Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10981Publicado 2017Tabla de Contenidos: “…III IoT in Industry -- ch. 9 Manufacturing -- An Introduction to Connected Manufacturing -- An IoT Strategy for Connected Manufacturing -- Business Improvements Driven Through IoT -- An Architecture for the Connected Factory -- Industrial Automation and Control Systems Reference Model -- The CPwE Reference Model -- CPwE Resilient Network Design -- Resilient Ethernet Protocol (REP) -- Business Value of Resiliency in Converged Networks -- CPwE Wireless -- CPwE Wireless Network Architecture -- Real-Time Location System (RTLS) -- Industrial Automation Control Protocols -- EtherNet/IP and CIP -- PROFINET -- The PROFINET Architecture -- Media Redundancy Protocol (MRP) -- Modbus/TCP -- Connected Factory Security -- A Holistic Approach to Industrial Security -- Network Address Translation in the Factory -- The Industrial DMZ -- Factory Security Identity Services -- Edge Computing in the Connected Factory -- Connected Machines and Edge Computing -- Summary -- References -- ch. 10 Oil and Gas -- An Introduction to the Oil and Gas Industry -- Defining Oil and Gas -- The Oil and Gas Value Chain -- Current Trends in the Oil and Gas Industry -- Industry Key Challenges as Digitization Drivers -- IoT and the Oil and Gas Industry -- Improving Operational Efficiency -- The Purdue Model for Control Hierarchy in Oil and Gas Networks -- Oil and Gas Use Cases for IoT -- The Connected Pipeline -- The Connected Refinery -- IoT Architectures for Oil and Gas -- Control Room Networks for Oil and Gas -- Wired Networks for Oil and Gas -- Wireless Networks for Oil and Gas -- Wireless Use Cases in the Oil and Gas Industry -- Mobile Process Control Network Operator -- Plant Turnaround -- The Risk Control Framework for Cybersecurity in IoT -- Securing the Oil and Gas PCN: Background -- Securing the Oil and Gas PCN: Use Cases and Requirements -- Real-Time Asset Inventory -- Remote Access Control -- Patch Management -- Antivirus (AV) Management -- Security Intelligence and Anomaly Detection -- Data Analytics for Predictive Asset Monitoring -- Summary -- References -- ch. 11 Utilities -- An Introduction to the Power Utility Industry -- The IT/OT Divide in Utilities -- The GridBlocks Reference Model -- GridBlocks: An 11-Tiered Reference Architecture -- The Primary Substation GridBlock and Substation Automation -- SCADA -- IEC 61850: The Modernization of Substation Communication Standards -- IEC 61850 Station Bus -- IEC 61850 Process Bus -- Migration to IEC 61850 -- Network Resiliency Protocols in the Substation -- Parallel Redundancy Protocol -- High-Availability Seamless Redundancy -- System Control GridBlock: The Substation WAN -- Defining Teleprotection -- Distance Protection -- Current Differential (87L) Protection -- Designing a WAN for Teleprotection -- The Field Area Network (FAN) GridBlock -- Advanced Metering Infrastructure -- Other Use Cases -- Demand Response -- Distribution Automation -- Securing the Smart Grid -- NERCCIP -- Smart Grid Security Considerations -- The Future of the Smart Grid -- Summary -- References -- ch. 12 Smart and Connected Cities -- An IoT Strategy for Smarter Cities -- Vertical IoT Needs for Smarter Cities -- Global vs. …”
Libro -
