Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Business & Economics 134
- Economic conditions 107
- Economic policy 107
- Management 86
- History 84
- Development 77
- Economic History 77
- Education 74
- Seguros 73
- Computer security 72
- Security measures 69
- Computer networks 61
- Quality control 59
- Computer software 58
- Insurance 49
- Engineering & Applied Sciences 47
- Historia 44
- Economics 41
- Medical care 37
- Quality assurance 36
- Evaluation 35
- Application software 34
- Government policy 33
- Testing 31
- Environment 30
- Governance 30
- Cloud computing 29
- Computer Science 29
- Data processing 28
- Education, Higher 28
-
1541Publicado 2024Tabla de Contenidos:Libro electrónico
-
1542por Reddy, MartinTabla de Contenidos: “…How to maintain backward compatibility -- Adding functionality -- Changing functionality -- Deprecating functionality -- Removing functionality -- Inline namespaces for versioning -- API reviews -- The purpose of API reviews -- Prerelease API reviews -- Precommit API reviews -- 11 - Documentation -- Reasons to write documentation -- Defining behavior -- Documenting the interface's contract -- Communicating behavioral changes -- What to document -- Types of documentation -- Automated API documentation -- Overview documentation -- Examples and tutorials -- Release notes -- License information -- Documentation usability -- Inclusive language -- Using Doxygen -- The configuration file -- Comment style and commands -- API comments -- File comments -- Class comments -- Method comments -- Enum comments -- Sample header with documentation -- 12 - Testing -- Reasons to write tests -- Types of API testing -- Unit testing -- Integration testing -- Performance testing -- Writing good tests -- Qualities of a good test -- What to test -- Focusing the testing effort -- Working with quality assurance -- Writing testable code -- Test-driven development -- Stub and mock objects -- Testing private code -- Using assertions -- Contract programming -- Record and playback functionality -- Supporting internationalization -- Automated testing tools -- Test harnesses -- Code coverage -- Bug tracking -- Continuous build system -- 13 - Objective-C and Swift -- Interface design in C++ and Objective-C -- Data hiding in Objective-C -- Objective-C behind a C++ API -- C++ behind an Objective-C API -- C++ behind a Swift API -- 14 - Scripting -- Adding script bindings -- Extending versus embedding -- Advantages of scripting -- Language compatibility issues -- Crossing the language barrier -- Script binding technologies -- Boost Python -- Simplified wrapper and interface generator…”
Publicado 2024
Libro electrónico -
1543por Pinto, RohanTabla de Contenidos: “…Secure data-sharing practices -- Continuous monitoring and auditing -- User awareness and training -- Compliance and regulatory considerations -- Incident response and recovery and processes for regular evaluation -- Regular evaluation and improvement -- Summary -- Chapter 4: Trust Anchors/Sources of Truth and Their Importance -- Sources of truth -- Defining sources of truth -- Ensuring data accuracy and consistency -- Enhancing identity assurance -- Enabling effective identity management -- Challenges and considerations -- Web of trust -- Understanding the WoT model -- Trust anchors in identity data verification -- Advantages of the WoT model and trust anchors -- Challenges and considerations -- Future trends and innovations -- Enhancing the WoT model through blockchain infrastructure -- The WoT model in the decentralized space -- Blockchain technology -- Integrating blockchain infrastructure into the WoT model -- Real-world use cases -- Summary -- Chapter 5: Historical Source of Authority -- Practical uses of historical sources of authority -- Controlling access to the source of authority -- ACLs -- Securing access to sources of truth with ACLs -- Implementing ACLs for data sources -- Advantages of ACLs for securing data sources -- Best practices for securing data sources with ACLs -- Cons of using historical sources of truth for verification of identity data -- Summary -- Chapter 6: The Relationship between Trust and Risk -- The impact of trust and risk -- Risks arising from compromised identity -- Attacks made on online identity break trust -- Local network risks -- Online surveillance -- Browser-based web risks -- Social engineering -- Risk management principles and assessments -- Proactive approach -- Risk identification -- Risk assessment and analysis -- Risk evaluation -- Risk mitigation strategies -- Monitoring and review…”
