Mostrando 4,821 - 4,840 Resultados de 5,616 Para Buscar '"hardware"', tiempo de consulta: 0.10s Limitar resultados
  1. 4821
    Publicado 2008
    Tabla de Contenidos: “…8.2 Breaking Symmetric Key with Brute Force -- 8.3 Breaking Public Key without Factoring -- 8.4 Breaking Cryptography via the Real World -- 8.5 The Potential of Efficiently Factoring Moduli -- 8.6 The Take-Home Message -- 8.7 Project Ideas -- 9 Authentication -- 9.1 Basic Framework -- 9.2 Authenticating Humans -- 9.3 Human Factors -- 9.4 From the Machine's Point of View -- 9.5 Advanced Approaches -- 9.6 Case Studies -- 9.7 Broader Issues -- 9.8 The Take-Home Message -- 9.9 Project Ideas -- 10 Public Key Infrastructure -- 10.1 Basic Definitions -- 10.2 Basic Structure -- 10.3 Complexity Arrives -- 10.4 Multiple CAs -- 10.5 Revocation -- 10.6 The X.509 World -- 10.7 Dissent -- 10.8 Ongoing Trouble -- 10.9 The Take-Home Message -- 10.10 Project Ideas -- 11 Standards, Compliance, and Testing -- 11.1 Standards -- 11.2 Policy Compliance -- 11.3 Testing -- 11.4 The Take-Home Message -- 11.5 Project Ideas -- Part IV: Applications -- 12 The Web and Security -- 12.1 Basic Structure -- 12.2 Security Techniques -- 12.3 Privacy Issues -- 12.4 Web Services -- 12.5 The Take-Home Message -- 12.6 Project Ideas -- 13 Office Tools and Security -- 13.1 Word -- 13.2 Lotus 1-2-3 -- 13.3 PDF -- 13.4 Cut-and-Paste -- 13.5 PKI and Office Tools -- 13.6 Mental Models -- 13.7 The Take-Home Message -- 13.8 Project Ideas -- 14 Money, Time, Property -- 14.1 Money -- 14.2 Time -- 14.3 Property -- 14.4 The Take-Home Message -- 14.5 Project Ideas -- Part V: Emerging Tools -- 15 Formal Methods and Security -- 15.1 Specification -- 15.2 Logics -- 15.3 Cranking the Handle -- 15.4 Case Studies -- 15.5 Spinning Your Bank Account -- 15.6 Limits -- 15.7 The Take-Home Message -- 15.8 Project Ideas -- 16 Hardware-Based Security -- 16.1 Data Remanence -- 16.2 Attacks and Defenses -- 16.3 Tools -- 16.4 Alternative Architectures -- 16.5 Coming Trends -- 16.6 The Take-Home Message…”
    Libro electrónico
  2. 4822
    Publicado 2003
    Tabla de Contenidos: “…Installation -- 2.1 Planning -- 2.1.1 Hardware and software prerequisites -- 2.1.2 Check for record identifier conflicts -- 2.1.3 Ensure that the HTTP Sever is installed and working -- 2.2 Performing the SMP/E installation -- 2.2.1 Installation reference table -- 2.3 Customizing your Information Management installation -- 2.3.1 Update your session member -- 2.3.2 Update your BLX-SP parameters -- 2.3.3 Update your IBM panels -- 2.3.4 Load the sample records into your data session -- 2.3.5 Load the data model records into your DMRDB session -- 2.3.6 Create static data views from the data model records -- 2.3.7 Verify your Information Management customizations -- 2.3.8 Set up e-mail notification -- 2.3.9 Configure your HTTP Server for Web Access -- 2.3.10 Update your BLQPARMS file -- 2.3.11 Start the HTTP Server -- 2.3.12 Verify your Web Access installation -- 2.3.13 Generate HTML -- Chapter 3. …”
    Libro electrónico
  3. 4823
    Publicado 2004
    Tabla de Contenidos: “…Installation overview -- 4.1 Installation and configuration procedures -- 4.1.1 Migration -- 4.1.2 Installing the components -- 4.1.3 Installing the agent and remote console components -- 4.1.4 Installing Tivoli Provisioning Manager and storage workflows -- 4.2 Installing IBM Tivoli Provisioning Manager -- 4.2.1 One-node topology installation -- 4.2.2 Two-node topology installation -- 4.2.3 Three-node topology installation -- 4.3 Installation prerequisites -- 4.3.1 Software -- 4.3.2 Hardware -- Part 2 Storage Provisioning using IBM Tivoli Provisioning Manager -- Chapter 5. …”
    Libro electrónico
  4. 4824
    por Krikorian, Raffi
    Publicado 2003
    “…Armed with just a screwdriver and basic understanding of PC hardware (or willingness to learn), preeminent hackability awaits. …”
