Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Música 229
- Música orquestal 194
- Development 189
- Engineering & Applied Sciences 188
- Historia 181
- Application software 176
- Computer programs 141
- Management 127
- Suites (Orquesta) 125
- Data processing 121
- History 110
- Computer Science 105
- Computer networks 94
- Business & Economics 91
- Security measures 85
- Web sites 85
- Computer graphics 81
- Operating systems (Computers) 78
- Design 77
- Computer software 76
- Business 75
- Cloud computing 74
- Música instrumental 74
- Database management 73
- Computer security 68
- Electrical & Computer Engineering 68
- Telecommunications 65
- Computer programming 63
- Economic conditions 61
- Suites (Piano) 54
-
4061Publicado 2022Tabla de Contenidos: “…-- The desktop -- Exploring the Activities Overview -- Customizing Your Ride -- Chapter 2 The KDE Plasma Desktop -- The KDE Plasma Desktop -- The Application launcher -- The panel -- The desktop -- Using Widgets -- Adding widgets -- Getting more widgets -- Plasma System Settings -- Desktop Settings -- Chapter 3 Other Popular Desktops -- Spicing Things Up with Cinnamon -- Reviewing the history of Cinnamon -- Looking at the menu -- Changing settings -- Adding more spice -- Working with MATE -- The history of MATE -- Looking at the menu -- Changing desktop settings -- Applets -- The Xfce Desktop Interface -- The history of Xfce -- The Whisker menu -- Changing Xfce settings -- Applets -- Chapter 4 Linux Desktop Applications -- The LibreOffice Suite -- Browsing the Web with Firefox -- Configuring Firefox -- Communicating with Email -- Evolving into email -- Working with KMail -- Setting up KMail -- The amazing Thunderbird -- Listening to Audio -- Listening to downloaded music -- Amarok -- Rhythmbox -- Viewing Movie Files -- Creating and Modifying Graphics -- Chapter 5 The Linux File System -- Pieces of the Puzzle -- Touring the Linux File System -- The root of the tree -- Where removable media lives -- Managing Your File System without a Net (or Mouse) -- Viewing information about files on the command line -- Understanding file listing information…”
Libro electrónico -
4062Publicado 2017Tabla de Contenidos: “…-- Where Does System Center and Operations Management Suite Fit with Azure Stack -- The Bottom Line -- Chapter 10 Containers and Docker -- Challenge of Application Deployment -- Hyper-V Nested Virtualization -- Windows Container Fundamentals -- Windows Server Containers vs. …”
Libro electrónico -
4063Publicado 2018Tabla de Contenidos: “…Inspecting variable values -- Debugging an application in an externally configured Tomcat -- Using the debugger to know the status of program execution -- Summary -- Chapter 7: Creating JEE Applications with EJB -- Types of EJB -- Session beans -- Stateful session beans -- Stateless session beans -- Singleton session beans -- Accessing session beans from a client -- Creating a no-interface session bean -- Accessing session beans using dependency injection -- Creating session beans using local business interface -- Accessing session beans using JNDI lookup -- Creating session beans using remote business interface -- Accessing remote session beans -- Configuring the GlassFish Server in Eclipse -- Creating a Course Management application using EJB -- Creating EJB projects in Eclipse -- Configuring datasources in GlassFish -- Configuring JPA in an Eclipse project -- Creating a JPA entity -- Creating stateless EJB -- Creating JSF and managed beans -- Running the example -- Creating EAR for deployment outside Eclipse -- Creating a JEE project using Maven -- Summary -- Chapter 8: Creating Web Applications with Spring MVC -- Dependency injection -- Dependency injection in Spring -- Component scopes -- Installing Spring Tool Suite -- Creating a Spring MVC application -- Creating a Spring project -- Understanding files created by the Spring MVC project template -- Building the Spring MVC application using JDBC -- Configuring a datasource -- Using the Spring JDBCTemplate class -- Creating the Spring MVC Controller -- Creating View -- Mapping data using @ModelAttribute -- Using parameters in @RequestMapping -- Using Spring interceptors -- Spring MVC application using JPA -- Configuring JPA -- Creating the Course entity -- Creating CourseDAO and Controller -- Creating the course list view -- Summary -- Chapter 9: Creating Web Services -- What is a web service?…”
Libro electrónico -
4064por Meyers, Michael, 1961-Tabla de Contenidos: “…-- Chapter Review -- Questions -- Answers -- Chapter 6 Installing a Physical Network -- Historical/Conceptual -- Understanding Structured Cabling -- Cable Basics-A Star Is Born -- Test Specific -- Structured Cable Network Components -- Structured Cable-Beyond the Star -- Installing Structured Cabling -- Getting a Floor Plan -- Mapping the Runs -- Determining the Location of the Telecommunications Room -- Pulling Cable -- Making Connections -- Testing the Cable Runs -- NICs -- Buying NICs -- Link Lights -- Diagnostics and Repair of Physical Cabling -- Diagnosing Physical Problems -- Check Your Lights -- Check the NIC -- Cable Testing -- Problems in the Telecommunications Room -- Toners -- Chapter Review -- Questions -- Answers -- Chapter 7 TCP/IP Basics -- Historical/Conceptual -- Standardizing Networking Technology -- Test Specific -- The TCP/IP Protocol Suite -- Internet Layer Protocols -- Transport Layer Protocols -- Application Layer Protocols -- IP in Depth -- IP Addresses -- IP Addresses in Action -- Class IDs -- CIDR and Subnetting -- Subnetting -- CIDR: Subnetting in the Real World -- Using IP Addresses -- Static IP Addressing -- Dynamic IP Addressing…”
Publicado 2012
Libro electrónico -
4065Publicado 2017Tabla de Contenidos: “…." -- The source of bond returns-the current interest yield -- With lower returns are in prospect for stocks and bonds, balanced stock/bond portfolios will follow suit -- If rational expectations suggest a future gross annual return of 3.6 percent for a balanced fund, what does this imply for the net return to owners of the balanced fund? …”
Libro electrónico -
4066por Jang, MichaelTabla de Contenidos: “…Installation Mode -- Security and dnf -- Updates and Security Fixes -- Package Groups and dnf -- More dnf Commands -- Module Streams (*) -- Certification Summary -- Two-Minute Drill -- Q& -- A Self Test -- Lab Questions -- Self Test Answers -- Lab Answers -- 5 systemd and the Boot Process -- The Boot Process -- Basic System Configuration -- Startup Menus -- Access to Linux Bootloaders -- Bootloaders and GRUB 2 -- GRUB, the GRand Unified Bootloader -- Exercise 5-1: Boot into a Different Target -- Exercise 5-2: Recover the Root Password -- Modify the System Bootloader -- How to Update GRUB 2 -- The GRUB 2 Command Line -- Exercise 5-3: Using the GRUB 2 Command Line -- An Option for Booting from GRUB 2: Rescue Mode -- Between GRUB 2 and Login -- Kernels and the Initial RAM Disk -- The First Process, Targets, and Units -- Switch Between Targets -- Reboot and Shut Down a System Normally -- systemd Replaces Upstart and SysVinit -- systemd Units -- Virtual Consoles and Login Screens -- Control by Target -- Functionality by Target -- The Innards of systemd Units -- Service Configuration -- Time Synchronization -- Time Zone Configuration -- Sync the Time with chronyd -- Certification