Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,829
- Engineering & Applied Sciences 800
- Computer networks 610
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 340
- Electrical & Computer Engineering 330
- Computer security 324
- Internet of things 317
- Telecommunications 317
- Web site development 314
- Operating systems (Computers) 312
- Management 304
- Marketing 298
- Web sites 274
- Universidad Pontificia de Salamanca (España) 265
- Aspectos sociales 251
- Design 246
- Social aspects 244
- Information technology 242
- Comercio electrónico 228
- Data processing 225
- Marketing en Internet 211
- Diseases 210
- Medios de comunicación social 206
-
24821Publicado 2022Tabla de Contenidos: “…Select Controls Based Upon Systems Security Requirements -- Evaluation criteria -- System certification and accreditation -- Understand Security Capabilities of Information Systems -- Trusted Computing Base -- Trusted Platform Module -- Secure modes of operation -- Open and closed systems -- Memory protection -- Encryption and decryption -- Protection rings -- Security modes -- Recovery procedures -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Client-based systems -- Server-based systems -- Database systems -- Cryptographic systems -- Industrial control systems -- Cloud-based systems -- Distributed systems -- Internet of Things -- Microservices -- Containerization -- Serverless -- Embedded systems -- High-performance computing systems -- Edge computing systems -- Virtualized systems -- Web-based systems -- Mobile systems -- Select and Determine Cryptographic Solutions -- Plaintext and ciphertext -- Encryption and decryption -- End-to-end encryption -- Link encryption -- Putting it all together: The cryptosystem -- Classes of ciphers -- Types of ciphers -- Cryptographic life cycle -- Cryptographic methods -- Public key infrastructure -- Key management practices -- Digital signatures and digital certificates -- Nonrepudiation -- Integrity (hashing) -- Understand Methods of Cryptanalytic Attacks -- Brute force -- Ciphertext only -- Known plaintext -- Frequency analysis -- Chosen ciphertext -- Implementation attacks -- Side channel -- Fault injection -- Timing -- Man in the middle -- Pass the hash -- Kerberos exploitation -- Ransomware -- Apply Security Principles to Site and Facility Design -- Design Site and Facility Security Controls -- Wiring closets, server rooms, and more -- Restricted and work area security -- Utilities and heating, ventilation, and air conditioning -- Environmental issues…”
Libro electrónico -
24822Publicado 2022“…These communications span several domains: people-to-people, people-to-websites, people-to-applications, sensors-to-cloud analytics, and machines-to-machines/device-to-device. While the later Internet of Things (IoT) applications are generally (but not always) low speed, the former applications are typically high-speed. …”
Libro electrónico -
24823Publicado 2003Tabla de Contenidos: “…Navigation tools -- 3.5. Internet -- 3.6. Economical aspects -- 4. Adapting documents -- 5. …”
Libro electrónico -
24824Publicado 2016Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Introduction -- Who this Book is for -- What this Book Covers -- How this Book is Structured -- What You Need to Use this Book -- Conventions -- Source Code -- Errata -- p2p.wrox.com -- Chapter 1 Getting Started with ASP.NET 6.0 -- An Introduction to ASP.NET vNext -- Hypertext Transfer Protocol (HTTP) -- Microsoft Internet Information Services -- HTML 5 -- HTML Markup -- Attributes in HTML -- HTML Example -- ASP.NET Web Forms -- ViewState -- ASP.NET Web Forms Events and Page Lifecycle -- Control Library -- ASP.NET MVC -- Testability -- Full Control over Output -- Web Forms and MVC Similarities -- Choosing the Best Approach -- Using Visual Studio 2015 -- Versions -- Downloading and Installing -- The Sample Application -- Summary -- Chapter 2 Building an Initial ASP.NET Application -- Creating Websites with Visual Studio 2015 -- Available Project Types -- Web Site Project-Based Approach -- Web Application Project -- Creating a New Site -- While Creating a Project -- Empty Template -- Web Forms Template -- MVC Template -- Web API Template -- Single Page Application Template -- Azure Mobile Service Template -- Working with Files in Your Application -- File Types of an ASP.NET MVC Application -- File System Structure of an ASP.NET MVC Application -- File Types of an ASP.NET Web Forms Application -- MVC and Web Form File Differences -- Creating the Sample Application -- Summary -- Chapter 3 Designing Your Web Pages -- HTML and CSS -- Why Use Both HTML and CSS? …”
