Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 38
- Operating systems (Computers) 38
- iPad (Computer) 32
- Tablet computers 30
- Computer Science 29
- Pocket computers 25
- Macintosh (Computer) 22
- Microsoft Windows (Computer file) 22
- Mac OS 20
- Security measures 17
- iPhone (Smartphone) 16
- Computer security 15
- Computer networks 13
- Surf 12
- Internet 11
- Computers 9
- Digital music players 9
- Management 9
- Electrical & Computer Engineering 8
- Microcomputers 8
- Mobile computing 8
- Programming 8
- Smartphones 8
- Surface chemistry 7
- Cell phones 6
- Portable computers 6
- Python (Computer program language) 6
- Social Sciences 6
- iPod (Digital music player) 6
- Música popular 5
-
301Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Foreword -- Preface -- Section I Trend Following Principles -- 1 Trend Following -- Speculation -- Winning versus Losing -- Investor versus Trader -- Fundamental versus Technical -- Discretionary versus Systematic -- Hiding in Plain Sight -- Change Is Life -- Follow the Trend to the End When It Bends -- Surf the Waves -- 2 Great Trend Followers -- David Harding -- Bill Dunn -- Extreme Performance Numbers -- Be Nimble -- Early Years -- Life inside Dunn Capital -- No Profit Targets -- Check Your Ego -- John W. …”
Libro electrónico -
302Publicado 2009Tabla de Contenidos: “…Creating a Smart Mailbox -- Filtering Email in Mail -- Intercepting Spam in Mail -- CHAPTER 9 LIVING ONLINE -- Hanging Out on the Net -- Setting Up an iChat Account -- Editing Your iChat Buddy List -- Messaging with iChat -- Talking over the Internet in iChat -- Holding a Videoconference -- Applying Special Video Effects -- Giving a Presentation over iChat -- Setting Up a MobileMe Account -- Surfing in Safari -- Making a Bookmark in Safari -- Viewing an RSS Feed -- Organizing Bookmarks -- Using the History in Safari -- Automatically Filling Out Forms -- Using Tabbed Browser Windows -- Searching Within a Web Page -- Browsing Securely -- Accessing Your Mac Remotely -- Controlling Kids' Computer Use -- Backing Up to Your iDisk -- Creating a MobileMe Home Page -- CHAPTER 10 GETTING AN ILIFE -- Managing Photos, Video, and Music -- Importing Photos into iPhoto -- Creating iPhoto Albums -- Printing Photos -- Sharing Photos on the Web -- Applying Fun Photo Effects -- Ripping Songs from a CD -- Making a New Playlist -- Burning a Music CD -- Purchasing Songs Through iTunes -- Importing Video Footage into iMovie -- Inserting Transitions -- Saving a Movie -- Creating a New iDVD Project -- Previewing a DVD -- Burning a DVD -- CHAPTER 11 SHARING YOUR MAC WITH MULTIPLE USERS -- Account and Security Setup -- Creating and Deleting Users -- Making a User an Admin -- Logging In and Out -- Adding Startup Items -- Resetting Your Password -- Sharing Files with Other Users -- CHAPTER 12 CREATING A HOME NETWORK -- Setting Up and Using a Network -- Getting on the Network -- Connecting to Networked Computers -- Sharing Files on a Network -- Controlling Another Mac -- Searching Multiple Macs -- Sharing a Printer on a Network -- Sharing an Internet Connection -- Joining a WiFi Network -- CHAPTER 13 MAINTAINING YOUR MAC -- Mac Maintenance and Repair Kit…”
Libro electrónico -
303Publicado 2015Tabla de Contenidos: “…Buy-Hold Myth #5: You Won't Make Any Money If You Sell and Sit in Cash Cash Can Be Your Friend Bewitched by Zero That's Not All Security or Surfing? Chapter Fifteen. Buy-Hold Myth #6: You Haven't Lost Any Money Unless You... …”
Libro electrónico -
