Mostrando 29,841 - 29,860 Resultados de 41,870 Para Buscar '"Documental"', tiempo de consulta: 0.20s Limitar resultados
  1. 29841
    Publicado 2020
    Tabla de Contenidos: “…Note continued: Find Apps on the App Store -- Update and Remove Apps -- Type, Cut, Copy, and Paste Text -- Format and Replace Text -- ch. 8 Browsing the Web and E-Mailing -- Browse the Web with Safari -- Access Websites Quickly with Bookmarks -- Create Bookmarks -- Keep a Reading List of Web Pages -- Navigate Among Open Web Pages Using Tabs -- Tighten Up Safari's Security -- Manage Your App and Website Passwords -- Using the Sign In with Apple Feature -- Read E-Mail -- Reply To or Forward an E-Mail Message -- Organize Your Messages in Mailbox Folders -- Write and Send E-Mail Messages -- ch. 9 Keeping Your Life Organized -- Browse Existing Events in Your Calendars -- Create New Events in Your Calendars -- Work with Calendar Invitations -- Track Your Commitments with Reminders -- Keep Essential Documents at Hand with Wallet -- Find Your Location with Maps -- Find Directions with Maps -- Explore with 3D Flyover -- Using Maps' Favorites and Contacts -- Take Notes…”
    Libro electrónico
  2. 29842
    Publicado 2003
    Tabla de Contenidos: “…11 Performing mySAP.com Component Installations -- Implementation Methodologies for SAP Installations -- Rounding Out Your SAP System Landscape -- Leveraging Installation Documentation, Tools, and Approaches -- Installing Your mySAP-Enabling Foundation-NetWeaver -- Installation Details for mySAP Components -- Addressing General mySAP Post-Installation Tasks -- Tools and Techniques -- Summary -- 12 Rounding Out Support for SAP -- Identifying and Staffing the Remaining TSO Roles -- Approaches to "Filling in the Final Holes" -- Let's Give a Big Warm Welcome to the "Specialists"! …”
    Libro electrónico
  3. 29843
    por Khimani, Bina, Mackler, Richard
    Publicado 2005
    Tabla de Contenidos: “…WSAM V3.1 installation rollout planning -- 4.1 Strategic or tactical -- 4.2 Planning the rollout -- 4.2.1 Identify an enterprise business sponsor and the stakeholders -- 4.2.2 Define ownership -- 4.2.3 Choose the project manager -- 4.2.4 Educate the user community and gain stakeholder support -- 4.2.5 Identify and document business needs for monitoring -- 4.2.6 Identify applications and JVMs to monitor -- 4.2.7 Define appropriate levels of access to the user groups -- 4.2.8 Define appropriate views to the user groups -- 4.2.9 Plan time frame to implement -- 4.3 Rollout -- 4.3.1 Develop WSAM enterprise architecture -- 4.4 Establish a training plan -- 4.5 Identify reporting requirements -- 4.6 Identify implementation team -- 4.7 Identify initial deployment benefits -- 4.8 Installation -- 4.8.1 Before you start -- 4.8.2 Planning the installation -- 4.8.3 Installing WSAM -- 4.8.4 Major Tasks performed by the installer -- 4.8.5 Installation scripts -- 4.8.6 Common mistakes -- 4.8.7 Resolving installation issues -- 4.8.8 Installation log files -- 4.9 Platform specific issues -- 4.9.1 Customized startup and shutdown instructions -- 4.9.2 Common error messages and solutions -- 4.10 Maintenance -- 4.10.1 Assign responsibilities -- 4.10.2 Training -- 4.11 Database maintenance -- 4.12 Monitoring -- 4.13 Upgrade maintenance strategy -- 4.13.1 Pre-production testing -- 4.13.2 Software upgrades -- 4.13.3 Updating a large number of servers (Data Collectors) -- Chapter 5. …”
    Libro electrónico
  4. 29844
    Publicado 2022
