Mostrando 661 - 680 Resultados de 2,801 Para Buscar '"Safed"', tiempo de consulta: 0.10s Limitar resultados
  1. 661
    por Wallhagen, Marita
    Publicado 2023
    Tabla de Contenidos: “…Urban Transition - Perspectives on Urban Systems and Environments -- Contents -- Preface -- Section 1 UrbanDesign,Transport, Safety, and Envisioning theFuture– Influence onUrbanTransitions -- Chapter1 Promoting Partnership between Urban Design and Urban Ecology through Social-Ecological Resilience Building -- Chapter2 SustainableTransport Developments for Dhaka City -- Chapter3 Inclusive, Safe and Resilient Public Spaces: Gateway to Sustainable Cities? …”
    Libro electrónico
  2. 662
    Publicado 2024
    Tabla de Contenidos: “…Utilization of Deep Learning Models for Safe Human-friendly Computing in Cloud, Fog and Mobile Edge Networks. …”
    Libro electrónico
  3. 663
    Publicado 2009
    Tabla de Contenidos: “…Griffith -- Alle origini della tradizione pagana su Costantino e il senato romano / Rita Lizzi Testa -- Four funerals and a wedding : this world and the next in fourth-century Rome / John Matthews -- Les râeticences de saint Augustin face aux lâegendes hagiographiques d'apráes la lettre Divjak 29* / Claude Lepelley -- Language, morality and cult : Augustine and Varro / Philip Rousseau -- A world full of stories / Charlotte Rouechâe -- Safe-conducts to heaven : holy men, mediation and the role of writing / Claudia Rapp -- Book burning as purification / Judith Herrin -- Gregorio Magno e i 'Libri dei Re' / Lellia Cracco Ruggini e Giorgio Cracco -- The late antique origins of the lunatic asylum? …”
    Libro
  4. 664
    Publicado 2024
    Tabla de Contenidos: “…-- Exploring relevant cybersecurity and functional safety standards -- Examining the safety and cybersecurity lifecycle -- Safety lifecycle -- Cybersecurity lifecycle -- Summary -- Further reading -- Chapter 2: SIS Evolution and Trends -- The history and evolution of SISs -- The need for protecting SISs -- ICS cyber risk trends and evolution -- The intersection of safety and cybersecurity -- ICS threat landscape -- ICS cybersecurity incidents and lessons learned -- Summary -- Further reading -- Chapter 3: SIS Security Design and Architecture -- Understanding DiD and LOPA principles -- The DiD strategy -- The LOPA strategy -- ICS security design and architecture -- The Purdue model -- ICS key components for safety functions -- ICS zoning and conduits -- SIS secure architecture -- Managing entry points -- Example SIS reference architectures -- Safety network protocols -- HART -- Modbus -- OPC -- SafeEthernet (HIMA) -- Vnet/IP (Yokogawa) -- ProfiSafe -- Functional Safety Over EtherCAT (FSoE) -- CIP Safety -- CC-Link Safety -- openSAFETY -- ICS proprietary protocols -- Lab exercise - TRITON -- Summary -- Further reading -- Part 2: Attacking and Securing SISs -- Chapter 4: Hacking Safety Instrumented Systems -- ICS attacks -- Process (physical) attacks -- Cyber attacks -- Understanding the SIS attack surface -- SuCs -- Abusing the HMI -- Attacking the SIS controller -- (P)0wning the S-EWS -- Abusing the IAMS -- Replaying traffic…”
    Libro electrónico
  5. 665
    por Criddle, Linda
    Publicado 2006
    Tabla de Contenidos: “…; Assessing the Risks; Telltale Signs of Spam Scams; Facing the Fraud; Communicating Safely; Protecting Yourself; Taking the First Steps; Avoiding Incoming Threats; Chapter 11: Step 8: Date Safely Online; What Just Happened?…”
    Libro electrónico
  6. 666
    por Georgenes, Chris
    Publicado 2009
    Tabla de Contenidos: “…Flash to video; Document setup; Ape Escape; Title and action safety; Safe colors; Safe colors (Kuler); Keeping it all in sync; QuickTime Exporter; SWF2Video; Interlude: Graphics tablets; 7. …”
    Libro electrónico
  7. 667
    por Smith, Rick, 1952-
    Publicado 2013
