Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,829
- Engineering & Applied Sciences 800
- Computer networks 610
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 340
- Electrical & Computer Engineering 330
- Computer security 324
- Internet of things 317
- Telecommunications 317
- Web site development 314
- Operating systems (Computers) 312
- Management 304
- Marketing 298
- Web sites 274
- Universidad Pontificia de Salamanca (España) 265
- Aspectos sociales 251
- Design 246
- Social aspects 244
- Information technology 242
- Comercio electrónico 228
- Data processing 225
- Marketing en Internet 211
- Diseases 210
- Medios de comunicación social 206
-
24461Publicado 2004“…Content and media asset management systems are core back office applications of the modern day broadcaster, yet there is little information available on the control and management of these systems and how content can be delivered over a variety of different channels: television, iTV, internet, webcasting, mobile phones and wireless PDAs. …”
Libro electrónico -
24462Publicado 2010“…Minibooks include Mac Basics; Photos, Music, and Movies;Browsing the Internet; Working with iLife and iWork; Other MacPrograms; Timesaving Tips with a Mac; and Mac Networking. …”
Libro electrónico -
24463por Liu, Dale“…Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. …”
Publicado 2009
Libro electrónico -
24464Publicado 2009“…Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. …”
Libro electrónico -
24465por Accardi-Petersen, Michelle“…Today, the fast moving opportunities afforded by the internet, websites, social networking and data communication give those in the know a huge advantage over traditional marketers. …”
Publicado 2011
Libro electrónico -
24466Publicado 2014“…Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more…”
Libro electrónico -
24467Publicado 2010Tabla de Contenidos: “…Cover -- Table of Contents -- 1 Business -- Accounting -- Branding -- Careers -- Customer Service -- Entrepreneurship and Small Business -- Franchising -- Home-Based Business -- Intellectual Property -- International Business -- Management Consulting -- Nonprofit Business Resources -- Office Management -- Patents and Trademarks -- Sales and Marketing -- Trade Publications -- Videoconferencing -- Women in Business -- 2 Computers and Electronics -- Computer Manufacturers -- Electronics -- Email -- Games -- General Blogging -- Instant Messaging -- Internet Security -- Macintosh -- Multimedia -- Music Resources -- Personal Computing -- Search Engines -- Software -- Virtual Worlds -- Web Browsers -- 3 Current Events/Political Science/News -- Current Events -- Emergency Preparedness -- Financial News -- Government -- Military -- Money Management -- Politics -- Science/Tech News -- State Governments -- Underground News -- World Affairs/Diplomacy -- 4 Education -- Colleges and Universities -- Continuing Education -- Distance Learning -- Financial Aid and Scholarships -- Graduate Schools -- Home Schooling -- K-12 Educator Resources -- K-12 Homework Help -- K-12 Language Arts -- K-12 Math and Science -- K-12 Private Education -- K-12 Public Education -- K-12 Social Studies -- Language and Linguistics -- Libraries -- Preschool -- Reference Resources -- Research Help -- Tutoring -- 5 Entertainment -- Actors and Actresses -- Celebrities -- Comedians and Humor -- DVDs -- Film Festivals -- Gaming -- Movies -- Independent Films -- Movie Reviews -- Movie Theaters -- Music -- Music Genres: Alternative -- Music Genres: Bluegrass -- Music Genres: Christian and Gospel -- Music Genres: Classical and Opera -- Music Genres: Country -- Music Genres: Hip-Hop and Rap -- Music Genres: Jazz -- Music Genres: Rock and Pop -- Music Genres:World Music…”
Libro electrónico -
