Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
4041por Bruni, PaoloTabla de Contenidos: “…-- 7.1.2 Mainframe differentiators -- 7.2 zSeries and DB2 UDB for z/OS -- 7.2.1 Mainframe Charter -- 7.2.2 Hardware -- 7.2.3 Mainframe pricing -- 7.2.4 System utilization -- 7.2.5 Staff utilization -- 7.2.6 Quality of service -- 7.3 Summary -- Chapter 8. …”
Publicado 2005
Libro electrónico -
4042Publicado 2014Tabla de Contenidos: “…3.5 The Proposed Multithreaded B&B3.6 Experiments and Results; 3.6.1 Flow-Shop Instances; 3.6.2 Hardware and Software Testbed; 3.6.3 Experimental Protocol; 3.6.4 Performance Analysis; 3.6.5 Page Faults; 3.6.6 Context Switches; 3.7 Conclusion; References; Part 2: Pervasive/Ubiquitous Computing and Peer-to-Peer Systems; 4 Large-Scale P2P-Inspired Problem-Solving: A Formal and Experimental Study; 4.1 Introduction; 4.1.1 Motivations; 4.1.2 Contribution and Results; 4.1.3 Related Works; 4.1.4 Outline; 4.2 Background; 4.3 A Pure Peer-to-Peer B&B Approach; 4.3.1 Preliminaries…”
Libro electrónico -
4043Publicado 2017Tabla de Contenidos: “…-- Our security posture -- Virtualization - cloud's best friend -- Understanding the ring architecture -- Hardware virtualization -- Full virtualization with binary translation -- Paravirtualization -- Hardware-assisted virtualization -- Distributed architecture in virtualization -- Enterprise virtualization with oVirt -- Encapsulation -- Point in time snapshots -- Isolation -- Risk assessment in cloud -- Service Level Agreement -- Business Continuity Planning - Disaster Recovery (BCP/DR) -- Business Continuity Planning -- Disaster Recovery -- Recovery Time Objective -- Recovery Point Objective -- Relation between RTO and RPO -- Real world use case of Disaster Recovery -- Use case to understand BCP/DR -- Policies and governance in cloud -- Audit challenges in the cloud -- Implementation challenges for controls on CSP side -- Vulnerability assessment and penetration testing in the cloud -- Use case of a hacked server -- Summary -- Chapter 2: Defense in Depth Approach -- The CIA triad -- Confidentiality -- Integrity -- Availability -- A use case -- Understanding all three aspects -- The use case -- Introducing Defense in Depth -- First layer - network layer -- Second layer - platform layer -- Third layer - application layer -- Fourth layer - data layer -- Fifth layer - response layer -- Summary -- Chapter 3: Designing Defensive Network Infrastructure -- Why do we need cryptography? …”
Libro electrónico -
4044Publicado 2024Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1: A reconfigurable FPGA-based epileptic seizures detection system with 144 μs detection time -- 1.1 Introduction -- 1.2 Software-based implementation -- 1.2.1 EEG data -- 1.2.2 Segmentation -- 1.2.3 Feature extraction -- 1.2.4 RF algorithm -- 1.3 Hardware-based implementation -- 1.3.1 Feature extraction -- 1.3.2 RF training module -- 1.3.3 The RF inference module -- 1.3.4 Display label -- 1.4 Experimental results -- 1.4.1 Software implementation results -- 1.4.2 FPGA implementation results -- 1.5 Conclusion -- Acknowledgment -- References -- Chapter 2: Hardware architecture for denoising of EOG signal using a differential evolution algorithm -- 2.1 Introduction -- 2.2 FIR filter architecture -- 2.3 Filter design for denoising of EOG signal using DE algorithm -- 2.4 DE algorithm with minimized coefficients -- 2.5 Functional verification of DE with minimized coefficient (DEWMC)-based denoised FIR filter -- 2.6 Synthesis results -- 2.7 Conclusion -- References -- Chapter 3: Implementation considerations for an intelligent embedded E-health system and experimental results for EEG-based activity recognition -- 3.1 Introduction -- 3.2 Embedded acquisition system for E-health -- 3.2.1 Hardware considerations, choices, and implementations -- 3.2.2 Software architecture and implementation -- 3.2.3 Related works -- 3.3 EEG-based classification of motor imagery activities -- 3.3.1 Segmentation -- 3.3.2 Neural network efficiency investigation -- 3.4 Conclusion -- References -- Chapter 4: Embedded and computational intelligence for diabetic healthcare: An overview -- 4.1 Introduction -- 4.2 Embedded intelligence glucose monitoring -- 4.2.1 BioSensors -- 4.2.2 Implanted micro systems -- 4.2.3 Wearable sensors…”
