Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
4641Publicado 2024Tabla de Contenidos: “…Written Lab -- Review Questions -- Chapter 9 Security Vulnerabilities, Threats, and Countermeasures -- Shared Responsibility -- Data Localization and Data Sovereignty -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Hardware -- Firmware -- Client-Based Systems -- Mobile Code -- Local Caches -- Server-Based Systems -- Large-Scale Parallel Data Systems -- Grid Computing -- Peer to Peer -- Industrial Control Systems -- Distributed Systems -- High-Performance Computing (HPC) Systems -- Real-Time Operating Systems -- Internet of Things -- Edge and Fog Computing -- Embedded Devices and Cyber-Physical Systems -- Static Systems -- Cyber-Physical Systems -- Security Concerns of Embedded and Static Systems -- Microservices -- Infrastructure as Code -- Immutable Architecture -- Virtualized Systems -- Virtual Software -- Virtualized Networking -- Software-Defined Everything -- Virtualization Security Management -- Containerization -- Mobile Devices -- Mobile Device Security Features -- Mobile Device Deployment Policies -- Essential Security Protection Mechanisms -- Process Isolation -- Hardware Segmentation -- Root of Trust -- System Security Policy -- Common Security Architecture Flaws and Issues -- Covert Channels -- Attacks Based on Design or Coding Flaws -- Rootkits -- Incremental Attacks -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 10 Physical Security Requirements -- Apply Security Principles to Site and Facility Design -- Secure Facility Plan -- Site Selection -- Facility Design -- Implement Site and Facility Security Controls -- Equipment Failure -- Wiring Closets -- Server Rooms/Data Centers -- Intrusion Detection Systems -- Cameras -- Access Abuses -- Media Storage Facilities -- Evidence Storage -- Work Area Security -- Utility Considerations…”
Libro electrónico -
4642Publicado 2011Tabla de Contenidos: “…Cover -- Contents -- Preface -- About the Authors -- Chapter 1: Educational Technology -- Change is Law of Nature -- Evolution of Educational Technology -- Educational Technology Before 1700 CE -- Educational Technology After 1700 CE -- Concept and Definition of Educational Technology -- Nature of Educational Technology -- Technology of Education -- Technology in Education -- Educational Technology as a System of 5 Ms -- Definitions of Educational Technology -- Scope of Educational Technology -- Identification of Aims and Objectives -- Developing Criteria for Evaluation -- Analysis and Structuring Learning Experiences -- Developing/Selecting Teaching Strategies and Media -- Teacher Training -- Continuing Education -- Mass Education -- Gaming and Simulation -- Distance Education -- Research -- Teaching Technology -- Contents of Teaching Technologies -- Main Features of Teaching Technology -- Behavioural Technology -- Main Features of Behavioural Technology -- Training Technology -- Cybernetics -- System Approach -- Approaches to Educational Technology -- Educational Technology (Step I) or Hardware Approach -- Educational Technology (Step II) or Software Approach -- Hardware and Software Aspects of ET are Complementary -- Educational Technology (Step III) or Systems Approach -- Uses of Educational Technology -- Evaluate Yourself -- Summary -- References -- Additional Reading -- Chapter 2: Educational Objectives -- Meaning of 'Objective' -- Concept of Educational Objectives -- Meaning of Educational Objectives -- Concept of Instructional Objectives -- Taxonomy of Educational Objectives -- Cognitive Domain: Knowledge and Intellectual Abilities and Skills -- Affective Domain -- Psychomotor Domain -- Tripartite Structure -- Tripartite Taxonomic Scheme of Educational Objectives -- Role and Importance of Taxonomies in Curriculum and Evaluation…”
Libro electrónico -
4643Publicado 2014Tabla de Contenidos: “…17.3 Effects and Negative Consequences of Harmonics 535 -- 17.4 International Standards for Harmonics 536 -- 17.5 Types of Harmonics 537 -- 17.5.1 Harmonic Current Sources 537 -- 17.5.2 Harmonic Voltage Sources 537 -- 17.6 Passive Filters 539 -- 17.7 Power Definitions 540 -- 17.8 Active Power Filters 543 -- 17.9 APF Switching Frequency Choice Methodology 547 -- 17.10 Harmonic Current Extraction Techniques (HCET) 548 -- 17.11 Shunt Active Power Filter 555 -- 17.12 Series Active Power Filter 564 -- 17.13 Unified Power Quality Conditioner 565 -- Acknowledgment 569 -- References 569 -- 18A Hardware-in-the-Loop Systems with Power Electronics: A Powerful Simulation Tool 573 -- 18A.1 Background 573 -- 18A.2 