Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 439
- Historia 357
- Economic conditions 299
- Economics 259
- Economic policy 227
- Economía 223
- Education 212
- General 204
- Politics and government 188
- Social Science 184
- Law 169
- Federalismo 165
- Política y gobierno 162
- Economic history 150
- Political Science 143
- Research 134
- Management 130
- Ciencias políticas 129
- Business & Economics 121
- Law and legislation 120
- Mexico 113
- Finance 111
- Derecho 110
- History and criticism 109
- Study and teaching 109
- Government policy 108
- Sociology 102
- Ciencias Sociales 99
- United States 99
- Derecho constitucional 98
-
6921Publicado 2019Tabla de Contenidos: “…List of Contributors xix -- Preface xxiii -- Acknowledgments xxvii -- Part I Foundations 1 -- 1 Internet of Things (IoT) and New Computing Paradigms 3 / Chii Chang, Satish Narayana Srirama, and Rajkumar Buyya -- 1.1 Introduction 3 -- 1.2 Relevant Technologies 6 -- 1.3 Fog and Edge Computing Completing the Cloud 8 -- 1.3.1 Advantages of FEC: SCALE 8 -- 1.3.2 How FEC AchievesThese Advantages: SCANC 9 -- 1.4 Hierarchy of Fog and Edge Computing 13 -- 1.5 Business Models 16 -- 1.6 Opportunities and Challenges 17 -- 1.7 Conclusions 20 -- References 21 -- 2 Addressing the Challenges in Federating Edge Resources 25 / Ahmet Cihat Baktir, Cagatay Sonmez, CemErsoy, Atay Ozgovde, and Blesson Varghese -- 2.1 Introduction 25 -- 2.2 The Networking Challenge 27 -- 2.3 The Management Challenge 34 -- 2.4 Miscellaneous Challenges 40 -- 2.5 Conclusions 45 -- References 45 -- 3 Integrating IoT + Fog + Cloud Infrastructures: System Modeling and Research Challenges 51 / Guto Leoni Santos,Matheus Ferreira, Leylane Ferreira, Judith Kelner, Djamel Sadok, Edison Albuquerque, Theo Lynn, and Patricia Takako Endo -- 3.1 Introduction 51 -- 3.2 Methodology 52 -- 3.3 Integrated C2F2T Literature by Modeling Technique 55 -- 3.4 Integrated C2F2T Literature by Use-Case Scenarios 65 -- 3.5 Integrated C2F2T Literature by Metrics 68 -- 3.6 Future Research Directions 72 -- 3.7 Conclusions 73 -- Acknowledgments 74 -- References 75 -- 4 Management and Orchestration of Network Slices in 5G, Fog, Edge, and Clouds 79 / Adel Nadjaran Toosi, RedowanMahmud, Qinghua Chi, and Rajkumar Buyya -- 4.1 Introduction 79 -- 4.2 Background 80 -- 4.3 Network Slicing in 5G 83 -- 4.4 Network Slicing in Software-Defined Clouds 87 -- 4.5 Network Slicing Management in Edge and Fog 91 -- 4.6 Future Research Directions 93 -- 4.7 Conclusions 96 -- Acknowledgments 96 -- References 96 -- 5 Optimization Problems in Fog and Edge Computing 103 / Zoltán Ádám Mann -- 5.1 Introduction 103 -- 5.2 Background / RelatedWork 104.…”
Libro electrónico -
6922Publicado 2017Tabla de Contenidos: “…. -- Chapter 5: Working with Ceph Object Storage Multi-Site v2 -- Introduction -- Functional changes from Hammer federated configuration -- RGW multi-site v2 requirement -- Installing the Ceph RGW multi-site v2 environment -- How to do it... -- Configuring Ceph RGW multi-site v2 -- How to do it... -- Configuring a master zone -- Configuring a secondary zone -- Checking the synchronization status -- Testing user, bucket, and object sync between master and secondary sites -- How to do it... -- Chapter 6: Working with the Ceph Filesystem -- Introduction -- Understanding the Ceph Filesystem and MDS -- Deploying Ceph MDS -- How to do it... -- Accessing Ceph FS through kernel driver -- How to do it... -- Accessing Ceph FS through FUSE client -- How to do it... -- Exporting the Ceph Filesystem as NFS -- How to do it... -- Ceph FS - a drop-in replacement for HDFS -- Chapter 7: Monitoring Ceph Clusters -- Introduction -- Monitoring Ceph clusters - the classic way…”
Libro electrónico -
