Artboard 33 Artboard 16 Artboard 18 Artboard 15 Artboard 21 Artboard 1 Artboard 2 Artboard 5 Artboard 45 Artboard 45 Artboard 22 Artboard 9 Artboard 23 Artboard 17? Artboard 28 Artboard 43 Artboard 49 Artboard 47 Artboard 38 Artboard 32 Artboard 8 Artboard 22 Artboard 5 Artboard 25 Artboard 1 Artboard 42 Artboard 11 Artboard 41 Artboard 13 Artboard 23 Artboard 10 Artboard 4 Artboard 9 Artboard 20 Artboard 6 Artboard 11 Artboard 7 Artboard 3 Artboard 3 Artboard 12 Artboard 25 Artboard 34 Artboard 39 Artboard 24 Artboard 13 Artboard 19 Artboard 7 Artboard 24 Artboard 31 Artboard 4 Artboard 14 Artboard 27 Artboard 30 Artboard 36 Artboard 44 Artboard 12 Artboard 17 Artboard 17 Artboard 6 Artboard 27 Artboard 19 Artboard 30 Artboard 29 Artboard 29 Artboard 26 Artboard 18 Artboard 2 Artboard 20 Artboard 35 Artboard 15 Artboard 14 Artboard 48 Artboard 50 Artboard 26 Artboard 16 Artboard 40 Artboard 21 Artboard 29 Artboard 10 Artboard 37 Artboard 3 Artboard 3 Artboard 46 Artboard 8

Redes

Refinar por
672 produtos
  • Addison-Wesley Professional Computing...

    Fall,Kevin R; Stevens,W Richard
    (9242048)

    For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable. ' Vint Cerf, Internet pioneer ' ' TCP/IP Illustrated, Volume 1,...

  • Web Analytics 2.0 - The Art of Online...

    Kaushik,Avinash
    (9206822)

    Adeptly address today's business challenges with this powerful new book from web analytics thought leader Avinash Kaushik. 'Web Analytics 2.0' presents a new framework that will permanently change how you think about analytics. It provides specific...

    sob encomenda
  • Cissp Isc2 Certified Information Systems...

    Chapple, Mike; Gibson, Darril; Stewart,James M
    (9206785)

    CISSP Study Guide - fully updated for the 2015 CISSP Body of Knowledge 'CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, ''7th Edition' has been completely updated for the latest 2015 CISSP Body of Knowledge....

    sob encomenda
  • Data Mining: Practical Machine Learning Tools...

    Frank,Eibe; Witten, Ian; Hall, Mark
    (3050621)

    Data Mining: Practical Machine Learning Tools and Techniques offers a thorough grounding in machine learning concepts as well as practical advice on applying machine learning tools and techniques in real-world data mining situations. This highly...

    sob encomenda
  • Theoretical Mechanics of Biological Neural...

    Macgregor, Ronald
    (3051195)

    Theoretical Mechanics of Biological Neural Networks presents an extensive and coherent discusson and formulation of the generation and integration of neuroelectric signals in single neurons. The approach relates computer simulation programs for...

    sob encomenda
  • The Speed of Trust - The One Thing That...

    Covey, Stephen R.; Merrill, Rebecca R.
    (1576956)

    In the readable and riveting style of The Tipping Point, Stephen M. R. Covey uncovers the overlooked and underestimated power of trust in a page-turning look into what he calls 'the one thing that changes everything.' A groundbreaking and...

    sob encomenda
  • The Internet Edge - Social, Technical, And...

    Stefik, Mark J
    (9921784)

    This book is an eagle's eye view of the Internet edge. It is about the experiences of those who encountered similar issues as they built precursors to the Net such as videotext, teletext, and the Source.Sometimes when we face change, we feel...

    sob encomenda
  • Spam - A Shadow History Of The Internet

    Brunton, Finn
    (9922584)

    What spam is, how it works, and how it has shaped online communities and the Internet itself.The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend...

    sob encomenda
  • A Prehistory Of The Cloud

    Hu, Tung-Hui
    (9921867)

    The militarized legacy of the digital cloud: how the cloud grew out of older network technologies and politics.We may imagine the digital cloud as placeless, mute, ethereal, and unmediated. Yet the reality of the cloud is embodied in thousands of...

    sob encomenda
  • Opening Standards - The Global Politics Of...

    DeNardis, Laura
    (9922547)

    The economic and political stakes in the current heated debates over 'openness' and open standards in the Internet's architecture.Openness is not a given on the Internet. Technical standards--the underlying architecture that enables interoperability...

    sob encomenda
  • Perceptrons - An Introduction To...

    Minsky, Marvin
    (9921863)

    The first systematic study of parallelism in computation by two pioneers in the field.Reissue of the 1988 Expanded Edition with a new foreword by Leon BottouIn 1969, ten years after the discovery of the perceptron -- which showed that a machine could...

    sob encomenda
  • Protocol Politics - The Globalization Of...

