Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 68
- Technology: general issues 64
- Biology 63
- Biobibliografías 53
- Research & information: general 53
- Medicine 52
- Bioingeniería 51
- BioMEMs (Microsistemas biológicos) 48
- Biotechnology 47
- Diseases 46
- History of engineering & technology 45
- Research 42
- Examinations 39
- Certification 34
- Data processing 34
- Bioètica 33
- Biochemistry 32
- Bioinformatics 32
- Microcomputers 28
- Electronic data processing personnel 27
- Science 27
- Bio-informatique 26
- Computer networks 25
- Engineering & Applied Sciences 25
- Filosofía 25
- mechanical properties 25
- Philosophy 24
- Computational Biology 23
- Maintenance and repair 23
- Medicina 23
-
2161por Andreu Gil, Jose LuisTabla de Contenidos: “…¿Qué significa para ti la rehabilitación bio-psico-social?; 6.2.4. Forma de trabajo; 6.2.5. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2162Publicado 2009Tabla de Contenidos: “…Evolution of intelligence in the bio-world / Arie S. Issar. 43. Creation and evolution in harmonic juxtaposition in Nahua culture / Sandra Ramos-Amâezquita [and others]. 44. …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
2163por Banchero, MartínTabla de Contenidos: “….) -- DE MÁQUINAS Y AUTÓMATAS -- EL JUEGO DE LA VIDA -- FRONTERAS DE UNA PRISIÓN INFINITA -- UNA VISTA PANORÁMICA -- SI AÚN TE QUEDA ALGO DE AMOR -- LOS MUERTOS VIVIENTES -- VII. ¿BIG BANG? NO, BIO BANG, POR ESTEBAN LANZAROTTI, LIONEL URAN (...) -- IMITAR LA BIOLOGÍA -- UN GUSANITO MUY SIMPÁTICO -- REPENSAR LA VIDA A PARTIR DE LA VIDA…”
Publicado 2022
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
2164por Gralla, PrestonTabla de Contenidos: “…Speed Up Boot and Shutdown Times; 1.4.2. Hack Your BIOS for Faster Startups…”
Publicado 2005
Libro electrónico -
2165por Watson, DavidTabla de Contenidos: “….; Copyright; Contents; About the Authors; Technical Editor Bio; Acknowledgments; Preface; Chapter 1: Introduction; 1.1. …”
Publicado 2013
Libro electrónico -
2166Publicado 2012Tabla de Contenidos: “…5.5 Industrial applications of image analysis5.6 Summary; 5.7 References; 6 Integrated data analysis with KNIME; 6.1 The KNIME platform; 6.2 The KNIME success story; 6.3 Benefits of 'professional open source'; 6.4 Application examples; 6.5 Conclusion and outlook; 6.6 Acknowledgments; 6.7 References; 7 Investigation-Study-Assay, a toolkit for standardizing data capture and sharing; 7.1 The growing need for content curation in industry; 7.2 The BioSharing initiative: cooperating standards needed; 7.3 The ISA framework - principles for progress; 7.4 Lessons learned; 7.5 Acknowledgments…”
Libro electrónico -
2167por Majure, Janet, 1954-Tabla de Contenidos: “…Teach Yourself VISUALLYTM PinterestTM; How to Use This Book; Table of Contents; CHAPTER 1: Getting Started with Pinterest; Introducing Pinterest; Join Pinterest Using Your E-mail Address; Join Pinterest Using Facebook; Join Pinterest Using Twitter; Complete Your Sign-Up; Sign Up with Twitter; Sign Up with Facebook; Understanding Pinterest Terminology; Log into Pinterest Three Ways; Create a Bio; Upload a Profile Picture; Install a Bookmarklet; Understanding Pinterest Etiquette; Create a New Board; Create Your First Pin; Create a Pin from the Pin It Bookmarklet; CHAPTER 2: Navigating Pinterest…”
Publicado 2012
Libro electrónico -
