Mostrando 5,021 - 5,040 Resultados de 7,022 Para Buscar '"Æ"', tiempo de consulta: 0.09s Limitar resultados
  1. 5021
  2. 5022
  3. 5023
  4. 5024
  5. 5025
  6. 5026
  7. 5027
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Title page -- Copyright -- Forewords -- Foreword -- Preface -- Acknowledgments -- About the Author -- 1 Introduction to Quality Planning -- 1.1 Quality Definitions -- 1.1.1 Meaning of Quality -- 1.1.2 End-customer Centricity -- 1.1.3 Dimensions of Product and Service Quality -- 1.1.4 Discussion of Service Quality -- 1.2 Quality System -- 1.2.1 Quality Management System -- 1.2.2 Discussion of QMS -- 1.2.3 Quality Target Setting -- 1.2.4 Cost of Quality -- 1.3 Quality Planning -- 1.3.1 Planning Process Overview -- 1.3.2 Considerations in Quality Planning -- 1.3.3 Quality-planning Guideline (APQP) -- 1.3.4 Service Quality Planning -- Summary -- Exercises -- References -- 2 Strategy Development for Quality -- 2.1 Strategic Management -- 2.1.1 Overview of Strategic Management -- 2.1.2 Hoshin Planning Management -- 2.1.3 Implementation Considerations -- 2.2 Risk Management and Analysis -- 2.2.1 Risk Management Overview -- 2.2.2 Risks and Treatments -- 2.2.3 Risk Evaluation -- 2.2.4 Event Tree, Fault Tree, and Bowtie Analysis -- 2.3 Pull and Push Strategies -- 2.3.1 Pull or Push -- 2.3.2 Innovation-push -- 2.3.3 Challenges to Pull and Push -- Summary -- Exercises -- References -- 3 Customer-centric Planning -- 3.1 Goal: Design for Customer -- 3.1.1 Customer-driven Development -- 3.1.2 Product/Process Characteristics -- 3.2 Quality Category to Customer -- 3.2.1 Must-be Quality and Attractive Quality -- 3.2.2 Kano Model -- 3.3 Quality Function Deployment -- 3.3.1 Principle of QFD -- 3.3.2 QFD Applications -- 3.3.3 More Discussion of QFD -- 3.4 Affective Engineering -- 3.4.1 Introduction to Affective Engineering -- 3.4.2 Discussion of AE -- 3.4.3 Applications of AE -- Summary -- Exercises -- References -- 4 Quality Assurance by Design -- 4.1 Design Review Process -- 4.1.1 Introduction to Design Review -- 4.1.2 Design Review Based on Failure Mode…”
    Libro electrónico
  8. 5028
  9. 5029
    Libro
  10. 5030
    991004772659706719
  11. 5031
    por Pokam Kamdem, Williams
    Publicado 2021
    Tabla de Contenidos: “…De la privatisation de la SONEL à l'avènement d'AES SONEL : les premières tensions -- 2. Vers un nouveau rôle de l'État dans le secteur de l'électricité au Cameroun ? …”
    Libro electrónico
  12. 5032
    Publicado 2011
    Tabla de Contenidos: “…Un poco de historiaUna definición científica; Eje estructural: las 4 motivaciones fundamentales; Eje procesal: El Análisis Existencial Personal (AEP); Fenomenología; Psicopatología y Psicoterapia; Métodos del AE; Investigación; Conclusión; Difusión en América Latina; Bibliografía; Capítulo 5 Las ideas de Binswanger; Ubicación histórica de Binswanger; Ideas fundamentales de su Daseinanálisis; Ser-en-el-mundo y ser-más-allá-del-mundo; Temporalidad y espacialidad; Los modos de ser; Lenguaje; Aportes a la terapia; Aspectos de la terapéutica rispiana; Ubicación histórica; Los modos de ser…”
    Libro electrónico
  13. 5033
    Publicado 2021
    Tabla de Contenidos: “…REDES DE FEISTEL -- DES Y AES -- MODOS DE OPERACIÓN -- LECTURAS SUGERIDAS -- TEST DE AUTOEVALUACIÓN -- 3. …”
    Libro electrónico
  14. 5034
    Publicado 1993
    Tabla de Contenidos: “…BARRIER FILMS; 6.1 Introduction; 6.2 Characteristics of Barrier Films; 6.3 Types of Barrier Films; 6.4 Processing Barrier Films; 6.5 Examples of Barrier Films; 6.6 Summary; Acknowledgments; References; APPENDIX: TECHNIQUE SUMMARIES; 1 Auger Electron Spectroscopy (AES); 2 Ballistic Electron Emission Microscopy (BEEM); 3 Capacitance-Voltage (C-V) Measurements; 4 Deep Level Transient Spectroscopy (DLTS); 5 Dynamic Secondary Ion Mass Spectrometry (Dynamic SIMS); 6 Electron Beam Induced Current (EBIC) Microscopy; 7 Energy-Dispersive X-Ray Spectroscopy (EDS)…”