    Tabla de Contenidos: “…Basic Camera Shots, Lighting, and Audio; Basic Shot Types; Wide Shot; Medium Shot; Close-Up Shot; Camera Framing; Title Safe and Action Safe Zones; Camera Viewfinders and Monitors; Basic Camera Moves; Pan; Tilt; Zoom; Follow; Tracking or Dolly; Camera Positions and Angles; Eye-Level (Point of View)…”
    Libro electrónico
  8. 668
    por Georgenes, Chris
    Publicado 2013
    Tabla de Contenidos: “…; 6 Flash to video; Document setup; Title and action safety; CS5 video templates; Safe colors; Safe colors (Kuler); Ape Escape; Keeping it all in sync; QuickTime Exporter; SWF & FLV Toolbox; Interlude: Graphics tablets; 7 Animation examples; Super text effect; Page turn; Smoke with gradients; Smoke stylized; Full steam ahead; Handwriting effect (frame-by-frame); Fireworks; Soft reveal; Star Wars text; Color adjustments; Vertigo; Let it rain; Playing with fire; Torch; Lightning…”
    Libro electrónico
  9. 669
    Publicado 2013
    Tabla de Contenidos: “…Dahl; A Remotely Extinguished Cremora®-Fueled Chris Peterson Flame Effect: Chris Peterson; A Mechanism for a Battery-Operated Torch: Katherine Gloria Tharp; A Safe Glass Mirror Breaking Effect: John McCullough; 1970s' Period Pull-Tab Beverage Cans: Jeff Smejdir; An Affordable Chair for Sweeney Todd: Colin Buckhurst; Using a Trolling Reel to Move Small Furniture and Props: Steve Schmidt; Hand-Held Dancing Fireflies: Andrew V. …”
    Libro electrónico
  10. 670
    Publicado 2002
    Tabla de Contenidos: “…Phenolic Resin Pulleys: Out of the Skies and into the FutureRIGGING TECHNIQUES; Flying Drops in Limited Fly Space; A Quick and Simple Rigging System; A Quick and Simple Rigging System: Addendum; A Simultaneous Travel-Fly Rig; A Travel-Fly Rig Modified; A Quiet Wire-Rope Curtain Track; Automatic Drop Tripping; Rotating Flats While Flying; Offset Flying; A Tracked System for Flying Actors; A Safe and Sag-Free Cable Curtain Track; A Parallel-Guide Rig; SAFETY; General Specifications for Stairs and Ladders; Compliance with Fire Safety; Determining Tension in Bridling Lines…”
    Libro electrónico
  11. 671
    por Rogers, Vanessa
    Publicado 2010
    Tabla de Contenidos: “…4.15 Expressing emotions; 4.16 Stress out; 4.17 Stress gallery; 5.Exploring Values and Attitudes; 5.1 First impressions; 5.2 To be a man; 5.3 Word bag; 5.4 Gender rules activity; 5.5 Acceptable/unacceptable; 5.6 What's in a name; 5.7 Jobs for the boys; 5.9 Images; 5.8 Men in the news; 5.10 Positive relationships; 6.Taking Risks; 6.1 Risky behaviour; 6.2 Crime sheet; 6.3 Alcohol value maps; 6.4 Would have/should have; 6.5 The truth, the whole truth...; 6.6 How safe is safe?; 6.7 Sexual health myth or fact?; 6.8 What happened next?…”
    Libro electrónico
  12. 672
    Publicado 2022
    Tabla de Contenidos: “…Acknowledgements -- Abbreviations and Acronyms -- Table of Materials -- Introduction -- 1The Need to Provide International Protection to Persons Mobile in the Context of Disasters and Climate Change -- 1Human Mobility in the Context of Disasters and Climate Change as a Complex Problem -- 2International Protection as a Solution -- 2.1The Notion of International Protection in International Law -- 2.2Conceptualising the International Protection of Persons Mobile in the Context of Disasters and Climate Change -- 3Towards International Protection: The Global Compact on Refugees and the Global Compact for Safe, Orderly and Regular Migration -- 3.1The Notion of a Global Compact -- 3.2International Protection and the Global Compact on Refugees -- 3.3International Protection and the Global Compact for Safe, Orderly and Regular Migration -- 3.4Future Implications -- 4Conclusion -- 2Mapping the Legal Gaps -- 1Relevant International Treaty Regimes -- 1.1International Refugee Regime -- 1.2International Climate Change Regime -- 1.3International Desertification Regime -- 1.4International Labour Regime -- 1.5International