Mostrando 18,781 - 18,800 Resultados de 21,559 Para Buscar '"4:3"', tiempo de consulta: 0.86s Limitar resultados
  1. 18781
    por Laudon, Kenneth
    Publicado 2021
    Tabla de Contenidos: “…-- 4.2 Building an E-commerce Presence: A Systematic Approach -- The Systems Development Life Cycle -- Systems Analysis/Planning: Identify Business Objectives, System Functionality, and Information Requirements -- System Design: Hardware and Software Platforms -- Building the System: In-house Versus Outsourcing -- Insight on Business: OVH Takes E-commerce to the Clouds -- Testing the System -- Implementation, Maintenance, and Optimization -- Alternative Web Development Methodologies -- 4.3 Choosing Software -- Simple versus Multi-tiered Website Architecture -- Web Server Software -- Site Management Tools -- Dynamic Page Generation Tools -- Application Servers -- E-commerce Merchant Server Software Functionality -- Online Catalog -- Shopping Cart -- Credit Card Processing -- Merchant Server Software Packages (E-commerce Software Platforms) -- Choosing an E-commerce Software Platform -- 4.4 Choosing Hardware -- Right-Sizing Your Hardware Platform: The Demand Side -- Right-Sizing Your Hardware Platform: The Supply Side -- 4.5 Other E-commerce Site Tools -- Website Design: Basic Business Considerations -- Tools for Search Engine Optimization…”
    Libro electrónico
  2. 18782
    por Jill Kirsten Robinson
    Publicado 2021
    Tabla de Contenidos: “…-- Study Guide -- Key Terms -- Key Equations -- Practice Test -- Conceptual Problems -- Section Problems -- Multiconcept Problems -- 4 Reactions in Aqueous Solution -- 4.1 Solution Concentration: Molarity -- 4.2 Diluting Concentrated Solutions -- 4.3 Electrolytes in Aqueous Solution -- 4.4 Types of Chemical Reactions in Aqueous Solution -- 4.5 Aqueous Reactions and Net Ionic Equations -- 4.6 Precipitation Reactions and Solubility Guidelines -- 4.7 Acids, Bases, and Neutralization Reactions -- 4.8 Solution Stoichiometry -- 4.9 Measuring the Concentration of a Solution: Titration -- 4.10 Oxidation-Reduction (Redox) Reactions -- 4.11 Identifying Redox Reactions -- 4.12 The Activity Series of the Elements -- 4.13 Redox Titrations -- 4.14 Some Applications of Redox Reactions -- INQUIRY? …”
    Libro electrónico
  3. 18783
    Publicado 2019
    Tabla de Contenidos: “…Epithelial Tissue Covers Body Surfaces, Lines Cavities, and Forms Glands -- 4.3. Connective Tissue is the Most Abundant and Widely Distributed Tissue in the Body -- 4.4. …”
    Libro electrónico
  4. 18784
    Publicado 2019
    Tabla de Contenidos: “…3.7 Changes of State -- CHEMISTRY LINK TO HEALTH: Steam Burns -- CLINICAL UPDATE: A Diet and Exercise Program -- Concept Map -- Chapter Review -- Key Terms -- Core Chemistry Skills -- Understanding the Concepts -- Additional Practice Problems -- Challenge Problems -- Answers -- COMBINING IDEAS from Chapters 1 to 3 -- Chapter 4 Atoms and Elements -- CAREER Farmer -- CLINICAL UPDATE Improving Crop Production -- 4.1 Elements and Symbols -- CHEMISTRY LINK TO HEALTH: Toxicity of Mercury -- 4.2 The Periodic Table -- CHEMISTRY LINK TO HEALTH: Elements Essential to Health -- 4.3 The Atom -- 4.4 Atomic Number and Mass Number -- CHEMISTRY LINK TO THE ENVIRONMENT: Many Forms of Carbon -- 4.5 Isotopes and Atomic Mass -- 4.6 Electron Energy Levels -- CHEMISTRY LINK TO HEALTH: Biological Reactions to UV Light -- 4.7 Trends in Periodic Properties -- CLINICAL UPDATE: Improving Crop Production -- Concept Map -- Chapter Review -- Key Terms -- Core Chemistry Skills -- Understanding the Concepts -- Additional Practice Problems -- Challenge Problems -- Answers -- Chapter 5 Nuclear Chemistry -- CAREER Radiation Technologist -- CLINICAL UPDATE Cardiac Imaging Using a Radioisotope -- 5.1 Natural Radioactivity -- 5.2 Nuclear Reactions -- CHEMISTRY LINK TO HEALTH: Radon in Our Homes -- 5.3 Radiation Measurement -- CHEMISTRY LINK TO HEALTH: Radiation and Food -- 5.4 Half‐Life of a Radioisotope -- CHEMISTRY LINK TO THE ENVIRONMENT: Dating Ancient Objects -- 5.5 Medical Applications Using Radioactivity -- CHEMISTRY LINK TO HEALTH: Brachytherapy -- 5.6 Nuclear Fission and Fusion -- CHEMISTRY LINK TO THE ENVIRONMENT: Nuclear Power Plants -- CLINICAL UPDATE: Cardiac Imaging Using a Radioisotope -- Concept Map -- Chapter Review -- Key Terms -- Core Chemistry Skills -- Understanding the Concepts -- Additional Practice Problems -- Challenge Problems -- Answers…”
    Libro electrónico
  5. 18785
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  6. 18786
    Publicado 2019
    Tabla de Contenidos: “…-- Units of Energy -- 3.9 Energy and Chemical and Physical Change -- 3.10 Temperature: Random Motion of Molecules and Atoms -- 3.11 Temperature Changes: Heat Capacity -- EVERYDAY CHEMISTRY: Coolers, Camping, and the Heat Capacity of Water -- 3.12 Energy and Heat Capacity Calculations -- Self-Assessment Quiz -- Key Terms -- Exercises -- Answers to Skillbuilder Exercises -- Answers to Conceptual Checkpoints -- 4 Atoms and Elements -- 4.1 Experiencing Atoms at Tiburon -- 4.2 Indivisible: The Atomic Theory -- 4.3 The Nuclear Atom -- 4.4 The Properties of Protons, Neutrons, and Electrons -- EVERYDAY CHEMISTRY: Solid Matter? …”
    Libro electrónico
  7. 18787
    Publicado 2016
    Tabla de Contenidos: “…Methods That Return a Boolean Value -- The Methods equals and toString -- Recursive Methods -- TIP: Testing Methods -- 4.2 INFORMATION HIDING AND ENCAPSULATION -- public and private Modifiers -- Example: Yet Another Date Class -- Accessor and Mutator Methods -- TIP: A Class Has Access to Private Members of All Objects of the Class -- TIP: Mutator Methods Can Return a Boolean Value -- Preconditions and Postconditions -- 4.3 OVERLOADING -- Rules for Overloading -- PITFALL: Overloading and Automatic Type Conversion -- PITFALL: You Cannot Overload Based on the Type Returned -- 4.4 CONSTRUCTORS -- Constructor Definitions -- TIP: You Can Invoke Another Method in a Constructor -- TIP: A Constructor Has a this Parameter -- TIP: Include a No-Argument Constructor -- Example: The Final Date Class -- Default Variable Initializations -- An Alternative Way to Initialize Instance Variables -- Example: A Pet Record Class -- The StringTokenizer Class -- Chapter Summary -- Answers to Self-Test Exercises -- Programming Projects -- Chapter 5 Defining Classes II -- 5.1 STATIC METHODS AND STATIC VARIABLES -- Static Methods -- PITFALL: Invoking a Nonstatic Method Within a Static Method -- TIP: You Can Put a main in Any Class -- Static Variables -- The Math Class -- Wrapper Classes -- Automatic Boxing and Unboxing -- Static Methods in Wrapper Classes -- PITFALL: A Wrapper Class Does Not Have a No-Argument Constructor -- 5.2 REFERENCES AND CLASS PARAMETERS -- Variables and Memory -- References -- Class Parameters -- PITFALL: Use of = and == with Variables of a Class Type -- The Constant null -- PITFALL: Null Pointer Exception -- The new Operator and Anonymous Objects -- Example: Another Approach to Keyboard Input -- TIP: Use Static Imports -- 5.3 USING AND MISUSING REFERENCES -- Example: A Person Class -- PITFALL: null Can Be an Argument to a Method -- Copy Constructors…”
    Libro electrónico
  8. 18788
    Publicado 2015
    Tabla de Contenidos: “…4.2 Finding Patterns: The Periodic Law and the Periodic Table -- 4.3 Electron Configurations: How Electrons Occupy Orbitals -- Electron Spin and the Pauli Exclusion Principle -- Sublevel Energy Splitting in Multi-electron Atoms -- Electron Configurations for Multi-electron Atoms -- 4.4 Electron Configurations, Valence Electrons, and the Periodic Table -- Orbital Blocks in the Periodic Table -- Writing an Electron Configuration for an Element from Its Position in the Periodic Table -- The Transition and Inner Transition Elements -- 4.5 How the Electron Configuration of an Element Relates to Its Properties -- Metals and Nonmetals -- Families of Elements -- The Formation of Ions -- 4.6 Periodic Trends in the Size of Atoms and Effective Nuclear Charge -- Effective Nuclear Charge -- Atomic Radii and the Transition Elements -- 4.7 Ions: Electron Configurations, Magnetic Properties, Ionic Radii, and Ionization Energy -- Electron Configurations and Magnetic Properties of Ions -- Ionic Radii -- Ionization Energy -- Trends in First Ionization Energy -- Exceptions to Trends in First Ionization Energy -- Trends in Second and Successive Ionization Energies -- 4.8 Electron Affinities and Metallic Character -- Electron Affinity -- Metallic Character -- REVIEW -- Self-Assessment Quiz -- Key Learning Outcomes -- Key Terms -- Key Concepts -- Key Equations and Relationships -- EXERCISES -- Review Questions -- Problems by Topic -- Cumulative Problems -- Challenge Problems -- Conceptual Problems -- Answers to Conceptual Connections -- 5 Molecules and Compounds -- 5.1 Hydrogen, Oxygen, and Water -- 5.2 Types of Chemical Bonds -- 5.3 Representing Compounds: Chemical Formulas and Molecular Models -- Types of Chemical Formulas -- Molecular Models -- 5.4 The Lewis Model: Representing Valence Electrons with Dots -- 5.5 Ionic Bonding: The Lewis Model and Lattice Energies…”
    Libro electrónico
  9. 18789
    Publicado 2019
    Tabla de Contenidos: “…3.16 Evolution Connection Lactose tolerance is a recent event in human evolution -- Chapter Review -- 4 A Tour of the cell -- Introduction to the Cell -- 4.1 Microscopes reveal the world of the cell -- 4.2 The small size of cells relates to the need to exchange materials across the plasma membrane -- 4.3 Prokaryotic cells are structurally simpler than eukaryotic cells -- 4.4 Eukaryotic cells are partitioned into functional compartments -- The Nucleus and Ribosomes -- 4.5 The nucleus contains the cell's genetic instructions -- 4.6 Ribosomes make proteins for use in the cell and for export -- The Endomembrane System -- 4.7 Many organelles are connected in the endomembrane system -- 4.8 The endoplasmic reticulum is a biosynthetic workshop -- 4.9 The Golgi apparatus modifies, sorts, and ships cell products -- 4.10 Lysosomes are digestive compartments within a cell -- 4.11 Vacuoles function in the general maintenance of the cell -- Energy-Converting Organelles -- 4.13 Mitochondria harvest chemical energy from food -- 4.14 A review of the structures involved in manufacturing and breakdown -- 4.15 Evolution Connection Chloroplasts convert solar energy to chemical energy -- 4.16 Mitochondria and chloroplasts evolved by endosymbiosis -- The Cytoskeleton and Cell Surfaces -- 4.16 The cell's internal skeleton helps organize its structure and activities -- 4.17 Scientific Thinking Scientists discovered the cytoskeleton using the tools of biochemistry and microscopy -- 4.18 Cilia and flagella move when microtubules bend -- 4.19 The extracellular matrix of animal cells functions in support and regulation -- 4.20 Three types of cell junctions are found in animal tissues -- 4.21 Cell walls enclose and support plant cells -- 4.22 Review: Eukaryotic cell structures can be grouped on the basis of four main functions -- Chapter Review -- 5 The Working Cell…”
    Libro electrónico
  10. 18790
    Publicado 2016
    Tabla de Contenidos: “…General Problems -- Search and Learn -- Chapter 4: Dynamics: Newton's Laws of Motion -- 4-1 Force -- 4-2 Newton's First Law of Motion -- Inertial Reference Frames -- 4-3 Mass -- 4-4 Newton's Second Law of Motion -- 4-5 Newton's Third Law of Motion -- 4-6 Weight-the Force of Gravity -- and the Normal Force -- 4-7 Solving Problems with Newton's Laws: Free-Body Diagrams -- Tension in a Flexible Cord -- 4-8 Problems Involving Friction, Inclines -- Friction -- Inclines -- Summary -- Questions -- MisConceptual Questions -- Problems -- General Problems -- Search and Learn -- Chapter 5: Circular Motion -- Gravitation -- 5-1 Kinematics of Uniform Circular Motion -- 5-2 Dynamics of Uniform Circular Motion -- 5-3 Highway Curves: Banked and Unbanked -- 5-4 Non uniform Circular Motion -- 5-5 Newton's Law of Universal Gravitation -- 5-6 Gravity Near the Earth's Surface -- 5-7 Satellites and "Weightlessness" -- Satellite Motion -- Weightlessness -- 5-8 Planets, Kepler's Laws, and Newton's Synthesis -- Kepler's Laws -- Kepler's Third Law Derived, Sun's Mass, Perturbations -- Other Centers for Kepler's Laws -- Distant Planetary Systems -- Newton's Synthesis -- Sun/Earth Reference Frames -- 5-9 Moon Rises an Hour Later Each Day -- 5-10 Types of Forces in Nature -- Summary -- Questions -- MisConceptual Questions -- Problems -- General Problems -- Search and Learn -- Chapter 6: Work and Energy -- 6-1 Work Done by a Constant Force -- 6-2 Work Done by a Varying Force -- 6-3 Kinetic Energy, and the Work-Energy Principle -- 6-4 Potential Energy -- Gravitational Potential Energy -- Potential Energy Defined in General -- Potential Energy of Elastic Spring -- Potential Energy as Stored Energy -- 6-5 Conservative and Nonconservative Forces -- Work-Energy Extended -- 6-6 Mechanical Energy and Its Conservation -- 6-7 Problem Solving Using Conservation of Mechanical Energy…”
    Libro electrónico
  11. 18791
    Publicado 2017
    Tabla de Contenidos: “…Chapter 4 Feedback Control System Characteristics -- 4.1 Introduction -- 4.2 Error Signal Analysis -- 4.3 Sensitivity of Control Systems to Parameter Variations -- 4.4 Disturbance Signals in a Feedback Control System -- 4.5 Control of the Transient Response -- 4.6 Steady-State Error -- 4.7 The Cost of Feedback -- 4.8 Design Examples -- 4.9 Control System Characteristics Using Control Design Software -- 4.10 Sequential Design Example: Disk Drive Read System -- 4.11 Summary -- Skills Check -- Exercises -- Problems -- Advanced Problems -- Design Problems -- Computer Problems -- Terms and Concepts -- Chapter 5 The Performance of Feedback Control Systems -- 5.1 Introduction -- 5.2 Test Input Signals -- 5.3 Performance of Second-Order Systems -- 5.4 Effects of a Third Pole and a Zero on the Second-Order System Response -- 5.5 The s-Plane Root Location and the Transient Response -- 5.6 The Steady-State Error of Feedback Control Systems -- 5.7 Performance Indices -- 5.8 The Simplification of Linear Systems -- 5.9 Design Examples -- 5.10 System Performance Using Control Design Software -- 5.11 Sequential Design Example: Disk Drive Read System -- 5.12 Summary -- Skills Check -- Exercises -- Problems -- Advanced Problems -- Design Problems -- Computer Problems -- Terms and Concepts -- Chapter 6 The Stability of Linear Feedback Systems -- 6.1 The Concept of Stability -- 6.2 The Routh-Hurwitz Stability Criterion -- 6.3 The Relative Stability of Feedback Control Systems -- 6.4 The Stability of State Variable Systems -- 6.5 Design Examples -- 6.6 System Stability Using Control Design Software -- 6.7 Sequential Design Example: Disk Drive Read System -- 6.8 Summary -- Skills Check -- Exercises -- Problems -- Advanced Problems -- Design Problems -- Computer Problems -- Terms and Concepts -- Chapter 7 The Root Locus Method -- 7.1 Introduction…”
    Libro electrónico
  12. 18792
    Publicado 2024
    Tabla de Contenidos: “…Domain Registration Monitoring -- Summary -- Exam Essentials -- Written Labs -- Written Lab 3.1: Configure Logging for DNS Queries -- Written Lab 3.2: View DNS Query Metrics for a Public Hosted Zone in the CloudWatch Console -- Review Questions -- Chapter 4 Load Balancing -- Elastic Load Balancing -- Network Load Balancing -- Application Load Balancing -- Gateway Load Balancing -- Classic Load Balancing -- Network Design -- High Availability -- Security -- ELB Connectivity Patterns -- Internal Load Balancers -- External Load Balancers -- Autoscaling -- AWS Service Integrations -- Config -- Global Accelerator -- CloudFront -- Traffic Mirroring -- VPC Endpoint Services (PrivateLink) -- Web Application Firewall -- Route 53 -- Amazon Elastic Kubernetes Service -- AWS Certificate Manager -- ELB Configuration Options -- Proxy Protocol -- X-Forwarded-For Protocol -- Cross-Zone Load Balancing -- Session Affinity and Sticky Sessions -- Target Groups -- Routing -- Target Types -- IP Address Type -- Protocol Version -- Registered Targets -- Routing Algorithms -- Deregistration and Connection Draining -- Deletion Protection -- Health Checking -- Slow Start -- The GENEVE Protocol -- Encryption and Authentication -- SSL/TLS Offload -- TLS Passthrough -- Summary -- Exam Essentials -- Exercises -- Written Labs -- Written Lab 4.1: Create a Network Load Balancer -- Written Lab 4.2: Use the Console to Enable Deletion Protection -- Written Lab 4.3: Use the Console to Disable Deletion Protection -- Written Lab 4.4: Enable Application-Based Stickiness -- Review Questions -- Chapter 5 Logging and Monitoring -- CloudWatch -- Metrics -- Monitoring Categories -- Agents -- Logging -- Alarms -- Metric Insights -- Dashboards -- Transit Gateway Network Manager -- VPC Reachability Analyzer -- Access Logs -- Elastic Load Balancing -- Route 53 Logs -- CloudFront Logs…”
    Libro electrónico
  13. 18793
    por Berk, Jonathan
    Publicado 2022
    Tabla de Contenidos: “…Applying the Rules of Valuing Cash Flows to a Cash Flow Stream -- Using a Financial Calculator: Solving for Present and Future Values of Cash Flow Streams -- 4.2 Perpetuities -- Perpetuities -- Historical Examples of Perpetuities -- Common Mistake Discounting One Too Many Times -- 4.3 Annuities -- Present Value of an Annuity -- Future Value of an Annuity -- 4.4 Growing Cash Flows -- Growing Perpetuity -- Growing Annuity -- 4.5 Solving for Variables Other Than Present Value or Future Value -- Solving for the Cash Flows -- Rate of Return -- Solving for the Number of Periods -- 4.6 Non-Annual Cash Flows -- The Big Picture -- Summary -- Critical Thinking -- Problems -- Data Case -- Chapter 4 Appendix Using a Financial Calculator -- Chapter 5. …”
    Libro electrónico
  14. 18794
    Publicado 2022
    Tabla de Contenidos: “…Metal Alloys: Their Structure and Strengthening by Heat Treatment -- 4.1 Introduction -- 4.2 Structure of Alloys -- 4.3 Phase Diagrams -- 4.4 The Iron-Carbon System -- 4.5 The Iron-Iron-carbide Phase Diagram and the Development of Microstructures in Steels -- 4.6 Cast Irons -- 4.7 Heat Treatment of Ferrous Alloys -- 4.8 Hardenability of Ferrous Alloys -- 4.9 Heat Treatment of Nonferrous Alloys and Stainless Steels -- 4.10 Case Hardening -- 4.11 Annealing -- 4.12 Heat Treating Furnaces and Equipment -- 4.13 Design Considerations for Heat Treating -- Summary -- Key Terms -- Bibliography -- Review Questions -- Qualitative Problems -- Quantitative Problems -- Synthesis, Design, and Projects -- Chapter 5. …”
    Libro electrónico
  15. 18795
    Publicado 2023
    Tabla de Contenidos: “…Polynomial and Rational Functions -- 4.1 Polynomial Functions -- Identify Polynomial Functions and Their Degree -- Graph Polynomial Functions Using Transformations -- Identify the Real Zeros of a Polynomial Function and Their Multiplicity -- 4.2 Graphing Polynomial Functions -- Models -- Graph a Polynomial Function -- Graph a Polynomial Function Using a Graphing Utility -- Build Cubic Models from Data -- 4.3 Properties of Rational Functions -- Find the Domain of a Rational Function -- Find the Vertical Asymptotes of a Rational Function -- Find a Horizontal or an Oblique Asymptote of a Rational Function -- 4.4 The Graph of a Rational Function -- Graph a Rational Function -- Solve Applied Problems Involving Rational Functions -- 4.5 Polynomial and Rational Inequalities -- Solve Polynomial Inequalities -- Solve Rational Inequalities -- 4.6 The Real Zeros of a Polynomial Function -- Use the Remainder and Factor Theorems -- Use Descartes' Rule of Signs to Determine the Number of Positive and the Number of Negative Real Zeros of a Polynomial Function -- Use the Rational Zeros Theorem to List the Potential Rational Zeros of a Polynomial Function -- Find the Real Zeros of a Polynomial Function -- Solve Polynomial Equations -- Use the Theorem for Bounds on Zeros -- Use the Intermediate Value Theorem -- 4.7 Complex Zeros -- Fundamental Theorem of Algebra -- Use the Conjugate Pairs Theorem…”
    Libro electrónico
  16. 18796
    Publicado 2022
    Tabla de Contenidos: “…The Study Of Chemical Reactions -- 4-1 Introduction -- 4-2 Chlorination of Methane -- 4-3 The Free-Radical Chain Reaction -- 4-4 Equilibrium Constants and Free Energy -- 4-5 Enthalpy and Entropy -- 4-6 Bond-Dissociation Enthalpies -- 4-7 Enthalpy Changes in Chlorination -- 4-8 Kinetics and the Rate Equation -- 4-9 Activation Energy and the Temperature Dependence of Rates -- 4-10 Transition States -- 4-11 Rates of Multistep Reactions -- 4-12 Temperature Dependence of Halogenation -- 4-13 Selectivity in Halogenation -- 4-14 Hammond's Postulate -- Problem-Solving Strategy: Proposing Reaction Mechanisms -- 4-15 Radical Inhibitors -- 4-16 Reactive Intermediates -- Summary: Reactive Intermediates…”
    Libro electrónico
  17. 18797
    por Brooks, Raymond
    Publicado 2022
    Tabla de Contenidos: “…The Time Value of Money (Part 2) -- 4.1 Future Value of Multiple Payment Streams -- 4.2 Future Value of an Annuity Stream -- Future Value of an Annuity: An Application -- 4.3 Present Value of an Annuity -- 4.4 Annuity Due and Perpetuity -- Putting Finance To Work Modeling the Future with Actuarial Science -- Perpetuity -- 4.5 Three Loan Payment Methods -- Interest and Principal at Maturity of Loan (Discount Loan) -- Interest as You Go, Principal at Maturity of Loan (Interest-Only Loan) -- Interest and Principal as You Go (Amortized Loan) -- 4.6 Amortization Schedules -- 4.7 Waiting Time and Interest Rates for Annuities -- 4.8 Solving a Lottery Problem -- 4.9 Ten Important Points about the TVM Equation -- Key Terms -- Questions -- Prepping for Exams -- Problems -- Advanced Problems for Spreadsheet Application -- Mini-Case Fitchminster Injection Molding, Inc.: Rose Climbs High -- Chapter 5. …”
    Libro electrónico
  18. 18798
    Publicado 2024
