Listing 1 - 10 of 48 | << page >> |
Sort by
|
Choose an application
Computer architecture. Operating systems --- 681.3 *C2 --- 681.3*D44 --- 681.324 --- Internet (e-mail, website) --- Computer communication networks: data communications; OSI; security and protection --- Communications management: buffering; input/output; message sending; network communication; terminal management (Operating systems)--See also {?681.3*C2} --- 681.3*D44 Communications management: buffering; input/output; message sending; network communication; terminal management (Operating systems)--See also {?681.3*C2} --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection
Choose an application
In designing a network device, you make dozens of decisions that affect the speed with which it will perform-sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles-ranging from the commonly recognized to the groundbreaking-that are key to breaking t
681.3*C2 --- Computer communication networks: data communications; OSI; security and protection --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer network protocols --- Protocols, Computer network --- Computer networks --- 681.3 *C2 --- Information Technology --- General and Others --- Computer network protocols. --- Computer networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
As more and more equipment is interface or'bus' driven, either by the use of controllers or directly from PCs, the question of which bus to use is becoming increasingly important both in industry and in the office. 'Computer Busses' has been designed to help choose the best type of bus for the particular application.There are several books which cover individual busses, but none which provide a complete guide to computer busses. The author provides a basic theory of busses and draws examples and applications from real bus case studies. Busses are analysed using from a top-down approach
Microcomputers --- Computer interfaces. --- Micro-ordinateurs --- Ordinateurs --- Buses --- Bus --- Interfaces --- -Computer interfaces --- 681.3 *C2 --- Interfaces, Computer --- Computer input-output equipment --- Interface circuits --- Home computers --- Micro computers --- Micros (Microcomputers) --- PCs (Microcomputers) --- Personal computers --- Small computers --- Minicomputers --- Computer communication networks: data communications; OSI; security and protection --- Computer interfaces --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Microcomputers -- Buses. --- Buses.
Choose an application
leerboeken --- Frans --- Schoolbooks - Didactic material --- Diplôme d'études en langue française. --- Francés --- French language --- French language. --- Enseñanza --- Estudiantes extranjeros. --- Gramática. --- Libros de conversación y de frases. --- Examinations, questions, etc. --- Grammar --- Textbooks for foreing speakers. --- Niveau C1 --- Niveau C2 --- Mondelinge taalvaardigheid --- Schriftelijke taalvaardigheid --- Begrijpend lezen --- Begrijpend luisteren --- Niveau C1 (Europees referentieniveau) --- Niveau C2 (Europees referentieniveau)
Choose an application
The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. GMPLS: Architecture and Applications brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively.This book begins by defining GMPLS's place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on
Internet --- Computer networks --- Telecommunication --- Management --- Traffic --- 681.3*C2 <043> --- Computer communication networks: data communications; OSI; security and protection--Dissertaties --- 681.3*C2 <043> Computer communication networks: data communications; OSI; security and protection--Dissertaties --- Internet. --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Management. --- Computer networks - Management --- Telecommunication - Traffic - Management
Choose an application
The SSCP Study Guide and DVD Training System is a unique and comprehensive combination of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation. These components will give the student 100% coverage of all (ISC)2 official exam objectives and realistic exam simulation.The SSCP Study Guide and DVD Training System consists of:1.SSCP Study Guide The 1,000,000 readers who have read previous Syngress Study Guides will find many familiar features in the Study Guide along with many new enhancements including:·Exercises: There will be frequent use of st
681.3 *C2 --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection --- Computer security. --- Computer science. --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
