Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 669
- Development 666
- Management 647
- Application software 594
- Computer Science 452
- Computer networks 403
- Leadership 365
- Computer programs 360
- Photography 332
- Design 325
- Examinations 312
- Business & Economics 308
- Security measures 288
- Data processing 282
- Digital techniques 280
- Operating systems (Computers) 276
- Computer security 274
- Computer programming 268
- Web site development 265
- Web sites 265
- Programming 262
- Certification 258
- Computer software 242
- Database management 227
- Python (Computer program language) 213
- Electronic data processing personnel 208
- Java (Computer program language) 204
- Cloud computing 196
- Success in business 194
- Computer graphics 182
-
5701Publicado 2024Tabla de Contenidos: “…Technical requirements -- Setting up DaVinci Resolve for ACES Color Workflow -- Importing rendered image sequences -- Reviewing the DaVinci Resolve interface -- Exploring color correction and color grading -- Reviewing the color page -- Color-correcting shots -- Downloading free LUTs -- Color grading with LUTs -- Generating your own LUTs -- Adding music and sound effects -- Importing music and sound effects -- Adding audio files to the timeline -- Adding end titles -- Exporting your film -- Summary -- Appendix: Creating Material IDs Using Blender -- Technical requirements -- Understanding Material IDs -- Getting to know the Blender interface -- Importing the cryo-pod 3D object -- Defining surfaces for Material ID application -- Exporting to FBX -- Index -- Other Books You May Enjoy -- _Hlk147917444…”
Libro electrónico -
5702por Chapple, MikeTabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Acknowledgments -- About the Author -- About the Technical Editor -- Contents at a Glance -- Contents -- Introduction -- CC Certification -- Taking the CC Exam -- Computer-Based Testing Environment -- Exam Retake Policy -- Recertification Requirements -- Using the Online Practice Test -- How to Contact the Publisher -- Part I Domain 1: Security Principles -- Chapter 1 Confidentiality, Integrity, Availability, and Non-repudiation: Objective 1.1 Understand the Security Concepts of Information Assurance -- The CIA Triad -- Confidentiality -- Integrity -- Availability -- Non-repudiation -- Chapter 2 Authentication and Authorization: Objective 1.1 Understand the Security Concepts of Information Assurance -- Access Control Process -- Identification -- Authentication -- Authorization -- Accounting -- Digital Access Control -- Password Policies -- Password Length -- Password Complexity -- Password Expiration -- Password History -- Password Resets -- Password Reuse -- Password Managers -- Authentication Factors -- Something You Know -- Something You Are -- Something You Have -- Multi-factor Authentication -- Chapter 3 Privacy: Objective 1.1 Understand the Security Concepts of Information Assurance -- Privacy -- Types of Private Information -- Expectation of Privacy -- Privacy Management Framework -- Management -- Agreement, Notice, and Communication -- Collection and Creation -- Use, Retention, and Disposal -- Access -- Disclosure to Third Parties -- Security for Privacy -- Data Integrity and Quality -- Monitoring and Enforcement -- Chapter 4 Risk Management: Objective 1.2 Understand the Risk Management Process -- Risk Types -- Internal and External Risks -- Multiparty Risks -- Specific Risks -- Risk Identification and Assessment -- The Language of Risk -- Ranking Risks -- Risk Treatment Strategies…”
Publicado 2024
Libro electrónico -
5703por Tank, WAI Architecture ThinkTabla de Contenidos: “…21 Manifestos: Compelling declaration of a vision, intent, goal, or mission -- 22 Diagramming: Highlighting architecture's basic functions, layout, and programs -- 23 Sketching: Drawing the basic outline, main ideas, or concepts of a project -- 24 Modelling: Constructing the three-dimensional representation of a design -- 25 Massing: Three-dimensional volumetric explorations of a project -- 26 Collage: Image produced by the combination of other images -- 27 Narrative Architecture: Storytelling of architectural situations, conditions, and critiques -- 28 Kit-of-Parts: Design with predetermined components and elements -- 29 Tactical Urbanism: Punctual and specific urban interventions that are part of a larger plan -- 30 Psychogeographic Cartographies: Assembling urban experiences with unexpected spatial combinations -- 31 Mapping: Outlining the conditions and characteristics