Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Technology: general issues 78
- History of engineering & technology 57
- Research & information: general 57
- Computer security 54
- Security measures 49
- Medicine 42
- Computer networks 35
- Environment 34
- Daños y perjuicios (Derecho civil) 31
- damage 31
- mechanical properties 31
- Digital techniques 29
- microstructure 29
- Brain damage 28
- History 28
- inflammation 28
- machine learning 28
- Damages 27
- Law and legislation 27
- climate change 27
- numerical simulation 27
- oxidative stress 27
- Photography 26
- Biology, life sciences 25
- Management 25
- DNA damage 24
- Prevention 24
- Economic aspects 23
- Social aspects 23
- Economics 22
-
1261Publicado 2013“…Hazmat accidents can result in significant impact to the population (death, injuries) and damage to the environment (destroyed or damaged buildings and infrastructure). …”
Libro electrónico -
1262por Glezerman, Tatyana B.“…The author identifies deficiencies in areas of the left-hemisphere associated with the self and identity as central to autism. From this primary damage, the brain further reorganizes to compensate, explaining the diverse behaviors among low- and high-functioning individuals as well as autistic savants. …”
Publicado 2012
Libro electrónico -
1263Publicado 2014“…In other cases, nature outsmarts us, doing great damage despite expensive mitigation measures or causing us to divert limited resources to mitigate hazards that are overestimated. …”
Libro electrónico -
1264por Organisation for Economic Co-operation and Development.“…Illicit trade in counterfeit goods causes economic damage by reducing sales and profits as well as innovation incentives in legitimate industries. …”
Publicado 2023
Libro electrónico -
1265por PELTIER, THOMAS R.“…Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. …”
Publicado 2017
Libro electrónico -
1266por Frost, Chris“…Affected firms can suffer significant commercial damage or even bankruptcy as a result. Only now is there a growing realisation that risk management is a key management responsibility. …”
Publicado 2001
Libro electrónico -
1267Publicado 2021“…As such, the future challenge will be not only to meet the rising demand but also to implement less reliance on depleting fossil fuels, which cause damage to the environment. Moreover, the sustainability of supplied energy requires a reduction of emissions to control the absorption capacity vis-à-vis the environment. …”
Libro electrónico -
1268Publicado 2021“…One of the reasons for the growing interest is the rapid development of marine resources (such as in the oil and gas industry, marine renewable energy, and fish farming industry) as well as the damage to marine infrastructure that has occurred in the last two decades. …”
Libro electrónico -
1269por Zandi, Mark M.“…The financial chaos inflicted catastrophic damage: double-digit unemployment; crashing house and stock prices; federal budget deficits in the trillions, and a wider gap between the country’s haves and have-nots. …”
Publicado 2012
Libro electrónico -
1270Publicado 2022“…As climate-change- and human-induced floods inflict increasing costs upon the planet, both in terms of lives and environmental damage, flood monitoring tools derived from remote sensing platforms have undergone improvements in their performance and capabilities in terms of spectral, spatial and temporal extents and resolutions. …”
Libro electrónico -
1271Publicado 2020“…Mental disorders can result from disruption of neuronal circuitry, damage to the neuronal and non-neuronal cells, altered circuitry in the different regions of the brain and any changes in the permeability of the blood brain barrier. …”
Libro electrónico -
1272Publicado 2022“…To take the path to a more just future, we must not ignore the damage but see it through others’ eyes, bear witness to it, and uncover its origins. …”
Capítulo -
1273Publicado 2018Tabla de Contenidos: “…About the Special Issue Editor -- Preface to "Dietary Fructose and Glucose: The Multifacetted Aspects of Their Metabolism and Implication for Human Health" -- Relationship between Added Sugars Consumption and Chronic Disease Risk Factors: Current Understanding -- Individual Diet Modeling Shows How to Balance the Diet of French Adults with or without Excessive Free Sugar Intakes -- The Role of Carbohydrate Response Element Binding Protein in Intestinal and Hepatic Fructose Metabolism Fructose-Rich Diet Affects Mitochondrial DNA Damage and Repair in Rats -- High Dietary Fructose: Direct or Indirect Dangerous Factors Disturbing Tissue and Organ Functions -- Role of the Enterocyte in Fructose-Induced Hypertriglyceridaemia Inborn Errors of Fructose Metabolism. …”
