Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
4821Publicado 2008Tabla de Contenidos: “…8.2 Breaking Symmetric Key with Brute Force -- 8.3 Breaking Public Key without Factoring -- 8.4 Breaking Cryptography via the Real World -- 8.5 The Potential of Efficiently Factoring Moduli -- 8.6 The Take-Home Message -- 8.7 Project Ideas -- 9 Authentication -- 9.1 Basic Framework -- 9.2 Authenticating Humans -- 9.3 Human Factors -- 9.4 From the Machine's Point of View -- 9.5 Advanced Approaches -- 9.6 Case Studies -- 9.7 Broader Issues -- 9.8 The Take-Home Message -- 9.9 Project Ideas -- 10 Public Key Infrastructure -- 10.1 Basic Definitions -- 10.2 Basic Structure -- 10.3 Complexity Arrives -- 10.4 Multiple CAs -- 10.5 Revocation -- 10.6 The X.509 World -- 10.7 Dissent -- 10.8 Ongoing Trouble -- 10.9 The Take-Home Message -- 10.10 Project Ideas -- 11 Standards, Compliance, and Testing -- 11.1 Standards -- 11.2 Policy Compliance -- 11.3 Testing -- 11.4 The Take-Home Message -- 11.5 Project Ideas -- Part IV: Applications -- 12 The Web and Security -- 12.1 Basic Structure -- 12.2 Security Techniques -- 12.3 Privacy Issues -- 12.4 Web Services -- 12.5 The Take-Home Message -- 12.6 Project Ideas -- 13 Office Tools and Security -- 13.1 Word -- 13.2 Lotus 1-2-3 -- 13.3 PDF -- 13.4 Cut-and-Paste -- 13.5 PKI and Office Tools -- 13.6 Mental Models -- 13.7 The Take-Home Message -- 13.8 Project Ideas -- 14 Money, Time, Property -- 14.1 Money -- 14.2 Time -- 14.3 Property -- 14.4 The Take-Home Message -- 14.5 Project Ideas -- Part V: Emerging Tools -- 15 Formal Methods and Security -- 15.1 Specification -- 15.2 Logics -- 15.3 Cranking the Handle -- 15.4 Case Studies -- 15.5 Spinning Your Bank Account -- 15.6 Limits -- 15.7 The Take-Home Message -- 15.8 Project Ideas -- 16 Hardware-Based Security -- 16.1 Data Remanence -- 16.2 Attacks and Defenses -- 16.3 Tools -- 16.4 Alternative Architectures -- 16.5 Coming Trends -- 16.6 The Take-Home Message…”
Libro electrónico -
4822Publicado 2003Tabla de Contenidos: “…Installation -- 2.1 Planning -- 2.1.1 Hardware and software prerequisites -- 2.1.2 Check for record identifier conflicts -- 2.1.3 Ensure that the HTTP Sever is installed and working -- 2.2 Performing the SMP/E installation -- 2.2.1 Installation reference table -- 2.3 Customizing your Information Management installation -- 2.3.1 Update your session member -- 2.3.2 Update your BLX-SP parameters -- 2.3.3 Update your IBM panels -- 2.3.4 Load the sample records into your data session -- 2.3.5 Load the data model records into your DMRDB session -- 2.3.6 Create static data views from the data model records -- 2.3.7 Verify your Information Management customizations -- 2.3.8 Set up e-mail notification -- 2.3.9 Configure your HTTP Server for Web Access -- 2.3.10 Update your BLQPARMS file -- 2.3.11 Start the HTTP Server -- 2.3.12 Verify your Web Access installation -- 2.3.13 Generate HTML -- Chapter 3. …”
Libro electrónico -
4823Publicado 2004Tabla de Contenidos: “…Installation overview -- 4.1 Installation and configuration procedures -- 4.1.1 Migration -- 4.1.2 Installing the components -- 4.1.3 Installing the agent and remote console components -- 4.1.4 Installing Tivoli Provisioning Manager and storage workflows -- 4.2 Installing IBM Tivoli Provisioning Manager -- 4.2.1 One-node topology installation -- 4.2.2 Two-node topology installation -- 4.2.3 Three-node topology installation -- 4.3 Installation prerequisites -- 4.3.1 Software -- 4.3.2 Hardware -- Part 2 Storage Provisioning using IBM Tivoli Provisioning Manager -- Chapter 5. …”
Libro electrónico -
4824por Krikorian, Raffi“…Armed with just a screwdriver and basic understanding of PC hardware (or willingness to learn), preeminent hackability awaits. …”