304Publicado 2012Tabla de Contenidos: “…The Backup and Recovery Quiz -- Other Important Components -- Conclusion -- Chapter 6: MySQL Configuration Options -- Data Management -- Data Locations -- Data Consistency -- Binary Logging -- MySQL Replication -- Recovery -- Conclusion -- Chapter 7: Disaster Scenarios -- Handling a MySQL Disaster -- Notable MySQL Disasters -- Magnolia -- References -- Couch Surfing -- References -- Journal Space -- References -- Percona -- Reference -- Other Notable Data Disasters -- The Sidekick/Microsoft Data Loss -- References -- Github -- Reference -- TD Bank -- References -- General MySQL Disaster Situations -- Binary Logging Not Enabled -- A Single Server -- Appropriate MySQL Security -- Application Security -- Appropriate MySQL Configuration -- Read Only Replication Slaves -- SQL Server Modes -- Deleting MySQL Data -- References -- Deleting the InnoDB Data File -- Deleting MySQL Binary Logs -- Existing Backup and Recovery Procedure Disasters -- MySQL Software Upgrades -- Operating System Security Patch Upgrade -- Handling MyISAM Corruption -- The Call for Help -- The Confirmation of a Serious Problem -- The First Resolution Attempt -- The Second Resolution Attempt -- The Third Resolution Attempt -- A Failed Database Backup -- Detecting Hardware Faults -- Conclusion -- Missing Database Schemas -- Restoring a Backup on a Running MySQL Instance -- Handling InnoDB Specific Situations -- Automatic Recovery -- InnoDB Data Dictionary Inconsistency -- Automatic Recovery Crashes the Database Server -- Other MySQL Situations -- Replication Inconsistency -- RDS Recovery Failure -- Common Downtime Causes -- External Help -- Conclusion -- Chapter 8: Optimizing Backup and Recovery -- Example Backup Environment -- Using Compression -- mysqldump -- Compression Utilities -- MySQL Enterprise Backup (MEB) -- XtraBackup -- Streaming Backups -- Using SSH -- Using nc…”
Libro electrónico -
305Publicado 2017Tabla de Contenidos: “…-- Picking on the little guys -- Sea-surfing on someone else's board -- Simple account takeovers -- Don't you know who I am? …”
Libro electrónico -
306por Ballew, Joli“…Here’s WHAT You’ll Learn: Personalize your Start screen in cool new ways Use apps such as Mail, People, Calendar, Skype, and Paint Surf the web, and send and receive email and messages Explore redesigned apps for Music, Video, and Windows Store Search your files, media, and the web—all at once Access your files from the cloud with Microsoft SkyDrive Here’s HOW You’ll Learn It Jump in wherever you need answers Follow easy steps and screenshots to see exactly what to do Get handy tips for new techniques and shortcuts Use Try This! …”
Publicado 2013
Libro electrónico -
307por Pogue, David, 1963-Tabla de Contenidos: “…Windows Live Writer -- Windows Media Player -- Windows PowerShell -- Windows Speech Recognition -- WordPad -- XPS Viewer -- The Control Panel -- Many Roads to Control Panel -- The Control Panel, Applet by Applet -- Part Three: Windows Online -- Hooking Up to the Internet -- Connecting to a WiFi Network -- Wired Connections -- Tethering and Cellular Modems -- Dial-Up Connections -- Connection Management -- Security & -- Privacy -- Windows Defender -- Action Center -- Windows Firewall -- Windows SmartScreen -- Privacy and Cookies -- History: Erasing Your Tracks -- The Pop-Up Blocker -- InPrivate Browsing -- Internet Security Zones -- Do Not Track -- Hotspot Security -- Protect Your Home Wireless Network -- Family Safety (Parental Controls) -- Internet Explorer 11 -- IE11 Desktop: The Grand Tour -- The Address/Search Bar -- Tabbed Browsing -- Favorites (Bookmarks) -- History List -- RSS: The Missing Manual -- Tips for Better Surfing -- The Keyboard Shortcut Master List -- Windows Live Mail -- Setting Up Windows Live Mail -- Checking Email -- Composing and Sending Messages -- Reading Email -- Quick Views, Custom Views (Filters) -- How to Process a Message -- Junk Email -- The World of Mail Settings -- The Contacts List -- Mail's Calendar -- RSS Feeds -- Newsgroups -- Part Four: Pictures & -- Music -- Windows Photo Gallery -- Photo Gallery: The Application -- Getting Pictures into Photo Gallery -- The Post-Dump Slideshow -- The Digital Shoebox -- People, Tags, Geotags, Captions, Ratings, and Flags -- Searching for Photos -- Editing Your Shots -- Finding Your Audience -- Windows Media Player -- The Lay of the Land -- Importing Music Files -- Music Playback -- Playlists -- Burning Your Own CDs -- Sharing Music on the Network -- Pictures and Videos -- Part Five: Hardware & -- Peripherals -- Printing, Fonts & -- Faxing -- Installing a Printer…”
