Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,829
- Engineering & Applied Sciences 800
- Computer networks 610
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 340
- Electrical & Computer Engineering 330
- Computer security 324
- Internet of things 317
- Telecommunications 317
- Web site development 314
- Operating systems (Computers) 312
- Management 304
- Marketing 298
- Web sites 274
- Universidad Pontificia de Salamanca (España) 265
- Aspectos sociales 251
- Design 246
- Social aspects 244
- Information technology 242
- Comercio electrónico 228
- Data processing 225
- Marketing en Internet 211
- Diseases 210
- Medios de comunicación social 206
-
24501por Savikas, AndrewTabla de Contenidos: “…Report and Review Your Options; 8. Force Internet Explorer to Hand Off Word Documents; 9. Tweak the New Document Task Pane; 2.8.2. …”
Publicado 2005
Libro electrónico -
24502por Hostetler, GlennTabla de Contenidos: “…Logical architecture selection -- 3.1 Key logical architecture issues for Technology Foundation -- 3.1.1 Fault tolerance -- 3.1.2 Degree of security -- 3.2 Supported, standard logical architectures -- 3.2.1 Standard Security, Highly Available -- 3.2.2 Standard Security, Continuously Available -- 3.2.3 Highly Secure, Highly Available -- 3.2.4 Test architecture -- 3.3 Allowed customizations to logical architectures -- 3.3.1 Connecting to third-party external directory servers (LDAPs) -- 3.3.2 Downgrading availability for non-mission critical elements -- 3.3.3 Increasing performance for remote locations -- 3.3.4 Very high internal security -- 3.3.5 Providing Internet access -- 3.3.6 Secure Sockets Layer accelerators -- 3.3.7 Third-party IP sprayers -- 3.3.8 Third-party database vendors -- 3.4 Selecting appropriate fault tolerance and security -- 3.4.1 Determining fault tolerance requirements -- 3.4.2 Determining security requirements -- Part 2 After installation -- Chapter 4. …”
Publicado 2005
Libro electrónico -
24503Publicado 2023Tabla de Contenidos: “…A new typology of cybercrime -- 3.3. Internet connectivity and violent militancy -- 3.4. …”
Libro electrónico -
24504Publicado 2024Tabla de Contenidos: “…1.3.3 Machine Learning and Artificial Intelligence -- 1.3.4 Game Development -- 1.3.5 Automation and Scripting -- 1.3.6 Cybersecurity -- 1.3.7 Internet of Things (IoT) -- 1.3.8 Robotics -- 1.3.9 Bioinformatics and Computational Biology -- 1.3.10 Education -- 1.4 Setting up the Python Environment and Writing Your First Python Program -- 1.4.1 Setting up Python Environment -- 1.4.2 Your First Python Program -- Chapter 1 Conclusion -- Chapter 2: Python Building Blocks -- 2.1 Python Syntax and Semantics -- 2.1.1 Python Syntax -- 2.1.2 Python Semantics -- 2.2 Variables and Data Types -- 2.2.1 Integers…”
Libro electrónico -
24505Publicado 1997Tabla de Contenidos: “…Últimas iniciativas de la Unión Europea / La tecnología de la comunicación en la construcción del nuevo orden económico mundial / Los estudios de documentación informativa en la universidad española / Las nuevas tecnologías de la información en el proceso de selección de contenidos periodísticos / Usos sociales de la fuente institucional en la comunicación de masas / Transparencia y acceso a la información en la Unión Europea / Doctrina de la acción católica sobre la prensa / La comercialización de internet : consecuencias en la comunicación externa de las empresas y organizaciones / Radio musical e industria cultural del rock / Apaciguamiento, frentes populares y cruzada antisoviética. …”
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Catálogo Colectivo del Patrimonio Bibliográfico Mercedario, Biblioteca Diocesana de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
24506Publicado 2018Tabla de Contenidos: “…VoIP exploitation -- VoIP attacks -- Denial-of-Service -- Eavesdropping -- SIP attacks -- SIP registration hijacking -- Spam over Internet Telephony -- Embedding malware -- Viproy - VoIP penetration testing kit -- VoLTE Exploitation -- VoLTE attacks -- SiGploit - Telecom Signaling Exploitation Framework -- Summary -- Chapter 10: Insecure VPN Exploitation -- Cryptography -- Cryptosystems -- Ciphers -- Classical ciphers -- Modern ciphers -- Kerckhoffs' principle for cryptosystems -- Cryptosystem types -- Symmetric cryptosystem -- Asymmetric cryptosystem -- Hash functions and message integrity -- Digital signatures -- Steganography -- Key management -- Cryptographic attacks -- VPN fundamentals -- Tunneling protocols -- IPSec -- Secure Sockets Layer/Transport Layer Security -- SSL attacks -- DROWN attack (CVE-2016-0800) -- POODLE attack (CVE-2014-3566) -- BEAST attack (CVE-2011-3389) -- CRIME attack (CVE-2012-4929) -- BREACH attack (CVE-2013-3587) -- Heartbleed attack -- Qualys SSL Labs -- Summary -- Chapter 11: Routing and Router Vulnerabilities -- Routing fundamentals -- Exploiting routing protocols -- Routing Information Protocol -- RIPv1 reflection DDoS -- Open Shortest Path First -- OSPF attacks -- Disguised LSA -- MaxAge LSAs -- Remote false adjacency -- Seq++ attack -- Persistent poisoning -- Defenses -- Interior Gateway Routing Protocol -- Enhanced Interior Gateway Routing Protocol -- Border Gateway Protocol -- BGP attacks -- Exploiting routers -- Router components -- Router bootup process -- Router attacks -- The router exploitation framework -- Summary -- Chapter 12: Internet of Things Exploitation -- The IoT ecosystem -- IoT project architecture -- IoT protocols -- The IoT communication stack -- IP Smart Objects protocols suite -- Standards organizations -- IoT attack surfaces -- Devices and appliances -- Firmware -- Web interfaces…”
