Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,829
- Engineering & Applied Sciences 800
- Computer networks 610
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 340
- Electrical & Computer Engineering 330
- Computer security 324
- Internet of things 317
- Telecommunications 317
- Web site development 314
- Operating systems (Computers) 312
- Management 304
- Marketing 298
- Web sites 274
- Universidad Pontificia de Salamanca (España) 265
- Aspectos sociales 251
- Design 246
- Social aspects 244
- Information technology 242
- Comercio electrónico 228
- Data processing 225
- Marketing en Internet 211
- Diseases 210
- Medios de comunicación social 206
-
24901Publicado 2012Tabla de Contenidos: “…Configure the Wireless Access Point -- Configure the Wireless Client -- Troubleshooting PEAP Authentication -- Troubleshooting RADIUS Authentication -- Bad RADIUS Authenticator -- Client Access Denied -- When All Else Fails -- Securing Your Wireless Network -- Segmenting Wireless Networks -- Restricting Users -- Restricting Time -- Restricting Network Subnets and TCP Ports -- Internal DMZ -- Multiple Wireless Networks (SSIDs) -- Remote Wireless Networks -- We've Covered -- Configuring a WPA2-Enterprise network with PEAP authentication -- Configure the Microsoft Windows 2008 Network Policy Server -- Strategies for segmenting wireless networks -- Chapter 10: Handling Wireless Guest Access -- We'll Cover -- Guest Networks and Internet Access -- Authenticating Guest Users and Managing Guest Credentials -- Using Captive Web Portals -- Guest Users Only -- Encrypting Traffic -- Using Auto-Expiring Credentials -- Allowing Secure Access to Internal Resources -- Authenticating Consultants -- Segmenting Guest Wireless Networks from Internal Networks -- DMZ with Jump Stations -- Virtual Private Networking -- VPN Options for Wireless Networks -- We've Covered -- Authenticating guest users and managing guest credentials -- Using captive web portals -- Segmenting guest wireless networks from internal networks -- Allowing secure access to internal resources -- Chapter 11: Handling Rogue Access Points and the Future of Wireless Security -- We'll Cover -- Handling Rogue Access Points -- Preventing Rogue Wireless Networks -- 802.1x Port-Based Access Control -- Network Access Control -- Port Security -- Manually Detecting Rogue Wireless Networks -- Tracing Malicious Rogue Access Points -- Handling Rogue Access Points -- Automated Detection of Rogue Wireless Networks -- Other Wireless Technologies -- Next-Gen Solutions -- Lightweight Wireless Solutions…”
Libro electrónico -
24902Publicado 2022Tabla de Contenidos: “…8.2.1 Solar-Powered Wheelchair -- 8.2.2 Solar Energy Module -- 8.3 Smart EMG-Based Wheelchair Control System -- 8.3.1 Techniques of EMG Signal Collection -- 8.3.2 Pre-Possessing and Segmentation of EMG Signal -- 8.3.3 Feature Extraction and Pattern Classification -- 8.4 Smart Navigation Assistance -- 8.5 Internet of Things (IoT)-Enabled Monitoring -- 8.6 Future Advancements in Smart Wheelchairs -- References -- 9 Hand-Talk Assistance: An Applicationfor Hearing and Speech Impaired People -- 9.1 Introduction -- 9.1.1 Sign Language -- 9.1.2 Recognition of Hand Gesture -- 9.1.3 Different Techniques for Sign Language Detection -- 9.2 Related Work -- 9.3 History and Motivation -- 9.4 Types of Sensors -- 9.4.1 Flex Sensor -- 9.5 Working of Glove -- 9.5.1 Hand Gloves -- 9.5.2 Implementation Details at Server Side -- 9.6 Architecture -- 9.7 Advantages and Applications -- References -- 10 The Effective Practice of AssistiveTechnology