Publicado 2013
Libro electrónico -
308Publicado 2024Tabla de Contenidos: “…Benefit of Security Controls -- Countermeasure Selection and Implementation -- Applicable Types of Controls -- Security Control Assessment -- Monitoring and Measurement -- Risk Reporting and Documentation -- Continuous Improvement -- Legacy Risk -- Risk Frameworks -- Social Engineering -- Social Engineering Principles -- Eliciting Information -- Prepending -- Phishing -- Spear Phishing -- Whaling -- Spam -- Shoulder Surfing -- Invoice Scams -- Hoax -- Impersonation and Masquerading -- Tailgating and Piggybacking -- Dumpster Diving -- Identity Fraud -- Typosquatting -- Influence Campaigns -- Establish and Maintain a Security Awareness, Education, and Training Program -- Awareness -- Training -- Education -- Improvements -- Effectiveness Evaluation -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 3 Business Continuity Planning -- Planning for Business Continuity -- Project Scope and Planning -- Organizational Review -- BCP Team Selection -- Resource Requirements -- External Dependencies -- Business Impact Analysis -- Identifying Priorities -- Risk Identification -- Likelihood Assessment -- Impact Analysis -- Resource Prioritization -- Continuity Planning -- Strategy Development -- Provisions and Processes -- Plan Approval and Implementation -- Plan Approval -- Plan Implementation -- Communication, Training and Education -- BCP Documentation -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 4 Laws, Regulations, and Compliance -- Categories of Laws -- Criminal Law -- Civil Law -- Administrative Law -- Laws -- Computer Crime -- Intellectual Property (IP) -- Software Licensing…”
Libro electrónico -
309Publicado 2012Tabla de Contenidos: “…HyperText Transfer Protocol and HyperText Transfer Protocol Secure -- Domain Name System -- Network File System -- File Transfer Protocols -- Tunneling Protocols -- Routing Protocols -- Telnet -- Secure Shell -- Internet Protocol Security -- Secure Sockets Layer and Transport Layer Security -- E-mail Protocols -- Network News Transfer Protocol -- Electronic Data Interchange -- Mapping Well-Known Ports to Protocols -- Comparing Internetwork Architectures -- Comparing Public and Private IP Addresses -- Using NAT -- Exploring Wireless Technologies -- Comparing WEP, WPA, and WPA2 -- Wireless Device Administrator Password -- Wireless Service Set Identifier -- MAC Filtering -- Bluetooth -- Radio-Frequency Identification -- GSM -- 3G -- WiMAX -- NFC -- Protecting Mobile Devices -- Questions -- Answers -- Chapter 4 Advanced Networking and Communications -- Understanding Telecommunications -- Internet Connections -- VoIP -- Securing Phones -- Understanding Firewalls -- Packet Filtering Firewall -- Stateful Inspection Firewall -- Application Firewall -- Defense Diversity -- Comparing Network-based and Host-based Firewalls -- Using Proxy Servers -- Exploring Remote Access Solutions -- Risks and Vulnerabilities -- Tunneling Protocols -- Authentication -- Access and Admission Control -- Questions -- Answers -- Chapter 5 Attacks -- Comparing Attackers -- Hackers and Crackers -- Insiders -- Script Kiddies -- Phreaks -- Exploring Attack Types -- DoS -- DDoS -- Botnets and Zombies -- Spam -- Sniffing Attack -- Ping Sweep -- Port Scan -- Salami -- Man-in-the-Middle -- Session Hijacking -- Replay -- Buffer Overflow Attacks -- Scareware and Ransomware -- Password Attacks -- Covert Channel -- Cramming -- Zero Day Exploits -- Advanced Persistent Threat -- Understanding Social Engineering -- Piggybacking -- Impersonation -- Dumpster Diving -- Shoulder Surfing -- Phishing…”
Libro electrónico -
