Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
20081Publicado 2017Tabla de Contenidos: “…. -- See also -- Analyzing Android data storage -- Getting ready -- How to do it... -- See also -- Performing dynamic analysis testing -- Getting ready -- How to do it... -- See also -- Chapter 6: IoT Device Hacking -- Introduction -- Hardware exploitation versus software exploitation -- Hardware hacking methodology -- Information gathering and recon -- External and internal analysis of the device -- Identifying communication interfaces…”
Libro electrónico -
20082por Rothman, DenisTabla de Contenidos: “…Approval of the design matrix -- Implementing a k-means clustering solution -- The vision -- The data -- The strategy -- The k-means clustering program -- The mathematical definition of k-means clustering -- The Python program -- Saving and loading the model -- Analyzing the results -- Bot virtual clusters as a solution -- The limits of the implementation of the k-means clustering algorithm -- Summary -- Questions -- Further reading -- Chapter 5: How to Use Decision Trees to Enhance K-Means Clustering -- Unsupervised learning with KMC with large datasets -- Identifying the difficulty of the problem -- NP-hard - the meaning of P -- NP-hard - the meaning of non-deterministic -- Implementing random sampling with mini-batches -- Using the LLN -- The CLT -- Using a Monte Carlo estimator -- Trying to train the full training dataset -- Training a random sample of the training dataset -- Shuffling as another way to perform random sampling -- Chaining supervised learning to verify unsupervised learning -- Preprocessing raw data -- A pipeline of scripts and ML algorithms -- Step 1 - training and exporting data from an unsupervised ML algorithm -- Step 2 - training a decision tree -- Step 3 - a continuous cycle of KMC chained to a decision tree -- Random forests as an alternative to decision trees -- Summary -- Questions -- Further reading -- Chapter 6: Innovating AI with Google Translate -- Understanding innovation and disruption in AI -- Is AI disruptive? …”
Publicado 2020
Libro electrónico -
20083Publicado 2023Tabla de Contenidos: “…UX -- UX Designers -- Platform -- User Skill Level -- Beginners and Beyond -- Configuration -- Hidden Configuration -- Models -- Metaphors and Idioms -- Case Study: Microsoft Word -- Design Guidelines -- Allow Exploration -- Make the Interface Immutable -- Support Commensurate Difficulty -- Avoid State -- Make Similar Things Similar -- Provide Redundant Commands -- Do the Right Thing -- Show Qualitative Data, Explain Quantitative Data -- Give Forms Purpose -- Gather All Information at Once -- Provide Reasonable Performance -- Only Allow What's Right -- Flag Mistakes -- Form Design -- Use Standard Controls -- Decorating -- Displaying -- Arranging -- Commanding -- Selecting -- Entering -- Display Five Things -- Arrange Controls Nicely -- Summary -- What You Learned in This Chapter -- Chapter 10 Programming -- Tools -- Hardware -- Network -- Development Environment -- Source Code Control -- Profilers -- Static Analysis Tools -- Testing Tools -- Source Code Formatters -- Refactoring Tools -- Training -- Collaboration Tools -- Algorithms -- Top-Down Design -- Programming Tips and Tricks -- Be Alert -- Write for People, Not the Computer…”
Libro electrónico -
20084por OECDTabla de Contenidos: “…Dubai's economy has been hard hit by the COVID-19 pandemic and the economic recession, but is expected to recover in 2021 -- Dubai has a very diverse population, made up predominantly of expatriates and individuals of working age -- Dubai's private school sector -- Governance -- Institutions -- Well-being as a key goal of KHDA's forward-looking strategy -- Funding -- The COVID-19 pandemic has exacerbated disparities in the private sector -- School choice is shaped by perceptions of quality, demographics and a unique job market -- Market pressures can encourage improvement, but may create unintended consequences -- Dubai's private education sector has become a profitable sector of the economy -- The sector has attracted professionals and centres that provide important services for strengthening well-being -- The structure of Dubai's