Mostrando 5,901 - 5,920 Resultados de 8,486 Para Buscar '"P2"', tiempo de consulta: 0.44s Limitar resultados
  1. 5901
    por Oberhauser, Benedicto (O.S.B.)
    Publicado 1785
    Libro
  2. 5902
    Publicado 2010
    Tabla de Contenidos: “…18.1 The Problem with Actions -- 18.2 Commands -- 18.3 Contributions -- 18.4 Handlers -- 18.5 Summary -- 18.6 Pointers -- Chapter 19 Customizing Workbench Windows -- 19.1 Customization Defined -- 19.2 Customizing a Workbench Window -- 19.3 Custom Window Shapes -- 19.4 Summary -- 19.5 Pointers -- Chapter 20 Customizing the Presentation of Views and Editors -- 20.1 Presentations -- 20.2 Sample Presentations -- 20.3 Writing a Presentation -- 20.4 Example Presentation -- 20.5 Summary -- 20.6 Pointers -- Part IV: Development Processes -- Chapter 21 Installing and Updating with p2 -- 21.1 The Roles of p2 -- 21.2 Architecture -- 21.3 Using the p2 API -- 21.4 Metadata Management -- 21.5 Repository Management -- 21.6 Installation Management -- 21.7 Summary -- 21.8 Pointers -- Chapter 22 Dynamic Plug-ins -- 22.1 Making Hyperbola Dynamic -- 22.2 Dynamic Challenges -- 22.3 Dynamic Awareness -- 22.4 Dynamic Enablement -- 22.5 Summary -- 22.6 Pointers -- Chapter 23 RCP Everywhere -- 23.1 Sample Code -- 23.2 The Scenario -- 23.3 Product Configurations -- 23.4 Hyperbola Product Configurations -- 23.5 Code Structure -- 23.6 Designing a Platform -- 23.7 RCP-Friendly Plug-ins -- 23.8 Summary -- 23.9 Pointers -- Chapter 24 Building Hyperbola -- 24.1 What Is PDE Build? …”
    Libro electrónico
  3. 5903
    Publicado 2019
    Tabla de Contenidos: “…LA PRESENCIA INQUIETANTE DE LA LOGIA MASÓNICA P2 -- 1. Los tres peculiares factores históricos que están en la base de la Italia oculta -- 2. …”
    Libro electrónico
  4. 5904
  5. 5905
    por Thomas, Antoine Léonard
    Publicado 1773
    Libro
  6. 5906
  7. 5907
    Libro
  8. 5908
    Tabla de Contenidos: “…T.I : 1979, enero-abril .-- XX, 811 p.-- (2) .-- ISBN 84-220-0976-5 (t.I) T.II : 1979, mayo-agosto .-- XV, 631 p.-- (3) .-- ISBN 84-220-0978-1(t.II) T.III : 1979, septiembre-diciembre (a) .-- XV, 1-590 p.-- (4a) .-- ISBN 84-220-0984-6 (t.III a) T.IV : 1979, septiembre-diciembre (b) .-- XV, 591-1165 p.-- ISBN 84-220-0987-0 (t.III b)…”
    Libro
  9. 5909
    por Cancer, Jaime (1520-1592)
    Publicado 1635
    Tabla de Contenidos: “… [4], 261 [i.e. 259] p., [1] en bl., [82] p., [2] en bl. ; Fol. Marca tip. en port. Sign.: *2, A-X6, Y4, Z6, 2A-2F6. …”
    Libro
  10. 5910
    Publicado 2010
    Tabla de Contenidos: “…Cover; Contents; List of Figures and Tables; Notes on Contributors; List of Abbreviations; Foreword Meeting the Demand for Intervention: The Promise of African Security Architecture; 1 African Solutions for African Problems and Shared R2P; 2 Through the Lens of European Integration Theory: African Peace and Security Architecture as a Framework in Transition; 3 Hopes and Challenges for the Peace and Security Architecture of the African Union; 4 From the Multilateralism of States to the Multilateralism of Peoples: The Roles of the African Union and the United Nations i…”
    Libro electrónico
  11. 5911
    por SelfMan 2006
    Publicado 2006