Increasing the Performance of the Power Stage 575 -- 18A.3 Machine Model of an Asynchronous Machine 581 -- 18A.4 Results and Conclusions 583 -- References 589 -- 18B Real-Time Simulation of Modular Multilevel Converters (MMCs) 591 -- 18B.1 Introduction 591 -- 18B.2 Choice of Modeling for MMC and Its Limitations 597 -- 18B.3 Hardware Technology for Real-Time Simulation 598 -- 18B.4 Implementation for Real-Time Simulator Using Different Approach 601 -- 18B.5 Conclusion 606 -- References 606 -- 19 Model Predictive Speed Control of Electrical Machines 608 -- 19.1 Introduction 608 -- 19.2 Review of Classical Speed Control Schemes for Electrical Machines 609 -- 19.3 Predictive Current Control 613 -- 19.4 Predictive Torque Control 617 -- 19.5 Predictive Torque Control Using a Direct Matrix Converter 619 -- 19.6 Predictive Speed Control 622 -- 19.7 Conclusions 626 -- Acknowledgment 627 -- References 627 -- 20 The Electrical Drive Systems with the Current Source Converter 630 -- 20.1 Introduction 630 -- 20.2 The Drive System Structure 631 -- 20.3 The PWM in CSCs 633 -- 20.4 The Generalized Control of a CSR 636 -- 20.5 The Mathematical Model of an Asynchronous and a Permanent Magnet Synchronous Motor 639 -- 20.6 The Current and Voltage Control of an Induction Machine 641 -- 20.7 The Current and Voltage Control of Permanent Magnet Synchronous Motor 651.…”
Libro electrónico -
4644Publicado 2016Tabla de Contenidos: “…-- Wake locks, wakeup sensors, and the FIFO queue -- Wakeup and non-wakeup sensors -- The sensor's hardware FIFO queue -- Summary -- Chapter 5: The Motion, Position, and Fingerprint Sensors -- Understanding motion-based sensors -- The accelerometer sensor -- The gyroscope sensor -- The gravity sensor -- The linear acceleration sensor -- The significant motion sensor -- Understanding position-based sensors -- The magnetometer sensor -- The orientation sensor -- The fingerprint sensor -- Time for action - shake detection using the accelerometer sensor -- Time for action - the compass using orientation sensor and orientation APIs -- Time for action - using the fingerprint sensor -- What just happened? …”
Libro electrónico -
4645Publicado 2024Tabla de Contenidos: “…-- The ffi module -- Bitflags and bitmasks -- Level-triggered versus edge-triggered events -- The Poll module -- The main program -- Summary -- Chapter 5: Creating Our Own Fibers -- Technical requirements -- How to use the repository alongside the book -- Background information -- Instruction sets, hardware architectures, and ABIs -- The System V ABI for x86-64 -- A quick introduction to Assembly language -- An example we can build upon -- Setting up our project -- An introduction to Rust inline assembly macro -- Running our example -- The stack -- What does the stack look like? …”
Libro electrónico -
4646por Vincent, Jesse“… In a typical organization, there's always plenty that to do such as: pay vendors, invoice customers, answer customer inquiries, and fix bugs in hardware or software. You need to know who wants what and keep track of what is left to do. …”
Publicado 2005
Libro electrónico -
4647Tabla de Contenidos:Libro electrónico
-
4648Publicado 2010“…The first book to explain the principals behind mobile 3D hardware implementation, helping readers understand advanced algorithms, produce low-cost, low-power SoCs, or become familiar with embedded systems As mobile broadcasting and entertainment applications evolve, there is increasing interest in 3D graphics within the field of mobile electronics, particularly for handheld devices. …”
Libro electrónico -
4649por Roberts, Charles, 1967-“…Roberts does not assume you have an IT staff on hand and therefore goes into crucial issues of set up, configuration, consumer advice on hardware p…”
Publicado 2004
Libro electrónico -
4650por Flickenger, Rob“…Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well as layers of applications software. …”
Publicado 2003
Libro electrónico -
4651por Earney, Richard“…For example, he covers using presets to automate the way Lightroom deals with photos, optimizing your Lightroom workflow for your own hardware and preferences. He covers sophisticated calibration techniques, he…”
Publicado 2009
Libro electrónico -
4652Publicado 2013“…With the invention of the unique credit-card sized single-board computer, the Raspberry Pi, comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities of the Raspberry Pi, and this is the perfect guide to get you started in this exhilarating new arena. …”
Libro electrónico -