behind a design project -- 32 Investigative Architecture: Identifying and researching various aspects of the built environment -- 33 Urban Patchwork: Designing smaller interactive spatial components (patches) -- 34 Figure-Ground: Contrasting spatial differences of open and enclosed spaces -- 35 Cadavre Exquis: Collective design where members don't know one another's input -- 36 Mash-Up: Combining disparate elements into a new design -- 37 Parametric: Designing via the input of parameters and variables -- 38 Three-Dimensional Printing: Producing three-dimensional objects by means of machines -- 39 Robot Fabrication: Constructing, assembling, and manufacturing projects with robots -- 40 Living Architecture: Using living organisms as construction and spatial materials -- Conditions -- 41 Ecological Architecture: Buildings, spaces, and structures in balance with nature -- 42 Spiritual Architecture: Structures and spaces for spiritual practices, rituals, and customs…”
Publicado 2023
Libro electrónico -
5704Publicado 2023Tabla de Contenidos: “…Secure coding practices versus safe coding techniques -- Synergies and differences in the testing phase -- Summary -- References -- Part 3: Executing the Process to Engineer a Secure Automotive Product -- Chapter 7: A Practical Threat Modeling Approach for Automotive Systems -- The fundamentals of performing an effective TARA -- Assets -- Damage scenarios -- Threat scenarios -- Attacker model and threat types -- Attack paths -- Risk assessment methods -- Risk treatment -- Common pitfalls when preparing a TARA -- Defining the appropriate TARA scope -- The practical approach -- Know your system -- Make your assumptions known -- Use case-driven analysis -- Prepare context and data flow diagrams -- Damages versus assets - where to start -- Identifying assets with the help of asset categories -- Building threat catalogs -- Creating attack paths using a system flow diagram -- Risk prioritization -- Defining cybersecurity goals -- Choosing security controls and operational environment (OE) requirements -- Tracking shared and accepted risks -- Review and signoff -- Case study using a digital video recorder (DVR) -- Assumptions -- Context diagram -- Identifying the assets -- Damage scenarios -- Cybersecurity requirements and controls -- Summary -- References -- Chapter 8: Vehicle-Level Security Controls -- Choosing cybersecurity controls -- Challenging areas -- Vehicle-level versus ECU-level controls -- Policy controls -- Secure manufacturing -- Challenges -- Secure off-board network communication -- Wi-Fi -- Bluetooth -- Cellular -- Host-based intrusion detection -- Network intrusion detection and prevention (NIDP) -- Domain separation and filtering -- Sensor authentication -- Secure software updates -- In-vehicle network protection -- CAN message authentication -- Ethernet -- Securing diagnostic abilities -- Security access control via UDS service 0x27…”
Libro electrónico -
5705Publicado 2023Tabla de Contenidos: “…Power Analyses for Minimum-Effect Tests 3.1 Nil Hypothesis Testing 3.2 The Nil Hypothesis is Almost Always Wrong 3.2.1 Polar Bear Traps: Why Type I Error Control is a Bad Investment 3.3 The Nil may not be True, but it is Often Fairly Accurate 3.4 Minimum-Effect tests as Alternatives to Traditional Null Hypothesis Tests 3.5 Sometimes a Point Hypothesis is also a Range Hypothesis 3.6 How do you Know the Effect Size? 3.7 Testing the Hypothesis that Treatment Effects are Negligible 3.8 Using the One-Stop Tables to Assess Power for Minimum-Effect Tests 3.9 A Worked Example of Minimum-Effect Testing 3.10 Type I Errors in Minimum-Effect Tests 3.11 Summary 4. …”
Libro electrónico -
5706Publicado 2024Tabla de Contenidos: “…13.4 Four Investigation Priorities -- Gastropod Molluscs -- Nematode Worms -- Spiders -- Insect Larvae -- 13.5 Neither Sentience Candidates nor Investigation Priorities: Plants and Unicellular Organisms -- 13.6 Summary of Chapter 13 -- 14: Frontiers of Proportionality -- 14.1 Taking Invertebrates Seriously -- 14.2 Codes of Good Practice and Licensing Schemes -- 14.3 Against Octopus Farming -- 14.4 Towards Humane Slaughter -- 14.5 Summary of Chapter 14 -- Part V: Preparing for Artificial Sentience -- 15: Against Complacency -- 15.1 A Case against Complacency -- 15.2 Sources of Risk 1: Whole-Brain Emulation -- 15.3 Sources of Risk 2: Artificial Evolution -- 15.4 Sources of Risk 3: Minimal Implementations of Cognitive Theories of Consciousness -- 15.5 Summary of Chapter 15 -- 16: Large Language Models and the Gaming Problem -- 16.1 The Gaming Problem: When the System Knows the Criteria -- 16.2 Boxing the AI: Schneider and Turner's 'Artificial Consciousness Test' -- 16.3 The Need for Deep Computational Markers -- 16.4 Summary of Chapter 16 -- 17: The Run-Ahead Principle -- 17.1 Metzinger's Call for a Moratorium -- 17.2 A Moderate Alternative -- 17.3 Will We Soon Need an AI Welfare Law? …”
