Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
3281por Mirabito, Michael M., 1956-Tabla de Contenidos: “…Cover; The New Communications Technologies: Applications, Policy, and Impact; Contents; Foreword; Preface; I FOUNDATION; 1 Communication in the Modern Age; BASIC CONCEPTS; SYSTEMS APPROACH: ELECTROMAGNETIC PULSE AND BIOMETRICS; CONCLUSION; REFERENCES/NOTES; SUGGESTED READINGS; GLOSSARY; 2 Technical Foundations of Modern Communication; BASIC CONCEPTS; DIGITAL TECHNOLOGY; ADVANTAGES OF A DIGITAL COMMUNICATIONS SYSTEM; DISADVANTAGES OF DIGITAL COMMUNICATIONS; STANDARDS; REFERENCES/NOTES; SUGGESTED READINGS; GLOSSARY; 3 Computer Technology Primer; HARDWARE; THE MICROCOMPUTER; COMPUTER SOFTWARE…”
Publicado 2004
Libro electrónico -
3282Publicado 2020Tabla de Contenidos: “…-- CONFIABILIDAD Y DISPONIBILIDAD DE LOS DATOS -- CONFIABILIDAD -- DISPONIBILIDAD -- RAID: UNA PARTE DE LA SOLUCION -- RAID NIVEL 0 -- RAID NIVEL 1 -- RAID PARA ALMACENAMIENTO JERARQUICO -- RECUPERACION DE DATOS DESDE UN DISCO FALLADO -- REGENERACIÓN -- RECONSTRUCCIÓN -- USO DE MEMORIAS CACHES PARA AMPLIAR LAS LLAMADAS RAID -- RAID PARA UN ALMACENAMIENTO TOTALMENTE JERARQUICO -- LA DECISION DE NECESIDAD DE RAID -- RAID POR HARDWARE VERSUS RAID POR SOFTWARE -- RAID POR SOFTWARE -- RAID POR HARDWARE -- ELECCION DEL RAID CORRECTO -- OTROS TIPOS DE RAID -- SISTEMAS TOLERANTES A FALLAS (FAULT TOLERANCE SYSTEMS) -- ALMACENAMIENTO IDÉNTICO DE LOS DATOS -- SERVIDORES ESPEJADOS -- DUPLICACIÓN DE DISCOS -- COSTOS OPERATIVOS -- SISTEMAS DE ARCHIVOS DISTRIBUIDOS…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
3283por Rountree, DerrickTabla de Contenidos: “…System Security; General System Security Threats; Hardware and Peripheral Devices; OS and Application Security; Virtualization; System-Based Security Applications; Summary; Chapter 5. …”
Publicado 2011
Libro electrónico -
3284por Rogers, PaulTabla de Contenidos: “…Environment description -- A.1 Hardware -- A.2 Software -- A.3 Applications -- Appendix B. …”
Publicado 2004
Libro electrónico -
3285Publicado 2024Tabla de Contenidos: “…-- Using storyboards -- Storyboard - put away the toys -- Project goals -- Understanding the scope of our use case -- Identifying our hardware needs -- Breaking down our software needs -- Writing a specification -- Summary -- Questions -- Further reading -- Part 2: Adding Perception, Learning, and Interaction to Robotics -- Chapter 4: Recognizing Objects Using Neural Networks and Supervised Learning -- Technical requirements -- A brief overview of image processing -- Understanding our object recognition task -- Image manipulation -- Convolution…”
Libro electrónico -
3286Publicado 2013“…Goff explains the techniques and hardware required to transmit video over fibre optical cable. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3287Publicado 2012“…With the rapid development of multimedia hardware and software, nowadays we can easily make, access and share considerable multimedia contents, which could not be imagined only 10 years before--…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3288Publicado 2015Tabla de Contenidos: “…Front Cover; Dedication; Contents; Preface; About the Author; Chapter Contents; Chapter 1 Introduction And Overview; Chapter Contents; Chapter 2 Concurrent Execution And Operating System Services; Chapter Contents; Chapter 3 An Overview Of The Hardware And Runtime Environment; Chapter Contents; Chapter 4 List And Queue Manipulation; Chapter Contents; Chapter 5 Scheduling And Context Switching; Chapter Contents; Chapter 6 More Process Management; Chapter Contents; Chapter 7 Coordination Of Concurrent Processes; Chapter Contents; Chapter 8 Message Passing; Chapter Contents…”
Libro electrónico -
3289Publicado 2002Tabla de Contenidos: “…Reliability, availability, and serviceability functions -- A.1 RAS concepts -- A.2 RAS functions of the processor -- A.3 RAS functions of the memory -- A.4 RAS functions of the I/O -- A.5 Other RAS enhancements -- Appendix B. Hardware Management Console and Support Element -- B.1 Hardware Management Console (HMC) -- B.2 Support Elements -- B.3 HMC to SE connectivity -- B.4 Remote operations -- B.5 HMC and SE functions -- Appendix C. z900 upgrade paths -- C.1 Vertical upgrade paths within z900 -- C.2 Horizontal upgrade paths from S/390 G5/G6 to z900 -- C.3 Upgrade paths for z900 Coupling Facility model -- Appendix D. …”
Libro electrónico -
