Mostrando 696,201 - 696,220 Resultados de 696,576 Para Buscar '"P.S.S."', tiempo de consulta: 1.49s Limitar resultados
  1. 696201
    Publicado 2023
    Tabla de Contenidos: “…Chapter 4 Feel the Love: Welcoming Commodities into Your Portfolio -- The Color of Money: Taking Control of Your Financial Life -- Looking Ahead: Creating a Financial Road Map -- Figuring out your net worth -- Identifying your tax bracket -- Determining your appetite for risk -- Making Room in Your Portfolio for Commodities -- Fully Exposed: The Top Ways to Get Exposure to Commodities -- Looking toward the future with commodity futures -- Commodity index -- Futures commission merchant -- Commodity trading advisor -- Commodity pool operator -- Funding your account with commodity funds -- Commodity mutual funds -- Exchange-traded funds -- You're in good company: Investing in commodity companies -- Publicly traded companies -- Master limited partnerships -- Part 2 Getting Started with Types of Investment Vehicles -- Chapter 5 Benefiting from Exchange-Traded Funds -- Getting to Know ETFs -- Accessing a Variety of Commodity Markets through ETFs -- Taking a Look at Leveraged ETFs -- Chapter 6 Making a Splash: Investing in Liquid Commodity Instruments -- Checking Out Commodity Indexes -- Why indexes are useful -- How to make money by using an index -- From Head to Toe: Uncovering the Anatomy of a Commodity Index -- Cataloguing the Five Major Indexes -- The S&amp -- P Goldman Sachs Commodity Index -- Reuters/Jefferies Commodity Research Bureau Index -- Dow Jones Commodity Index -- Rogers International Commodities Index -- Deutsche Bank Liquid Commodity Index -- Determining Which Index to Use -- Chapter 7 Show Me the Money! …”
    Libro electrónico
  2. 696202
    Publicado 2015
    Tabla de Contenidos: “…239 8.4 Bayesian Model Selection 274 8.5 SMC Samplers Estimators of Model Evidence 276 8.6 Multiple Risk Dependence Structure Model Selection: Copula Choice 277 9 Flexible Parametric Severity Models: Basics 289 9.1 Motivation for Flexible Parametric Severity Loss Models 289 9.2 Context of Flexible Heavy Tailed Loss Models in OpRisk and Insurance LDA Models 290 9.3 Empirical Analysis Justifying Heavy Tailed Loss Models in OpRisk 292 9.4 Flexible Distributions for Severity Models in OpRisk 294 9.5 Quantile Function Heavy Tailed Severity Models 294 9.6 Generalized Beta Family of Heavy Tailed Severity Models 321 9.7 Generalized Hyperbolic Families of Heavy Tailed Severity Models 328 9.8 Halphen Family of Flexible Severity Models: GIG and Hyperbolic 338 10 Modelling Dependence 353 10.1 Dependence Modelling Within and Between LDA Model Structures 353 10.2 General Notions of Dependence 358 10.3 Dependence Measures and Tail Dependence 364 10.4 Introduction to Parametric Dependence Modeling Through a Copula 380 10.5 Copula Model Families for OpRisk 387 10.6 Copula Parameter Estimation in Two Stages: Inference For the Margins 416 10.7 Multiple Risk LDA Compound Poisson Processes and Levy Copula 420 10.8 Multiple Risk LDA: Dependence Between Frequencies via Copula 425 10.9 Multiple Risk LDA: Dependence Between the k-th Event Times/Losses 425 10.10 Multiple Risk LDA: Dependence Between Aggregated Losses via Copula 430 10.11 Multiple Risk LDA: Structural Model with Common Factors 432 10.12 Multiple Risk LDA: Stochastic and Dependent Risk Profiles 434 10.13 Multiple Risk LDA: Dependence and Combining Different Data Sources 437 10.14 A Note on Negative Diversification and Dependence Modelling 445 11 Loss Aggregation 447 11.1 Introduction 447 11.2 Analytic Solution 448 11.3 Monte Carlo Method 454 11.4 Panjer Recursion 457 11.5 Panjer Extensions 462 11.6 Fast Fourier Transform 463 11.7 Closed-Form Approximation 466 11.8 Capital Charge Under Parameter Uncertainty 471 12 Scenario Analysis 477 12.1 Introduction 477 12.2 Examples of Expert Judgements 480 12.3 Pure Bayesian Approach (Estimating Prior) 482 