private school system -- Dubai has a large and expanding private education system -- There is a wide diversity of curricula on offer -- Private schools in Dubai benefit from a high degree of autonomy over teaching and learning -- Teachers and teaching -- Dubai has a diverse teacher workforce, made up predominantly of expatriates -- Dubai's private sector benefits from a highly-qualified teacher workforce, with access to support and development opportunities -- Main trends in participation, outcomes and equity -- In the last three decades, Dubai's private student population has increased three-fold and enrolment is high -- Student learning outcomes are high, compared to benchmark countries -- Students' outcomes have improved in Dubai's private sector -- Disparities in performance across the sector and the student population -- Stakeholders, including parents and students, have high aspirations for their future -- References -- Notes -- 2. …”
Publicado 2022
Libro electrónico -
20085Publicado 2023Tabla de Contenidos: “…Scaling Ethereum with rollups -- Optimistic rollups -- ZK rollups -- Summary -- Chapter 3: Decentralized Finance -- Technical requirements -- Introducing decentralized finance -- Mastering Ethereum token standards -- Definition of cryptocurrency -- Crypto funding mechanism -- Ethereum token standards -- Analyzing stablecoins and MakerDAO Dai -- Understanding DeFi protocols -- Basic DeFi constructs -- Lending and borrowing -- Decentralized exchanges -- Decentralized derivatives and insurance -- Yield farming and DeFi continuum -- Making sense of cryptoeconomics -- DeFi after the collapse of FTX -- Summary -- Chapter 4: EVM-Compatible Blockchain Networks -- Technical requirements -- Understanding EVM blockchain ecosystems -- Introducing BSC -- Consensus mechanism in BSC -- Block creation and finality -- BNB governance -- BNB ecosystem and roadmap -- Scaling Ethereum with Polygon chains -- How Polygon PoS and Plasma work -- Block production and checkpoints -- Consensus mechanism in Polygon PoS -- Multi-chain solutions with Polygon Edge -- Polygon ecosystem and roadmap -- Diving deep into high-performance Avalanche chains -- Avalanche blockchain architecture overview -- Avalanche consensus mechanism -- Subnets and enterprise blockchains -- Governance in Avalanche chains -- Avalanche ecosystem -- Bridging interoperability gaps between blockchains -- Cross-chain integration challenges -- Common cross-chain bridge designs -- Trustless bridge solutions using Polkadot -- Generalized bridge solutions with Cosmos -- Decentralized oracle as a bridge -- Glancing over non-EVM blockchain networks -- TRON blockchain overview -- Introduction to Solana -- Summary -- Chapter 5: Deep Research and the Latest Developments in Ethereum -- Technical requirements -- Understanding the challenges in distributed systems -- The CAP theorem…”
Libro electrónico -
20086por Dimotikalis, YiannisTabla de Contenidos: “…Numerical examples -- 16.6.2. Performance comparisons -- 16.7. Conclusions -- 16.8. …”
Publicado 2024
Libro electrónico -
20087Publicado 2002Tabla de Contenidos: “…-- Noncorrelated Subqueries -- Single-Row, Single-Column Subqueries -- Multiple-Row, Single-Column Subqueries -- Multiple-Column Subqueries -- The WITH Clause -- Correlated Subqueries -- Inline Views -- Inline View Basics -- Query Execution -- Data Set Fabrication -- Overcoming SQL Restrictions -- Hierarchical queries -- Aggregate queries -- Inline Views in DML Statements -- Restricting Access Using WITH CHECK OPTION -- Global Inline Views -- Subquery Case Study: The Top N Performers -- A Look at the Data -- Your Assignment -- Second Attempt -- Final Answer -- Handling Temporal Data -- Time Zones -- Database Time Zone -- Session Time Zone -- Temporal Data Types in Oracle -- The DATE Data Type -- The TIMESTAMP Data Types -- TIMESTAMP -- TIMESTAMP WITH TIME ZONE -- TIMESTAMP WITH LOCAL TIME ZONE -- The INTERVAL Data Types -- INTERVAL YEAR TO MONTH -- INTERVAL DAY TO SECOND -- Literals of Temporal Types -- DATE Literals -- TIMESTAMP Literals -- INTERVAL Literals -- YEAR TO MONTH interval literals -- DAY TO SECOND interval literals -- Getting Temporal Data In and Out of a Database -- TO_DATE, TO_TIMESTAMP, and TO_TIMESTAMP_TZ -- Using the default formats…”
