Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,829
- Engineering & Applied Sciences 800
- Computer networks 610
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 340
- Electrical & Computer Engineering 330
- Computer security 324
- Internet of things 317
- Telecommunications 317
- Web site development 314
- Operating systems (Computers) 312
- Management 304
- Marketing 298
- Web sites 274
- Universidad Pontificia de Salamanca (España) 265
- Aspectos sociales 251
- Design 246
- Social aspects 244
- Information technology 242
- Comercio electrónico 228
- Data processing 225
- Marketing en Internet 211
- Diseases 210
- Medios de comunicación social 206
-
25121Publicado 2003“…Highlights of the book include: Preparing your system for installing Linux Installing and configuring your Linux system and the two popular desktop environments, GNOME and KDE Linux fundamentals: understanding the basic concepts Using Linux productivity tools like Open Office Configuring and administering a multi-user Linux system Connecting to the Internet Burn CDs and sync a PalmPilot Setting up a networked workstation Setting up Internet services Understand and write shell scripts so you can peek under the hood and extend the power of Linux Since the release of its first edition, Learning Red Had Linux has guided many a PC user into the world of Linux. …”
Libro electrónico -
25122por Udupa, Sahana“…Digital Unsettling establishes a critical framework for placing digitalization within the longue durée of coloniality, while also revealing the complex ways in which the internet is entwined with persistent global calls for decolonization…”
Publicado 2023
Libro electrónico -
25123Publicado 2012“…Mittlerweile ist es millionenfach im Einsatz, Teil der kritischen öffentlichen Infrastruktur des Internets und ein zentrales Element in der Zukunft der Datenbankwelt. …”
Libro electrónico -
25124por Krause, Ina, author“…Die Strukturen der industriell geprägten Arbeitsgesellschaft werden durch den zunehmenden Einsatz automatisierter und digitaler Technologien sowie den Ausbau der Infrastruktur des Internets maßgeblich verändert. Gleichzeitig lässt sich eine intensive Flexibilisierung vertrauter Strukturen betriebszentrierter Organisationsformen von Beschäftigung beobachten. …”
Publicado 2023
Libro electrónico -
25125Publicado 2016“…., the internationally recognized programming languages authoring, corporate-training and Internet business development organization. Paul and his father—Harvey Deitel—have written many international best-selling programming-language professional books and textbooks that millions of people worldwide have used to master C++, C, JavaTM, C#, Visual Basic®, Visual C++®, XML, Perl, Python, and Internet and web programming…”
-
25126Publicado 2008“…If you have even one computer on the Internet or if you use wireless in your home or office, you need this book! …”
Libro electrónico -
25127Publicado 2018“…Skill Level Beginner/entry-level What You Will Learn A complete overview of all TCP/IP fundamentals About ground-level Internet technology and general networking Who Should Take This Course The target audience for this course consists of anyone who wants to learn about the foundation of the Internet and the World Wide Web. …”
-
