Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Operating systems (Computers) --- informatica --- operating systems --- microsoft --- Windows --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Operating systems --- Systèmes d'exploitation (ordinateurs) --- software --- Systèmes d'exploitation (ordinateurs)
Choose an application
Programming --- MS OS/2 (Computer operating system) --- Operating systems (Computers) --- Systèmes d'exploitation (Ordinateurs) --- 519.68 --- 681.3*D40 --- 681.3.066 --- Besturingssystemen --- OS/2 --- Computer programming --- Operating systems: general --- 681.3*D40 Operating systems: general --- 519.68 Computer programming --- Systèmes d'exploitation (Ordinateurs)
Choose an application
Minix --- OS (operating system) --- Computer architecture. Operating systems --- Operating systems (Computers) --- Systèmes d'exploitation (Ordinateurs) --- MINIX. --- Operating systems --- Besturingssystemen --- operating systems --- 681.3*D4 --- Operating systems--See also {681.3*C} --- Operating systems (Computers). --- 681.3*D4 Operating systems--See also {681.3*C} --- Systèmes d'exploitation (Ordinateurs) --- Computer operating systems --- Computers --- Disk operating systems --- Systems software
Choose an application
Operating System Concepts 7/e, the best-selling introduction in the market, continues to provide a solid theoretical foundation for understanding operating systems. The seventh edition has been updated to offer coverage of the most current topics and applications, improved conceptual coverage and additional content to bridge the gap between concepts and actual implementations. The new two-color design allows for easier navigation and motivation. New exercises, lab projects and review questions help to further reinforce important concepts.
Programming --- Computer architecture. Operating systems --- Operating systems (Computers) --- Systèmes d'exploitation (Ordinateurs) --- Operating systems --- Besturingssystemen --- operating systems --- procesmanagement --- beveiliging --- 681.3*D4 --- Operating systems--See also {681.3*C} --- 681.3*D4 Operating systems--See also {681.3*C} --- Systèmes d'exploitation (Ordinateurs) --- Computer operating systems --- Computers --- Disk operating systems --- Systems software
Choose an application
Besturingssystemen (Computers) --- Micro-ordinateur -- Stations de travail --- Microcomputer -- Werkstations --- Microcomputer workstations --- Operating systems (Computers) --- Systèmes d'exploitation (Ordinateurs) --- Microcomputer workstations. --- Postes de travail (Bureautique) --- Microsoft Windows NT. --- AA / International- internationaal --- 654 --- 681.3.066 --- Windows NT --- Informatieverwerking. Bureautica. --- Systèmes d'exploitation (Ordinateurs) --- Computer operating systems --- Computers --- Disk operating systems --- Microprocessor-based workstations --- Personal computer workstations --- Work stations (Electronic office machines) --- Work stations, Microcomputer --- Workstations, Microcomputer --- Workstations, Microprocessor-based --- Informatieverwerking. Bureautica --- Operating systems --- Microsoft Windows NT workstation --- Windows 2000 --- Systems software --- Microcomputers --- Daytona (Computer file)
Choose an application
Operating systems (Computers) --- Systèmes d'exploitation (Ordinateurs) --- 681.3*C --- 681.3*D4 --- 681.3.066 --- Operating systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer systems organization: hardware/software interfaces; instruction set design; system architectures; systems specification methodology --- Operating systems--See also {681.3*C} --- 681.3*D4 Operating systems--See also {681.3*C} --- 681.3*C Computer systems organization: hardware/software interfaces; instruction set design; system architectures; systems specification methodology --- Computer architecture. Operating systems --- Systèmes d'exploitation (Ordinateurs)
Choose an application
Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall
Computer networks --- Electronic data processing personnel --- Microsoft software --- Examinations --- Certification. --- Information Technology --- General and Others --- Books with accompanying CDROM. --- Computer security. --- Data protection. --- Internet --- Electronic information resources --- Hackers. --- Operating systems (Computers) --- Sécurité informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Sources d'information électroniques --- Pirates informatiques --- Systèmes d'exploitation (Ordinateurs) --- Security measures. --- Access control. --- Sécurité --- Mesures --- Accès --- Contrôle --- Linux. --- Computer networks. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Mobile computing. --- Internet searching. --- PalmPilot (Computer) --- Pocket computers --- Palm (Computer) --- Searching the Internet --- Web searching --- World Wide Web searching --- Electronic information resource searching --- Electronic data processing --- Context-aware computing --- Portable computers --- Programming. --- Palm OS. --- Palm operating system --- Microsoft Windows server. --- Microsoft Windows (Computer file)
Choose an application
“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies many of the risks of running Linux hosts and applications and provides practical examples and methods to minimize those risks. The book is written for Linux/UNIX administrators who do not necessarily have in-depth knowledge of security but need to know how to secure their networks.
