Pretraži oglase
Učitavam pretragu,

molimo sačekajte...

Ceger.rs je pretraživač proizvoda. Da bi ste otišli na sajt prodavce kliknite na proizvod.
  • Sajt

    www.knjige.kombib.rs

9

Proizvoda
    i problemi 14Poglavlje 2 Evolucija i performansa računara 152.1 Kratka istorija računara 162.2 Projektovanje za performansu 372.3 Više jezgara, MIC i GPGPU 432.4 Evolucija arhitekture Intel x86 442.4 Ugrađeni sistemi i ARM 452.6 Procena performanse 492.7 Dodatna literatura 592.8 Ključni pojmovi, kontrolna... 933.6 PCI express 983.7 Dodatna literatura 1083.8 Ključni pojmovi, kontrolna pitanja i problemi 108Poglavlje 4 Keš memorija 1124.1 Pregled računarskog memorijskog sistema 1134.2 Principi keš memorije 1204.3 Elementi projektovanja keš memorija 1234.4 OrganizacijA keš memorije procesora Pentium 1414...: karakteristike i funkcije 40512.1 Karakteristike mašinske instrukcije 40612.2 Vrste operanada 41312.3 Tipovi podataka procesora Intel x86 i ARM 41512.4 Vrste operacija 41812.5 Vrste operacija procesora Intel x86 i ARM 43112.6 Dodatna literatura 44112.7 Ključni pojmovi, kontrolna pitanja i problemi 441Dodatak 12

    Izvor

    www.knjige.kombib.rs
    2.808 RSD

    23,78 €

    .7 Web Security 360 10.7.1 Basic Types of Web Documents 361 10.7.2 Security of Web Documents 362 10.7.3 ActiveX 363 10.7.4 Cookies 364 10.7.5 Spyware 365 10.7.6 AJAX Security 365 10.7.7 Safe Web Surfing 367 10.8 Distributed Denial-of-Service Attacks 367 10.8.1 Master-Slave DDoS Attacks 367 10.8.2 Master....7 Stream Ciphers 80 2.7.1 RC4 Stream Cipher 80 2.7.2 RC4 Security Weaknesses 81 2.8 Key Generations 83 2.8.1 ANSI X9.17 PRNG 83 2.8.2 BBS Pseudorandom Bit Generator 83 2.9 Closing Remarks 84 2.10 Exercises 85 2.10.1 Discussions 85 2.10.2 Homework 85 3 Public-Key Cryptography and Key Management 93 3....1.3 Crypto Placement at the Network Layer 168 5.1.4 Crypto Placement at the Data-Link Layer 169 5.1.5 Implementations of Crypto Algorithms 169 5.2 Public-Key Infrastructure 170 5.2.1 X.509 Public-Key Infrastructure 170 5.2.2 X.509 Certificate Formats 171 5.3 IPsec: A Security Protocol at the Network Layer

    Izvor

    www.knjige.kombib.rs
  • A 16 Model B 17 A History of Model B PCB Revisions 18 Revision 1 18 Revision 2 18 A Bit of Background 18 ARM versus x86 19 Windows versus Linux 20 CHAPTER 2 Getting Started with the Raspberry Pi 21 Connecting a Display 22 Composite Video 22 HDMI Video 23 DSI Video 24 Connecting Audio 24 Connecting... from the Pi Store 55 Obtaining Software from Elsewhere 57 Finding the Software You Want 58 Installing Software 59 Uninstalling Software 61 Upgrading Software 61 Shutting the Pi Down Safely 62 CHAPTER 4 Troubleshooting 63 Keyboard and Mouse Diagnostics 64 Power Diagnostics 65 Display Diagnostics 67 Boot... Configuration Tool 93 Running the Tool 94 The Setup Options Screen 95 1 Expand Filesystem 95 2 Change User Password 96 3 Enable Boot to Desktop 96 4 Internationalisation Options 97 5 Enable Camera 99 6 Add to Rastrack 99 7 Overclock 100 8 Advanced Options 101 9 About raspi-config 105 CHAPTER 7 Advanced

    Izvor

    www.knjige.kombib.rs
    Network Security Test Lab is your complete, essential guide. Table of Contents Introduction xxi Chapter 1 Building a Hardware and Software Test Platform 1 Why Build a Lab? 2 Hardware Requirements 4 Physical Hardware 5 Equipment You Already Have 6 New Equipment Purchases 7 Used Equipment Purchases 7 Online Auctions 8 Thrift Stores 9 Company Sales 10 Virtual Hardware 10 VMware 12 VirtualBox 15 Hacker Hardware 16 Software Requirements 18 Operating Systems 19 Microsoft Windows 19 Linux 20 Navigating in Linux 23 Linux Basics 25 Mac OS X 28 Software and Applications 28 Learning Applications 29 Hacking Software 31... Traffi c 102 Basic Data Capture—A Layer-by-Layer Review 108 Physical—Data-Link Layer 108 Network-Internet Layer 110 Transport—Host-Host Layer 111 Application Layer 115 Other Network Analysis Tools 115 Summary 118 Key Terms 118 Exercises 119 Fun with Packets 119 Packet Analysis with tcpdump 120 Packet

