Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (8)
  • Hungarian  (3)
  • Russian
  • 2015-2019  (11)
  • 2019  (9)
  • 2018  (6)
  • Electronic books ; local
  • Volkskunde
  • Computer Science  (7)
  • General works  (4)
Datasource
Language
Year
Keywords
  • 1
    Journal/Serial
    Journal/Serial
    Budapest : [Verlag nicht ermittelbar] ; 1.1959 -
    ISSN: 0571-1304
    Language: Hungarian
    Dates of Publication: 1.1959 -
    Parallel Title: Erscheint auch als Arrabona
    DDC: 060
    RVK:
    RVK:
    Keywords: Zeitschrift ; Ungarn ; Volkskunde ; Funde ; Geschichte ; Xántus János Múzeum
    Note: Herausgebendes Organ früher: Győr-Moson-Sopron Megyei Múzeumok, Igazgatósága , Beteil. Körp. früher: Győri Xántus János Múzeum
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 0816118086 , 081688840X , 081688840X , 081611840X
    Language: English
    DDC: 306/.03
    RVK:
    RVK:
    RVK:
    Keywords: Wörterbuch ; Kultur ; Südasien ; Kultur ; Indien ; Kultur ; Volkskunde ; Ethnologie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Journal/Serial
    Journal/Serial
    Budapest : [Verlag nicht ermittelbar] ; 1.1959 -
    ISSN: 0571-1304
    Language: Hungarian
    Dates of Publication: 1.1959 -
    Parallel Title: Erscheint auch als Arrabona
    DDC: 060
    RVK:
    RVK:
    Keywords: Zeitschrift ; Ungarn ; Volkskunde ; Funde ; Geschichte ; Xántus János Múzeum
    Note: Herausgebendes Organ früher: Győr-Moson-Sopron Megyei Múzeumok, Igazgatósága , Beteil. Körp. früher: Győri Xántus János Múzeum
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Journal/Serial
    Journal/Serial
    Budapest : [Verlag nicht ermittelbar] ; 1.1959 -
    ISSN: 0571-1304
    Language: Hungarian
    Dates of Publication: 1.1959 -
    Parallel Title: Erscheint auch als Arrabona
    DDC: 060
    RVK:
    RVK:
    Keywords: Zeitschrift ; Ungarn ; Volkskunde ; Funde ; Geschichte ; Xántus János Múzeum
    Note: Herausgebendes Organ früher: Győr-Moson-Sopron Megyei Múzeumok, Igazgatósága , Beteil. Körp. früher: Győri Xántus János Múzeum
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Published with the authorization of Microsoft Corporation by Pearson Education
    ISBN: 9781509305940 , 1509305947
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition.
    Series Statement: Inside out
    Parallel Title: Erscheint auch als Bott, Ed, 1955 - Windows 10 für Experten
    DDC: 005.446
    RVK:
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; Electronic books ; local ; Windows 10
    Abstract: Conquer today's Windows 10-from the inside out! Dive into Windows 10-and really put your Windows expertise to work. Focusing on Windows 10's newest, most powerful, and most innovative features, this supremely organized reference packs hundreds of timesaving solutions, up-to-date tips, and workarounds. From the new Timeline to key improvements in Microsoft Edge, Cortana, security, and virtualization, you'll discover how experts tackle today's essential tasks. Adapt to faster change in today's era of "Windows as a service," as you challenge yourself to new levels of mastery. • Install, configure, and personalize the latest versions of Windows 10 • Manage Windows reliability, security, and feature updates in any environment • Maximize your productivity with Windows 10's growing library of built-in apps • Pinpoint information fast with advanced Windows Search and Cortana techniques • Discover major Microsoft Edge enhancements, from extensions to accessibility • Use Cortana to perform tasks, set reminders, retrieve data, and get instant answers to pressing questions • Secure devices, data, and identities, and block malware and intruders • Safeguard your business with BYOD work accounts, Windows Hello, biometrics, and Azure AD • Deploy, use, and manage Universal Windows Platform (UWP) apps • Store, sync, and share content with OneDrive and OneDrive for Business • Collaborate more efficiently with the Windows 10 Mail, Calendar, and Skype apps • Seamlessly manage both physical and virtual storage • Optimize performance and battery life and troubleshoot crashes
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed March 12, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Addison-Wesley Professional | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (693 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Gregg, Brendan BPF performance tools
    RVK:
    Keywords: Electronic books ; local ; LINUX
    Abstract: BPF and related observability tools give software professionals unprecedented visibility into software, helping them analyze operating system and application performance, troubleshoot code, and strengthen security. BPF Performance Tools: Linux System and Application Observability is the industry's most comprehensive guide to using these tools for observability. Brendan Gregg, author of the industry's definitive guide to system performance, introduces powerful new methods and tools for doing analysis that leads to more robust, reliable, and safer code. This authoritative guide: Explores a wide spectrum of software and hardware targets Thoroughly covers open source BPF tools from the Linux Foundation iovisor project's bcc and bpftrace repositories Summarizes performance engineering and kernel internals you need to understand Provides and discusses 150+ bpftrace tools, including 80 written specifically for this book: tools you can run as-is, without programming — or customize and develop further, using diverse interfaces and the bpftrace front-end You'll learn how to use BPF (eBPF) tracing tools to analyze CPUs, memory, disks, file systems, networking, languages, applications, containers, hypervisors, security, and the Linux kernel. You'll move from basic to advanced tools and techniques, producing new metrics, stack traces, custom latency histograms, and more. It's like having a superpower: with Gregg's guidance and tools, you can analyze virtually everything that impacts system performance, so you can improve virtually any Linux operating system or application.
