Browse Results

Showing 53,201 through 53,225 of 53,525 results

The 8th International Conference on Knowledge Management in Organizations: Social and Big Data Computing for Knowledge Management

by Leon S.L. Wang Juan Manuel Corchado Rodríguez Lorna Uden I-Hsien Ting Hsin-Chang Yang

The proceedings from the eighth KMO conference represent the findings of this international meeting which brought together researchers and developers from industry and the academic world to report on the latest scientific and technical advances on knowledge management in organizations. This conference provided an international forum for authors to present and discuss research focused on the role of knowledge management for innovative services in industries, to shed light on recent advances in social and big data computing for KM as well as to identify future directions for researching the role of knowledge management in service innovation and how cloud computing can be used to address many of the issues currently facing KM in academia and industrial sectors.

8th International Conference on Advancements of Medicine and Health Care Through Technology: Proceedings of MEDITECH 2022, October 20–22, 2022, Cluj-Napoca, Romania (IFMBE Proceedings #102)

by Simona Vlad Nicolae Marius Roman

This book gathers the proceedings of the 8th International Conference on Advancements of Medicine and Health Care through Technology, MEDITECH 2022, held virtually on 20–22 October 2022, from Cluj-Napoca, Romania. It reports on both theoretical and practical developments in biomedical imaging and image processing, health technology, technologies for education, and biomedical signal processing and medical devices, measurements and instrumentation. Both the conference and the realization of this book were supported by the Romanian National Society for Medical Engineering and Biological Technology (SNIMTB).

The 8th International Conference on Advanced Machine Learning and Technologies and Applications (Lecture Notes on Data Engineering and Communications Technologies #113)

by Aboul Ella Hassanien Rawya Y. Rizk Václav Snášel Rehab F. Abdel-Kader

This book constitutes the refereed proceedings of the 8th International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2022, held in Cairo, Egypt, during May 5-7, 2022. The 8th edition of AMLTA will be organized by the Scientific Research Group in Egypt (SRGE), Egypt, collaborating with Port Said University, Egypt, and VSB-Technical University of Ostrava, Czech Republic. AMLTA series aims to become the premier international conference for an in-depth discussion on the most up-to-date and innovative ideas, research projects, and practices in the field of machine learning technologies and their applications. The book covers current research on advanced machine learning technology, including deep learning technology, sentiment analysis, cyber-physical system, IoT, and smart cities informatics and AI against COVID-19, data mining, power and control systems, business intelligence, social media, digital transformation, and smart systems.

8051 Microcontrollers: Fundamental Concepts, Hardware, Software And Applications In Electronics

by Salvador Pinillos Gimenez

Explains internals of 8051 hardware and relates to general principles of computer architecture;<P><P> Demonstrates how to implement various electronics applications, with hardware and software design for 8051 microcontrollers;<P> Includes numerous, solved examples, end-of-chapter exercises, laboratory and practical projects.<P>This textbook describes in detail the fundamental information about the 8051 microcontroller and it carefully teaches readers how to use the microcontroller to make both electronics hardware and software. In addition to discussion of the 8051 internals, this text includes numerous, solved examples, end-of-chapter exercises, laboratory and practical projects.

802.11n: A Survival Guide

by Matthew Gast

<p>With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn&#8217;t trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast&#8212;chair of the IEEE group that produced revision 802.11-2012&#8212;shows you why wireless has become the default method of connecting to a network, and provides technical details you need to plan, design, and deploy 802.11n today.</p>

802.11n: Wi-Fi Above 100 Mbps

by Matthew S. Gast

Wireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn’t trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast—chair of the IEEE group that produced revision 802.11-2012—shows you why wireless has become the default method of connecting to a network, and provides technical details you need to plan, design, and deploy 802.11n today.Building a network for the multitude of new devices is now a strategic decision for network engineers everywhere. This book gives you an in-depth look at key parts of 802.11n, and shows you how to achieve an Ethernet-free wireless office.Learn how MIMO’s multiple data streams greatly increase wireless speedDiscover how 802.11n modifications improve MAC efficiencyExamine advanced PHY features such as beanforming and space-time code blockUse advanced MAC features to maintain interoperability with older devicesPlan an 802.11n network by determining traffic demand, key applications, power requirements, and securityChoose the architecture, select hardware, and plan coverage to design and build your network

802.11 Wireless Networks: The Definitive Guide

by Matthew Gast

As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start. This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on: deployment considerations network monitoring and performance tuning wireless security issues how to use and select access points network monitoring essentials wireless card configuration security issues unique to wireless networks With wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.