to Boom Total Communication Among ChildrenWith Hearing Impairment inInclusive Classroom Settings -- 10.1 Introduction -- 10.2 Students With Hearing Impairment -- 10.3 The Classifications on Hearing Impairment -- 10.3.1 Conductive Hearing Losses -- 10.3.2 Sensorineural Hearing Losses -- 10.3.3 Central Hearing Losses -- 10.3.4 Mixed Hearing Losses -- 10.4 Inclusion of Hearing-Impaired Students in Inclusive Classrooms -- 10.4.1 Assistive Technology -- 10.4.2 Assistive Technology for Hearing Impairments -- 10.4.3 Hearing Technology -- 10.4.4 Assistive Listening Devices -- 10.4.5 Personal Amplification -- 10.4.6 Communication Supports -- 10.5 Total Communication System for HearingImpairments -- 10.6 Conclusion -- References -- Index -- EULA…”
Libro electrónico -
24903Publicado 2022Tabla de Contenidos: “…Chapter 10 Discovering Graph Secrets -- Envisioning Social Networks as Graphs -- Clustering networks in groups -- Discovering communities -- Navigating a Graph -- Counting the degrees of separation -- Walking a graph randomly -- Chapter 11 Getting the Right Web page -- Finding the World in a Search Engine -- Searching the Internet for data -- Considering how to find the right data -- Explaining the PageRank Algorithm -- Understanding the reasoning behind the PageRank algorithm -- Explaining the nuts and bolts of PageRank -- Implementing PageRank -- Implementing a Python script -- Struggling with a naive implementation -- Introducing boredom and teleporting -- Looking inside the life of a search engine -- Considering other uses of PageRank -- Going Beyond the PageRank Paradigm -- Introducing semantic queries -- Using AI for ranking search results -- Part 4 Wrangling Big Data -- Chapter 12 Managing Big Data -- Transforming Power into Data -- Understanding Moore's implications -- Finding data everywhere -- Getting algorithms into business -- Streaming Flows of Data -- Analyzing streams with the right recipe -- Reserving the right data -- Sketching an Answer from Stream Data -- Filtering stream elements by heart -- Demonstrating the Bloom filter -- Finding the number of distinct elements -- Learning to count objects in a stream -- Chapter 13 Parallelizing Operations -- Managing Immense Amounts of Data -- Understanding the parallel paradigm -- Distributing files and operations -- Employing the MapReduce solution -- Working Out Algorithms for MapReduce -- Setting up a MapReduce simulation -- Inquiring by mapping -- Chapter 14 Compressing and Concealing Data -- Making Data Smaller -- Understanding encoding -- Considering the effects of compression -- Choosing a particular kind of compression -- Choosing your encoding wisely…”
Libro electrónico -
24904Publicado 2023Tabla de Contenidos: “…Chapter 13: Industrial Network and Communication Protocols Fundamentals -- Understanding industrial networks -- Understanding network topology -- Network media - wired and wireless (Bluetooth, Wi-Fi, and cellular communication - 1G, 2G, 3G, 4G, and 5G) -- Network connectors and other network components -- Understanding network protocols -- Wired network protocols -- Wireless network protocols -- Common industrial network protocol - Foundation Fieldbus -- Common industrial network protocol - PROFIBUS -- Common industrial network protocol - Modbus -- Modbus Remote Terminal Unit (RTU) -- Modbus Transmission Control Protocol/Internet Protocol (TCP/IP) -- Common industrial network protocol - HART -- Common industrial network protocol - PROFINET -- Summary -- Questions -- Chapter 14: Exploring Smart Factory (Industry 4.0) with 5G -- Understanding Industry 4.0 -- Exploring the key technologies in Industry 4.0 -- The benefits of Industry 4.0 -- Basic steps for building a smart factory -- The benefits of a 5G-enabled smart factory -- Connecting your PLC or machine data to the cloud -- Summary -- Questions -- Assessments -- Index -- Other Books You May Enjoy…”