    Tabla de Contenidos: “…Connection parameters -- Creating connections -- Devices and networks -- Downloading to an HMI -- Simulating a unified HMI -- Accessing a unified HMI simulation -- Security considerations -- Summary -- Chapter 15: Programming Tips and Additional Support -- Simplifying logic tips -- Delay timers -- AT constructor -- IF statements -- Serializing -- Refactoring -- Consolidating blocks -- Sequences - best practices -- Using constants instead of numerical values -- Managed transitions -- Managing output requests -- Naming conventions and commenting -- Comments in SCL -- Additional Siemens support -- Using TIA Portal's help system -- Siemens forum -- Siemens documentation archive -- Further support - Liam Bee -- Summary -- Index…”
    Libro electrónico
  5. 29845
    Publicado 2014
    Tabla de Contenidos: “…The International Working Men's Association: Addresses, Resolutions, Interventions, Documents -- The Inaugural Address : 1. Karl Marx, Inaugural Address of the International Working Men's Association -- The Political Program : 2. …”
    Libro electrónico
  6. 29846
    por Buffel, Tine
    Publicado 2024
    Tabla de Contenidos: “…Emancipatory methods to co-produce knowledge with marginalised communities -- Co-producing a comic book with older refugees -- Co-producing films with older people about the impact of gentrification -- Conclusion -- References -- 11 Dismantling and rebuilding praxis for Age-Friendly Cities and Communities: towards an emancipatory approach -- Introduction -- Guiding documents for the WHO's 'Age-Friendly World' -- Critical analysis -- Beyond social planning towards a plurality of approaches to community change -- Beyond quantitative metrics towards other ways to characterise communities -- Beyond older adults' participation and involvement towards co-production and allyship -- Towards an emancipatory AFCC approach and a 'different suite of tools' -- Conclusion -- Note -- Acknowledgements -- References -- 12 Conclusion: reimagining age-friendly cities and communities -- Introduction -- Urban ageing and spatial justice -- Incorporating diversity, equity and co-production in urban ageing research -- Embracing diversity -- A focus on equity -- Centring older people -- Reimagining age-friendly cities and communities -- References -- Afterword -- Principles and practices for work with older people -- References -- Index…”
    Libro electrónico
  7. 29847
    Publicado 2020
    Tabla de Contenidos: “…Luisa Algar Pérez-Castilla -- La situación de la danza en la Comunidad Foral de Navarra : consecuencias de la política cultural y eduativa / María Begoña Garayalde Buey -- La danza contemporánea en la programación de los festivales de la Región de Murcia (1970-2019). Una aproximación documenteal / Tania Herrero Martínez -- El bailarín y su reconocimiento. …”
    Libro
  8. 29848
    Publicado 2022
    Tabla de Contenidos: “…7.3.3 Adding the Authorization header security scheme -- 7.3.4 Adding the security requirements to POST /reviews -- 7.3.5 Using the security feature of try-it-out -- 7.4 Optional security -- 7.5 Other types of security schemas -- 7.6 How to add security schemes in general -- Summary -- 8 Preparing and hosting API documentation -- 8.1 The problem -- 8.2 Adding metadata to the definition -- 8.3 Writing the description in Markdown -- 8.3.1 Markdown basics -- 8.3.2 Adding a rich text description to the FarmStall API definition -- 8.4 Organizing operations with tags -- 8.4.1 Adding the Reviews tag to GET /reviews -- 8.4.2 Adding descriptions to tags -- 8.4.3 Adding the rest of the tags -- 8.5 Hosting our API documentation using Netlify.com and Swagger UI -- 8.5.1 Preparing Swagger UI with our definition -- 8.5.2 Hosting on Netlify.com -- 8.6 The end of part 1 -- Summary -- Part 2 Design-first -- 9 Designing a web application -- 9.1 The PetSitter idea -- 9.2 PetSitter project kickoff -- 9.2.1 Additional requirements -- 9.2.2 Team structure -- 9.2.3 API-driven architecture -- 9.2.4 The plan -- 9.3 Domain modeling and APIs -- 9.3.1 Domain modeling for APIs -- 9.3.2 Looking back on FarmStall -- 9.4 A domain model for PetSitter -- 9.4.1 Concepts in the model -- 9.4.2 The User model -- 9.4.3 The Job and Dog models -- 9.5 User stories for PetSitter -- 9.5.1 What are user stories? …”
