Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
3441Publicado 2020“…Nicolas Kowalski and Axel Antoniotti outline how Criteo approached this issue, discussing how Criteo profiled its model to understand its bottleneck; why commonly shared solutions such as optimizing TensorFlow build for the target hardware, freezing and cleaning up the model, and using accelerated linear algebra (XLA) ended up being lackluster; and how Criteo rewrote is models from scratch, reimplementing cross-features and hashing functions using low-level TF operations in order to factorize as much as possible all TensorFlow nodes in its model."…”
Vídeo online -
3442Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Revisiting pfSense Basics -- Technical requirements -- pfSense project overview -- Possible deployment scenarios -- Hardware requirements and sizing guidelines -- Minimum hardware requirements -- Hardware sizing guidelines -- The best practices for installation and configuration -- pfSense configuration -- Configuration from the console -- Configuration from the web GUI -- Configuring additional interfaces -- Additional WAN configuration -- General setup options -- Summary -- Questions -- Further reading -- Chapter 2: Advanced pfSense Configuration -- Technical requirements -- SSH login -- DHCP -- DHCP configuration at the console -- DHCP configuration in the web GUI -- DHCPv6 configuration in the web GUI -- DHCP and DHCPv6 relay -- DHCP and DHCPv6 leases -- DNS -- DNS resolver -- General Settings -- Enable DNSSEC support -- Host Overrides and Domain Overrides -- Access Lists -- DNS forwarder -- DNS firewall rules -- DDNS -- DDNS updating -- RFC 2136 updating -- Troubleshooting DDNS -- Captive portal -- Implementing captive portal -- User manager authentication -- Voucher authentication -- RADIUS authentication -- Other settings -- Troubleshooting captive portal -- NTP -- SNMP -- Summary -- Questions -- Chapter 3: VLANs -- Technical requirements -- Basic VLAN concepts -- Example 1 - developers and engineering -- Example 2 - IoT network -- Hardware, configuration, and security considerations -- VLAN configuration at the console -- VLAN configuration in the web GUI -- QinQ -- Link aggregation -- Add firewall rules for VLANs -- Configuration at the switch -- VLAN configuration example 1 - TL-SG108E -- VLAN configuration example 2 - Cisco switches -- Static VLAN creation -- Dynamic Trunking Protocol…”
Libro electrónico -
3443Publicado 2018Tabla de Contenidos: “…Chapter 4: Endpoint Security and Trustworthiness -- Defining an IIoT endpoint -- Motivation and risk-based endpoint protection -- Resource-constrained endpoint protection -- Brownfield scenario considerations -- Endpoint security enabling technologies -- IIoT endpoint vulnerabilities -- Case study - White hack exposes smart grid meter vulnerability -- Use case -- Developing the exploit -- Demonstration -- Establishing trust in hardware -- Hardware security components -- Root of trust - TPM, TEE, and UEFI -- Securing secrets, or sealing -- Endpoint identity and access control -- Initialization and boot process integrity -- Establishing endpoint trust during operations -- Secure updates -- A trustworthy execution ecosystem -- Endpoint data integrity -- Endpoint configuration and management -- Endpoint visibility and control -- Endpoint security using isolation techniques -- Process isolation -- Container isolation -- Virtual isolation -- Physical isolation -- Endpoint physical security -- Machine learning enabled endpoint security -- Endpoint security testing and certification -- Endpoint protection industry standards -- Summary -- Chapter 5: Securing Connectivity and Communications -- Definitions - networking, communications, and connectivity -- Distinguishing features of IIoT connectivity -- Deterministic behavior -- Interoperability - proprietary versus open standards -- Performance characteristics - latency, jitter, and throughput -- Legacy networks with disappearing air gaps -- Access to resource-constrained networks -- Massive transition by connecting the unconnected -- IIoT connectivity architectures -- Multi-tier IIoT-secured connectivity architecture -- Layered databus architecture -- Controls for IIoT connectivity protection -- Secure tunnels and VPNs -- Cryptography controls -- Network segmentation -- Industrial demilitarized zones…”
Libro electrónico -