Libro electrónico -
24905por Barrett, JoanTabla de Contenidos: “…Topologies overview -- 1.1 Topology components and relationships -- 1.1.1 Access to the Internet -- 1.1.2 Firewall -- 1.1.3 Load balancer -- 1.1.4 Reverse proxy -- 1.1.5 Web server -- 1.1.6 Application server -- 1.1.7 LDAP server -- 1.1.8 Database -- 1.1.9 Network -- 1.2 WebSphere Application Server terminology -- 1.2.1 Application server node -- 1.2.2 Deployment manager -- 1.2.3 Node agent -- 1.2.4 WebSphere profile -- 1.2.5 Managed node -- 1.2.6 Web server managed node -- 1.2.7 Web server unmanaged node -- 1.2.8 Cell -- 1.2.9 Cluster -- 1.2.10 High Availability Manager -- 1.3 From the basic to the most sophisticated topologies -- 1.3.1 Single machine, single node, one application server topology -- 1.3.2 Web server separated topology -- 1.3.3 Reverse proxy topology -- 1.3.4 Vertical scaling topology -- 1.3.5 Horizontal scaling topology -- 1.3.6 Horizontal scaling with IP sprayer topology -- 1.3.7 Topology with redundancy of several components -- Chapter 2. …”
Publicado 2005
Libro electrónico -
24906por Wahli, UeliTabla de Contenidos: “…JSR 101: Java APIs for XML-based RPC (JAX-RPC) -- JSR 109: Implementing Enterprise Web Services -- JSR 31: Java Architecture for XML Data Binding (JAXB) -- JSR 67: Java APIs for XML Messaging 1.0 (JAXM) -- JSR 93: Java API for XML Registries 1.0 (JAXR) -- JSR 110: Java APIs for WSDL (WSDL4J) -- JSR 172: J2ME Web Services -- JSR 173: Streaming API for XML -- JSR 181: Web Services Metadata for the Java Platform -- JSR 208: Java Business Integration (JBI) -- JSR 222: Java Architecture for XML Binding (JAXB) 2.0 -- JSR 224: Java API for XML-based RPC (JAX-RPC) 2.0 -- JSR 921: Implementing Enterprise Web Services 1.1 -- Web services organizations and groups -- Internet Engineering Task Force -- Java Community Process -- OASIS -- World Wide Web Consortium -- Web Services Interoperability Organization -- UDDI -- Companies working on Web services -- IBM -- Microsoft -- Vertical industry standards organizations -- Summary -- More information -- Chapter 3. …”
Publicado 2005
Libro electrónico -
24907por Massou, LucTabla de Contenidos: “…Metaphor as a framework for action: involvement of the Internet user and a sense of transparency -- 7.4. Conclusion -- 7.5. …”
Publicado 2024
Libro electrónico -
24908Publicado 2023Tabla de Contenidos: “…Front Cover -- Designing Smart Manufacturing Systems -- Copyright -- Contents -- Contributors -- Part I Smart manufacturing design -- 1 Cloud manufacturing implementation for smart manufacturing networks -- 1.1 Introduction -- 1.2 Cloud manufacturing -- 1.3 CMfg approach for smart manufacturing networks -- Database module -- Intelligent assessment and optimization module -- Functional compatibility engine -- Intelligent optimization engine -- Decision-making module -- Supplier decision-making engine -- Customer decision-making engine -- 1.4 Cloud manufacturing platform implementation -- 1.5 Intelligent recommendation system -- 1.6 Recommendation system implementation -- Customer profiling -- Intelligent regression -- Evaluation and discussion -- 1.7 Conclusions -- References -- 2 Improving Brazilian Engineering Education: real engineering challenges in an IIoT undergraduate