Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Embedded computer systems 31
- Programming 30
- Computer programming 28
- Engineering & Applied Sciences 27
- Application software 23
- Development 22
- Java (Computer program language) 22
- Computer Science 21
- Computer architecture 18
- Computer networks 16
- Parallel programming (Computer science) 15
- Electronic data processing 14
- Data processing 13
- Python (Computer program language) 13
- Database management 12
- Design and construction 12
- Digital techniques 12
- Microprocessors 12
- Programming languages (Electronic computers) 11
- Security measures 11
- z/OS 11
- C++ (Computer program language) 10
- Computer programs 10
- Computers 10
- Examinations 10
- Operating systems (Computers) 10
- Cloud computing 9
- Distributed processing 9
- Microcomputers 9
- Certification 8
-
261por Wilson, G. R.Tabla de Contenidos: “…6.3 Converting the source code to machine code - manual assembly 6.4 Using the assembler; 6.5 Assembly language; 6.6 Types of instruction; 6.7 Problems; Chapter 7. Program structures; 7.1 Program control structures; 7.2 Data structures; 7.3 Subroutines; 7.4 Problems; Chapter 8. …”
Publicado 2002
Libro electrónico -
262por Benini, Luca, 1967-Tabla de Contenidos: “…3.3 Building Blocks3.4 Summary; 4 The Data-Link Layer in NoC Design; 4.1 Tasks of the Data-Link Layer; 4.2 On-Chip Communication Reliability; 4.3 Fault Models for NoCs; 4.4 Principles of Coding Theory; 4.5 The Power-Reliability Trade-Off; 4.6 Unified Coding Framework; 4.7 Adaptive Error Protection; 4.8 Data-Link Layer Architecture: Case Studies; 4.9 On-Chip Stochastic Communication; 4.10 Link-Level versus End-to-End Error Protection; 4.11 Flow Control; 4.12 Performance Exploration; 4.13 Summary; 5 Network and Transport Layers in Network on Chip; 5.1 Network and Transport Layers in NoCs…”
Publicado 2006
Libro electrónico -
263
-
264
-
265
-
266por Arrell, KathrynTabla de Contenidos: “…Using Tivoli Storage Manager and Tivoli Data Protect for Oracle Database 10g -- 6.1 IBM Tivoli Storage Manager overview -- 6.2 Tivoli Storage Manager architecture -- 6.3 Tivoli Data Protection for Oracle -- 6.4 RMAN and Tivoli Data Protection for Oracle -- 6.5 Overview of installation process of TSM and TDPO -- 6.5.1 Configuring RMAN -- 6.5.2 Installing TSM server…”
Publicado 2005
Libro electrónico -
267Publicado 2014Tabla de Contenidos: “…Making Yourself Available (Or Not) for ChattingMaking Calls with FaceTime; Chapter 4: Moving Around with Maps; Wherever You Go, There You Are; Asking For Directions; Book III: Beyond the Basics; Chapter 1: Backing Up and Restoring Your Data; Understanding Different Backup Options; Blasting into the Past with Time Machine; Moving Your Backup from an Old Mac to a New Mac; Working with Data-Recovery Programs; Chapter 2: Protecting Your Mac against Local and Remote Threats; Locking Down Your Mac; Using Passwords; Encrypting Data with FileVault; Using Firewalls; Selecting Privacy Settings…”
Libro electrónico -
268Publicado 2024Tabla de Contenidos: “…Import/Export -- Privacy -- State Privacy Laws -- Compliance -- Contracting and Procurement -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 5 Protecting Security of Assets -- Identifying and Classifying Information and Assets -- Defining Sensitive Data -- Defining Data Classifications -- Defining Asset Classifications -- Understanding Data States -- Determining Compliance Requirements -- Determining Data Security Controls -- Establishing Information and Asset Handling Requirements -- Data Maintenance -- Data Loss