Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,081
- Biblia 1,868
- Derecho canónico 1,550
- Teología dogmática 1,436
- Teología 1,414
- Iglesia Católica 1,192
- Padres de la Iglesia 920
- Crítica e interpretación 881
- Moral cristiana 845
- Església Catòlica 790
- Filosofía 704
- Development 673
- Bíblia 623
- Application software 614
- Història 549
- Liturgia 528
- Teologia 489
- Engineering & Applied Sciences 484
- Pontificia Università Lateranense (Vaticano) 480
- Tomás de Aquino 462
- Patrística 422
- Computer programs 409
- Litúrgia 397
- Teología moral 389
- -Historia 385
- Obras anteriores a 1800 373
- Design 369
- History 352
- Obres anteriors al 1800 342
- Programming 321
-
63941por Bedoya, HernandoTabla de Contenidos: “…5.4.1 Constraint options -- 5.4.2 View options -- 5.4.3 Journal options -- 5.4.4 Journal receiver options -- 5.5 Creating a Database Navigator map -- 5.5.1 Adding new objects to a map -- 5.5.2 Changing the objects to include in a map -- 5.5.3 Changing object placement and arranging objects in a map -- 5.5.4 Creating a user-defined relationship -- 5.6 The Database Navigator map icons -- Chapter 6. …”
Publicado 2004
Libro electrónico -
63942Publicado 2001Tabla de Contenidos: “…Time-of-Check, Time-of-Use -- Broken passwd -- Avoiding TOCTOU Problems -- Secure File Access -- Temporary Files -- File Locking -- Other Race Conditions -- Conclusion -- 10 Randomness and Determinism -- Pseudo-random Number Generators -- Examples of PRNGs -- The Blum-Blum-Shub PRNG -- The Tiny PRNG -- Attacks Against PRNGs -- How to Cheat in On-line Gambling -- Statistical Tests on PRNGs -- Entropy Gathering and Estimation -- Hardware Solutions -- Software Solutions -- Poor Entropy Collection: How to Read "Secret" Netscape Messages -- Handling Entropy -- Practical Sources of Randomness -- Tiny -- Random Numbers for Windows -- Random Numbers for Linux -- Random Numbers in Java -- Conclusion -- 11 Applying Cryptography -- General Recommendations -- Developers Are Not Cryptographers -- Data Integrity -- Export Laws -- Common Cryptographic Libraries -- Cryptlib -- OpenSSL -- Crypto++ -- BSAFE -- Cryptix -- Programming with Cryptography -- Encryption -- Hashing -- Public Key Encryption -- Threading -- Cookie Encryption -- More Uses for Cryptographic Hashes -- SSL and TLS (Transport Layer Security) -- Stunnel -- One-Time Pads -- Conclusion -- 12 Trust Management and Input Validation -- A Few Words on Trust -- Examples of Misplaced Trust -- Trust Is Transitive -- Protection from Hostile Callers -- Invoking Other Programs Safely -- Problems from the Web -- Client-side Security -- Perl Problems -- Format String Attacks -- Automatically Detecting Input Problems -- Conclusion -- 13 Password Authentication -- Password Storage -- Adding Users to a Password Database -- Password Authentication -- Password Selection -- More Advice -- Throwing Dice -- Passphrases -- Application-Selected Passwords -- One-Time Passwords -- Conclusion -- 14 Database Security -- The Basics -- Access Control -- Using Views for Access Control -- Field Protection…”
Libro electrónico -
63943por Kumar, VijayTabla de Contenidos: “…2.13 Interest Groups Discussion -- Mode 3: Know People -- Know People: Mindsets -- Observing Everything -- Building Empathy -- Immersing in Daily Life -- Listening Openly -- Looking for Problems and Needs -- Know People: Methods -- 3.1 Research Participant Map -- 3.2 Research Planning Survey -- 3.3 User Research Plan -- 3.4 Five Human Factors -- 3.5 POEMS -- 3.6 Field Visit -- 3.7 Video Ethnography -- 3.8 Ethnographic Interview -- 3.9 User Pictures Interview -- 3.10 Cultural Artifacts -- 3.11 Image Sorting -- 3.12 Experience Simulation -- 3.13 Field Activity -- 3.14 Remote Research -- 3.15 User Observations Database -- Mode 4: Frame Insights -- Frame Insights: Mindsets -- Exploring Systems -- Looking for Patterns -- Constructing Overviews -- Identifying Opportunities -- Developing Guiding Principles -- Frame Insights: Methods -- 4.1 Observations to Insights -- 4.2 Insights Sorting -- 4.3 User Observation Database Queries -- 4.4 User Response Analysis -- 4.5 ERAF Systems Diagram -- 4.6 Descriptive Value Web -- 4.7 Entities Position Map -- 4.8 Venn Diagramming -- 4.9 Tree/Semi-Lattice Diagramming -- 4.10 Symmetric Clustering Matrix -- 4.11 Asymmetric Clustering Matrix -- 4.12 Activity Network -- 4.13 Insights Clustering Matrix -- 4.14 Semantic Profile -- 4.15 User Groups Definition -- 4.16 Compelling Experience Map -- 4.17 User Journey Map -- 4.18 Summary Framework -- 4.19 Design Principles Generation -- 4.20 Analysis Workshop -- Mode 5: Explore Concepts -- Explore Concepts: Mindsets -- Challenging Assumptions -- Standing in the Future -- Exploring Concepts at the Fringes -- Seeking Clearly Added Value -- Narrating Stories about the Future -- Explore Concepts: Methods -- 5.1 Principles to Opportunities -- 5.2 Opportunity Mind Map -- 5.3 Value Hypothesis -- 5.4 Persona Definition -- 5.5 Ideation Session -- 5.6 Concept-Generating Matrix…”
Publicado 2012
Libro electrónico -
63944Publicado 2012Tabla de Contenidos: “…MySQL UNIQUE Constraints -- Unique Indexes -- Primary Key Constraints -- Oracle Primary Key Constraints -- MySQL Primary Key Constraints -- Foreign Key Constraints -- Oracle Foreign Key Constraints -- MySQL Foreign Key Constraints -- CHECK Constraints -- Oracle CHECK Constraints -- MySQL CHECK Constraints -- Trigger Constraints -- Summary -- Mastery Check -- Part II SQL Development -- 6 Creating Users and Structures -- Users -- Oracle Users -- MySQL Users -- Databases -- Oracle Schemas -- MySQL Databases -- Tables -- Oracle Tables -- MySQL Tables -- Indexes -- Oracle Indexes -- MySQL Indexes -- Summary -- Mastery Check -- 7 Modifying Users and Structures -- Users -- Oracle Users -- MySQL Users -- Database -- Sessions -- Enable SQL Tracing -- Enable Conditional Compilation -- Tables -- Data Catalog Table Definitions -- Adding, Modifying, and Dropping Columns -- Dropping Tables -- Indexes -- Oracle Index Maintenance -- MySQL Index Maintenance -- Views -- Oracle Drop Views -- MySQL Drop Views . . . . . -- Summary -- Mastery Check -- 8 Inserting Data -- Insert by Values -- Oracle Insert by Values -- MySQL Insert by Values -- Insert by Queries -- Oracle Insert by Queries -- MySQL Insert by Queries -- Summary -- Mastery Check -- 9 Updating Data -- Update by Values and Queries -- Oracle Update by Values and Queries -- MySQL Update by Values -- Update by Correlated Queries -- Oracle Correlated Queries -- MySQL Correlated Queries -- Summary -- Mastery Check -- 10 Deleting Data -- Delete by Value Matches -- Delete Nested Table Row Elements -- Delete by Correlated Queries -- MySQL Delete by Multiple-Table Statement -- Summary -- Mastery Check -- 11 Querying -- Query Results -- Queries that Return Columns or Results from Columns -- Queries that Aggregate -- Queries that Return Columns or Results Selectively -- Join Results -- Joins that Splice Together Rows…”
Libro electrónico -
63945por Gasston, PeterTabla de Contenidos: “…New Approaches to CSS Layouts -- Multi-columns -- Gaps and Rules -- Spans and Breaks -- Flexbox -- Declaring the Flexbox Model -- Changing the Content Order -- Alignment Inside the Container -- Adding Some Flexibility -- Wrap and Flow -- Grid Layout -- Declaring and Defining the Grid -- Repeating Grid Lines -- Placing Items on the Grid -- Alignment and Stacking -- The September 2012 Grid Layout Syntax -- On the Grid Layout Terminology -- Grid Template -- The Further Future -- Summary -- E. …”
Publicado 2013
Libro electrónico -