course -- Introduction -- Modernization of Engineering Education in Brazil -- Real-world research problem -- The Industrial Internet-of-Things course -- Challenge-based learning and CDIO frameworks as integrated active learning methodologies -- The assessment tools for projects -- Presentation rubric -- Peer assessment rubrics -- CDIO rubrics -- Ethics and privacy rubric -- The scenario for application of integrated active learning methodologies -- Results -- Final remarks -- Acknowledgment -- References -- Part II Industry 4.0 information technology developments -- 3 New verification and validation tools for Industry 4.0 software -- 3.1 Introduction -- 3.2 Background in software testing -- 3.2.1 Software testing in Industry 4.0 -- 3.3 MSS-based testing -- 3.4 TAPIR -- 3.4.1 Aspect-Oriented Programming -- 3.4.2 Framework design, implementation, and operation -- Design -- Implementation -- Operation -- 3.4.3 Coverage criteria -- Coverage criteria for valid sequences…”
Libro electrónico -
24909por Mishra, Brojo KishoreTabla de Contenidos: “…7.1 Introduction -- 7.2 Literature Review -- 7.2.1 Psychology -- 7.2.2 Chess and Academic and Non-Academic Skills -- 7.2.3 Insights -- 7.2.4 Impacts of Tangible Interfaces in Gaming -- 7.2.5 Related Work -- 7.2.6 Competitive Analysis -- 7.3 Methodology -- 7.4 Design Intervention -- 7.5 Proposed Solution: IoT Integrated Tangible Chessboard -- 7.5.1 Experimental Setup -- 7.5.2 Algorithm -- 7.6 User Testing and Validation -- 7.7 Conclusion -- References -- 8 Intelligent Systems and Robotics for Wastewater Management Across India: A Study and Analysis -- 8.1 Introduction -- 8.2 Relevant Work -- 8.3 Theoretical Framework -- 8.3.1 Intelligent Systems -- 8.3.2 Artificial Neural Network -- 8.3.3 Genetic Algorithm -- 8.3.4 Fuzzy Logic -- 8.3.5 Machine Learning -- 8.3.6 Deep Learning -- 8.3.7 Data Analytics -- 8.4 Proposed Methodology -- 8.5 Industrial Waste -- 8.6 Robot Design Using Intelligent Systems -- 8.7 Conclusion -- References -- Chapter 9 Text-Based Prediction and Classification Model of Stress, Anxiety and Depression Among Indians -- 9.1 Introduction -- 9.2 Relevant Work -- 9.3 Discussion and Results -- 9.4 Conclusion -- References -- Chapter 10 Industry 4.0: Security Challenges and Opportunities of the IIoT -- 10.1 Introduction -- 10.2 Industry 4.0 Landscape -- 10.3 Literature Survey -- 10.4 Security Requirements in IIoT -- 10.5 Measures for Implementing Cybersecurity -- 10.5.1 Category 1: Smart Factories and Supply Chains -- 10.5.2 Category 2: Stakeholders -- 10.5.3 Category 3: Internet -- 10.5.4 Fog and Edge Computing -- 10.6 Conclusion -- References -- Chapter 11 Role of Machine Learning and Deep Learning in Smart Sensors -- 11.1 Introduction -- 11.2 Smart Sensors and Their Technology -- 11.2.1 Smart Sensors and Their Functionalities -- 11.2.2 Micro-Electromechanical Systems -- 11.2.3 Wireless Sensor Networks -- 11.3 Artificial Intelligence…”
Publicado 2024
Libro electrónico -
24910Publicado 2024Tabla de Contenidos: “…-- Cloud technologies -- The internet of things -- Machine learning -- What does this mean for automation engineering? …”
Libro electrónico -
24911Publicado 2020Tabla de Contenidos: “…APLICACIONES DE LA FIBRA ÓPTICA -- 10.16.1. INTERNET -- 10.16.2. REDES -- 10.16.3. TELEFONÍA -- 10.16.4. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
