Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,829
- Engineering & Applied Sciences 800
- Computer networks 610
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 340
- Electrical & Computer Engineering 330
- Computer security 324
- Internet of things 317
- Telecommunications 317
- Web site development 314
- Operating systems (Computers) 312
- Management 304
- Marketing 298
- Web sites 274
- Universidad Pontificia de Salamanca (España) 265
- Aspectos sociales 251
- Design 246
- Social aspects 244
- Information technology 242
- Comercio electrónico 228
- Data processing 225
- Marketing en Internet 211
- Diseases 210
- Medios de comunicación social 206
-
25481por Berthot, Franck“…Plus encore, les nouvelles technologies de l'information et de la communication, et en particulier internet, ont ouvert un espace illimité ou blogs et webzines peuvent proliférer désormais dans une anarchie joyeuse…”
Publicado 2015
Electrónico -
25482por Kiisel, Ty. author“…Getting a Business Loan will: Detail how bankers look at you and your loan application Explain the menu of non-bank financing options available to business owners, like asset-based lending, factoring, merchant cash advance, local “hard money,” and more Show how to locate potential lenders via the Internet and other means Show how to prepare before you visit the lender or fill out an application Main Street businesses aren’t limited by the local bank’s footprint any more. …”
Publicado 2013
Libro electrónico -
25483por Duncan, Christopher. author“…In Have Fun, Get Paid you will learn how to: Find paying work and get the gigs Market your talent without selling your soul Build an image as a highly sought after professional Manage the business details of your creative career Harness the power of relationships for long term success With advances in technology and the global reach of the Internet, creative people are empowered today as never before. …”
Publicado 2013
Libro electrónico -
25484por Organisation de coopération et de développement économiques.“…La définition d’un certain nombre de termes importants (imprimés en caractères gras) est donnée en annexe, avec des indications sur des sources d’information complémentaires (Publications SIGMA et PUMA ou sites Internet pertinents)…”
Publicado 1998
Capítulo de libro electrónico -
25485Publicado 2016“…Here’s just a sampling of what this book’s tips, tricks, and techniques will help you do: · Connect to wireless and cellular networks, to keyboards and Bluetooth devices, and via VPNs · Transform your device into a portable Wi-Fi hotspot, and share Internet connections via USB or Bluetooth · Secure Android with screen and SIM locks, location settings, and encryption · Sideload apps from any source and keep bad apps from loading · Take Gmail to pro level with signatures, vacation responders, labels, archiving, advanced search, and secure two-step verification · Manage multiple email accounts together: POP, IMAP, web mail, and Exchange · Get more out of your Google Chrome browser, and share bookmarks across all your devices · Chat via text, audio, or video on Google Hangouts—and customize it to work just the way you want · Enjoy your music everywhere, whether it’s stored locally or in the cloud · Easily capture, edit, and share top-quality photos and videos · Transform your smartphone or tablet into a total social networking hub · Squeeze more battery life from your Android device…”
Libro electrónico -
25486Publicado 2016“…Windows Sysinternals creator Mark Russinovich and Aaron Margosis show you how to: Use Process Explorer to display detailed process and system information Use Process Monitor to capture low-level system events, and quickly filter the output to narrow down root causes List, categorize, and manage software that starts when you start or sign in to your computer, or when you run Microsoft Office or Internet Explorer Verify digital signatures of files, of running programs, and of the modules loaded in those programs Use Autoruns, Process Explorer, Sigcheck, and Process Monitor features that can identify and clean malware infestations Inspect permissions on files, keys, services, shares, and other objects Use Sysmon to monitor security-relevant events across your network Generate memory dumps when a process meets specified criteria Execute processes remotely, and close files that were opened remotely Manage Active Directory objects and trace LDAP API calls Capture detailed data about processors, memory, and clocks Troubleshoot unbootable devices, file-in-use errors, unexplained communication, and many other problems Understand Windows core concepts that aren’t well-documented elsewhere…”
Libro electrónico -
25487Publicado 2011“…Le guide du parfait petit locavore Méthodologie pour locavore appliqué Plus d'un tour dans mon sac Le mémo pratique du locavore Sélection de livres Sélection de sites Internet…”
Libro electrónico -
25488Publicado 2014“…In OS X Yosemite All-in-One For Dummies , you'll get the best-of-the-best content from indispensable For Dummies books: Introducing OS X; Customizing and Sharing; The Digital hub; Using iWork; The Typical Internet Stuff; Networking in OS X; Expanding Your System; and Advanced OS X. …”
Libro electrónico -
