Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
901Publicado 2024Tabla de Contenidos: “…-- Stack sizes -- Implementing our own fibers -- Implementing the runtime -- Guard, skip, and switch functions -- Finishing thoughts -- Summary -- Part 3: Futures and async/await in Rust -- Chapter 6: Futures in Rust -- What is a future? …”
Libro electrónico -
902Publicado 2022Tabla de Contenidos: “…-- Conclusion -- Chapter 9 - Guarding the Guardians: Auditing Security Sector Governance in Malawi -- Introduction -- Overview of the National Security Policy -- Auditing the Security Sector in Malawi -- The Challenge of Policing Protests -- Whither Professionalism of the Police -- Loopholes in Migration Management Laws -- Politicisation of the National Intelligence Services -- The Question of Upholding Constitutional Order -- The Challenges of Democratic Control of the Security Sector -- Towards a Holistic Implementation of the NSP -- Chapter 10 - Executive Supremacy and the Armed Forces: A Case Study of Public Finance Management in Malawi -- Introduction -- Good Governance and Public Finance Management -- Institutional Framework for Security Governance and Financial Oversight in the Armed Forces -- The Historical Context of Public Finance Management in the Armed Forces -- Conclusion -- Chapter 11 - 50-50 Campaigns: Lessons from 10 Years of Promoting Gender Equality and Women's Representation in Parliament -- Introduction -- The Theory of Women's Political Representation -- The Legal and Policy Framework Guiding Women Representation in Malawi -- Trends in Women's Political Representation and the Genesis of the 50-50 Campaign -- Main Actors in the 50-50 Campaigns and their Strategies -- Impact of Parity Funding Campaigns on Descriptive Representation of Women in Parliament in Malawi -- Conclusion…”
Libro electrónico -
903por Ariganello, ErnestoTabla de Contenidos: “…3.5 FUNDAMENTOS PARA EL EXAMEN -- 4 AAA -- 4.1 INTRODUCCIÓN A AAA -- 4.1.1 Modos de acceso AAA -- 4.1.2 Autenticación AAA -- 4.1.3 Autorización AAA -- 4.1.4 Auditoría AAA -- 4.2 CONFIGURACIÓN LOCAL DE AAA -- 4.2.1 Configuración de AAA con CLI -- 4.2.2 Configuración de AAA con CCP -- 4.3 AUTENTICACIÓN AAA BASADA EN SERVIDOR -- 4.3.1 Protocolos de autenticación AAA -- 4.3.2 Cisco Secure ACS -- 4.3.3 Instalación de ACS -- 4.3.4 Configuración de ACS -- 4.4 CONFIGURACIÓN DE AUTENTICACIÓN BASADA EN SERVIDOR -- 4.4.1 Configuración de RADIUS y TACACS+ con CLI -- 4.5 CONFIGURACIÓN DE TACACS+ CON CCP -- 4.6 RESOLUCIÓN DE FALLOS EN AAA -- 4.7 CONFIGURACIÓN DE AUTORIZACIÓN BASADA EN SERVIDOR -- 4.7.1 Configuración de autorización con CCP -- 4.8 REGISTRO DE AUDITORÍA AAA BASADA EN SERVIDOR -- 4.8.1 Configuración del registro de auditoría -- 4.9 FUNDAMENTOS PARA EL EXAMEN -- 5 SEGURIDAD DE CAPA 2 -- 5.1 SEGURIDAD DE LAN -- 5.1.1 Seguridad en los dispositivos finales -- 5.1.2 Dispositivos Cisco de seguridad para terminales -- 5.2 SEGURIDAD EN CAPA 2 -- 5.2.1 Ataques comunes de capa 2 -- 5.3 SEGURIDAD DE PUERTOS DE CAPA 2 -- 5.3.1 Configuración de seguridad de puertos -- 5.3.2 Verificación de la seguridad de puertos -- 5.4 CONTROL DE TORMENTAS -- 5.4.1 Configuración de control de tormentas -- 5.5 PROTECCIÓN DE LAS TOPOLOGÍAS STP -- 5.5.1 Configuración de BPDU Guard -- 5.5.2 Configuración de BPDU Filter -- 5.5.3 Configuración de Root Guard -- 5.6 SEGURIDAD EN VLAN -- 5.6.1 Seguridad del enlace troncal -- 5.6.2 Configuración de un enlace troncal seguro -- 5.6.3 VLAN Access Lists -- 5.6.4 Private VLAN -- 5.6.5 Private VLAN Edge -- 5.6.6 Switched Port Analyzer -- 5.7 FUNDAMENTOS PARA EL EXAMEN -- 6 LISTAS DE CONTROL DE ACCESO -- 6.1 INTRODUCCIÓN A ACL -- 6.1.1 Funcionamiento de las ACL -- 6.1.2 Mitigación de ataques con ACL -- 6.1.3 Tipos de lista de acceso…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