10982Publicado 2017Tabla de Contenidos: “…Cognitive Biases -- Developing Self-Control -- Rise Above Emotion and Choose Your Behaviors -- Notes -- Chapter 12: Shaping Win Probability Begins with Qualification -- Chasing Ugly Deals -- Define the Strike Zone -- Qualifying Methodologies and Shortcuts -- Nine-Frame Qualification Matrix -- Measure Every Prospect against Your Ideal Qualified Prospect Profile -- Murder Boarding -- Note -- Chapter 13: Engagement and Micro-Commitments -- Testing Engagement -- Tune In to Emotions -- Micro-Commitments -- Leveraging the Value Bias and Consistency Principle -- Getting Caught Up in Emotion -- Chapter 14: Stalled Deals and Next Steps -- The Bane of Sales Organizations -- The Cardinal Rule of Sales Conversations -- Getting Past the Next-Step Brush-Off -- Ledge -- Disrupt -- Ask -- Chapter 15: Sales Process -- Disruptive Emotions Disrupt the Sales Process -- Winging It -- Complexity Is the Enemy of Execution -- No Sales Process -- Aligning the Three Processes of Sales -- Chapter 16: Buying Process -- Mapping the Buying Process -- The Danger of Getting Out of Sync -- Average Salespeople Dance -- Shaping the Buying Process -- Get There First -- Leverage -- Average Salespeople Become Buying Process Puppets -- Chapter 17: The Five Stakeholders You Meet in a Deal -- The Higher the Risk, the More Stakeholders Involved -- Know Your Audience -- Hearts Before Minds -- BASIC -- The One Question Ultra-High Performers Never Ask -- BASIC Mapping -- Chapter 18: Decision Process -- Influencing the Decision Process -- Aligning the Three Processes of Sales -- The Five Questions That Matter Most in Sales -- Aligning Decision Making with Social Proof -- Notes -- Chapter 19: Do I Like You? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
10983Publicado 2020Tabla de Contenidos: “…PART I: Basic Science of Pulmonary Development and Pulmonary Arterial Disease -- 1 Perspective for Part I -- 2 The alveolar stem cell niche of the mammalian lung -- 3 Lung development and Notch signalling -- 4 Specialized smooth muscle cell progenitors in pulmonary hypertension -- 5 Diverse Pharmacology of Prostacyclin Mimetics: Implications for Pulmonary Hypertension -- 6 Endothelial-to-mesenchymal transition in pulmonary hypertension -- 7 Extracellular vesicles, MicroRNAs and Pulmonary Hypertension -- 8 Roles of Tbx4 in the lung mesenchyme for airway and vascular development -- 9 A lacZ reporter transgenic mouse line revealing the development of pulmonary artery -- 10 Roles of stem cell antigen-1 in the pulmonary endothelium -- 11 Morphological characterization of pulmonary microvascular disease in bronchopulmonary dysplasia caused by hyperoxia in newborn mice -- 12 Involvement of CXCR4 and stem cells in a rat model of pulmonary arterial hypertension -- 13 Ca2+ signal through inositol trisphosphate receptors for cardiovascular development and pathophysiology of pulmonary arterial hypertension -- PART II: Abnormal pulmonary circulation in the developing lung and heart -- 14 Perspective for Part II -- 15 Pathophysiology of Pulmonary Circulation in Congenital Heart Disease -- 16 Development of Novel Therapies for Pulmonary Hypertension by Clinical Application of Basic Research -- 17 Using Patient-Specific Induced Pluripotent Stem Cells to Understand and Treat Pulmonary Arterial Hypertension -- 18 Modeling pulmonary arterial hypertension using induced pluripotent stem cells -- 19 Dysfunction and restoration of endothelial cell communications in Pulmonary Arterial Hypertension: Therapeutic implications -- 20 Inflammatory Cytokines in the Pathogenesis of Pulmonary Arterial Hypertension -- 21 Genotypes and Phenotypes of Chinese Pediatric Patients with Idiopathic and Heritable Pulmonary Arterial Hypertension- Experiences from A Single Center -- 22 Fundamental Insight into Pulmonary Vascular Disease : Perspectives from Pediatric PAH in Japan -- 23 Risk stratification in paediatric pulmonary arterial hypertension -- 24 The Adaptive Right Ventricle in Eisenmenger Syndrome: Potential Therapeutic Targets for Pulmonary Hypertension -- 25 Impaired right coronary vasodilator function in pulmonary hypertensive rat assessed by in vivo synchrotron microangiography -- 26 Relationship between mutations in ENG and ALK1 gene and the affected organs in hereditary hemorrhagic telangiectasia -- 27 A genetic analysis for