25128Publicado 2014Tabla de Contenidos: “…8.8.4 Canberra Deep Space Communications Complex 422 -- 8.8.5 Goldstone Deep Space Communications Complex 423 -- 8.8.6 Honeysuckle Creek Tracking Station 424 -- 8.8.7 Kaena Point Satellite Tracking Station 426 -- 8.8.8 Bukit Timah Satellite Earth Station 426 -- 8.8.9 INTELSAT Teleport Earth Stations 426 -- 8.8.10 SUPARCO Satellite Ground Station 428 -- 8.8.11 Makarios Satellite Earth Station 428 -- 8.8.12 Raisting Earth Station 428 -- 8.8.13 Indian Deep Space Network 429 -- Glossary 430 -- 9 Networking Concepts 433 -- 9.1 Introduction 433 -- 9.2 Network Characteristics 433 -- 9.2.1 Availability 434 -- 9.2.2 Reliability 434 -- 9.2.3 Security 435 -- 9.2.4 Throughput 436 -- 9.2.5 Scalability 437 -- 9.2.6 Topology 437 -- 9.2.7 Cost 437 -- 9.3 Applications and Services 437 -- 9.3.1 Satellite and Network Services 438 -- 9.3.2 Satellite Services 438 -- 9.3.3 Network Services 438 -- 9.3.4 Internet Services 439 -- 9.4 Network Topologies 442 -- 9.4.1 Bus Topology 442 -- 9.4.2 Star Topology 443 -- 9.4.3 Ring Topology 444 -- 9.4.4 Mesh Topology 444 -- 9.4.5 Tree Topology 445 -- 9.4.6 Hybrid Topology 446 -- 9.5 Network Technologies 447 -- 9.5.1 Circuit Switched Networks 447 -- 9.5.2 Packet Switched Networks 448 -- 9.5.3 Circuit Switched versus Packet Switched Networks 449 -- 9.6 Networking Protocols 450 -- 9.6.1 Common Networking Protocols 450 -- 9.6.2 The Open Systems Interconnect (OSI) Reference Model 453 -- 9.6.3 Internet Protocol (IP) 456 -- 9.6.4 Transmission Control Protocol (TCP) 457 -- 9.6.5 Hyper Text Transfer Protocol (HTTP) 457 -- 9.6.6 File Transfer Protocol (FTP) 457 -- 9.6.7 Simple Mail Transfer Protocol (SMTP) 458 -- 9.6.8 User Datagram Protocol (UDP) 458 -- 9.6.9 Asynchronous Transfer Mode (ATM) 459 -- 9.7 Satellite Constellations 459 -- 9.7.1 Constellation Geometry 459 -- 9.7.2 Major Satellite Constellations 460 -- 9.8 Internetworking with Terrestrial Networks 465 -- 9.8.1 Repeaters, Bridges, Switches and Routers 465 -- 9.8.2 Protocol Translation, Stacking and Tunnelling 466.…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
25129por Jakobsen, Adam TilmarTabla de Contenidos: “…6.3.5 Creation of Timeline of Activity -- 6.3.5.1 Plaso -- 6.3.5.2 Volatility 3 Timeline -- 6.3.5.3 Creating a Super Timeline -- 6.4 Evidence Location -- 6.4.1 System Information -- 6.4.1.1 Time Zone Information -- 6.4.1.2 Network Interfaces -- 6.4.2 Account Usage -- 6.4.2.1 SAM Accounts -- 6.4.2.2 Security Events -- 6.4.2.3 Dead Box Password Cracking -- 6.4.2.4 User Access Logging -- 6.4.3 User Activity -- 6.4.3.1 Search History -- 6.4.3.2 Typed Path -- 6.4.3.3 LastVisitedMRU (Windows common dialog box) -- 6.4.3.4 XP Search -- 6.4.3.5 Thumbnails -- 6.4.3.6 Remote Desktop Protocol (RDP) -- 6.4.4 File or Folder Opening -- 6.4.4.1 Recent Files -- 6.4.4.2 Shortcut (.LNK) Files -- 6.4.4.3 Office Recent Files -- 6.4.4.4 Shellbag -- 6.4.4.5 Open/Save MRU -- 6.4.5 Program and File Execution -- 6.4.5.1 UserAssist -- 6.4.5.2 MUICache -- 6.4.5.3 Windows 10 Timeline -- 6.4.5.4 BAM and DAM -- 6.4.5.5 Amcache.hve -- 6.4.5.6 Jump List -- 6.4.5.7 Last‐Visited MRU -- 6.4.5.8 RecentApp -- 6.4.5.9 Prefetch -- 6.4.5.10 LastVisitedMRU -- 6.4.5.11 Taskbar Feature Usage -- 6.4.5.12 CapabilityAccessManager -- 6.4.5.13 RUN Box Execution -- 6.4.6 External Device/USB Usage -- 6.4.6.1 USB Device Types -- 6.4.6.2 Plugged in USB -- 6.4.6.3 Setupapi -- 6.4.6.4 Plug‐and‐Play Cleanup -- 6.4.6.5 PnP Events -- 6.4.6.6 MTP Device -- 6.4.6.7 User USB Device -- 6.4.6.8 Removable Devices Logs -- 6.4.7 Network Activity Artifacts -- 6.4.7.1 Network Mapping -- 6.4.7.2 Network History -- 6.4.7.3 Network Profiles Key -- 6.4.7.4 IP Address -- 6.4.8 Commands -- 6.4.8.1 Powershell History -- 6.4.8.2 WMI -- 6.4.8.3 WMI Database -- 6.4.8.4 Command Line Event Log -- 6.4.8.5 WMI Event Log -- 6.4.9 Browser Usage Artifacts -- 6.4.9.1 Account Records -- 6.4.9.2 Cookies -- 6.4.9.3 History -- 6.4.9.4 Cache -- 6.4.9.5 Internet Explorer -- 6.4.9.6 Browser Download Manager -- 6.4.9.7 Session Restore…”
