Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,829
- Engineering & Applied Sciences 800
- Computer networks 610
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 340
- Electrical & Computer Engineering 330
- Computer security 324
- Internet of things 317
- Telecommunications 317
- Web site development 314
- Operating systems (Computers) 312
- Management 304
- Marketing 298
- Web sites 274
- Universidad Pontificia de Salamanca (España) 265
- Aspectos sociales 251
- Design 246
- Social aspects 244
- Information technology 242
- Comercio electrónico 228
- Data processing 225
- Marketing en Internet 211
- Diseases 210
- Medios de comunicación social 206
-
24761Publicado 2017“…Learn how UX and design thinking can make your site stand out from the rest of the internet. About This Book Learn everything you need to know about UX for your Web Design. …”
Libro electrónico -
24762Publicado 2017“…Persistent) XSS attacks work and how to take advantage of them Learn to secure your application by performing advanced web based attacks. Bypass internet security to traverse from the web to a private network. …”
Libro electrónico -
24763por Rothman, DenisTabla de Contenidos: “…Amazon must expand its services to face competition -- A real-time manufacturing revolution -- CRLMM applied to an automated apparel manufacturing process -- An apparel manufacturing process -- Training the CRLMM -- Generalizing the unit training dataset -- Food conveyor belt processing - positive p and negative n gaps -- Running a prediction program -- Building the RL-DL-CRLMM -- A circular process -- Implementing a CNN-CRLMM to detect gaps and optimize -- Q-learning - MDP -- MDP inputs and outputs -- The optimizer -- The optimizer as a regulator -- Finding the main target for the MDP function -- A circular model - a stream-like system that never starts nor ends -- Summary -- Questions -- Further reading -- Chapter 12: AI and the Internet of Things (IoT) -- The public service project -- Setting up the RL-DL-CRLMM model -- Applying the model of the CRLMM -- The dataset -- Using the trained model -- Adding an SVM function -- Motivation - using an SVM to increase safety levels -- Definition of a support vector machine -- Python function -- Running the CRLMM -- Finding a parking space -- Deciding how to get to the parking lot -- Support vector machine -- The itinerary graph -- The weight vector -- Summary -- Questions -- Further reading -- Chapter 13: Visualizing Networks with TensorFlow 2.x and TensorBoard -- Exploring the output of the layers of a CNN in two steps with TensorFlow -- Building the layers of a CNN -- Processing the visual output of the layers of a CNN -- Analyzing the visual output of the layers of a CNN -- Analyzing the accuracy of a CNN using TensorBoard -- Getting started with Google Colaboratory -- Defining and training the model -- Introducing some of the measurements -- Summary -- Questions -- Further reading…”
Publicado 2020
Libro electrónico -
24764Publicado 2025Tabla de Contenidos: “…VERIFYING HOST DOMAIN NAME SYSTEM AND INTERNET PROTOCOL INFORMATION -- 7. SUMMARY -- CHAPTER REVIEW QUESTIONS/EXERCISES -- True/False -- Multiple Choice -- EXERCISE -- Problem -- Hands-On Projects -- Project -- Case Projects -- Problem -- Optional Team Case Project -- Problem -- REFERENCES -- 5 - Detecting System Intrusions -- 1. …”
Libro electrónico -
24765Publicado 2003Tabla de Contenidos: “…Introducing EDI technologies and products -- 1.1 EDI terms and concepts -- 1.2 Benefits of EDI -- 1.3 EDI components -- 1.3.1 Message standards -- 1.3.2 Communication -- 1.4 The evolution of EDI -- 1.4.1 Elements of an EDI solution -- 1.4.2 The IBM EDI solution -- 1.5 Introducing WebSphere Data Interchange -- 1.5.1 Features of WebSphere Data Interchange -- 1.5.2 Mailbox profiles -- 1.5.3 Network profiles -- 1.5.4 WebSphere MQ-related artifacts -- 1.5.5 Service profiles -- 1.5.6 Trading Partner profiles -- 1.5.7 Concepts of the mapping editor -- 1.5.8 Mapping rules -- 1.6 Usage patterns for