Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,829
- Engineering & Applied Sciences 800
- Computer networks 610
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 340
- Electrical & Computer Engineering 330
- Computer security 324
- Internet of things 317
- Telecommunications 317
- Web site development 314
- Operating systems (Computers) 312
- Management 304
- Marketing 298
- Web sites 274
- Universidad Pontificia de Salamanca (España) 265
- Aspectos sociales 251
- Design 246
- Social aspects 244
- Information technology 242
- Comercio electrónico 228
- Data processing 225
- Marketing en Internet 211
- Diseases 210
- Medios de comunicación social 206
-
25101por Guerra Soto, MarioTabla de Contenidos: “….) -- 3 INTERCONEXIÓN DE REDES -- 3.1 CONCEPTOS BÁSICOS SOBRE REDES PÚBLICAS -- 3.1.1 LÍNEAS DEDICADAS -- 3.1.3 DIAL UP -- 3.1.4 COMUNICACIONES VÍA SATÉLITE -- 3.2 REDES DEFINIDAS POR TOPOLOGÍA -- 3.2.1 TOPOLOGÍA EN BUS -- 3.2.2 TOPOLOGÍA EN ANILLO -- 3.2.3 TOPOLOGÍA EN ESTRELLA -- 3.2.4 TOPOLOGÍA PUNTO A PUNTO -- 3.2.5 TOPOLOGÍA PUNTO MULTIPUNTO (HUB AND SPOKE TOPOLOGY) -- 3.2.6 TOPOLOGÍA EN MALLA COMPLETA (FULL-MESH TOPOLOGY) -- 3.2.7 TOPOLOGÍA EN MALLA PARCIAL (PARTIAL-MESHED TOPOLOGY) -- 3.3 REDES SEGÚN SU EXTENSIÓN GEOGRÁFICA -- 3.3.1 REDES DE ÁREA LOCAL (LAN) -- 3.3.2 REDES DE ÁREA AMPLIA (WAN) -- 3.3.3 REDES CAMPUS (CAN) -- 3.3.4 REDES DE ÁREA METROPOLITANA (MAN) -- 3.3.5 REDES DE ÁREA PERSONAL (PAN) -- 3.4 REDES SEGÚN LA UBICACIÓN DE LOS RECURSOS -- 3.4.1 REDES CLIENTE-SERVIDOR -- 3.4.2 REDES PEER-TO-PEER (P2P) -- 4 MODELOS DE REFERENCIA -- 4.1 EL MODELO OSI -- 4.1.1 CAPA FÍSICA (CAPA 1) -- 4.1.2 CAPA DE ENLACE DE DATOS (CAPA 2) -- 4.1.3 CAPA DE RED (CAPA 3) -- 4.1.4 CAPA DE TRANSPORTE (CAPA 4) -- 4.1.5 CAPA DE SESIÓN (CAPA 5) -- 4.1.6 CAPA DE PRESENTACIÓN (CAPA 6) -- 4.1.7 CAPA DE APLICACIÓN (CAPA 7) -- 4.2 INTRODUCCIÓN AL ENCAPSULAMIENTO -- 4.3 EL MODELO TCP/IP -- 4.3.1 LA CAPA INTERFAZ DE RED -- 4.3.2 LA CAPA INTERNET…”
Publicado 2016
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
25102por Ramírez, MarleniTabla de Contenidos: “…ESTRATEGIAS DEFENSIVAS -- 3.2.8. ESTRATEGIAS DE INTERNET -- 3.3. ELEGIR LAS ESTRATEGIAS ADECUADAS PARA ÁREAS FUNCIONALES -- 3.4. …”
Publicado 2020
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
25103Publicado 2019Tabla de Contenidos: “…Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN AUTOMATION, CONTROL AND ROBOTICS -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Acknowledgments -- Foreword -- List of Contributors -- List of Figures -- List of Tables -- List of Abbreviations -- Chapter 1 - Introduction -- 1.1 Maintenance Today -- 1.2 The Path to Proactive Maintenance -- 1.3 Why to Read this Book -- References -- Chapter 2 - Business Drivers of a Collaborative, Proactive Maintenance Solution -- 2.1 Introduction -- 2.1.1 CBM-based PM in Industry -- 2.1.2 CBM-based PM in Service Business -- 2.1.3 Life Cycle Cost and Overall Equipment Effectiveness -- 2.1.4 Integrating IoT with Old Equipment -- 2.1.5 CBM Strategy as a Maintenance Business Driver -- 2.2 Optimization of Maintenance Costs -- 2.3 Business Drivers for Collaborative Proactive Maintenance -- 2.3.1 Maintenance Optimisation Models -- 2.3.2 Objectives and Scope -- 2.3.3 Maintenance Standards -- 2.3.4 Maintenance-related Operational Planning -- 2.4 Economic View of CBM-based PM -- 2.5 Risks in CBM Plan Implementation -- 