Libro electrónico -
5707Publicado 2022Tabla de Contenidos: “…-- What exemptions exist to worker monitoring? -- Do employees know what information employers can access? -- Should employees bring personal equipment to work? …”
Libro electrónico -
5708por National Research Council (U.S.).Tabla de Contenidos: “…Influence and Public Debate -- NOTES -- 5 Common Misconceptions About Risk Communication -- EXPECTATIONS REGARDING RISK COMMUNICATION -- Communication, Conflict, and Management -- Comparing Risks -- BELIEFS ABOUT THE FUNCTIONING OF THE PROCESS -- Adequacy of the Scientific Information Base -- Agreement as to the Meaning of Existing Information -- Interpretation of Public Attitudes and Information Needs -- STEREOTYPES ABOUT INTERMEDIARIES AND RECIPIENTS -- Journalists and the News Media -- The Attraction of Decisive Answers -- NOTE -- 6 Problems of Risk Communication -- PROBLEMS DERIVING FROM THE INSTITUTIONAL AND POLITICAL SYSTEM -- Legal Considerations -- Statutory Prescriptions and Proscriptions -- Liability -- Informed Consent and Right-to-Know -- Sharing of Power -- Fragmentation -- Dispersion of Responsibility -- Incentives to Gain Leverage -- Difficulty in Determining Responsibility for Outcomes -- Imbalanced Access to Information -- Systematic Interests and Biases -- PROBLEMS OF RISK COMMUNICATORS AND RECIPIENTS -- Establishing and Recognizing Credibility -- Real or Perceived Advocacy of Unjustified Positions -- Reputation for Deceit, Misrepresentation, or Coercion -- Contradiction of Previous Positions -- Self-Serving Framing of Messages -- Contradictory Messages from Other Sources -- Professional Incompetence and Impropriety -- Legal Standing -- Justification of Communication Campaigns -- Access of Affected Parties to the Decision-Making Process -- Fair Review of Conflicting Claims -- Making Messages Understandable -- Unfamiliar Language -- Unfamiliar Magnitudes -- Insensitivity to Psychological Needs of the Recipient -- Preparing Messages with Few Data and No Time -- Responding in an Emergency -- Communicating on the Basis of Incomplete Information -- Capturing and Focusing Attention -- Stimulating Recipient Interest…”
Publicado 1989
Libro electrónico -
5709Publicado 2010“…Today, credit is king. What do you need to know about good credit in the new credit era?…”
Libro electrónico -
5710
-
5711Publicado 2022Tabla de Contenidos: “…-- Chapter 17 Understanding Tier 2/Subcontracting Spend -- Tracing the History of Subcontracting -- Stepping through the Levels: Tier 1, Tier 2, and Beyond -- Tier 1 suppliers -- Tier 2 suppliers -- Tier 3 suppliers -- Tier 4 suppliers and below -- Managing Subcontractors and Tiered Procurement -- Influencing Your Prime Vendors to Use Diverse Suppliers -- Knowing the Importance of Tracking and Utilizing Tier 2 Data -- Chapter 18 Getting a Grip on Goal Setting in Supplier Diversity…”
Libro electrónico -
5712Publicado 2018Tabla de Contenidos: “…Server development options -- Debugging -- The Python debugger -- A sample debugging session -- Alternative Python debuggers -- Printing messages and logging -- Killing running processes -- Summary -- Chapter 14: Deploying and Maintaining Production Instances -- Available prebuilt packages -- Installing dependencies -- Preparing a dedicated system user -- Installing from the source code -- Setting up the configuration file -- Multiprocessing workers -- Setting up Odoo as a system service -- Creating a systemd service -- Creating an Upstart/sysvinit service -- Checking the Odoo service from the command line -- Using a reverse proxy -- Setting up Nginx as a reverse proxy -- Enforcing HTTPS -- Nginx optimizations -- Long polling -- Server and module updates -- Summary -- Other Books You May Enjoy -- Leave a review - let other readers know what you think -- Index…”
Libro electrónico -