24468Publicado 2015Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - US Cybersecurity Jobs -- 1.1 - US cybersecurity job titles -- 1.2 - General "hacker" classifications -- 1.2.1 - White Hat Hacker -- 1.2.2 - Black Hat Hacker -- 1.2.3 - Gray Hat Hacker -- 1.2.4 - Blue Hat Hacker -- 1.2.5 - Blue and Red Teams -- 1.3 - The concept of "being bad to be good" -- 1.4 - Key penetration tester "knowledge, skills, and abilities" (KSA's) -- Chapter 2 - The US Cybersecurity Industry -- 2.1 - Current and expected growth of the cybersecurity industry -- 2.1.1 - Worldwide Cybersecurity Spending -- 2.1.2 - Growth Driver 1: Cybercrime -- 2.1.3 - Growth Driver 2: The Internet-of-Things (IoT) -- 2.1.4 - Growth Driver 3: Cybersecurity is Now a Main Street Issue -- 2.1.5 - Growth Driver 4: Regulatory Compliance -- 2.2 - Employment opportunities -- 2.2.1 - Private Sector Demand -- 2.2.2 - Public Sector Demand -- 2.3 - 2015 Salary guide for cybersecurity professionals -- 2.4 - Entry-level positions -- Chapter 3 - 17 Tips on How to Land Your First Cybersecurity Job -- 3.1 - Tip 1: develop the right attitude -- 3.2 - Tip 2: curiosity is key -- 3.3 - Tip 3: develop technical prowess -- 3.4 - Tip 4: get involved in your local community -- 3.5 - Tip 5: take part in competitions -- 3.6 - Tip 6: join newsletters and read blogs -- 3.7 - Tip 7: master popular hacking tools -- 3.8 - Tip 8: become a Kali Linux power user -- 3.9 - Tip 9: create a home lab -- 3.10 - Tip 10: become a code monkey -- 3.11 - Tip 11: find bugs! …”
Libro electrónico -
24469por Mirabito, Michael M., 1956-“…International censorship, the impact of the Internet and wireless tools, and th legisation following the World Trade Center bombing all fall into this category.The New Communications Technologies, Fifth Edition, provides vital information on the…”
Publicado 2004
Libro electrónico -
24470por Schumann, Hans-Georg“…Die richtigen Antworten und Lösungen sowie alle Codebeispiele findest du im Internet zum Download…”
Publicado 2022
Libro electrónico -
24471por Simpson, AlanTabla de Contenidos: “…Using try . . . except . . . else . . . finally -- Raising Your Own Exceptions -- Chapter 10 Working with External Files -- Understanding Text and Binary Files -- Opening and Closing Files -- Reading a File's Contents -- Looping through a File -- Looping with readlines() -- Looping with readline() -- Appending versus overwriting files -- Using tell() to determine the pointer location -- Moving the pointer with seek() -- Reading and Copying a Binary File -- Chapter 11 Juggling JSON Data -- Organizing JSON Data -- Understanding Serialization -- Loading Data from JSON Files -- Converting an Excel date to a JSON date -- Loading unkeyed JSON from a Python string -- Loading keyed JSON data from a Python string -- Changing JSON data -- Removing data from a dictionary -- Dumping Python Data to JSON -- Chapter 12 Interacting with the Internet -- Seeing How the Web Works -- Understanding the mysterious URL -- Exposing the HTTP headers -- Opening a URL from Python -- Posting to the web with Python -- Scraping the web with Python -- Storing the parsed content -- Chapter 13 Libraries, Packages, and Modules -- Understanding the Python Standard Library -- Using the dir() function -- Using the help() function -- Exploring built-in functions -- Exploring Python Packages -- Importing Python Modules -- Chapter 14 The Ten Most Essential Aspects of Python -- Being Pythonic -- Identifying the Importance of Indents -- Understanding Python Syntax -- Appreciating the Flexibility of Python Variables -- Seeing Lists as Your Friend -- Controlling Your Program -- Understanding Python Functions -- Figuring Out Errors -- Using Other People's Modules -- Using the Web and AI When You Have Problems -- Index -- EULA…”
Publicado 2024
Libro electrónico -
24472Publicado 2023“…Nowadays, the Internet is becoming more and more complex due to an everincreasing number of network devices, various multimedia services and a prevalence of encrypted traffic. …”
Libro electrónico -