    Libro electrónico
  5. 4825
    Publicado 2001
    Tabla de Contenidos: “…Time-of-Check, Time-of-Use -- Broken passwd -- Avoiding TOCTOU Problems -- Secure File Access -- Temporary Files -- File Locking -- Other Race Conditions -- Conclusion -- 10 Randomness and Determinism -- Pseudo-random Number Generators -- Examples of PRNGs -- The Blum-Blum-Shub PRNG -- The Tiny PRNG -- Attacks Against PRNGs -- How to Cheat in On-line Gambling -- Statistical Tests on PRNGs -- Entropy Gathering and Estimation -- Hardware Solutions -- Software Solutions -- Poor Entropy Collection: How to Read "Secret" Netscape Messages -- Handling Entropy -- Practical Sources of Randomness -- Tiny -- Random Numbers for Windows -- Random Numbers for Linux -- Random Numbers in Java -- Conclusion -- 11 Applying Cryptography -- General Recommendations -- Developers Are Not Cryptographers -- Data Integrity -- Export Laws -- Common Cryptographic Libraries -- Cryptlib -- OpenSSL -- Crypto++ -- BSAFE -- Cryptix -- Programming with Cryptography -- Encryption -- Hashing -- Public Key Encryption -- Threading -- Cookie Encryption -- More Uses for Cryptographic Hashes -- SSL and TLS (Transport Layer Security) -- Stunnel -- One-Time Pads -- Conclusion -- 12 Trust Management and Input Validation -- A Few Words on Trust -- Examples of Misplaced Trust -- Trust Is Transitive -- Protection from Hostile Callers -- Invoking Other Programs Safely -- Problems from the Web -- Client-side Security -- Perl Problems -- Format String Attacks -- Automatically Detecting Input Problems -- Conclusion -- 13 Password Authentication -- Password Storage -- Adding Users to a Password Database -- Password Authentication -- Password Selection -- More Advice -- Throwing Dice -- Passphrases -- Application-Selected Passwords -- One-Time Passwords -- Conclusion -- 14 Database Security -- The Basics -- Access Control -- Using Views for Access Control -- Field Protection…”
    Libro electrónico
  6. 4826
    por Kehtarnavaz, Nasser
    Publicado 2005
    “…This book is perfect for practicing engineers, as well as hardware and software technical managers who are familiar with DSP and are involved in system-level design. …”
    Libro electrónico
  7. 4827
    por Kroah-Hartman, Greg
    Publicado 2007
    Tabla de Contenidos: “…ACPI Options -- acpi -- acpi_sleep -- acpi_sci -- acpi_irq_ balance -- acpi_irq_ nobalance -- acpi_irq_isa -- acpi_irq_pci -- acpi_os_name -- acpi_osi -- acpi_serialize -- acpi_skip_ timer_override -- acpi_dbg_layer -- acpi_fake_ecdt -- acpi_generic_ hotkey -- acpi_pm_good -- ec_intr -- memmap -- memmap -- pnpacpi -- processor.max_ cstate -- processor.nocst -- SCSI Options -- max_luns -- max_report_ luns -- scsi_dev_flags -- PCI Options -- PCI -- Plug and Play BIOS Options -- noisapnp -- pnpbios -- pnp_reserve_ irq -- pnp_reserve_ dma -- pnp_reserve_io -- pnp_reserve_ mem -- SELinux Options -- checkreqprot -- enforcing -- selinux -- selinux_ compat_net -- Network Options -- netdev -- rhash_entries -- shapers -- thash_entries -- Network File System Options -- lockd.nlm_ grace_period -- lockd.nlm_ tcpport -- lockd.nlm_ timeout -- lockd.nlm_ udpport -- nfsroot -- nfs.callback_ tcpport -- nfs.idmap_ cache_timeout -- Hardware-Specific Options -- nousb -- lp -- parport -- parport_init_ mode -- nr_uarts -- Timer-Specific Options -- enable_timer_ pin_1 -- disable_timer_ pin_1 -- enable_8254_ timer -- disable_8254_ timer -- hpet -- clocksource -- Miscellaneous Options -- dhash_entries -- elevator -- hashdist -- combined_ mode -- max_loop -- panic -- pause_on_oops -- profile -- Kernel Build Command-Line Reference -- Informational Targets -- Cleaning Targets -- Configuration Targets -- Build Targets -- Packaging Targets -- Documentation Targets -- Architecture-Specific Targets -- Analysis Targets -- Kernel Configuration Option Reference -- EXPERIMENTAL -- LOCALVERSION -- AUDIT -- IKCONFIG -- EMBEDDED -- MODULES -- IOSCHED_NOOP -- IOSCHED_AS -- IOSCHED_ DEADLINE -- IOSCHED_CFQ -- SMP -- M386 -- X86_GENERIC -- NR_CPUS -- SCHED_SMT -- PREEMPT_NONE -- PREEMPT_ VOLUNTARY -- PREEMPT -- PREEMPT_BKL -- NOHIGHMEM -- HIGHMEM4G -- HIGHMEM64G -- FLATMEM_ MANUAL…”
