Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,267
- Engineering & Applied Sciences 800
- Computer networks 611
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 399
- Electrical & Computer Engineering 330
- Computer security 324
- Telecommunications 317
- Internet of things 316
- Web site development 314
- Operating systems (Computers) 312
- Management 303
- Web sites 275
- Marketing 271
- Universidad Pontificia de Salamanca (España) 265
- Design 247
- Social aspects 246
- Information technology 242
- Aspectes socials 239
- Data processing 225
- Diseases 210
- Computer programs 198
- Technological innovations 195
- Research 193
-
21341Troubleshooting and supporting Windows 11 creating robust, reliable, sustainable, and secure systemsPublicado 2023Tabla de Contenidos: “…-- What Are the Root Files and Folders on a PC -- Root Windows Folders -- Win32 Program and Store App Folders -- Windows Operating System Folders -- User Account Folders -- Windows Log Folders -- Windows Temporary File Folders -- Windows File Types -- Managing the Shell User Folders -- Creating Symbolic Links -- Disks and Partitions -- MBR and GPT Partition Structures -- Windows File Systems -- Summary -- Chapter 12: Apps and Software Troubleshooting -- Managing Legacy App Compatibility -- The Program Compatibility Troubleshooter -- Manually Configuring Compatibility -- Repairing Win32 Desktop Programs -- Managing Microsoft Store and Third-Party Store Apps -- Managing Apps with Task Manager -- Managing Startup Apps and Programs -- Summary -- Chapter 13: Processes and Services Troubleshooting -- Internet Explorer Is Dead... Long Live Internet Explorer! …”
Libro electrónico -
21342Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
21343Publicado 2022Tabla de Contenidos: “…Imaging Modalities -- 6.2.4 Suitable Technologies Before Machine Learning -- 6.2.5 MRI Brain Image Segmentation -- 6.3 Related Work -- 6.4 Gaps and Observations -- 6.5 Suggestions -- 6.6 Conclusion -- References -- 7 Challenges, Standards, and Solutions for Secure and Intelligent 5G Internet of Things (IoT) Scenarios Ayasha Malik and Bharat Bhushan -- 7.1 Introduction -- 7.2 Safety in Wireless Networks: Since 1G to 4G -- 7.2.1 Safety in Non-IP Networks -- 7.2.2 Safety in 3G -- 7.2.3 Security in 4G -- 7.2.4 Security in 5G -- 7.2.4.1 Flashy System Traffic and Radio Visual Security Keys -- 7.2.4.2 Authorized Network Security and Compliance with Subscriber Level Safety Policies -- 7.2.5 Security in 5G and Beyond -- 7.3 IoT Background and Requirements -- 7.3.1 IoT and Its Characteristics -- 7.3.2 Characteristics of IoT Infrastructure -- 7.3.3 Characteristics of IoT Applications -- 7.3.4 Expected Benefits of IoT Adoption for Organization -- 7.3.4.1 Benefits Correlated to Big Data Created by IoT -- 7.3.4.2 Benefits Interrelated to the Openness of IoT -- 7.3.4.3 BenefitsRelated to the Linked Aspect6 of IoT -- 7.4 Non 5G Standards Supporting IoT -- 7.4.1 Bluetooth Low Energy -- 7.4.2 IEEE 802.15.4 -- 7.4.3 LoRa -- 7.4.4 Sigfox -- 7.4.5. …”
Libro electrónico -
21344Publicado 2023Tabla de Contenidos: “…-- 3.4.4 Key Paradigms of Industry 4.0 -- 3.4.5 Four Components of Networked Production -- 3.4.6 Connected Technologies -- 3.4.7 Nine Pillars of Technological Advancement -- 3.4.7.1 Big Data and Analytics -- 3.4.7.2 Autonomous Robots -- 3.4.7.3 Simulation -- 3.4.7.4 Horizontal and Vertical System Integration -- 3.4.7.5 Industrial Internet of Things (IIoT) -- 3.4.7.6 Cybersecurity -- 3.4.7.7 The Cloud -- 3.4.7.8 Additive Manufacturing -- 3.4.7.9 Augmented Reality -- 3.4.8 Other Industry 4.0 Components -- 3.4.8.1 Cyber-Physical Systems (CPS) -- 3.4.8.2 Internet of Things (IoT) -- 3.4.8.3 Internet of Services -- 3.4.8.4 Smart Factory -- 3.4.9 The Impact of Industry 4.0 -- 3.4.9.1 Quantifying the Impact -- 3.4.9.2 Producers: Transforming Production Processes and Systems -- 3.4.9.3 Manufacturing-System Suppliers: Meeting New Demands and Defining New Standards -- 3.4.10 How Will Industry 4.0 Impact Equipment? …”