24912por Cattini, RolandTabla de Contenidos: “…6.4.7 Erweiterungskarten -- 6.5 Fragen zu diesem Kapitel -- Kapitel 7: Der TCP/IP-Stack -- 7.1 Das Modell und die Praxis -- 7.1.1 Vergleich OSI-Modell mit dem DOD-4-Modell -- 7.1.2 Der Aufbau der Adressierung -- 7.2 Die Grundlagen der IP-Adressierung -- 7.2.1 CIDR statt Adressklassen -- 7.2.2 Private Netzwerke unter IPv4 -- 7.2.3 Ausnahmen und besondere Adressen -- 7.2.4 Der IPv4-Header -- 7.3 IPv6 -- 7.3.1 Der Header von IPv6 -- 7.3.2 Spezielle Adressen unter IPv6 -- 7.4 Subnettierung von Netzen -- 7.5 Weitere Protokolle auf dem IP-Layer -- 7.5.1 ICMP und IGMP -- 7.5.2 ARP -- 7.6 TCP und UDP -- 7.7 Die Geschichte mit den Ports -- 7.8 Fragen zu diesem Kapitel -- Kapitel 8: Serverrollen -- 8.1 Dienste und Rollen -- 8.2 Datei- und Druckdienste -- 8.2.1 Dateidienste verwaltet der Fileserver -- 8.2.2 Printserver verwalten Drucker und ihre Aufträge -- 8.3 Internetdienste -- 8.3.1 Webserver -- 8.3.2 FTP-Server -- 8.4 Netzwerkdienste -- 8.4.1 DNS-Server -- 8.4.2 DHCP-Server -- 8.4.3 Zeitsynchronisationsserver -- 8.4.4 Überwachungsserver -- 8.4.5 Server mit Fernzugriff (RAS-Server) -- 8.4.6 VPN unter Linux -- 8.5 Messaging-Server (Mailserver) -- 8.5.1 Posteingangsdienste (Postfachzugriff) -- 8.5.2 Postausgangsdienst und Mailtransfer -- 8.5.3 Unix- und Linux-Mailserver -- 8.5.4 Die kommerziellen Server -- 8.5.5 Webmail -- 8.5.6 Cloud-Systeme -- 8.6 Sicherheits- und Authentifizierungsdienste -- 8.6.1 Domänen-Controller -- 8.6.2 Certificate Authorities (CA) -- 8.6.3 Rights-Management-Server -- 8.7 Anwendungsserver -- 8.7.1 Datenbankserver -- 8.7.2 Anwendungsserver -- 8.7.3 Anwendungsarchitekturen -- 8.8 Internet, Intranet und Extranet -- 8.8.1 Internet -- 8.8.2 Intranet -- 8.8.3 Extranet -- 8.9 Fragen zu diesem Kapitel -- Kapitel 9: Installation von Netzwerkbetriebssystemen -- 9.1 Übersicht zu Netzwerkbetriebssystemen…”
Publicado 2022
Libro electrónico -
24913por Pascual, FranciscoTabla de Contenidos: “…5.10 PROTECCIÓN DE DATOS -- 5.11 COMPARTIR LIBROS -- 5.12 ORDENACIONES -- 5.13 AUTOCALCULAR -- 5.14 HERRAMIENTAS PARA EL EURO -- 5.15 CARACTERES ESPECIALES Y SÍMBOLOS -- 5.16 TEXTO EN COLUMNAS -- 5.17 AGRUPAR CELDAS Y ESQUEMAS -- 5.18 SUBTOTALES -- 5.19 AÑADIR IMÁGENES -- 5.20 EDITAR IMÁGENES -- 5.21 DIBUJAR -- 5.21.1 Seleccionar figuras -- 5.21.2 Mover figuras -- 5.22 WORDART -- 5.23 DIAGRAMAS SMARTART -- 5.24 CAPTURAS -- 5.25 PERSONALIZAR LA CINTA DE OPCIONES -- 5.26 BARRA DE HERRAMIENTAS DE ACCESO RÁPIDO -- 5.26.1 Agregar y eliminar botones a la barra -- 5.27 EJERCICIOS -- 5.27.1 Comentarios -- 5.27.2 Insertar y eliminar celdas -- 5.27.3 Añadir y eliminar hojas -- 5.27.4 Desarrollo de un libro con varias hojas -- 5.27.5 Protección de datos -- 5.27.6 Protección de datos II -- 5.27.7 Ordenaciones -- 5.27.8 Rótulos -- 6 FUNCIONES CON EXCEL -- 6.1 TRATAMIENTO DE LAS FUNCIONES -- 6.1.1 Rangos en las funciones -- 6.2 FUNCIONES MATEMÁTICAS -- 6.3 FUNCIONES DE FECHA Y HORA -- 6.4 FUNCIONES DE TEXTO -- 6.5 FUNCIONES LÓGICAS Y DE INFORMACIÓN -- 6.6 EJERCICIOS -- 6.6.1 Aplicación de funciones -- 6.6.2 Hotel -- 7 GRÁFICOS MATEMÁTICOS -- 7.1 CREACIÓN DE UN GRÁFICO -- 7.2 EDICIÓN DE GRÁFICOS -- 7.3 LOS ELEMENTOS DEL GRÁFICO -- 7.3.1 Relleno -- 7.3.2 Color de borde -- 7.3.3 Sombra -- 7.3.4 Iluminado y bordes suaves -- 7.3.5 Bordes suaves -- 7.3.6 Formato 3D -- 7.3.7 Giro 3D -- 7.3.8 Efectos artísticos -- 7.3.9 Correcciones de imágenes -- 7.3.10 Color de imagen -- 7.3.11 Recortar -- 7.3.12 Tamaño -- 7.3.13 Propiedades -- 7.3.14 Cuadro de texto -- 7.3.15 Texto alternativo -- 7.4 EJERCICIOS -- 7.4.1 Gráfico para Notas de un alumno -- 7.4.2 Gráfico para Gastos -- 8 TRABAJO SENCILLO CON BASES DE DATOS -- 8.1 ORDENACIÓN Y FILTROS -- 8.1.1 Filtros avanzados -- 8.2 IMPORTAR BASES DE DATOS A UNA HOJA DE EXCEL -- 8.3 FUNCIONES DE BASE DE DATOS -- 8.4 CONSULTAS EN INTERNET…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
