Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 10,979
- Crítica e interpretación 4,128
- Biblia 3,417
- Història 3,411
- Filosofía 3,140
- History 2,152
- Colecciones 2,054
- Aristóteles 1,851
- Bíblia 1,571
- Iglesia Católica 1,547
- Engineering & Applied Sciences 1,489
- Església Catòlica 1,376
- Teología 1,376
- Historia y crítica 1,319
- Literatura latina clásica 1,318
- Management 1,181
- Platón 1,136
- Development 1,091
- Computer Science 1,077
- Filosofía antigua 1,057
- Filosofía griega 1,037
- Política 1,026
- Derecho canónico 1,019
- Sermones 1,006
- Política y gobierno 967
- Moral cristiana 961
- Obres anteriors al 1800 926
- Crítica i interpretació 915
- Derecho 895
- Application software 875
-
293801Publicado 2018Tabla de Contenidos: “…Resetting signals -- Listing traps -- Using traps inside a function -- Running scripts or processes even if the user logs out -- Creating dialog boxes with the dialog utility -- Creating a message box (msgbox) -- Creating a message box (msgbox) with a title -- The yes/no box (yesno) -- The input box (inputbox) -- The textbox (textbox) -- A password box -- The checklist box (checklist) -- The menu box (menu) -- The radiolist box (radiolist) -- The progress meter box (gauge) -- Summary -- Chapter 12: System Startup and Customizing a Linux System -- System startup, inittab, and run levels -- The kernel startup and init process -- Understanding run levels -- System initialization boot scripts -- User initialization scripts -- System-wide setting scripts -- User level settings - default files -- Summary -- Chapter 13: Pattern Matching and Regular Expressions with sed and awk -- The basics of regular expressions -- sed - non-interactive stream editor -- Understanding sed -- Addressing in sed -- How to modify a file with sed -- Printing - the p command -- Deleting - the d command -- Substitution - the s command -- Range of selected lines the comma -- Multiple edits - the e command -- Reading from files - the r command -- Writing to files - the w command -- Appending - the a command -- Inserting - the i command -- Changing - the c command -- Transform - the y command -- Quit - the q command -- Holding and getting - the h and g commands -- Holding and exchanging - the h and x commands -- sed scripting -- Using awk -- The meaning of awk -- Using awk -- Input from files -- Input from commands -- How awk works -- awk commands from within a file -- Records and fields -- Records -- The record separator -- The 0 variable -- The NR variable -- Fields -- Field separators -- The input field separator -- Patterns and actions -- Patterns -- Actions…”
Libro electrónico -
293802Publicado 2016Tabla de Contenidos: “…16.1 Introduction 523 -- 16.2 Layering as Optimization Decomposition 524 -- 16.3 Cross-Layer Optimization 533 -- 16.4 Optimization Problem Decomposition Methods 543 -- References 554 -- 17 Network Information Theory 557 -- 17.1 Capacity of Ad Hoc Networks 557 -- 17.2 Information Theory and Network Architectures 569 -- 17.3 Cooperative Transmission in Wireless Multihop Ad Hoc Networks 577 -- References 584 -- 18 Stability of Advanced Network Architectures 585 -- 18.1 Stability of Cooperative Cognitive Wireless Networks 585 -- 18.2 System Model 586 -- 18.4 Optimal Control Policy 592 -- 18.5 Achievable Rates 594 -- 18.6 Stabilizing Transmission Policies 598 -- References 605 -- 19 Multi-Operator Spectrum Sharing 607 -- 19.1 Business Models for Spectrum Sharing 607 -- 19.2 Spectrum Sharing in Multi-hop Networks 638 -- References 656 -- 20 Large Scale Networks and Mean Field Theory 659 -- 20.1 MFT for Large Heterogeneous Cellular Networks 659 -- 20.2 Large Scale Network Model Compression 664 -- 20.3 Mean Field Theory Model of Large Scale DTN Networks 668 -- 20.4 Mean Field Modeling of Adaptive Infection Recovery in Multicast DTN Networks 674 -- 20.5 Mean Field Theory for Scale-Free Random Networks 701 -- 20.6 Spectrum Sharing and MFT 709 -- 20.7 Modeling Dynamics of Complex System 711 -- Appendix A.20 Iterative Algorithm to Solve Systems of Nonlinear ODEs (DiNSE-Algorithm) 721 -- Appendix B.20 Infection Rate of Destinations for DNCM 722 -- Appendix C.20 Infection Rate for Basic Epidemic Routing 722 -- References 722 -- 21 mmWave Networks 726 -- 21.1 mmWave Technology in Subcellular Architecture 726 -- 21.2 Microeconomics of Dynamic mmWave Networks 737 -- References 747 -- 22 Cloud Computing in Wireless Networks 750 -- 22.1 Technology Background 750 -- 22.2 System Model 752 -- 22.3 System Optimization 756 -- 22.4 Dynamic Control Algorithm 758 -- 22.5 Achievable Rates 761 -- 22.6 Stabilizing Control Policies 763 -- References 769 -- 23 Wireless Networks and Matching Theory 771.…”
