Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
3881por Iniewski, Krzysztof“…Additionally, it focuses on areas not widely covered in existing books: physical transport and switching, the process and technique of building networking hardware, and new technologies being deployed in the marketplace, such as Metro Wave Division Multiplexing (MWDM), Resilient Packet Rings (RPR), Optical Ethernet, and more. …”
Publicado 2008
Libro electrónico -
3882por Smith, Bud E.“…It presents helpful tips on how to maximize energy savings as well as how to present information gradually to allow peers and stakeholders to absorb it.The book's comprehensive coverage includes various types of hardware and software, including the changes currently happening, underlying trends, products currently on the market, and what to expect -- or, in some cases, what organizations should ask for--from suppliers in the future.On the hardware side, the book considers tablet computers -- examining the iPad and Android-based tablets. …”
Publicado 2014
Libro electrónico -
3883Publicado 2013“…The availability of suitable hardware and software tools is condicio sine qua non for new methods testing. …”
Libro electrónico -
3884Publicado 2022“…Scalability-replicability of the FLEXITRANSTORE technology innovations integrates hardware-software solutions in all areas of the transmission system and the wholesale markets, promoting increased RES. …”
Libro electrónico -
3885Publicado 2016Tabla de Contenidos: “…Linux and OSS in a Forensic Context -- Advantages of Linux and OSS in Forensics Labs -- Disadvantages of Linux and OSS in Forensics Labs -- Linux Kernel and Storage Devices -- Kernel Device Detection -- Storage Devices in /dev -- Other Special Devices -- Linux Kernel and Filesystems -- Kernel Filesystem Support -- Mounting Filesystems in Linux -- Accessing Filesystems with Forensic Tools -- Linux Distributions and Shells -- Linux Distributions -- The Shell -- Command Execution -- Piping and Redirection -- Closing Thoughts -- Chapter 3: Forensic Image Formats -- Raw Images -- Traditional dd -- Forensic dd Variants -- Data Recovery Tools -- Forensic Formats -- EnCase EWF -- FTK SMART -- AFF -- SquashFS as a Forensic Evidence Container -- SquashFS Background -- SquashFS Forensic Evidence Containers -- Closing Thoughts -- Chapter 4: Planning and Preparation -- Maintain an Audit Trail -- Task Management -- Shell History -- Terminal Recorders -- Linux Auditing -- Organize Collected Evidence and Command Output -- Naming Conventions for Files and Directories -- Scalable Examination Directory Structure -- Save Command Output with Redirection -- Assess Acquisition Infrastructure Logistics -- Image Sizes and Disk Space Requirements -- File Compression -- Sparse Files -- Reported File and Image Sizes -- Moving and Copying Forensic Images -- Estimate Task Completion Times -- Performance and Bottlenecks -- Heat and Environmental Factors -- Establish Forensic Write-Blocking Protection -- Hardware Write Blockers -- Software Write Blockers -- Linux Forensic Boot CDs -- Media with Physical Read-Only Modes -- Closing Thoughts -- Chapter 5: Attaching Subject Media to an Acquisition Host -- Examine Subject PC Hardware -- Physical PC Examination and Disk Removal -- Subject PC Hardware Review -- Attach Subject Disk to an Acquisition Host -- View Acquisition Host Hardware…”
Libro electrónico -