63946Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Acknowledgments -- Table of Contents -- Preface -- Chapter 1: Getting Started with Java 11 -- Getting started with Java -- Version numbers -- Installing Java -- Installation on Windows -- Installation on macOS -- Installation on Linux -- Setting JAVA_HOME -- Executing jshell -- Looking at the bytecode -- Packaging classes into a JAR file -- Managing the running Java application -- Using an IDE -- NetBeans -- Eclipse -- IntelliJ -- IDE services -- IDE screen structure -- Editing files -- Managing projects -- Building the code and running it -- Debugging Java -- Summary -- Chapter 2: The First Real Java Program - Sorting Names -- Getting started with sorting -- Bubble sort -- Getting started with project structure and build tools -- Make -- Ant -- Installing Ant -- Using Ant -- Maven -- Installing Maven -- Using Maven -- Gradle -- Installing Gradle -- Setting up the project with Maven -- Coding the sort -- Understanding the algorithm and language constructs -- Blocks -- Variables -- Types -- Arrays -- Expressions -- Loops -- Conditional execution -- Final variables -- Classes -- Inner, nested, local, and anonymous classes -- Packages -- Methods -- Interfaces -- Argument passing -- Fields -- Modifiers -- Object initializers and constructors -- Compiling and running the program -- Summary -- Chapter 3: Optimizing the Sort - Making Code Professional -- The general sorting program -- A brief overview of various sorting algorithms -- Quicksort -- Project structure and build tools -- Maven dependency management -- Coding the sort -- Creating the interfaces -- Creating BubbleSort -- Architectural considerations -- Creating unit tests -- Adding JUnit as a dependency -- Writing the BubbleSortTest class -- Good unit tests -- A good unit test is readable -- Unit tests are fast…”
Libro electrónico -
63947Publicado 2018Tabla de Contenidos: “…Managing packages -- Dependencies -- Bootstrap dependency -- A better Hello World -- Modules -- Components -- Handling events -- Data binding -- One way -- Two way -- Services -- Routes -- routerLinkActive -- Building a project -- Setup and run sample -- Introduction to PrimeNG -- Summary -- Chapter 10: Angular Forms -- Two approaches to forms -- Template-driven forms -- Reactive forms -- Understanding forms with an example -- Building custom forms with validations -- Checking the state of a form -- Forms with NgModel -- Reactive forms -- Setting up forms with FormBuilder -- Adding validations -- Creating a custom validator -- Grouping controls -- Setting and patching values -- Handling forms in Angular -- Gaining more control with reactive forms -- Summary -- Chapter 11: Building a Real-World Application -- Building an Issue Management System frontend -- Setup -- Structuring the project -- Working independently of the backend -- Data models -- Securing the application -- Issue lists and details -- Rendering data with templates -- Injectable service -- Issue creation and updates -- Reactive forms -- Validation -- Issue comments -- Chatting on an issue -- Production-ready build -- Summary -- Chapter 12: Connecting Angular to Java EE Microservices -- Integration with microservices -- Docker - focusing made easy -- Verifying the running services -- Cross Origin Resource Sharing (CORS) -- JSON communication -- Observables in Angular -- Dynamic updates using Observables -- Going to production -- Deploying on the cloud using AWS -- Launching the Amazon EC2 instance -- Installing Docker on Amazon EC2 -- Docker release -- Summary -- Chapter 13: Testing Java EE Services -- Testing strategies for microservices -- Understanding the testing pyramid -- Unit testing -- Integration testing -- End-End testing -- Microservice testing challenges -- Contract testing…”
Libro electrónico -
63948Tabla de Contenidos: “…Chapter 7 Minimizing Service Loss and Data Theft in a Campus Network -- Configuring Static MAC Addresses -- Configuring Switch Port Security -- Verifying Switch Port Security -- Sticky MAC Addresses -- Programming Authentication Methods -- Adding 802.1x Port-Based Authentication -- Mitigating VLAN Hopping: Best Practices -- VLAN Access Maps -- Verifying VLAN Access Maps -- Configuration Example: VLAN Access Maps -- DHCP Snooping -- Verifying DHCP Snooping -- Implementing Dynamic ARP Inspection -- Verifying DAI -- Configuring IP Source Guard -- Understanding Cisco Discovery Protocol Security Issues -- Link Layer Discovery Protocol Configuration -- Configuring the Secure Shell Protocol -- Restricting Management Access with ACLs -- Telnet Sessions -- Web Interface Sessions -- Disabling Unneeded Services -- Securing End-Device Access -- Chapter 8 Accommodating Voice and Video in Campus Networks -- Communications Subsystems -- Configuring and Verifying Voice VLANs -- Power over Ethernet -- High Availability for Voice and Video -- Configuring AutoQoS: 2960/3560/3750 -- Verifying Auto QoS Information: 2960/3560/3750 -- Configuring AutoQoS: 6500 -- Verifying AutoQoS Information: 6500 -- Chapter 9 Integrating Wireless LANs into a Campus Network -- Wireless Roaming and Controllers -- Switch Configuration for Standalone APs and HREAPs -- Switch Configuration for WLC and Controller-Based APs -- Configuration for the LWAP Connection -- Configuration for the WLC Connection -- Switch Configuration for 4400 Series Controllers (EtherChannel) -- The Wireless Services Module -- Configuring Communication Between the Supervisor 720 and Cisco WiSM -- The Initial WiSM Configuration -- Configuration Example: 4402 WLAN Controller Using the Configuration Wizard -- Configuration Example: 4402 WLAN Controller Using the Web Interface…”
Libro electrónico -
63949por Horvath, Joan. authorTabla de Contenidos: “…Moving to metal: The sand-cast process ; Sand-casting terminology ; Patterns made from PLA ; Filling the flask with sand ; Cutting sprues and runners ; Pouring in the metal ; Finishing the sand casting ; Planning ahead for better casting ; Adding draft to patterns ; Avoiding undercuts ; Layer orientation ; Shrinkage and clearances ; Printing your sprues? …”
Publicado 2014
Libro electrónico -
63950Publicado 2022Tabla de Contenidos: “…Conclusion -- Exercises -- References -- Chapter 3: Feed-Forward Neural Networks -- A Short Review of Network's Architecture and Matrix Notation -- Output of Neurons -- A Short Summary of Matrix Dimensions -- Example: Equations for a Network with Three Layers -- Hyper-Parameters in Fully Connected Networks -- A Short Review of the Softmax Activation Function for Multiclass Classifications -- A Brief Digression: Overfitting -- A Practical Example of Overfitting -- Basic Error Analysis -- Implementing a Feed-Forward Neural Network in Keras -- Multiclass Classification with Feed-Forward Neural Networks -- The Zalando Dataset for the Real-World Example -- Modifying Labels for the Softmax Function: One-Hot Encoding -- The Feed-Forward Network Model -- Keras Implementation -- Gradient Descent Variations Performances -- Comparing the Variations -- Examples of Wrong Predictions -- Weight Initialization -- Adding Many Layers Efficiently -- Advantages of Additional Hidden Layers -- Comparing Different Networks -- Tips for Choosing the Right Network -- Estimating the Memory Requirements of Models -- General Formula for the Memory Footprint -- Exercises -- References -- Chapter 4: Regularization -- Complex Networks and Overfitting -- What Is Regularization -- About Network Complexity -- lp Norm -- l2 Regularization -- Theory of l2 Regularization -- Keras Implementation -- l1 Regularization -- Theory of l1 Regularization and Keras Implementation -- Are the Weights Really Going to Zero? …”
Libro electrónico -
63951Publicado 2022Tabla de Contenidos: “…-- Chapter 4: Shifting to a Systemic Perspective -- Chapter 5: Inclusion at the Intersections -- Part 2 Adjusting Cultural Levers -- Chapter 6 Help Wanted-Inclusive Recruiting -- Debiasing the Job Description -- Help Wanted: Highly Qualified Job Ads -- Who Is Seeing You? -- Go In Blind -- Chapter 7 The Best Person for the Job-Merit-Based Hiring -- Debiasing the Interviewing and Scoring Process -- Prepping for the Interview -- During the Interview -- After the Interview -- Testing, Testing -- Chapter 8 It's Who You Know-Protégés and Professional Development -- The Seniority Gap -- Different Mentors, Different Impact -- Matching with Meaning -- Meeting: Quality over Quantity -- Mentoring After #MeToo -- Mentoring Outside Your Circle -- From Mentorship to Sponsorship -- Choosing a Sponsee -- Just One -- Different Inboxes, Different Opportunities -- Networking That Works -- What Gets Measured Matters -- Chapter 9 Exceed Expectations-The Performance Evaluation -- Rate My Professor -- Beyond the Ivory Tower -- What Gets Measured Matters -- Closing the "Open Box" -- What Are the Criteria for Criteria? …”
Libro electrónico -
63952Publicado 2024Tabla de Contenidos: “…Not Finding the Time to Create -- Overcoming the Content Creation Problem -- The Power of Repurposing Content -- Strategies for Repurposing Content with a Fresh Perspective -- Repurposing Other People's Ideas -- Adding Your Unique Spin -- Replaying Your Best Hits -- Reformatting Your Content -- Content Tips for Driving More Engagement -- Chapter 9 Unleashing Your Selling and Marketing Power with Email -- Why You Need an Email List -- Understanding the Customer Buying Journey -- Using Your Email List in the Customer Buying Journey -- Additional Benefits of Email Lists -- How to Build Your Email List -- 1. …”
Libro electrónico -
63953Publicado 2023Tabla de Contenidos: “…Part 2: Configuring and Modifying Linux Systems -- Chapter 6: Basic System Settings -- Overview of basic settings -- The hosts configuration file -- The resolv configuration file -- The network-scripts configuration file -- The dhclient configuration file -- The sysctl configuration file -- Summary -- Chapter 7: User and Group Management -- Overview of managing accounts/groups -- How to add a new account -- Using useradd -- Using adduser -- How to delete an account -- Understanding the/etc/sudoers file -- Switching users -- Managing account passwords -- Locking/unlocking user accounts -- Setting password expiration -- Group management -- Permissions -- Changing groups -- Summary -- Chapter 8: Software Installation and Package Repositories -- Software installation, packages, and dependencies -- Package managers -- Package files -- Inspecting package files -- Inspecting installed packages -- Installing and removing package files -- Package repositories and high-level package managers -- Package repositories -- High-level package managers -- Searching for packages -- System upgrade -- Upgrading a system with YUM or DNF -- Upgrading a system with APT -- Summary -- Further reading -- Chapter 9: Network Configuration and Debugging -- Linux network stack -- Network interfaces and addresses in Linux -- Discovering physical network devices -- Network interface names -- Using the ip command -- Discovering and inspecting logical links -- Viewing and changing Ethernet link MAC addresses -- Viewing and changing IP addresses -- Routes and neighbor tables -- ARP and NDP neighbor tables -- Routes and route tables -- NetworkManager -- Distribution-specific configuration methods -- Debian -- Old Red Hat-based distributions -- Network troubleshooting -- Using ping -- Using traceroute -- Summary -- Chapter 10: Storage Management -- Adding additional storage volumes…”
