Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,829
- Engineering & Applied Sciences 800
- Computer networks 610
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 340
- Electrical & Computer Engineering 330
- Computer security 324
- Internet of things 317
- Telecommunications 317
- Web site development 314
- Operating systems (Computers) 312
- Management 304
- Marketing 298
- Web sites 274
- Universidad Pontificia de Salamanca (España) 265
- Aspectos sociales 251
- Design 246
- Social aspects 244
- Information technology 242
- Comercio electrónico 228
- Data processing 225
- Marketing en Internet 211
- Diseases 210
- Medios de comunicación social 206
-
25141Publicado 2018Tabla de Contenidos: “…Tanzanie Applications 9/2011 et 11/2011 (2013) -- NOUVEAU PARTENARIAT POUR LE DÉVELOPPEMENT DE L'AFRIQUE -- Le Nouveau partenariat pour le développement de l'Afrique Déclaration (NEPAD) (2001) -- Mémorandum d'entente relatif au Mécanisme africain d'évaluation par les pairs (2003) -- Déclaration sur la gouvernance démocratique, politique, économique et des entreprises (2002) -- Autoévaluation des Pays pour le Mécanisme africain d'évaluation par les pairs (2004) -- TABLEAU DE RATIFICATIONS: TRAITÉS DES DROITS DE L'HOMME DE L'UA -- SITES INTERNET UTILES -- BIBLIOGRAPHIE INDICATIVE…”
Libro electrónico -
25142Publicado 2014“…The book also provides directions for setting up a cellular iOS device as an Internet hotspot, and it discusses Apple's Instant Hotspot feature. …”
Libro electrónico -
25143por Niemeier, Stefan, 1973-“…The changes go far beyond making items available for sale on the internet. Starting by briefly setting the historical and business system contexts for retail and describe the role that technology has played in the creation of modern retail it then explains the underlying technological drivers behind the current revolution - radical changes in the capacity of both hardware and software, mobile telecommunications changes and the advances of the Internet. …”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
25144Publicado 2005“…As executive editor at PC World , Tynan edited a special issue on Internet Privacy that won a Grand Neal Award and was a finalist for a National Magazine Award. …”
Libro electrónico -
25145Publicado 2023“…In der digitalen Gegenwart mit ihren sozialen Medien, der Verbreitung von mobilen Endgeräten und der ständigen Verfügbarkeit des Internets ist Kommunikation allgegenwärtig. Doch während Plattformen und Algorithmen zunehmend in der Kritik stehen, wird die befremdliche Allgegenwart der Kommunikation als Segnung des technischen Fortschritts gefeiert. …”
Libro electrónico -
25146Publicado 2018Tabla de Contenidos: “…based Communication 214 -- 9.4.1.1 Security Testing 216 -- 9.4.1.2 Outcomes of the Security Testing 216 -- 9.4.2 Evaluation of RGW Security 217 -- 9.5 Deployment in 5G Networks 222 -- 9.5.1 Use Case 1: Mobile Broadband 224 -- 9.5.1.1 Deployment and Operations 224 -- 9.5.1.2 Security Benefits 224 -- 9.5.1.3 Scalability 225 -- 9.5.1.4 Reliability 225 -- 9.5.2 Use Case 2: Corporate Gateway 225 -- 9.5.2.1 Deployment and Operations 225 -- 9.5.2.2 Security Benefits 226 -- 9.5.2.3 Scalability 226 -- 9.5.2.4 Reliability 226 -- 9.5.3 Use Case 3: National CERT Centric Trust Domain 226 -- 9.5.3.1 Deployment and Operations 226 -- 9.5.3.2 Security Benefits 227 -- 9.5.3.3 Scalability 227 -- 9.5.3.4 Reliability 227 -- 9.5.4 Use Case 4: Industrial Internet for Road Traffic and Transport 227 -- 9.5.4.1 Deployment and Operations 227 -- 9.5.4.2 Security Benefits 228 -- 9.5.4.3 Scalability 228 -- 9.5.4.4 Reliability 228 -- 9.6 Conclusion 228 -- References 230 -- 10 Software Defined Security Monitoring in 5G Networks 231 /Madhusanka Liyanage, Ijaz Ahmad, Jude Okwuibe, Edgardo Montes de Oca, Mai Hoang Long, Oscar Lopez Perez, and Mikel Uriarte Itzazelaia -- 10.1 Introduction 231 -- 10.2 Existing Monitoring Techniques 232 -- 10.3 Limitations on Current Monitoring Techniques 233 -- 10.4 Use of Monitoring in 5G 234 -- 10.5 Software?]…”
Libro electrónico -
25147Publicado 2013“…• Set up your computer with no fuss or aggravation • Get productive fast, even if you don’t have computer experience • Use Windows’ new touch features if you have a touchscreen device • Safeguard your privacy, and protect yourself from online scams • Find, install, and use easy new Modern apps • Display up-to-the-minute news, weather, and stock prices • Browse the Web with the great new Internet Explorer 11 • Use new SmartSearch to find everything faster on the Internet • Discover reliable health and financial information online • Make free Skype video calls to friends and family • Use Facebook to find old friends and see what they’re up to • Store your pictures, fix them, and share them with loved ones • Read eBooks on your PC—even enlarge text for greater comfort • Watch TV or movies with Netflix, Hulu Plus, or YouTube • Enjoy your music, and discover great music you’ve never heard • Fix your own computer problems without help…”
Libro electrónico -
25148Publicado 2022“…Being an important and timely contribution to the field of media and communication studies, this book will appeal to academics and researchers interested in digital disinformation, information literacy, and representation on the Internet, as well as students studying these topics…”
Libro electrónico -
25149Publicado 2011“…El autor presenta muchos trucos desconocidos hasta ahora, que permiten personalizar Internet Explorer, añadir opciones al Explorador de Windows e incluso optimizar el sistema operativo. …”
Acceso con credenciales UPSA.
