Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4361por Shinder, Thomas W.Tabla de Contenidos: “…Tom Shinder's ISA Server 2006 Migration Guide; Copyright Page; Lead Authors; Contributing Authors; Contents; Introduction; Chapter 1: Network Security Basics; Introduction; Security Overview; Defining Basic Security Concepts; Knowledge is Power; Think Like a Thief; The Intrusion Triangle; Removing Intrusion Opportunities; Security Terminology; Addressing Security Objectives; Controlling Physical Access; Physical Access Factors; Protecting the Servers; Keeping Workstations Secure; Protecting Network Devices; Securing the Cable; Safely Going Wireless; Have Laptop, Will Travel…”
Publicado 2007
Libro electrónico -
4362por Doar, MatthewTabla de Contenidos: “…; Naming Branches and Tags; Merge Madness; Security; Access Wars; Filenames to Avoid; Backups and SCM; Backing up CVS; SCM Tools; CVS; Making your life with CVS easier; Subversion; Arch; Perforce; BitKeeper; ClearCase; Visual SourceSafe; Comparison of SCM Tools; Wider Uses of SCM; Checklist; Building Software; How Software Gets Built…”
Publicado 2005
Libro electrónico -
4363por Henderson, CalTabla de Contenidos: “…Source-Control ProductsThe Revision Control System (RCS); The Concurrent Versions System (CVS); Subversion (SVN); Perforce; Visual Source Safe (VSS); And the rest...; Summary; What to Put in Source Control; Documentation; Software configurations; Build tools; What Not to Put in Source Control; One-Step Build; Editing Live; Creating a Work Environment; Development; Staging; Production; The Release Process; Build Tools; Release Management; What Not to Automate; Database schema changes; Software and hardware configuration changes; Issue Tracking; The Minimal Feature Set; Issue-Tracking Software…”
Publicado 2006
Libro electrónico -
4364por Boyce, JimTabla de Contenidos: “…Protection Against Web BeaconsAttachment and Virus Security; Macro Viruses; Digital Signatures; Message Encryption; Security Labels; Understanding Outlook Service Options; Options for Starting Outlook; Safe Mode Startup; Starting Outlook Automatically; Adding Outlook to the Quick Launch Bar; Changing the Outlook Shortcut; Use RUNAS to Change User Context; Startup Switches; Choosing a Startup View; Creating Shortcuts to Start New Outlook Items; 2. …”
Publicado 2009
Libro electrónico -
4365por Gourley, DavidTabla de Contenidos: “…For More InformationHTTP Messages; The Flow of Messages; Messages Commute Inbound to the Origin Server; Messages Flow Downstream; The Parts of a Message; Message Syntax; Start Lines; Request line; Response line; Methods; Status codes; Reason phrases; Version numbers; Headers; Header classifications; Header continuation lines; Entity Bodies; Version 0.9 Messages; Methods; Safe Methods; GET; HEAD; PUT; POST; TRACE; OPTIONS; DELETE; Extension Methods; Status Codes; 100-199: Informational Status Codes; Clients and 100 Continue; Servers and 100 Continue; Proxies and 100 Continue…”
Publicado 2002
Libro electrónico -
4366por Harrington, Richard, 1972-Tabla de Contenidos: “…Standard Definition Broadcast-Safe Concerns…”
Publicado 2007
Libro electrónico -
4367por Yiu, JosephTabla de Contenidos: “…Several Useful Instructions in the Cortex-M3MSR and MRS; IF-THEN; CBZ and CBNZ; SDIV and UDIV; REV, REVH, and REVSH; RBIT; SXTB, SXTH, UXTB, and UXTH; BFC and BFI; UBFX and SBFX; LDRD and STRD; TBB and TBH; Chapter 5 - Memory Systems; Memory System Features Overview; Memory Maps; Memory Access Attributes; Default Memory Access Permissions; Bit-Band Operations; Advantages of Bit-Band Operations; Bit-Band Operation of Different Data Sizes; Bit-Band Operations in C Programs; Unaligned Transfers; Exclusive Accesses; Endian Mode; Chapter 6 - Cortex-M3 Implementation Overview; The Pipeline…”
Publicado 2007
Libro electrónico -
4368por Beale, JayTabla de Contenidos: “…Factors that Can Affect Scanner OutputPlugin Selection; The Role of Dependencies; Safe Checks; no404.nasl; Ping the Remote Host; Portscanner Settings; Proxies, Firewalls, and TCP Wrappers; Valid Credentials; KB Reuse and Differential Scanning; And Many More...; Scanning Web Servers and Web Sites; Web Servers and Load Balancing; Bugs in the Plugins; Additional Reading; Configuration Files; NASL; The Nessus KB; The Nessus Logs; Forums and Mailing Lists; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6: Vulnerability Types; Introduction; Critical Vulnerabilities…”
Publicado 2008
Libro electrónico -
4369
-
4370por McConnell, SteveTabla de Contenidos: “…Estimate InfluencesDiseconomies of Scale; When You Can Safely Ignore Diseconomies of Scale; Importance of Diseconomy of Scale in Software Estimation; 5.2. …”
Publicado 2009
Libro electrónico -
4371por Thompson, RoyTabla de Contenidos: “…The Camera Lens-The Eye in CompositionThe Zoom Lens; Lens Focus-Directing the Viewer's Eye Around Your Frame; Pulling Focus vs Following Focus; Light in Composition-Now You See It, Now You Don't; Light as Energy; Color Temperature; Natural or Artificial Light; Quantity of Light: Sensitivity and Exposure; Quality of Light: Hard vs Soft; Contrast; Basic Character Lighting: Three Point Method; Set and Location Lighting; End of Chapter Three Review; Chapter Four - Putting Your Shots Together: Prethinking the Editing Process; Matching Your Shots in a Scene; Continuity…”