Trade Regime -- 1.6International Human Rights Regimes -- 2Relevant International Rules and Principles -- 2.1Non-refoulement -- 2.2Protection in the Event of Displacement -- 2.3Protection in the Event of Disasters -- 3A Novel Challenge: Sea-Level Rise and International Law -- 4Conclusion -- 3Legal Gaps in Action – Insights from the Pacific Island States -- 1Setting the Scene -- 2Human Mobility in the Context of Disasters and Climate Change in the Region -- 2.1Comparing the Pathways for Inter- and Intra-regional Movement -- 2.2The Prospects for a ‘Regional’ Approach to Human Mobility: pacer Plus, Free Movement and Labour Mobility -- 3Learning from the Domestic Approaches to Protection -- 3.1The Notion of Planned Relocation and the Pacific Island States -- 3.2Planned Relocation Policy of Vanuatu -- 3.3Planned Relocation Policy of Fiji -- 4Conclusion -- 4The International Protection of Persons Mobile in the Context of Disasters and Climate Change as a Community Interest -- 1The Theory of Community Interests in International Law -- 1.1Revival and Content -- 1.2Legal Effects: Obligations Erga Omnes as a Reflection of Community Interests -- 2Application of a Community Interest Approach: Towards an Obligation Erga Omnes to Protect Persons Mobile in the Context of Disasters and Climate Change -- 2.1Identification -- 2.2Pathways to Using the Existing Procedural Aspects of International Law -- 2.3Pathways to Using the Follow-Up and Review Mechanisms of the Global Compact for Migration and the Global Compact on Refugees -- 3Conclusion -- 5The International Protection of Persons Mobile in the Context of Disasters and Climate Change as a Common Concern of Humankind -- 1The Theory of the Common Concern of Humankind in International Law -- 1.1Emergence and Expressions -- 1.2Legal Effects: Treaty Regimes as a Reflection of Common Concerns -- 2The Application of a Common Concern Approach: Towards a New Treaty Regime -- 2.1A Novel Duty to Cooperate -- 2.2A Novel Duty to Act -- 3Conclusion -- Conclusion Summary and Outlook -- 1International Protection and Human Mobility in the Context of Disasters and Climate Change -- 2Lessons Learnt about Community Interests and Common Concerns -- 3Outlook -- Bibliography -- Index…”
    Libro electrónico
  13. 673
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Kotlin - Data Types, Objects, and Classes -- Classes -- Properties -- Methods -- Inheritance -- Abstract classes -- Interfaces -- Objects -- Object declarations -- Companion objects -- Generics -- Type alias -- Nullable types -- Checking for null -- Checking for non-null types -- Safe calls -- The Elvis (?:) operator -- The (!!) …”
    Libro electrónico
  14. 674
    por Schreckenberg, Kate
    Publicado 2018
    Tabla de Contenidos: “…part I Evolving framings and contexts / chapter 1 Seeing the wood for the trees -- Exploring the evolution of frameworks of ecosystem services for human wellbeing / chapter 2 Justice and equity -- Emerging research and policy approaches to address ecosystem service trade-offs / chapter 3 Social-ecological systems approaches -- Revealing and navigating the complex trade-offs of sustainable development / chapter 4 Limits and thresholds -- Setting global, local and regional safe operating spaces / part II Ongoing and rapid system changes / chapter 5 Interactions of migration and population dynamics with ecosystem services / chapter 6 Land use intensification -- The promise of sustainability and the reality of trade-offs / chapter 7 Ecosystem services and poverty alleviation in urbanising contexts / chapter 8 Reciprocal commitments for addressing forest–water relationships / chapter 9 Restoration of ecosystems and ecosystem services / part III Improving governance / chapter 10 Governing for ecosystem health and human wellbeing / chapter 11 Co-generating knowledge on ecosystem services and the role of new technologies / chapter 12 PES -- Payments for ecosystem services and poverty alleviation? …”
    Libro electrónico
  15. 675
    Publicado 2019
    Tabla de Contenidos: “…-Regular Language Learning Library -- Symbolic Regex Matcher -- COMPASS 3.0 -- Debugging of Behavioural Models with CLEAR -- Machine Learning -- Omega-Regular Objectives in Model-Free Reinforcement Learning -- Verifiably Safe Off-Model Reinforcement Learning. …”
    Libro electrónico
  16. 676
    por Hanauer, Larry
    Publicado 2012
    Tabla de Contenidos: “…Regionalize Solutions to Afghan Security and Stability ProblemsProject Power; Provide Military Assistance; Effectiveness of India's Strategies; CHAPTER THREE: Pakistan; Pakistan's Objectives in Afghanistan; Block Indian Influence; Prevent Encirclement and Maintain Strategic Depth; Establish Safe Havens for Pakistani-Trained Extremists; Undermine Afghan Claims on Pashtunistan; Build Economic Links to the Central Asian Republics; Curb Other States' Influence in Afghanistan; Pakistan's Strategies in Afghanistan; Train Extremists to Counter India in Afghanistan…”
    Libro electrónico
  17. 677
    Publicado 2022
    Tabla de Contenidos: “….- Constructive Journalism and Covid -19 Safe Narratives in Zimbabwe a Case of the Herald Reportage of Corona Pandemic.- Endangered Voices: Nigerian Journalists’ Safety Amid the COVID-19 Pandemic.- Framing Poverty in Nigerian Online Media Reports on the Maiden Neglected Tropical Diseases (NTDs) Day.- Face-to Face with COVID-19: Experiences of Ghanaian Frontline Journalists Infected with the Virus.- A Comparative Discourse Analysis of African Newspaper Reports on Global Epidemics: A Case Study Ebola and Coronavirus.- Citizen Journalism and Health Communication in Pandemic Prevention and Control.- “This is a Punishment to America” Framing the Covid-19 Pandemic in Zimbabwe’s Mainstream Media.- Part III Regulation, Representation and Marginalisation.- Cyber Crimes Law, Citizenship: Journalism Clampdown in Times of Covid in Tanzania.- Framing the Aids Discourse: Authority Versus Non-Authority Sources in Uganda’s HIV Aids News Reporting.- Weapons of Oppressors: Covid -19 Regulatory Framework and Impact on Journalism Practice in South Africa.- Media Discourses on Gender in Covid-19 Times in Zimbabwe…”
    Libro electrónico
  18. 678
    Publicado 2007
    Tabla de Contenidos: “…Invited Talk -- Erlang – Software for a Concurrent World -- Types -- Gradual Typing for Objects -- Generic Universe Types -- Declarative Object Identity Using Relation Types -- Runtime Implementation -- Object-Relative Addressing: Compressed Pointers in 64-Bit Java Virtual Machines -- Generational Real-Time Garbage Collection -- AS-GC: An Efficient Generational Garbage Collector for Java Application Servers -- Empirical Studies -- Exception Handling: A Field Study in Java and .NET -- On the Impact of Aspectual Decompositions on Design Stability: An Empirical Study -- Dahl-Nygaard Prize Invited Talk -- An Accidental Simula User -- Programs and Predicates -- Validity Invariants and Effects -- Non-null References by Default in Java: Alleviating the Nullity Annotation Burden -- Efficiently Generating Structurally Complex Inputs with Thousands of Objects -- Language Design -- Matching Objects with Patterns -- DirectFlow: A Domain-Specific Language for Information-Flow Systems -- A Relational Model of Object Collaborations and Its Use in Reasoning About Relationships -- Inheritance and Derivation -- JavaGI: Generalized Interfaces for Java -- Metaprogramming with Traits -- Morphing: Safely Shaping a Class in the Image of Others -- A Higher Abstraction Level Using First-Class Inheritance Relations -- Dahl-Nygaard Prize Invited Talk -- Assuring Object-Oriented Architecture -- Aspects -- MAO: Ownership and Effects for More Effective Reasoning About Aspects -- Joinpoint Inference from Behavioral Specification to Implementation -- A Machine Model for Aspect-Oriented Programming -- A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring -- Language About Language -- Tracking Linear and Affine Resources with Java(X) -- Attribute Grammar-Based Language Extensions for Java -- Metamodel Adaptation and Model Co-adaptation…”