Libro electrónico -
63954Publicado 2023Tabla de Contenidos: “…Execution policy -- Transcription -- Configuring PowerShell -- Adding modules -- Profiles -- Group Policy -- Using PowerShell -- The PowerShell console -- The Windows PowerShell Integrated Scripting Environment (ISE) -- Windows Terminal -- Microsoft Visual Studio Code -- Desired State Configuration -- Summary -- Chapter 3: Configuration and Customization -- Evolution of WaaS -- Image customization -- Imaging process -- Customizing the image -- Microsoft Autopilot -- BYOD scenarios -- Upgrade expectations -- Security mitigation -- Internet Explorer 11 retired -- Windows Store for Business EOL announced -- Windows 11 Start and taskbar layout -- Audit mode -- Tips -- Virtual Desktop Infrastructure -- SCT -- AppLocker and Windows Defender Application Guard (previously MDAC) -- Microsoft telemetry -- Windows Spotlight -- Mandatory user profiles -- Summary -- Chapter 4: User Account Administration -- Windows account types -- Account privileges -- Local Administrator Password Solution -- Creating policies to control local accounts -- Password policy -- Account lockout policy -- Managing user sign-in options -- Mobile device management security settings -- User Account Control -- Privileged Access Workstation -- Summary -- Chapter 5: Tools to Manage Windows 11 -- RSAT -- Installing the RSAT tools -- Updating the RSAT tools -- Using the RSAT tools -- The Sysinternals tools suite -- Downloading the Sysinternals tools suite -- Introducing the Sysinternals BGInfo tool -- Introducing the Sysinternals PsTools suite -- Summary -- Chapter 6: Device Management -- Evolving business needs -- MDM -- Changes to GPOs in Windows 10/11 -- Enterprise- and Education-only GPOs -- Known issues when upgrading the central policy store -- Known issues with GPPs/GPMC -- Servicing and patching -- Why CUs? …”
Libro electrónico -
63955Nuxt 3 Projects Build Scalable Applications with Nuxt 3 Using TypeScript, Pinia, and Composition APIPublicado 2024Tabla de Contenidos: “…Authentication UI and Validating Inputs -- Installing Required Modules -- Setting Up Auth Pages -- Using Joi for Input Validation -- Setting Up User Authentication with Supabase -- Creating the Signup Function -- Creating and Managing Personal User Posts -- Adding RLS Policy for the 'Posts' Table -- Using Supabase API for Post Management -- Building the Post Information Page -- Displaying User Posts -- Summary -- Practice Questions -- Further Reading -- Chapter 6: Enhancing a Recipe-Sharing Site While Optimizing SEO Using Nuxt 3 -- Technical requirements -- Essential background - Understanding Search Engine Optimization (SEO) -- Exploring the repository -- Defining metadata for each page -- Setting up the project structure -- Setting up site configuration with nuxt SEO -- Overriding metadata -- Implementing structured data for improved search engine rankings -- Creating a recipe node -- Optimizing recipe images to load pages faster -- Creating a custom og:image for the recipe page -- Generating dynamic site maps for the recipe-sharing site -- Summary -- Practice questions -- Further reading -- Chapter 7: Building a Quiz Game Application to Learn about Testing -- Technical requirements -- Exploring the repository -- Essential background - fundamentals of testing -- Implementing the quiz game app -- Questions data -- Types definitions -- Quiz Pinia store -- The app.vue file -- Writing unit tests for the Pinia store -- Exploring Vitest -- Testing the quiz store -- Writing unit tests for components -- Setting up for component testing -- Creating the Question.spec.ts test file -- Writing the component unit test -- Writing end-to-end tests for the quiz game -- Setting up for E2E testing -- Writing E2E tests -- Exploring Vitest UI and test coverage tools -- Summary -- Practice questions -- Further reading…”
