Mostrando 1,001 - 1,020 Resultados de 1,227 Para Buscar '"Guard"', tiempo de consulta: 0.07s Limitar resultados
  1. 1001
    Publicado 2010
    “…When there isn't a high level of trust among team members, communication is guarded, the climate is tense, meetings are stiff and formal and the team goes nowhere. …”
    Libro electrónico
  2. 1002
    por Roberts, Barbara Ann, 1941-1998
    Publicado 1988
    “…Barbara Roberts explores these government officials, showing how they not only kept the doors closed but also managed to find a way to get rid of some of those who managed to break through their carefully guarded barriers. Robert's important book explores a dark history with an honest and objective style…”
    Libro electrónico
  3. 1003
    Publicado 2017
    “…Her answers are often accurate compared to other aging patients. She is a bit guarded about being interviewed, but expresses fairly normal sleep behaviors…”
    Vídeo online
  4. 1004
    Publicado 1910
    Fotografía
  5. 1005
    Publicado 2005
    “…Although there are many resources available about how to make a film, there are few about how to get your film seen once it's made and none that reveal the closely-guarded marketing secrets of the major motion picture studios. …”
    Libro electrónico
  6. 1006
    Manuscrito
  7. 1007
    Publicado 2017
    “…Supported by contributions from Oracle expert Eric Yen, Oracle Database 12c Release 2 New Features offers detailed coverage of: • Installing Oracle Database 12c and Grid Infrastructure • Architectural changes, such as Oracle Multitenant • The most current information on upgrading and migrating to Oracle Database 12c • The pre-upgrade information tool and parallel processing for database upgrades • Oracle Real Application Clusters new features, such as Oracle Flex Cluster, Oracle Flex Automatic Storage Management, and Oracle Automatic Storage Management Cluster File System • Enhanced and new online operations: tables, indexes, and PDBs • Oracle RMAN enhancements, including cross-platform backup and recovery • Oracle Data Guard improvements, such as Fast Sync, and Oracle Active Data Guard new features, such as Far Sync • SQL, PL/SQL, DML, and DDL new features • Improvements to partitioning manageability, performance, and availability • Advanced business intelligence and data warehousing capabilities • Security enhancements, including privileges analysis, data redaction, and new administrative-level privileges • Manageability, performance, and optimization improvements…”
    Libro electrónico
  8. 1008
    Publicado 1989
    Libro
  9. 1009
    por Ramirez, Juan, 1961-
    Publicado 2011
    “…Equity strategies are closely guarded secrets and as such, there is very little written about how investors and corporate can utilise equity vehicles as part of their growth strategies. …”
    Libro electrónico
  10. 1010
    Publicado 2018
    “…We will cover the most important new features in VMM 2016 across networking, storage, and compute, including brand new Guarded Fabric, Shielded VMs and Storage Spaces Direct. …”
    Libro electrónico
  11. 1011
    Publicado 2018
    “…She claims her hallucinations are gifts. Her affect is very guarded and paranoid…”
    Vídeo online
  12. 1012
    Publicado 2018
    “…She claims her hallucinations are gifts. Her affect is very guarded and paranoid…”
    Vídeo online
  13. 1013
    por Valeri Màxim
    Publicado 1488
    Libro
  14. 1014
  15. 1015
    por Nisbet, Jo
    Publicado 2013
    “…The story begins on the night that two security guards arrive at a house in Los Angeles, USA, to take the author's fourteen-year-old daughter Emily away to a 'Brat Camp' in Utah. …”
    Libro electrónico
  16. 1016
    Publicado 2019
    “…""For aspiring life guards this book is a must read on how to give oxygen to create energy and have impact (like JR). …”
    Libro electrónico
  17. 1017
    por Warrick, Cathy
    Publicado 2005
    Tabla de Contenidos: “…Open system servers - Linux for xSeries -- 8.1 Supported Linux distributions -- 8.2 Introduction to Linux OS components -- 8.2.1 Understanding and tuning virtual memory -- 8.2.2 Understanding and tuning the swap partition -- 8.2.3 Understanding and tuning the daemons -- 8.2.4 Compiling the kernel -- 8.2.5 Changing kernel parameters -- 8.2.6 Kernel parameters -- 8.2.7 Understanding and tuning the file systems -- 8.2.8 Tuning TCP window size -- 8.3 Linux monitoring tools -- 8.3.1 uptime -- 8.3.2 dmesg -- 8.3.3 top -- 8.3.4 iostat -- 8.3.5 vmstat -- 8.3.6 sar -- 8.3.7 isag -- 8.3.8 GKrellM -- 8.3.9 KDE System Guard -- 8.4 Host bus adapter (HBA) settings -- 8.5 Logical Volume Manager for Linux (LVM) -- 8.5.1 Implementation -- 8.5.2 Performance management -- 8.6 Bonnie -- 8.6.1 Benchmarks -- 8.6.2 Downloading -- 8.7 Bonnie++…”
    Libro electrónico
  18. 1018
    por Moore, Bill
    Publicado 2003
    Tabla de Contenidos: “…9.2 User management component specification -- 9.2.1 User management component: the actors -- 9.2.2 What the users can do: The use cases -- 9.2.3 View user details: UC.ViewUserDetails -- 9.2.4 Request password: UC.RequestPassword -- 9.2.5 Register customer: UC.RegisterCustomer -- 9.2.6 Modify customer details: UC.ModifyCustomerDetails -- 9.2.7 Log out: UC.Logout -- 9.2.8 Log in: UC.login -- 9.2.9 List users: UC.ListUsers -- 9.2.10 Delete customer details: UC.DeleteCustomerDetails -- 9.2.11 Dependencies -- 9.2.12 Interfaces for other components -- 9.3 Building the user management component -- 9.3.1 Preparing the workspace -- 9.3.2 Creating the Java packages -- 9.3.3 Creating the Web section -- 9.4 Strategy -- 9.5 The business layer (manager) -- 9.5.1 LDAP Implementation -- 9.6 The model layer (DAO) -- 9.7 The domain layer (DTO) -- 9.8 The presentation layer (Struts) -- 9.8.1 Log in/out -- 9.8.2 Registration -- 9.8.3 User details management -- 9.8.4 Administrative view/modify/delete user details -- 9.8.5 Password e-mail request -- 9.8.6 Security and guarding pages -- 9.9 Testing the component -- 9.10 Room for improvement -- 9.11 Summary -- Chapter 10. …”
    Libro electrónico
  19. 1019
    Publicado 2024
    Tabla de Contenidos: “…7.7.4.5 Reselection Evaluation Altered by UE Mobility -- 7.7.5 RRC Connection Control and Mobility -- 7.7.5.1 RRC Connection Control -- 7.7.5.2 RRC Connection Setup from IDLE and INACTIVE -- 7.7.5.3 Mobility and Measurements in Connected Mode -- 7.7.6 RRC Support of Upper Layers -- 7.7.6.1 NAS Message Transfer -- 7.7.6.2 Network Slicing -- 7.7.6.3 UE Capability Transfer -- 7.7.7 Different Versions of Release 15 RRC Specifications -- 7.8 Radio Protocols in RAN Architecture -- 7.9 Summary -- References -- Chapter 8 Deployment Aspects -- 8.1 Introduction -- 8.2 Spectrum Resources -- 8.2.1 Spectrum Refarming and Dynamic Spectrum Sharing -- 8.3 Network Density -- 8.4 Mobile Data Traffic Growth -- 8.4.1 Mobile Data Volume -- 8.4.2 Traffic Asymmetry -- 8.5 Base Station Site Solutions -- 8.6 Electromagnetic Field (EMF) Considerations -- 8.7 Network Synchronization and Coordination Requirements -- 8.7.1 Main Interference Scenarios in TDD System -- 8.7.2 TDD Frame Configuration Options -- 8.7.3 Cell Size and Random Access Channel -- 8.7.4 Guard Period and Safety Zone -- 8.7.5 Intra‐Frequency Operation -- 8.7.6 Inter‐Operator Synchronization -- 8.7.7 Synchronization Requirements in 3GPP -- 8.7.7.1 Cell Phase Synchronization Accuracy -- 8.7.7.2 Maximum Receive Timing Difference (MRTD) for LTE-5G Dual Connectivity -- 8.7.8 Synchronization from Global Navigation Satellite System (GNSS) -- 8.7.9 Synchronization with ToP -- 8.7.10 Timing Alignment Between Vendors -- 8.8 5G Overlay with Another Vendor LTE -- 8.9 Summary -- References -- Chapter 9 Transport -- 9.1 5G Transport Network -- 9.1.1 5G Transport -- 9.1.2 Types of 5G Transport -- 9.1.3 Own Versus Leased Transport -- 9.1.4 Common Transport -- 9.1.5 Mobile Backhaul Tiers -- 9.1.6 Logical and Physical Transport Topology -- 9.1.7 Standards Viewpoint -- 9.2 Capacity and Latency…”
    Libro electrónico
  20. 1020
    Publicado 2004
    “…This process of privatisation of security in Nigeria often involves recruitment of corporate and local security guards, vigilantes, night watchmen and the control of access into the neighbourhoods through gates and barriers. …”
    Electrónico