Publicado 2003
Libro electrónico -
4825Publicado 2001Tabla de Contenidos: “…Time-of-Check, Time-of-Use -- Broken passwd -- Avoiding TOCTOU Problems -- Secure File Access -- Temporary Files -- File Locking -- Other Race Conditions -- Conclusion -- 10 Randomness and Determinism -- Pseudo-random Number Generators -- Examples of PRNGs -- The Blum-Blum-Shub PRNG -- The Tiny PRNG -- Attacks Against PRNGs -- How to Cheat in On-line Gambling -- Statistical Tests on PRNGs -- Entropy Gathering and Estimation -- Hardware Solutions -- Software Solutions -- Poor Entropy Collection: How to Read "Secret" Netscape Messages -- Handling Entropy -- Practical Sources of Randomness -- Tiny -- Random Numbers for Windows -- Random Numbers for Linux -- Random Numbers in Java -- Conclusion -- 11 Applying Cryptography -- General Recommendations -- Developers Are Not Cryptographers -- Data Integrity -- Export Laws -- Common Cryptographic Libraries -- Cryptlib -- OpenSSL -- Crypto++ -- BSAFE -- Cryptix -- Programming with Cryptography -- Encryption -- Hashing -- Public Key Encryption -- Threading -- Cookie Encryption -- More Uses for Cryptographic Hashes -- SSL and TLS (Transport Layer Security) -- Stunnel -- One-Time Pads -- Conclusion -- 12 Trust Management and Input Validation -- A Few Words on Trust -- Examples of Misplaced Trust -- Trust Is Transitive -- Protection from Hostile Callers -- Invoking Other Programs Safely -- Problems from the Web -- Client-side Security -- Perl Problems -- Format String Attacks -- Automatically Detecting Input Problems -- Conclusion -- 13 Password Authentication -- Password Storage -- Adding Users to a Password Database -- Password Authentication -- Password Selection -- More Advice -- Throwing Dice -- Passphrases -- Application-Selected Passwords -- One-Time Passwords -- Conclusion -- 14 Database Security -- The Basics -- Access Control -- Using Views for Access Control -- Field Protection…”
Libro electrónico -
4826por Kehtarnavaz, Nasser“…This book is perfect for practicing engineers, as well as hardware and software technical managers who are familiar with DSP and are involved in system-level design. …”
Publicado 2005
Libro electrónico -
4827por Kroah-Hartman, GregTabla de Contenidos: “…ACPI Options -- acpi -- acpi_sleep -- acpi_sci -- acpi_irq_ balance -- acpi_irq_ nobalance -- acpi_irq_isa -- acpi_irq_pci -- acpi_os_name -- acpi_osi -- acpi_serialize -- acpi_skip_ timer_override -- acpi_dbg_layer -- acpi_fake_ecdt -- acpi_generic_ hotkey -- acpi_pm_good -- ec_intr -- memmap -- memmap -- pnpacpi -- processor.max_ cstate -- processor.nocst -- SCSI Options -- max_luns -- max_report_ luns -- scsi_dev_flags -- PCI Options -- PCI -- Plug and Play BIOS Options -- noisapnp -- pnpbios -- pnp_reserve_ irq -- pnp_reserve_ dma -- pnp_reserve_io -- pnp_reserve_ mem -- SELinux Options -- checkreqprot -- enforcing -- selinux -- selinux_ compat_net -- Network Options -- netdev -- rhash_entries -- shapers -- thash_entries -- Network File System Options -- lockd.nlm_ grace_period -- lockd.nlm_ tcpport -- lockd.nlm_ timeout -- lockd.nlm_ udpport -- nfsroot -- nfs.callback_ tcpport -- nfs.idmap_ cache_timeout -- Hardware-Specific Options -- nousb -- lp -- parport -- parport_init_ mode -- nr_uarts -- Timer-Specific Options -- enable_timer_ pin_1 -- disable_timer_ pin_1 -- enable_8254_ timer -- disable_8254_ timer -- hpet -- clocksource -- Miscellaneous Options -- dhash_entries -- elevator -- hashdist -- combined_ mode -- max_loop -- panic -- pause_on_oops -- profile -- Kernel Build Command-Line Reference -- Informational Targets -- Cleaning Targets -- Configuration Targets -- Build Targets -- Packaging Targets -- Documentation Targets -- Architecture-Specific Targets -- Analysis Targets -- Kernel Configuration Option Reference -- EXPERIMENTAL -- LOCALVERSION -- AUDIT -- IKCONFIG -- EMBEDDED -- MODULES -- IOSCHED_NOOP -- IOSCHED_AS -- IOSCHED_ DEADLINE -- IOSCHED_CFQ -- SMP -- M386 -- X86_GENERIC -- NR_CPUS -- SCHED_SMT -- PREEMPT_NONE -- PREEMPT_ VOLUNTARY -- PREEMPT -- PREEMPT_BKL -- NOHIGHMEM -- HIGHMEM4G -- HIGHMEM64G -- FLATMEM_ MANUAL…”