Libro electrónico -
24825Publicado 2024“…Additionally, you’ll use Django to develop a movie store application and deploy it to the internet. By the end of this book, you’ll be able to build and deploy your own Django web applications confidently…”
Libro electrónico -
24826Publicado 1792Accés lliure (ARCA)
Accés lliure (Hemeroteca digital AHCB)
Accés lliure (Hemeroteca digital BNE)
Accés lliure
991005180149706719 -
24827por Hoekman, Robert“…With Flash, you can integrate video, text, audio, and graphics into distinctive and compelling web content, stunningly interactive and expressive user interfaces, and rich applications for the Internet. Flash is all about helping you dramatically enhance the user experience. …”
Publicado 2005
Libro electrónico -
24828por Peikari, Cyrus“…The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? …”
Publicado 2004
Libro electrónico -
24829Publicado 2018“…All you'll need is a computer, internet connection, and a cup of coffee. What You Will Learn Understand what Java is Install Java and learn how to run it Write and execute a Java program Write and execute the test for your program Install components and confgure your development environment Learn and use Java language fundamentals Learn object-oriented design principles Master the frequently used Java constructs In Detail Have you ever thought about making your computer do what you want it to do? …”
Libro electrónico -
24830Publicado 2017“…About This Book This book gets you started with the exciting world of C++ programming It will enable you to write C++ code that uses the standard library, has a level of object orientation, and uses memory in a safe and effective way It forms the basis of programming and covers concepts such as data structures and the core programming language Who This Book Is For A computer, an internet connection, and the desire to learn how to code in C++ is all you need to get started with this book. …”
Libro electrónico -
24831Publicado 2022Tabla de Contenidos: “…Cover -- About the Author -- Title Page -- Copyright Page -- Contents at a Glance -- Contents -- Preface -- For Further Study -- Part I The Java Language -- Chapter 1 The History and Evolution of Java -- Java's Lineage -- The Birth of Modern Programming: C -- C++: The Next Step -- The Stage Is Set for Java -- The Creation of Java -- The C# Connection -- How Java Impacted the Internet -- Java Applets -- Security -- Portability -- Java's Magic: The Bytecode -- Moving Beyond Applets -- A Faster Release Schedule -- Servlets: Java on the Server Side -- The Java Buzzwords -- Simple -- Object-Oriented -- Robust -- Multithreaded -- Architecture-Neutral -- Interpreted and High Performance -- Distributed -- Dynamic -- The Evolution of Java -- A Culture of Innovation -- Chapter 2 An Overview of Java -- Object-Oriented Programming -- Two Paradigms -- Abstraction -- The Three OOP Principles -- A First Simple Program -- Entering the Program -- Compiling the Program -- A Closer Look at the First Sample Program -- A Second Short Program -- Two Control Statements -- The if Statement -- The for Loop -- Using Blocks of Code -- Lexical Issues -- Whitespace -- Identifiers -- Literals -- Comments -- Separators -- The Java Keywords -- The Java Class Libraries -- Chapter 3 Data Types, Variables, and Arrays -- Java Is a Strongly Typed Language -- The Primitive Types -- Integers -- byte -- short -- int -- long -- Floating-Point Types -- float -- double -- Characters -- Booleans -- A Closer Look at Literals -- Integer Literals -- Floating-Point Literals -- Boolean Literals -- Character Literals -- String Literals -- Variables -- Declaring a Variable -- Dynamic Initialization -- The Scope and Lifetime of Variables -- Type Conversion and Casting -- Java's Automatic Conversions -- Casting Incompatible Types -- Automatic Type Promotion in Expressions…”
Libro electrónico -
