Mostrando 6,981 - 7,000 Resultados de 12,444 Para Buscar '"LinkedIn"', tiempo de consulta: 0.14s Limitar resultados
  1. 6981
    por Hatty, Suzanne
    Publicado 2000
    “…This text explores the relationship between masculinity and violence within the context of cultural change and escalating violence. This unique analysis links the growing sociological psychological literature on masculinity…”
    Libro electrónico
  2. 6982
    “…Active policies are needed so that countries, regions and cities can realise the potential benefits from linking tourism and creativity. Key policy issues are identified…”
    Libro electrónico
  3. 6983
    por Guerra Soto, Mario
    Publicado 2016
    Tabla de Contenidos: “…8.3.5 VLAN TRUNKING PROTOCOL (VTP) -- 8.4. LINK AGGREGATION -- 8.5. POWER OVER ETHERNET (PoE) -- 8.6. …”
    Libro electrónico
  4. 6984
    Publicado 2018
    Tabla de Contenidos: “…2.4.7.1 Three‐Phase Current Source Inverter -- 2.5 Multilevel Inverters -- 2.5.1 Diode‐Clamped Multilevel Inverter -- 2.5.2 Flying‐Capacitor Multilevel Inverter -- 2.5.3 Cascaded Multicell with Different dc Source Inverter -- 2.6 Resonant Converters -- 2.6.1 Series Resonant Converter -- 2.6.1.1 Discontinuous Conduction Mode -- 2.6.2 Parallel Resonant Inverter -- 2.6.3 ZCS Resonant Converters -- 2.6.4 ZVS Resonant Converter -- 2.6.5 Resonant dc‐Link Inverters -- 2.7 Matrix Converters -- 2.8 Summary -- References -- Chapter 3 Renewable Energy Generator Technology -- 3.1 Energy Conversion -- 3.2 Power Conversion and Control of Wind Energy Systems -- 3.2.1 Induction Generator -- 3.2.2 Permanent Magnet Synchronous Generator -- 3.2.3 Linear PM Synchronous Machine -- 3.3 Operation and Control of Induction Generators for WES -- 3.3.1 Equivalent Circuit -- 3.3.2 Wound‐Rotor Induction Machine -- 3.3.3 Doubly Fed Induction Generator (DFIG) -- 3.3.3.1 Equivalent Circuit of DGIG -- 3.3.3.2 Braking System -- 3.4 Permanent Magnet Synchronous Generator -- 3.4.1 Modelling of PMSG -- 3.5 Wave Energy Conversion (WEC) Technologies -- 3.5.1 Linear Permanent Magnet Synchronous Machine -- 3.5.2 Tubular Permanent Magnet Linear Wave Generator (TPMLWG) -- 3.5.3 Linear Induction Machines -- 3.6 Summary -- References -- Chapter 4 Grid‐Scale Energy Storage -- 4.1 Requirement of Energy Storage -- 4.2 Types of Energy Storage Technologies -- 4.3 Electromechanical Storage -- 4.3.1 Pumped Hydro Storage (PHS) System -- 4.3.2 Underground Pumped Hydro Energy Storage -- 4.3.3 Compressed Air Energy Storage -- 4.3.4 Flywheel Storage -- 4.3.4.1 Energy Stored in Flywheel -- 4.3.4.2 Motors for Flywheels -- 4.4 Superconducting Magnetic Energy Storage -- 4.5 Supercapacitors -- 4.5.1 Equivalent Circuit -- 4.6 Chemical Storage (Batteries) -- 4.6.1 Lead-acid Battery -- 4.6.2 UltraBattery…”
    Libro electrónico
  5. 6985
    Publicado 2014
    Tabla de Contenidos: “…7.3.5 Sicherungen mit dem Oracle Enterprise Manager -- 7.3.6 Einen Media Manager verwenden -- 7.4 Die Fast Recovery Area -- 7.4.1 Dateien in die Fast Recovery Area legen -- 7.4.2 Die Fast Recovery Area verwalten -- 7.5 Restore und Recovery mit RMAN -- 7.5.1 Verlust eines Datafiles -- 7.5.2 Disaster Recovery -- 7.5.3 Verlust von Online Redo Log-Dateien -- 7.5.4 Block Media Recovery -- 7.5.5 Der Data Recovery Advisor -- 7.5.6 Switch zur Datafile-Kopie -- 7.5.7 Eine Tabelle mit RMAN zurückspeichern -- 