Publicado 2007
Libro electrónico -
4828por Farahani, Shahin“…This book will explain the ZigBee protocol, discuss the design of ZigBee hardware, and describe how to design and implement ZigBee networks. …”
Publicado 2008
Libro electrónico -
4829Publicado 2009Tabla de Contenidos: “…2.1.6.2 Limitations to Measurement of Capacitance2.1.7 Filters; 2.1.8 Operational Amplifiers; 2.2 Sensor Systems; 2.3 Application Considerations; 2.4 Sensor Characteristics; 2.5 System Characteristics; 2.6 Instrument Selection; 2.6.1 Sensor; 2.6.2 Cable; 2.6.3 Power Supply; 2.6.4 Amplifier; 2.7 Data Acquisition and Readout; 2.8 Installation; 2.8.1 Sensor; 2.8.2 Cement Mounting; 2.8.3 Cable; 2.8.4 Power Supply, Amplifier, and Readout; 2.9 Measurement Issues and Criteria; Chapter 3: Data Acquisition Hardware and Software; 3.1 ADCs; 3.1.1 Reference Voltage; 3.1.2 Output Word; 3.1.3 Resolution…”
Libro electrónico -
4830Publicado 2013“…Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. …”
Libro electrónico -
4831Publicado 2013“…Find out how to prepare hardware, build disk groups, efficiently allocate storage space, and handle security. …”
Libro electrónico -
4832Publicado 2014Tabla de Contenidos: “…Business Process Layer -- Uptake New Features -- Optimize for New Usage -- Personalize for Productivity -- Functional Tasks -- Functional Configuration and Change Management -- Proactive Support -- Applications Technology Layer -- Business Intelligence -- Extending Features -- Applications Data Health -- WebCenter -- Caching Framework -- Integration -- Oracle Workflow -- Concurrent Processing -- Alerts and Notifications -- Setup and Implementation -- Platform Technology Layer -- Technical Architecture -- Simplify Maintenance -- Health Checks and Technical Compliance -- Hardware and Networking -- Watching the Watchman -- Summary -- Chapter 9: A Governance Management Toolbox -- What Is Application Governance? …”
Libro electrónico -
4833Publicado 2012“…This book attempts to answer these questions.This is the only book on the market that covers obsolescence forecasting methodologies, including forecasting tactics for hardware and software that enable cost-effective proactive product life-cycle management. …”
Libro electrónico -
4834por Vasseur, Jean-Philippe“…This book consists of three parts, Part I focuses on the architecture of smart objects networking, Part II covers the hardware, software, a…”
Publicado 2010
Libro electrónico -
4835Publicado 2012Tabla de Contenidos: “…15.1 Introduction 325 -- 15.2 Transition to LTE -- Use Cases 326 -- 15.3 Spectrum Aspects 327 -- 15.4 Effect of the Advanced GSM Features on the Fluent LTE Deployment 343 -- 15.5 Alternative Network Migration Path (Multi-Operator Case) 367 -- 15.6 Hardware Migration Path 376 -- 15.7 Mobile Backhaul -- Towards "All-IP" Transport 381 -- 15.8 LTE Interworking with Legacy Networks for the Optimal Voice and Data Services 384 -- References 405 -- Index 407.…”
Libro electrónico -
4836Publicado 2014“…Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. …”
Libro electrónico -