Libro electrónico -
293803Publicado 2021Tabla de Contenidos: “…-- Culture Fit -- Ability to Buy -- Motivation -- Competence in M& -- A -- Trust and Alignment of Values -- Vetting Buyers for the Right Fit -- Research -- M& -- A Professionals -- Interview Others -- Build Personal Relationships -- Become a Customer or Vendor -- Partner Up -- Using Partnerships to Trigger Acquisitions -- How to Make Contact with Interested Parties -- Introductions and Referrals -- Networking -- Cold Emails -- Be So Good They Can't Ignore You -- Move Up the List in Reverse Order -- Use Brokers -- The Golden Rule in Making Contact -- Chapter 9 The Communication Process with Buyers -- Liabilities and Responsibilities -- How to Handle Communications -- Gauging Initial Interest -- Nailing the Follow-Up -- Awareness and Discovery -- Learning -- Consideration -- Comparison Shopping -- Trust -- Due Diligence -- Negotiation -- Finding the Decision-Maker -- C-Suite Executives -- Corporate Development -- Advisors -- Transaction Leads -- Business Unit Leaders -- Chapter 10 Preparing for a Successful First Meeting…”
Libro electrónico -
293804Publicado 2021Tabla de Contenidos: “…Step 1: Generate Your API Token in Cloud App Security -- Step 2: Create Your Trigger in Microsoft Flow -- Step 3: Create the Teams Message Action in Microsoft Flow -- Step 4: Generate an Email in Microsoft Flow -- Connecting the Flow in Cloud App Security -- Performing an Automated Response Using Azure Security Center -- Using Machine Learning and Artificial Intelligence in Threat Response -- Overview of Fusion Detections -- Overview of Azure Machine Learning -- Summary -- Chapter 5 Microsoft Cybersecurity Reference Architecture and Capability Map -- Introduction -- Microsoft Security Architecture versus the NIST Cybersecurity Framework (CSF) -- Microsoft Security Architecture -- The Identify Function -- The Protect Function -- The Detect Function -- The Respond Function -- The Recover Function -- Using the Microsoft Reference Architecture -- Microsoft Threat Intelligence -- Service Trust Portal -- Security Development Lifecycle (SDL) -- Protecting the Hybrid Cloud Infrastructure -- Azure Marketplace -- Private Link -- Azure Arc -- Azure Lighthouse -- Azure Firewall -- Azure Web Application Firewall (WAF) -- Azure DDOS Protection -- Azure Key Vault -- Azure Bastion -- Azure Site Recovery -- Azure Security Center (ASC) -- Microsoft Azure Secure Score -- Protecting Endpoints and Clients -- Microsoft Endpoint Manager (MEM) Configuration Manager -- Microsoft Intune -- Protecting Identities and Access -- Azure AD Conditional Access -- Passwordless for End-to-EndSecure Identity -- Azure Active Directory (aka Azure AD) -- Azure MFA -- Azure Active Directory Identity Protection -- Azure Active Directory Privilege Identity Management (PIM) -- Microsoft Defender for Identity -- Azure AD B2B and B2C -- Azure AD Identity Governance -- Protecting SaaS Apps -- Protecting Data and Information -- Azure Purview -- Microsoft Information Protection (MIP)…”
Libro electrónico -
293805Publicado 2016Tabla de Contenidos: “…Promoting competition and improving the business environment -- C. Reforming education and strengthening skill use and school-to-work transitions -- D. …”
Libro electrónico -
