Mostrando 1,641 - 1,660 Resultados de 2,388 Para Buscar '"No Entry"', tiempo de consulta: 0.14s Limitar resultados
  1. 1641
    Publicado 2017
    Tabla de Contenidos: “…L.1 Introduction -- L.2 Elements of Indexing -- L.2.1 Approach Terms -- L.2.2 Term Order -- L.2.3 Controlled Vocabulary -- L.2.4 Arrangement of Entries -- L.3 Types of Indexing -- L.3.1 Assigned Indexing -- L.3.1.1 Pre-coordinate Indexing -- L.3.1.2 Post-coordinate Indexing -- L.3.1.3 Difference -- L.3.2 Derived Indexing -- L.4 Graphic Representation -- L.5 Automatic Indexing -- L.5.1 Comparative Advantages/Disadvantages -- L.6 Selection -- References -- M Assigned Indexing -- M.1 Introduction -- M.2 Chain Indexing (CI) -- M.2.1 Breaking of Class Number -- M.2.2 Indication of Links -- M.2.3 Backward Rendering -- M.2.4 Cross-References -- M.2.4.1 Coates's Modification -- M.2.5 Filing -- M.2.6 Modified CI -- M.2.6.1 Job's Modification -- M.2.7 Advantages of CI -- M.2.8 Disadvantages of CI -- M.3 PRECIS -- M.3.1 Format and Structure -- M.3.1.1 Primary Notions -- M.3.1.2 Approach Term -- M.3.1.3 Three-Part Format -- M.3.2 Generation of Entries -- M.3.3 Role Operators -- M.3.4 Codes -- M.3.5 String Making -- M.3.6 Final Entries -- M.3.7 Advantages of PRECIS -- M.3.8 Disadvantages of PRECIS -- M.4 POPSI -- M.4.1 Basis of POPSI -- M.4.2 Different Versions -- M.4.3 Subject-Proposition -- M.4.4 Syntactical Structure -- M.4.5 Indexing Steps -- M.4.6 Advantages of POPSI -- M.4.7 Disadvantages of POPSI -- M.5 Uniterm Indexing -- M.5.1 Uniterms -- M.5.2 Indexing Process -- M.5.3 Searching Process -- M.5.4 Advantages of UNITERM -- M.5.5 Disadvantages ​of UNITERM -- M.5.6 Solutions -- References -- N Derived Indexing -- N.1 Introduction -- N.2 KWIC -- N.2.1 Indexing Process -- N.2.2 Format and Structure -- N.2.3 Advantages of KWIC -- N.2.4 Disadvantages of KWIC -- N.2.5 Variants of KWIC -- N.3 Citation Indexing -- N.3.1 Underlying Principles -- N.3.2 Genesis of Citation Index -- N.3.3 Definition of Citation Index -- N.3.4 Characteristics of Citation Index…”
    Libro electrónico
  2. 1642
    Tabla de Contenidos: “…Remote development: The debugger -- 8.1 Debug perspective overview -- 8.2 Controlling the flow -- 8.2.1 Controls in the Debug view -- 8.2.2 Entry breakpoint -- 8.2.3 Address breakpoint -- 8.2.4 Watch breakpoint -- 8.2.5 Load breakpoint -- 8.2.6 Line breakpoint -- 8.2.7 Disable breakpoints…”
    Libro electrónico
  3. 1643
    por Consiglio, Andrea
    Publicado 2009
    Tabla de Contenidos: “…1.4.2 Command line interaction1.4.3 The model library; Notes and References; 2 Data Management; 2.1 Preview; 2.2 Basics of Data Handling; 2.2.1 Data entry: SCALARs, PARAMETERs, and TABLEs; 2.2.2 External data files: INCLUDE; 2.2.3 Output: DISPLAY and PUT; 2.3 Data Generation; 2.4 A Complete Example: Portfolio Dedication; 2.4.1 The source file; 2.4.2 The FINLIB files; 3 Mean-Variance Portfolio Optimization; 3.1 Preview; 3.2 Basics of Mean-Variance Models; 3.2.1 Data estimation for the mean-variance model; 3.2.2 Allowing short sales; 3.2.3 The FINLIB files; 3.3 Sharpe Ratio Model…”
    Libro electrónico
  4. 1644
    por Nadeau, Thomas D.