Libro electrónico -
20088Publicado 1999Tabla de Contenidos: “…-- Chapter Summary -- Quiz Answers -- How Python Runs Programs -- Introducing the Python Interpreter -- Program Execution -- The Programmer's View -- Python's View -- Byte code compilation -- The Python Virtual Machine (PVM) -- Performance implications -- Development implications -- Execution Model Variations -- Python Implementation Alternatives -- CPython -- Jython -- IronPython -- Execution Optimization Tools -- The Psyco just-in-time compiler -- The Shedskin C++ translator -- Frozen Binaries -- Future Possibilities? …”
Libro electrónico -
20089por Barton, RickTabla de Contenidos: “…Using Java in Talend -- Introduction -- Performing one-off pieces of logic using tJava -- Getting ready -- How to do it... -- How it works... -- See also -- Setting the context and globalMap variables using tJava -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Adding complex logic into a flow using tJavaRow -- Getting ready -- How to do it... -- How it works... -- Creating pseudo components using tJavaFlex -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating custom functions using code routines -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Importing JAR files to allow use of external Java classes -- Getting ready -- How to do it... -- How it works... -- There's more... -- 6. …”
Publicado 2013
Libro electrónico -
20090por Grant, RickfordTabla de Contenidos: “…-- 5: Slipping and Sliding - Exploring the Internet, Linux Style -- Firefox: Your Internet Browser -- Project 5: Installing Firefox Extensions -- Email with Evolution -- An Email Alternative: Thunderbird -- Chatting with Your Friends via Empathy -- Microblogging--Twitter and Friends -- Other Internet Applications -- 6: Rounding out the Bird - Downloading, Installing, and Updating Programs the Easy Way -- Project 6A: Installing Applications via the Ubuntu Software Center -- Performing System Upgrades via Update Manager…”
Publicado 2010
Libro electrónico -
20091Publicado 2015Tabla de Contenidos: “…Machine generated contents note: Contents Forward Preface 1 -- INTRODUCTIONS AND MOTIVATION 1.1 Introduction 1.2 The book 1.2.1 Objectives 1.2.2 Benefits 1.2.3 Organization 1.2.4 Book Cover 1.2.5 Impact of C-IoT 1.2.6 Summary 1.3 C-IoT Terms of References 1.3.1 Introduction 1.3.2 Need for IoT Framework 1.3.3 C-IoT Domains and Business Apps Model 1.3.4 C-IoT Roadmap 1.3.5 C-IoT Platform and Developer Community 1.3.6 C-IoT Opportunities for Business apps, solutions and systems 1.4 The Future 1.4.1 General Trends 1.4.2 Point Solutions 1.4.3 Collaborative IoT 1.4.4 C-IoT and RFID 1.4.5 C-IoT and Nanotechnology 1.4.6 Cyber-Collaborative IoT (C2-IoT) 1.4.7 C2-IoT and EBOLA Case 1.4.8 Summary 2 -- APPLICATION REQUIREMENTS 2.1 C-IOT Landscape 2.1.1 C-IoT Model and Architecture Layers 2.1.2 C-IoT Model and Enabling Technologies 2.1.3 Definition of key elements 2.1.4 Requirement Considerations 2.1.5 C-IoT System Solution - Requirement Considerations 2.2 Applications Requirement - Use Cases 2.3 Health & Fitness (Lead Example) 2.3.1 Landscape 2.3.2 Health & Fitness - Sensing Requirements 2.3.3 Health & Fitness - Gateway Requirements 2.3.4 Health & Fitness - Service Requirements 2.3.5 Health & Fitness - Solution Considerations 2.3.6 Health & Fitness - System Considerations 2.3.7 Health & Fitness and Hospitals 2.4 Video Surveillance 2.4.1 Landscape 2.4.2 Video Surveillance - Across Home, Industry and Infrastructure 2.4.3 Video Surveillance - Sensing Requirements 2.4.4 Video Surveillance - Gateway Requirements 2.4.5 Video Surveillance - Services 2.4.6 Example: Red Light Camera - Photo Enforcement Camera 2.4.7 Conclusion 2.5 Smart Home & Building 2.5.1 Landscape 2.5.2 Requirement 2.5.3 Home - Sensing Requirements 2.5.4 Home - Gateway Requirements 2.5.5 Home - Services 2.6 Smart Energy 2.6.1 Landscape 2.6.2 Requirements 2.6.3 Smart Energy - Sensing Requirements 2.6.4 Smart Energy - Gateway Requirements 2.6.5 Smart Energy - Services 2.6.6 The Smart Energy App 2.6.7 Smart Energy and Network Security 2.7 Track & Monitor 2.7.1 Landscape 2.7.2 Track & Monitory - Sensing