25489Publicado 2015“…The best fully integrated study system available for ICND1 Exam 100-101 With hundreds of practice questions and hands-on exercises, CCENT Cisco Certified Entry Networking Technician ICND1 Study Guide with Boson NetSim Limited Edition covers what you need to know—and shows you how to prepare—for this challenging exam. 100% complete coverage of all official exam objectives Exam Readiness checklist—you’re ready for the exam when all objectives on the list are checked off Inside the Exam sections in every chapter highlight key exam topics covered Two-Minute Drills for quick review at the end of every chapter Simulated exam questions match the format, tone, topics, and difficulty of the real exam Covers all the exam topics, including: Network Fundamentals and Terminology * Networking Models–OSI and TCP/IP * IPv4 Addressing and Subnet Masks * Preparing to Configure Cisco Devices * Configuring Cisco Switches * VLANs and Port Security * Routing Essentials and Routing Protocols * Cisco Router Configuration * Open Shortest Path First (OSPF)–Single Area * IP Service * Access Control Lists (ACLs) * IPv6 Addressing Online content includes: Boson NetSim Limited Edition with 15+ simulated lab exercises Boson Exam Engine with CCENT practice exam Video training System requirements for the Boson NetSim LE and the Boson Exam Engine: Supported Operating Systems: Windows 8, Windows 7, Windows Vista, Windows XP NET Framework: Microsoft .NET Framework Version 4.0 Processor: 1-GHz Pentium processor or equivalent (Minimum); 3-GHz Pentium processor or equivalent (Recommended) RAM: 512MB (Minimum); 2GB (Recommended) Hard Disk: Up to 100MB of available space Display: 1024×768, 256 colors (Minimum); 1024×768 high color, 32-bit (Recommended) Active Internet connection NOTE: Access to the Boson NetSlim simulated exercises is NOT available on this site…”
Libro electrónico -
25490Publicado 1993“…All of the code shown in the book is available free of charge over the Internet or via UUCP. Coverage of the drag-and-drop mechanism for transferring data. …”
Libro electrónico -
25491Publicado 2016“…programming platforms Covers new features of Java 8 such as closures, the most eagerly anticipated language feature in years Easy-to-understand, practical examples clearly illustrate the fundamentals of Java programming Discover how Swing can help you quickly develop programs with a graphical user interface Find out about JDBC 4.2 programming with the Derby database and XML parsing with the open source XOM class library Learn how to use streams to write programs that communicate with the Internet, including socket programming, buffers, channels, and URL handling. …”
Libro electrónico -
25492Publicado 2016“…You can follow Omar on Twitter: @santosomar NetFlow and IPFIX basics Cisco NetFlow versions and features Cisco Flexible NetFlow NetFlow Commercial and Open Source Software Packages Big Data Analytics tools and technologies such as Hadoop, Flume, Kafka, Storm, Hive, HBase, Elasticsearch, Logstash, Kibana (ELK) Additional Telemetry Sources for Big Data Analytics for Cyber Security Understanding big data scalability Big data analytics in the Internet of everything Cisco Cyber Threat Defense and NetFlow Troubleshooting NetFlow Real-world case studies…”
Libro electrónico -
25493Publicado 2022“…The emerging areas of Cloud Computing and Internet of Things also pose serious privacy and security challenges. …”
Libro electrónico -
25494Publicado 2011“…Au sommaire Les clés de l'entreprenariat indépendant Les gisements d'emplois indépendants Les étapes de la création d'entreprise Les statuts juridiques des entreprises Les capacités, les compétences et les connaissances de 'entrepreneur indépendant Les aides, les financements et les rétributions de l'entrepreneur indépendant Les risques encourus par l'entrepreneur indépendant Les secteurs traditionnels de création d'emplois indépendants et d'entreprises Les métiers de l'agriculture Les métiers de la mer Les métiers du bâtiment Les métiers du commerce et de l'artisanat Les métiers de l'édition, des arts et des spectacles Les métiers du tourisme Les nouveaux secteurs créateurs d'emplois Les métiers des services à la personne et les métiers sanitaires et sociaux Les métiers de l'informatique, de la bureautique et de l'Internet (e-business) Les métiers du conseil, de la formation et du coaching Les métiers liés à 'environnement et au développement durable…”
Libro electrónico -
25495Publicado 2017“…Much of our economic world depends on growing streams of data, such as social media feeds, financial records, data from mobile devices, sensors and machines (the Internet of Things - IoT). The projects in the book show how to process such streams to gain valuable, timely, and actionable insights. …”
Libro electrónico -
25496Publicado 2002“…Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. …”
Libro electrónico -
25497por Neuburg, Matt“…Then you use the code editor to fill in the code that tells these pieces what to do.The widely hailed first edition of REALbasic: The Definitive Guide has been completely rewritten to encompass reader suggestions and the many improvements of REALbasic 3--like its ability to compile and run under OS X.The book is divided into three sections: Fundamentals: a detailed summary of the language that quickly shows you how to think about programming and accomplish your goals in less time User Interface: how to create a complete application using the rich classes and pre-defined tools that make life so much easier for the REALbasic programmer. Reaching Out: Internet communications, databases, multimedia, game programming and more!…”
Publicado 2001
Libro electrónico -
25498Publicado 2016“…Als Ergänzung steht Ihnen die »LPI Academy«, ein LPI-Prüfungssimulator mit über 500 kommentierten, an die echte LPIC-1-Prüfung angenäherten Fragen im Internet zur Verfügung. So werden Sie Ihre Zertifizierung erfolgreich meistern und bald zum Kreis der LPIC-1-zertifizierten Linux-Experten gehören. …”
Libro electrónico -
25499por Brown, William N. author“…The primary method of empowerment was to provide modern infrastructure, “Roads first, then riches,” so rural dwellers in remote Inner Mongolia or the Himalayan heights of Tibet had the same access to markets, jobs and internet for e-commerce as their urban counterparts. …”
Publicado 2023
Libro electrónico -
25500Publicado 2005“…The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. …”
Libro electrónico