    Libro electrónico
  9. 29849
    Publicado 2021
    Tabla de Contenidos: “…2.3.4 Rational, complex numbers, and other numeric types -- 2.4 Flow control -- 2.4.1 For: The central pillar of iteration -- 2.4.2 Continue: Skipping the rest of the current iteration -- 2.4.3 While: Looping until a condition changes its state -- 2.4.4 Loop: The basis for Rust's looping constructs -- 2.4.5 Break: Aborting a loop -- 2.4.6 If, if else, and else: Conditional branching -- 2.4.7 Match: Type-aware pattern matching -- 2.5 Defining functions -- 2.6 Using references -- 2.7 Project: Rendering the Mandelbrot set -- 2.8 Advanced function definitions -- 2.8.1 Explicit lifetime annotations -- 2.8.2 Generic functions -- 2.9 Creating grep-lite -- 2.10 Making lists of things with arrays, slices, and vectors -- 2.10.1 Arrays -- 2.10.2 Slices -- 2.10.3 Vectors -- 2.11 Including third-party code -- 2.11.1 Adding support for regular expressions -- 2.11.2 Generating the third-party crate documentation locally -- 2.11.3 Managing Rust toolchains with rustup -- 2.12 Supporting command-line arguments -- 2.13 Reading from files -- 2.14 Reading from stdin -- Summary -- 3 Compound data types -- 3.1 Using plain functions to experiment with an API -- 3.2 Modeling files with struct -- 3.3 Adding methods to a struct with impl -- 3.3.1 Simplifying object creation by implementing new() -- 3.4 Returning errors -- 3.4.1 Modifying a known global variable -- 3.4.2 Making use of the Result return type -- 3.5 Defining and making use of an enum -- 3.5.1 Using an enum to manage internal state -- 3.6 Defining common behavior with traits -- 3.6.1 Creating a Read trait -- 3.6.2 Implementing std::fmt::Display for your own types -- 3.7 Exposing your types to the world -- 3.7.1 Protecting private data -- 3.8 Creating inline documentation for your projects -- 3.8.1 Using rustdoc to render docs for a single source file…”
    Libro electrónico
  10. 29850
    Publicado 2021
    Tabla de Contenidos: “…-- 8.1.1 URIs -- 8.1.2 URLs -- 8.1.3 URNs -- 8.1.4 DIDs -- 8.2 The functional level: How DIDs work -- 8.2.1 DID documents -- 8.2.2 DID methods -- 8.2.3 DID resolution -- 8.2.4 DID URLs -- 8.2.5 Comparison with the Domain Name System (DNS) -- 8.2.6 Comparison with URNs and other persistent Identifiers -- 8.2.7 Types of DIDs -- 8.3 The architectural level: Why DIDs work -- 8.3.1 The core problem of Public Key Infrastructure (PKI) -- 8.3.2 Solution 1: The conventional PKI model -- 8.3.3 Solution 2: The web-of-trust model -- 8.3.4 Solution 3: Public key-based identifiers -- 8.3.5 Solution 4: DIDs and DID documents -- 8.4 Four benefits of DIDs that go beyond PKI -- 8.4.1 Beyond PKI benefit 1: Guardianship and controllership -- 8.4.2 Beyond PKI benefit 2: Service endpoint discovery -- 8.4.3 Beyond PKI benefit 3: DID-to-DID connections -- 8.4.4 Beyond PKI benefit 4: Privacy by design at scale -- 8.5 The semantic level: What DIDs mean -- 8.5.1 The meaning of an address -- 8.5.2 DID networks and digital trust ecosystems -- 8.5.3 Why isn't a DID human-meaningful? …”
    Libro electrónico
  11. 29851
