Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,267
- Engineering & Applied Sciences 800
- Computer networks 611
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 399
- Electrical & Computer Engineering 330
- Computer security 324
- Telecommunications 317
- Internet of things 316
- Web site development 314
- Operating systems (Computers) 312
- Management 303
- Web sites 275
- Marketing 271
- Universidad Pontificia de Salamanca (España) 265
- Design 247
- Social aspects 246
- Information technology 242
- Aspectes socials 239
- Data processing 225
- Diseases 210
- Computer programs 198
- Technological innovations 195
- Research 193
-
21401por Adelstein, TomTabla de Contenidos: “…The Distributed Method of Resolving Domain NamesFinding a Domain; Answering Queries; Primary and Secondary DNS Servers; Caching-Only Servers; Editing the Configuration Files; named.conf; The Primary Zone File; Enhancements and advanced features; Putting it all together; The Reverse Zone File; PTR records; Testing Lookups; Configuring the Secondary Nameserver; BIND Tools; nslookup; rndc; Troubleshooting BIND; Cannot Connect Using rndc; named Starts but Does Not Resolve Names; Hosts Aren't Recognized; What's Next; An Initial Internet-Ready Environment; Installing ISPConfig; Requirements…”
Publicado 2007
Libro electrónico -
21402
-
21403por Lutz, MarkTabla de Contenidos: “…; What Can I Do with Python?; GUIs; Internet Scripting…”
Publicado 2008
Libro electrónico -
21404por Walther, HenrikTabla de Contenidos: “…Managing the Hub Transport Server Role; Introduction; Message Transport and Routing Architecture in Exchange 2007; Managing the Hub Transport Server; Message Tracking with Exchange Server 2007; Using the Exchange 2007 Queue Viewer; Introduction to the Exchange Mail Flow Troubleshooter Tool; Configuring the Hub Transport Server as an Internet-facing Transport Server; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. …”
Publicado 2007
Libro electrónico -
21405por Webb, Jeff, 1961-Tabla de Contenidos: “…; Putting SharePoint to Work; Holding Meetings; Building Libraries; Creating Internet Sites; What Software Do You Need?; Trying Out SharePoint; What's SharePoint Not Good For?…”
Publicado 2005
Libro electrónico -
21406por Garfinkel, SimsonTabla de Contenidos: “…The Architecture of the World Wide Web; History and Terminology; A Packet's Tour of the Web; Who Owns the Internet?; Chapter 3. Cryptography Basics; Understanding Cryptography; Symmetric Key Algorithms; Public Key Algorithms; Message Digest Functions; Chapter 4. …”
Publicado 2002
Libro electrónico -
21407por Boyce, JimTabla de Contenidos: “…Working With Outlook; Internet E-Mail; HTTP-Based E-Mail; Fax Send and Receive; Extensible E-Mail Support; Scheduling; Contact Management; Task Management; Tracking with Outlook&s Journal; Organizing Your Thoughts with Notes; How Outlook Stores Data; Options for Working Offline; Sharing Storage Files; Understanding Messaging Protocols; IMAP; MAPI; LDAP; NNTP; HTML; MIME; S/MIME; MHTML; iCalendar, vCalendar, and vCard; Security Provisions in Outlook…”
Publicado 2009
Libro electrónico -
21408por Harrison, GuyTabla de Contenidos: “…Resources for Developers Using Stored ProgramsBooks; Internet Resources; Some Words of Advice for Developers; Don't Be in Such a Hurry!…”
Publicado 2006
Libro electrónico -
21409por Contos, Brian T.Tabla de Contenidos: “…Cover; Contents; Foreword; Introduction; Part I Background on Cyber Crime, Insider Threats, and ESM; Chapter 1 Cyber Crime and Cyber Criminals 101; About This Chapter; Computer Dependence and Internet Growth; Motivations for Cyber Criminal Activity; Black Markets; Hackers; Script Kiddies; Solitary Cyber Criminals and Exploit Writers for Hire; Organized Crime; Identity Thieves (Impersonation Fraudsters); Competitors; Activist Groups, Nation-State Threats, and Terrorists; Insiders; Tools of the Trade; Chapter 2 Insider Threats; Understanding Who the Insider Is…”
Publicado 2006
Libro electrónico -
21410por Aitken, Peter G.Tabla de Contenidos: “…Performing a Mail Merge from Your ContactsWorking with Multiple Address Books; Setting Contact Options; Summary; Chapter 11: Working with the Calendar; Understanding the Outlook Calendar; Using the Calendar; Working with Appointments; Searching the Calendar; Sharing Your Calendar with Others; Subscribing to Internet Calendars; Setting Calendar Options; Summary; Chapter 12: Working with Schedules and Meetings; Understanding Scheduling; Creating a Meeting; Working with Existing Meetings; Setting Meeting Options; Creating and Using a Meeting Workplace; Summary…”
Publicado 2007
Libro electrónico -
