Mostrando 28,881 - 28,900 Resultados de 33,117 Para Buscar '"Global"', tiempo de consulta: 0.17s Limitar resultados
  1. 28881
    por Kavita, Singh
    Publicado 1900
    Tabla de Contenidos: “…Cover -- Organizational Behaviour -- Copyright -- About the Author -- Brief contents -- Contents -- Preface -- Reviewers -- Managing Organizational Behaviour -- Introduction -- Organizational Behaviour: Past and Present -- The Pre-scientific Era (Pre-1000-1880) -- The Classical Era (1880-1930) -- The Behavioural Era (1930-1960) -- The Modern Era (1960 Onwards) -- Emerging Issues in Organization -- Globalization: Uniting the World -- Trend Towards Diversity: Managing Employeesfrom Different Backgrounds -- Diversity in India -- Corporate Social Responsibility: DevelopingEthical Organizations -- What Can Be Done to Promote Ethical Behaviourin an Organization -- Trends in Working Arrangements: a Newer Way toStructure Your Organizations and Jobs -- Managing Through Knowledge: Developmentof Learning Organizations -- Dynamics of Organizational Life -- Developing Skills -- Managerial Roles -- Organizational Behaviour: a Framework -- Environmental Forces -- Individual Processes -- Interpersonal and Team Processes -- Organizational Processes -- Change Processes -- Common Mistakes Committed by Managers -- Summary -- Personality -- Introduction -- Is Personality Real? …”
    Libro electrónico
  2. 28882
    por Metzger, Robert C.
    Publicado 2004
    Tabla de Contenidos: “…Debugging Tactics; 9.1 Preview; 9.2 Read the source code; 9.3 Write a unit test; 9.4 Display variable values; 9.5 Display execution messages; 9.6 Display procedure arguments; 9.7 Generate a flow trace; 9.8 Generate a variable snapshot; 9.9 Generate memory dump; 9.10 Force variable value; 9.11 Assert assumptions; 9.12 Check data structures; 9.13 Display data structures; 9.14 Use runtime subscript checking; 9.15 Use runtime stack checking; 9.16 Use runtime heap checking; 9.17 Initialize global variables…”
    Libro electrónico
  3. 28883
    por Menke, William
    Publicado 2012
    “…One only has to consider the global warming debate to realize how critically important it is to be able to derive clear conclusions from often-noisy data drawn from a broad range of sources. …”
    Libro electrónico
  4. 28884
    Publicado 2014
    Tabla de Contenidos: “…-- Extending an Extension Point -- Examining the Sample Extension -- Modifying the Sample Extension -- Extension UI Configuration -- Configuration File Conventions -- Configuration UI Rendering -- Interaction Between UI and Model -- UI Validation -- Global UI Configuration -- Summary -- Part III: The Hudson Lifestyle -- Chapter 9: Advanced Plugin Development -- Extending Various Aspects of Hudson Dashboards -- Creating a Custom Rendered Jobs Status View -- Using the Custom Rendered View -- Adding a Custom Column to the Default View -- Adding an Action to the Action Panel of the Main Dashboard -- Custom Decoration of Hudson Pages -- Extending Various Aspects of a Hudson Job -- Adding a Custom Notifier to a Job -- Adding a Custom Link to a Job Dashboard -- Creating a Custom Build Wrapper -- Summary -- Chapter 10: Hudson Best Practices -- Manage the Hudson Resources Effectively -- Tune Memory -- Restrict Job History Depth -- Monitor the Disk Space -- Put Your Hudson Behind a Web Proxy -- Do Not Use Your Hudson as a File Server -- Periodically Back Up Your Hudson Contents -- Set Up a Fail-Safe Mode for Your Hudson -- Redundant Hudson Server Setup -- Monitoring Hudson Setup -- Server Switch on Failure -- Redirecting HTTP Traffic to a Redundant Server -- Scale Up the Security of Your Hudson -- Restrict Job Access to Certain Users -- Add Roles to the Authorization Matrix -- Upgrade Your Hudson Diligently -- Understand the Hudson Versioning Scheme -- Upgrade in a Sandbox First -- Summary -- Part IV: Appendixes -- Appendix A: Widely Used Hudson Plugins -- Appendix B: Personal Hudson Instance -- Hudson-as-Valet -- Optimal Hudson-as-Valet Setup -- Hudson for Work Area Maintenance -- The Open-Source Liaison Role -- The Committer Role -- Hudson as General-Purpose Scheduler…”
    Libro electrónico
  5. 28885
    Publicado 2013
    Tabla de Contenidos: “…Service Layer with ASP.NET Web API -- Creating a Web API service -- Hosting using IIS -- Routing -- Customizing the Web API routing -- Parameter binding -- Model binding -- Formatters -- Building a service for the Movie Tickets application -- Adding a controller -- Content Negotiation -- The Advanced Rest Client Chrome extension -- The Accept header -- The Content-type header -- The Accept-charset header -- An Image/PDF file as response -- Securing Web API -- Authentication -- Basic authentication -- Authentication using message handlers -- Implementing authentication -- Authentication in action -- Authorization -- Using AuthorizeAttribute -- Global level -- Controller level -- Action level -- [AllowAnonymous] attribute -- Role and user checks -- Custom authorization attribute -- Summary -- 4. …”
    Libro electrónico
  6. 28886
    Publicado 2013
    Tabla de Contenidos: “…-- Preface xiii -- About the Author xxi -- Acknowledgments xxiii -- 1 Internetworking and Layered Models 1 -- 1.1 Networking Technology 2 -- 1.2 Connecting Devices 5 -- 1.3 The OSI Model 8 -- 1.4 TCP/IP Model 12 -- 2 TCP/IP Suite and Internet Stack Protocols 15 -- 2.1 Network Layer Protocols 15 -- 2.2 Transport Layer Protocols 41 -- 2.3 World Wide Web 47 -- 2.4 File Transfer 49 -- 2.5 E-Mail 50 -- 2.6 Network Management Service 52 -- 2.7 Converting IP Addresses 53 -- 2.8 Routing Protocols 54 -- 2.9 Remote System Programs 55 -- 2.10 Social Networking Services 56 -- 2.11 Smart IT Devices 57 -- 2.12 Network Security Threats 58 -- 2.13 Internet Security Threats 58 -- 2.14 Computer Security Threats 59 -- 3 Global Trend of Mobile Wireless Technology 63 -- 3.1 1G Cellular Technology 63 -- 3.2 2G Mobile Radio Technology 64 -- 3.3 2.5G Mobile Radio Technology 67 -- 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70 -- 3.5 3G UMTS Security-Related Encryption Algorithm 75 -- 4 Symmetric Block Ciphers 81 -- 4.1 Data Encryption Standard (DES) 81 -- 4.2 International Data Encryption Algorithm (IDEA) 99 -- 4.3 RC5 Algorithm 108 -- 4.4 RC6 Algorithm 123 -- 4.5 AES (Rijndael) Algorithm 135 -- 5 Hash Function, Message Digest, and Message Authentication Code 161 -- 5.1 DMDC Algorithm 161 -- 5.2 Advanced DMDC Algorithm 171 -- 5.3 MD5 Message-Digest Algorithm 176 -- 5.4 Secure Hash Algorithm (SHA-1) 188 -- 5.5 Hashed Message Authentication Codes (HMAC) 195 -- 6 Asymmetric Public-Key Cryptosystems 203 -- 6.1 Diffie / Hellman Exponential Key Exchange 203 -- 6.2 RSA Public-Key Cryptosystem 207 -- 6.3 ElGamal's Public-Key Cryptosystem 215 -- 6.4 Schnorr's Public-Key Cryptosystem 222 -- 6.5 Digital Signature Algorithm 227 -- 6.6 The Elliptic Curve Cryptosystem (ECC) 230 -- 7 Public-Key Infrastructure 249 -- 7.1 Internet Publications for Standards 250 -- 7.2 Digital Signing Techniques 251 -- 7.3 Functional Roles of PKI Entities 258 -- 7.4 Key Elements for PKI Operations 263 -- 7.5 X.509 Certificate Formats 271.…”
    Libro electrónico
  7. 28887
    Publicado 2011
    “…Extreme Money is about: The new financial fundamentalism: false gods, false prophets - Faith in money, faith in risk, faith in shadows The cult of risk and the growth engine that isn’t - How financial engineering replaced real engineering and illusions replaced reality Financial alchemy and the “Doomsday Debt Machine”- The rise of the global financial machine we cannot escape The new global oligarchy—and the nihilistic games they pla y - Too smart, too fast, too greedy, too self-absorbed—and far too dangerous…”
    Libro electrónico
  8. 28888
    Publicado 2014
    “…CentOS is self-sufficient and fast while working, with the added benefit of global acceptance as a large number of the world's web servers run on it. …”