patients with pulmonary arterial hypertension -- 28 Evaluation and visualization of right ventricle using three dimensional echocardiography -- 29 Pulmonary hypertension associated with post-operative Tetralogy of Fallot -- 30 Microscopic Lung Airway Abnormality and Pulmonary Vascular Disease Associated with Congenital Systemic to Pulmonary Shunt -- 31 Respiratory syncytial virus infection in infants with heart and lung diseases -- PART III: Ductus arteriosus: bridge over troubled vessels -- 32 Perspective for Part III -- 33 The ductus arteriosus, a vascular outsider, in relation to the pulmonary circulation -- 34 Molecular, genetic, and pharmacological modulation of the ductus arteriosus: KATP channels as novel drug targets -- 35 New mediators in the biology of the ductus arteriosus: Lessons from the chicken embryo -- 36 Constriction of the Ductus Arteriosus with KATP Channel Inhibitors -- 37 New insights on how to treat patent ductus arteriosus -- 38 Antenatal Administration of Betamethasone Contributes to Intimal thickening of the Ductus Arteriosus -- 39 Prostaglandin E-EP4-mediated fibulin-1 up-regulation plays a role in intimal thickening of the ductus arteriosus -- 40 Transcriptional profiles in the chicken ductus arteriosus during hatching -- 41 Inhibition of Cyclooxygenase Contracts Chicken Ductus Arteriosus -- 42 Prostaglandin E2 receptor EP4 inhibition constricts the rat ductus arteriosus -- 43 Dilatation of the Ductus Arteriosus by Diazoxide in Fetal and Neonatal Rats -- 44 The Effect of Long-term Administration of Plostaglandin E1 on Morphological Changes in Ductus Arteriosus -- 45 Significance of SGK1 as a protein kinase transcriptionally regulated by ALK1 signaling in vascular endothelial cells -- 46 Fabrication of Implantable Human Arterial Graft by Periodic Hydrostatic Pressure -- 47 Optimum preparation of Candida albicans cell wall extra (CAWE) for the mouse model of Kawasaki disease -- PART IV: Development and Regeneration of the Cardiovascular System -- 48 Perspective for Part IV -- 49 Advances in the second heart field -- 50 Novel cardiac progenitors for all components of the heart except for the right ventricle -- 51 Regional and TBX5-dependent gene expression in the atria: Implications for pulmonary vein development and atrial fibrillation -- 52 The Endocardium as a Master Regulator of Ventricular Trabeculation -- 53 The Role of Alternative mRNA Splicing in Heart Development -- 54 Progress in the Generation of Multiple Lineage Human-iPSC-derived 3D Engineered Cardiac Tissues for Cardiac Repair -- 55 Quantification of contractility in stem cell derived cardiomyocytes -- 56 A neurotrophic factor receptor GFRA2, a specific surface antigen for cardiac progenitor cells, regulates the process of myocardial compaction -- 57 Cardiac cell specification and differentiation by the defined factors -- 58 A Temporo-Spatial Regulation of Sema3c is Essential for Interaction of Progenitor Cells during Cardiac Outflow Tract Development -- 59 Spatiotemporally restricted developmental alterations in the anterior and secondary heart fields cause distinct conotruncal heart defects -- 60 Significance of transcription factors in the mechanisms of great artery malformations -- 61 The different c-kit expression in human induced pluripotent stem (iPS) cells between with feeder cells and without feeder cells -- 62 Establishment of induced pluripotent stem cells from immortalized B cell lines and their differentiation into cardiomyocytes -- 63 Establishment of an in vitro LQT3 model, using induced pluripotent stem cells from LQT3 patient-derived cardiomyocytes -- 64 Genetic Assessments for clinical courses of Left ventricle noncompaction -- 65 Elucidating the pathogenesis of congenital heart disease in the era of next-generation sequencing…”
Libro electrónico -
