Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer programs 101
- Development 92
- Engineering & Applied Sciences 88
- Application software 85
- Economics 70
- Computer networks 67
- Computer Science 63
- Business 56
- Computer security 56
- Examinations 55
- Database management 54
- Management 52
- History 50
- Certification 45
- Data processing 44
- Operating systems (Computers) 44
- Security measures 43
- Electronic data processing personnel 40
- Design 37
- Programming 37
- Accounting 36
- Business & Economics 35
- Photography 35
- Historia 34
- Finance 33
- Python (Computer program language) 32
- Web site development 31
- Linux 30
- Microsoft Excel (Computer file) 30
- Digital techniques 28
-
1661Publicado 2021Tabla de Contenidos: “…-- Sorting out equipment -- Taking the Make-or-Buy Decision -- Making it yourself - pros and cons -- Outsourcing - a low investment option -- Setting quality standards -- Choosing a Supplier -- Evaluating trading terms -- Building a relationship -- Buying online -- Minimising Risk and Assessing Liability -- Protecting your employees -- Covering yourself against an employee suing -- Protecting assets -- Covering loss of profits -- Goods in transit -- Protecting yourself -- Guaranteeing goods and services -- Dissecting Directors -- Finding and Choosing Business Advisers -- Tallying up an accountant -- Investing in a bank -- Soliciting for a lawyer -- Managing a consultant -- Taking Cyber Security Seriously -- Recognising common types of cyber crime -- Adopting preventative measures -- Making a Virtue Out of Going Green -- Chapter 13 Keeping Track of Finances -- Keeping the Books -- Recording financial information -- Starting simple with single entry -- Dealing with double entry…”
Libro electrónico -
1662por David K. EitemanTabla de Contenidos: “…Tax Law Change in 2017 -- Summary Points -- Mini-Case: Apple's Global iTax Strategy -- Questions -- Problems -- Internet Exercises -- Chapter 16 International Trade Finance -- 16.1 The Trade Relationship -- 16.2 Key Documents -- 16.3 Government Programs to Help Finance Exports -- 16.4 Trade Financing Alternatives -- 16.5 Forfaiting -- Summary Points -- Mini-Case: Crosswell International and Brazil -- Questions -- Problems -- Internet Exercises -- PART 5 Foreign Investments and Investment Analysis -- Chapter 17 Foreign Direct Investment and Political Risk -- 17.1 The Foreign Direct Investment Decision -- 17.2 Structural Choices for Foreign Market Entry -- 17.3 Political Risk: Definition and Classification -- 17.4 Financial Impacts of Political Risk -- 17.5 Political Risk Mitigation -- Summary Points -- Mini-Case: Tengiz-The Definition of Political Risk -- Questions -- Internet Exercises -- Chapter 18 Multinational Capital Budgeting and Cross-Border Acquisitions -- 18.1 Complexities of Budgeting for a Foreign Project -- 18.2 Illustrative Case: Cemex Enters Indonesia -- 18.3 Real Option Analysis -- 18.4 Project Financing -- 18.5 Cross-Border Mergers and Acquisitions -- Summary Points -- Mini-Case: Elan and Royalty Pharma -- Questions -- Problems -- Internet Exercises -- Answers to Selected End-of-Chapter Problems -- Glossary -- Index…”
Publicado 2021
Libro electrónico -
1663Publicado 2018Tabla de Contenidos: “…VLAN Trunking Protocol -- Troubleshooting VLANs -- General troubleshooting tips -- Verifying switch configuration -- Verifying pfSense configuration -- Summary -- Questions -- Chapter 4: Using pfSense as a Firewall -- Technical requirements -- An example network -- Firewall fundamentals -- Firewall best practices -- Best practices for ingress filtering -- Best practices for egress filtering -- Creating and editing firewall rules -- Floating rules -- Example rules -- Example 1 - block a website -- Example 2 - block all traffic from other networks -- Example 3 - the default allow rule -- Scheduling -- An example schedule entry -- Aliases -- Creating aliases from a DNS lookup -- Bulk import -- Virtual IPs -- Troubleshooting firewall rules -- Summary -- Questions -- Chapter 5: Network Address Translation -- Technical requirements -- NAT essentials -- Outbound NAT -- Example - filtering outbound NAT for a single network -- 1:1 NAT -- Example - mapping a file server -- Port forwarding -- Example 1 - setting up DCC -- Example 2 - excluding a port -- Example 3 - setting up a personal web server -- Network Prefix Translation -- Example - mapping an IPv6 network -- Troubleshooting -- Summary -- Questions -- Chapter 6: Traffic Shaping -- Technical requirements -- Traffic shaping essentials -- Queuing policies -- Priority queuing -- Class-based queuing -- Hierarchical Fair Service Curve -- Configuring traffic shaping in pfSense -- The Multiple LAN/WAN Configuration wizard -- The Dedicated Links wizard -- Advanced traffic shaping configuration -- Changes to queues -- Limiters -- Layer 7 traffic shaping -- Adding and changing traffic shaping rules -- Example 1 - modifying the penalty box -- Example 2 - prioritizing EchoLink -- Traffic shaping examples -- Example 1 - adding limiters -- Example 2 - penalizing peer-to-peer traffic -- Using Snort for traffic shaping…”
Libro electrónico -
1664Publicado 2018Tabla de Contenidos: “…How SAP Automation affects data entry jobs -- Examples where SAP automation is used commonly -- Java plugin -- Why are we using the Java plugin with UiPath Studio? …”
Libro electrónico -
1665Publicado 2021Tabla de Contenidos: “…Bypassing JavaScript Validation -- SQL Injection -- Querying the Database -- Bypassing the Login Page -- Execute Database Commands Using SQLi -- SQL Injection Automation with SQLMap -- Testing for SQL Injection -- Command Injection -- File Inclusion -- Local File Inclusion -- Remote File Inclusion -- Cross-Site Request Forgery -- The Attacker Scenario -- The Victim Scenario -- File Upload -- Simple File Upload -- Bypassing Validation -- Encoding -- OWASP Top 10 -- Summary -- Chapter 9 Web Penetration Testing and Secure Software Development Lifecycle -- Web Enumeration and Exploitation -- Burp Suite Pro -- Web Pentest Using Burp Suite -- More Enumeration -- Nmap -- Crawling -- Vulnerability Assessment -- Manual Web Penetration Testing Checklist -- Common Checklist -- Special Pages Checklist -- Secure Software Development Lifecycle -- Analysis/Architecture Phase -- Application Threat Modeling -- Assets -- Entry Points -- Third Parties -- Trust Levels -- Data Flow Diagram -- Development Phase -- Testing Phase -- Production Environment (Final Deployment) -- Summary -- Chapter 10 Linux Privilege Escalation -- Introduction to Kernel Exploits and Missing Configurations -- Kernel Exploits -- Kernel Exploit: Dirty Cow -- SUID Exploitation -- Overriding the Passwd Users File -- CRON Jobs Privilege Escalation -- CRON Basics -- Crontab -- Anacrontab -- Enumerating and Exploiting CRON -- sudoers -- sudo Privilege Escalation -- Exploiting the Find Command -- Editing the sudoers File -- Exploiting Running Services -- Automated Scripts -- Summary -- Chapter 11 Windows Privilege Escalation -- Windows System Enumeration -- System Information -- Windows Architecture -- Listing the Disk Drives -- Installed Patches -- Who Am I? …”
Libro electrónico -