4653por Rouphael, Tony J.“…After an introductory overview of essential SDR concepts, this book examines waveform creation, analog signal processing, digital signal processing, data conversion, phase-locked loops, SDR algorithms, and SDR hardware design. The various trade-offs at each of these design stages are discussed in detail.…”
Publicado 2009
Libro electrónico -
4654por Lammle, Todd“…CompTIA's Network+ certification tells the world you have the skills to install, configure, and troubleshoot today's basic networking hardware peripherals and protocols. But first, you have to pass the exam! …”
Publicado 2012
Libro electrónico -
4655por Minelli, Michael, 1974-“…Unique prospective on the big data analytics phenomenon for both business and IT professionals The availability of Big Data, low-cost commodity hardware and new information management and analytics software has produced a unique moment in the history of business. …”
Publicado 2013
Libro electrónico -
4656por Dorr, Barry L., 1958-“…This book is a 'must have' on the bookshelf of any newly practicing hardware engineer and those who mentor them.”<BR/> -Roger Colbath, Engineering Director, ViaSat, Inc. …”
Publicado 2014
Libro electrónico -
4657Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Started on the Raspberry Pi -- The Internet of Things -- A brief look at our application -- The sensor interface - perception -- The database - persistence -- The user interface - presentation -- The application server - middleware -- Setting up our Raspberry Pi -- Remote access -- Summary -- Chapter 2: Getting Up-and-Running with Web Development on the Raspberry Pi -- The network -- The web development stack -- The UI - the user's first encounter -- The server - the brains of the application -- Client-server communication -- Interfacing with external hardware -- The database - adding persistence to our data -- Integrating the database into our application -- The overall architecture -- Summary -- Chapter 3: Running a Node Server on the Pi -- Introducing nodes - the server side JavaScript runtime -- Installing node on the Pi -- Running our first node program -- Setting up a version control system -- Back to our program -- Installing external libraries -- Developing the application server -- Adding routes to the server -- Starting up the server -- Keeping the server running in the background -- Summary -- Chapter 4: Extracting Information from the GPIO Pins -- The GPIO pins on the Pi -- The pin as a standalone component -- The Write mode -- The Read mode -- Fine-tuning our control - using the GPIO command-line tools -- The DHT11 sensor -- Reading from the sensor -- Summary -- Chapter 5: Retrieving Sensor Readings from the Server -- Understanding how our node process takes readings -- Modifying our server code to show sensor readings -- Optimizing our server -- Abstracting our sensor library code -- Caching our results -- Summary…”
Libro electrónico -
4658por Mehta, Prateek. author“…Along the way you'll gain skills in building apps with Eclipse and the Android SDK or NDK, rendering graphics using hardware acceleration, and multithreading for performance and responsiveness. iOS developers will also find this book's information invaluable when writing their apps. …”
Publicado 2013
Libro electrónico -
4659Publicado 2012Tabla de Contenidos: “…Using the Merge OVAL Documents Tool -- Some Useful Tips for Creating Content -- Explain Yourself -- Make Sure It Works -- Version Your Artifacts -- Reuse of Artifacts -- Content Correctness -- Least Version Principle -- Design for People -- Follow the Rules of the Road -- Minimize Extension Depth -- Granularity -- Customization -- Performance -- Regular Expressions -- Chapter 8: Putting Security Automation to Work in the Enterprise -- How Organizations Are Using Security Automation -- Automated Hardware and Software Inventory -- Security Configuration Management (SCM) -- OpenSCAP Security Automation Software in Linux Distributions -- Use of Security Automation to Track Management and Operational Security -- Security Automation to Discover Malicious Software -- Continuous Monitoring by Integrating Security Systems -- Device Health Monitoring -- Building a Healthy and Resilient Cyber Ecosystem -- Chapter 9: Conclusion -- The Road Ahead -- Appendix: XCCDF, OVAL, OCIL, and Supporting Enumerations Usage -- Index…”
Libro electrónico -
4660por Sood, Raghav“…From using various software and Android hardware sensors, such as an accelerometer or a magnetometer (compass), you'll learn the building blocks of augmented reality for both marker- and location-based apps. …”
Publicado 2012
Libro electrónico