Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
5541por Pogue, David, 1963-“…The book is divided into five sections: Section One details every hardware and software aspect of PalmPilot as it comes out of the box: the stylus and screen, the buttons, and the current line of models. …”
Publicado 1999
Libro electrónico -
5542por Carter, Chad“…Plan your games to deliver solid performance on the platforms you’ve targeted Understand essential XNA Framework concepts, including object creation, cameras, input handling, libraries, game services, and managing and extending the content pipeline Create a 2D game that will run across 3 platforms (Windows, Xbox 360, and Zune) with a single code base Create a Visualizer media player for the Microsoft Zune Use the High Level Shader Language (HLSL) to communicate directly with graphics hardware Bring realistic physics to your game action and realistic artificial intelligence to your characters Create sophisticated 3D effects that use advanced texturing and a particle system Build networked games, including multiplayer demos, turn-based games, and real-time network games Create 4 full games–2D parallax side scroller, 3D shooter, multiplayer turn-based 2D card game, and a multiplayer real-time 3D game Discover best practices for creating Xbox LIVE Community Games Sell your finished game on Xbox LIVE Marketplace CD-ROM includes: All C# examples and source code presented in this book…”
Publicado 2009
Libro electrónico -
5543por Kovsky, Steven D.“…Choosing the right game console - You might not know it, we are amid a hardware slugfest between Nintendo, Sony and the dark horse, Microsoft. …”
Publicado 2002
Libro electrónico -
5544Publicado 2008“…She has more than 20 years of experience in designing, implementing, and troubleshooting network hardware and software, and has been involved in teaching, course design, and project management. …”
Libro electrónico -
5545Publicado 2007“…Engage 3D acceleration and play with desktop applets Navigating your Fedora desktop has more bling when you enable 3D-hardware acceleration with AIGLX and the Compiz window manager. …”
Libro electrónico -
5546Publicado 2013“…His background in information technology is diverse—ranging from operating systems and hardware, specialized applications and development to a fair amount of work on networks. …”
-
5547Publicado 2019“…What you will learn Develop a module in the Odoo framework and modify the existing flow of any application Build dynamic websites with Odoo CMS Create and modify backend JavaScript components in Odoo and POS Connect and access any object in Odoo via Remote Procedure Calls (RPC) Illustrate the different tools available in Odoo to implement business processes for your records Implement in-app purchase services Manage, deploy, and test an Odoo instance with the PaaS Odoo.sh Configure IoT Box to add and upgrade Point of Sale (POS) hardware Who this book is for If you're a Python developer who wants to develop highly efficient business applications with the latest Odoo framework, or if you just want a solution guide for all your Odoo development issues, this book is for you. …”
Libro electrónico -
5548Publicado 2020“…This study guide helps you master all the topics on the CompTIA Cybersecurity Analyst (CySA+) CS0-002 exam, including · Vulnerability management activities · Implementing controls to mitigate attacks and software vulnerabilities · Security solutions for infrastructure management · Software and hardware assurance best practices · Understanding and applying the appropriate incident response · Applying security concepts in support of organizational risk mitigation Companion Website: The website provides..…”
Libro electrónico -
5549Publicado 2017“…His background in information technology is diverse‚Äîranging from operating systems and hardware, specialized applications and development, to a fair amount of work on networks. …”
-
5550Publicado 2017“…Coverage includes Planning and building networks Building a network map with standard software tools Exploring, installing, and configuring network hardware Preparing and configuring a switch Connecting and organizing cabling Connecting computers, smartphones, tablets, and servers to your network Setting up basic security Installing Windows Server step by step, including Active Directory, DNS, and virtualization Configuring Windows clients to access a Windows Server domain Providing reliable and efficient backup/recovery services Configuring network services for macOS, iOS, Android, Linux, and FreeBSD operating systems Analyzing network traffic with WireShark Monitoring networks with logs, baselines, and captures Troubleshooting common problems Learning key concepts for success with the CompTIA Network+ exam’s tough performance-based questions About the Instructor David L. …”
-