3444Publicado 2014Tabla de Contenidos: “…; 3.9 Conclusion; References; 4 How SDN Works; 4.1 Fundamental Characteristics of SDN; 4.1.1 Plane Separation; 4.1.2 A Simple Device and Centralized Control; 4.1.3 Network Automation and Virtualization; 4.1.4 Openness; 4.2 SDN Operation; 4.3 SDN Devices; 4.3.1 Flow Tables; 4.3.2 SDN Software Switches; 4.3.3 Hardware SDN Devices; 4.3.4 Existing SDN Device Implementations…”
Libro electrónico -
3445Publicado 2023Tabla de Contenidos: “…Cover -- Exam Vouchers -- FM -- Copyright -- Contributors -- Table of Contents -- Preface -- How to Use This Book -- Approach for Navigating Multiple-Choice Queries -- Exercising Caution in Testing -- Advice on Additional Resources - Practical Exercise -- Chapter 1: Mobile Devices -- Introduction -- Practice Exam Questions -- 1.1 Given a scenario, install and configure laptop hardware and components -- 1.2 Compare and contrast the display components of mobile devices -- 1.3 Given a scenario, set up and configure accessories and ports of mobile devices -- 1.4 Given a scenario, configure basic mobile-device network connectivity and application support -- Chapter 2: Networking -- Introduction -- Practice Exam Questions -- 2.1 Compare and contrast TCP and UDP ports, protocols, and their purposes -- 2.2 Compare and contrast common networking hardware -- 2.3 Compare and contrast protocols for wireless networking -- 2.4 Summarize services provided by networked hosts -- 2.5 Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks -- 2.6 Compare and contrast common network configuration concepts -- 2.7 Compare and contrast internet connection types, network types, and their features -- 2.8 Given a scenario, use networking tools -- Chapter 3: Hardware -- Introduction -- Practice Exam Questions -- 3.1 Explain basic cable types and their connectors, features, and purposes -- 3.2 Install the appropriate RAM given a scenario -- 3.3 Given a scenario, select and install storage devices -- 3.4 Given a scenario, install and configure motherboards, central processing units (CPUs), and add-on cards -- 3.5 Given a scenario, install or replace the appropriate power supply -- 3.6 Given a scenario, deploy and configure multifunction devices/printers and settings…”
Libro electrónico -
3446por Aspinwall, Jim“… Intel-and AMD-powered PCs--which account for more than 90% of all personal computers--are powerful and expandable, and operating systems like Windows and Linux do a great job of running well on this hardware. But to maintain maximum stability and predictability, these operating systems don't push the hardware to its limits. …”
Publicado 2005
Libro electrónico -
3447Publicado 2017Tabla de Contenidos: “…Real-time image processing -- 2. Hardware Architectures for Real-time Processing -- 2.1. …”
Libro electrónico -
3448Publicado 2022Tabla de Contenidos:Libro electrónico
-
3449Publicado 2004Tabla de Contenidos: “…The Devil is in the Details; Domain Name; Digital Certificates; Merchant Account; Check Processing; Other Payment Options; Conclusion; Chapter 4. Server Hardware; The Small Website's Server Specifications; Server Specifications for a Robust Website…”
Libro electrónico -
3450por Bakir, Ahmed. authorTabla de Contenidos: “…""Making Your Images Move with Your Device""""Adding Blurring to Your Images""; ""Summary""; ""Chapter 4: Advanced Photo Interfaces""; ""Building a Custom Camera Interface""; ""Initializing the Hardware Interface""; ""Accessing the Live Camera Feed""; ""Capturing a Still Image""; ""Accessing Hardware Controls""; ""Switching Cameras""; ""Changing Flash Modes""; ""Changing Autofocus Modes""; ""Changing Exposure Modes""; ""Handling Different Screen Sizes""; ""Building a Custom Image Picker""; ""Instantiating an Asset Library as a Data Source""…”
Publicado 2014
Libro electrónico -
3451Publicado 2015Tabla de Contenidos: “…Tackling memory inefficiencyMeasuring latency with Criterium; Criterium and Leiningen; Summary; Chapter 5: Concurrency; Low-level concurrency; Hardware memory barrier (fence) instructions; Java support and the Clojure equivalent; Atomic updates and state; Atomic updates in Java; Clojure's support for atomic updates; Faster writes with atom striping; Asynchronous agents and state; Asynchrony, queueing, and error handling; Why you should use agents; Nesting; Coordinated transactional ref and state; Ref characteristics; Ref history and in-transaction deref operations…”
Libro electrónico -
