Angebote zu "Technology" (8.206 Treffer)

Kategorien

Shops

RAZER Blade Stealth L2 Gaming-Notebook »33,8 cm...
Aktuell
1.679,84 € *
zzgl. 5,95 € Versand

Das Unibody-Gehäuse ist durch präzisionsgefrästes CNC-Aluminium verstärkt und auf submolekularer Ebene schwarz eloxiert, um das Finish noch widerstandsfähiger zu machen. Das Design zeichnet sich durch ein Ton-in-Ton gehaltenes, elegantes Razer-Logo aus. Akkulaufzeit für einen ganzen Tag und Performance der nächsten Generation. Das Mercury White-Modell setzt auf die neue Intel® Iris™ Plus-Grafik und einen noch leistungsfähigeren Intel® Core™ i7 Prozessor der 10. Generation mit 25 Watt. Dieses Modell mit seinem ebenso eleganten wie robusten exloxierten Finish in Mercury White glänzt mit edlem Understatement und dem perfekten Gleichgewicht von Akkulaufzeit und Performance. Per Gesichtserkennung ermöglicht dir Windows Hello bei dem Razer Blade Stealth ganz einfach auch ohne Kennwort Zugriff auf dein System. Display: Displaygröße in cm: 33.80, Displaygröße in Zoll: 13.30, Bildqualität: Full HD, Max. Auflösung: 1920 x 1080, Display-Art: Matt, Prozessor: Prozessor: Intel Core , Prozessornummer: i7-1065G7, Prozessorgeschwindigkeit: 1,3 GHz bis zu 3,9 GHz, Komponenten: Anzahl installierter Festplatten: 1, Festplattenkapazität gesamt: 256 GB, Festplatte: PCIe M.2 , Arbeitsspeichergröße: 16 GB, Arbeitsspeichertyp: LPDDR4 3733MHz, Grafikkartenhersteller: Intel® Iris® Plus Graphics, Audio: Dolby Atmos, Microphone: Array, Webcam: 720p IR Hello, Lautsprecher: Stereo 2.0 , 4 Speakers + Smart Amp, Netzwerk & Anschlüsse: Thunderbolt: Thunderbolt™ 3 (USB-C™) + Power, USB-C 3.1 Gen 2: 1 - Supports charging of laptop, USB-A: 2, Audio Jack: 3.5mm Combo-Jack, Bluetooth: 5.0, Wireless: Intel® Wireless-AX 201 (IEEE 802.11a/b/g/n/ac), Betriebssystem / Software: Betriebssystem: Windows 10 Home (64-bit), Maße & Gewicht: Breite: 30,46 cm, Höhe: 1,53 cm, Tiefe: 21 cm, Gewicht: 1,36 kg, Allgemein: Security: Intel® Platform Trust Technology (Intel® PTT) security, Touchpad: Precision - PTP, Tastatur: RGB single-zone, powered by Razer Chroma, Anti-Ghostig, ,

Anbieter: OTTO
Stand: 26.01.2020
Zum Angebot
Information and Operational Technology Security...
53,49 € *
ggf. zzgl. Versand

Gebraucht - Sehr gut SG - leichte Beschädigungen oder Verschmutzungen, ungelesenes Mängelexemplar; gestempeltInformation and Operational Technology Security Systems: First International Workshop, IOSec 2018, Cipsec Project, Heraklion, Crete, Gre

Anbieter: Rakuten
Stand: 26.01.2020
Zum Angebot
Security Technology
80,24 € *
ggf. zzgl. Versand

This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.

Anbieter: Dodax
Stand: 26.01.2020
Zum Angebot
Security Technology
82,49 € *
ggf. zzgl. Versand

This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.

