Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Benet 1,073
- History 727
- Management 710
- Historia 682
- Development 662
- Application software 512
- Leadership 481
- Engineering & Applied Sciences 439
- Computer Science 299
- Computer networks 297
- Social aspects 289
- Data processing 279
- Business & Economics 257
- Security measures 257
- Computer security 242
- Information technology 240
- Computer programs 232
- Cloud computing 227
- Computer software 223
- Python (Computer program language) 213
- Success in business 210
- Artificial intelligence 209
- Computer programming 195
- Design 194
- Història 194
- Filosofía 193
- Technological innovations 191
- Database management 190
- Peces 186
- Examinations 182
-
24181Publicado 2007“…Written by leading Ubuntu community members, this is the only book that you need to become a savvy Ubuntu user. Covers the latest version of Ubuntu--Ubuntu 6.06LTS Covers every standard desktop application from word processing, spreadsheets, Web browsing, e-mail, instant messaging, music, video, and, of course, games, all the way to software development, databases, and other server applications Includes real-world troubleshooting advice contributed by Ubuntu users from around the world Learn about the extended Ubuntu community, which includes translators; software developers; teachers; people who love to hand out CDs and help friends try free software; artists; people who write documentation, tips, and guides; accountants; and even a lawyer or two. …”
Libro electrónico -
24182Publicado 2005“…A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues Operate and maintain a secure MPLS core with industry best practices Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS) Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. …”
Libro electrónico -
24183Publicado 2003“…Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. …”
Libro electrónico -
24184por Fleisher, Craig S.“…--Bill Fiora, Partner and Founder, Outward Insights “All practicing managers and business decision makers should be grateful to Fleisher and Bensoussan for showing them how their analysis work can become more rigorous and their approach less casual. …”
Publicado 2007
Libro electrónico -
24185por Bai, Ying, 1956-“…Computer applications and their implementations become more complex and specialized by the day. Often, the best way to meet a particular challenge is to apply two or more programming languages to the task. …”
Publicado 2003
Libro electrónico -
24186Publicado 2010“…While many companies have become very good at recruiting, today's orientation programs fall woefully short and impact your bottom-line potential. …”
Libro electrónico -
24187Publicado 2010“…With the right coaching system in place, this dream will soon become reality. With The Extraordinary Coach , leadership guru Jack Zenger and coaching expert Kathleen Stinnett deliver an entire toolbox for coaching your organization to success. …”
Libro electrónico -
24188Publicado 2019“…What you will learn Understand what true serverless architecture is Study how to extend and scale architectures until they become 'complex' Implement durable functions in your design Improve the observability of your serverless architecture Implement security solutions using serverless services Learn how to 'practise' chaos engineering in production Who this book is for Advanced Serverless Architectures with Microsoft Azure is is ideal if you want to build serverless systems with fewer outages and high performance using Azure. …”
Libro electrónico -
24189Publicado 2013“…The Heart of Leadership is a road map for every person who desires to make a difference in the lives of others and become a leader people want to follow. ¿Qué es lo que hace que un líder sea verdaderamente excepcional? …”
Libro electrónico -
24190Publicado 2019“…This book gives you all the information you need to become an expert in MS Dynamics 365. This book starts with a brief overview of the functional features of Dynamics 365. …”
Libro electrónico -
24191Publicado 2017“…It can be applied to a range of business strategies and has been a key player in search advertising and recommendation engines. …”
Libro electrónico -
24192Publicado 2015“…This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced into the Operations areas with IBM z/OS® V2R2. …”
Libro electrónico -
24193Publicado 2017“…What You Will Learn Set up your Raspberry Pi Zero with the operating system, networking, and different interfaces Get a hands-on introduction to Linux, Python, and shell scripts with the Raspberry Pi Zero Become a master at driving GPIOs and controlling relays, motors, transistors, buzzers, audio, read switches, and interrupts with the Raspberry Pi Zero Control GPIOs using the web interface and Node.js Connect displays, LED matrixes, analog sensors, and digital sensors Hack the Ethernet on the Raspberry Pi Zero Make your Raspberry Pi Zero an IoT-based sensor node and remotely monitor your data In Detail The Raspberry Pi Zero, one of the most inexpensive, fully-functional computers available, is a powerful and revolutionary product developed by the Raspberry Pi Foundation. …”