1666Publicado 2021Tabla de Contenidos: “…. -- How it works... -- Interactive text entry with Input Field -- How to do it... -- How it works... -- There's more... -- Toggles and radio buttons via toggle groups -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating text and image icon UI Drop-down menus -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding images to a Dropdown control -- Displaying a radar to indicate the relative locations of objects -- Getting ready -- How to do it... -- How it works... -- The Start() method -- The Update() method -- The FindAndDisplayBlipsForTag(...) method -- The CalculateBlipPositionAndDrawBlip (...) method -- The NormalizedPosition(...) method -- The CalculateBlipPosition(...) method -- The DrawBlip() method -- There's more... -- Chapter 3: Inventory and Advanced UIs -- Technical requirements -- Creating a simple 2D mini-game - SpaceGirl -- Getting ready -- How to do it... -- How it works... -- Displaying single object pickups with carrying and not-carrying text -- Getting ready -- How to do it... -- How it works... -- The PlayerInventory script class -- The PlayerInventoryDisplay script class -- There's more... -- Collecting multiple items and display the total number carried -- Alternative - combining all the responsibilities into a single script -- Displaying single-object pickups with carrying and not-carrying icons -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
1667Publicado 2017“…Examine the techniques and Java tools supporting the growing field of data science About This Book Your entry ticket to the world of data science with the stability and power of Java Explore, analyse, and visualize your data effectively using easy-to-follow examples Make your Java applications more capable using machine learning Who This Book Is For This book is for Java developers who are comfortable developing applications in Java. …”
Libro electrónico -
1668Publicado 2019Tabla de Contenidos: “…A.3 Common x86 Instructions -- A.4 Common Code Constructs in Assembly -- B IMPLEMENTING PT_NOTE OVERWRITING USING LIBELF -- B.1 Required Headers -- B.2 Data Structures Used in elfinject -- B.3 Initializing libelf -- B.4 Getting the Executable Header -- B.5 Finding the PT_NOTE Segment -- B.6 Injecting the Code Bytes -- B.7 Aligning the Load Address for the Injected Section -- B.8 Overwriting the .note.ABI-tag Section Header -- B.9 Setting the Name of the Injected Section -- B.10 Overwriting the PT_NOTE Program Header -- B.11 Modifying the Entry Point -- C LIST OF BINARY ANALYSIS TOOLS -- C.1 Disassemblers -- C.2 Debuggers -- C.3 Disassembly Frameworks -- C.4 Binary Analysis Frameworks -- D FURTHER READING -- D.1 Standards and References -- D.2 Papers and Articles -- D.3 Books -- INDEX…”
Libro electrónico -
1669Publicado 2016“…In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. …”
Libro electrónico -
1670por Leurs, Koen“…Doing Digital Migration present a comprehensive entry point to the variety of theoretical debates, methodological interventions, political discussions and ethical debates around migrant forms of belonging as articulated through digital practices. …”
Publicado 2024
Libro electrónico -
1671Publicado 2017Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Contents -- List of Contributors -- Series Preface -- Preface -- Companion Website -- Chapter 1 Advanced UAV Aerodynamics, Flight Stability and Control:: An Introduction -- 1.1 Unmanned Aircraft Aerodynamics -- 1.2 UAV Flight Stability and Control -- Chapter 2 Aerodynamics of UAV Configurations -- 2.1 Introduction -- 2.2 Emerging Technologies in UAV Aerodynamics -- 2.3 Aerodynamics and Stealth Compromises -- 2.4 Rotor Blade Tip Aerodynamics -- 2.5 Flight Dynamics of Canard Aircraft -- 2.6 Aerodynamics of the UCAV 1303 Delta‐wing Configuration -- 2.7 Flow Structure Modification using Plasma Actuators -- 2.8 Conclusion -- References -- Part I Novel Concepts in Unmanned Aircraft Aerodynamics -- 1.1 Fixed-wing (airplanes) -- Chapter 3 Aerodynamic Performance Analysis of Three Different Unmanned Re-entry Vehicles -- 3.1 Introduction -- 3.2 Vehicle Description -- 3.3 Flight Scenario and Flow‐regime Assessment -- 3.4 Rarefied and Transitional Regimes -- 3.5 Viscous-interaction Regime -- 3.6 High-temperature Real-gas Regime -- 3.7 Laminar-to-turbulent Transition Assessment -- 3.8 Design Approach and Tools -- 3.9 Aerodynamic Characterization -- 3.10 Low-order Methods Aerodynamic Results -- 3.11 CFD-based Aerodynamic Results -- References -- Chapter 4 Nonlinear Reduced-order Aeroservoelastic Analysis of Very Flexible Aircraft -- 4.1 Introduction -- 4.2 Large Coupled Computational Models -- 4.3 Coupled Reduced-order Models -- 4.4 Control System Design -- 4.5 Conclusion -- 4.6 Exercises -- References -- Chapter 5 Unmanned Aircraft Wind Tunnel Testing -- 5.1 Introduction -- 5.2 The Diana UAV Project -- 5.3 Experimental Facility -- 5.4 Force and Moment Measurements -- 5.5 Wind Tunnel and CFD Comparisons -- 5.6 Flow Visualization -- 5.7 Summary and Conclusions -- Acknowledgments -- References…”
Libro electrónico -
1672Publicado 2017Tabla de Contenidos: “…Notes -- Part III: Applying Chart Analysis to Trading -- Chapter 12: Midtrend Entry and Pyramiding -- Chapter 13: Choosing Stop-Loss Points -- Note -- Chapter 14: Setting Objectives and Other Position Exit Criteria -- Chart-Based Objectives -- Measured Move -- Rule of Seven -- Support and Resistance Levels -- Overbought/Oversold Indicators -- DeMark Sequential -- Contrary Opinion -- Trailing Stops -- Change of Market Opinion -- Note -- Chapter 15: The Most Important Rule in Chart Analysis -- Failed Signals -- Bull and Bear Traps -- False Trend Line Breakouts -- Return to Spike Extremes -- Return to Wide-Ranging Day Extremes -- Counter-to-Anticipated Breakout of Flag or Pennant -- Opposite Direction Breakout of Flag or Pennant Following a Normal Breakout -- Penetration of Top and Bottom Formations -- Breaking of Curvature -- The Future Reliability of Failed Signals -- Conclusion -- Part IV: Trading Systems and Performance Measurement -- Chapter 16: Technical Trading Systems: Structure and Design: -- The Benefits of a Mechanical Trading System -- Three Basic Types of Systems -- Trend-Following Systems -- Ten Common Problems with Standard Trend-Following Systems -- Possible Modifications for Basic Trend-Following Systems -- Countertrend Systems -- Diversification -- Ten Common Problems with Trend-Following Systems Revisited -- Notes -- Chapter 17: Examples of Original Trading Systems -- Wide-Ranging-Day System -- Run-Day Breakout System -- Run-Day Consecutive Count System -- Conclusion -- Notes -- Chapter 18: Selecting the Best Futures Price Series for System Testing -- Actual Contract Series -- Nearest Futures -- Constant-Forward ("Perpetual") Series -- Continuous (Spread-Adjusted) Price Series -- Comparing the Series -- Conclusion -- Notes -- Chapter 19: Testing and Optimizing Trading Systems -- The Well-Chosen Example…”
Libro electrónico -
1673Publicado 2023Tabla de Contenidos: “…Reporting and Analytics -- Data Life Cycle -- Misaligning Data Governance and Data Management -- Data Governance and Data Management Summary -- Chapter 4 Priorities -- Results You Can Expect Using the Most Common Approaches to Prioritization -- The List -- Level -- Volume -- Lunch -- Communication -- Emergency -- A Disciplined Approach to Priorities -- Business Value -- Achievability -- Utilizing the Model -- University - Formal Weighted Model -- Retailer - A Different Approach -- Priorities Summary -- Chapter 5 Common Starting Points -- Results You Can Expect With Too Many Entry Points -- Building a Data Portfolio -- Metadata -- Metadata Categories -- Business Metadata -- Technical Metadata -- Operational Metadata -- Data Quality -- Business Definition -- Data Element -- Data Record -- Data Movement -- Data Profiling -- Common Starting Points Summary -- Chapter 6 Data Governance Planning -- Results You Can Expect Without Planning -- Defining Objectives -- Our Objectives -- Defining Guiding Principles -- Data Governance Planning Summary -- Chapter 7 Organizational Framework -- Results You Can Expect When There Is No Defined Organizational Structure -- Organizational Framework Roles -- Support -- Oversight -- Operations -- Facilitation -- Defining a Framework -- Data Governance Steering Committee -- Program Management -- Data Owner -- Working Group -- Data Stewardship -- Data Management -- Aligning the Model to Existing Structures -- Leadership Team -- Data Manager Team -- Domain Definitions - Student -- Domain Definitions - Business Operations -- Domain Definitions - External -- Data Manager -- Data Steward -- Ad-Hoc Working Group -- Data Governance Management -- Technical Data Operations -- Aligning the Framework to the Culture -- Data Governance Steering Committee -- Data Governance Sub-Committee -- Data Governance Office -- Data Steward…”
Libro electrónico -
1674Publicado 2020Tabla de Contenidos: “…Calculating the occupational entry restrictions indicator -- References -- 7 Tourism activities -- 7.1. …”
Libro electrónico -
1675Publicado 2006Tabla de Contenidos: “…2.3.20 Charging reference points3 IMS concepts; 3.1 Overview; 3.2 Registration; 3.3 Mechanism to register multiple user identities at a go; 3.4 Session initiation; 3.5 Identification; 3.5.1 Identification of users; 3.5.2 Identification of services (public service identities); 3.5.3 Identification of network entities; 3.6 Identity modules; 3.6.1 IP Multimedia Services Identity Module (ISIM); 3.6.2 Universal Subscriber Identity Module (USIM); 3.7 Sharing a single user identity between multiple devices; 3.8 Discovering the IMS entry point; 3.9 S-CSCF assignment…”
Libro electrónico -
1676Foundations of Indian psychology Volume 2, Practical applications Volume 2, Practical applications /Publicado 2011Tabla de Contenidos: “…Sri Aurobindo's ideas on education -- The present research -- Gaining entry -- Mirambika: The physical ecology -- A day at Mirambika -- Diyas-Teachers in school -- Organising the school processes -- Classrooms: The context of learning -- Teaching and learning through projects -- Flexibility in work -- The child: An active learner -- Negotiations at work -- Disciplining strategies -- Conclusion -- Suggestions for future research -- Endnote -- References -- Section 3: Social issues -- Introduction -- Chapter 12: Exploring the images used for the individual-organization interface: Experiences and reflections -- Introduction -- The human side of organizations -- Functional and dysfunctional aspects of these images -- Employee as family member -- Employee as team member -- Employee as internal customer -- Employee as commodity -- Employee as resource -- Uncovering underlying assumptions of person-organization relations -- Indian organizations and cultural disparities -- Study I: Employee retention in the call centre industry (Singh & Prakash, 2004) -- A 25-year-old agent staying with her parents: -- Another interviewee: -- Study II: Stress among personnel working in call centres (Tandon & Prakash, 2004) -- Images of the organization -- Social disconnect -- Study III: Disinvestment process in ITDC (Sehgal & Prakash, 2004) -- The meaning of work -- Possibility of an integrative approach -- Concluding comments -- References -- Chapter 13: Broadening of consciousness: A healing process among the survivors of the Kachchh earthquake -- Cultural-psychological perspective on health and illness -- 'Broadening of consciousness' as healing: What literature says -- Method -- Participants -- Data collection and analysis -- Constructions of health and illness in Selari village -- (a) Exercising one's potentialities to the fullest…”
Libro electrónico -
1677por Duening, Thomas N.Tabla de Contenidos: “…3.1.5 The Network Effect3.2 Value Creation in the Global Economy; 3.2.1 Creating Market Value; 3.2.2 Creating Enterprise Value; 3.2.3 Value Protection in Technology Ventures; 3.3 Value Capture in the Global Economy; 3.3.1 Capturing Market Value; 3.3.2 Capturing Enterprise Value; 3.4 Global Market Entry Strategies; 3.4.1 Exporting; 3.4.2 Licensing; 3.4.3 Joint Ventures; 3.4.4 Strategic Alliances; 3.4.5 Trading Companies; 3.4.6 Countertrading; 3.4.7 Direct Ownership; PART II: LEGAL STRUCTURE AND CAPITAL; CHAPTER 4 Legal Structure and Equity Distribution; 4.1 Ownership and Liability Issues…”