2.5.1 Technology -- 2.5.2 People -- 2.5.3 Processes -- 2.5.4 Organizational Culture -- References -- Chapter 3 - The MANTIS Reference Architecture -- 3.1 Introduction -- 3.1.1 MANTIS Platform Architecture Overview -- 3.2 The MANTIS Reference Architecture -- 3.2.1 Related Work and Technologies -- 3.2.1.1 Reference architecture for the industrial internet of things -- 3.2.1.2 Data processing in Lambda -- 3.2.1.3 Maintenance based on MIMOSA -- 3.2.2 Architecture Model and Components -- 3.2.2.1 Edge tier -- 3.2.2.2 Platform tier -- 3.2.2.3 Enterprise tier -- 3.2.2.4 Multi stakeholder interactions -- 3.3 Data Management -- 3.3.1 Data Quality Considerations -- 3.3.2 Utilization of Cloud Technologies -- 3.3.3 Data Storages in MANTIS -- 3.3.4 Storage Types -- 3.3.4.1 Big data file systems…”
Libro electrónico -
25104por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Accès à un ordinateur personnel et à Internet, à la maison, au travail ou sur un lieu d'études, 1997-99 -- Chapitre 2. …”
Publicado 2003
Libro electrónico -
25105Publicado 2017Tabla de Contenidos: “…Front Cover -- Elements of Information Organization and Dissemination -- Copyright Page -- Contents -- Preface -- A Background -- A.1 Introduction -- A.2 Concept of IOD -- A.3 Need for IOD -- A.4 Role of IOD -- A.5 Nomenclature -- A.5.1 Other Names -- A.6 Definition of Documentation -- A.6.1 New Dimension -- A.6.2 Clear Scope -- A.6.3 New Context -- A.7 Main Facets -- A.7.1 Differences -- A.8 IOD Activities -- References -- B Information Sources -- B.1 Introduction -- B.2 Genesis of IS -- B.3 Varieties of IS -- B.3.1 Human Information Sources -- B.3.2 Institutional Information Sources -- B.3.3 Documentary Information Sources (DIS) -- B.3.3.1 Definition -- B.3.3.2 Recording Media and Technology -- B.3.3.3 Media of Presentation -- Advantages of IS in Print Medium -- Advantages of IS in Digital Medium -- B.3.3.4 Categories of DIS -- Binary Division -- Trinary Division -- Quaternary Division -- B.3.3.5 Characteristics of DIS -- Primary Information Sources -- Secondary Information Sources -- Tertiary Information Sources -- Differences Between DIS -- B.3.3.6 Nature of Printed DIS -- Book -- Periodical -- Report -- Pamphlet -- Research Paper -- Conference Paper -- Guide to Literature -- Patent Literature -- Standard -- Specification -- Trade Literature -- Manuscript -- Government Publication -- B.3.3.7 Nature of Non-printed DIS -- Electronic Publications -- Databases -- Internet/Web Resources -- B.3.3.8 Gray Literature -- Characteristics of GL -- Types of GL -- B.4 Importance of IS -- References -- C Information Users -- C.1 Introduction -- C.2 User -- C.2.1 User Community -- C.2.2 Types of User -- C.3 User Study (US) -- C.3.1 Types and Scope of US -- C.3.2 Need of US -- C.3.3 Objectives of US -- C.3.4 User Characteristics -- C.3.5 Benefits of User Study -- C.3.6 Guidelines for US -- C.4 Information Need -- C.4.1 Basis of Need -- C.4.2 Affecting Factors…”
Libro electrónico -
25106Publicado 2012Tabla de Contenidos: “…» -- Figure 5.2 Amérique latine : renégociations des contrats de concession -- Figure 5.3 MERCOSUR et pays d'Amérique du Sud et d'Amérique du Nord : répartition du fret par mode de transport (en volume), 2007 -- Figure 5.4 Perception des décideurs de la région : obstacles à la coordination du transport multimodal -- Figure 5.5 Exigences en matière de largeur de bande passante, selon le type d'application -- Figure 5.6 Amérique latine et Caraïbes, et OCDE : abonnés à l'Internet à haut débit, fixe et mobile…”