10984Publicado 2021Tabla de Contenidos: “…-- Consult the Business First -- The Procurement Balanced Scorecard -- Sustainability -- Supply chain risk and resilience -- Customer service levels and accessing innovation -- Sustainability -- Social sustainability -- Environmental sustainability -- Financial sustainability -- Get the Right Sustainability Key Performance Indicators -- Embarking on Your Sustainability Program -- Chapter 9: SAVINGS REALIZATION: Stemming the Leaks -- What Is a Saving? …”
Libro electrónico -
10985Publicado 2022Tabla de Contenidos: “…The H3Africa Consortium: Publication Outputs of a Pan-African Genomics Collaboration -- 1 Introduction -- 2 Identification of Publications and Categorization -- 3 Marker Paper and Cohort Descriptions -- 4 Governance, Ethics, Community Engagement and Biobanking -- 5 Epidemiological Studies on Diseases, Traits and Risk Factors -- 6 Disease-Associated Behaviour and Awareness Studies -- 7 Genetics and Genomics Studies -- 8 Bioinformatics and Genomics Capacity Development -- 9 Microbiome and Pathogen Studies -- 10 Epilogue - H3Africa Data in Population-Genetics Research -- 11 Conclusions -- Acknowledgements -- References -- 10. …”
Libro electrónico -
10986Publicado 2022Tabla de Contenidos: “…The Harmonization Agenda -- 1.4 The Exception to the Rule -- 1.5 The Real Story of 'Environmental' Exceptions or 'On How They Became Environmental' -- 1.6 The Indeterminacy of Trade Law and the Neoliberal Turn -- 2 Rivalry -- 2.1 Dialogue of the Deaf -- 2.2 Everyone for Themselves -- 2.3 Between Two Fires -- 2.4 Development First -- 2.5 To Each His Own Fear -- 2.6 Like Riding Bicycles -- 3 How Exceptions Work: The Environment Upstaged -- 3.1 A Clause to Prevent All Abuses -- 3.2 A 'Narrowly Defined' Exception -- 3.3 Who Bears the Risk of Non-Persuasion? -- 3.4 Judges with Limited Mandate and Expertise -- 3.5 Trade Liberalization First -- 4 The Evolution of the Nexus The Quest for Balance -- 1 The Need for Balance -- 1.1 Lady Jackson -- 1.2 Same Game, New Rules -- 1.3 Which Takes Precedence, Environment or Development? …”
Libro electrónico -
10987por Forum, International TransportTabla de Contenidos: “…-- Mastering the pandemic: Challenges and opportunities for urban mobility after Covid-19 -- Cities at a standstill -- Recovery risks - and opportunities -- Recover, Reshape, Reshape+: Three possible futures for urban passenger transport -- Urban mobility in the Recover scenario -- Paradigm change: urban mobility in the Reshape scenario -- Reshape+: Reinforcing Reshape -- Demand for urban travel: Managing mobility in growing cities -- CO2 emissions from urban mobility: Improved services, smaller carbon footprint -- Equity and well-being: Accessible cities and resilient networks -- Ambitious decarbonisation and accessibility for all -- The higher the decarbonisation policy ambition, the higher the resilience of the system -- Policy recommendations -- Empower cities to decarbonise urban mobility and enhance accessibility to improve well-being -- Prioritise funding for sustainable urban transport over investment in city roads -- Improve the quality of public transport to create more inclusive and reliable services -- Pursue integrated land-use and transport planning for sustainable, neighbourhood-based urban development -- Create incentives for greening urban vehicle fleets -- Nurture transport innovation and collaborate with providers of new urban mobility services to maximise benefits and minimise costs -- Combine transport decarbonisation and resilience measures now to meet future demand in sustainable ways and withstand disruptions -- References -- 4 Non-urban passenger transport: A pivotal sector for greening transport -- Decarbonising non-urban passenger transport: The state of play…”
Publicado 2021
Libro electrónico -
10988por Organization for Economic CooperationTabla de Contenidos: “…Key findings of the pilot phase -- All OECD countries act to improve scale up finance, albeit at different intensities -- Public action for scale up finance often falls beyond the SME and entrepreneurship policy domain -- There are signs of a general fragmentation of scale up finance policies... -- ... raising the risk of governance failures and the need for sound coordination across-the-board -- Scale up finance policy is in fact highly targeted... -- ... which can raise difficulties for potential scalers to navigate a broad and disperse range of public services -- Scale up finance policies are different depending on the scale up driver at play -- National policy mixes are not geared towards the same scaling up drivers -- Disruptive innovation, investment in physical capital and global expansion are first in the line of sight of governments -- Public measures for improving scale up finance often target SMEs directly, through various instruments…”
Publicado 2022
Libro electrónico -
10989Publicado 2017Tabla de Contenidos: “…Responsiveness to Customers and Clients -- Minimized Risks and Costs -- This Is So Preventable -- Endnotes -- Chapter 3: Ascent of Neuroscience -- Equal Does Not Mean the Same! …”
Libro electrónico -
10990Publicado 2017Tabla de Contenidos: “…-- Analyze Current State -- Define Future State -- Assess Risks -- Define Change Strategy -- How This Applies to Your Projects -- Summary -- Exam Essentials -- Key Terms -- Review Questions -- Chapter 4 Overarching Tasks: Requirements Life Cycle Management -- Requirements Life Cycle Management -- The Business Analyst's Task List -- When Does Requirements Life Cycle Management Take Place? …”
Libro electrónico -
10991Publicado 2018Tabla de Contenidos: “…Just a Significant Evolution -- How the Supply Chain Works -- Production -- Inventory -- Location -- Transportation -- Information -- The Evolving Structure of Supply Chains -- Participants in the Supply Chain -- Producers -- Distributors -- Retailers -- Customers -- Service Providers -- Aligning the Supply Chain with Business Strategy -- Understand the Markets Your Company Serves -- Define Core Competencies of Your Company -- Develop Needed Supply Chain Capabilities -- Chapter Summary -- Chapter 2: Supply Chain Operations: Planning and Sourcing -- A Useful Model of Supply Chain Operations -- Plan -- Source -- Make -- Deliver -- Demand Forecasting and Planning (Plan) -- Forecasting Methods -- Aggregate Planning -- Product Pricing (Plan) -- Relationship of Cost Structure to Pricing -- Inventory Management (Plan) -- Cycle Inventory -- Economic Order Quantity -- Seasonal Inventory -- Safety Inventory -- Procurement (Source) -- Purchasing -- Consumption Management -- Vendor Selection -- Contract Negotiation -- Contract Management -- Credit and Collections (Source) -- Set Credit Policy -- Implement Credit and Collections Practices -- Manage Credit Risk -- Chapter Summary -- Chapter 3: Supply Chain Operations: Making and Delivering -- Product Design (Make) -- Production Scheduling (Make) -- Facility Management (Make) -- Order Management (Deliver) -- Delivery Scheduling (Deliver) -- Direct Deliveries -- Milk-Run Deliveries -- Delivery Sources -- Return Processing (Deliver) -- Supply Chain Operations Can Be Outsourced -- Chapter Summary -- Chapter 4: New Technology Changes How Work Is Done -- New Technology Is Changing Supply Chain Operations -- Key Components of Information Technology -- Cloud Computing…”
Libro electrónico -