24914por González de Audikana, ManuelTabla de Contenidos: “…Influencia del ingreso en los PCPI en el consumo de drogas -- Conclusiones y limitaciones -- Bibliografía -- Capítulo 6 - La prevención en el juego de azar -- Juan José Lamas Alonso -- Introducción -- Juego de azar -- El juego en España -- Tipos de juegos en España -- Gasto en juegos legales -- Panorama actual del juego en España -- Juego online -- Publicidad -- Programa de prevención -- Capítulo 7 - El uso excesivo del juego online a través de la línea de ayuda de IS4K -- Cristina Gutiérrez Borge -- Preparados, listos¡a jugar! -- Juegos en Internet ¿todo bajo control? -- IS4K y la percepción sobre uso excesivo…”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
24915Publicado 2010Tabla de Contenidos: “…CIENTÍFICO -- G) RESEÑA -- H) INTERNET -- I) WWW -- AUTOEVALUACIÓN…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
24916Publicado 2022Tabla de Contenidos: “…APRENDIZAJE Y VIVENCIAS EN MOMENTOS DIFÍCILES POR LA COVID-19 -- CAPÍTULO 39 EL PROYECTO LA ESCUELA RURAL COMO SERVICIO BÁSICO PARA LA EQUIDAD SOCIAL Y TERRITORIAL: DISEÑO Y VALIDACIÓN DEL CUESTIONARIO ESCUELA RURAL, TERRITORIO Y ADMINISTRACIONES LOCALES #ERTAL -- CAPÍTULO 40 FACTORES DETERMINANTES DE LIDERAZGO DIRECTIVO EN EL CONTEXTO ESCOLAR -- CAPÍTULO 41 BRUNO MARS AND BODY PERCUSSION: CREATIVE STRATEGIES FROM NEUROMOTRICITY WITH THE BAPNE METHOD -- CAPÍTULO 42 URBAN RHYTHMS AND CREATIVITY: PROPOSALS FOR DIDACTIC INNOVATION FROM NEUROMOTRICITY THROUGH THE BAPNE METHOD -- CAPÍTULO 43 CHOCOLATE: BODY PERCUSSION AND CREATIVITY FROM THE BAPNE METHOD -- CAPÍTULO 44 BOLA CANTABILE: CREATIVE STRATEGIES FOR THE CLASSROOM FROM THE BAPNE METHOD -- CAPÍTULO 45 ESKU DANTZA: CREATIVE PROPOSAL THROUGH NEUROMOTRICITY, BAPNE METHOD -- CAPÍTULO 46 DISEÑO Y PRODUCCIÓN DE UN MOTOR TURBOFÁN DE AVIACIÓN CIVIL EN REALIDAD AUMENTADA -- CAPÍTULO 47 IDEAS PRECONCEBIDAS SOBRE EL DICCIONARIO Y SU UTILIDAD DIDÁCTICA EN FUTUROS DOCENTES -- CAPÍTULO 48 LAS ESTRATEGIAS DE PLANIFICACIÓN PARA LA MEJORA DE LA ESCRITURA EN EDUCACIÓN PRIMARIA -- CAPÍTULO 49 NAVEGA SEGUR@ EN INTERNET: UNA PROPUESTA DE INTERVENCIÓN ENFERMERA EN EL ÁMBITO EDUCATIVO -- CAPÍTULO 50 EXPERIENCIA EDUCATIVA SOBRE DROGAS EN ADOLESCENTES: EL PAPEL DE ENFERMERÍA EN EL CONTEXTO DE LA EDUCACIÓN SECUNDARIA -- CAPÍTULO 51 LA ENFERMERA COMO ACTIVO EN LA SALUD DE LOS ESCOLARES: UNA OPORTUNIDAD DE FORMACIÓN -- CAPÍTULO 52 LA EDUCACIÓN EMOCIONAL DE LOS NIÑOS/AS: UNA INTERVENCIÓN FORMATIVA DE LA ENFERMERA EN EL ÁMBITO ESCOLAR -- Back Matter…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
24917Publicado 2017Tabla de Contenidos: “…Advanced Design and Manufacturing -- Based On the Test Track Minimum Radius of Expressway Ramp / Modeling and Testing of an ICPTs Used in Dynamic Balancing Device / Study on the Coordination Principle of Innovative Manufacturing Elements Based on Internet plus / Design of a Semi-active Heave Compensation System Combined Variable Frequency with Throttle / Design of Auxiliary Arm for High Voltage Live Working Robot / Investigation on Integrated Digital Platform of High Power Converter with Power Factor Correction for Formed Aluminium Foil / Thermal-mechanical Coupling Analysis of Screw Discharge Machine Based on ANSYS / Improved XY-axis Calibration Based on Bilinear Interpolation / Research of E36 Steel Welding Process for Jinzhou 9-3 Offshore Platform / Finite Element Analysis and Optimum Design of a Video Laryngoscope / An Instrumented Glove for Real Time Feedback on Hand Gripping Pressure and Bending a Pilot Study / Optimization of Crank Mechanism of Multifunctional Nursing Bed Based on ADAMS / Research on the Mechanism of Industry Integration between Shaanxi Advanced Manufacturing and Modern Service Industry / Session 10. …”