3886Publicado 2010Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Introduction -- Chapter 1 Introduction to Cisco Wide Area Application Services (WAAS) -- Understanding Application Performance Barriers -- Layer 4 Through Layer 7 -- Latency -- Bandwidth Inefficiencies -- Throughput Limitations -- Network Infrastructure -- Bandwidth Constraints -- Network Latency -- Loss and Congestion -- Introduction to Cisco WAAS -- WAN Optimization -- Data Redundancy Elimination -- Persistent LZ Compression -- Transport Flow Optimization -- Secure Sockets Layer (SSL) Optimization -- Application Acceleration -- Object and Metadata Caching -- Prepositioning -- Read-Ahead -- Write-Behind -- Multiplexing -- Other Features -- Branch Virtualization -- The WAAS Effect -- Summary -- Chapter 2 Cisco WAAS Architecture, Hardware, and Sizing -- Cisco WAAS Product Architecture -- Disk Encryption -- Central Management Subsystem -- Interface Manager -- Monitoring Facilities and Alarms -- Network Interception and Bypass Manager -- Application Traffic Policy Engine -- Virtual Blades -- Hardware Family -- Router-Integrated Network Modules -- NME-WAE Model 302 -- NME-WAE Model 502 -- NME-WAE Model 522 -- Appliances -- WAVE Model 274 -- WAVE Model 474 -- WAE Model 512 -- WAVE Model 574 -- WAE Model 612 -- WAE Model 674 -- WAE Model 7341 -- WAE Model 7371 -- Licensing -- Performance and Scalability Metrics -- Device Memory -- Disk Capacity -- Number of Optimized TCP Connections -- WAN Bandwidth and LAN Throughput -- Number of Peers and Fan-Out -- Number of Devices Managed -- Replication Acceleration -- Virtual Blades -- Summary -- Chapter 3 Planning, Discovery, and Analysis -- Planning Overview -- Planning Overview Checklist -- Requirements Collection and Analysis -- Site Information -- Site Types -- User Population -- Physical Environment -- Site Information Checklist -- Network Infrastructure -- WAN Topology…”
Libro electrónico -
3887Publicado 2002Tabla de Contenidos: “…Setting up iSeries Access for Web -- 2.1 iSeries server requirements -- 2.1.1 iSeries hardware requirements -- 2.1.2 Software requirements -- 2.1.3 Software considerations -- 2.2 Web browser requirements -- 2.3 Setup overview -- 2.4 Migration -- 2.5 Connecting to multiple iSeries servers -- 2.6 Setting up a secure iSeries connection -- Chapter 3. …”
Libro electrónico -
3888Publicado 2023Tabla de Contenidos: “…6.3.2.1 High-K Dielectric -- 6.3.2.2 Metal Gate -- 6.3.2.3 Multiple Gate -- 6.4 Role of High-K in CMOS Miniaturization -- 6.5 Current Mosfet Technologies -- 6.6 Conclusion -- References -- Chapter 7 Investigation of Diabetic Retinopathy Level Based on Convolution Neural Network Using Fundus Images -- 7.1 Introduction -- 7.2 The Proposed Methodology -- 7.3 Dataset Description and Feature Extraction -- 7.3.1 Depiction of Datasets -- 7.3.2 Preprocessing -- 7.3.3 Detection of Blood Vessels -- 7.3.4 Microaneurysm Detection -- 7.4 Results and Discussions -- 7.5 Conclusions -- References -- Chapter 8 Anti-Theft Technology of Museum Cultural Relics Using RFID Technology -- 8.1 Introduction -- 8.2 Literature Survey -- 8.3 Software Implementation -- 8.4 Components -- 8.4.1 Arduino UNO -- 8.4.2 EM18 Reader Module -- 8.4.3 RFID Tag -- 8.4.4 LCD Display -- 8.4.5 Sensors -- 8.4.5.1 Fire Sensor -- 8.4.5.2 IR Sensor -- 8.4.6 Relay -- 8.5 Working Principle -- 8.5.1 Working Principle -- 8.6 Results and Discussions -- 8.7 Conclusions -- References -- Chapter 9 Smart Irrigation System Using Machine Learning Techniques -- 9.1 Introduction -- 9.2 Hardware Module -- 9.2.1 Soil Moisture Sensor -- 9.2.2 LM35-Temperature Sensor -- 9.2.3 POT Resistor -- 9.2.4 BC-547 Transistor -- 9.2.5 Sounder -- 9.2.6 LCD 16x2 -- 9.2.7 Relay -- 9.2.8 Push Button -- 9.2.9 LED -- 9.2.10 Motor -- 9.3 Software Module -- 9.3.1 Proteus Tool -- 9.3.2 Arduino Based Prototyping -- 9.4 Machine Learning (Ml) Into Irrigation -- 9.5 Conclusion -- References -- Chapter 10 Design of Smart Wheelchair with Health Monitoring System -- 10.1 Introduction -- 10.2 Proposed Methodology -- 10.3 The Proposed System -- 10.4 Results and Discussions -- 10.5 Conclusions -- References -- Chapter 11 Design and Analysis of Anti-Poaching Alert System for Red Sandalwood Safety -- 11.1 Introduction…”
Libro electrónico -