Libro electrónico -
25107Publicado 2020Tabla de Contenidos: “…Information gathering -- 2 Discovering network hosts -- 2.1 Understanding your engagement scope -- 2.1.1 Black-box, white-box, and grey-box scoping -- 2.1.2 Capsulecorp -- 2.1.3 Setting up the Capsulecorp Pentest environment -- 2.2 Internet Control Message Protocol -- 2.2.1 Using the ping command -- 2.2.2 Using bash to pingsweep a network range -- 2.2.3 Limitations of using the ping command -- 2.3 Discovering hosts with Nmap -- 2.3.1 Primary output formats -- 2.3.2 Using remote management interface ports -- 2.3.3 Increasing Nmap scan performance -- 2.4 Additional host-discovery methods -- 2.4.1 DNS brute-forcing -- 2.4.2 Packet capture and analysis -- 2.4.3 Hunting for subnets -- Summary -- 3 Discovering network services…”
Libro electrónico -
25108Publicado 2023Tabla de Contenidos: “…5.6.2.3 Technology Solutions Used to Overcome Existing Challenges -- 5.6.2.4 Top Three Challenges Faced While Implementing New Zero Trust Architecture -- 5.6.2.5 Benefits Achieved by Implementing Zero Trust Architecture -- 5.7 Endpoint or Devices Component -- 5.7.1 Endpoint or Devices Architecture Overview -- 5.7.1.1 Customer Case Study: Unified Endpoint or Device Management with Zero Trust -- 5.7.1.1.1 About the Organization -- 5.7.1.1.2 Current Challenges -- 5.7.1.1.3 Technology Solutions Used to Over the Challenges -- 5.7.1.1.4 Top 5 Challenges Faced While Implementing New Zero Trust Architecture -- 5.7.1.1.5 Impact and Benefits Achieved with Zero Trust Architecture -- 5.8 Application Component (on Prem, Legacy, Cloud, Mobile App) -- 5.8.1 Application Architecture Overview -- 5.9 Data Component -- 5.9.1 Data Architecture Overview -- 5.9.1.1 Mobile Application Management -- 5.9.1.2 End-to-End Encryption for Data Protection -- 5.9.2 Customer Case Study: Data Loss Prevention and Data Security Zero Trust -- 5.9.2.1 About the Organization -- 5.9.2.2 Current Situation Before the Zero Trust Model -- 5.9.2.3 Technology Solutions Used for Zero Trust Architecture -- 5.9.3 Top Three Challenges Faced While Implementing New Zero Trust Architecture -- 5.9.4 Impact and Benefits with Zero Trust Architecture -- 5.10 Infrastructure Component -- 5.10.1 Infrastructure Deployment Objectives -- 5.10.2 Network Component -- 5.10.3 Network Architecture Overview -- 5.10.3.1 Segment and Enforce the External Boundaries -- 5.10.3.2 Network Segmentation -- 5.10.3.3 Threat Protection -- 5.10.3.4 Encryption -- 5.11 Zero Trust and Operational Technology Component -- 5.11.1 A Practical Approach for Deploying Zero Trust for Operational Technology -- 5.11.2 Internet of Things and Operational Technology Architecture with Zero Trust Principles…”
Libro electrónico -
25109Publicado 2024Tabla de Contenidos: “…-- 6.6.1 Elections -- 6.6.2 Political parties -- 6.6.3 Cybersecurity of the electoral staff - a challenge -- 6.6.3.1 Personal issue -- 6.6.3.2 Headquarters/staff cybersecurity strategy -- 6.6.3.3 More about the human factor -- 6.6.3.4 Technical, cloud measures -- 6.6.3.5 Routine deletion of data -- 6.6.4 Cybersecurity as a PR problem -- 6.7 The necessity of a State cybersecurity strategy -- 6.8 Or maybe disconnect from the Internet? -- Notes -- Chapter 7: Cyberconflict and cyberwar -- 7.1 Rivalry and competition between the States -- 7.2 Cyberintelligence, cyberespionage... -- 7.3 Cyber police -- 7.4 Cyber army -- 7.4.1 Standard tools -- 7.4.2 Cyberattack is not an attack -- 7.4.3 Cyber operations -- 7.4.3.1 Defensive cyber operations -- 7.4.3.2 ISR operations -- 7.4.3.3 Offensive operations…”
