Mostrando 25,481 - 25,500 Resultados de 25,897 Para Buscar '"internet"', tiempo de consulta: 0.19s Limitar resultados
  1. 25481
    por Berthot, Franck
    Publicado 2015
    “…Plus encore, les nouvelles technologies de l'information et de la communication, et en particulier internet, ont ouvert un espace illimité ou blogs et webzines peuvent proliférer désormais dans une anarchie joyeuse…”
    Electrónico
  2. 25482
    por Kiisel, Ty. author
    Publicado 2013
    “…Getting a Business Loan will: Detail how bankers look at you and your loan application Explain the menu of non-bank financing options available to business owners, like asset-based lending, factoring, merchant cash advance, local “hard money,” and more Show how to locate potential lenders via the Internet and other means Show how to prepare before you visit the lender or fill out an application Main Street businesses aren’t limited by the local bank’s footprint any more. …”
    Libro electrónico
  3. 25483
    por Duncan, Christopher. author
    Publicado 2013
    “…In Have Fun, Get Paid you will learn how to: Find paying work and get the gigs Market your talent without selling your soul Build an image as a highly sought after professional Manage the business details of your creative career Harness the power of relationships for long term success With advances in technology and the global reach of the Internet, creative people are empowered today as never before. …”
    Libro electrónico
  4. 25484
    “…La définition d’un certain nombre de termes importants (imprimés en caractères gras) est donnée en annexe, avec des indications sur des sources d’information complémentaires (Publications SIGMA et PUMA ou sites Internet pertinents)…”
    Capítulo de libro electrónico
  5. 25485
    Publicado 2016
    “…Here’s just a sampling of what this book’s tips, tricks, and techniques will help you do: · Connect to wireless and cellular networks, to keyboards and Bluetooth devices, and via VPNs · Transform your device into a portable Wi-Fi hotspot, and share Internet connections via USB or Bluetooth · Secure Android with screen and SIM locks, location settings, and encryption · Sideload apps from any source and keep bad apps from loading · Take Gmail to pro level with signatures, vacation responders, labels, archiving, advanced search, and secure two-step verification · Manage multiple email accounts together: POP, IMAP, web mail, and Exchange · Get more out of your Google Chrome browser, and share bookmarks across all your devices · Chat via text, audio, or video on Google Hangouts—and customize it to work just the way you want · Enjoy your music everywhere, whether it’s stored locally or in the cloud · Easily capture, edit, and share top-quality photos and videos · Transform your smartphone or tablet into a total social networking hub · Squeeze more battery life from your Android device…”
    Libro electrónico
  6. 25486
    Publicado 2016
    “…Windows Sysinternals creator Mark Russinovich and Aaron Margosis show you how to: Use Process Explorer to display detailed process and system information Use Process Monitor to capture low-level system events, and quickly filter the output to narrow down root causes List, categorize, and manage software that starts when you start or sign in to your computer, or when you run Microsoft Office or Internet Explorer Verify digital signatures of files, of running programs, and of the modules loaded in those programs Use Autoruns, Process Explorer, Sigcheck, and Process Monitor features that can identify and clean malware infestations Inspect permissions on files, keys, services, shares, and other objects Use Sysmon to monitor security-relevant events across your network Generate memory dumps when a process meets specified criteria Execute processes remotely, and close files that were opened remotely Manage Active Directory objects and trace LDAP API calls Capture detailed data about processors, memory, and clocks Troubleshoot unbootable devices, file-in-use errors, unexplained communication, and many other problems Understand Windows core concepts that aren’t well-documented elsewhere…”
    Libro electrónico
  7. 25487
    Publicado 2011
    “…Le guide du parfait petit locavore Méthodologie pour locavore appliqué Plus d'un tour dans mon sac Le mémo pratique du locavore Sélection de livres Sélection de sites Internet…”
    Libro electrónico
  8. 25488
    Publicado 2014
    “…In OS X Yosemite All-in-One For Dummies , you'll get the best-of-the-best content from indispensable For Dummies books: Introducing OS X; Customizing and Sharing; The Digital hub; Using iWork; The Typical Internet Stuff; Networking in OS X; Expanding Your System; and Advanced OS X. …”
    Libro electrónico
  9. 25489
    Publicado 2015
    “…The best fully integrated study system available for ICND1 Exam 100-101 With hundreds of practice questions and hands-on exercises, CCENT Cisco Certified Entry Networking Technician ICND1 Study Guide with Boson NetSim Limited Edition covers what you need to know—and shows you how to prepare—for this challenging exam. 100% complete coverage of all official exam objectives Exam Readiness checklist—you’re ready for the exam when all objectives on the list are checked off Inside the Exam sections in every chapter highlight key exam topics covered Two-Minute Drills for quick review at the end of every chapter Simulated exam questions match the format, tone, topics, and difficulty of the real exam Covers all the exam topics, including: Network Fundamentals and Terminology * Networking Models–OSI and TCP/IP * IPv4 Addressing and Subnet Masks * Preparing to Configure Cisco Devices * Configuring Cisco Switches * VLANs and Port Security * Routing Essentials and Routing Protocols * Cisco Router Configuration * Open Shortest Path First (OSPF)–Single Area * IP Service * Access Control Lists (ACLs) * IPv6 Addressing Online content includes: Boson NetSim Limited Edition with 15+ simulated lab exercises Boson Exam Engine with CCENT practice exam Video training System requirements for the Boson NetSim LE and the Boson Exam Engine: Supported Operating Systems: Windows 8, Windows 7, Windows Vista, Windows XP NET Framework: Microsoft .NET Framework Version 4.0 Processor: 1-GHz Pentium processor or equivalent (Minimum); 3-GHz Pentium processor or equivalent (Recommended) RAM: 512MB (Minimum); 2GB (Recommended) Hard Disk: Up to 100MB of available space Display: 1024×768, 256 colors (Minimum); 1024×768 high color, 32-bit (Recommended) Active Internet connection NOTE: Access to the Boson NetSlim simulated exercises is NOT available on this site…”
    Libro electrónico
  10. 25490
    Publicado 1993
    “…All of the code shown in the book is available free of charge over the Internet or via UUCP. Coverage of the drag-and-drop mechanism for transferring data. …”
    Libro electrónico
  11. 25491
    Publicado 2016
    “…programming platforms Covers new features of Java 8 such as closures, the most eagerly anticipated language feature in years Easy-to-understand, practical examples clearly illustrate the fundamentals of Java programming Discover how Swing can help you quickly develop programs with a graphical user interface Find out about JDBC 4.2 programming with the Derby database and XML parsing with the open source XOM class library Learn how to use streams to write programs that communicate with the Internet, including socket programming, buffers, channels, and URL handling. …”
    Libro electrónico
  12. 25492
    Publicado 2016
    “…You can follow Omar on Twitter: @santosomar NetFlow and IPFIX basics Cisco NetFlow versions and features Cisco Flexible NetFlow NetFlow Commercial and Open Source Software Packages Big Data Analytics tools and technologies such as Hadoop, Flume, Kafka, Storm, Hive, HBase, Elasticsearch, Logstash, Kibana (ELK) Additional Telemetry Sources for Big Data Analytics for Cyber Security Understanding big data scalability Big data analytics in the Internet of everything Cisco Cyber Threat Defense and NetFlow Troubleshooting NetFlow Real-world case studies…”
    Libro electrónico
  13. 25493
    Publicado 2022
    “…The emerging areas of Cloud Computing and Internet of Things also pose serious privacy and security challenges. …”
    Libro electrónico
  14. 25494
    Publicado 2011
    “…Au sommaire Les clés de l'entreprenariat indépendant Les gisements d'emplois indépendants Les étapes de la création d'entreprise Les statuts juridiques des entreprises Les capacités, les compétences et les connaissances de 'entrepreneur indépendant Les aides, les financements et les rétributions de l'entrepreneur indépendant Les risques encourus par l'entrepreneur indépendant Les secteurs traditionnels de création d'emplois indépendants et d'entreprises Les métiers de l'agriculture Les métiers de la mer Les métiers du bâtiment Les métiers du commerce et de l'artisanat Les métiers de l'édition, des arts et des spectacles Les métiers du tourisme Les nouveaux secteurs créateurs d'emplois Les métiers des services à la personne et les métiers sanitaires et sociaux Les métiers de l'informatique, de la bureautique et de l'Internet (e-business) Les métiers du conseil, de la formation et du coaching Les métiers liés à 'environnement et au développement durable…”
    Libro electrónico
  15. 25495
    Publicado 2017
    “…Much of our economic world depends on growing streams of data, such as social media feeds, financial records, data from mobile devices, sensors and machines (the Internet of Things - IoT). The projects in the book show how to process such streams to gain valuable, timely, and actionable insights. …”
    Libro electrónico
  16. 25496
    Publicado 2002
    “…Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. …”
    Libro electrónico
  17. 25497
    por Neuburg, Matt
    Publicado 2001
    “…Then you use the code editor to fill in the code that tells these pieces what to do.The widely hailed first edition of REALbasic: The Definitive Guide has been completely rewritten to encompass reader suggestions and the many improvements of REALbasic 3--like its ability to compile and run under OS X.The book is divided into three sections: Fundamentals: a detailed summary of the language that quickly shows you how to think about programming and accomplish your goals in less time User Interface: how to create a complete application using the rich classes and pre-defined tools that make life so much easier for the REALbasic programmer. Reaching Out: Internet communications, databases, multimedia, game programming and more!…”
    Libro electrónico
  18. 25498
    Publicado 2016
    “…Als Ergänzung steht Ihnen die »LPI Academy«, ein LPI-Prüfungssimulator mit über 500 kommentierten, an die echte LPIC-1-Prüfung angenäherten Fragen im Internet zur Verfügung. So werden Sie Ihre Zertifizierung erfolgreich meistern und bald zum Kreis der LPIC-1-zertifizierten Linux-Experten gehören. …”
    Libro electrónico
  19. 25499
    por Brown, William N. author
    Publicado 2023
    “…The primary method of empowerment was to provide modern infrastructure, “Roads first, then riches,” so rural dwellers in remote Inner Mongolia or the Himalayan heights of Tibet had the same access to markets, jobs and internet for e-commerce as their urban counterparts. …”
    Libro electrónico
  20. 25500
    Publicado 2005
    “…The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. …”
    Libro electrónico