Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
4021Publicado 2023Tabla de Contenidos: “…Chapter 15 High Availability and Disaster Recovery -- Load Balancing -- Multipathing -- NIC Teaming -- Redundant Hardware/Clusters -- Facilities and Infrastructure Support -- Redundancy and High Availability Concepts -- Network Device Backup/Restore -- Part IV Domain 4.0: Network Security -- Chapter 16 Security Concepts -- Confidentiality, Integrity, and Availability -- Threats -- Vulnerabilities -- Exploits -- Least Privilege -- Role-Based Access -- Zero Trust -- Defense in Depth -- Authentication Methods -- Risk Management -- SIEM -- Chapter 17 Network Attacks -- Technology-Based Attacks -- Human and Environmental Attacks -- Chapter 18 Network Hardening -- Best Practices -- Wireless Security -- IoT Access Considerations -- Chapter 19 Remote Access -- Virtual Private Networks -- Remote Desktop Gateway -- Virtual Network Computing (VNC) -- Virtual Desktop -- Authentication and Authorization Considerations -- In-band vs. …”
Libro electrónico -
4022Publicado 2020“…Topics include modeling and simulation methods in semiconductor operations, supply chain management issues, employee training methods and workplaces optimization, as well as smart software and hardware solutions for semiconductor manufacturing. …”
Libro electrónico -
4023Publicado 2006Tabla de Contenidos: “…System startup and login -- The hardware boot process -- The operating system boot process -- Logging in -- Monitoring users -- Logging out -- Shutting down the system -- 5. …”
Libro electrónico -
4024Publicado 2015Tabla de Contenidos: “…The Arduino Platform -- The Arduino Hardware -- The Software Integrated Development Environment (IDE) -- Installing Arduino on Your Computer -- Installing the IDE: Macintosh -- Configuring the Drivers: Macintosh -- Port Identification: Macintosh -- Installing the IDE: Windows -- Configuring the Drivers: Windows -- Port Identification: Windows -- Chapter 4. …”
Libro electrónico -
4025Publicado 2019“…You’ll also learn the basics of topics like: •Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process •The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates •The laws and regulations that protect systems and data •Anti-malware tools, firewalls, and intrusion detection systems •Vulnerabilities such as buffer overflows and race conditions A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security…”
Libro electrónico -
4026Publicado 2023“…The scope is broad, ranging from the development of mobile applications for low-literacy users to hardware and software solutions for providing electricity and water in remote settings. …”
Libro electrónico -
4027Publicado 2022“…A cyber unit could be either a software or hardware. Physical components are those objects, which are governed by the law of physics. …”
Libro electrónico -
4028Publicado 2018“…Smart university is an emerging and rapidly evolving area that creatively integrates innovative concepts; smart software and hardware systems; smart classrooms with state-of-the-art technologies and technical platforms; smart pedagogy based on modern teaching and learning strategies; smart learning and academic analytics; as well as various branches of computer science and computer engineering. …”
Libro electrónico -
4029Publicado 2010“…Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. …”
Libro electrónico -
4030Publicado 2022Tabla de Contenidos: “…5.1.3 5G Technology and Its Implications -- 5.1.4 IoT and Its Applications in Transportation -- 5.1.5 Usage of AI and ML in IoT and Blockchain -- 5.2 Related Work -- 5.2.1 Carchain -- 5.2.2 Fabcar IBM Blockchain -- 5.2.3 Blockchain and Future of Automobiles -- 5.2.4 Significance of 5G Technology -- 5.3 Presented Methodology -- 5.4 Software Requirement Specification -- 5.4.1 Product Perspective -- 5.4.1.1 Similarities Between Carchain and Our Application -- 5.4.1.2 Differences Between Carchain and Our Application -- 5.4.2 System Interfaces -- 5.4.3 Interfaces (Hardware and Software and Communication) -- 5.4.3.1 