Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,424
- Application software 1,230
- Engineering & Applied Sciences 1,159
- Management 831
- Computer Science 775
- Computer networks 679
- Data processing 568
- Computer programs 543
- Security measures 512
- Historia 499
- Cloud computing 487
- Web site development 466
- Design 463
- Computer security 438
- Computer software 433
- Python (Computer program language) 429
- History 420
- Java (Computer program language) 420
- Database management 412
- Computer programming 402
- Colón, Cristóbal 398
- Programming 391
- Web sites 380
- Electrical & Computer Engineering 356
- Operating systems (Computers) 353
- Examinations 333
- Artificial intelligence 322
- Telecommunications 311
- Microsoft .NET Framework 300
- Machine learning 285
-
31341Publicado 2006“…A troubleshooting guide for all Linux users: Focuses on common problems with start-up, printing, login, the network, security, and more Restore Linux when boot, startup, or shutdown fails–and reinstall Linux properly when all troubleshooting fails Explains how to use some of the most popular Linux performance tools, including top, sar, vmstat, iostat, and free Handle storage problems and CPU slamming to ensure high Linux performance Solve hardware device problems by deciphering error messages and using the lspci tool Use backup/recover commands and tape libraries to create proper backups Identify and correct remote and network printing problems using spooler commands Gone are the days of searching online for solutions that are out of date and unreliable. …”
Libro electrónico -
31342por Jagoe, Andrew“…Mobile location servers and the components of an end-to-end location-based solution Spatial analysis: digital mapping, geocoding, routing, map image generation, and point-of-interest searches Mobile positioning: using and augmenting GPS technology Authentication and security in location-based applications Personalization, profiling, and privacy Mobile location clients: platform, protocols, languages, and localization issues Key applications: navigation, emergency assistance, travel services, advertising/marketing, and more Includes detailed appendices on the Geography Markup Language (GML), the Location Interoperability Forum's Mobile Location Protocol, and P3P privacy standards CD-ROM INCLUDED The accompanying CD-ROM contains several useful tools for developing mobile location services, as well as a list of important resources on the Internet…”
Publicado 2003
Libro electrónico -
31343Publicado 2018“…The book also addresses the transmitter design of these techniques with the optimum number of hardware components and the use of these techniques in cooperative and mm-Wave communications. …”
Libro electrónico -
31344Publicado 2018“…Discover the time-tested 7-step technique to problem solving that top consulting professionals employ Learn how a simple visual system can help you break down and understand the component parts of even the most complex problems Build team brainstorming techniques that fight cognitive bias, streamline workplanning, and speed solutions Know when and how to employ modern analytic tools and techniques from machine learning to game theory Learn how to structure and communicate your findings to convince audiences and compel action The secrets revealed in Bulletproof Problem Solving will transform the way you approach problems and take you to the next level of business and personal success"--…”
Libro electrónico -
31345por Thompson, Eric C. author“…Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) during breach investigations and compliance audits. …”
Publicado 2017
Libro electrónico -
31346Publicado 2018“…Cognitive diversity is a given whenever a group of people work together toward a common goal; the critical factor is whether those differences become an obstacle or a catalyst. …”
Libro electrónico -
31347Publicado 2017“…Discover the do's and don'ts involved in crafting readable Swift code as you explore common Swift coding challenges and the best practices that address them. …”
Libro electrónico -
31348Publicado 2015“…Written by renowned family inheritance attorney Jeffrey L. Condon, this book discusses the various aspects of this important document, and shows you how to manage a seamless transfer of assets to various beneficiaries. …”
Libro electrónico -
31349Publicado 2013“…Using a top-down OSI model approach, the course introduces the architecture, structure, functions, components, and models of the Internet and computer networks. …”
Libro electrónico -
31350Publicado 2013“…Step-by-step instructions carefully walk you through the most common Python development tasks. Quizzes and Exercises at the end of each chapter help you test your knowledge. …”
Libro electrónico -
31351por Bowley, David“…Expert developer David Bowley walks you through several of today’s most common portlet development scenarios, demonstrating how to create powerful, robust portlets quickly and cost-effectively. …”
Publicado 2009
Libro electrónico -
31352por Abrams, Brad“…Comments cover everything from design rationale and history to common problems and shortcomings. An overview of each namespace, describing its functionality and the inheritance hierarchy of types it defines. …”
Publicado 2004
Libro electrónico -
31353por Kaeo, Merike“…A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. …”
Publicado 2004
Libro electrónico -
31354por Reed, Paul R.“…You will learn how to: Estimate with accuracy and confidence projects built using the use case approach Map UML to Java-based deliverables Understand and describe application requirements using UML use cases Create a design based on UML class and sequence diagrams Use Rational Rose to create and track UML artifacts and generate skeletons for component code Build server-side Java functionality using JSP, servlets, and EJB 2.0 beans Produce code using several options, including JavaBeans, EJB Session Beans, and EJB Entity Beans (using both Bean-Managed Persistence and Container-Managed Persistence) Explore the benefits of deploying Java applications on both open-source and commercial application server products Based on the author's extensive professional experience and the most advanced software development methods, Developing Applications with JavaTM and UML teaches you how to use UML and the latest developments in technology to create truly successful, professional-quality Java applications. 0201702525B09042001…”
Publicado 2002
Libro electrónico -
31355Publicado 2001“…Among other things, Python supports object-oriented programming; a remarkably simple, readable, and maintainable syntax; integration with C components; and a vast collection of pre-coded interfaces and utilities. …”
Libro electrónico -
31356por Miller, Michael, 1958-“…Sure, there are uber-geeky guides out there that provide tweaks and customizations appealing to the pocket protector nation, but there is no other book that addresses these common problems at the everyday consumer level. We think it’s time for a book that covers all of these topics in a way that appeals to real humans, like you. …”
Publicado 2009
Libro electrónico -
31357por Topley, Kim“…Core Swing: Advanced Programming delivers: State-of-the-art insights into the Swing classes that other books can't touch Practical techniques for building the Swing components you really need Fast-track techniques for making the most of text controls, editors, tables, and drag-and-drop Hundreds of professional-level code examples CD-ROM The accompanying CD-ROM includes all of the book's detailed code examples a bonus chapter taken from Kim Topley's first book, Core Java Foundation Classes, and trial versions of SwingBuilder from SwingSoft and Netbeans…”
Publicado 2000
Libro electrónico -
31358Publicado 2005“…Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? …”
Libro electrónico -
31359Publicado 2015“…Sudden cardiac death due to ventricular tachyarrhythmias remains the leading cause of death in industrialized countries while atrial fibrillation is the most common rhythm disorder; an arrhythmia that’s prevalence is increasing and accounts for nearly one quarter of ischemic stokes the elderly population. …”
Libro electrónico -
31360Publicado 2018“…The research is delimited in contextual and situational terms of teaching-learning wholes, rather than primarily in terms of components (e.g., student, teacher or content). This translates to that classroom studies can capture and examine teaching and learning processes including their dependence of specific contexts in which they are conducted.The potential that lies in the work of classroom studies for didactics is attended to and described in more detail than previous research has done along with a set of example studies, which is a significant contribution of the anthology as a whole. …”
Libro electrónico