2168Publicado 2018Tabla de Contenidos: “…Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN AUTOMATION, CONTROL AND ROBOTICS -- Tilte Page -- Copyright Page -- Contents -- Preface -- Acknowledgements -- List of Contributors -- List of Figures -- List of Tables -- List of Abbreviations -- PART I Development of Silicone-based Stiffness Controllable Actuators -- Chapter 1 Technology Selection -- 1.1 Manipulator Specifications -- 1.1.1 Medical Requirements -- 1.1.2 Technical Specifications -- 1.2 Technological Overview of Different Actuation Strategies -- 1.2.1 Active Motion Technology Survey -- 1.2.1.1 Electromagnetic motors -- 1.2.1.2 Electro active polymers. 1.2.1.3 Shape memory alloys1.2.1.4 Shape memory polymers -- 1.2.1.5 Flexible fluidic actuator -- 1.2.2 Discussion and Choice of Active Motion Technology -- 1.2.3 Stiffness Variation Technology Survey -- 1.2.4 Comparison and Choice -- References -- Chapter 2 Design of the Multi-module Manipulator -- 2.1 The Design of the Single Module -- 2.1.1 Active Motion -- 2.1.2 Stiffness variation -- 2.2 Connection of Multiple Modules -- 2.3 Complete Characterization of the 2-Module Manipulator -- 2.3.1 Fabrication -- 2.3.2 Workspace Evaluation -- 2.3.2.1 Methods -- 2.3.2.2 Results -- 2.3.3 Junction Characterization -- 2.3.3.1 Methods. 2.3.3.2 Results2.3.4 Stiffness Characterization -- 2.3.4.1 Methods -- 2.3.4.2 Results -- 2.3.5 Combined Force and Stiffening Experiments -- 2.3.5.1 Methods -- 2.3.5.2 Results -- References -- Chapter 3 Soft Manipulator Actuation Module with Reinforced Chambers -- 3.1 Introduction -- 3.1.1 Change of the Chamber Cross Section Area -- 3.1.2 Chamber Cross Section Center Displacement -- 3.1.3 Friction between the Silicone Body and Braided Sleeve -- 3.1.4 Sensor Interaction -- 3.2 Proposed Improvements -- 3.2.1 Possible Solutions -- 3.2.2 Design -- 3.3 Manufacturing -- 3.4 Tests -- 3.4.1 Pneumatic Actuation. 3.4.2 Hydraulic Actuation3.4.3 External Force -- 3.5 Stiffening Mechanism -- 3.5.1 Basic Module Design -- 3.5.2 Optimised Module Design -- 3.6 Conclusions -- Acknowledgement -- References -- Chapter 4 Antagonistic Actuation Principle for a Silicone-based Soft Manipulator -- 4.1 Introduction -- 4.2 Background -- 4.3 Bio-Inspiration and Contributions -- 4.4 Integration of the Antagonistic Stiffening Mechanism -- 4.4.1 Embedding Tendon-driven Actuation into a STIFF-FLOP Segment -- 4.4.2 Setup of the Antagonistic Actuation Architecture -- 4.5 Test Protocol, Experimental Results, and Discussion -- 4.5.1 Methodology. 4.5.2 Experimental Results4.5.3 Discussion -- 4.6 Conclusions -- 4.7 Funding -- References -- Chapter 5 Smart Hydrogel for Stiffness Controllable Continuum Manipulators: A Conceptual Design -- 5.1 Introduction -- 5.2 Materials and Methods -- 5.2.1 Active Hydrogel Preparation -- 5.2.2 Active Hydrogel Properties and Ion Pattern Printing -- 5.3 Experiments and Discussion -- 5.3.1 Swelling Test -- 5.3.2 Stiffness Test -- 5.4 Conclusion and Future Works -- References -- PART II Creation and Integration of Multiple Sensing Modalities -- Chapter 6 Optical Force and Torque Sensor for Flexible Robotic Manipulators…”
Libro electrónico -
2169por Press, Posts & TelecomTabla de Contenidos: “…封 -- 异步社区电子书 -- 版权声明 -- 内容提 -- 序 -- 简介 -- 前 -- -- 作 简介 -- 技术审稿人简介 -- 目录 -- 第1 章了 Hadoop MapReduce -- 1.1 MapReduce 模型 -- 1.2 Hadoop MapReduce 概 -- 1.3 Hadoop MapReduce 的工作原理 -- 1.4 影响MapReduce 性 的因素 -- 1.5 小结 -- 第2 章Hadoop 参数概 -- 2.1 研究Hadoop 参数 -- 2.1.1 置文件mapred-site.xml -- 2.1.2 置文件hdfs-site.xml -- 2.1.3 置文件core-site.xml -- 2.2 Hadoop MapReduce 性 指标 -- 2.3 性 监测工具 -- 2.3.1 用Chukwa 监测Hadoop -- 2.3.2 使用Ganglia 监测Hadoop -- 2.3.3 使用Nagios 监测Hadoop -- 2.4 用Apache Ambari 监测Hadoop -- 2.5 小结 -- 第3 章检测系统瓶 -- 3.1 性 优 -- 3.2 创建性 基线 -- 3.3 别 源瓶 -- 3.3.1 别内存瓶 -- 3.3.2 别CPU 瓶 -- 3.3.3 别存储瓶 -- 3.3.4 别网络带宽瓶 -- 3.4 小结 -- 第4 章 别 源 弱环 -- 4.1 别 群 弱环 -- 4.1.1 检查Hadoop 群 点的健康状况 -- 4.1.2 检查 入数据大小 -- 4.1.3 检查海 I/O 和网络 塞 -- 4.1.4 检查并发任务不 -- 4.1.5 检查CPU 和 -- 4.2 化Hadoop 群 -- 4.3 正确 置 群 -- 4.4 小结 -- 第5 章强化map 和reduce 任务 -- 5.1 强化map 任务 -- 5.1.1 入数据和块大小的影响 -- 5.1.2 处置小文件和不可拆分文件 -- 5.1.3 在Map 段压缩溢写 录 -- 5.1.4 算map 任务的吞吐 -- 5.2 强化reduce 任务 -- 5.2.1 算reduce 任务的吞吐 -- 5.2.2 改善Reduce 执 段 -- 5.3 优map 和reduce 参数 -- 5.4 小结 -- 第6 章优化MapReduce 任务 -- 6.1 使用Combiner -- 6.2 使用压缩技术 -- 6.3 使用正确Writable 类型 -- 6.4 明智地复用类型 -- 6.5 优化mapper 和reducer 的代码 -- 6.6 小结 -- 第7 章最佳实 与建 -- 7.1 硬件 优与操作系统推 -- 7.1.1 Hadoop 群检查 -- 7.1.2 Bios 优检查 -- 7.1.3 OS 置建 -- 7.2 Hadoop 最佳实 与建 -- 7.2.1 署Hadoop -- 7.2.2 Hadoop 优建 -- 7.2.3 使用MapReduce 模板类代码 -- 7.3 小结 -- 欢 来到异步社区 -- 封底…”
Publicado 2024
Libro electrónico -
2170por Bellido Quintero, EnriqueTabla de Contenidos: “…FASES DE INSTALACIÓN; 2.1 Configuración del dispositivo de arranque en la Bios; 2.2 Formateado de discos; 2.3 Particionado de discos; 2.4 Creación del sistema de ficheros; 2.5 Configuración del sistema operativo y de los dispositivos; 2.6 Instalación y configuración de utilidades y aplicaciones; 3. …”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2171por Costas Santos, JesúsTabla de Contenidos: “…SEGURIDAD LÓGICA; 3.1 PRINCIPIOS DE LA SEGURIDAD LÓGICA; 3.2 CONTROL DE ACCESO LÓGICO; 3.2.1 POLÍTICA DE CONTRASEÑAS; 3.2.2 CONTROL DE ACCESO EN LA BIOS Y GESTOR (...); 3.2.3 CONTROL DE ACCESO EN EL SISTEMA OPERATIVO; 3.3 POLÍTICA DE USUARIOS Y GRUPOS; 3.4 REFERENCIAS WEB; RESUMEN DEL CAPÍTULO; EJERCICIOS PROPUESTOS; TEST DE CONOCIMIENTOS; CAPÍTULO 4. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2172por Hunt, CraigTabla de Contenidos: “…Windows Internet Name Service3.5.1.2. Resolving a NetBIOS name; 3.6. SMB and CIFS; 3.7. Mail Services; 3.7.2. …”
Publicado 2005
Libro electrónico -
2173por Kroah-Hartman, GregTabla de Contenidos: “…ACPI Options -- acpi -- acpi_sleep -- acpi_sci -- acpi_irq_ balance -- acpi_irq_ nobalance -- acpi_irq_isa -- acpi_irq_pci -- acpi_os_name -- acpi_osi -- acpi_serialize -- acpi_skip_ timer_override -- acpi_dbg_layer -- acpi_fake_ecdt -- acpi_generic_ hotkey -- acpi_pm_good -- ec_intr -- memmap -- memmap -- pnpacpi -- processor.max_ cstate -- processor.nocst -- SCSI Options -- max_luns -- max_report_ luns -- scsi_dev_flags -- PCI Options -- PCI -- Plug and Play BIOS Options -- noisapnp -- pnpbios -- pnp_reserve_ irq -- pnp_reserve_ dma -- pnp_reserve_io -- pnp_reserve_ mem -- SELinux Options -- checkreqprot -- enforcing -- selinux -- selinux_ compat_net -- Network Options -- netdev -- rhash_entries -- shapers -- thash_entries -- Network File System Options -- lockd.nlm_ grace_period -- lockd.nlm_ tcpport -- lockd.nlm_ timeout -- lockd.nlm_ udpport -- nfsroot -- nfs.callback_ tcpport -- nfs.idmap_ cache_timeout -- Hardware-Specific Options -- nousb -- lp -- parport -- parport_init_ mode -- nr_uarts -- Timer-Specific Options -- enable_timer_ pin_1 -- disable_timer_ pin_1 -- enable_8254_ timer -- disable_8254_ timer -- hpet -- clocksource -- Miscellaneous Options -- dhash_entries -- elevator -- hashdist -- combined_ mode -- max_loop -- panic -- pause_on_oops -- profile -- Kernel Build Command-Line Reference -- Informational Targets -- Cleaning Targets -- Configuration Targets -- Build Targets -- Packaging Targets -- Documentation Targets -- Architecture-Specific Targets -- Analysis Targets -- Kernel Configuration Option Reference -- EXPERIMENTAL -- LOCALVERSION -- AUDIT -- IKCONFIG -- EMBEDDED -- MODULES -- IOSCHED_NOOP -- IOSCHED_AS -- IOSCHED_ DEADLINE -- IOSCHED_CFQ -- SMP -- M386 -- X86_GENERIC -- NR_CPUS -- SCHED_SMT -- PREEMPT_NONE -- PREEMPT_ VOLUNTARY -- PREEMPT -- PREEMPT_BKL -- NOHIGHMEM -- HIGHMEM4G -- HIGHMEM64G -- FLATMEM_ MANUAL…”
Publicado 2007
Libro electrónico -