310Publicado 2020Tabla de Contenidos: “…Using your mind to manage stress -- Cooling Down Your Anger -- Understanding anger -- Coping when the fire rises up -- Reducing Fatigue -- Assessing your energy levels -- Discovering energy drainers -- Finding what uplifts you -- Using meditations to rise and sparkle -- Chapter 13 Using Mindfulness to Combat Anxiety, Depression and Addiction -- Exploring Acceptance and Commitment Therapy -- All human minds suffer - it's natural -- Six core skills of ACT -- Doing ACT exercises -- Dealing Mindfully with Depression -- Understanding depression -- Understanding why depression recurs -- Using mindfulness to change your relationship to low mood -- Discovering Mindfulness-Based Cognitive Therapy (MBCT) -- Pleasant and Unpleasant Experiences -- Interpreting thoughts and feelings -- Combating automatic thoughts -- Alternative viewpoints -- De-centring from difficult thoughts -- Listing your activities -- Making wise choices -- Using a depression warning system -- Calming Anxiety: Let It Be -- Feel the fear . . . and make friends with it -- Using mindfulness to cope with anxiety -- Being with anxious feelings -- Overcoming Addiction -- Understanding a mindful approach to addiction -- Discovering urge surfing: The mindful key to unlocking addiction -- Managing relapse: Discovering the surprising secret for success -- Chapter 14 Getting Physical: Healing the Body -- Contemplating Wholeness: Healing from Within -- Seeing the Connection between Mind and Body -- Accepting Your Limits -- Rising above Your Illness -- Using Mindfulness to Accept Pain -- Knowing the difference between pain and suffering -- Working with pain -- Using Mindfulness during Ill Health -- Aiding the healing process -- Chapter 15 Sharing Mindfulness with Children -- Children and Mindfulness: A Natural Combination -- Teaching Mindfulness to Children -- Setting an example -- Taking baby steps…”
Libro electrónico -
311Publicado 2023Tabla de Contenidos: “…Identifying Risks -- Protecting against Risks -- Perimeter defense -- Firewall/router -- Security software -- Your physical computer(s) and any other endpoints -- Backups -- Detecting -- Responding -- Recovering -- Improving -- Evaluating Your Current Security Measures -- Software -- Hardware -- Insurance -- Education -- Privacy 101 -- Think before you share -- Think before you post -- General privacy tips -- Banking Online Safely -- Safely Using Smart Devices -- Cryptocurrency Security 101 -- Chapter 2 Enhancing Physical Security -- Understanding Why Physical Security Matters -- Taking Inventory -- Stationary devices -- Mobile devices -- Locating Your Vulnerable Data -- Creating and Executing a Physical Security Plan -- Implementing Physical Security -- Security for Mobile Devices -- Realizing That Insiders Pose the Greatest Risks -- Chapter 3 Cybersecurity Considerations When Working from Home -- Network Security Concerns -- Device Security Concerns -- Location Cybersecurity -- Shoulder surfing -- Eavesdropping -- Theft -- Human errors -- Video Conferencing Cybersecurity -- Keep private stuff out of camera view -- Keep video conferences secure from unauthorized visitors -- Social Engineering Issues -- Regulatory Issues -- Chapter 4 Securing Your Accounts -- Realizing You're a Target -- Securing Your External Accounts -- Securing Data Associated with User Accounts -- Conduct business with reputable parties -- Use official apps and websites -- Don't install software from untrusted parties -- Don't root your phone -- Don't provide unnecessary sensitive information -- Use payment services that eliminate the need to share credit card numbers -- Use one-time, virtual credit card numbers when appropriate -- Monitor your accounts -- Report suspicious activity ASAP -- Employ a proper password strategy -- Utilize multifactor authentication…”
Libro electrónico -
