Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Access
  • 1
    Online Resource
    Online Resource
    Amsterdam ; : Newnes,
    UID:
    almafu_9959238253302883
    Format: 1 online resource (597 p.)
    ISBN: 9786611049362 , 9781281049360 , 1281049360 , 9780080477176 , 0080477178
    Series Statement: Embedded technology series
    Content: Embedded internet and internet appliances are the focus of great attention in the computing industry, as they are seen as the future of computing. The design of such devices presents many technical challenges. This book is the first guide available that describes how to design internet access and communications capabilities into embedded systems. It takes an integrated hardware/software approach using the Java programming language and industry-standard microcontrollers. Numerous illustrations and code examples enliven the text. This book shows how to build various sensors and control devices t
    Note: Description based upon print version of record. , Front Cover; Designing Embedded Internet Devices; Copyright Page; Acknowledgments; Dedication; Contents; What's on the CD-ROM?; Chapter 1. Introduction; Why should you read this book?; What this book will do for you; How this book is laid out; How to get the most out of this book; What you should already know; Chapter 2. Computer Networks; A really simple network; A small office and home network; Connecting a LAN to the Internet (or a LAN, MAN, WAN); The 10/100 Base- T cable; Ethernet address; Internet addresses; Domain names; Network classes; Subnetworks; DHCP; Protocols; Client/server , Chapter 3. Java Essentials for Embedded Networked DevicesFor Windows; For Linux; For Windows; For Linux; Classes, objects, methods, constructors; OOP diagrams; Inheritance; Errors, exceptions, and exception handling; Network Programming; Threads; Serial ports; Chapter 4. Overview of Embedded Networked Devices; Chapter 5. Getting Started with TINI; The TINI SIMM; The socket board; Get your TINI running; For Windows; Windows 95/98; Windows 2000, Windows NT, Windows XP; Linux; Running JavaKit; Your first TINI program; Windows; Linux; Hardware; First 1-Wire program , Compile from Windows, run from WindowsCompile from Windows, run from TINI; Compile from Linux, run from Linux; Compile from Linux, run from TINI; Chapter 6. The TINI Hardware; Versions; A high-level look at TINI; The SIMM (Single Inline Memory Module) edge connector; The processor and oscillator module; The RAM nonvolatizer; The CPU Reset circuitry; The internal 1-Wire net; The external 1-Wire I/O, or iButton interface; The RS232 interface; The real-time clock; Programming example: using the real-time clock; The Ethernet controller; The I2C interface; The CAN interface , What's in an E20 socket board?The E20 in greater detail; Vinculum Technologies Group; Systronix; Additional products and vendors; Making a custom TINI socket; Chapter 7. The TINI Software; Terminal; Starting slush; Slush commands; Slush files and environment; Tips for your programs; TINIConvertor; BuildDependency; A TINI example; Modifying slush; Utilities; GNUmake; Linux; Windows; JEdit; TiniHttpServer; TiniInstaller; TINIAnt; Chapter 8. Enhancing TINI; Adding data bus buffer; The address decoder; Adding an LCD display; Adding buttons; Adding a keypad; Add an LED display , Chapter 9. TINI Serial and Parallel I/OA few serial port details; TINI serial ports; Serial communication software (API); A serial example; A parting word on serial ports; TINI parallel ports; Parallel communication software (API); A simple parallel device example; Another example; Other ways of handling parallel I/O; Chapter 10. Wire Basics for TINI; Wire Reset Details; Wire Data Communication Details; The Read ROM command; The Search ROM command; Match ROM; Skip ROM; Memory commands; DS2405 Addressable Switch ROM commands; The DS2405 Match ROM command; The DS2405 Search ROM command , DS1920 ROM commands , English
    Additional Edition: ISBN 9781878707987
    Additional Edition: ISBN 1878707981
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV040615951
    Format: 1 Online-Ressource (2 CD-ROMs) , sd., col , 1 guide (59 p. : col. ill. ; 28 cm) , 4 3/4 in.
    ISBN: 0821373544 , 9780821373545
    Series Statement: WBI learning resources series
    Note: Title from opening screen of power point version , Erscheinungsjahr in Vorlageform:c2008 , . - System requirements: Intel, Pentium 4, Intel Centrino, Intel Xeon, Intel Core Duo (or compatible) processor; Microsoft Windows XP with service pack 2, Windows Vista Home Premium, Business, Enterprise, or Ultimate (certified for 32-bit editions; 512MB of RAM or more recommended; RealOne Player (basic player) required for video features; Macromedia Flash Player (version 8.0 or higher) required for multimedia features; Web browser; 1024 x 768 minimum monitor resolution with 16-bit or greater video card; CD-ROM drive
    Additional Edition: Reproduktion von Approaches to urban slums 2008
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 0-8213-7354-4
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-0-8213-7354-5
    Language: English
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almafu_9961077987902883
    Format: 1 online resource (175 unnumbered pages) : , illustrations.
    Series Statement: NIST special publication. 800-69
    Note: Title from page [1] (viewed May 8, 2007). , "Sponsored by the Department of Homeland Security"--cover. , "September 2006."
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Burlington, MA :Syngress Publishing,
    UID:
    almafu_9960072240602883
    Format: 1 online resource (601 p.)