904por Foltz, KevinTabla de Contenidos: “…-- 2.2 Naming -- 2.3 Identity and Naming: Case Study -- 2.4 Implications for Information Security -- 2.5 Personas -- 2.6 Identity Summary -- 3 Attributes -- 3.1 Facts and Descriptors -- 3.2 An Attribute Ecosystem -- 3.3 Data Sanitization -- 3.3.1 Guarded and Filtered Inputs -- 3.3.2 Guard Administrator Web Interface -- 3.3.3 Integrity in Attribute Stores…”
Publicado 2020
Libro electrónico -
905Publicado 2021Tabla de Contenidos: “…ESD Standards 1017 B.1 ESD Association 1017 B.2 International Organization of Standards 1018 B.3 Department of Defense 1018 B.4 Military Standards 1019 B.5 Airborne Standards and Lightning 1019 C Index 1021 D Wiley Series in Electrostatic Discharge (ESD) and Electrical Overstress (EOS) 1055 D.1 Additional Wiley Texts 1055 E ESD Design Rules 1057 E.1 ESD Design Rule Check (DRC) 1057 E.2 Electrostatic Discharge (ESD) Layout Versus Schematic (LVS) Verification 1058 E.3 ESD Electrical Rule Check (ERC) 1059 F Guard Ring Design Rules 1061 F.1 Latchup Design Rule Checking (DRC) and Guard Rings 1061 F.2 Latchup Electrical Rule Check (ERC) 1063 F.3 Guard Ring Resistance 1064 G EOS Design Rules and Checklist 1067 G.1 Electrical Overstress (EOS) Design Rule Checking 1067 G.2 Electrical Overstress (EOS) Layout Versus Schematic (LVS) Verification 1067 G.3 Electrical Overstress (EOS) Electrical Rule Check (ERC) 1068 H Latchup Design Rules 1069 H.1 Latchup Design Rule Checking (DRC) 1069 H.2 Latchup Electrical Rule Check (ERC) 1072 I ESD Cookbook 1077 I.1 Electrostatic Discharge (ESD) Cookbook 1077 J EOS Cookbook 1079 J.1 Electrical Overstress (EOS) Cookbook 1079 K Latchup Cookbook 1081 K.1 Latchup Design Rule Checking (DRC) 1081 K.2 Latchup Electrical Rule Check (ERC) 1083 L ESD Design and Release Check List 1087 L.1 ESD Design Release 1087 L.2 Electrostatic Discharge (ESD) Checklists 1087 M EOS Design and Release Checklist 1089 M.1 Electrical Overstress (EOS) and ESD Design Release 1089 M.2 Electrical Overstress (EOS) Design Release Process 1089 M.3 Electrical Overstress (EOS) Checklists 1090 M.4 An EOS Checklist 1091 N Latchup Design and Release Checklist 1093 N.1 Latchup Design Rule Checking (DRC) 1093 N.2 Latchup Electrical Rule Checking (ERC) 1095 N.3 Latchup Checklists 1095 N.4 A Latchup Design and Release Checklist 1096 Index 1097.…”
Libro electrónico -
906Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Penetration Testing and Web Applications -- Proactive security testing -- Different testing methodologies -- Ethical hacking -- Penetration testing -- Vulnerability assessment -- Security audits -- Considerations when performing penetration testing -- Rules of Engagement -- The type and scope of testing -- Client contact details -- Client IT team notifications -- Sensitive data handling -- Status meeting and reports -- The limitations of penetration testing -- The need for testing web applications -- Reasons to guard against attacks on web applications -- Kali Linux -- A web application overview for penetration testers -- HTTP protocol -- Knowing an HTTP request and response -- The request header -- The response header -- HTTP methods -- The GET method -- The POST method -- The HEAD method -- The TRACE method -- The PUT and DELETE methods -- The OPTIONS method -- Keeping sessions in HTTP -- Cookies -- Cookie flow between server and client -- Persistent and nonpersistent cookies -- Cookie parameters -- HTML data in HTTP response -- The server-side code -- Multilayer web application -- Three-layer web application design -- Web services -- Introducing SOAP and REST web services -- HTTP methods in web services -- XML and JSON -- AJAX -- Building blocks of AJAX -- The AJAX workflow -- HTML5 -- WebSockets -- Summary -- Chapter 2: Setting Up Your Lab with Kali Linux -- Kali Linux -- Latest improvements in Kali Linux -- Installing Kali Linux -- Virtualizing Kali Linux versus installing it on physical hardware -- Installing on VirtualBox -- Creating the virtual machine -- Installing the system -- Important tools in Kali Linux -- CMS & -- Framework Identification -- WPScan -- JoomScan -- CMSmap…”
Libro electrónico -
907Publicado 2021Tabla de Contenidos: “…Cataloging your data to avoid the data swamp -- How to avoid the data swamp -- The AWS Glue/Lake Formation data catalog -- AWS services for data encryption and security monitoring -- AWS Key Management Service (KMS) -- Amazon Macie -- Amazon GuardDuty -- AWS services for managing identity and permissions -- AWS Identity and Access Management (IAM) service -- Using AWS Lake Formation to manage data lake access -- Hands-on - configuring Lake Formation permissions -- Creating a new user with IAM permissions -- Transitioning to managing fine-grained permissions with AWS Lake Formation -- Summary -- Section 2: Architecting and Implementing Data Lakes and Data Lake Houses -- Chapter 5: Architecting Data Engineering Pipelines -- Technical requirements -- Approaching the data pipeline architecture -- Architecting houses and architecting pipelines -- Whiteboarding as an information-gathering tool -- Conducting a whiteboarding session -- Identifying data consumers and understanding their requirements -- Identifying data sources and ingesting data -- Identifying data transformations and optimizations -- File format optimizations -- Data standardization -- Data quality checks -- Data partitioning -- Data denormalization -- Data cataloging -- Whiteboarding data transformation -- Loading data into data marts -- Wrapping up the whiteboarding session -- Hands-on - architecting a sample pipeline -- Detailed notes from the project "Bright Light" whiteboarding meeting of GP Widgets, Inc -- Summary -- Chapter 6: Ingesting Batch and Streaming Data -- Technical requirements -- Understanding data sources -- Data variety -- Data volume -- Data velocity -- Data veracity -- Data value -- Questions to ask -- Ingesting data from a relational database -- AWS Database Migration Service (DMS) -- AWS Glue -- Other ways to ingest data from a database…”
Libro electrónico -
908Publicado 2022Tabla de Contenidos: “…Using Your Findings to Make Decisions -- Following up on variances -- Judging the effectiveness of your employees -- Tying supply chain concepts to variance analysis -- Attaching ABC costing concepts to variance analysis -- Chapter 8 Focusing on Overhead Costs -- Using Cost Allocation to Minimize Overhead -- Paying for the Security Guard: Fixed Overhead Costs -- Planning fixed overhead costs -- Allocating fixed overhead costs -- Assessing potential causes of fixed overhead variances -- Those Vexing Variable Manufacturing Costs -- Working with variable overhead costs -- Implementing variance analysis -- Finding the reasons for a variable overhead variance -- Chapter 9 What's on the Shelf? …”
Libro electrónico -
909Publicado 2013Tabla de Contenidos: “…Reorganizing Tables and Indexes -- Cloud Control Metrics -- Summary -- Part II: Cloud Control for Database, System, Storage, and Middleware Administrators -- Chapter 9: DBAs: Manage Databases with Cloud Control -- Oracle Database Home Screen -- Oracle Database Menu -- Performance -- Oracle Performance Menu -- Availability -- Backup/Recovery Summary -- Data Guard Summary -- Availability Menu -- Schema Tools -- Schema Menu -- Administration Tools -- Administration Menu -- Summary -- Chapter 10: System and Storage Adminstrators: Manage Infrastructure with Cloud Control -- Host Administration -- Host Home Page -- Host Menu -- Storage Administration -- Viewing Storage History -- Summary -- Chapter 11: Middleware Adminstrators: Manage Middleware with Cloud Control -- Managing Middleware with Cloud Control -- Discovering Middleware Targets -- Automatic Discovery of Fusion Middleware Targets -- Discovering Targets Manually -- Using the Command Line to Discover Multiple WebLogic Domains -- Discovering New or Modified Domain Members -- Managing Middleware with Cloud Control -- Managing WebLogic Application Deployment -- Monitoring JEE Applications -- Managing WebLogic Server with Cloud Control -- SOA Home -- Web Services Policy Dashboard -- Managing a WebLogic Server Domain -- Proactive Middleware Monitoring -- Managing Cloud Control Metrics -- System Monitoring and Notifications -- Request Monitoring -- Composite Application Dashboard -- Middleware Diagnostics with Cloud Control -- Using the Middleware Target Home Pages for Diagnostics -- Using the Middleware Performance Summary Pages -- The Middleware Diagnostics Advisor -- Diagnosing Problems Related to WebLogic Middleware Alerts -- Transaction Diagnostics and Root-Cause Analysis -- JVM Diagnostics and Application Dependency and Performance Managers -- JVM Diagnostics…”
Libro electrónico -
910Publicado 2024Tabla de Contenidos: “…Introduction to security groups -- Network ACLs overview -- Elastic IPs and Elastic network interfaces -- Understanding Elastic IPs and their use cases -- Elastic network interfaces -- VPC peering and connectivity options -- VPC peering concepts and setup -- AWS Direct Connect and VPNs -- VPC endpoints and their user cases -- VPC design principles -- Summary -- Chapter 6: Implementing Security Best Practices in Amazon EC2 -- Introduction to Amazon EC2 security -- Shared responsibility model -- IAM -- IAM in the context of Amazon EC2 -- Creating and managing IAM roles for EC2 instances -- Understanding instance profiles and policies -- Data encryption -- Data at rest encryption for EBS volumes and snapshots -- Data in transit encryption with TLS/SSL -- Key management with AWS KMS -- Network security -- Additional network security best practices -- Operating system and application security -- Patch management and updates -- Application-level security considerations -- Introduction to Amazon GuardDuty for threat detection -- Logging with AWS CloudTrail and CloudWatch -- Auditing and analysis techniques -- Summary -- Part 2: Building a Resilient Application on Amazon EC2 -- Chapter 7: Load Balancing and Auto Scaling with Elastic Load Balancer and Auto Scaling Groups -- Introduction to ELB -- Types of load balancers -- Setting up and configuring an ELB -- ALB -- Setting up and configuring an NLB -- Creating and configuring listeners -- Setting up target groups for the NLB -- Configuring health checks for targets -- Load balancer best practices -- Cross-zone load balancing -- SSL/TLS offloading -- Monitoring and logging -- Introduction to Auto Scaling groups -- Understanding the concept and components of ASG -- Use cases and benefits -- Configuring and managing ASG -- Launch templates -- Scaling policies -- Life cycle hooks -- Integrating ELB with ASG…”
Libro electrónico -
911Publicado 2010Tabla de Contenidos: “…Coaching, teaching, leading -- A sacred trust -- Philosophers and prison guards -- Who can lead? -- "But, coach Wooden, times have changed!" …”
Libro electrónico -
912Publicado 2018Tabla de Contenidos: “…Balancing act of tests -- Testing in practice -- Integration testing with Arquillian -- Acceptance testing with Cucumber -- Feature file -- Step definitions -- Summary -- Chapter 14: Securing the Application -- Securing the application -- JSON Web Tokens -- Token structure -- Generating the token -- IMS Security -- Verifying the token -- Consuming token in Angular -- Route Guards -- Exchanging tokens -- Injecting an authorization header -- Neither in Java EE nor MicroProfile -- General tips -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
