intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Network environment

Xem 1-20 trên 726 kết quả Network environment
  • Part 1 of ebook "Software engineering, artificial intelligence, networking and parallel/distributed computing 2011" includes the following main contents: analysis of ISSP environment II survey data using variable clustering; polar transformation system for offline handwritten character recognition; examining QoS guarantees for real-time CBR services in broadband wireless access networks; sin and sigmoid higher order neural networks for data simulations and predictions; a proposal of mouth shapes sequence code for Japanese pronunciation;...

    pdf90p khuynhlinhnguyet1009 05-04-2024 1 1   Download

  • Part 1 of ebook "Optimization of logistics and supply chain systems: Theory and practice" includes the following main contents: Chapter 1 - The optimization concept; Chapter 2 - Typical base optimization problems; Chapter 3 - Algorithms; Chapter 4 - Reducing the Kullback-Leibler distance, the cross-entropy method for optimization; Chapter 5 - Logistics systems and optimization strategies under uncertain operational environment; Chapter 6 - Transportation network design by heuristic methods;...

    pdf184p khuynhlinhnguyet1009 05-04-2024 3 3   Download

  • This article focuses on researching the development of a monitoring and control system for various environmental parameters based on the Internet of Things (IoT) to assist farmers in increasing crop yield in tea nurseries in certain areas of Thai Nguyen province.

    pdf10p gaupanda024 04-04-2024 1 1   Download

  • This book covers most of the major areas of information security and the open source tools you can use to help secure them. The chapters are designed around the major disciplines of information security and key concepts are covered in each chapter. The tools included on the book’s CD-ROM allow for a lab-like environment that everyone can participate in. All you need is a PC and this book’s CD-ROM to start using the tools described herein.

    pdf600p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Penetration tester’s: Open source toolkit – Part 2 includes contents: Chapter 7 writing open source security tools, chapter 8 nessus, chapter 9 coding for nessus, chapter 10 NASL extensions and custom tests, chapter 11 understanding the extended capabilities of the nessus environment, chapter 12 extending metasploit I, chapter 13 extending metasploit II.

    pdf348p longtimenosee05 31-03-2024 0 0   Download

  • This paper proposes an evaluation approach for the supply chain network design problems under uncertainty. Existing approaches to this problem are either the deterministic environments or can only address a modest number of scenarios for the uncertain problem parameters. Our solution approach integrates both features; the collective evaluation and the selection of one.

    pdf14p longtimenosee07 29-03-2024 1 1   Download

  • This research contributes to academic literature in the area of supply chain network optimization, involving parameters and restrictions of Brazilian operation scenario. Besides, it contributes to the professional corporative environment, with a new perspective of how a supply chain network can be constructed for a company that operates in a scenario with inventory capacity and supplier restrictions.

    pdf11p longtimenosee07 29-03-2024 2 2   Download

  • Ebook "Plant tissue culture engineering" signals a turning point: the recognition that this specialized field of plant science must be integrated with engineering principles in order to develop efficient, cost effective, and large scale applications of these technologies. I am most impressed with the organization of this volume, and the extensive list of chapters contributed by expert authors from around the world who are leading the emergence of this interdisciplinary enterprise.

    pdf469p cotieubac1004 15-03-2024 0 0   Download

  • Ebook "E-cell system: Basic concepts and applications" is to provide a comprehensive guide for the E‑Cell System version 3 in terms of the software features and its usage. While the publicly available E‑Cell Simulation Environment version 3 User's Manual provides the technical details of model building and scripting, it does not describe some of the underlying concepts of the E‑Cell System. The first part of the book addresses this issue by providing the basic concepts of modeling and simulation with the E‑Cell System.

    pdf185p cotieubac1004 15-03-2024 0 0   Download

  • Ebook AVVID & IP Telephony: Design & Implementation - Part 2 includes content: Chapter 6 DSPs explained, chapter 7 AVVID applications, chapter 8 advanced QoS for AVVID environments, chapter 9 AVVID dial plans, chapter 10 designing and implementing single site solutions, chapter 11 designing and implementing multisite solutions.