12.4 Expert Distribution and Scenario Elicitation: learning from Bayesian methods 484 12.5 Building Models for Elicited Opinions: Heirarchical Dirichlet Models 487 12.6 Worst Case Scenario Framework 489 12.7 Stress Test Scenario Analysis 492 12.8 Bow-Tie Diagram 495 12.9 Bayesian Networks 497 12.10 Discussion 504 13 Combining Different Data Sources 507 13.1 Minimum variance principle 508 13.2 Bayesian Method to Combine Two Data Sources 510 13.3 Estimation of the Prior Using Data 528 13.4 Combining Expert Opinions with External and Internal Data 530 13.5 Combining Data Sources Using Credibility Theory 546 13.6 Nonparametric Bayesian approach via Dirichlet process 556 13.7 Combining using Dempster-Shafer structures and p-boxes 558 13.8 General Remarks 567 14 Multifactor Modelling and Regression for Loss Processes 571 14.1 Generalized Linear Model Regressions and the Exponential Family 571 14.2 Maximum Likelihood Estimation for Generalized Linear Models 573 14.3 Bayesian Generalized Linear Model Regressions and Regularization Priors 576 14.4 Bayesian Estimation and Model Selection via SMC Samplers 583 14.5 Illustrations of SMC Samplers Model Estimation and Selection for Bayesian GLM Regressions 585 14.6 Introduction to Quantile Regression Methods for OpRisk 590 14.7 Factor Modelling for Industry Data 597 14.8 Multifactor Modelling under EVT Approach 599 15 Insurance and Risk Transfer: Products and Modelling 601 15.1 Motivation for Insurance and Risk Transfer in OpRisk 602 15.2 Fundamentals on Insurance Product Structures for OpRisk 604 15.3 Single Peril Policy Products for OpRisk 609 15.4 Generic Insurance Product Structures for OpRisk 611 15.5 Closed Form LDA Models with Insurance Mitigations 621 16 Insurance and Risk Transfer: Pricing 663 16.1 Insurance Linked Securities and Catastrophe Bonds for OpRisk 664 16.2 Basics of Valuation of Insurance Linked Securities and Catastrophe Bonds for OpRisk 679 16.3 Applications of Pricing Insurance Linked Securities and Catastrophe Bonds 709 16.4 Sidecars, Multiple Peril Baskets and Umbrellas for OpRisk 726 16.5 Optimal Insurance Purchase Strategies for OpRisk Insurance via Multiple Optimal Stopping Times 733 A. …”
    Libro electrónico
  3. 696203
    por Belew, Shannon
    Publicado 2024
    Tabla de Contenidos: “…Safety for young users -- Other online policies -- Complying With the Law -- Let's talk about GDPR -- The importance of ADA -- Lesser known policies that could incur fines -- Book 2 Legal and Accounting -- Chapter 1 Minding the Law -- Keeping Your Business Legal -- Federal tax identification number -- Resale certificate -- Business bank account -- Employee forms -- Zoning for Business (at Home) -- Obtaining Business Licenses -- Chapter 2 Choosing the Right Foundation: From Partnerships to Corporations -- Strategizing for the Best Organization -- Operating Alone as a Sole Proprietor -- Fictitious name registration -- Marriage and the sole proprietorship -- Sharing the Load with a Partnership -- Limited Liability Company -- Making It Official with Incorporation -- Different flavors of corporations -- The choice to incorporate -- Changing Your Organization as It Grows -- Chapter 3 The Trademark-and- Copyright Two-Step -- Understanding Why Trademarks and Copyrights Matter -- Making Your (Trade)Mark -- Protecting Your Investment with Copyrights -- Establishing Registration Yourself -- Getting your trademark -- Filing for copyright -- Retaining Professional Assistance -- Chapter 4 Accounting for Taxes (and Then Some) -- The Tax Man Cometh - Again and Again -- Income tax -- Employment tax -- Sales tax -- By the Numbers: Accounting Basics -- Determining periods and methods -- And now, your balance sheet -- A quick glimpse: The P&amp -- L -- Choosing Software to Make Your Tasks Easy -- Going online? …”
    Libro electrónico
  4. 696204
    Publicado 2025
    Tabla de Contenidos: “…Keyboard -- Attaching a keyboard -- Examining the typical PC keyboard -- Reviewing laptop keyboard layout -- Controlling keyboard behavior keys -- Finding the laptop's secret numeric keypad -- The Pointing Device -- Connecting a pointing device -- Reviewing basic mouse parts -- Moving the mouse -- Using a touchpad -- Wielding a digital pen -- Changing pointing device settings -- Use the mouse left-handed -- Adjust the scroll wheel -- Set touchpad options -- Additional mouse settings -- Touchscreen Input -- Reviewing touchscreen techniques -- Typing on a touchscreen -- Voice Input -- Chapter 11 System Expansion -- The Versatile USB Port -- Reviewing USB standards - and colors -- Knowing the USB cable connector varieties -- Adding and removing USB peripherals -- Using hubs to expand the USB universe -- Working with USB-powered gizmos -- Expansion Slots -- Shopping for expansion cards -- Installing an expansion card -- Wireless Connections with Bluetooth -- Accessing Bluetooth controls -- Pairing a Bluetooth peripheral -- Unpairing a Bluetooth device -- The Laptop Becomes a Desktop -- Using a full-size keyboard and mouse -- Adding a monitor -- Running the laptop with its lid closed -- Chapter 12 P Is for Printer -- Step Aside, Gutenberg -- Surveying the printer landscape -- Touring the typical printer -- Drinking ink -- Eating paper -- Choosing the proper paper -- The Union of Printer and PC -- Connecting the printer…”
    Libro electrónico
  5. 696205
    Publicado 2017
    Tabla de Contenidos: “…10.6.1 Chemical Nonequilibrium Turbulent Flow in a Scramjet Nozzle -- 10.6.1.1 Some Results -- 10.6.2 Shock Wave-Boundary Layer Interactions -- 10.7 CONCLUSIONS -- REFERENCES -- 11 - Measuring Techniques -- 11.1 INTRODUCTION -- 11.2 TEMPERATURE MEASUREMENT -- 11.3 FLOW MEASUREMENT -- 11.3.1 Typical Flow Meters -- 11.3.2 Two-Phase Flow Measurements -- 11.3.3 Microscale Fluid Flow Measurement -- 11.4 LIQUID MASS GAUGING IN MICROGRAVITY -- 11.4.1 Review -- 11.4.2 Compression of Mass Gauging -- 11.4.2.1 Description of Ground Experiments -- 11.4.2.1.1 Experimental Apparatus -- 11.4.2.1.2 Experimental Procedures -- 11.4.2.2 Test Results and Discussion -- 11.4.2.2.1 Normal Tests -- 11.4.2.2.2 Attitude Disturbance Tests -- 11.4.2.2.3 Heat Transfer Tests -- 11.4.3 Summary and Concluding Remarks -- REFERENCES -- 1: Governing Equations for Momentum, Mass, and Energy Transport -- A1.1 CONTINUITY EQUATION (MASS CONSERVATION EQUATION) -- A1.2 THE NAVIER-STOKES EQUATIONS -- A1.2.1 The Stress Tensor σij -- A1.2.2 The Navier-Stokes Equations for Two-Dimensional and Incompressible Flows -- A1.2.3 Derivation of the Complete Temperature Field Equation -- A1.2.3.1 Determination of ΔE ̇ -- A1.2.3.2 Determination of the Heat Transfer Rate Q ̇ -- A1.2.3.3 Determination of the Work Rate W ̇ -- A1.2.3.3.1 The Energy Equation in its Primary Form -- A1.2.3.3.2 Rewriting the Energy Equation -- A1.3 THE BOUNDARY LAYER FORM OF THE TEMPERATURE FIELD EQUATION -- A1.4 BOUNDARY LAYER EQUATIONS FOR THE LAMINAR CASE -- A1.5 DIMENSIONLESS GROUPS AND RULES OF SIMILARITY -- REFERENCES -- 2: Dimensionless Numbers of Relevance in Aerospace Heat Transfer -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Back Cover…”
    Libro electrónico
  6. 696206
    Publicado 2011
    Tabla de Contenidos: “…14.1 Introduction 409 -- 14.2 Standardization 412 -- 14.3 Frequency Bands 415 -- 14.4 Architecture 417 -- 14.5 Wireless Message Flow and Protocol Stack 424 -- 14.6 Wireline Message Flow and Protocol Stacks 433 -- 14.7 Identifiers 434 -- 14.8 HARQ Procedure 435 -- 14.9 Scrambling Sequences 439 -- 14.10 Physical Layer (PHY) 439 -- 14.11 PHY Structure 444 -- 14.12 PHY TDD 457 -- 14.13 Multimedia Broadcast/Multicast Service (MBMS) 457 -- 14.14 Call Placement Scenario 461 -- 14.15 PHY Characteristics and Performance 463 -- 14.16 Multiple Antennas in LTE 466 -- 14.17 Resource Planning in LTE 472 -- 14.18 Self-Organizing Network (SON) 473 -- 14.19 RAT (Radio Access Technology) Internetworking 475 -- 14.20 LTE Radio Propagation Channel Considerations 475 -- 14.21 Handover Procedures in LTE 481 -- 14.22 Measurements 482 -- 14.23 LTE Practical System Capacity 483 -- 14.24 Synchronization 486 -- 14.25 Beyond 4G 486 -- 15 Broadband Standards Comparison 489 -- 15.1 Introduction 489 -- 15.2 Performance Tables 489 -- 16 Wireless Network Design 513 -- 16.1 Introduction 513 -- 16.2 Wireless Market Modeling 513 -- 16.3 Wireless Network Strategy 515 -- 16.4 Wireless Network Design 516 -- 16.5 Wireless Network Optimization 517 -- 16.6 Wireless Network Performance Assessment 517 -- 17 Wireless Market Modeling 519 -- 17.1 Findings Phase 519 -- 17.2 Area of Interest (AoI) Modeling 519 -- 17.3 Terrain Databases (GIS Geographic Information System) 519 -- 17.4 Demographic Databases 530 -- 17.5 Service Modeling 533 -- 17.6 Environment Modeling 536 -- 17.7 User Terminal Modeling 537 -- 17.8 Service Class Modeling 538 -- 17.9 User Distribution Modeling 542 -- 17.10 Traffic Distribution Modeling 551 -- 18 Wireless Network Strategy 553 -- 18.1 Define Spectrum Usage Strategy 553 -- 18.2 Deployment Strategy 555 -- 18.3 Core Equipment 555 -- 18.4 Base Station Equipment 555 -- 18.5 Customer Premises Equipment (CPE) 563 -- 18.6 Link Budget 565 -- 18.7 Backhaul Equipment 565 -- 18.8 Land Line Access Points of Presence (PoP) 570.…”
    Libro electrónico
  7. 696207
    Publicado 2022
    Tabla de Contenidos: “…-- 7.1.1 TOR -- 7.1.2 I2P -- 7.1.3 Freenet -- 7.2 How to access the Dark Web -- 7.2.1 Precautions -- 7.3 How is the Dark Web used? …”
    Libro electrónico
  8. 696208
    Publicado 2019
    Tabla de Contenidos: “…Goel 12.1 Introduction 253 12.2 Basic 3D-DfT Architecture 254 12.3 Vesuvius-3D 3D-DfT Demonstrator 257 12.4 Extensions to the Basic 3D-DfT Architecture 265 12.5 Conclusion 276 Acknowledgments 276 References 277 13 Optimization of Test-Access Architectures and Test Scheduling for 3D ICs 281; Sergej Deutsch, Brandon Noia, Krishnendu Chakrabarty, and Erik Jan Marinissen 13.1 Uncertain Parameters in Optimization of 3D Test Architecture and Test Scheduling 282 13.2 Robust Optimization of 3D Test Architecture 285 13.3 Simulation Results 294 13.4 Conclusion 299 References 299 14 IEEE Std P1838: 3D Test Access Standard Under Development 301; Adam Cron, Erik Jan Marinissen, Sandeep K.…”
    Libro electrónico
  9. 696209
    Publicado 2020
    Tabla de Contenidos: “…-- 3.2 Ala-lenses -- 4 Compositionality of ala-lenses -- 4.1 Compositionality of update policies: An example -- 4.2 Sequential composition of ala-lenses -- 4.3 Parallel composition of ala-lenses -- 4.4 Symmetric monoidal structure over ala-lenses -- 4.5 Functoriality of learning in the delta lens setting -- 5 Related work -- 6 Conclusion -- A Appendices -- A.1 Category of parameterized functors pCat -- A.2 Ala-lenses as categorification of ML-learners -- References -- Non-idempotent intersection types in logical form -- Introduction -- 1 Notations and preliminary definitions -- 2 The relational model of the λ-calculus -- 3 The simply typed case -- 3.1 Why do we need another system? …”
    Libro electrónico
  10. 696210
    por DeRosa, Jennifer
    Publicado 2024
    Tabla de Contenidos: “…Blog post titles -- Blog content -- Excerpts -- A featured image -- Author -- Comments -- Categories and tags -- Blog archive pages -- Strategies for creating a helpful and amazing blog -- The purpose of your blog -- The tone of your blog -- The subject of your blog articles -- A posting schedule -- A content calendar -- How to get visitors to your blog -- Content to include on your blog articles -- Building Your Homepage Last -- Row 1: A strong message -- Links to other pages and content -- Videos -- Social proof -- Awards and accolades -- Specific numbers and data -- Galleries and portfolios -- Features and benefits -- Lead magnets -- News articles and blog posts -- Upcoming events -- Chapter 8 Preparing Your Site's Content -- Generating and Preparing Excellent Copy -- Create an outline and brainstorm topics -- Outline your copy -- Generate your copy -- Use AI to write content -- Steer clear of duplicate content -- Creating and Sourcing Your Images -- Stock photography vs your own photos -- Find an illustrator -- Choose a photographer -- Take great photos -- Find good stock photography -- Understanding Image Formats and Naming Conventions -- JPG images -- PNG images -- GIF images -- WebP images -- SVG images -- HEIC images -- Name your images -- Optimize your images -- Proper resolution -- Color mode -- Dimensions -- Compress your images -- Use alt tags -- Producing Video for Your Website -- Where to purchase videos -- Where to host videos -- Choose a video hosting service -- Vimeo -- YouTube -- Wistia -- Part 4 Designing and Laying Out Your Website -- Chapter 9 Deconstructing the Anatomy of Web Pages -- Determining Your Website Theme -- Choose a good theme -- Features and functionality -- The visual design of your website -- How customizable the theme is -- How performant the theme is -- Is the theme supported by the developer?…”
    Libro electrónico
  11. 696211
    por Camarillo, Gonzalo
    Publicado 2008
    Tabla de Contenidos: “…-- 1.4 Relation between IMS and non-IMS Services -- 2 The History of the IMS Standardization -- 2.1 Relations between IMS-related Standardization Bodies -- 2.3 Third Generation Partnership Project -- 2.4 Third Generation Partnership Project 2 -- 2.5 IETF-3GPP/3GPP2 Collaboration -- 2.6 Open Mobile Alliance -- 3 General Principles of the IMS Architecture -- 3.1 From Circuit-switched to Packet-switched -- 3.2 IMS Requirements -- 3.3 Overview of Protocols used in the IMS -- 3.4 Overview of IMS Architecture -- 3.5 Identification in the IMS -- 3.6 SIM, USIM, and ISIM in 3GPP -- 3.7 Next Generation Networks (NGN) -- Part II The Signaling Plane in the IMS -- 4 Session Control on the Internet -- 4.1 SIP Functionality -- 4.2 SIP Entities -- 4.3 Message Format -- 4.4 The Start Line in SIP Responses: the Status Line -- 4.5 The Start Line in SIP Requests: the Request Line -- 4.6 Header Fields -- 4.7 Message Body -- 4.8 SIP Transactions -- 4.9 Message Flow for Session Establishment -- 4.10 SIP Dialogs -- 4.11 Extending SIP -- 4.12 Caller Preferences and User Agent Capabilities -- 4.13 Reliability of Provisional Responses -- 4.14 Preconditions -- 4.15 Event Notification -- 4.16 Signaling Compression -- 4.17 Content Indirection -- 4.18 The REFER Method -- 4.19 Globally Routable User- Agent URIs (GRUU) -- 4.20 NAT Traversal -- 5 Session Control in the IMS -- 5.1 Prerequisites for Operation in the IMS -- 5.2 IPv4 and IPv6 in the IMS -- 5.3 IP Connectivity Access Network -- 5.4 P-CSCF Discovery -- 5.5 IMS-level Registration -- 5.6 Subscription to the reg Event State -- 5.7 Basic Session Setup -- 5.8 Application Servers: Providing Services to Users…”
    Libro electrónico
  12. 696212
    por Volitich, Dan, Ruppert, Gerard
    Publicado 2012
    Tabla de Contenidos: “…Focusing Dimensional Data -- Dimensional Query Behavior -- Creating Efficient Dimensional Queries -- Set Function -- Filter Function -- Except Function -- Slicer Filter -- Context Filter -- Page Layers -- Simple Prompting -- Dimensional Prompt Expressions and Tree Prompts -- Navigating with Dimensional Functions -- Family Functions -- Children and Parent Functions -- Cousin Function -- Ancestor Function -- Relative Functions -- Relative Time Functions -- Complex Functions -- Prompt Macro -- Chapter 12: Advanced Report Authoring -- Create Drill-Through Access -- Set Up a Target Report for Drill-Through Access -- Set Up a Source Report for Drill-Through Access -- Master Detail Relationship -- Create a Master Detail Relationship -- Adding a Microchart to a Report -- Selecting Ancestors -- Modify the Style for Multiple Items -- Query