Mostrando 25,001 - 25,020 Resultados de 25,897 Para Buscar '"internet"', tiempo de consulta: 0.22s Limitar resultados
  1. 25001
    Publicado 2014
    Tabla de Contenidos: “…Preface xv -- Acknowledgments xxi -- Contributors xxiii -- PART I CDN AND MEDIA STREAMING BASICS 1 -- 1 CLOUD-BASED CONTENT DELIVERY AND STREAMING 3 /Mukaddim Pathan -- 1.1 Introduction 3 -- 1.2 CDN Overview 5 -- 1.3 Workings of a CDN 10 -- 1.4 CDN Trends 21 -- 1.5 Research Issues 28 -- 1.6 Conclusion 29 -- References 29 -- 2 LIVE STREAMING ECOSYSTEMS 33 /Dom Robinson -- 2.1 Introduction 33 -- 2.2 Live Streaming Pre-Evolution 34 -- 2.3 Live, Linear, Nonlinear 35 -- 2.4 Media Streaming 37 -- 2.5 Related Network Models 38 -- 2.6 Streaming Protocol Success 43 -- 2.7 Platform Divergence and Codec Convergence 44 -- 2.8 Adaptive Bitrate (ABR) Streaming 45 -- 2.9 Internet Radio and HTTP 48 -- 2.10 Conclusion 48 -- References 49 -- 3 PRACTICAL SYSTEMS FOR LIVE STREAMING 51 /Dom Robinson -- 3.1 Introduction 51 -- 3.2 Common Concepts in Live Streaming 52 -- 3.3 The Practicals 56 -- 3.4 Conclusion 69 -- References 70 -- 4 EFFICIENCY OF CACHING AND CONTENT DELIVERY IN BROADBAND ACCESS NETWORKS 71 /Gerhard Haslinger -- 4.1 Introduction 71 -- 4.2 Options and Properties for Web Caching 73 -- 4.3 Zipf Laws for Requests to Popular Content 75 -- 4.4 Efficiency and Performance Modeling for Caches 76 -- 4.5 Effect of Replacement Strategies on Cache Hit Rates 78 -- 4.6 Replacement Methods Based on Request Statistics 81 -- 4.7 Global CDN and P2P Overlays for Content Delivery 84 -- 4.8 Summary and Conclusion 86 -- Acknowledgments 87 -- References 87 -- 5 ANYCAST REQUEST ROUTING FOR CONTENT DELIVERY NETWORKS 91 /Hussein A. …”
    Libro electrónico
  2. 25002
    Publicado 2005
    Tabla de Contenidos: “…Building the claims scenario -- 12.1 Building the scenario for WebSphere -- 12.1.1 Problem definition -- 12.1.2 Solution -- 12.1.3 Import Enterprise JavaBeans -- 12.1.4 Test imported Enterprise JavaBeans -- 12.1.5 Create a Web service from Enterprise JavaBeans -- 12.1.6 Test the created Web service -- 12.1.7 Deploy the created Web service -- 12.2 Building the scenario for Windows Server 2003 -- 12.2.1 Prerequisites to run the Web service application -- 12.2.2 Create the Web Service -- 12.2.3 Import the existing classes -- 12.2.4 Build the Web service -- 12.2.5 Microsoft Internet Information Services (IIS) -- 12.2.6 Create Microsoft .Net Test Client -- 12.2.7 Summary -- 12.3 Building the Web services clients -- 12.3.1 Web service client for the WebSphere Web service -- 12.3.2 Web service client for the Microsoft .Net Web service -- 12.3.3 Microsoft .Net -- 12.3.4 Differences between the two Web services and conclusions -- Chapter 13. …”
    Libro electrónico
  3. 25003
    Publicado 2023
    “…The chapters herein cover scientific advancements across a diversified spectrum that includes differential as well as integral equations with applications, computational fluid dynamics, nanofluids, network theory and optimization, control theory, machine learning and artificial intelligence, big data analytics, Internet of Things, cryptography, fuzzy automata, statistics, and many more. …”
    Libro electrónico
  4. 25004
    por Sountharrajan, S.