Publicado 2009
Libro electrónico -
4372Publicado 2009Tabla de Contenidos: “…Statistical Analysis with Excel for Dummies; About the Author; Dedication; Author's Acknowledgments; Contents at a Glance; Table of Contents; Introduction; About This Book; What You Can Safely Skip; Foolish Assumptions; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Part I: Statistics and Excel: A Marriage Made in Heaven; Chapter 1: Evaluating Data in the Real World; The Statistical (And Related) Notions You Just Have to Know; Inferential Statistics: Testing Hypotheses; What's New in Excel?…”
Libro electrónico -
4373Publicado 2008Tabla de Contenidos: “…SummarySolutions Fast Track; Frequently Asked Questions; Chapter 4: Malware Detection and the Mac; Introduction; Safe Out of the Box?; Anti-malware Technology; More About EICAR; Classic Anti-malware Detection Techniques; Signature Scanning; Heuristics Revealed; Anti-malware Products; Anti-malware Before OS X; Disinfectant; Anti-malware and OS X; avast!…”
Libro electrónico -
4374por McFedries, PaulTabla de Contenidos: “…Getting the Most Out of the RegistryTaking a Tour of the Registry; Understanding Registry Settings; Getting to Know the Registry's Root Keys; HKEY_CURRENT_USER (HKCU); HKEY_USERS (HKU); HKEY_CURRENT_CONFIG (HKCC); Understanding Hives and Registry Files; Keeping the Registry Safe; Saving the Current Registry State with System Restore; Protecting Keys by Exporting Them to Disk; Importing a .reg File; Working with Registry Keys and Settings; Editing a DWORD Value; Editing a Binary Value; Editing a .reg File; Creating a .reg File; Renaming a Key or Setting; Creating a New Key or Setting…”
Publicado 2009
Libro electrónico -
4375Publicado 2014Tabla de Contenidos: “…Windows Explorer Integration with Team Foundation ServerAccess to Team Foundation Server via Other Third-Party Integrations; What's New in Team Foundation Server 2013; Version Control; Web Access; Agile Portfolio Management; Release Management; The Cloud; Adopting Team Foundation Server; Summary; Chapter 3 Using Centralized Team Foundation Version Control; Team Foundation Version Control and Visual SourceSafe (VSS) 2005; Setting Up Version Control; Using Source Control Explorer; Setting Up Your Workspace; Getting Existing Code; Sharing Projects in Version Control; Check-In Pending Changes…”
Libro electrónico -
4376por Dasnois, BenjaminTabla de Contenidos: “…Explicitly typed variablesStatic typing; Values with several types; Defining a type; Inheritance; Multi-inheritance; Implementing an interface; Representing a blog article; Time for action - representing different types of articles; Function's type; Expressing a function's type; Functions using functions; Dynamic functions; Anonymous objects; Duck typing; Creating a function to apply another one; Time for action - applying a function on every item; Type inference; Assigning a value; Assigning the value of the variable to another one; Passing the variable as a parameter; Casting; Safe casting…”
Publicado 2011
Libro electrónico -
4377por Spotted Eagle, DouglasTabla de Contenidos: “…Chromakey CompositingChapter 6 Titling Tools and Text Techniques; Basic Titles; Play It Safe; Roll the Credits; The Star Wars look; Create a Lower-Third Graphic in Vegas Movie Studio; Add a Fade-In to the Lower-Third Graphic; Creating a Different Type of Lower-Third; Add a ""Bug""; Chapter 7 Sound Off!…”
Publicado 2005
Libro electrónico -
4378por Gratton, Dean A.Tabla de Contenidos: “…Personal-area; Generations of Wireless Technology; Wireless Convergence; Manufacturers' Refocus of Consumer Perception and Usage Models; Summary; Chapter 4: Can we Confidently Rely on Wireless Communication?; How Safe is Your House?; Encryption Principles; It's All About Adopting a Common Sense Approach to Wireless Security; Enabling Intelligent Connectivity; Coexistence and Interoperation; Summary; Chapter 5: Realizing a True Wireless Life-style Vision; Defining Quantitative Needs for Technology…”
Publicado 2006
Libro electrónico -
4379por Thurrott, Paul AlanTabla de Contenidos: “…; Where New Meets Old: Metro Features You Get in the Desktop, Too; Managing Files and Folders; Managing Classic Windows Applications; To the Cloud: Using the SkyDrive Desktop App; Summary; Chapter 5: Make It Yours: Personalizing Windows 8; Customizing Metro; Customizing Settings and Settings Sync; Customizing the Desktop; Power User Customization Tips and Tricks; Summary…”
Publicado 2012
Libro electrónico -
4380por Cummings, ChipTabla de Contenidos: “…Surviving EvictionsKeeping Your Property Safe; Paying Taxes; Rapid Liquidation; Creating Long-Term Wealth Using Installments; Property: 3-unit multi-family house with detached garage; Zero Risk Liquidation Results; Rinse and Repeat; Chapter 8: Advanced Strategies; Using Traditional Funding; Tapping into Private Money; Corporate Investing; Locating Investment Capital; Investing Using Retirement Accounts; Tax Strategies; Unique Types of Property Deals; Chapter 9: Tracking Your Investments; Setting Up a Simple System; Accruals and Yield Information; Maintaining Contacts and Lien Lists…”
Publicado 2013
Libro electrónico