    Libro electrónico
  19. 679
    Publicado 2010
    Tabla de Contenidos: “…-- A Simplex-Like Algorithm for Fisher Markets -- Nash Equilibria in Fisher Market -- Partition Equilibrium Always Exists in Resource Selection Games -- Mixing Time and Stationary Expected Social Welfare of Logit Dynamics -- Pareto Efficiency and Approximate Pareto Efficiency in Routing and Load Balancing Games -- On Nash-Equilibria of Approximation-Stable Games -- Improved Lower Bounds on the Price of Stability of Undirected Network Design Games -- On the Rate of Convergence of Fictitious Play -- On Learning Algorithms for Nash Equilibria -- On the Structure of Weakly Acyclic Games -- A Direct Reduction from k-Player to 2-Player Approximate Nash Equilibrium -- Responsive Lotteries -- On the Existence of Optimal Taxes for Network Congestion Games with Heterogeneous Users -- Computing Stable Outcomes in Hedonic Games -- A Perfect Price Discrimination Market Model with Production, and a (Rational) Convex Program for It -- The Computational Complexity of Trembling Hand Perfection and Other Equilibrium Refinements -- Complexity of Safe Strategic Voting -- Bottleneck Congestion Games with Logarithmic Price of Anarchy -- Single-Parameter Combinatorial Auctions with Partially Public Valuations -- On the Efficiency of Markets with Two-Sided Proportional Allocation Mechanisms -- Braess’s Paradox for Flows over Time -- The Price of Anarchy in Network Creation Games Is (Mostly) Constant -- Truthful Fair Division -- No Regret Learning in Oligopolies: Cournot vs. …”
    Libro electrónico
  20. 680
    por CBSE 2005
    Publicado 2005
    Tabla de Contenidos: “…Prediction, Analysis and Monitoring of System Architecture -- Performance Prediction of J2EE Applications Using Messaging Protocols -- EJBMemProf – A Memory Profiling Framework for Enterprise JavaBeans -- Model-Driven Safety Evaluation with State-Event-Based Component Failure Annotations -- Optimizing Resource Usage in Component-Based Real-Time Systems -- Evaluating Performance Attributes of Layered Software Architecture -- Component-Level Dataflow Analysis -- Architecture and Design of Component-Based Systems -- Exogenous Connectors for Software Components -- Qinna, a Component-Based QoS Architecture -- Architecture Based Deployment of Large-Scale Component Based Systems: The Tool and Principles -- Component-Based Open Middleware Supporting Aspect-Oriented Software Composition -- An Empirical Study on the Specification and Selection of Components Using Fuzzy Logic -- Finding a Needle in the Haystack: A Technique for Ranking Matches Between Components -- Extra-Functional System Properties of Components and Component-Based Systems -- A Contracting System for Hierarchical Components -- Tailored Responsibility Within Component-Based Systems -- Efficient Upgrading in a Purely Functional Component Deployment Model -- Real-Time Scheduling Techniques for Implementation Synthesis from Component-Based Software Models -- A Component-Oriented Model for the Design of Safe Multi-threaded Applications -- TeStor: Deriving Test Sequences from Model-Based Specifications -- Components at Work -- A CCA-compliant Nuclear Power Plant Simulator Kernel -- Experience with Component-Based Development of a Telecommunication Service -- Reusable Dialog Component Framework for Rapid Voice Application Development -- Unlocking the Grid -- Experience Report: Design and Implementation of a Component-Based Protection Architecture for ASP.NET Web Services…”
    Libro electrónico