2174por Pyles, JamesTabla de Contenidos: “…Task 2.3: Performing a Quick Test and Replacing a Power SupplyTask 2.4: Searching for Windows Vista Drivers; Task 2.5: Listing All of the Drivers Installed on a Windows 7 PC; Task 2.6: Cleaning Fans; Task 2.7: Oiling Fans; Task 2.8: Defragging a Hard Drive; Task 2.9: Scheduling Automatic Defragging in Windows 7; Task 2.10: Defragmenting a Single File; Task 2.11: Updating Security Patches; Task 2.12: Checking Internal Connectors; Task 2.13: Backing Up with Acronis True Image Home; Task 2.14: Flashing the BIOS; Task 2.15: Changing the CMOS Battery to Correct a Slow PC Clock…”
Publicado 2012
Libro electrónico -
2175Tabla de Contenidos: “…Distributed Computing Environment Remote Procedure Calls (DCERPC) -- Domain Name System -- Extended Simple Mail Transfer Protocol -- File Transfer Protocol -- General Packet Radio Service Tunneling Protocol -- H.323 -- Unified Communications Advanced Support -- HTTP -- ICMP -- ILS -- Instant Messenger (IM) -- IPSec Pass-Through -- MGCP -- NetBIOS -- PPTP -- Sun RPC -- RSH -- RTSP -- SIP -- Skinny (SCCP) -- SNMP -- SQL*Net -- TFTP -- WAAS -- XDMCP -- Summary -- Chapter 8 Virtualization -- Architectural Overview -- Configuration of Security Contexts -- Deployment Scenarios -- Monitoring and Troubleshooting the Security Contexts -- Summary -- Chapter 9 Transparent Firewalls -- Restrictions Within Transparent Firewalls -- Configuration of Transparent Firewalls -- Deployment Scenarios -- Monitoring and Troubleshooting the Transparent Firewalls -- Summary -- Chapter 10 Failover and Redundancy -- Architectural Overview -- Failover Configuration -- Deployment Scenarios -- Monitoring and Troubleshooting Failovers -- Summary -- Chapter 11 Quality of Service -- QoS Types -- QoS Architecture -- Configuring Quality of Service -- QoS Deployment Scenarios -- Monitoring QoS -- Summary -- Part III: Intrusion Prevention System (IPS) Solutions -- Chapter 12 Configuring and Troubleshooting Intrusion Prevention System (IPS) -- Overview of the Adaptive Inspection Prevention Security Services Module (AIP-SSM) and Adaptive Inspection Prevention Security Services Card (AIP-SSC) -- AIP-SSM and AIP-SSC Management -- Cisco IPS Software Architecture -- Configuring the AIP-SSM -- AIP-SSM Maintenance -- Advanced Features and Configuration -- Cisco ASA Botnet Detection -- Summary -- Chapter 13 Tuning and Monitoring IPS -- IPS Tuning -- Monitoring and Tuning the AIP-SSM Using CS-MARS -- Displaying and Clearing Statistics -- Summary -- Part IV: Content Security…”
Libro electrónico -
2176Publicado 2023Tabla de Contenidos: “…Guest -- Virtual Networking -- Resource Allocation and Provisioning -- Management Interfaces for Virtual Machines -- Cloud Models -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Server Maintenance -- Given a Scenario, Perform Server Hardware Maintenance -- Out-of-Band Management -- Local Hardware Administration -- Components -- Drives -- Hot-Swappable Hardware -- Basic Input/Output System (BIOS)/Unified Extensible Firmware Interface (UEFI) -- Explain Licensing Concepts -- Models -- Open Source -- Subscription -- License vs. …”
Libro electrónico -
2177por Garcia Cortes, CarlosTabla de Contenidos: “…MARÍA FRANCISCA DE ISLA Y SU FAMILIA; CAPÍTULO III EL P. ISLA Y COMPOSTELA; 1. BIO-BIBLIOGRAFÍA DEL P. ISLA; 1.1. Síntesis biográfica; 1.2. …”
Publicado 2007
