Mostrando 5,701 - 5,720 Resultados de 14,052 Para Buscar '"Knowing"', tiempo de consulta: 0.13s Limitar resultados
  1. 5701
    Publicado 2024
    Tabla de Contenidos: “…Technical requirements -- Setting up DaVinci Resolve for ACES Color Workflow -- Importing rendered image sequences -- Reviewing the DaVinci Resolve interface -- Exploring color correction and color grading -- Reviewing the color page -- Color-correcting shots -- Downloading free LUTs -- Color grading with LUTs -- Generating your own LUTs -- Adding music and sound effects -- Importing music and sound effects -- Adding audio files to the timeline -- Adding end titles -- Exporting your film -- Summary -- Appendix: Creating Material IDs Using Blender -- Technical requirements -- Understanding Material IDs -- Getting to know the Blender interface -- Importing the cryo-pod 3D object -- Defining surfaces for Material ID application -- Exporting to FBX -- Index -- Other Books You May Enjoy -- _Hlk147917444…”
    Libro electrónico
  2. 5702
    por Chapple, Mike
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Acknowledgments -- About the Author -- About the Technical Editor -- Contents at a Glance -- Contents -- Introduction -- CC Certification -- Taking the CC Exam -- Computer-Based Testing Environment -- Exam Retake Policy -- Recertification Requirements -- Using the Online Practice Test -- How to Contact the Publisher -- Part I Domain 1: Security Principles -- Chapter 1 Confidentiality, Integrity, Availability, and Non-repudiation: Objective 1.1 Understand the Security Concepts of Information Assurance -- The CIA Triad -- Confidentiality -- Integrity -- Availability -- Non-repudiation -- Chapter 2 Authentication and Authorization: Objective 1.1 Understand the Security Concepts of Information Assurance -- Access Control Process -- Identification -- Authentication -- Authorization -- Accounting -- Digital Access Control -- Password Policies -- Password Length -- Password Complexity -- Password Expiration -- Password History -- Password Resets -- Password Reuse -- Password Managers -- Authentication Factors -- Something You Know -- Something You Are -- Something You Have -- Multi-factor Authentication -- Chapter 3 Privacy: Objective 1.1 Understand the Security Concepts of Information Assurance -- Privacy -- Types of Private Information -- Expectation of Privacy -- Privacy Management Framework -- Management -- Agreement, Notice, and Communication -- Collection and Creation -- Use, Retention, and Disposal -- Access -- Disclosure to Third Parties -- Security for Privacy -- Data Integrity and Quality -- Monitoring and Enforcement -- Chapter 4 Risk Management: Objective 1.2 Understand the Risk Management Process -- Risk Types -- Internal and External Risks -- Multiparty Risks -- Specific Risks -- Risk Identification and Assessment -- The Language of Risk -- Ranking Risks -- Risk Treatment Strategies…”
    Libro electrónico
  3. 5703
    por Tank, WAI Architecture Think
    Publicado 2023
    Tabla de Contenidos: “…21 Manifestos: Compelling declaration of a vision, intent, goal, or mission -- 22 Diagramming: Highlighting architecture's basic functions, layout, and programs -- 23 Sketching: Drawing the basic outline, main ideas, or concepts of a project -- 24 Modelling: Constructing the three-dimensional representation of a design -- 25 Massing: Three-dimensional volumetric explorations of a project -- 26 Collage: Image produced by the combination of other images -- 27 Narrative Architecture: Storytelling of architectural situations, conditions, and critiques -- 28 Kit-of-Parts: Design with predetermined components and elements -- 29 Tactical Urbanism: Punctual and specific urban interventions that are part of a larger plan -- 30 Psychogeographic Cartographies: Assembling urban experiences with unexpected spatial combinations -- 31 Mapping: Outlining the conditions and characteristics behind a design project -- 32 Investigative Architecture: Identifying and researching various aspects of the built environment -- 33 Urban Patchwork: Designing smaller interactive spatial components (patches) -- 34 Figure-Ground: Contrasting spatial differences of open and enclosed spaces -- 35 Cadavre Exquis: Collective design where members don't know one another's input -- 36 Mash-Up: Combining disparate elements into a new design -- 37 Parametric: Designing via the input of parameters and variables -- 38 Three-Dimensional Printing: Producing three-dimensional objects by means of machines -- 39 Robot Fabrication: Constructing, assembling, and manufacturing projects with robots -- 40 Living Architecture: Using living organisms as construction and spatial materials -- Conditions -- 41 Ecological Architecture: Buildings, spaces, and structures in balance with nature -- 42 Spiritual Architecture: Structures and spaces for spiritual practices, rituals, and customs…”