Linux device drivers (Computer programs) --- Computer security. --- Operating systems (Computers) --- Software maintenance. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer program maintenance --- Computer programs --- Computer software --- Maintenance, Software --- Software revision --- Computer programming --- Software reengineering --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Device drivers (Computer programs) --- Maintenance --- Operating systems --- Protection --- Security measures --- Open source software. --- Computer programming. --- Software engineering. --- Open Source. --- Software Engineering/Programming and Operating Systems. --- Computer software engineering --- Engineering --- Electronic computer programming --- Electronic data processing --- Programming (Electronic computers) --- Coding theory --- Free software (Open source software) --- Open code software --- Opensource software --- Programming --- Software maintenance --- Linux, Pilotes de périphérique pour (logiciels) --- Réseaux d'ordinateurs --- Logiciels --- Systèmes d'exploitation (ordinateurs) --- Mesures de sûreté --- Linux, Pilotes de périphérique pour (logiciels) --- Réseaux d'ordinateurs --- Systèmes d'exploitation (ordinateurs) --- Mesures de sûreté
Choose an application
Teacher education seeks to transform prospective and/or practicing teachers from neophyte possibly uncritical perspectives on teaching and learning to more knowledgeable, adaptable, analytic, insightful, observant, resourceful, reflective and confident professionals ready to address whatever challenges teaching secondary mathematics presents. This transformation occurs optimally through constructive engagement in tasks that foster knowledge for teaching secondary mathematics. Ideally such tasks provide a bridge between theory and practice, and challenge, surprise, disturb, confront, extend, or provoke examination of alternatives, drawn from the context of teaching. We define tasks as the problems or activities that, having been developed, evaluated and refined over time, are posed to teacher education participants. Such participants are expected to engage in these tasks collaboratively, energetically, and intellectually with an open mind and an orientation to future practice. The tasks might be similar to those used by classroom teachers (e.g., the analysis of a graphing problem) or idiosyncratic to teacher education (e.g., critique of videotaped practice). This edited volume includes chapters based around unifying themes of tasks used in secondary mathematics teacher education. These themes reflect goals for mathematics teacher education, and are closely related to various aspects of knowledge required for teaching secondary mathematics. They are not based on the conventional content topics of teacher education (e.g., decimals, grouping practices), but on broad goals such as adaptability, identifying similarities, productive disposition, overcoming barriers, micro simulations, choosing tools, and study of practice. This approach is innovative and appeals both to prominent authors and to our target audiences. This book may inspire researchers who engage in the study of design principles and characteristics of productive tasks for secondary mathematics teacher education.
Teacher education. Teacher's profession --- Didactics of mathematics --- didactiek --- wiskunde --- lerarenopleiding --- lesgeven --- Systèmes d'exploitation (ordinateurs) --- Mathematics—Study and teaching . --- Teaching. --- Mathematics Education. --- Teaching and Teacher Education. --- #ZR ////// ZAIREES RECHT ////// --- 681.3*D45 --- 681.3*D46 --- 681.3*D48 --- 681.3*H24 --- 681.3*H24 Systems: concurrency; distributed systems; query processing; transaction processing (Database management) --- Systems: concurrency; distributed systems; query processing; transaction processing (Database management) --- 681.3*D48 Performance: measurements; modeling and prediction; monitors; operational analysis; queuing theory; simulation; stochastic analysis (Operating systems)--See also {?681.3*C2}; {681.3*D28}; {681.3*I6} --- Performance: measurements; modeling and prediction; monitors; operational analysis; queuing theory; simulation; stochastic analysis (Operating systems)--See also {?681.3*C2}; {681.3*D28}; {681.3*I6} --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D45 Reliability: backup procedures; checkpoint/restart; fault-tolerance; verification (Operating systems) --- Reliability: backup procedures; checkpoint/restart; fault-tolerance; verification (Operating systems) --- Didactics --- Instruction --- Pedagogy --- School teaching --- Schoolteaching --- Education --- Instructional systems --- Pedagogical content knowledge --- Training --- Mathematics teachers --- Mathematics --- Training of. --- Study and teaching (Secondary)
Listing 1 - 9 of 9 |
Sort by
|