Libro electrónico -
25110Publicado 2022“…They have been organized with respect to the similarity of topics addressed, ranging from issues pertaining to the Internet of Things (IoT) for biomedical engineering and health informatics, computational intelligence for medical data processing, and Internet of Medical Things??…”
Libro electrónico -
25111Publicado 2023Tabla de Contenidos: “…LAS LENGUAS Y LOS MEDIOS: UNA HISTORIA DE MÁS DE CINCO SIGLOS(pp. 1217-1240) -- Raúl Ávila -- https://www.jstor.org/stable/j.ctt1657th3.11 -- En la actualidad, en las habitaciones de los hoteles se ofrece al viajero, como algo normal, un televisor, una radio, un teléfono y, cada vez más frecuentemente, una conexión para internet1…”
Enlace del recurso
Libro electrónico -
25112Publicado 2012Tabla de Contenidos: “…CAUSES AND COSTS OF INFORMATION OVERLOAD -- 2 OF TIME MAGAZINE, 24/7 MEDIA, AND DATA DELUGE: THE EVOLUTION OF INFORMATION OVERLOAD THEORIES AND CONCEPTS 15 -- Debashis “Deb” Aikat and David Remund -- 2.1 Introduction 16 -- 2.2 Theory and Concept of Information Overload 16 -- 2.3 Information Overload as a Twentieth Century Phenomenon 17 -- 2.4 Evolution of Information and Its Proliferation in Society 21 -- 2.4.1 The Early Quest for Information and Knowledge (320 BCE-Thirteenth Century) 21 -- 2.4.2 The Age of Renaissance (Fourteenth-Seventeenth Century) and the Printing Press 22 -- 2.4.3 The Industrial Revolution (Eighteenth-Nineteenth Century) and Its Information Innovations 23 -- 2.4.4 The Era of the Mind and the Machine (Twentieth Century) 24 -- 2.4.5 Internet Boom and Information Explosion of the 1990s 27 -- 2.4.6 Data Deluge and Information Overload in the Twenty-First Century Digital Age 28.…”
Libro electrónico -
25113Publicado 2016Tabla de Contenidos: “…7.6 Router verbinden diese (Netzwerk-)Welt -- 7.7 Virtuelle Netzwerkkomponenten -- 7.8 Fragen zu diesem Kapitel -- Kapitel 8: Der TCP/IP-Stack -- 8.1 Das Modell und die Praxis -- 8.1.1 Vergleich OSI-Modell mit dem DOD-4-Modell -- 8.1.2 Der Aufbau der Adressierung -- 8.2 Die Grundlagen der IP-Adressierung -- 8.2.1 CIDR statt Adressklassen -- 8.2.2 Private Netzwerke unter IPv4 -- 8.2.3 Ausnahmen und besondere Adressen -- 8.2.4 Der IPv4-Header -- 8.3 IPv6 -- 8.3.1 Der Header von IPv6 -- 8.3.2 Spezielle Adressen unter IPv6 -- 8.4 Subnettierung von Netzen -- 8.5 Von NAT bis uPnP -- 8.5.1 NAT und PAT -- 8.5.2 Universal Plug and Play -- 8.6 Weitere Protokolle auf dem IP-Layer -- 8.6.1 ICMP und IGMP -- 8.6.2 ARP -- 8.7 TCP und UDP -- 8.8 Die Geschichte mit den Ports -- 8.9 Fragen zu diesem Kapitel -- Kapitel 9: Serverrollen -- 9.1 Dienste und Rollen -- 9.2 Datei- und Druckdienste -- 9.2.1 Dateidienste verwaltet der Fileserver -- 9.2.2 Printserver verwalten Drucker und ihre Aufträge -- 9.3 Internetdienste -- 9.3.1 Webserver -- 9.3.2 FTP-Server -- 9.4 Netzwerkdienste -- 9.4.1 DNS-Server -- 9.4.2 DHCP-Server -- 9.4.3 Zeitsynchronisations-Server -- 9.4.4 Überwachungsserver -- 9.4.5 Server mit Fernzugriff (RAS-Server) -- 9.4.6 VPN unter Linux -- 9.5 Messaging-Server (Mailserver) -- 9.5.1 Posteingangsdienste (Postfachzugriff) -- 