WebSphere Data Interchange -- 1.6.1 A point-to-point solution -- 1.6.2 An integration broker solution -- 1.6.3 A B2B gateway solution -- 1.7 Introducing the iSoft Peer-to-Peer Agent -- 1.7.1 Communication features -- 1.7.2 Data integrity and security characteristics -- 1.7.3 Administration features -- 1.7.4 Load-balancing and multi-machine setup -- 1.8 Introducing Trading Partner Interchange -- 1.8.1 How the system works -- 1.8.2 Company profile -- 1.8.3 Partner profile -- 1.8.4 The relationship between the company and partner profiles -- 1.8.5 Document sizes -- 1.8.6 Transports -- 1.9 Internet references -- Chapter 2. Implementing iSoft P2PAgent -- 2.1 Business scenario -- 2.2 Basic implementation of iSoft -- 2.2.1 Installation and initial configuration -- 2.2.2 Validating the configuration -- 2.2.3 Automating the send process -- 2.2.4 Connecting to partners RETAILER2 and RETAILER3 -- 2.3 Integration with WebSphere Data Interchange -- 2.3.1 Translating received EDI documents -- 2.3.2 Preparing EDI documents -- 2.4 Integration with the Interchange Server -- 2.4.1 Creating business objects…”
Libro electrónico -
24766Publicado 2004Tabla de Contenidos: “…Technical implementation of the scenario -- 10.1 The runtime environment -- 10.2 The Lotus Domino server -- 10.3 The IBM Content Manager server -- 10.4 The Lotus Extended Search server -- 10.4.1 Internet and Intranet data source setup -- 10.4.2 Domino application data source setup -- 10.4.3 IBM Content Manager data source setup -- 10.5 The WebSphere Portal server -- 10.6 Putting it all together -- Part 5 Appendices -- Appendix A. …”
Libro electrónico -
24767Publicado 2001“…The Simple Network Management Protocol (SNMP) is an Internet-standard protocol for managing hosts on an IP network. …”
Libro electrónico -
24768Publicado 2009Tabla de Contenidos: “…-- Using XML in the Serialization Process -- Writing to a Relational Database -- Accessing a Relational Database -- Loading the Driver -- Making the Connection -- The SQL Statements -- Conclusion -- References -- Example Code Used in This Chapter -- 13 Objects and the Internet -- Evolution of Distributed Computing -- Object-Based Scripting Languages -- A JavaScript Validation Example -- Objects in a Web Page -- JavaScript Objects -- Web Page Controls -- Sound Players -- Movie Players -- Flash -- Distributed Objects and the Enterprise -- The Common Object Request Broker Architecture (CORBA) -- Web Services Definition -- Web Services Code -- Invoice.cs -- Invoice.vb -- Conclusion -- References -- 14 Objects and Client/Server Applications -- Client/Server Approaches -- Proprietary Approach -- Serialized Object Code -- Client Code -- Server Code -- Running the Proprietary Client/Server Example -- Nonproprietary Approach -- Object Definition Code -- Client Code -- Server Code -- Running the Nonproprietary Client/Server Example -- Conclusion -- References -- Example Code Used in This Chapter -- 15 Design Patterns -- Why Design Patterns? …”
Libro electrónico -
24769por Watkinson, John, 1950-“…Everything you need is here from the fundamental principles to the latest applications, written in an award-winning style with clear explanations from first principles.New material covered includes internet audi…”
Publicado 2001
Libro electrónico -
24770por Laahs, Kevin“…SharePoint provides a vital service to businesses--content sharing over Intranet and Internet sites. Microsoft is investing tons of research and development money into content sharing technologies: SharePoint is the ""next big thing"" for MS Office users, especially in a world where many work teams are becoming geographically dispersed. …”
Publicado 2008
Libro electrónico -