Libro electrónico -
4045por Béjar Heredia, María de la CruzTabla de Contenidos:
Publicado 2014Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
4046Publicado 2020Tabla de Contenidos: “…-- Mit Software wird Hardware intelligent -- Ein paar Fragen ... -- ... und ein paar Aufgaben -- Kapitel 3: Programmieren mit Grafik-Blöcken -- Die Oberfläche von Open Roberta Lab erkunden -- Aktionen -- Sensoren -- Kontrolle -- Logik -- Mathematik -- Text -- Variablen -- Funktionen -- Ein paar Fragen ... -- ... und ein paar Aufgaben -- Kapitel 4: Das Roboter-Fahrgestell entsteht -- Ein Blick in den Motor und das Getriebe -- Mit Vollgas gegen die Wand -- Der Arduino gibt Gas und bremst -- Geschwindigkeitskontrolle -- Kurven fahren -- Gefahrene Strecke messen -- Ein paar Fragen ... -- ... und ein paar Aufgaben -- Kapitel 5: Der Roboter wird eigenständig -- Achtung, ich komme! …”
Libro electrónico -
4047por Stolarz, DamienTabla de Contenidos: “…Virtual SpacesAudio and Video On-the-Go; Conclusion; CHAPTER 9 Essential Tools; A Powerful Computer; A/V Editing Software; A/V Hardware; Conclusion; CHAPTER 10 Audio Production and Post-Production; Microphones and Mixers; Production Preparation and Voice Talent; Recording; Editing and Mixing; Mixdown and Compressing for Podcasting; Conclusion; CHAPTER 11 Video Production and Post-Production; Think Post-Production While in Pre-Production; Encoding Video; Editing; Conclusion; CHAPTER 12 Hosting and Bandwidth; Bandwidth Pricing; Content Hosting; Basic Web Hosts; Web Hosts with Blogging Services…”
Publicado 2006
Libro electrónico -
4048Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Started with the ESP8266 -- Starting with the ESP8266 chip -- Installing Arduino IDE -- Downloading the Arduino Software IDE -- Configure Arduino IDE -- Installing the ESP8266 SDK -- How to install a library -- Libraries from the Arduino's repository -- Library is not in the repository -- It is time for your first program -- Seeing the result -- Connecting ESP8266 to Wi-Fi -- Getting data from the internet -- Sending data to the internet -- Summary -- Chapter 2: Building and Configuring Your Own MQTT Server -- Message Queue Telemetry Transport -- Quality of service -- Security -- Retain messages and last will -- Basic terminology -- Wildcards on topics -- Introducing Mosquitto broker -- ESP8266 and MQTT -- Publishing data from the ESP8266 -- Receiving MQTT messages in the ESP8266 -- Securing Mosquitto -- Summary -- Chapter 3: Building a Home Thermostat with the ESP8266 -- SPIFFS -- SPIFFS objects -- Directory object -- File object -- Temperature sensor -- Summary -- Chapter 4: Control Appliances from the ESP8266 -- Using the WiFiManager library -- Adding parameters to the WiFiManager setup page and saving them into the file -- ESP8266 and Infrared communication -- Hardware components -- Software and libraries for this project -- Summary -- Chapter 5: Using ESP8266 to Build a Security System -- Passive infrared sensor -- How PIRs work -- Testing the PIR module -- Connecting the PIR module to the internet -- The ESP8266 PIR security code -- Summary -- Chapter 6: Securing Your Data -- Enabling encryption on mosquitto -- Installing the openssl package -- Generating your own certificates -- Securing a connection between ESP8266 and an MQTT broker -- Working offline…”
Libro electrónico -
4049Publicado 2015Tabla de Contenidos: “…Compressed sensing -- 9: Elements of Camera Hardware -- 9.1. Image processors -- 9.2. Memory -- 9.3. …”
Libro electrónico -