    Libro electrónico
  15. 5035
    por Narayanan, Sudheesh
    Publicado 2013
    Tabla de Contenidos: “…-- Kerberos advantages -- The Hadoop default security model with Kerberos -- Hadoop Kerberos security implementation -- User-level access controls -- Service-level access controls -- User and service authentication -- Delegation Token -- Job Token -- Block Access Token -- Summary -- Chapter 3: Setting up a Secured Hadoop Cluster -- Prerequisites -- Setting up Kerberos -- Installing the Key Distribution Center -- Configuring the Key Distribution Center -- Establishing the KDC database -- Setting up the administrator principal for KDC -- Starting the Kerberos daemons -- Setting up the first Kerberos administrator -- Adding the user or service principals -- Configuring LDAP as the Kerberos database -- Supporting AES-256 encryption for a Kerberos ticket -- Configuring Hadoop with Kerberos authentication -- Setting up the Kerberos client on all the Hadoop nodes -- Setting up the Hadoop service principals -- Creating a keytab file for the Hadoop services -- Distributing the keytab file for all slaves -- Setting up the Hadoop configuration files -- HDFS-related configurations -- MRV1-related configurations -- MRV2-related configurations -- Setting up secured DataNode -- Setting up the TaskController class -- Configuring users for Hadoop -- Automation of secured Hadoop deployment -- Summary -- Chapter 4: Securing the Hadoop Ecosystem -- Configuring Kerberos for Hadoop ecosystem components -- Securing Hive…”
    Libro electrónico
  16. 5036
    Publicado 2017
    Tabla de Contenidos: “…Review QuestionsChapter 3 Encryption Ciphers and Methods; Encryption Basics; Symmetric and Asymmetric Algorithms; Stream and Block Ciphers; RC4/ARC4; RC5; DES; 3DES; AES; WLAN Encryption Methods; WEP; WEP MPDU; TKIP; TKIP MPDU; CCMP; CCMP MPDU; WPA/WPA2; Future Encryption Methods; Proprietary Layer 2 Implementations; Summary; Exam Essentials; Review Questions; Chapter 4 802.1X/EAP Authentication; WLAN Authentication Overview; AAA; Authentication; Authorization; Accounting; 802.1X; Supplicant; Authenticator; Authentication Server; Supplicant Credentials; Usernames and Passwords…”
    Libro electrónico
  17. 5037
    por Dwivedi, Himanshu
    Publicado 2008
    Tabla de Contenidos: “…SRTP and Media Protection with AES Cipher…”
    Libro electrónico
  18. 5038
    por Coleman, David D.
    Publicado 2012
    Tabla de Contenidos: “…802.11b802.11a; 802.11g; 802.11d; 802.11h; 802.11i; 802.11j; 802.11e; Post 2007 Ratified Amendments; 802.11r-2008; 802.11k-2008; 802.11y-2008; 802.11w-2009; 802.11n-2009; 802.11z-2010; 802.11u-2011; 802.11v-2011; 802.11s-2011; IEEE 802.11 Draft Amendments; 802.11p; 802.11aa; 802.11ac; 802.11ad; 802.11ae; 802.11af; 802.11ah; Defunct Amendments; 802.11F; 802.11T; 802.11m Task Group; Summary; Exam Essentials; Review Questions; Chapter 6 Wireless Networks and Spread Spectrum Technologies; Industrial, Scientific, and Medical Bands; 900 MHz ISM Band; 2.4 GHz ISM Band; 5.8 GHz ISM Band…”
    Libro electrónico
  19. 5039
    Publicado 2010
    Tabla de Contenidos: “…SSID SegmentationSSID Cloaking; Summary; Exam Essentials; Key Terms; Review Questions; Answers to Review Questions; Chapter 3: Encryption Ciphers and Methods; Encryption Basics; AES; WLAN Encryption Methods; WEP; TKIP; CCMP; WPA/WPA2; Proprietary Layer 2 Implementations; Summary; Exam Essentials; Key Terms; Review Questions; Answers to Review Questions; Chapter 4: Enterprise 802.11 Layer 2 Authentication Methods; WLAN Authentication Overview; AAA; 802.1X; Supplicant Credentials; Authentication Server Credentials; Shared Secret; Legacy Authentication Protocols; EAP; Summary; Exam Essentials…”
    Libro electrónico
  20. 5040
    por Arturo Pérez-Reverte
    Publicado 2017
    Texto completo en Odilo
    Otros