Libro electrónico -
63956por Shah, Imdad AliTabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Acknowledgements -- Chapter 1 Cybersecurity Issues and Challenges in Civil Aviation Security -- 1.1 Introduction -- 1.2 Literature Review -- 1.3 Research Methods -- 1.4 Cyber Risk in Aviation -- 1.4.1 Voice (Very High Frequency - VHF) -- 1.4.2 Automatic Dependent Surveillance-Broadcast (ADS-B) -- 1.4.3 Importance of Satellite Navigation (GPS) -- 1.5 Distributed Denial of Service (DDoS) -- 1.5.1 Impact of DDoS on Air Transportation -- 1.6 Discussion -- 1.6.1 Importance of IoT in Civil Aviation -- 1.6.2 Cybersecurity Challenges in Civil Aviation -- 1.7 Conclusion -- 1.8 Future Work -- References -- Chapter 2 Addressing Security Issues and Challenges in Smart Logistics Using Smart Technologies -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Methodology -- 2.4 Evaluation of Logistics and Smart Technologies -- 2.4.1 Connectivity -- 2.4.2 Sensors Collection -- 2.4.3 Data Processing Analysis -- 2.4.4 Automation and Control -- 2.4.5 Remote Monitoring and Management -- 2.5 Transportation Technology's Types -- 2.5.1 Underground Tunneling -- 2.5.2 Aerospace -- 2.5.3 Autonomous Vehicles -- 2.5.4 Last-Mile Robots -- 2.5.5 Electric Vehicles -- 2.6 Transportation Technology in Development -- 2.6.1 Blockchain Technology -- 2.6.2 Autonomous Vehicles -- 2.6.3 Connected Vehicles -- 2.7 Discussion -- 2.8 Conclusion -- 2.9 Future Work -- References -- Chapter 3 Global Navigation Satellite Systems for Logistics: Cybersecurity Issues and Challenges -- 3.1 Introduction -- 3.2 Literature Review -- 3.3 Research Methods -- 3.4 Global Navigation Satellite Systems -- 3.4.1 Types of Global Navigation Satellite Systems -- 3.4.2 Global Positioning System (United States) -- 3.4.3 GLONASS (Russia) -- 3.4.4 Galileo (European Union) -- 3.4.5 BeiDou (China) -- 3.4.6 IRNSS (India)…”
Publicado 2024
Libro electrónico -
63957por Dubois, MathieuTabla de Contenidos: “…Die Desillusion des Euro: Eine Währungsunion ohne wirtschaftliche Konvergenz (1988‐1993) -- Die Veränderung der westdeutschen Verhandlungsposition zur WWU -- Sachzwang ohne Bekenntnis: der Einfluss der Bundesbank -- Deutsche und europäische Einheit: die Beschleunigung der WWU -- Die deutsche Kritik an Maastricht: das Fehlen einer politischen Einheit -- Der Stabilitätspakt: Sachzwang als Grundlage für die Union -- Fazit des Dritten Teils -- Schluss -- Quellenverzeichnis -- Bundesarchiv (Koblenz) -- B 102 Bundesministerium für Wirtschaft -- B 116 Bundesministerium für Ernährung, Landwirtschaft und Forsten -- B 126 Bundesministerium der Finanzen -- B 136 Bundeskanzleramt -- B 213 Bundesministerium für wirtschaftliche Zusammenarbeit und Entwicklung -- B 295 Bundesministerium für Umwelt, Naturschutz und Reaktorsicherheit -- Nachlässe -- Politisches Archiv‐Auswärtiges Amt (Berlin) -- Leitung -- Politische Abteilung -- Wirtschaftsabteilung -- Kulturabteilung -- Europaabteilung -- Zwischenarchiv -- Nachlässe -- Archiv der Christlich‐Demokratischen Partei (ACDP) - Konrad‐Adenauer‐Stiftung (Sankt‐Augustin) -- I‐Nachlässe -- Archiv der Sozialen Demokratie (AdSD) - Friedrich‐Ebert‐Stiftung (Bonn) -- Helmut‐Schmidt‐Archiv (1/HSAA) -- Ludwig‐Erhard‐Archiv (LEA) - Ludwig‐Erhard‐Stiftung (Bonn)…”
Publicado 2024
Libro electrónico -
63958por Hansmeyer, Karl-HeinrichTabla de Contenidos: “…Schlußbemerkungen -- Summary: Quantitative Aspects of Value-Added Tax Harmonization in the EC -- Literaturverzeichnis -- Rolf Caesar, Bochum: Kreditoperationen im Finanzsystem der EG -- A. …”
Publicado 2022
Libro electrónico -