    DeNardis, Laura
    (9922530)

    What are the global implications of the looming shortage of Internet addresses and the slow deployment of the new IPv6 protocol designed to solve this problem?The Internet has reached a critical point. The world is running out of Internet addresses....

    sob encomenda
  • Circuit Complexity And Neural Networks

    Parberry, Ian
    (9922306)

    Neural networks usually work adequately on small problems but can run into trouble when they are scaled up to problems involving large amounts of input data. Circuit Complexity and Neural Networks addresses the important question of how well neural...

    sob encomenda
  • Inventing The Internet

    Abbate, Janet
    (9921862)

    Janet Abbate recounts the key players and technologies that allowed the Internet to develop; but her main focus is always on the social and cultural factors that influenced the Internet's design and use.Since the late 1960s the Internet has grown...

    sob encomenda
  • Cloud Computing For Machine Learning And...

    Hwang, Kai
    (9922317)

    The first textbook to teach students how to build data analytic solutions on large data sets using cloud-based technologies.This is the first textbook to teach students how to build data analytic solutions on large data sets (specifically in Internet...

    sob encomenda
  • Internet Alley - High Technology In Tysons...

    Ceruzzi, Paul E
    (9921940)

    How government military contractors and high-tech firms transformed an unincorporated suburban crossroads into the center of the world's Internet management and governance.Much of the world's Internet management and governance takes place in a...

    sob encomenda
  • Regulating The Cloud - Policy For Computing...

    Yoo, Christopher S
    (9921941)

    The emergence of the cloud as infrastructure: experts from a range of disciplines consider policy issues including reliability, privacy, consumer protection, national security, and copyright.The emergence of cloud computing marks the moment when...

    sob encomenda
  • Malware Forensics

    "malin,Cameron; Casey, Eoghan; Aquilina, Jam
    (3053642)

    Malware Forensics: Investigating and Analyzing Malicious Codecovers the emerging and evolving field of &quot

    sob encomenda
  • Head First Networking

    Anderson,Al; Benedetti,Ryan
    (2697367)

    Head First Networking

    sob encomenda
  • Search Engine Optimization Seo - An Hour A...

    Grappone, Jennifer; Couzin, Gradiva
    (9206965)

    The third edition of the bestselling guide to do-it-yourself SEO Getting seen on the first page of search engine result pages is crucial for businesses and online marketers. Search engine optimization helps improve Web site rankings, and it is often...

    sob encomenda
  • Practical Reverse Engineering - X86, X64, Arm...

    Dang, Bruce; Gazet, Alexandre; Bachaalany, Elias
    (9396835)

    Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse...

    sob encomenda
  • Ethical Hacker Essentials

    Oriyano, Sean-Philip
    (9207462)

    Becoming a professional penetration tester (or pen tester or ethical hacker) can be a major step forward in an IT security career. But before one can get the most well known professional certification for ethical hackers, you need foundational...

    sob encomenda
  • Redes e Sistemas de Telecomunicacoes

    Sá,Rui
    (3060374)

    Redes e Sistemas de Telecomunicacoes

    sob encomenda
  • Ospf - Anatomy Of An Internet Routing...

    Moy,John T
    (9244603)

    This work examines the topic of routing, and provides detailed coverage of the routing protocol, OSPF (Open Shortest Path First) which was developed by the author. Part One defines Internet routing in general and discusses a variety of protocols in...

    sob encomenda
  • Mastering Microsoft Exchange Server 2016

    Elfassy, David
    (9206977)

    A bestselling Exchange Server guide, updated for the 2016 release 'Mastering Microsoft Exchange Server 2016' is the gold-standard reference for system administrators and first-time users alike. Fully updated to align with the latest release, this...

    sob encomenda
  • Landing Page Optimization - The Definitive...

    Ash; Ash,Tim; Page,Richard C; Ginty, Maura; Page, Rich
    (9206927)

    A fully updated guide to making your landing pages profitableEffective Internet marketing requires that you test and optimize your landing pages to maximize exposure and conversion rate. This second edition of a bestselling guide to landing page...

    sob encomenda
  • Building Neural Networks

    Skapura,David M; Gordon,Peter S
    (9245313)

    Neural network theory can be learned with relative ease, yet learning to apply the technology successfully can be a slow, trial-and-error process. In this study, the connectionist model is taught using numerous examples that show how people have...

    sob encomenda
  • Group Policy - Fundamentals Security and the...

    Moskowitz, Jeremy
    (9208106)

    Get up to speed on the latest Group Policy tools, features, and best practices 'Group Policy,' 'Fundamentals, Security, and the Managed Desktop, 3rd Edition' help's' you streamline Windows and Windows Server management using the latest Group Policy...

    sob encomenda
  • Foundations Of Modern Networking - SDN, NFV,...

