Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,829
- Engineering & Applied Sciences 800
- Computer networks 610
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 340
- Electrical & Computer Engineering 330
- Computer security 324
- Internet of things 317
- Telecommunications 317
- Web site development 314
- Operating systems (Computers) 312
- Management 304
- Marketing 298
- Web sites 274
- Universidad Pontificia de Salamanca (España) 265
- Aspectos sociales 251
- Design 246
- Social aspects 244
- Information technology 242
- Comercio electrónico 228
- Data processing 225
- Marketing en Internet 211
- Diseases 210
- Medios de comunicación social 206
-
25701Publicado 2024“…Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional…”
Video -
25702Publicado 2020“…Why We Must Plan for a Just AI Future"; Gina Neff of the Oxford Internet Institute, University of Oxford who spoke on "From Bad Users and Failed Uses to Responsible Technologies: A Call to Expand the AI Ethics Toolkit"; and Frank Pasquale of the University of Maryland who spoke on "Machines Judging Humans: The Promise and Perils of Formalizing Evaluative Criteria"…”
Libro electrónico -
25703Publicado 2018“…As updates become available, they will be delivered to you via a free Web Edition of this book, which can be accessed with any Internet connection. To learn more, visit informit.com/cup . …”
Libro electrónico -
25704Publicado 2017“…Understand the different forms of conditions and loops, and go over the sleep command in detail Learn about different ways to handle the reporting of return codes Create an interactive script by reading the keyboard and use subroutines and interrupts Create scripts to perform backups and go over the use of encryption tools and checksums Use wget and curl in scripts to get data directly from the Internet In Detail Linux Shell Scripting Bootcamp is all about learning the essentials of script creation, validating parameters, and checking for the existence of files and other items needed by the script. …”
Libro electrónico -
25705Publicado 2016“…What You Will Learn Familiarize yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and execution Exploit the Remote File Inclusion to gain administrative access to systems with Python and other scripting languages Crack an organization's Internet perimeter and chain exploits to gain deeper access to an organization's resources Explore wireless traffic with the help of various programs and perform wireless attacks with Python programs Gather passive information from a website using automated scripts and perform XSS, SQL injection, and parameter tampering attacks Develop complicated header-based attacks through Python In Detail Cybercriminals are always one step ahead, when it comes to tools and techniques. …”
Libro electrónico -
25706Publicado 2017“…What You Will Learn Discover the best practices to achieve an automated repeatable infrastructure in AWS Bring down your IT costs by managing AWS successfully and deliver high availability, fault tolerance, and scalability Make any website faster with static and dynamic caching Create monitoring and alerting dashboards using CloudWatch Migrate a database to AWS Set up consolidated billing to achieve simple and effective cost management with accounts Host a domain and find out how you can automate health checks In Detail Amazon Web Services (AWS) is a bundled remote computing service that provides cloud computing infrastructure over the Internet with storage, bandwidth, and customized support for application programming interfaces (API). …”
Libro electrónico -
25707Publicado 2016“…What You Will Learn Build quirky and fun projects from scratch while exploring patterns, practices, and techniques, as well as a range of different technologies Create websites and data services capable of massive scale using Go’s net/http package, exploring RESTful patterns as well as low-latency WebSocket APIs Interact with a variety of remote web services to consume capabilities ranging from authentication and authorization to a fully functioning thesaurus Develop high-quality command-line tools that utilize the powerful shell capabilities and perform well using Go’s in-built concurrency mechanisms Build microservices for larger organizations using the Go Kit library Implement a modern document database as well as high-throughput messaging queue technology to put together an architecture that is truly ready to scale Write concurrent programs and gracefully manage the execution of them and communication by smartly using channels Get a feel for app deployment using Docker and Google App Engine In Detail Go is the language of the Internet age, and the latest version of Go comes with major architectural changes. …”
Libro electrónico -
25708Publicado 2008“…., located in the greater Dallas, Texas area and an Intuit Solutions Provider that specializes in on-site and Internet-assisted accounting software implementation, set-up, training and troubleshooting. …”
Libro electrónico -
25709Publicado 2005“…Iverson's coverage includes Downloading Commons project libraries and installing them into Eclipse Programmatically accessing resources via HTTP, FTP, NNTP, and other Internet protocols Using the Jakarta Commons suite of configurable object pools Managing database connectivity in Swing applications—and anywhere containers aren't doing it for you Using BeanUtils to generate forms and gain runtime access to information provided by JavaBeans-style objects Traversing complex object graphs with JXPath Using Jakarta Commons' advanced collections tools to establish richer object relationships Extending java.lang with better methods for manipulating core classes Implementing conversion routines, configurable logging, command-line help, and more Exploring the newest packages, including emerging "sandbox" packages Whether you're building code for front-end Web applications, client-side software, or back-end servers, learning Jakarta Commons will make you far more efficient. …”
Libro electrónico -