Libro electrónico -
24507Publicado 2017Tabla de Contenidos: “…Running the Script -- The Results -- #42 Deleting a User Account -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #43 Validating the User Environment -- The Code -- How It Works -- Running the Script -- The Results -- #44 Cleaning Up After Guests Leave -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 6: System Administration: System Maintenance -- #45 Tracking Set User ID Applications -- The Code -- How It Works -- Running the Script -- The Results -- #46 Setting the System Date -- The Code -- How It Works -- Running the Script -- The Results -- #47 Killing Processes by Name -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #48 Validating User crontab Entries -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #49 Ensuring that System cron Jobs Are Run -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #50 Rotating Log Files -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #51 Managing Backups -- The Code -- How It Works -- Running the Script -- The Results -- #52 Backing Up Directories -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 7: Web and Internet Users -- #53 Downloading Files via FTP -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #54 Extracting URLs from a Web Page -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #55 Getting GitHub User Information -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #56 ZIP Code Lookup -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #57 Area Code Lookup -- The Code -- How It Works…”
Libro electrónico -
24508Publicado 2023Tabla de Contenidos: “…-- Cybersecurity Means Different Things to Different Folks -- Cybersecurity Is a Constantly Moving Target -- Technological changes -- Digital data -- The Internet -- Cryptocurrency -- Mobile workforces and ubiquitous access -- Smart devices -- Big data -- The COVID-19 pandemic -- Social shifts -- Economic model shifts -- Political shifts -- Data collection -- Election interference -- Hacktivism -- Greater freedom -- Sanctions -- New balances of power -- Looking at the Risks Cybersecurity Mitigates -- The goal of cybersecurity: The CIA Triad -- From a human perspective -- Chapter 2 Getting to Know Common Cyberattacks -- Attacks That Inflict Damage -- Denial-of-service (DoS) attacks -- Distributed denial-of-service (DDoS) attacks -- Botnets and zombies -- Data destruction attacks -- Is That Really You? …”
Libro electrónico -
24509Publicado 2011Tabla de Contenidos: “…Working from the Command Line -- Controlling Windows: Advanced Operations -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 5: THE LINUX UTILITIES -- Special Characters -- Basic Utilities -- Working with Files -- | (Pipe): Communicates Between Processes -- Four More Utilities -- Compressing and Archiving Files -- Locating Commands -- Obtaining User and System Information -- Communicating with Other Users -- Email -- Tutorial: Using vim to Create and Edit a File -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 6: THE LINUX FILESYSTEM -- The Hierarchical Filesystem -- Directory Files and Ordinary Files -- Pathnames -- Working with Directories -- Access Permissions -- ACLs: Access Control Lists -- Links -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 7: THE SHELL -- The Command Line -- Standard Input and Standard Output -- Running a Command in the Background -- Filename Generation/Pathname Expansion -- Builtins -- Chapter Summary -- Exercises -- Advanced Exercises -- PART III: DIGGING INTO UBUNTU LINUX -- CHAPTER 8: LINUX GUIS: X AND GNOME -- X Window System -- The Nautilus File Browser Window -- The Nautilus Spatial View -- GNOME Utilities -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 9: THE BOURNE AGAIN SHELL -- Background -- Shell Basics -- Parameters and Variables -- Special Characters -- Processes -- History -- Aliases -- Functions -- Controlling bash: Features and Options -- Processing the Command Line -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 10: NETWORKING AND THE INTERNET -- Types of Networks and How They Work -- Communicate over a Network -- Network Utilities -- Distributed Computing -- Usenet -- WWW: World Wide Web -- Chapter Summary -- Exercises -- Advanced Exercises -- PART IV: SYSTEM ADMINISTRATION -- CHAPTER 11: SYSTEM ADMINISTRATION: CORE CONCEPTS…”
Libro electrónico -