913Publicado 2022Tabla de Contenidos: “…-- 8.5 Significance of Iranian Internal Waters for the Passage Regime in the Strait of Hormuz -- 9 Tensions in and over the Taiwan Strait in 2021 -- 9.1 Legal and Geographical Characteristics of the Taiwan Strait -- 9.2 Navigation in the Taiwan Strait in the Light of Recent Developments in China’s Legislation -- 9.3 Geopolitical Tensions in the Taiwan Strait and Intrusions of Taiwan’s Air Defence Identification Zone -- 10 Discriminatory Navigational Restrictions in the Kerch Strait in Respect of Foreign Commercial Ships -- 10.1 The Significance of the Kerch Strait for Commerce -- 10.2 Restrictions on Foreign Commercial Ships’ Navigation through the Kerch Strait -- 11 Discriminatory Prohibition of the Right of Innocent Passage of a Commercial Ship The Vironia Incident in the Gulf of Finland -- 11.1 Right of Innocent Passage in the Eastern Gulf of Finland from 1920s to 2000 -- 11.2 The Russian Federation’s Maritime Zones in the Gulf of Finland -- 11.3 The Vironia Incident in the Gulf of Finland and Its Aftermath -- 11.4 Potential Legal Basis of the Russian Federation’s Permit-Based Passage Regime in the Gulf of Finland -- part 4 -- Major Maritime Industrial Projects, Piracy, and Unidentified Soldiers -- 12 The Nord Stream Project and Estonian-Russian Incidents in the Viro Strait -- 12.1 Link between Industrial Projects and Maritime Security -- 12.2 The Significance of the Viro Strait’s eez Corridor for the Nord Stream Project -- 12.3 Marine Scientific Research in the Context of Seabed Studies on the Pipeline Route -- 12.4 The Incident between the Estonian Coast Guard and Russian Research Vessels in the Viro Strait’s eez Corridor -- 12.5 Permit-Based Marine Scientific Research in an eez: Estonia’s Decision to Deny Seabed Surveys -- 13 Countering the Threat of ‘Little Green Men’ in the Åland Strait -- 13.1 Geopolitical Characteristics of the Åland Strait and Preparations to Counter Unidentified Soldiers on the Åland Islands -- 13.2 Legal Regime of the Åland Strait -- 14 Threats of Piracy in the Straits of Malacca, Sunda, Lombok -- 14.1 Legal and Geopolitical Characteristics -- 14.2 Threats of Piracy in Indonesia and the Straits of Malacca and Singapore -- part 5 -- Concluding Observations on the Implications of Hybrid Threats for Maritime Security Law -- 15 A Need for a New Legal Framework on Hybrid Naval Warfare? …”
Libro electrónico -
914Publicado 2023Tabla de Contenidos: “…Chapter 10: Improving the Bottle Holder Design -- Technical requirements -- Making design changes -- Adding tolerances -- Removing material with the Shell tool -- Adding parts from McMaster-Carr -- Adding a nut and bolt from McMaster-Carr -- Using joints to place a McMaster-Carr part -- Fixing the hole size -- Bringing in a hex nut from McMaster-Carr -- Adding a slider joint for Holder 01 and Holder 2 -- Creating a part drawing -- Creating a BOM -- Creating a sheet for Holder 2 -- Adding dimensions -- Making an adjustment to the 3D model -- Summary -- Part 3: The Form Environment -- Chapter 11: The FORM Environment -- Technical requirements -- Overview of the FORM environment -- Working with form models -- Filling in a hole in the FORM environment -- The CREATE and MODIFY tools -- Selecting features on an object -- Filling holes -- The Edit Form tool -- Fixing a broken mesh body -- Surface tools -- Summary -- Chapter 12: Modeling a Scary Tealight Ghost -- Technical requirements -- Using surfaces to create the tealight -- Creating the ghost -- Rendering the ghost -- Changing the material -- Change the scene settings -- Render settings -- Summary -- Chapter 13: Using Form and Solid Modeling to Create a Cushioned Chair -- Technical requirements -- Creating a chair in the form environment -- Shape the chair with the Edit Form tool -- Adding a material to faces -- Creating the inner frame -- Head and arm support -- Improving the design -- Changing the selected sketch plane -- Summary -- Part 4: Working with 2D and 3D Scanned Images -- Chapter 14: Using a Scanned Image to Create a 3D Model -- Technical requirements -- Inserting a scanned image into Fusion 360 -- Calibrate the image to size -- Adding sketch lines and dimensions -- Creating a 3D model -- The sword model -- The guard and hilt -- The handle -- The finishing touches -- Summary…”
Libro electrónico -
915Publicado 1999Tabla de Contenidos: “…PREVENTIVE MEASURES DURING DEPLOYMENT -- Risk Communication -- Combat Stress Reactions and Control -- Use of Investigational New Drugs by the Armed Forces -- PREVENTIVE MEASURES AFTER DEPLOYMENT -- Risk Communication -- Reintegration -- Medical Management and Symptomatic Treatment of Medically Unexplained Symptoms -- FINDINGS AND RECOMMENDATIONS -- 7 Postdeployment Reintegration -- INTRODUCTION -- Family-and Work-Related Problems of Deployment -- Effects of Downsizing and Increased Operational Tempo -- MILITARY REUNION AND REINTEGRATION LITERATURE REVIEW -- Information Gathering -- Family Factors -- Reunion Period -- Return Phase -- Readjustment Phase -- Reintegration Phase -- Return of the Wounded or Ill -- Role of Family in Readjustment -- Family Roles in Readjustment in Non-Military Settings -- Prevention of War-Related Stress for Family Members -- PROGRAMS TO ASSIST FAMILIES AND SERVICE MEMBERS WITH REINTEGRATION -- Navy Support Services -- Army Support Services -- Air Force Support Services -- Programs to Help Support National Guard and Reserves -- VA Support Programs -- FINDINGS AND RECOMMENDATIONS -- 8 Protecting the Health of the Reserve Component -- DEMOGRAPHICS AND HEALTH ISSUES -- Categories of Reserve Forces -- Demographics -- Deployments of Reserve Forces -- Health Problems in Reserves -- UNIQUE CIRCUMSTANCES -- IMPLEMENTATION OF REPORT RECOMMENDATIONS -- Medical Surveillance -- Medical Record Keeping -- Preventive Measures -- Reintegration -- FINDINGS AND RECOMMENDATIONS -- References -- APPENDIX A Population and Need-Based Prevention of Unexplained Physical Symptoms in the Community -- SYNOPSIS -- UNDERSTANDING MEDICALLY UNEXPLAINED PHYSICAL SYMPTOMS -- EPIDEMIOLOGY OF SYMPTOMS AND SYMPTOM-BASED DISORDERS -- Prevalence in the Community and Primary Care -- Natural History of MUPS…”
Libro electrónico -
916Publicado 2024Tabla de Contenidos: “…5.2 Setting the Risk Limits for Risk Matrix and F-N Curves -- 5.3 Uncertainty -- 5.4 Risk Reduction -- 5.5 Representing the Cascading Effect -- 5.6 Adding Dimensions -- 5.7 Cumulative Versus Non-cumulative Scale -- 5.7.1 An Example Ambiguous Use of Matrix -- 6 Summaries of the Recommendations -- 7 Example of Integration of Assessment for all Classes -- 8 Method -- 8.1 The Belonging to a Class and its Uncertainty -- 8.2 Classes Definitions -- 8.3 The Expert Assessment for a Specific Event -- 8.4 The Matrix Construction -- 8.5 The Example of a Particular Unstable Mass of Pont Bourquin Landslide -- 8.5.1 Landslide Settings -- 8.5.2 The Classes and Scales -- 8.5.3 Setting the Prior Probabilities -- 8.5.4 Results -- 9 Discussion and Conclusion -- References -- Do not Let Your Guard Down: Landslide Exposure and Local Awareness in Mexico -- 1 Introduction -- 2 Landslide Exposure and Awareness -- 3 Studied Area -- 4 Methodology -- 4.1 Aerial Survey Using UAVs -- 4.2 Expansion of the Urban Area -- 4.3 Rainfall Series -- 