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2178Publicado 2013Tabla de Contenidos: “…ETAPAS BÁSICAS DEL DESARROLLO BIO-PSICO-SOCIAL INFANTO-JUVENIL; 2.2. NECESIDADES BÁSICAS EN LA INFANCIA Y ADOLESCENCIA; 2.3. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2179Publicado 2023Tabla de Contenidos: “…. -- Finding protein domains with PFAM and bio3d -- Getting ready -- How to do it... -- How it works... -- There's more... -- Finding InterPro domains -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also... -- Finding transmembrane domains with tmhmm and pureseqTM -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating figures of protein domains using drawProteins -- Getting ready -- How to do it... -- How it works... -- There's more... -- Performing multiple alignments of proteins or genes -- Getting ready -- How to do it... -- How it works... -- There's more... -- Aligning genomic length sequences with DECIPHER -- Getting ready -- How to do it... -- How it works... -- Novel feature detection in proteins -- Getting ready -- How to do it... -- How it works... -- 3D structure protein alignment in bio3d -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 9: Phylogenetic Analysis and Visualization -- Technical requirements -- Further information -- Reading and writing varied tree formats with ape and treeio -- Getting ready -- How to do it... -- How it works... -- See also -- Visualizing trees of many genes quickly with ggtree -- Getting ready -- How to do it... -- How it works... -- There's more... -- Quantifying and estimating the differences between trees with treespace -- Getting ready -- How to do it... -- How it works... -- There's more... -- Extracting and working with subtrees using ape -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating dot plots for alignment visualizations -- Getting ready -- How to do it... -- How it works... -- Reconstructing trees from alignments using phangorn -- Getting ready -- How to do it... -- How it works...…”
Libro electrónico -
2180Publicado 2018Tabla de Contenidos: “…A real-world pen test scenario - the chatty printer -- Configuring our SMB listener -- Authentication capture -- Hash capture with LLMNR/NetBIOS NS spoofing -- Let it rip - cracking Windows hashes -- The two philosophies of password cracking -- John the Ripper cracking with a wordlist -- John the Ripper cracking with masking -- Reviewing your progress with the show flag -- Summary -- Questions -- Further reading -- Chapter 4: Advanced Network Attacks -- Technical requirements -- Binary injection with BetterCAP proxy modules -- The Ruby file injection proxy module - replace_file.rb -- Creating the payload and connect-back listener with Metasploit -- HTTP downgrading attacks with sslstrip -- Removing the need for a certificate - HTTP downgrading -- Understanding HSTS bypassing with DNS spoofing -- HTTP downgrade attacks with BetterCAP ARP/DNS spoofing -- The evil upgrade - attacking software update mechanisms -- Exploring ISR Evilgrade -- Configuring the payload and upgrade module -- Spoofing ARP/DNS and injecting the payload -- IPv6 for hackers -- IPv6 addressing basics -- Local IPv6 reconnaissance and the Neighbor Discovery Protocol -- IPv6 man-in-the-middle - attacking your neighbors -- Living in an IPv4 world - creating a local 4-to-6 proxy for your tools -- Summary -- Questions -- Further reading -- Chapter 5: Cryptography and the Penetration Tester -- Technical requirements -- Flipping the bit - integrity attacks against CBC algorithms -- Block ciphers and modes of operation -- Introducing block chaining -- Setting up your bit-flipping lab -- Manipulating the IV to generate predictable results -- Flipping to root - privilege escalation via CBC bit-flipping -- Sneaking your data in - hash length extension attacks -- Setting up your hash attack lab -- Understanding SHA-1's running state and compression function…”
Libro electrónico