Produkt zum Begriff Computer:
-
Computer Networks
Appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach. Tanenbaum presents key principles, then illustrates them utilising real-world example networks that run through the entire book—the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security.
Preis: 75.96 € | Versand*: 0 € -
Computer Security Fundamentals
Clearly explains core concepts, terminology, challenges, technologies, and skillsCovers today’s latest attacks and countermeasures The perfect beginner’s guide for anyone interested in a computer security careerDr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned. Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.LEARN HOW TOIdentify and prioritize potential threats to your networkUse basic networking knowledge to improve securityGet inside the minds of hackers, so you can deter their attacksImplement a proven layered approach to network securityResist modern social engineering attacksDefend against today’s most common Denial of Service (DoS) attacksHalt viruses, spyware, worms, Trojans, and other malwarePrevent problems arising from malfeasance or ignoranceChoose the best encryption methods for your organizationCompare security technologies, including the latest security appliancesImplement security policies that will work in your environmentScan your network for vulnerabilitiesEvaluate potential security consultantsMaster basic computer forensics and know what to do if you’re attackedLearn how cyberterrorism and information warfare are evolving
Preis: 59.91 € | Versand*: 0 € -
Human-Computer Interaction
The second edition of Human-Computer Interaction established itself as one of the classic textbooks in the area, with its broad coverage and rigorous approach, this new edition builds on the existing strengths of the book, but giving the text a more student-friendly slant and improving the coverage in certain areas. The revised structure, separating out the introductory and more advanced material will make it easier to use the book on a variety of courses. This new edition now includes chapters on Interaction Design, Universal Access and Rich Interaction, as well as covering the latest developments in ubiquitous computing and Web technologies, making it the ideal text to provide a grounding in HCI theory and practice.
Preis: 97.37 € | Versand*: 0 € -
Computer-Related Risks
"This sobering description of many computer-related failures throughout our world deflates the hype and hubris of the industry. Peter Neumann analyzes the failure modes, recommends sequences for prevention and ends his unique book with some broadening reflections on the future."—Ralph Nader, Consumer AdvocateThis book is much more than a collection of computer mishaps; it is a serious, technically oriented book written by one of the world's leading experts on computer risks. The book summarizes many real events involving computer technologies and the people who depend on those technologies, with widely ranging causes and effects. It considers problems attributable to hardware, software, people, and natural causes. Examples include disasters (such as the Black Hawk helicopter and Iranian Airbus shootdowns, the Exxon Valdez, and various transportation accidents); malicious hacker attacks; outages of telephone systems and computer networks; financial losses; and many other strange happenstances (squirrels downing power grids, and April Fool's Day pranks). Computer-Related Risks addresses problems involving reliability, safety, security, privacy, and human well-being. It includes analyses of why these cases happened and discussions of what might be done to avoid recurrences of similar events. It is readable by technologists as well as by people merely interested in the uses and limits of technology. It is must reading for anyone with even a remote involvement with computers and communications—which today means almost everyone. Computer-Related Risks: Presents comprehensive coverage of many different types of risksProvides an essential system-oriented perspectiveShows how technology can affect your life—whether you like it or not!
Preis: 13.9 € | Versand*: 0 €
-
Welcher Computer ist besser, Computer 1 oder Computer 2?
Es ist schwierig zu sagen, welcher Computer besser ist, da dies von den individuellen Bedürfnissen und Vorlieben abhängt. Computer 1 könnte besser sein, wenn man viel Wert auf Grafikleistung legt, während Computer 2 besser geeignet sein könnte, wenn man viel Speicherplatz benötigt. Letztendlich hängt die Entscheidung davon ab, welche Funktionen und Leistungen für den jeweiligen Nutzer am wichtigsten sind.
-
Was ist Computer-Software im Jahr 2002?
Computer-Software im Jahr 2002 umfasste eine Vielzahl von Anwendungen, Betriebssystemen und Programmen, die auf Computern verwendet wurden. Dies reichte von Büroanwendungen wie Textverarbeitung und Tabellenkalkulation bis hin zu Grafik- und Bildbearbeitungsprogrammen. Es gab auch eine Vielzahl von Spielen und Unterhaltungssoftware für verschiedene Plattformen.
-
Was ist Computer-Software im Jahr 2003?
Im Jahr 2003 umfasste Computer-Software eine Vielzahl von Anwendungen und Programmen, die auf Computern ausgeführt wurden. Dies reichte von Betriebssystemen wie Windows XP und Mac OS X bis hin zu Anwendungen wie Microsoft Office und Adobe Photoshop. Die Software wurde hauptsächlich auf CDs oder DVDs verkauft und konnte auch online heruntergeladen werden.
-
Wie liefert cls computer Computer mit Wasserkühlung?
CLS Computer liefert Computer mit Wasserkühlung, indem sie spezielle Wasserkühlungssysteme in ihre Computer einbauen. Diese Systeme bestehen aus einem Radiator, einem Pumpenblock und Wasserblöcken, die auf die Komponenten des Computers wie CPU und GPU montiert werden. Das Wasser wird durch das System gepumpt, um die Wärme von den Komponenten abzuführen und so eine effiziente Kühlung zu gewährleisten.