    Libro electrónico
  4. 5704
    Publicado 2023
    Tabla de Contenidos: “…Secure coding practices versus safe coding techniques -- Synergies and differences in the testing phase -- Summary -- References -- Part 3: Executing the Process to Engineer a Secure Automotive Product -- Chapter 7: A Practical Threat Modeling Approach for Automotive Systems -- The fundamentals of performing an effective TARA -- Assets -- Damage scenarios -- Threat scenarios -- Attacker model and threat types -- Attack paths -- Risk assessment methods -- Risk treatment -- Common pitfalls when preparing a TARA -- Defining the appropriate TARA scope -- The practical approach -- Know your system -- Make your assumptions known -- Use case-driven analysis -- Prepare context and data flow diagrams -- Damages versus assets - where to start -- Identifying assets with the help of asset categories -- Building threat catalogs -- Creating attack paths using a system flow diagram -- Risk prioritization -- Defining cybersecurity goals -- Choosing security controls and operational environment (OE) requirements -- Tracking shared and accepted risks -- Review and signoff -- Case study using a digital video recorder (DVR) -- Assumptions -- Context diagram -- Identifying the assets -- Damage scenarios -- Cybersecurity requirements and controls -- Summary -- References -- Chapter 8: Vehicle-Level Security Controls -- Choosing cybersecurity controls -- Challenging areas -- Vehicle-level versus ECU-level controls -- Policy controls -- Secure manufacturing -- Challenges -- Secure off-board network communication -- Wi-Fi -- Bluetooth -- Cellular -- Host-based intrusion detection -- Network intrusion detection and prevention (NIDP) -- Domain separation and filtering -- Sensor authentication -- Secure software updates -- In-vehicle network protection -- CAN message authentication -- Ethernet -- Securing diagnostic abilities -- Security access control via UDS service 0x27…”
    Libro electrónico
  5. 5705
    Publicado 2023
    Tabla de Contenidos: “…Power Analyses for Minimum-Effect Tests 3.1 Nil Hypothesis Testing 3.2 The Nil Hypothesis is Almost Always Wrong 3.2.1 Polar Bear Traps: Why Type I Error Control is a Bad Investment 3.3 The Nil may not be True, but it is Often Fairly Accurate 3.4 Minimum-Effect tests as Alternatives to Traditional Null Hypothesis Tests 3.5 Sometimes a Point Hypothesis is also a Range Hypothesis 3.6 How do you Know the Effect Size? 3.7 Testing the Hypothesis that Treatment Effects are Negligible 3.8 Using the One-Stop Tables to Assess Power for Minimum-Effect Tests 3.9 A Worked Example of Minimum-Effect Testing 3.10 Type I Errors in Minimum-Effect Tests 3.11 Summary 4. …”
    Libro electrónico
  6. 5706
    Publicado 2024
    Tabla de Contenidos: “…13.4 Four Investigation Priorities -- Gastropod Molluscs -- Nematode Worms -- Spiders -- Insect Larvae -- 13.5 Neither Sentience Candidates nor Investigation Priorities: Plants and Unicellular Organisms -- 13.6 Summary of Chapter 13 -- 14: Frontiers of Proportionality -- 14.1 Taking Invertebrates Seriously -- 14.2 Codes of Good Practice and Licensing Schemes -- 14.3 Against Octopus Farming -- 14.4 Towards Humane Slaughter -- 14.5 Summary of Chapter 14 -- Part V: Preparing for Artificial Sentience -- 15: Against Complacency -- 15.1 A Case against Complacency -- 15.2 Sources of Risk 1: Whole-Brain Emulation -- 15.3 Sources of Risk 2: Artificial Evolution -- 15.4 Sources of Risk 3: Minimal Implementations of Cognitive Theories of Consciousness -- 15.5 Summary of Chapter 15 -- 16: Large Language Models and the Gaming Problem -- 16.1 The Gaming Problem: When the System Knows the Criteria -- 16.2 Boxing the AI: Schneider and Turner's 'Artificial Consciousness Test' -- 16.3 The Need for Deep Computational Markers -- 16.4 Summary of Chapter 16 -- 17: The Run-Ahead Principle -- 17.1 Metzinger's Call for a Moratorium -- 17.2 A Moderate Alternative -- 17.3 Will We Soon Need an AI Welfare Law? …”
    Libro electrónico
  7. 5707
