Mostrando 1,621 - 1,640 Resultados de 2,388 Para Buscar '"No Entry"', tiempo de consulta: 0.09s Limitar resultados
  1. 1621
    por Gavin, Lee
    Publicado 2004
    Tabla de Contenidos: “…Overview -- 1.1 Business process definition and theory elements -- 1.1.1 Business process environments -- 1.1.2 Business processes characteristics -- 1.2 The case study -- 1.3 The case study business process description -- 1.3.1 Customer order process -- 1.3.2 Entry audit process -- 1.3.3 Sub-processes -- 1.3.4 The case study business process details -- 1.4 Some comments on case study selection -- Chapter 2. …”
    Libro electrónico
  2. 1622
    Publicado 2004
    Tabla de Contenidos: “…ICSF support for CPACF, PCIXCC, and PCICA -- 5.1 CP Assist for Cryptographic Functions (CPACF) feature -- 5.2 LPAR setup -- 5.2.1 Planning considerations -- 5.2.2 The image profile processor page -- 5.2.3 The PCI Crypto page -- 5.2.4 Viewing LPAR Cryptographic Controls -- 5.3 PCIXCC and PCICA feature installation -- 5.3.1 PCIXCC and PCICA enablement -- 5.3.2 Configuring and monitoring the status of PCIXCC and PCICA -- 5.3.3 Security issues with the PCI Cryptographic cards -- 5.4 Integrated Cryptographic Services Facility (ICSF) setup -- 5.4.1 Changes from previous release -- 5.4.2 Started task and the first time start -- 5.4.3 Master Keys -- 5.4.4 Initial Master Key entry with the pass phrase initialization utility -- 5.4.5 Installation of a new PCIXCC or PCICA card -- 5.4.6 PKDS initialization -- Chapter 6. …”
    Libro electrónico
  3. 1623
    por Bluttman, Ken
    Publicado 2005
    Tabla de Contenidos: “…Create Tables Faster; 2.7.2. The Code; 3. Entry and Navigation; 19. Help Users Navigate Through Long Forms; 3.2.2. …”
    Libro electrónico
  4. 1624
    por McCue, Colleen
    Publicado 2007
    Tabla de Contenidos: “…Screening versus Diagnostic -- 7.17 A Perfect World Scenario -- 7.18 Tools of the Trade -- 7.19 General Considerations and Some Expert Options -- 7.20 Variable Entry -- 7.21 Prior Probabilities -- 7.22 Costs -- 7.23 Bibliography -- 8 Public Safety-Specific Evaluation -- 8.1 Outcome Measures -- 8.2 Think Big -- 8.3 Training and Test Samples -- 8.4 Evaluating the Model -- 8.5 Updating or Refreshing the Model -- 8.6 Caveat Emptor -- 8.7 Bibliography -- 9 Operationally Actionable Output -- 9.1 Actionable Output -- Applications -- 10 Normal Crime -- 10.1 Knowing Normal -- 10.2 "Normal" Criminal Behavior -- 10.3 Get to Know "Normal" Crime Trends and Patterns -- 10.4 Staged Crime -- 10.5 Bibliography -- 11 Behavioral Analysis of Violent Crime -- 11.1 Case-Based Reasoning -- 11.2 Homicide -- 11.3 Strategic Characterization -- 11.4 Automated Motive Determination -- 11.5 Drug-Related Violence -- 11.6 Aggravated Assault -- 11.7 Sexual Assault -- 11.8 Victimology -- 11.9 Moving from Investigation to Prevention -- 11.10 Bibliography -- 12 Risk and Threat Assessment -- 12.1 Risk-Based Deployment -- 12.2 Experts versus Expert Systems -- 12.3 "Normal" Crime -- 12.4 Surveillance Detection -- 12.5 Strategic Characterization -- 12.6 Vulnerable Locations -- 12.7 Schools -- 12.8 Data -- 12.9 Accuracy versus Generalizability -- 12.10 "Cost" Analysis -- 12.11 Evaluation -- 12.12 Output -- 12.13 Novel Approaches to Risk and Threat Assessment…”
    Libro electrónico
  5. 1625
    por Elferdink, Jim
    Publicado 2005
    Tabla de Contenidos: “…Inserting Section Breaks; 3.5.4. Auto-entry: Formatted Text Fields; 3.6. Adding a Table of Contents; 4. …”
    Libro electrónico
  6. 1626
    por Bates, Martin, 1952-
    Publicado 2008
    “…With no previous knowledge of C necessary to read this book, it is the perfect for entry into this world for engineers who have not worked with PICs, new…”
    Libro electrónico
  7. 1627
    por Krishna, Vijay
    Publicado 2009
    Tabla de Contenidos: “…Asymmetries and Other Complications8.1 Failures of the Linkage Principle; 8.2 Asymmetric Equilibria in Symmetric Second-Price Auctions; 8.3 Asymmetrically Informed Bidders; 8.4 Reserve Prices and Entry Fees; Chapter 9. Efficiency and the English Auction; 9.1 The Single Crossing Condition; 9.2 Two-Bidder Auctions; 9.3 The Average Crossing Condition; 9.4 Three or More Bidders; 9.5 Proof of Proposition 9.2; 9.6 Miscellany; Chapter 10. …”
    Libro electrónico
  8. 1628
    por Olson, Jack E.
