Mostrando 5,541 - 5,560 Resultados de 5,616 Para Buscar '"hardware"', tiempo de consulta: 0.08s Limitar resultados
  1. 5541
    por Pogue, David, 1963-
    Publicado 1999
    “…The book is divided into five sections: Section One details every hardware and software aspect of PalmPilot as it comes out of the box: the stylus and screen, the buttons, and the current line of models. …”
    Libro electrónico
  2. 5542
    por Carter, Chad
    Publicado 2009
    “…Plan your games to deliver solid performance on the platforms you’ve targeted Understand essential XNA Framework concepts, including object creation, cameras, input handling, libraries, game services, and managing and extending the content pipeline Create a 2D game that will run across 3 platforms (Windows, Xbox 360, and Zune) with a single code base Create a Visualizer media player for the Microsoft Zune Use the High Level Shader Language (HLSL) to communicate directly with graphics hardware Bring realistic physics to your game action and realistic artificial intelligence to your characters Create sophisticated 3D effects that use advanced texturing and a particle system Build networked games, including multiplayer demos, turn-based games, and real-time network games Create 4 full games–2D parallax side scroller, 3D shooter, multiplayer turn-based 2D card game, and a multiplayer real-time 3D game Discover best practices for creating Xbox LIVE Community Games Sell your finished game on Xbox LIVE Marketplace CD-ROM includes: All C# examples and source code presented in this book…”
    Libro electrónico
  3. 5543
    por Kovsky, Steven D.
    Publicado 2002
    “…Choosing the right game console - You might not know it, we are amid a hardware slugfest between Nintendo, Sony and the dark horse, Microsoft. …”
    Libro electrónico
  4. 5544
    Publicado 2008
    “…She has more than 20 years of experience in designing, implementing, and troubleshooting network hardware and software, and has been involved in teaching, course design, and project management. …”
    Libro electrónico
  5. 5545
    Publicado 2007
    “…Engage 3D acceleration and play with desktop applets Navigating your Fedora desktop has more bling when you enable 3D-hardware acceleration with AIGLX and the Compiz window manager. …”
    Libro electrónico
  6. 5546
    Publicado 2013
    “…His background in information technology is diverse—ranging from operating systems and hardware, specialized applications and development to a fair amount of work on networks. …”
    Video
  7. 5547
    Publicado 2019
    “…What you will learn Develop a module in the Odoo framework and modify the existing flow of any application Build dynamic websites with Odoo CMS Create and modify backend JavaScript components in Odoo and POS Connect and access any object in Odoo via Remote Procedure Calls (RPC) Illustrate the different tools available in Odoo to implement business processes for your records Implement in-app purchase services Manage, deploy, and test an Odoo instance with the PaaS Odoo.sh Configure IoT Box to add and upgrade Point of Sale (POS) hardware Who this book is for If you're a Python developer who wants to develop highly efficient business applications with the latest Odoo framework, or if you just want a solution guide for all your Odoo development issues, this book is for you. …”
    Libro electrónico
  8. 5548
    Publicado 2020
    “…This study guide helps you master all the topics on the CompTIA Cybersecurity Analyst (CySA+) CS0-002 exam, including · Vulnerability management activities · Implementing controls to mitigate attacks and software vulnerabilities · Security solutions for infrastructure management · Software and hardware assurance best practices · Understanding and applying the appropriate incident response · Applying security concepts in support of organizational risk mitigation Companion Website: The website provides..…”
    Libro electrónico
  9. 5549
    Publicado 2017
    “…His background in information technology is diverse‚Äîranging from operating systems and hardware, specialized applications and development, to a fair amount of work on networks. …”
    Video
  10. 5550
    Publicado 2017
    “…Coverage includes Planning and building networks Building a network map with standard software tools Exploring, installing, and configuring network hardware Preparing and configuring a switch Connecting and organizing cabling Connecting computers, smartphones, tablets, and servers to your network Setting up basic security Installing Windows Server step by step, including Active Directory, DNS, and virtualization Configuring Windows clients to access a Windows Server domain Providing reliable and efficient backup/recovery services Configuring network services for macOS, iOS, Android, Linux, and FreeBSD operating systems Analyzing network traffic with WireShark Monitoring networks with logs, baselines, and captures Troubleshooting common problems Learning key concepts for success with the CompTIA Network+ exam’s tough performance-based questions About the Instructor David L. …”
    Video
  11. 5551
    Publicado 2017