Libro electrónico -
24194Publicado 2017“…What You Will Learn Realize different classification and regression techniques Understand the concept of clustering and how to use it to automatically segment data See how to build an intelligent recommender system Understand logic programming and how to use it Build automatic speech recognition systems Understand the basics of heuristic search and genetic programming Develop games using Artificial Intelligence Learn how reinforcement learning works Discover how to build intelligent applications centered on images, text, and time series data See how to use deep learning algorithms and build applications based on it In Detail Artificial Intelligence is becoming increasingly relevant in the modern world where everything is driven by technology and data. …”
Libro electrónico -
24195Publicado 2017“…Next, you will be able to identify the main structures in the language, functions, and classes, and feel confident being able to identify the execution flow through the code. You will then become aware of the facilities of the standard library and be able to determine whether you need to write a routine yourself, or use an existing routine in the standard library. …”
Libro electrónico -
24196Publicado 2017“…What You Will Learn Get equipped with a deeper understanding of how to apply machine-learning techniques Implement each of the advanced machine-learning techniques Solve real-life problems that are encountered in order to make your applications produce improved results Gain hands-on experience in problem solving for your machine-learning systems Understand the methods of collecting data, preparing data for usage, training the model, evaluating the model's performance, and improving the model's performance In Detail Machine learning has become the new black. The challenge in today's world is the explosion of data from existing legacy data and incoming new structured and unstructured data. …”
Libro electrónico -
24197Publicado 2017“…Machine learning is not just for academics anymore, but is becoming a mainstream practice through wide adoption, and deep learning has taken the front seat. …”
Libro electrónico -
24198Publicado 2017“…Master machine learning techniques with R to deliver insights in complex projects About This Book Understand and apply machine learning methods using an extensive set of R packages such as XGBOOST Understand the benefits and potential pitfalls of using machine learning methods such as Multi-Class Classification and Unsupervised Learning Implement advanced concepts in machine learning with this example-rich guide Who This Book Is For This book is for data science professionals, data analysts, or anyone with a working knowledge of machine learning, with R who now want to take their skills to the next level and become an expert in the field. What You Will Learn Gain deep insights into the application of machine learning tools in the industry Manipulate data in R efficiently to prepare it for analysis Master the skill of recognizing techniques for effective visualization of data Understand why and how to create test and training data sets for analysis Master fundamental learning methods such as linear and logistic regression Comprehend advanced learning methods such as support vector machines Learn how to use R in a cloud service such as Amazon In Detail This book will teach you advanced techniques in machine learning with the latest code in R 3.3.2. …”
Libro electrónico -
24199Publicado 2017“…The old adage "It's not what you know; it's who you know" has never been more applicable than it is today. The problem is that many of us "know" thousands of people across social networks, but how many of those people truly know you and how many of them are truly connected to you? …”
Libro electrónico -
24200Publicado 2008“…Coverage includes The limitations of current approaches to authentication and identity management Detailed information on advanced Web services The Identity Metasystem, the laws of identity, and the ideal authentication system Windows CardSpace: What it is, how it works, and how developers and managers can use it in their organizations CardSpace technology: user experience, Information Cards, private desktops, and integration with .NET 3.5 and Windows Vista CardSpace implementation: from HTML integration through federation, Web services integration, and beyond Adding personal card support to a website: a detailed, scenario-based explanation Choosing or becoming an identity provider: opportunities, business impacts, operational issues, and pitfalls to avoid Using CardSpace to leverage trust relationships and overcome phishing Whether you’re a developer, security specialist, or business decision-maker, this book will answer your most crucial questions about identity management, so you can protect everything that matters: your people, your assets, your partners, and your customers. …”
Libro electrónico