10992Publicado 2016Tabla de Contenidos: “…Making Life Easier with Digital Information Management -- Singing Off the Same Hymn Sheet: Information Exchange -- Part III: Understanding BIM Requirements and Developing BIM Processes -- Chapter 9: Mandating BIM in the UK and across the Globe -- Interpreting the Requirements -- Leading BIM in the United States -- Growing BIM Standards Internationally -- Keeping Up to Date -- Chapter 10: Standardizing the Modeling of BIM Objects -- Figuring Out What BIM Objects Are -- Obtaining BIM Objects through Object Libraries -- Recognizing BIM Objects -- Supporting Standardization -- Enabling Interoperability -- Chapter 11: Collaborating through BIM Requirements -- Running through Open Standards -- Steering the Industry toward IFC -- Reviewing the Key Standards -- Coordinating Information -- Chapter 12: Encouraging BIM in Your Office or On-Site -- Adopting BIM as a People-led Process -- Encouraging BIM Champions -- Changing Hearts and Minds -- Training and Supporting Everyone -- Chapter 13: Developing BIM Plans and Strategies -- Getting Started with Your BIM Strategy -- Setting Up a BIM Business Case -- Combining Information into a BIM Execution Plan -- Modeling Your Plan after Successful BIM Processes -- Chapter 14: Considering the Issues that BIM Presents -- Managing Change in Your Business -- Clarifying the Legal Implications of BIM -- Ensuring Your Business Thrives with BIM: Engineering Collaboration -- Part IV: Measuring the Real-World Benefits of BIM -- Chapter 15: Evaluating BIM Benefits and Investment -- Arriving at a Digital Understanding of Construction -- Calculating the Savings -- Separating Reality from the BIM Wash -- Chapter 16: Using BIM On-Site and BIM for Health and Safety -- Examining Contractor-Led Project Teams: Planning for Quality -- Requiring BIM Use On-Site -- Reducing Risks On-Site: BIM for Health and Safety…”
Libro electrónico -
10993Publicado 2023Tabla de Contenidos: “…-- 2.2 Deploying workloads in Kubernetes -- 2.2.1 Deploying a workload -- 2.2.2 Deployment objects -- 2.2.3 Volume -- 2.3 Managing application configuration -- 2.3.1 ConfigMaps -- 2.4 Using Kubernetes Secrets to store sensitive information -- 2.4.1 Secrets are encoded in Base64 -- 2.4.2 Secrets are mounted in a temporary file system -- 2.4.3 Secrets can be encrypted at rest -- 2.4.4 Risks -- Summary -- Part 2. Managing Secrets -- 3 Securely storing Secrets -- 3.1 Storing Kubernetes manifests at rest -- 3.1.1 Capturing resources for declarative configuration -- 3.2 Tools for securely storing Kubernetes resources -- 3.2.1 Ansible Vault -- 3.3 Kubernetes Operators -- 3.3.1 Custom resource definitions (CRDs) -- 3.3.2 Sealed Secrets -- 3.4 Managing Secrets within Kubernetes package managers -- 3.4.1 Deploying the Greeting Demo Helm chart -- 3.4.2 Using Helm Secrets -- 3.5 Rotating secrets -- 3.5.1 Ansible Vault secret key rotation -- 3.5.2 Sealed Secrets key rotation -- 3.5.3 SOPS secret key rotation -- Summary -- 4 Encrypting data at rest -- 4.1 Encrypting secrets in Kubernetes…”
Libro electrónico -
10994Publicado 2023Tabla de Contenidos: “…-- Sequence DESIGN-Howto Build and Architect Conversions -- Comms and Heuristics -- Heuristics (Mental Shortcuts) Examples: -- Hyper-Personalization Theory -- Cold-Calling Mastery -- Handling Objections -- Tailored Voicemails and Video Drops -- Interactive Video Prospecting -- Visual Prospecting-Venns -- Contact Marketing -- Political Selling -- Qualification Frameworks -- The Anchor -- Higher-RiskOutreach Methods -- Chapter 23 Methods for Sophisticated Outreach -- Inherent Power Dynamics -- Sophisticated Call Anatomy -- Alphas and Betas -- Powershifting-Social Aikido/Social Tai-chi -- Mastering Political Factors -- Symptoms versus Problems -- Breaking the Fourth Wall -- Mindset -- Advanced Phone Strategies -- Voicemails -- Generic Is the Enemy of Effective Event Follow-Up -- Whom to Call -- Trade Secrets -- Self-Actualized Prospects -- Section 3 Customer-Led Everything -- Chapter 24 Customer-Led Acquisition/Activation -- Customer-Led Growth and Selling -- Chapter 25 Customer-Led Engagement -- Chapter 26 Customer-Led Retention/Expansion -- Section 4 Lessons from 100 GTM Events x 100 GTM Leaders…”