5 Results -- 6 Concluding Remarks -- References -- Landslides in Higher Education Curricula and Beyond -- 1 Introduction -- 1.1 General Views on Higher Education -- 1.2 The Focus of this Article -- 2 Materials and Methods -- 3 Results and Discussion -- 3.1 Background Studies on Landslides and Study Programmes -- 3.2 Academic Programmes in Disaster Risk Management -- 3.3 University Study Programs in Disaster Risk Reduction & -- Management -- 3.4 Selected Summer Schools on Landslides -- 3.5 Landslide-Related Capacity Building Examples -- 3.6 Case 1: The International School on Landslide Risk Assessment and Mitigation (LARAM) -- 3.7 Case 2: Kokomerem Summer School on Rockslides and Related Phenomena in the Kokomeren River Valley (Kyrgyzstan) -- 3.8 Case 3: The International Research Association on Large Landslides (iRALL) School…”
Libro electrónico -
917Publicado 2023Tabla de Contenidos: “…Creating a dictionary -- Checking the number of elements in a dictionary -- Adding a new element to a dictionary -- Accessing a dictionary element -- Assigning a new value to an existing key -- Removing an element from a dictionary -- Iterating over a dictionary -- Exploring sets -- Creating a set -- Checking the number of elements in a set -- Adding a new element to a set -- Checking whether a set contains an element -- Removing an item from a set -- Iterating over a set -- Performing set operations -- Understanding set membership and equality -- Summary -- Chapter 6: Functions and Closures -- Technical requirements -- Exploring functions -- Creating a function -- Using custom argument labels -- Using nested functions -- Using functions as return types -- Using functions as parameters -- Using a guard statement to exit a function early -- Exploring closures -- Simplifying closures -- Summary -- Chapter 7: Classes, Structures, and Enumerations -- Technical requirements -- Understanding classes -- Creating a class declaration -- Making an instance of the class -- Making a subclass -- Overriding a superclass method -- Understanding structures -- Creating a structure declaration -- Making an instance of the structure -- Comparing value types and reference types -- Deciding between classes and structures -- Understanding enumerations -- Creating an enumeration -- Summary -- Chapter 8: Protocols, Extensions, and Error Handling -- Technical requirements -- Exploring protocols -- Creating a protocol declaration -- Exploring extensions -- Adopting a protocol via an extension -- Creating an array of different types of objects -- Exploring error handling -- Summary -- Learn more on Discord -- Chapter 9: Swift Concurrency -- Technical requirements -- Understanding Swift concurrency -- Examining an app without concurrency -- Updating the app using async/await…”
Libro electrónico -
918Publicado 2017Tabla de Contenidos: “…-- /api/posts with GET method -- /api/posts with the POST method -- /api/posts/1 with the GET method -- /api/posts/1 with the PATCH/PUT method -- /api/posts/1 with the DELETE method -- User authentication -- Other missing elements -- Comment Resource Implementation -- Summary -- Chapter 7: Improving RESTful Web Services -- Dingo, simplifying RESTful API development -- Installation and configuration -- Simplifying routes -- API versioning -- Rate limiting -- Internal requests -- Responses -- Authentication and middleware -- JWT Auth setup -- The Manual way -- Simpler way through Lumen JWT authentication integration package -- Authentication -- Log in -- Invalidate token -- Refresh token -- Transformers -- Understanding and setting transformers -- Using transformers -- Encryption -- SSL certificate, different options -- Summary -- Chapter 8: API Testing & -- #x2013 -- Guards on the Gates -- The need for automated tests -- Types of testing -- Unit testing -- Acceptance testing -- Functional testing -- Integration testing…”