5551Publicado 2017“…Coverage includes Setting up your software and hardware for efficient wireless capture Understanding channels, contention detection, thresholds, and 802.11 b/g/n/ac physical layers Recognizing key clues in Layer 2 headers and frame check sequences Decrypting and displaying wireless captures, so it makes sense Customizing filters specifically for Wi-Fi exchanges Using advanced tools to view traffic from a higher vantage point Pinpointing problems by exploring management, control, data frames, and retransmissions Troubleshooting slow, failed, and intermittent connections Gaining deeper insights with statistical analysis and pattern recognition Aout the Instructors James Garringer (Atlanta, GA), CWNE, is an experienced consulting engineer who specializes in Wi-Fi and networking for education, healthcare, and enterprise customers throughout the United States Mr. …”
-
5552Publicado 2017“…Understanding Wireshark versions, flavors, and hardware support Installing and customizing Wireshark Building highly-efficient profiles for specific troubleshooting tasks Performing Layer 2 or Layer 3 captures Exploring standard network exchanges (DNS, DHCP, ICMP, FTP, HTTP, and more) Capturing and visualizing encrypted traffic Personalizing the Wireshark interface Using filters and advanced filtering to focus on the data you really need Identifying trends with Wireshark’s advanced analysis tools Using Wireshark’s powerful command-line options Exporting Wireshark captures to other tools About the Instructors James Garringer (Atlanta, GA) is an experienced consulting engineer who specializes in Wi-Fi and networking for education, healthcare, and enterprise customers throughout the United States. …”
-
5553Publicado 2017“…In the next module, you will learn to set up a test cluster, using Ceph clusters and hardware selection. After you have learned to use Ceph clusters, the next module will teach you how to monitor cluster health, improve performance, and troubleshoot any issues that arise. …”
Libro electrónico -
5554Publicado 2019“…Also discussed is the basic idea of a perceptron and the enormous expansion of simple models with hardware that has become available in the last decade. …”
-
5555Publicado 2018“…A scenario-based practice exam to help you prepare for the Red Hat exam End-of-lesson quizzes Topics include: Troubleshooting Basics Systems Monitoring Troubleshooting Boot Issues Managing Hardware Issues Managing Storage Issues Troubleshooting Networking Managing Software Issues Managing Application Issues Managing Security Issues Troubleshooting Kernel Issues Fixing Performance Problems Sample Exam About the Instructor Sander van Vugt is an independent Linux trainer, author and consultant living in the Netherlands. …”
-
5556Publicado 2013“…Coverage includes Setting up the WP8 development environment, including the emulator Using XAML to fully control the look and feel of your app’s interface Providing robust user interactivity through controls Creating mobile experiences built around the real needs of Windows Phone users Localizing your app for native languages and global markets Utilizing vibration, motion, sound, the camera, or other hardware features Supporting voice commands such as “Call Mom” or “Open Twitter” Integrating features that use Contacts, Appointments, Alarms, the media library and hubs, and the lock screen Storing data in simple files, caches, or a full-fledged database Multitasking in the background without compromising performance Implementing location-aware apps that can track where users are Retrieving external data and assets via REST, Web services, push notifications, or Windows Live Preparing your application for the Windows Phone Store Building and distributing enterprise apps for your company’s internal customers…”
Libro electrónico -
5557Publicado 2012“…The official study guide helps you master all the topics on the CCNP Security IPS exam, including Cisco IPS software, hardware, and supporting applications Network IPS and IDS deployment architecture Installing and maintaining Cisco IPS physical and virtual sensors Traffic analysis IPS signatures and responses Anomaly-based operations Improving alarm response and quality Managing and analyzing events High availability and performance IPS modules for ASAs, routers, and switches Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test CCNP Security Category: Ci..…”
Libro electrónico -
5558por Rich, Jason“…• Secure your iPad with passwords and data encryption • Connect your iPad to a wireless printer • Discover today’s most powerful iPad business apps • Manage contacts and relationships using your iPad and the VIPorbit app • Do your word processing, spreadsheet and database management while on the go • Access your email and surf the Web from almost anywhere • Make winning sales and business presentations from your iPad • Read PC and Mac files, from Microsoft Office to Adobe PDF • Manage your next project from your iPad • Use your iPad more efficiently on the road and while traveling • Manage your company’s social networking presence from your tablet • Hold iPad-based video conferences and virtual meetings • Use your iPad as an ebook reader, and find the best new business and productivity books online • Reduce your communications costs with FaceTime and Skype • Create and distribute iPad content, or have a custom app developed for your business • Add hardware and accessories that make your iPad even more useful…”
Publicado 2012
Libro electrónico -
5559Publicado 2022“…No external monitor or keyboard, no programming, Unix, or hardware experience is required…”
Video -
5560Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation…”
Video