Libro electrónico -
10995Publicado 2024Tabla de Contenidos: “…Chapter 6: Event and Data Handling in Vue.js -- Technical requirements -- Exploring the Companion App changes -- Folders and file changes -- Logic changes -- Deepening our knowledge of props -- Props configurations -- Creating a basic button -- Handling native events in Vue.js -- Event modifiers -- Connecting components with custom events -- Event arguments -- Summary -- Chapter 7: Handling API Data and Managing Async Components with Vue.js -- Technical requirements -- Loading data from an API using the Vue.js life cycle -- Loading social posts from an API -- Fixing the SocialPost.vue properties' misalignment -- Load comments on demand -- Watching for changes in components using watch -- Handling asynchronous components with < -- Suspense> -- -- Understanding asynchronous components -- Turning a component into an asynchronous component -- Rendering async components -- Summary -- Part 3: Expanding Your Knowledge with Vue.js and Its Core Libraries -- Chapter 8: Testing Your App with Vitest and Cypress -- Technical requirements -- The testing pyramids -- Increased flexibility and the reduced risk of change -- Unit testing with Vitest -- Installing Vitest in your application -- Writing our first unit test -- E2E tests with Cypress -- Installing Cypress into your project -- Learning the E2E tests' file format and file location -- Writing your first E2E test -- Introducing advanced testing techniques -- Mocking -- Spying -- shallowMount (unit tests only) -- Summary -- Chapter 9: Introduction to Advanced Vue.js Techniques - Slots, Lifecycle, and Template Refs -- Technical requirements -- The power of slots -- Adding default values to a slot -- Slot versus property -- Provide multiple slots with named slots -- Accessing components elements with Template Refs -- Focus an onMounted element -- Access from native validation…”
Libro electrónico -
10996Publicado 2024Tabla de Contenidos: “…Cover -- FM -- Table of Contents -- Preface -- Chapter 1: Getting Started with Generative AI -- Technical requirements -- Defining the terminology -- The generative AI stack -- Python and GenAI -- OpenAI API -- MongoDB with Vector Search -- Important features of generative AI -- Why use generative AI? -- The ethics and risks of GenAI -- Summary -- Chapter 2: Building Blocks of Intelligent Applications -- Technical requirements -- Defining intelligent applications -- The building blocks of intelligent applications -- LLMs - reasoning engines for intelligent apps -- Use cases for LLM reasoning engines -- Diverse capabilities of LLMs -- Multi-modal language models -- A paradigm shift in AI development -- Embedding models and vector databases - semantic long-term memory -- Embedding models -- Vector databases -- Model hosting -- Your (soon-to-be) intelligent app -- Sample application - RAG chatbot -- Implications of intelligent applications for software engineering -- Summary -- Part 1 -- Foundations of AI: LLMs, Embedding Models, Vector Databases, and Application Design -- Chapter 3: Large Language Models -- Technical requirements -- Probabilistic framework -- n-gram language models -- Machine learning for language modelling -- Artificial neural networks -- Training an artificial neural network -- ANNs for natural language processing -- Tokenization -- Embedding -- Predicting probability distributions -- Dealing with sequential data -- Recurrent neural networks -- Transformer architecture -- LLMs in practice -- The evolving field of LLMs -- Prompting, fine-tuning, and RAG -- Summary -- Chapter 4: Embedding Models -- Technical requirements -- What is an embedding model? …”
Libro electrónico -