    Note: Online resource; Title from title page (viewed November 6, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9783960103370
    Language: English , German
    Pages: 1 Online-Ressource (400 pages)
    Edition: 2. Auflage
    Parallel Title: Erscheint auch als Grus, Joel Einführung in Data Science
    RVK:
    RVK:
    Keywords: Data mining ; Electronic books ; local ; Data Mining ; Datenanalyse ; Datenstruktur ; Python ; Datenanalyse ; Python 2.7 ; Data Mining
    Abstract: Dieses Buch führt Sie in Data Science ein, indem es grundlegende Prinzipien der Datenanalyse erläutert und Ihnen geeignete Techniken und Werkzeuge vorstellt. Sie lernen nicht nur, wie Sie Bibliotheken, Frameworks, Module und Toolkits konkret einsetzen, sondern implementieren sie auch selbst. Dadurch entwickeln Sie ein tieferes Verständnis für die Zusammenhänge und erfahren, wie essenzielle Tools und Algorithmen der Datenanalyse im Kern funktionieren. Falls Sie Programmierkenntnisse und eine gewisse Sympathie für Mathematik mitbringen, unterstützt Joel Grus Sie dabei, mit den mathematischen und statistischen Grundlagen der Data Science vertraut zu werden und sich Programmierfähigkeiten anzueignen, die Sie für die Praxis benötigen. Dabei verwendet er Python: Die weit verbreitete Sprache ist leicht zu erlernen und bringt zahlreiche Bibliotheken für Data Science mit.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Parallel Title: Erscheint auch als Lauwens, Ben Think Julia
    DDC: 005.73
    RVK:
    Keywords: Julia (Computer program language) ; Dynamic programming ; Electronic books ; Electronic books ; local ; Julia
    Abstract: If you're just learning how to program, Julia is an excellent JIT-compiled, dynamically typed language with a clean syntax. This hands-on guide uses Julia 1.0 to walk you through programming one step at a time, beginning with basic programming concepts before moving on to more advanced capabilities, such as creating new types and multiple dispatch. Designed from the beginning for high performance, Julia is a general-purpose language ideal for not only numerical analysis and computational science but also web programming and scripting. Through exercises in each chapter, you'll try out programming concepts as you learn them. Think Julia is perfect for students at the high school or college level as well as self-learners and professionals who need to learn programming basics. Start with the basics, including language syntax and semantics Get a clear definition of each programming concept Learn about values, variables, statements, functions, and data structures in a logical progression Discover how to work with files and databases Understand types, methods, and multiple dispatch Use debugging techniques to fix syntax, runtime, and semantic errors Explore interface design and data structures through case studies
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed April 15, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (170 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als Calavera, David Linux observability with BPF
    RVK:
    Keywords: Electronic books ; local ; LINUX ; Programmierung ; Leistungsbewertung
    Abstract: Want to master the BPF virtual machine in the Linux Kernel? This practical guide shows you how to write applications that use BPF to observe and modify the kernel’s behavior on demand—without having prior knowledge of Linux Kernel development. David Calavera and Lorenzo Fontana introduce concepts to help systems engineers understand the BPF program lifecycle. If you have knowledge about performance optimization, networking, and security, this book shows you how to inject code to monitor, trace, and observe events in the kernel in a secure way—without the need to recompile the kernel or reboot the system. You’ll find code examples in C, Go, and Python.
    Note: Online resource; Title from title page (viewed September 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    San Francisco, CA : No Starch Press
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als Sweigart, Al Cracking codes with Python
    DDC: 005.8
    RVK:
    Keywords: Data encryption (Computer science) ; Python (Computer program language) ; Computer security ; Hacking ; Electronic books ; Electronic books ; local ; Python ; Python
    Abstract: "Learn how to program in Python while making and breaking ciphers-algorithms used to create and send secret messages! After a crash course in Python programming basics, you'll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You'll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today's online transactions, including digital signatures, email, and Bitcoin. Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you'll have learned how to code in Python and you'll have the clever programs to prove it! You'll also learn how to: • Combine loops, variables, and flow control statements into real working programs• Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish• Create test programs to make sure that your code encrypts and decrypts correctly• Code (and hack!) a working example of the affine cipher, which uses modular arithmetic to encrypt a message• Break ciphers with techniques such as brute-force and frequency analysis There's no better way to learn to code than to play with real programs. Cracking Codes with Python makes the learning fun!"