24473Publicado 2017Tabla de Contenidos: “…-- Danksagung -- Teil I: Netzwerk-Grundlagen -- Kapitel 1: Einführung in Computernetzwerke -- 1.1 Die Entwicklung von Computernetzwerken -- 1.1.1 Bevor es Netzwerke gab -- 1.1.2 Die Entstehung des Internets -- 1.1.3 UNIX und C -- 1.1.4 Die TCP/IP-Protokollfamilie -- 1.1.5 Ethernet -- 1.1.6 Computernetzwerke heute -- 1.2 Komponenten eines Computernetzwerks -- 1.2.1 LAN, WAN, GAN, MAN -- 1.2.2 Und das Internet? …”
Libro electrónico -
24474por Amberg, EricTabla de Contenidos: “…. - Layer-2-Technologien -- 7.2.3 Das Internet Protocol (IPv4) -- 7.2.4 Das Internet Control Message Protocol (ICMP) -- 7.2.5 Das User Datagram Protocol (UDP) -- 7.2.6 Das Transmission Control Protocol (TCP) -- 7.3 Nmap - DER Portscanner -- 7.3.1 Host Discovery -- 7.3.2 Normale Portscans -- 7.3.3 Zu scannende Ports festlegen -- 7.3.4 Besondere Portscans -- 7.3.5 Dienst- und Versionserkennung -- 7.3.6 Betriebssystem-Erkennung -- 7.3.7 Firewall/IDS-Vermeidung (Evasion) -- 7.3.8 Ausgabe-Optionen -- 7.3.9 Die Nmap Scripting Engine (NSE) -- 7.3.10 Weitere wichtige Optionen -- 7.3.11 Zenmap -- 7.4 Scannen mit Metasploit -- 7.4.1 Was ist Metasploit? …”
Publicado 2024
Libro electrónico -
24475por Brühlmann, ThomasTabla de Contenidos: “…7.2 7-Segment-Anzeigen -- 7.2.1 Port Expander über den I2C-Bus -- 7.3 LC-Display (LCD) -- 7.3.1 Paralleles LC-Display -- 7.3.2 Serielle LC-Displays -- 7.4 LC-Display Nokia 3310/5110 -- 7.5 OLED-Display -- 7.6 LED-Matrix -- 7.7 Projekt Geschwindigkeitsmesser fürs Fahrrad -- 7.8 Projekt Schrittzähler -- Kapitel 8: Datenverarbeitung -- 8.1 Daten speichern -- 8.1.1 Daten im Microcontroller speichern -- 8.1.2 Daten in externem EEPROM ablegen -- 8.1.3 Daten auf SD-Karte speichern -- 8.2 Daten ins Internet senden -- 8.3 Projekt: Programmierbarer Signalgeber -- 8.4 Sinusgenerator -- 8.5 Projekt Sollwerteingabe mit Drehgeber -- 8.5.1 Projekt-Erweiterung - Ausgabe als Analogwert -- Kapitel 9: Erweiterungen -- 9.1 Bibliotheken -- 9.1.1 Ethernet-Bibliothek -- 9.1.2 Wire-Bibliothek -- 9.1.3 SoftwareSerial -- 9.1.4 TinyGPS-Bibliothek -- 9.1.5 PString-Bibliothek -- 9.1.6 TextFinder-Bibliothek -- 9.1.7 JeeLib (nur Arduino UNO R3) -- 9.1.8 Stepper-Bibliothek -- 9.1.9 Wii Nunchuk -- 9.2 Hardware-Erweiterungen (Shields) -- 9.2.1 Protoshield -- 9.2.2 Protonly-Protoshield -- 9.2.3 Floweronly-Protoshield -- 9.2.4 Ethernet Shield -- 9.2.5 Datalogger und GPS Shield -- 9.2.6 Adafruit Motor Shield -- 9.2.7 DFRobot Motor Shield -- 9.2.8 Wave Shield -- 9.2.9 SD Card Shield -- 9.2.10 Lithium Backpack -- 9.2.11 ITEAD Power Shield -- 9.2.12 RFM12B Shield -- 9.2.13 Schraubklemmen-Shield -- 9.3 Hardware-Adapter -- 9.3.1 RFM12B-Breakout-Board -- 9.3.2 Wii-Nunchuk-Adapter -- Kapitel 10: Arduino im Einsatz -- 10.1 Verbindung zum Internet -- 10.1.1 Kabelgebundene Netzwerkverbindung -- 10.1.2 Arduino als Webserver -- 10.1.3 Der Arduino als Webclient -- 10.2 Verbindung zum Internet -- 10.2.1 Wifi mit UNO R4 WIFI (nur Arduino UNO R4 WIFI) -- 10.2.2 Wifi-Anwendungen mit UNO R4 WIFI -- 10.3 ESP-Module und Arduino -- 10.3.1 Integration in Arduino -- 10.3.2 ESP8266 -- 10.3.3 ESP8266-ESP12E…”
Publicado 2023
Libro electrónico -
24476por Ariganello, ErnestoTabla de Contenidos: “….) -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 FUNDAMENTOS DE SEGURIDAD EN LAS REDES -- 1.1 PRINCIPIOS DE UNA RED SEGURA -- 1.1.1 Evolución de la seguridad en redes Hoy en día, Internet es una red muy diferente a la -- 1.1.2 Claves para la protección de datos -- 1.1.3 Hacking -- 1.1.4 Organizaciones de seguridad en redes -- 1.1.5 Dominios de la seguridad en redes -- 1.1.6 Políticas de seguridad en redes -- 1.1.7 Cisco SecureX Architecture -- 1.2 VULNERABILIDADES -- 1.2.1 Virus -- 1.2.2 Gusanos -- 1.2.3 Troyanos -- 1.2.4 Mitigación de virus, gusanos y troyanos -- 1.3 METODOLOGÍAS DE ATAQUE -- 1.3.1 Ataques de reconocimiento -- 1.3.2 Ataques de acceso -- 1.3.3 Ataques de denegación de servicio -- 1.3.4 Mitigación de ataques de red -- 1.3.5 Cisco Network Foundation Protection -- 1.4 FUNDAMENTOS PARA EL EXAMEN -- 2 SEGURIDAD EN LOS ROUTERS -- 2.1 