10997Publicado 2023Tabla de Contenidos: “…-- The cornerstones of proactive defense -- Advantages of a proactive stance -- Challenges in implementation -- The road ahead - a dynamic defense ecosystem -- The future state of enhanced sandbox environments in cybersecurity -- Modern challenges - evolving malware tactics -- The vision - next-generation sandboxes -- Summary -- Chapter 7: The Future State of Key International Compliance Requirements -- The future state of global data privacy regulations -- The future state of AI ethics and governance standards -- The future state of cybersecurity and risk management -- The future state of supply chain transparency -- The future state of financial crime prevention -- The future state of cross-border data flow regulations -- The future state of climate change regulations -- The future state of blockchain and digital identity -- The future state of RegTech -- The future state of geopolitical dynamics -- Summary -- Chapter 8: Epilogue - A Harmonious Overture to the Future of Malware Science and Cybersecurity -- Appendix -- Index -- About Packt -- Other Books You May Enjoy…”
Libro electrónico -
10998Publicado 2018Tabla de Contenidos: “…Fuzzing web requests using the Intruder tab -- Intruder attack types -- Practical examples -- Installing third-party apps using Burp Extender -- Summary -- Chapter 5: Understanding Web Application Vulnerabilities -- File Inclusion -- Local File Inclusion -- Remote File Inclusion -- Cross-Site Scripting -- Reflected XSS -- Stored XSS -- Exploiting stored XSS using the header -- DOM XSS -- JavaScript validation -- Cross-Site Request Forgery -- Step 01 - victim -- Step 02 - attacker -- Results -- SQL Injection -- Authentication bypass -- Extracting the data from the database -- Error-based SQLi enumeration -- Blind SQLi -- Command Injection -- OWASP Top 10 -- 1 - Injection -- 2 - Broken Authentication -- 3 - Sensitive Data -- 4 - XML External Entities -- 5 - Broken Access Control -- 6 - Security Misconfiguration -- 7 - Cross-Site Scripting (XSS) -- 8 - Insecure Deserialization -- 9 - Using Components with Known Vulnerabilities -- 10 - Insufficient Logging & -- Monitoring -- Summary -- Chapter 6: Application Security Pre-Engagement -- Introduction -- The first meeting -- The day of the meeting with the client -- Non-Disclosure Agreement -- Kick-off meeting -- Time and cost estimation -- Statement of work -- Penetration Test Agreement -- External factors -- Summary -- Chapter 7: Application Threat Modeling -- Software development life cycle -- Application Threat Modeling at a glance -- Application Threat Modeling in real life -- Application Threat Modeling document parts -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Test strategies -- Security risks -- Practical example -- xBlog Threat Modeling -- Scope -- Threat Modeling -- Project information -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Threats list -- Spoofing - authentication -- Tampering - integrity…”
Libro electrónico -
10999Publicado 2015Tabla de Contenidos: “…The 200-Day Moving Average Strategy How to Calculate the 200-Day Moving Average The 200-Day Moving Average in Action Backed Up By History Returns and Risks Using the 200-day Moving Average Why This Strategy Works Why It Works Especially Well for Investors over 50 Chapter Nineteen. …”
Libro electrónico -
11000Publicado 2013Tabla de Contenidos: “…-- IDEA #55: How social networks share knowledge -- IDEA #56: I'm in charge - check my paycheque -- IDEA #57: Great performance, but I regress -- IDEA #58: A bird in the hand is worth two in the bush -- IDEA #59: The hidden evil of stereotype threats -- IDEA #60: How to turn that black swan white -- IDEA #61: Kick the habit -- IDEA #62: The biology of risk-taking -- IDEA #63: Do you have a Pareto or a long tail? …”
Libro electrónico