Mostrando 21,341 - 21,360 Resultados de 23,348 Para Buscar '"internet"', tiempo de consulta: 0.15s Limitar resultados
  1. 21341
    Publicado 2023
    Tabla de Contenidos: “…-- What Are the Root Files and Folders on a PC -- Root Windows Folders -- Win32 Program and Store App Folders -- Windows Operating System Folders -- User Account Folders -- Windows Log Folders -- Windows Temporary File Folders -- Windows File Types -- Managing the Shell User Folders -- Creating Symbolic Links -- Disks and Partitions -- MBR and GPT Partition Structures -- Windows File Systems -- Summary -- Chapter 12: Apps and Software Troubleshooting -- Managing Legacy App Compatibility -- The Program Compatibility Troubleshooter -- Manually Configuring Compatibility -- Repairing Win32 Desktop Programs -- Managing Microsoft Store and Third-Party Store Apps -- Managing Apps with Task Manager -- Managing Startup Apps and Programs -- Summary -- Chapter 13: Processes and Services Troubleshooting -- Internet Explorer Is Dead... Long Live Internet Explorer! …”
    Libro electrónico
  2. 21342
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  3. 21343
    Publicado 2022
    Tabla de Contenidos: “…Imaging Modalities -- 6.2.4 Suitable Technologies Before Machine Learning -- 6.2.5 MRI Brain Image Segmentation -- 6.3 Related Work -- 6.4 Gaps and Observations -- 6.5 Suggestions -- 6.6 Conclusion -- References -- 7 Challenges, Standards, and Solutions for Secure and Intelligent 5G Internet of Things (IoT) Scenarios Ayasha Malik and Bharat Bhushan -- 7.1 Introduction -- 7.2 Safety in Wireless Networks: Since 1G to 4G -- 7.2.1 Safety in Non-IP Networks -- 7.2.2 Safety in 3G -- 7.2.3 Security in 4G -- 7.2.4 Security in 5G -- 7.2.4.1 Flashy System Traffic and Radio Visual Security Keys -- 7.2.4.2 Authorized Network Security and Compliance with Subscriber Level Safety Policies -- 7.2.5 Security in 5G and Beyond -- 7.3 IoT Background and Requirements -- 7.3.1 IoT and Its Characteristics -- 7.3.2 Characteristics of IoT Infrastructure -- 7.3.3 Characteristics of IoT Applications -- 7.3.4 Expected Benefits of IoT Adoption for Organization -- 7.3.4.1 Benefits Correlated to Big Data Created by IoT -- 7.3.4.2 Benefits Interrelated to the Openness of IoT -- 7.3.4.3 BenefitsRelated to the Linked Aspect6 of IoT -- 7.4 Non 5G Standards Supporting IoT -- 7.4.1 Bluetooth Low Energy -- 7.4.2 IEEE 802.15.4 -- 7.4.3 LoRa -- 7.4.4 Sigfox -- 7.4.5. …”
    Libro electrónico
  4. 21344
    Publicado 2023
    Tabla de Contenidos: “…-- 3.4.4 Key Paradigms of Industry 4.0 -- 3.4.5 Four Components of Networked Production -- 3.4.6 Connected Technologies -- 3.4.7 Nine Pillars of Technological Advancement -- 3.4.7.1 Big Data and Analytics -- 3.4.7.2 Autonomous Robots -- 3.4.7.3 Simulation -- 3.4.7.4 Horizontal and Vertical System Integration -- 3.4.7.5 Industrial Internet of Things (IIoT) -- 3.4.7.6 Cybersecurity -- 3.4.7.7 The Cloud -- 3.4.7.8 Additive Manufacturing -- 3.4.7.9 Augmented Reality -- 3.4.8 Other Industry 4.0 Components -- 3.4.8.1 Cyber-Physical Systems (CPS) -- 3.4.8.2 Internet of Things (IoT) -- 3.4.8.3 Internet of Services -- 3.4.8.4 Smart Factory -- 3.4.9 The Impact of Industry 4.0 -- 3.4.9.1 Quantifying the Impact -- 3.4.9.2 Producers: Transforming Production Processes and Systems -- 3.4.9.3 Manufacturing-System Suppliers: Meeting New Demands and Defining New Standards -- 3.4.10 How Will Industry 4.0 Impact Equipment? …”
    Libro electrónico
  5. 21345
    por López García, Bernabé
    Publicado 2011
    Tabla de Contenidos: “…El nacimiento de la república de TurquíaOrígenes del constitucionalismo iraní; Mandatos y primeras independencias en Oriente Medio; El Magreb colonial; El islam en el sudeste asiático durante el siglo XX; El nacimiento de Pakistán; El nacionalismo árabe y el conflicto arabe-israelí; Las independencias en el Magreb; El islam africano en el siglo XX; El mundo islámico tras la revolución iraní; La emergencia del islamismo como actor político; El islam en Occidente; Islam, posislamismo y revoluciones árabes; 7.Glosario; 8.Recomendaciones bibliográficas; 9.Recursos en Internet; 10.Mapas…”
    Libro electrónico
  6. 21346
    por García Salas, Ángela
    Publicado 2015
    Tabla de Contenidos: “…Identificación de riesgos en Internet -- 6. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 3 Análisis de medios de comunicación y su utilización por los SIJ -- 1. …”
    Libro electrónico
  7. 21347
    Publicado 2007
    Tabla de Contenidos: “….); LA RADIODIFUSIÓN; LA TELEVISIÓN; LAS TELECOMUNICACIONES ESPACIALES; LA ELECTRÓNICA Y LAS TELECOMUNICACIONES; EL FENÓMENO INTERNET; MARCO CONCEPTUAL; LA CONVERGENCIA TECNOLÓGICA; CONCLUSIONES; CONCEPTOS ECONÓMICOS BÁSICOS DE LAS TELECOMUNICACIONES; LAS TELECOMUNICACIONES EN LA ECONOMÍA (...); CAUSALIDAD ENTRE TELECOMUNICACIONES Y CRECIMIENTO (...); ELEMENTOS DE LA DEMANDA; ELEMENTOS DE LA OFERTA…”
    Libro electrónico
  8. 21348
    por Miralbell Izard, Oriol
    Publicado 2007
    Tabla de Contenidos: “…Información y comunicación en Internet; 5. La evolución de los webs turísticos; Capítulo VII; 1. …”
    Libro electrónico
  9. 21349
    por Rodríguez González, Ana
    Publicado 2016
    Tabla de Contenidos: “…Elección de programas de gestión necesarios y adquisición legal de los programas -- 4. Internet en el alojamiento rural -- 5. Programas específicos para la gestión administrativa contable del alojamiento rural -- 6. …”
    Libro electrónico
  10. 21350
    por Cuesta Fernández, Raimundo
    Publicado 2009
    Tabla de Contenidos: “…- El salón de actos- Otros espacios: la calle e Internet; Capítulo 4. Documentos críticos: si quieres la paz, para la guerra; 4.1. …”
    Libro electrónico
  11. 21351
    por Abuin Neira, Ana
    Publicado 2012
    Tabla de Contenidos: “….); Arranging travel; Booking a room; Organising the transport of the goods; Métodos de búsqueda de información relevante; Finding information on the internet; Lo que hemos aprendido; UNIDAD FORMATIVA II (UF0331): INTERPRETACIÓN (...); TEMA 1. …”
    Libro electrónico
  12. 21352
    Publicado 2009
    Tabla de Contenidos: “…Yéhouda Léon Askénazi (Manitou) / Yossef Charvit -- Faith and the courage to be : Heschel and Tillich / Alexander Even-Chen -- 'A symbolic bridge between faiths' : holy ground for liquid ritual / Paul Post -- Kabbalah on the internet : transcending denominational boundaries in conflicting ideologies / Marcel Poorthuis and Frank Bosman -- 'An indissoluble bond between the church and the people of Israel' : historical fact or theological conviction? …”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  13. 21353
    por Volonino, Linda
    Publicado 2008
