Mostrando 11,161 - 11,180 Resultados de 13,591 Para Buscar '"BEYOND"', tiempo de consulta: 0.11s Limitar resultados
  1. 11161
    por Hubbard, Douglas W., 1962-
    Publicado 2014
    Tabla de Contenidos: “…The Risk Paradox and the Need for Better Risk AnalysisNotes; Chapter 7 Quantifying the Value of Information; The Chance of Being Wrong and the Cost of Being Wrong: Expected Opportunity Loss; The Value of Information for Ranges; Beyond yes/no: Decisions on a Continuum; The Imperfect World: The Value of Partial Uncertainty Reduction; Perishable Information Values; Information Values for Multiple Variables; The Epiphany Equation: How the Value of Information Changes Everything; Summarizing Uncertainty, RisK, and Information Value: The pre-measurements; Notes; Part III Measurement Methods…”
    Libro electrónico
  2. 11162
    Publicado 2015
    Tabla de Contenidos: “…Front Cover; Contents; Preface; Editor; Contributors; Chapter 1: Introduction; Chapter 2: Placing Prevention in the Pockets: : The Role of mHealth in Preventive Medical Services; Chapter 3: Going Beyond: : Challenges for Using mHealth Applications for Preventive Medicine; Chapter 4: Mobile Services for Diabetic Patients' Sustainable Lifestyle; Chapter 5: mHealth Diet and Nutrition Guidance; Chapter 6: Step-By-Step Guide to Designing Effective Wellness Apps; Chapter 7: Collaborative Health-Care System (COHESY) Model; Chapter 8: mHealth for Behavior Change and Monitoring…”
    Libro electrónico
  3. 11163
    Publicado 2014
    Tabla de Contenidos: “…; Icons in This Book; Beyond the Book; Where to Go from Here; Part I: Getting Started with Oracle 12c; Chapter 1: Discovering Databases and Oracle 12c; Discovering Databases; Choosing Oracle; Keeping a Database Safe and Sound; Chapter 2: Understanding Oracle Database Architecture; Defining Databases and Instances; Deconstructing the Oracle Architecture; Walking Down Oracle Memory Structures; Trotting around the System Global Area; Program Global Area; Managing Memory; Following the Oracle Processes…”
    Libro electrónico
  4. 11164
    Publicado 2015
    Tabla de Contenidos: “…Persisting and recovering channelsChannel interceptors; Summary; Chapter 3: Message Processing; Message endpoints; Gateways; Synchronous gateways; Asynchronous gateways; Service activators; Delayers; Transactions; Summary; Chapter 4: Message Transformers; Introducing message transformers; Working with XML payload; The marshalling transformer; The unmarshalling transformer; XPath transformers; Validating XML messages; Beyond default transformers; Content enrichers; Header enrichers; Payload enrichers; Claim check; Incoming claim check transformer; Outgoing claim check transformer; Summary…”
    Libro electrónico
  5. 11165
    Publicado 2015
    Tabla de Contenidos: “…DEDUPLICATION PHASE: FINAL OUTPUT OF COMPONENTSER USING THE NULL RULE; THE CAPTURE PHASE AND IKB; THE IDENTITY UPDATE PROBLEM; PERSISTENT ENTITY IDENTIFIERS; THE LARGE COMPONENT AND BIG ENTITY PROBLEMS; IDENTITY CAPTURE AND UPDATE FOR ATTRIBUTE-BASED RESOLUTION; CONCLUDING REMARKS; Chapter 11 - ISO Data Quality Standards for Master Data; BACKGROUND; GOALS AND SCOPE OF THE ISO 8000-110 STANDARD; FOUR MAJOR COMPONENTS OF THE ISO 8000-110 STANDARD; SIMPLE AND STRONG COMPLIANCE WITH ISO 8000-110; ISO 22745 INDUSTRIAL SYSTEMS AND INTEGRATION; BEYOND ISO 8000-110; CONCLUDING REMARKS…”
    Libro electrónico
  6. 11166
    Publicado 2015
    Tabla de Contenidos: “…; How to Capture the Essence of the Problem; Look Beyond Requirements; Capture the Domain Vision for a Shared Understanding of What Is Core…”
    Libro electrónico
  7. 11167
    por Murphy, Brenda, 1950-
    Publicado 2014
    Tabla de Contenidos: “…Two Streetcars in Evolutionary PerspectiveStreetcar in a Changing American Culture; Dynamic Processing in 1947 and 1951; Conclusion; A Broken Romance: Tennessee Williams and America's Mid-Century Theatre Culture; "Stupidity is no longer profitable": Williams and his Critics, 1937-1948; "A radical departure": Williams and his Critics, 1951-1958; "A butterfly to a cannon": Williams and his Critics, 1959 and Beyond; "Assassins, before, now, and after": Conclusion; "A Vast Traumatic Eye": Culture Absorbed and Refigured in Tennessee Williams's Transitional Plays…”
    Libro electrónico
  8. 11168
    por Ramnath, Rajiv C.
