Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
841por Hansteen, Peter N. M.Tabla de Contenidos: “…The Easy Way Out: The Buck Stops Here; Letting ping Through; Helping traceroute; Path MTU Discovery; Tables Make Your Life Easier; 4: Wireless Networks Made Easy; A Little IEEE 802.11 Background; MAC Address Filtering; WEP; WPA; The Right Hardware for the Task; Setting Up a Simple Wireless Network; An OpenBSD WPA Access Point; A FreeBSD WPA Access Point; The Access Point's PF Rule Set; Access Points with Three or More Interfaces; Handling IPSec, VPN Solutions; The Client Side; Guarding Your Wireless Network with authpf; A Basic Authenticating Gateway…”
Publicado 2011
Libro electrónico -
842por Prusinski, BenTabla de Contenidos: “…Fault tolerance and replicationHigh availability solutions for Oracle; Oracle Data Guard; Oracle Streams; Oracle Application Server Clustering; High availability: Oracle 11g R1 Real Application Clusters (RAC); High availability: Oracle 11g R2 Real Application Clusters (RAC); Summary; Chapter 2:Oracle 11g RAC Architecture; Oracle 11g RAC architecture; Certification matrix for Oracle 11g RAC architecture; Hardware architecture for Oracle 11g RAC; Server configurations for Oracle 11g RAC; CPU processors; Choosing between 32-bit and 64-bit CPU architectures; Dual core and multicore processors…”
Publicado 2011
Libro electrónico -
843Publicado 2015Tabla de Contenidos: “…OpenBSD SetupFreeBSD Setup; Guarding Your Wireless Network with authpf; A Basic Authenticating Gateway; Wide Open but Actually Shut; Chapter 5: Bigger or Trickier Networks; A Web Server and Mail Server on the Inside: Routable IPv4 Addresses; A Degree of Separation: Introducing the DMZ; Sharing the Load: Redirecting to a Pool of Addresses; Getting Load Balancing Right with relayd; A Web Server and Mail Server on the Inside-The NAT Version; DMZ with NAT; Redirection for Load Balancing; Back to the Single NATed Network; Filtering on Interface Groups; The Power of Tags; The Bridging Firewall…”
Libro electrónico -
844Publicado 2023Tabla de Contenidos: “…-- Prevention is always better -- Tip 1: Come back to 'you' first -- Tip 2: Create clear boundaries -- Tip 3: Schedule 'you' time into your calendar -- Tip 4: Guard your time -- Tip 5: Get enough sleep -- The wheel of life -- The wheel of life domains -- Adopting a positive and growth mindset -- Conclusion -- Acknowledgements -- References -- Index -- EULA…”
Libro electrónico -
845por Cline, Lydia SloanTabla de Contenidos: “…Double-Sided Walls; Create Plan and Elevation Views; Model a Building from an AutoCAD Plan; Interact with Revit, 20-20, and Other Programs; "Clipping" (Disappearing Geometry); Model a Sloped Ceiling with the Protractor Tool; Chapter 6: Modeling a Two-Story House Interior; Model the Shell and First Floor; Model the Second Floor; Model the Living Room; Model a Cabinet; Model Crown Molding with the Follow Me Tool; Model a Stairs Guard; Edit a Downloaded Staircase; The Outliner…”
Publicado 2014
Libro electrónico -
846por Speed, Tim“…This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. …”
Publicado 2003
Libro electrónico -
847Publicado 2023Tabla de Contenidos: “…-- Chapter 4 Harness Your Distinctions: The First Time You Discover Your Racial Identity Is Life-Transforming -- Lesson 4.1: Harness Your IDMs -- Lesson 4.2: Guard Against Excessive Skepticism -- Chapter 5 Job Interviews Happen Every Day: How Shampoo Changed My Life and Started My Career -- Lesson 5.1 Every Day Is an Interview for Your Next Promotion -- Lesson 5.2: Treat the Company Like You Own It -- Chapter 6 Make the Most of Your Mentor: The Right Mentor Makes All the Difference in the World -- Lesson 6.1: Find the Right Mentor -- Lesson 6.2: Becoming a Mentee Takes TIME -- Chapter 7 Recognize and Harness Your Champions: Champions Are Larger-Than-Life People Who Give You a Boost -- Lesson 7.1: Champions Are Not Mentors -- Lesson 7.2: Embrace the Discomfort of Accepting Help from Afar -- Lesson 7.3: Champions Come in All Shapes and Sizes -- Chapter 8 Overcome the Entry-Level Blues: What to Do When You Feel Like You're Running in Place -- Lesson 8.1: Volunteer for Projects -- Lesson 8.2: Beware the Consequences of Code-Switching -- Lesson 8.3: Learn When to Call on Your Allies…”
