Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 985
- Application software 893
- Engineering and Technology 701
- Physical Sciences 701
- Management 514
- Kierkegaard, Søren 505
- Medicine 480
- Design 419
- Data processing 405
- Health Sciences 381
- History 374
- Computer networks 352
- Life Sciences 326
- Programming 324
- Computer graphics 318
- Web site development 297
- Artificial intelligence 290
- Computer programs 289
- Web sites 288
- Cloud computing 279
- Engineering 277
- Digital techniques 273
- Machine learning 273
- Engineering & Applied Sciences 270
- Research 266
- Photography 260
- Computer software 256
- Operating systems (Computers) 252
- Périodiques 239
- Information technology 223
-
25721por Wilson, Kevin 1978- author“…Whether you have just bought your first Kindle or a keen user, this brief book will provide you with a firm grasp of the underpinning foundations and equip you with the skills needed to use a Kindle Fire…”
Publicado 2014
Libro electrónico -
25722por National Research Council (U.S.) Committee on Industrialization of Biology: A Roadmap to Accelerate the Advanced Manufacturing of Chemicals“…In the past decade, we have witnessed major advances made possible by biotechnology in areas such as rapid, low-cost DNA sequencing, metabolic engineering, and high-throughput screening. The manufacturing of chemicals using biological synthesis and engineering could expand even faster. …”
Publicado 2015
Libro electrónico -
25723Publicado 2005“…The system included a utility for defining databases, screens, and reports. This utility used a form named Data Description Specifications (DDS) to define the database physical (PF) and logical (LF) files (base tables, views, and indexes). …”
Libro electrónico -
25724por Cameron, Jamie“…Coverage includes: How Webmin works--and how to install and secure it Using Webmin to configure basic system services, including filesystems, users/groups, and printing Configuring Apache, Sendmail, Squid, Samba, MySQL, PostgreSQL, FTP services, and more Cluster modules: configuring multiple systems from one master server Webmin modules: configuring Webmin itself Full API documentation and instructions for writing your own Webmin modules and themes Jamie Cameron walks you through more than 50 essential Webmin tasks--offering all the background you need, step-by-step instructions, extensive screen captures, and listings of the underlying configuration files that are being modified. …”
Publicado 2004
Libro electrónico -
25725Publicado 2020“…No capítulo 2 "Exame Físico de Screening" e no capítulo 3 "Exame Físico Completo" o estudante recebe um guia prático e sistematizado para duas abordagens, distintas, mas complementares, ao exame físico: uma mais curta e mais frequentemente aplicada e outra mais clássica e detalhada. …”
Libro electrónico -
25726Publicado 2022“…To identify the 21st century's best CEOs, the authors of CEO Excellence started with a pool of over 2400 public company CEOs. Extensive screening distilled that group into an elite corps, sixty-seven of whom agreed to in-depth, multi-hour interviews. …”
Libro -
25727por Y Alanis, Alma“…Readers will find leading-edge research in diabetes identification based on discrete high-order neural networks trained with the extended Kalman filter; parametric identification of compartmental models used to describe diabetes mellitus; modelling of data obtained by continuous glucose monitoring sensors for the prediction of risk scenarios such as hyperglycaemia and hypoglycaemia; and screening for glucose intolerance using glucose tolerance test data and deep neural networks. …”
Publicado 2024
Libro electrónico -
25728por McCullough, Malcolm“…Glowing rectangles have become part of the scene; screens, large and small, appear everywhere. Physical locations are increasingly tagged and digitally augmented. …”
Publicado 2013
Libro -
25729Publicado 2012Tabla de Contenidos: “…Freeman -- Fallen prince pretender of the faith: Henry VIII as seen by Sander and Parsons / Victor Houliston -- "It is unpossible to draw his picture well who hath severall countenances" : Lord Herbert of Cherbury and the life and reign of King Henry VIII / Christine Jackson -- Henry VIII in history: Gilbert Burnet's History of the Reformation (v. 1), 1679 / Andrew Starkie -- "Unblushing falsehood": the Strickland sisters and the domestic history of Henry VIII / Judith Richards -- Ford Madox Ford's fifth queen and the modernity of Henry VIII / Anthony & Susannah Monta -- The "sexual everyman"? …”