Publicado 2024
Libro electrónico -
1544Publicado 1996Tabla de Contenidos: “…Subpart G-Sources for Brachytherapy -- Subpart H-Sealed Sources for Diagnosis -- Subpart I-Teletherapy -- Subpart J-Training and Experience Requirements -- Subpart K-Enforcement -- PART 36-LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS -- Subpart A-General Provisions -- Subpart B-Specific Licensing Requirements -- Subpart C-Design and Performance Requirements for Irradiators -- Subpart D-Operation of Irradiators -- Subpart E-Records -- Subpart F-Enforcement -- E Nuclear Regulatory Commission Agreement and Non-agreement States -- AGREEMENT STATES -- NON-AGREEMENT STATES -- F Regulatory Chronology -- G History of Radiation Regulation in Medicine -- PROFESSIONAL SELF-REGULATION -- GOVERNMENT REGULATION -- NUCLEAR REGULATORY COMMISSION -- Atomic Energy Act -- Other Federal Agencies -- Federal Radiation Council -- Other Executive Agencies -- PHS Radiological Health Program -- Environmental Protection Agency -- STATE REGULATION -- REFERENCES -- H Public Meeting Documents -- ORGANIZATIONS FORMALLY CONTACTED FOR PUBLIC MEETING PARTICIPATION -- COMMITTEE FOR REVIEW AND EVALUATION OF THE MEDICAL USE PROGRAM OF THE NUCLEAR REGULATORY COMMISSION -- PUBLIC MEETING ANNOUNCEMENT AND REQUEST FOR WRITTEN TESTIMONY -- Background -- Providing Testimony -- Guide to Preparing Testimony -- TOPICS -- Regulation -- Data/Risk -- Quality Management/Quality Assurance -- Education -- Other -- PUBLIC HEARING OCTOBER 12, 1994 ORGANIZATIONS AND INDIVIDUALS SUBMITTING TESTIMONY -- QUESTION SUMMARIES -- I Quality Management Technical Panel -- LIST OF PARTICIPANTS, TUESDAY, OCTOBER 11, 1994 -- Speakers -- Observers -- Subcommitee Members -- J Commissioned Papers -- K The Linear, No-Threshold Model -- ADOPTION OF THE LINEAR, NO-THRESHOLD MODEL -- Divided Scientific Opinion, 1958-1966 -- Joint Committee on Atomic Energy Hearings, 1957-1960s…”
Libro electrónico -
1545por National Research Council (U.S.).Tabla de Contenidos: “…AIDS -- Copyright -- PREFACE -- ACKNOWLEDGMENTS -- NOTE ON AUTHORSHIP -- Contents -- SUMMARY -- Monitoring The Spread Of HIV And Aids -- Statistics On Aids -- Statistics On HIV Infection -- Cdc's Family Of HIV Seroprevalence Surveys -- National Seroprevalence Survey -- Assuring Confidentiality -- Sexual Behavior And Aids -- Same-Gender Sex Among Men -- Teenage And Adult Heterosexuals -- Female Prostitution -- Research And Data Needs -- Data On Sexually Transmitted Diseases -- IV Drug Use And Aids -- Limiting The Spread Of HIV Infection -- Facilitating Change In Health Behaviors -- Evaluating Interventions -- Randomized Field Experiments -- Resources For Evaluation -- Overcoming Barriers To Research And Intervention -- Barriers To Research -- Collaborative Research -- Social Barriers To Intervention -- PART I UNDERSTANDING THE SPREAD OF HIV INFECTION -- 1 Monitoring The Epidemic's Course -- PREVALENCE AND INCIDENCE OF HIV INFECTION -- Uses Of HIV Prevalence And Incidence Data -- Prevalence Data -- Monitoring Trends -- Incidence Data -- Variation In Estimated Hiv Prevalence For Selected Groups -- Homosexual and Bisexual Men. -- IV Drug Users. -- Hemophiliacs. -- Heterosexual Partners of Persons with HIV Infection or at Recognized Risk. -- Patients at General Care Hospitals. -- Newborn Infants and Women of Reproductive Age. -- Prostitutes. -- Tuberculosis Patients. -- Heterosexuals Without Known Risk Factors.12 -- Variation by Age. -- Variation by Gender. -- Variation Among Blacks, Whites, and Hispanics. -- Geographic Spread of the Epidemic. -- Uncertainties About HIV Prevalence -- Principles And Methods Of Estimating Prevalence -- Probability Samples -- Full Coverage Of The Sample -- Accurate Testing -- Combining Results -- THE 1989 HIV SURVEILLANCE SYSTEM -- Surveillance Of Iv Drug Users -- Sentinel Hospital Surveillance…”
Publicado 1989
Libro electrónico -