Prevention -- Labeling Sensitive Data and Assets -- Handling Sensitive Information and Assets -- Data Collection Limitation -- Data Location -- Storing Sensitive Data -- Data Destruction -- Ensuring Appropriate Data and Asset Retention -- Data Protection Methods -- Digital Rights Management -- Cloud Access Security Broker -- Pseudonymization -- Tokenization -- Anonymization -- Understanding Data Roles -- Data Owners -- Data Controllers and Processors -- Data Custodians -- Users and Subjects -- Using Security Baselines -- Comparing Tailoring and Scoping -- Standards Selection -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 6 Cryptography and Symmetric Key Algorithms -- Cryptographic Foundations -- Goals of Cryptography -- Cryptography Concepts -- Cryptographic Mathematics -- Ciphers -- Modern Cryptography -- Cryptographic Keys -- Symmetric Key Algorithms -- Asymmetric Key Algorithms -- Hashing Algorithms -- Symmetric Cryptography -- Block Cipher Modes of Operation -- Data Encryption Standard -- Triple DES -- International Data Encryption Algorithm -- Blowfish -- SKIPJACK -- Rivest Ciphers -- Advanced Encryption Standard -- CAST -- Comparison of Symmetric Encryption Algorithms -- Symmetric Key Management -- Cryptographic Life Cycle -- Summary -- Study Essentials -- Written Lab…”
Libro electrónico -
269Publicado 2012Tabla de Contenidos: “…Sequential Files -- Direct Files -- Indexed Sequential Files -- Hierarchical Database Model -- Network Database Model -- Relational Database Model -- Distributed Database System -- Object-oriented Database System -- Data Warehousing -- Data Mining -- Characteristics of SQL -- SQL Standards -- CREATE TABLE -- ALTER TABLE -- DROP TABLE -- INSERT -- UPDATE -- DELETE -- SELECT -- Multiple-choice Questions -- Answers -- Chapter 17: Microsoft Office Access 2003 -- Adding and Modifying Records -- Deleting Records -- Running a Query -- Multiple-choice Questions -- Answers -- Chapter 18: E-commerce Fundamentals -- Hardware -- Software -- Internet Protocol (IP) Address -- ISP -- Internet Presence Providers -- Malicious Software -- Unwanted Programs -- Phishing -- Hacking and Cybervandalism -- Credit Card Fraud/Theft -- Spoofing and Sniffing -- DoS and distributed DoS attacks -- Encryption -- Digital Signature -- Digital Certificate -- SSL -- SET -- Working of EDI -- Multiple-choice Questions -- Answers -- Index…”
Libro electrónico -
270por Frenzel, Louis E., 1959-Tabla de Contenidos: “…How Microcomputers Work; Introduction; Concepts and Definitions; Computer Organization and Operation; Operational Details; Registers and the ALU; Control Unit; Instruction-Word Formats; Program Execution Example; Microcomputer Buses; Popular Micros; 8- and 16-Bit Microcontrollers; 32- and 64-Bit Processors; A Word about Software; Programming Languages; Digital Signal Processing…”
Publicado 2010
Libro electrónico -
271Publicado 2003Libro electrónico
-
272Publicado 2017“…Some experience with programming will be an advantage. What You Will Learn Measure data from a digital temperature and humidity sensor using the ESP8266 Explore advanced ESP8266 functionalities Control devices from anywhere in the world using MicroPython Troubleshoot issues with cloud data monitoring Tweet data from the Arduino board Build a cloud-connected power-switch with the ESP8266 Create an ESP8266 robot controlled from the cloud In Detail The ESP8266 Wi-Fi Module is a self contained System on Chip (SOC) with an integrated TCP/IP protocol stack and can give any microcontroller access to your Wi-Fi network. …”
Libro electrónico -