    Publicado 2011
    Tabla de Contenidos: “…Maximizing Battery LifeEnsuring Responsiveness in Your Apps; Understanding the SDK Components Used in This Chapter; Chapter 9: Making Your Application Safe and Secure; Recognizing the Importance of Security; Looking at Security Holistically; Defining the Threat Model for an Android Application; Understanding the Android Security Model; Protecting SQLite Databases; Minimizing the Security Footprint of Your App; Going Beyond Permissions; Part IV: Enhancing the Capabilities of Your Android Application; Chapter 10: Channeling the Outside World through Your Android Device…”
    Libro electrónico
  9. 11169
    por Spira, Jonathan B.
    Publicado 2011
    Tabla de Contenidos: “…; Quantifying Information; Why Information Is Exploding; How Information Is Going beyond Network and Storage Capabilities…”
    Libro electrónico
  10. 11170
    Publicado 2014
    Tabla de Contenidos: “…; The Rise of the Machines; The Seven Key Takeaways; Notes; CHAPTER 4 Social Finance; Conform-or Die; Groupthink; Motivated Reasoning; Polarized; A Personal Mission Statement: Social Identity and Beyond; Gaming the System…”
    Libro electrónico
  11. 11171
    por Marchetti, Anne M., 1963-
    Publicado 2012
    Tabla de Contenidos: “…Appendix 6B: Accounts Payable: Preliminary Controls Assessment Questionnaire Purchasing Controls Questionnaire; Internal Control Assessment; Appendix 6C: Fraud Risk Factors: AU Section 316; Risk Factors Relating to Misstatements Arising from Fraudulent Financial Reporting; Chapter 7: Ongoing Compliance Overview; Origin of the Sarbanes-Oxley Act; Generating Value from Compliance; Moving Beyond Initial Compliance; Reevaluating the Compliance Program; Summary; Chapter 8: Ongoing Compliance Challenges; Future State Opportunity: Compliance Optimization; Issues to Consider When Optimizing Compliance…”
    Libro electrónico
  12. 11172
    Publicado 2011
    Tabla de Contenidos: “…You Are What You ChargeCHAPTER 6: What People Buy; The Dynamics of Customer Expectations; CHAPTER 7: How People Buy; Relative, Not Absolute, Price Matters; Price Psychology; Search, Experience, and Credence Attributes; Understanding Customer Risk; The Four Ways to Spend Mone; CHAPTER 8: Your Firm's Value Proposition; Moments of Truth; What Is Beyond Total Quality Service?; CHAPTER 9: The Consumer Surplus and Price Discrimination; Price Elasticity; Consumer Surplus; Price Discrimination; Requirements to Price Discriminate; CHAPTER 10: Macro Pricing Strategies; Skim Pricing; Penetration Pricing…”
    Libro electrónico
  13. 11173
    por Sinclair, Ian
    Publicado 2011
    Tabla de Contenidos: “…Chapter 8 Elements of TelevisionTelevision; Scanning; Transmission; Modern Television Displays; Analog Television Receiver; Color Television; Analog Receiver Circuits; Chapter 9 Digital Signals; Voltage Levels; Recording Digitally; Digital Broadcasting; Conversions; Digital Coding; Chapter 10 Gating and Logic Circuits; Gates; Arithmetic Circuits; Code Changing; Chapter 11 Counting and Correcting; Sequential Circuits; The J-K Flip-Flop; Counter Uses; Registers; Related Chips; Memory Chips; Error Control and Correction; Hamming and Other Codes; Chapter 12 Compact Disc System and Beyond…”
