Mostrando 9,541 - 9,560 Resultados de 9,934 Para Buscar '"Crossed"', tiempo de consulta: 0.10s Limitar resultados
  1. 9541
    por International Energy Agency.
    Publicado 2003
    “…Austria's security of supply is enhanced by extensive cross-border trading and recent efforts to diversify natural gas import supply sources. …”
    Libro electrónico
  2. 9542
    “…Israel has failed to enforce many aspects of its labour legislation, contributing to poor employment conditions for many resident, cross-border and foreign low-income workers. Rules to overcome discrimination against all workers need to be enforced, and the illegal hiring and employment of temporary foreign workers need to be stamped out. …”
    Libro electrónico
  3. 9543
    Publicado 2016
    “…Sicherheitsmanagement und Richtlinien Grundlagen der Kryptografie Unterschiedliche Zugriffsverfahren Authentifizierungsmethoden Biometrische Erkennungssysteme Sicherheit durch Redundanz Physische Sicherheitsmaßnahmen Grundlagen der Systemhärtung Gefahren durch Malware Social Engineering Phishing, Pharming und andere Bösartigkeiten So sichern Sie den Mailverkehr Sicherheit für Protokolle Denial of Service, Pufferüberlauf, Race-Condition Cross-Site-Scripting, SQL-Injection, LDAP-Injection Spoofing, Man-in-the-Middle, Session-Hijacking Sichere Verbindungen durch VPN und Remote Access Was helfen RADIUS, TACACS, SSL, SSH? …”
    Libro electrónico
  4. 9544
    Publicado 2017
    “…Customize your Windows 10 Anniversary Update experience Install and remove hardware and software Set up your network and configure security Manage content, connect to printers, and troubleshoot issues Clear your to-do list faster than ever with Cortana voice commands, Windows Ink, Windows Hello, and a cross-platform capability that allows you to integrate a range of platforms including tablets, phones, Raspberry Pi, and even Xbox. …”
    Libro electrónico
  5. 9545
    Publicado 2019
    “…It also discusses examples of semantic applications and cross domain 3D retrieval, i.e. how to retrieve 3D models using various types of modalities, e.g. sketches and/or images. …”
    Libro electrónico
  6. 9546
    Publicado 2019
    “…You’ll also implement techniques for protection against attacks such as session fixation, clickjacking, cross-site request forgery, and more. By the end of the course, you’ll understand common security vulnerabilities and be able to prevent them with Spring Security, with an empirical approach to securing your web applications. …”
    Video
  7. 9547
    Publicado 2023
    “…But, for a real taste of medieval and Renaissance humor and in-your-face slapstick, one must cross the Channel to France, where over two hundred extant farces regularly dazzled crowds with blistering satires. …”
    Libro electrónico
  8. 9548
    por Naef, Tobias
    Publicado 2023
    “…Replicable legal analysis and practical solutions show the way to deal with cross-border data flows without violating fundamental rights and trade law principles. …”
    Libro electrónico
  9. 9549
    por Davies, Ken
    Publicado 2013
    “…Merger notification discrimination against foreign investors has been removed and a national security review process for cross-border M&As has been announced. The Chinese government should continue its efforts to liberalise and increase the transparency and predictability of the framework for both inward and outward FDI…”
    Capítulo de libro electrónico
  10. 9550
    Publicado 1951
    “…Descriptions of ten large-scale electronic computers of varying design and performance were presented, giving a cross-section of the varying designs to date of both parallel and serial types of electronic computers using storage devices including mercury delay lines, magnetic drums, and cathode-ray tubes. …”
    Libro electrónico
  11. 9551
    por Hansteen, Peter N. M.