9.5.2 Postausgangsdienst -- 9.5.3 Unix- und Linux-Mailserver -- 9.5.4 Die kommerziellen Server -- 9.5.5 Webmail -- 9.5.6 Cloud-Systeme -- 9.6 Sicherheits- und Authentifizierungsdienste -- 9.6.1 Domänen-Controller -- 9.6.2 Certificate Authorities (CA) -- 9.6.3 Rights-Management-Server -- 9.7 Anwendungsserver -- 9.7.1 Datenbankserver -- 9.7.2 Anwendungsserver -- 9.7.3 Anwendungsarchitekturen -- 9.8 Internet, Intranet und Extranet -- 9.9 Fragen zu diesem Kapitel -- Kapitel 10: Übersicht zu Netzwerkbetriebssystemen…”
Libro electrónico -
25114por Kahate, AtulTabla de Contenidos: “…-- 10.6.3 Advantages of OODBMS -- 10.6.4 Examples of ODL, OQL and OML -- Key Terms and Concepts -- Chapter Summary -- Practice Set -- Chapter 11: Advanced Topics in DBMS -- 11.1 Deductive Databases -- 11.1.1 Features of Deductive Databases -- 11.1.2 An Overview of Logic -- 11.1.3 Knowledge Representation -- 11.2 Internet and DBMS -- 11.2.1 What is WWW?…”
Publicado 2004
Libro electrónico -
25115Publicado 2018“…This online assessment engine enables you to access the practice tests via the Internet on any desktop, laptop, tablet, or smartphone device with internet connectivity. …”
Libro electrónico -
25116Publicado 2002“…Wireless J2ME Platform Programming covers all this, and more: Using the Mobile Information Device Profile's (MIDP) high-level and low-level APIs Building effective wireless user interfaces with the J2ME platform Leveraging the J2ME platform's facilities for persistent storage Managing, provisioning, and internationalizing wireless applications Integrating complete wireless solutions: Internet portal interfaces, wireless application interfaces, and the wireless Internet environment Wireless J2ME Platform Programming : The must-have guide for writing robust, highly usable, cross-platform wireless applications. …”
Libro electrónico -
25117Publicado 2016“…Helps academic and non-academic economists understand recent rapid changes in theoretical and empirical advances, in structural empirical methods, and in the media industry's connection with the democratic process Presents the only detailed summary of media economics that emphasizes political economy, merger policy, and competition policy Pays special attention to the economic influences of the Internet, including developments in social media, user-generated content, and advertising, as well as the Internet's effects on newspapers, radio, and television…”
Libro electrónico -
25118Publicado 2019“…Economic and civil libertarianism have increasingly merged to produce a deregulatory, "free-market" approach to constitutional rights that achieves fullest expression in the idealization of the Internet. The worship of guns, speech, and the Internet in the name of the Constitution has blurred the boundaries between conduct and speech and between veneration and violence. …”
Libro -
25119Publicado 2017“…Internet access required. Pearson Test Prep offline system requirements: Windows 10, Windows 8.1, Windows 7, or Vista (SP2); Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases…”
Libro electrónico -
25120por Organisation for Economic Co-operation and Development.“…Particular attention is focused on the impact of the Internet and other technologies, consistent with the issues and priorities highlighted in the 2008 Seoul Ministerial on the Future of the Internet Economy. …”
Publicado 2011
Capítulo de libro electrónico