Summary -- Two-Minute Drill -- Q& -- A Self Test -- Lab Questions -- Self Test Answers -- Lab Answers -- 6 User Administration -- User Account Management -- Different Kinds of Users -- The Shadow Password Suite -- Command-Line Tools -- Exercise 6-1: Add a User with Cockpit Web Console -- Exercise 6-2: Real and Fake Shells -- Modify an Account -- Administrative Control -- The Ability to Log In -- The su Command -- Limit Access to su -- The sg Command -- Superuser Access with the sudo Command -- User and Shell Configuration -- Home Directories and /etc/skel -- Exercise 6-3: Another Way to Secure a System -- Shell Configuration Files in User Home Directories…”
Publicado 2024
Libro electrónico -
4067por Schilling, MartinTabla de Contenidos: “…. -- Organizational chart and roles -- Practice 74: Defining the roles & -- responsibilities for a service operations function -- Practice 75: Scaling the right service operations roles at the right time -- Preventing contacts -- Practice 76: Preventing unnecessary contacts in the first place -- Deflecting contacts -- Practice 77: Deflecting transactional contacts to an automated self-help -- Resolving contacts -- Practice 78: Investing in a hybrid operating model and specialization to ensure availability at all times -- Practice 79: Resolving customer inquiries with autonomous teams and close-knit performance management -- Practice 80: Investing in Lean Six Sigma processes while giving teams enough room to create moments of service delight -- Practice 81: Investing in a loosely coupled, yet highly integrated suite of service tools -- Practice 82: Steering external partners to jointly drive business goals -- Practice 83: Boosting back-office throughput with performance management, automation and centers of excellence -- Practice 84: Investing in resilience to quickly recover from demand and supply shocks -- 10 Supply Chain Excellence: Shipping customer happiness consistently -- OKRs -- Practice 85: Establishing the right supply chain OKRs -- Organizational chart and roles -- Practice 86: Defining the roles & -- responsibilities for a supply chain operations function…”
Publicado 2022
Libro electrónico -
4068Publicado 2016Tabla de Contenidos: “…-- CHAPTER 10 Advanced Topics in Pricing -- Nonlinear Pricing -- A Single Two-Part Tariff -- Two Two-Part Tariffs -- Tie-in Sales -- General Justifications for Tie-in Sales -- Tie-in Sales as a Method of Price Discrimination -- Package Tie-in Sales of Independent Products -- Interrelated Demands -- Quality Choice -- Other Methods of Nonlinear Pricing -- Minimum Quantities and Quantity Discounts -- Selection of Price Schedules -- Premium for Priority -- Auctions -- Summary -- Problems -- APPENDIX 10A The Optimal Two-Part Tariff -- APPENDIX 10B Nonlinear Pricing with an Example -- EXAMPLE 10.1 Football Tariffs -- EXAMPLE 10.2 You Auto Save from Tie-in Sales -- EXAMPLE 10.3 Stuck Holding the Bag -- EXAMPLE 10.4 Tied to TV -- EXAMPLE 10.5 Not Too Suite-Mixed Bundling -- EXAMPLE 10.6 Price Discriminating on eBay -- CHAPTER 11 Strategic Behavior -- Strategic Behavior Defined -- Noncooperative Strategic Behavior -- Predatory Pricing -- Limit Pricing -- Investments to Lower Production Costs -- Raising Rivals' Costs -- Welfare Implications and the Role of the Courts -- Cooperative Strategic Behavior -- Practices That Facilitate Collusion -- Cooperative Strategic Behavior and the Role of the Courts -- Summary -- Problems -- Suggested Readings…”
Libro electrónico -