293806por OECDTabla de Contenidos: “…. -- Основные выводы по компонентам -- Обеспечение равных условий деятельности в странах Восточного партнерства -- Защита конкуренции -- Принудительное исполнение договоров и альтернативное урегулирование споров -- Коммерческая добросовестность -- Компонент А - Адаптивное государственное управление -- Институционально-нормативная база -- Условия деятельности -- Процедуры банкротства и предоставление второго шанса -- Компонент B - Предприимчивость в развитии человеческого капитала -- Развитие предприимчивости в процессе обучения и поддержка предпринимательской деятельности женщин -- Умения МСП -- Компонент C - Доступ к финансированию -- Доступ к финансированию -- Компонент D - Доступ к рынкам -- Государственные закупки -- Стандарты и технические нормативы -- Интернационализация -- Компонент E - Поддержка инноваций и предпринимательства -- Услуги по развитию бизнеса -- Политика в области инноваций -- Применение принципов зеленой экономики -- Основные результаты оценки по странам…”
Publicado 2020
Libro electrónico -
293807por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Produit intérieur brut -- Tableau C. Comptes des ménages et des institutions privées sans but lucratif -- Tableau D. …”
Publicado 2001
Libro electrónico -
293808Publicado 2017Tabla de Contenidos: “…. -- Passing formatted arguments to a command by reading stdin -- Using xargs with find -- Counting the number of lines of C code in a source code directory -- While and subshell trick with stdin -- Translating with tr -- Getting ready -- How to do it... -- How it works... -- There's more... -- Deleting characters using tr -- Complementing character sets -- Squeezing characters with tr -- Character classes -- Checksum and verification -- Getting ready -- How to do it... -- How it works... -- There's more…”
Libro electrónico -
293809Publicado 2017Tabla de Contenidos: “…. -- Randomized grid search alternative -- Visualize the nonlinear RBF decision boundary -- More meaning behind C and gamma -- Multiclass classification with SVM -- Getting ready -- How to do it... -- OneVsRestClassifier -- Visualize it -- How it works... -- Support vector regression -- Getting ready -- How to do it... -- Chapter 9: Tree Algorithms and Ensembles -- Introduction -- Doing basic classifications with decision trees -- Getting ready -- How to do it... -- Visualizing a decision tree with pydot -- How to do it... -- How it works... -- There's more... -- Tuning a decision tree -- Getting ready -- How to do it... -- There's more... -- Using decision trees for regression -- Getting ready -- How to do it... -- There's more... -- Reducing overfitting with cross-validation -- How to do it... -- There's more... -- Implementing random forest regression -- Getting ready -- How to do it…”
Libro electrónico -
293810Publicado 2018Tabla de Contenidos: “…Deploying Cloud Functions -- Deploying from a local machine -- Deploying from a source repository -- Integrating with other Google services -- IAM and billing -- Cloud Functions and IAM -- Frameworks and tooling -- Summary -- Chapter 7: Google Compute Engine -- Understanding Compute Engine -- IaaS -- Infrastructure as Code (IaC) -- More than virtual machines -- When to use Compute Engine -- A straightforward migration path -- Host anything -- Building a robust global presence -- Long running and resource intensive processes -- Security and compliance -- Virtual machines on Google Compute Engine (GCE) -- Machine types -- Standard machine types -- High-memory machine types -- Mega-memory machine types -- High-CPU machine types -- Shared-core machine types -- Custom machine types -- Extended memory -- Other resources -- Disk storage -- GPUs -- Images -- Public images -- Premium images -- Community images -- Container images -- Managing Compute Engine instances -- Creating instances -- Remote access -- SSH access -- SCP access -- Remote Desktop Protocol (RDP) access -- Metadata server -- Default metadata -- Project-wide metadata -- Instance-specific metadata -- Setting and removing metadata -- Querying metadata from within instances -- Trying it out -- Modifying API responses -- Startup and shutdown scripts -- Startup scripts -- Shutdown Scripts -- Windows machines -- Updates and patches -- Availability policies -- Maintenance behavior -- Restart behavior -- Relocating an instance -- Storage solutions -- Persistent disks -- Standard and solid-state drive (SSD) persistent disks -- Persistent disk performance -- Boot disks -- Managing persistent disks -- Persistent disk snapshots -- Local SSDs -- Creating scalable solutions with GCE -- Custom images -- Creating images from a persistent disk -- Copying an image -- Creating images from snapshots…”
Libro electrónico -
293811por Hochstein, LorinTabla de Contenidos: “…Default Settings -- Appendix C. Using IAM Roles for EC2 Credentials -- AWS Management Console -- Command-Line -- Glossary -- Bibliography -- Index -- About the Author…”
Publicado 2015
Libro electrónico -
293812Publicado 2023Tabla de Contenidos: “…-- Lean and Marketing -- Lessons from an AP Kaizen -- Traditional Metrics Discussion -- We Should Have Part of Our Accounting Report Entitled -- Discover the Opportunities -- Summary -- Part 3: Lean Accounting by Jerold Solomon -- Value Streams -- Accounting for Lean -- Why a Traditional Standard Cost System Is Incompatible with Lean -- Summary -- Chapter Questions -- Notes -- Additional Readings -- Appendix A - Study Guide -- Appendix B - Acronyms -- Appendix C - Glossary -- Index…”
Libro electrónico -
293813Publicado 2016Tabla de Contenidos: “…-- An Introduction to CSS -- More CSS -- Selectors -- Properties -- Precedence in Styles -- The Style Sheet -- Adding CSS to Your Pages -- Creating Embedded and Inline Style Sheets -- Applying Styles -- Managing Styles -- Summary -- Chapter 4 Programming in C# and VB.NET -- Introduction to Programming -- Data Types and Variables…”
Libro electrónico -
293814por Hollander, MylesTabla de Contenidos: “…A Distribution-Free Test for General Alternatives in a Randomized Block Design with an Equal Number c(> -- 1) of Replications Per Treatment-Block Combination (Mack-Skillings) -- Procedure -- Large-Sample Approximation -- Ties -- Comments -- Properties -- Problems -- 7.10. …”
Publicado 2014
Libro electrónico -
293815por Gutjahr, ClaraTabla de Contenidos: “…-- Neuhumanismus und Neoliberalismus - eine verhängnisvolle Verbindung -- Politische Gemeinschaft statt Vereinzelung -- Literaturverzeichnis -- C.H.Beck & -- Co. enteignen! -- 1. Einführung -- 2. …”
Publicado 2024
Libro electrónico -
293816Publicado 2021Tabla de Contenidos: “…-- At COP26, Governments Must Make the Leap On Enforceable and Rising Carbon Pricing -- Pricing Can Trigger Rapid Changes in Behaviours -- Time to Announce a 'C-Day' -- The Price of Carbon - Set a Minimum, a Timeline, and an Adjustable Glidepath -- Cap-and-trade Schemes -- Europe's ETS - the World Leader, Despite Troubles -- China's ETS - a Lot of Room to Grow -- Whither the US On Carbon Pricing -- A Thin Regional Patchwork, With Some Successes -- A National US ETS is Needed -- Learn Lessons and Apply Them Globally and Locally -- Carbon Prices: How High is High Enough? …”
Libro electrónico -
293817Publicado 1947Tabla de Contenidos: “…Joies greco-romanes de l'Estanyol (Girona) / per Josep de C. Serra i Ràfols. La construcció a tornajornals / per Joan Amades. …”
991004128899706719 -
293818Publicado 2010Tabla de Contenidos: “…Changing the Default Document -- Editing Content in the Browser -- Summary -- Chapter 29: Using Library Items and Server-side Includes -- Dreamweaver Library Items -- Using the Library Assets Panel -- Editing a Library Item -- Updating Your Web Sites with Libraries -- Applying Server-Side Includes -- Summary -- Chapter 30: Maximizing Cross-Browser Compatibility -- Converting Pages in Dreamweaver -- Validating Your Code -- Checking Your Page for Compatibility -- Summary -- Chapter 31: Building Web Sites with a Team -- Following Check In/Check Out Procedures -- Keeping Track with Design Notes -- Browsing File View Columns -- Generating Reports -- Administering Adobe Contribute Sites -- Communicating with WebDAV -- Version Control with Subversion -- Summary -- Chapter 32: Integrating with XML and XSLT -- Understanding XML -- Exporting XML -- Importing XML -- Building Your Own XML Files -- Styling with XSL -- Summary -- Part VII: Extending Dreamweaver -- Chapter 33: Customizing Dreamweaver -- Adding New Commands -- Managing Menus and Keyboard Shortcuts -- Working with Custom Tags -- Customizing Property Inspectors -- Making Custom Floating Panels -- Developing Translators -- Extending