Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 170
- Computer Science 147
- Development 104
- Application software 90
- Computer software 52
- Artificial intelligence 29
- Cloud computing 27
- Computer programming 26
- Machine learning 26
- Management 26
- Computer security 21
- Data processing 21
- Java (Computer program language) 21
- Electrical & Computer Engineering 20
- Computer programs 19
- Examinations 18
- Software engineering 18
- Web site development 16
- Computer networks 15
- Blockchains (Databases) 14
- Certification 14
- Python (Computer program language) 14
- Art, Architecture & Applied Arts 13
- Design 13
- Photography 13
- Telecommunications 13
- Visual Arts 13
- Database management 12
- Electronic data processing personnel 12
- Information technology 12
-
361Publicado 2014“…This publication's intended audience is technical architects, planners, and managers who are interested in exploring how the security design and features of System z, the z/OS operating system, and associated software address current issues, such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring…”
Libro electrónico -
362Publicado 2017Libro electrónico
-
363
-
364
-
365
-
366Publicado 2000Libro electrónico
-
367
-
368
-
369Publicado 2018“…The second blueprint involves an AI system that continuously monitors social media to gauge public feeling about a topic of interest - such as self-driving cars. …”
Libro electrónico -
370Publicado 2013“…This IBM® Redbooks® publication presents a general introduction to Linear Tape-Open (LTO) technology and the implementation of corresponding IBM products. …”
Libro electrónico -
371Publicado 2025Libro electrónico
-
372Publicado 2022Video
-
373Artificial intelligence and international human rights law developing standards for a changing worldPublicado 2024“…Chapters focus on key situations in which the use of AI raises human rights concerns, including AI-supported decision-making in healthcare, public administration and cases of asylum; the use of facial recognition software; and the creation of deepfakes. …”
Libro electrónico -
374
-
375Publicado 2023Tabla de Contenidos: “…Cover -- Copyright -- Table of Contents -- Preface -- Chapter 1 : Blockchain 101 -- The growth of blockchain technology -- Progress towards maturity -- Rising interest -- Distributed systems -- CAP theorem -- PACELC theorem -- The history of blockchain -- Bitcoin -- Electronic cash -- Introducing blockchain -- Blockchain architecture -- Blockchain by layers -- Blockchain in business -- Generic elements of a blockchain -- Blockchain functionality -- Benefits and features of blockchain -- Limitations of blockchain technology -- Types of blockchain -- Distributed ledgers -- Shared ledger -- Public blockchains -- Private blockchains -- Semi-private blockchains -- Permissioned ledger -- Fully private and proprietary blockchains -- Tokenized blockchains -- Tokenless blockchains -- Layer 1 blockchains -- Monolithic and polylithic blockchains -- Layer 2 blockchains -- Sidechains -- Summary -- Chapter 2 : Decentralization -- Introducing decentralization -- Methods of decentralization -- Disintermediation -- Contest-driven decentralization -- Quantifying decentralization -- Benefits of decentralization -- Evaluating requirements -- Full-ecosystem decentralization -- Storage -- Communication -- Computing power -- Decentralization in practice -- Smart contracts -- Autonomous agents -- Decentralized organizations -- Decentralized autonomous organizations -- Decentralized autonomous corporations -- Decentralized autonomous societies -- Decentralized applications -- Criteria for a DApp -- Operations of a DApp -- Design of a DApp -- Innovative trends -- Decentralized web -- Web 1 -- Web 2 -- Web 3 -- Summary -- Chapter 3 : Symmetric Cryptography -- Introducing cryptography -- Services provided by cryptography -- Cryptographic primitives -- Keyless primitives -- Random numbers -- Hash functions -- Symmetric key primitives -- Message authentication codes…”
Libro electrónico -
376Publicado 1994“…How to get TeX and its associated tools from public domain and commercial sources (a complete buyer's guide). …”
Libro electrónico -
377
-
378
-
379
-
380