    Tabla de Contenidos: “…Middleware and Infrastructure for Self-Management -- Implementation and Evaluation of a Middleware for Self-Organizing Decentralized Web Services -- Self-Adaptive Systems: A Middleware Managed Approach -- Gossip-Based Clock Synchronization for Large Decentralized Systems -- Peer-to-Peer and Overlay Networks -- Proximity-Aware Superpeer Overlay Topologies -- Self-Maintaining Overlay Data Structures for Pervasive Autonomic Services -- Using Aggregation for Adaptive Super-Peer Discovery on the Gradient Topology -- Self-Adaptation -- Self-Adaptive Applications Using ADL Contracts -- Dynamic Generation of Context Rules -- Self-Managed Mobile Systems -- Spirits: Using Virtualization and Pervasiveness to Manage Mobile Robot Software Systems -- Mobile Service Clouds: A Self-Managing Infrastructure for Autonomic Mobile Computing Services -- Networking -- Capacity Efficient Shared Protection and Fast Restoration Scheme in Self-Configured Optical Networks -- Increasing Lifetime of Wireless Sensor Networks with Energy-Aware Role-Changing -- Work-in-Progress Papers -- Self-Organisation of Resources in PROSA P2P Network -- Plug-and-Play Address Management in Ambient Networks -- k-Variable Movement-Assisted Sensor Deployment Based on Virtual Rhomb Grid in Wireless Sensor Networks -- Toward Self-Managed Networks?…”
    Libro electrónico
  12. 5912
    por Bellinaso, Marco
    Publicado 2006
    Tabla de Contenidos: “…NET 2.0 Website Programming; About the Author; Acknowledgments; Contents; Foreword; Introduction; What This Book Covers; How This Book Is Structured; Who This Book Is For; What You Need to Use This Book; Conventions; Source Code; Errata; p2p.wrox.com; Chapter 1 Introducing the Project: TheBeerHouse; Problem; Design; Solution; Summary; Chapter 2 Developing the Site Design; Problem; Design; Solution; Summary; Chapter 3 Planning an Architecture; Problem; Design; Solution; Summary; Chapter 4 Membership and User Profiling; Problem; Design; Solution; Summary…”
    Libro electrónico
  13. 5913
  14. 5914
  15. 5915
    Publicado 2018
    Tabla de Contenidos: “…Schlüssel und Adressen in Python implementieren -- Fortgeschrittene Schlüssel und Adressen -- Verschlüsselte private Adressen (Encrypted Private Keys, BIP-38) -- Pay-to-Script-Hash-(P2SH-)Adressen und Multisig-Adressen -- Vanity-Adressen -- Paper-Wallets -- Kapitel 5: Wallets -- Wallet-Technologie in der Übersicht -- Nichtdeterministische (zufallsbasierte) Wallets -- Deterministische (Seed-basierte) Wallets -- HD-Wallets (BIP-32/BIP-44) -- Seeds und mnemonische Codes (BIP-39) -- Die Wallet-Best-Practices -- Eine Bitcoin-Wallet verwenden -- Details der Wallet-Technologie -- Mnemonische Codewörter (BIP-39) -- Eine HD-Wallet aus dem Seed-Wert erzeugen -- Einen erweiterten öffentlichen Schlüssel in einem Webshop nutzen -- Kapitel 6: Transaktionen -- Einführung -- Transaktionen im Detail -- Transaktionen - hinter den Kulissen -- Transaktions-Outputs und -Inputs -- Transaktions-Outputs -- Transaktions-Inputs -- Transaktionsgebühren (Fees) -- Gebühren in Transaktionen einfügen -- Transaktionsskripte und Skriptsprache -- Turing-Unvollständigkeit -- Zustandslose Verifikation -- Konstruktion von Skripten (Lock + Unlock) -- Pay-to-Public-Key-Hash (P2PKH) -- Digitale Signaturen (ECDSA) -- Wie digitale Signaturen funktionieren -- Die Signatur verifizieren -- Arten von Signatur-Hashes (SIGHASH) -- Die Mathematik hinter ECDSA -- Die Bedeutung der Zufälligkeit für Signaturen -- Bitcoin-Adressen, Guthaben und andere Abstraktionen -- Kapitel 7: Transaktionen und Skripting für Fortgeschrittene -- Einführung -- Multisignatur -- Pay-to-Script-Hash (P2SH) -- P2SH-Adressen -- Vorteile von P2SH -- Redeem-Skript und Validierung -- Data Recording Output (RETURN) -- Timelocks -- Transaktions-Locktime (nLocktime) -- Check Lock Time Verify (CLTV) -- Relative Timelocks -- Relative Timelocks mit nSequence -- Relative Timelocks mit CSV -- Median-Time-Past…”
    Libro electrónico
  16. 5916
  17. 5917
  18. 5918
  19. 5919
  20. 5920
    por Guy de Chauliac (1290?-1368)
    Publicado 1596
    Libro