Libro electrónico -
21345por López García, BernabéTabla de Contenidos: “…El nacimiento de la república de TurquíaOrígenes del constitucionalismo iraní; Mandatos y primeras independencias en Oriente Medio; El Magreb colonial; El islam en el sudeste asiático durante el siglo XX; El nacimiento de Pakistán; El nacionalismo árabe y el conflicto arabe-israelí; Las independencias en el Magreb; El islam africano en el siglo XX; El mundo islámico tras la revolución iraní; La emergencia del islamismo como actor político; El islam en Occidente; Islam, posislamismo y revoluciones árabes; 7.Glosario; 8.Recomendaciones bibliográficas; 9.Recursos en Internet; 10.Mapas…”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
21346por García Salas, ÁngelaTabla de Contenidos: “…Identificación de riesgos en Internet -- 6. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 3 Análisis de medios de comunicación y su utilización por los SIJ -- 1. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
21347Publicado 2007Tabla de Contenidos: “….); LA RADIODIFUSIÓN; LA TELEVISIÓN; LAS TELECOMUNICACIONES ESPACIALES; LA ELECTRÓNICA Y LAS TELECOMUNICACIONES; EL FENÓMENO INTERNET; MARCO CONCEPTUAL; LA CONVERGENCIA TECNOLÓGICA; CONCLUSIONES; CONCEPTOS ECONÓMICOS BÁSICOS DE LAS TELECOMUNICACIONES; LAS TELECOMUNICACIONES EN LA ECONOMÍA (...); CAUSALIDAD ENTRE TELECOMUNICACIONES Y CRECIMIENTO (...); ELEMENTOS DE LA DEMANDA; ELEMENTOS DE LA OFERTA…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
21348por Miralbell Izard, OriolTabla de Contenidos: “…Información y comunicación en Internet; 5. La evolución de los webs turísticos; Capítulo VII; 1. …”
Publicado 2007
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
21349por Rodríguez González, AnaTabla de Contenidos: “…Elección de programas de gestión necesarios y adquisición legal de los programas -- 4. Internet en el alojamiento rural -- 5. Programas específicos para la gestión administrativa contable del alojamiento rural -- 6. …”
Publicado 2016
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
21350por Cuesta Fernández, RaimundoTabla de Contenidos: “…- El salón de actos- Otros espacios: la calle e Internet; Capítulo 4. Documentos críticos: si quieres la paz, para la guerra; 4.1. …”
Publicado 2009
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
21351por Abuin Neira, AnaTabla de Contenidos: “….); Arranging travel; Booking a room; Organising the transport of the goods; Métodos de búsqueda de información relevante; Finding information on the internet; Lo que hemos aprendido; UNIDAD FORMATIVA II (UF0331): INTERPRETACIÓN (...); TEMA 1. …”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
21352Publicado 2009Tabla de Contenidos: “…Yéhouda Léon Askénazi (Manitou) / Yossef Charvit -- Faith and the courage to be : Heschel and Tillich / Alexander Even-Chen -- 'A symbolic bridge between faiths' : holy ground for liquid ritual / Paul Post -- Kabbalah on the internet : transcending denominational boundaries in conflicting ideologies / Marcel Poorthuis and Frank Bosman -- 'An indissoluble bond between the church and the people of Israel' : historical fact or theological conviction? …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
