Mostrando 24,501 - 24,520 Resultados de 25,897 Para Buscar '"internet"', tiempo de consulta: 0.22s Limitar resultados
  1. 24501
    por Savikas, Andrew
    Publicado 2005
    Tabla de Contenidos: “…Report and Review Your Options; 8. Force Internet Explorer to Hand Off Word Documents; 9. Tweak the New Document Task Pane; 2.8.2. …”
    Libro electrónico
  2. 24502
    por Hostetler, Glenn
    Publicado 2005
    Tabla de Contenidos: “…Logical architecture selection -- 3.1 Key logical architecture issues for Technology Foundation -- 3.1.1 Fault tolerance -- 3.1.2 Degree of security -- 3.2 Supported, standard logical architectures -- 3.2.1 Standard Security, Highly Available -- 3.2.2 Standard Security, Continuously Available -- 3.2.3 Highly Secure, Highly Available -- 3.2.4 Test architecture -- 3.3 Allowed customizations to logical architectures -- 3.3.1 Connecting to third-party external directory servers (LDAPs) -- 3.3.2 Downgrading availability for non-mission critical elements -- 3.3.3 Increasing performance for remote locations -- 3.3.4 Very high internal security -- 3.3.5 Providing Internet access -- 3.3.6 Secure Sockets Layer accelerators -- 3.3.7 Third-party IP sprayers -- 3.3.8 Third-party database vendors -- 3.4 Selecting appropriate fault tolerance and security -- 3.4.1 Determining fault tolerance requirements -- 3.4.2 Determining security requirements -- Part 2 After installation -- Chapter 4. …”
    Libro electrónico
  3. 24503
    Publicado 2023
    Tabla de Contenidos: “…A new typology of cybercrime -- 3.3. Internet connectivity and violent militancy -- 3.4. …”
    Libro electrónico
  4. 24504
    Publicado 2024
    Tabla de Contenidos: “…1.3.3 Machine Learning and Artificial Intelligence -- 1.3.4 Game Development -- 1.3.5 Automation and Scripting -- 1.3.6 Cybersecurity -- 1.3.7 Internet of Things (IoT) -- 1.3.8 Robotics -- 1.3.9 Bioinformatics and Computational Biology -- 1.3.10 Education -- 1.4 Setting up the Python Environment and Writing Your First Python Program -- 1.4.1 Setting up Python Environment -- 1.4.2 Your First Python Program -- Chapter 1 Conclusion -- Chapter 2: Python Building Blocks -- 2.1 Python Syntax and Semantics -- 2.1.1 Python Syntax -- 2.1.2 Python Semantics -- 2.2 Variables and Data Types -- 2.2.1 Integers…”
    Libro electrónico
  5. 24505
    Publicado 1997
    Tabla de Contenidos: “…Últimas iniciativas de la Unión Europea / La tecnología de la comunicación en la construcción del nuevo orden económico mundial / Los estudios de documentación informativa en la universidad española / Las nuevas tecnologías de la información en el proceso de selección de contenidos periodísticos / Usos sociales de la fuente institucional en la comunicación de masas / Transparencia y acceso a la información en la Unión Europea / Doctrina de la acción católica sobre la prensa / La comercialización de internet : consecuencias en la comunicación externa de las empresas y organizaciones / Radio musical e industria cultural del rock / Apaciguamiento, frentes populares y cruzada antisoviética. …”
    Libro
  6. 24506
    Publicado 2018
    Tabla de Contenidos: “…VoIP exploitation -- VoIP attacks -- Denial-of-Service -- Eavesdropping -- SIP attacks -- SIP registration hijacking -- Spam over Internet Telephony -- Embedding malware -- Viproy - VoIP penetration testing kit -- VoLTE Exploitation -- VoLTE attacks -- SiGploit - Telecom Signaling Exploitation Framework -- Summary -- Chapter 10: Insecure VPN Exploitation -- Cryptography -- Cryptosystems -- Ciphers -- Classical ciphers -- Modern ciphers -- Kerckhoffs' principle for cryptosystems -- Cryptosystem types -- Symmetric cryptosystem -- Asymmetric cryptosystem -- Hash functions and message integrity -- Digital signatures -- Steganography -- Key management -- Cryptographic attacks -- VPN fundamentals -- Tunneling protocols -- IPSec -- Secure Sockets Layer/Transport Layer Security -- SSL attacks -- DROWN attack (CVE-2016-0800) -- POODLE attack (CVE-2014-3566) -- BEAST attack (CVE-2011-3389) -- CRIME attack (CVE-2012-4929) -- BREACH attack (CVE-2013-3587) -- Heartbleed attack -- Qualys SSL Labs -- Summary -- Chapter 11: Routing and Router Vulnerabilities -- Routing fundamentals -- Exploiting routing protocols -- Routing Information Protocol -- RIPv1 reflection DDoS -- Open Shortest Path First -- OSPF attacks -- Disguised LSA -- MaxAge LSAs -- Remote false adjacency -- Seq++ attack -- Persistent poisoning -- Defenses -- Interior Gateway Routing Protocol -- Enhanced Interior Gateway Routing Protocol -- Border Gateway Protocol -- BGP attacks -- Exploiting routers -- Router components -- Router bootup process -- Router attacks -- The router exploitation framework -- Summary -- Chapter 12: Internet of Things Exploitation -- The IoT ecosystem -- IoT project architecture -- IoT protocols -- The IoT communication stack -- IP Smart Objects protocols suite -- Standards organizations -- IoT attack surfaces -- Devices and appliances -- Firmware -- Web interfaces…”
