Mostrando 4,861 - 4,880 Resultados de 5,616 Para Buscar '"hardware"', tiempo de consulta: 0.12s Limitar resultados
  1. 4861
    Publicado 2023
    Tabla de Contenidos: “…-- Self-healing -- Load-balancing and networking -- Persistent storage and volumes -- General -- Pods versus containers -- Some Kubernetes lingo -- Extending Kubernetes -- Kubernetes architecture -- Where to run Kubernetes -- Use your own hardware -- Using a hosted service…”
    Libro electrónico
  2. 4862
    Publicado 2023
    Tabla de Contenidos: “…In the Laboratory -- 6.1 Industrial Laboratory -- 6.2 Professional Laboratory -- 6.3 Processing Yourself: Black-and-White -- 6.3.1 Overview: Negative Processing -- 6.3.2 Chemicals -- 6.3.3 Hardware…”
    Libro electrónico
  3. 4863
    Publicado 2007
    Tabla de Contenidos: “…Efficient indoor proximity and separation detection for location fingerprinting / Mikkel Baun Kjærgaard [and others] -- An approach to increase the scalability of location systems in WLAN networks / Israel Martin-Escalona, Francisco Barcelo-Arroyo -- Name-based location service for mobile agents in wireless sensor networks / Shunichiro Suenaga, Shinichi Honiden -- Localization using neural networks in wireless sensor networks / Ali Shareef, Yifeng Zhu, Mohamad Musavi -- Middleware-based solution to offer mobile presence services / Victoria Beltran, Josep Paradells -- Supporting location-aware services for mobile users with the whereabouts diary / Nicola Bicocchi [and others] -- Bridging context management systems for different types of pervasive computing environments / Cristian Hesselman [and others] -- Middleware for multi-interfaces management through profiles handling / Jean-Marie Bonnin [and others] -- Semantic middleware for context services composition in ubiquitous computing / Abdelghani Chibani, Karim Djouani, Yacine Amirat -- Nano-kernel: a dynamically reconfigurable kernel for WSN / Susmit Bagchi -- RCCT: robust clustering with cooperative transmission for energy efficient wireless sensor networks / Mahbod Ghelichi, Seied Kazem Jahanbakhsh, Esmaeil Sanaei -- Design guidelines for integration of wireless sensor networks with enterprise systems / Laurent Gomez, Annett Laube, Alessandro Sorniotti -- Hardware support for a wireless sensor network virtual machine / Hitoshi Oi -- Virtual access points for vehicular networks / Nikolaos Frangiadakis [and others] -- Using SELinux security enforcement in Linux-based embedded devices / Björn Vogel, Bernd Steinke -- New efficient intrusion detection and prevention system for Bluetooth networks / Keijo M.J. …”
    Libro electrónico
  4. 4864
    Publicado 2012
    Tabla de Contenidos: “…DESCRIBE LOS DIFERENTES COMPONENTES DE LOS SISTEMAS COMPUTACIONALES -- 1.7 HARDWARE, ESTRUCTURA DE UN SISTEMA DE COMPUTO -- 1. 7. 1 GABINETE -- 1.7.2 FACTOR DE FORMA DEL GABINETE -- 1.8 TIERRA FÍSICA -- 1.9 FUENTE DE ALIMENTACIÓN -- 1. 9. 1 FUENTE DE PODER AT -- 1. 9.2 FUENTE DE PODER ATX -- 1.9.3 TENSIÓN POWER GOOD -- 1. 9 .4 CONECTORES DE LA FUENTE -- 1.10 SISTEMAS DE ENF RIAMIENTO -- 1.10.1 DISIPACIÓN STOCK O DE FÁBRICA -- 1.10.2. …”
    Libro electrónico
  5. 4865
    Tabla de Contenidos: “…Workstation: Desktop Setup Configuration -- SkyDrive Pro: Configuration -- SkyDrive Pro: Planning for Personal and Team Site Document Storage -- Step 1: Add SkyDrive Pro to Your Desktop -- Step 2: Office 365 SkyDrive Pro Configuration -- Step 3: Launch SkyDrive Pro on Your Local System -- Step 4: Office 365 SkyDrive Pro Configuration -- SkyDrive Pro: Team Site Caution -- SkyDrive: Configuration Changes -- SkyDrive Pro: Support for Office 2010 Users -- SkyDrive: Checking Storage Allocation -- Smartphone: Configuration -- iPhone -- Android Devices: Motorola Droid v2.2 (and Above) -- Windows Phone: Office 365 -- Windows Phone: Adding Another Exchange Account -- Lync: Skype Configuration -- Step 1: Enable Lync Client to Accept Skype User Calls -- Step 2: Verify Configuration of Office 365 with External Users -- Lync: Linking Microsoft Account to Skype -- Lync: Using