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- Elements of Information Organization and Dissemination -- Copyright Page -- Contents -- Preface -- A Background -- A.1 Introduction -- A.2 Concept of IOD -- A.3 Need for IOD -- A.4 Role of IOD -- A.5 Nomenclature -- A.5.1 Other Names -- A.6 Definition of Documentation -- A.6.1 New Dimension -- A.6.2 Clear Scope -- A.6.3 New Context -- A.7 Main Facets -- A.7.1 Differences -- A.8 IOD Activities -- References -- B Information Sources -- B.1 Introduction -- B.2 Genesis of IS -- B.3 Varieties of IS -- B.3.1 Human Information Sources -- B.3.2 Institutional Information Sources -- B.3.3 Documentary Information Sources (DIS) -- B.3.3.1 Definition -- B.3.3.2 Recording Media and Technology -- B.3.3.3 Media of Presentation -- Advantages of IS in Print Medium -- Advantages of IS in Digital Medium -- B.3.3.4 Categories of DIS -- Binary Division -- Trinary Division -- Quaternary Division -- B.3.3.5 Characteristics of DIS -- Primary Information Sources -- Secondary Information Sources -- Tertiary Information Sources -- Differences Between DIS -- B.3.3.6 Nature of Printed DIS -- Book -- Periodical -- Report -- Pamphlet -- Research Paper -- Conference Paper -- Guide to Literature -- Patent Literature -- Standard -- Specification -- Trade Literature -- Manuscript -- Government Publication -- B.3.3.7 Nature of Non-printed DIS -- Electronic Publications -- Databases -- Internet/Web Resources -- B.3.3.8 Gray Literature -- Characteristics of GL -- Types of GL -- B.4 Importance of IS -- References -- C Information Users -- C.1 Introduction -- C.2 User -- C.2.1 User Community -- C.2.2 Types of User -- C.3 User Study (US) -- C.3.1 Types and Scope of US -- C.3.2 Need of US -- C.3.3 Objectives of US -- C.3.4 User Characteristics -- C.3.5 Benefits of User Study -- C.3.6 Guidelines for US -- C.4 Information Need -- C.4.1 Basis of Need -- C.4.2 Affecting Factors…”
    Libro electrónico
  12. 29852
    Publicado 2019
    Tabla de Contenidos: “…-- 7.4 Meetings for Planning -- 7.4.1 Quarterly Release Planning -- 7.4.2 Sprint Planning -- 7.5 Plan for Your Unplanned -- 7.6 Documentation -- 7.6.1 Requirements vs. Acceptance Criteria -- 7.7 Go With the Flow -- 7.7.1 Agile Ceremonies Promote and Increase Flow -- 7.7.1.1 Feature Writing, Decomposition, and Grooming -- 7.7.1.2 Detailed Documents and Meetings -- 7.7.1.2.1 Sprint Backlog Grooming -- 7.7.1.2.2 Daily Scrum -- 7.7.1.2.3 Sprint Demo -- 7.7.1.2.4 Release Demo -- 7.7.1.2.5 Sprint Retro -- 7.7.2 Agile Flow Exists Within and Between Sprints -- 7.7.2.1 Within Sprints -- 7.7.2.1.1 Work Item Fields and States -- 7.7.2.1.1.1 User Story Cycle -- 7.7.2.1.1.2 How Do We Write User Stories and How Granular Should They Be? …”
    Libro electrónico
  13. 29853
    Publicado 2004
    Tabla de Contenidos: “…3.2.3 Install a Web site using the Database Installer -- 3.2.4 Manual installation -- 3.3 Configuration -- 3.3.1 Database Access Control Lists (ACLs) and Roles -- 3.3.2 Configure the Agents -- 3.3.3 Configure System Settings -- 3.3.4 Configure database and replication properties -- 3.3.5 Set up online help -- 3.4 Advanced configuration -- 3.4.1 Installation of the Microsoft Word Wizard -- 3.4.2 Configure the Web UI for Microsoft Word document upload -- 3.4.3 Configure feedback management -- 3.4.4 Configure version control -- 3.4.5 Configure the Importer database -- 3.5 Portal configuration -- 3.5.1 Portlet installation -- 3.5.2 Portlet configuration -- Chapter 4. …”
    Libro electrónico
  14. 29854
    Publicado 2010