Libro electrónico -
848por Haque, A. K. EnamulTabla de Contenidos: “…4.3.1 Climate Change and Extreme Events -- 4.3.2 Other Covariate and Idiosyncratic Risks -- 4.3.3 Socio-economic Characteristics of Household and Household Head -- 4.3.4 Farm Characteristics -- 4.3.5 Access to Institutions -- 4.3.6 Risk Attitude Behaviour and Other Variables -- 4.4 Factors Influencing Farmer's Adaptive Behaviour: Qualitative Papers -- 4.5 Concluding Remarks -- Appendix: Summary of Major Findings from the Qualitative Studies -- References -- 5 A Resilience Framework for Climate Adaptation: The Shyamnagar Experience -- 5.1 The Old Guard -- 5.2 Shyamnagar: Life on the Edge…”
Publicado 2021
Libro electrónico -
849por Ford, NealTabla de Contenidos: “…Architectural Coupling -- Modularity -- Architectural Quanta and Granularity -- Evolvability of Architectural Styles -- Big Ball of Mud -- Monoliths -- Event-Driven Architectures -- Service-Oriented Architectures -- "Serverless" Architectures -- Controlling Quantum Size -- Case Study: Guarding Against Component Cycles -- 5. Evolutionary Data -- Evolutionary Database Design -- Evolving Schemas -- Shared Database Integration -- Inappropriate Data Coupling -- Two-Phase Commit Transactions -- Age and Quality of Data -- Case Study: Evolving PenultimateWidgets' Routing -- 6. …”
Publicado 2017
Libro electrónico -
850Publicado 2014Tabla de Contenidos: “…; And a One and a Two; The Big Finish; Live by the Sword; Now You Have to Kiss Me; Let's Get Defensive; Dodging the Bullet; On Guarding; State of the Art Bang Bang; The Best Gun for You; Run and Gun; Not Just Shooting; Dang it, Jones! …”
Libro electrónico -
851por Axelrod, Alan, 1952-Tabla de Contenidos: “…Lesson 60: Get the Biggest PictureLesson 61: Design What You Need; Lesson 62: Create New Uses for Whatever You Have; Lesson 63: "Guard Against Results"; Lesson 64: Exploit the Unexpected; Chapter 8: GRINDING IT OUT; Lesson 65: Learn a Lesson from The Termperate Life; Lesson 66: Know the Known; Lesson 67: Want Some Real Labor? …”
Publicado 2008
Libro electrónico -
852Publicado 2024Tabla de Contenidos: “…Collected Works of Jao Tsung-i: Xuantang Anthology—Series Introduction -- Acknowledgments -- List of Figures -- Translator’s Preface -- Preface -- 1 Explanatory Abstract -- 2 Recorded Commentary of Xiang’er -- 3 Annotative Discussion -- 4 Annotative Notes -- 1 The Origin of the Name “Daoist Religion” -- 2 The Genuine Dao, Genuineness of the Dao, and the Genuine Text -- 3 Tenets of the Dao -- 4 Person of Dao, Daoist Priest, and Transcendent Person -- 5 Guarding the One -- 6 On Joy and Anger, Auspicious and Inauspicious Fortune -- 7 The Sound of Rapidly Plucked Strings in Equilibrium -- 8 On Life and Studying Life -- 9 Auspicious Talismans of Great Peace -- 10 The Natural -- 11 Harmonizing the Five Elements -- 12 Issuing Forth Prosperity to Overcome Confinement -- 13 Halos of the Sun and Moon, and the Guest Who Defiantly Does Not Shine -- 14 The Arsenal and Tower, Wolf and Fox, General and Cavalry Officials, Chamber and Spearhead Stars -- 15 The Dragon Is without Sons, False Arts -- 16 Jade Maiden -- 17 Writings of the Yellow Emperor, Mysterious Maiden, and Rong Cheng -- 18 Enriching the Marrow and Cherishing the Essence -- 19 The Dao Prohibits Sacrificial Tributes to the Dead -- 20 Disaster Returns to One’s Descendants -- 21 Great Yin -- 22 Officials of Earth -- 23 Officers of Heaven and the Life-Count -- 24 The