    Publicado 2022
    Tabla de Contenidos: “…-- What exemptions exist to worker monitoring? -- Do employees know what information employers can access? -- Should employees bring personal equipment to work? …”
    Libro electrónico
  8. 5708
    Tabla de Contenidos: “…Influence and Public Debate -- NOTES -- 5 Common Misconceptions About Risk Communication -- EXPECTATIONS REGARDING RISK COMMUNICATION -- Communication, Conflict, and Management -- Comparing Risks -- BELIEFS ABOUT THE FUNCTIONING OF THE PROCESS -- Adequacy of the Scientific Information Base -- Agreement as to the Meaning of Existing Information -- Interpretation of Public Attitudes and Information Needs -- STEREOTYPES ABOUT INTERMEDIARIES AND RECIPIENTS -- Journalists and the News Media -- The Attraction of Decisive Answers -- NOTE -- 6 Problems of Risk Communication -- PROBLEMS DERIVING FROM THE INSTITUTIONAL AND POLITICAL SYSTEM -- Legal Considerations -- Statutory Prescriptions and Proscriptions -- Liability -- Informed Consent and Right-to-Know -- Sharing of Power -- Fragmentation -- Dispersion of Responsibility -- Incentives to Gain Leverage -- Difficulty in Determining Responsibility for Outcomes -- Imbalanced Access to Information -- Systematic Interests and Biases -- PROBLEMS OF RISK COMMUNICATORS AND RECIPIENTS -- Establishing and Recognizing Credibility -- Real or Perceived Advocacy of Unjustified Positions -- Reputation for Deceit, Misrepresentation, or Coercion -- Contradiction of Previous Positions -- Self-Serving Framing of Messages -- Contradictory Messages from Other Sources -- Professional Incompetence and Impropriety -- Legal Standing -- Justification of Communication Campaigns -- Access of Affected Parties to the Decision-Making Process -- Fair Review of Conflicting Claims -- Making Messages Understandable -- Unfamiliar Language -- Unfamiliar Magnitudes -- Insensitivity to Psychological Needs of the Recipient -- Preparing Messages with Few Data and No Time -- Responding in an Emergency -- Communicating on the Basis of Incomplete Information -- Capturing and Focusing Attention -- Stimulating Recipient Interest…”
    Libro electrónico
  9. 5709
    Publicado 2010
    “…Today, credit is king. What do you need to know about good credit in the new credit era?…”
    Libro electrónico
  10. 5710
    por Blanchard, Kenneth H.
    Publicado 2008
    Libro
  11. 5711
    Publicado 2022
    Tabla de Contenidos: “…-- Chapter 17 Understanding Tier 2/Subcontracting Spend -- Tracing the History of Subcontracting -- Stepping through the Levels: Tier 1, Tier 2, and Beyond -- Tier 1 suppliers -- Tier 2 suppliers -- Tier 3 suppliers -- Tier 4 suppliers and below -- Managing Subcontractors and Tiered Procurement -- Influencing Your Prime Vendors to Use Diverse Suppliers -- Knowing the Importance of Tracking and Utilizing Tier 2 Data -- Chapter 18 Getting a Grip on Goal Setting in Supplier Diversity…”
    Libro electrónico
  12. 5712
    Publicado 2018
    Tabla de Contenidos: “…Server development options -- Debugging -- The Python debugger -- A sample debugging session -- Alternative Python debuggers -- Printing messages and logging -- Killing running processes -- Summary -- Chapter 14: Deploying and Maintaining Production Instances -- Available prebuilt packages -- Installing dependencies -- Preparing a dedicated system user -- Installing from the source code -- Setting up the configuration file -- Multiprocessing workers -- Setting up Odoo as a system service -- Creating a systemd service -- Creating an Upstart/sysvinit service -- Checking the Odoo service from the command line -- Using a reverse proxy -- Setting up Nginx as a reverse proxy -- Enforcing HTTPS -- Nginx optimizations -- Long polling -- Server and module updates -- Summary -- Other Books You May Enjoy -- Leave a review - let other readers know what you think -- Index…”
    Libro electrónico
  13. 5713
    Publicado 2022
