Browse Results

Showing 401 through 425 of 64,204 results

70 Tips and Tricks for Mastering the CISSP Exam

by R. Sarma Danturthi

Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick the best of the options given. The CISSP exam conducted by ISC2 is the hardest and most rewarded cybersecurity examination. The test has several domains and sub-domains and covers a wide range of topics on security, including cyber and physical building security fields. It also covers breaches, discovery of breaches, and how to report data breaches. Because the subject area is vast and the questions are almost never repeated, it is hard for the exam taker to memorize or quickly discover the correct solution. The four options given as answers typically have two very close matches to the question. With quick analysis, it is possible to discover from the verbiage of a question what is truly being asked and learn how to find the closest possible solution without spending too much time on each question. What You Will Learn Think outside the box (the CISSP exam demands this of candidates)Quickly discern the gist of a question, eliminate the distractors, and select the correct answerUnderstand the use of words such as MOST, BEST, FIRST, LAST in the questionsSelect the correct answer when multiple options look like possible solutions Who This Book Is For Experienced security practitioners, managers, and executives interested in proving their knowledge across a wide array of security practices and principles, including chief information security officers, chief information officers, directors of security, IT directors and managers, security systems engineers, security analysts, security managers, security auditors, security architects, security consultants, private contractors, and network architects

75 consejos para sobrevir a las redes sociales (Serie 75 Consejos #8)

by María Frisa

¡¡Llega el volumen número 8 de la exitosa serie «75 consejos», el DIARIO MÁS TRONCHANTE JAMÁS ESCRITO!! Y esta vez no querrás perdértelo, porque lo necesitas: ¿cómo sobrevivir cuando las redes sociales se vuelven en tu contra? ¿Alguna vez un «amigo» ha subido una foto o un vídeo tuyo humillante, de esos que a los demás les hacen mucha gracia (porque no salen) y tú has sido el último en enterarte? ¿Quieres saber qué hacer para intentar pararlo (difícil) o, por lo menos, contrarrestarlo? ¡¡No esperes más, ABRE ESTE LIBRO!! ¡Y aprende de mis 75 superconsejos! Bueno, ejem, ejem, también de mis errores... Y recuerda: si hay algo eterno, es lo que subes a un grupo de WhatsApp, (el sol se apagará, las estrellas desaparecerán, la raza humana se extinguirá, pero tu foto seguirá ahí).

77 Bloques para Construir una Transformación Digital: El Modelo de Capacidad Digital

by Jace An

Este no es un libro sobre teoría que discuta conceptos académicos de transformaración digital, sino que se orienta a la práctica de campo que describe cómo asesorar y mejorar las capacidades digitales de una organización. Más bien satisface mejor a los ‘practicantes digitales’, quienes están involucrados en operaciones de negocios digitales, incluyendo tecnología informática y digital, comercio electrónico, servicios de atención al cliente online y muchas otras áreas operativas en las que la tecnología informática podría tener impacto. La capacidad digital está definida en este libro como la capacidad organizativa y la habilidad para producir resultados de negocio intencionales en el espacio digital al combinar procesos, personas y elementos tecnológicos de un modo único para cada organización. Los elementos del proceso incluyen flujo de proceso, información de entrada y salida; reglas del negocio; políticas y lineamientos. El elemento humano incluye una estructura y cultura organizacional; roles, responsabilidades y habilidades de las personas. Los elementos tecnológicos incluyen aplicaciones; infraestructura de datos; instalaciones y equipos alrededor de la tecnología digital. La capacidad de escucha del diálogo social está definida, por ejemplo, como una capacidad organizativa para entender de qué están hablando los usuarios en las redes sociales y utilizarlo para un negocio al combinar procesos bien definidos, las habilidades del personal y sus evidentes roles y responsabilidades, como también las herramientas de automatización. Una mayor madurez dentro de las capacidades digitales asegura operaciones efectivas y eficientes dentro de los negocios digitales. Las operaciones de los negocios digitales están dentro de un área multidisciplinaria donde convergen los negocios y la Tecnología Informática que trabajan en conjunto para producir resultados comerciales en el espacio digital. Enten