    Publicado 2003
    Tabla de Contenidos: “…Sources of Inaccurate Data; 3.1 Initial Data Entry; 3.2 Data Accuracy Decay; 3.3 Moving and Restructuring Data; 3.4 Using Data; 3.5 Scope of Problems; 3.6 Closing Remarks; Part II: Implementing a Data Quality Assurance Program; Chapter 4. …”
    Libro electrónico
  9. 1629
    Publicado 2013
    “…The new edition has been updated to include: - All new sample reports and forms including AC time cards, resume templates, a digital camera report, and a non-prep disclaimer - A fresh chapter on the entry level camera positions of Camera Trainee/Production Assistant - Instruction and custom forms to help freelance filmmakers keep track of daily expenses for tax purposes - Coverage of emerging iPhone apps that are used by filmmakers and ACs on set - An updated companion website offering online tutorials, clips, and techniques that ACs can easily access while on location (www.cameraassistantmanual.com)"--…”
    Libro electrónico
  10. 1630
    Publicado 2012
    Tabla de Contenidos: “…Cover -- Contents at a Glance -- Contents -- Acknowledgments -- Introduction -- Part I: Development Components -- 1 Architecture -- General Client-Server Computing Model -- Oracle Database 11g -- Client Software: SQL*Plus -- Oracle 11g Server Software -- Oracle Data Dictionary -- Oracle MySQL 5.6 -- Client Software: The MySQL Monitor -- MySQL Server Software -- MySQL Data Dictionary -- Summary -- Mastery Check -- 2 Client Interface -- SQL*Plus -- Connecting to and Disconnecting from SQL*Plus -- Working in the SQL*Plus Environment -- Writing SQL Statements with SQL*Plus -- Saving SQL Statements with SQL*Plus -- Editing SQL Statements with SQL*Plus -- Rerunning SQL*Plus SQL Statements from the Buffer -- Aborting Entry of SQL Statements in SQL*Plus -- Calling and Running SQL*Plus Script Files -- Passing Parameters to SQL*Plus Script Files -- Calling PL/SQL Programs -- Writing SQL*Plus Log Files -- MySQL Monitor -- Connecting to and Disconnecting from MySQL Monitor -- Writing MySQL SQL Statements -- Saving MySQL SQL Statements -- Editing MySQL SQL Statements -- Aborting MySQL SQL Statements -- Calling and Running MySQL Script Files -- Setting a Session Variable -- Calling SQL/PSM Programs -- Writing MySQL Log Files -- Summary -- Mastery Check -- 3 Security Models -- Security Barriers -- Securing the Network -- Securing the Operating System -- Securing the Database -- Security Privileges -- Data Control Language -- Definer and Invoker Rights -- Definer Rights -- Invoker Rights -- Summary -- Mastery Check -- 4 Transaction Models -- Data Transactions -- ACID-compliant SQL Statements -- INSERT Statement -- UPDATE Statement -- DELETE Statement -- Stored Programs -- Triggers -- Summary -- Mastery Check -- 5 Constraints -- NOT NULL Constraints -- Oracle NOT NULL Constraints -- MySQL NOT NULL Constraints -- UNIQUE Constraints -- Oracle UNIQUE Constraints…”
    Libro electrónico
  11. 1631
    por Lomax, Richard G.
    Publicado 2013
    Tabla de Contenidos: “…Logistic Regression; 9.1 How Logistic Regression Works; 9.2 Logistic Regression Equation; 9.3 Estimation and Model Fit; 9.4 Significance Tests; 9.5 Assumptions and Conditions; 9.6 Effect Size; 9.7 Methods of Predictor Entry; 9.8 SPSS; 9.9 G*Power; 9.10 Template and APA-Style Write-Up; 9.11 What Is Next?…”
    Libro electrónico
  12. 1632
    por McFedries, Paul
    Publicado 2011
    Tabla de Contenidos: “…Cover -- Contents -- Introduction -- What's in the Book -- This Book's Special Features -- I: MASTERING EXCEL RANGES AND FORMULAS -- 1 Getting the Most Out of Ranges -- Advanced Range-Selection Techniques -- Data Entry in a Range -- Filling a Range -- Using the Fill Handle -- Creating a Series -- Advanced Range Copying -- Copying Selected Cell Attributes -- Clearing a Range -- Applying Conditional Formatting to a Range -- 2 Using Range Names -- Defining a Range Name -- Working with Range Names -- 3 Building Basic Formulas -- Understanding Formula Basics -- Understanding Operator Precedence -- Controlling Worksheet Calculation -- Copying and Moving Formulas -- Displaying Worksheet Formulas -- Converting a Formula to a Value -- Working with Range Names in Formulas -- Working with Links in Formulas -- Formatting Numbers, Dates, and Times -- 4 Creating Advanced Formulas -- Working with Arrays -- Understanding Array Formulas -- Using Array Constants -- Using Iteration and Circular References -- Consolidating Multisheet Data -- Applying Data-Validation Rules to Cells -- Using Dialog Box Controls on a Worksheet -- 5 Troubleshooting Formulas -- Understanding Excel's Error Values -- Fixing Other Formula Errors -- Handling Formula Errors with IFERROR( ) -- Using the Formula Error Checker -- Auditing a Worksheet -- II: HARNESSING THE POWER OF FUNCTIONS -- 6 Understanding Functions -- About Excel's Functions -- The Structure of a Function -- Typing a Function into a Formula -- Using the Insert Function Feature -- Loading the Analysis ToolPak -- 7 Working with Text Functions -- Excel's Text Functions -- Working with Characters and Codes -- Converting Text -- Formatting Text -- Manipulating Text -- Removing Unwanted Characters from a String -- Extracting a Substring -- Searching for Substrings -- Case Study: Generating Account Numbers…”
    Libro electrónico
  13. 1633
    Publicado 2014
    Tabla de Contenidos: “…-- Exceptional items -- Stock (inventory) valuation -- Depreciation -- Capitalisation -- Off-balance-sheet items -- Share (stock) options -- Missing the profits and assets in investee companies -- Other tricks -- Concluding comments -- Further reading -- Chapter 14: Analysing industries -- The competitive floor -- The five competitive forces -- Threat of entry -- Intensity of rivalry of existing companies -- The threat from substitutes -- Buyer (customer) power -- Supplier power -- Industry evolution -- Concluding comments -- Further reading -- Chapter 15: The competitive position of the firm -- The TRRACK system -- What makes resources extraordinary? …”
    Libro electrónico
  14. 1634
    por Jain, Mohit
    Publicado 2007
    Tabla de Contenidos: “…Key Points Related to Financial Resources towards Your MBA -- Some Trusts that Provide Financial Aid -- Chapter 15: Get Going with the Visa -- General Information about Visas -- General Visa Requirements for Most Countries -- Visa Procedures in the Us -- Types of Student Visas -- F-1 (Student Visa) -- J-1 (Exchange Visitor) -- Applying for a Student or Exchange Visitor Visa-Sevis Requirements -- Sevis -- Plan Ahead -- The Top of the Mind Instructions -- Arriving and Studying in the US (Immigration Clearance) -- Plan Your Arrival -- Always Hand-carry Your Documents -- Complete Your Paperwork -- At the Port-of-Entry -- Additional Information on Secondary Inspection Requirements -- On Arrival at the College or University in the US -- The US Visa Application Process in India -- Visa Refusal -- Legalities to be Observed by the Student in the US on a Student Visa -- Visa to Study in Canada -- A Study Permit -- Application