Publicado 2024
Libro electrónico -
25130Publicado 2011“…. • Manage all your documents and applications through a single web page • Exchange documents with Microsoft Office users • Create, edit, format, and share documents with Google Docs • Collaborate online, share calendars, and organize events • Build powerful spreadsheets with functions, charts, forms, and gadgets • Deliver in-person or Internet-based presentations • Make the most of the speedy, efficient Google Chrome web browser • Use Gmail and Google Talk to communicate more effectively, and save money • Work with Google Apps even if you’re disconnected from the Internet • Save money by using Google Apps in your business…”
Libro electrónico -
25131Publicado 1998“…It explains how to use the Oracle Enterprise Manager and Oracle Security Server to enhance your site's security, and it touches on such advanced security features as encryption, Trusted Oracle, and various Internet and World Wide Web protection strategies. …”
Libro electrónico -
25132Publicado 2012“…Protect your Mac from Internet attacks, data loss, and other potential problems. …”
Libro electrónico -
25133por Shostack, Adam“…Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. …”
Publicado 2014
Libro electrónico -
25134Publicado 2015“…Browsing and Searching the Web Using the new Edge browser (and Google search engine) to browse and search the Internet 6. Protecting Yourself Online Tips and advice for safe and secure use of the Internet ..…”
Libro electrónico -
25135Publicado 2021“…ber den Autor: Philipp Rieber entwickelt seit |ber 20 Jahren Internet-Anwendungen und begeistert gerne andere Menschen daf|r. …”
Libro electrónico -
25136por Boyce, Jim, 1958-“…Some of the topics covered include: Setting up a dual-boot system Recovering data Resolving hardware configuration conflicts Restoring the Registry from a back up Making a printer available through the Internet Using automatic address assignment without DHCP Configuring Internet Connection Sharing Hosting a web site With its clear, well-organized fixes to common problems, Windows 2000 Quick Fixes is the book to reach for when the pressure is on and there's no time to waste hunting for buried solutions…”
Publicado 2001
Libro electrónico -
25137Publicado 2016“…Receive a comprehensive overview of the history, methods, technologies, goals, and limitations of encryption Learn to make practical reasoned choices regarding the forms of encryption to avoid and the forms to deploy Explore stream ciphers, block ciphers, authenticated encryption systems, and symmetric key encryption Discover why the widely used MD-5 hashing algorithm should no longer be used for most encryption purposes Familiarize yourself with Transport Level Security (TLS), the most widely-used Internet encryption mechanism Learn to deploy DHKE, the asymmetric key exchange protocol for establishing encrypted Internet channels Understand RSA, the encryption features it enables, and why it’s the standard for digitally-signing electronic documents Learn to recognize encryption attacks and why government demands for backdoors might cripple modern cryptography Brian Sletten runs Bosatsu Consulting, Inc., which focuses on security, encryption, and other forward-leaning technologies. …”