Requirements 2.7.3 Track & Monitor - Services 2.7.4 Track & Monitor - Solution Considerations 2.7.5 Track & Monitor - Examples 2.8 Smart Factory/Manufacturing 2.8.1 Factory Automation - Robot 2.8.2 Caregiver and Robot 2.8.3 Industrial Robot 2.9 Others: Smart Car, Smart Truck and Smart City 2.9.1 Smart Car 2.9.2 Smart Roadside 2.9.3 Drone 2.9.4 Machine Vision 2.9.5 Smart City 3 -- C-IOT APPLICATIONS AND SERVICES 3.1 Smart IoT Application Use Cases 3.1.1 Health monitoring - Individual level (Fitness/Health Tracking wearables) 3.1.2 Health Monitoring at Business level (used in clinic) 3.1.3 Home and Building Automation - Individual level (Smart Home) 3.1.3.1 Smart Thermostat (Smart Energy Management) 3.1.3.2 Smart Smoke Alarm (Safety) 3.1.3.3 Smart IP Camera for Video Surveillance (Security) 3.1.3.4 Smart Service Robots at Consumer level - Roombas iRobot 3.1.3.5 Smart Home Gateway (Scalable for Smart Building Automation) 3.1.3.6 Smart Building Automation 3.1.4 Smart Energy and Smart Grid 3.1.5 Smart Energy Gateways 3.1.6 Industrial and Factory Automation 3.1.7 Smart Transportation & Fleet Logistics (Connected Cars - V2X: V2V, V2I) 3.1.8 Smart City 3.2 Smart IoT Platform 3.2.2 Smart IoT Software Gateway Platform 3.2.3 Smart Sensor Fusion Platform 3.3 Secured C-IoT Software Platform 3.3.1 C-IoT Security - Example on Smart Energy 3.3.2 Securing NAN (Metrology-to-Concentrator) 3.3.3 Securing Home Area Network (HAN) 3.3.4 Securing WAN (Concentrator-to-Sub Station/Utility Servers) 3.3.5 Platform Solution for Concentrator 3.3.6 Platform Solution for Sub Station/Utility Servers 3.3.7 Network Topology and IP Addressing: WAN 3.3.8 Security on the Concentrator and Utility Servers 3.3.9 Summary on C-IoT Security 4 -- IOT REFERENCE DESIGN KIT 5 -- C-IOT CLOUD-BASED SERVICES AND END DEVICE DIVERSIITY 5.1 C-IoT Cloud Based Services 5.1.1 Introduction and Drivers to C-IoT Service Platform 5.1.2 Classes of C-IoT Cloud Computing 5.1.3 C-IoT Innovative and Collaborative Services 5.1.4 The Emerging Data Centre LAN 5.2 C-IoT User Device Diversity 5.2.1 Introduction 5.2.2 C-IoT Developers/Platform 5.2.3 Wearable Devices - Individual 5.2.4 Harvesting (Self-powered nodes) - Infrastructure Applications 5.2.5 Embedded Devices and Servers 5.2.6 Performing Sentiment Analysis Using Big Data 5.2.7 Far-Reaching Consequence 5.2.8 Collaboration 6 -- IMPACT OF C-IOT AND TIPS 6.1 Impact on Business Process Productivity and Smart of Digital Life 6.1.1 Individual 6.1.2 Industry 6.1.3 Infrastructure 6.2 Considerations of developing Differentiated C-IoT Solutions 6.2.1 Software Processes and Platform 6.2.3 Standardization 6.2.4 Advertising Ecosystem Value Exchange 6.2.5 Opportunity with Industry Supply Chain for Material Handling 6.3 Practical Tips in maintaining Digital Life Style 6.3.1 Mobile and Wearable Computing 6.3.2 Robotics and Automation 6.3.3 Sensors and C-IoT 6.3.4 BIG Data and Predictive Analysis 6.3.5 The Changing Workforce 6.3.6 Sustainability 7 -- CONCLUSION 7.1 Simple C-IoT Domains and Model 7.2 Disruptive Business Applications of C-IoT 7.3 A New LifeStyle 7.4 Development Platform 7.5 C-IoT emerging Standards, Consortiums and other Initiatives 7.5.1 C-IoT Emerging Standards 7.5.2 C-IoT Emerging Consortiums 7.5.3 Forums, Workshops, and other Initiatives 7.5.4 C-IoT and Radio Communications 7.5.5 C-IoT and Nanotechnology 7.5.6 C-IoT and Security 7.6 Final Note References About the Authors Index …”
Libro electrónico -
20092Publicado 2019Tabla de Contenidos: “…. -- There's more... -- See also -- Performing simple image arithmetic -- Getting ready -- How to do it... -- How it works... -- There's more... -- Overloaded image operators -- Splitting the image channels -- Remapping an image -- How to do it... -- How it works... -- See also…”
Libro electrónico -
20093Publicado 2018Tabla de Contenidos: “…. -- Searching for the percentage of cart additions from product views -- See also -- Charting the application's functional performance -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Charting the application's memory usage -- Getting ready -- How to do it... -- How it works... -- See also -- Counting the total number of database connections -- Getting ready -- How to do it... -- How it works... -- See also…”