    Libro electrónico
  8. 4828
    por Farahani, Shahin
    Publicado 2008
    “…This book will explain the ZigBee protocol, discuss the design of ZigBee hardware, and describe how to design and implement ZigBee networks. …”
    Libro electrónico
  9. 4829
    Publicado 2009
    Tabla de Contenidos: “…2.1.6.2 Limitations to Measurement of Capacitance2.1.7 Filters; 2.1.8 Operational Amplifiers; 2.2 Sensor Systems; 2.3 Application Considerations; 2.4 Sensor Characteristics; 2.5 System Characteristics; 2.6 Instrument Selection; 2.6.1 Sensor; 2.6.2 Cable; 2.6.3 Power Supply; 2.6.4 Amplifier; 2.7 Data Acquisition and Readout; 2.8 Installation; 2.8.1 Sensor; 2.8.2 Cement Mounting; 2.8.3 Cable; 2.8.4 Power Supply, Amplifier, and Readout; 2.9 Measurement Issues and Criteria; Chapter 3: Data Acquisition Hardware and Software; 3.1 ADCs; 3.1.1 Reference Voltage; 3.1.2 Output Word; 3.1.3 Resolution…”
    Libro electrónico
  10. 4830
    Publicado 2013
    “…Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. …”
    Libro electrónico
  11. 4831
    Publicado 2013
    “…Find out how to prepare hardware, build disk groups, efficiently allocate storage space, and handle security. …”
    Libro electrónico
  12. 4832
    Publicado 2014
    Tabla de Contenidos: “…Business Process Layer -- Uptake New Features -- Optimize for New Usage -- Personalize for Productivity -- Functional Tasks -- Functional Configuration and Change Management -- Proactive Support -- Applications Technology Layer -- Business Intelligence -- Extending Features -- Applications Data Health -- WebCenter -- Caching Framework -- Integration -- Oracle Workflow -- Concurrent Processing -- Alerts and Notifications -- Setup and Implementation -- Platform Technology Layer -- Technical Architecture -- Simplify Maintenance -- Health Checks and Technical Compliance -- Hardware and Networking -- Watching the Watchman -- Summary -- Chapter 9: A Governance Management Toolbox -- What Is Application Governance? …”
    Libro electrónico
  13. 4833
    Publicado 2012
    “…This book attempts to answer these questions.This is the only book on the market that covers obsolescence forecasting methodologies, including forecasting tactics for hardware and software that enable cost-effective proactive product life-cycle management. …”
    Libro electrónico
  14. 4834
    por Vasseur, Jean-Philippe
    Publicado 2010
    “…This book consists of three parts, Part I focuses on the architecture of smart objects networking, Part II covers the hardware, software, a…”
    Libro electrónico
  15. 4835
    Publicado 2012
    Tabla de Contenidos: “…15.1 Introduction 325 -- 15.2 Transition to LTE -- Use Cases 326 -- 15.3 Spectrum Aspects 327 -- 15.4 Effect of the Advanced GSM Features on the Fluent LTE Deployment 343 -- 15.5 Alternative Network Migration Path (Multi-Operator Case) 367 -- 15.6 Hardware Migration Path 376 -- 15.7 Mobile Backhaul -- Towards "All-IP" Transport 381 -- 15.8 LTE Interworking with Legacy Networks for the Optimal Voice and Data Services 384 -- References 405 -- Index 407.…”
    Libro electrónico
  16. 4836
    Publicado 2014
    “…Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. …”
    Libro electrónico
  17. 4837
    Publicado 2018