    Tabla de Contenidos: “…Understanding boxing -- Understanding garbage collection -- Controlling the GC -- Managing resources with IDisposable -- Tools and skills for memory troubleshooting -- Common memory tools and skills -- Visual Studio tools -- Using Visual Studio Memory Usage -- Practicing and exploring -- Exercise 4.1 - Online-only material -- Exercise 4.2 - Practice exercises -- Exercise 4.3 - Test your knowledge -- Exercise 4.4 - Explore topics -- Summary -- Chapter 5: Logging, Tracing, and Metrics for Observability -- Logging and tracing in .NET -- Understanding ILogger in .NET -- How to log using ILogger -- Building a web service for logging -- Testing the basic functionality of the web service -- Monitoring with metrics in .NET -- Concepts for metrics and alerts -- Metrics -- Alerts -- Scenarios for metrics and alerts -- Implementing metrics -- Adding metrics to an ASP.NET Core project -- Viewing metrics -- Introducing OpenTelemetry -- Supported instrumentation packages -- Instrumenting an ASP.NET Core project -- Viewing the telemetry -- Practicing and exploring -- Exercise 5.1 - Online-only material -- Exercise 5.2 - Practice exercises -- Exercise 5.3 - Test your knowledge -- Exercise 5.4 - Explore topics -- Summary -- Chapter 6: Documenting Your Code, APIs, and Services -- Introducing documentation -- Benefits of documentation -- When not to document -- Documenting your source code -- When should you document your source code? …”
    Libro electrónico
  19. 18799
    Publicado 2024
    Tabla de Contenidos: “…Building Static Websites with Amazon S3 -- CORS -- Additional Amazon S3 Features -- Amazon S3 Transfer Acceleration -- Amazon S3 Event Notifications -- Amazon S3 Select and Glacier Select -- Amazon Object Tags and Metadata -- Amazon S3 Replication -- Requirements for Replication -- Amazon S3 Multipart Upload -- Enforcing MFA Delete -- S3 Server Access Logging -- Hybrid Storage Solutions with AWS Storage Gateway -- Project Task - Create an Amazon S3 Static Website for the Todo List Application -- Project Task 3.1 - Create an Amazon S3 Bucket -- Project Task 3.2 - Upload Your Frontend Source Code -- Project Task 3.3 - Configure Bucket Policy and Permissions -- Project Task 3.4 - Configure Static Website Hosting -- Project Task 3.5 - Test the Website -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 4: Building Private Networks in the Cloud with Amazon VPC -- Introduction to VPC Fundamentals -- Managing External Resources' Exposure Using IGWs and NAT Gateways -- How an IGW Works -- Securing Your AWS Resources within the VPC with NACLs and Security Groups -- Security Groups -- Network Access Control Lists (NACLs) -- Configuring VPC interconnectivity -- VPC Peering -- Securing Connectivity between VPCs and Other Public AWS Services -- Connecting VPCs to external networks -- Monitoring Traffic with VPC Flow Logs -- Project - Build a VPC to Host the Todo List Application -- Technical Requirements -- Project Task 4.1 - Creating the VPC (us-east-1 Region) -- Project Task 4.2 - Creating and Attaching an Internet Gateway -- Project Task 4.3 - Creating a Public Route Table -- Project Task 4.4 - Creating Subnets -- Project Task 4.5 - Associating Public Subnets with a Public Route Table -- Project Task 4.6 - Creating Security Groups -- Summary -- Exam Readiness Drill - Chapter Review Questions…”
    Libro electrónico
  20. 18800
    Publicado 2019
    Tabla de Contenidos: “…Epithelial Tissues -- Components and Classification of Epithelia -- Covering and Lining Epithelia -- Glandular Epithelia -- 4.3. Connective Tissues -- Connective Tissue Proper -- Specialized Connective Tissues -- 4.4. …”
    Libro electrónico