6923Publicado 2013Tabla de Contenidos: “…(b) Negative Outcomes of a Culture Operating without Integrity -- (c) Appropriately Handling an Integrity Failure -- (d) Integrity and the WAM‐Pro -- NOTES -- UNIT THREE Timekeeping -- CHAPTER FIVE Workforce Management Devices and Functionality -- 5.1 TIMECARD FUNCTIONALITY -- (a) Time Record Views -- (b) Timecard Edits and Entries -- (c) Timecard Reports -- (d) Advanced Timecard Functionality -- (e) Pay Rules -- (f) Timecard Functionality beyond Straight Timekeeping -- 5.2 ACCRUAL RULES -- 5.3 AUTOMATED WORKFLOW AND EMPLOYEE SELF‐SERVICE -- (a) Benefits of Workforce Management Automated Workflows and Employee Self‐Service Tools -- (b) Functionality of Automated Workflow System -- (c) Considerations When Planning an Automated Workflow Process -- 5.4 DATA COLLECTION: WHO, WHERE, AND WHEN -- (a) After Hours: Moving beyond Timekeeping -- (b) Data Collection Technologies -- (c) Fixed-Location Data Collection -- (d) Mobile Data Collection -- (e) Push and Poll: Integrating Data into Time Management Systems -- (f) The Future -- 5.5 BIOMETRICS: FEATURES AND FUNCTIONALITY -- (a) Common Challenges of Biometric Systems -- (b) Common Benefits of Biometric Systems -- (c) Common Pitfalls of Biometric Systems -- 5.6 MOBILE RESOURCE MANAGEMENT: FEATURES AND FUNCTIONALITY -- (a) Benefits of Using Mobile Resource Management -- (b) Challenges and Issues When Using Mobile Resource Management -- (c) Big Picture for the Employee and the Employer -- NOTES -- CHAPTER SIX Federal Regulation -- 6.1 FAIR LABOR STANDARDS ACT -- (a) Overtime Requirements and Regular Rate of Pay -- (b) Payments Covering More than One Workweek -- 6.2 DEFINING THE LEGAL WORKWEEK -- (a) Public Sector Employee Workweek -- (b) Healthcare Industry -- (c) Agricultural Employees -- (d) Transportation Workers -- 6.3 CHANGING THE WORKWEEK -- (a) Nonemployees or Independent Contractors…”
Libro electrónico -
6924Publicado 2004Tabla de Contenidos: “…Fundamental concepts in Process Integration -- 2.1 The need for a unifying technique -- 2.1.1 Similarities between intra- and inter-enterprise integration -- 2.1.2 Summary -- 2.2 Process Integration concepts and notations -- 2.2.1 Collaboration and Interaction -- 2.2.2 Connectors and Adapters -- 2.2.3 Classification of interaction between sub-systems -- 2.3 QoS capabilities framework -- 2.3.1 Operability -- 2.3.2 Availability -- 2.3.3 Federation -- 2.3.4 Performance -- 2.3.5 Security -- 2.3.6 Standards compliance -- 2.3.7 Transactionality -- 2.4 Application patterns for Application Integration -- 2.5 Application patterns for Extended Enterprise -- 2.6 Summary -- Chapter 3. …”
Libro electrónico -
6925Publicado 2017Tabla de Contenidos: “…Census Bureau -- CIA World Factbook -- External datasets - economic -- Organization for Economic Cooperation and Development (OECD) -- Federal Reserve Economic Data (FRED) -- Summary -- Chapter 8: Communicating with Others - Visualization and Dashboarding -- Common mistakes when designing visuals -- The Hierarchy of Questions method -- The Hierarchy of Questions method overview -- Developing question trees -- Pulling together the data -- Aligning views with question flows -- Designing visual analysis for IoT data -- Using layout positioning to convey importance -- Use color to highlight important data -- The impact of using a single color to communicate importance -- Be consistent across visuals -- Make charts easy to interpret -- Creating a dashboard with Tableau -- The dashboard walk-through -- Hierarchy of Questions example -- Aligning visuals to the thought process -- Creating individual views -- Assembling views into a dashboard -- Creating and visualizing alerts -- Alert principles -- Organizing alerts using a Tableau dashboard -- Summary -- Chapter 9: Applying Geospatial Analytics to IoT Data -- Why do you need geospatial analytics for IoT? …”
Libro electrónico -