    Libro electrónico
  9. 28889
    por Robin, Jennifer, 1974-
    Publicado 2013
    “…Includes case studies, stories, tips, and tools for managers who want to transform their organizations From the experts at the Great Place to Work(r), a global research, consulting, and training firm that operates in nearly 50 countries Proves that any and every organization can change for the better when managers have the right tools and mindset Creating a place where people want to work and want to succeed is the primary key to success for every manager. …”
    Libro electrónico
  10. 28890
    Publicado 2013
    Libro electrónico
  11. 28891
    Publicado 2013
    Tabla de Contenidos: “…-- Preface xi -- 1 Evolution from 2G over 3G to 4G 1 -- 1.1 First Half of the 1990s - Voice-Centric Communication 1 -- 1.2 Between 1995 and 2000: The Rise of Mobility and the Internet 1 -- 1.3 Between 2000 and 2005: Dot Com Burst, Web 2.0, Mobile Internet 2 -- 1.4 Between 2005 and 2010: Global Coverage, Fixed Line VoIP, and Mobile Broadband 4 -- 1.5 2010 and Beyond 5 -- 1.6 All over IP in Mobile - The Biggest Challenge 6 -- 1.7 Summary 6 -- 2 Beyond 3G Network Architectures 9 -- 2.1 Overview 9 -- 2.2 UMTS, HSPA, and HSPA+ 10 -- 2.3 LTE 43 -- 2.4 802.11 Wi-Fi 74 -- 3 Network Capacity and Usage Scenarios 95 -- 3.1 Usage in Developed Markets and Emerging Economies 95 -- 3.2 How to Control Mobile Usage 96 -- 3.3 Measuring Mobile Usage from a Financial Point of View 99 -- 3.4 Cell Capacity in Downlink 100 -- 3.5 Current and Future Frequency Bands for Cellular Wireless 105 -- 3.6 Cell Capacity in Uplink 106 -- 3.7 Per-User Throughput in Downlink 109 -- 3.8 Per-User Throughput in Uplink 114 -- 3.9 Traffic Estimation Per User 116 -- 3.10 Overall Wireless Network Capacity 117 -- 3.11 Network Capacity for Train Routes, Highways, and Remote Areas 124 -- 3.12 When will GSM be Switched Off? …”
    Libro electrónico
  12. 28892
    Publicado 2010
    Tabla de Contenidos: “…Tcl Example Used to Check the CPU Utilization -- Summary -- References -- Chapter 5 Advanced Tcl Operation in Cisco IOS -- Introduction to the Syslog Protocol -- Configuring Syslog Server Parameters in Cisco IOS -- Syslog Tcl Script Example -- Syslog Tcl Script Sample Output -- Sending Syslog Messages to a File -- Syslog Server Script Procedures -- Syslog Server Script Body -- Putting the Syslog Script into Operation -- Introduction to Embedded Syslog Manager -- Filtering Syslog Messages -- ESM Global Variables -- Rebuilding a Syslog Message from Its Components -- Displaying/Adding ESM Tcl Script Filters -- Introduction to Embedded Menu Manager -- Using Tcl as a Web Server -- Obtaining a Free Web Server Application -- Reverse Engineering the Web Server -- Creating Your Own Simple Web Page -- Creating a Web Page Using IOS show Commands -- Adding User Input to the Web Page -- Introduction to IP SLA -- Adding the IP SLA Measurement to the Web Page -- Tcl Script Refresh Policy -- SNMP Proxy Event Detector -- Remote-Procedure Call Requests -- Multiple-Event Support for Event Correlation -- Using the clear Command -- Summary -- References -- Chapter 6 Tcl Script Examples -- Creating an Application from Start to Finish -- Determine What You Want to Accomplish -- Creating a Flowchart -- Deciding What the User Interface Should Look Like -- Write the Code in Pseudo-Code -- Before You Begin -- Starting to Program the Application -- Troubleshooting as You Go -- Using Tcl to Troubleshoot Network Problems -- Monitoring the Console for Events -- Creating a Web Application for Remote SNMP Graphing -- Summary -- References -- Chapter 7 Security in Tcl Scripts -- Introduction to PKI Infrastructure -- PKI Prerequisite -- Confidentiality with PKI -- Digital Signatures with PKI -- Using Digital Signatures to Sign a Tcl Script…”
    Libro electrónico
  13. 28893
    por Chaturvedi, P. D.