24771Publicado 2010Tabla de Contenidos: “…Accessing the Windows Home Server Shared Folders -- Copying Files to a Shared Folder -- Publishing a Windows Vista Calendar to the Server -- Viewing Share Storage History -- Searching the Shared Folders -- Deleting a Shared Folder -- From Here -- 7 Making Connections to Network Computers -- Configuring a Computer as a Remote Desktop Host -- Connecting via Remote Desktop Connection -- Connecting via Windows Home Server Web Site Remote Access -- Connecting via the Internet -- Customizing the Remote Access Web Pages -- From Here -- 8 Streaming and Sharing Digital Media -- Streaming Digital Media to Network Computers and Devices -- Sharing Photos -- Sharing Music -- Sharing Videos -- From Here -- 9 Backing Up and Restoring Network Computers -- Understanding Windows Home Server's Backup Technology -- Converting Client Partitions to NTFS -- Configuring Windows Home Server Backups -- Configuring a Computer for Backup -- Running a Manual Backup -- Working with Backups -- Restoring Network Backups -- From Here -- 10 Monitoring Your Network -- Monitoring the Windows Home Server Status Icon -- Monitoring the Windows Home Server Shares -- Monitoring Remote Desktop Sessions -- From Here -- 11 Implementing Windows Home Server Security -- Enabling Security Auditing on Windows Home Server -- More Ways to Secure Windows Home Server -- Securing Network Computers -- Implementing Wireless Network Security -- From Here -- 12 Setting Up a Windows Home Server Website -- Understanding the Windows Home Server Default Website -- Adding Folders and Files to the Default Website -- Creating a New Website -- Configuring a Website -- From Here -- 13 Running a SharePoint Site on Windows Home Server -- Installing and Configuring Windows SharePoint Services -- Adding Sites to SharePoint -- Working with Site Settings -- Creating Content for a SharePoint Site -- From Here…”
Libro electrónico -
24772Publicado 2018“…Voice User Interface Projects teaches you how to develop voice-enabled applications for desktop, mobile, and Internet of Things (IoT) devices. This book explains in detail VUI and its importance, basic design principles of VUI, fundamentals of conversation, and the different voice-enabled applications available in the market. …”
Libro electrónico -
24773Publicado 2018Tabla de Contenidos: “…Understanding parse trees -- Using extracted relationships -- Extracting relationships -- Using NLP APIs -- Using OpenNLP -- Using the Stanford API -- Using the LexicalizedParser class -- Using the TreePrint class -- Finding word dependencies using the GrammaticalStructure class -- Finding coreference resolution entities -- Extracting relationships for a question-answer system -- Finding the word dependencies -- Determining the question type -- Searching for the answer -- Summary -- Chapter 11: Combined Pipeline -- Preparing data -- Using boilerpipe to extract text from HTML -- Using POI to extract text from Word documents -- Using PDFBox to extract text from PDF documents -- Using Apache Tika for content analysis and extraction -- Pipelines -- Using the Stanford pipeline -- Using multiple cores with the Stanford pipeline -- Creating a pipeline to search text -- Summary -- Chapter 12: Creating a Chatbot -- Chatbot architecture -- Artificial Linguistic Internet Computer Entity -- Understanding AIML -- Developing a chatbot using ALICE and AIML -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
24774Publicado 2019Tabla de Contenidos: “…Step 8: Monitor Your Results and Adjust as Needed -- Marketing on a Shoestring Budget -- What About Internet Marketing? -- Quick Start Action: Grab Attention with Your Headlines -- Write Winning Proposals -- Steps to Writing a Proposal -- Writing the Proposal -- Track Your Clients -- Tips to Become a Better Marketer -- Quick Start Lists -- 10 Surviving the First Year -- Chapter Overview -- Take Care of Your Health -- Manage Your Time -- The Big Jobs -- Do the Hardest First -- Invoice Ease -- Tickler Files -- Establish Good Business Habits -- The Basics -- Financial Advice -- Client Counsel -- Delight Your Clients -- Balance Your Life -- Identify Any Imbalance -- Make Your Own Rules -- Enjoy the Doing -- Take Time Off -- Identify Other Interests -- Take Advantage of Being Your Own Boss -- Manage Your Balance -- Did You Hear the One About the Consultant . . . ? …”