Anbieter: Dodax AT
Stand: 26.01.2020
Zum Angebot
Information Technology for Peace and Security
34,61 € *
ggf. zzgl. Versand

This book offers an introduction to Information Technology with regard to peace, conflict, and security research, a topic that it approaches from natural science, technical and computer science perspectives. Following an initial review of the fundamental roles of IT in connection with peace, conflict and security, the contributing authors address the rise of cyber conflicts via information warfare, cyber espionage, cyber defence and Darknets. The book subsequently explores recent examples of cyber warfare, including:- The Stuxnet attack on Iran's uranium refining capability- The hacking of the German Federal Parliament's internal communication system- The Wannacry malware campaign, which used software stolen from a US security agency to launch ransomware attacks worldwideThe book then introduces readers to the concept of cyber peace, including a discussion of confidence and security-building measures. A section on Cyber Arms Control draws comparisons to global efforts to control chemical warfare, to reduce the risk of nuclear war, and to prevent the militarization of space. Additional topics include the security of critical information infrastructures, and cultural violence and peace in social media. The book concludes with an outlook on the future role of IT in peace and security.Information Technology for Peace and Security breaks new ground in a largely unexplored field of study, and offers a valuable asset for a broad readership including students, educators and working professionals in computer science, IT security, peace and conflict studies, and political science.

Anbieter: Dodax AT
Stand: 26.01.2020
Zum Angebot
Information Technology for Peace and Security
34,66 € *
ggf. zzgl. Versand

This book offers an introduction to Information Technology with regard to peace, conflict, and security research, a topic that it approaches from natural science, technical and computer science perspectives. Following an initial review of the fundamental roles of IT in connection with peace, conflict and security, the contributing authors address the rise of cyber conflicts via information warfare, cyber espionage, cyber defence and Darknets. The book subsequently explores recent examples of cyber warfare, including:- The Stuxnet attack on Iran's uranium refining capability- The hacking of the German Federal Parliament's internal communication system- The Wannacry malware campaign, which used software stolen from a US security agency to launch ransomware attacks worldwideThe book then introduces readers to the concept of cyber peace, including a discussion of confidence and security-building measures. A section on Cyber Arms Control draws comparisons to global efforts to control chemical warfare, to reduce the risk of nuclear war, and to prevent the militarization of space. Additional topics include the security of critical information infrastructures, and cultural violence and peace in social media. The book concludes with an outlook on the future role of IT in peace and security.Information Technology for Peace and Security breaks new ground in a largely unexplored field of study, and offers a valuable asset for a broad readership including students, educators and working professionals in computer science, IT security, peace and conflict studies, and political science.

Anbieter: Dodax
Stand: 26.01.2020
Zum Angebot
Platform Embedded Security Technology Revealed
37,44 € *
ggf. zzgl. Versand

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications' secrets and users' privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine.Intel's security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users' security experience, and how third-party vendors can make use of it.It's written for computer security professionals and researchers, embedded system engineers, and software engineers and vendors who are interested in developing new security applications on top of Intel's security and management engine.It's also written for advanced users who are interested in understanding how the security features of Intel's platforms work.

Anbieter: Dodax
Stand: 26.01.2020
Zum Angebot
Security Technology
106,99 € *
ggf. zzgl. Versand

As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D- aster Recovery and Business Continuity (DRBC, published independently), Future G- eration Communication and Networking (FGCN) that was combined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), M- timedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and- and e-Service, Science and Technology (UNESST).

Anbieter: Dodax
Stand: 26.01.2020
Zum Angebot
Platform Embedded Security Technology Revealed
38,49 € *
ggf. zzgl. Versand

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications' secrets and users' privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine.Intel's security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users' security experience, and how third-party vendors can make use of it.It's written for computer security professionals and researchers, embedded system engineers, and software engineers and vendors who are interested in developing new security applications on top of Intel's security and management engine.It's also written for advanced users who are interested in understanding how the security features of Intel's platforms work.

Anbieter: Dodax AT
Stand: 26.01.2020
Zum Angebot
Security Technology
109,99 € *
ggf. zzgl. Versand

As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D- aster Recovery and Business Continuity (DRBC, published independently), Future G- eration Communication and Networking (FGCN) that was combined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), M- timedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and- and e-Service, Science and Technology (UNESST).

Anbieter: Dodax AT
Stand: 26.01.2020
Zum Angebot