3452Tabla de Contenidos: “…FormattingGrouping; Filtering; Conversion; Variables; Additional Modules; Remote PowerShell; PowerShell ISE; Requirements for Hardware Virtualization; The Virtualization Host; Virtual Processors; Storage Requirements for Virtual Machines; Virtualization Host Storage; Virtual Hard Disks; Fixed Size; Dynamically Expanding; Differencing Disk; Pass-Through Disk; Snapshots; Memory Requirements for Virtual Machines; High-Availability Solutions; Virtualization; Sizing Virtual Exchange 2013 Servers; Summary; Chapter 2: Installing Exchange Server 2013; Designing Exchange Server 2013…”
Libro electrónico -
3453por Shelley, StevenTabla de Contenidos: “…The Individual InstrumentsLighting Console Support Software; Computer Lighting Design Software; Housing & Hanging Hardware; Accessory Hardware; Atmospherics; COLOR; Defining Color; Color Temperature; Color Perception; Color Mixing; Color Media; THE STAFF OF A PRODUCTION; The Management and Creative Staff; The Production Staff; The House Staff; The Lighting Department; The Lighting Designer; The Associate Lighting Designer; The Assistant Lighting Designer; Staff Summary; THE PRODUCTION SCHEDULE; THE LIGHT PLOT AND LIGHTING SECTION; Creating and Constructing a Lighting Design…”
Publicado 2009
Libro electrónico -
3454por Russotti, PattiTabla de Contenidos: “…Recommended Workstation SetupRam; Graphics Cards; Hardware Setup; Speed; Capacity; Connection; Additional Workstation Considerations; Chapter 5. …”
Publicado 2010
Libro electrónico -
3455Publicado 2015Tabla de Contenidos: “…""Cloning a virtual machine to a template""""Deploying new virtual machines from a template""; ""Importing a virtual appliance from OVA""; ""Performing a hot add of virtual hardware to an existing virtual machine""; ""Enabling and disabling Fault Tolerance on a virtual machine""; ""Increasing the disk space in a virtual machine""; ""Upgrading the virtual hardware version of a virtual machine ""; ""Locating and reloading inaccessible or invalid virtual machines ""; ""Setting VMware Tool settings from PowerCLI ""; ""Creating basic reports of VM properties using VMware Tools and PowerCLI""…”
Libro electrónico -
3456por Cohen, TylerTabla de Contenidos: “…; Imaging and Hashing; Hardware vs . Nonhardware Imaging; Types of iPods; File Systems; "Hacking Tools" and Encrypted Home Directories; Evidence: Normal vs . …”
Publicado 2007
Libro electrónico -
3457Publicado 2002Tabla de Contenidos: “…Using snoopInstalling Solaris; Pre-Installation Checklist; Host Configuration Worksheet; Hardware Configuration Worksheet; Software Configuration Worksheet; Solaris Installations (SPARC); Supported SPARC Platforms; Solaris Installations (Intel); Selecting Intel Hardware; Prebuilt Systems; Motherboards; Video Cards and Monitors; Mouse; SCSI Host Adapters; Zip/Jaz Devices; Network Cards; PCMCIA Cards; Preparing for Installation (SPARC); Preparing for Installation (Intel); Web Start Wizard Installation; Network Configuration; Creating Networks and Subnets; Configuring Network Interfaces…”
Libro electrónico -
3458por Hirt, AllanTabla de Contenidos: “…Using Network-Attached Storage as a Data Store with SQL ServerStorage Area Networks; What Disk Technology to Use; Server Clusters, Failover Clustering, and Disks; Pre-Windows Disk Configuration; Step 2-Individual Drive Throughput; Step 3-Calculating Number of Spindles; Understanding Disk Drives; Understanding Your Hardware; Understanding How SQL Server Interacts with Disks; Understanding Disk Cache; A RAID Primer; Mirroring; Striped Mirrors; Mirrored Stripes; Striping with Parity; Hardware RAID versus Software RAID; Remote Mirroring; Storage Composition…”
Publicado 2009
Libro electrónico -
3459por Honeycutt, JerryTabla de Contenidos: “…Windows Vista Home BasicWindows Vista Home Premium; Windows Vista Business; Windows Vista Enterprise; Windows Vista Ultimate; Choosing Hardware; Hardware Requirements; Summary; Additional Resources; On the Companion CD; 2. …”
Publicado 2009
Libro electrónico -
3460por Cardwell, KevinTabla de Contenidos: “…Spatial ErgonomicsA Note on "common office technology"; Personal Workspace Design; Common Area Considerations; Essential Laboratory Tools; Write Blockers; Write Block Field Kits; Hardware Duplication Platforms; Portable Forensics Systems; Portable Enterprise Systems; Laboratory Forensics Systems; Media Sterilization Systems; Data Management (Backup, Retention, Preservation); CD/DVD Hardware Solutions; Portable Device Forensics, Some Basic Tools; Faraday Devices as Applied to Forensics; Real-World Examples; Portable Devices and Data Storage; Locating the Data; Power; Readers, readers, readers!…”
Publicado 2007
Libro electrónico