    Libro electrónico
  14. 11174
    por Boschi, Sigismondo
    Publicado 2013
    Tabla de Contenidos:
    Libro electrónico
  15. 11175
    Publicado 2014
    Tabla de Contenidos: “…; ARE YOU SURE OF WHAT YOU WANT TO DO?; MOVE BEYOND YOUR DREAMKILLERS; RÉSUMÉ LENGTH; CHRONOLOGICAL OR FUNCTIONAL RÉSUMÉ?…”
    Libro electrónico
  16. 11176
    por McLaughlin, Brett
    Publicado 2011
    Tabla de Contenidos: “…Some Things Never ChangeListing All Your Users; Deleting a User; Talking Back To Your Users; Standardizing on Messaging; Integrating Utilities, Views, and Messages; Part Four:Security and the Real World; Chapter 11:Authentication and Authorization; Start with Basic Authentication; Abstracting What's the Same; Passwords Don't Belong in PHP Scripts; Passwords Create Security, But Should Be Secure; Chapter 12:Cookies, Sign-ins, and Ditching Crummy Pop-ups; Going Beyond Basic Authentication; Logging In with Cookies; Adding Context-Specific Menus; Chapter 13:Authorization and Sessions…”
    Libro electrónico
  17. 11177
    por Kowalski, Karl G.
    Publicado 2012
    Tabla de Contenidos: “…Keep Track of MemoryRead Apple's Documentation; Use Online Resources; Always Remember the Parent Class; Look Beyond the Current Problem; Follow Interface Builder's Guidelines; Reduce, Reuse, Recycle; Use Keyboard Shortcuts; Set Xcode to Your Preferences; Stay Up to Date; Index…”
    Libro electrónico
  18. 11178
    por Tselichtchev, Ivan
    Publicado 2012
    Tabla de Contenidos: “…Yes and No; Conclusions; Part Two: The Global Downturn and Beyond: Western Capitalism and Chinese Capitalism; Chapter 9: The Global Crisis Was Not Really Global; Chapter 10: Western Crisis: Three Major Factors; Unaffordable Consumption and Households Deeper in Debt; Gambling Capitalism; The Failure of State Regulation, Corporate Governance, and Business Morality…”
    Libro electrónico
  19. 11179
    por Mirchandani, Vinnie
    Publicado 2012
    Tabla de Contenidos: “…Case Study: Estonia's "Tiigrih ̈upe"-Tiger LeapChapter 5 Convergence, Crossover, and Beyond; Guest Columns: Crossover Executive Perspectives; Perspective 1: Tony Scott (CIO, Microsoft); Perspective 2: Vijay Ravindran (Chief Digital Officer, The Washington Post Co.); Part II Key Attributes for the New Technology Elite: Three Es, Three Ms, Three Ps, and Three Ss; Chapter 6 Elegant: In a World of Flashing 12s; Case Study: Virgin America-Redefining Elegance in Flying; Chapter 7 Exponential: Leveraging Ecosystems; Case Study: RIM's Evolving Ecosystem…”
    Libro electrónico
  20. 11180
    por Shakarian, Paulo
    Publicado 2013
    Tabla de Contenidos: “…ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?…”
    Libro electrónico