24832Publicado 2023Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Chromebook -- Chapter 1 Choosing and Setting Up Your Chromebook -- Checking Under the Hood of the Chromebook -- The software -- The hardware -- Choosing a Chromebook -- Setting Up Your Chromebook -- Turning on your device -- Selecting a language -- Connecting to the internet -- Agreeing to the Terms of Service -- Adult or child user -- Logging In for the First Time -- Logging in using an existing Google Account -- Creating a new Google Account -- Using Chromebook as a guest -- Transitioning to a Chromebook from Mac, Linux, or Windows -- Where to Go Next -- Chapter 2 Working with the Chromebook Desktop -- Accessing the Chromebook Shelf -- Using the Launcher: Chromebook's Start Button -- Navigating the Launcher -- Organizing Launcher Icons -- Setting Up App Shortcuts -- Pinning app shortcuts to your shelf -- Removing app shortcuts from your shelf -- Getting the Scoop in the Status Area -- Taking Charge of Window Controls -- Multitasking with Multiple Windows -- Setting Up a Printer -- Direct connect printing -- Wi-Fi printing -- Chapter 3 Surveying the Chrome Browser -- Navigating the Chrome Browser -- Sizing the Chrome window -- Working with tabs -- Using the Omnibox and the navigation buttons -- Saving your place with the bookmark bar -- Customizing and Controlling Chrome -- Managing bookmarks -- Managing your history and downloads -- Erasing your browsing history -- Going incognito -- Changing Search Engine Providers -- Using Other Browsers -- Chapter 4 Getting Your Hands on the Keyboard and Touchpad -- The Chromebook Keyboard at a Glance -- Using Shortcut Key Combinations -- Configuring Keyboard Settings…”
Libro electrónico -
24833Publicado 2024Tabla de Contenidos: “…Written Lab -- Review Questions -- Chapter 9 Security Vulnerabilities, Threats, and Countermeasures -- Shared Responsibility -- Data Localization and Data Sovereignty -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Hardware -- Firmware -- Client-Based Systems -- Mobile Code -- Local Caches -- Server-Based Systems -- Large-Scale Parallel Data Systems -- Grid Computing -- Peer to Peer -- Industrial Control Systems -- Distributed Systems -- High-Performance Computing (HPC) Systems -- Real-Time Operating Systems -- Internet of Things -- Edge and Fog Computing -- Embedded Devices and Cyber-Physical Systems -- Static Systems -- Cyber-Physical Systems -- Security Concerns of Embedded and Static Systems -- Microservices -- Infrastructure as Code -- Immutable Architecture -- Virtualized Systems -- Virtual Software -- Virtualized Networking -- Software-Defined Everything -- Virtualization Security Management -- Containerization -- Mobile Devices -- Mobile Device Security Features -- Mobile Device Deployment Policies -- Essential Security Protection Mechanisms -- Process Isolation -- Hardware Segmentation -- Root of Trust -- System Security Policy -- Common Security Architecture Flaws and Issues -- Covert Channels -- Attacks Based on Design or Coding Flaws -- Rootkits -- Incremental Attacks -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 10 Physical Security Requirements -- Apply Security Principles to Site and Facility Design -- Secure Facility Plan -- Site Selection -- Facility Design -- Implement Site and Facility Security Controls -- Equipment Failure -- Wiring Closets -- Server Rooms/Data Centers -- Intrusion Detection Systems -- Cameras -- Access Abuses -- Media Storage Facilities -- Evidence Storage -- Work Area Security -- Utility Considerations…”
Libro electrónico -
24834por Stolarz, Damien“…A car PC or carputer is a car tricked-out with electronics for playing radio, music and DVD movies, connecting to the Internet, navigating and tracking with satellite, taking photos, and any electronic gadget a person wants in a car. …”
Publicado 2005
Libro electrónico -
24835Publicado 2002“…These applications extend and enhance the capabilities of Geac System21 into the intranet and Internet. This book targets consultants or customers who work with these .connect applications. …”
Libro electrónico -
24836por Donahoo, Michael J.“…The Internet allows computers thousands of miles apart to exchange information through programs such as Web browsers, and nearly all of these programs gain access to network communication services through the sockets programming interface. …”
Publicado 2009
Libro electrónico -