7.6 Wiederherstellung mit Flashback-Operationen -- 7.6.1 Flashback Table -- 7.6.2 Flashback Drop -- 7.6.3 Flashback Transaction History -- 7.6.4 Flashback Database -- 7.7 Tablespace Point-in-Time Recovery -- Kapitel 8: Schnittstellen -- 8.1 Data Pump -- 8.1.1 Die Data Pump-Architektur -- 8.1.2 Data Pump-Export -- 8.1.3 Data Pump-Import -- 8.1.4 Data Pump über Datenbank-Link -- 8.1.5 Full Transportable Export/Import -- 8.1.6 Data Pump Performance und Monitoring -- 8.1.7 Data Pump für Migrationen einsetzen -- 8.1.8 Ein Dumpfile nach Excel konvertieren -- 8.1.9 Data Pump mit dem Oracle Enterprise Manager -- 8.2 SQL*Loader -- 8.2.1 Daten laden -- 8.2.2 Externe Tabellen laden -- 8.2.3 Daten entladen -- Kapitel 9: Job-Verwaltung -- 9.1 Die Architektur des Scheduler -- 9.2 Scheduler-Jobs verwalten -- 9.3 Privilegien -- 9.4 Job-Ketten -- 9.5 Automatisierte Wartungs-Tasks -- Kapitel 10: Oracle Net Services -- 10.1 Die Oracle Net-Architektur -- 10.2 Die Server-Konfiguration -- 10.3 Die Shared Server-Konfiguration -- 10.4 Oracle Net Performance -- Kapitel 11: Sicherheit und Überwachung -- 11.1 Grundlegende Features und Maßnahmen -- 11.1.1 Benutzer, Rollen und Profile -- 11.1.2 Einfache Maßnahmen zur Erhöhung der Sicherheit -- 11.2 Auditing -- 11.2.1 Out-of-the box Auditing -- 11.2.2 Object Auditing -- 11.2.3 Statement Auditing -- 11.2.4 Privilege Auditing…”
    Libro electrónico
  6. 6986
    Publicado 2005
    Tabla de Contenidos: “…Patterns for e-business -- 1.1 The Patterns for e-business layered asset model -- 1.2 How to use the Patterns for e-business -- 1.2.1 Business, Integration, or Composite pattern, or a custom design -- 1.2.2 Selecting Application patterns -- 1.2.3 Review Runtime patterns -- 1.2.4 Review Product mappings -- 1.2.5 Review guidelines and related links -- 1.3 Summary -- Chapter 2. Application patterns for pervasive solutions -- 2.1 Pervasive access applications -- 2.2 Pervasive Device Adapter application pattern -- 2.3 Rich Device application patterns -- 2.4 Other Access Integration patterns -- 2.4.1 Single sign-on -- 2.4.2 Extended Single Sign-On application patterns -- 2.4.3 Personalized Delivery application pattern -- Chapter 3. …”
    Libro electrónico
  7. 6987
    Publicado 2003
    Tabla de Contenidos:
    Libro electrónico
  8. 6988
    Publicado 2017
    Tabla de Contenidos: “…L.1 Introduction -- L.2 Elements of Indexing -- L.2.1 Approach Terms -- L.2.2 Term Order -- L.2.3 Controlled Vocabulary -- L.2.4 Arrangement of Entries -- L.3 Types of Indexing -- L.3.1 Assigned Indexing -- L.3.1.1 Pre-coordinate Indexing -- L.3.1.2 Post-coordinate Indexing -- L.3.1.3 Difference -- L.3.2 Derived Indexing -- L.4 Graphic Representation -- L.5 Automatic Indexing -- L.5.1 Comparative Advantages/Disadvantages -- L.6 Selection -- References -- M Assigned Indexing -- M.1 Introduction -- M.2 Chain Indexing (CI) -- M.2.1 Breaking of Class Number -- M.2.2 Indication of Links -- M.2.3 Backward Rendering -- M.2.4 Cross-References -- M.2.4.1 Coates's Modification -- M.2.5 Filing -- M.2.6 Modified CI -- M.2.6.1 Job's Modification -- M.2.7 Advantages of CI -- M.2.8 Disadvantages of CI -- M.3 PRECIS -- M.3.1 Format and Structure -- M.3.1.1 Primary Notions -- M.3.1.2 Approach Term -- M.3.1.3 Three-Part Format -- M.3.2 Generation of Entries -- M.3.3 Role Operators -- M.3.4 Codes -- M.3.5 String Making -- M.3.6 Final Entries -- M.3.7 Advantages of PRECIS -- M.3.8 Disadvantages of PRECIS -- M.4 POPSI -- M.4.1 Basis of POPSI -- M.4.2 Different Versions -- M.4.3 Subject-Proposition -- M.4.4 Syntactical Structure -- M.4.5 Indexing Steps -- M.4.6 Advantages of POPSI -- M.4.7 Disadvantages of POPSI -- M.5 Uniterm Indexing -- M.5.1 Uniterms -- M.5.2 Indexing Process -- M.5.3 Searching Process -- M.5.4 Advantages of UNITERM -- M.5.5 Disadvantages ​of UNITERM -- M.5.6 Solutions -- References -- N Derived Indexing -- N.1 Introduction -- N.2 KWIC -- N.2.1 Indexing Process -- N.2.2 Format and Structure -- N.2.3 Advantages of KWIC -- N.2.4 Disadvantages of KWIC -- N.2.5 Variants of KWIC -- N.3 Citation Indexing -- N.3.1 Underlying Principles -- N.3.2 Genesis of Citation Index -- N.3.3 Definition of Citation Index -- N.3.4 Characteristics of Citation Index…”
    Libro electrónico
  9. 6989
    Publicado 2018
    Tabla de Contenidos: “…Putting it All Together: Analyzing a Malware Executable -- 5.1 Static Analysis of the Sample -- 5.2 Dynamic Analysis of the Sample -- 6. Dynamic-Link Library (DLL) Analysis -- 6.1 Why Attackers Use DLLs -- 6.2 Analyzing the DLL Using rundll32.exe -- 6.2.1 Working of rundll32.exe -- 6.2.2 Launching the DLL Using rundll32.exe -- Example 1 - Analyzing a DLL With No Exports -- Example 2 - Analyzing a DLL Containing Exports -- Example 3 - Analyzing a DLL Accepting Export Arguments -- 6.3 Analyzing a DLL with Process Checks -- Summary -- Chapter 4: Assembly Language and Disassembly Primer -- 1. …”
    Libro electrónico
  10. 6990
    Publicado 2020
    Tabla de Contenidos: “…Soong and Rath Vannithamby -- 1.1 Introduction 3 -- 1.2 5G and the Vertical Industries 5 -- 1.3 5G Requirements in Support of Vertical Industries 10 -- 1.4 Radio Access 12 -- 1.5 Network Slicing 14 -- 1.6 Other Network Issues 17 -- 1.7 Book Outline 19 -- References 20 -- Part II 5G Verticals ́ô Deployments and Business Model Opportunities and Challenges 25 -- 2 5G Network for a Variety of Vertical Services 27 /Jin Yang -- 2.1 5G Services 29 -- 2.1.1 Enhanced Mobile Broadband 29 -- 2.1.2 Ultra Reliable and Low Latency Communications 31 -- 2.1.3 Massive Machine Type Communications 32 -- 2.2 Networks 33 -- 2.2.1 5G Network Architecture 34 -- 2.2.2 Multi-Access Edge Computing Network 38 -- 2.2.3 Virtualized Radio Accesses 40 -- 2.3 Service-Aware SON 42 -- 2.3.1 5G-NR SON Control 44 -- 2.3.2 An Intelligent Hybrid 3-Tier SON 46 -- 2.3.3 Service-Aware Access Scheme 48 -- 2.3.4 Performance Benefits 50 -- 2.4 Summary 51 -- Acronyms 52 -- References 54 -- Part III 5G Verticals ́ô Radio Access Technologies 57 -- 3 NR Radio Interface for 5G Verticals 59 /Amitava Ghosh, Rapeepat Ratasuk, and Frederick Vook -- 3.1 Introduction 59 -- 3.2 NR Radio Interface 60 -- 3.2.1 eMBB 67 -- 3.2.2 URLLC 70 -- 3.2.3 mMTC 72 -- 3.2.3.1 eMTC Overview 74 -- 3.2.3.2 NB-IoT Overview 74 -- 3.2.3.3 Coexistence with NR 76 -- 3.3 5G Verticals 78 -- 3.3.1 Industrial IoT 78 -- 3.3.2 Automotive V2X 82 -- 3.3.3 eHealth 86 -- 3.4 Conclusion 88 -- Acknowledgment 88 -- Acronyms 89 -- References 90 -- 4 Effects of Dynamic Blockage in Multi-Connectivity Millimeter-Wave Radio Access 93 /Vitaly Petrov, Margarita Gapeyenko, Dmitri Moltchanov, Andrey Samuylov, Sergey Andreev, and Yevgeni Koucheryavy -- 4.1 Introduction 93 -- 4.2 Blockage Effects in 5G Millimeter-Wave Cellular Communication 94 -- 4.2.1 Millimeter-Wave Link Blockage at a Glance 94 -- 4.2.2 Blockage Modeling Methodology 95.…”