    Libro electrónico
  7. 24507
    Publicado 2017
    Tabla de Contenidos: “…Running the Script -- The Results -- #42 Deleting a User Account -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #43 Validating the User Environment -- The Code -- How It Works -- Running the Script -- The Results -- #44 Cleaning Up After Guests Leave -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 6: System Administration: System Maintenance -- #45 Tracking Set User ID Applications -- The Code -- How It Works -- Running the Script -- The Results -- #46 Setting the System Date -- The Code -- How It Works -- Running the Script -- The Results -- #47 Killing Processes by Name -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #48 Validating User crontab Entries -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #49 Ensuring that System cron Jobs Are Run -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #50 Rotating Log Files -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #51 Managing Backups -- The Code -- How It Works -- Running the Script -- The Results -- #52 Backing Up Directories -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 7: Web and Internet Users -- #53 Downloading Files via FTP -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #54 Extracting URLs from a Web Page -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #55 Getting GitHub User Information -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #56 ZIP Code Lookup -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #57 Area Code Lookup -- The Code -- How It Works…”
    Libro electrónico
  8. 24508
    Publicado 2023
    Tabla de Contenidos: “…-- Cybersecurity Means Different Things to Different Folks -- Cybersecurity Is a Constantly Moving Target -- Technological changes -- Digital data -- The Internet -- Cryptocurrency -- Mobile workforces and ubiquitous access -- Smart devices -- Big data -- The COVID-19 pandemic -- Social shifts -- Economic model shifts -- Political shifts -- Data collection -- Election interference -- Hacktivism -- Greater freedom -- Sanctions -- New balances of power -- Looking at the Risks Cybersecurity Mitigates -- The goal of cybersecurity: The CIA Triad -- From a human perspective -- Chapter 2 Getting to Know Common Cyberattacks -- Attacks That Inflict Damage -- Denial-of-service (DoS) attacks -- Distributed denial-of-service (DDoS) attacks -- Botnets and zombies -- Data destruction attacks -- Is That Really You? …”
    Libro electrónico
  9. 24509
    Publicado 2011
    Tabla de Contenidos: “…Working from the Command Line -- Controlling Windows: Advanced Operations -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 5: THE LINUX UTILITIES -- Special Characters -- Basic Utilities -- Working with Files -- | (Pipe): Communicates Between Processes -- Four More Utilities -- Compressing and Archiving Files -- Locating Commands -- Obtaining User and System Information -- Communicating with Other Users -- Email -- Tutorial: Using vim to Create and Edit a File -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 6: THE LINUX FILESYSTEM -- The Hierarchical Filesystem -- Directory Files and Ordinary Files -- Pathnames -- Working with Directories -- Access Permissions -- ACLs: Access Control Lists -- Links -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 7: THE SHELL -- The Command Line -- Standard Input and Standard Output -- Running a Command in the Background -- Filename Generation/Pathname Expansion -- Builtins -- Chapter Summary -- Exercises -- Advanced Exercises -- PART III: DIGGING INTO UBUNTU LINUX -- CHAPTER 8: LINUX GUIS: X AND GNOME -- X Window System -- The Nautilus File Browser Window -- The Nautilus Spatial View -- GNOME Utilities -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 9: THE BOURNE AGAIN SHELL -- Background -- Shell Basics -- Parameters and Variables -- Special Characters -- Processes -- History -- Aliases -- Functions -- Controlling bash: Features and Options -- Processing the Command Line -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 10: NETWORKING AND THE INTERNET -- Types of Networks and How They Work -- Communicate over a Network -- Network Utilities -- Distributed Computing -- Usenet -- WWW: World Wide Web -- Chapter Summary -- Exercises -- Advanced Exercises -- PART IV: SYSTEM ADMINISTRATION -- CHAPTER 11: SYSTEM ADMINISTRATION: CORE CONCEPTS…”
    Libro electrónico
  10. 24510
    Cybersecurity
    Cybersecurity For Dummies
    Publicado 2022