Libro electrónico -
1274Publicado 2023“…Drawing attention to the affects of climate change and the broader environmental damage of the Anthropocene, this study mobilizes its frame in concert with other tools from cultural and film studies-such as debates over Black representation-to provide readings of the underlying environmental themes in Black American and Norwegian screen texts. …”
Libro electrónico -
1275por Bergmann, Jonas“…The higher the structural constraints, such as weak governance, and the more damaging the climate impacts were, the higher the risk of well-being declines. …”
Publicado 2024
Libro electrónico -
1276Publicado 2022“…You will write C# scripts for simple game mechanics, perform procedural programming, and add complexity to your games by introducing intelligent enemies and damage-dealing projectiles. You will explore the fundamentals of Unity game development, including game design, lighting basics, player movement, camera controls, collisions, and more with every passing chapter…”
Libro electrónico -
1277Publicado 2009Tabla de Contenidos: “…De Mello -- Exploiting rat genetics to investigate hypertensive end-organ damage / Xiaoujun Liu ... [et al.] -- Alternative renin transcripts and functions of cytoplasmatic renin / Jörg Peters and Heike Wanka -- Novel aspects of the cardiac renin-angiotensin system / Vivek P. …”
Libro -
1278Publicado 2012Tabla de Contenidos: “…Cable Modem Transmission System -- Multiple Choice Questions -- Answers -- Unit III: Data Link Layer -- Chapter 6: Error Detection and Correction -- Character Count -- Byte Stuffing -- Bit Stuffing -- Physical Layer Coding Violations -- Parity Checking -- Two-dimensional Parity Check -- Checksum -- Cyclic Redundancy Check (CRC) -- Multiple Choice Questions -- Answers -- Chapter 7: Flow and Error Control -- Link Utilization -- Link Utilization -- Lost or Damaged Frames -- Lost or Delayed ACKs -- Link Utilization -- Lost or Damaged Frames -- Lost or Delayed RR or REJ -- Link Utilization -- Lost or Damaged Frame -- Lost or Delayed RR -- Lost or Delayed SREJ -- Link Utilization -- Types of stations -- Types of Link Configurations -- Modes of Data Transfer -- Frame Structure -- Control Field for I-frame -- Control Field for S-frame -- Control Field for U-Frame -- Link Control Protocol -- Network Control Protocol -- Password Authentication Protocol -- Challenge Handshake Authentication Protocol -- Multiple Choice Questions -- Answers -- Chapter 8: Media Access Control -- Static Channel Allocation -- Dynamic Channel Allocation -- Pure ALOHA -- Slotted ALOHA -- Bit-Map Protocol -- Binary Countdown Protocol -- Reservation -- Polling -- Token Passing -- Multiple choice questions -- Answers -- Chapter 9: Ethernet, Virtual Circuit Networks and SONET -- Physical Layer -- Data Link Layer -- Standard Ethernet -- Fast Ethernet -- Gigabit Ethernet -- Ten-Gigabit Ethernet -- Access Method -- Time Registers -- Timers -- Station Procedure -- Basic Service Set -- Extended Service Set -- Bluetooth Architecture -- Radio Layer -- Baseband Layer -- L2CAP Layer -- Link Manager Protocol -- Host Controller Interface -- Radio Frequency Communication -- Service Discovery Protocol (SDP) -- Telephony Control Protocol Binary (TCS BIN) -- AT-Commands -- Point-to-Point Bluetooth…”
Libro electrónico -
1279Publicado 2014Tabla de Contenidos: “…Rapid Earthquake Loss Assessment after Damaging Earthquakes -- 3. Existing Buildings: The New Italian Provisions for Probabilistic Seismic Assessment -- 4. …”
Libro electrónico -
1280Publicado 2018Tabla de Contenidos: “…Introduction: The Elephant Whisperer -- Part I: Slow-Moving Storm: A History of Warnings and Apathy -- Chapter 1: A Slow-Moving Storm: The Existential Threat to Business and the Economy -- Chapter 2: The Rainbow in the Storm: Medical Science Meets Building Science -- Chapter 3: Storm Damage: The Cost of Forgetting -- Chapter 4: Stress: Portrait of a Killer -- Part II: Is There Shelter from the Storm? …”
Libro electrónico