1546por OECDTabla de Contenidos: “…Improving the alignment between county development plans and relevant higher-level strategic planning documents -- Enhancing clarity about the actors involved in county development plan implementation -- More specific objectives and performance indicators can foster targeted policy action and facilitate monitoring and evaluation -- Incentives for implementing county development plans -- There is a lack of financial incentives for the implementation of county development plans -- Areas for improvement in the local-level strategic planning process -- Additional incentives for inter-municipal co-operation could strengthen local strategic planning -- Opportunities to build the strategic planning skills of local governments -- Monitoring and evaluation of regional development in Croatia -- Institutional framework for monitoring and evaluation of regional development policy -- Croatia has adopted a clear and shared definition of monitoring and evaluation -- Legislation provides high-level guidance but the monitoring methodology could be further clarified -- Responsibilities for monitoring and evaluation across government are clearly defined in law, but may not always be fit-for-purpose -- Quality of regional development monitoring and evaluation -- Developing quality assurance and control mechanisms could improve the technical standard of evaluation reports -- A lack of access to, or awareness of, timely and granular data in Croatia constrains monitoring effectiveness -- Improving the quality of indicators can help policy makers track progress in meeting regional development objectives -- The impact of monitoring and evaluation evidence on regional development policy making -- Creating feedback loops through decision-making processes -- Communication of monitoring and evaluation results can be improved through the creation of a web searchable platform…”
Publicado 2024
Libro electrónico -
1547
-
1548
-
1549Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Advanced Infrastructure Penetration Testing -- Information security overview -- Confidentiality -- Integrity -- Availability -- Least privilege and need to know -- Defense in depth -- Risk analysis -- Information Assurance -- Information security management program -- Hacking concepts and phases -- Types of hackers -- Hacking phases -- Reconnaissance -- Passive reconnaissance -- Active reconnaissance -- Scanning -- Port scanning -- Network scanning -- Vulnerability scanning -- Gaining access -- Maintaining access -- Clearing tracks -- Penetration testing overview -- Penetration testing types -- White box pentesting -- Black box pentesting -- Gray box pentesting -- The penetration testing teams -- Red teaming -- Blue teaming -- Purple teaming -- Pentesting standards and guidance -- Policies -- Standards -- Procedures -- Guidance -- Open Source Security Testing Methodology Manual -- Information Systems Security Assessment Framework -- Penetration Testing Execution Standard -- Payment Card Industry Data Security Standard -- Penetration testing steps -- Pre-engagement -- The objectives and scope -- A get out of jail free card -- Emergency contact information -- Payment information -- Non-disclosure agreement -- Intelligence gathering -- Public intelligence -- Social engineering attacks -- Physical analysis -- Information system and network analysis -- Human intelligence -- Signal intelligence -- Open source intelligence -- Imagery intelligence -- Geospatial intelligence -- Threat modeling -- Business asset analysis -- Business process analysis -- Threat agents analysis -- Threat capability analysis -- Motivation modeling -- Vulnerability analysis -- Vulnerability assessment with Nexpose -- Installing Nexpose…”
Libro electrónico -
1550Publicado 2022Tabla de Contenidos: “…Protect the Confidentiality and Integrity of Corporate Data Once It Leaves Internal Networks -- C. Assure That Information Can Only Be Accessed by Those Authorized to Do So and Protect Hardware and Storage Media -- D. …”
Libro electrónico -
