Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
1041
-
1042
-
1043
-
1044por Williams, Lisa, 1966-“…Lisa William's poems are infused with what John Hollander calls "a guarded wonder." A poet of unique vision, she seems always to be "looking at," with special attention to the experience of the senses. …”
Publicado 1998
Libro electrónico -
1045Publicado 2019“…But if you develop the key skills of influence, it's like knowing the exact combination to that lock and gaining access to the consciousness of another person-or to your own.This book provides the right combination to that highly guarded lock. It will show you the skills of influence. …”
Grabación musical -
1046por Pye, Lucian W., 1921-2008“…The dynamics of the Cultural Revolution, the behaviour of the Red Guards, and the compulsions of Mao Tse-tung are among the important symptoms examined. …”
Publicado 1992
Libro -
1047por Allen, John L., 1965-“…Granted unlimited access to those within its ranks, and with an investigative eye intent on uncovering closely guarded secrets, John Allen finally separates the myths from the facts: the actual use of the cilice; the reason men and women remain separate; the true extent of Opus Dei's funds. …”
Publicado 2005
Libro -
1048Publicado 2020Tabla de Contenidos: “…5.3 Idle and connected mode procedures -- 5.3.1 Idle mode procedures -- 5.3.1.1 Cell selection -- 5.3.1.1.1 Time and frequency synchronization -- 5.3.1.1.2 Cell identification and initial frame synchronization -- 5.3.1.1.3 MIB acquisition -- 5.3.1.1.4 CID and H-SFN acquisition -- 5.3.1.2 System Information acquisition -- 5.3.1.2.1 System Information Block 1 -- 5.3.1.2.2 System Information Blocks 2-20 -- 5.3.1.2.3 System Information update -- 5.3.1.3 Cell reselection -- 5.3.1.4 Paging, DRX and eDRX -- 5.3.1.5 Power Saving Mode -- 5.3.1.6 Random access in idle mode -- 5.3.1.7 Connection establishment -- 5.3.1.7.1 RRC resume -- 5.3.1.7.2 Data over Non-access Stratum -- 5.3.1.7.3 Early Data Transmission -- 5.3.1.8 Access control -- 5.3.1.9 Multicast -- 5.3.2 Connected mode procedures -- 5.3.2.1 Scheduling -- 5.3.2.1.1 Dynamic downlink scheduling -- 5.3.2.1.2 Dynamic uplink scheduling -- 5.3.2.1.3 Semipersistent scheduling -- 5.3.2.2 Channel quality reporting -- 5.3.2.3 Random access in connected mode -- 5.3.2.4 Power control -- 5.3.2.5 Mobility support -- 5.3.2.6 Positioning -- 5.3.3 Procedures common for idle and connected mode -- 5.3.3.1 MPDCCH search spaces -- 5.3.3.2 Frequency hopping -- 5.4 NR and LTE-M coexistence -- References -- 6 - LTE-M performance -- 6.1 Performance objectives -- 6.2 Coverage -- 6.3 Data rate -- 6.3.1 Downlink data rate -- 6.3.2 Uplink data rate -- 6.4 Latency -- 6.5 Battery life -- 6.6 Capacity -- 6.7 Device complexity -- References -- 7 - NB-IoT -- 7.1 Background -- 7.1.1 3GPP standardization -- 7.1.2 Radio access design principles -- 7.1.2.1 Low device complexity and cost -- 7.1.2.2 Coverage enhancement -- 7.1.2.3 Long device battery lifetime -- 7.1.2.4 Support of massive number of devices -- 7.1.2.5 Deployment flexibility -- 7.1.2.5.1 Stand-alone mode of operation -- 7.1.2.5.2 In-band and guard-band modes of operation…”
Libro electrónico -
1049
-
1050
-
1051Publicado 2017“…Historically, the primary goal of supply chain security was guarding against theft and damage. Today, supply chains are also on the frontlines in the fight against terrorism. …”
Libro electrónico -
1052por Black, Benjamin, 1945-“…And as Quirke reluctantly presses on toward the true facts behind her death, he comes up against some insidious—and very well-guarded—secrets of Dublin’s high Catholic society, among them members of his own family…”
Publicado 2006
Acceso a las primeras páginas
Libro -
1053por Fry, Helen, 1967-“…And so it was that the Allies got access to some of Hitler's most closely guarded secrets -- and from those most entrusted to protect them…”
Publicado 2019
Libro -
1054por Andrews, Abigail Leslie, author“…In this book, a team of thirty-one Latinx students and an award-winning scholar of gender and migrant exclusion uncover a harrowing system that weaves together policing, prison, detention, removal, and border militarization-and overwhelmingly targets men. Guards and gangs beat them down, both literally and metaphorically, as if they are no more than vermin or livestock. …”
Publicado 2023
Libro electrónico -
1055Publicado 2024“…You’ll use Identity API endpoints in ASP.NET Core and functional route guards in Angular to add authentication and authorization to your apps. …”
Libro electrónico -
1056por Howard-Hassmann, Rhoda E., 1948-“…Should Western-based corporations be held liable if their security guards injure union activists in another part of the world, or should such decisions be settled under local or domestic law? …”
Publicado 2019
Libro -
1057
-
1058
-
1059
-
1060