    Publicado 2008
    “…But, perhaps more importantly, because we know you like to tinker, The Book of PF tackles a broad range of topics that will stimulate your mind and pad your resume, including how to: Create rule sets for all kinds of network traffic, whether it is crossing a simple home LAN, hiding behind NAT, traversing DMZs, or spanning bridges Use PF to create a wireless access point, and lock it down tight with authpf and special access restrictions Maximize availability by using redirection rules for load balancing and CARP for failover Use tables for proactive defense against would-be attackers and spammers Set up queues and traffic shaping with ALTQ, so your network stays responsive Master your logs with monitoring and visualization, because you can never be too paranoid The Book of PF is written for BSD enthusiasts and network admins at any level of expertise. …”
    Libro electrónico
  12. 9552
    Publicado 2013
    “…Among many valuable concepts and techniques, you’ll learn to: • Set up a professional color correction environment using the latest technologies and adhere to the most up-to-date standards • Work with log-encoded media and LUTs • Analyze shots quickly and correct errors of color and exposure • Create idealized adjustments for key features such as skin tone, skies, and product shots • Develop strategies for balancing clips in a scene to match one another for continuity, and grading greenscreen clips destined for visual effects • Master a variety of stylistic techniques used to set a scene’s mood • Apply principles of color and contrast to add depth and visual interest • Browse valuable research about memory colors, audience preferences, and critical corrections for achieving appealing skin tones and controlled environments • Follow along with the downloadable files that accompany this book, including HD footage, cross-platform exercises, and project files…”
    Libro electrónico
  13. 9553
    Publicado 2022
    “…After reading this book, you’ll be able to effectively communicate with engineering teams, provide valuable inputs in the system design review meetings of upcoming features and products, synthesize and simplify technical updates for cross-functional teams and stakeholders, and pass those dreaded technical interviews at your dream companies. …”
    Libro electrónico
  14. 9554
    Publicado 2021
    “…., in factories, where several oils are produced or used at the same time, or cross-contaminations…”
    Libro electrónico
  15. 9555
    por Burlton, Roger T.
    Publicado 2001
    “…Develop processes to align technology, organization, and facility transformation. Gain cross-organizational acceptance of process and personal change. …”
    Libro electrónico
  16. 9556
    por Hanson, J. Jeffrey
    Publicado 2009
    “…Coverage includes Understanding and using presentation-oriented, data-oriented, process-oriented, or hybrid mashup styles Identifying the optimal uses for mashups in your environment Up-front planning: requirements, constraints, and security considerations; stability, reliability, and performance issues Creating an enterprise mashup, step by step: design, identification of services and data sources, and more Creating effective frameworks for mashup mediation and monitoring Applying proven patterns to your enterprise mashup infrastructure Securing mashups: validation, HTML sanitization, protecting iframes, and avoiding common attacks, such as cross-site request forgery Building mashups with third-party tools for Google, Oracle, Salesforce.com, Amazon, and other environments Developing an open, agile environment that supports rapid, flexible development of new mashups Also of interest: The companion book, Mashup Patterns: Designs and Examples for the Modern Enterprise by Mike Ogrinz (Addison-Wesley), is an indispensable guide to patterns, with insights for making mashups work in production environments…”
    Libro electrónico
  17. 9557
    por Baharestani, Daniel
    Publicado 2013
    “…Create loosely coupled applications by implementing dependency injection using Ninject Learn how to design an enterprise application so as to maximize its maintainability, extensibility and testability Automate the process of dealing with the dependencies of your application and object lifetimes Address the cross-cutting concerns of your applications in the easiest way Full of real-life, step-by-step examples and clear code samples In Detail Dependency injection is an approach to creating loosely coupled applications. …”
    Libro electrónico
  18. 9558
    Publicado 2006
    “…DB2 utilities provide integrated support with LOAD and UNLOAD, Cross Loader, REORG, CHECK DATA, and CHECK LOB. In this IBM Redbooks publication, we provide a totally revised description of the DB2 functions for LOB support as well as useful information about how to design and implement LOBs. …”
    Libro electrónico
  19. 9559
    por Brito, Michael
    Publicado 2013
    “…Social business pioneer Michael Brito covers every step of the process, including: Understanding the unpredictable nature and dynamic behaviors of the social customer Deploying social business strategies that will help facilitate the change from brand to media company Building a content organization and setting the stage for transformation Creating a real-time command center that will help facilitate reactive and proactive content marketing Creating a centralized editorial team that will drive content strategy, governance, and cross-team collaboration Building the content supply chain (workflows for content ideation, creation, approval, distribution, and integration) Enabling customers and employees (brand journalists) to feed the content engine Developing your content strategy that can be executed across paid, earned, and owned media content Transitioning from “brand messaging” to a highly relevant content narrative Evaluating the content marketing vendors and software platforms vying for your business Along the way, Brito presents multiple case studies from brand leaders worldwide, including RedBull, Oreo, Tesla Motors, Burberry, Sharpie, and Pepsi—delivering specific, actionable, powerfully relevant insights you can act on to begin the transformation from brand to media company…”
    Libro electrónico
  20. 9560
    Publicado 2018
    “…This book teaches you how you can use JavaScript and Node.js to build highly scalable APIs that work well with lightweight cross-platform client applications. It begins with the basics of Node.js in the context of backend development, and quickly leads you through the creation of an example client that pairs up with a fully authenticated API implementation. …”
    Libro electrónico