Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
5481Publicado 2006“…In-depth coverage of all the new and improved Windows Vista tools and technologies A tour of the new Windows Vista interface, including Aero Glass What hardware you need to get the most out of Windows Vista Vista’s file system improvements, including tags, Quick Search, and virtual folders A review of Vista’s new performance and stability features A critical look at the beefed-up security features, including Windows Defender, the new Firewall, and User Account Control A complete look at Vista’s totally redesigned networking tools In-depth coverage of Vista’s new and improved tools for notebooks and Tablet PCs, digital media, and gaming Paul McFedries is the president of Logophilia Limited, a technical writing company. …”
Libro electrónico -
5482por Ousterhout, John K.“…Whether you’re using Tcl/Tk to automate system/network administration, streamline testing, control hardware, or even build desktop or Web applications, this is the one Tcl/Tk book you’ll always turn to for answers…”
Publicado 2009
Libro electrónico -
5483Publicado 2008“…Kapitel 1, Installation Kapitel 2, Konfiguration Kapitel 3, Wartung Kapitel 4, Datensicherung Kapitel 5, Überwachung Kapitel 6, Wiederherstellung Kapitel 7, Sicherheit Kapitel 8, Performance Kapitel 9, Replikation Kapitel 10, Hardware…”
Libro electrónico -
5484Publicado 2013“…Finally, this hands-on, step-by-step video training tool also includes downloadable documentation that covers base configurations (and a listing of hardware) for all routers and switches, including the PSTN/Frame Relay Switch router as well as all the configurations peformed in the mock-lab walkthrough videos. …”
-
5485Publicado 2011“…. § Understand why, when, and how you should test your network § Use testing to discover critical network design flaws § Incorporate structured systems testing into enterprise architecture strategy § Utilize testing to improve decision-making throughout the network lifecycle § Develop an effective testing organization and lab facility § Choose and use test services providers § Scope, plan, and manage network test assignments § nLeverage the best commercial, free, and IOS test tools § Successfully execute test plans, including crucial low-level details § Minimize the equipment required to test large-scale networks § Identify gaps in network readiness § Validate and refine device configurations § Certify new hardware, operating systems, and software features § Test data center performance and scalability § Leverage test labs for hands-on technology training This book is part of the Networking Technology Series from Cis..…”
Libro electrónico -
5486Publicado 2017“…The book will guide you down the path to mastering Python concurrency, giving you all the necessary hardware and theoretical knowledge. We'll cover concepts such as debugging and exception handling as well as some of the most popular libraries and frameworks that allow you to create event-driven and reactive systems. …”
Libro electrónico -
5487Publicado 2020“…You'll go through the essential hardware and software components of Logix, before learning all about the new L8 processor model and the latest Studio 5000 architecture to build effective integrated solutions. …”
Libro electrónico -
5488Publicado 2012“…Topics Include BLE device types, design goals, terminology, and core concepts Architecture: controller, host, applications, and stack splits Usage models: presence detection, data broadcasting, connectionless models, and gateways Physical Layer: modulation, frequency band, radio channels, power, tolerance, and range Direct Test Mode: transceiver testing, hardware interfaces, and HCI Link Layer: state machine, packets, channels, broadcasting, encryption, and optimization HCI: physical/logical interfaces, controller setup, and connection management L2CAP: channels and packet structure, and LE signaling channels Attributes: grouping, services, characteristics, and protocols Security: pairing, bonding, and data signing Generic Access Profiles: roles, modes, procedures, security modes, data advertising, and services Applications, devices, services, profiles, and peripherals Testing/qualification: starting projects, selecting features, planning, testing, com..…”
Libro electrónico -
5489por Knittel, Brian“…• Take a quick guided tour of everything that’s new in Windows 8.1 • Survive without the Start menu • Navigate the Windows 8.1 interface (and customize it to make yourself more comfortable) • Learn hidden shortcuts you’d never find on your own • Quickly locate and use files, media, apps, websites and management tools • Set up your Web connection, and discover Internet Explorer 11’s latest improvements • Get comfortable with Windows 8.1’s built-in apps, from Calendar and Finance to Weather and Windows Store • Save time by monitoring Facebook, Twitter, and LinkedIn through one unified app • Make the most of Windows’ supercharged media and imaging tools • Profit from Windows’ built-in support for business presentations • Maximize the performance and efficiency of hardware, storage, and software • Protect yourself from viruses, spyware, data theft, fraud, spam, hackers, and snoops • Use SkyDrive to access your data from anywhere—and use Remote Desktop to access your computer, too • Get even more power with Windows 8.1’s command-line interface • Use Hyper-V to run other operating systems alongside Windows • Troubleshoot the most common Windows 8.1’s problems—and the toughest ones In Depth offers: • Comprehensive coverage, with detailed solutions • Breakthrough techniques and shortcuts that are unavailable elsewhere • Practical, real-world examples with nothing glossed over or left out • Troubleshooting help for tough problems you can’t fix on your own • Outstanding authors recognized worldwide for their expertise and teaching styles • Quick information via sidebars, tips, reminders, notes, and warnings In Depth is the only tool you need to get more done in less time! …”
Publicado 2014
Libro electrónico -
5490por Johnson, Sandra K.“…You'll discover how to Install and configure Linux for maximum performance from the outset Evaluate and choose the right hardware architecture for your Linux environment Understand Linux kernels 2.4 through 2.6: components, performance issues, and optimization opportunities Master core Linux performance tuning principles and strategies Utilize free, open source tools for measurement, monitoring, system tracing, and benchmarking Interpret performance data to analyze your Linux server's real-world behavior Optimize Linux system schedulers, memory, I/O, file systems, and networking Tune web, file, database, and application servers running commercial workloads Predict the impact of changes in tuning parameters or configurations Tune Linux code: optimize design, timing, sockets, threads, synchronization, and more Architect for maximum performance: SMP scaling, clustering, and topology Integrate kernel and application tuning in end-to-end system optimization projects Whether you're an administrator, developer, integrator, or consultant, Performance Tuning for Linux Serverswill help you maximize the performance and value of every Linux system and application you run. © Copyright Pearson Education. …”
Publicado 2005
Libro electrónico -
5491Publicado 2024“…You'll gain insights into assessing and improving your organization's security posture, concerning system, hardware, and software security. You'll also get to grips with setting user and system policies and protocols through effective monitoring and enforcement, along with understanding countermeasures that protect the system from unauthorized access attempts. …”
Libro electrónico -
5492Publicado 2023“…What you will learn Define quantum circuits Harness superposition and entanglement to solve classical problems Gain insights into the implementation of quantum teleportation Explore the impact of quantum computing on cryptography Translate theoretical knowledge into practical skills by writing and executing code on real quantum hardware Expand your understanding of this domain by uncovering alternative quantum computing models Who this book is for This book is for individuals familiar with algebra and computer programming, eager to delve into modern physics concepts. …”
Libro electrónico -
5493Publicado 2023“…Prerequisites: Basic working knowledge of computers, including installing software, uploading and downloading content, hardware, and software Rudimentary knowledge of computer security concepts such as plaintext, encryption/decryption, malware…”
Video -
5494Publicado 2022“…The complete Certified Cloud Security Professional video course with CCSK extras by Dean Bushmiller Domain 1 Cloud Concepts, Architecture and Design 1.1 Understand cloud computing concepts Cloud computing definitions Cloud computing roles and responsibilities Key cloud computing characteristics Building block technologies 1.2 Describe cloud reference architecture Cloud computing activities Cloud service capabilities Cloud service categories IaaS, PaaS, SaaS Cloud deployment models Cloud shared considerations , auditability, regulatory, outsourcing 1.3 Understand security concepts relevant to cloud computing Cryptography and key management Identity and access control Data and media sanitization Network security Virtualization security Common threats Security hygiene 1.4 Understand design principles of secure cloud computing Cloud secure data lifecycle Cloud-based business continuity and disaster recovery plan Business impact analysis Functional security requirements Security considerations and responsibilities for different cloud categories Cloud design patterns Enterprise Architecture DevOps security 1.5 Evaluate cloud service providers Verification against criteria System/subsystem product certifications Domain 2 Cloud Data Security 2.1 Describe cloud data concepts Cloud data life cycle phases Data dispersion Data flows 2.2 Design and implement cloud data storage architectures Storage types Threats to storage types 2.3 Design and apply data security technologies and strategies Encryption and key management Hashing Data obfuscation Tokenization Data loss prevention Keys, secrets and certificates management 2.4 Implement data discovery Structured data Unstructured data Semi-structured data Data location 2.5 Plan and implement data classification Data classification policies Data mapping Data labeling 2.6 Design and implement Information Rights Management Legal hold 2.7 Design and implement auditability, traceability and accountability of data events Definition of event sources and requirement of event attributes address, geolocation Logging, storage and analysis of data events Chain of custody and non repudiation Domain 3 Cloud Platform and Infrastructure Security 3.1 Comprehend cloud infrastructure and platform components Physical environment Network and communications Compute Virtualization Storage Management plane 3.2 Design a secure data center Logical design Physical design Environmental design Design resilient 3.3 Analyze risks associated with cloud infrastructure and platforms Risk assessment Cloud vulnerabilities, threats and attacks Risk mitigation strategies 3.4 Plan and implementation of security controls Physical and environmental protection System, storage and communication protection Identification, authentication and authorization in cloud environments Audit mechanisms correlation, packet capture 3.5 Plan business continuity and disaster recovery Business continuity and disaster recovery strategies Business requirements , Recovery Point Objective Creation, implementation and testing of plan Domain 4 Cloud Application Security 4.1 Advocate training and awareness for application security Cloud development basics Common pitfalls Common cloud vulnerabilities OWASP Top 10 4.2 Describe the Secure Software Development Life Cycle process Business requirements Phases and methodologies 4.3 Apply the Secure Software Development Life Cycle Cloud specific risks Threat modeling STRIDE and DREAD Avoid common vulnerabilities during development Secure coding Application Security Verification Standard Software configuration management and versioning 4.4 Apply cloud software assurance and validation Functional and non functional testing Security testing methodologies SAST DAST Quality assurance Abuse case testing 4.5 Use verified secure software Securing application programming interfaces Supply chain management Third party software management Validated open source software 4.6 Comprehend the specifics of cloud application architecture Supplemental security components , Database Activity Monitoring, Extensible Markup Language firewalls, application programming interface gateway Cryptography Sandboxing Application virtualization and orchestration 4.7 Design appropriate identity and access management solutions Federated identity Identity providers Single sign on Multi factor authentication Cloud access security broker Secrets management Domain 5 Cloud Security Operations 5.1 Build and implement physical and logical infrastructure for cloud environment Hardware specific security configuration requirements and Trusted Platform Module Installation and configuration of management tools Virtual hardware specific security configuration requirements , Hypervisor types Installation of guest operating system virtualization toolsets 5.2 Operate and maintain physical and logical infrastructure for cloud environment Access controls for local and remote access , secure terminal access, Secure Shell, console based access mechanisms, jumpboxes, virtual client Secure network configuration , Transport Layer Security, Dynamic Host Configuration Protocol, Domain Name System Security Extensions, virtual private network Network security controls , intrusion prevention systems, honeypots, vulnerability assessments, network security groups, bastion host Operating system hardening through the application of baselines, monitoring and remediation Patch management Infrastructure as Code strategy Availability of clustered hosts Availability of guest operating system Performance and capacity monitoring Hardware monitoring Configuration of host and guest operating system backup and restore functions Management plane 5.3 Implement operational controls and standards Change management Continuity management Information security management Continual service improvement management Incident management Problem management Release management Deployment management Configuration management Service level management Availability management Capacity management 5.4 Support digital forensics Forensic data collection methodologies Evidence management Collect, acquire, and preserve digital evidence 5.5 Manage communication