802.11 Wireless Networks: The Definitive Guide

by Matthew Gast

As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide , 2nd Edition is the perfect place to start. This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on: deployment considerations network monitoring and performance tuning wireless security issues how to use and select access points network monitoring essentials wireless card configuration security issues unique to wireless networks With wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide , 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.

802.11 Wireless Networks

by Alan Holt Chi-Yu Huang

Wireless communication has the advantage of mobility and obviates the need for cabling, but is inherently less secure and is subject to the heavy regulation of the radio frequency spectrum. Nevertheless, the allocation of unlicensed parts of the spectrum has facilitated the growth in wireless local area networks (WLANs). WLAN technology is progressing at a rapid pace, but the most widely accepted WLAN standard is the IEEE 802.11. This unique and highly practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. Readers will gain understanding of the security implications of wireless networks and learn how vulnerabilities can be mitigated. Additionally, the book examines the underlying 802.11 protocols and explains how to build mathematical models in order to analyze performance in a WLAN environment. Topics and Features: presents a practical approach supported by the extensive use of examples and detailed instructions; discusses various wireless network solutions across a number of different vendor platforms, including Cisco Aironet, Alactel-Lucent Omniaccess and Meru Networks; provides numerous mathematical models for analyzing the performance of IEEE 802.11 standards, and shows how to build these models using Maple; examines issues of wireless security and describes how to implement a wireless network with enterprise security; investigates the medium access control sub-layer, and models for performance analysis of the MAC layer; reviews the physical sub-layers of 802.11, describing modulation techniques and examining how devices adapt to changes in the RF environment. A highly useful text/reference for industry professionals, undergraduate and graduate-level students will also find this book an ideal companion to a university course on wireless networking. Dr. Alan Holt is Chief Technical Officer at the network consultancy company IP Performance Ltd., based in Bristol, UK. He is author of the popular Springer text Network Performance Analysis: Using the J Programming Language. Dr. Chi-Yu Huang works for Tata Technologies Ltd., and is currently a software consultant on the Airbus project in Bristol. She was formerly Operations Manager for DL Consulting, New Zealand.

802.11 Security

by Bob Fleck Bruce Potter

Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you'll want this book beside you every step of the way