    Publicado 2023
    Tabla de Contenidos: “…3.6.1 Attacks in Physical Layer -- 3.6.2 Attacks in Data Link Layer -- 3.6.3 Attacks in Network Layer -- 3.6.4 Attacks in Transport Layer -- 3.6.5 Attacks in Application Layer -- 3.7 Security Models -- 3.7.1 Bio-Inspired Trust and Reputation Model -- 3.7.2 Peer Trust System -- 3.8 Case Study: Healthcare -- 3.8.1 Security Risks in Healthcare -- 3.8.2 Prevention from Security Attacks in Healthcare -- 3.9 Minimize the Risks in a Wireless Environment -- 3.9.1 Generate Strong Passwords -- 3.9.2 Change Default Wi-Fi Username and Password -- 3.9.3 Use Updated Antivirus -- 3.9.4 Send Confidential Files with Passwords -- 3.9.5 Detect the Intruders -- 3.9.6 Encrypt Network -- 3.9.7 Avoid Sharing Files Through Public Wi-Fi -- 3.9.8 Provide Access to Authorized Users -- 3.9.9 Used a Wireless Controller -- 3.10 Conclusion -- References -- Chapter 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 -- 4.1 Introduction -- 4.1.1 Software-Defined Network -- 4.1.2 Types of Attacks -- 4.1.2.1 Denial of Services -- 4.1.2.2 Distributed Denial of Service -- 4.2 Related Works -- 4.3 Proposed Work for Threat Detection and Security Analysis -- 4.3.1 Traffic Collection -- 4.3.1.1 Data Flow Monitoring and Data Collection -- 4.3.1.2 Purpose of Data Flow Monitoring and Data Collection -- 4.3.1.3 Types of Collection -- 4.3.2 Feature Selection Using Entropy -- 4.3.3 Malicious Traffic Detection -- 4.3.3.1 Framing of the Expected Traffic Status -- 4.3.3.2 Traffic Filtering Using Regression -- 4.3.4 Traffic Mitigation -- 4.4 Implementation and Results -- 4.5 Conclusion -- References -- Chapter 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques -- 5.1 Introduction -- 5.2 System Architecture -- 5.3 Literature Review -- 5.4 Proposed Methodology…”
    Libro electrónico
  5. 25005
    por Umamaheswari, K.
    Publicado 2023
    “…With the advent of recent technologies, the demand for Information and Communication Technology (ICT)-based applications such as artificial intelligence (AI), machine learning (ML), Internet of Things (IoT), health care, data analytics, augmented reality/virtual reality, cyber-physical systems, and future generation networks, has increased drastically. …”
    Libro electrónico
  6. 25006
    Publicado 2018
    Tabla de Contenidos: “…-- Getting cozy with Python in your Kali environment -- Introducing Vim with Python syntax awareness -- Python network analysis -- Python modules for networking -- Building a Python client -- Building a Python server -- Building a Python reverse shell script -- Antimalware evasion in Python -- Creating Windows executables of your Python scripts -- Preparing your raw payload -- Writing your payload retrieval and delivery in Python -- Python and Scapy - a classy pair -- Revisiting ARP poisoning with Python and Scapy -- Summary -- Questions -- Further reading -- Chapter 10: Windows Shellcoding -- Technical requirements -- Taking out the guesswork - heap spraying -- Memory allocation - stack versus heap -- Shellcode whac-a-mole - heap spraying fundamentals -- Shellcode generation for the Java vulnerability -- Creating the malicious website to exploit Java -- Debugging Internet Explorer with WinDbg -- Examining memory after spraying the heap -- Fine-tuning your attack and getting a shell -- Understanding Metasploit shellcode delivery -- Encoder theory and techniques - what encoding is and isn't -- Windows binary disassembly within Kali -- Injection with Backdoor Factory…”
    Libro electrónico
  7. 25007
    Tabla de Contenidos: “…Le rôle des médias -- a) Liberté d'expression -- b) Accès à l'information -- c) Utilisation d'Internet comme outil de communication -- 4. Principales tendances et principaux domaines à améliorer -- Notes -- Chapitre 6. …”
    Libro electrónico
  8. 25008
    Publicado 2017
    Tabla de Contenidos: “…. -- CIDR notation -- Scanning random targets on the Internet -- How to do it... -- How it works... -- There's more... -- Legal issues with port scanning -- Collecting signatures of web servers -- How to do it... -- How it works... -- There's more…”
    Libro electrónico
  9. 25009
    por Rybaric, Robert
    Publicado 2023
    Tabla de Contenidos: “…ALM strategy -- Establishing Azure DevOps -- Using Power Platform solutions -- Using Power BI ALM -- Other ALM decisions -- Summary -- Section III: The Implementation -- Chapter 6: Implementation Approach and Methodologies -- Contoso Inc. preparing the implementation project -- Getting an overview of the implementation approach -- Understanding customer enterprise architecture and environment -- Data residency requirements -- Authentication providers -- Internet restrictions -- Data protection requirements -- Learning about project implementation methodologies and tools -- Understanding programs and projects -- Understanding project implementation methodologies -- The waterfall model…”