    Tabla de Contenidos: “…Offline CA -- Stapling -- Pinning -- Trust Models -- Certificate Chaining -- Hierarchical Trust Model -- Peer-to-Peer Model -- Hybrid Trust Model -- Walking the Certificate Path -- Digital Certificates -- Certificate Classes -- Certificate Extensions -- Certificate Attributes -- Certificate Formats -- Certificate Lifecycles -- Registration and Generation -- CSR -- Renewal -- Suspension -- Certificate Revocation -- Key Destruction -- Certificate Repositories -- Sharing Key Stores -- Trust and Certificate Verification -- Centralized and Decentralized Infrastructures -- Hardware Security Modules -- Private Key Protection -- Key Recovery -- Key Escrow -- Certificate-Based Threats -- PKIX and PKCS -- PKIX Standards -- PKCS -- Why You Need to Know the PKIX and PKCS Standards -- Stolen Certificates -- ISAKMP -- CMP -- XKMS -- CEP -- Chapter 7 Review -- Chapter 8 Physical Security -- The Security Problem -- Physical Security Safeguards -- Walls and Guards -- Lights and Signage -- Physical Access Controls and Monitoring -- Electronic Access Control Systems -- Policies and Procedures…”
    Libro electrónico
  14. 5714
    Publicado 2021
    Tabla de Contenidos: “…-- Captivate Prime is an enterprise LMS -- Captivate Prime is a cloud-based LMS -- Captivate Prime is a learner-centric LMS -- Captivate Prime in the Adobe Digital Learning Solutions ecosystem -- Adobe Captivate -- Adobe Connect -- Conclusion -- Captivate Prime and Adobe Experience Cloud -- Prime and Adobe Experience Manager -- Prime and Marketo Engage -- Selling Captivate Prime content -- Conclusion -- Getting Access to Captivate Prime -- Activating Your Trial Account -- Discovering Your Prime Account URL -- Getting to know Captivate Prime -- Modifying your account settings -- Changing the default language of your Prime account -- Understanding the main roles -- Summary -- Chapter 2: Customize the Look and Feel of Captivate Prime -- Technical requirements -- Modifying the name and the subdomain of your Prime account -- Using a custom domain -- Branding your Captivate Prime account -- Uploading your logo -- Customizing the color theme -- Other visual customizations -- Customizing the learner's experience -- Understanding the Classic and the Immersive experiences -- Discovering the Classic learner experience -- Discovering the Immersive learner experience -- Other customizations -- Going headless with Captivate Prime -- Summary -- Chapter 3: Uploading Learning Content and Managing the Content Library -- Technical requirements -- Getting content into Captivate Prime -- Integrating third-party, off-the-shelf content -- Uploading your own custom content -- Conclusion -- Creating custom course modules -- Logging in as an Author -- Modules, courses, and learning programs -- A first look at the Content Library…”
    Libro electrónico
  15. 5715
    Android Smartphone Photography for Dummies
    Android Smartphone Photography For Dummies
    Publicado 2021
    Tabla de Contenidos: “…Considering Alternate Aspect Ratios -- Creating Panorama Photos -- Horizontal panorama photos -- Vertical panorama photos -- Part 2 Having Fun with the Fundamentals of Photographic Genres -- Chapter 5 Capturing the Perfect Landscape Photograph -- Camera Considerations: Levels and Exposure -- Levelling your camera -- Controlling exposure -- Lighting Considerations -- Photograph during the magic hours -- Timing the magic hours -- Gear Considerations -- Steadying your Android camera with a tripod -- Choosing a lens (for multi-lens Android cameras) -- Photography Tips for Your Next Outing -- Applying the Rule of Thirds for better compositions -- Framing an "L" shaped composition -- Positioning a primary and secondary subject -- Chapter 6 Shooting Sports Photography -- Camera Considerations: Using Burst Mode to Capture Motion -- Gear Considerations -- A tough smartphone protective case -- A smartphone screen protector -- Battery packs or battery cases -- Touch-sensitive gloves in cold weather -- Lighting Considerations -- Photographing into the setting sun -- Capturing team sports with the sun behind you -- Using the setting sun for portraits -- Incorporating cool and warm color tones -- Choosing high contrast lighting -- Photography Tips for Dynamic Sports Photos -- Using your Portrait mode -- Allowing the subject to enter the composition -- Choosing curved backgrounds -- Framing your athletes -- Creating negative space -- Chapter 7 Saving Memories through Family and Individual Portraiture -- Camera Considerations: Portrait Mode and Lenses -- Knowing when to use Portrait mode -- Understanding lens compression -- Gear Considerations: Editing Tools for Better Compositions -- Lighting Considerations -- Avoiding certain types of interior lighting -- Dealing with interior backlighting -- Creating silhouettes for artistic family portraits…”
    Libro electrónico
  16. 5716
    Publicado 1999