    pdf334p longtimenosee03 22-02-2024 5 2   Download

  • Ebook Firewalls and internet security (Second edition): Part 2 includes content: Chapter 9 kinds of firewalls, chapter 10 filtering services, chapter 11 firewall engineering, chapter 12 tunneling and VPNs, chapter 13 network layout, chapter 14 safe hosts in a hostile environment, chapter 15 intrusion detection, chapter 16 an evening with berferd, chapter 17 the taking of clark, chapter 18 secure communications over insecure networks, chapter 19 where do we go from here?, appendix a an introduction to cryptography, appendix b keeping up.

    pdf263p longtimenosee03 22-02-2024 3 2   Download

  • Ebook Network programming with windows sockets: Part 2 includes content: Chapter 9 design goals, chapter 10 CWinSock, chapter 11 CDatagramSocket, chapter 12 CStreamSocket, chapter 13 bringing it all together, chapter 14 sample applications using the class library, chapter 15 practical client/server database application, chapter 16 finger application in a heterogeneous UNIX Environment.

    pdf139p longtimenosee03 22-02-2024 1 1   Download

  • Ebook Wireless Data Demystified (2003) Part 1 includes content: Chapter 1 wireless data network fundamentals, chapter 2 wireless data network protocols, chapter 3 services and applications over wireless data networks, chapter 4 wireless data marketing environment, chapter 5 standards for next-generation high-speed wireless data connectivity, chapter 6 planning and designing wireless data and satellite applications, chapter 7 architecting wireless data mobility design, chapter 8 fixed wireless data network design, chapter 9 wireless data access design, chapter 10 designing for IP ( TIMIP) de...

    pdf341p longtimenosee03 22-02-2024 3 2   Download

  • This book is about the latest topics in home networking, such as the use cases, various networking technologies, security, service discovery, media formats and description, media distribution, security, digital rights management, and the role of sensor technologies in the home environment. Because each topic can easily expand into a book of its own and it is difficult to have in-depth knowledge in all of these domains, we chose to invite the various experts in the fields to contribute their thoughts.

    pdf239p longtimenosee03 22-02-2024 2 2   Download

  • The first aim of this document is to present how buffer overflows work and may compromise a system or a network security, and to focus on some existing protection solutions. Finally, we will try to point out the most interesting sets to secure an environment, and compare them on criteria such as efficiency or performance loss.

    pdf102p haojiubujain010 14-12-2023 0 0   Download

  • Linux utilities cookbook includes contents: Chapter 1, Using the Terminal / Command Line, covers how to get the most out of the Linux command line. Chapter 2, The Desktop, introduces some of the desktop environments available for Linux. Chapter 3, Files and Directories, explains files, directories, and how to manage them. Chapter 4, Networking and the Internet, covers connectivity and how to fix it when it goes down. Chapter 5, Permissions, Access, and Security, gives a brief overview of Linux security features. Chapter 6, Processes, explains how to manage processes in Linux.

    pdf224p haojiubujain010 14-12-2023 5 3   Download

  • This document serves as an implementation guide for Voice over IP (VoIP) networks based on Cisco AVVID (Architecture for Voice, Video and Integrated Data). The goal of this document is to provide a blueprint for implementing the end-to-end Quality of Service (QoS) that is required for successful deployment of Cisco AVVID solutions in today’s enterprise environment. This document cannot examine all the possible QoS configurations available for all Cisco AVVID products.

    pdf242p haojiubujain09 30-11-2023 6 4   Download

  • Cisco routers are the standard devices used to connect companies to the Internet. They are highly reliable and robust, and support anything from small connections to huge circuits used by telephone companies. Cisco Routers for the Desperate is a brief, meaty introduction to Cisco routers that will make a competent systems administrator comfortable with the Cisco environment, teach them how to troubleshoot problems, and take them through the basic tasks of router maintenance and integration into an existing network.

    pdf145p haojiubujain09 30-11-2023 6 4   Download

  • Ebook "Transnational corporations and international law: Accountability in the global business environment" provides a comprehensive overview of existing laws and principles aimed at regulating the international behaviour of transnational corporations (TNCs). Alice de Jonge highlights the inadequacies and possibilities inherent in the current regulatory network and also outlines a theoretical framework for bringing TNCs more comprehensively under the coverage of internationally-agreed standards of behaviour.

    pdf256p tuongnhuoclan 28-11-2023 4 2   Download

  • Continued part 1, part 2 of ebook "Test of professional competence in management accounting" provides readers with contents including: researching the industry for background knowledge; developing an answer to the TOPCIMA requirement; writing the introduction to your report;...

    pdf272p mocthanhdao0210 19-11-2023 7 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2