5713Publicado 2022Tabla de Contenidos: “…Offline CA -- Stapling -- Pinning -- Trust Models -- Certificate Chaining -- Hierarchical Trust Model -- Peer-to-Peer Model -- Hybrid Trust Model -- Walking the Certificate Path -- Digital Certificates -- Certificate Classes -- Certificate Extensions -- Certificate Attributes -- Certificate Formats -- Certificate Lifecycles -- Registration and Generation -- CSR -- Renewal -- Suspension -- Certificate Revocation -- Key Destruction -- Certificate Repositories -- Sharing Key Stores -- Trust and Certificate Verification -- Centralized and Decentralized Infrastructures -- Hardware Security Modules -- Private Key Protection -- Key Recovery -- Key Escrow -- Certificate-Based Threats -- PKIX and PKCS -- PKIX Standards -- PKCS -- Why You Need to Know the PKIX and PKCS Standards -- Stolen Certificates -- ISAKMP -- CMP -- XKMS -- CEP -- Chapter 7 Review -- Chapter 8 Physical Security -- The Security Problem -- Physical Security Safeguards -- Walls and Guards -- Lights and Signage -- Physical Access Controls and Monitoring -- Electronic Access Control Systems -- Policies and Procedures…”
Libro electrónico -
5714Publicado 2021Tabla de Contenidos: “…-- Captivate Prime is an enterprise LMS -- Captivate Prime is a cloud-based LMS -- Captivate Prime is a learner-centric LMS -- Captivate Prime in the Adobe Digital Learning Solutions ecosystem -- Adobe Captivate -- Adobe Connect -- Conclusion -- Captivate Prime and Adobe Experience Cloud -- Prime and Adobe Experience Manager -- Prime and Marketo Engage -- Selling Captivate Prime content -- Conclusion -- Getting Access to Captivate Prime -- Activating Your Trial Account -- Discovering Your Prime Account URL -- Getting to know Captivate Prime -- Modifying your account settings -- Changing the default language of your Prime account -- Understanding the main roles -- Summary -- Chapter 2: Customize the Look and Feel of Captivate Prime -- Technical requirements -- Modifying the name and the subdomain of your Prime account -- Using a custom domain -- Branding your Captivate Prime account -- Uploading your logo -- Customizing the color theme -- Other visual customizations -- Customizing the learner's experience -- Understanding the Classic and the Immersive experiences -- Discovering the Classic learner experience -- Discovering the Immersive learner experience -- Other customizations -- Going headless with Captivate Prime -- Summary -- Chapter 3: Uploading Learning Content and Managing the Content Library -- Technical requirements -- Getting content into Captivate Prime -- Integrating third-party, off-the-shelf content -- Uploading your own custom content -- Conclusion -- Creating custom course modules -- Logging in as an Author -- Modules, courses, and learning programs -- A first look at the Content Library…”
Libro electrónico -
5715Android Smartphone Photography for DummiesAndroid Smartphone Photography For DummiesPublicado 2021Tabla de Contenidos: “…Considering Alternate Aspect Ratios -- Creating Panorama Photos -- Horizontal panorama photos -- Vertical panorama photos -- Part 2 Having Fun with the Fundamentals of Photographic Genres -- Chapter 5 Capturing the Perfect Landscape Photograph -- Camera Considerations: Levels and Exposure -- Levelling your camera -- Controlling exposure -- Lighting Considerations -- Photograph during the magic hours -- Timing the magic hours -- Gear Considerations -- Steadying your Android camera with a tripod -- Choosing a lens (for multi-lens Android cameras) -- Photography Tips for Your Next Outing -- Applying the Rule of Thirds for better compositions -- Framing an "L" shaped composition -- Positioning a primary and secondary subject -- Chapter 6 Shooting Sports Photography -- Camera Considerations: Using Burst Mode to Capture Motion -- Gear Considerations -- A tough smartphone protective case -- A smartphone screen protector -- Battery packs or battery cases -- Touch-sensitive gloves in cold weather -- Lighting Considerations -- Photographing into the setting sun -- Capturing team sports with the sun behind you -- Using the setting sun for portraits -- Incorporating cool and warm color tones -- Choosing high contrast lighting -- Photography Tips for Dynamic Sports Photos -- Using your Portrait mode -- Allowing the subject to enter the composition -- Choosing curved backgrounds -- Framing your athletes -- Creating negative space -- Chapter 7 Saving Memories through Family and Individual Portraiture -- Camera Considerations: Portrait Mode and Lenses -- Knowing when to use Portrait mode -- Understanding lens compression -- Gear Considerations: Editing Tools for Better Compositions -- Lighting Considerations -- Avoiding certain types of interior lighting -- Dealing with interior backlighting -- Creating silhouettes for artistic family portraits…”