Skype to Call Lync -- Lync: Troubleshooting -- Lync: Firewall Port Configuration -- Reference Links -- Next Steps -- Contents at a Glance -- Chapter 3: Office 365 Planning and Purchase -- Office 365 Subscription Plans -- Planning and Purchase Chapter Structure -- Pre-deployment -- Step 1: Purchase Your Subscription(s) -- Step 2: Choose Your Sign-On Method -- Office 365 Sign-On -- DirSync with Password Sync -- Active Directory Federation Services (AD FS)/Single Sign-On -- AD FS/Single Sign-On with Exchange Federation -- DirSync and SSO/AD FS Caution -- Step 3: Collect Your Information -- Domains and Domain Information -- Users and Resources -- Security Groups -- Special E-mail Addresses: Distribution Groups and Aliases -- Exchange Public Folders -- Internet, Hardware, and Software -- Perform Any Required Updates and Software or Hardware Upgrades -- Compliance Archive Requirements -- Step 4: Define Your Migration Plan and Schedule -- E-mail Flow…”
    Libro electrónico
  6. 4866
    Publicado 2020
    Tabla de Contenidos: “…. -- Literatur -- Ethernet TSN Nano Profil - Migrationshelfer vom industriellen Brownfield zum Ethernet TSN-basierten IIoT -- 1 Entwicklungstendenzen von Ethernet TSN im Applikationsfeld industrielle Automation und Motivation für ein Ethernet TSN Nano Profil -- 2 Heterogenität von Ethernet TSN in Profilen, Systemen und Geräten -- 3 Ethernet TSN Nano-Profil - Skalierung von Ethernet TSN für die Feldebene und Retrofitting von IEC Echtzeit Ethernet-Hardware und -Anlagen -- 3.1 Time Aware Forwarder: Funktionsmodus für den Time Aware Shaper für Bridged Endstations mit eingeschränkter Weiterleittabelle und…”
    Libro electrónico
  7. 4867
    Publicado 2024
    Tabla de Contenidos: “…Significant forthcomings of edge healthcare IoT -- 4.7. Software and hardware companies developing healthcare tools -- 4.8. …”
    Libro electrónico
  8. 4868
    por Moeller, Morten
    Publicado 2005
    Tabla de Contenidos: “…. -- 3.4 Setup and configuration planning -- 3.4.1 Suggested Tivoli hardware requirements -- 3.4.2 Tivoli repeater architecture -- 3.4.3 Optimizing slow links connections -- 3.4.4 Managing endpoint behavior -- 3.4.5 Managing the TME Infrastructure -- 3.4.6 Tivoli and RDBMS Integration -- 3.5 Network communications and considerations -- 3.5.1 TCP/IP -- 3.6 Configuration management…”
    Libro electrónico
  9. 4869
    Publicado 2012
    Tabla de Contenidos: “…9.6.2 MNO Certification -- 10 Smart Cards in M2M Communication -- 10.1 Introduction -- 10.2 Security and Privacy Issues in M2M Communication -- 10.3 The Grounds for Hardware-Based Security Solutions -- 10.4 Independent Secure Elements and Trusted Environments -- 10.4.1 Trusted Environments in M2M Devices -- 10.4.2 Trusting Unknown Devices: The Need for Security Certification -- 10.4.3 Advantages of the Smart Card Model -- 10.5 Specific Smart Card Properties for M2M Environments -- 10.5.1 Removable Smart Cards versus Embedded Secure Elements -- 10.5.2 UICC Resistance to Environmental Constraints -- 10.5.3 Adapting the Card Application Toolkit to Unattended Devices -- 10.5.4 Reaching UICC Peripheral Devices with Toolkit Commands -- 10.5.5 Confidential Remote Management of Third-Party Applications -- 10.6 Smart Card Future Evolutions in M2M Environments -- 10.6.1 UICC-Based M2M Service Identity Module Application -- 10.6.2 Internet Protocol Integration of the UICC -- 10.7 Remote Administration of M2M Secure Elements -- 10.7.1 Overview -- 10.7.2 Late Personalization of Subscription -- 10.7.3 Remote Management of Subscriptions on the Field -- References -- Part III BOOK CONCLUSIONS AND FUTURE VISION -- 11 Conclusions -- Index…”
    Libro electrónico
  10. 4870