Management -- Query Types -- Creating a Join -- Specify What Appears When No Data Is Available -- Dynamic Data Formatting Using Variables -- Dynamic Column Rendering in a List Report Using Variables -- Bursting Reports -- Advanced Prompting -- HTML Items -- Singleton -- Insert a Singleton Object -- Edit a Query Associated with a Singleton Object -- Associate Multiple Singletons to One Query -- Table of Contents -- Set Up the Table of Contents -- Add a Table of Contents Entry for a Particular Data Item -- Add Bookmarks to the Table of Contents -- Active Reports -- Create an Active Report -- Add a Control with Static Data -- Add a Control with Dynamic Data -- Add Interactivity to Controls -- Save an Active Report -- Chapter 13: Statistical Reporting Overview -- Basic Concepts -- Variable Types -- Statistical Analyses -- Descriptive Statistics -- Means Comparison -- Nonparametric Tests -- Correlation and Regression -- Business Scenario: Shampoo pH Levels -- Creating a New Statistics Analysis -- Basic Descriptive Statistics…”
    Libro electrónico
  13. 696213
    Publicado 2022
    Tabla de Contenidos: “…(b) Federal Election Commission -- (c) Free Speech Principles Overview -- (d) Contribution and Expenditure Limitations -- (e) Political Committees -- (f) Limitations on Contributions -- (g) Corporate Independent Expenditures -- (h) Soft Money Restrictions -- (i) Disclosure Requirements -- (j) Coordinated Communications and Expenditures -- (k) Reporting of Independent Expenditures -- (l) Establishment and Maintenance of Segregated Funds -- (m) Political Campaign Financing and Exempt Organizations -- 6.16 Charitable Fundraising Organizations -- (a) General Principles -- (b) Application of Commensurate Test -- (c) Other Exemption Issues -- 6.17 House of Representatives Memorandum -- Chapter 7 Import of Form 990 -- 7.1 Form 990 Series Basics -- (a) Various Forms -- (b) Filing Exceptions -- (c) Filing Due Dates -- (d) Penalties -- (e) Disclosure Requirements -- 7.2 IRS Guiding Principles -- 7.3 Import of Form 990 -- 7.4 Summary of Parts of Form 990 -- (a) Part I (Summary) -- (b) Part II -- (c) Part III -- (d) Part IV -- (e) Part V -- (f) Part VI -- (g) Part VII -- (h) Parts VIII-XI -- 7.5 Preparation of Form 990, Part I22 -- 7.6 Summary of Form 990 Schedules -- (a) Schedule A -- (b) Schedule B -- (c) Schedule C -- (d) Schedule D -- (e) Schedule E -- (f) Schedule F -- (g) Schedule G -- (h) Schedule H -- (i) Schedule I -- (j) Schedule J -- (k) Schedule K -- (l) Schedule L -- (m) Schedule M -- (n) Schedule N -- (o) Schedule O -- (p) Schedule R -- 7.7 Form 990‐EZ -- 7.8 Instructions -- 7.9 Federal and State Regulation of Gaming -- (a) Definitions -- (b) Law in General -- 7.10 Schedule B -- (a) Definitions -- (b) Reporting Thresholds -- (c) Group Returns -- (d) Disclosure Considerations -- 7.11 Preparation of Form 990 Schedule G -- (a) Part I (Professional Fundraising Expenses) -- (b) Part II (Fundraising Events)…”
    Libro electrónico
  14. 696214
    Publicado 2023
    Tabla de Contenidos: “…. -- Quinoa for the Brazilian Cerrado: Agronomic Characteristics of Elite Genotypes under Different -- Water Regimes -- Reprinted from: Plants 2021, 10, 1591, doi:10.3390/plants10081591 343 -- Elsa Helena Manjarres-Hern ́andez, Diana Marcela Arias-Moreno, Ana Cruz -- Morillo-Coronado, Zaida Zarely Ojeda-P ́erez and Agobardo C ́ardenas-Chaparro -- Phenotypic Characterization of Quinoa (Chenopodium quinoa Willd.) for the Selection of -- Promising Materials for Breeding Programs -- Reprinted from: Plants 2021, 10, 1339, doi:10.3390/plants10071339 361 -- Carla Colque-Little, Daniel Buchvaldt Amby and Christian Andreasen -- A Review of Chenopodium quinoa (Willd.) …”
    Libro electrónico
  15. 696215