    Tabla de Contenidos: “…Die Lösung mit der Extra-Nonce -- Mining-Pools -- Konsensangriffe -- Die Konsensregeln ändern -- Hard Forks -- Hard Forks: Software, Netzwerk, Mining und die Chain -- Divergierende Miner und Difficulty -- Umstrittene Hard Forks -- Soft Forks -- Kritik an Soft Forks -- Soft-Fork-Signalisierung mittels Blockversion -- BIP-34-Signalisierung und -Aktivierung -- BIP-9-Signalisierung und -Aktivierung -- Entwicklung von Konsenssoftware -- Kapitel 11: Bitcoins und Sicherheit -- Sicherheitsgrundsätze -- Bitcoin-Systeme sicher entwickeln -- Die Wurzel des Vertrauens -- Best Practices für den Nutzer -- Physische Speicherung von Bitcoins -- Hardware-Wallets -- Risiken abwägen -- Risiken verteilen -- Multisignaturen und Kontrolle -- Überlebensfähigkeit -- Fazit -- Kapitel 12: Blockchain-Anwendungen -- Einführung -- Grundbausteine (Primitive) -- Anwendungen aus Grundbausteinen -- Colored Coins -- Colored Coins nutzen -- Colored Coins ausstellen -- Colored-Coins-Transaktionen -- Counterparty -- Zahlungs- und Zustandskanäle -- Zustandskanäle - grundlegende Konzepte und Terminologie -- Einfaches Zahlungskanalbeispiel -- Vertrauensfreie Kanäle aufbauen -- Asymmetrisch widerrufliche Commitments -- Hash Time Lock Contracts (HTLC) -- Geroutete Zahlungskanäle (Lightning Network) -- Einfaches Lightning-Network-Beispiel -- Lightning Network - Transport und Routing -- Vorteile des Lightning Network -- Fazit -- Anhang A: Das Bitcoin-Whitepaper von Satoshi Nakamoto -- Anhang B: Operatoren, Konstanten und Symbole der Transaktions-Skriptsprache -- Anhang C: Bitcoin Improvement Proposals -- Anhang D: Segregated Witness -- Anhang E: Bitcore -- Anhang F: pycoin, ku und tx -- Anhang G: Bitcoin-Explorer-(bx-)Befehle -- Index -- Über den Autor -- Kolophon…”
    Libro electrónico
  18. 4838
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Table of Contents -- Introduction -- Prerequisites -- Our Teaching Philosophy -- How To Use This Book -- How This Book Is Organized -- Style Choices -- Typographical Conventions -- Hardware, Software, and Deployment -- 1. A Simple iPhone Application -- Creating an Xcode Project -- Using Interface Builder -- Model-View-Controller -- Declarations -- Declaring instance variables -- Declaring methods -- Making Connections -- Setting pointers -- Setting targets and actions -- Summary of connections -- Implementing Methods -- Build and Run on the Simulator -- Event-driven Programming -- Deploying an Application -- Application Icons -- Default Images -- 2. …”
    Libro electrónico
  19. 4839
    por Shearer, Findlay
    Publicado 2008
    “…In fact, the main limiting factor in many portable designs is not hardware or soft…”
    Libro electrónico
  20. 4840
    Publicado 2003
    Tabla de Contenidos: “…6 Identifying High Availability and Disaster Recovery Requirements -- Introduction to Availability -- Addressing Availability Early in the SAP Project -- Determining Your Required Level of Disaster Tolerance -- Remedying Single Points of Failure in the Stack -- SAP Data Center Infrastructure SPOFs -- SAP Server SPOFs -- Disk Subsystem Single Points of Failure -- Single Points of Failure Inherent in the OS -- SPOFs and the Database Layer -- mySAP.com Single Points of Failure -- SAP General Availability and DR Best Practices -- A Final Look at the SAP System Landscape -- Tools and Techniques -- Summary -- 7 Sizing: Engaging the SAP Solution Stack Vendors -- Overview-The Sizing and Blueprinting Process -- General Sizing Best Practices and Approaches -- Preparing for the SAP Sizing Process -- SAP Hardware, OS, and Database Sizing -- Sizing Considerations for mySAP Components -- Selecting Your SAP Solution Stack Partners -- Executing the SAP Infrastructure Planning Sessions -- Tools and Techniques -- Summary -- 8 Staffing the Technical Support Organization -- Best Practices Approach to Staffing the SAP TSO -- Staffing the SAP TSO: Rapid Deployment -- Bringing in the Best of the Best -- How to Retain Your SAP Staff! …”
    Libro electrónico