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Amazon Web Services for Serverless -- Technical requirements -- Transitioning from traditional server to serverless -- Getting started with AWS Lambda -- How AWS Lambda works -- Configuration -- Function code -- Environment variables -- Tags -- Execution role -- Basic settings -- Network -- Debugging and error handling -- Monitoring -- Executing the Lambda function -- Creating Lambda triggers -- Serverless RESTful API -- AWS Lambda interaction with theAWS CLI -- Installing the AWS CLI -- Configuring the AWS CLI -- Configuring Lambda function with the AWS CLI -- Creating a Lambda function -- Invoking the function -- Create-event-source-mapping -- Summary -- Questions -- Chapter 2: Getting Started with Zappa -- Technical requirements -- Hardware -- Software -- What is Zappa? -- Installing and configuring Zappa -- Building, testing, and deploying a Python web service using Zappa -- Building the deployment package -- What do you call this environment? …”
    Libro electrónico
  11. 4871
    Publicado 2019
    Tabla de Contenidos: “…-- Man Pages -- FreeBSD.org -- Other Websites -- Using FreeBSD Problem-Solving Resources -- Asking for Help -- 2 BEFORE YOU INSTALL -- Default Files -- Configuration with UCL -- FreeBSD Hardware -- Disks and Filesystems -- Getting FreeBSD -- Network Installs -- 3 INSTALLING -- Core Settings -- Distribution Selection -- Disk Partitioning -- Network and Service Configuration -- Finishing the Install -- 4 START ME UP! …”
    Libro electrónico
  12. 4872
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Part I: An Overview of plot() -- Chapter 1: Introduction: plot(), qplot(), and ggplot(), Plus Some -- 1.1 plot(), par(), layout(), and split.screen() -- 1.2 qplot() and ggplot() -- 1.3 The Appendixes -- 1.4 Software Versions and Hardware Used in This Book -- 1.5 Graphics Devices -- Chapter 2: The plot() Function -- 2.1 Arguments and Default Values -- 2.2 Ancillary Functions -- 2.3 Methods -- 2.4 The Graphics Devices and the Functions par(), layout(), and split.screen() -- 2.5 An Example -- Chapter 3: The Arguments of plot() -- 3.1 The Dataset -- 3.2 Changing the Overall Appearance in plot() -- 3.2.1 Labels and Axis Limits -- 3.2.2 Box Type, Aspect Ratio, Annotation, and Expanded Plotting -- 3.3 Points and Lines -- 3.3.1 Types of Plots -- 3.3.2 The Arguments pch and lty -- 3.4 Details -- 3.4.1 Colors -- 3.4.1.1 Assigning Colors with Character Strings -- 3.4.1.2 Assigning Colors with Integers -- 3.4.1.3 Assigning Colors with Functions -- 3.4.2 Fonts and Font Families -- 3.4.2.1 Font Families and Assigning the Font Family in plot() -- 3.4.2.2 Font Weights in plot() -- 3.4.3 Character Size in plot() -- 3.4.4 Line Details: lwd, lend, ljoin, and lmitre -- 3.4.5 Making Changes to the Axes -- 3.4.6 Working with Log Scales -- Chapter 4: Ancillary Functions for plot() -- 4.1 Functions That Affect Overall Appearance -- 4.1.1 The title() Function -- 4.1.2 The axis() and axTicks() Functions -- 4.1.2.1 The axis() Function -- 4.1.2.2 The axTicks() Function -- 4.1.3 The box(), grid(), clip(), and rug() Functions -- 4.1.3.1 The box() Function -- 4.1.3.2 The grid() Function -- 4.1.3.3 The clip() Function -- 4.1.3.4 The rug() Function -- 4.2 Functions Defined at Points -- 4.2.1 The points() Function -- 4.2.2 The text() Function…”
    Libro electrónico
  13. 4873
    Publicado 2021
    Tabla de Contenidos: “…IoT-enabling technologies -- 5.3.1. IoT hardware -- 5.3.2. IoT software -- 5.3.3. IoT connectivity -- 5.4. …”
    Libro electrónico
  14. 4874
    Publicado 2013
    Tabla de Contenidos: “…Postmortem Forensics -- Live Forensics -- When Live Forensics Is the Best Option -- Tools for Live Forensics -- Postmortem Forensics -- Postmortem Memory Analysis -- Chapter 8: Capturing Evidence -- Creating Forensic Images of Internal Hard Drives -- FTK Imager with a Hardware Write Blocker -- FTK Imager with a Software Write Blocker -- Creating Forensic Images of External Drives -- FTK Imager with a USB Write Blocker -- FTK Imager with a Software Write Blocker -- Software Write Blocking on Linux Systems -- Creating Forensic Images of Network Shares…”
    Libro electrónico
  15. 4875
    Publicado 2016