3290por Kirch, OlafTabla de Contenidos: “…History TCP/IP Networks UUCP Networks Linux Networking Maintaining Your System Issues of TCP/IP Networking Networking Interfaces IP Addresses Address Resolution IP Routing Internet Control Message Protocol Resolving Host Names Configuring the Networking Hardware Kernel Configuration A Tour of Linux Network Devices Ethernet Installation PLIP Driver PPP and SLIP Drivers Other Network Types Configuring the Serial Hardware Communications Software for Modem Links Introduction to Serial Devices Accessing Serial Devices Serial Hardware Using the Configuration Utilities Serial Devices and the login: Prompt Configuring TCP/IP Networking Mounting the /proc Filesystem…”
Publicado 2000
Libro electrónico -
3291Publicado 2004Tabla de Contenidos: “…Chapter 12 Server Consolidation and Disk Management SimplificationChapter 13 Windows Past, Windows Present: Windows NT and Windows 2000; Chapter 14 Windows Present: Windows XP; Chapter 15 Windows Present and Future: Windows Server 2003, 64-Bit Computing, and Beyond; Chapter 16 Asset Management for Server Hardware and Software; Chapter 17 Software Deployment and Distribution on Windows Platforms; Chapter 18 The Future of Disks and Disk Management; Appendix A: Glossary of Terms; Appendix B: Bibliography; About the Author; Index…”
Libro electrónico -
3292Publicado 2013Tabla de Contenidos: “…Pushing Pixels Secret weapons for the modern animator; Copyright; Contents; Social; Introduction; Foreword; How to Use This Book; Why This Book?; Inspiration; Hardware; Acknowledgments; About the Author; Project 1: Frog Day Afternoon; Toon Boom Animate Pro; Project Settings; Onion Skin; Adobe Flash Integration; Animate Pro Brush Tool; iStockphoto Audio; Working with Sound; Exporting; Uploading to the Internet; Project 2: The Annual Holiday Animations; Apple OS X Functions; Flash Extensions; Inspiration; Recording; Audio Editing; Multitrack Editing; Character Rigging; Flash Document Setup…”
Libro electrónico -
3293Publicado 2017Tabla de Contenidos: “…Front Cover; Contents; Foreword by Dorothy Graham; Foreword by Lisa Crispin; Preface; Acknowledgments; Copyright and Trademarks Declaration Page; Introduction; Author; Chapter 1: Setting the Mobile and Embedded Framework; Chapter 2: Developer Attacks: Taking the Code Head On; Chapter 3: Control System Attacks; Chapter 4: Hardware Software Attacks; Chapter 5: Mobile and Embedded Software Attacks; Chapter 6: Time Attacks: "It's about Time"; Chapter 7: Human User Interface Attacks: "The Limited (and Unlimited) User Interface"; Chapter 8: Smart and/or Mobile Phone Attacks…”
Libro electrónico -
3294Publicado 2015Tabla de Contenidos: “…Chapter 11: Basics, Applications, and Design of Reversible CircuitsChapter 12: Three-Dimensional Spintronics; Chapter 13: Soft-Error-Aware Power Optimization Using Dynamic Threshold; Chapter 14: Future of Asynchronous Logic; Chapter 15: Memristor-CMOS-Hybrid Synaptic Devices Exhibiting Spike-Timing-Dependent Plasticity; Chapter 16: Very-Large-Scale Integration Implementations of Cryptographic Algorithms; Chapter 17: Dynamic Intrinsic Chip ID for Hardware Security; Chapter 18: Ultra-Low-Power Audio Communication System for Full Implantable Cochlear Implant Application…”
Libro electrónico -
3295por Golden, BernardTabla de Contenidos: “…Chapter 8: Choosing Hardware for Your Server Virtualization Project. Part III: Server Virtualization Software Options. …”
Publicado 2008
Libro electrónico -
3296Publicado 2017Tabla de Contenidos: “…Digital electronics ; Ch. 9. Digital hardware and software -- Section 3. Electromechanical and mechanical systems. …”
Libro electrónico -
3297por Slama, DirkTabla de Contenidos: “…Internet of Things 101 -- 6. Hardware 101 -- 7. Digital OEM -- 8. Digital Equipment Operator -- 9. …”
Publicado 2023
Libro electrónico -
3298Publicado 2012“…Todos los capítulos de la presente edición han sido actualizados a fondo para las nuevas API, herramientas y hardware…”
Libro -
3299Publicado 2021“…Una vez terminado el análisis, se ha realizado una propuesta teórica de aplicación de la realidad aumentada en un contexto de formación profesional, seleccionando para ello el hardware y el software más adecuado en el proceso de enseñanza aprendizaje de un ciclo formativo, identificando las posibilidades de utilización…”
Clic para texto completo. Acceso restringido UPSA
Tesis -
3300“…"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. …”
Libro electrónico