for a Study Permit -- Documents Needed to Apply for a Study Permit -- Proof of Acceptance -- Proof of Identity -- Proof of Financial Support -- Letter of Explanation -- After You Apply-The Status of Your Application -- Arriving in Canada -- Understanding Your Study Permit -- Exiting and Re-entering Canada -- Changing Conditions or Renewing Your Study Permit -- Applying for a New Temporary Resident Visa (if needed) -- Work Opportunities for Foreign Students -- Working on Campus -- Working Off-campus -- Co-op and Internship Programmes -- Post-graduation Work Permits -- Work Permits for Students at Private Institutions -- Work Permit for Your Spouse or Common-law Partner -- Summary of Documents to be Submitted for the Study Permit -- Visa Procedure in the UK -- Applying for the Visa -- Work Permit -- Pre-MBA Visits to the UK -- Other Important Aspects to Remember -- Student Visa Application Procedure for Indian Students…”
    Libro electrónico
  15. 1635
    Publicado 2017
    Tabla de Contenidos: “…Acknowledgments -- References -- Strategic Categorization -- Strategic Categorization -- Producers -- Analysts -- Empirical Test: The Technology Sector -- Data -- Producers: Software Organizations -- Analysts: Gartner -- Methods -- Hypotheses 1 and 2 -- Dependent Variable -- Independent Variables -- Control Variables -- Hypothesis 3 -- Dependent Variable -- Independent Variables -- Control Variables -- Hypothesis 4 -- Dependent Variables -- Independent Variables -- Control Variables -- Results -- Software Producers: Market Category Entry -- Gartner Analysts: Report on a Producer Market Category -- Gartner Analysts: Issue a Magic Quadrant Report -- Discussion -- Notes -- References -- Hybrid Categories as Political Devices: The Case of Impact Investing in Frontier Markets -- Theoretical Foundation -- Politics, Power, and Categories -- Hybrid Categories and Power Relations -- Methodology -- Research Context -- Impact Investors Look to Africa -- Data Sources and Data Collection -- Documents, Media Reports, and Archives -- Semi-Structured Interviews -- Data Analysis -- Analytical Approach -- Case Study -- Birth of a Hybrid Category: The Emergence of Impact Investing -- Creating New Knowledge and Defining a New Collective Identity -- New Forests Company and the Politics of Identity -- Weak Institutional Setting -- Strategic Use of Hybrid Category Membership for Political Advantage -- Hybrid Category Membership for the Transfer of Legitimacy -- Discussion and Conclusion -- Contributions -- Further Research -- Notes -- References -- The Discursive Perspective of Market Categorization: Interaction, Power, and Context -- Introduction -- The Discourse of Market Categorization -- The Interaction among Market Participants -- Power Dynamics among Market Participants -- Contextualizing Category Development…”
    Libro electrónico
  16. 1636
    Tabla de Contenidos: “…Structural and practical obstacles impede effective implementation and use of RPL -- Offering part-time and distance learning opportunities -- Providing preparatory courses and increasing the flexibility of entry requirements -- Providing VET programmes dedicated to adults -- Ensuring financial support is available for more flexible VET programmes -- References -- Notes -- 4 Vocational education and training to support transitions -- Introduction -- How can VET develop transversal skills? …”
    Libro electrónico
  17. 1637
    Publicado 2017
    Tabla de Contenidos: “…3.1 Modeling Spatial Heterogeneity and Spatial Dependence: MGWR-SAR -- 3.2 Modeling Spatial Dependence, Spatial Heterogeneity and Nonlinearities: P-Spline Models for Cross-Sectional Data and Short Panels -- 3.3 Modeling Spatial Spillovers, Spatial Heterogeneity, Nonlinearities and Time-Related Factors: Spatio-Temporal Semiparametric Autoregressive Models for Large Panel Data -- 4 Software -- 5 Conclusions -- References -- Looking Ahead: Part I -- Abstract -- 1 Introduction -- 2 Summary of the Research Conducted Within the Action -- 3 Main Results and Open Questions -- 3.1 Main Results -- 3.2 Open