25710Publicado 2003“…You'll learn how to: Customize your shell environment Manage files and directories Successfully print from the Unix command line Edit and create files with the vi editor Perform remote logins Access Internet functions Understand pipes and filters Use background processing Use Fink, an easy way to install open source Unix software on Mac OS X With Terminal, you'll access areas of your Mac that you just can't get to from the desktop. …”
Libro electrónico -
25711Publicado 2015“…Coverage includes: how to behave appropriately at work... how to be more positive, avoid inappropriate conversations, and use nonverbal communication more effectively... how to use technologies like the Internet, email, and speakerphones appropriately... how to make business contacts, meet groups of people, and network more successfully. …”
Libro electrónico -
25712Publicado 2016“…Tommy's online Scrum training series has been the top-selling Agile video on InformIt.com for the past two years. He rambles on the Internet at www.tommynorman.com and @tommynorman. …”
-
25713Publicado 2023“…He started his teaching career in 2014, with the Internet's first Swift course. He now teaches a range of technologies such as iOS, Android, Django, Kotlin, Python, HTML, and Blockchain…”
Video -
25714Publicado 2007“…., Author of Nice Girls Don’t Get Rich and Nice Girls Don’t Get the Corner Office Simplify your financial life... now and forever! • By the Internet’s #1 personal finance expert, MSN’s Liz Pulliam Weston • Stop feeling overwhelmed by your finances: take control, the easy way! …”
Libro electrónico -
25715Publicado 2008“…Install and configure Ubuntu Get all your system’s devices and peripherals up and running Configure and use the X Window System Manage Linux services and users Run a printer server Connect to a local network and the Internet Set up and administer a web server with Apache Secure your machine and your network from intruders Learn shell scripting Share files with Windows users using Samba Get productive with OpenOffice.org Play games on Linux Use Linux multimedia programs Create and maintain a MySQL database Configure a firewall Set up an FTP server Use Ubuntu’s development and programming tools Tune your Ubuntu system for maximum performance Learn to manage and compile the kernel and modules Andrew Hudson is a regular freelance contributor to Linux Format magazine, the UK’s largest Linux magazine. …”
Libro electrónico -
25716Publicado 2003“…In recent years, the term has come to be associated with those nefarious black hats who break into computers to snoop, steal information or disrupt Internet traffic. But the term originally had a more benign meaning, and you'll still hear it used this way whenever developers get together. …”
Libro electrónico -
25717Publicado 2006“…A practical guide for comparing, designing, and deploying IPsec, MPLS Layer 3, L2TPv3, L2TPv2, AToM, and SSL virtual private networks Explore the major VPN technologies and their applications, design, and configurations on the Cisco IOS® Router, Cisco® ASA 5500 Series, and the Cisco VPN 3000 Series Concentrator platforms Compare the various VPN protocols and technologies, learn their advantages and disadvantages, and understand their real-world applications and methods of integration Find out how to design and implement Secure Socket Layer (SSL) VPNs, including consideration of clientless operation, the Cisco SSL VPN Client, the Cisco Secure Desktop, file and web server access, e-mail proxies, and port forwarding Learn how to deploy scalable and secure IPsec and L2TP remote access VPN designs, including consideration of authentication, encryption, split-tunneling, high availability, load-balancing, and NAT transparency Master scalable IPsec site-to-site VPN design and implementation including configuration of security protocols and policies, multiprotocol/ multicast traffic transport, NAT/PAT traversal, quality of service (QoS), Dynamic Multipoint VPNs (DMVPNs), and public key infrastructure (PKI) Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. …”
Libro electrónico -
25718Publicado 2004“…Obtain and set up software through the Red Hat Package Manager (RPM) Set up a Linux system for networking, either on your local area network (LAN), or via a dialup connection to the Internet. Use the system-administration tools included with Red Hat, GNOME, and KDE, including such valuable utilities as Samba file-sharing and the Apache web server. …”
Libro electrónico -
25719Publicado 2003“…You'll learn how to: Customize your shell environment Manage files and directories Successfully print from the Unix command line Edit and create files with the vi editor Perform remote logins Access Internet functions, and much more Unix continues to thrive as an operating system because of its power, flexibility, and simplicity, and the vast community that supports it. …”
Libro electrónico -
25720por Rawlins, Michael C.“…Inside you'll find: A concise tutorial for learning to read W3C XML schemas An introduction to using XSLT to transform between different XML formats Simple, pragmatic advice on transporting XML documents securely over the Internet For developers working with either MSXML with Visual C++ or Java and Xerces: See Chapter 3 for a step-by-step guide to enabling existing business applications to export XML documents See Chapter 2 for a step-by-step guide to enabling existing business applications to import XML documents See Chapter 5 for code examples and tips for validating XML documents against schemas See Chapter 12 for general tips on building commerce support into an application For end users who need a simple and robust conversion utility: See Chapter 7 for converting CSV files to and from XML See Chapter 8 for converting flat files to and from XML See Chapter 9 for converting X12 EDI to and from XML See Chapter 11 for tips on how to use these techniques together for complex format conversions The resource-filled companion Web site (www.rawlinsecconsulting.com/booksupplement) includes executable versions of the utilities described in the book, full source code in C++ and Java, XSLT stylesheets, bug fixes, sample input and output files, and more. 0321154940B07142003…”
Publicado 2004
Libro electrónico