    Publicado 2003
    Tabla de Contenidos: “…The MPLS Forward Equivalency Class to Next-Hop Label Forward Entry MIB (MPLS-FTN MIB); Introduction; 5.1 Who Should Use It; 5.2 IP Traffic In, MPLS Labels Out; 5.3 Forwarding Equivalency Classes…”
    Libro electrónico
  5. 1645
    Publicado 2008
    Tabla de Contenidos: “…Plutarch on the Statesman's Entry in Political Life -- The Education of Rulers in Theory (Mor.) and Practice (Vitae) -- Dion and Brutus: Philosopher Kings Adrift in a Hostile World -- Eunoia bei Plutarch: von den Praecepta Gerendae Reipublicae zu den Viten -- Struggling with the Plêthos: Politics and Military Leadership in Plutarch's Life of Lucullus -- Greek Lawgivers in Plutarch: A comparison Between the Biographical Lycurgus and the Rhetorical Alexander -- 5. …”
    Libro electrónico
  6. 1646
    por Bragg, Steven M.
    Publicado 2007
    Tabla de Contenidos: “…4-2 HOW DO I CONTROL ORDER ENTRY?4-3 HOW DO I CONTROL CREDIT MANAGEMENT?; 4-4 HOW DO I CONTROL PURCHASING?…”
    Libro electrónico
  7. 1647
    por Schmalz, Michael
    Publicado 2005
    Tabla de Contenidos: “…Services and Charges; 12.7. Expense Entry; 12.8. Invoices; 12.9. Letters; 12.10. Income Statements; 12.11. …”
    Libro electrónico
  8. 1648
    por Von Hagen, William
    Publicado 2005
    Tabla de Contenidos: “…Migrating User, Password, and Group Entries to an LDAP Server1.7.4. Updating Client Systems to Use LDAP Authentication; 1.7.5. …”
    Libro electrónico
  9. 1649
    por Bean, James
    Publicado 2009
    Tabla de Contenidos: “…8.2.1 Design Requirements8.2.2 Conceptual Message Design; 8.2.3 Logical Message Design; 8.2.4 Physical Message Design; 8.2.5 Create and Refine Message Schemas; 8.2.6 Create WSDL; 8.3 Model-Driven Interface Design; CHAPTER 9 The Enterprise Taxonomy; 9.1 Focus on Common Business Language for Discovery; 9.2 Broadening and Extending the Taxonomy; 9.3 Registry Entries and Discovery; CHAPTER 10 XML Schema Basics; 10.1 Elements; 10.2 Attributes; 10.3 simpleTypes; 10.4 complexTypes; 10.5 Groups; 10.6 Namespaces; 10.7 Import, Include; CHAPTER 11 XML Schema Design Patterns; 11.1 complexType Patterns…”
    Libro electrónico
  10. 1650
    Publicado 2014
    Tabla de Contenidos: “…Divergence Measuring Market Divergence at the Portfolio Level Testing the Stationarity of Market Divergence The Tradability of Trend The Importance of Entry vs. Exit Summary Further Reading and References Chapter 6: The Role of Interest Rates and the Roll Yield Collateral Yield Decomposition into Roll Yield and Spot Interest Rates and the Roll Yield for Bond Futures Market Divergence and the Roll Yield Commodity Markets and the Roll Yield Summary Further References and Readings Part IV: Trend Following as an Alternative Asset Class Chapter 7: Properties of Trend Following Returns Trend Following as an Alternative Asset Class Crisis Alpha Crisis Beta Key Statistical Properties Summary Featured Readings and References Appendix: A Summary of Common Performance Measures Chapter 8: Characteristics of Drawdowns, Volatility, and Correlation Understanding the Properties of Drawdowns Correlation and Diversification at the Portfolio Level Summary Further Reading and References Chapter 9: The Hidden and Unhidden Risks of Trend Following Directional and Non-Directional Strategies: A Review Defining Hidden and Unhidden Risks The Myths and Mystique of the Sharpe Ratio Unraveling Hidden Risks of Dynamic Leveraging Summary Further Reading and References Chapter 10: Trend Following in Various Macroeconomic Environments Interest Rate Environments Regulatory Forces and Government Intervention Summary Further Reading and References Part V: Benchmarking and Style Analysis Chapter 11: Return Dispersion Strategy Classification and Return Dispersion A Closer Look at Capital Allocation and Position Sizing Return Dispersion from an Investor's Perspective Empirical and Theoretical Considerations for Correlated Return Series Summary Further Readings and References Chapter 12: Index and Style Factor Construction Divergent Risk Taking Revisited Defining a Divergent Trend Following Strategy Constructing Style Factors Characteristics of the Style Factors Summary Further Readings and References Chapter 13: Benchmarking and Style Analysis A Framework for Return based Style Analysis Style Analysis for Individual CTA Managers Sector Level Analysis of the Market Size Factor Manager Selection and Allocation Summary Further Readings and References Part VI: Trend Following in an Investment Portfolio Chapter 14: Portfolio Perspectives on Trend Following A Closer Look at Crisis Alpha The Impact of Mark-to-Market on Correlation Understanding Cyclicality in Managed Futures Summary Further Reading and References Chapter 15: Practicalities of Size, Liquidity, and Capacity Does Size Matter? …”