    Izvor

    www.knjige.kombib.rs
  • !Dodavanje boja u prezentaciju 98 Novo!Dodavanje stila pozadine 99 Novo!Modifikovanje stila pozadine 100Snimanje šablona 102 4. Crtanje i modifikovanje oblika 105 Crtanje i promena veličine oblika 106 Novo!Ubacivanje više oblika 108Dodavanje teksta obliku 109Crtanje linija i strelica 110 Novo!Kreiranje...Perspection je napisao i proizveo knjige o različitim računarskim programima – uključujući Microsoft Office 2003 i XP, Microsoft Windows XP, Apple Mac OS X Panther, Adobe Photoshop CS2, Macromedia Flash 8, Macromedia Director MX i Macromedia Fireworks – i web izdavaštvo. 1991. godine, nakon što...-a 4 Novo!Biranje komandi 5Rad sa linijama sa alatkama 6 Novo!Biranje opcija okvira za dijalog 8 Novo!Upotreba statusne linije 9 Novo!Biranje najboljeg metoda za počinjanje prezentacije 10 Novo!Kreiranje prazne prezentacije 11Kreiranje prezentacije pomoću šablona 12 Novo!Otvaranje prezentacije 13 Novo

    Izvor

    www.knjige.kombib.rs
    1.320 RSD

    11,18 €

    If you already know JavaScript and are curious about the power of Node.js, then this is the ideal book for you.INTRODUCTION xxvii PART I: INTRODUCTION AND SETUP CHAPTER 1: INSTALLING NODE 3 Installing Node on Windows 4 Installing on Mac OS X 5 Installing Node Using the Source Code 6 Choosing the Node...Script Make Writing Asynchronous Applications Easier 17 What Are Closures? 18 How Closures Help When Programming Asynchronously 19 Summary 19 PART II: NODE CORE API BASICS CHAPTER 3: LOADING MODULES 23 Understanding How Node Loads Modules 24 Exporting a Module 24 Loading a Module 25 Summary 28 CHAPTER 4... Printing Server Messages 107 Reconnecting if the Connection Dies 108 Closing the Connection 109 Putting the Client Together 111 Summary 112 CHAPTER 13: MAKING HTTP REQUESTS 113 Making GET Requests 113 Using Other HTTP Verbs 114 Inspecting the Response Object 115 Obtaining the Response Body 116 Streaming

    Izvor

    www.knjige.kombib.rs
    1 Getting Started with Access 1 Understanding How Databases Store Data 2 Starting Access 4 New! Using the Ribbon 6 Choosing Commands 7 New! Working with the Ribbon and Toolbars 8 Choosing Dialog Box Options 10 Using the Status Bar 11 Creating a Database 12 New! Opening a Database 14 New! Converting... a Table Relationship Report 68 Ensuring Referential Integrity 70 Identifying Object Dependencies 71 Modifying Object Dependencies 72 4 Working with Fields 73 Inserting Fields 74 Working with Fields 76 Specifying Data Types and Field Properties 78 New! Viewing Field Properties 79 Changing Field Properties... Tables 107 Working with Tables 108 Repairing Renaming Errors 110 Managing Linked Tables 111 Working with the Clipboard 112 Editing Text 114 Entering Data Accurately with AutoCorrect 116 Finding and Replacing Text 118 Checking Spelling 120 Using Custom Dictionaries 122 Formatting a Datasheet 123 Arranging

    Izvor

    www.knjige.kombib.rs
    pomoću Adobe Device Central. Perspection je napisao i proizveo knjige o različitim računarskim programima – uključujući Adobe Flash CS3 Professional, Adobe Photoshop CS3 i CS2, Adobe Dreamweaver CS3, Microsoft Office 2007 i 2003, Microsoft Windows Vista i XP, Microsoft Exression Web i Apple Mac OS X... Instaliranje Photoshopa CS3 2Pokretanje Photoshopa CS3 4Prikazivanje Photoshop prozora 6Prikazivanje i sakrivanje paleta 7Rad sa paletama 8 Novo!Rad sa Photoshop alatkama 10Kreiranje novog dokumenta 12Selektovanje režima boje i rezolucije 13Kreiranje novog dokumenta pomoću preseta 14 Novo!Rad sa nekvadratnim...Podešavanje radnog prostora 72 Novo!Definisanje tastera za prečice 73Kreiranje prilagođenog korisničkog interfejsa 74Upotreba table za crtanje 76 4. Savladajte umetnost selekcije 77 Upotreba Rectangular Marquee alatke 78Upotreba Elliptical Marquee alatke 79Upotreba Single Row i Single Column Marquee alatke 80

    Izvor

    www.knjige.kombib.rs
    1.980 RSD

    16,77 €

    to “Unpivot” Non-normalized Data 94 Chapter 4: Filtering and Finding Data 101 Item 22: Understand Relational Algebra and How It Is Implemented in SQL 101 Item 23: Find Non-matches or Missing Records 108 Item 24: Know When to Use CASE to Solve a Problem 110 Item 25: Know Techniques to Solve Multiple-Criteria... Item 3: Get Rid of Repeating Groups 19 Item 4: Store Only One Property per Column 21 Item 5: Understand Why Storing Calculated Data Is Usually a Bad Idea 25 Item 6: Define Foreign Keys to Protect Referential Integrity 30 Item 7: Be Sure Your Table Relationships Make Sense 33 Item 8: When 3NF Is Not... Using OUTER JOIN 156 Item 35: Include Zero-Value Rows When Testing for HAVING COUNT(x) < Some Number 159 Item 36: Use DISTINCT to Get Distinct Counts 163 Item 37: Know How to Use Window Functions 166 Item 38: Create Row Numbers and Rank a Row over Other Rows 169 Item 39: Create a Moving Aggregate 172

    Izvor

    www.knjige.kombib.rs

9

Proizvoda