search results

  1. Widmann Widmann Kolczyki Wiszące Kule Disco

  2. Guirca Guirca Nakładki Na Nogi Disco Kwadraty

  3. Widmann Widmann Nakładki Na Buty Disco Żółte

  4. Widmann Widmann Czapka Narciarza Disco Jasnoniebieska

  5. Threats to Euro-Atlantic Security

    This edited volume discusses current Euro-Atlantic security issues, examining a wide range of areas including cyber threats, arms control, relations between key countries, existing conflicts and potential future flash points. It looks at both the key security challenges and responses that could be developed to mitigate these. The editor brings together perspectives from a wide range of authors from policy and academia who are part of the Younger Generation Leaders Network on Euro-Atlantic Security. This book offers a fresh perspective to these important issues from high-profile next generation leaders.

    Legimi.pl

  6. Agnex Agnex Żurawina Cięta Suszona 300G

  7. Widmann Widmann Strój Dres Disco-Xl

  8. Widmann Widmann Strój Disco Garnitur-S

  9. Widmann Widmann Zielony Pasek Neonowy Disco

  10. Blockchain Technology in Internet of Things

    <div> This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems.&#xa0; </div> <div> <br> </div> <div> The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends. </div> <div> <br> </div> <div> IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions.&#xa0; </div> <div> <br> </div> <div> This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource. </div>

    Legimi.pl

  11. Nanga Nanga Stewia Liść Cięty 100G

  12. Nanga Nanga Sarsaparilla Korzeń Cięty 250G

  13. Empik Naturalne masło do ciała Citrono

  14. Empik Miniatura liścia monstera z kijem

  15. Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018)

    <p>This book presents the proceedings of the International Conference on Computer Networks, Big Data and IoT (ICCBI-2018), held on December 19–20, 2018 in Madurai, India.</p> <p>In recent years, advances in information and communication technologies [ICT] have collectively aimed to streamline the evolution of internet applications. In this context, increasing the ubiquity of emerging internet applications with an enhanced capability to communicate in a distributed environment has become a major need for existing networking models and applications. To achieve this, Internet of Things [IoT] models have been developed to facilitate a smart interconnection and information exchange among modern objects – which plays an essential role in every aspect of our lives. Due to their pervasive nature, computer networks and IoT can easily connect and engage effectively with their network users. This vast network continuously generates data from heterogeneous devices, creating a need to utilize big data, which provides new and unprecedented opportunities to process these huge volumes of data. This International Conference on Computer Networks, Big Data, and Internet of Things [ICCBI] brings together state-of-the-art research work, which briefly describes advanced IoT applications in the era of big data. As such, it offers valuable insights for researchers and scientists involved in developing next-generation, big-data-driven IoT applications to address the real-world challenges in building a smartly connected environment.</p> <p>&#xa0;</p> <p> </p> <p>&#xa0;</p> <p></p>

    Legimi.pl

  16. Widmann Widmann Czapka Narciarza Disco Czerwona

  17. Widmann Widmann Zestaw Disco Czarno-Srebrny

  18. Guirca Guirca Kapelusz Żółty Neonowy Disco

  19. Lucze Lucze Ogon Wieprzowy Cięty 1Kg

  20. Edible Insects in the Food Sector

    <p>This book explores one of the most discussed and investigated novel foods in recent years: edible insects. The increasing demand for alternative protein sources worldwide had led the Food and Agriculture Organization of the United Nations (FAO) to promote the potential of using insects both for feed and food, establishing a program called “Edible Insects.” Although several social, environmental, and nutritional benefits of the use of insects in the human diet have been identified, the majority of the population in Western countries rejects the idea of adopting insects as food, predominantly for cultural reasons.</p> <p>Nevertheless, international interest in promoting the consumption of insects has grown significantly, mainly in North America and Europe. This trend is mostly due to increasing attention and involvement from the scientific network and the food and feed industries, as well as governments and their constituents.</p> The book explores the current state of entomophagy and identifies knowledge gaps to inform primary research institutions, students, members of the private sector, and policymakers to better plan, develop, and implement future research studies on edible insects as a sustainable source of food. The case studies and issues presented in this book cover highly up-to-date topics such as aspects of safety and allergies for human consumption, final meat quality of animals fed with insects, the legislative framework for the commercialization of this novel food, and other relevant issues. <p></p> <p></p>

    Legimi.pl

  21. Smiffy's Smiffy's Giga Okulary Disco Fever

  22. Widmann Widmann Zestaw Disco Kolorowe Łezki

  23. Widmann Widmann Zestaw Disco Koła Vintage

  24. Widmann Widmann Cekinowa Czapka W Panterkę Disco

  25. Practical Cyber Forensics

    <div> <div> Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to network forensics, where you cover the various tools available to make your network forensics process less complicated. Following this, you will work with cloud and mobile forensic techniques by considering the concept of forensics as a service (FaSS), giving you cutting-edge skills that will future-proof your career. </div> <div> <br> </div> <div> Building on this, you will learn the process of breaking down malware attacks, web attacks, and email scams with case studies to give you a clearer view of the techniques to be followed. Another tricky technique is SSD forensics, so the author covers this in detail to give you the alternative analysis techniques you’ll need. To keep you up to speed on contemporary forensics, <i>Practical Cyber Forensics</i> includes a chapter on Bitcoin forensics, where key crypto-currency forensic techniques will be shared. Finally, you will see how to prepare accurate investigative reports.&#xa0; </div> <div> <br> </div> <div> <b>What You Will Learn</b> </div> <div> <ul> <li>Carry out forensic investigation on Windows, Linux, and macOS systems<br></li> <li>Detect and counter anti-forensic techniques&#xa0;<br></li> <li>Deploy network, cloud, and mobile forensics<br></li> <li>Investigate web and malware attacks<br></li> <li>Write efficient investigative reports<br></li> </ul> </div> <div> <b><br></b> </div> <div> <b>Who This Book Is For</b> </div> <div> <br> </div> <div> Intermediate infosec professionals looking for a practical approach to investigative cyber forensics techniques.&#xa0; </div> <div> <br> </div> </div>

    Legimi.pl

  26. Widmann Widmann Szary Kapelusz Ciemno Gangstera

  27. Guirca Guirca Nakładki Na Nogi Disco Romby

  28. The Components of Sustainable Development

    <p>This book focuses on the application of sustainable development principles through consultation with, and partnerships between commerce and the community. Offering international perspectives, the authors show that the issues are global and that we can best arrive at solutions through a synthesis of these various perspectives. The book also examines changes to corporate and institutional behavior and discusses the extent to which the focus has changed, making it necessary to consider new approaches to our understanding of sustainability and differing effects in practice.</p> <p>This approach is based on the tradition of the Social Responsibility Research Network, which in its 17-year history has sought to broaden the discourse and to treat all research as inter-related and relevant to business. This book consists of the best contributions from the 17th International Conference on Corporate Social Responsibility and 8th Organisational Governance Conference, held in Bangalore, India in September 2018</p> <div> <br> </div> <p><br></p>

    Legimi.pl

  29. K3 K3 Strój Rolerka Disco-116

  30. Zarządzanie sieciami komputerowymi w programie Packet Tracer - Wiadomości podstawowe

    <p>Książka: &bdquo;ZARZĄDZANIE SIECIAMI KOMPUTEROWYMI W PROGRAMIE PACKET TRACER - Wiadomości podstawowe&rdquo; zawiera porady dla os&oacute;b chcących poznać działanie sieci oraz większości sprzętu, kt&oacute;re tworzy wsp&oacute;łczesną architekturę sieciową. Użytkownicy początkujący dowiedzą się w jaki spos&oacute;b pobrać oprogramowanie, jak dobierać, łączyć i konfigurować r&oacute;żne urządzenia oraz w jaki spos&oacute;b analizować ich działanie.<br /><br />Czytelnik znajdzie także podstawy konfigurowania usług sieciowych takich jak TELNET, SSH, FTP, EMAIL, DHCP, DNS oraz protokoł&oacute;w RIP, EIGRP, OSPF i sieci wirtualnych VLAN. Autorzy opisując zagadnienia administrowania sieciami komputerowymi, posługują się wieloma przykładami i ćwiczeniami.<br />Książka jest kompilacją poprzednich publikacji naszego Wydawnictwa z serii Packet Tracer dla kurs&oacute;w CISCO, posiada zaktualizowany interfejs obecnie najnowszego oprogramowania Packet Tracer oraz zawiera zestaw nowych przykład&oacute;w i ćwiczeń.<br /><br />Autorzy tej książki to zesp&oacute;ł międzypokoleniowy i interdyscyplinarny. Utalentowany uczeń Zespołu Szk&oacute;ł Łączności w Gdańsku, Damian Strojek. Jego pasją są sieci komputerowe, posiada komplet certyfikat&oacute;w CCNA R&amp;S oraz jest w trakcie ścieżki dydaktycznej CCNA Security. Jerzy Kluczewski, długoletni instruktor Akademii CISCO CCNA. W swoim dorobku autorskim posiada już kilka publikacji książkowych na temat symulatora Packet Tracer. Swoje doświadczenie zdobywał podczas pracy w przemyśle, obecnie jest wykładowcą w Wyższej Szkole Bankowej w Gdańsku. Robert Wszelaki to pasjonat zagadnień sieciowych i programowania. Ukończył pełny kurs Cisco CCNA. Jest absolwentem ZS1 w Piekarach Śląskich, obecnie studiuje informatykę na wydziale Automatyki, Elektroniki i Informatyki Politechniki Śląskiej. Marek Smyczek to doświadczony nauczyciel przedmiot&oacute;w informatycznych i elektrycznych, a zarazem instruktor programu Cisco CCNA. Jest autorem i redaktorem kilkudziesięciu publikacji z dziedzin elektroniki i informatyki.</p>

    Legimi.pl

  31. ZYX Music Zyx Music Kiddie Disco

  32. Zarządzanie sieciami komputerowymi w programie Packet Tracer - Wiadomości zaawansowane

    <p>Książka pt. &bdquo;ZARZĄDZANIE SIECIAMI KOMPUTEROWYMI W PROGRAMIE PACKET TRACER &ndash; Wiadomości zaawansowane&rdquo; jest przeznaczona dla os&oacute;b chcących rozszerzyć swoje umiejętności oraz wiedzę w zakresie zarządzania sieciami LAN i WAN. Czytelnik znajdzie tu opisy i ćwiczenia praktyczne dotyczące konfigurowania urządzeń Cisco. Jest kontynuacją pierwszej części książki o tym samym tytule.<br />Autorzy książki przyjęli zasadę &bdquo;Minimum teorii &ndash; maksimum przykład&oacute;w praktycznych&rdquo;, co umożliwi czytelnikowi naukę administrowania sieciami teleinformatycznymi w wielu skomplikowanych konfiguracjach urządzeń bez potrzeby zakupu drogiego sprzętu Cisco.<br />Treść książki obejmuje podstawy konfigurowania protokoł&oacute;w, usług oraz technik sieciowych, takich jak: routing dynamiczny RIP, EIGRP, OSPF, eBGP, routing statyczny, listy kontroli dostępu, VoIP, STP, RSTP, VTP, FRAME RELAY, PPP, uwierzytelnianie PAP i CHAP, RADIUS, NETFLOW, NAT, L2NAT, VPN, tunelowanie. Ta część obejmuje r&oacute;wnież konfigurowanie przełącznik&oacute;w wielowarstwowych 3560-24PS oraz 3650-24PS.<br />Autorzy tej książki to zesp&oacute;ł międzypokoleniowy i interdyscyplinarny. Utalentowany uczeń Zespołu Szk&oacute;ł Łączności w Gdańsku, Damian Strojek. Jego pasją są sieci komputerowe, posiada certyfikaty CCNA R&amp;S oraz CCNA Security. <br />Jerzy Kluczewski, długoletni instruktor Akademii CISCO CCNA. W swoim dorobku autorskim posiada już kilka publikacji książkowych na temat symulatora Packet Tracer. Swoje doświadczenie zdobywał podczas pracy w przemyśle, obecnie jest wykładowcą w Wyższej Szkole Bankowej w Gdańsku.</p>

    Legimi.pl

  1. Previous Page (Page 66)Next Page (Page 68)