77 Bloques para Construir una Transformación Digital: Explicación Simplificada

by Jace An

En 2018, ‘77 Bloques para Construir una Transformación Digital: Modelo de Capacidad Digital’ fue publicado para asistir a los ‘practicantes digitales’ quienes trabajan en el espacio digital. Desde entonces, pocos lectores me han sugerido escribir un libro sobre la transformación digital para ‘el público en general’ que estuviere interesado en aprender más que lo básico sobre la transformación digital. Es así que he creado este libro ‘77 Bloques para Construir una Transformación Digital: Explicación Simplificada’. Este libro intenta entregar los mensajes claves de ‘77 Bloques para Construir una Transformación Digital: Modelo de Capacidad Digital’ al público en general. Dicho esto, este no pretende ser un libro de teoría que discuta las ideas y conceptos académicos de la transformación digital, sino un libro práctico de campo que describe las capacidades digitales probadas como los bloques de construcción para la transformación digital. ‘77 Bloques para Construir una Transformación Digital: Explicación Simplificada’ se enfoca en introducir 77 bloques de construcción para asistir al público en general a comprender las ‘prácticas reales’ en el espacio digital, aunque no cubre totalmente el Modelo de Madurez descripto en detalle en ‘77 Bloques para Construir una Transformación Digital: Modelo de Capacidad Digital’ que asiste a los practicantes digitales con indicadores de madurez de las capacidades digitales. Este libro proporciona unos pocos ejemplos de indicadores de mayor madurez como una introducción al Modelo de Madurez de las Capacidades Digitales.

7R: Las siete revoluciones tecnológicas que transformarán nuestra vida

by Joan Cwaik

El siglo XXI dejará su huella en la historia gracias al desarrollo de tecnologías emergentes que están generando una revolución que va más allá de lo industrial porque también involucra aspectos sociales, económicos y culturales. Decir que el mundo avanza a pasos agigantados es una frase trillada pero real. Todavía los autos no vuelan y no vacacionamos en el espacio, pero el siglo XXI va a dejar su huella en la historia gracias al desarrollo de las tecnologías emergentes. Aunque la ciencia ficción y la filosofía imaginaron todos estos adelantos, se está generando una nueva revolución que va más allá de lo industrial porque también involucra aspectos sociales, económicos y culturales. Joan Cwaik, investigador y especialista en innovación tecnológica, explica con claridad en qué consisten estos nuevos avances y cómo van a cambiar la vida de las personas. Las criptomonedas, el big data, las ciudades inteligentes, la impresión 3D, los robots, la Internet de las Cosas y la realidad virtual y la aumentada llegaron para quedarse y van a transformarnos para siempre.

7th EAI International Conference on Computer Science and Engineering in Health Services: COMPSE 2023 (EAI/Springer Innovations in Communication and Computing)

by Pandian Vasant Igor Litvinchev Utku Kose Jose Antonio Marmolejo-Saucedo Roman Rodriguez-Aguilar Idalia Flores De la Mota Liliana Marmolejo-Saucedo Miriam Rodriguez-Aguilar

This book constitutes the refereed post-conference proceedings of the 7th EAI International Conference on Computer Science and Engineering in Health Services (COMPSE 2023), which took place November 16-17, 2023, in Mexico City, Mexico. The full papers presented were carefully reviewed and selected from dozens of submissions. The papers are grouped on thematic topics: application of tools delivered by the COVID-19 pandemic; health services; computer and data science; and industry 4.0 in logistics and supply chain. The content is relevant to researchers, academics, students and professionals.

7th EAI International Conference on Robotic Sensor Networks: EAI ROSENET 2023 (EAI/Springer Innovations in Communication and Computing)

by Paolo Fiorini Ömer Melih Gül Seifedine Nimer Kadry

This book presents the proceedings of the 7th EAI International Conference on Robotics and Networks 2023 (EAI ROSENET 2023). The conference explores the integration of networks, communications, and robotic technologies, which has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide. The authors posit that big networks will be the main approach to the next generation of robotic research, with the explosive number of communications and networks models and increasing computational power of computers significantly extending the number of potential applications for robotic technologies while also bringing new challenges to the communications and networking community. The conference provided a platform for researchers to share up-to-date scientific achievements in this field. The conference takes place at Bahcesehir University, Istanbul, Türkiye on 15-16 December 2023.

