Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 18
- Engineering & Applied Sciences 14
- Development 12
- Computer Science 11
- Security measures 11
- Operating systems (Computers) 9
- Safety measures 9
- Social aspects 9
- Application software 8
- Computer networks 8
- Software engineering 8
- Computer software 7
- Prevention 7
- Technology: general issues 7
- Artificial intelligence 6
- Medicine 6
- Open source software 6
- Computer programming 5
- Data protection 5
- Electrical & Computer Engineering 5
- Government policy 5
- History of engineering & technology 5
- Industrial applications 5
- Investments 5
- Management 5
- Risk assessment 5
- Risk management 5
- Agricultural and Biological Sciences 4
- Business & Economics 4
- C++ (Computer program language) 4
-
241Publicado 2024“…Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIs Key Features Develop a profound understanding of the inner workings of APIs with a sharp focus on security Learn the tools and techniques employed by API security testers and hackers, establishing your own hacking laboratory Master the art of building robust APIs with shift-left and shield-right approaches, spanning the API lifecycle Purchase of the print or Kindle book includes a free PDF eBook Book Description Along with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. …”
Libro electrónico -
242Publicado 2017“…Master Functional Programming techniques with this comprehensive guide for writing cleaner, safer, high-performing JavaScript codes About This Book Become proficient and skilled with Functional Programming in JavaScript to solve real-world development problems Successfully apply Functional Programming concepts and techniques to everyday JavaScript programming Bring modularity, reusability, testability, and performance to your web apps Who This Book Is For If you are a JavaScript developer and want to apply functional programming techniques, then this book is for you. …”
Libro electrónico -
243por Kletz, Trevor A.Tabla de Contenidos: “…Problems with Computer Control -- 20.1 Hardware and Software Faults -- 20.2 Treating the Computer as a Black Box -- 20.3 Misjudging the Way Operators Will Respond -- 20.4 Other Problems -- 20.5 Unauthorized Interference -- 20.6 New Applications -- 20.7 Conclusions -- Chapter 21. Inherently Safer Design -- 21.1 Bhopal -- 21.2 Other Examples of Inherently Safer Design -- 21.3 User-Friendly Design -- Chapter 22. …”
Publicado 2009
Libro electrónico -
244por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Increasing women's workforce participation and leadership in the transport sector would improve sustainability -- 10.4.2. Making settlements safer and more peaceful by engaging women -- 10.4.3. …”
Publicado 2021
Libro electrónico -
245por Mueller, John PaulTabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Book 1 Defining Data Science -- Chapter 1 Considering the History and Uses of Data Science -- Considering the Elements of Data Science -- Considering the emergence of data science -- Outlining the core competencies of a data scientist -- Linking data science, big data, and AI -- Understanding the role of programming -- Defining the Role of Data in the World -- Enticing people to buy products -- Keeping people safer -- Creating new technologies -- Performing analysis for research -- Providing art and entertainment -- Making life more interesting in other ways -- Creating the Data Science Pipeline -- Preparing the data -- Performing exploratory data analysis -- Learning from data -- Visualizing -- Obtaining insights and data products -- Comparing Different Languages Used for Data Science -- Obtaining an overview of data science languages -- Defining the pros and cons of using Python -- Defining the pros and cons of using R -- Learning to Perform Data Science Tasks Fast -- Loading data -- Training a model -- Viewing a result -- Chapter 2 Placing Data Science within the Realm of AI -- Seeing the Data to Data Science Relationship -- Considering the data architecture -- Acquiring data from various sources -- Performing data analysis -- Archiving the data -- Defining the Levels of AI -- Beginning with AI -- Advancing to machine learning -- Getting detailed with deep learning -- Creating a Pipeline from Data to AI -- Considering the desired output -- Defining a data architecture -- Combining various data sources -- Checking for errors and fixing them -- Performing the analysis -- Validating the result -- Enhancing application performance…”