    Libro electrónico
  10. 25010
    Publicado 2023
    Tabla de Contenidos: “…-- Reading the exhibition bible -- Determining your space and display needs -- Figuring out your space requirements -- Choosing the location of your space -- Considering your display options -- Concerning yourself with details -- Promoting Your Exhibit -- Defining your promotional plan -- Creating a memorable message -- Choosing your promotional tools carefully -- Personal invitations -- Telemarketing -- Direct mail -- Advertising -- Public relations -- Sponsorship -- The internet -- Using giveaways effectively -- Selecting marketing collateral -- Chapter 19 Strutting Your Stuff: Exhibiting 201 -- Counting on People for Exhibit Success…”
    Libro electrónico
  11. 25011
    Tabla de Contenidos: “…VLAN Tagging Modes -- VLAN Model Topology -- L2 Quality of Service (QoS)-Prioritization Marking and Handling -- Layer 3 Transport-Routing -- Layer 3 Forwarding -- Routing Protocols -- L3 Prioritization -- Access Edge Transport Considerations -- SERVICE MODEL ARCHITECTURES -- Service Specification Methodology -- PON System Service Model Partitions -- UNI Port Interface -- ONT Data Path -- ONT Services Interfaces -- PON Link -- OLT Data Path -- SNI Port Interface -- Service Model Supporting Functions -- HIGH-SPEED DATA SERVICE MODEL -- Example Service Model Partitions -- Network Insertion Point -- Service Transport -- Service Assurance -- Trusted Interfaces -- Scalability Aspects -- Provisioning Aspects -- Service Ingress and Egress Points -- VOIP TELEPHONY SERVICE MODEL -- Network Model Partitions -- Network Insertion Point -- Service Transport -- Service Assurance -- Trusted Interfaces -- Scalability Aspects -- Provisioning Aspects -- Service Ingress and Egress Points -- IPTV SERVICE MODEL -- Network Model Partitions -- Network Insertion Point -- Service Transport -- Service Assurance -- Trusted Interfaces -- Scalability Aspects -- Provisioning Aspects -- Service Ingress and Egress Points -- RF VIDEO SERVICE MODEL -- Network Model Partitions -- Network Insertion Point -- Service Transport -- Service Assurance -- Trusted Interfaces -- Scalability Aspects -- Provisioning Aspects -- Service Ingress and Egress Points -- OVERALL SERVICE MODEL PLANNING -- CONCLUSION -- Endnotes -- 11 - Video Overview and Broadcast Video Architecture -- INTRODUCTION -- BROADCAST VERSUS IPTV -- Broadcast Video -- Internet Protocol Television -- PROGRAM AND CASH FLOW -- Broadcast Model -- Money Flows in Various Ways -- Cable TV Model -- HOW DO YOU GET PROGRAMMING? …”
    Libro electrónico
  12. 25012
    Publicado 2017
    Tabla de Contenidos: “…Sampling by time window -- Extracting audio signatures -- Building a song analyzer -- Selling data science is all about selling cupcakes -- Using Cassandra -- Using the Play framework -- Building a recommender -- The PageRank algorithm -- Building a Graph of Frequency Co-occurrence -- Running PageRank -- Building personalized playlists -- Expanding our cupcake factory -- Building a playlist service -- Leveraging the Spark job server -- User interface -- Summary -- Chapter 9: News Dictionary and Real-Time Tagging System -- The mechanical Turk -- Human intelligence tasks -- Bootstrapping a classification model -- Learning from Stack Exchange -- Building text features -- Training a Naive Bayes model -- Laziness, impatience, and hubris -- Designing a Spark Streaming application -- A tale of two architectures -- The CAP theorem -- The Greeks are here to help -- Importance of the Lambda architecture -- Importance of the Kappa architecture -- Consuming data streams -- Creating a GDELT data stream -- Creating a Kafka topic -- Publishing content to a Kafka topic -- Consuming Kafka from Spark Streaming -- Creating a Twitter data stream -- Processing Twitter data -- Extracting URLs and hashtags -- Keeping popular hashtags -- Expanding shortened URLs -- Fetching HTML content -- Using Elasticsearch as a caching layer -- Classifying data -- Training a Naive Bayes model -- Thread safety -- Predict the GDELT data -- Our Twitter mechanical Turk -- Summary -- Chapter 10: Story De-duplication and Mutation -- Detecting near duplicates -- First steps with hashing -- Standing on the shoulders of the Internet giants -- Simhashing -- The hamming weight -- Detecting near duplicates in GDELT -- Indexing the GDELT database -- Persisting our RDDs -- Building a REST API -- Area of improvement -- Building stories -- Building term frequency vectors…”