    Tabla de Contenidos: “…Fortschritte bei der Strukturreform -- Einleitung -- Jüngste Entwicklungen am Arbeitsmarkt -- Abbildung 11 Arbeitsmarktindikatoren -- Fortschritte bei der Strukturreform -- Größere Lohn- und Arbeitskostenflexibilität -- Kasten 4 Der Nationale Aktionsplan für Beschäftigung -- Stärkere Arbeitszeitflexibilisierung -- Abbau der Verzerrungseffekte von Arbeitslosengeld- und verwandten Sozialleistungen -- Arbeitslosenunterstützung -- Frühpensionierung -- Aktive Arbeitsmarktmaßnahmen -- Verbesserung von Qualifikationen, unternehmerischer Dynamik und Wettbewerb -- Verbesserung von Qualifikationen und technologischem Know-how -- Finanzmarktentwicklung -- Verstärkung des Wettbewerbs auf den Produktmärkten -- Deregulierung des Telekommunikationssektors -- Der Elektrizitätssektor -- Wettbewerbspolitik -- Gesamtüberblick und Spielraum für weitere Maßnahmen -- Kasten 5 Überblick über die Fortschritte bei der Umsetzung der OECD Jobs Strategy…”
    Libro electrónico
  17. 5717
    Publicado 2014
    Tabla de Contenidos: “…Working with Tables -- Introduction -- Getting to know the structure of tables -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Working with different types of tables -- Getting ready -- How to do it... -- How it works... -- See also -- Formatting tables -- Getting ready -- How to do it... -- How it works... -- Working with cross tables -- Getting ready -- How to do it... -- How it works... -- See also -- Hiding dimensions -- Getting ready -- How to do it... -- How it works... -- There's more... -- 5. …”
    Libro electrónico
  18. 5718
    Publicado 2017
    Tabla de Contenidos: “…Foundation Programs in the Arab Gulf States Using Qatar as a Case Study -- 9.1 Introduction -- 9.2 Foundation Programs -- 9.3 Historical Background and Current Realities -- 9.4 Globalization and Nationalization in the Gulf -- 9.5 Qatar as a Case Study in Understanding Foundation Programs in the Gulf -- 9.6 Implications for Policymakers -- 9.7 Conclusion -- References -- 10 Generating Strategies for Success: Understanding the Lived Experiences of Native American Adult Learners -- 10.1 Introduction -- 10.2 Review of the Literature -- 10.3 Positionality -- 10.4 Research Methods -- 10.5 Findings -- 10.5.1 Negotiating "Ways of Knowing" -- 10.6 The Challenge of Participating in Class -- 10.7 The Importance of Relationships -- 10.8 Discussion -- References -- 11 Nepal's Educated Nonelite: Reevaluating State-Provided Higher Education -- 11.1 Introduction -- 11.2 Public Higher Education Under Pressure…”
    Libro electrónico
  19. 5719
    Publicado 2017
    Tabla de Contenidos: “…. -- See also -- Chapter 12: Knowing Your Map -- Introduction -- Projecting the US map -- GeoJSON -- TopoJSON -- Getting ready -- How to do it... -- How it works... -- See also -- Projecting the world map -- Getting ready -- How to do it... -- How it works... -- See also -- Building a choropleth map -- Getting ready -- How to do it... -- How it works... -- See also…”
    Libro electrónico
  20. 5720
    Publicado 2017
    Tabla de Contenidos: “…. -- How it works... -- What to know when offloading checksum -- Getting ready -- How to do it... -- How it works... -- Selecting the correct virtual network adapter -- Getting ready -- How to do it... -- How it works... -- Improving performance through VMDirectPath I/O -- Getting ready -- How to do it... -- Improving performance through NetQueue -- Getting ready -- How to do it... -- How it works... -- Improving network performance using the SplitRx mode for multicast traffic -- Getting ready -- How to do it... -- How it works... -- Designing a multi-NIC vMotion -- Getting ready -- How to do it... -- Improving network performance using network I/O control -- Getting ready -- How to do it... -- Monitoring network capacity and performance matrix -- Getting ready -- How to do it... -- Chapter 4: DRS, SDRS, and Resource Control Design -- Introduction -- Using DRS algorithm guidelines -- Getting ready -- How to do it... -- How it works... -- Using resource pool guidelines -- Getting ready -- How to do it... -- How it works... -- Avoiding the use of a resource pool as a folder structure -- How to do it... -- How it works... -- Choosing the best SIOC latency threshold -- Getting ready -- How to do it... -- How it works... -- Using storage capability and policy-driven storage -- Getting ready -- How to do it... -- How it works... -- Anti-affinity rules in the SDRS cluster -- Getting ready -- How to do it…”
    Libro electrónico