    Tabla de Contenidos: “…Giving the Third Degree to Computers, Electronics, and the InternetAnswering the Big Questions; Examining Investigative Methods; Revealing Investigation Results; Chapter 2: Suiting Up for a Lawsuit or Criminal Investigation; Deciphering the Legal Codes; Managing E-Discovery; Conducting the Investigation in Good Faith; Deciding Who's Paying the Bill; Chapter 3: Getting Authorized to Search and Seize; Getting Authority: Never Start Without It; Criminal Cases: Papering Your Behind (CYA); Civil Cases: Verifying Company Policy; Chapter 4: Documenting and Managing the Crime Scene…”
    Libro electrónico
  14. 21354
    por Galán Ortíz, Laura
    Publicado 2021
    Tabla de Contenidos: “…Aspectos a considerar en la adaptación de la función de la distribución en diferentes entornos internacionales -- 8. Internet como canal de distribución internacional -- 9. …”
    Libro electrónico
  15. 21355
    Publicado 2019
    Tabla de Contenidos: “…Frontmatter -- Índice -- Introducción / Anotación multicamada externa e o enriquecemento de edicións dixitais/Multi-layered stand-off annotation and the enrichment of digital scholarly editions / Iluminacións medievais na rede: retos e oportunidades para a investigación/ Medieval illuminations on the internet: Challenges and opportunities for research / Modelação de dados poéticos: uma perspectiva desde os dados abertos e ligados/ The modelling of poetic data: A perspective from linked open data / Da transcrición paleográfica ás bases de datos: problemas e solucións na lírica galego-portuguesa/ From paleographic transcriptions to databases: Problems and solutions with Galician-Portuguese lyric / La variación textual y su visualización en las ediciones digitales de textos medievales/ Textual variation and its visualization in digital editions of medieval texts / HILAME (Hidalgos, Labradoras, Mercaderes): procesamiento y visualización de datos prosopográficos/ Hilame (hidalgos, labradoras, mercaderes): The processing and visualization of prosopographic data / Elogio del texto digital 2.0 (¿el triunfo de la segunda textualidad?)…”
    Libro electrónico
  16. 21356
    Tabla de Contenidos: “…LOS VIDEOJUEGOS; II.3. INTERNET…”
    Libro electrónico
  17. 21357
    Publicado 2016
    Tabla de Contenidos: “…-- 2.8 Business transformation -- 2.9 Leadership versus management -- 2.10 STIR Foundation - City of Tomorrow -- 2.11 Sustainocracy -- 2.12 City of Tomorrow -- 2.13 The Amsterdam internet congress -- 2.14 Key elements that define “sustainocratic” AiREAS -- 2.15 AiREAS -- 2.16 Commitment first -- 2.17 Territorial focus -- 2.18 Local AiREAS Eindhoven -- 2.19 First things first -- 2.20 Making visible the invisible -- 2.21 From idea to project -- 2.22 Conclusion about the coming about of AiREAS -- 2.23 Link with ethics and economies -- Part III “The Invisible made Visible”: science and technology -- An introduction by Marco van Lochem -- 3.1 The ILM -- 3.2. …”
    Libro electrónico
  18. 21358
    Publicado 2012
    Tabla de Contenidos: “…Many obstacles remain to achieving a fully integrated Single MarketFigure 1.8. Internet purchases in the EU; Figure 1.9. Product market regulation; Box 1.1. …”
    Libro electrónico
  19. 21359
    por The World Bank.
    Publicado 2001
    Tabla de Contenidos: “…Past and predicted growth in mobile phones""; ""Figure 4.2. Total Internet subscribers, past and predicted""; ""Figure 5.1. …”
    Libro electrónico
  20. 21360
    por Evjen, Bill
    Publicado 2012
    Tabla de Contenidos:
    Libro electrónico