312Publicado 2010Tabla de Contenidos: “…Modifying Code with the Tag Inspector -- Rapid Tag Modification with the Quick Tag Editor -- Adding Java Applets -- Managing JavaScript and VBScript -- Validating Your XML Pages -- Inserting Symbols and Special Characters -- Summary -- Chapter 6: Building Style Sheet Web Pages -- Understanding Cascading Style Sheets -- Working with the CSS Styles Panel -- Creating and Applying Styles -- Styles and Their Attributes -- Design-Time Style Sheets -- Summary -- Chapter 7: Working with Text -- Starting with Headings -- Working with Paragraphs -- Checking Your Spelling -- Using Find and Replace -- Controlling Whitespace -- Working with Microsoft Office Documents -- Styling Your Text -- Modifying Text Format -- Incorporating Dates -- Commenting Your Code -- Summary -- Chapter 8: Inserting Images -- Using Images Inline -- Adding Background Images -- Dividing the Web Page with Horizontal Rules -- Including Banner Ads -- Inserting Rollover Images -- Summary -- Chapter 9: Establishing Web Links -- Understanding URLs -- Surfing the Web with Hypertext -- Adding an E-mail Link -- Navigating with Anchors -- Targeting Your Links -- Summary -- Part III: Adding Advanced Design Features -- Chapter 10: Working with Divs and AP Elements -- Divs and AP Elements 101 -- Placing < -- div> -- Tags -- Creating AP Elements with Dreamweaver -- Modifying an AP Element -- Creating Your Page Design with AP Elements -- Activating AP Elements with Behaviors -- Summary -- Chapter 11: Using Behaviors -- Understanding Behaviors, Events, and Actions -- Attaching a Behavior -- Installing, Managing, and Modifying Behaviors -- Summary -- Chapter 12: Setting Up Tables -- HTML Table Fundamentals -- Inserting Tables in Dreamweaver -- Modifying Tables -- Sorting Tables -- Importing Tabular Data -- Summary -- Chapter 13: Interactive Forms -- How HTML Forms Work…”
Libro electrónico -
313CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…Your work environment -- Identifying Risks -- Protecting against Risks -- Perimeter defense -- Firewall/router -- Security software -- Your physical computer(s) and any other endpoints -- Backups -- Detecting -- Responding -- Recovering -- Improving -- Evaluating Your Current Security Measures -- Software -- Hardware -- Insurance -- Education -- Privacy 101 -- Think before you share -- Think before you post -- General privacy tips -- Banking Online Safely -- Safely Using Smart Devices -- Cryptocurrency Security 101 -- Chapter 5 Enhancing Physical Security -- Understanding Why Physical Security Matters -- Taking Inventory -- Stationary devices -- Mobile devices -- Locating Your Vulnerable Data -- Creating and Executing a Physical Security Plan -- Implementing Physical Security -- Security for Mobile Devices -- Realizing That Insiders Pose the Greatest Risks -- Chapter 6 Cybersecurity Considerations When Working from Home -- Network Security Concerns -- Device Security Concerns -- Location Cybersecurity -- Shoulder surfing -- Eavesdropping -- Theft -- Human errors -- Video Conferencing Cybersecurity -- Keep private stuff out of camera view -- Keep video conferences secure from unauthorized visitors -- Social Engineering Issues -- Regulatory Issues -- Part 3 Protecting Yourself from Yourself -- Chapter 7 Securing Your Accounts -- Realizing You're a Target -- Securing Your External Accounts -- Securing Data Associated with User Accounts -- Conduct business with reputable parties -- Use official apps and websites -- Don't install software from untrusted parties -- Don't root your phone -- Don't provide unnecessary sensitive information -- Use payment services that eliminate the need to share credit card numbers -- Use one-time, virtual credit card numbers when appropriate -- Monitor your accounts -- Report suspicious activity ASAP…”
Libro electrónico -
314
-