    Tabla de Contenidos: “…2.2.4 Full-Duplex Ethernet -- 2.2.5 Switched Ethernet -- 2.2.6 10-Gigabit Ethernet -- 2.2.7 Virtual LAN -- 2.2.8 Token Ring -- 2.2.9 FDDI -- 2.2.10 Wireless LAN -- 2.3 Network Node Components -- 2.3.1 Hubs -- 2.3.2 Bridges -- 2.3.3 Remote Bridge -- 2.3.4 Transparent Bridge -- 2.3.5 Source-Routing Bridge -- 2.3.6 Routers -- 2.3.7 Gateways and Protocol Converters -- 2.3.8 Multiprotocol Routers and Tunneling -- 2.3.9 Half-Bridge Configuration of Router -- 2.3.10 Edge Routers -- 2.3.11 Switches -- 2.4 Wide Area Networks -- 2.5 Transmission Technology -- 2.5.1 Introduction -- 2.5.2 Wired Transmission -- 2.5.3 Wireless Transmission Media -- 2.5.4 Transmission Modes -- 2.6 Integrated Services: ISDN, Frame Relay, and Broadband -- Summary -- Exercises -- Part II: SNMP and Network Management -- Chapter 3: Basic Foundations: Standards, Models, and Language -- 3.1 Network Management Standards -- 3.2 Network Management Models -- 3.3 Organization Model -- 3.4 Information Model -- 3.4.1 Management Information Tree -- 3.4.2 Managed Object Perspective -- 3.5 Communication Model -- 3.6 Abstract Syntax Notation One: ASN. 1 -- 3.6.1 Terminology, Symbols, and Conventions -- 3.6.2 Objects and Data Types -- 3.6.3 Object Name -- 3.6.4 An Example of Use of ASN.1 from ISO 8824 -- 3.7 Encoding Structure -- 3.8 Macros -- 3.9 Functional Model -- Summary -- Exercises -- Chapter 4: SNMPv1 Network Management: Organization and Information Models -- 4.1 Managed Network: Case Histories and Examples -- 4.2 History of SNMP Management -- 4.3 Internet Organizations and Standards -- 4.3.1 Organizations -- 4.3.2 Internet Documents -- 4.4 SNMP Model -- 4.5 Organization Model -- 4.6 System Overview -- 4.7 Information Model -- 4.7.1 Introduction -- 4.7.2 Structure of Management Information -- 4.7.3 Managed Objects -- 4.7.4 Management of Information Base -- Summary -- Exercises…”
    Libro electrónico
  15. 29855
    Publicado 2018
    Tabla de Contenidos: “…-- The Overall Picture -- Nordic Legal Aid in the European Setting -- The CEPEJ's Evaluation of European Legal Aid Schemes -- Conclusion -- References -- Legislation and Other Legislative Documents -- Finland: -- Norway: -- Council of Europe/CEPEJ:…”
    Libro electrónico
  16. 29856
    Publicado 2018
    Tabla de Contenidos: “…. -- Redirecting the My Documents folder to a network share -- Getting ready -- How to do it... -- How it works... -- Creating a VPN connection with Group Policy -- Getting ready -- How to do it... -- How it works... -- Creating a printer connection with Group Policy -- Getting ready -- How to do it... -- How it works... -- Using Group Policy to enforce an Internet proxy server -- Getting ready -- How to do it... -- How it works... -- Viewing the settings currently enabled inside a GPO -- Getting ready -- How to do it... -- How it works... -- See also -- Viewing the GPOs currently assigned to a computer -- Getting ready -- How to do it... -- How it works... -- See also -- Backing up and restoring GPOs -- Getting ready -- How to do it... -- How it works... -- See also -- Plugging in ADMX and ADML templates -- Getting ready -- How to do it... -- How it works... -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  17. 29857
    Publicado 2018
    Tabla de Contenidos: “…Access token manipulation -- Exploiting accessibility features -- Application shimming -- Bypassing user account control -- DLL injection -- DLL search order hijacking -- Dylib hijacking -- Exploration of vulnerabilities -- Launch daemon -- Hands-on example of privilege escalation on a Windows 8 target -- Conclusion and lessons learned -- References -- Summary -- Chapter 9: Security Policy -- Reviewing your security policy -- Educating the end user -- Social media security guidelines for users -- Security awareness training -- Policy enforcement -- Application whitelisting -- Hardening -- Monitoring for compliance -- References -- Summary -- Chapter 10: Network Segmentation -- Defense in depth approach -- Infrastructure and services -- Documents in transit -- Endpoints -- Physical network segmentation -- Discovering your network -- Securing remote access to the network -- Site-to-site VPN -- Virtual network segmentation -- Hybrid cloud network security -- References -- Summary -- Chapter 11: Active Sensors -- Detection capabilities -- Indicators of compromise -- Intrusion detection systems -- Intrusion prevention system -- Rule-based detection -- Anomaly-based detection -- Behavior analytics on-premises -- Device placement -- Behavior analytics in a hybrid cloud -- Azure Security Center -- References -- Summary -- Chapter 12: Threat Intelligence -- Introduction to threat intelligence -- Open source tools for threat intelligence -- Microsoft threat intelligence -- Azure Security Center -- Leveraging threat intelligence to investigate suspicious activity -- References -- Summary -- Chapter 13: Investigating an Incident -- Scoping the issue -- Key artifacts -- Investigating a compromised system on-premises -- Investigating a compromised system in a hybrid cloud -- Search and you shall find it -- Lessons learned -- References -- Summary…”
    Libro electrónico
  18. 29858
    Publicado 2022
    Tabla de Contenidos: “…Refactoring to asynchronous communication -- Store Management state transfer -- Customer state transfer -- Order processing state transfer -- Payments state transfer -- Documenting the asynchronous API -- Adding a new order search module -- Building read models from multiple sources -- Creating a read model record -- Summary -- Chapter 8: Message Workflows -- Technical requirements -- What is a distributed transaction? …”
    Libro electrónico
  19. 29859
    Tabla de Contenidos: “…-- Étude de l'opinion des étudiants sur le processus éducatif et la gestion de l'université -- Introduction -- Note historique -- La législation sur l'enseignement supérieur en République tchèque -- Des documents nationaux approuvés par le gouvernement : -- Les conventions et déclarations internationales : -- Les institutions principales du système d'enseignement supérieur en République tchèque -- Figure 1. …”
    Libro electrónico
  20. 29860
    Publicado 2016
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: A First Step in Go -- The Go programming language -- Playing with Go -- No IDE required -- Installing Go -- Source code examples -- Your first Go program -- Go in a nutshell -- Functions -- Packages -- The workspace -- Strongly typed -- Composite types -- The named type -- Methods and objects -- Interfaces -- Concurrency and channels -- Memory management and safety -- Fast compilation -- Testing and code coverage -- Documentation -- An extensive library -- The Go Toolchain -- Summary -- Chapter 2: Go Language Essentials -- The Go source file -- Optional semicolon -- Multiple lines -- Go identifiers -- The blank identifier -- Muting package imports -- Muting unwanted function results -- Built-in identifiers -- Types -- Values -- Functions -- Go variables -- Variable declaration -- The zero-value -- Initialized declaration -- Omitting variable types -- Short variable declaration -- Restrictions for short variable declaration -- Variable scope and visibility -- Variable declaration block -- Go constants -- Constant literals -- Typed constants -- Untyped constants -- Assigning untyped constants -- Constant declaration block -- Constant enumeration -- Overriding the default enumeration type -- Using iota in expressions -- Skipping enumerated values -- Go operators -- Arithmetic operators -- The increment and decrement operators -- Go assignment operators -- Bitwise operators -- Logical Operators -- Comparison operators -- Operator precedence -- Summary -- Chapter 3: Go Control Flow -- The if statement -- The if statement initialization -- Switch statements -- Using expression switches -- The fallthrough cases -- Expressionless switches -- Switch initializer -- Type switches -- The for statements -- For condition…”
    Libro electrónico