Publicado 2020
Libro electrónico -
246Publicado 2022Tabla de Contenidos: “…Understanding that AI can't eliminate safety issues -- Chapter 7 Using AI to Address Medical Needs -- Implementing Portable Patient Monitoring -- Wearing helpful monitors -- Relying on critical wearable monitors -- Using movable monitors -- Making Humans More Capable -- Using games for therapy -- Considering the use of exoskeletons -- Addressing a Range of Physical Abilities -- Considering the software-based solutions -- Relying on hardware augmentation -- Seeing AI in prosthetics -- Completing Analysis in New Ways -- Relying on Telepresence -- Defining telepresence -- Considering examples of telepresence -- Understanding telepresence limitations -- Devising New Surgical Techniques -- Making surgical suggestions -- Assisting a surgeon -- Replacing the surgeon with monitoring -- Performing Tasks Using Automation -- Working with medical records -- Predicting the future -- Making procedures safer -- Creating better medications -- Combining Robots and Medical Professionals -- Chapter 8 Relying on AI to Improve Human Interaction -- Developing New Ways to Communicate -- Creating new alphabets -- Working with emoji and other meaningful graphics -- Automating language translation -- Incorporating body language -- Exchanging Ideas -- Creating connections -- Augmenting communication -- Defining trends -- Using Multimedia -- Embellishing Human Sensory Perception -- Shifting data spectrum -- Augmenting human senses -- Part 3 Working with Software-Based AI Applications -- Chapter 9 Performing Data Analysis for AI -- Defining Data Analysis -- Understanding why analysis is important -- Reconsidering the value of data -- Defining Machine Learning -- Understanding how machine learning works -- Understanding the benefits of machine learning -- Being useful -- being mundane -- Specifying the limits of machine learning -- Considering How to Learn from Data…”
Libro electrónico -
247Publicado 2018“…This experience-rich book is filled with mission-critical strategies to protect web applications against attacks, deter fraud attempts, and make your services safer when operating at scale. You’ll also learn to identify, assess, and secure the unique vulnerabilities posed by cloud deployments and automation tools commonly used in modern infrastructures…”
Libro electrónico -
248Publicado 2024Tabla de Contenidos: “…3.3.14.1 Webmail -- 3.3.14.2 Is big safer? -- 3.3.15 Instant messaging -- 3.3.15.1 Encryption -- 3.3.16 Social media -- 3.3.17 Do we need a VPN? …”
Libro electrónico -
249Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Table of Contents -- List of Figures -- List of Tables -- Abbreviations and Acronyms -- Glossary -- Acknowledgments -- Dedication -- Online Materials Accompanying this Handbook -- Preface -- Part 1 - Introduction and Overview -- 1 Purpose and Scope -- 1.1 Purpose -- 1.2 Scope of Book and Target Audience -- 1.3 Terms for Laboratories and Pilot Plants -- 1.4 Distinctions between Laboratories and Pilot Plants -- 1.5 Organization of This Handbook -- 2 Managing Risk to Prevent Incidents -- 2.1 Some LAPP Characteristics -- 2.2 Safety in Laboratories and Pilot Plants -- 2.3 Where to Start with a Risk-based Approach in the LAPP -- 2.4 Gain Leadership Support to Implement Risk Based Process Safety -- 2.5 Laboratory Safety Management System Considerations -- 2.6 Resources for Risk Based Process Safety Management System -- 3 Leaks and Spills in the LAPP -- 3.1 Leaks of Hazardous Materials -- 3.2 Spills of Hazardous Materials -- Part 2 - Committing to Process Safety -- 4 LAPP Risk Management Concepts -- 4.1 Occupational Safety and Process Safety -- 4.2 Hierarchy of Controls -- 4.3 Inherently Safer Design (ISD) -- 4.4 Basic Risk Concepts -- 4.5 A Risk Management Program -- 4.6 Anatomy of an Incident -- 4.7 Preventive and Mitigative Safeguards -- 4.8 Applying a Risk-Based Approach in a LAPP -- 5 Process Safety Culture in the LAPP -- 5.1 RBPS Element 1: Process Safety Culture -- 5.2 Leaders' Responsibilities for Positive Safety Culture -- 5.3 Resources and Examples for Process Safety Culture -- 6 Standards for the LAPP -- 6.1 RBPS Element 2: Compliance with Standards -- 6.2 Risk Management Focus -- 6.3 Different Codes and Standards When Scaling Up from Laboratory to Pilot Plant -- 6.4 Jurisdictional Requirements -- 6.5 Resources for Compliance with Standards -- 7 Process Safety Competency and Training in the LAPP…”
