Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 5,723
- History 2,967
- Història 1,697
- Filosofía 1,552
- Crítica e interpretación 1,430
- Biblia 1,346
- Iglesia Católica 945
- Ateísmo 825
- Universidad Pontificia de Salamanca (España) 825
- Security measures 770
- Computer security 735
- Computer networks 731
- Management 723
- Engineering & Applied Sciences 706
- Development 700
- Social aspects 693
- Teología 687
- Atlas 680
- Derecho 677
- Política y gobierno 669
- Education 667
- Església Catòlica 653
- Bíblia 609
- Historia y crítica 577
- Philosophy 573
- History and criticism 556
- Politics and government 520
- Educación 512
- Derecho canónico 507
- Application software 490
-
150201Publicado 2008“…The techniques detailed in this book provide protection and instrumentation enabling operators to understand and defend against attacks. As the vulnerability economy continues to mature, it is critical for both vendors and network providers to collaboratively deliver these protections to the IP infrastructure.” …”
Libro electrónico -
150202por Naiburg, Eric J.“…Topics covered include: The business use case model Activity and sequence diagrams for modeling database functions and tasks Moving from the business to system model Class diagrams and statecharts Mapping classes to tables Transformation of attributes Rational's UML Profile for Database Design Creating tables from classes DDL scripts, component diagrams, and deployment diagrams Jump starting the database design process A case study runs throughout the book to illustrate key concepts and techniques, and appendixes containing the actual UML models from this case study are used to catalog the type and extent of models that would be developed for such a system. …”
Publicado 2001
Libro electrónico -
150203Publicado 2007“…How networks and the Internet work How to build coherent, cost-effective network infrastructures How to design networks for maximum reliability and availability What you need to know about data center and application networking How to secure networks against today’s threats and attacks How to take advantage of the latest mobility technologies How virtualizing networks can help businesses leverage their network investments even further How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco®. …”
Libro electrónico -
150204Publicado 2004“…., Associate, Rex Capital Advisors, LLC "This is a very lucidly written book that provides a new qualitativeframework for business decision-making.The primary contribution is toprovide a decision-maker with a process that can be used to complementexisting (and often abused) financial-number-driven analysis.The authorhas provided a very helpful and effective resource for practitioners—both managers and consultants—and people who are regularly inundated bynumbers but may not have the time to put these numbers in the context ofa particular capital decision-making process." —Dr. Atreya Chakraborty, Senior Consultant,The Brattle Group "Through consulting, I have witnessed far too many failedinvestments—and even worse, failing companies!…”
Libro electrónico -
150205por Gupta, Ajay“….: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. …”
Publicado 2004
Libro electrónico -
150206Publicado 2003“…Key topic coverage includes: Direct Attached Storage, including the new Windows Storport driver model Fibre Channel Storage Area Networks (SANs) Network Attached Storage (NAS), including the Windows NT network stack and an overview of CIFS Backup and restore technologies, including Windows XP and Windows Server 2003 Volume Shadow Copy Service File systems and disk virtualization, including a detailed overview of NTFS as well as a study of Windows cluster file systems Storage management, including the new Windows Virtual Disk Service IP Storage and Infiniband High availability, including RAID mirroring as well as multi path I/O solutions This extensive guide concludes by tracing Windows NT storage features as they appear in Windows NT 4.0, Windows 2000, and Windows Server 2003, and by offering a preview of what to expect from future Windows server releases. …”
Libro electrónico -
150207Publicado 2002“…He begins with his first attempts at using a wireless card at a conference, covers the real-life experience of trying something new, and ends with notes from the Portland Summit, a national gathering of wireless aficionados. …”
Libro electrónico -
150208Publicado 2005“…Learn what you must do immediately if you've been attacked. Defend yourself against credit rip-offs, and stop paying more than you have to! …”
Libro electrónico -
150209por Lee, Donald C.“…These services will allow you to securely extend the network to new frontiers, protect your network from attacks, and enhance network transport with application-level prioritization. …”
Publicado 1999
Libro electrónico -
150210por Sobell, Mark G.“…A Practical Guide to UNIX ® for Mac OS ® X Users is the most useful, comprehensive UNIX tutorial and reference for Mac OS X and is the only book that delivers Better, more realistic examples covering tasks you'll actually need to perform Deeper insight, based on the authors' immense knowledge of every UNIX and OS X nook and cranny Practical guidance for experienced UNIX users moving to Mac OS X Exclusive discussions of Mac-only utilities, including plutil , ditto , nidump , otool , launchctl , diskutil , GetFileInfo , and SetFile Techniques for implementing secure communications with ssh and scp —plus dozens of tips for making your OS X system more secure Expert guidance on basic and advanced shell programming with bash and tcsh Tips and tricks for using the shell interactively from the command line Thorough guides to vi and emacs designed to help you get productive fast, and maximize your editing efficiency In-depth coverage of the Mac OS X filesystem and access permissions, including extended attributes and Access Control Lists (ACLs) A comprehensive UNIX glossary Dozens of exercises to help you practice and gain confidence And much more, including a superior introduction to UNIX programming tools such as awk , sed , otool , make , gcc , gdb , and CVS…”
Publicado 2005
Libro electrónico -