Questions -- 4 Suggested Topics for Future Research -- The Meso Perspective - Financial Markets -- Systemic Risk and Macroeconomic Fat Tails -- 1 Introduction -- 2 The Model Without Fire Sales -- 3 Results Without Fire Sales -- 4 The Model with Fire Sales -- 5 Results with Fire Sales -- 6 Conclusion -- A Appendix: Numerical Example -- References -- Market Interactions, Endogenous Dynamics and Stabilization Policies -- Abstract -- 1 Introduction and Outline -- 2 Market Interactions -- 3 Stabilization Policies -- 3.1 Optimal Trade Barriers -- 3.2 Profit Taxes -- 4 Conclusions and Outlook -- References -- Looking Ahead: Part II -- 1 Future Challenges -- References -- The Micro Perspective - Social and Industrial Interactions -- A Dynamic Model of Firms' Strategic Location Choice -- 1 Introduction -- 2 The Model -- 3 Markov Perfect Equilibria -- 4 Economic Analysis -- 5 Concluding Remarks -- References -- Strategic Corporate Social Responsibility by a Local Firm Against a Multinational Enterprise -- 1 Introduction -- 2 The Model -- 3 The Multinational Firm's Modes of Entry -- 4 Comparing FDI and Exports -- 5 Conclusion -- References -- Knowledge Spillovers, Congestion Effects, and Long-Run Location Patterns -- 1 Introduction -- 2 The Model…”
    Libro electrónico
  18. 1638
    por Scholz, James A.
    Publicado 2013
    Tabla de Contenidos: “…Objectives of the Business Impact Analysis Developing the Project Plan BIA Process Steps Performing the BIA Gathering Information Performing a Vulnerability Assessment Analyzing the Information Documenting the Results and Presenting the Recommendations Risk Risk Management Risk Framework Risk Assessment or Evaluation Risk Mitigation and Response Risk Monitoring Risk Assessment Secure Configuration Management Phases of Security-Focused Configuration Management Security Configuration Management Plan Coordination Configuration Control Change Control Board (CCB) or Technical Review Board (TRB) Configuration Items Baseline Identification Functional Baseline Design Baseline Development Baseline Product Baseline Roles and Responsibilities Change Control Process Change Classifications Change Control Forms Problem Resolution Tracking Measurements Configuration Status Accounting Configuration Management Libraries Release Management (RM) Configuration Audits Functional Configuration Audit Physical Configuration Audit Tools Training Training Approach Contingency Planning Types of Plans Business Continuity Plan (BCP) Continuity of Operations (COOP) Plan Cyber Incident Response Plan Disaster Recovery Plan (DRP) Contingency Plan (CP) Occupant Emergency Plan (OEP) Crisis Communications Plan Backup Methods and Off-Site Storage Cloud Computing Essential Characteristics Service Models Continuous Monitoring Continuous Monitoring Strategy Organization (Tier 1) and Mission/Business Processes (Tier 2) Continuous Monitoring Strategy Information System (Tier 3) Continuous Monitoring Strategy Process Roles and Responsibilities Define Sample Populations Continuous Monitoring Program Determine Metrics Monitoring and Assessment Frequencies Considerations in Determining Assessment and Monitoring Frequencies Physical Security History Security Level (SL) Determination Threat Factors/Criteria Building Security Level Matrix Building Security Level Scoring Criteria Mission/Business Public Impact Building Occupants Building Square Footage Impact on Tenants Other Factors Level E Facilities Campuses, Complexes, and Corporate or Commercial Centers Changes in the Building Security Level Building Security Illumination Lighting for CCTV Surveillance Building Security Levels Minimum Security Standards Entry Security Interior Security Security Planning The Certification and Accreditation Process Accreditation Decisions Continuous Monitoring General Process Phase I Security Categorization System Security Plans (SSPs) Risk Assessments (RAs) Contingency Plans (CPs) Security Control Compliance Matrix (SCCM) Standard Operating Procedures (SOPs) Privacy Impact Assessment (PIA) Configuration Management Plan (CMP) Service Level Agreements (SLAs) General Process Phase II: Security Test and Evaluation (ST&E) Develop the Security Test and Evaluation (ST&E) Plan Execute the ST&E Plan Create the ST&E Report and Recommend Countermeasures Update the Risk Assessment Update the Security Plan Document Certification Findings General Management and Methodologies Employed Methodologies Internal Review Procedures End-State Security Model Appendix A: List of References (NIST ) Appendix B: List of References (FIPS) Appendix C: Sample Certification Statement Appendix D: Sample Rules of Engagement…”