6926Publicado 2011Tabla de Contenidos: “…5 Migrating from Legacy SharePoint to SharePoint Server 2010 -- Formulating a Migration Strategy -- Planning for an Upgrade to SharePoint 2010 -- Examining SharePoint 2010 Migration Paths -- Performing an In-Place Upgrade of a SharePoint Environment -- Performing a Database Attach Upgrade -- Using Visual Upgrade -- Summary -- Best Practices -- Part II: Administering and Maintaining SharePoint Server 2010 -- 6 Managing and Administering SharePoint 2010 Infrastructure -- Operations Management with the SharePoint Central Administration Tool -- Administering Site Collections and Sites -- Using Additional Administration Tools for SharePoint -- Summary -- Best Practices -- 7 Leveraging PowerShell for Command-Line SharePoint Administration and Automation -- Understanding Windows PowerShell Concepts -- SharePoint Administration with PowerShell -- Cataloging the Best Scripts to Automate SharePoint Administration -- Understanding Advanced PowerShell Topics -- Beyond Built-In SharePoint PowerShell Cmdlets -- Summary -- Best Practices -- 8 Leveraging and Optimizing Search in SharePoint 2010 -- Outlining the Capabilities of SharePoint 2010 Search -- Deploying a Native SharePoint 2010 Search Service Application -- Define Content Sources -- Search Scopes -- Federating Search -- Keywords and Best Bets -- Customizing the Search User Interface -- Installing FAST Search Server 2010 for SharePoint -- Deploying FAST Search Service Applications -- Customizing the FAST Search User Interface -- Uninstalling FAST Search Server 2010 for SharePoint -- Summary -- Best Practices -- 9 Managing and Maintaining SQL Server in a SharePoint Environment -- Monitoring SQL Server in a SharePoint Environment -- Maintaining SQL Server in a SharePoint Environment -- Managing SharePoint Content Databases -- Externalizing BLOB Storage in SharePoint 2010 -- Summary -- Best Practices…”
Libro electrónico -
6927por Dance, BeverlyTabla de Contenidos: “…The Worker Adjustment and Retraining Notification Act (WARN) (1988) -- 6. For Federal Government Employees -- 6.1. The Civil Service Reform Act (1978) -- 6.2. …”
Publicado 2023
Libro electrónico -
6928por Wahli, UeliTabla de Contenidos: “…Web services standards -- Categorization of Web services standards -- Core standards -- SOAP: Simple Object Access Protocol -- WSDL: Web Services Description Language -- UDDI: Universal Description, Discovery, and Integration -- XML -- Description and discovery -- WS-Inspection: Web Services Inspection Language (WSIL) -- WS-Discovery -- WS-MetadataExchange -- WS-Policy -- WS-PolicyAssertions -- WS-PolicyAttachement -- DNS Endpoint Discovery (DNS-EPD) -- Messaging -- ASAP: Asynchronous Services Access Protocol -- SOAP Messages with Attachments (SwA) -- SOAP Message Transmission Optimization Mechanism -- WS-Addressing -- WS-Notification -- WS-Eventing -- WS-Enumeration -- WS-MessageDelivery -- WS-Reliability -- WS-ReliableMessaging -- WS-Resources -- WS-Transfer -- Management -- WSDM: Web Services Distributed Management -- WS-Manageability -- SPML: Service Provisioning Markup Language -- WS-Provisioning -- Business processes -- BPEL: Business Process Execution Language -- WS-CDL -- WS-CAF -- Transactions -- WS-Coordination (WS-COOR) -- WS-Transaction -- WS-AtomicTransaction (WS-AT) -- WS-BusinessActivity (WS-BA) -- Security -- XML-Encryption -- XML-Signature -- WS-Security -- WS-SecureConversation -- WS-SecurityPolicy -- WS-Trust -- WS-Federation -- SAML: Security Assertion Markup Language -- User experience -- WSRP: Web Services for Remote Portlets -- J2EE 1.4 and Java JSRs…”
Publicado 2005
Libro electrónico -
6929Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
6930por Berk, JonathanTabla de Contenidos: “…-- 1.2 The Four Types of Firms -- Sole Proprietorships -- Partnerships -- Limited Liability Companies -- Corporations -- Tax Implications for Corporate Entities -- Corporate Taxation Around the World -- 1.3 The Financial Manager -- Making Investment Decisions -- Global Financial Crisis The Dodd-Frank Act -- Making Financing Decisions -- Managing Short-Term Cash Needs -- The Goal of the Financial Manager -- Shareholder Value Versus Stakeholder Value -- 1.4 The Financial Manager's Place in the Corporation -- The Corporate Management Team -- Ethics and Incentives in Corporations -- Global Financial Crisis The Dodd-Frank Act on Corporate Compensation and Governance -- Citizens United v. Federal Election Commission -- 1.5 The Stock Market -- The Largest Stock Markets -- Primary Versus Secondary Markets -- Traditional Trading Venues -- Interview With Frank Hatheway -- New Competition and Market Changes -- Dark Pools -- Listing Standards -- Other Financial Markets -- NYSE, BATS, DJIA, S& -- P 500: Awash in Acronyms -- 1.6 Financial Institutions -- The Financial Cycle -- Types of Financial Institutions -- Role of Financial Institutions -- Summary -- Problems -- Chapter 2. …”
Publicado 2022
Libro electrónico -
6931Publicado 2023Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Section 1: AWS Data Engineering Concepts and Trends -- Chapter 1: An Introduction to Data Engineering -- Technical requirements -- The rise of big data as a corporate asset -- The challenges of ever-growing datasets -- The role of the data engineer as a big data enabler -- Understanding the role of the data engineer -- Understanding the role of the data scientist -- Understanding the role of the data analyst -- Understanding other common data-related roles -- The benefits of the cloud when building big data analytic solutions -- Hands-on - creating and accessing your AWS account -- Creating a new AWS account -- Accessing your AWS account -- Summary -- Chapter 2: Data Management Architectures for Analytics -- Technical requirements -- The evolution of data management for analytics -- Databases and data warehouses -- Dealing with big, unstructured data -- Cloud-based solutions for big data analytics -- A deeper dive into data warehouse concepts and architecture -- Dimensional modeling in data warehouses -- Understanding the role of data marts -- Distributed storage and massively parallel processing -- Columnar data storage and efficient data compression -- Feeding data into the warehouse - ETL and ELT pipelines -- An overview of data lake architecture and concepts -- Data lake logical architecture -- The storage layer and storage zones -- Catalog and search layers -- Ingestion layer -- The processing layer -- The consumption layer -- Data lake architecture summary -- Bringing together the best of data warehouses and data lakes -- The data lake house approach -- New data lake table formats -- Federated queries across database engines -- Hands-on - using the AWS Command Line Interface (CLI) to create Simple Storage Service (S3) buckets -- Accessing the AWS CLI…”
Libro electrónico -
6932Publicado 2023Tabla de Contenidos: “…Types of blockchain dependent on network access -- Public blockchain -- Benefits of public blockchain -- Private blockchain -- Disadvantages of a private blockchain -- Consortium/federated blockchain -- Benefits of consortium blockchain -- Disadvantages of blockchain consortium -- Use cases of consortium blockchain -- Hybrid blockchain -- Advantages of hybrid blockchain…”
Libro electrónico -
6933por Morris, TeeTabla de Contenidos: “…-- The powers that be -- Federal Communications Commission (FCC) -- Recording Industry Association of America (RIAA) -- Electronic Frontier Foundation (EFF) -- Creative Commons (CC) -- I can name that tune . . . …”
Publicado 2024
Libro electrónico -
6934Publicado 1999Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto)Libro
-
6935
-
6936
-
6937
-
6938
-
6939
-
6940