C-Level Libraries -- Customizing Your Tag Libraries -- Summary -- Chapter 34: Handling Server Behaviors -- Understanding Server Behaviors -- Applying and Managing Server Behaviors -- Standard Server Behaviors -- Installing Additional Server Behaviors -- Creating Custom Server Behaviors -- Summary -- Chapter 35: Creating Adobe AIR Applications -- About Adobe AIR -- Installing AIR into Dreamweaver -- Designing for AIR -- Packaging Your AIR Application -- Summary -- Appendix A: What's New in Dreamweaver CS5 -- Dynamic Scope Expanded -- Totally Revamped Site Setup -- CSS Integration Enhanced -- Online Services Take Off -- Older Features Removed…”
Libro electrónico -
293819Tabla de Contenidos: “…Front Cover -- FTTx Networks -- FTTx Networks: Technology Implementation and Operation -- Copyright -- Dedication -- Contents -- About the Authors -- Acknowledgments -- 1 - Overview of FTTx -- 1 - Introduction -- PHYSICAL TECHNOLOGIES FOR COMMUNICATION -- PURPOSE OF THE BOOK -- TERMINOLOGY -- COMMON FTTH SYSTEMS -- OTHER FTTH PHYSICAL ARCHITECTURES -- FTTH DATA LINK AND NETWORK PROTOCOLS -- 2 - Deciding to Build an FTTx Network -- INTRODUCTION -- TYPES OF ORGANIZATIONS BUILDING FTTH NETWORKS -- System 1: US Municipal Electric System -- System 2: Incumbent Local Exchange Carrier, Small European Country -- System 3: Northern European Municipal Power Utility -- System 4: US Municipality-Owned Utility -- THE DECISION-MAKING PROCESS -- Business Considerations -- Technology Considerations -- Those Hidden Extras -- Organizational Considerations -- INDUSTRY ORGANIZATION -- Endnotes -- 2 - FTTx Technologies -- 3 - EPON -- INTRODUCTION -- EPON AND VARIATIONS -- EPON KEY FEATURES -- Speed -- DC Elimination and Clock Synchronization -- Encryption -- Flow Control Versus Multipoint Control Protocol -- Discovering the New Guy -- After Discovery -- Logical Link Identifier -- PtP Ethernet Versus PON -- LLID Downstream -- Then the Great Multicast Morph of 2012 -- LLID Upstream -- System Management -- Element Management -- Operational Support Systems -- EXTENSIONS TO EPON -- PON OPTICS -- EPON Optics Options -- SRS Effects -- SUMMARY -- Endnotes -- 4 - GPON -- INTRODUCTION -- GPON KEY FEATURES -- Speed -- DC Elimination and Clock Synchronization -- Encryption -- Flow Control in GPON -- Discovering the New Guy -- After Discovery -- PON Protection -- Type B Protection -- Type C Protection -- OMCI -- ELEMENT MANAGEMENT -- OPERATIONAL SUPPORT SYSTEMS -- PON OPTICS -- GPON Optics Options -- XG-PON Optics Options -- SRS Effects -- SUMMARY -- Endnotes…”
Libro electrónico -
293820Publicado 2017Tabla de Contenidos: “…. -- Identifying buses and interfaces -- UART identification -- SPI and I2C identification -- JTAG identification -- There's more... -- Serial interfacing for embedded devices -- Getting ready -- How to do it... -- See also -- NAND glitching -- Getting ready -- How to do it... -- See also -- JTAG debugging and exploitation -- Getting ready -- How to do it... -- See also -- Chapter 7: Radio Hacking -- Introduction -- Getting familiar with SDR -- Key terminologies in radio -- Hands-on with SDR tools -- Getting ready -- How to do it... -- Analyzing FM -- RTL-SDR for GSM analysis -- Working with GNU Radio -- There's more... -- Understanding and exploiting ZigBee -- Getting ready -- How to do it... -- There's more... -- Gaining insight into Z-Wave -- How to do it... -- Understanding and exploiting BLE -- Getting ready -- How to do it... -- There's more... -- Chapter 8: Firmware Security Best Practices -- Introduction -- Preventing memory-corruption vulnerabilities -- Getting ready -- How to do it... -- See also -- Preventing injection attacks -- How to do it... -- See also -- Securing firmware updates -- How to do it... -- Securing sensitive information -- How to do it... -- See also -- Hardening embedded frameworks -- Getting ready -- How to do it... -- Securing third-party code and components -- Getting ready -- How to do it... -- Chapter 9: Mobile Security Best Practices -- Introduction -- Storing data securely -- Getting ready -- How to do it... -- See also -- Implementing authentication controls…”
Libro electrónico