    Edition: 1st edition
    ISBN: 9786611189266 , 9781281189264 , 128118926X , 9780080558721 , 0080558720
    Content: Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-e
    Note: Includes index. , Front Cover; Microsoft Forefront Security Administration Guide; Copyright Page; Technical Editor; Contributing Authors; Contents; Chapter 1: Introduction to Microsoft Forefront Security Suite; Introduction; Components of the Microsoft Forefront Security Suite; Forefront Security for Clients; Client Security Features; Forefront Security for Exchange Server; Forefront Security for SharePoint Server; ISA Server 2006; Intelligent Application Gateway (IAG) 2007; Benefits of Using the Microsoft Forefront Suite; Solutions Fast Track; Frequently Asked Questions , Chapter 2: Forefront Security for Microsoft Windows ClientsIntroduction; How to Use Microsoft Forefront Client Security; Configuring and Installing; Management Server; Collection Server; Reporting Server; Distribution Server; Installing FCS Server Software; Forefront Client Security Console; Creating and Deploying Policies; Creating a Policy; Deploying a Policy; Installing Client Software Agent; Home; Checking for Updates; Scan; Quick Scan; Full Scan; Custom Scan; FCS Kernel Mode Minifilter; History; Tools; Options; Microsoft SpyNet; Software Explorer; Quarantined Items , Microsoft Forefront Security Client Web SiteHelp; Checking for Client Version, Engine Version, Antivirus and Antispyware Definitions; Forefront Client Security Agent in Action; Troubleshooting Microsoft Forefront Client Security; Backup Folder; Event Viewer, System Log; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: Deploying Windows Server Update Services to Forefront Clients; Introduction; Using Windows Software Update Services; WSUS 3.0 Deployment Topologies; Configuring and Installing WSUS; Quiet and Unattended Installations; WSUS 3.0 Interactive Setup , Configuring Group Policy for WSUS UpdatesTCP Port 8530; Client Requirements for WSUS: 2000 Service Pack 3, XP Service Pack 1; Checking for Updates (Check for Updates Now); Navigating the WSUS Console; Update Services; Server Node; Updates; Updates Subnodes; Approve; Decline; Change an Approval or Decline; Revision History; Reports; Update Reports; Computer Reports; Synchronization Reports; Computers; Computer Groups; Options; Update Source and Proxy Server; Products and Classifications; Update Files and Languages; Synchronization Schedule; Automatic Approvals; Computers; Server Cleanup Wizard , Reporting RollupE-mail Notifications; Microsoft Update Improvement Program; Personalization; WSUS Server Configuration Wizard; Troubleshooting WSUS; WSUS Health Checks; Group Policy; Computer Groups; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4: Observing and Maintaining Microsoft Forefront Clients; Introduction; Using the Microsoft Forefront Client Security Management Console; Dashboard; Reporting Critical Issues; Reporting No Issues; Not Reporting; Computers per Issue; Summary Reports; Policy Management; Creating a New Policy; Protection Tab; Advanced Tab , Overrides Tab , English
    Additional Edition: ISBN 9781597492447
    Additional Edition: ISBN 1597492442
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almafu_9959235458102883
    Format: 1 online resource (321 p.)
    Edition: 1st edition
    ISBN: 9786611071868 , 9781281071866 , 1281071862 , 9780080505893 , 0080505899 , 9781597491594 , 1597491594
    Content: Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Securit
    Note: Includes index. , Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch? , How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security , IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing , Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources . , Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index , English
    Additional Edition: ISBN 9781597491143
    Additional Edition: ISBN 1597491144
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Book
    Book
    München/Germany :Markt-und-Technik-Verl.,
    UID:
    almahu_BV013993134
    Format: 341 S. : Ill. : 24 cm.
    ISBN: 3-8272-6103-1
    Series Statement: M + T easy
    Language: German
    Subjects: Computer Science
    RVK:
    Keywords: Windows XP Home Edition
    Author information: Born, Günter, 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    b3kat_BV024709644
    Format: 1023 S. , Ill. , 1 CD-ROM (12 cm)
    Edition: 2. Aufl.
    ISBN: 3827263670
    Series Statement: Kompendium
    Language: German
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Windows XP Home Edition
    Author information: Monadjemi, Peter 1961-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    b3kat_BV035821808
    Format: 744 S. , Ill., graph. Darst. , CD-ROM (12 cm)
    ISBN: 9783772373763
    Note: Systemvoraussetzungen der CD-ROM-Beil.: Windows XP/Vista/Windows 7, Intel Pentium IV oder vergleichbar, 512 MB RAM (unter Vista 1 GB RAM empfohlen), SVGA-Grafik, ca. 350 MB freier Festplattenspeicher, Internetzugang für Antivirus-Update und kostenlose Downloads erforderlich
    Language: German
    Subjects: Computer Science
    RVK:
    Keywords: Windows 7
    Author information: Immler, Christian 1964-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    München :Markt-und-Technik-Verl.,
    UID:
    almahu_BV014188149
    Format: 768 S. : Ill. , CD-ROM (12 cm)
    ISBN: 3-8272-6157-0
    Series Statement: M + T magnum
    Note: Auf CD-ROM: Tools und Utilities zu Windows XP, Internet-Programmsammlung, aktuelle Virenscanner
    Language: German
    Subjects: Computer Science
    RVK:
    Keywords: Windows XP Home Edition
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_BV014037908
    Format: 126 S. : Ill.
    ISBN: 3-8272-6224-0
    Language: German
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Windows XP Home Edition
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages