Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 239
- Application software 202
- Artificial intelligence 200
- Management 192
- Engineering & Applied Sciences 170
- Computer networks 160
- Cloud computing 157
- Computer programs 127
- Machine learning 123
- Computer security 116
- Computer graphics 102
- Data processing 101
- Python (Computer program language) 101
- Security measures 101
- Digital techniques 98
- Computer Science 94
- Photography 85
- Web site development 82
- Design 81
- Technological innovations 81
- Internet of things 79
- Image processing 77
- Computer software 76
- History 71
- Programming 71
- Examinations 68
- Information technology 67
- Historia 65
- Leadership 65
- Computer programming 59
-
2821Publicado 2018Tabla de Contenidos: “…Boundary defense with firewalls and filtering -- Comprehensive access control -- Core and edge gateways -- Unidirectional gateway protection -- Asset discovery, visibility, and monitoring -- Physical security - the first line of defense -- Security assessment of IIoT connectivity standards and protocols -- Fieldbus protocols -- Connectivity framework standards -- Data Distribution Service -- DDS security -- oneM2M -- oneM2M security -- Open Platform Communications Unified Architecture (OPC UA) -- OPC UA security -- Web services and HTTP -- Web services and HTTP security -- Connectivity transport standards -- Transmission Control Protocol (TCP) -- TCP security -- User Datagram Protocol (UDP) -- UDP security -- MQTT and MQTT-SN -- MQTT security -- Constrained Application Protocol (CoAP) -- CoAP security -- Advanced Message Queuing Protocol (AMQP) -- Connectivity network standards -- Data link and physical access standards -- IEEE 802.15.4 WPAN -- IEEE 802.11 wireless LAN -- Cellular communications -- Wireless wide area network standards -- IEEE 802.16 (WiMAX) -- LoRaWAN -- Summary -- Chapter 6: Securing IIoT Edge, Cloud, and Apps -- Defining edge, fog, and cloud computing -- IIoT cloud security architecture -- Secured industrial site -- Secured edge intelligence -- Secure edge cloud transport -- Secure cloud services -- Cloud security - shared responsibility model -- Defense-in-depth cloud security strategy -- Infrastructure security -- Identity and access management -- Application security -- Microservice architecture -- Container security -- Credential store and vault -- Data protection -- Data governance -- Data encryption -- Key and digital certificate management -- Securing the data life cycle -- Cloud security operations life cycle -- Business continuity plan and disaster recovery -- Secure patch management -- Security monitoring…”
Libro electrónico -
2822por Faure, BernardTabla de Contenidos: “…The myth of Tamayorihime -- The Miko and the monk -- Women on the edge -- Women, dragons, and snakes…”
Publicado 2003
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
2823Publicado 2016Tabla de Contenidos: “…Bobenko and Felix Günther -- Approximation of conformal mappings using conformally equivalent triangular lattices: Ulrike Bücking -- Numerical Methods for the Discrete Map Za: Folkmar Bornemann, Alexander Its, Sheehan Olver, and Georg Wechslberger -- A variational principle for cyclic polygons with prescribed edge lengths: Hana Kourimská, Lara Skuppin, Boris Springborn -- Complex Line Bundles over Simplicial Complexes and their Applications: Felix Knöppel and Ulrich Pinkall -- Holomorphic vector fields and quadratic differentials on planar triangular meshes: Wai Yeung Lam, Ulrich Pinkall -- Vertex normals and face curvatures of triangle meshes: Xiang Sun, Caigui Jiang, Johannes Wallner, and Helmut Pottmann -- S-conical cmc surfaces. …”
Libro electrónico -
2824Publicado 2022Tabla de Contenidos: “…Post-Cold War NATO enlargement and the geopolitical instrumentalization of "liberal peace" : lessons from George Kennan / Alexandre Lambert ; The increasing importance of geoeconomics in power rivalries : from the past to the present / Gyula Csurgai ; Dangers on the edge of the map : geographic mental maps and the emergence of the Carter Doctrine / Luis da Vinha ; Mapping greed as a conflict motivation : evidence from armed conflicts in Sudan and Libya on the complexity of armed groups' interactions with natural resources / Steven Spittaels ; Regional diplomacy : re-territorialisation as a piece in the neo-medieval puzzle? …”