    Tabla de Contenidos: “…-- A detailed look at keyloggers -- Hardware keyloggers -- Software keyloggers -- Detecting malicious processes -- Building a keylogger for Windows -- Using the Windows API -- PyWin32 -- PyHooks -- WMI -- Monitoring keyboard events -- Capturing screenshots -- Capturing the clipboard -- Monitoring processes -- Multiprocessing in Python - simple_multiprocessor.py -- Running Python without a command window -- Exploring the code -- Capturing the screen -- Capturing the clipboard -- Capturing the keyboard -- Keylogger controllers -- Capturing processes -- Understanding the main() function -- Running the script -- Citations -- Additional challenges -- Summary -- Chapter 11: Parsing Outlook PST Containers -- The Personal Storage Table File Format -- An introduction to libpff -- How to install libpff and pypff -- Exploring PSTs - pst_indexer.py -- An overview -- Developing the main() function -- Evaluating the makePath() helper function -- Iteration with the folderTraverse() function -- Identifying messages with the checkForMessages() function -- Processing messages in the processMessage() function -- Summarizing data in the folderReport() function -- Understanding the wordStats() function -- Creating the wordReport() function -- Building the senderReport() function -- Refining the heat map with the dateReport() function -- Writing the HTMLReport() function -- The HTML template -- Running the script -- Additional challenges…”
    Libro electrónico
  16. 4876
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Copyright and Credits -- Packt Upsell -- Foreword -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started -- Understanding deep learning -- Perceptron -- Activation functions -- Sigmoid -- The hyperbolic tangent function -- The Rectified Linear Unit (ReLU) -- Artificial neural network (ANN) -- One-hot encoding -- Softmax -- Cross-entropy -- Dropout -- Batch normalization -- L1 and L2 regularization -- Training neural networks -- Backpropagation -- Gradient descent -- Stochastic gradient descent -- Playing with TensorFlow playground -- Convolutional neural network -- Kernel -- Max pooling -- Recurrent neural networks (RNN) -- Long short-term memory (LSTM) -- Deep learning for computer vision -- Classification -- Detection or localization and segmentation -- Similarity learning -- Image captioning -- Generative models -- Video analysis -- Development environment setup -- Hardware and Operating Systems - OS -- General Purpose - Graphics Processing Unit (GP-GPU) -- Computer Unified Device Architecture - CUDA -- CUDA Deep Neural Network - CUDNN -- Installing software packages -- Python -- Open Computer Vision - OpenCV -- The TensorFlow library -- Installing TensorFlow -- TensorFlow example to print Hello, TensorFlow -- TensorFlow example for adding two numbers -- TensorBoard -- The TensorFlow Serving tool -- The Keras library -- Summary -- Chapter 2: Image Classification -- Training the MNIST model in TensorFlow -- The MNIST datasets -- Loading the MNIST data -- Building a perceptron -- Defining placeholders for input data and targets -- Defining the variables for a fully connected layer -- Training the model with data -- Building a multilayer convolutional network -- Utilizing TensorBoard in deep learning -- Training the MNIST model in Keras -- Preparing the dataset -- Building the model…”
    Libro electrónico
  17. 4877
    Publicado 2018
    Tabla de Contenidos: “…-- Public versus private blockchains -- Unexpected security risks -- Security starts at the network architecture level -- Importance of the consensus protocol -- Bugs in the blockchain code -- Manage asset security -- Difference between hot and cold wallets -- Software wallets (desktop and mobile) -- Online or web wallets -- Physical or paper wallets -- Hardware wallets -- Access control -- Reversibility of transactions -- Maintaining privacy on the blockchain -- Maintaining today's level of privacy -- Secure multi-party computation -- Zero-knowledge proofs -- Permissioned blockchain -- Making sense of smart contracts -- What is a smart contract? …”
    Libro electrónico
  18. 4878
    por Mueller, John Paul
    Publicado 2019