21353por Volonino, LindaTabla de Contenidos: “…Giving the Third Degree to Computers, Electronics, and the InternetAnswering the Big Questions; Examining Investigative Methods; Revealing Investigation Results; Chapter 2: Suiting Up for a Lawsuit or Criminal Investigation; Deciphering the Legal Codes; Managing E-Discovery; Conducting the Investigation in Good Faith; Deciding Who's Paying the Bill; Chapter 3: Getting Authorized to Search and Seize; Getting Authority: Never Start Without It; Criminal Cases: Papering Your Behind (CYA); Civil Cases: Verifying Company Policy; Chapter 4: Documenting and Managing the Crime Scene…”
Publicado 2008
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
21354por Galán Ortíz, LauraTabla de Contenidos: “…Aspectos a considerar en la adaptación de la función de la distribución en diferentes entornos internacionales -- 8. Internet como canal de distribución internacional -- 9. …”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
21355Publicado 2019Tabla de Contenidos: “…Frontmatter -- Índice -- Introducción / Anotación multicamada externa e o enriquecemento de edicións dixitais/Multi-layered stand-off annotation and the enrichment of digital scholarly editions / Iluminacións medievais na rede: retos e oportunidades para a investigación/ Medieval illuminations on the internet: Challenges and opportunities for research / Modelação de dados poéticos: uma perspectiva desde os dados abertos e ligados/ The modelling of poetic data: A perspective from linked open data / Da transcrición paleográfica ás bases de datos: problemas e solucións na lírica galego-portuguesa/ From paleographic transcriptions to databases: Problems and solutions with Galician-Portuguese lyric / La variación textual y su visualización en las ediciones digitales de textos medievales/ Textual variation and its visualization in digital editions of medieval texts / HILAME (Hidalgos, Labradoras, Mercaderes): procesamiento y visualización de datos prosopográficos/ Hilame (hidalgos, labradoras, mercaderes): The processing and visualization of prosopographic data / Elogio del texto digital 2.0 (¿el triunfo de la segunda textualidad?)…”
Libro electrónico -
21356por Nunez Zorrilla, Maria del CarmenTabla de Contenidos: “…LOS VIDEOJUEGOS; II.3. INTERNET…”
Publicado 2012
Libro electrónico -
21357Publicado 2016Tabla de Contenidos: “…-- 2.8 Business transformation -- 2.9 Leadership versus management -- 2.10 STIR Foundation - City of Tomorrow -- 2.11 Sustainocracy -- 2.12 City of Tomorrow -- 2.13 The Amsterdam internet congress -- 2.14 Key elements that define “sustainocratic” AiREAS -- 2.15 AiREAS -- 2.16 Commitment first -- 2.17 Territorial focus -- 2.18 Local AiREAS Eindhoven -- 2.19 First things first -- 2.20 Making visible the invisible -- 2.21 From idea to project -- 2.22 Conclusion about the coming about of AiREAS -- 2.23 Link with ethics and economies -- Part III “The Invisible made Visible”: science and technology -- An introduction by Marco van Lochem -- 3.1 The ILM -- 3.2. …”
Libro electrónico -
21358Publicado 2012Tabla de Contenidos: “…Many obstacles remain to achieving a fully integrated Single MarketFigure 1.8. Internet purchases in the EU; Figure 1.9. Product market regulation; Box 1.1. …”
Libro electrónico -
21359por The World Bank.Tabla de Contenidos: “…Past and predicted growth in mobile phones""; ""Figure 4.2. Total Internet subscribers, past and predicted""; ""Figure 5.1. …”
Publicado 2001
Libro electrónico -
21360