ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

You have 0 saved results.
Mark results and click the "Add To Watchlist" link in order to add them to this list.
feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (64)
  • 2010-2014  (64)
  • Computer Science  (64)
Collection
Source
Language
Years
Year
  • 1
    Unknown
    Bonn : Galileo Press
    Keywords: LINUX ; UNIX ; SHELL ; Systemprogrammierung
    Description / Table of Contents: Dieses umfassende Handbuch bietet Ihnen nahezu vollständiges Linux-Wissen. Es erklärt, wie man Linux als leistungsstarke Workstation nutzen kann und widmet sich ausführlich professionelleren Themen wie Administration des Systems, Shell, Netzwerkkonfiguration und Sicherheit. Das Buch ist geeignet für Nutzer aller gängigen Linux-Distributionen. Die beiliegenden Multiboot-DVDs enthalten eine große Auswahl an Linux-Systemen. Das Buch ist konsequent praxisnah geschrieben, immer verständlich und sehr gründlich in der Behandlung aller Themen. Diese 5. Auflage wurde umfassend aktualisiert und verbessert. Sowohl Einsteiger als auch Profis werden von diesem kompetenten Handbuch profitieren.
    Pages: Online-Ressource (1282 Seiten)
    Edition: 5., akt. Aufl.
    ISBN: 9783836218221
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Unknown
    Bonn : Galileo Press
    Keywords: Visual Basic ; Visual Basic 2010 ; Visual Studio ; Objektorientierte Programmierung ; OOP ; C# ; .NET
    Description / Table of Contents: Wenn Sie ein Buch suchen, dass Ihnen bei allen Fragen der C#-Entwicklung zuverlässig mit Rat und Tat zur Seite steht, dann ist unser bewährtes Kompendium genau das Richtige für Sie. Mittlerweile in der 5. Auflage erschienen, dient es ambitionierten Ein- und Umsteigern durch seine strukturierte Vorgehensweise und die zahlreichen Anwendungsbeispiele als praxisorientierte Einführung; Fortgeschrittene und Profis unterstützt es als Nachschlagewerk optimal bei ihrer täglichen Arbeit. In den ersten Kapiteln werden zunächst die Grundlagen von C#, .NET und der objektorientierten Programmierung vermittelt. Es folgen Kapitel zur effizienten Entwicklung mit Visual Studio 2010, zur Fehlerbehandlung sowie zu fortgeschrittenen C#-Themen wie LINQ, Multithreading, Serialisierung u.v.m. Den größten Themenblock bildet die Entwicklung von grafischen Benutzeroberflächen. Neben einer fundierten Einführung in die WPF und XAML erfahren Sie hier alles Notwendige, um auch komplexe Anwendungen zu gestalten. Anschließend wird die Datenbankprogrammierung mit ADO.NET ausführlich behandelt und zu guter Letzt die Weitergabe von .NET-Anwendungen thematisiert. So sind Sie für Ihren Arbeitsalltag bestens gerüstet!
    Pages: Online-Ressource (1295 Seiten)
    Edition: 5., akt. und erw. Aufl.
    ISBN: 9783836215527
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Description / Table of Contents: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Pages: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer science ; Computer communication systems ; Data mining ; User interfaces (Computer systems) ; Artificial intelligence ; Pattern recognition ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Pattern Recognition ; Computer Communication Networks
    Description / Table of Contents: Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied originates from one domain.   The focus of this book, and the BISON project from which the contributions originate, is a network-based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of seeking well-defined global or local patterns, the aim was to find domain-bridging associations. These are particularly interesting if they are sparse and have not been encountered before.   The 32 contributions presented in this state-of-the-art survey, together with a detailed introduction to the book, are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.  
    Pages: Online-Ressource (X, 486 pages) , 146 illustrations
    ISBN: 9783642318306
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Unknown
    Bonn : Galileo Press
    Keywords: Windows Server 2012 R2 ; Hyper-V ; Active Directory ; Remotedesktopdienste ; Webserver IIS ; Netzwerkprotokolle ; Kerberos-Authentifizierung
    Description / Table of Contents: Das lösungsorientierte und umfassende Buch zum Windows Server 2012 R2 mit zahlreichen fundierten Hintergrundinformationen. Der Autor Ulrich B. Boddenberg greift bei der Beschreibung des Servers auf seine praktischen Erfahrungen in zahlreichen Projekten bei mittleren und großen Kunden zurück. Denn ein modernes Betriebssystem wie Windows Server 2012 R2 bietet weit mehr als nur die Möglichkeit, Programme auszuführen. Er beschreibt alle zentralen Technologien wie die Virtualisierung mit Hyper-V V3, Active Directory, Remotedesktopdienste, den Webserver IIS sowie SharePoint. Neben diesen konkreten Technologien geht es auch um Grundlagen wie Netzwerkprotokolle, Kerberos-Authentifizierung oder die eingesetzte Hardware. Zentrale Aspekte wie Performance, Verfügbarkeit und Sicherheit ziehen sich durch das gesamte Buch.
    Pages: Online-Ressource (1392 Seiten)
    Edition: 4., akt. Aufl.
    ISBN: 9783836220132
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Visual Basic 2012 ; .NET
    Description / Table of Contents: Sie möchten das Programmieren mit Visual Basic lernen? Dann führt Sie dieses Buch schnell und sicher zum Ziel. Anhand anschaulicher und leicht nachvollziehbarer Beispiele werden alle wichtigen Themen erläutert: Grundlagen zu Variablen, Operatoren, Schleifen und Co., objektorientierte Programmierung, Fehlerbehandlung, Erstellen von Datenbank- und Internetanwendungen. Auch in die Entwicklung von GUIs mit der Windows Presentation Foundation und von Windows Store Apps für Windows 8 werden Sie eingeführt. Ausführliche Schritt-für-Schritt-Anleitungen und regelmäßige Zusammenfassungen sichern Ihren Lernerfolg. Ihr neu gewonnenes Wissen können Sie an einer Vielzahl von Übungsaufgaben unter Beweis stellen und an Musterlösungen überprüfen. So werden Sie schon bald selbstständig eigene Windows-Programme entwickeln.
    Pages: Online-Ressource (579 Seiten)
    Edition: 3., akt. und erw. Aufl.
    ISBN: 9783836219594
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Computer science ; Computer communication systems ; Data mining ; User interfaces (Computer systems) ; Artificial intelligence ; Pattern recognition ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Pattern Recognition ; Computer Communication Networks
    Description / Table of Contents: Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied originates from one domain.   The focus of this book, and the BISON project from which the contributions originate, is a network-based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of seeking well-defined global or local patterns, the aim was to find domain-bridging associations. These are particularly interesting if they are sparse and have not been encountered before.   The 32 contributions presented in this state-of-the-art survey, together with a detailed introduction to the book, are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.  
    Pages: Online-Ressource (X, 486 pages) , 146 illustrations
    ISBN: 9783642318306
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...