Libro electrónico -
24775Publicado 2011Tabla de Contenidos: “…NXT-G 2.0 Quick Reference -- C. Internet Resources -- General Resources -- Programming Resources -- Bluetooth Resources -- NXT Blogs -- LEGO Computeraided Design Resources -- Building Techniques -- Educational Resources -- Buying LEGO -- LEGO Storage -- Personal Websites -- LEGO Events -- Index -- About the Authors -- Copyright…”
Libro electrónico -
24776Publicado 2012Tabla de Contenidos: “…The Operation Aurora Case -- APT Investments -- APTs and the Internet Value Chain -- It's All Good(s) -- Bitcoin in the Future? …”
Libro electrónico -
24777por Kalicharan, Noel. author“…From laptops to data centers, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere! There are tons of applications and heaps of websites that will not work unless you have Java installed, and more are created every day. …”
Publicado 2014
Libro electrónico -
24778Publicado 2022Tabla de Contenidos: “…System Routes -- User-Defined Routes -- Service Endpoints -- Supported Services -- Private Endpoint -- Azure DNS -- Record Management -- Private DNS Zones -- Network Security Groups -- NSG Concepts -- NSG Effective Rules -- Azure Firewall -- Azure Firewall Rules -- Implementing Azure Firewall -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Intersite Connectivity -- Azure-to-Azure Connectivity -- Internet -- Virtual Network Peering -- VPN Gateway -- Virtual Network Peering vs. …”
Libro electrónico -
24779por Spiers, Mary V.Tabla de Contenidos: “…PHYSICAL ACTIVITY AND OBESITY -- PHYSICAL ACTIVITY FOR CHRONIC DISEASE PREVENTION AND MANAGEMENT -- Cardiovascular Disease -- Diabetes -- Hypertension -- Breast Cancer -- PHYSICAL ACTIVITY FOR SMOKING CESSATION -- PHYSICAL ACTIVITY FOR MENTAL HEALTH -- INTERNET TECHNOLOGIES AND OTHER INNOVATIVE PHYSICAL ACTIVITY INTERVENTION STRATEGIES -- PHYSICAL ACTIVITY PROMOTION IN WOMEN FROM UNDERSERVED POPULATIONS -- DISCUSSION -- REFERENCES -- SECTION III: Reproductive Health -- Chapter 12 Women's Sexual Health -- INTRODUCTION -- Do We Need a Model for Healthy Sexuality? …”
Publicado 2013
Libro electrónico -
24780Publicado 2024Tabla de Contenidos: “…Use cases for Entra ID Protection -- Case study analysis -- Extending XDR capabilities to on-premises and hybrid cloud by leveraging MDC -- MDC key features -- Benefits of using unified XDR for on-premises, multi-cloud, or hybrid cloud scenarios -- Case study analysis -- Microsoft Sentinel - SIEM and SOAR -- Sentinel key features -- Microsoft Sentinel versus Microsoft Defender XDR -- Case study analysis -- XDR and beyond - exploring commonly used security solutions -- Microsoft Defender for IoT -- EASM -- MDTI -- Microsoft Copilot for Security -- Case study analysis -- Microsoft's unified XDR and SIEM solution's benefits over non-MS solutions -- The future - Microsoft's influence in cybersecurity -- The graphical Windows OS revolution -- Reshaping server technology with Windows NT -- Outlook and the transformation of email communication -- MS Office - standard in productivity software -- Internet Explorer - a chapter in web browsing -- The future - Microsoft's rising influence in cybersecurity -- Summary -- Further reading -- Part 2 - Microsoft's Unified Approach to Threat Detection and Response -- Chapter 4: Power of Investigation with Microsoft Unified XDR and SIEM Solution -- Understanding the basics of SOC -- Typical SOC roles -- Avengers of cybersecurity -- Traditional versus modern SOC operations -- SOC journey with Microsoft's unified security operations platform -- Investigation in Microsoft Sentinel -- Investigation in Microsoft Defender XDR -- Microsoft Copilot for Security -- Integrations with other Microsoft security solutions and third-party tools -- Microsoft Defender XDR platform - Single pane of glass -- Microsoft Sentinel -- Third Party integrations -- Case study analysis -- Summary -- Further reading -- Chapter 5: Defend Attacks with Microsoft XDR and SIEM -- An attack kill chain in XDR and SIEM…”
Libro electrónico