Libro electrónico -
2825Publicado 2018Tabla de Contenidos: “…diverse women's perspectives on violence in the german-herero colonial war / Christian love and other weapons. the domestic heroine of the multiracial colonial mission "family" as an antiwar icon in hedwig irle's mission memoirs / Girls, imperialism and war in women's writing from the german-herero war and wwi / Views from the colonies on wwi -- Woman on the edge of time. frieda schmidt and the great war in east africa / World war i in samoa as reported by frieda zieschank in the german colonial magazine kolonie und heimat / Political perspectives on nationalism and wwi -- Bertha von suttner's die waffen nieder! …”
Libro electrónico -
2826Publicado 2020Tabla de Contenidos: “…: reconciling burdens and interests in the law of religious liberty / Chad Flanders, Sean Oliveira -- Sanctuary : religion and law in the United States / Dorothy Rogers -- Exorcism : faith versus fraud : the balance struck between freedom of religion and protecting the vulnerable from exploitation / Javier García Oliva, Helen Hall -- Sacred sites and state failures : a case study of the Babri Masjid/RamTemple Dispute in Ayodhya / Peter W Edge, MC Rajan -- The place of Shari'a in Australia / Jahid Hossain Bhuiyan…”
Libro -
2827Publicado 2020Tabla de Contenidos: “…About the Editors -- List of Contributors -- Acknowledgments -- 1 Introduction / John Davies and Carolina Fortuna -- 2 Connecting Devices: Access Networks / Paul Putland -- 3 Edge Computing / Mohammad Hossein Zoualfaghari, Simon Beddus, and Salman Taherizadeh -- 4 Data Platforms: Interoperability and Insight / John Davies and Mike Fisher -- 5 Streaming Data Processing for IoT / Carolina Fortuna and Timotej Gale -- 6 Applied Machine Vision and IoT / V. …”
Libro electrónico -
2828Publicado 2011Tabla de Contenidos: “…Comments on models and categorization theories: the razor's edge Douglas Medin…”
Libro electrónico -
2829Publicado 2007Tabla de Contenidos: “…Chapter 7: The Adobe Camera Raw Plug-InChapter 8: Fine-Tuning Your Fixes; Chapter 9: Common Problems and Their Cures; Part III: Creating "Art" in Photoshop; Chapter 10: Combining Images; Chapter 11: Precision Edges with Vector Paths; Chapter 12: Dressing Up Images with Layer Styles; Chapter 13: Giving Your Images a Text Message; Chapter 14: Painting in Photoshop; Chapter 15: Filters: The Fun Side of Photoshop; Part IV: Power Photoshop; Chapter 16: Streamlining Your Work in Photoshop; Chapter 17: Introducing Photoshop CS3 Extended; Part V: The Part of Tens…”
Libro electrónico -
2830Publicado 2012Tabla de Contenidos: “…Implementing a Directionally Adaptive Edge AA Filter Using DirectX 11; 4. Designing a Data-Driven Renderer; VI. …”
Libro electrónico -
2831Publicado 2012Tabla de Contenidos: “…Thresholding Techniques --Chapter 5. Edge Detection --Chapter 6. Corner and Interest Point Detection --Chapter 7. …”
Libro electrónico -
2832por Rodgers, PaulTabla de Contenidos: “…From manufacture to market -- Detail design -- Design and manufacture -- Common materials -- Manufacturing processes -- Interview: Raw-Edges Design Studio -- Marketing and selling -- 5. …”
Publicado 2011
Libro electrónico -
2833Publicado 2012Tabla de Contenidos: “…Turquoise Paisley Wraps Mined Gold Mosaic Hoops; Lace Edge Loops; Stacked Bead Drop Hoops; Pearl Flamingo Hoops; Chapter 6: Boho Inspirations; Pins and Leather Earrings; Beach Flower Earrings; Feather Duster Earrings; Ravenwood Earrings; Facets and Chains Earrings; Chapter 7: Rugged Details; Bounty Saber Chandeliers; Hands of Time Earrings; Kyanite Gem Sticks; Quarantine Hoops; Spiky Scribe Drops; Chapter 8: Retro Chic Designs; Gilded Posies Earrings; Pearls and Filigree Earrings; Beaded Pinwheel Clip-Ons; Hydrangea Clip-Ons; Moxy Clusters; Chapter 9: Sparkle and Glam…”
Libro electrónico -