Libro electrónico -
24918Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Industrial Control Systems -- An overview of an Industrial control system -- The view function -- The monitor function -- The control function -- The Industrial control system architecture -- Programmable logic controllers -- Human Machine Interface -- Supervisory Control and Data Acquisition -- Distributed control system -- Safety instrumented system -- The Purdue model for Industrial control systems -- The enterprise zone -- Level 5 - Enterprise network -- Level 4 - Site business planning and logistics -- Industrial Demilitarized Zone -- The manufacturing zone -- Level 3 - Site operations -- Level 2 - Area supervisory control -- Level 1 - Basic control -- Level 0 - Process -- Industrial control system communication media and protocols -- Regular information technology network protocols -- Process automation protocols -- Industrial control system protocols -- Building automation protocols -- Automatic meter reading protocols -- Communication protocols in the enterprise zone -- Communication protocols in the Industrial zone -- Summary -- Chapter 2: Insecure by Inheritance -- Industrial control system history -- Modbus and Modbus TCP/IP -- Breaking Modbus -- Using Python and Scapy to communicate over Modbus -- Replaying captured Modbus packets -- PROFINET -- PROFINET& -- #160 -- packet replay attacks -- S7 communication and the stop CPU vulnerability -- EtherNet/IP and the Common Industrial Protocol -- Shodan: The scariest search engine on the internet -- Common IT protocols found in the ICS -- HTTP -- & -- #160 -- File Transfer Protocol -- Telnet -- Address Resolution Protocol -- ICMP echo request -- Summary -- Chapter 3: Anatomy of an ICS Attack Scenario -- Setting the stage…”
Libro electrónico -
24919por OECDTabla de Contenidos: “…Regulatory challenges brought by technologies and business models for smart logistics -- Introduction -- Smart logistics overview -- Concepts and key technologies of smart logistics -- Artificial intelligence (AI) -- Robotics -- Augmented reality -- Big data analysis -- Internet of Things -- Virtual reality -- Drones -- Blockchain -- Market outlook for smart logistics -- Market outlook for AGVs -- Global market size for commercial drones -- Emerging topics in smart logistics…”
Publicado 2021
Libro electrónico -
24920Publicado 2017Tabla de Contenidos: “…. -- See also -- Microsoft Internet Explorer and Microsoft Edge analysis with Belkasoft Evidence Center -- Getting ready -- How to do it... -- How it works... -- See also -- Extracting web browser data from Pagefile.sys -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 9: Email and Instant Messaging Forensics -- Introduction -- Outlook mailbox parsing with Intella -- Getting ready -- How to do it... -- How it works... -- See also -- Thunderbird mailbox parsing with Autopsy -- Getting ready -- How to do it... -- How it works... -- See also -- Webmail analysis with Magnet AXIOM -- Getting ready -- How to do it... -- How it works... -- See also -- Skype forensics with Belkasoft Evidence Center -- Getting ready -- How to do it... -- How it works... -- See also -- Skype forensics with SkypeLogView -- Getting ready…”
Libro electrónico