7th International Conference on Education, Network and Information Technology (EAI/Springer Innovations in Communication and Computing)

by Jingsha He Ljiljana Trajković

This book presents the proceedings of the 7th International Conference on Education, Network and Information Technology (ICENIT2024), which took place in Dalian, China, on August 16-18, 2024. The conference provides a platform for relevant scholars and researchers to discuss the impact of network and information technology on education, improve the research and application level of domestic education, and promote academic exchanges in related fields as well. Topics include web classroom applications, technology-enhanced learning, computer distance education, AI in education, digital libraries information system applications, and more. The conference is relevant to researchers, professionals, practitioners, and students in education, and IT. Presents the proceedings of the 7th International Conference on Education, Network and Information Technology (ICENIT2024) Provides a platform to discuss the impact of network and information technology on education Relevant to researchers, professionals, practitioners, and students in education, and IT

7th International Conference on Nanotechnologies and Biomedical Engineering: Proceedings of ICNBME-2025, October 7–10, 2025, Chisinau, Moldova -Volume 2: Biomedical Engineering and New Technologies for Diagnosis, Treatment, and Rehabilitation (IFMBE Proceedings #135)

by Ion Tiginyanu Victor Sontea Serghei Railean

This book reports on advances in fundamental and applied research at the interface between biomedical research, data science, molecular diagnostics, and material engineering. Gathering peer-reviewed contributions to the 7th International Conference on Nanotechnologies and Biomedical Engineering, ICNBME 2025, held on October 7–10, 2025, in Chisinau, Republic of Moldova, this second volume of the proceedings focuses on technologies for medical imaging, tissue engineering, therapeutic and rehabilitation devices, and diagnostic tools. An emphasis is given to applications in personalized medicine, disease prevention, and patient care. Key topics include genetic and biomarker-based diagnostics, predictive modeling of disease progression, and computational simulations of biological systems. Further, this book covers applications of artificial intelligence in healthcare, with a focus on data security, patient stratification, and decision support systems. Novel biomaterials for tissues engineering, technologies for non-invasive monitoring, and mobile health solutions are also discussed throughout the book. With a good balance of theory and practice, this book offers extensive and timely information for students and specialists in biomedical engineering, clinical research, health informatics, and medical technologies.

8 Ball Pool: guía no oficial

by Joshua Abbott Mario Antuña

GUÍA NO OFICIAL Guía de consejos y estrategias. Este título contiene la guía más detallada de internet, todo explicado de manera sencilla y entendible. Disponible para descarga instantánea a tu teléfono móvil, dispositivo eBook o en papel. Con el éxito de mis cientos de otras guías, he escrito una nueva incluyendo consejos profesionales, excelentes tanto para jugadores principiantes como para avanzados. Esta guía incluye consejos, estrategias y tácticas específicas para ayudarte a progresar más rápidamente, vencer a tus oponentes, ganar más dinero ¡y mucho más! *- Consejos y estrategias profesionales *- Trampas *- ¡Secretos, trucos y estrategias usadas por jugadores profesionales! *- Cómo obtener millones de billetes y monedas *- Y MUCHO MÁS Todas las versiones de esta guía incluyen capturas que te ayudarán a entender mejor cada parte de la misma. No hay ninguna otra guía más comprensible y completa que esta en internet. Renuncia a derechos Este producto no está relacionado, afiliado, patrocinado o certificado de ninguna forma por el poseedor de los derechos de autor.

8 Practical Bootstrap Projects

by Zeeshan Chawdhary Syed Fazle Rahman Maria Antonietta Perna Manjunath M Ahmed Bouchefra George Martsoukos Ashraff Hathibelagal

Bootstrap stands as one of the most popular, open-source, front-end frameworks on the Web. Since its official release in 2011, it has undergone several changes, and it's now one of the most stable and responsive frameworks available. It's loved by web developers of all levels, as it gives them the capability to build a functional, attractive website design within minutes. A novice developer with just some basic knowledge of HTML and little CSS can easily get started with Bootstrap. In this book, we'll share a selection of nine different practical projects that you can follow along with. It contains: Spicing Up the Bootstrap Carousel with CSS3 Animations by Maria Antonietta PernaA Full-screen Bootstrap Carousel with Random Initial Image by George MartsoukosAnimating Bootstrap Carousels with GSAP's Animation Library by George MartsoukosBuild a Simple Tumblr Theme with Bootstrap by Ashraff Hathibelagal How to Build a Responsive Bootstrap Website by Syed Fazle RahmanBootstrap and WordPress Theme Integration in 8 Easy Steps by Ahmed BouchefraIntegrating Bootstrap with React: a Guide for Developers by Manjunath MIntegrating Bootstrap with Vue.js using Bootstrap-Vue by Zeeshan Chawdhary This book is for all frontend developers who want to build responsive, mobile-first websites. You'll need to be familiar with HTML and CSS and have a reasonable level of understanding of JavaScript in order to follow the discussion.

