, and Worms; Chapter 16 IDS Evasion; Chapter 17 Automated Security Review and Attack Tools…”
    Libro electrónico
  20. 2700
    por Jackson, Wallace. author
    Publicado 2015
    Tabla de Contenidos: “…Foundations of Digital Painting: Canvas and Brush -- 2. Hardware of Digital Painting: Tablet and Stylus -- 3. …”
    Libro electrónico