80 sposobów na Ajax

by Bruce W. Perry

Techniki tworzenia nowoczesnych aplikacji internetowych Przygotowywanie wygodnych w obs?udze formularzy Integracja witryny z Google Maps Zarzšdzanie po?šczeniami sieciowymi Ajax to nazwa technologii powsta?ej w wyniku po?šczenia j?zyka JavaScript, XML oraz kaskadowych arkuszy stylów. Jej wdro?enie pozwala wyeliminowa? ze stron WWW jednš z ich najbardziej irytujšcych cech, czyli konieczno?? prze?adowywania zawarto?ci po ka?dej zmianie. Umiej?tne wykorzystanie mo?liwo?ci Ajaksa sprawia, ?e aplikacje internetowe przypominajš "zwyk?e" programy dla systemów Windows lub Mac OS. Dzi?ki zastosowaniu Ajaksa aplikacja internetowa dzia?a zdecydowanie szybciej, a po?šczenia z serwerem nie przeszkadzajš u?ytkownikowi w pracy. ?atwiejsza jest tak?e dynamiczna zmiana elementów w ró?nych cz??ciach strony. Rozwišzania oparte na Ajaksie wprowadzono w wielu dziedzinach, takich jak blogi, narz?dzia s?u?šce do nauki, newslettery oraz ma?e portale internetowe. W ksiš?ce "80 sposobów na Ajax" znajdziesz przyk?ady zastosowania tej techniki w tworzeniu interesujšcych i nieszablonowych witryn WWW. Czytajšc jš, dowiesz si?, jak sprawi?, aby witryny WWW by?y bardziej interaktywne, a aplikacje WWW dzia?a?y dok?adnie tak jak aplikacje desktopowe. Nauczysz si? korzysta? z interfejsów programistycznych witryn Google Maps, Yahoo! Maps i Geo URL oraz obs?ugiwa? sesje i cookies z poziomu Ajaksa. Poznasz równie? metody weryfikowania poprawno?ci danych wprowadzanych do formularzy oraz techniki ?šczenia Ajaksa z innymi nowoczesnymi narz?dziami, takimi jak Ruby on Rails. Tworzenie interaktywnych formularzy Po?šczenia z Google Maps i Yahoo! Maps Korzystanie z us?ugi Geo URL Obs?uga plików cookies Przeglšdanie kana?ów RSS Integracja z aplikacjami sieciowymi napisanymi w Javie Korzystanie z bibliotek Prototype i Rico Po?šczenie Ajaksa z Ruby on Rails Wykorzystanie biblioteki script.aculo.us do tworzenia efektów wizualnych Twórz szybkie, wydajne i wygodne w obs?udze aplikacje sieciowe.

80/20 Sales and Marketing

by Richard Koch Perry Marshall

Guided by famed marketing consultant and best-selling author Perry Marshall, sales and marketing professionals save 80 percent of their time and money by zeroing in on the right 20 percent of their market - then apply 80/202 and 80/203 to gain 10X, even 100X the success. With a powerful 80/20 software tool (online, included with the book), sellers and marketers uncover how to slash time-wasters; advertise to hyper-responsive buyers and avoid tire-kickers; gain coveted positions on search engines; differentiate themselves from competitors and gain esteem in their marketplace. With the included tools they'll see exactly how much money they're leaving on the table, and how to put it back in their pockets. Sellers will identify untapped markets, high-profit opportunities and incremental improvements, gaining time and greater profit potential. Supported by online tools from Marshall, including The 80/20 Power Curve, a tool that helps you see invisible money, and a Marketing DNA Test, a personal assessment that zeroes in on one's natural selling assets, this timeless guide promises to change the game for seasoned and novice marketers and sellers.

8 Steps to Better Security: A Simple Cyber Resilience Guide for Business

by Kim Crawley

Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

8 Practical Bootstrap Projects

by Maria Antonietta Perna George Martsoukos Ashraff Hathibelagal Syed Fazle Rahman Ahmed Bouchefra Manjunath M Zeeshan Chawdhary

Bootstrap stands as one of the most popular, open-source, front-end frameworks on the Web. Since its official release in 2011, it has undergone several changes, and it's now one of the most stable and responsive frameworks available. It's loved by web developers of all levels, as it gives them the capability to build a functional, attractive website design within minutes. A novice developer with just some basic knowledge of HTML and little CSS can easily get started with Bootstrap. In this book, we'll share a selection of nine different practical projects that you can follow along with. It contains: Spicing Up the Bootstrap Carousel with CSS3 Animations by Maria Antonietta PernaA Full-screen Bootstrap Carousel with Random Initial Image by George MartsoukosAnimating Bootstrap Carousels with GSAP's Animation Library by George MartsoukosBuild a Simple Tumblr Theme with Bootstrap by Ashraff Hathibelagal How to Build a Responsive Bootstrap Website by Syed Fazle RahmanBootstrap and WordPress Theme Integration in 8 Easy Steps by Ahmed BouchefraIntegrating Bootstrap with React: a Guide for Developers by Manjunath MIntegrating Bootstrap with Vue.js using Bootstrap-Vue by Zeeshan Chawdhary This book is for all frontend developers who want to build responsive, mobile-first websites. You'll need to be familiar with HTML and CSS and have a reasonable level of understanding of JavaScript in order to follow the discussion.