    Libro electrónico
  11. 1651
    Publicado 2012
    Tabla de Contenidos: “…Putting It All Together -- Chapter 4: Asset Management -- Asset Identification -- Literal and Synthetic Identifiers -- Correlation -- AI Elements -- Helper Elements -- Asset Reporting Format -- Relationship Terms -- ARF Example -- Assessment Summary Results -- System-Ident Model -- Chapter 5: Enumerations -- Automation Enumerations and Their Purposes -- Enumerations Included in SCAP -- Common Configuration Enumeration -- CCE History -- The Purpose of CCE -- CCE Entries -- CCE Submission Process -- CC E and the National Vulnerability Database -- Common Platform Enumeration -- The New CPE 2.3 Stack -- Common Vulnerability and Exposures -- The Birth of CVE -- CVE Editorial Board -- CVE Identifiers -- Common Vulnerability Scoring System -- Other Related Enumerations and Expressions -- Common Weakness Enumeration -- Common Attack Pattern Enumeration and Classification -- Common Malware Enumeration -- Common Event Expression -- Distributed Audit Service -- Common Remediation Enumeration -- Chapter 6: SCAP Vulnerability Measurement -- Common Vulnerability Scoring System -- CVSS History -- CVSS Use Cases -- Vulnerability Characteristics -- CVSS Scoring -- Base Scoring -- Temporal Scores -- Environmental Scores -- Base, Temporal, Environmental Vectors -- CVSS Equations -- Your Mileage May Vary -- Common Vulnerability Reporting Framework (CVRF) -- Common Misuse Scoring System (CMSS) -- Common Configuration Scoring System -- Vulnerability Management in the Enterprise -- Part III: Putting It All Together -- Chapter 7: Building Automated Security Content -- Working with Files -- XML Editors -- Content Maintenance Tools -- Enhanced SCAP Editor (eSCAPe) -- The eSCAPe Wizards -- Opening and Navigating an SCAP Data Stream -- Example: Finding Malware with SCAP -- Example: Creating Content to Check for Malicious File -- Using the Regex Validator Tool…”
    Libro electrónico
  12. 1652
    Publicado 2015
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Table of contents -- Author Biography -- Contributing Editor Biography -- Chapter 1 - US Cybersecurity Jobs -- 1.1 - US cybersecurity job titles -- 1.2 - General "hacker" classifications -- 1.2.1 - White Hat Hacker -- 1.2.2 - Black Hat Hacker -- 1.2.3 - Gray Hat Hacker -- 1.2.4 - Blue Hat Hacker -- 1.2.5 - Blue and Red Teams -- 1.3 - The concept of "being bad to be good" -- 1.4 - Key penetration tester "knowledge, skills, and abilities" (KSA's) -- Chapter 2 - The US Cybersecurity Industry -- 2.1 - Current and expected growth of the cybersecurity industry -- 2.1.1 - Worldwide Cybersecurity Spending -- 2.1.2 - Growth Driver 1: Cybercrime -- 2.1.3 - Growth Driver 2: The Internet-of-Things (IoT) -- 2.1.4 - Growth Driver 3: Cybersecurity is Now a Main Street Issue -- 2.1.5 - Growth Driver 4: Regulatory Compliance -- 2.2 - Employment opportunities -- 2.2.1 - Private Sector Demand -- 2.2.2 - Public Sector Demand -- 2.3 - 2015 Salary guide for cybersecurity professionals -- 2.4 - Entry-level positions -- Chapter 3 - 17 Tips on How to Land Your First Cybersecurity Job -- 3.1 - Tip 1: develop the right attitude -- 3.2 - Tip 2: curiosity is key -- 3.3 - Tip 3: develop technical prowess -- 3.4 - Tip 4: get involved in your local community -- 3.5 - Tip 5: take part in competitions -- 3.6 - Tip 6: join newsletters and read blogs -- 3.7 - Tip 7: master popular hacking tools -- 3.8 - Tip 8: become a Kali Linux power user -- 3.9 - Tip 9: create a home lab -- 3.10 - Tip 10: become a code monkey -- 3.11 - Tip 11: find bugs! …”
    Libro electrónico
  13. 1653
    Publicado 2024
