Mostrando 24,461 - 24,480 Resultados de 25,897 Para Buscar '"internet"', tiempo de consulta: 0.18s Limitar resultados
  1. 24461
    Publicado 2004
    “…Content and media asset management systems are core back office applications of the modern day broadcaster, yet there is little information available on the control and management of these systems and how content can be delivered over a variety of different channels: television, iTV, internet, webcasting, mobile phones and wireless PDAs. …”
    Libro electrónico
  2. 24462
    Publicado 2010
    “…Minibooks include Mac Basics; Photos, Music, and Movies;Browsing the Internet; Working with iLife and iWork; Other MacPrograms; Timesaving Tips with a Mac; and Mac Networking. …”
    Libro electrónico
  3. 24463
    por Liu, Dale
    Publicado 2009
    “…Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. …”
    Libro electrónico
  4. 24464
    Publicado 2009
    “…Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. …”
    Libro electrónico
  5. 24465
    por Accardi-Petersen, Michelle
    Publicado 2011
    “…Today, the fast moving opportunities afforded by the internet, websites, social networking and data communication give those in the know a huge advantage over traditional marketers. …”
    Libro electrónico
  6. 24466
    Publicado 2014
    “…Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more…”
    Libro electrónico
  7. 24467
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Table of Contents -- 1 Business -- Accounting -- Branding -- Careers -- Customer Service -- Entrepreneurship and Small Business -- Franchising -- Home-Based Business -- Intellectual Property -- International Business -- Management Consulting -- Nonprofit Business Resources -- Office Management -- Patents and Trademarks -- Sales and Marketing -- Trade Publications -- Videoconferencing -- Women in Business -- 2 Computers and Electronics -- Computer Manufacturers -- Electronics -- Email -- Games -- General Blogging -- Instant Messaging -- Internet Security -- Macintosh -- Multimedia -- Music Resources -- Personal Computing -- Search Engines -- Software -- Virtual Worlds -- Web Browsers -- 3 Current Events/Political Science/News -- Current Events -- Emergency Preparedness -- Financial News -- Government -- Military -- Money Management -- Politics -- Science/Tech News -- State Governments -- Underground News -- World Affairs/Diplomacy -- 4 Education -- Colleges and Universities -- Continuing Education -- Distance Learning -- Financial Aid and Scholarships -- Graduate Schools -- Home Schooling -- K-12 Educator Resources -- K-12 Homework Help -- K-12 Language Arts -- K-12 Math and Science -- K-12 Private Education -- K-12 Public Education -- K-12 Social Studies -- Language and Linguistics -- Libraries -- Preschool -- Reference Resources -- Research Help -- Tutoring -- 5 Entertainment -- Actors and Actresses -- Celebrities -- Comedians and Humor -- DVDs -- Film Festivals -- Gaming -- Movies -- Independent Films -- Movie Reviews -- Movie Theaters -- Music -- Music Genres: Alternative -- Music Genres: Bluegrass -- Music Genres: Christian and Gospel -- Music Genres: Classical and Opera -- Music Genres: Country -- Music Genres: Hip-Hop and Rap -- Music Genres: Jazz -- Music Genres: Rock and Pop -- Music Genres:World Music…”
    Libro electrónico
  8. 24468
    Publicado 2015