8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

by Kim Crawley

Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

8-Bit Apocalypse: The True Story Behind The Classic Video Game

by Alex Rubens Jeff Gerstmann

The first history of Atari’s Missile Command, and its unforeseen effects on its creators and the culture Before Call of Duty, before World of Warcraft, before even Super Mario Bros., the video game industry exploded in the late 1970s with the advent of the video arcade. Leading the charge was Atari Inc., the creator of, among others, the iconic game Missile Command. The first game to double as a commentary on culture, Missile Command put the players’ fingers on “the button,” making them responsible for the fate of civilization in a no-win scenario, all for the price of a quarter. The game was a marvel of modern culture, helping usher in both the age of the video game and the video game lifestyle. Its groundbreaking implications inspired a fanatical culture that persists to this day. As fascinating as the cultural reaction to Missile Command were the programmers behind it. Before the era of massive development teams and worship of figures like Steve Jobs, Atari was manufacturing arcade machines designed, written, and coded by individual designers. As earnings from their games entered the millions, these creators were celebrated as geniuses in their time; once dismissed as nerds and fanatics, they were now being interviewed for major publications, and partied like Wall Street traders. However, the toll on these programmers was high: developers worked 120-hour weeks, often opting to stay in the office for days on end while under a deadline. Missile Command creator David Theurer threw himself particularly fervently into his work, prompting not only declining health and a suffering relationship with his family, but frequent nightmares about nuclear annihilation. To truly tell the story from the inside, tech insider and writer Alex Rubens has interviewed numerous major figures from this time: Nolan Bushnell, founder of Atari; David Theurer, the creator of Missile Command; and Phil Klemmer, writer for the NBC series Chuck, who wrote an entire episode for the show about Missile Command and its mythical “kill screen.” Taking readers back to the days of TaB cola, dot matrix printers, and digging through the couch for just one more quarter, Alex Rubens combines his knowledge of the tech industry and experience as a gaming journalist to conjure the wild silicon frontier of the 8-bit ’80s. 8-Bit Apocalypse: The Untold Story of Atari's Missile Command offers the first in-depth, personal history of an era for which fans have a lot of nostalgia.

80 sposobów na Ajax

by Bruce W. Perry

Techniki tworzenia nowoczesnych aplikacji internetowych Przygotowywanie wygodnych w obs?udze formularzy Integracja witryny z Google Maps Zarzšdzanie po?šczeniami sieciowymi Ajax to nazwa technologii powsta?ej w wyniku po?šczenia j?zyka JavaScript, XML oraz kaskadowych arkuszy stylów. Jej wdro?enie pozwala wyeliminowa? ze stron WWW jednš z ich najbardziej irytujšcych cech, czyli konieczno?? prze?adowywania zawarto?ci po ka?dej zmianie. Umiej?tne wykorzystanie mo?liwo?ci Ajaksa sprawia, ?e aplikacje internetowe przypominajš "zwyk?e" programy dla systemów Windows lub Mac OS. Dzi?ki zastosowaniu Ajaksa aplikacja internetowa dzia?a zdecydowanie szybciej, a po?šczenia z serwerem nie przeszkadzajš u?ytkownikowi w pracy. ?atwiejsza jest tak?e dynamiczna zmiana elementów w ró?nych cz??ciach strony. Rozwišzania oparte na Ajaksie wprowadzono w wielu dziedzinach, takich jak blogi, narz?dzia s?u?šce do nauki, newslettery oraz ma?e portale internetowe. W ksiš?ce "80 sposobów na Ajax" znajdziesz przyk?ady zastosowania tej techniki w tworzeniu interesujšcych i nieszablonowych witryn WWW. Czytajšc jš, dowiesz si?, jak sprawi?, aby witryny WWW by?y bardziej interaktywne, a aplikacje WWW dzia?a?y dok?adnie tak jak aplikacje desktopowe. Nauczysz si? korzysta? z interfejsów programistycznych witryn Google Maps, Yahoo! Maps i Geo URL oraz obs?ugiwa? sesje i cookies z poziomu Ajaksa. Poznasz równie? metody weryfikowania poprawno?ci danych wprowadzanych do formularzy oraz techniki ?šczenia Ajaksa z innymi nowoczesnymi narz?dziami, takimi jak Ruby on Rails. Tworzenie interaktywnych formularzy Po?šczenia z Google Maps i Yahoo! Maps Korzystanie z us?ugi Geo URL Obs?uga plików cookies Przeglšdanie kana?ów RSS Integracja z aplikacjami sieciowymi napisanymi w Javie Korzystanie z bibliotek Prototype i Rico Po?šczenie Ajaksa z Ruby on Rails Wykorzystanie biblioteki script.aculo.us do tworzenia efektów wizualnych Twórz szybkie, wydajne i wygodne w obs?udze aplikacje sieciowe.