    Libro electrónico
  19. 1639
    Publicado 2017
    Tabla de Contenidos: “…-- No content -- Creating a post -- Draft store actions -- Blog Map changes -- Click handler -- Ghost marker -- Post form -- Making the request -- Fetching posts -- Store action -- Fetch posts action -- Action dispatching -- Displaying markers -- Login and logout -- Logout -- Login -- Selecting a post -- Post details -- Store changes for post selection and sending -- Post Content component -- Location info and scoped slots -- Scoped slots to pass data to the parent -- Implementing of the component -- Comments - functional components -- Store changes for comments -- Functional component -- Summary -- Chapter 7: Project 5 - Online Shop and Scaling Up -- Advanced development workflow -- Setting up the project -- Generating a quick development API -- Launching the app -- Auto-prefixing CSS with PostCSS -- Targeting specific browsers with browserslist -- Improving code quality and style with ESLint -- Configuring ESLint -- Customizing the rules -- Running ESLint -- ESLint inside Webpack -- Unit testing with Jest -- Configuring Jest -- Babel configuration for Jest -- Our first unit test -- ESLint and Jest globals -- Jest snapshots -- Updating the snapshots -- Complementary topics -- Internationalization and code-splitting -- Code-splitting with dynamic imports -- Automatically loading the user locale -- Changing Language page -- Server-side rendering -- Universal App Structure -- Client entry -- Server entry -- State management…”
    Libro electrónico
  20. 1640
    Publicado 2024
    Tabla de Contenidos: “…switch statements -- switch statements and arrays -- switch statements and files -- Wildcard and Regex parameters -- Script block cases -- switch statements and enums -- switch, break, and continue -- Loops -- foreach loop -- foreach keyword and foreach alias -- for loop -- do-until and do-while loops -- while loop -- Loops, break, and continue -- break and continue outside loops -- Loops and labels -- Loops, queues, and stacks -- Summary -- Chapter 7: Working with .NET -- Assemblies -- About the GAC -- Types -- Type descriptions are objects in PowerShell -- Enumerations -- Classes -- Namespaces -- The using keyword -- Using namespaces -- Using assemblies -- Type accelerators -- About PSCustomObject and Ordered -- Members -- Constructors -- Properties -- Methods -- Fluent interfaces -- Static methods -- About the new() method -- Static properties -- Reflection in PowerShell -- The TypeAccelerators type -- The ArgumentTypeConverterAttribute type -- About generics -- Generic classes -- Generic methods -- Summary -- Online Chapter -- Chapter 10: Files, Folders, and the Registry -- Working with providers -- Navigating -- Getting items -- Drives -- Items -- Paths and .NET -- Testing for existing items -- Testing filesystem paths -- Testing registry paths -- Testing path type -- Creating items -- Reading and writing content -- Reading and writing in a pipeline -- Reading all content -- Writing content -- About text file encoding -- Temporary files -- Removing items -- Invoking items -- Item properties -- Properties and the filesystem -- Adding and removing file attributes -- Registry values -- Registry values and environment variables -- Searching for items -- Windows permissions -- Access and audit -- Rule protection -- Inheritance and propagation flags -- Removing ACEs -- Copying lists and entries -- Adding ACEs -- Filesystem rights -- Registry rights…”
    Libro electrónico