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - US Cybersecurity Jobs -- 1.1 - US cybersecurity job titles -- 1.2 - General "hacker" classifications -- 1.2.1 - White Hat Hacker -- 1.2.2 - Black Hat Hacker -- 1.2.3 - Gray Hat Hacker -- 1.2.4 - Blue Hat Hacker -- 1.2.5 - Blue and Red Teams -- 1.3 - The concept of "being bad to be good" -- 1.4 - Key penetration tester "knowledge, skills, and abilities" (KSA's) -- Chapter 2 - The US Cybersecurity Industry -- 2.1 - Current and expected growth of the cybersecurity industry -- 2.1.1 - Worldwide Cybersecurity Spending -- 2.1.2 - Growth Driver 1: Cybercrime -- 2.1.3 - Growth Driver 2: The Internet-of-Things (IoT) -- 2.1.4 - Growth Driver 3: Cybersecurity is Now a Main Street Issue -- 2.1.5 - Growth Driver 4: Regulatory Compliance -- 2.2 - Employment opportunities -- 2.2.1 - Private Sector Demand -- 2.2.2 - Public Sector Demand -- 2.3 - 2015 Salary guide for cybersecurity professionals -- 2.4 - Entry-level positions -- Chapter 3 - 17 Tips on How to Land Your First Cybersecurity Job -- 3.1 - Tip 1: develop the right attitude -- 3.2 - Tip 2: curiosity is key -- 3.3 - Tip 3: develop technical prowess -- 3.4 - Tip 4: get involved in your local community -- 3.5 - Tip 5: take part in competitions -- 3.6 - Tip 6: join newsletters and read blogs -- 3.7 - Tip 7: master popular hacking tools -- 3.8 - Tip 8: become a Kali Linux power user -- 3.9 - Tip 9: create a home lab -- 3.10 - Tip 10: become a code monkey -- 3.11 - Tip 11: find bugs! …”
    Libro electrónico
  9. 24469
    por Mirabito, Michael M., 1956-
    Publicado 2004
    “…International censorship, the impact of the Internet and wireless tools, and th legisation following the World Trade Center bombing all fall into this category.The New Communications Technologies, Fifth Edition, provides vital information on the…”
    Libro electrónico
  10. 24470
    por Schumann, Hans-Georg
    Publicado 2022
    “…Die richtigen Antworten und Lösungen sowie alle Codebeispiele findest du im Internet zum Download…”
    Libro electrónico
  11. 24471
    por Simpson, Alan
    Publicado 2024
    Tabla de Contenidos: “…Using try . . . except . . . else . . . finally -- Raising Your Own Exceptions -- Chapter 10 Working with External Files -- Understanding Text and Binary Files -- Opening and Closing Files -- Reading a File's Contents -- Looping through a File -- Looping with readlines() -- Looping with readline() -- Appending versus overwriting files -- Using tell() to determine the pointer location -- Moving the pointer with seek() -- Reading and Copying a Binary File -- Chapter 11 Juggling JSON Data -- Organizing JSON Data -- Understanding Serialization -- Loading Data from JSON Files -- Converting an Excel date to a JSON date -- Loading unkeyed JSON from a Python string -- Loading keyed JSON data from a Python string -- Changing JSON data -- Removing data from a dictionary -- Dumping Python Data to JSON -- Chapter 12 Interacting with the Internet -- Seeing How the Web Works -- Understanding the mysterious URL -- Exposing the HTTP headers -- Opening a URL from Python -- Posting to the web with Python -- Scraping the web with Python -- Storing the parsed content -- Chapter 13 Libraries, Packages, and Modules -- Understanding the Python Standard Library -- Using the dir() function -- Using the help() function -- Exploring built-in functions -- Exploring Python Packages -- Importing Python Modules -- Chapter 14 The Ten Most Essential Aspects of Python -- Being Pythonic -- Identifying the Importance of Indents -- Understanding Python Syntax -- Appreciating the Flexibility of Python Variables -- Seeing Lists as Your Friend -- Controlling Your Program -- Understanding Python Functions -- Figuring Out Errors -- Using Other People's Modules -- Using the Web and AI When You Have Problems -- Index -- EULA…”
    Libro electrónico
  12. 24472
    Publicado 2023
    “…Nowadays, the Internet is becoming more and more complex due to an everincreasing number of network devices, various multimedia services and a prevalence of encrypted traffic. …”
    Libro electrónico
  13. 24473
    Publicado 2017
    Tabla de Contenidos: “…-- Danksagung -- Teil I: Netzwerk-Grundlagen -- Kapitel 1: Einführung in Computernetzwerke -- 1.1 Die Entwicklung von Computernetzwerken -- 1.1.1 Bevor es Netzwerke gab -- 1.1.2 Die Entstehung des Internets -- 1.1.3 UNIX und C -- 1.1.4 Die TCP/IP-Protokollfamilie -- 1.1.5 Ethernet -- 1.1.6 Computernetzwerke heute -- 1.2 Komponenten eines Computernetzwerks -- 1.2.1 LAN, WAN, GAN, MAN -- 1.2.2 Und das Internet? …”