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : mitp Verlag | Boston, MA : Safari
    ISBN: 9783958452756
    Language: English , German
    Pages: 1 online resource (520 pages)
    Edition: 2nd edition
    Parallel Title: Erscheint auch als Harich, Thomas W. IT-Sicherheitsmanagement
    DDC: 005.80218
    RVK:
    RVK:
    Keywords: Electronic books ; local ; BSI ; ISMS ; ISO-27001 ; IT-System ; Compliance ; Monitoring ; Sicherheit ; Controlling ; Datenschutz ; Richtlinien ; DIN-NIA-01-27 ; IT-Compliance ; IT-Sicherheit ; Risikofaktoren ; Cloud Computing ; Datensicherheit ; Risikobewertung ; Datenschutzrecht ; Penetrationstest ; Softwareprojekte ; Geschäftsprozesse ; Notfallmanagement ; digitale Signatur ; Balanced Scorecard ; IT-Risikomanagement ; Softwareentwicklung ; Identitätsmanagement ; Informationssicherheit ; Business Impact-Analyse ; IT-Sicherheitsverfahren ; Risikomanagementprozess ; IT-Sicherheitsmanagement ; ISO/IEC 27001 ; Europäische Union Datenschutz-Grundverordnung ; Computersicherheit ; Rechnernetz ; Systemverwaltung ; Datensicherung ; Computersicherheit
    Abstract: Praxiswissen für IT Security Manager Mit einem durchdachten IT-Sicherheitskonzept zu mehr Informationssicherheit IT Compliance, Business Continuity Management, Risikomanagement oder Security Audit – alle Bereiche des IT Security Managers praxisnah erklärt Aufbau eines Information Security Management Systems (ISMS) nach ISO 27001 und BSI – unter Berücksichtigung der neuen DSGVO Immer mehr Daten werden in Public Clouds verarbeitet, auf Mobiltelefonen gespeichert, über Chat-Apps geteilt oder im Rahmen von Industrie 4.0 in einer Größenordnung erhoben, die bislang kaum denkbar war. Die entsprechenden Maßnahmen der IT-Security müssen sich an diese Veränderungen anpassen. Ebenso wie an die EU-Datenschutz-Grundverordnung, das IT-Sicherheitsgesetz oder das China Cybersecurity Law. Alle diese Regelungen haben immense Auswirkungen darauf, wie Unternehmen Daten erfassen, verarbeiten, speichern oder austauschen dürfen. In der Fülle und der Bandbreite der neuen Regelungen liegt aber immer auch die Gefahr, etwas falsch zu machen. Dieser Praxisleitfaden wird Ihnen dabei helfen, von der schieren Menge an Einzelthemen und Aufgaben, mit denen sich der (angehende) IT Security Manager auseinanderzusetzen hat, nicht erschlagen zu werden und den richtigen Weg zu wählen, um mit all diesen Anforderungen umzugehen. Jedes Kapitel dieses Buches beschreibt einen zusammenhängenden Bereich der IT Security. Die notwendige theoretische Fundierung wechselt sich dabei ab mit Tipps aus der Praxis für die Praxis, mit für den Berufsalltag typischen Fragestellungen, vielen konkreten Beispielen und hilfreichen Checklisten. Alle Teilgebiete werden abschließend in einem Kapitel zusammengeführt, das die Einführung und Weiterentwicklung eines IT-Sicherheitsmanagements auf Basis der ISO-27000-Normen-Familie unter Beachtung der datenschutzrechtlichen Bestimmungen der EU-DSGVO behandelt. So erhalten Sie sowohl einen kompetenten Praxisleitfaden (auch für den Berufseinstieg) als auch ein umfassendes Nachschlagewerk für Ihre tägliche Arbeit. Aus dem Inhalt: Umfang und Aufgabe des IT-Security-Managements Organisation der IT-Security IT-Compliance Organisation von Richtlinien Betrieb der IT-Security IT Business Continuity Management IT-Notfallmanagement Verfügbarkeitsmanagement Technische IT-Security IT-Risikomanagement Sicherheitsmonitoring IT-Security-Audit Management von Sicherheitsereignissen und IT-Forensik Kennzahlen Praxis: Aufbau eines ISMS Awareness und Schulung Über den Autor: T...
    Note: Online resource; Title from title page (viewed June 26, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...