    Libro electrónico
  11. 6991
    Publicado 2016
    Tabla de Contenidos: “…Long-term solvency measures -- Earnings and cash flow coverage ratios -- Interest coverage ratio -- Cash coverage ratio -- Operational efficiency or asset utilization ratios -- Inventory turnover ratio -- Receivables turnover ratio -- Market value measures -- Du Pont system -- Business risk -- Analysis of growth potential -- Analysis of bank performance -- Profitability measures -- Efficiency measures -- Expense measures -- Leverage ratios -- Asset quality -- Management quality -- Limitations of ratio analysis -- Links for websites for financial analysis -- Fundamentals of valuation -- Time value of money -- Future value and compounding -- Present value and discounting -- Discounted cash flow valuation -- Annuities -- Perpetuities -- Growing annuity -- Continuous compounding -- Different types of interest rates -- Nominal or stated interest rate -- Annual percentage rate -- Periodic rate -- Effective annual rate -- Different types of loans -- Pure discount loans -- Interest only loans -- Amortized loans -- Bond valuation and interest rates -- Basics of bonds -- Features of bond -- Indenture -- Bond terminology -- Par value -- Coupon and coupon rate -- Maturity date -- Yield to maturity (YTM) -- Current yield -- Yield to call -- Premium and discount bond -- Value of bond -- Interest rates -- Term structure of interest rates -- Bond ratings -- Bond pricing theorems -- Duration theorems -- Basics of stock valuation -- Summary highlights of stock valuation -- General method -- Constant growth method -- Nonconstant growth -- Two stage growth -- References -- 2 Risk and return -- 2.1 Introduction -- 2.2 Accounting and risk measures -- 2.3 Measures of returns -- 2.3.1 Total return -- 2.3.2 Historical rates of return -- 2.3.3 Average returns -- 2.3.4 Expected return -- 2.3.5 Portfolio returns -- 2.3.6 Determinants of rate of return -- 2.4 Risk premium…”
    Libro electrónico
  12. 6992
    por Böhm, Franz
    Publicado 2023
    Tabla de Contenidos: “…UNGERADE() Zahlen runden‌ -- 4.5.7 Als Ergebnis einer Berechnung nur die Zahl links vom Komma anzeigen -- 4.6 Mittelwertberechnung -- 4.6.1 Welcher Zahlenwert liegt in der Mitte der Zahlenreihe? …”
    Libro electrónico
  13. 6993
    Publicado 2023
    Tabla de Contenidos: “…I4.0 -- 2.5.3 Software for Product Planning-A Link Between Smart Products and the Main System ERP -- 2.6 Industry Production System 4.0 (Smart Factory)…”
    Libro electrónico
  14. 6994
    Publicado 2022
    Tabla de Contenidos: “…Imaging Modalities -- 6.2.4 Suitable Technologies Before Machine Learning -- 6.2.5 MRI Brain Image Segmentation -- 6.3 Related Work -- 6.4 Gaps and Observations -- 6.5 Suggestions -- 6.6 Conclusion -- References -- 7 Challenges, Standards, and Solutions for Secure and Intelligent 5G Internet of Things (IoT) Scenarios Ayasha Malik and Bharat Bhushan -- 7.1 Introduction -- 7.2 Safety in Wireless Networks: Since 1G to 4G -- 7.2.1 Safety in Non-IP Networks -- 7.2.2 Safety in 3G -- 7.2.3 Security in 4G -- 7.2.4 Security in 5G -- 7.2.4.1 Flashy System Traffic and Radio Visual Security Keys -- 7.2.4.2 Authorized Network Security and Compliance with