Бази даних

Наукова електронна бібліотека - результати пошуку

Mozilla Firefox Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер
"Mozilla Firefox"

Вид пошуку
у знайденому
Сортувати знайдені документи за:
авторомназвоюроком видання
Формат представлення знайдених документів:
повнийстислий
 Знайдено в інших БД:Віртуальна довідка (1)Автореферати дисертацій (424)Реферативна база даних (835)Книжкові видання та компакт-диски (192)Журнали та продовжувані видання (28)
Пошуковий запит: (<.>K=JUNIPER$<.>+<.>K=NETWORKS$<.>)
Загальна кількість знайдених документів : 77
Представлено документи з 1 до 20
...

   Тип видання:   науково-популярне видання   
1.

Roshan, P.
802.11 wireless LAN fundamentals [Electronic resource] / P. Roshan, J. Leary. - Indianapolis : Cisco Press, 2003. - 312 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


802.11 Wireless LAN Fundamentals gives networking engineers and IT professionals the knowledge they need to design, deploy, manage, and troubleshoot their own wireless local-area networks (WLANs). Starting with an overview of the technology and architecture of WLANs, the book goes on to explain services and advanced features that such applications can provide. Most importantly, it provides practical design guidance and deployment recommendations.



Кл.слова:
бездротова мережа -- локальна мережа

   Тип видання:   науково-популярне видання   
2.

Crouzet, F.
A history of the European economy, 1000–2000 [Electronic resource] / F. Crouzet. - London : The University Press of Virginia, 2001. - 351 p
Переклад назви: Історія європейської економіки, 1000-2000

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Considering Europe as a whole rather than as a mosaic of individual states, François Crouzet presents here an accessible, engaging history of the European economy during the second millennium. Stressing the common economic institutions shared over time by the different regions of Europe and the networks of relations that have linked them, Crouzet examines pan-European changes and integration rather than merely the particular experiences of individual countries. A History of the European Economy, 1000-2000 goes beyond addressing the historical ramifications of trade in the European economy to encompass problems such as the diffusion of technology, the migration of capital and labor, diasporas and minorities, and national diversity. By stressing the historical origins of the drive toward European integration and its progress all the way to the birth of the euro, Crouzet delivers an original and comprehensive overview of European economic history.



Кл.слова:
економіка -- торгівля -- історія Європи

   Тип видання:   довідник   
3.

Allen, R.
Active directory cookbook [Electronic resource] : for Windows Server 2003 and Windows 2000 / R. Allen. - Sebastopol : O'Reilly, 2003. - 622 p
Переклад назви: Активний каталог для Windows Server 2003 і Windows 2000

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Those of you who run networks on Windows 2000 know the benefits of using Active Directory for managing user information and permissions. You also know what a bear it can be. The newer version included with Windows Server 2003 has over 100 new and updated features to simplify deployment, but once it's in place many system administrators still find Active Directory challenging. If you're among those looking for practical hands-on support, help is here with our new Active Directory Cookbook for Windows Server 2003 & Windows 2000, a unique problem-solving guide that offers quick answers for both versions of the directory. The book contains hundreds of step-by-step solutions for both common and uncommon problems that you might encounter with Active Directory on a daily basis--including recipes to deal with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, the Active Directory Schema, and many other features. Author Robbie Allen, a Senior Systems Architect at Cisco Systems and co-author of our Active Directory tutorial, based this collection of troubleshooting recipes on his own experience, along with input from Windows administrators throughout the industry. Each recipe includes a discussion to explain how and why the solution works, so you can adapt the problem-solving techniques to similar situations.



Кл.слова:
домен -- протокол доступу -- адміністратор

   Тип видання:   науково-популярне видання   
4.
 


Manjapra, Kris.
Age of Entanglement [Electronic resource] : german and Indian Intellectuals across Empire / Kris Manjapra. - Cambridge : Harvard University Press, 2013. - 454 p
Переклад назви: Вік з'єднання: Німецькі та Індійські інтелектуали по всій імперії