Hardware Interfaces -- 5.4.3.2 Software Interfaces -- 5.4.3.3 Communications Interfaces -- 5.4.4 Operations (Product Functions, User Characteristics) -- 5.4.4.1 Product Functions -- 5.4.4.2 User Characteristics -- 5.4.5 Use Case, Sequence Diagram -- 5.4.5.1 Use Case -- 5.4.5.2 Sequence Diagrams -- 5.4.5.3 System Design -- 5.4.5.4 Architecture Diagrams -- 5.5 Software and Hardware Requirements -- 5.5.1 Software Requirements -- 5.5.2 Hardware Requirements -- 5.6 Implementation Details -- 5.7 Results and Discussions -- 5.8 Novelty and Recommendations -- 5.9 Future Research Directions -- 5.10 Limitations -- 5.11 Conclusions -- References -- 6 Designing of Fuzzy Controller for Adaptive Chair and Desk System -- 6.1 Introduction -- 6.2 Time Spent Sitting in Front of Computer Screen -- 6.3 Posture -- 6.3.1 Need for Correct Posture -- 6.3.2 Causes of Sitting in the Wrong Posture -- 6.4 Designing of Ergonomic Seat -- 6.4.1 Considerate Factors of an Ergonomic Chair and Desk System -- 6.5 Fuzzy Control Designing -- 6.5.1 Fuzzy Logic Controller Algorithm [20] -- 6.5.2 Fuzzy Membership Functions -- 6.5.3 Rule Base -- 6.5.4 Why Fuzzy Controller? …”
Libro electrónico -
4031Publicado 2022Tabla de Contenidos: “…3.7.3.3 Data transmission through 5G terminal by ZigBee network -- 3.8 Conclusions -- References -- 4 An overview of low power hardware architecture for edge computing devices -- 4.1 Introduction -- 4.2 Basic concepts of cloud, fog and edge computing infrastructure -- 4.2.1 Role of edge computing in Internet of Things -- 4.2.2 Edge intelligence and 5G in Internet of Things based smart healthcare system -- 4.3 Low power hardware architecture for edge computing devices -- 4.3.1 Objectives of hardware development in edge computing -- 4.3.2 System architecture -- 4.3.3 Central processing unit architecture -- 4.3.4 Input-output architecture -- 4.3.5 Power consumption -- 4.3.6 Data processing and algorithmic optimization -- 4.4 Examples of edge computing devices -- 4.5 Edge computing for intelligent healthcare applications -- 4.5.1 Edge computing for healthcare applications -- 4.5.2 Advantages of edge computing for healthcare applications -- 4.5.3 Implementation challenges of edge computing in healthcare systems -- 4.5.4 Applications of edge computing based healthcare system -- 4.5.5 Patient data security in edge computing -- 4.6 Impact of edge computing, Internet of Things and 5G on smart healthcare systems -- 4.7 Conclusion and future scope of research -- References -- 5 Convergent network architecture of 5G and MEC -- 5.1 Introduction -- 5.2 Technical overview on 5G network with MEC -- 5.2.1 5G with multi-access edge computing (MEC): a technology enabler -- 5.2.2 Application splitting in MEC -- 5.2.3 Layered service oriented architecture for 5G MEC -- 5.3 Convergent network architecture for 5G with MEC -- 5.4 Current research in 5G with MEC -- 5.5 Challenges and issues in implementation of MEC -- 5.5.1 Communication and computation perspective -- 5.5.1.1 MEC service orchestration and programmability…”
Libro electrónico -
4032por Gibbs, G. BentonTabla de Contenidos: “…Introduction to BladeCenter and blade server technology -- Chapter 2. Hardware components -- 2.1 Overview of the BladeCenter infrastructure -- 2.1.1 BladeCenter chassis -- 2.1.2 BladeCenter power options -- 2.1.3 Management Module -- 2.1.4 I/O modules -- 2.1.5 Blade servers -- 2.2 BladeCenter JS20 -- 2.2.1 Base features -- 2.2.2 Optional features -- 2.3 PowerPC 970 and PowerPC 970FX Microprocessors -- 2.3.1 Review of POWER and PowerPC Architecture -- 2.3.2 Vector/SIMD Multimedia eXtension -- 2.3.3 Features of the PowerPC 970 and PowerPC 970FX -- Chapter 3. …”
Publicado 2005
Libro electrónico -
4033por Lowe, ScottTabla de Contenidos: “…Picking Out Your Wireless Hardware; 3.3.2. A Quick Bite of the Apple; 3.3.3. …”
Publicado 2005
Libro electrónico -
4034Publicado 2006Tabla de Contenidos: “…Exam 101 Study Guide; 2. Hardware and Architecture (Topic 1.101); 3.1.1.2. Disks and boot devices; 3.1.2. …”
Libro electrónico -