    Stallings, William
    (9244430)

    'Foundations of Modern Networking 'is a comprehensive, unified survey of modern networking technology and applications for today s professionals, managers, and students. Dr. William Stallings offers clear and well-organized coverage of five key...

    sob encomenda
  • Developer's Library - Programming In Python 3...

    Summerfield, Mark
    (9244452)

    A Fully Revised Edition Featuring New Material on Coroutines, Debugging, Testing, Parsing, String Formatting, and More Python 3 is the best version of the language yet: It is more powerful, convenient, consistent, and expressive than ever before. Now...

    sob encomenda
  • Architecting The Cloud - Design Decisions For...

    Kavis,Michael J
    (9235100)

    An expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a...

    sob encomenda
  • Mastering System Center 2012 R2 Configuration...

    Martinez, Santos; Daalmans, Peter; Bennett, Brett
    (9206817)

    Invaluable coverage on all aspects of System Center 2012 R2 Configuration Manager Completely updated for System Center 2012 R2 Configuration Manager, this comprehensive book provides intermediate and advanced coverage of all aspects of the product,...

    sob encomenda
  • Social Engineering - The Art Of Human Hacking

    Hadnagy, Christopher
    (9396860)

    Social Engineering: The Art of Human Hacking From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind...

    sob encomenda
  • Linkers And Loaders

    LEVINE
    (525026)

    Whatever your programming language, whatever your platform, you probably tap into linker and loader functions all the time. But do you know how to use them to their greatest possible advantage? Only now, with the publication of Linkers & Loaders, is...

    sob encomenda
  • Data Mining: Concepts And Techniques

    Kamber,Micheline; Han,Jiawei; Pei,Jian
    (3050976)

    Data Mining: Concepts and Techniques provides the concepts and techniques in processing gathered data or information, which will be used in various applications. Specifically, it explains data mining and the tools used in discovering knowledge from...

    sob encomenda
  • Segurança em Redes Informáticas 3ª Ed. 2010

    Zúquete,André
    (2887014)

    Este livro alerta para os problemas de segurança que podem advir da ligação de uma máquina ou rede local à Internet e explica de que forma os problemas podem ser minimizados ou evitados. Ajuda também os gestores das máquinas ou redes locais a saberem...

  • Even Faster Web Sites

    Souders,Steve
    (2697382)

    Even Faster Web Sites

    sob encomenda
  • Domine a 110% Outlook Xp e 2000

    Silva,Ricardo
    (3066936)

    Com esta obra, o leitor pode desenvolver os seus conhecimentos, dominando em pouco tempo o Outlook, uma aplicação de correio electrónico, com mais de 23 milhões de utilizadores em todo o mundo.Através de uma linguagem simples e acessível, acompanhada...

  • Google Analytics Integrations

    Waisberg, Daniel
    (9206797)

    A roadmap for turning Google Analytics into a centralized marketing analysis platform With 'Google Analytics Integrations,' expert author Daniel Waisberg shows you how to gain a more meaningful, complete view of customers that can drive growth...

    sob encomenda
  • Ethical Hacking And Web Hacking Handbook And...

    Oriyano, Sean-Philip; Stuttard,Dafydd; Pinto,Marcus
    (9238992)

    CEHv8: Certified Ethical Hacker Version 8 Study Guide by Sean–Philip Oriyano is the book you need when you're ready to tackle this challenging exam. Security professionals remain in high demand. The Certified Ethical Hacker is a one–of–a–kind...

    sob encomenda
  • Dreamweaver Cc Digital Classroom

    ; Osborn,Jeremy; Agi Creative Team; Arguin,Mike; Arguin, Michael; Heald,Creg; Heald, Greg
    (9220489)

    Learn Adobe Dreamweaver CC with this full-color book and DVD training package You may be eager to learn how to use Adobe Dreamweaver CC (Creative Cloud) to create great websites, but you'd like to tackle it at your own speed. If so, this book-and-DVD...

    sob encomenda
  • Mastering Hyper-V 2012 R2 With System Center...

    Savill, John
    (9206895)

    This book will help you understand the capabilities of Microsoft Hyper-V, architect a Hyper-V solution for your datacenter, plan a deployment/migration, and then manage it all using native tools and System Center. Coverage also includes hybrid cloud...

    sob encomenda
  • Soa - Principles of Service Design

    Erl,Thomas
    (2072977)

    This book’s in-depth coverage includes - Over 240 full-color illustrations; A concise introduction to SOA and service-oriented computing concepts and benefits; A thorough exploration of the service-orientation design paradigm as represented by eight...

  • Cabling - The Complete Guide To Copper And...

    Woodward, Bill; Oliviero, Andrew
    (9206894)

    Develop the skills you need to design and build a reliable, cost-effective cabling infrastructure Fully updated for the growing demand of fiber optics for large-scale communications networks and telecommunication standards, this new edition is...

    sob encomenda
Busca por