    Publicado 2011
    Tabla de Contenidos:
    Libro electrónico
  14. 28894
    Publicado 2006
    Tabla de Contenidos: “…Cernea -- Introduction -- Section I: Contextualizing Displacement -- Chapter 1: Resettlement and Rehabilitation: The New Indian Policy -- Introduction -- Objectives -- Minimize Displacement -- Consultation and Right to Information -- Gender Neutrality -- Other Definitions -- Land for All Agricultural Families -- Creating Job Opportunities -- House for House -- Homesteads and Dwelling Houses -- Basic Amenities at the New Site -- Displacement Under Emergency -- Other Innovative Provisions in the Draft -- Changes in the LAA -- Special Provisions for Tribals in Scheduled Areas -- Main Differences -- Summing up -- References -- Annexure -- Chapter 2: Public Participation in Development -- Introduction -- Global Scene and the National Response -- Narmada: A Case Study -- Judicial and Other Responses -- Maan Dam Affected Evicted with Police Terror -- GRA Orders Return of the Maan Oustees -- Proactive Participation and Initiating a Dynamic Process of Negotiation -- Capacity Development -- Publishing Awareness-Raising Material -- Colson-Scudder Model -- Cernea's 'Livelihood Risks Analysis and Reconstruction' Model -- Training for Target Groups -- Nature of the Target Group -- Contents of the Training Programmes -- For the Displacees -- For Requiring Bodies and Implementers of R&R Plans -- A Balanced Platform for Negotiations -- Planning and Implementation of R&R Programmes -- Institutional Arrangements -- Integrity and Continuity of Bureaucracy -- Preview of the Time-Span of a Project -- Lessons for Community Reconstruction -- The Impact of Displacement on Women, Children and the Aged and Host Communities -- Conclusion -- Notes -- References -- Chapter 3: Political Economy of Compensation -- Introduction -- Exclusiveness of the Law -- Excluded Groups…”
    Libro electrónico
  15. 28895
    por Bonner, William, 1948-
    Publicado 2011
    “…Details the evolution of the U.S. and global financial markets with wit and wisdom Shows readers how to live well even in uncertain times Other titles by Bonner: Empire of Debt: The Rise of an Epic Financial Crisis and Financial Reckoning Day: Surviving the Soft Depression of the 21st Century Providing both intriguing insight and evergreen advice, Dice Have No Memory is a rousing look at Bill Bonner's literary economic perspective, global market analysis, and contrarian investment ideas"--…”
    Libro electrónico
  16. 28896
    por Bishop, Tony
    Publicado 2009
    “…Financial markets are witnessing an unprecedented explosion in the availability of data, and the firms that survive will be able to leverage this information to increase their profit and expand their opportunities in a global world. Financial firms have two options: to build their own data centers or to outsource them to hosting services such as Google and Amazon 'cloud' services. …”
    Libro electrónico
  17. 28897
    Publicado 2018
    Tabla de Contenidos: “…ElasticNet -- Robust regression -- RANSAC -- Huber regression -- Bayesian regression -- Polynomial regression -- Isotonic regression -- Summary -- Chapter 5: Linear Classification Algorithms -- Linear classification -- Logistic regression -- Implementation and optimizations -- Stochastic gradient descent algorithms -- Passive-aggressive algorithms -- Passive-aggressive regression -- Finding the optimal hyperparameters through a grid search -- Classification metrics -- Confusion matrix -- Precision -- Recall -- F-Beta -- Cohen's Kappa -- Global classification report -- Learning curve -- ROC curve -- Summary -- Chapter 6: Naive Bayes and Discriminant Analysis -- Bayes' theorem -- Naive Bayes classifiers -- Naive Bayes in scikit-learn -- Bernoulli Naive Bayes -- Multinomial Naive Bayes -- An example of Multinomial Naive Bayes for text classification -- Gaussian Naive Bayes -- Discriminant analysis -- Summary -- Chapter 7: Support Vector Machines -- Linear SVM -- SVMs with scikit-learn -- Linear classification -- Kernel-based classification -- Radial Basis Function -- Polynomial kernel -- Sigmoid kernel -- Custom kernels -- Non-linear examples -- ν-Support Vector Machines -- Support Vector Regression -- An example of SVR with the Airfoil Self-Noise dataset -- Introducing semi-supervised Support Vector Machines (S3VM) -- Summary -- Chapter 8: Decision Trees and Ensemble Learning -- Binary Decision Trees -- Binary decisions -- Impurity measures -- Gini impurity index -- Cross-entropy impurity index -- Misclassification impurity index -- Feature importance -- Decision Tree classification with scikit-learn -- Decision Tree regression -- Example of Decision Tree regression with the Concrete Compressive Strength dataset -- Introduction to Ensemble Learning -- Random Forests -- Feature importance in Random Forests -- AdaBoost -- Gradient Tree Boosting…”