4035Publicado 2018Tabla de Contenidos: “…Restoring, migrating, and taking over a gateway -- Gateway log files -- Performance Monitor counters -- Scheduled data refresh -- DirectQuery datasets -- Single sign-on to DirectQuery sources via Kerberos -- Live connections to Analysis Services models -- Azure Analysis Services refresh -- Dashboard cache refresh -- Summary -- Chapter 10: Deploying the Power BI Report Server -- Planning for the Power BI Report Server -- Feature differences with the Power BI service -- Parity with SQL Server Reporting Services -- Data sources and connectivity options -- Hardware and user licensing -- Pro licenses for report authors -- Alternative and hybrid deployment models -- Report Server reference topology -- Installation -- Hardware and software requirements -- Analysis Services Integrated -- Retrieve the Report Server product key -- Migrating from SQL Server Reporting Services -- Configuration -- Service Account -- Remote Report Server Database -- Office Online Server for Excel Workbooks -- Upgrade cycles -- Report Server Desktop Application -- Running desktop versions side by side -- Report Server Web Portal -- Scheduled data refresh -- Data source authentication -- Power BI mobile applications -- Report server administration -- Securing Power BI report content -- Execution logs -- Scale Power BI Report Server -- Summary -- Chapter 11: Creating Power BI Apps and Content Distribution -- Content distribution methods -- Power BI apps -- Licensing apps -- App deployment process -- User permissions -- Publishing apps -- Installing apps -- Apps on Power BI mobile -- App updates -- Dataset-to-workspace relationship -- Self-Service BI workspace -- Self-Service content distribution -- Risks to Self-Service BI -- Sharing dashboards and reports -- Sharing scopes -- Sharing versus Power BI apps -- SharePoint Online embedding -- Custom application embedding…”
Libro electrónico -
4036por Ceyland, SanverTabla de Contenidos: “…Requirements and IBM Tivoli Storage Manager functionality -- 3.1 What to know about the first section -- 3.2 Prerequisites of IBM Tivoli Storage Manager 5.3 -- 3.2.1 Supported platforms -- 3.2.2 Supported devices -- 3.2.3 Hardware requirements -- 3.3 Prerequisites of Administration Center -- 3.3.1 Software requirements -- 3.3.2 Hardware requirements -- 3.4 Planning the implementation -- Chapter 4. …”
Publicado 2005
Libro electrónico -
4037por Kruegle, HermanTabla de Contenidos: “…1.2.1.7 Standby Power and Communications1.2.2 Security Investigations; 1.2.3 Safety; 1.2.4 The Role of the Guard; 1.2.5 Employee Training and Education; 1.3 Synergy through Integration; 1.3.1 Integrated Functions; 1.3.2 System Hardware; 1.4 Video's Role and Its Applications; 1.4.1 Video System Solutions; 1.4.2 Overt vs. …”
Publicado 2005
Libro electrónico -
4038Publicado 2022Tabla de Contenidos: “…Monitoring and measurement -- Reporting -- Continuous improvement -- Risk frameworks -- Understand and Apply Threat Modeling Concepts and Methodologies -- Identifying threats -- Determining and diagramming potential attacks -- Performing reduction analysis -- Remediating threats -- Apply Supply Chain Risk Management (SCRM) Concepts -- Risks associated with hardware, software, and services -- Third-party assessment and monitoring -- Fourth-party risk -- Minimum security requirements -- Service-level agreement requirements -- Establish and Maintain a Security Awareness, Education, and Training Program -- Methods and techniques to present awareness and training -- Periodic content reviews -- Program effectiveness evaluation -- Chapter 4 Asset Security -- Identify and Classify Information and Assets -- Data classification -- Asset classification -- Establish Information and Asset Handling Requirements -- Provision Resources Securely -- Information and asset ownership -- Asset inventory -- Asset management -- Manage Data Life Cycle -- Data roles -- Data collection -- Data location -- Data maintenance -- Data retention -- Data remanence -- Data destruction -- Ensure Appropriate Asset Retention -- End of life -- End of support -- Determine Data Security Controls and Compliance Requirements -- Data states -- Scoping and tailoring -- Standards selection -- Data protection methods -- Chapter 5 Security Architecture and Engineering -- Research, Implement, and Manage Engineering Processes Using Secure Design Principles -- Threat modeling -- Least privilege (and need to know) -- Defense in depth -- Secure defaults -- Fail securely -- Separation of duties -- Keep it simple -- Zero trust -- Privacy by design -- Trust but verify -- Shared responsibility -- Understand the Fundamental Concepts of Security Models…”