Libro electrónico -
25150Publicado 2020Tabla de Contenidos: “…38 -- 2.3.2.2 Shall Cloud/Fog Providers Communicate with Each Other 38 -- 2.3.2.3 How Multifog/Cloud Access is Managed 39 -- 2.3.3 Business Challenges 40 -- 2.4 Ongoing Efforts 41 -- 2.4.1 ECC 41 -- 2.4.2 mF2C 42 -- 2.4.3 MEC 42 -- 2.4.4 OEC 44 -- 2.4.5 OFC 44 -- 2.5 Handling Data in Coordinated Scenarios 45 -- 2.5.1 The New Data 46 -- 2.5.2 The Life Cycle of Data 48 -- 2.5.3 F2C Data Management 49 -- 2.5.3.1 Data Collection 49 -- 2.5.3.2 Data Storage 51 -- 2.5.3.3 Data Processing 52 -- 2.6 The Coming Future 52 -- Acknowledgments 54 -- References 54 -- 3 Computation Offloading Game for Fog-Cloud Scenario 61 /Hamed Shah-Mansouri and Vincent W.S. Wong -- 3.1 Internet of Things 61 -- 3.2 Fog Computing 63 -- 3.2.1 Overview of Fog Computing 63 -- 3.2.2 Computation Offloading 64 -- 3.2.2.1 Evaluation Criteria 65 -- 3.2.2.2 Literature Review 66 -- 3.3 A Computation Task Offloading Game for Hybrid Fog-Cloud Computing 67 -- 3.3.1 System Model 67 -- 3.3.1.1 Hybrid Fog-Cloud Computing 68.…”
Libro electrónico -
25151Publicado 2015“…Coverage includes an explanation of the mechanics of a search, and how to tie your website, paid ads, online reputation, social media, content, images, and video into a winning SEO strategy that pushes you to the front of the line.The Page One Domination strategy incorporates all the ways in which you can beef up your Internet presence and online reputation. This book is a clear, straightforward guide that will knock down the silos of the Internet and teach you exactly how to integrate all aspects of content creation into a synergistic, SEO strategy. …”
Libro electrónico -
25152Publicado 2016“…., the internationally recognized programming languages authoring, corporate-training and Internet business development organization. Paul and his father—Harvey Deitel—have written many international best-selling programming-language professional books and textbooks that millions of people worldwide have used to master C++, C, JavaTM, C#, Visual Basic®, Visual C++®, XML, Perl, Python, and Internet and web programming…”
-
25153Publicado 2015“…Connecting and using an Internet-based service is a frequent requirement for many applications. …”
Libro electrónico -
25154por Pitt, Esmond“…All you need to know about: understanding RMI in the context of Java and object-oriented programming using RMI to create applications in networked environments ranging from LANs to the Internet mastering serialization, remote interfaces, clients, the RMI registry, servers, security, and mobile code applying advanced concepts e.g. activation, socket factories, Internet firewalls, distributed garbage collection, and design patterns working with alternatives or extensions to the standard RMI implementation e.g., JNDI naming services and CORBA IIOP. …”
Publicado 2001
Libro electrónico -
25155Publicado 2018“…Review security standards, create security policies, and organize security with Cisco SAFE architecture Understand and mitigate threats to network infrastructure, and protect the three planes of a network device Safeguard wireless networks, and mitigate risk on Cisco WLC and access points Secure the network perimeter with Cisco Adaptive Security Appliance (ASA) Configure Cisco Next-Generation Firewall Firepower Threat Defense (FTD) and operate security via Firepower Management Center (FMC) Detect and prevent intrusions with Cisco Next-Gen IPS, FTD, and FMC Configure and verify Cisco IOS firewall features such as ZBFW and address translation Deploy and configure the Cisco web and email security appliances to protect content and defend against advanced threats Implement Cisco Umbrella Secure Internet Gateway in the cloud as your first line of defense against internet threats Protect against new malware with Cisco Advanced Malware Protection and Cisco ThreatGrid…”
Libro electrónico -
25156Publicado 2019“…In that time, he has co-authored more than 40 software patents, has spoken at venues throughout the world, has participated in the development of several Internet standards, has helped develop the CCDE and the CCAr, and has worked in Internet governance with the ISOC. …”
-
25157Publicado 2015“…Exploration of using telephone interfaces - including both analogue and digital ISDN, as well as recording across the internet - is included…”
Libro electrónico -
25158Publicado 2017“…Aquests intents no poden ser justificats, atès que amenacen el sistema internacional de drets humans i els valors que protegeix, així com s'orienten a mantenir el control governamental sobre la informació en una era en què l'esmentat control es troba seriosament qüestionat a causa del desenvolupament d'Internet i les noves modalitats tecnològiques en el terreny dels mitjans. …”
Accés lliure
Tesis -
25159Publicado 2018“…Written to the latest specifications of Spring that focuses on Reactive Programming, the Learning Path teaches you how to build modern, internet-scale Java applications in no time. Next, you will understand how Spring Boot is used to deploying serverless autonomous services by removing the need to have a heavyweight application server. …”
Libro electrónico -
25160Publicado 2004“…I have always truly believed that the Internet and education are the two great equalizers in life, and this book provides information about how to combine the two for productivity and profitability gains, based on real successes. …”
Libro electrónico