Subscriber Level Safety Policies -- 7.2.5 Security in 5G and Beyond -- 7.3 IoT Background and Requirements -- 7.3.1 IoT and Its Characteristics -- 7.3.2 Characteristics of IoT Infrastructure -- 7.3.3 Characteristics of IoT Applications -- 7.3.4 Expected Benefits of IoT Adoption for Organization -- 7.3.4.1 Benefits Correlated to Big Data Created by IoT -- 7.3.4.2 Benefits Interrelated to the Openness of IoT -- 7.3.4.3 BenefitsRelated to the Linked Aspect6 of IoT -- 7.4 Non 5G Standards Supporting IoT -- 7.4.1 Bluetooth Low Energy -- 7.4.2 IEEE 802.15.4 -- 7.4.3 LoRa -- 7.4.4 Sigfox -- 7.4.5. …”
    Libro electrónico
  15. 6995
    Publicado 2023
    Tabla de Contenidos: “…I4.0 -- 2.5.3 Software for Product Planning-A Link Between Smart Products and the Main System ERP -- 2.6 Industry Production System 4.0 (Smart Factory)…”
    Libro electrónico
  16. 6996
    Publicado 2005
    Tabla de Contenidos: “…WebSphere - DB2 environment -- 3.1 Introduction to the sample scenario setup -- 3.2 Introduction to DB2 drivers for Java -- 3.3 Data source definitions in WAS V5 -- 3.4 The IBM DB2 Universal Driver for SQLJ and JDBC -- 3.4.1 Summary of WAS z/OS external changes for the Universal Driver -- 3.5 Configuring Universal JDBC Driver type 2 connectivity -- 3.5.1 Specifying the Universal JDBC Driver provider -- 3.5.2 Defining Data Sources under this provider -- 3.5.3 Setting/verifying the symbolic environment variables -- 3.5.4 Defining DB2 Universal Driver - General properties -- 3.5.5 Searching for the package to execute -- 3.5.6 Linking to the DB2 libraries -- 3.5.7 Creating a new Application Server -- 3.6 Configuring Universal JDBC Driver type 4 connectivity -- 3.6.1 Using the Universal Driver for type 4 (non-XA) -- 3.6.2 Using the Universal Driver for type 4 (XA) connectivity -- 3.7 Summary -- Chapter 4. …”
    Libro electrónico
  17. 6997
    Publicado 2004
    Tabla de Contenidos: “…Architecture guidelines and technology options -- 2.1 Operational modeling guidelines -- 2.1.1 Application architecture components -- 2.1.2 Product mapping -- 2.1.3 Runtime environment topologies -- 2.1.4 Development environment topologies -- 2.2 Application architecture guidelines -- 2.2.1 Guidelines for non-functional requirements -- 2.2.2 Object retrieval from DB2 Content Manager -- 2.2.3 Capture -- 2.2.4 Retrieval -- 2.2.5 Search -- 2.2.6 Portlet application structure -- 2.3 Data model -- 2.3.1 Attribute -- 2.3.2 Attribute group -- 2.3.3 Components -- 2.3.4 Item type -- 2.3.5 Item type subset -- 2.3.6 Semantic type -- 2.3.7 References -- 2.3.8 Links -- 2.3.9 Foreign key -- 2.3.10 Objects -- 2.3.11 Text search -- 2.3.12 Design your data model using the building blocks -- 2.3.13 Integrate a Content Manager data model with a Portal -- 2.4 Workflow…”
    Libro electrónico
  18. 6998
    Publicado 2003
    Tabla de Contenidos: “…-- 7.1.4 Coupling facility storage sizing -- 7.1.5 Coupling facility links -- 7.1.6 CPU planning for the coupling facility -- 7.2 Processor capacity planning -- 7.3 Software configuration planning -- 7.4 System logger planning -- 7.4.1 What is the system logger? …”
    Libro electrónico
  19. 6999
    Publicado 2003