1551por OECDTabla de Contenidos: “…-- Inpatient psychiatric beds are declining in almost all OECD countries -- The use of inpatient mental health services varies across countries -- Community-care capacity for mental health varies more than 30-fold between OECD countries -- Is continuity of care assured? -- Community-based mental health care demands good care co-ordination -- Emergency care visits and repeat admissions to inpatient care point to gaps in care co-ordination between inpatient and community care -- Services after discharge - suicide following discharge inpatient admissions…”
Publicado 2021
Libro electrónico -
1552Publicado 2002Tabla de Contenidos: “…Principaux taux d'intérêt nationaux pour les prêts immobiliers -- Il subsiste d'importantes barrières à l'entrée sur les marchés des assurances -- Faire face aux défis : les politiques actuelles et leur mise en œuvre -- Le Plan d'action pour les services financiers -- Tableau 16. …”
Libro electrónico -
1553Publicado 2017Tabla de Contenidos: “…-- Conventions are good -- Test frameworks and commercial choices are increasing -- Offsetting work to Jenkins nodes -- Starving QA/integration servers -- Reading the change log of Jenkins -- Avoiding human bottlenecks -- Avoiding groupthink -- Training and community -- Visibly rewarding successful developers -- Stability and code maintenance -- Resources on quality assurance -- And there's always more -- Final comments -- Index…”
Libro electrónico -
1554por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Réglementation et comportements procycliques -- Renforcer la réglementation bancaire et assurer la stabilité financière -- Encadré 4.2. Recommandations relatives à la réglementation bancaire et à la stabilité financière -- Notes -- Bibliographie -- Chapitre 5. …”
Publicado 2010
Libro electrónico -
1555Publicado 2019Tabla de Contenidos: “…-- Overview of the 10 Project Management Knowledge Areas -- Project Integration Management -- Project Scope Management -- Project Schedule Management -- Project Cost Management -- Project Quality Management -- Quality Planning Process -- Quality Assurance Process -- Quality Control Process -- Project Resource Management -- Project Communications Management -- Who Are the Project Stakeholders? …”
Libro electrónico -
1556Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- Foreword -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: The Big Data Science Ecosystem -- Introducing the Big Data ecosystem -- Data management -- Data management responsibilities -- The right tool for the job -- Overall architecture -- Data Ingestion -- Data Lake -- Reliable storage -- Scalable data processing capability -- Data science platform -- Data Access -- Data technologies -- The role of Apache Spark -- Companion tools -- Apache HDFS -- Advantages -- Disadvantages -- Installation -- Amazon S3 -- Advantages -- Disadvantages -- Installation -- Apache Kafka -- Advantages -- Disadvantages -- Installation -- Apache Parquet -- Advantages -- Disadvantages -- Installation -- Apache Avro -- Advantages -- Disadvantages -- Installation -- Apache NiFi -- Advantages -- Disadvantages -- Installation -- Apache YARN -- Advantages -- Disadvantages -- Installation -- Apache Lucene -- Advantages -- Disadvantages -- Installation -- Kibana -- Advantages -- Disadvantages -- Installation -- Elasticsearch -- Advantages -- Disadvantages -- Installation -- Accumulo -- Advantages -- Disadvantages -- Installation -- Summary -- Chapter 2: Data Acquisition -- Data pipelines -- Universal ingestion framework -- Introducing the GDELT news stream -- Discovering GDELT in real-time -- Our first GDELT feed -- Improving with publish and subscribe -- Content registry -- Choices and more choices -- Going with the flow -- Metadata model -- Kibana dashboard -- Quality assurance -- [Example 1 - Basic quality checking, no contending users] -- Example 1 - Basic quality checking, no contending users -- Example 2 - Advanced quality checking, no contending users -- Example 3 - Basic quality checking, 50% utility due to contending users -- Summary…”
Libro electrónico -
1557Publicado 2017Tabla de Contenidos: “…-- Future of testing engagement models - point of view -- Conclusion -- References -- Chapter 3: The Benefits of Replacing Testing Subcontractors with Managed Testing Services -- Findings from the World Quality Report 2016 on industrialization and testing centers of excellence -- Use of direct subcontractors remains prevalent -- Key challenges associated while working with subcontractors -- How replacing testing subcontractors with managed testing services helps -- Knowledge retention -- Handover -- Cost of resourcing -- Economies of scale -- Illustration of benefits -- A saving calculator -- Conclusion -- Chapter 4: Digital Quality Assurance in a Factory Model -- Services factories…”