150211por Shanley, Tom“…Specific topics of interest include: Packet addressing, channel adapters, and the role of switches, routers, and repeaters Queue Pair (QP) creation and operation Transfer types, including connected, datagram, and raw datagram service Send/receive operations, such as Send, RDMA Read and Write, and atomic Read/Modify/Write (RMW) operations Link and physical layer descriptions Subnet-local and global addressing The Subnet Manager (SM) and the Subnet Administrator (SA) Performance, communication, device, and baseboard managers Created for hardware and software engineers and developers, InfiniBand Network Architecture is a critical resource for understanding and implementing this revolutionary technology. 0321117654B11042002…”
Publicado 2003
Libro electrónico -
150212Publicado 2004“…What outstanding leaders do, and how they do it Actionable insights for achieving your own form of greatness Building corporate culture that can withstand anything What you can learn from Southwest's Herb Kelleher and J&J's James Burke Key attributes of lasting leadership Giving voice to customers , giving voice to truth Getting smarter, faster Case studies in building organizations that learn-- and act Reinventing your business: when it's time, how to do it Lessons from the master: Steve Jobs Discovering underserved markets--and serving them profitably Mohammed Yunus: Profiting from entrepreneurship in the world's poorest communities The greatest business leaders of our generation How they achieved the impossible What you can learn from them How to use those lessons to supercharge your career 25 compelling profiles from two of the world's leading sources of business insight: Nightly Business Report and The Wharton School's Knowledge@Wharton 25 extraordinary leaders, 25 incisive profiles: Andy Grove, Intel Bill Gates, Microsoft John Bogle, The Vanguard Group Steve Jobs, Apple & Pixar Warren Buffett, Berkshire Hathaway Herb Kelleher, Southwest Airlines Sam Walton, Wal-Mart Jack Welch, GE Jeff Bezos, Amazon Mary Kay Ash, Mary Kay Michael Dell, Dell Peter F. …”
Libro electrónico -
150213por Khurshudov, Andrei, 1963-“…Data storage interfaces: UDMA, USB, IEEE 1394 "FireWire," SCSI, FC-AL, and Serial Storage Architecture In-depth coverage of magnetic media: hard disks, tapes, and removables Up-to-date comparisons of removable storage: Superdisk, HiFD, Zip, Jaz, Orb, external hard disk drives, and more Tape alternatives: DAT, Travan, Mammoth, AIT, DLT, LTO, and beyond Optical storage: CD-RW, CD-R, and today's competing DVD formats Other storage solutions: Magneto-optical, Flash memory, and solid-state disk drives Enterprise storage strategies: storage area networks (SAN), network attached storage (NAS), RAID, and more Storage for digital cameras, PDAs, MP3 players, Personal Video Recorders, and other next-generation devices Storage on the Web: alternatives, limitations, and case studies Preventing data loss-and what to do if the disaster has already happened If you're planning for business growth and disaster recovery, or simply want the best storage "bang for the buck," The Essential Guide to Computer Data Storage delivers objective guidance—and realistic solutions…”
Publicado 2001
Libro electrónico -
150214Publicado 1998“…Lingo in a Nutshell caters to the huge pool of Director users attempting to bridge the Lingo gap, yet provides the details for the experienced Linguist that are lacking in other Lingo books. …”
Libro electrónico -
150215Publicado 2009“…Regular expressions get attention, as do file and other I/O operations. Along the way, the reader is introduced to numerous tools included in the standard Ruby distribution--tools like the task manager Rake and the interactive Ruby console-based interpreter Irb--that facilitate Ruby development and make it an integrated and pleasant experience. …”
Libro electrónico -
150216Publicado 2008“…Appel reveals what ETFs can and can’t do, explains why they’re not all equally attractive, and shows exactly how to use them to beat the market. …”
Libro electrónico -
150217Publicado 2001“…The formal specifications provide the definitive description of every element of the Jini architecture, including detailed information on such topics as: Jini discovery and join protocols Jini entry usage Jini distributed leasing concepts Jini distributed event programming model Jini transaction model and semantics Jini lookup service and lookup attribute schema Jini discovery, event, leasing, and join utilities Jini lookup discovery, lease renewal, and event mailbox helper services Jini device architecture 0201726173B04062001…”
Libro electrónico -
150218Publicado 2006“…2.2 Upgrade tips and information 2.3 Switching from other GNU/Linux distributions 2.4 Switching from Microsoft Windows 2.5 Preinstall checklist 2.6 Booting from the installation media 2.7 Installer configuration options 2.8 Drive partitioning 2.9 Selecting software packages 2.10 Finalizing your settings 2.11 Hostname, Root Password, Networking, and Users 2.12 Release notes 2.13 Graphics, printers, and sound card configuration 2.14 First boot 3 Post-install configuration 3.1 Configuring your computer with YaST and SaX 3.2 Networking and modems 3.3 Installation sources 3.4 Staying up to date 3.5 Installing the ATI video driver 3.6 Installing the Nvidia video driver 3.7 DVD video playback for 32-bit systems 3.8 DVD video playback for 64-bit systems 3.9 Playing Windows media files 3.10 Adding more software 3.11 Enhancing your graphics with XGL and Compiz 3.12 Printing 3.13 Sound configuration 3.14 Setting up email 4 Transferring data from Microsoft Windows 4.1 Mass transfer of data and settings from Microsoft Windows 4.2 Data destinations: where to put your files 4.3 Moving old email from Windows 4.4 Moving system fonts from Windows 4.5 Using MS Office documents in SUSE 10.1 5 Where to go for help 5.1 Web links 5.2 Related books and further reading…”
Libro electrónico -
150219Publicado 2006“…He was first exposed to Ruby in 1999, and in 2001 he began work on the first edition of this book–the second Ruby book published in the English language. He has attendednumerous Ruby conferences and has given presentations at several of those, including the first European Ruby Conference. …”
Libro electrónico -
150220Smart Women Protect Their Assets Essential Information for Every Woman About Wills, Trusts, and MorePublicado 2008“…Don’t have a will, trust, living will, or durable powers of attorney? Get them, immediately after reading this book.” …”
Libro electrónico