    Tabla de Contenidos: “…Considering the Off-the-Shelf Cross- Platform Scientific Distributions -- Getting Continuum Analytics Anaconda -- Getting Enthought Canopy Express -- Getting WinPython -- Installing Anaconda on Windows -- Installing Anaconda on Linux -- Installing Anaconda on Mac OS X -- Downloading the Datasets and Example Code -- Using Jupyter Notebook -- Defining the code repository -- Understanding the datasets used in this book -- Chapter 4 Working with Google Colab -- Defining Google Colab -- Understanding what Google Colab does -- Considering the online coding difference -- Using local runtime support -- Getting a Google Account -- Creating the account -- Signing in -- Working with Notebooks -- Creating a new notebook -- Opening existing notebooks -- Saving notebooks -- Downloading notebooks -- Performing Common Tasks -- Creating code cells -- Creating text cells -- Creating special cells -- Editing cells -- Moving cells -- Using Hardware Acceleration -- Executing the Code -- Viewing Your Notebook -- Displaying the table of contents -- Getting notebook information -- Checking code execution -- Sharing Your Notebook -- Getting Help -- Part 2 Getting Your Hands Dirty with Data -- Chapter 5 Understanding the Tools -- Using the Jupyter Console -- Interacting with screen text -- Changing the window appearance -- Getting Python help -- Getting IPython help -- Using magic functions -- Discovering objects -- Using Jupyter Notebook -- Working with styles -- Restarting the kernel -- Restoring a checkpoint -- Performing Multimedia and Graphic Integration -- Embedding plots and other images -- Loading examples from online sites -- Obtaining online graphics and multimedia -- Chapter 6 Working with Real Data -- Uploading, Streaming, and Sampling Data -- Uploading small amounts of data into memory -- Streaming large amounts of data into memory…”
    Libro electrónico
  19. 4879
    Publicado 2018
    Tabla de Contenidos: “…The REBIND Utility -- Flushing the Package Cache Utility -- The ADMIN_CMD () procedure -- Summary -- Practice questions -- Answers -- Chapter 7: High Availability -- Transactions and logging parameters -- Transaction logging strategies -- Database recovery methods -- Backup and recovery -- The Db2 backup utility -- Incremental and delta backups -- A word about hardware accelerated backup -- The Db2 restore utility -- The Db2 roll-forward utility -- The Db2 recover utility -- A word about the db2relocatedb command -- High availability and disaster recovery -- HADR synchronization modes -- HADR-specific parameters -- Setting up an HADR multiple standby environment -- A word about the Db2 HA instance configuration utility (db2haicu) -- Activating the RoS feature -- Db2 pureScale architecture -- Geographically dispersed Db2 pureScale db2cluster (GDPC) -- Db2 pureScale db2cluster service command options -- Explicit Hierarchical Locking -- Summary -- Practice questions -- Answers -- Chapter 8: Db2 Security -- Authentication and authorization -- Authorities and privileges -- Authorities -- The system administrative authority (SYSADM) -- The system control authority (SYSCTRL) -- The system maintenance authority (SYSMAINT) -- The system monitor authority (SYSMON) -- The database administrator authority (DBADM) -- The security administrator authority (SECADM) -- The SQL administrator (SQLADM) authority -- The workload management administrator authority (WLMADM) -- The Explain administrator authority (EXPLAIN) -- The Access control administrator authority (ACCESSCTRL) -- The data access administrator authority (DATAACCESS) -- The data load (LOAD) authority -- Privileges -- LDAP-based authentication -- Role-based access control -- Trusted context and trusted connections -- Row and column access control (RCAC) -- Row permissions -- Column masks…”
    Libro electrónico
  20. 4880
    Publicado 2020
    “…An ideal resource for students, hobbyists, musicians, audio professionals, and those interested in exploring the possibilities of hardware-based sound and music creation…”
    Libro electrónico