4837Publicado 2018Tabla de Contenidos: “…Die Lösung mit der Extra-Nonce -- Mining-Pools -- Konsensangriffe -- Die Konsensregeln ändern -- Hard Forks -- Hard Forks: Software, Netzwerk, Mining und die Chain -- Divergierende Miner und Difficulty -- Umstrittene Hard Forks -- Soft Forks -- Kritik an Soft Forks -- Soft-Fork-Signalisierung mittels Blockversion -- BIP-34-Signalisierung und -Aktivierung -- BIP-9-Signalisierung und -Aktivierung -- Entwicklung von Konsenssoftware -- Kapitel 11: Bitcoins und Sicherheit -- Sicherheitsgrundsätze -- Bitcoin-Systeme sicher entwickeln -- Die Wurzel des Vertrauens -- Best Practices für den Nutzer -- Physische Speicherung von Bitcoins -- Hardware-Wallets -- Risiken abwägen -- Risiken verteilen -- Multisignaturen und Kontrolle -- Überlebensfähigkeit -- Fazit -- Kapitel 12: Blockchain-Anwendungen -- Einführung -- Grundbausteine (Primitive) -- Anwendungen aus Grundbausteinen -- Colored Coins -- Colored Coins nutzen -- Colored Coins ausstellen -- Colored-Coins-Transaktionen -- Counterparty -- Zahlungs- und Zustandskanäle -- Zustandskanäle - grundlegende Konzepte und Terminologie -- Einfaches Zahlungskanalbeispiel -- Vertrauensfreie Kanäle aufbauen -- Asymmetrisch widerrufliche Commitments -- Hash Time Lock Contracts (HTLC) -- Geroutete Zahlungskanäle (Lightning Network) -- Einfaches Lightning-Network-Beispiel -- Lightning Network - Transport und Routing -- Vorteile des Lightning Network -- Fazit -- Anhang A: Das Bitcoin-Whitepaper von Satoshi Nakamoto -- Anhang B: Operatoren, Konstanten und Symbole der Transaktions-Skriptsprache -- Anhang C: Bitcoin Improvement Proposals -- Anhang D: Segregated Witness -- Anhang E: Bitcore -- Anhang F: pycoin, ku und tx -- Anhang G: Bitcoin-Explorer-(bx-)Befehle -- Index -- Über den Autor -- Kolophon…”
Libro electrónico -
4838Publicado 2010Tabla de Contenidos: “…Cover -- Table of Contents -- Introduction -- Prerequisites -- Our Teaching Philosophy -- How To Use This Book -- How This Book Is Organized -- Style Choices -- Typographical Conventions -- Hardware, Software, and Deployment -- 1. A Simple iPhone Application -- Creating an Xcode Project -- Using Interface Builder -- Model-View-Controller -- Declarations -- Declaring instance variables -- Declaring methods -- Making Connections -- Setting pointers -- Setting targets and actions -- Summary of connections -- Implementing Methods -- Build and Run on the Simulator -- Event-driven Programming -- Deploying an Application -- Application Icons -- Default Images -- 2. …”
Libro electrónico -
4839por Shearer, Findlay“…In fact, the main limiting factor in many portable designs is not hardware or soft…”
Publicado 2008
Libro electrónico -
4840Publicado 2003Tabla de Contenidos: “…6 Identifying High Availability and Disaster Recovery Requirements -- Introduction to Availability -- Addressing Availability Early in the SAP Project -- Determining Your Required Level of Disaster Tolerance -- Remedying Single Points of Failure in the Stack -- SAP Data Center Infrastructure SPOFs -- SAP Server SPOFs -- Disk Subsystem Single Points of Failure -- Single Points of Failure Inherent in the OS -- SPOFs and the Database Layer -- mySAP.com Single Points of Failure -- SAP General Availability and DR Best Practices -- A Final Look at the SAP System Landscape -- Tools and Techniques -- Summary -- 7 Sizing: Engaging the SAP Solution Stack Vendors -- Overview-The Sizing and Blueprinting Process -- General Sizing Best Practices and Approaches -- Preparing for the SAP Sizing Process -- SAP Hardware, OS, and Database Sizing -- Sizing Considerations for mySAP Components -- Selecting Your SAP Solution Stack Partners -- Executing the SAP Infrastructure Planning Sessions -- Tools and Techniques -- Summary -- 8 Staffing the Technical Support Organization -- Best Practices Approach to Staffing the SAP TSO -- Staffing the SAP TSO: Rapid Deployment -- Bringing in the Best of the Best -- How to Retain Your SAP Staff! …”
Libro electrónico