Libro electrónico -
20094Publicado 2010Tabla de Contenidos: “…Copying and Moving Text -- Changing Fonts -- Changing Font Size -- Text Leading -- Text Kerning -- Text Tracking -- Scaling or Skewing Text -- Aligning Paragraphs -- Indenting and Spacing Paragraphs -- Creating a Drop Cap -- Applying a Paragraph Rule -- Adding Bullets and Numbering -- Setting Tabs -- Working with Glyphs -- Inserting Special Text Characters -- Working with Hidden Text -- Setting Text Frame Options -- Creating Columns -- Wrapping Text Around an Object -- Creating Type Outlines -- Adding Page Numbers to Continued Text -- 5 Placing and Working with Graphics -- Placing Graphics -- Placing Graphics with Options -- Setting Place Import Options -- Placing Multiple Graphics -- Placing Graphics from Adobe Bridge -- Adding Captions to Graphics -- Copying or Moving Graphics -- Using the Links Panel -- Managing Linked Graphics -- Editing a Linked Graphic -- Displaying XMP Graphic Information -- Creating Specialty Frames for Graphics -- Selecting and Moving Frames and Graphics -- Fitting Graphics in Frames -- Nesting Graphics in Frames -- Formatting Graphics in Frames -- Controlling Graphics Display Performance -- 6 Working with Objects and Layers -- Creating Shapes -- Creating Lines -- Creating Multiple Objects in a Grid -- Using the Selection Tool -- Using the Direct Selection Tool -- Resizing Objects -- Moving Objects -- Duplicating Objects -- Grouping and Combining Objects -- Aligning Objects -- Distributing Objects -- Arranging Object Stack Order -- Transforming Objects -- Repeating Object Transformations -- Using the Free Transform Tool -- Scaling Objects -- Shearing Objects -- Rotating Objects -- Locking and Unlocking Objects -- Hiding and Showing Objects -- Creating Inline Objects -- Creating Anchored Objects -- Creating and Deleting Object Layers -- Setting Layer Options -- Showing and Hiding Layers and Objects…”
Libro electrónico -
20095Publicado 2010Tabla de Contenidos: “…Quiz -- Printing Fundamentals -- Laser and LED Printers -- Inkjet Printers -- Thermal Printers -- Impact Printers -- Printer and Scanner Control -- Drivers -- Firmware -- Print Processes -- Laser Print Process -- Inkjet Print Process -- Thermal Print Processes -- Impact Print Process -- Interface Types -- Adding Bluetooth Support -- Adding Ethernet Support -- Adding 802.11Wireless Ethernet (WLAN) Support -- Adding Infrared Support -- Printer Installation -- Connecting the Device -- Verifying Device Compatibility with Operating System and Applications -- Installing Device Drivers -- Calibrating the Device -- Configuring Options and Device Settings -- Educating the User About Basic Functionality -- Optimizing Printer Performance…”
Libro electrónico -
20096Publicado 2015Tabla de Contenidos: “…-- CAUSE AND EFFECT MATRIX -- LESSONS LEARNED REGARDING BPM COE -- Work of a BPM CoE -- Typical BPM CoE Roles -- BPM CoE Process Life Cycle -- BPM CoE Portfolio Process Management -- A Clear Understanding and Approach to BPM Governance -- A BPM Maturity Holistic View in BPM CoE -- BPM Performance Management Is Executed Within the BPM CoE -- BPM Alignment to Value So That the Strategic Intent Is Woven Into the BPM CoE -- Alignment of BPM CoE to Existing Enterprise Standards, Enterprise Architecture, Enterprise Modeling, and Other IT Disciplines -- Continuous Improvement and BPM CoE Change Management -- CONCLUSION -- End Notes -- Understanding Business Process Management Roles -- INTRODUCTION -- MOTIVATION FOR DEFINING YOUR BPM ROLES -- RELEVANCE CONTEXT -- WHAT IS A ROLE? …”
Libro electrónico -