Libro -
25730por Turkle, Sherry“…At work, we retreat to our screens although it is conversation at the water cooler that increases not only productivity but commitment to work. …”
Publicado 2015
Libro -
25731por Ferrigno, Robert, 1947-“…Veiled women hurry through the busy streets. Alcohol is outlawed, replaced by Jihad Cola, and mosques dot the skyline. …”
Publicado 2006
Acceso a las primeras páginas
Libro -
25732Publicado 2022Tabla de Contenidos: “…Logging Levels/Severity Levels -- 00-FMindd 18 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Interface Statistics/Status -- Link State (Up/Down) -- Speed/Duplex -- Send/Receive Traffic -- Cyclic Redundancy Checks (CRCs) -- Protocol Packet and Byte Counts -- Interface Errors or Alerts -- CRC Errors -- Giants -- Runts -- Encapsulation Errors -- Environmental Factors and Sensors: Temperature, Humidity, Electrical, Flooding -- Baselines -- NetFlow Data -- Uptime/Downtime -- REVIEW -- 31 QUESTIONS -- 31 ANSWERS -- Objective 32 Explain the purpose of organizational documents -- and policies -- Plans and Procedures -- Change Management -- Incident Response Plan -- Disaster Recovery Plan -- Business Continuity Plan -- System Life Cycle -- Standard Operating Procedures -- Hardening and Security Policies -- Password Policy -- Acceptable Use Policy -- Bring Your Own Device (BYOD) Policy -- Remote Access Policy -- Onboarding and Offboarding Policy -- Security Policy -- Data Loss Prevention -- Common Documentation -- Physical Network Diagram -- Logical Network Diagram -- Wiring Diagram -- Site Survey Report -- 00-FMindd 19 22/04/22 11:12 AM -- xx Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Audit and Assessment Report -- Baseline Configurations -- Common Agreements -- Non-Disclosure Agreement (NDA) -- Service-Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- REVIEW -- 32 QUESTIONS -- 32 ANSWERS -- Objective 33 Explain high availability and disaster recovery -- concepts and summarize which is the best solution -- Load Balancing -- Multipathing -- Network Interface Card (NIC) Teaming -- Redundant Hardware/Clusters -- Switches -- Routers -- Firewalls -- Facilities and Infrastructure Support -- Uninterruptible Power Supply (UPS) -- Power Distribution Units (PDUs) -- Generator -- HVAC -- Fire Suppression -- Redundancy and High Availability (HA) Concepts -- Cold Site -- Warm Site -- Hot Site -- Cloud Site -- Active-Active vs Active-Passive -- Mean Time to Repair (MTTR) -- Mean Time Between Failure (MTBF) -- Recovery Time Objective (RTO) -- Recovery Point Objective (RPO) -- Network Device Backup/Restore -- Configuration -- State -- REVIEW -- 33 QUESTIONS -- 33 ANSWERS -- 00-FMindd 20 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 40 Network Security -- Objective 41 Explain common security concepts -- Confidentiality, Integrity, Availability (CIA) -- Threats -- Internal -- External -- Vulnerabilities -- Common Vulnerabilities and Exposures (CVE) -- Zero-Day -- Exploits -- Least Privilege -- Role-Based Access -- Zero Trust -- Defense in Depth -- Network Segmentation Enforcement -- Screened Subnet [Previously Known as Demilitarized Zone (DMZ)] -- Separation of Duties -- Network Access Control -- Honeypot -- Authentication Methods -- Multifactor -- Terminal Access Controller Access-Control System Plus (TACACS+) -- Remote Authentication Dial-in User Service (RADIUS) -- Single Sign-On (SSO) -- LDAP -- Kerberos -- Local Authentication -- Extensible Authentication Protocol (EAP) -- 8021X -- Risk Management -- Security Risk Assessments -- Business Risk Assessments -- Security Information and Event Management (SIEM) -- REVIEW -- 41 QUESTIONS -- 41 ANSWERS -- Objective 42 Compare and contrast common types of attacks -- Technology-Based -- Denial-of-Service (DoS)/Distributed Denial-of-Service (DDoS) -- On-Path Attack (Previously Known as Man-in-the-Middle Attack) -- 00-FMindd 21 22/04/22 11:12 AM -- xxii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- ARP Spoofing -- DNS Poisoning -- VLAN Hopping -- Rogue DHCP -- Rogue Access Point (AP) -- Evil Twin -- Ransomware -- Password Attacks -- MAC Spoofing -- IP Spoofing -- Deauthentication -- Malware -- Human and Environmental -- Social Engineering -- REVIEW -- 42 QUESTIONS -- 42 ANSWERS -- Objective 43 Given a scenario, apply network -- hardening techniques -- Best Practices -- Secure SNMP -- Router Advertisement (RA) Guard -- Port Security -- Dynamic ARP Inspection -- Control Plane Policing -- Private VLANs -- Disable Unneeded Switchports -- Disable Unneeded Network Services -- Change Default Passwords -- Password Complexity/Length -- Enable DHCP Snooping -- Change Default VLAN -- Patch and Firmware Management -- Access Control List -- Firewall Rules -- Role-Based Access -- Wireless Security -- MAC Filtering -- Antenna Placement -- Power Levels -- Wireless Client Isolation -- Guest Network Isolation -- 00-FMindd 22 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Preshared Keys (PSKs) -- EAP -- Geofencing -- Captive Portal -- IoT Access Considerations -- REVIEW -- 43 QUESTIONS -- 43 ANSWERS -- Objective 44 Compare and contrast remote access methods -- and security implications -- Site-to-Site VPN -- Client-to-Site VPN -- Clientless VPN -- Split Tunnel vs Full Tunnel -- Remote Desktop Connection -- Remote Desktop Gateway -- SSH -- Virtual Network Computing (VNC)…”
Libro electrónico -
25733Publicado 2024“…Este tipo de dislexias, a diferencia de las evolutivas, surgen una vez iniciado el proceso de aprendizaje de la lectura, lo que conlleva una pérdida de habilidad variable en función de cada caso. …”
Clic para acceso completo. Acceso bajo autorización
Tesis -
25734Publicado 2015“…Es evidente que han perdido fuerza para nosotros aquellas decisiones que se sostienen en la ambigüedad. No sirven, ni comunican vida el mantener presencias porque tuvieron historia o porque tuvieron prestigio o porque fueron reconocidas, en su momento, como una muestra de excelencia. …”
Libro -
25735por Ferrater Mora, José, 1912-1991“…Mientras Pricilla Cohn examina los problemas fundamentales planteados en cada caso, ofrece ejemplos de conflictos y analiza las opiniones entrecruzadas, José Ferrater Mora pone de relieve loa aspectos más generales, escruta las nociones subyacentes que sirven de contexto a cada tema y ofrece una aguda exposición de los enfoques polémicos más recientes sobre la noción de ética…”
Publicado 1994
Libro -
25736por Straney, Louis L., 1946-“…"The first complete, expert guide to securities and investment fraud Filled with expert guidance for detection and prevention of all kinds of securities fraud and investment misconduct, Securities Fraud helps you identify red flags of fraud and offers practical ways to detect and prevent it. Written by a Wall Street professional with three decades of experience spanning the most critical period of our financial markets This book challenges classic fraud theories, describing how to dismantle information silos that permit fraudsters to conceal their activities. …”
Publicado 2011
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
25737Publicado 2021“…Y, por último, pero no menos importante, el paciente oncológico y su familia debe tener apoyo psicológico para poder afrontar correctamente los cambios que surgen a causa de la enfermedad y el tratamiento…”
Clic para texto completo.
Tesis -
25738Publicado 2023“…El desarrollo de la capacidad condicional de sus practicantes está en un continuo estado de estudio y evolución. Debido a esto surgen numerosas metodologías de entrenamiento que deben ser estudiadas para poder definir su eficacia. …”
Clic para texto completo. Acceso abierto.
Tesis -
25739Publicado 2018“…Cuando más intenta ser como cualquier otro hombre adinerado de Wall Street, más anónimo se vuelve y menos control tiene sobre sus terribles instintos y su insaciable sed de sangre, que lo arrastra a una vorágine en la que los objetos valen más que el cuerpo y el alma de una persona. …”
CDROM -
25740por Ángel Arias Domínguez“…Es una forma radicalmente distinta de configurar los contenidos temáticos de las asignaturas, que obliga a elaborar los materiales prácticos que sirven de complemento a las explicaciones teóricas de manera muy diferente a lo que se ha realizado hasta el momento…”
Publicado 2017
Texto completo en Odilo
Otros