Libro electrónico -
5716Publicado 1999Tabla de Contenidos: “…Fortschritte bei der Strukturreform -- Einleitung -- Jüngste Entwicklungen am Arbeitsmarkt -- Abbildung 11 Arbeitsmarktindikatoren -- Fortschritte bei der Strukturreform -- Größere Lohn- und Arbeitskostenflexibilität -- Kasten 4 Der Nationale Aktionsplan für Beschäftigung -- Stärkere Arbeitszeitflexibilisierung -- Abbau der Verzerrungseffekte von Arbeitslosengeld- und verwandten Sozialleistungen -- Arbeitslosenunterstützung -- Frühpensionierung -- Aktive Arbeitsmarktmaßnahmen -- Verbesserung von Qualifikationen, unternehmerischer Dynamik und Wettbewerb -- Verbesserung von Qualifikationen und technologischem Know-how -- Finanzmarktentwicklung -- Verstärkung des Wettbewerbs auf den Produktmärkten -- Deregulierung des Telekommunikationssektors -- Der Elektrizitätssektor -- Wettbewerbspolitik -- Gesamtüberblick und Spielraum für weitere Maßnahmen -- Kasten 5 Überblick über die Fortschritte bei der Umsetzung der OECD Jobs Strategy…”
Libro electrónico -
5717Publicado 2014Tabla de Contenidos: “…Working with Tables -- Introduction -- Getting to know the structure of tables -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Working with different types of tables -- Getting ready -- How to do it... -- How it works... -- See also -- Formatting tables -- Getting ready -- How to do it... -- How it works... -- Working with cross tables -- Getting ready -- How to do it... -- How it works... -- See also -- Hiding dimensions -- Getting ready -- How to do it... -- How it works... -- There's more... -- 5. …”
Libro electrónico -
5718Publicado 2017Tabla de Contenidos: “…Foundation Programs in the Arab Gulf States Using Qatar as a Case Study -- 9.1 Introduction -- 9.2 Foundation Programs -- 9.3 Historical Background and Current Realities -- 9.4 Globalization and Nationalization in the Gulf -- 9.5 Qatar as a Case Study in Understanding Foundation Programs in the Gulf -- 9.6 Implications for Policymakers -- 9.7 Conclusion -- References -- 10 Generating Strategies for Success: Understanding the Lived Experiences of Native American Adult Learners -- 10.1 Introduction -- 10.2 Review of the Literature -- 10.3 Positionality -- 10.4 Research Methods -- 10.5 Findings -- 10.5.1 Negotiating "Ways of Knowing" -- 10.6 The Challenge of Participating in Class -- 10.7 The Importance of Relationships -- 10.8 Discussion -- References -- 11 Nepal's Educated Nonelite: Reevaluating State-Provided Higher Education -- 11.1 Introduction -- 11.2 Public Higher Education Under Pressure…”
Libro electrónico -
5719Publicado 2017Tabla de Contenidos: “…. -- See also -- Chapter 12: Knowing Your Map -- Introduction -- Projecting the US map -- GeoJSON -- TopoJSON -- Getting ready -- How to do it... -- How it works... -- See also -- Projecting the world map -- Getting ready -- How to do it... -- How it works... -- See also -- Building a choropleth map -- Getting ready -- How to do it... -- How it works... -- See also…”
Libro electrónico -
5720Publicado 2017Tabla de Contenidos: “…. -- How it works... -- What to know when offloading checksum -- Getting ready -- How to do it... -- How it works... -- Selecting the correct virtual network adapter -- Getting ready -- How to do it... -- How it works... -- Improving performance through VMDirectPath I/O -- Getting ready -- How to do it... -- Improving performance through NetQueue -- Getting ready -- How to do it... -- How it works... -- Improving network performance using the SplitRx mode for multicast traffic -- Getting ready -- How to do it... -- How it works... -- Designing a multi-NIC vMotion -- Getting ready -- How to do it... -- Improving network performance using network I/O control -- Getting ready -- How to do it... -- Monitoring network capacity and performance matrix -- Getting ready -- How to do it... -- Chapter 4: DRS, SDRS, and Resource Control Design -- Introduction -- Using DRS algorithm guidelines -- Getting ready -- How to do it... -- How it works... -- Using resource pool guidelines -- Getting ready -- How to do it... -- How it works... -- Avoiding the use of a resource pool as a folder structure -- How to do it... -- How it works... -- Choosing the best SIOC latency threshold -- Getting ready -- How to do it... -- How it works... -- Using storage capability and policy-driven storage -- Getting ready -- How to do it... -- How it works... -- Anti-affinity rules in the SDRS cluster -- Getting ready -- How to do it…”
Libro electrónico