2834Publicado 2012Tabla de Contenidos: “…-- Big light, small flash -- The aesthetics of high-speed flash -- Up against the wall -- Things I think I know : I thought the lights would be on -- Radio TTL -- The shape of light -- A tale of one face, lit two ways -- Things I think I know : Mamie and Barbara, and a lesson learned -- Lessons from the Acetate Era -- Finding a picture on the edge of the canyon -- Sometimes, the main light is in the back -- Things I think I know : Don't mess with the photog -- Working with D -- Light as an exclamation point -- One light, one shadow -- This looks hard, but it's not -- Things I think I know : Flash frenzy -- A couple of Joes -- The lady, the light, and some luck -- Lighting the wind -- More Wilma -- This looks hard, and it is -- This just in…”
Libro electrónico -
2835Publicado 2023Tabla de Contenidos: “…Protection of minors at the edge of reality: the problem of regulating «virtual» and «simulated» child pornography and the issue of assumed age of consent -- CAPÍTULO III La protección digital de los Niños en la UE. …”
Libro electrónico -
2836Publicado 2023Tabla de Contenidos: “…Frontmatter -- Acknowledgements -- Contents -- List of Contributors -- Transliteration and Orthography -- Abbreviations -- Introduction to the Third Volume -- Preludes -- 1 Beyond the Silk Road: Toward Alternative Models of Transimperial Exchange -- 2 Global History and the Study of Frontier Zones in Ancient Afro-Eurasia: A Postcolonial Endeavor -- Part I: Steppes and Oases -- 3 Beyond Transit and Trade: Embedded Commodity Movement in the Hexi Corridor during the Han Period -- 4 Merchants and Nomads: Political and Economic Organization in Sogdiana and the Middle Syr Darya under the Kangju Confederacy -- 4.A Political Organization -- 4.B Economic Organization -- 5 The Eurasian Steppe: Local Agents and their Participation in Global Networks -- Part II: Oceans and Coasts -- 6 Southern Sea Ports of the Han Empire: Urbanization and Trade in Coastal Lingnan -- 7 Liminalities and Centralities of Early Historic Ports: The Gulf of Khambhat in Perspective -- 8 Frontiers in the Mediterranean-Indian Ocean Exchange Network: The Eastern Desert of Egypt and its Ports -- Part III: Mountains and Deserts -- 9 Multifaceted Highlands: The Economy of Armenia and its South Caucasus Context -- 10 An Empire of Many Frontiers: The Economy of Arsakid Borderlands -- 11 A Caravan City at the Edge of Empire? The Economy of Dura-Europos in the Syrian Desert -- 12 Nabataean Networks and Transimperial Trade in Southwest Asia -- 12.A Social, Political, and Economic Dynamics in a Desert Frontier -- 12.B Aromatics and Agriculture: A Spatial Approach to Long-Distance Trade and the Local Economy of the Nabataeans -- Index…”
Libro electrónico -
2837Publicado 2024Tabla de Contenidos: “…Utilization of Deep Learning Models for Safe Human-friendly Computing in Cloud, Fog and Mobile Edge Networks. Artificial Intelligence for Threat Anomaly Detection using Graph Databases - A Semantic Outlook. …”
Libro electrónico -
2838por Kapferer, BruceTabla de Contenidos: “…Insight Meditation: Liminality Without the Excitement -- Chapter 8. Music at the Edge: American Torture and African Trance -- Part III. …”
Publicado 2024
Libro electrónico -
2839Publicado 2024Tabla de Contenidos: “…The shadow of Vietnam (1963-1974) -- Back to the brink (1975-1980) -- The gloves come off (1981-1982) -- Dancing blindly on the edge (1983) -- Endgame (1984-89) -- Part 5: The era of intervention. …”
Libro -
2840Publicado 2013“…"Brings together cutting-edge accounts of social movements concerned with civil and political rights, globalization, peace, the environment, migrant and factory labour, the rights of middle- and working-class women, and sexual identity in an overarching framework of analysis that forefronts the importance of human rights and the state as a focus for social activism in a region characterized by a history of authoritarian developmentalism and weak civil society"--Provided by publisher…”
Acceso restringido con credenciales, usuarios UPSA
Libro electrónico