3889por Blawat, Brenton J. W.Tabla de Contenidos: “…Using the basic CIM cmdletsCreating, verifying, and terminating new sessions; Top features you'll want to know about; New CIM instance and class cmdlets; Get-CimClass cmdlets; New-CimInstance cmdlets; Set-CimInstance cmdlet; Remove-CimInstance cmdlets; Get-CimAssociatedInstance cmdlet; Invoke-CimMethod cmdlet; Scenario 1 - using WMI in software deployment; Checking the operating system version; Checking disk space; Checking the hardware model number; Checking for running processes; Checking for running services; Viewing the installed software; Checking file version numbers…”
Publicado 2013
Libro electrónico -
3890Publicado 2022Tabla de Contenidos: “…PART I 0́3 THEORY AND CONCEPTSCHAPTER 1 0́3 The Internet of Things (IoT)1.1A New Design Paradigm: The Internet of Things1.2Introduction to the IoT Framework1.3Understanding the FULL Potential of the Internet of Things1.4Challenges of Implementing effective IoT Systems1.5Effective Implementation of IoT Systems: A step-by-step Process1.6Case studies of Successful IoT Applications1.7IoT of Tomorrow: Emerging Trends of the Internet of ThingsCHAPTER 2 0́3 Foundation Topics: Concepts2.1Terminologies & Fundamentals2.2Embedded Systems: Introduction2.3Embedded Systems: Hardware Considerations2.4Embedded Systems: Software Considerations2.5Embedded Systems: Peripherals2.6Online Resources: The Journey ContinuesPART II 0́3 HANDS-ON SYSTEM DEVELOPMENTCHAPTER 3 0́3 Foundation Topics: Programming & Coding3.1Programming Languages: C++3.2Programming Languages: Python3.3The Linux Operating SystemCHAPTER 4 0́3 Controller Boards IoT Systems (Arduino Systems)4.1The Arduino Boards4.2Arduino Peripherals4.3The Arduino Integrated Development Environment (Arduino IDE)4.4Hands-on Projects: Arduino Autonomous Systems4.5Hands-on Projects: Arduino-based IoT SystemsCHAPTER 5 0́3 Computer Boards IoT Systems (Raspberry Pi Systems)5.1The Raspberry Pi Boards5.2The Raspberry Pi Peripherals5.4Hands-on Projects: Raspberry Pi Autonomous Systems5.5Hands-on Projects: Raspberry Pi-based IoT Systems…”
Libro electrónico -
3891Publicado 2008Tabla de Contenidos: “…Installing and replacing hardware ; 31. Editing the registry ; 32. Command-line and automation tools -- VII. …”
Libro electrónico -
3892Publicado 2014Tabla de Contenidos: “…Retina display supportDisplay calibration and profiling; Calibration hardware; The calibration/profiling procedure; White point; Gamma; Luminance; The profiling process; Do you want good color or just OK color?…”
Libro electrónico -
3893Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- PART I Choose Change Before It Chooses You -- CHAPTER 1 How Change Changes Things-and What to Do About It: Making Friends with Change -- CHAPTER 2 Got Your Back: Lifeguard Lessons -- CHAPTER 3 The Change-Proof Model: Pause, Ask, Choose -- PART II Becoming Change Proof -- CHAPTER 4 The Power of Choice: Leveraging Your Relationship to Change and Stress -- CHAPTER 5 The Markers of Resilience -- CHAPTER 6 The Myth of Balance -- CHAPTER 7 Harmony -- CHAPTER 8 The Resilience Bank Account -- CHAPTER 9 Resilient Organizations -- CHAPTER 10 Left Brain Resilience -- PART III Change-Proof Hardware -- CHAPTER 11 Recovery Versus Burnout -- CHAPTER 12 Recover Before It's Too Late -- CHAPTER 13 Even Michael Jordan Paused -- CHAPTER 14 Outperforming Challenges -- CHAPTER 15 Get out of Your Head -- CHAPTER 16 Mindset Recalibration -- CHAPTER 17 Disputing Irrational Beliefs -- CHAPTER 18 A Little Failure Goes a Long Way -- PART IV Change-Proof Software -- CHAPTER 19 Happiness Doesn't Deliver Resilience -- CHAPTER 20 Are You Emotionally Agile? …”
Libro electrónico -
3894por Pfister, CunoTabla de Contenidos: “…; Taking a REST; Communities; Other Hardware; The Sky Is the Limit; A/Test Server; B/.NET Classes Used in the Examples; C/Gsiot.Server Library; HTTP Server; Resources; Representations; Drivers for Sensors and Actuators; Multithreading; Index; About the Author; Colophon…”
Publicado 2011
Libro electrónico -
3895Publicado 2023Tabla de Contenidos: “…Partnerships -- 13 Why and how to engage beneficiaries as co-(social) entrepreneurs? Considering hardware, software, and orgware for citizen engagement -- 14 Civic leadership for a transformative social economy: A comparison of city leadership constellations in Italy and the UK -- 15 Public structural funds as a catalyst for social innovation: The experience of Portugal Social Innovation -- 16 Social procurement to promote social problem solving…”
Libro electrónico -
3896Publicado 2022Tabla de Contenidos: “…PDX and Software Bill of Materials ISO/IEC 5962L 2021 - Kate Stewart - 8. corporate Concerns: Audit, Valuation, and Deals - Toby Crick - 9. trademarks - Pamela Chestek - 10. patents and the Defensive Response - Malcolm Bain and P McCoy Smith - 11. pen Source Software in Standard Setting: The Role of Intellectual Property Right Regimes - Knut Blind, Mirko Böhm, and Nikolaus Thumm - 12. export Control - Michael Cheng and Mishi Choudhary - 13. pen Source Software and Security: Practices, Governance, History, and Perceptions - Charles-H Schulz - Part 2The Business of Open: Economics, Open Source Models, and Usage - 14. sustainability and Open Source - Cristian Parrino - 15. economics of Open Source - Mirko Böhm - 16. business and Revenue Models and Commercial Agreements - Amanda Brock - 17. ntitrust, Competition, and Open Source - Carlo Piana - 18. foundations and Other Organisations - Karen Sandler - 19. he Rise of the Open Source Program Offices (OSPO) - Nithya Ruff - 20. loud Native Development, Containers, and Open Source Licensing - Richard Fontana - 21. ublic Sector and Open Source - Iain G Mitchell KC - Part 3Everything Open - 22. lockchain and Open Source - Mark Radcliffe - 23. pen Hardware - Andrew Katz - 24. pen Everything - Andrew Katz - Appendix - Index…”
Libro electrónico -
3897Publicado 2012Tabla de Contenidos: “…Las empresas de software y hardware; 3.2.3. Las empresas proveedoras de servicios de Internet…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3898por Red Martinez, David Luis laTabla de Contenidos: “…SISTEMAS OPERATIVOS; Prólogo; Prefacio; Índice General; Parte I - Sistemas Operativos Convencionales; Capítulo 1 - Introducción; 1.1 Qué es un Sistema Operativo; 1.2 Historia de los Sistemas Operativos - Generaciones; 1.3 Conceptos de los Sistemas Operativos; 1.4 Estructura de los Sistemas Operativos; 1.5 Tendencias; 1.6 Hardware; 1.7 Software; 1.8 Memoria Fija; Capítulo 2 - Procesos y Administración del Procesador; 2.1 Introducción y Definiciones Sobre Procesos; 2.2 Estados de Procesos; 2.3 Procesamiento de Interrupciones; 2.4 El Núcleo del Sistema Operativo; 2.5 Planificación de Procesos…”
Publicado 2001
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3899por Ibrahim, DoganTabla de Contenidos: “…Chapter 2 - PIC32 Microcontroller Series2.1 The PIC32MX360F512L Architecture; 2.2 Summary; 2.3 Exercises; Chapter 3 - C Programming for 32-Bit PIC Microcontrollers; 3.1 Structure of a Simple mikroC Pro for PIC32 Program; 3.2 Functions; 3.3 PIC32 Microcontroller Specific Features; 3.4 Summary; 3.5 Exercises; Chapter 4 - mikroC Pro for PIC32 Built-in Library Functions; 4.1 ADC Library; 4.2 LCD Library; 4.3 Software UART Library; 4.4 Hardware UART Library; 4.5 Sound Library; 4.6 ANSI C Library; 4.7 Miscellaneous Library; 4.8 Summary; 4.9 Exercises…”
Publicado 2014
Libro electrónico -
3900Publicado 2019Tabla de Contenidos: “…THE MBR/VBR BOOT PROCESS -- The Unified Extensible Firmware Interface -- Differences Between the Legacy BIOS and UEFI Boot Processes -- GUID Partition Table Specifics -- How UEFI Firmware Works -- Conclusion -- 15 CONTEMPORARY UEFI BOOTKITS -- Overview of Historical BIOS Threats -- All Hardware Has Firmware -- Ways to Infect the BIOS -- Understanding Rootkit Injection -- UEFI Rootkits in the Wild -- Conclusion -- 16 UEFI FIRMWARE VULNERABILITIES -- What Makes Firmware Vulnerable? …”
Libro electrónico