Listing 1 - 10 of 22 | << page >> |
Sort by
|
Choose an application
As more and more equipment is interface or'bus' driven, either by the use of controllers or directly from PCs, the question of which bus to use is becoming increasingly important both in industry and in the office. 'Computer Busses' has been designed to help choose the best type of bus for the particular application.There are several books which cover individual busses, but none which provide a complete guide to computer busses. The author provides a basic theory of busses and draws examples and applications from real bus case studies. Busses are analysed using from a top-down approach
Microcomputers --- Computer interfaces. --- Micro-ordinateurs --- Ordinateurs --- Buses --- Bus --- Interfaces --- -Computer interfaces --- 681.3 *C2 --- Interfaces, Computer --- Computer input-output equipment --- Interface circuits --- Home computers --- Micro computers --- Micros (Microcomputers) --- PCs (Microcomputers) --- Personal computers --- Small computers --- Minicomputers --- Computer communication networks: data communications; OSI; security and protection --- Computer interfaces --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Microcomputers -- Buses.
Choose an application
The SSCP Study Guide and DVD Training System is a unique and comprehensive combination of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation. These components will give the student 100% coverage of all (ISC)2 official exam objectives and realistic exam simulation.The SSCP Study Guide and DVD Training System consists of:1.SSCP Study Guide The 1,000,000 readers who have read previous Syngress Study Guides will find many familiar features in the Study Guide along with many new enhancements including:·Exercises: There will be frequent use of st
681.3 *C2 --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection --- Computer security. --- Computer science. --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Computer architecture. Operating systems --- 681.3 *C2 --- 681.3*D44 --- 681.324 --- Internet (e-mail, website) --- Computer communication networks: data communications; OSI; security and protection --- Communications management: buffering; input/output; message sending; network communication; terminal management (Operating systems)--See also {?681.3*C2} --- 681.3*D44 Communications management: buffering; input/output; message sending; network communication; terminal management (Operating systems)--See also {?681.3*C2} --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection
Choose an application
In designing a network device, you make dozens of decisions that affect the speed with which it will perform-sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles-ranging from the commonly recognized to the groundbreaking-that are key to breaking t
681.3*C2 --- Computer communication networks: data communications; OSI; security and protection --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer network protocols --- Protocols, Computer network --- Computer networks --- 681.3 *C2 --- Information Technology --- General and Others --- Computer network protocols. --- Computer networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
In the design of a neural network, either for biological modeling, cognitive simulation, numerical computation or engineering applications, it is important to investigate the network's computational performance which is usually described by the long-term behaviors, called dynamics, of the model equations. The purpose of this book is to give an introduction to the mathematical modeling and analysis of networks of neurons from the viewpoint of dynamical systems.
Neural networks (Neurobiology) --- Mathematical models. --- 681.3*C1 --- 681.3 *C2 --- 681.3*C1 Processor architectures (Computer systems organization) --- Processor architectures (Computer systems organization) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection --- Biological neural networks --- Nets, Neural (Neurobiology) --- Networks, Neural (Neurobiology) --- Neural nets (Neurobiology) --- Cognitive neuroscience --- Neurobiology --- Neural circuitry --- Mathematical models --- Neurobiology. --- Neurosciences
Choose an application
In dit werk maakt Evelyn Vandervieren een studie van de gebruiksvriendelijkheid van websites, in het bijzonder websites die legale muziekdownloads aanbieden aan Belgische klanten. Ze zoekt aan de hand van een zelf ontwikkeld meetinstrument uit wat het succes verklaart van sommige websites. Het boek is bedoeld voor wie beroepshalve bezig is met aan- en verkoop via websites, lesgevers en studenten en al wie zijn website wil optimaliseren om zo een hoger rendement te halen.