-
25138Publicado 2021“…The 7th Bandung Creative Movement has brought forward discussions on dynamic changes, ups and downs, innovations, relations of industrial revolution of the internet of thing, data, automation, to human physical world, new art and aesthetic, business, product innovation, built environment, and education…”
Libro electrónico -
25139por Qiu, Robert Caiming, 1966-Tabla de Contenidos: “…10.3.3 Game Formulation 369 -- 10.3.4 Bayesian Equilibrium 370 -- 10.3.5 Numerical Results 371 -- 10.4 Games in Collaborative Spectrum Sensing 372 -- 10.4.1 False Report Attack 373 -- 10.4.2 Game Formulation 373 -- 10.4.3 Elements of Game 374 -- 10.4.4 Bayesian Equilibrium 376 -- 10.4.5 Numerical Results 379 -- 11 Cognitive Radio Network 381 -- 11.1 Basic Concepts of Networks 381 -- 11.1.1 Network Architecture 381 -- 11.1.2 Network Layers 382 -- 11.1.3 Cross-Layer Design 384 -- 11.1.4 Main Challenges in Cognitive Radio Networks 384 -- 11.1.5 Complex Networks 385 -- 11.2 Channel Allocation in MAC Layer 386 -- 11.2.1 Problem Formulation 386 -- 11.2.2 Scheduling Algorithm 387 -- 11.2.3 Solution 389 -- 11.2.4 Discussion 390 -- 11.3 Scheduling in MAC Layer 391 -- 11.3.1 Network Model 391 -- 11.3.2 Goal of Scheduling 393 -- 11.3.3 Scheduling Algorithm 393 -- 11.3.4 Performance of the CNC Algorithm 395 -- 11.3.5 Distributed Scheduling Algorithm 396 -- 11.4 Routing in Network Layer 396 -- 11.4.1 Challenges of Routing in Cognitive Radio 397 -- 11.4.2 Stationary Routing 398 -- 11.4.3 Dynamic Routing 402 -- 11.5 Congestion Control in Transport Layer 404 -- 11.5.1 Congestion Control in Internet 404 -- 11.5.2 Challenges in Cognitive Radio 405 -- 11.5.3 TP-CRAHN 406 -- 11.5.4 Early Start Scheme 408 -- 11.6 Complex Networks in Cognitive Radio 417 -- 11.6.1 Brief Introduction to Complex Networks 418 -- 11.6.2 Connectivity of Cognitive Radio Networks 421 -- 11.6.3 Behavior Propagation in Cognitive Radio Networks 423 -- 12 Cognitive Radio Network as Sensors 427 -- 12.1 Intrusion Detection by Machine Learning 429 -- 12.2 Joint Spectrum Sensing and Localization 429 -- 12.3 Distributed Aspect Synthetic Aperture Radar 429 -- 12.4 Wireless Tomography 433 -- 12.5 Mobile Crowdsensing 434 -- 12.6 Integration of 3S 435 -- 12.7 The Cyber-Physical System 435 -- 12.8 Computing 436 -- 12.8.1 Graphics Processor Unit 437 -- 12.8.2 Task Distribution and Load Balancing 437 -- 12.9 Security and Privacy 438.…”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
25140Publicado 2013Tabla de Contenidos: “…Tanzanie Applications 9/2011 et 11/2011 (2013) -- NOUVEAU PARTENARIAT POUR LE DÉVELOPPEMENT DE L'AFRIQUE -- Le Nouveau partenariat pour le développement de l'Afrique Déclaration (NEPAD) (2001) -- Mémorandum d'entente relatif au Mécanisme africain d'évaluation par les pairs (2003) -- Déclaration sur la gouvernance démocratique, politique, économique et des entreprises (2002) -- Autoévaluation des Pays pour le Mécanisme africain d'évaluation par les pairs (2004) -- TABLEAU DE RATIFICATIONS: TRAITÉS DES DROITS DE L'HOMME DE L'UA -- SITES INTERNET UTILES -- BIBLIOGRAPHIE INDICATIVE…”
Libro electrónico