80/20 Sales and Marketing

by Richard Koch Perry Marshall

Guided by famed marketing consultant and best-selling author Perry Marshall, sales and marketing professionals save 80 percent of their time and money by zeroing in on the right 20 percent of their market - then apply 80/202 and 80/203 to gain 10X, even 100X the success. With a powerful 80/20 software tool (online, included with the book), sellers and marketers uncover how to slash time-wasters; advertise to hyper-responsive buyers and avoid tire-kickers; gain coveted positions on search engines; differentiate themselves from competitors and gain esteem in their marketplace. With the included tools they'll see exactly how much money they're leaving on the table, and how to put it back in their pockets. Sellers will identify untapped markets, high-profit opportunities and incremental improvements, gaining time and greater profit potential. Supported by online tools from Marshall, including The 80/20 Power Curve, a tool that helps you see invisible money, and a Marketing DNA Test, a personal assessment that zeroes in on one's natural selling assets, this timeless guide promises to change the game for seasoned and novice marketers and sellers.

802.11 Security

by Bruce Potter Bob Fleck

Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you'll want this book beside you every step of the way

802.11 Wireless Networks

by Alan Holt Chi-Yu Huang

Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyze performance in a WLAN environment. Topics and Features: presents a practical approach supported by the extensive use of examples and detailed instructions; discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks; provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple; examines issues of wireless security and describes how to implement a wireless network with enterprise security; investigates the medium access control sub-layer, and models for performance analysis of the MAC layer; reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.

802.11 Wireless Networks: The Definitive Guide

by Matthew Gast

As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide , 2nd Edition is the perfect place to start. This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on: deployment considerations network monitoring and performance tuning wireless security issues how to use and select access points network monitoring essentials wireless card configuration security issues unique to wireless networks With wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide , 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.

802.11 Wireless Networks: The Definitive Guide

by Matthew S. Gast

As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.

802.11ac: Wi-Fi at Gigabit and Beyond

by Matthew S. Gast

The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.Author Matthew Gast—an industry expert who led the development of 802.11-2012 and security task groups at the Wi-Fi Alliance—explains how 802.11ac will not only increase the speed of your network, but its capacity as well. Whether you need to serve more clients with your current level of throughput, or serve your existing client load with higher throughput, 802.11ac is the solution. This book gets you started.Understand how the 802.11ac protocol works to improve the speed and capacity of a wireless LANExplore how beamforming increases speed capacity by improving link margin, and lays the foundation for multi-user MIMOLearn how multi-user MIMO increases capacity by enabling an AP to send data to multiple clients simultaneouslyPlan when and how to upgrade your network to 802.11ac by evaluating client devices, applications, and network connections

802.11n: Wi-Fi Above 100 Mbps

by Matthew S. Gast

Wireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn’t trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast—chair of the IEEE group that produced revision 802.11-2012—shows you why wireless has become the default method of connecting to a network, and provides technical details you need to plan, design, and deploy 802.11n today.Building a network for the multitude of new devices is now a strategic decision for network engineers everywhere. This book gives you an in-depth look at key parts of 802.11n, and shows you how to achieve an Ethernet-free wireless office.Learn how MIMO’s multiple data streams greatly increase wireless speedDiscover how 802.11n modifications improve MAC efficiencyExamine advanced PHY features such as beanforming and space-time code blockUse advanced MAC features to maintain interoperability with older devicesPlan an 802.11n network by determining traffic demand, key applications, power requirements, and securityChoose the architecture, select hardware, and plan coverage to design and build your network

8051 Microcontrollers: Fundamental Concepts, Hardware, Software And Applications In Electronics

by Salvador Pinillos Gimenez

Explains internals of 8051 hardware and relates to general principles of computer architecture;<P><P> Demonstrates how to implement various electronics applications, with hardware and software design for 8051 microcontrollers;<P> Includes numerous, solved examples, end-of-chapter exercises, laboratory and practical projects.<P>This textbook describes in detail the fundamental information about the 8051 microcontroller and it carefully teaches readers how to use the microcontroller to make both electronics hardware and software. In addition to discussion of the 8051 internals, this text includes numerous, solved examples, end-of-chapter exercises, laboratory and practical projects.