273por Patterson, David A.Tabla de Contenidos: “…Chapter 6.Enhancing Performance with Pipelining6.1 Introduction; 6.2 A Pipelined Datapath; 6.3 Pipelined Control; 6.4 Data Hazards; 6.5 Control for Data Hazards: Stalls; 6.6 Reducing Data Hazards: Forwarding; 6.7 Branch Hazards; 6.8 Exceptions; 6.9 Performance of Pipelined Systems; 6.10 Fallacies and Pitfalls; 6.11 Concluding Remarks; 6.12 Historical Perspective and Further Reading; 6.13 Exercises; Chapter 7.Large and Fast: Exploiting Memory Hierarchy; 7.1 Introduction; 7.2 Caches; 7.3 Virtual Memory; 7.4 A Common Framework for Memory Hierarchies; 7.5 Fallacies and Pitfalls…”
Publicado 2014
Libro electrónico -
274Publicado 2017Libro electrónico
-
275Publicado 2017Tabla de Contenidos: “…In-Band Versus Out-of-Band Data Collection -- 8.2. Processor Performance Counters -- 8.3. …”
Libro electrónico -
276Publicado 2012Tabla de Contenidos: “…Isolating a DSP kernelModeling of true system behaviors; System effects; Execution in a multicore/multidevice environment; Measuring the measurement; Chapter 10 - Optimizing DSP Software - High-level Languages and Programming Models; Assembly language; C Programming language with intrinsics and pragmas; Embedded C; C++ for embedded systems; Auto-vectorizing compiler technology; Chapter 11 - Optimizing DSP Software -Code Optimization; Optimization process; Using the development tools; Background - understanding the DSP architecture; Basic C optimization techniques…”
Libro electrónico -
277Publicado 2022Tabla de Contenidos: “…-- The six principles of the GDPR -- Summary -- Chapter 4: Data Processing -- The data controller -- The data processor -- Accountability -- Recommended documents -- The privacy dashboard -- Training materials -- Mandatory documents -- Data protection - the last warning -- EU-US Privacy Shield -- Brief summary -- Schrems II ruling -- The frequently asked questions issued by the EDPB -- What occurs next? …”
Libro electrónico -
278Publicado 2013Tabla de Contenidos: “…6.4 Some simple examples of combinatorial logic circuits6.5 Sequential logic; 6.6 Summary; 7 Computers and programs; 7.1 The essential architecture of a computer system; 7.2 A look inside the central processing unit; 7.3 The representation of instructions in a computer; 7.4 The representation of data in a computer; 7.5 The components of programs; 7.6 Conditional branching and the program status word; 7.7 Subroutines and stacks; 7.8 Summary; 8 Interfacing: the use of the computer as a component; 8.1 Interfacing from the point of view of the programmer…”
Libro electrónico -
279por Koren, Israel, 1945-Tabla de Contenidos: “…4.2.3 Rectangular Mesh and Interstitial Mesh4.2.4 Hypercube Network; 4.2.5 Cube-Connected Cycles Networks; 4.2.6 Loop Networks; 4.2.7 Ad Hoc Point-to-Point Networks; 4.3 Fault-Tolerant Routing; 4.3.1 Hypercube Fault-Tolerant Routing; 4.3.2 Origin-Based Routing in the Mesh; 4.4 Further Reading; 4.5 Exercises; References; 5 Software Fault Tolerance; 5.1 Acceptance Tests; 5.2 Single-Version Fault Tolerance; 5.2.1 Wrappers; 5.2.2 Software Rejuvenation; 5.2.3 Data Diversity; 5.2.4 Software Implemented Hardware Fault Tolerance (SIHFT); 5.3 N-Version Programming; 5.3.1 Consistent Comparison Problem…”
Publicado 2007
Libro electrónico -
280Publicado 1995Tabla de Contenidos: “…Shared-Memory Parallel Programs; 2.1 Basic Concepts; 2.2 Parallel Application Set; 2.3 Simulation Environment; 2.4 Parallel Application Execution Model; 2.5 Parallel Execution under a PRAM Memory Model; 2.6 Parallel Execution with Shared Data Uncached…”
Libro electrónico