Publicado 2010
Libro electrónico -
1678Publicado 2018Tabla de Contenidos: “…-- Setting up a Dialogflow router -- Setting up a Dialogflow webhook entry point -- Refactoring the BuildGetCookingInstruction function -- Refactoring the GetOffset function -- Deploying and testing Henry's Kitchen -- Summary -- Chapter 9: Building a Voice-Enabled Podcast for the Car -- Learning about Xamarin -- Setting up the development environment -- Creating a new Xamarin project -- Setting up the Xamarin project for Android Auto -- Building Android Auto MyPodCast -- Building MusicService -- Implementing MusicService (Android MediaBrowserService) -- Implementing MusicPlayer -- Building MusicProvider -- Building an Android Media Player UI -- Testing Using Android Phone -- Summary -- Chapter 10: Hosting and Enhancing the Android Auto Podcast -- Enhancing a MusicProvider -- Creating a Node.js backend server -- Creating and adding the podcasts to the Microsoft Azure blob storage -- Refactoring the GetSource() method in MusicProvider -- Testing Android Auto using the Desktop-Header unit -- Testing the Podcast's Application in the Car -- Basic Voice Commands -- Certifying Android Auto -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
1679por Sreenivasan, N. S.Tabla de Contenidos: “…Screening/review of process -- Conclusion -- Annexure 5A -- Chapter 6: Process Analysis Through Flow Chart -- Flow chart: technique -- Flow chart: analysis -- Case 1: Process of rewinding burnt motors -- Case 2: Complaints from outpatients at a hospital -- Process-centred approach -- Conclusion -- Chapter 7: Process Analysis: Interfering Factors and Action -- Process interference -- Checklist of interfering factors -- Interferences: applicability and analysis -- Illustrative examples -- Illustration 1 -- Illustration 2 -- Illustration 3 -- Relevance to continual improvement project/problem -- Conclusion -- Chapter 8: Process Analysis for Defect Prevention -- Process review -- Reference base-listing for review of process -- Human dignity -- Unhygienic features -- Housekeeping -- Mistake proofing -- Process consumables -- 'Clearance gate' for process entry -- Misinterpretation of drawing, SOP, WI -- Gaps in defect prevention measures -- 1) Defect identification and detection analysis -- 2) Defect detection and control by operator -- 3) Defect control review -- 4) Defect prevention and dominant pattern -- Integration of review results -- Gaps in customer linkage -- Hidden defects -- Process capability -- Conclusion -- Annexure 8A: Self-control: an evaluation as applicable to manufacturing -- Chapter 9: Process Analysis for Gaps in Specification -- Specification -- Gap analysis: listing of gaps in specification -- Clarity of requirements -- Test and evaluation methods -- Rationale of a requirement-concern for customer -- Health and environmental requirement -- Safe requirement of dispatch -- Process(es) -- Material(s) -- Requirement compatibility (with usage conditions) -- Requirement and customer complaint -- Mandatory rules and regulations -- Quality critical to customer -- Juranian classification of customer quality needs…”
Publicado 2007
Libro electrónico -
1680Publicado 2022Tabla de Contenidos: “…-- Notes -- Chapter 10 Strategic Business Partnerships: When Two Work as One -- Committing for the Long Haul: Strategic Brand-to-Brand Partnerships -- Entry-Level SB2B Partnerships: Based on a Promotion -- Complex SB2B Partnerships: Based on a Product Integration -- Is Your Company Ready for SB2B Partnerships? …”
Libro electrónico