SEGURIDAD EN EL ROUTER -- 2.1.1 Modelos de defensa -- 2.1.2 Complementos de seguridad -- 2.1.3 Acceso administrativo seguro -- 2.2 CONFIGURACIÓN DE CONTRASEÑAS -- 2.2.1 Contraseña enable secret -- 2.2.3 Contraseña de telnet -- 2.2.4 Contraseña de auxiliar -- 2.2.5 Seguridad mejorada para conexiones virtuales -- 2.2.6 Banners -- 2.2.7 Configuración de SSH -- 2.2.8 Configuración de SSH con CCP -- 2.3 ASIGNACIÓN DE ROLES -- 2.3.1 Configuración de niveles de privilegios -- 2.3.2 Configuración de acceso a la CLI basado en roles -- 2.4 PROTECCIÓN DE ARCHIVOS Y CONTRASEÑAS -- 2.4.1 Resguardo de la configuración e imagen IOS -- 2.4.2 Recuperación de contraseñas -- 2.5 FUNDAMENTOS PARA EL EXAMEN -- 3 MONITORIZACIÓN Y ADMINISTRACIÓN DE LA RED -- 3.1 ADMINISTRACIÓN Y REPORTES -- 3.1.1 Syslog como herramienta de registro -- 3.1.2 Configuración de Syslog -- 3.2 SNMP -- 3.3 NTP -- 3.4 AUDITORÍAS DE SEGURIDAD -- 3.4.1 Asistente de Auditoría de Seguridad -- 3.4.2 Cisco AutoSecure -- 3.4.3 One-Step Lockdown…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
24477Publicado 2018Tabla de Contenidos: “…Niveau de compétence en résolution de problèmes dans des environnements à forte composante technologique, 2012 -- Les données, nouvelle infrastructure pour la production du XXIe siècle -- Préserver le caractère ouvert de l'internet pour les chaînes de valeur mondiales -- Graphique 2.9. …”
Libro electrónico -
24478por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Liste de certaines ressources internet sur le Mexique -- II. Chronologie économique -- III. …”
Publicado 2002
Libro electrónico -
24479Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Chapter 1 5G Technologies, Architecture and Protocols -- 1.1 Evolution of Wireless Technologies -- 1.2 5G Cellular Network Architecture -- 1.2.1 5G E2E Network Architecture -- 1.2.2 Network Slicing Architecture -- 1.2.3 NFV Management and Orchestration -- 1.2.4 NGMN Envisioned 5G Design -- 1.3 5G Energy Efficiency -- 1.3.1 Full Duplex -- 1.3.2 High Network Data Rate -- 1.3.3 Dense Small Cell Deployment -- 1.3.4 Massive MIMO Antennas -- 1.4 Security in 5G -- 1.5 5G Applications -- 1.5.1 Rapid Data Transmission -- 1.5.2 5G Flexibility for Smart Mobility -- 1.5.3 5G in Smart Cities -- 1.5.4 5G Augmented Reality -- 1.6 Conclusion -- References -- Chapter 2 Scope and Challenges of IoT and Blockchain Integration -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Internet of Things and Its Centralized System -- 2.3.1 Application Layer -- 2.3.2 Network Layer -- 2.3.3 Device Layer -- 2.4 Blockchain Technology -- 2.4.1 Characteristics of Blockchain -- 2.4.2 Working Mechanisms of Blockchain -- 2.4.3 Example of Blockchain Transactions -- 2.4.4 Need for Blockchain Technology -- 2.5 Integration of Blockchain and IoT Technology -- 2.5.1 Interactions of IoT and Blockchain Integrations -- 2.5.2 Blockchain Platforms for IoT -- 2.5.3 Advantages of Integrating IoT with Blockchain -- 2.5.4 Challenges of Blockchain and IoT Integration -- 2.5.5 Applications of IoT-Blockchain Integration -- 2.6 Conclusion -- References -- Chapter 3 Data Communication and Information Exchange in Distributed IoT Environment -- 3.1 Introduction -- 3.2 IoT Technologies and Their Uses -- 3.2.1 How WSN Works -- 3.2.2 Communication with RIFD-Enabled Devices -- 3.2.3 WWW - Things on the Web -- 3.3 Centralized vs. …”
Libro electrónico -
24480por Bergland, JohnTabla de Contenidos: “…Specifying Server configuration settings for LDAP -- A.0.1 Adding portal administrators to the Domino Directory -- Updating the Access Control List of the Domino Directory -- Configuring WebSphere Portal for Domino Directory -- Security is enabled -- Verifying LDAP -- WebSphere Portal Server hardware requirements for Linux Intel systems -- Appendix B. Configuring Internet Cluster Manager -- Internet Cluster Manager -- Configuring the ICM -- Setting up a separate IP address for the ICM -- Appendix C. …”
Publicado 2004
Libro electrónico