20097Publicado 2021Tabla de Contenidos: “…Front Cover -- Title Page -- Copyright Page -- About the Authors -- Brief Contents -- Detailed Contents -- Applying Macroeconomics to the Real World -- Symbols Used in This Book -- Preface -- Part 1 Introduction -- Chapter 1 Introduction to Macroeconomics -- 1.1 What Macroeconomics Is About -- Long-Run Economic Growth -- Business Cycles -- Unemployment -- Inflation -- The International Economy -- Macroeconomic Policy -- Aggregation -- 1.2 What Macroeconomists Do -- Macroeconomic Forecasting -- Macroeconomic Analysis -- Macroeconomic Research -- Data Development -- In Touch with Data and Research: Developing and Testing an Economic Theory -- 1.3 Why Macroeconomists Disagree -- Classicals Versus Keynesians -- A Unified Approach to Macroeconomics -- Chapter 2 The Measurement and Structure of the National Economy -- 2.1 National Income Accounting: The Measurement of Production, Income, and Expenditure -- In Touch with Data and Research: The National Income and Product Accounts in Malaysia -- Why the Three Approaches Are Equivalent -- 2.2 Gross Domestic Product -- The Product Approach to Measuring GDP -- In Touch with Data and Research: Natural Resources, the Environment, and the National Income Accounts -- The Expenditure Approach to Measuring Gdp -- The Income Approach to Measuring GDP -- 2.3 Saving and Wealth -- Measures of Aggregate Saving -- The Uses of Private Saving -- Relating Saving and Wealth -- 2.4 Real GDP, Price Indexes, and Inflation -- Real GDP -- Price Indexes -- In Touch with Data and Research: The Computer Revolution and Chain-Weighted GDP -- In Touch with Data and Research: CPI Inflation Versus Core Inflation -- Application The Federal Reserve's Preferred Inflation Measures -- 2.5 Interest Rates -- Part 2 Long-Run Economic Performance -- Chapter 3 Productivity, Output, and Employment…”
Libro electrónico -
20098Publicado 2004Tabla de Contenidos: “…Fundamental concepts in process integration -- 2.1 The need for a unifying technique -- 2.1.1 Similarities between intra- and inter-enterprise integration -- 2.1.2 Summary -- 2.2 Process integration concepts and notations -- 2.2.1 Collaboration and interaction -- 2.2.2 Connectors and adapters -- 2.2.3 Classification of interaction between subsystems -- 2.3 QoS capabilities framework -- 2.3.1 Operability -- 2.3.2 Availability -- 2.3.3 Federation -- 2.3.4 Performance -- 2.3.5 Security -- 2.3.6 Standards compliance -- 2.3.7 Transactionality -- 2.4 Application patterns for Application Integration -- 2.5 Application patterns for Extended Enterprise -- 2.6 Summary -- Chapter 3. …”
Libro electrónico -
20099CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…Employ a proper password strategy -- Utilize multifactor authentication -- Log out when you're finished -- Use your own computer or phone -- Lock your computer -- Use a separate, dedicated computer for sensitive tasks -- Use a separate, dedicated browser for sensitive web-based tasks -- Secure your access devices -- Keep your devices up to date -- Don't perform sensitive tasks over public Wi-Fi -- Never use public Wi-Fi in high-risk places -- Access your accounts only in safe locations -- Use appropriate devices -- Set appropriate limits -- Use alerts -- Periodically check access device lists -- Check last login info -- Respond appropriately to any fraud alerts -- Never send sensitive information over an unencrypted connection -- Beware of social engineering attacks -- Establish voice login passwords -- Protect your cellphone number -- Don't click on links in emails or text messages -- Securing Data with Parties You've Interacted With -- Securing Data at Parties You Haven't Interacted With -- Securing Data by Not Connecting Hardware with Unknown Pedigrees -- Chapter 8 Passwords -- Passwords: The Primary Form of Authentication -- Avoiding Simplistic Passwords -- Password Considerations -- Easily guessable personal passwords -- Complicated passwords aren't always better -- Different levels of sensitivity -- Your most sensitive passwords may not be the ones you think -- You can reuse passwords - sometimes -- Consider using a password manager -- Creating Memorable, Strong Passwords -- Knowing When to Change Passwords -- Changing Passwords after a Breach -- Providing Passwords to Humans -- Storing Passwords -- Storing passwords for your heirs -- Storing general passwords -- Transmitting Passwords -- Discovering Alternatives to Passwords -- Biometric authentication -- SMS-based authentication -- App-based one-time passwords -- Hardware token authentication…”
Libro electrónico -
20100Publicado 1994Tabla de Contenidos: “…Experiments 1 and 2: Contextual Factors Surrounding Performance of Task -- 3. Method -- 3.1. Subjects -- 3.2. …”
Libro electrónico