Libro electrónico -
1558Publicado 2011Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Preface -- Introduction: It's a New World Out There -- Chapter 1 Perfect Phrases to Establish Yourself in Your New Role -- Perfect Phrases to Introduce Yourself to a New Manager -- Perfect Phrases to Forge a Manager/Admin Partnership -- Perfect Phrases to Relate Your Best Work and Communication Style -- Perfect Phrases to Discover Your Manager's Preferred Work and Communication Style -- Perfect Phrases to Establish Your New Role with All Levels of Employees -- Perfect Phrases to Collaborate with Other Office Professionals -- Perfect Phrases for Questions About and Comparisons with Your Predecessor -- Perfect Phrases to Initiate Meaningful Small Talk -- Chapter 2 Perfect Phrases to Manage Inevitable Learning Curves -- Perfect Phrases to Ask for Help Getting Oriented -- Perfect Phrases to Handle Questions You Can't Answer -- Perfect Phrases to Let People Know You're New -- Perfect Phrases to Request More Detailed Explanations -- Perfect Phrases to Clarify Office Jargon -- Perfect Phrases to Get Support from People Who Know Your Job -- Perfect Phrases to Admit Mistakes and Look Good in the Process -- Perfect Phrases to Admit You Are in Over Your Head -- Perfect Phrases to Apologize Without Groveling -- Chapter 3 Perfect Phrases to Establish Communication Agreements -- Perfect Phrases to Establish Communication Agreements with Your Manager -- Perfect Phrases to Establish Communication Agreements Within Work Groups -- Perfect Phrases to Arrange for Regular Meetings with Your Manager(s) -- Perfect Phrases to Assure That You Are Consulted on Decisions That Affect You -- Perfect Phrases to Discuss Solutions to Communication Breakdowns or Confusion -- Perfect Phrases to Explain Special Communication Needs -- Perfect Phrases to Adapt Communication Modalities to Preferred Styles…”
Libro electrónico -
1559Publicado 2023Tabla de Contenidos: “…-- Product Backlog Grooming (refinement) -- Summary of Key Points -- Discussion Topics -- Notes -- Part 2 Agile Project Management Overview -- Chapter 5 Agile Development, Quality, and Testing Practices -- Agile Software Development Practices -- Code Refactoring -- Continuous Integration -- Pair Programming -- Test-driven Development -- Extreme Programming (XP) -- Agile Quality Management Practices -- Key Differences in Agile Quality Management Practices -- Definition of "Done" -- The Role of Quality Assurance (QA) Testing in an Agile Project -- Agile Testing Practices -- Concurrent Testing -- Acceptance Test-driven Development -- Repeatable Tests and Automated Regression Testing -- Value-Driven and Risk-based Testing -- Summary of Key Points -- Discussion Topics -- Chapter 6 Time-boxing, Kanban, and Theory of Constraints -- The Importance of Flow -- Small Batch Sizes -- Just-in-time Production -- Concurrent Processing -- Time-boxing -- Time-boxing Advantages -- Additional Time-boxing Productivity Advantages -- The Kanban Process -- Push and Pull Processes -- What Is a Kanban Process? …”
Libro electrónico -
1560por Scott, Sharon M.Tabla de Contenidos: “…Collecting the necessary materials -- Educational statement -- Letter of reasonable assurance -- Submitting your application -- Winning Your FM Frequency -- Navigating MX Situations -- Winning your frequency -- Joining a timeshare -- Alternative Methods for Getting on the FM Dial -- Working with licensees in your community -- Using Part 15 broadcasting -- Part 2 Countdown to Blastoff: Launching Your Broadcast -- Chapter 4 Firing Up Your Frequency -- Permission Granted: Getting Started -- Keeping your FCC information safe -- Claiming your call sign -- Setting Up Your Signal -- Sourcing equipment housing -- Piecing everything together -- Choosing Between On-Site and Remote-Site Transmission -- Understanding Your FM Transmitter -- Installing Your Antenna -- Installing the Emergency Alert System -- Lighting It Up! …”
Publicado 2023
Libro electrónico