    Libro electrónico
  14. 24474
    por Amberg, Eric
    Publicado 2024
    Tabla de Contenidos: “…. - Layer-2-Technologien -- 7.2.3 Das Internet Protocol (IPv4) -- 7.2.4 Das Internet Control Message Protocol (ICMP) -- 7.2.5 Das User Datagram Protocol (UDP) -- 7.2.6 Das Transmission Control Protocol (TCP) -- 7.3 Nmap - DER Portscanner -- 7.3.1 Host Discovery -- 7.3.2 Normale Portscans -- 7.3.3 Zu scannende Ports festlegen -- 7.3.4 Besondere Portscans -- 7.3.5 Dienst- und Versionserkennung -- 7.3.6 Betriebssystem-Erkennung -- 7.3.7 Firewall/IDS-Vermeidung (Evasion) -- 7.3.8 Ausgabe-Optionen -- 7.3.9 Die Nmap Scripting Engine (NSE) -- 7.3.10 Weitere wichtige Optionen -- 7.3.11 Zenmap -- 7.4 Scannen mit Metasploit -- 7.4.1 Was ist Metasploit? …”
    Libro electrónico
  15. 24475
    por Brühlmann, Thomas
    Publicado 2023
    Tabla de Contenidos: “…7.2 7-Segment-Anzeigen -- 7.2.1 Port Expander über den I2C-Bus -- 7.3 LC-Display (LCD) -- 7.3.1 Paralleles LC-Display -- 7.3.2 Serielle LC-Displays -- 7.4 LC-Display Nokia 3310/5110 -- 7.5 OLED-Display -- 7.6 LED-Matrix -- 7.7 Projekt Geschwindigkeitsmesser fürs Fahrrad -- 7.8 Projekt Schrittzähler -- Kapitel 8: Datenverarbeitung -- 8.1 Daten speichern -- 8.1.1 Daten im Microcontroller speichern -- 8.1.2 Daten in externem EEPROM ablegen -- 8.1.3 Daten auf SD-Karte speichern -- 8.2 Daten ins Internet senden -- 8.3 Projekt: Programmierbarer Signalgeber -- 8.4 Sinusgenerator -- 8.5 Projekt Sollwerteingabe mit Drehgeber -- 8.5.1 Projekt-Erweiterung - Ausgabe als Analogwert -- Kapitel 9: Erweiterungen -- 9.1 Bibliotheken -- 9.1.1 Ethernet-Bibliothek -- 9.1.2 Wire-Bibliothek -- 9.1.3 SoftwareSerial -- 9.1.4 TinyGPS-Bibliothek -- 9.1.5 PString-Bibliothek -- 9.1.6 TextFinder-Bibliothek -- 9.1.7 JeeLib (nur Arduino UNO R3) -- 9.1.8 Stepper-Bibliothek -- 9.1.9 Wii Nunchuk -- 9.2 Hardware-Erweiterungen (Shields) -- 9.2.1 Protoshield -- 9.2.2 Protonly-Protoshield -- 9.2.3 Floweronly-Protoshield -- 9.2.4 Ethernet Shield -- 9.2.5 Datalogger und GPS Shield -- 9.2.6 Adafruit Motor Shield -- 9.2.7 DFRobot Motor Shield -- 9.2.8 Wave Shield -- 9.2.9 SD Card Shield -- 9.2.10 Lithium Backpack -- 9.2.11 ITEAD Power Shield -- 9.2.12 RFM12B Shield -- 9.2.13 Schraubklemmen-Shield -- 9.3 Hardware-Adapter -- 9.3.1 RFM12B-Breakout-Board -- 9.3.2 Wii-Nunchuk-Adapter -- Kapitel 10: Arduino im Einsatz -- 10.1 Verbindung zum Internet -- 10.1.1 Kabelgebundene Netzwerkverbindung -- 10.1.2 Arduino als Webserver -- 10.1.3 Der Arduino als Webclient -- 10.2 Verbindung zum Internet -- 10.2.1 Wifi mit UNO R4 WIFI (nur Arduino UNO R4 WIFI) -- 10.2.2 Wifi-Anwendungen mit UNO R4 WIFI -- 10.3 ESP-Module und Arduino -- 10.3.1 Integration in Arduino -- 10.3.2 ESP8266 -- 10.3.3 ESP8266-ESP12E…”
    Libro electrónico
  16. 24476
    por Ariganello, Ernesto
    Publicado 2014
    Tabla de Contenidos: “….) -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 FUNDAMENTOS DE SEGURIDAD EN LAS REDES -- 1.1 PRINCIPIOS DE UNA RED SEGURA -- 1.1.1 Evolución de la seguridad en redes Hoy en día, Internet es una red muy diferente a la -- 1.1.2 Claves para la protección de datos -- 1.1.3 Hacking -- 1.1.4 Organizaciones de seguridad en redes -- 1.1.5 Dominios de la seguridad en redes -- 1.1.6 Políticas de seguridad en redes -- 1.1.7 Cisco SecureX Architecture -- 1.2 VULNERABILIDADES -- 1.2.1 Virus -- 1.2.2 Gusanos -- 1.2.3 Troyanos -- 1.2.4 Mitigación de virus, gusanos y troyanos -- 1.3 METODOLOGÍAS DE ATAQUE -- 1.3.1 Ataques de reconocimiento -- 1.3.2 Ataques de acceso -- 1.3.3 Ataques de denegación de servicio -- 1.3.4 Mitigación de ataques de red -- 1.3.5 Cisco Network Foundation Protection -- 1.4 FUNDAMENTOS PARA EL EXAMEN -- 2 SEGURIDAD EN LOS ROUTERS -- 2.1 SEGURIDAD EN EL ROUTER -- 2.1.1 Modelos de defensa -- 2.1.2 Complementos de seguridad -- 2.1.3 Acceso administrativo seguro -- 2.2 CONFIGURACIÓN DE CONTRASEÑAS -- 2.2.1 Contraseña enable secret -- 2.2.3 Contraseña de telnet -- 2.2.4 Contraseña de auxiliar -- 2.2.5 Seguridad mejorada para conexiones virtuales -- 2.2.6 Banners -- 2.2.7 Configuración de SSH -- 2.2.8 Configuración de SSH con CCP -- 2.3 ASIGNACIÓN DE ROLES -- 2.3.1 Configuración de niveles de privilegios -- 2.3.2 Configuración de acceso a la CLI basado en roles -- 2.4 PROTECCIÓN DE ARCHIVOS Y CONTRASEÑAS -- 2.4.1 Resguardo de la configuración e imagen IOS -- 2.4.2 Recuperación de contraseñas -- 2.5 FUNDAMENTOS PARA EL EXAMEN -- 3 MONITORIZACIÓN Y ADMINISTRACIÓN DE LA RED -- 3.1 ADMINISTRACIÓN Y REPORTES -- 3.1.1 Syslog como herramienta de registro -- 3.1.2 Configuración de Syslog -- 3.2 SNMP -- 3.3 NTP -- 3.4 AUDITORÍAS DE SEGURIDAD -- 3.4.1 Asistente de Auditoría de Seguridad -- 3.4.2 Cisco AutoSecure -- 3.4.3 One-Step Lockdown…”
    Libro electrónico
  17. 24477
    Publicado 2018
    Tabla de Contenidos: “…Niveau de compétence en résolution de problèmes dans des environnements à forte composante technologique, 2012 -- Les données, nouvelle infrastructure pour la production du XXIe siècle -- Préserver le caractère ouvert de l'internet pour les chaînes de valeur mondiales -- Graphique 2.9. …”
    Libro electrónico
  18. 24478
    Tabla de Contenidos: “…Liste de certaines ressources internet sur le Mexique -- II. Chronologie économique -- III. …”
    Libro electrónico
  19. 24479
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Chapter 1 5G Technologies, Architecture and Protocols -- 1.1 Evolution of Wireless Technologies -- 1.2 5G Cellular Network Architecture -- 1.2.1 5G E2E Network Architecture -- 1.2.2 Network Slicing Architecture -- 1.2.3 NFV Management and Orchestration -- 1.2.4 NGMN Envisioned 5G Design -- 1.3 5G Energy Efficiency -- 1.3.1 Full Duplex -- 1.3.2 High Network Data Rate -- 1.3.3 Dense Small Cell Deployment -- 1.3.4 Massive MIMO Antennas -- 1.4 Security in 5G -- 1.5 5G Applications -- 1.5.1 Rapid Data Transmission -- 1.5.2 5G Flexibility for Smart Mobility -- 1.5.3 5G in Smart Cities -- 1.5.4 5G Augmented Reality -- 1.6 Conclusion -- References -- Chapter 2 Scope and Challenges of IoT and Blockchain Integration -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Internet of Things and Its Centralized System -- 2.3.1 Application Layer -- 2.3.2 Network Layer -- 2.3.3 Device Layer -- 2.4 Blockchain Technology -- 2.4.1 Characteristics of Blockchain -- 2.4.2 Working Mechanisms of Blockchain -- 2.4.3 Example of Blockchain Transactions -- 2.4.4 Need for Blockchain Technology -- 2.5 Integration of Blockchain and IoT Technology -- 2.5.1 Interactions of IoT and Blockchain Integrations -- 2.5.2 Blockchain Platforms for IoT -- 2.5.3 Advantages of Integrating IoT with Blockchain -- 2.5.4 Challenges of Blockchain and IoT Integration -- 2.5.5 Applications of IoT-Blockchain Integration -- 2.6 Conclusion -- References -- Chapter 3 Data Communication and Information Exchange in Distributed IoT Environment -- 3.1 Introduction -- 3.2 IoT Technologies and Their Uses -- 3.2.1 How WSN Works -- 3.2.2 Communication with RIFD-Enabled Devices -- 3.2.3 WWW - Things on the Web -- 3.3 Centralized vs. …”
    Libro electrónico
  20. 24480
    por Bergland, John
    Publicado 2004
    Tabla de Contenidos: “…Specifying Server configuration settings for LDAP -- A.0.1 Adding portal administrators to the Domino Directory -- Updating the Access Control List of the Domino Directory -- Configuring WebSphere Portal for Domino Directory -- Security is enabled -- Verifying LDAP -- WebSphere Portal Server hardware requirements for Linux Intel systems -- Appendix B. Configuring Internet Cluster Manager -- Internet Cluster Manager -- Configuring the ICM -- Setting up a separate IP address for the ICM -- Appendix C. …”
    Libro electrónico