315por Hart-Davis, GuyTabla de Contenidos: “…View Files and Folders by Tags -- Work with Zip Files -- Work with Zip Files -- Compress Files to a Zip File -- Extract Files from a Zip File -- Using the Trash -- Using the Trash -- Place a File in the Trash -- Recover a File from the Trash -- Configure Finder Settings -- Configure Finder Settings -- Customize the Finder Toolbar -- Customize the Finder Toolbar -- Customize the Finder Sidebar -- Customize the Finder Sidebar -- Chapter 6 Surfing the Web -- Open Safari and Customize Your Start Page -- Open Safari and Customize Your Start Page -- Open a Web Page -- Open a Web Page -- Follow a Link to a Web Page -- Follow a Link to a Web Page -- Open Several Web Pages at Once -- Open Several Web Pages at Once -- Open Several Pages on Tabs in the Same Safari Window -- Open Several Pages in Separate Safari Windows -- Navigate Among Web Pages -- Navigate Among Web Pages -- Go Back One Page -- Go Forward One Page -- Go Back Multiple Pages -- Go Forward Multiple Pages -- Return to a Recently Visited Page -- Return to a Recently Visited Page -- Return to a Page on the History List -- Clear Your Browsing History -- Play Music and Videos on the Web -- Play Music and Videos on the Web -- Play Music -- Play Videos -- Set Your Home Page and Search Engine -- Set Your Home Page and Search Engine -- Create Bookmarks for Web Pages -- Create Bookmarks for Web Pages -- Create a New Bookmark -- Organize Your Bookmarks -- Using Reader View and Reading List -- Using Reader View and Reading List -- Switch a Web Page to Reader View -- Add a Web Page to Reading List -- Open Reading List and Display a Page -- Organize Safari Tabs into Tab Groups -- Organize Safari Tabs into Tab Groups -- Download a File -- Download a File -- Create and Use Safari Profiles -- Configure Safari for Security and Privacy -- Configure Safari for Security and Privacy…”
Publicado 2024
Libro electrónico -
316Publicado 2017“…Engaging with the experiences of Pentecostal punks, surfing missionaries, township rappers, and skateboarding youth pastors, this book makes an original contribution to the sociology of religion, youth studies, and the study of religion and popular culture…”
Libro -
317Publicado 2010Tabla de Contenidos: “…Working with Bookmarks -- Downloading and Viewing Files -- Saving Web Pages -- Customizing Safari's Toolbar -- Quitting Safari -- 8 Keeping Your Address Book and Schedule -- Using the Address Book -- Using iCal -- 9 Emailing and Chatting Online -- Using Mac Mail -- Using iChat -- 10 Using TextEdit -- Working with Documents -- Navigating and Editing Text -- Setting Margins and Tabs -- Formatting Text -- Formatting Paragraphs -- Exploring Other Formatting Features -- Printing -- 11 Managing and Editing Your Photos -- Setting Up iPhoto -- Importing Photos and Movies -- Viewing Photos -- Viewing, Changing, and Adding Photo Information -- Viewing and Changing Information for Events -- Sorting Photos -- Exploring Methods to Organize Photos -- Searching for Photos -- Editing Photos -- Sharing Photos with Others -- 12 Using Widgets and Other Applications -- Using Widgets -- Using Preview -- Consulting the Dictionary -- Posting Stickies -- Using the Calculator -- 13 Keeping Your Mac Safe, Updated, and Backed Up -- Safely Surfing the Web -- Working with the Keychain -- Maintaining Your Mac Software -- Backing Up with Time Machine -- Part III: Having Fun and Getting Creative -- 14 Watching Movies, Listening to Music, and Playing Games -- Watching Movies and Videos -- Listening to Music with iTunes -- Listening to Music in Front Row -- Acquiring and Playing Podcasts -- Playing Games -- 15 Being Creative with Photos -- Making Self-Portraits in Photo Booth -- Creating and Exporting Slideshows -- Designing and Publishing a Photo Book -- Creating Other Keepsakes -- Using Comic Life -- 16 Making Your Own Movies -- Getting Started -- Adding Video to the Events Library -- Playing Clips in the Event Library -- Creating and Playing a New Movie Project -- Trimming and Splitting Clips -- Adding Transitions between Clips -- Adding Titles -- Sharing and Exporting Movies…”
Vídeo online -
318
-
319
-
320Publicado 2006“…The book concludes that while single homeless women remain 'invisible' as a target group in need of accommodation assistance, they will continue to be displaced from their home suburbs and forced to solve their own homelessness through problematic practices such as 'couch surfing' and swapping sex for shelter."--Publisher's website…”
Libro electrónico