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Chapter 1 The Fundamentals of Solar Energy Photocatalysis -- 1.1 Background -- 1.2 History of Solar Energy Photocatalysis -- 1.3 Fundamental Principles of Solar Energy Photocatalysis -- 1.3.1 Basic Mechanisms for Solar Energy Photocatalysis -- 1.3.2 Thermodynamic Requirements for Solar Energy Photocatalysis -- 1.3.3 Dynamics Requirements for Solar Energy Photocatalysis -- 1.4 Design, Development, and Modification of Semiconductor Photocatalysts -- 1.4.1 Design Principles of Semiconductor Photocatalysts -- 1.4.2 Classifications of Semiconductor Photocatalysts -- 1.4.3 Modification Strategies of Semiconductor Photocatalysts -- 1.4.4 Development Approaches of Novel Semiconductor Photocatalysts -- 1.5 Processes and Evaluation of Solar Energy Photocatalysis -- 1.5.1 Processes of Solar Energy Photocatalysis -- 1.5.1.1 Photocatalytic Water Splitting -- 1.5.1.2 Photocatalytic CO2 Reduction -- 1.5.1.3 Photocatalytic Degradation -- 1.5.2 Evaluation of Solar Energy Photocatalysis -- 1.6 The Scope of This Book -- Acknowledgments -- References -- Chapter 2 Heterojunction Systems for Photocatalysis -- 2.1 Introduction -- 2.2 Classification of Heterojunction Photocatalysts -- 2.2.1 Type‐II Heterojunction Photocatalysts -- 2.2.2 P-N Junction Photocatalysts -- 2.2.3 Surface Junction Photocatalysts -- 2.2.4 Direct Z‐scheme Photocatalysts -- 2.2.5 S‐scheme Photocatalysts -- 2.3 Evaluation of the Heterojunction Photocatalysts -- 2.3.1 Band Structure -- 2.3.1.1 Light Absorption Ability -- 2.3.1.2 Reduction and Oxidation Ability -- 2.3.1.3 Identification of Major Charge Carriers -- 2.3.2 Charge Carrier Separation Efficiency -- 2.3.2.1 Electrochemical Test -- 2.3.2.2 Optical Spectroscopy -- 2.3.3 Charge Carrier Migration Mechanism -- 2.3.3.1 Metal Loading -- 2.3.3.2 Reactive Oxygen Species Trapping…”
    Libro electrónico
  16. 696216
    Publicado 2024
    Tabla de Contenidos: “…-- AppxManifest.xml -- AppxBlockMap.xml -- AppxSignature.p7x -- How to create MSIX packages -- Pushing the MSIX package application to your endpoints -- Summary -- Questions -- Answers -- Further reading -- Chapter 9: Understanding Policy Management -- Policy management -- What is a CSP policy? …”
    Libro electrónico
  17. 696217
    Publicado 2023
    Tabla de Contenidos: “…Learning about Amazon Simple Storage Service (S3) -- S3 Standard -- Amazon S3 Intelligent-Tiering -- Amazon S3 Standard-IA (Infrequent Access) -- Amazon S3 One Zone-IA -- Amazon S3 Glacier -- Managing data with S3 Object Lambda -- Versioning in Amazon S3 -- Amazon S3 Multi-Destination Replication -- Choosing the right cloud storage type -- Exploring Amazon S3 best practices -- Enhancing Amazon S3 performance -- Amazon CloudFront -- Amazon ElastiCache -- Amazon S3 Transfer Acceleration -- Choosing the right S3 bucket/prefix naming convention -- Protecting your data in Amazon S3 -- Blocking Amazon S3 public access to buckets and objects whenever possible -- Avoiding wildcards in policy files -- Leveraging the S3 API -- Leveraging IAM Access Analyzer to inspect S3 -- Enabling AWS Config -- Implementing S3 Object Lock to secure resources -- Implementing data at rest encryption -- Enabling data-in-transit encryption -- Turning on Amazon S3 server access logging -- Considering the use of Amazon Macie with Amazon S3 -- Implementing monitoring leveraging AWS monitoring services -- Using VPC endpoints to access Amazon S3 whenever possible -- Leveraging Amazon S3 cross-region replication -- Amazon S3 cost optimization -- Building hybrid storage with AWS Storage Gateway -- AWS Storage Gateway -- Amazon S3 File Gateway -- Amazon FSx File Gateway -- Tape Gateway -- Volume Gateway -- AWS Backup -- Summary -- Chapter 6: Harnessing the Power of Cloud Computing -- Compute in AWS -- Learning about Amazon EC2 -- AWS Graviton -- Advantages of EC2 -- EC2 instance families -- General Purpose (A1, M6, T4, Mac) -- Compute Optimized (C7, Hpc6a) -- Accelerated Computing (P4, G5, F1) -- Memory Optimized (R6, X2, High Memory) -- Storage Optimized (H1, D3, I4) -- EC2 pricing model -- AWS Compute Optimizer -- Amazon Machine Images (AMIs) -- Reviewing Amazon EC2 best practices…”