    “…Coverage includes Setting up your software and hardware for efficient wireless capture Understanding channels, contention detection, thresholds, and 802.11 b/g/n/ac physical layers Recognizing key clues in Layer 2 headers and frame check sequences Decrypting and displaying wireless captures, so it makes sense Customizing filters specifically for Wi-Fi exchanges Using advanced tools to view traffic from a higher vantage point Pinpointing problems by exploring management, control, data frames, and retransmissions Troubleshooting slow, failed, and intermittent connections Gaining deeper insights with statistical analysis and pattern recognition Aout the Instructors James Garringer (Atlanta, GA), CWNE, is an experienced consulting engineer who specializes in Wi-Fi and networking for education, healthcare, and enterprise customers throughout the United States Mr. …”
    Video
  12. 5552
    Publicado 2017
    “…Understanding Wireshark versions, flavors, and hardware support Installing and customizing Wireshark Building highly-efficient profiles for specific troubleshooting tasks Performing Layer 2 or Layer 3 captures Exploring standard network exchanges (DNS, DHCP, ICMP, FTP, HTTP, and more) Capturing and visualizing encrypted traffic Personalizing the Wireshark interface Using filters and advanced filtering to focus on the data you really need Identifying trends with Wireshark’s advanced analysis tools Using Wireshark’s powerful command-line options Exporting Wireshark captures to other tools About the Instructors James Garringer (Atlanta, GA) is an experienced consulting engineer who specializes in Wi-Fi and networking for education, healthcare, and enterprise customers throughout the United States. …”
    Video
  13. 5553
    Publicado 2017
    “…In the next module, you will learn to set up a test cluster, using Ceph clusters and hardware selection. After you have learned to use Ceph clusters, the next module will teach you how to monitor cluster health, improve performance, and troubleshoot any issues that arise. …”
    Libro electrónico
  14. 5554
    Publicado 2019
    “…Also discussed is the basic idea of a perceptron and the enormous expansion of simple models with hardware that has become available in the last decade. …”
    Video
  15. 5555
    Publicado 2018
    “…A scenario-based practice exam to help you prepare for the Red Hat exam End-of-lesson quizzes Topics include: Troubleshooting Basics Systems Monitoring Troubleshooting Boot Issues Managing Hardware Issues Managing Storage Issues Troubleshooting Networking Managing Software Issues Managing Application Issues Managing Security Issues Troubleshooting Kernel Issues Fixing Performance Problems Sample Exam About the Instructor Sander van Vugt is an independent Linux trainer, author and consultant living in the Netherlands. …”
    Video
  16. 5556
    Publicado 2013
    “…Coverage includes Setting up the WP8 development environment, including the emulator Using XAML to fully control the look and feel of your app’s interface Providing robust user interactivity through controls Creating mobile experiences built around the real needs of Windows Phone users Localizing your app for native languages and global markets Utilizing vibration, motion, sound, the camera, or other hardware features Supporting voice commands such as “Call Mom” or “Open Twitter” Integrating features that use Contacts, Appointments, Alarms, the media library and hubs, and the lock screen Storing data in simple files, caches, or a full-fledged database Multitasking in the background without compromising performance Implementing location-aware apps that can track where users are Retrieving external data and assets via REST, Web services, push notifications, or Windows Live Preparing your application for the Windows Phone Store Building and distributing enterprise apps for your company’s internal customers…”
    Libro electrónico
  17. 5557
    Publicado 2012
    “…The official study guide helps you master all the topics on the CCNP Security IPS exam, including Cisco IPS software, hardware, and supporting applications Network IPS and IDS deployment architecture Installing and maintaining Cisco IPS physical and virtual sensors Traffic analysis IPS signatures and responses Anomaly-based operations Improving alarm response and quality Managing and analyzing events High availability and performance IPS modules for ASAs, routers, and switches Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test CCNP Security Category: Ci..…”
    Libro electrónico
  18. 5558
    por Rich, Jason
    Publicado 2012
    “…• Secure your iPad with passwords and data encryption • Connect your iPad to a wireless printer • Discover today’s most powerful iPad business apps • Manage contacts and relationships using your iPad and the VIPorbit app • Do your word processing, spreadsheet and database management while on the go • Access your email and surf the Web from almost anywhere • Make winning sales and business presentations from your iPad • Read PC and Mac files, from Microsoft Office to Adobe PDF • Manage your next project from your iPad • Use your iPad more efficiently on the road and while traveling • Manage your company’s social networking presence from your tablet • Hold iPad-based video conferences and virtual meetings • Use your iPad as an ebook reader, and find the best new business and productivity books online • Reduce your communications costs with FaceTime and Skype • Create and distribute iPad content, or have a custom app developed for your business • Add hardware and accessories that make your iPad even more useful…”
    Libro electrónico
  19. 5559
    Publicado 2022
    “…No external monitor or keyboard, no programming, Unix, or hardware experience is required…”
    Video
  20. 5560
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise This course in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation…”
    Video