    Libro electrónico
  18. 28898
    Publicado 2020
    Tabla de Contenidos: “…Videory: The late-stage, successful tech startup -- 2.5. Global Aerospace Dynamics: The giant government contractor -- 2.6. …”
    Libro electrónico
  19. 28899
    Publicado 2021
    “…Why most culture shaping approaches have no answer for how to effect culture in global companies, why so many culture-shaping projects focused on corporate values despite the fact modern science shows why changing personal values is exceedingly difficult What we are learning about culture from the last 30 years of cognitive science gives us the foundation for far more impactful and sustainable interventions than have been possible to date. …”
    Libro electrónico
  20. 28900
    Publicado 2021
    Tabla de Contenidos: “…: Decision Thing 112 Chapter 9: Loops, Loops, Loops 115 A Little Deja Vu 115 The Thrill of for Loops 116 Doing something x number of times 116 Introducing the for loop 117 Counting with the for statement 119 Looping letters 120 Nesting for loops 121 The Joy of the while Loop 123 Structuring a while loop 123 Using the do while loop 125 Loopy Stuff 126 Looping endlessly 126 Looping endlessly but on purpose 127 Breaking out of a loop 128 Adding multiple for loop conditions 129 Screwing up a loop 130 Chapter 10: Fun with Functions 133 Anatomy of a Function 133 Constructing a function 133 Prototyping (or not) 136 Functions and Variables 139 Using variables in functions 139 Sending a value to a function 140 Sending multiple values to a function 142 Creating functions that return values 143 Returning early 145 Constants of the Global Kind 147 Introducing defined constants 147 Putting defined constants to use 148 Part 3: Build Upon What You Know 151 Chapter 11: The Unavoidable Math Chapter 153 Math Operators from Beyond Infinity 153 Incrementing and decrementing 154 Prefixing the ++ and -- operators 156 Discovering the remainder (modulus) 158 Saving time with assignment operators 158 Math Function Mania 160 Exploring some common math functions 161 Suffering through trigonometry 163 It's Totally Random 166 Spewing random numbers 166 Making the numbers more random 167 The Holy Order of Precedence 170 Getting the order correct 170 Forcing order with parentheses 171 Chapter 12: Give Me Arrays 173 Behold the Array 173 Avoiding arrays 173 Understanding arrays 174 Initializing an array 177 Playing with character arrays (strings) 177 Working with empty char arrays 179 Sorting arrays 181 Multidimensional Arrays 183 Making a two-dimensional array 183 Going crazy with three-dimensional arrays 186 Declaring an initialized multidimensional array 188 Arrays and Functions 189 Passing an array to a function 189 Returning an array from a function 191 Chapter 13: Fun with Text 193 Character Manipulation Functions 193 Introducing the CTYPEs 193 Testing characters 195 Changing characters 197 String Functions Galore 198 Reviewing string functions 198 Comparing text 199 Building strings 200 Fun with printf() Formatting 202 Formatting floating point 202 Setting the output width 204 Aligning output 206 Gently Down the Stream 207 Demonstrating stream input 207 Dealing with stream input 208 Chapter 14: Structures, the Multivariable 211 Hello, Structure 211 Introducing the multivariable 211 Understanding struct 213 Filling a structure 215 Making an array of structures 216 Weird Structure Concepts 218 Putting structures within structures 218 Passing a structure to a function 219 Chapter 15: Life at the Command Prompt 221 Conjure a Terminal Window 221 Starting a terminal window 222 Running code in text mode 223 Arguments for the main() Function 225 Reading the command line 225 Understanding main()'s arguments 227 Time to Bail 229 Quitting the program 229 Running another program 230 Chapter 16: Variable Nonsense 233 Variable Control 233 Typecasting into disbelief 233 Creating new things with typedef 235 Making static variables 238 Variables, Variables Everywhere 241 Using external variables 241 Creating an external structure variable 243 Enumerating 245 Chapter 17: Binary Mania 249 Binary Basics 249 Understanding binary 249 Outputting binary values 251 Bit Manipulation 253 Using the bitwise | operator 253 Using bitwise & 256 Operating exclusively with XOR 257 Understanding the ~ and ! …”
    Libro electrónico