    Tabla de Contenidos: “…Windows -- Android -- iOS and macOS -- Building and testing the iOS target -- Building and testing the macOS target -- Migrating from Xamarin -- Migrating and reusing the Shell template from Xamarin.Forms -- Visual Studio project template -- Summary -- Chapter 3: User Interface Design with XAML -- Technical requirements -- Creating a XAML page -- XAML syntax -- XML declaration -- Element -- Attribute -- XML and XAML namespaces -- Creating a new page using XAML -- Creating the same new page using C# -- XAML markup extensions -- Building a user interface -- Layouts -- StackLayout -- Grid -- FlexLayout -- AbsoluteLayout -- Views -- Label -- Image -- Editor -- Entry -- ListView -- Master-detail UI design -- Side-by-side -- Stacked -- Navigation in the master-detail UI design -- ItemDetailPage -- ItemsPage -- Supporting multiple languages - localization -- Creating a .resx file -- Localizing text -- Summary -- Further reading -- Chapter 4: Exploring MVVM and Data Binding -- Technical requirements -- Understanding MVVM and MVC -- MVVM in PassXYZ.Vault -- Data binding -- Binding object -- Binding target -- Binding source -- Properties of a Binding object -- Source -- Binding mode -- Changing notifications in ViewModels -- .NET Community Toolkit -- How to use the MVVM Toolkit -- Improving the data model and service -- KPCLib -- Abstraction of PwGroup and PwEntry -- PassXYZLib -- Updating the model -- Updating the service -- Binding to collections -- Using custom views -- Summary -- Further reading -- Chapter 5: Navigation Using .NET MAUI Shell and NavigationPage -- Technical requirements -- Implementing navigation -- INavigation interface and NavigationPage -- Using the navigation stack -- Manipulating the navigation stack -- Inserting a page -- Removing a page -- Using Shell -- Flyout -- Flyout items -- Menu items -- Tabs -- Shell navigation…”
    Libro electrónico
  14. 1654
    Publicado 2018
    Tabla de Contenidos: “…The Number.isSafeInteger(number) method -- The Number.EPSILON property -- Doing math -- Trigonometry-related operations -- Arithmetic-related operations -- Exponential operator -- Miscellaneous math methods -- The Math.imul(number1, number2) function -- The Math.clz32(number) function -- The Math.sign(number) function -- The Math.trunc(number) function -- The Math.fround(number) function -- Working with strings -- The repeat(count) method -- The includes(string, index) method -- The startsWith(string, index) method -- The endsWith(string, index) function -- The indexOf(string) function -- The lastIndexOf(string) -- The padStart(length [, padString]) -- The padEnd(length [, padString]) -- Template strings -- Expressions -- Tagged template literals -- Multiline strings -- Raw strings -- Escape sequence problem with template literals -- Arrays -- The Array.from(iterable, mapFunc, this) method -- The Array.of(values...) method -- The fill(value, startIndex, endIndex) method -- The includes() method -- The includes() versus the indexOf() method -- The find(testingFunc) method -- The findIndex(testingFunc) method -- The copyWithin(targetIndex, startIndex, endIndex) function -- The entries(), keys(), and values() methods -- Array iteration -- The map() method -- The filter() method -- forEach() method -- some() method -- Collections -- ArrayBuffer -- Typed arrays -- Set -- WeakSet -- Map -- WeakMap -- Objects -- Object.values() -- Object.entries() -- The __proto__ property -- The Object.is(value1, value2) method -- The Object.setPrototypeOf(object, prototype) method -- The Object.assign(targetObj, sourceObjs...) method -- Object.getOwnPropertyDescriptors() -- Summary -- Chapter 3: Using Iterators -- Symbols - primitive data type -- The typeof operator -- The new operator -- Using symbols as the object property keys -- The Object.getOwnPropertySymbols() method…”
    Libro electrónico
  15. 1655
    Publicado 2019
    Tabla de Contenidos: “…-- Equipment failure -- Platform instability -- Database design flaws -- Data-entry errors -- Operator error -- Taking Advantage of RAID -- Striping -- RAID levels -- Backing Up Your System -- Preparation for the worst -- Full or incremental backup -- Frequency -- Backup maintenance -- Coping with Internet Threats -- Viruses -- Trojan horses -- Worms -- Denial-of-service attacks -- SQL injection attacks -- Phishing scams -- Zombie spambots -- Installing Layers of Protection -- Network-layer firewalls -- Application-layer firewalls -- Antivirus software -- Vulnerabilities, exploits, and patches -- Education -- Alertness -- Chapter 2 Protecting Against User Errors and Conflicts -- Reducing Data-Entry Errors -- Data types: The first line of defense -- Constraints: The second line of defense -- Sharp-eyed humans: The third line of defense -- Coping with Errors in Database Design -- Handling Programming Errors -- Solving Concurrent-Operation Conflicts -- Passing the ACID Test: Atomicity, Consistency, Isolation, and Durability -- Operating with Transactions -- Using the SET TRANSACTION statement -- Starting a transaction -- Committing a transaction…”