    Tabla de Contenidos: “…-- Cybersecurity Means Different Things to Different Folks -- Cybersecurity Is a Constantly Moving Target -- Technological changes -- Digital data -- The Internet -- Cryptocurrency -- Mobile workforces and ubiquitous access -- Smart devices -- Big data -- The COVID-19 pandemic -- Social shifts -- Economic model shifts -- Political shifts -- Data collection -- Election interference -- Hacktivism -- Greater freedom -- Sanctions -- New balances of power -- Looking at the Risks Cybersecurity Mitigates -- The goal of cybersecurity: The CIA Triad -- From a human perspective -- Chapter 2 Getting to Know Common Cyberattacks -- Attacks That Inflict Damage -- Denial-of-service (DoS) attacks -- Distributed denial-of-service (DDoS) attacks -- Botnets and zombies -- Data destruction attacks -- Is That Really You? …”
    Libro electrónico
  11. 24511
    por Antoine Lefébure
    Publicado 2016
    “…¿Por qué utiliza a las multinacionales estadounidenses con el fin de hacer de Internet un espacio de vigilancia generalizado? Este libro, que relata en detalle -y de una manera muy pedagógica- la cara oculta desconocida de esta increíble historia, permite comprender las motivaciones de sus actores, lo que ponen en juego los secretos revelados y sus consecuencias sobre la marcha del mundo. …”
    Texto completo en Odilo
    Otros
  12. 24512
    Publicado 2022
    Tabla de Contenidos: “…REPENSANDO EL PASADO Y PRESENTE DE LAS TEORÍAS DE LA COMUNICACIÓN -- ¿QUIÉN ESTABLECE LA AGENDA EN LA ERA DE INTERNET? EL ACTUAL DEBATE SOBRE LA VIGENCIA DE LA TEORÍA DE LA AGENDA-SETTING EN EL ACTUAL CONTEXTO DE LOS MEDIOS DIGITALES, LAS REDES SOCIALES Y LOS MOTORES DE BÚSQUEDA -- AUTORES Y CULTURA CIENTÍFICA EN LA ESCUELA DE CHICAGO -- CONVERGENCIA PERIFÉRICA: NUEVOS PROBLEMAS FORMULADOS DESDE LA ECONOMÍA POLÍTICA DE LA COMUNICACIÓN POPULAR -- ECONOMÍA POLÍTICA DE LA COMUNICACIÓN: ¿UN MARCO VÁLIDO PARA EL ESTUDIO DE LOS SERVICIOS AUDIOVISUALES BAJO DEMANDA POR SUSCRIPCIÓN? …”
    Libro electrónico
  13. 24513
    por Sibbet, David
    Publicado 2010
    “…Just as social networking has reclaimed the Internet for human interactivity and co-creation, the visual meetings movement is reclaiming creativity, productivity, and playful exchange for serious work in groups. …”
    Libro electrónico
  14. 24514
    por Richardson, Iain E. G.
    Publicado 2010
    “…H.264 Advanced Video Coding or MPEG-4 Part 10 is fundamental to a growing range of markets such as high definition broadcasting, internet video sharing, mobile video and digital surveillance. …”
    Libro electrónico
  15. 24515
    Publicado 2019
    “…Ihre Beiträge umfassen nicht nur Erfahrungsberichte von Autor_innen, Lektor_innen und Mentor_innen sowie Einblicke in Lehrmethoden des literarischen Schreibens an Hochschulen in verschiedenen Ländern Europas, sondern auch theoretische Ansätze zu einer intersubjektiven literarischen Praxis sowie Entwürfe für dialogische Literaturbegriffe im Zeitalter des Publizierens im Internet. Although practices of editing and mentoring are part of an author's daily activities, they have previously been largely neglected by the literary studies. …”
    Electrónico
  16. 24516
    “…New indicators address emerging policy issues: international mobility of human capital, relative innovative performance as measured by patent families, skills in the information economy, diffusion of the Internet and electronic commerce. Resources devoted to innovation in emerging areas such as biotechnology, environment, health and i…”
    Libro electrónico
  17. 24517
    Publicado 2016
    “…Schritt für Schritt Einblick in die Funktionen von Adobe Premiere Elements 14 Videos schneiden, Titel einfügen und tolle Spezialeffekte setzen Video-Export für Internet, DVD und Smartphones Sie haben bereits viel Video-Material und möchten endlich ansehnliche Filme schneiden? …”
    Libro electrónico
  18. 24518
    por Bauer, Michael D.
    Publicado 2005
    “… Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. …”
    Libro electrónico
  19. 24519
    por Rutenbeck, Jeffrey B. 1961-
    Publicado 2006
    “…Now in its 3rd edition, Tech Terms is an invaluable learning tool to help grasp key aspects of the television and video, PC hardware and software markets, multimedia authoring tools, and the exploding wireless Internet and mobile telecomputing worlds. With more than 1000 terms described in four sentences or less, Tech Terms is perfect the perfect desk reference…”
    Libro electrónico
  20. 24520
    por Follansbee, Joe
    Publicado 2006
    “…This book describes the steps for creating an on-demand and live streaming video in an all-in-one reference guide for new users and companies that need introduced to the technology.After reading this book, you will understand:- How the Internet works in relation to streaming media- Client/server technology, specifically related to streaming media- Strengths and limits of streaming media, including best uses for the technology- Choices of streaming media content creation tools<BR id=""…”
    Libro electrónico