8-Bit Apocalypse: The True Story Behind The Classic Video Game

by Alex Rubens Jeff Gerstmann

The first history of Atari’s Missile Command, and its unforeseen effects on its creators and the culture Before Call of Duty, before World of Warcraft, before even Super Mario Bros., the video game industry exploded in the late 1970s with the advent of the video arcade. Leading the charge was Atari Inc., the creator of, among others, the iconic game Missile Command. The first game to double as a commentary on culture, Missile Command put the players’ fingers on “the button,” making them responsible for the fate of civilization in a no-win scenario, all for the price of a quarter. The game was a marvel of modern culture, helping usher in both the age of the video game and the video game lifestyle. Its groundbreaking implications inspired a fanatical culture that persists to this day. As fascinating as the cultural reaction to Missile Command were the programmers behind it. Before the era of massive development teams and worship of figures like Steve Jobs, Atari was manufacturing arcade machines designed, written, and coded by individual designers. As earnings from their games entered the millions, these creators were celebrated as geniuses in their time; once dismissed as nerds and fanatics, they were now being interviewed for major publications, and partied like Wall Street traders. However, the toll on these programmers was high: developers worked 120-hour weeks, often opting to stay in the office for days on end while under a deadline. Missile Command creator David Theurer threw himself particularly fervently into his work, prompting not only declining health and a suffering relationship with his family, but frequent nightmares about nuclear annihilation. To truly tell the story from the inside, tech insider and writer Alex Rubens has interviewed numerous major figures from this time: Nolan Bushnell, founder of Atari; David Theurer, the creator of Missile Command; and Phil Klemmer, writer for the NBC series Chuck, who wrote an entire episode for the show about Missile Command and its mythical “kill screen.” Taking readers back to the days of TaB cola, dot matrix printers, and digging through the couch for just one more quarter, Alex Rubens combines his knowledge of the tech industry and experience as a gaming journalist to conjure the wild silicon frontier of the 8-bit ’80s. 8-Bit Apocalypse: The Untold Story of Atari's Missile Command offers the first in-depth, personal history of an era for which fans have a lot of nostalgia.

8 Ball Pool: guía no oficial

by Joshua Abbott Mario Antuña

GUÍA NO OFICIAL Guía de consejos y estrategias. Este título contiene la guía más detallada de internet, todo explicado de manera sencilla y entendible. Disponible para descarga instantánea a tu teléfono móvil, dispositivo eBook o en papel. Con el éxito de mis cientos de otras guías, he escrito una nueva incluyendo consejos profesionales, excelentes tanto para jugadores principiantes como para avanzados. Esta guía incluye consejos, estrategias y tácticas específicas para ayudarte a progresar más rápidamente, vencer a tus oponentes, ganar más dinero ¡y mucho más! *- Consejos y estrategias profesionales *- Trampas *- ¡Secretos, trucos y estrategias usadas por jugadores profesionales! *- Cómo obtener millones de billetes y monedas *- Y MUCHO MÁS Todas las versiones de esta guía incluyen capturas que te ayudarán a entender mejor cada parte de la misma. No hay ninguna otra guía más comprensible y completa que esta en internet. Renuncia a derechos Este producto no está relacionado, afiliado, patrocinado o certificado de ninguna forma por el poseedor de los derechos de autor.

The 7th International Conference on Information Science, Communication and Computing (Smart Innovation, Systems and Technologies #350)

by Xuesong Qiu Yang Xiao Zhiqiang Wu Yudong Zhang Yuan Tian Bo Liu

This conference proceedings is a collection of the accepted papers of ISCC2023 - the 7th International Conference on Information Science, Communication and Computing held in Chongqing, China, 2-5 June 2023. The topics focus on intelligent information science and technology, artificial intelligence and intelligent systems, cloud computing and big data, smart computing and communication technology, wireless network, and cyber security. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows, and undergraduate and graduate students who need to build a knowledge base of the latest advances and state of the practice in the topics covered by this conference proceedings. This will enable them to build, maintain and manage systems of high reliability and complexity. We would like to thank the authors for their hard work and dedication, and the reviewers for ensuring that only the highest quality papers were selected.