    Libro electrónico
  13. 25013
    Publicado 2017
    Tabla de Contenidos: “…-- Setting up the client certificate authentication infrastructure -- Understanding the purpose of a public key infrastructure -- Creating a client certificate key pair -- Configuring the Tomcat trust store -- Configuring Tomcat in Spring Boot -- Importing the certificate key pair into a browser -- Using Firefox -- Using Chrome -- Using Internet Explorer…”
    Libro electrónico
  14. 25014
    Publicado 2018
    Tabla de Contenidos: “…-- Identifying Android malware -- Summary -- Chapter 12: Windows Phone Forensics -- Windows Phone OS -- Security model -- Chambers -- Encryption -- Capability-based model -- App sandboxing -- Windows Phone filesystem -- Data acquisition -- Commercial forensic tool acquisition methods -- Extracting data without the use of commercial tools -- SD card data extraction methods -- Key artifacts for examination -- Extracting contacts and SMS -- Extracting call history -- Extracting internet history -- Summary -- Chapter 13: Parsing Third-Party Application Files -- Third-party application overview -- Chat applications -- GPS applications -- Secure applications -- Financial applications -- Social networking applications -- Encoding versus encryption -- Application data storage -- iOS applications -- Android applications -- Windows Phone applications -- Forensic methods used to extract third-party application data -- Commercial tools -- Oxygen Detective -- Magnet IEF -- UFED Physical Analyzer -- Open source tools -- Autopsy -- Other methods of extracting application data -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  15. 25015
    Publicado 2003
    Tabla de Contenidos: “…J2EE programming model -- J2EE platform -- J2EE clients -- Web clients -- Hyper Text Transfer Protocol (HTTP) -- Hyper-Text Markup Language (HTML) -- eXtensible Markup Language (XML) -- JavaScript and document object model (DOM) -- Multipurpose Internet Mail Extensions (MIME) -- Application clients -- Web services -- J2EE roles -- J2EE application model and components -- J2EE application model -- Components -- Servlets -- Filters -- Life cycle events -- JavaServer Pages (JSPs) -- Enterprise JavaBeans (EJBs) -- Container-managed relationships (CMR) -- EJB query language (EJB QL) -- Local and remote interfaces -- J2EE packaging -- Containers -- Web container -- EJB container -- JCA container -- Application client container -- Applet container -- J2EE services -- Java Naming and Directory Interface (JNDI) -- Java Database Connectivity (JDBC) -- Java Transaction API (JTA) and Java Transaction Service (JTS) -- Isolation level -- Java Messaging Service (JMS) -- J2EE benefits -- WebSphere Application Server -- WebSphere versions -- WebSphere Application Server architecture…”
    Libro electrónico
  16. 25016
    por Adamovich, Andrey
    Publicado 2013
    Tabla de Contenidos: “…Working with Web Services in Groovy -- Introduction -- Downloading content from the Internet -- How to do it... -- How it works... -- There's more... -- See also -- Executing an HTTP GET request -- How to do it... -- How it works... -- There's more... -- See also -- Executing an HTTP POST request -- How to do it... -- How it works... -- There's more... -- See also -- Constructing and modifying complex URLs -- How to do it... -- How it works... -- See also -- Issuing a REST request and parsing a response -- Getting ready -- How to do it... -- How it works... -- See also…”
    Libro electrónico
  17. 25017
    Publicado 2018
    Tabla de Contenidos: “…. -- THTTPClient's methods which directly map HTTP verbs -- How to verify that HTTP TRACE is disabled -- Coping with the encoded internet world using System.NetEncodings -- Getting ready -- How it works... -- There's more... -- Saving space using System.Zip -- How it works... -- There's more... -- Decoupling your code using a cross-platform publish/subscribe mechanism -- Getting ready... -- How it works... -- There's more... -- Chapter 4: Going Cross-Platform with FireMonkey -- Introduction -- Giving a new appearance to the standard FireMonkey controls using styles -- Getting ready -- How to do it... -- How it works... -- See also -- Creating a styled TListBox…”
    Libro electrónico
  18. 25018
    por Ranganatham, M.