Ähnliche Suchbegriffe für Computer:
-
Code: The Hidden Language of Computer Hardware and Software
The classic guide to how computers work, updated with new chapters and interactive graphics"For me, Code was a revelation. It was the first book about programming that spoke to me. It started with a story, and it built up, layer by layer, analogy by analogy, until I understood not just the Code, but the System. Code is a book that is as much about Systems Thinking and abstractions as it is about code and programming. Code teaches us how many unseen layers there are between the computer systems that we as users look at every day and the magical silicon rocks that we infused with lightning and taught to think."- Scott Hanselman, Partner Program Director, Microsoft, and host of HanselminutesComputers are everywhere, most obviously in our laptops and smartphones, but also our cars, televisions, microwave ovens, alarm clocks, robot vacuum cleaners, and other smart appliances. Have you ever wondered what goes on inside these devices to make our lives easier but occasionally more infuriating?For more than 20 years, readers have delighted in Charles Petzold's illuminating story of the secret inner life of computers, and now he has revised it for this new age of computing. Cleverly illustrated and easy to understand, this is the book that cracks the mystery. You'll discover what flashlights, black cats, seesaws, and the ride of Paul Revere can teach you about computing, and how human ingenuity and our compulsion to communicate have shaped every electronic device we use. This new expanded edition explores more deeply the bit-by-bit and gate-by-gate construction of the heart of every smart device, the central processing unit that combines the simplest of basic operations to perform the most complex of feats. Petzold's companion website, CodeHiddenLanguage.com, uses animated graphics of key circuits in the book to make computers even easier to comprehend. In addition to substantially revised and updated content, new chapters include:Chapter 18: Let's Build a Clock!Chapter 21: The Arithmetic Logic UnitChapter 22: Registers and BussesChapter 23: CPU Control SignalsChapter 24: Jumps, Loops, and CallsChapter 28: The World BrainFrom the simple ticking of clocks to the worldwide hum of the internet, Code reveals the essence of the digital revolution.
Preis: 28.88 € | Versand*: 0 € -
FS70WTx Computer-Nähmaschine
- Home & Living Haushaltskleingeräte - FS70WTx Computer-Nähmaschine
Preis: 362.47 € | Versand*: 0.00 € -
Computer Networks
Appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach. Tanenbaum presents key principles, then illustrates them utilising real-world example networks that run through the entire book—the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security.
Preis: 75.96 € | Versand*: 0 € -
Computer Security Fundamentals
Clearly explains core concepts, terminology, challenges, technologies, and skillsCovers today’s latest attacks and countermeasures The perfect beginner’s guide for anyone interested in a computer security careerDr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you’ve learned. Whether you’re a student, a professional, or a manager, this guide will help you protect your assets—and expand your career options.LEARN HOW TOIdentify and prioritize potential threats to your networkUse basic networking knowledge to improve securityGet inside the minds of hackers, so you can deter their attacksImplement a proven layered approach to network securityResist modern social engineering attacksDefend against today’s most common Denial of Service (DoS) attacksHalt viruses, spyware, worms, Trojans, and other malwarePrevent problems arising from malfeasance or ignoranceChoose the best encryption methods for your organizationCompare security technologies, including the latest security appliancesImplement security policies that will work in your environmentScan your network for vulnerabilitiesEvaluate potential security consultantsMaster basic computer forensics and know what to do if you’re attackedLearn how cyberterrorism and information warfare are evolving
Preis: 59.91 € | Versand*: 0 €
-
Computer Spiele
Die Sims 4World of WarcraftFortniteLeague of LegendsMehr Ergebnisse
-
Wie kann man mit der Maus am Computer digital zeichnen?
Um mit der Maus am Computer digital zu zeichnen, benötigt man ein Zeichenprogramm wie z.B. Adobe Photoshop oder Paint. Man kann dann mit der Maus den Zeichenstift auswählen und auf dem Bildschirm zeichnen. Es kann jedoch schwierig sein, mit der Maus präzise Linien zu ziehen, daher ist es ratsam, eine Grafiktablett oder einen Stylus-Stift zu verwenden, um eine bessere Kontrolle beim Zeichnen zu haben.
-
Kann jeder einen Computer mit einem anderen Computer auslesen?
Nein, nicht jeder kann einen Computer mit einem anderen Computer auslesen. Das Auslesen eines Computers erfordert spezifisches Wissen und Fähigkeiten in den Bereichen Computerprogrammierung und Netzwerksicherheit. Es ist auch wichtig, dass der Zugriff auf den Computer legal und autorisiert ist.
-
Wie kann man gecrackte Software auf dem Computer haben?
Gecrackte Software kann auf den Computer gelangen, indem man sie aus unsicheren Quellen im Internet herunterlädt oder von anderen Personen erhält. Diese Software wurde illegal manipuliert, um den Kopierschutz zu umgehen. Es ist wichtig zu beachten, dass der Besitz und die Verwendung von gecrackter Software illegal sind und zu rechtlichen Konsequenzen führen können.
* Alle Preise verstehen sich inklusive der gesetzlichen Mehrwertsteuer und ggf. zuzüglich Versandkosten. Die Angebotsinformationen basieren auf den Angaben des jeweiligen Shops und werden über automatisierte Prozesse aktualisiert. Eine Aktualisierung in Echtzeit findet nicht statt, so dass es im Einzelfall zu Abweichungen kommen kann.