7R: Las siete revoluciones tecnológicas que transformarán nuestra vida

by Joan Cwaik

El siglo XXI dejará su huella en la historia gracias al desarrollo de tecnologías emergentes que están generando una revolución que va más allá de lo industrial porque también involucra aspectos sociales, económicos y culturales. Decir que el mundo avanza a pasos agigantados es una frase trillada pero real. Todavía los autos no vuelan y no vacacionamos en el espacio, pero el siglo XXI va a dejar su huella en la historia gracias al desarrollo de las tecnologías emergentes. Aunque la ciencia ficción y la filosofía imaginaron todos estos adelantos, se está generando una nueva revolución que va más allá de lo industrial porque también involucra aspectos sociales, económicos y culturales. Joan Cwaik, investigador y especialista en innovación tecnológica, explica con claridad en qué consisten estos nuevos avances y cómo van a cambiar la vida de las personas. Las criptomonedas, el big data, las ciudades inteligentes, la impresión 3D, los robots, la Internet de las Cosas y la realidad virtual y la aumentada llegaron para quedarse y van a transformarnos para siempre.

77 Bloques para Construir una Transformación Digital: El Modelo de Capacidad Digital

by Jace An

Este no es un libro sobre teoría que discuta conceptos académicos de transformaración digital, sino que se orienta a la práctica de campo que describe cómo asesorar y mejorar las capacidades digitales de una organización. Más bien satisface mejor a los ‘practicantes digitales’, quienes están involucrados en operaciones de negocios digitales, incluyendo tecnología informática y digital, comercio electrónico, servicios de atención al cliente online y muchas otras áreas operativas en las que la tecnología informática podría tener impacto. La capacidad digital está definida en este libro como la capacidad organizativa y la habilidad para producir resultados de negocio intencionales en el espacio digital al combinar procesos, personas y elementos tecnológicos de un modo único para cada organización. Los elementos del proceso incluyen flujo de proceso, información de entrada y salida; reglas del negocio; políticas y lineamientos. El elemento humano incluye una estructura y cultura organizacional; roles, responsabilidades y habilidades de las personas. Los elementos tecnológicos incluyen aplicaciones; infraestructura de datos; instalaciones y equipos alrededor de la tecnología digital. La capacidad de escucha del diálogo social está definida, por ejemplo, como una capacidad organizativa para entender de qué están hablando los usuarios en las redes sociales y utilizarlo para un negocio al combinar procesos bien definidos, las habilidades del personal y sus evidentes roles y responsabilidades, como también las herramientas de automatización. Una mayor madurez dentro de las capacidades digitales asegura operaciones efectivas y eficientes dentro de los negocios digitales. Las operaciones de los negocios digitales están dentro de un área multidisciplinaria donde convergen los negocios y la Tecnología Informática que trabajan en conjunto para producir resultados comerciales en el espacio digital. Enten

77 Bloques para Construir una Transformación Digital: Explicación Simplificada

by Jace An

En 2018, ‘77 Bloques para Construir una Transformación Digital: Modelo de Capacidad Digital’ fue publicado para asistir a los ‘practicantes digitales’ quienes trabajan en el espacio digital. Desde entonces, pocos lectores me han sugerido escribir un libro sobre la transformación digital para ‘el público en general’ que estuviere interesado en aprender más que lo básico sobre la transformación digital. Es así que he creado este libro ‘77 Bloques para Construir una Transformación Digital: Explicación Simplificada’. Este libro intenta entregar los mensajes claves de ‘77 Bloques para Construir una Transformación Digital: Modelo de Capacidad Digital’ al público en general. Dicho esto, este no pretende ser un libro de teoría que discuta las ideas y conceptos académicos de la transformación digital, sino un libro práctico de campo que describe las capacidades digitales probadas como los bloques de construcción para la transformación digital. ‘77 Bloques para Construir una Transformación Digital: Explicación Simplificada’ se enfoca en introducir 77 bloques de construcción para asistir al público en general a comprender las ‘prácticas reales’ en el espacio digital, aunque no cubre totalmente el Modelo de Madurez descripto en detalle en ‘77 Bloques para Construir una Transformación Digital: Modelo de Capacidad Digital’ que asiste a los practicantes digitales con indicadores de madurez de las capacidades digitales. Este libro proporciona unos pocos ejemplos de indicadores de mayor madurez como una introducción al Modelo de Madurez de las Capacidades Digitales.