    Publicado 2005
    Tabla de Contenidos: “…Legislation Governing SEBI Functions -- Primary Market Regulation -- Issue of Shares -- Pricing by Companies Issuing Securities -- Promoters' Contribution -- Other Issue Requirements -- Pre-issue Obligations -- Contents of the Prospectus -- Post-issue Obligations -- Regulation on Employee Stock Option Scheme (ESOS)/Employee Stock Purchase Scheme (ESPS) -- Issue of Sweat Equity by a Listed Company -- Secondary Market Regulations -- Insider Trading -- Buyback of Shares -- Buyback through Tender Offer/Buyback of Odd Lot Specified Securities -- Buyback from Open Market -- Buyback through Stock Exchange -- Buyback through Book Building -- Substantial Acquisition of Shares or Voting Rights or Control in a Listed Company -- Bail out Takeovers -- Regulation for Mutual Funds -- Regulations on Derivatives Trading -- Summary -- Concepts -- Short Questions -- Essay Questions -- Appendix -- Case Study -- Chapter 4: Services of Intermediaries -- Brokers -- Sub-broker -- Dealing/Trading Member of a Derivative Segment -- Investment Management Company -- Fund Managers -- Merchant Bankers -- Issue Managements -- Advisory Services -- Financial Services -- Market Operations -- Credit Rating Agencies -- Investment Banks -- Regulatory Bodies -- Auditing Bodies -- Stock Depositories -- Technology Providers/Internet Providers -- Bandwidth Optimisation -- Scalability and Robustness of the Trading System -- Intergration with Third Party Systems -- Broadband -- Narrowband -- Electronic Communications Networks -- e-Customer Relationship Managements -- Summary -- Concepts -- Short Questions -- Essay Questions -- Appendix -- Chapter 5: Investment Opportunities -- Investment Avenues -- Corporate Securities -- Equity Shares -- Rights Issue of Equity -- Preference Shares -- Debentures and Bonds -- Depsitory Receipts (GDRs/ADRs) -- Warrants -- Derivatives -- Deposits…”
    Libro electrónico
  19. 25019
    Publicado 2013
    Tabla de Contenidos: “…Limited Warranties -- Warranty Time Limitations -- Appliance Installation Instructions -- Appliance Use and Care Manual -- Where to Get Help -- Product Recalls and the Internet -- National Appliance Service Technicians Certification (NASTeC) -- Endnotes -- Chapter 2: Safety Precautions -- Safety Procedures -- Individual Safety Precautions -- Electrical Safety Precautions -- Gas Safety Precautions -- Chemical Safety Precautions -- Appliance and Air Conditioner Safety -- Operating Safety -- Installation Safety Precautions -- Grounding of Appliances…”
    Libro electrónico
  20. 25020
    Publicado 2024
    Tabla de Contenidos: “…-- Creating a sock puppet -- Anonymizing internet-based traffic -- VPN -- Proxychains -- TOR -- Summary -- Further reading -- Chapter 5: Exploring Open-Source Intelligence -- Technical requirements -- Google hacking techniques -- Domain reconnaissance -- Collecting WHOIS data -- Performing DNS enumeration -- Exploiting DNS zone transfer -- Automation using SpiderFoot -- Sub-domain harvesting -- Enumeration with DNSMap -- Sub-domain discovery with Knockpy…”
    Libro electrónico