Websites. --- websites --- Music --- Computer architecture. Operating systems --- webdesign --- e-commerce --- meten --- digitale muziek --- Web sites --- Evaluation --- Electronic commerce --- Case studies --- PXL-Media & Tourism 2014 --- internetcommunicatie --- internetsites --- kwaliteitscontrole --- #SBIB:309H1713 --- websiteanalyse --- klantvriendelijkheid --- media --- marketing --- Mediatechnologie: nieuwe toepassingen (abonnee-televisie, electronic mail, desk top publishing, virtuele realiteit...) --- Websites --- Internet --- Muziek --- Grafische vormgeving --- Gebruikersonderzoeken --- Zoekmachineoptimalisatie --- SEO --- Website --- Gebruikersonderzoek --- Afrika --- Compositie (muziek) --- 681.3 *C2 --- 34:681.3 --- 34:681.3 Informaticarecht --- Informaticarecht --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection
Choose an application
Vreemdetalenonderwijs --- didactiek --- gebruik van internet. --- Computer assisted instruction --- talenonderwijs --- Didactics of languages --- internet --- Vreemdetalenonderwijs en internet --- 800.7 --- 800.515 --- 681.3 *C2 --- #KVHA:Internet --- #KVHA:Taalonderwijs --- 81'3:004 --- computerondersteund onderwijs --- e-mail --- taaldidactiek --- taalonderwijs --- 485.1 --- Internet --- Nederlands --- Onderwijs --- Taal --- Taalonderwijs --- 654 )* TELECOMMUNICATIE --- informatica --- talen --- 454.52 --- Talenonderwijs: internet --- talenonderwijs: internet --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection --- 800.515 Computerondersteunend (taal)onderwijs. Computer Assisted Language Learning --- Computerondersteunend (taal)onderwijs. Computer Assisted Language Learning --- 800.7 Taalonderwijs. Taalverwerving --- Taalonderwijs. Taalverwerving --- taalonderwijs met computer --- Nederlandse taal- en letterkunde --- (zie ook: teleonderwijs) --- Didactiek --- Gebruik van internet.
Choose an application
It's no secret that well-executed exhibits in libraries and museums can make attendance numbers skyrocket. Dynamic exhibits not only provide information and entertainment for your existing customers, but they are also opportunities to reach out to new customers and to widen your market. A great exhibit can be the hook that brings people in the door for the first time. Creating a Winning Online Exhibition will help you to do just that—conceive, design, and execute a compelling online exhibition. Different than a digital collection, an online exhibition is a selective presentation of objects org
Libraries --- -Library exhibits --- -Library Web sites --- -Web sites --- -025.17 --- 069.01 --- 681.3*C2 --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection --- 069.01 Museologie --- Museologie --- 025.17 Bibliotheekbeheer: speciale collecties --- Bibliotheekbeheer: speciale collecties --- Pages, Web --- Sites, Web --- Web pages --- Websites --- World Wide Web pages --- World Wide Web sites --- WWW pages --- WWW sites --- Computer network resources --- Web sites --- Web librarianship --- Displays, Library --- Library displays --- Exhibitions --- Books --- Documentation --- Public institutions --- Librarians --- Public relations --- Design --- History --- Library exhibits --- Library Web sites --- 025.17 --- 681.3 *C2
Choose an application
Provides ideas and resources that will help school librarians and teachers understand the discipline of geography and locate and use Internet sites that are especially useful in helping students develop critical thinking skills in the context of geography.
Critical thinking --- Geography --- Internet in education --- 681.3 *C2 --- 91 --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection --- Internet (Computer network) in education --- Education --- Cosmography --- Earth sciences --- World history --- Critical reflection --- Reflection (Critical thinking) --- Reflection process --- Reflective thinking --- Thinking, Critical --- Thinking, Reflective --- Thought and thinking --- Reflective learning --- Study and teaching (Secondary) --- Study and teaching (Secondary)&delete& --- Computer network resources --- Aardrijkskunde. Geografie --- Internet in education. --- Computer network resources. --- Evaluative thinking --- Internet research.
Choose an application
Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer RBAC in a networked environment and how to integrate it with existing infrastructure.
Computers --- Computer security. --- Computer networks --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer security --- Access control. --- Protection --- Security measures --- 005.8 --- 681.3 *C2 --- 681.3*D46 --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection --- Access control --- Data sovereignty --- Computers - Access control. --- Computer networks - Access control.
Listing 1 - 10 of 22 | << page >> |
Sort by
|