Libro electrónico -
919Publicado 2022Tabla de Contenidos: “…-- The Haskell Ecosystem -- The History of Haskell -- Your Working Environment -- First Steps with GHCi -- The Time Machine Store -- Summary -- Chapter 2: Declaring the Data Model -- Characters, Numbers, and Lists -- Characters -- Numbers -- Strings -- Lists -- Creating a New Project -- Creating a Project with Cabal -- Creating a Project with Stack -- Understanding Modules -- Cabal and Stack -- Defining Simple Functions -- Creating a Simple Function -- Specifying the Function's Type -- Developing a Robust Example -- Returning More Than One Value -- Working with Data Types -- Pattern Matching -- Simple Patterns -- Lists and Tuples -- Guards -- View Patterns -- Records -- Creation and Use -- The Default Values Idiom -- Summary -- Chapter 3: Increasing Code Reuse -- Parametric Polymorphism -- Functions As Parameters -- Higher-Order Functions -- Anonymous Functions -- Partial Application of a Function -- More on Modules -- Module Imports -- Smart Constructors and Views -- Diving into Lists -- Folds -- Lists and Predicates -- Lists Containing Tuples -- List Comprehensions -- Haskell Origami -- Summary -- Chapter 4: Using Containers and Type Classes -- Using Packages -- Managing Dependencies -- Building Packages -- Building Packages with Cabal -- Building Packages with Stack -- Obtaining Help -- Containers: Maps, Sets, Trees, Graphs -- Maps -- Sets -- Trees -- Graphs -- Ad Hoc Polymorphism: Type Classes -- Declaring Classes and Instances -- Built-In Type Classes -- Binary Trees for the Minimum Price -- Step 1: Simple Binary Trees -- Step 2: Polymorphic Binary Trees -- Step 3: Binary Trees with Monoidal Cache…”
Libro electrónico -
920Publicado 2015Tabla de Contenidos: “…4.7.3.1.4 Out-of-plane bending -- 4.7.3.1.5 Axial load, balanced -- 4.7.3.1.6 In-plane bending -- 4.7.3.1.7 Out-of-plane bending, balanced -- 4.7.3.1.8 Balanced axial load -- 4.7.3.1.9 Unbalanced in-plane bending -- 4.7.3.1.10 Unbalanced out-of plane bending OPB -- 4.7.3.1.11 Balanced axial load for three braces -- 4.7.3.1.12 In-plane bending for three braces -- 4.7.3.1.13 Unbalanced out-of-plane bending for three braces -- 4.7.3.2 Effect of weld toe position -- Example 4.7 -- Example 4.8 -- Example 4.9 -- Example 4.10 -- 4.7.4 Jacket fatigue design -- 4.8 Topside design -- 4.8.1 Topside structure analysis -- 4.8.2 Deck design to support vibrating machines -- Example 4.11 -- Solution -- 4.8.3 Grating design -- Example 4.12 -- Solution -- 4.8.4 Handrails, walkways, stairways, and ladders -- 4.9 Bridges -- 4.10 Vortex-induced vibration -- Example 4.13 -- Example 4.14 -- Example 4.15 -- Example 4.16 -- Solution -- Example 4.17 -- Solution -- Further reading -- 5 Helidecks and boat landing design -- 5.1 Introduction -- 5.2 Helideck design -- 5.2.1 Helicopter landing loads -- 5.2.1.1 Loads for helicopter landings -- 5.2.1.2 Loads for helicopters at rest -- 5.2.1.3 Helicopter static loads -- 5.2.1.4 Area load -- 5.2.1.5 Helicopter tie-down loads -- 5.2.1.6 Wind loading -- 5.2.1.7 Installation motion -- 5.2.2 Safety net arms and framing -- 5.3 Design load conditions -- 5.3.1 Helideck layout design steps -- 5.3.2 Plate thickness calculation -- Example 5.2 -- 5.3.3 Aluminum helideck -- 5.4 Boat landing design -- 5.4.1 Boat landing calculation -- Example 5.3 -- 5.4.1.1 Cases of impact load -- 5.4.2 Boat landing design using a nonlinear analysis method -- 5.4.3 Boat impact methods -- 5.4.4 Tubular member denting analysis -- 5.4.4.1 Simplified method for denting limit calculation -- 5.5 Riser guard -- 5.5.1 Riser guard design calculation -- Example 5.4.…”
Libro electrónico