8th International Conference on Advancements of Medicine and Health Care Through Technology: Proceedings of MEDITECH 2022, October 20–22, 2022, Cluj-Napoca, Romania (IFMBE Proceedings #102)

by Simona Vlad Nicolae Marius Roman

This book gathers the proceedings of the 8th International Conference on Advancements of Medicine and Health Care through Technology, MEDITECH 2022, held virtually on 20–22 October 2022, from Cluj-Napoca, Romania. It reports on both theoretical and practical developments in biomedical imaging and image processing, health technology, technologies for education, and biomedical signal processing and medical devices, measurements and instrumentation. Both the conference and the realization of this book were supported by the Romanian National Society for Medical Engineering and Biological Technology (SNIMTB).

9 Practical Node.js Projects

by Simon Holmes Michael Wanyoike James Kolce Jeremy Wilken James Hibbard Lukas White Paul Orac Patrick Catanzariti

While there have been quite a few attempts to get JavaScript working as a server-side language, Node.js (frequently just called Node) has been the first environment that's gained any traction. It's now used by companies such as Netflix, Uber and Paypal to power their web apps. Node allows for blazingly fast performance; thanks to its event loop model, common tasks like network connection and database I/O can be executed very quickly indeed. In this book, we offer a selection of nine different practical projects that you can follow along with. It contains: Build a Simple Beginner App with Node, Bootstrap & MongoDB by James HibbardHow to Build a File Upload Form with Express and Dropzone.js by Lukas WhiteHow to Build and Structure a Node.js MVC Application by James KolceUser Authentication with the MEAN Stack by Simon Holmes & Jeremy WilkenBuild a JavaScript Command Line Interface (CLI) with Node.js by Lukas White & Michael WanyoikeBuilding a Real-time Chat App with Sails.js by Michael WanyoikePassport Authentication for Node.js Applications by Paul OracLocal Authentication Using Passport in Node.js by Paul OracAn Introduction to NodeBots by Patrick Catanzariti This book is for anyone who wants to start learning server-side development with Node.js. Familiarity with JavaScript is assumed.

96 Common Challenges in Power Query: Practical Solutions for Mastering Data Transformation in Excel and Power BI

by Omid Motamedisedeh

This comprehensive guide is designed to address the most frequent and challenging issues faced by users of Power Query, a powerful data transformation tool integrated into Excel, Power BI, and Microsoft Azure. By tackling 96 real-world problems with practical, step-by-step solutions, this book is an essential resource for data analysts, Excel enthusiasts, and Power BI professionals. It aims to enhance your data transformation skills and improve efficiency in handling complex data sets. Structured into 12 chapters, the book covers specific areas of Power Query such as data extraction, referencing, column splitting and merging, sorting and filtering, and pivoting and unpivoting tables. You will learn to combine data from Excel files with varying column names, handle multi-row headers, perform advanced filtering, and manage missing values using techniques such as linear interpolation and K-nearest neighbors (K-NN) imputation. The book also dives into advanced Power Query functions such as Table.Group, List.Accumulate, and List.Generate, explored through practical examples such as calculating running totals and implementing complex grouping and iterative processes. Additionally, it covers crucial topics such as error-handling strategies, custom function creation, and the integration of Python and R with Power Query. In addition to providing explanations on the use of functions and the M language for solving real-world challenges, this book discusses optimization techniques for data cleaning processes and improving computational speed. It also compares the execution time of functions across different patterns and proposes the optimal approach based on these comparisons. In today’s data-driven world, mastering Power Query is crucial for accurate and efficient data processing. But as data complexity grows, so do the challenges and pitfalls that users face. This book serves as your guide through the noise and your key to unlocking the full potential of Power Query. You’ll quickly learn to navigate and resolve common issues, enabling you to transform raw data into actionable insights with confidence and precision. What You Will Learn Master data extraction and transformation techniques for various Excel file structures Apply advanced filtering, sorting, and grouping methods to organize and analyze data Leverage powerful functions such as Table.Group, List.Accumulate, and List.Generate for complex transformations Optimize queries to execute faster Create and utilize custom functions to handle iterative processes and advanced list transformation Implement effective error-handling strategies, including removing erroneous rows and extracting error reasons Customize Power Query solutions to meet specific business needs and share custom functions across files Who This Book Is For Aspiring and developing data professionals using Power Query in Excel or Power BI who seek practical solutions to enhance their skills and streamline complex data transformation workflows

Refine Search

Showing 401 through 425 of 64,204 results