Mostrando 25,561 - 25,580 Resultados de 25,897 Para Buscar '"internet"', tiempo de consulta: 0.16s Limitar resultados
  1. 25561
    Publicado 2018
    “…Popular terms such as Internet of Things and smart structures were coined as a result of the intersection between advances in other engineering disciplines with civil engineering to produce the new field of structural health monitoring (SHM). …”
    Libro electrónico
  2. 25562
    por Nedeltchev, Plamen
    Publicado 2003
    “…A guide to understanding the troubleshooting tools, commands, and methodologies that enable reliable performance for remote access services Gain a solid grasp of enterprise telecommunications technology fundamentals, including service options and clocking, line coding, and framing in carrier systems Understand how network traffic is handled by carriers and service providers Examine a layer-by-layer, systematic approach to troubleshooting issues Design, configure, and troubleshoot T1 and PRI circuits, text and PPP dial-in and dial-out services, and Cisco AS5000 Access Servers Design, configure, and troubleshoot ISDN BRI at the physical, data link, and network levels, as well as PPP, MMP, and telephone interfaces Design, configure, and troubleshoot Frame Relay UNI and NNI interfaces, with a focus on new installs, wrong DLCI, LMI settings, performance and multicast issues, and re-hosting of Frame Relay service Design, configure, and troubleshoot PTPP, L2TP, and IPSec VPNs, examining specific VPN clients, Internet technology, and LAN issues Resolve common availability issues for all major remote access technologies through real-world scenarios for dial, ISDN, Frame Relay, and VPNs The ranks of telecommuters, remote employees, and mobile users are growing every day and their communications needs are expanding just as rapidly. …”
    Libro electrónico
  3. 25563
    Publicado 2023
    “…You'll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. It also provides: Practical, hands-on exercises that reinforce vital, real-world job skills and exam competencies Essential guidance for a certification that meets the requirements of the Department of Defense 8570 Directive for Information Assurance positions Complimentary access to the Sybex online learning center, complete with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy…”
    Libro electrónico
  4. 25564
    Publicado 2023
    “…No one predicted the Internet No one predicted the latest pandemic.It's time to turn volatility and disruption on their heads and use them as offensive weapons in the marketplace instead of trying to protect ourselves from them. …”
    Libro electrónico
  5. 25565
    Publicado 2024
    “…Que es posible reaprovechar la conectividad de la que gozamos y la viralidad de las redes sociales para promover conductas positivas.Generosidad contagiosa es una invitación a repensar internet como una herramienta capaz de unir a la gente en lugar de separarla y de humanizar una sociedad hoy polarizada y egoísta. …”
    Libro
  6. 25566
    Publicado 2023
    “…Prerequisites: Basic knowledge of web applications and the Internet. Recommended follow-up Getting Started with Blockchain and Cryptocurrency (video course) Practical Blockchain and Cryptocurrency (video course) Understanding Crypto Currencies, Bitcoins, and Blockchains (video course) Blockchain Applications and Smart Contracts: Developing with Ethereum and Solidity (video course) Certified Blockchain Developer--Hyperledger Fabric (CBDH) (video course) Introduction to Blockchain for Azure Developers: Understanding the Basic Foundations of Blockchain (video course) Architecting Blockchain Solutions (video course) Introduction to Blockchain Applications (video course) Introduction to Blockchain Technology (video course) Meet the Expert: Blockchain Best Practices with John Hargrave and Evan Karnoupakis (video interview) Bitcoin, the Blockchain, and Their Potential to Change Our World (video course) Complete Cryptocurrency & Blockchain Course Learn Solidity (video course) Solidity Smart Contracts: Build DApps in Ethereum Blockchain (video course) Blockchain in Swift: Decentralized iOS Programming (video course) Ethereum Fundamentals (video course) Blockchain and Regulation: Privacy, Laws, Taxation and More (video course) Create Your First DApp on Ethereum - A Concise Tutorial (video course)…”
    Video
  7. 25567
    por Martel, Frédéric 1967-
    Publicado 2012
    “…A la vez, nuevos países emergen con sus medios de comunicación y sus propias diversiones masivas. Internet multiplica su poder. Todo se acelera. En India, en Brasil o en Arabia Saudí se compite por dominar la web y ganar la batalla de la influencia cultural. …”
    Libro
  8. 25568
    “…Ello ha permitido llegar a la finalidad de este estudio, que es concluir si la actual institución universitaria española favorece, perjudica o ahoga la creatividad y, con ello, la posibilidad de alcanzar la verdad y juzgar la situación científica presente.(Internet)…”
    Libro
  9. 25569
    por Rachman, Tom
    Publicado 2010
    “…Los imperfeccionistas, el vibrante debut de Tom Rachman, nos ofrece una mirada irónica y conmovedora de las desordenadas vidas privadas de periodistas, correctores, jefes y directores de un periódico a la antigua, formado por personajes imperfectos que avanzan como pueden hacia un futuro incierto en una época en que internet amenaza con cambiar la prensa escrita para siempre…”
    Libro
  10. 25570
    Publicado 2014
    “…Los capítulos del libro: Introducción - Dominio Active Directory - Arquitectura distribuida de acceso a los recursos - Alta disponibilidad - Implementar los servicios de Red de la empresa - La evolución de la red - Servicios de Escritorio remoto - Acceso remoto - Aplicaciones de Internet - Reducir la superficie de ataque - Consolidar sus servidores - Despliegue de servidores y puestos de trabajo - Securizar su arquitectura - El ciclo de vida de su infraestructura - Prepararse para el futuro…”
    Acceso con credenciales UPSA.
