Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Arquitectura 2,870
- Development 1,164
- Application software 993
- Engineering & Applied Sciences 988
- Arquitectura moderna 850
- Architecture 835
- Cloud computing 697
- Computer networks 609
- Computer Science 592
- Art, Architecture & Applied Arts 519
- Management 506
- Visual Arts 476
- Historia 474
- Data processing 430
- Photography 430
- Computer architecture 406
- Software architecture 397
- Computer software 395
- Database management 384
- Security measures 376
- Electrical & Computer Engineering 362
- History 335
- Obras 328
- Java (Computer program language) 326
- Telecommunications 317
- Arquitectes 313
- Diseños y planos 299
- Artificial intelligence 296
- Computer programs 296
- Computer security 295
-
19381por Lal Kishore, K.Tabla de Contenidos: “…2.10 Arbitrary Waveform Generator -- 2.10.1 Applications -- 2.11 Video Signal Generator -- 2.12 Summary -- Points to Remember -- Objective-type Questions -- Review Questions -- Unsolved Problems -- Chapter 3: Signal Analysers -- 3.1 Introduction -- 3.2 Wave Analyser -- 3.3 AF Wave Analyser -- 3.4 High-Frequency Wave Analyser -- 3.4.1 Frequency Mixers -- 3.5 Harmonic Distortion -- 3.5.1 Tunable Selective Circuit -- 3.5.2 Disadvantages -- 3.5.3 Heterodyne Wave Analyser (Wavemeter) -- 3.5.4 Fundamental Suppression Method of Distortion Measurement -- 3.6 Heterodyne Wave Analyser -- 3.6.1 Applications of Wave Analysers -- 3.7 Tuned Circuit Harmonic Analyser -- 3.8 Heterodyne Harmonic Analyser or Wavemeter -- 3.9 Fundamental Suppression Harmonic Distortion Analyser -- 3.10 Spectrum Analyser -- 3.10.1 Characteristics of a Spectrum Analyser -- 3.10.2 Applications of a Spectrum Analyser -- 3.10.3 Basic Spectrum Analyser -- 3.10.4 Factors to be Considered in a Spectrum Analyser -- 3.11 Low-Frequency Spectrum Analyser -- 3.11.1 Applications -- 3.12 Power Analyser -- 3.12.1 Communications Signal Analyser -- 3.12.2 Logic Analysers -- 3.12.3 Network Monitoring System -- 3.12.4 System Architecture -- 3.12.5 Features -- 3.12.6 Applications -- 3.13 Capacitance-Voltage Analysers -- 3.14 Oscillators -- 3.14.1 Considerations in Choosing an Oscillator -- 3.15 Summary -- Points to Remember -- Objective-type Questions -- Review Questions -- Unsolved Problems -- Chapter 4: Oscilloscopes -- 4.1 Introduction -- 4.2 Cathode Ray Oscilloscope -- 4.3 Block Diagram of a CRO -- 4.4 Cathode Ray Tube (CRT) -- 4.5 Graticules -- 4.6 Electrostatic Deflection Sensitivity -- 4.6.1 Design Criteria -- 4.7 Different Controls in a CRO -- 4.7.1 How to Operate a CRO -- 4.8 Time Base Generators -- 4.8.1 Time Base Circuits -- 4.9 Triggered Mode -- 4.9.1 Free-Running Mode…”
Publicado 2009
Libro electrónico -
19382por Allison, SteveTabla de Contenidos: “…The security investigation application -- 7.1 The SWIPE application -- 7.1.1 SWIPE application structure -- 7.1.2 SWIPE application architecture and description -- 7.2 SWIPE authentication features -- 7.3 Authorization features…”
Publicado 2005
Libro electrónico -
19383Publicado 2023Tabla de Contenidos: “…-- 11.1.1 Audience -- 11.1.2 Format -- 11.1.3 Validation -- 11.2 Documentation types -- 11.2.1 Meeting notes -- 11.2.2 Walk-throughs demos -- 11.2.3 Owner's manual -- 11.2.4 Backing up and restoration -- 11.2.5 Deployment process -- 11.2.6 Source/code comments -- 11.2.7 Architectural diagrams -- 11.2.8 Process diagrams -- 11.2.9 Network diagrams -- 11.2.10 Data schemas -- 11.2.11 Compliance documentation -- 11.2.12 License and audit tracking -- 11.3 Whitepapers -- 11.4 Best practices -- Summary -- Checklist -- 12 Security -- 12.1 Patching -- 12.1.1 Identify patches -- 12.1.2 Scheduling -- 12.1.3 Special considerations -- 12.2 Penetration testing -- 12.3 Social engineering -- 12.4 Data leakage -- 12.4.1 Logging -- 12.4.2 Application errors -- 12.4.3 Data exports -- 12.4.4 Version control -- 12.5 Password rotation -- 12.5.1 System credentials tracking -- 12.6 Secure environment -- 12.6.1 Identify -- 12.6.2 Protect -- 12.6.3 Monitor -- 12.7 Developing with security -- 12.7.1 Creating secure code -- 12.7.2 Securing the build process -- 12.8 "We are under attack" -- 12.8.1 Kill switch -- 12.8.2 Communication -- 12.8.3 Managing a security breach…”
Libro electrónico -
19384por Nethercote, Megan, author“…Condominium and comparable legal architectures make vertical urban growth possible, but do we really understand the social implications of restructuring city land ownership in this way? …”
Publicado 2022
Libro electrónico -
19385Publicado 2014“…This book is for those Splunk developers who want to learn advanced strategies to deal with big data from an enterprise architectural perspective. You need to have good working knowledge of Splunk…”
Libro electrónico -
19386
-
19387
-
19388
-
19389
-
19390
-
19391
-
19392
-
19393
-
19394
-
19395Publicado 2021“…Comprehensive and timely, Cloud Computing: Concepts and Technologies offers a thorough and detailed description of cloud computing concepts, architectures, and technologies, along with guidance on the best ways to understand and implement them. …”
Libro electrónico -
19396Publicado 2018“…Insightful projects to master deep learning and neural network architectures using Python and Keras Key Features Explore deep learning across computer vision, natural language processing (NLP), and image processing Discover best practices for the training of deep neural networks and their deployment Access popular deep learning models as well as widely used neural network architectures Book Description Deep learning has been gradually revolutionizing every field of artificial intelligence, making application development easier. …”
Libro electrónico -
19397Publicado 2021“…The data mesh is poised to replace data lakes and data warehouses as the dominant architectural pattern in data and analytics. By promoting the concept of domain-focused data products that go beyond file sharing, data mesh helps you deal with data quality at scale by establishing true data ownership. …”
Libro electrónico -
19398
-
19399Publicado 2022“…The complexity of the subject is such that a shared frame of reference is still lacking among art historians, architects, architectural and geotechnical engineers. And while there are exemplary cases of an integral approach to each building element with its static and architectural function, as a material witness to the culture and construction techniques of the original historical period, there are still examples of uncritical reliance on modern technology leading to the substitution from earlier structures to new ones, preserving only the iconic look of the original monument. …”
Libro electrónico -
19400Publicado 2021“…The main objective of the present study consists of its documentary and evocative value, without forgetting the analysis of the multiple architectural spaces with monumental complexes of extraordinary cultural importance arranged according to precise hierarchies and specific uses. …”
Libro electrónico