4050por Maynor, DavidTabla de Contenidos: “…Building a Test Lab for Penetration Testing; Introduction; Some Background; Setting up a Penetration Test Lab; Types of Pentest Labs; Selecting the Right Hardware; Selecting the Right Software; Running Your Lab; Selecting a Pentest Framework; Targets in the Penetration Test Lab; Other Scenario Ideas; Summary; Appendix C. …”
Publicado 2007
Libro electrónico -
4051por Baker, MarkTabla de Contenidos: “…Signal Generation; 3.1 Introduction; 3.2 Signal Source Hardware; 3.3 Application Example; 3.4 Signal Data Sets; 3.5 Periodic Sample Sets; 3.6 Creating the Signal Data Set; 3.7 DSP's Law; 3.8 Samples per Cycle; 3.9 The Golden Ratio; 3.10 Application of DSP's Law; 3.11 Sine (X) over X; 3.12 Source Filters; 3.13 Source Filter Optimization; Chapter Review Questions; CHAPTER 4. …”
Publicado 2003
Libro electrónico -
4052por Panek, William, 1970-Tabla de Contenidos: “…; What's on the CD?; Hardware and Software Requirements; Contacts and Resources; How to Contact the Author; Assessment Exam; Answers to Assessment Exam; Chapter 1: Hyper-V Overview; Introducing Hyper-V; Microsoft Networking Models; Understanding Windows Server 2008; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 2: Installing Hyper-V…”
Publicado 2009
Libro electrónico -
4053por Tannir, KhaledTabla de Contenidos: “…Tuning map and reduce parametersSummary; Chapter 6: Optimizing MapReduce Tasks; Using Combiners; Using compression; Using appropriate Writable types; Reusing types smartly; Optimizing mappers and reducers code; Summary; Chapter 7: Best Practices and Recommendations; Hardware tuning and OS recommendations; Hadoop cluster checklists; The Bios tuning checklist; OS configuration recommendations; Hadoop best practices and recommendations; Deploying Hadoop; Hadoop tuning recommendations; Using a MapReduce template class code; Summary; Index…”
Publicado 2014
Libro electrónico -
4054por Young, MarcusTabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction; Introduction to AWS; Cloud computing service models; Infrastructure as a Service; Platform as a Service; Software as a Service; Benefits of moving to the cloud; Common problems encountered at AWS; Underlying hardware failures; Over-provisioning; Under-provisioning; Replication; Redundancy; Improving the end-user experience; Monitoring and log-gathering; Summary; Chapter 2: Basic Patterns; Introducing Vagrant; Snapshot pattern; Stamp pattern; Scale up pattern…”
Publicado 2015
Libro electrónico -
4055por Stevens, ChrisTabla de Contenidos: “…CHAPTER 7: HARBOR MASTERROMANCING THE APP; HARBOR MASTER IS BORN; BEHIND THE SCENES; SUMMARY; CHAPTER 8: POCKET GOD; A BASIC START; DROPPING OUT; HARDWARE SECRETS; HOW TO PLAY GOD; THE EVOLUTION OF POCKET GOD; THE LIFE AND TIMES OF CASTELNUOVO; THE PUBLIC'S REACTION; LUCK IS PART OF THE FORMULA; SUMMARY; CHAPTER 9: STICKWARS; DEFENDING THE CASTLE; A LIFE AT SEA; SUMMARY; CHAPTER 10: ANGRY BIRDS; A GLOBAL HIT; 52ND TIME LUCKY; A RICH HISTORY OF FLYING ANIMALS; BIGGER THAN THE IPHONE; SETTING THE APP STANDARD; SUMMARY; PART III: THE APP REVOLUTION; CHAPTER 11: FROM BEDROOM TO BOARDROOM…”
Publicado 2011
Libro electrónico -
4056Publicado 2016Tabla de Contenidos: “…6.3.1 - No-History Reference Tables -- 6.3.2 - History-Based Reference Tables -- 6.3.3 - Code and Descriptions -- 6.3.3.1 - Code and Descriptions with History -- Reference -- Chapter 7 - Dimensional Modeling -- 7.1 - Introduction -- 7.2 - Star Schemas -- 7.2.1 - Fact Tables -- 7.2.1.1 - The Grain of a Fact Table -- 7.2.2 - Dimension Tables -- 7.2.3 - Querying Star Schemas -- 7.3 - Multiple Stars -- 7.3.1 - Conformed Dimensions -- 7.4 - Dimension Design -- 7.4.1 - Slowly Changing Dimensions -- 7.4.2 - Hierarchies -- 7.4.3 - Snowflake Design -- References -- Chapter 8 - Physical Data Warehouse Design -- 8.1 - Database Workloads -- 8.1.1 - Workload Characteristics -- 8.2 - Separate Environments for Development, Testing, and Production -- 8.2.1 - Blue-Green Deployment -- 8.3 - Microsoft Azure Cloud Computing Platform -- 8.4 - Physical Data Warehouse Architecture on Premise -- 8.4.1 - Hardware Architectures and Databases -- 8.4.2 - Processor Options -- 8.4.3 - Memory Options -- 8.4.4 - Storage Options -- 8.4.5 - Network Options -- 8.5 - Database Options -- 8.5.1 - tempdb Options -- 8.5.2 - Partitioning -- 8.5.3 - Filegroups -- 8.5.4 - Data Compression -- 8.6 - Setting up the Data Warehouse -- 8.6.1 - Setting up the Stage Area -- 8.6.1.1 - Hardware Considerations for Stage Area -- 8.6.1.2 - Stage Database Setup -- 8.6.2 - Setting up the Data Vault -- 8.6.2.1 - Hardware Considerations for Data Vault Layer -- 8.6.2.2 - Backing Up the Data Vault -- 8.6.2.3 - Data Vault Database Setup -- 8.6.3 - Setting up Information Marts -- 8.6.3.1 - Hardware Considerations for Information Marts -- 8.6.3.2 - Information Mart Database Setup -- 8.6.4 - Setting up the Meta, Metrics, and Error Marts -- 8.6.4.1 - Hardware Considerations for Meta, Metrics, and Error Marts -- 8.6.4.2 - Meta, Metrics, and Error Marts Database Setup -- References…”
Libro electrónico -
4057por Allison, SteveTabla de Contenidos: “…Using cryptographic services -- 9.1 Cryptographic support -- 9.2 How WebSphere fits in z/OS and zSeries cryptographic infrastructure -- 9.2.1 Supported J2EE APIs -- 9.2.2 SSL overview -- 9.3 Hardware cryptography support for zSeries 2084 or 2086 engines -- 9.4 Activation of hardware cryptography support for zSeries 2084, 2086, 9672, 2064, 2066, or 7060 engines -- 9.4.1 Verify that your processor has Cryptographic Coprocessor -- 9.4.2 Obtain the correct configuration enablement diskette or diskettes for your processor -- 9.4.3 Load the configuration enablement diskette(s) -- 9.4.4 Assign Cryptographic Coprocessors to LPARs -- 9.4.5 Additional instruction for assigning the PCI crypto features to LPARs with a 2084 or 2086 engine -- 9.4.6 Install and initialize Integrated Cryptographic Service Facility -- 9.4.7 Initialize the CKDS and PKDS and load your master key -- 9.5 Configure WebSphere to use hardware cryptographic services -- 9.5.1 Configure WebSphere to use hardware cryptography for SSL -- 9.5.2 Configure WebSphere to use hardware cryptography in support of the ICSF authentication mechanism -- 9.6 Securing and maintaining cryptography -- 9.6.1 RACF protection for ICSF -- 9.6.2 RACF setup to secure OCSF and OCEP -- 9.7 Create RACF keyrings and certificates -- 9.8 Set up Secure Sockets Layer (SSL) for WebSphere for z/OS…”
Publicado 2005
Libro electrónico -
4058Publicado 2004Tabla de Contenidos: “…Scalability factors of SAP BW on DB2 UDB ESE -- 10.1 DB2 scalability studies -- 10.2 Performance study for SAP BW on DB2 UDB EEE -- 10.2.1 Hardware environment -- 10.2.2 Scalability of single and multi-user SAP BW queries -- 10.2.3 Scalability of dataload from PSA into InfoCube -- 10.2.4 Summary of scalability test results -- 10.3 SAP Business Warehouse on DB2 UDB Sun Cluster -- 10.3.1 Hardware and software setup -- 10.3.2 Description of tests -- 10.3.3 Results of scalability tests -- 10.4 Performance of partitioned and unpartitioned database -- Appendix A. …”
Libro electrónico -
4059Publicado 2019Tabla de Contenidos: “…Sie antworten -- 13.11 Fragen zu diesem Kapitel -- Kapitel 14: Mobile Systeme reparieren -- 14.1 Typische Probleme mit mobiler Hardware -- 14.2 Einsatz von Akkus -- 14.3 Tastatur und Touchpad -- 14.4 Bildschirm -- 14.5 Netzwerkanschlüsse -- 14.6 Netzwerkeinstellungen auf dem Smartphone oder Tablet -- 14.6.1 Mail- und Synchronisationseinstellungen auf mobilen Geräten -- 14.7 Gehäuse- und Wärmeproblematik -- 14.8 Laufwerke und externe Anschlüsse -- 14.9 Probleme mit mobilen Geräten -- 14.10 Fragen zu diesem Kapitel…”
Libro electrónico -
4060por Segret Sala, RamónTabla de Contenidos: “…Software de los sistemas informáticos; 3. Hardware de los sistemas informáticos; 4. El sistema binario; 5. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico