Stöbern Sie durch unsere Angebote

dBase lebt ! Band 2
€ 19.80 *
ggf. zzgl. Versand

dBASE Programmierung unter Windows. Für dBASE Plus und seine Vorgänger dBASE SE, dBASE 2000 und Visual dBASE. Das Buch: Vermittelt Ihnen alles, was Sie zum leichten Einstieg mit dBASE unter Windows brauchen. Unabhängig von Ihren Vorkenntnissen. Für alle Anwender der aktuellen Windows-Versionen von dBASE. Auch für dBASE-Neulinge und DOS-Umsteiger sehr empfohlen. Der Inhalt: Mit Designern arbeiten, Projekte verwalten, BDE-Administrator und Debugger. Ansprechende Formulare und Menüs gestalten. Profi-Programmierung mit Prozeduren, Variablen und Makros. dBASE-Objekte, EXE-Programme erstellen, die Runtime u.v.a. Die Reihe: Das Buch ist Teil einer neuen Reihe zu dBASE unter Windows. Jeder Band hat seine Schwerpunkte und vermittelt fundiertes Wissen zu ausgewählten Themen. KnowHow für Ihre Praxis, sofort umsetzbare Beispiele und jede Menge Insider-Tricks, verpackt in verständliche Erklärungen und Lösungswege. Der Autor: Ist EDV-Profi und arbeitet seit Jahren mit dBASE unter Windows. Als Inhaber einer Software-Firma und freiberuflicher Autor kann er verzwickte Details verständlich erklären. Seine dBASE-Bücher schreibt er nach dem Motto ´´aus der Praxis, für die Praxis´´. Alle Beispielprogramme auch per Internet-Download erhältlich!

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Public Marketing. Public Innovation.
€ 24.00 *
ggf. zzgl. Versand

Standortvermarktung war bis vor der letzten Jahrtausendwende aus Ressourcengründen vornehmlich grösseren Standorten vorenthalten. Die Erkenntnis, den eigenen Standort im umkämpften Wettbewerb gut zu positionieren und zu vermarkten, ist mittlerweile auch bei kleineren Regionen und Gemeinden angelangt. Die Vermarktungsmechanismen für kleinere Standorte sind jedoch im Gegensatz zu jenen von Metropolitan-Regionen oder Nationen unterschiedlich. Unternehmen evaluieren heute nach anderen Gesichtspunkten neue Standorte, als sie dies noch vor zehn oder zwanzig Jahren taten. Die rasante Verbreitung des Internets und die damit verbundenen Applikationen tun ein weiteres dazu, dass sich die Kommunikationsregeln innerhalb der letzten Jahre verändert haben. Dazu kommt der Innovationsdruck im öffentlichen Umfeld. Innovationen sind ein noch stark vernachlässigtes Feld in der zeitgemässen Standortvermarktung, denn über Produkt-, Dienstleistungs- oder Prozessinnovationen lassen sich Standorte besser und klarer im Wettbewerb positionieren. Der vorliegende Praxisleitfaden vermittelt wertvolle Tipps, wie Regionen und Gemeinden heute ein gelungenes Standortmarketing aufbauen und betreiben können. Ein besonderes Augenmerk wird dabei auf den Einsatz von elektronischen und sozialen Medien gelegt. Zu guter Letzt wird ausführlich beschrieben, wie sich Standorte über einen kreativen Innovationsprozess Wettbewerbsvorteile erarbeiten können.

Anbieter: buecher.de
Stand: Dec 14, 2018
Zum Angebot
Computer Security
€ 57.99 *
ggf. zzgl. Versand

A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing security systems and what makes them different from one another. * Unravels the complex topic of computer security and breaks it down in such a way as to serve as an ideal introduction for beginners in the field of computer security * Examines the foundations of computer security and its basic principles * Addresses username and password, password protection, single sign-on, and more * Discusses operating system integrity, hardware security features, and memory * Covers Unix security, Windows security, database security, network security, web security, and software security Packed with in-depth coverage, this resource spares no details when it comes to the critical topic of computer security.

Anbieter: buecher.de
Stand: Dec 14, 2018
Zum Angebot
Linux Basics for Hackers
€ 22.99 *
ggf. zzgl. Versand

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you´re getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you´ll learn the basics of using the Linux operating system and acquire the tools and techniques you´ll need to take control of a Linux environment. First, you´ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you´ll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You´ll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Anbieter: buecher.de
Stand: Dec 14, 2018
Zum Angebot
Recommender Systems
€ 54.99 *
ggf. zzgl. Versand

This book comprehensively covers the topic of recommender systems, which provide personalized recommendations of products or services to users based on their previous searches or purchases. Recommender system methods have been adapted to diverse applications including query log mining, social networking, news recommendations, and computational advertising. This book synthesizes both fundamental and advanced topics of a research area that has now reached maturity. The chapters of this book are organized into three categories: Algorithms and evaluation: These chapters discuss the fundamental algorithms in recommender systems, including collaborative filtering methods, content-based methods, knowledge-based methods, ensemble-based methods, and evaluation. Recommendations in specific domains and contexts: the context of a recommendation can be viewed as important side information that affects the recommendation goals. Different types of context such as temporal data, spatial data, social data, tagging data, and trustworthiness are explored. Advanced topics and applications: Various robustness aspects of recommender systems, such as shilling systems, attack models, and their defenses are discussed. In addition, recent topics, such as learning to rank, multi-armed bandits, group systems, multi-criteria systems, and active learning systems, are introduced together with applications. Although this book primarily serves as a textbook, it will also appeal to industrial practitioners and researchers due to its focus on applications and references. Numerous examples and exercises have been provided, and a solution manual is available for instructors.

Anbieter: buecher.de
Stand: Dec 14, 2018
Zum Angebot
Diseño de un Servicio de Asistencia a Diabético...
€ 28.99 *
ggf. zzgl. Versand

El monitoreo constante a los pacientes diabéticos demuestra ser una herramienta valiosa en el control de esta condición tanto a nivel individual como poblacional. Este proyecto propone el diseño de un servicio que utilice de teléfonos inteligentes. Mediante este servicio de asistencia se reportará el monitoreo de los pacientes, permitiendo comunicación directa con su especialista, mantenerse informados acerca e sus progresos y conocer próximos pasos recomendados. Se seguirá el esquema del instrumento PYME del Horizonte 2020 y un modelo de entrega evolutiva. Apoyados en este servicio, se espera que asociaciones, entes gubernamentales y prestadores de salud mejoren su capacidad de atención, sus políticas acerca de ésta población y por ende las condiciones del paciente en su dia a dia.

Anbieter: buecher.de
Stand: Dec 14, 2018
Zum Angebot
Jelektronnoe zdravoohranie dlya jeffektivnogo z...
€ 62.99 *
ggf. zzgl. Versand

Kniga posvyashhena sistemnoj cifrovizacii zdravoohraneniya. Ispol´zovanie sovremennyh informacionnyh sistem pozvolyaet povysit´ kachestvo okazaniya medicinskih uslug, racionalizirovat´ upravlenie razlichnymi strukturami v zdravoohranenii i sformirovat´ mezhdunarodnogo urovnya infrastrukturu dlya jeffektivnogo zdorov´esberezheniya. Razrabotka i implementaciya innovacionnyh magisterskih programm pozvolit obespechit´ jeffektivnuju cifrovuju transformaciju sfery zdravoohraneniya.

Anbieter: buecher.de
Stand: Dec 14, 2018
Zum Angebot
Metodología para la evaluación de la seguridad ...
€ 57.99 *
ggf. zzgl. Versand

Las plataformas virtuales, que son un claro ejemplo de aplicaciones web han traído grandes beneficios para las organizaciones y específicamente para las entidades educativas, facilitado muchos procesos que requiere de trabajo en línea, lo que la ha convertido en una fortaleza para las empresas que la adquieren pero que también está siendo vulnerada su seguridad presentado grandes dificultades que no garantizan el buen uso de este sistema. Por tanto, lo que se busca con este proyecto y con la utilización de guías, normas, organizaciones internacionales y estándares, es diseñar una metodología que evalúe la seguridad de la información en el Ambiente virtual de Aprendizaje Moodle y que permita a los usuarios realizar sus diferentes actividades con la plena tranquilidad de que la información que allí se maneja, tanto en su ingreso, proceso, almacenamiento como en su salida esté segura, siendo ésta una estrategia que permitirá garantizar un nivel de seguridad aceptable en las plataformas virtuales y de la información que se maneja a nivel institucional.

Anbieter: buecher.de
Stand: Dec 14, 2018
Zum Angebot
IT Security Risk Control Management
€ 36.99 *
ggf. zzgl. Versand

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes. Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. What You Will Learn: Build a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constantly changing threats Prepare for and pass such common audits as PCI-DSS, SSAE-16, and ISO 27001 Calibrate the scope, and customize security controls to fit into an organization´s culture Implement the most challenging processes, pointing out common pitfalls and distractions Frame security and risk issues to be clear and actionable so that decision makers, technical personnel, and users will listen and value your advice Who This Book Is For: IT professionals moving into the security field; new security managers, directors, project heads, and would-be CISOs; and security specialists from other disciplines moving into information security (e.g., former military security professionals, law enforcement professionals, and physical security professionals)

Anbieter: buecher.de
Stand: Dec 14, 2018
Zum Angebot
Compartmentalization of Wheat Cultivars by Empl...
€ 43.99 *
ggf. zzgl. Versand

Machine learning methods majorly comprise image processing and soft computing methods and are mainly responsible for automation. Wheat production is influenced by assorted varying factors. A basic requisite for best production is the seed. Sorting or grading of agricultural products influenced by computer varies product wise and even product variety wise which changes region wise. Grading for new varieties released by the agricultural scientist is the major concerned as new varieties are produced by crossing existing varieties and for these proven optimized machine learning algorithms may give an adverse result. This book highlights various applications of image processing in agriculture and introduces a machine learning algorithm capable of classifying major 5 wheat cultivars (TRITICUM - DURUM: GDW 1255 (released in 2013 by ICAR) & TRITICUM - AESTVIUM: GW 273, GW 322, GW 496 & LOK 1) cultivated in Gujarat region. Experimental data consist of 11 traits comprised of shape, color & morphological characteristics. After applying feature selection algorithm,5 traits were considered & LM backpropagation was used to classify above wheat cultivars which ensued to more than 90.0% accuracy.

Anbieter: buecher.de
Stand: Dec 14, 2018
Zum Angebot