    Libro electrónico
  11. 25571
    “…Dentro de esa relación entre adolescentes y las distintas pantallas y dando prioridad a afirmaciones construidas a partir observaciones detenidas y reflexivas, el libro aborda temas como: las paradojas insertas en la investigación social de lo que los adolescentes hacen con los medios de comunicación, la creación de identidades juveniles por parte de la televisión, los aspectos comunes que conforman la oferta de los medios de comunicación destinados específicamente a los jóvenes y adolescentes y que configuran su gusto, los modelos de la literatura o de las propias pantallas que explican distintas generaciones de adolescentes, el lugar de los jóvenes en la expansión de la telefonía móvil y, a la vez, el significado de la telefonía móvil para los jóvenes y adolescentes, y la relación que tienen con Internet. En definitiva, por su variedad y profundidad, una polifacética mirada que configura un indudable punto y aparte en esa siempre preocupante relación que tienen los adolescentes con los medios de comunicación…”
    Texto completo en Odilo
    Otros
  12. 25572
    por Guy Kawasaki
    Publicado 2006
    “…Guy Kawasaki contribuyó a que Apple se convirtiera en una de las grandes compañías del siglo; como director de Garage Technology Ventures tuvo la oportunidad de poner a prueba sus ideas con decenas de nuevas empresas de Internet y, como consultor, ha asesorado a cientos de personas en la fundación de sus empresas o en el lanzamiento de nuevos productos y servicios."…”
    Texto completo en Odilo
    Otros
  13. 25573
    Publicado 2022
    “…La Universidad Complutense de Madrid ha realizado este Libro Blanco de la educación digital en el marco del proyecto del Safer Internet Centre, Spain (SIC-Spain 2.0), que lidera el Instituto Nacional de Ciberseguridad de España (INCIBE). …”
    Enlace del recurso
    Libro electrónico
  14. 25574
    por Braun, Alain
    Publicado 2019
    “…Pour autant, le jeu excessif, de distraction, d'argent et de hasard, qui s'apparente à une addiction sans drogue, associe des traits déjà connus à des comportements émergents directement liés aux nouvelles technologies. Le dispositif Internet agit comme un catalyseur. Pour le meilleur et parfois pour le pire…”
    Electrónico
  15. 25575
    Publicado 2022
    “…This course is also useful to anyone who uses Google Workspace and wants custom functionality for Google Workspace users. All you need is an internet connection and a Google Account, and you can start creating your coding apps…”
    Video
  16. 25576
    Publicado 2020
    “…What you will learn Get up and running with powerful Kali Linux tools for digital investigation and analysis Perform internet and memory forensics with Volatility and Xplico Understand filesystems, storage, and data fundamentals Become well-versed with incident response procedures and best practices Perform ransomware analysis using labs involving actual ransomware Carry out network forensics and analysis using NetworkMiner and other tools Who this book is for This Kali Linux book is for forensics and digital investigators, security analysts, or anyone interested in learning digital forensics using Kali Linux. …”
    Libro electrónico
  17. 25577
    Publicado 2017
    “…What You Will Learn Understand key data analysis techniques centered around machine learning Implement Java APIs and various techniques such as classification, clustering, anomaly detection, and more Master key Java machine learning libraries, their functionality, and various kinds of problems that can be addressed using each of them Apply machine learning to real-world data for fraud detection, recommendation engines, text classification, and human activity recognition Experiment with semi-supervised learning and stream-based data mining, building high-performing and real-time predictive models Develop intelligent systems centered around various domains such as security, Internet of Things, social networking, and more In Detail Machine Learning is one of the core area of Artificial Intelligence where computers are trained to self-learn, grow, change, and develop on their own without being explicitly programmed. …”
    Libro electrónico
  18. 25578
    Publicado 2018
    “…With the advent of high-speed internet access, short loading times and fast transfer rates have become a necessity. …”
    Libro electrónico
  19. 25579
    Publicado 2015
    “…Cassandra is one of the most widely used NoSQL data stores that is frequently used by a huge number of heavy duty Internet-scale applications. Unlike the RDBMS world, the NoSQL landscape is very diverse and there is no one way to model data stores. …”
    Libro electrónico
  20. 25580
    Publicado 2016
    “…This guide will help you Leverage your existing programming knowledge to quickly master core Java syntax Understand how encapsulation, classes, and inheritance work in Java Master interfaces, inner classes, and lambda expressions for functional programming Improve program robustness with exception handling and effective debugging Write safer, more readable programs with generics and strong typing Use pre-built collections to collect multiple objects for later retrieval Master concurrent programming techniques from the ground up Build modern cross-platform GUIs with standard Swing components Deploy configurable applications and applets, and deliver them across the Internet Simplify concurrency and enhance performance with new functional techniques If you're an experienced programmer moving to Java SE 8, Core Java®, Tenth Edition, will be your reliable, practical companion-now and for many years to come. …”
    Libro electrónico