Libro electrónico -
4039Publicado 2023Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Chromebook -- Chapter 1 Choosing and Setting Up Your Chromebook -- Checking Under the Hood of the Chromebook -- The software -- The hardware -- Choosing a Chromebook -- Setting Up Your Chromebook -- Turning on your device -- Selecting a language -- Connecting to the internet -- Agreeing to the Terms of Service -- Adult or child user -- Logging In for the First Time -- Logging in using an existing Google Account -- Creating a new Google Account -- Using Chromebook as a guest -- Transitioning to a Chromebook from Mac, Linux, or Windows -- Where to Go Next -- Chapter 2 Working with the Chromebook Desktop -- Accessing the Chromebook Shelf -- Using the Launcher: Chromebook's Start Button -- Navigating the Launcher -- Organizing Launcher Icons -- Setting Up App Shortcuts -- Pinning app shortcuts to your shelf -- Removing app shortcuts from your shelf -- Getting the Scoop in the Status Area -- Taking Charge of Window Controls -- Multitasking with Multiple Windows -- Setting Up a Printer -- Direct connect printing -- Wi-Fi printing -- Chapter 3 Surveying the Chrome Browser -- Navigating the Chrome Browser -- Sizing the Chrome window -- Working with tabs -- Using the Omnibox and the navigation buttons -- Saving your place with the bookmark bar -- Customizing and Controlling Chrome -- Managing bookmarks -- Managing your history and downloads -- Erasing your browsing history -- Going incognito -- Changing Search Engine Providers -- Using Other Browsers -- Chapter 4 Getting Your Hands on the Keyboard and Touchpad -- The Chromebook Keyboard at a Glance -- Using Shortcut Key Combinations -- Configuring Keyboard Settings…”
Libro electrónico -
4040por Subrata, GhoshalTabla de Contenidos: “…Evaluate Yourself -- Search for Answers -- Think and Solve -- Interfacing: Keyboards -- Introduction -- Contact Type Keys -- Interfacing a Key -- Solved Example -- Example 18.1 -- Bouncing of Keys -- Hardware Debouncing -- Software Debouncing -- Key Matrix -- Scanning Keyboard Matrix -- Debouncing Keyboard Matrix -- Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- Interfacing:Display Devices -- Introduction -- Led Interfacing -- Solved Examples -- Seven-Segment Display Interfacing -- Multiplexed Display -- Multiplexed Keyboard Display Interface -- Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- Interfacing: Dac/Adc -- Introduction -- How a Dac Works -- How an Adc Works -- Sample and Hold -- Interfacing Dac -- Interfacing Adc -- Solved Examples -- Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- Interfacing: Dc Motor -- Introduction -- How Dc Motor Works -- Direction Control -- H-Bridge -- H-Bridge Using Transistors -- L293D -- Speed Control -- Through Dac -- Changing Duty Cycle of Square Wave -- Relay and Optocoupler -- Solved Examples -- Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- Interfacing: Stepper Motor -- Introduction -- How Stepper Motor Functions -- Full-Step Rotation -- How Step Angle is Controlled -- Generation of 3.6° Step Angle -- Generation of Half-Step -- Stepper Motor Interfacing -- Using Transistors -- Using Dedicated Ics -- Direction Control -- Speed Control -- Solved Examples -- Summary -- Points to Remember -- Review Questions -- Evaluate Yourself -- Search for Answers -- Think and Solve -- Interfacing: Steppermotor -- Introduction -- How a Servomotor Works…”
Publicado 2002
Libro electrónico