Libro electrónico -
250Publicado 2019“…By outlining these connections, the author provides an aid to a safer, healthier approach to food frying. Topics covered range from culturally specific forms of frying to detailed analyses of the chemical and biochemical processes involved in its practice. …”
Libro electrónico -
251Publicado 2016Tabla de Contenidos: “…-- Listing ignored files -- Ignoring changes in tracked files -- File attributes -- Identifying binary files and end-of-line conversions -- Diff and merge configuration -- Generating diffs and binary files -- Configuring diff output -- Performing a 3-way merge -- Transforming files (content filtering) -- Obligatory file transformations -- Keyword expansion and substitution -- Other built-in attributes -- Defining attribute macros -- Fixing mistakes with the reset command -- Rewinding the branch head, softly -- Removing or amending a commit -- Squashing commits with reset -- Resetting the branch head and the index -- Splitting a commit with reset -- Saving and restoring state with the WIP commit -- Discarding changes and rewinding branch -- Moving commits to a feature branch -- Undoing a merge or a pull -- Safer reset - keeping your changes -- Rebase changes to an earlier revision…”
Libro electrónico -
252Publicado 2023Tabla de Contenidos: “…-- Man-to-Machine Ratios -- Containment Action versus Countermeasures versus Solutions Solution -- Long Action Item Lists that Keep Growing for the Wrong Reasons -- Respect for Humanity: What We Call the People Piece -- Top of the Toyota House: Respect for Humanity -- Respect for Humanity Is Not -- Respect for Humanity Is -- Respect for Humanity and Ideas -- Make the Employee's Job Easier -- Make the Employee's Job Safer: The Best Safety Test -- Scanlon Principles -- Lean and Layoffs -- Unions and Lean -- Foundation for the Lean House: Total Company-Wide Quality Management -- Quality Circles (Jishuken) -- Total Company-Wide Quality Control -- Problem-Solving: The 5 Whys -- What We Know versus What We Don't Know -- Know How versus Know Why -- Poka Yoke -- 5W2Hs: Another Tool to Get Rid of Waste -- PCDSA: Dr. …”
Libro electrónico -
253por Rajendran, SathiyarajTabla de Contenidos: “…-- 4.2 A Study on Technologies Used in AV -- 4.2.1 Artificial Vision -- 4.2.2 Varying Light and Visibility Conditions -- 4.2.3 Scenes with a High Dynamic Range (HDR) -- 4.2.3.1 3 Dimensional Technology -- 4.2.3.2 Emerging Vision Technologies -- 4.2.4 Radar -- 4.2.4.1 Emerging Radar Technologies -- 4.2.5 LiDAR -- 4.2.5.1 Emerging LiDAR Technologies -- 4.3 Analysis on the Architecture of Autonomous Vehicles -- 4.3.1 Hardware Architecture -- 4.3.2 Software Architecture -- 4.4 Analysis on One of the Proposed Architectures -- 4.5 Functional Architecture of Autonomous Vehicles -- 4.6 Challenges in Building the Architecture of Autonomous Vehicles -- 4.6.1 Road Condition -- 4.6.2 Weather Condition -- 4.6.3 Traffic Condition -- 4.6.4 Accident Responsibility -- 4.6.5 Radar Interference -- 4.7 Advantages of Autonomous Vehicles -- 4.8 Use Cases for Autonomous Vehicle Technology -- 4.8.1 Five Use Cases -- 4.9 Future Aspects of Autonomous Vehicles -- 4.9.1 Levels of Vehicle Autonomy -- 4.9.2 Safer Mobility Technology -- 4.9.3 Industry Collaboration and Policy Matters -- 4.10 Summary -- References -- Chapter 5 Autonomous Car Driver Assistance System -- 5.1 Introduction -- 5.1.1 Traffic Video Surveillance -- 5.1.2 Need for the Research Work -- 5.2 Related Work -- 5.3 Methodology -- 5.3.1 Intelligent Driver Assistance System -- 5.3.2 Traffic Police Hand Gesture Region Identification -- 5.3.3 Vehicle Brake and Indicator Light Identification…”
Publicado 2024
Libro electrónico -
254Publicado 2024Tabla de Contenidos: “…-- Listing ignored files -- Trick - ignoring changes in tracked files -- File attributes -- Identifying binary files and end-of-line conversions -- Diff and merge configuration -- Transforming files (content filtering) -- Keyword expansion and substitution -- Other built-in attributes -- Defining attribute macros -- Fixing mistakes with the reset command -- Rewinding the branch head, softly -- Resetting the branch head and the index -- Discarding changes and rewinding the branch -- Safer reset - keeping your changes -- Stashing away your changes -- Using git stash -- Stash and the staging area -- Stash internals -- Managing worktrees and the staging area -- Examining files and directories -- Searching file contents…”
Libro electrónico -
255por Lewis, Ted G.Tabla de Contenidos: “…-- 5.3.2 Climate Change and Rot - The New Threats -- 5.4 The Architecture of Water Systems -- 5.4.1 The Law of the River -- 5.4.2 Resiliency of Water Pipeline Networks -- 5.5 Hetch Hetchy Water -- 5.5.1 Risk Analysis -- 5.5.2 Resilience Analysis -- 5.6 Threat Analysis -- 5.6.1 The Rational Actor -- 5.6.2 Hetch Hetchy Threat Analysis -- 5.6.3 Chem-Bio -- 5.6.4 Earthquakes -- 5.7 Water Resilience -- 5.7.1 Save the Pineapple Express -- 5.7.2 Gray Water -- 5.7.3 Desalination -- 5.7.4 Exemplar Israel -- 5.8 Discussion -- References -- Chapter 6 Transportation Renewed -- 6.1 Transitioning a Vast and Complex Sector -- 6.1.1 Government Leads the Way -- 6.1.2 Safety and Security -- 6.2 Roads at TOC Risk -- 6.2.1 The Road to Prosperity -- 6.2.2 Economic Impact -- 6.2.3 The National Highway System (NHS) -- 6.2.4 The Interstate Highway Network is Resilient -- 6.2.5 The NHS is Safer -- 6.2.6 The Future is Electric -- 6.3 Rail and Railroads -- 6.3.1 Birth of Regulation -- 6.3.2 Freight Trains -- 6.3.3 Passenger Rail -- 6.3.4 Terrorist Target Passenger Trains -- 6.3.5 Economics of Rail -- 6.4 Air Transportation -- 6.4.1 Resilience of the Hub-and-Spoke Network -- 6.4.2 Security of Commercial Air Travel -- 6.4.3 How Safe and Secure is Flying in the United States? …”
Publicado 2023
Libro electrónico -
256Publicado 2019Tabla de Contenidos: “…Organizational Support -- 7.4.12. Safer Systems and Products -- 7.4.13. Design Order of Precedence -- 7.4.14. …”
Libro electrónico -
257Publicado 2023Tabla de Contenidos: “…-- 1.4 What you will learn in this book -- Summary -- 2 Introducing Behavior-Driven Development -- 2.1 BDD was originally designed to make teaching TDD easier -- 2.2 BDD also works well for requirements analysis -- 2.3 BDD principles and practices -- 2.3.1 Focus on features that deliver business value -- 2.3.2 Work together to specify features -- 2.3.3 Embrace uncertainty -- 2.3.4 Illustrate features with concrete examples -- 2.3.5 A Gherkin primer -- 2.3.6 Don't write automated tests -- write executable specifications -- 2.3.7 These principles also apply to unit tests -- 2.3.8 Deliver living documentation -- 2.3.9 Use living documentation to support ongoing maintenance work -- 2.4 Benefits of BDD -- 2.4.1 Reduced waste -- 2.4.2 Reduced costs -- 2.4.3 Easier and safer changes -- 2.4.4 Faster releases -- 2.5 Disadvantages and potential challenges of BDD -- 2.5.1 BDD requires high business engagement and collaboration -- 2.5.2 BDD works best in an Agile or iterative context -- 2.5.3 BDD doesn't work well in a silo -- 2.5.4 Poorly written tests can lead to higher test-maintenance costs -- Summary…”
Libro electrónico -
258Publicado 2024“…You'll learn: The fundamentals of authentication, authorization, access control, and secrets management What developers need to know about managing secrets and identity to build safer apps What nonhuman identities, secrets, and credentials are--and how to secure them How developers work with their cross-function peers to build safer apps How identity security fits into modern software development practices…”
Libro electrónico -
259Publicado 2016“…Hicks shows that by choosing dignity as a way of life, we open the way to greater peace within ourselves and to a safer and more humane world for all…”
Grabación musical -
260Publicado 2018“…What you will learn Use static types to capture information, making programs safer and faster Learn ReasonML from experienced type-driven developers Enhance safety by simply using basic types Understand the most important type-driven concepts with simple examples Explore a design space using static typing and find the best way to express your system rules Use static types and dynamic runtime in harmony to write even safer and faster code Who this book is for If you're a programmer working with dynamically typed languages and are looking for ways to mitigate production runtime errors, Learn Type-Driven Development is for you. …”
Libro electrónico