  Повний текст доступний у читальних залах НБУВ


Age of Entanglement explores patterns of connection linking German and Indian intellectuals from the nineteenth century to the years after the Second World War. Kris Manjapra traces the intersecting ideas and careers of a diverse collection of individuals from South Asia and Central Europe who shared ideas, formed networks, and studied one another's worlds. Moving beyond well-rehearsed critiques of colonialism toward a new critical approach, this study recasts modern intellectual history in terms of the knotted intellectual itineraries of seeming strangers. Collaborations in the sciences, arts, and humanities produced extraordinary meetings of German and Indian minds. Meghnad Saha met Albert Einstein, Stella Kramrisch brought the Bauhaus to Calcutta, and Girindrasekhar Bose began a correspondence with Sigmund Freud. Rabindranath Tagore traveled to Germany to recruit scholars for a new Indian university, and the actor Himanshu Rai hired director Franz Osten to help establish movie studios in Bombay. These interactions, Manjapra argues, evinced shared responses to the cultural and political hegemony of the British empire. Germans and Indians hoped to find in one another the tools needed to disrupt an Anglocentric world order. As Manjapra demonstrates, transnational intellectual encounters are not inherently progressive. From Orientalism and Aryanism to socialism and scientism, German-Indian entanglements were neither necessarily liberal nor conventionally cosmopolitan, often characterized as much by manipulation as by cooperation. Age of Entanglement underscores the connections between German and Indian intellectual history, revealing the characteristics of a global age when the distance separating Europe and Asia seemed, temporarily, to disappear.



Кл.слова:
друга світова війна -- індуїзм -- нацизм -- арійська теорія

   Тип видання:   наукове видання   
5.

Campi, N.
Automating Linux and Unix System Administration [Electronic resource] / N. Campi, K. Bauer. - 2th. ed.. - New York : Apress, 2009. - 419 p.
Переклад назви: Автоматизація Linux і Unix System Administration

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration. Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer.Automating Linux and Unix System Administration, Second Editionis unique in its focus on how to make the system administrator's job easier and more efficient: instead of just managing the system administrator's time, the book explains the technology to automate repetitive tasks and the methodology to automate successfully. Both new and seasoned professionals will profit from industry–leading insights into the automation process. System administrators will attain a thorough grasp of cfengine, kickstart, and shell scripting for automation. After reading all chapters and following all exercises in this book, the reader will be able to set up anything from a Linux datacenter to a small office network. What you'll learn See how to make changes on many UNIX and Linux hosts at once in a reliable and repeatable manner. Learn how to automate things correctly so you only have to do it once, by leveraging the authors' experience in setting up small, medium, and large networks. Set up a Linux datacenter or a network correctly. Explore handling real–world environments where not all hosts are configured alike via a case study of a fictional new datacenter buildout. Examine real–world examples for core infrastructure services (DNS, mail, monitoring, log analysis, security, cfengine, imaging) to build on in your environment. Understand core system administration best practices, which are a key part of how cfengine and automations deployments are outlined in the book. Learn how to make changes reversible, repeatable, and correct the first time through interaction with product/application stakeholders (programmers, product managers, customers, etc.). Who this book is for This book is for Linux system administrators who want to learn about the software and methodology to automate repetitive tasks-regardless of network or datacenter size-in one place. System managers will also find it much easier to think about network technology and automation projects if they read this book. This book is also for anyone who is interested in repeatable and secure infrastructure.



Кл.слова:
програмне забезпечення -- операційна система

   Тип видання:   підручник   
6.

Gupta, M.
Building a virtual private network [Electronic resource] / M. Gupta. - Cincinnati : Premier Press, 2003. - 448 p
Переклад назви: Будівництво віртуальної приватної мережі

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Your business must be connected in order to compete in the global marketplace. Employees need to know that their company's network is accessible at any time, from any place. A Virtual Private Network (VPN) accomplishes this by utilizing remote connectivity technologies that combine existing internal networks with the Internet to securely communicate information. Building a Virtual Private Network is your key to designing, implementing, and securing a fully connected network that meets your business needs.



Кл.слова:
інтернет -- мережа -- бізнес

   Тип видання:   методичний посібник   
7.

Chapman, D. B.
Building Internet firewalls [Electronic resource] / D. B. Chapman, E. D. Zwicky. - Sebastopol : O'Reilly, 1995. - 517 p.
Переклад назви: Побудова інтернет-фаєрволів

Рубрики:

  Повний текст доступний у читальних залах НБУВ


More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendic



Кл.слова:
мережа -- захист

   Тип видання:   підручник   
8.

Reddy, K.
Building MPLS-Based Broadband Access VPNs [Electronic resource] / K. Reddy. - Indianapolis : Cisco Press, 2003. - 408 p.
Переклад назви: Побудова VPN-мережі широкополосного доступу на основі MPLS

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.



Кл.слова:
комп'ютерна мережа -- багатопротокольна комутація -- віртуальна мережа

   Тип видання:   навчальний посібник   
9.

Rao, V. B.
C++ Neural networks and fuzzy logic [Electronic resource] / V. B. Rao. - [S. l.] : M&T Books, 1995. - 549 p.
Переклад назви: C++ нейронні мережі та нечітка логіка

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The number of models available in neural network literature is quite large. Very often the treatment is mathematical and complex. This book provides illustrative examples in C++ that the reader can use as a basis for further experimentation. A key to learning about neural networks to appreciate their inner workings is to experiment. Neural networks, in the end, are fun to learn about and discover. Although the language for description used is C++, you will not find extensive class libraries in this book. With the exception of the backpropagation simulator, you will find fairly simple example programs for many different neural network architectures and paradigms. Since backpropagation is widely used and also easy to tame, a simulator is provided with the capacity to handle large input data sets. You use the simulator in one of the chapters in this book to solve a financial forecasting problem. You will find ample room to expand and experiment with the code presented in this book.



Кл.слова:
мова програмування

   Тип видання:   науково-популярне видання   
10.
 


Ledeneva, Alena V..
Can Russia Modernise? [Electronic resource] : sistema, power networks and informal governance / Alena V. Ledeneva. - Cambridge : Cambridge university press, 2013. - 327 p
Переклад назви: Чи може Росія модернізуватися? : Система, сила мережі та управління інформацією

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


In this original, bottom-up account of the evolution of contemporary Russia, Alena Ledeneva seeks to reveal how informal power operates. Concentrating on Vladimir Putin's system of governance - referred to as sistema - she identifies four key types of networks: his inner circle, useful friends, core contacts and more diffuse ties and connections. These networks serve sistema but also serve themselves. Reliance on networks enables leaders to mobilise and to control, yet they also lock politicians, bureaucrats and businessmen into informal deals, mediated interests and personalised loyalty. This is the 'modernisation trap of informality': one cannot use the potential of informal networks without triggering their negative long-term consequences for institutional development. Ledeneva's perspective on informal power is based on in-depth interviews with sistema insiders and enhanced by evidence of its workings brought to light in court cases, enabling her to draw broad conclusions about the prospects for Russia's political institutions.



Кл.слова:
маніпулювання громадською думкою -- пропаганда -- авторитаризм -- цензура -- ортодоксія

   Тип видання:   підручник   
11.

Jack, T.
CCNP: building Cisco multilayer switched networks study guide (642-811) [Electronic resource] / T. Jack. - Alameda : Sybex, 2003. - 562 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This book prepares you for Cisco’s Building Cisco Multilayer Switched Networks (BCMSN) exam, 642-811.



Кл.слова:
Cisco Systems -- комп'ютерна мережа

   Тип видання:   наукове видання   
12.

Dubrawsky, I.
CCSP Self-Study CCSP CSI [Electronic resource] : exam Certification Guide / I. Dubrawsky, P. Grey. - 2-е вид.. - Indianapolis : Cisco Press, 2004. - 528 p.
Переклад назви: CCSP самовчитель CCSP CSI: Керівництво сертифікаційного іспиту

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The official self-study test preparation guide for the CCSP CSI exam 642-541 This study guide helps you master all the topics on the CCSP CSI exam, including Classifying and mitigating network attacks Securing designs for small, medium-sized, remote-user, and enterprise networks Understanding the SAFE network modules Using Host IPS and the Cisco Security Agent Identifying security threats Securing a wireless network Applying the SAFE Blueprint to networks utilizing IP telephony Implementing appropriate security products to prevent or counteract vulnerabilities Defining a security policy Using the Cisco Secure product portfolio, including perimeter security, IDS, secure connectivity, security management, and Cisco AVVID Understanding the SAFE architectural overview CCSP CSI Exam Certification Guide, Second Edition, is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CSI exam. Inside, you'll find preparation hints and test-taking tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge of network security. CCSP CSI Exam Certification Guide, Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation Summary lists and tables make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions reinforce key concepts. An entire chapter of scenarios helps you place the exam objectives in real-world situations, thus increasing recall during exam time. New in this edition is coverage of wireless networks, IP telephony, Host Intrusion Prevention System (IPS), and enterprise networks. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take a complete, timed exam. The assessment engine tracks your performance and provides feedback on a module-by-module basis, presenting links to the text for further review and helping you devise a complete study plan. Well-regarded for its level of detail, assessment features, challenging review questions, and hands-on exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP CSI Exam Certification Guide, Second Edition, is part of a recommended study program from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains more than 200 practice questions for the CCSP CSI exam, including simulation-based questions. CD-ROM test engine powered by www.boson.com. Boson Software is a Cisco Learning Partner.



Кл.слова:
програмне забезпечення -- база даних -- електронний ресурс -- сервер -- захист даних -- CCSP CSI exam

   Тип видання:   науково-популярне видання   
13.
 


Cox, John M..
Circles of Resistance [Electronic resource] / John M. Cox. - New York : Peter lang, 2009. - 214 p
Переклад назви: Кола Спротиву

Рубрики:

Географічні рубрики:
  

  Повний текст доступний у читальних залах НБУВ


Circles of Resistance: Jewish, Leftist, and Youth Dissidence in Nazi Germany analyzes resistance networks of young German Jews and other young dissidents during the Nazi dictatorship. Young German-Jewish radicals created an intellectually and politically vibrant subculture in Berlin, the geographical focus of this study. The youths analyzed here were reacting not only to Nazi oppression: they were also driven to develop new modes of action and politics by their estrangement not only from German society, but also from the traditional left parties and their post-1933 underground organizations, and even from large segments of Berlin's Jewish community, where radical activism was often regarded as counter-productive and needlessly provocative. At the center of this study are the Herbert Baum groups, led by members of Germany's Communist Party (KPD). While the Baum groups were the largest, they were but one of several resistance operations that were situated partially within the milieu created by Communists, Socialists, Trotskyists, and radical Jewish youths. Based on archival research in Germany, Paris, Amsterdam, and Jerusalem, and interviews with veterans of the anti-Nazi resistance, Circles of Resistance analyzes the overlap of these diverse social and political dimensions among dissident circles and offers a reconsideration of traditional thinking on leftist and Jewish resistance and youth subcultures of the Third Reich. Circles of Resistance will be useful for undergraduate as well as graduate courses on Jewish history, Nazi Germany, and the Holocaust, as well as courses devoted to the history of European socialism.



Кл.слова:
рух опору -- третій рейх -- психологія

   Тип видання:   підручник   
14.

Flannagan, M.
Cisco Catalyst QoS: quality of service in campus networks [Electronic resource] / M. Flannagan , R. Froom. - Indianapolis : Cisco Press, 2003. - 432 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Quality of service (QoS) is the set of techniques designed to manage network resources. QoS refers to the capability of a network to provide better service to selected network traffic over various LAN and WAN technologies. The primary goal of QoS is to provide flow priority, including dedicated bandwidth, controlled jitter and latency (required by some interactive and delay-sensitive traffic), and improved loss characteristics. While QoS has become an essential technology for those organizations rolling out a new generation of network applications such as real-time voice communications and high-quality video delivery, most of the literature available on this foundation technology for current and future business applications focuses on IP QoS. Equally important is the application of QoS in the campus LAN environment, which is primarily responsible for delivering traffic to the desktop. Cisco Catalyst QoS is the first book to concentrate exclusively on the application of QoS in the campus environment. This practical guide provides you with insight into the operation of QoS on the most popular and widely deployed LAN devices: the Cisco Catalyst family of switches. Leveraging the authors' extensive expertise at Cisco in the support of Cisco Catalyst switches and QoS deployment, the book presents QoS from the campus LAN perspective. It explains why QoS is essential in this environment in order to achieve a more deterministic behavior for traffic when implementing voice, video, or other delay-sensitive applications. Through architectural overviews, configuration examples, real-world deployment case studies, and summaries of common pitfalls, you will understand how QoS operates, the different components involved in making QoS possible, and how QoS can be implemented on the various Cisco Catalyst platforms to enable truly successful end-to-end QoS applications. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.



Кл.слова:
комп'ютерна мережа

   Тип видання:   методичний посібник   
15.

Liu, D.
Cisco CCNA/CCENT exam 640-802, 640-822, 640-816 preparation kit [Electronic resource] / D. Liu, B. Barber. - Burlington : Syngress Publishing, 2009. - 830 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining route and switched networks. The current exam material covers networking concepts along with new and updated content on network security fundamentals and the basics of wireless networking. This book can be used as a study guide for either track you choose to receive your CCNA – the single exam, 640-802 or the combined 640-822 and 640-816, and for the CCENT certification which a student will receive upon completion of the 640-822 exam. The author team has arranged the content so that you can easily identify the objectives for each half of the combined exam.



Кл.слова:
мережа -- сертифікат -- іспит

   Тип видання:   методичний посібник   
16.

Boney, J.
Cisco IOS in a Nutshell [Electronic resource] / J. Boney. - 2nd. ed.. - Sebastopol : O'Reilly, 2005. - 796 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS.