with relevant parties Vendors Customers Partners Regulators Other stakeholders 5.6 Manage security operations Security operations center Intelligent monitoring of security controls , intrusion prevention systems, honeypots, network security groups, artificial intelligence Log capture and analysis , log management Incident management Vulnerability assessments Domain 6 Legal, Risk and Compliance 6.1 Articulate legal requirements and unique risks within the cloud environment Conflicting international legislation Evaluation of legal risks specific to cloud computing Legal framework and guidelines eDiscovery Forensics requirements 6.2 Understand privacy issues Difference between contractual and regulated private data , personally identifiable information Country specific legislation related to private data , personally identifiable information Jurisdictional differences in data privacy Standard privacy requirements Privacy Impact Assessments 6.3 Understand audit process, methodologies, and required adaptations for a cloud environment Internal and external audit controls Impact of audit requirements Identify assurance challenges of virtualization and cloud Types of audit reports Restrictions of audit scope statements Gap analysis Audit planning Internal information security management system Internal information security controls system Policies Identification and involvement of relevant stakeholders Specialized compliance requirements for highly regulated industries Impact of distributed information technology model 6.4 Understand implications of cloud to enterprise risk management Assess providers risk management programs Difference between data owner/controller vs. data custodian/processor Regulatory transparency requirements , General Data Protection Regulation Risk treatment Different risk frameworks Metrics for risk management Assessment of risk environment 6.5 Understand outsourcing and cloud contract design Business requirements , master service agreement, statement of work Vendor management Contract management Supply chain management…”
Video -
5495Publicado 2022“…Tras una introducción en la que se explica por qué sus datos son tan codiciados, cada capítulo detalla los riesgos y las medidas de protección que debería implementar en su hardware, sus aplicaciones y sus datos antes de abordar las buenas prácticas que es preciso conocer y, sobre todo, aplicar: cómo establecer contraseñas efectivas, navegar por Internet sin miedo, utilizar los correos electrónicos de forma segura, proporcionar un acceso seguro para sus hijos y qué hacer en caso de robo o pérdida de credenciales o de datos. …”
Acceso con credenciales UPSA.
Libro electrónico -
5496Publicado 2007“…En este caso, meditar sobre el nucleo de referencia (el factor humano en la cibercultura) puede modificar, asimismo, nuestras relaciones con la dupla maquinas-programas (hardware-software). Ha de hacerlo, con toda probabilidad, si la reflexion es flexible, abierta. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
5497Publicado 2021“…Con estos medios, se produce una profunda renovación de los sistemas clásicos de creación plástica, posible gracias al prodigioso avance del hardware y software informáticos…”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
5498Publicado 2015“…Indeed, a recurring theme is how techniques of previous media become technologies, inscribed in both digital software and hardware. Contributions include considerations of image-oriented software and file formats; screen technologies; projection and urban screen surfaces; histories of computer graphics, 2D and 3D image editing software, photography and cinematic art; and transformations of light-based art resulting from the distributed architectures of the internet and the logic of the database. …”
Libro electrónico -
5499Publicado 2017“…The video lessons cover the following topics: Lesson 1: How Linux is organized Lesson 2: About C code, scripts and compiled programs Lesson 3: Understanding Linux commands and how they work Lesson 4: Understanding the Linux boot procedure Lesson 5: Understanding Linux storage Lesson 6: Understanding memory management Lesson 7: Understanding processes Lesson 8: Security Lesson 9: Hardware initialization Lesson 10: Looking closer at the kernel Lesson 11: Understanding networking Lesson 12: Performance optimization Lesson 13: The future of Linux About the Instructor Sander van Vugt is an independent Linux trainer, author, and consultant living in the Netherlands. …”
-
5500Publicado 2017“…Along the way, Trisha discusses the many advantages of switching to Java 9, including: Better use of memory Better performance of secure applications, locking, and graphics. Better use of hardware Better and easier to navigate documentation Prettier graphics, particularly for Windows and Linux Faster compilation Related Code Files: The code for this training can be found at https://github.com/trishagee/sense-nine . …”