    Libro electrónico
  16. 1656
    Publicado 2018
    Tabla de Contenidos: “…-- The Django web framework -- Django design philosophy -- The model layer -- The view layer -- The template layer -- The Django URL dispatcher -- Regular expressions -- A regex website -- Setting up Django -- Starting the project -- Creating users -- Adding the Entry model -- Customizing the admin panel -- Creating the form -- Writing the views -- The home view -- The entry list view -- The form view -- Tying up URLs and views -- Writing the templates -- The future of web development -- Writing a Flask view -- Building a JSON quote server in Falcon -- Summary -- Farewell -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  17. 1657
    Publicado 2005
    Tabla de Contenidos: “…ADDRESS RESOLUTION AND THE TCP/IP ADDRESS RESOLUTION PROTOCOL (ARP) -- Address Resolution Concepts and Issues -- The Need for Address Resolution -- Addressing at Layer 2 and Layer 3 -- General Address Resolution Methods -- Address Resolution Through Direct Mapping -- How Direct Mapping Works -- Problems with Direct Mapping -- Dynamic Address Resolution -- How Dynamic Addressing Works -- Dynamic Address Resolution Caching and Efficiency Issues -- Other Enhancements to Dynamic Resolution -- TCP/IP Address Resolution Protocol (ARP) -- ARP Address Specification and General Operation -- ARP Message Types and Address Designations -- ARP General Operation -- ARP Message Format -- ARP Caching -- Static and Dynamic ARP Cache Entries -- Cache Entry Expiration -- Other Caching Features -- Proxy ARP -- TCP/IP Address Resolution for IP Multicast Addresses -- TCP/IP Address Resolution for IP Version 6 -- 14. …”
    Libro electrónico
  18. 1658
    por Bryant, Russell
    Publicado 2013
    Tabla de Contenidos: “…Hello World -- Building an Interactive Dialplan -- The Goto(), Background(), and WaitExten() Applications -- Handling Invalid Entries and Timeouts -- Using the Dial() Application -- Using Variables -- Pattern Matching -- Includes -- Conclusion -- Chapter 7. …”
    Libro electrónico
  19. 1659
    Publicado 2022
    Tabla de Contenidos: “…-- Designing the store state and actions -- Test-driving a reducer -- Pulling out generator functions for reducer actions -- Setting up a store and an entry point -- Test-driving a saga -- Using expect-redux to write expectations -- Making asynchronous requests with sagas -- Switching component state for Redux state -- Submitting a React form by dispatching a Redux action -- Making use of store state within a component -- Navigating router history in a Redux saga -- Summary -- Exercise -- Further reading -- Chapter 13: Test-Driving GraphQL -- Technical requirements -- Compiling the schema before you begin -- Testing the Relay environment -- Building a performFetch function -- Test-driving the Environment object construction -- Test-driving a singleton instance of Environment -- Fetching GraphQL data from within a component -- Summary -- Exercises -- Further reading -- Part 3 - Interactivity -- Chapter 14: Building a Logo Interpreter -- Technical requirements -- Studying the Spec Logo user interface -- Undoing and redoing user actions in Redux -- Building the reducer -- Building buttons -- Saving to local storage via Redux middleware -- Building middleware -- Changing keyboard focus -- Writing the reducer -- Focusing the prompt -- Requesting focus in other components -- Summary -- Further reading -- Chapter 15: Adding Animation -- Technical requirements -- Designing animation -- Building an animated line component -- Animating with requestAnimationFrame -- Canceling animations with cancelAnimationFrame…”
    Libro electrónico
  20. 1660
    Publicado 2024
    Tabla de Contenidos: “…Ingress API - event -- Ingress API - command -- Egress SPI - webhook -- Egress API - query -- Tackling common data challenges -- Idempotence -- Enriching data -- Latching and cross-referencing -- Slow data resync -- Summary -- Chapter 8: Reacting to Events with More Events -- Promoting inter-service collaboration -- Choreography's pros and cons -- Dissecting the Control Service pattern -- collect -- correlate -- collate -- evaluate -- emit -- expire -- Orchestrating business processes -- Entry and exit events -- Parallel execution -- Employing the Saga pattern -- Compensating transactions -- Abort events -- Calculating event-sourcing snapshots -- What is ACID 2.0? …”
    Libro electrónico