Кл.слова:
мережа

   Тип видання:   наукове видання   
17.

Barnes, D.
Cisco LAN switching [Electronic resource] / D. Barnes, B. Sakandar. - Indianapolis : Cisco Press, 2004. - 408 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Local-area networks (LANs) are becoming increasingly congested and overburdened because of a dramatic increase in traffic, faster CPUs and operating systems, and more network-intensive applications. Many organizations that use network and computing technology use LAN switching to take advantage of high-speed traffic forwarding and improved performance of traditional Ethernet technologies that don't require costly wiring upgrades or time-consuming host reconfiguration. Cisco LAN Switching Fundamentals provides administrators of campus networks with the most up-to-date introduction to LAN switching within a traditional Ethernet environment.



Кл.слова:
мережі -- інтернет

   Тип видання:   підручник   
18.

Stone, T.
Cisco unity deployment and solutions guide [Electronic resource] / T. Stone. - Indianapolis : Cisco Press, 2004. - 1008 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This definitive reference helps you leverage the true power of Cisco Unity, the powerful unified communications server that provides advanced, convergence-based communication services, which integrate with the desktop applications that business professionals use everyday. Cisco Unity Deployment and Solutions Guide shows you how to integrate Cisco Unity with Cisco IP-based communication solutions, including Cisco CallManager. Part I introduces you to the Cisco Unity architecture and teaches you about the Cisco Unity feature set. Part II helps you design and deploy a unified message solution with Cisco Unity, and Part III helps you manage and administer your solution by leveraging the tools within Cisco Unity. Cisco Unity Deployment and Solutions Guide teaches you all that you need to know about designing, deploying, and managing a sustainable, unified messaging solution. This book is part of the Networking Technology Series from Cisco Press(R) which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.



Кл.слова:
голосова пошта

   Тип видання:   науково-популярне видання   
19.
 


Graham, Stephen.
Cities under siege [Electronic resource] : the new military urbanism / Stephen Graham. - London : Verso, 2011. - 432 p.
Переклад назви: Міста в облозі: новітня військова урбанізація

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Cities are the new battleground of our increasingly urban world. From the slums of the global South to the wealthy financial centers of the West, Cities Under Siege traces the spread of political violence through the sites, spaces, infrastructure and symbols of the world’s rapidly expanding metropolitan areas. Drawing on a wealth of original research, Stephen Graham shows how Western militaries and security forces now perceive all urban terrain as a conflict zone inhabited by lurking shadow enemies. Urban inhabitants have become targets that need to be continually tracked, scanned and controlled. Graham examines the transformation of Western armies into high-tech urban counter-insurgency forces. He looks at the militarization and surveillance of international borders, the use of ‘security’ concerns to suppress democratic dissent, and the enacting of legislation to suspend civilian law. In doing so, he reveals how the New Military Urbanism permeates the entire fabric of urban life, from subway and transport networks hardwired with high-tech ‘command and control’ systems to the insidious militarization of a popular culture corrupted by the all-pervasive discourse of ‘terrorism.’



Кл.слова:
парамілітарні організації -- глобальна безпека -- системи контролю

   Тип видання:   підручник   
20.

Heltzel, P.
Complete home wireless networking [Electronic resource] / P. Heltzel. - Windows® XP Edition. - Upper Saddle River : Prentice Hall PTR, 2003. - 224 p.
Переклад назви: Повна домашня безпровідна мережа

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Today's home wireless networks offer tremendous advantages over hard-wired networks-among them, unprecedented portability and, of course, the freedom from wires strung all over your house! Unless you have a firm grasp on all the latest networking technologies, though, wireless networks won't free you from digging your way through a collection of confusing, jargon-riddled manuals; dealing with obscure configuration modes; and finally, hoping somehow it will all work once you flip the switch. If you want a home wireless network without the headaches, then Complete Wireless Home Networking: Windows XP Edition, by wireless networking authority Paul Heltzel, is for you. Written in an engaging, conversational style, this book offers reliable advice on determining your equipment needs, then guides you through each step of building a wireless network-installation, setup, configuration, and troubleshooting. And with minimal fuss, you'll have a home wireless network that's fast, secure, and optimized for your physical environment and computing requirements. Whether you're accessing the Internet from your back yard, sending jobs to a printer downstairs, or transferring files effortlessly, you'll wonder how you got by without a wireless network.



Кл.слова:
комп'ютерна мережа -- бездротова мережа
...
 

Всі права захищені © Національна бібліотека України імені В. І. Вернадського