24837por Mueller, John, 1958-Tabla de Contenidos: “…Intro -- Dedication -- Introduction -- Who Should Read This Book -- Who Should Not Read This Book -- Organization of This Book -- Free eBook Reference -- Conventions and Features in This Book -- System Requirements -- Code Samples -- Acknowledgments -- Errata & -- Book Support -- We Want to Hear from You -- Stay in Touch -- Getting to Know C# -- Obtaining and Installing Visual Studio 2010 Express -- Downloading the Products -- Installing Visual C# 2010 Express -- Installing Visual Web Developer 2010 Express -- Installing Visual Studio 2010 Service Pack 1 -- Starting Visual C# 2010 Express -- Creating the No-Code Web Browser -- Creating a New Windows Forms Application Project -- Saving Your Project -- Adding Windows Forms Controls -- Configuring the Windows Forms Controls -- Testing the Windows Forms Application -- Viewing the Web Browser Code -- Ending Your Session -- Creating the No-Code WPF Web Browser -- Starting a New WPF Application Project -- Adding WPF Controls -- Configuring the WPF Controls -- Trying the WPF Application -- Viewing the WPF Code -- Creating the No Code WPF Browser Application -- Setting Internet Explorer as the Default -- Starting a WPF Browser Application Project -- Creating the WPF Browser Application -- Adding WPF Browser Controls -- Configuring the WPF Browser Controls -- Trying the WPF Browser Application -- Viewing the WPF Browser Code -- Get Going with C# -- Developing a Web Project -- Starting Visual Web Developer 2010 Express -- Creating the No-Code Project -- Starting the New Project -- Understanding the Default Site -- Viewing the Site in a Browser -- Creating the No Code Website -- Defining a Website Location -- Adding a New Page -- Adding the Page to the Site Menu -- Trying the Site in a Browser -- Get Going with C# -- Basic Data Manipulation Techniques -- Understanding LINQ -- Creating the List Project…”
Publicado 2011
Libro electrónico -
24838por Pathak, Bharati V.Tabla de Contenidos: “…Development of the Stock Market in India -- Post-reforms Market Scenario -- Regulation of Stock Exchanges -- Organisation, Management and Membership of Stock Exchanges -- Demutualisation of Stock Exchanges -- Listing of Securities -- Central Listing Authority -- The SEBI (Central Listing Authority) Regulations, 2003 -- Risk Management -- Trading Rules and Regulations -- Circuit Breakers -- Trading Arrangements -- Trading and Settlement -- Dematerialisation of Securities -- Internet Trading -- Stock Market Index -- Methodologies for Calculating the Index -- Global Stock Market Indices -- Major Indices in India -- Stock Exchanges -- The Bombay Stock Exchange -- BSE Milestones -- Carry Forward Deals, or Badla -- Badla Mechanism -- Advantages -- Listing Categories -- BSE Indices -- Trends in Turnover on the BSE -- Conclusion -- The National Stock Exchange of India -- Membership Pattern on the NSE -- Indices -- National Securities Clearing Corporation Limited -- Margin Requirements -- Capital Market Segment of the NSE -- Conclusion -- The Over the Counter Exchange of India (OTCEI) -- Trading Documents on the OTCEI -- Advantages of OTCEI -- Steps to Improve Turnover on the OTCEI -- Conclusion -- The Inter-Connected Stock Exchange of India LTD -- Regional Stock Exchanges -- Indo Next -- Measures to Boost Liquidity in the Secondary Market -- Investment by Foreign Institutional Investors in the Indian Stock Market -- Depositories -- Buy Back of Shares -- Conclusion -- Market Making System -- Stock Lending and Borrowing (SLB) -- Conclusion -- Rolling Settlement -- Conclusion -- Straight Through Processing (STP) -- Margin Trading -- Conclusion -- Impact of Reforms and Measures on Secondary Market Activities -- Conclusion -- Key Terms -- Summary -- Review Questions -- References -- Chapter 9: The Derivatives Market -- Introduction…”
Publicado 2010
Libro electrónico -
24839Publicado 2009Tabla de Contenidos: “…Chapter 5: Human Development: Health and Education -- Introduction -- Health -- Education -- Conclusion -- Suggested Readings -- Questions -- Chapter 6: Science and Technology Policy: IT and Social Change -- A Historical Background -- Science and Technology: The Post-Independence Period -- Agricultural Research -- Meteorological Services -- Atomic Energy -- The Indian Space Programme10 -- Information Technology and its implications -- Background -- Information Technology: The Growth Story -- Telephone Sector -- The Internet -- E-Commerce: Applying IT to Trade and Commerce -- E-Governance: Applying IT to Governance -- Information Technology and the Law -- Information Technology, Development and Democracy -- Conclusion -- Suggested Readings -- Questions -- Part II: Society -- Chapter 7: The Changing Social Structure in Contemporary India -- Caste in the Colonial Period -- What is an Indian Social Structure? …”
Libro electrónico -
24840Publicado 2017Tabla de Contenidos:Libro electrónico