75 consejos para sobrevir a las redes sociales (Serie 75 Consejos #8)

by María Frisa

¡¡Llega el volumen número 8 de la exitosa serie «75 consejos», el DIARIO MÁS TRONCHANTE JAMÁS ESCRITO!! Y esta vez no querrás perdértelo, porque lo necesitas: ¿cómo sobrevivir cuando las redes sociales se vuelven en tu contra? ¿Alguna vez un «amigo» ha subido una foto o un vídeo tuyo humillante, de esos que a los demás les hacen mucha gracia (porque no salen) y tú has sido el último en enterarte? ¿Quieres saber qué hacer para intentar pararlo (difícil) o, por lo menos, contrarrestarlo? ¡¡No esperes más, ABRE ESTE LIBRO!! ¡Y aprende de mis 75 superconsejos! Bueno, ejem, ejem, también de mis errores... Y recuerda: si hay algo eterno, es lo que subes a un grupo de WhatsApp, (el sol se apagará, las estrellas desaparecerán, la raza humana se extinguirá, pero tu foto seguirá ahí).

70 Tips and Tricks for Mastering the CISSP Exam

by R. Sarma Danturthi

Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick the best of the options given. The CISSP exam conducted by ISC2 is the hardest and most rewarded cybersecurity examination. The test has several domains and sub-domains and covers a wide range of topics on security, including cyber and physical building security fields. It also covers breaches, discovery of breaches, and how to report data breaches. Because the subject area is vast and the questions are almost never repeated, it is hard for the exam taker to memorize or quickly discover the correct solution. The four options given as answers typically have two very close matches to the question. With quick analysis, it is possible to discover from the verbiage of a question what is truly being asked and learn how to find the closest possible solution without spending too much time on each question. What You Will Learn Think outside the box (the CISSP exam demands this of candidates)Quickly discern the gist of a question, eliminate the distractors, and select the correct answerUnderstand the use of words such as MOST, BEST, FIRST, LAST in the questionsSelect the correct answer when multiple options look like possible solutions Who This Book Is For Experienced security practitioners, managers, and executives interested in proving their knowledge across a wide array of security practices and principles, including chief information security officers, chief information officers, directors of security, IT directors and managers, security systems engineers, security analysts, security managers, security auditors, security architects, security consultants, private contractors, and network architects

The 7 Qualities of Highly Secure Software

by Mano Paul

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure

7 Days till Ice Cream: A Makers Story about Coding (Makers Make It Work)

by Bernardo Feliciano

It's Sunday—ice cream day! But sometimes the ice cream truck turns down a different street. Can Jerron, A.J., and Cha crack the ice cream man's code? They want him to come their way! Tying into the popular Makers Movement, Makers Make It Work is a series of fun easy-to-read stories that focus on problem-solving and hands-on action. This charming story explores the Makers theme of Coding and includes explanatory sidebars and a computer coding-related activity for young makers to try themselves!

The 6th International Conference on Wireless, Intelligent and Distributed Environment for Communication: WIDECOM 2023 (Lecture Notes on Data Engineering and Communications Technologies #185)

by Isaac Woungang Sanjay Kumar Dhurandher

This book presents the proceedings of the 6th International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2023), which took place at Brock University, St. Catharines, Ontario, Canada, October 11-13, 2023. The book addresses issues related to new dependability paradigms, design, and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The goal of the conference is to provide a forum for researchers, students, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the above-mentioned areas.

Refine Search

Showing 53,201 through 53,225 of 53,525 results