4069por James, JimTabla de Contenidos: “…Your Voice Should Depend on Circumstance and Environment -- Proper Preparation -- Exercises to Try -- Breathing Is Key -- Take Your Perception Into Account -- Chapter Three: The Engaging Voice -- How to Find the Right Voiceover Artist for the Job -- Professional Versus Amateur -- Chapter Four: The Power Podcaster -- Be Confident and Passionate -- Choose a Production Schedule that Works for You -- Find Your Level of Comfort -- Get Feedback from Listeners -- Set Aside Enough Time for Production Work -- Promote, Be Proactive, and Monetise -- Choose Tools and Equipment that Suit Your Goals and Capabilities -- Chapter Five: Five-Stages to DIY PR -- The Five-Step Methodology -- Eliminating the Middleman -- The Efficient Way to Do It -- Structuring Content for the Media -- Avoiding Being Internally Focused -- Creating Content Using Different Tools -- Giving Voice to Small Startups -- Chapter Six: The Media Interview -- Practise and Prepare -- Talk About Something Relatable -- Know the Program Where You'll Be Featured -- Be Mindful About Audio Quality -- Tell a Topic Suitable for the Program -- Put Yourself in the Media People's Chair -- Chapter Seven: Crisis Communications -- It's Better to Be Prepared -- Handling a Crisis Remotely -- Communications Plans Are a Breathing Document -- Trusting Your PR Firm -- Chapter Eight: Surveys as a Source -- The Importance of Listening -- How Evaluation Is Done -- Countering Survey Dropouts -- Making Surveys More Accurate -- On Anonymity -- The Cost of Surveys and Evaluations -- Chapter Nine: Content from Social Impact Analytics -- Case study: Reducing Recidivism -- What It's Like Working with ImpactableX -- Chapter Ten: The AI Content World -- Let AI Do the Writing for You -- AI Is Universal in Its Usage and Its Reach -- The Tesseract Academy -- Chapter Eleven: Case: Legally Content…”
Publicado 2024
Libro electrónico -
4070Publicado 2012Tabla de Contenidos: “…Objective 2.03 Optical Fiber -- Optical Fiber Connectors -- Uses for Fiber -- Implementing Multiple Types of Ethernet -- Objective 2.04 Wireless Media Types -- 802.11 Wireless Networks -- Wireless Basics -- BSSID, SSID, and ESSID -- Wireless Standards -- Wireless Frequency Ranges -- Laser Links -- Bluetooth -- Infrared Wireless Networking -- Checkpoint -- Review Questions -- Review Answers -- Chapter 3: Network Topologies and Standards -- Objective 3.01 The Bus Topology and Ethernet -- Ethernet Overview -- How Ethernet Works -- CSMA/CD -- Collisions -- Termination -- Cable Breaks -- Broadcast -- Bonding -- Ethernet Standards -- Ethernet on the Bus -- Objective 3.02 The Star Bus Topology -- 10BaseT and 100BaseT -- Gigabit Ethernet -- 10/100/1000BaseT Summary -- 10 Gigabit Ethernet (10 GbE) -- Objective 3.03 Ring Topologies -- Objective 3.04 Other Topologies -- Mesh Topology -- Point-to-point and Point-to-multipoint -- CSMA/CA -- Checkpoint -- Review Questions -- Review Answers -- Chapter 4: Network Hardware -- Objective 4.01 Network Interfaces -- MAC Address -- Organizing the Data: Ethernet Frames -- Preamble -- Destination and Source MAC Addresses -- Type -- Data -- Frame Check Sequence -- Objective 4.02 Repeaters, Hubs, and Bridges -- Objective 4.03 Switched Ethernet -- The Trouble with Hubs -- Switches to the Rescue -- Spanning Tree Protocol -- Objective 4.04 Connecting Ethernet Segments -- Uplink Ports -- Crossover Cables -- Objective 4.05 Routers -- Objective 4.06 Wireless Access Points -- Checkpoint -- Review Questions -- Review Answers -- Chapter 5: TCP/IP -- Objective 5.01 The TCP/IP Protocol Suite -- Application Protocols -- Port Numbers -- Sockets -- List of Application Protocols -- Compound Application Protocols -- Transport Protocols -- TCP -- UDP -- Internet Protocols -- Internet Protocol -- Internet Control Message Protocol (ICMP)…”
Libro electrónico -