    Tabla de Contenidos: “…Planning for IASPs -- 2.1 Business needs -- 2.2 Performance requirements -- 2.2.1 Structure of IASPs -- 2.2.2 Disk drives: Arms versus capacity -- 2.2.3 Placement for performance -- 2.3 Software licensing requirements -- 2.3.1 Required software -- 2.3.2 Optional software -- 2.4 Restrictions -- 2.4.1 Switching independent disk pools between V5R1 and V5R2 systems -- 2.4.2 Spooling limitations -- 2.5 Application integration -- 2.6 Authority considerations -- 2.6.1 User profiles and IASPs -- 2.6.2 Planning for user profiles and space to be used -- 2.6.3 Authorization lists (AUTL) and IASPs -- 2.6.4 Accounting for space used by user profiles and authorization lists -- 2.7 Capacity planning -- 2.8 Hardware configuration and physical planning -- 2.8.1 Minimum hardware requirements -- 2.8.2 Physical versus logical switching -- 2.8.3 PCI card switching -- 2.8.4 ASPs and expansion towers -- 2.8.5 High-speed link (HSL) cable placement -- 2.8.6 HSL port feature -- 2.8.7 HSL cabling rules for multiple system switched tower implementation -- 2.8.8 SPCN cable considerations -- 2.9 Aesthetics -- 2.10 Physical planning requirements -- 2.10.1 Advantages of using IASPs -- 2.10.2 Limitations of using IASP -- 2.11 Independent disk pool planning checklist -- 2.12 Disk planning worksheet -- 2.13 PCI card placement planning worksheet -- 2.14 Positioning independent disk pools -- Chapter 3. …”
    Libro electrónico
  20. 7000
    Publicado 2009
    Tabla de Contenidos: “…8.6.2 Background 265 -- 8.6.3 Problem Formulation 266 -- 8.6.4 Routing Based on Priority Queuing 267 -- 8.6.5 Problem Solution 269 -- 8.6.6 Performance Evaluation 270 -- 8.7 Cross-Layer Optimization for Video Summary Transmission 272 -- 8.7.1 Background 272 -- 8.7.2 Problem Formulation 274 -- 8.7.3 System Model 276 -- 8.7.4 Link Adaptation for Good Content Coverage 278 -- 8.7.5 Problem Solution 280 -- 8.7.6 Performance Evaluation 283 -- 8.8 Conclusions 287 -- References 287 -- 9 Content-based Video Communications 291 -- 9.1 Network-Adaptive Video Object Encoding 291 -- 9.2 Joint Source Coding and Unequal Error Protection 294 -- 9.2.1 Problem Formulation 295 -- 9.2.2 Solution and Implementation Details 299 -- 9.2.3 Application on Energy-Efficient Wireless Network 301 -- 9.2.4 Application on Differentiated Services Networks 303 -- 9.3 Joint Source-Channel Coding with Utilization of Data Hiding 305 -- 9.3.1 Hiding Shape in Texture 308 -- 9.3.2 Joint Source-Channel Coding 309 -- 9.3.3 Joint Source-Channel Coding and Data Hiding 311 -- 9.3.4 Experimental Results 315 -- References 322 -- 10 AVC/H.264 Application / Digital TV 325 -- 10.1 Introduction 325 -- 10.1.1 Encoder Flexibility 326 -- 10.2 Random Access 326 -- 10.2.1 GOP Bazaar 327 -- 10.2.2 Buffers, Before and After 332 -- 10.3 Bitstream Splicing 335 -- 10.4 Trick Modes 337 -- 10.4.1 Fast Forward 338 -- 10.4.2 Reverse 338 -- 10.4.3 Pause 338 -- 10.5 Carriage of AVC/H.264 Over MPEG-2 Systems 338 -- 10.5.1 Packetization 339 -- 10.5.2 Audio Video Synchronization 344 -- 10.5.3 Transmitter and Receiver Clock Synchronization 344 -- 10.5.4 System Target Decoder and Timing Model 344 -- References 345 -- 11 Interactive Video Communications 347 -- 11.1 Video Conferencing and Telephony 347 -- 11.1.1 IP and Broadband Video Telephony 347 -- 11.1.2 Wireless Video Telephony 348 -- 11.1.3 3G-324M Protocol 348 -- 11.2 Region-of-Interest Video Communications 351 -- 11.2.1 ROI based Bit Allocation 351 -- 11.2.2 Content Adaptive Background Skipping 356.…”
    Libro electrónico