24510CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…-- Cybersecurity Means Different Things to Different Folks -- Cybersecurity Is a Constantly Moving Target -- Technological changes -- Digital data -- The Internet -- Cryptocurrency -- Mobile workforces and ubiquitous access -- Smart devices -- Big data -- The COVID-19 pandemic -- Social shifts -- Economic model shifts -- Political shifts -- Data collection -- Election interference -- Hacktivism -- Greater freedom -- Sanctions -- New balances of power -- Looking at the Risks Cybersecurity Mitigates -- The goal of cybersecurity: The CIA Triad -- From a human perspective -- Chapter 2 Getting to Know Common Cyberattacks -- Attacks That Inflict Damage -- Denial-of-service (DoS) attacks -- Distributed denial-of-service (DDoS) attacks -- Botnets and zombies -- Data destruction attacks -- Is That Really You? …”
Libro electrónico -
24511por Antoine Lefébure“…¿Por qué utiliza a las multinacionales estadounidenses con el fin de hacer de Internet un espacio de vigilancia generalizado? Este libro, que relata en detalle -y de una manera muy pedagógica- la cara oculta desconocida de esta increíble historia, permite comprender las motivaciones de sus actores, lo que ponen en juego los secretos revelados y sus consecuencias sobre la marcha del mundo. …”
Publicado 2016
Texto completo en Odilo
Otros -
24512Publicado 2022Tabla de Contenidos: “…REPENSANDO EL PASADO Y PRESENTE DE LAS TEORÍAS DE LA COMUNICACIÓN -- ¿QUIÉN ESTABLECE LA AGENDA EN LA ERA DE INTERNET? EL ACTUAL DEBATE SOBRE LA VIGENCIA DE LA TEORÍA DE LA AGENDA-SETTING EN EL ACTUAL CONTEXTO DE LOS MEDIOS DIGITALES, LAS REDES SOCIALES Y LOS MOTORES DE BÚSQUEDA -- AUTORES Y CULTURA CIENTÍFICA EN LA ESCUELA DE CHICAGO -- CONVERGENCIA PERIFÉRICA: NUEVOS PROBLEMAS FORMULADOS DESDE LA ECONOMÍA POLÍTICA DE LA COMUNICACIÓN POPULAR -- ECONOMÍA POLÍTICA DE LA COMUNICACIÓN: ¿UN MARCO VÁLIDO PARA EL ESTUDIO DE LOS SERVICIOS AUDIOVISUALES BAJO DEMANDA POR SUSCRIPCIÓN? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
24513por Sibbet, David“…Just as social networking has reclaimed the Internet for human interactivity and co-creation, the visual meetings movement is reclaiming creativity, productivity, and playful exchange for serious work in groups. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
24514por Richardson, Iain E. G.“…H.264 Advanced Video Coding or MPEG-4 Part 10 is fundamental to a growing range of markets such as high definition broadcasting, internet video sharing, mobile video and digital surveillance. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
24515Publicado 2019“…Ihre Beiträge umfassen nicht nur Erfahrungsberichte von Autor_innen, Lektor_innen und Mentor_innen sowie Einblicke in Lehrmethoden des literarischen Schreibens an Hochschulen in verschiedenen Ländern Europas, sondern auch theoretische Ansätze zu einer intersubjektiven literarischen Praxis sowie Entwürfe für dialogische Literaturbegriffe im Zeitalter des Publizierens im Internet. Although practices of editing and mentoring are part of an author's daily activities, they have previously been largely neglected by the literary studies. …”
Electrónico -
24516por Organisation for Economic Co-operation and Development Staff“…New indicators address emerging policy issues: international mobility of human capital, relative innovative performance as measured by patent families, skills in the information economy, diffusion of the Internet and electronic commerce. Resources devoted to innovation in emerging areas such as biotechnology, environment, health and i…”
Publicado 2001
Libro electrónico -
24517Publicado 2016“…Schritt für Schritt Einblick in die Funktionen von Adobe Premiere Elements 14 Videos schneiden, Titel einfügen und tolle Spezialeffekte setzen Video-Export für Internet, DVD und Smartphones Sie haben bereits viel Video-Material und möchten endlich ansehnliche Filme schneiden? …”
Libro electrónico -
24518por Bauer, Michael D.“… Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. …”
Publicado 2005
Libro electrónico -
24519por Rutenbeck, Jeffrey B. 1961-“…Now in its 3rd edition, Tech Terms is an invaluable learning tool to help grasp key aspects of the television and video, PC hardware and software markets, multimedia authoring tools, and the exploding wireless Internet and mobile telecomputing worlds. With more than 1000 terms described in four sentences or less, Tech Terms is perfect the perfect desk reference…”
Publicado 2006
Libro electrónico -
24520por Follansbee, Joe“…This book describes the steps for creating an on-demand and live streaming video in an all-in-one reference guide for new users and companies that need introduced to the technology.After reading this book, you will understand:- How the Internet works in relation to streaming media- Client/server technology, specifically related to streaming media- Strengths and limits of streaming media, including best uses for the technology- Choices of streaming media content creation tools<BR id=""…”
Publicado 2006
Libro electrónico