It's no secret that well-executed exhibits in libraries and museums can make attendance numbers skyrocket. Dynamic exhibits not only provide information and entertainment for your existing customers, but they are also opportunities to reach out to new customers and to widen your market. A great exhibit can be the hook that brings people in the door for the first time. Creating a Winning Online Exhibition will help you to do just that—conceive, design, and execute a compelling online exhibition. Different than a digital collection, an online exhibition is a selective presentation of objects org
Libraries --- -Library exhibits --- -Library Web sites --- -Web sites --- -025.17 --- 069.01 --- 681.3*C2 --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection --- 069.01 Museologie --- Museologie --- 025.17 Bibliotheekbeheer: speciale collecties --- Bibliotheekbeheer: speciale collecties --- Pages, Web --- Sites, Web --- Web pages --- Websites --- World Wide Web pages --- World Wide Web sites --- WWW pages --- WWW sites --- Computer network resources --- Web sites --- Web librarianship --- Displays, Library --- Library displays --- Exhibitions --- Books --- Documentation --- Public institutions --- Librarians --- Public relations --- Design --- History --- Library exhibits --- Library Web sites --- 025.17 --- 681.3 *C2
Choose an application
In the design of a neural network, either for biological modeling, cognitive simulation, numerical computation or engineering applications, it is important to investigate the network's computational performance which is usually described by the long-term behaviors, called dynamics, of the model equations. The purpose of this book is to give an introduction to the mathematical modeling and analysis of networks of neurons from the viewpoint of dynamical systems.
Neural networks (Neurobiology) --- Mathematical models. --- 681.3*C1 --- 681.3 *C2 --- 681.3*C1 Processor architectures (Computer systems organization) --- Processor architectures (Computer systems organization) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection --- Biological neural networks --- Nets, Neural (Neurobiology) --- Networks, Neural (Neurobiology) --- Neural nets (Neurobiology) --- Cognitive neuroscience --- Neurobiology --- Neural circuitry --- Mathematical models --- Neurobiology. --- Neurosciences
Choose an application
Firewalls (Computer security) --- Computer networks --- Internet --- Netwerken --- 681.3*C2m --- 681.3*C2 --- -Internet --- 681.324 --- Firewalls --- Internetbeveiliging --- 005.8 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer firewalls --- Internet firewalls --- Intranet firewalls --- Computer communication networks: data communications; OSI; security and protection --- Security measures --- Security measures. --- Distributed processing --- Computernetwerken: beveiliging --- Internet: beveiliging --- Computernetwerken: beveiliging. --- Firewalls. --- Internet: beveiliging. --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- 681.3*C2m Computer communication networks: data communications; OSI; security and protection --- Firewalls (Computer security). --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- 681.3 *C2
Choose an application
In dit werk maakt Evelyn Vandervieren een studie van de gebruiksvriendelijkheid van websites, in het bijzonder websites die legale muziekdownloads aanbieden aan Belgische klanten. Ze zoekt aan de hand van een zelf ontwikkeld meetinstrument uit wat het succes verklaart van sommige websites. Het boek is bedoelt voor wie beroepshalve bezig is met aan- en verkoop via websites, lesgevers en studenten en al wie zijn website wil optimaliseren om zo een hoger rendement te halen.
Websites. --- websites --- Music --- Computer architecture. Operating systems --- webdesign --- e-commerce --- meten --- digitale muziek --- Web sites --- Evaluation --- Electronic commerce --- Case studies --- PXL-Media & Tourism 2014 --- internetcommunicatie --- internetsites --- kwaliteitscontrole --- #SBIB:309H1713 --- websiteanalyse --- klantvriendelijkheid --- media --- marketing --- Mediatechnologie: nieuwe toepassingen (abonnee-televisie, electronic mail, desk top publishing, virtuele realiteit...) --- Websites --- Internet --- Muziek --- Grafische vormgeving --- Gebruikersonderzoeken --- Zoekmachineoptimalisatie --- SEO --- Website --- Gebruikersonderzoek --- Afrika --- Compositie (muziek) --- 681.3 *C2 --- 34:681.3 --- 34:681.3 Informaticarecht --- Informaticarecht --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection
Listing 1 - 10 of 48 | << page >> |
Sort by
|