63959Publicado 2023Tabla de Contenidos: “…API Tests from the Trenches -- API Test Examples -- Mixed API/GUI Scenarios -- Chapter 13: Gherkin and Behavior Driven Development -- Behavior Driven Development -- Applying BDD for COTS Integration Projects -- Gherkin Without BDD: Pros and Cons -- Gherkin Language: Readability Above All, If Possible -- Scenario Readability -- Some Good and Bad Examples -- Example 1 -- Example 2 -- Example 3 -- Chapter 14: JIRA with Boozang via XRay -- Using JIRA with XRay -- Xray for Test Automation -- Boozang Integration with XRay -- Importing Features Files -- Pushing Test Results Back to XRay -- Chapter 15: Jenkins and the Boozang Runner -- Continuous Delivery and the Need for Automating Acceptance Tests -- Puppeteer and the Boozang Runner -- How to Use the Docker Runner -- Keeping Execution Time Low with Parallel Runs -- Parallel Execution and Workers Setup -- Boozang Workers Concepts -- Boozang Workers Setup in the Jenkins Pipeline -- Launching the Workers -- Launching the Master -- Reports and Log Files -- Execution Reports -- Log Files and the Log Formatter -- Root Cause Analysis Report -- Publishing Reports on Jenkins and JIRA -- Cucumber Reports -- HTML Reports -- JIRA Reports -- Complete Working Pipeline -- Test Users Setup -- Set Variables -- Define Job Parameters -- Set Build Information -- Execute Smoke Tests -- Launch Boozang Workers and Master -- Aggregate JSON Reports and Log Files -- Download and Execute RCA Script -- Publish Cucumber Reports -- Get Currently Deployed Version -- Import Results into XRay -- HTML Publisher -- Docker in Docker Setup -- Chapter 16: Boozang for Teams -- Team Collaboration -- Explicit Lock -- Concurrent Development and Safe Refactoring with Branches -- Working with Branches -- Using a Feature Branch Approach -- Branch Naming Convention -- Adding a Develop Branch -- Merging Process -- Tests Map -- Quality Control…”
Libro electrónico -
63960Publicado 1994Tabla de Contenidos: “…Alcohol Use and Productivity -- Marijuana Use and Productivity -- Cocaine and Other Drug Use and Productivity -- Demographic Differential Effects -- Variations in Results Across Outcome Measures -- INTERPRETING THE EMPIRICAL RESULTS -- CONCLUSIONS AND RECOMMENDATIONS -- REFERENCES -- III Effectiveness Of Workplace Interventions -- 6 Detecting and Assessing Alcohol and Other Drug Use -- EVOLUTION OF BIOCHEMICAL DRUG TESTING -- BIOCHEMICAL METHODS FOR DETECTING DRUG USE -- Specimen Collection -- Laboratory Methods -- On-Site Testing Facilities -- Adding to the List of Drugs to be Tested -- Accuracy and Interpretation -- INDIRECT METHODS OF ASSESSING ALCOHOL AND OTHER DRUG USE -- Personal Profiles -- Integrity Tests -- Other Personal Profile Measures -- Summary -- Behavioral Indicators -- Drug Evaluation and Classification Program -- Occupational Alcoholism and Employee Assistance Programs -- CONCLUSIONS AND RECOMMENDATIONS -- REFERENCES -- 7 Impact of Drug-Testing Programs on Productivity -- TYPES AND USES OF DRUG-TESTING PROGRAMS -- IMPACT OF DRUG-TESTING PROGRAMS -- Preemployment Drug Testing -- For-Cause Testing -- Random Drug Testing -- Workplace Drug Testing and Productivity -- CONCEPTUAL INCONGRUITIES IN RESEARCH METHODS -- Conceptual Issues -- Cost-Effectiveness of Drug-Testing Programs -- EFFECTS OF DRUG TESTING ON ATTITUDES AND MORALE -- Influence of Job Characteristics -- Influence of Program Characteristics -- Limitations of Research on Reactions to Drug Testing -- CONCLUSIONS AND RECOMMENDATIONS -- REFERENCES -- 8 Employee Assistance Programs -- PREVENTION ACTIVITIES -- Health Promotion and Wellness Programs -- Effects of Interventions on Work-Related Outcome Measures -- EMPLOYEE ASSISTANCE PROGRAMS -- Types of Data Available -- Utilization of Services -- Evidence of Effectiveness -- Specific Activities and Services -- Supervisor Training…”
Libro electrónico