Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
1001Publicado 2010“…When there isn't a high level of trust among team members, communication is guarded, the climate is tense, meetings are stiff and formal and the team goes nowhere. …”
Libro electrónico -
1002por Roberts, Barbara Ann, 1941-1998“…Barbara Roberts explores these government officials, showing how they not only kept the doors closed but also managed to find a way to get rid of some of those who managed to break through their carefully guarded barriers. Robert's important book explores a dark history with an honest and objective style…”
Publicado 1988
Libro electrónico -
1003Publicado 2017“…Her answers are often accurate compared to other aging patients. She is a bit guarded about being interviewed, but expresses fairly normal sleep behaviors…”
Vídeo online -
1004
-
1005Publicado 2005“…Although there are many resources available about how to make a film, there are few about how to get your film seen once it's made and none that reveal the closely-guarded marketing secrets of the major motion picture studios. …”
Libro electrónico -
1006
-
1007Publicado 2017“…Supported by contributions from Oracle expert Eric Yen, Oracle Database 12c Release 2 New Features offers detailed coverage of: • Installing Oracle Database 12c and Grid Infrastructure • Architectural changes, such as Oracle Multitenant • The most current information on upgrading and migrating to Oracle Database 12c • The pre-upgrade information tool and parallel processing for database upgrades • Oracle Real Application Clusters new features, such as Oracle Flex Cluster, Oracle Flex Automatic Storage Management, and Oracle Automatic Storage Management Cluster File System • Enhanced and new online operations: tables, indexes, and PDBs • Oracle RMAN enhancements, including cross-platform backup and recovery • Oracle Data Guard improvements, such as Fast Sync, and Oracle Active Data Guard new features, such as Far Sync • SQL, PL/SQL, DML, and DDL new features • Improvements to partitioning manageability, performance, and availability • Advanced business intelligence and data warehousing capabilities • Security enhancements, including privileges analysis, data redaction, and new administrative-level privileges • Manageability, performance, and optimization improvements…”
Libro electrónico -
1008Publicado 1989Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Central de Capuchinos de España)Libro
-
1009por Ramirez, Juan, 1961-“…Equity strategies are closely guarded secrets and as such, there is very little written about how investors and corporate can utilise equity vehicles as part of their growth strategies. …”
Publicado 2011
Libro electrónico -
1010Publicado 2018“…We will cover the most important new features in VMM 2016 across networking, storage, and compute, including brand new Guarded Fabric, Shielded VMs and Storage Spaces Direct. …”
Libro electrónico -
1011Publicado 2018“…She claims her hallucinations are gifts. Her affect is very guarded and paranoid…”
Vídeo online -
1012Publicado 2018“…She claims her hallucinations are gifts. Her affect is very guarded and paranoid…”
Vídeo online -
1013
-
1014
-
1015por Nisbet, Jo“…The story begins on the night that two security guards arrive at a house in Los Angeles, USA, to take the author's fourteen-year-old daughter Emily away to a 'Brat Camp' in Utah. …”
Publicado 2013
Libro electrónico -
1016Publicado 2019“…""For aspiring life guards this book is a must read on how to give oxygen to create energy and have impact (like JR). …”
Libro electrónico -
1017por Warrick, CathyTabla de Contenidos: “…Open system servers - Linux for xSeries -- 8.1 Supported Linux distributions -- 8.2 Introduction to Linux OS components -- 8.2.1 Understanding and tuning virtual memory -- 8.2.2 Understanding and tuning the swap partition -- 8.2.3 Understanding and tuning the daemons -- 8.2.4 Compiling the kernel -- 8.2.5 Changing kernel parameters -- 8.2.6 Kernel parameters -- 8.2.7 Understanding and tuning the file systems -- 8.2.8 Tuning TCP window size -- 8.3 Linux monitoring tools -- 8.3.1 uptime -- 8.3.2 dmesg -- 8.3.3 top -- 8.3.4 iostat -- 8.3.5 vmstat -- 8.3.6 sar -- 8.3.7 isag -- 8.3.8 GKrellM -- 8.3.9 KDE System Guard -- 8.4 Host bus adapter (HBA) settings -- 8.5 Logical Volume Manager for Linux (LVM) -- 8.5.1 Implementation -- 8.5.2 Performance management -- 8.6 Bonnie -- 8.6.1 Benchmarks -- 8.6.2 Downloading -- 8.7 Bonnie++…”
Publicado 2005
Libro electrónico -
1018por Moore, BillTabla de Contenidos: “…9.2 User management component specification -- 9.2.1 User management component: the actors -- 9.2.2 What the users can do: The use cases -- 9.2.3 View user details: UC.ViewUserDetails -- 9.2.4 Request password: UC.RequestPassword -- 9.2.5 Register customer: UC.RegisterCustomer -- 9.2.6 Modify customer details: UC.ModifyCustomerDetails -- 9.2.7 Log out: UC.Logout -- 9.2.8 Log in: UC.login -- 9.2.9 List users: UC.ListUsers -- 9.2.10 Delete customer details: UC.DeleteCustomerDetails -- 9.2.11 Dependencies -- 9.2.12 Interfaces for other components -- 9.3 Building the user management component -- 9.3.1 Preparing the workspace -- 9.3.2 Creating the Java packages -- 9.3.3 Creating the Web section -- 9.4 Strategy -- 9.5 The business layer (manager) -- 9.5.1 LDAP Implementation -- 9.6 The model layer (DAO) -- 9.7 The domain layer (DTO) -- 9.8 The presentation layer (Struts) -- 9.8.1 Log in/out -- 9.8.2 Registration -- 9.8.3 User details management -- 9.8.4 Administrative view/modify/delete user details -- 9.8.5 Password e-mail request -- 9.8.6 Security and guarding pages -- 9.9 Testing the component -- 9.10 Room for improvement -- 9.11 Summary -- Chapter 10. …”
Publicado 2003
Libro electrónico -
1019Publicado 2024Tabla de Contenidos: “…7.7.4.5 Reselection Evaluation Altered by UE Mobility -- 7.7.5 RRC Connection Control and Mobility -- 7.7.5.1 RRC Connection Control -- 7.7.5.2 RRC Connection Setup from IDLE and INACTIVE -- 7.7.5.3 Mobility and Measurements in Connected Mode -- 7.7.6 RRC Support of Upper Layers -- 7.7.6.1 NAS Message Transfer -- 7.7.6.2 Network Slicing -- 7.7.6.3 UE Capability Transfer -- 7.7.7 Different Versions of Release 15 RRC Specifications -- 7.8 Radio Protocols in RAN Architecture -- 7.9 Summary -- References -- Chapter 8 Deployment Aspects -- 8.1 Introduction -- 8.2 Spectrum Resources -- 8.2.1 Spectrum Refarming and Dynamic Spectrum Sharing -- 8.3 Network Density -- 8.4 Mobile Data Traffic Growth -- 8.4.1 Mobile Data Volume -- 8.4.2 Traffic Asymmetry -- 8.5 Base Station Site Solutions -- 8.6 Electromagnetic Field (EMF) Considerations -- 8.7 Network Synchronization and Coordination Requirements -- 8.7.1 Main Interference Scenarios in TDD System -- 8.7.2 TDD Frame Configuration Options -- 8.7.3 Cell Size and Random Access Channel -- 8.7.4 Guard Period and Safety Zone -- 8.7.5 Intra‐Frequency Operation -- 8.7.6 Inter‐Operator Synchronization -- 8.7.7 Synchronization Requirements in 3GPP -- 8.7.7.1 Cell Phase Synchronization Accuracy -- 8.7.7.2 Maximum Receive Timing Difference (MRTD) for LTE-5G Dual Connectivity -- 8.7.8 Synchronization from Global Navigation Satellite System (GNSS) -- 8.7.9 Synchronization with ToP -- 8.7.10 Timing Alignment Between Vendors -- 8.8 5G Overlay with Another Vendor LTE -- 8.9 Summary -- References -- Chapter 9 Transport -- 9.1 5G Transport Network -- 9.1.1 5G Transport -- 9.1.2 Types of 5G Transport -- 9.1.3 Own Versus Leased Transport -- 9.1.4 Common Transport -- 9.1.5 Mobile Backhaul Tiers -- 9.1.6 Logical and Physical Transport Topology -- 9.1.7 Standards Viewpoint -- 9.2 Capacity and Latency…”
Libro electrónico -
1020Publicado 2004“…This process of privatisation of security in Nigeria often involves recruitment of corporate and local security guards, vigilantes, night watchmen and the control of access into the neighbourhoods through gates and barriers. …”
Electrónico