4071Publicado 2022Tabla de Contenidos: “…<P>Preface</p> <p>Chapter 1 Introduction and Overview 1</p> <p>The Shifting Landscape of Green Buildings</p> <p>The Roots of Sustainable Construction</p> <p>The Vocabulary of Sustainable Development and Sustainable Construction</p> <p>Rationale for High-Performance Buildings</p> <p>State and Local Green Building Initiatives</p> <p>Green Building Progress and Obstacles</p> <p>Trends in High-Performance Green Building</p> <p>Book Organization</p> <p>Case Study: Bloomberg European Headquarters</p> <p>Summary and Conclusions</p> <p>Part I Green Building Foundations </p> <p>Chapter 2 Background </p> <p>The Driving Forces for Sustainable Construction</p> <p>Ethics and Sustainability</p> <p>Basic Concepts and Vocabulary</p> <p>Major Environmental and Resource Concerns</p> <p>The Green Building Movement</p> <p>Case Study: OWP 11, Stuttgart, Germany</p> <p>Summary and Conclusions</p> <p>Chapter 3 Ecological Design </p> <p>Design Versus Ecological Design</p> <p>Contemporary Ecological Design</p> <p>Key Green Building Publications: Early 1990s</p> <p>Key Thinking about Ecological Design</p> <p>Evolving the Concept of Ecological Design</p> <p>Thermodynamics: Limits on Recycling and the Dissipation of Materials</p> <p>Case Study: Kroon Hall, Yale University, New Haven, Connecticut</p> <p>Synthesis</p> <p>Summary and Conclusions</p> <p>Part II Assessing High-Performance Green Buildings </p> <p>Chapter 4 Green Building Assessment </p> <p>Purpose of Green Building Assessment Systems</p> <p>Major Green Building Assessment Systems Used in the US</p> <p>International Building Assessment Systems</p> <p>Summary and Conclusions</p> <p>Chapter 5 The US Green Building Council LEED Building Rating System </p> <p>Brief History of LEED</p> <p>Structure of the LEED Suite of Building Rating Systems</p> <p>LEED Credentials</p> <p>LEED v4.1 Structure and Process</p> <p>Green Building Certification Institute Relationship to the USGBC and LEED</p> <p>LEED Certification Process</p> <p>LEED Building Design and Construction Rating System</p> <p>Regional Priority</p> <p>Case Study: Stephen C. …”
Libro electrónico -
4072Publicado 2023Tabla de Contenidos: “…-- Understanding Why LLCs Are Awesome -- Protecting your personal assets -- Taking charge of charging order protection -- How charging orders work -- Economic rights versus other rights -- Enjoying the flexibility of management and ownership rules -- No ownership restrictions -- No management restrictions -- Choosing your own tax status -- Making your selection -- Distributing profits at your whim -- Taking a Look at a Few Wrinkles -- Membership can be a bit tricky -- Rules governing LLCs vary among states -- Discovering the LLC's Many Variations -- The Professional LLC -- Simply wearing a suit doesn't make you a professional -- Different liability protection -- Restrictions on ownership -- Restrictions on business activities -- Forming a professional LLC -- The Series LLC -- Segregating your assets in a Series LLC -- When a Series LLC might work for you -- Forming a Series LLC -- Maintaining a Series LLC -- Series LLC Taxation -- The family LLC -- The Benefit LLC -- The single-member LLC -- Chapter 3 Determining Whether an LLC Is Right for You…”
Libro electrónico -
4073Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
4074Publicado 2023Tabla de Contenidos: “…-- Chapter 1 Get Started with ChatGPT Prompts -- Set Up a Free Research Preview Account -- Take ChatGPT for a Spin -- Log In and Meet the ChatGPT Interface -- Give Prompts -- Edit the Prompt, Add Information, or Prompt Again -- Share a Link to a Chat -- Craft Effective Prompts -- Evaluate ChatGPT's Output -- Sign Up for a Paid ChatGPT Account -- Upgrade to a ChatGPT Plus Account -- Switch Between ChatGPT Models -- Customize Your ChatGPT Account -- Choose Settings in the General Pane -- Choose Settings in the Beta Features Pane -- Choose Settings in the Data Controls Pane -- Set Up ChatGPT on Your Devices -- Install the ChatGPT App on Your iPhone or iPad -- Install the ChatGPT App on Your Android Device -- Sign In to Your ChatGPT Account -- Configure ChatGPT on Your Device -- Use ChatGPT on Your Device -- Chapter 2 ChatGPT Prompts for Getting a Job -- Get Help Writing and Polishing Your Resume -- Gather the Information for the Resume -- Get ChatGPT to Write the Resume -- Ask ChatGPT to Rewrite the Resume -- Get ChatGPT to Suggest Improvements to the Resume -- Customize the Resume to Suit a Job Description -- Make ChatGPT Your Career Guidance Counselor -- Identify Careers That Match Your Skills and Interests -- Explore Careers That Interest You -- Learn What Skills and Certifications You Need for a Particular Field -- Research Your Target Industries and Potential Employers -- Get Help Writing Cover Letters or Email Messages -- Prepare for an Interview -- Write a Post-Interview Email Message or Letter -- Chapter 3 ChatGPT Prompts for Managing Your Work and Schedule -- Streamline Your Meetings -- Schedule Your Meetings -- Set Meeting Agendas -- Perform Meeting Preparation and Research…”
Libro electrónico -
4075
-
4076
-
4077
-
4078por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Coûts salariaux horaires standardisés -- Balance des paiements -- L'excédent de la balance courante a diminué en 1999 par suite d'achats d'avions... -- Tableau 3. Balance des paiements courants -- ... mais il semble devoir augmenter fortement en 2000 -- Perspectives -- Les condi tions monétaires et les marchés d'exportation devraient devenir progressivement moins favorables -- Graphique 6. …”
Publicado 2001
Libro electrónico -
4079Publicado 2016Tabla de Contenidos: “…Business Process Management Suites -- 4.4. Designing Executable Process Models -- Digression SOA -- 4.5. …”
Libro electrónico -
4080por Laitinen, SailaTabla de Contenidos: “…12 -- 2.3.1 Baseline Maturity 13 -- 2.3.2 Customization Maturity 13 -- 2.3.3 Least Stable Sub-system 14 -- 2.3.4 Program Timing 14 -- 2.4 Summary 14 -- Chapter 3: Release Management 17 -- 3.1 The Build Cycle 19 -- 3.2 Required Testing Activities 23 -- 3.3 Summary 23 -- Chapter 4: Binary Compatibility 25 -- 4.1 API Categorization 28 -- 4.2 Maintaining Compatibility 30 -- 4.2.1 Platform Compatibility 30 -- 4.2.2 Platform-based Phone Compatibility 31 -- 4.2.3 Application Compatibility 32 -- 4.2.4 Compatibility Dimensions 32 -- 4.3 Binary Compatibility Scenario 33 -- 4.4 Binary Compatibility Verifi cation 35 -- 4.4.1 The Binary Compatibility Verifi cation Process 35 -- 4.4.2 The Binary Compatibility Verifi cation Suite 36 -- 4.4.2.1 The SDK Analyser 36 -- 4.4.2.2 The Source Analyser 38 -- 4.4.2.3 The Binary Analyser 39 -- 4.4.2.4 The Application Launcher 39 -- 4.4.2.5 Binary Compatibility Applications 40 -- 4.4.2.6 Third-Party Applications 40 -- 4.5 Possible Future Tools 40 -- 4.5.1 DepInfo Tool 41 -- 4.5.2 Header Checker Tool 41 -- 4.5.3 Ordinal Checker 42 -- 4.6 Summary 42 -- Chapter 5: Certifi cates and Standards 43 -- 5.1 Technology Certifi cates 44 -- 5.1.1 Java/TCK 44 -- 5.1.2 Bluetooth 47 -- 5.1.2.1 BT Certifi cation Areas 47 -- 5.1.3 Other Technology Licences 48 -- 5.1.4 Security Certifi cates 49 -- 5.1.5 Universal Serial Bus 50 -- 5.1.6 Infrared Connectivity 50 -- 5.1.7 Multimedia Cards (MMC) 51 -- 5.2 The Open Mobile Alliance (OMA) 52.…”
Publicado 2007
Libro electrónico