    Libro electrónico
  18. 696218
    Publicado 2019
    Tabla de Contenidos: “…8.3 Temperature and Volume (Charles's Law) -- 8.4 Temperature and Pressure (Gay-Lussac's Law) -- 8.5 The Combined Gas Law -- 8.6 Volume and Moles (Avogadro's Law) -- 8.7 Partial Pressures (Dalton's Law) -- CHEMISTRY LINK TO HEALTH: Hyperbaric Chambers -- CLINICAL UPDATE: Exercise-Induced Asthma -- Concept Map -- Chapter Review -- Key Terms -- Core Chemistry Skills -- Understanding the Concepts -- Additional Practice Problems -- Challenge Problems -- Answers -- Chapter 9 Solutions -- CAREER Dialysis Nurse -- CLINICAL UPDATE Using Dialysis for Renal Failure -- 9.1 Solutions -- CHEMISTRY LINK TO HEALTH: Water in the Body -- 9.2 Electrolytes and Nonelectrolytes -- CHEMISTRY LINK TO HEALTH: Electrolytes in Body Fluids -- 9.3 Solubility -- CHEMISTRY LINK TO HEALTH: Gout and Kidney Stones: A Problem of Saturation in Body Fluids -- 9.4 Solution Concentrations -- 9.5 Dilution of Solutions -- 9.6 Properties of Solutions -- CHEMISTRY LINK TO HEALTH: Dialysis by the Kidneys and the Artificial Kidney -- CLINICAL UPDATE: Using Dialysis for Renal Failure -- Concept Map -- Chapter Review -- Key Terms -- Core Chemistry Skills -- Understanding the Concepts -- Additional Practice Problems -- Challenge Problems -- Answers -- COMBINING IDEAS from Chapters 7 to 9 -- Chapter 10 Acids and Bases and Equilibrium -- CAREER Clinical Laboratory Technician -- CLINICAL UPDATE Acid Reflux Disease -- 10.1 Acids and Bases -- 10.2 BrØnsted-Lowry Acids and Bases -- 10.3 Strengths of Acids and Bases -- 10.4 Acid-Base Equilibrium -- CHEMISTRY LINK TO HEALTH: Oxygen-Hemoglobin Equilibrium and Hypoxia -- 10.5 Dissociation of Water -- 10.6 The pH Scale -- CHEMISTRY LINK TO HEALTH: Stomach Acid, HCl -- 10.7 Reactions of Acids and Bases -- CHEMISTRY LINK TO HEALTH: Antacids -- 10.8 Buffers -- CHEMISTRY LINK TO HEALTH: Buffers in the Blood Plasma -- CLINICAL UPDATE: Acid Reflux Disease…”
    Libro electrónico
  19. 696219
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  20. 696220
    Publicado 2015
    Tabla de Contenidos: “…-- The Mole: A Chemist's "Dozen" -- Converting between Number of Moles and Number of Atoms -- Converting between Mass and Amount (Number of Moles) -- REVIEW -- Self-Assessment Quiz -- Key Learning Outcomes -- Key Terms -- Key Concepts -- Key Equations and Relationships -- EXERCISES -- Review Questions -- Problems by Topic -- Cumulative Problems -- Challenge Problems -- Conceptual Problems -- Answers to Conceptual Connections -- 3 The Quantum-Mechanical Model of the Atom -- 3.1 Schrödinger's Cat -- 3.2 The Nature of Light -- The Wave Nature of Light -- The Electromagnetic Spectrum -- Interference and Diffraction -- The Particle Nature of Light -- 3.3 Atomic Spectroscopy and the Bohr Model -- Atomic Spectra -- The Bohr Model -- Atomic Spectroscopy and the Identification of Elements -- 3.4 The Wave Nature of Matter: The de Broglie Wavelength, the Uncertainty Principle, and Indeterminacy -- The de Broglie Wavelength -- The Uncertainty Principle -- Indeterminacy and Probability Distribution Maps -- 3.5 Quantum Mechanics and the Atom -- Solutions to the Schrödinger Equation for the Hydrogen Atom -- Atomic Spectroscopy Explained -- 3.6 The Shapes of Atomic Orbitals -- s Orbitals (l = 0) -- p Orbitals (l = 1) -- d Orbitals (l = 2) -- f Orbitals (l = 3) -- The Phase of Orbitals -- The Shape of Atoms -- REVIEW -- Self-Assessment Quiz -- Key Learning Outcomes -- Key Terms -- Key Concepts -- Key Equations and Relationships -- EXERCISES -- Review Questions -- Problems by Topic -- Cumulative Problems -- Challenge Problems -- Conceptual Problems -- Answers to Conceptual Connections -- 4 Periodic Properties of the Elements -- 4.1 Aluminum: Low-Density Atoms Result in Low-Density Metal…”
    Libro electrónico