21411por Lowrie, Charlotte K.Tabla de Contenidos: “…Choosing a RAW Conversion ProgramSample RAW Image Conversion; Creating an Efficient Workflow; Updating the 40D Firmware; Appendix A: Image Sensors and the Canon DIGIC Processor; Sensor Technology; DIGIC III Image Processor; Appendix B: EOS 40D Specifications; Appendix C: Professional Resources; Internet Resources; Photography Publications and Web Sites; Professional Organizations; Glossary; Index…”
Publicado 2008
Libro electrónico -
21412por Kartik, VikramTabla de Contenidos: “…Microsoft Office SharePoint Designer 2007 Bible; Contents; Introduction; Chapter 1: Becoming Familiar with SharePoint Designer; Introducing SharePoint Designer; Understanding SharePoint Designer Basics; Exploring Hidden Metadata and Raw Webs; Maintaining Web Sites; Summary; Chapter 2: Understanding Related Server Technologies; Exploring the Basics of Internet Information Services; Investigating the Nature of FTP and WebDAV Sites; Working with FPSE-Based Web Sites; Introducing WSS and MOSS Technologies; Summary; Chapter 3: Exploring the Internals of Remote Authoring…”
Publicado 2009
Libro electrónico -
21413por Zdziarski, Jonathan A.Tabla de Contenidos: “…Getting Started with Applications; Building the Free Tool Chain; High speed Internet connection; Open source tools; iPhone filesystem; Compiling the Tool Chain; Step 2: Build and install cross-compiler tools…”
Publicado 2008
Libro electrónico -
21414por Chisholm, WendyTabla de Contenidos: “…Web Content Accessibility Guidelines (WCAG)Authoring Tool Accessibility Guidelines (ATAG); User Agent Accessibility Guidelines (UAAG); The Accessible Rich Internet Applications Suite (WAI-ARIA); Mobile Web Best Practices (MWBP); Professionalism; Early and Often; Summary; Chapter 3. …”
Publicado 2008
Libro electrónico -
21415Publicado 1999Tabla de Contenidos: “…Twenty Years of Berkeley Unix: From AT&T-Owned to Freely RedistributableEarly History; Early Distributions; VAX Unix; DARPA Support; 4.2BSD; 4.3BSD; Networking, Release 1; 4.3BSD-Reno; Networking, Release 2; The Lawsuit; 4.4BSD; 4.4BSD-Lite, Release 2; The Internet Engineering Task Force; The History of the IETF; IETF Structure and Features; IETF Working Groups; IETF Documents; The IETF Process; Open Standards, Open Documents, and Open Source; The GNU Operating System and the Free Software Movement; The First Software-Sharing Community; The Collapse of the Community; A Stark Moral Choice…”
Libro electrónico -
21416por Grosso, WilliamTabla de Contenidos: “…Layering StreamsCompressing a File; How this works; Some Useful Intermediate Streams; Readers and Writers; Revisiting the ViewFile Application; Chapter 2. Sockets; Internet Definitions; Sockets; Creating a Socket; A simple client application; Protocols and Metadata; Protocols; Metadata; ServerSockets; The accept() method; A Simple Web Server; Customizing Socket Behavior; Special-Purpose Sockets; Direct Stream Manipulation; Subclassing Socket Is a Better Solution; A Special-Purpose Socket; Factories; Socket Factories; Security; Using SSL; The SSL Handshake; Using SSL with JSSE…”
Publicado 2002
Libro electrónico -
21417por Carter, GeraldTabla de Contenidos: “…; Sharing Files; Sharing a Printer; Seeing Things from the Unix Side; The Common Internet File System; Understanding NetBIOS; Getting a Name; Node Types; What's in a Name?…”
Publicado 2007
Libro electrónico -
21418Publicado 2007Tabla de Contenidos: “…Audit View Log Maintenance; Daily Maintenance; Log Switch; Summary; Chapter 4: SmartDefense and Web Intelligence; Introduction; Network Security; Threats; Structured Threats; Denial of Service; External Threats; Welchia Internet Control Message Protocol; Network Quota; Internal Threats; Reconnaissance (Port Scans and Sweeps); The OSI Model; Layer 3: The Network Layer; Layer 4: The Transport Layer; Layer 7: The Application Layer; The Need for Granular Inspection; Application Intelligence; Configuring Hosts and Nodes for AI; SmartDefense Technology…”
Libro electrónico -
21419por Russell, Ryan, 1969-Tabla de Contenidos: “…; NSI LOOKUP; SAM SPADE; INTERNET PHONE DIRECTORIES; E-MAIL BOUNCING, RETURN RECEIPTS, AND OUT-OF-OFFICE REPLIES; JACQUES COUSTEAU AND 20,000 LEAGUES IN THE DUMPSTER; FUN WITH HUMAN RESOURCES; PLAN C: THE DISPLACED EMPLOYEE; SHOULDER SURFING…”
Publicado 2009
Libro electrónico -
21420por Bott, EdTabla de Contenidos: “…Activating a Retail Copy of WindowsActivation Requirements for OEM Copies; Product Activation and Corporate Licensing; Dealing with Product Validation; Transferring Files and Settings from Another Computer; Making a Connection; Choosing What to Transfer; Restoring Files and Settings on Your New Computer; Configuring System Recovery Options; Finishing Your Windows Vista Installation; Adjust Basic Display Settings; Check Your Security Settings; Connect to the Internet and Your Local Network; Finish Hardware Setup; Add or Remove Windows Features; Set Power and Sleep Settings…”
Publicado 2008
Libro electrónico