As design continues to impact our products, services, and solutions at scale, it is more important than ever to understand the systems and context that surround design decisions.
Xiskya Valladares ofrece en este libro una serie de prácticas que cualquier institución católica podría tener en cuenta para mejorar su presencia y su testimonio de fe en Twitter, orientadas a transmitir información (aprovechando las ventajas y estilos propios de esta red sin rebajar por ello la función evangelizadora), a promover iniciativas (crowdsourding, cadenas de oración.
Learn, prepare, and practice for CompTIA Network+ N10-009 exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
La religiosa Xiskya Valladares ofrece en este libro una serie de prácticas que cualquier institución católica podría tener en cuenta para mejorar su presencia y testimonio de fe en Facebook, la red social con más católicos del mundo, con el objetivo de compartir algunos trucos, sugerencias y conocimientos que ayuden a las organizaciones y grupos católicos en su misión evangelizadora en esta red social a trasmitir información, promover iniciativas y a conversar y crear comunidad entre los seguidores.
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security.
This book examines the implications of new communication technologies in the light of the most recent work in social and cultural theory and argues that new developments in electronic media, such as the Internet and Virtual Reality, justify the designation of a "e;second media age"e;.
The global shift toward delivering services online requires organizations to evolve from using traditional paper files and storage to more modern electronic methods.
This book provides a comprehensive theory of mono- and multi-fractal traffic, including the basics of long-range dependent time series and 1/f noise, ergodicity and predictability of traffic, traffic modeling and simulation, stationarity tests of traffic, traffic measurement and the anomaly detection of traffic in communications networks.
This book provides a comprehensive theory of mono- and multi-fractal traffic, including the basics of long-range dependent time series and 1/f noise, ergodicity and predictability of traffic, traffic modeling and simulation, stationarity tests of traffic, traffic measurement and the anomaly detection of traffic in communications networks.
As Internet traffic continues to grow exponentially, there is a great need to build Internet protocol (IP) routers with high-speed and high-capacity packet networking capabilities.
Programming Massively Parallel Processors: A Hands-on Approach, Third Edition shows both student and professional alike the basic concepts of parallel programming and GPU architecture, exploring, in detail, various techniques for constructing parallel programs.
IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition, supports the Cisco Networking Academy IT Essentials: PC Hardware and Software version 5 course.
Practical design and performance solutions for every ad hoc wireless network Ad Hoc Wireless Networks comprise mobile devices that use wireless transmission for communication.
Recent advances in VoIP (Voice over IP) technology have made it the solution of choice for voice service because of its low cost and increased reliability.
TCP/IP Illustrated, an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite.
This volume constitutes the refereed proceedings of the 10th International Conference on Multimedia Communications, Services and Security, MCSS 2020, held in Krakow, Poland, in October 2020.
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security.
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
The book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2022), organized by GITAM School of Technology, Bangalore, India, during 3-4 February 2022.
This essential guide covers all aspects of Linux system administration, from user maintenance, backups, filesystem housekeeping, storage management, and network setup to hardware and software troubleshooting and some application management.
This book constitutes the refereed proceedings of the 7th International Conference on E-Democracy, E-Democracy 2017, held in Athens, Greece, in December 2017.
Efficiently manage and administer enterprise environments using Microsoft Windows Server 2019Key FeaturesLeverage Windows Server 2019 to improve enterprise workflow efficiency and increase productivityDeliver enterprise-grade cloud services that can be applied in your infrastructureGet up and running with PowerShell and the all-new Hyper-V improvementsBook DescriptionDo you want to get up and running with essential administrative tasks in Windows Server 2019?
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
This two-volume set LNCS 12861 and LNCS 12862 constitutes the refereed proceedings of the 16th International Work-Conference on Artificial Neural Networks, IWANN 2021, held virtually, in June 2021.
This book constitutes thoroughly reviewed, revised and selected papers from the 4th International Conference on Human Centered Computing, HCC 2018, held in Merida, Mexico, in December 2018.