Corpse and Corpse People -- 25 The Compass -- 26 The Bright Hall -- 27 Straw Dogs -- 28 Xi Zhong Made Carts, the Yellow Emperor Made Rooms -- 29 Great Virtue -- 30 The Character Zhuo 汋 -- 31 The Ladle -- 32 Rhymed Words in the Xiang’er Commentary -- 33 The Title of Laozi’s Book -- 5 Different Explanations of the Xiang’er Commentary -- 6 The Xiang’er Commentary and Heshang Gong’s Section and Verse -- 1 Part 1 -- 2 Part 2 -- 7 Comparison between the Xiang’er Commentary and Suo Dongxuan Edition -- 8 The Xiang’er Commentary and Scripture of Great Peace -- 9 Supplement to the Lost Texts of the Xiang’er Commentary -- 10 Examining Zhang Daoling’s Writings -- 11 The Nine Precepts and Three Harmonies of the Xiang’er Commentary, with Additional Discussion on the Newly Published Critical Edition of the Scripture of Great Peace -- 12 Continued Discussion of the Xiang’er Commentary -- 1 Preface -- 2 Addendum to manuscript number 6825 in the Stein Catalogue -- 3 Sun Simiao Citing the Precepts of Xiang’er, with Further Discussion of Xiang’er being Called a Transcendent Person -- 4 The Nine Practices of the Xiang’er Commentary and Lord Lao’s Visualization Diagram -- 5 On the Xiang’er Commentary’s “First was the Scripture then the 5,000-Character Classic as the Daoist Numerical System.” -- 6 The Xiang’er Scripture as Received by the Preceptor of Eminent Mystery -- 7 Discussing “Do Not Harm the Kingly Breath” in the Twenty-Seven Precepts of Xiang’er and the Scripture of Great Peace -- 8 A Brief Record of Daoist Writings Citing the Xiang’er Commentary -- 9 Conclusion -- 13 Four Points on the Xiang’er Commentary -- 1 The Jixia Academy and the theory of Essence and Breath -- 2 The State of Chu and the theory of Proper Breath and Primal Breath -- 3 Huang-Lao and the Theory of Identical Breath, Profound Breath, and Tyrant Breath -- 4 The “Five Elements” Silk Text and the School of Rites’ Theory of the Breath of Benevolence, Breath of Righteousness, and Breath of Ritual -- 5 The Scripture of Great Peace’s theory of Preserving the Primal Breath and Wang Fu’s Theory of the Breath of the Dao -- 6 The Early Han Mawangdui Recipe for Nourishing Life and the Theory of Contracting Breath as the Root of Zhang Daoling’s Thought -- Appendices -- Postscript -- Bibliography -- Index…”
Libro electrónico -
853por Long, Johnny“…It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. …”
Publicado 2008
Libro electrónico -
854Publicado 2010“…The first edition of The Economist Guide to Investment Strategy explained the fundamentals of investment risk, how to put together ""keep-it-simple"" investment strategies, and the need to guard against our own behavior leading to dreadful investment mistakes. …”
Libro electrónico -
855Publicado 1975Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Universidad de Deusto, Biblioteca Central de Capuchinos de España, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Seminario Metropolitano de Oviedo, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad de Navarra, Red de Bibliotecas de la Archidiócesis de Granada, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Diocesana Bilbao, Biblioteca Diocesana de Salamanca, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Universidad Loyola - Universidad Loyola Granada, Biblioteca IEBA Jerusalén, Biblioteca de Pastoral Madrid, Biblioteca del Seminario Diocesano de Jaén, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro
-
856Publicado 1974Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada, Red de bibliotecas Iglesia Navarra, Biblioteca Central de Capuchinos de España, Universidad Loyola - Universidad Loyola Granada, Biblioteca Universidad de Deusto, Biblioteca de la Universidad de Navarra, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Biblioteca del Seminario Diocesano de Jaén, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro
-
857Publicado 2014Tabla de Contenidos: “…22.4 Die Architektur des Data Warehouse -- 22.5 Das Datenmodell -- 22.6 Hard- und Software für das DWH -- 22.6.1 Hardware -- 22.6.2 Software -- Kapitel 23: Der Oracle Warehouse Builder -- 23.1 Installation und Konfiguration -- 23.2 OWB-Datenquellen -- 23.3 Die ETL-Logik des OWB -- Kapitel 24: ETL in der Praxis -- 24.1 ETL-Werkzeuge -- 24.2 Tabellenfunktionen -- 24.3 Change Data Capture (CDC) -- 24.4 Transportable Tablespaces -- 24.5 Weitere ETL-Features -- Kapitel 25: OLAP und Reporting -- 25.1 SQL für Data Warehouse-Abfragen -- 25.2 SQL-Modeling -- Kapitel 26: Administration von Data Warehouse-Datenbanken -- 26.1 Partitionierung -- 26.2 Indexe -- 26.3 Materialized Views (MV) -- 26.4 Backup and Recovery -- Teil V: Hochverfügbarkeit -- Kapitel 27: Data Guard -- 27.1 Architektur -- 27.2 Physical Standby-Datenbanken -- 27.2.1 Vorbereitung der Primärdatenbank -- 27.2.2 Vorbereitung der Standby-Datenbank -- 27.2.3 Kopieren der Primärdatenbank -- 27.2.4 Aktivierung von Data Guard -- 27.2.5 Physical Standby-Datenbanken verwalten -- 27.3 Logical Standby-Datenbanken -- Kapitel 28: Global Data Services (GDS) -- 28.1 Architektur und Features -- 28.2 Eine GDS-Umgebung aufsetzen -- 28.2.1 Den GSM installieren -- 28.2.2 Den GDS-Katalog erstellen -- 28.2.3 GSM zum Katalog hinzufügen -- 28.2.4 Pool, Region, Datenbanken und Services hinzufügen -- 28.2.5 GDS Client-Konfiguration -- Kapitel 29: Real Application Clusters -- 29.1 Cluster-Architekturen -- 29.2 Cache Fusion -- 29.3 Installation und Konfiguration -- 29.3.1 Die Installation vorbereiten -- 29.3.2 Die Grid Infrastructure installieren -- 29.3.3 Die Datenbank-Software installieren -- 29.3.4 Eine RAC-Datenbank erstellen -- 29.4 Real Application Clusters administrieren -- 29.4.1 ORAchk -- 29.4.2 Die RAC-Datenbank verwalten -- 29.5 RAC-Performance -- 29.6 Backup and Recovery -- 29.7 RAC und Data Guard…”
Libro electrónico -
858Publicado 2013Tabla de Contenidos: “…5.3 > GnuPG (GNU Privacy Guard)Unidad 5. Aplicaciones de la criptografía; 1 >> Aplicaciones prácticas de la criptograf; 2 >> Firma digital; 2.1 > Firma digital con árbitro; 2.2 > Firma digital ordinaria; 2.3 > Clases de firma digital; 3 >> Certificados digitales; 3.1 > Concepto y características; 3.2 > Autoridades de certificación; 3.3 > Solicitud de certificados; 3.4 > Uso de los certificados; 3.5 > Clases de certificados; 4 >> DNI electrónico; 5 >> SSL y TLS; 6 >> Cifrado de información; Unidad 6. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
859Publicado 2014Tabla de Contenidos: “…3.8 Chopper-Stabilized and AZ Chopper OpAmps and InstAmps3.9 Summary and Future Directions; References; Chapter 4 Dedicated Impedance-Sensor Systems; 4.1 Introduction; 4.2 Capacitive-Sensor Interfaces Employing Square-Wave Excitation Signals; 4.2.1 Measurement of Single Elements; 4.2.2 Energy-Efficient Interfaces Based on Period Modulation; 4.2.3 Measurement of Capacitive Sensors with High Speed and High Resolution; 4.2.4 Measurement of Grounded Capacitors: Feed-Forward Active Guarding; 4.3 Dedicated Measurement Systems: Detection of Micro-Organisms…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
860por Williams, TimTabla de Contenidos: “…Printed circuit board qualityThermal stresses; Cleaning and testing; 2.3.2 Package placement; 2.3.3 Component identification; Polarity indication; 2.4 Surface protection; Variations in surface resistance; Circuit design vs. surface resistance; 2.4.1 Guarding; 2.4.2 Conformal coating; Coating vs. encapsulation; Steps to take before coating; Application; Test and rework; 2.5 Sourcing boards and artwork; 2.5.1 Artwork; Using a bureau; Disadvantages of a bureau; 2.5.2 Boards; Chapter 3 Passive components; 3.1 Resistors; 3.1.1 Resistor types; Surface mount chip; Metal film; Carbon; Wirewound…”
Publicado 2004
Libro electrónico