Mostrando 941 - 960 Resultados de 2,801 Para Buscar '"Safed"', tiempo de consulta: 0.08s Limitar resultados
  1. 941
    Publicado 2014
    Tabla de Contenidos: “…Learning to use list comprehensionsImplementing is_exact_type; Saying goodbye to map and filter; Writing a skeleton converter library; Writing the docstring and pseudocode; Understanding docstrings and reStructured Text; Writing the first implementation; Breaking the first implementation; Understanding interface contracts; Extracting the safe_setparent utility function; Learning how to refactor; Simplifying the node to joint conversion; Learning how to use closures; Dealing with node connections; Dealing with namespaces; Wrapping up the skeleton converter; Writing a character creator…”
    Libro electrónico
  2. 942
    por Grannell, Craig
    Publicado 2012
    Tabla de Contenidos: “…Deprecated and nonstandard physical stylesThe small element; Subscript and superscript; Logical styles for programming-oriented content; Block quotes, quote citations, and definitions; Abbreviations; Elements for inserted and deleted text; The importance of well-formed markup; The importance of end tags; Styling text using CSS; Defining font colors; Defining fonts; Web-embedded fonts and web-safe fonts; Embedding web fonts; Sans-serif fonts for the Web; Serif fonts for the Web; Fonts for headings and monospace type; Mac vs. …”
    Libro electrónico
  3. 943
    Publicado 2015
    Tabla de Contenidos: “…Transaction Confirmations, Double Spending , and IrreversibilityMining Bitcoins; The Complexity of the Bitcoin System; Chapter 3: Storing Your Bitcoins Safely, Securely, and Conveniently; Storing Your Private Key(s); Hot Storage vs. …”
    Libro electrónico
  4. 944
    por Gasior, Lukasz
    Publicado 2014
    Tabla de Contenidos: “…Generate object membersUsing code editing helpers; Enhanced IntelliSense; Extending the code selection; Safe delete; Auto-importing namespaces; Quick documentation; Templates; Templates as snippets; File template; Customization; Multifile templates; Refactoring; Rename; Moving to separate file; Refactor this...; Summary; Chapter 3: Finding What You Need Quickly; Finding files; Going to proper file; Bookmarks; Last edited location; Go to Everything; Searching code references; Go to Declaration; Code usage; The Navigate to feature; Displaying code structure; File members…”
    Libro electrónico
  5. 945
    por Kolb, Tim
    Publicado 2004
    Tabla de Contenidos: “…CAPTURING MEDIA IN PREMIERE PROOpening the Capture Window; Setting up Deck Control; Manual Capture; Capture In to Out Point; Batch Capture; Automatic Scene Detection; Importing Files; ORGANIZING YOUR MEDIA; Viewing Clips; Displaying and Sorting Items in the Project Window; Using the Project Window to Storyboard; Deleting an Item; Search Function; MONITORS; Test Displays; "Ganging" a Reference Monitor to the Program Monitor; Loop; Audio Units; Quality Settings; Safe Areas; Dual View and Single View; Preparing a Clip in the Source Monitor; EDITING; Targeting Tracks; Insert and Overlay Editing…”
    Libro electrónico
  6. 946
    por Gross, James J. author
    Publicado 2013
    Tabla de Contenidos: “…Chapter 2: Things to Do NowWays to Take Charge of Finances; Bank Accounts; Stocks, Money Market Funds, Certificates of Deposit, and Brokerage Accounts; Credit Cards; Loans and Lines of Credit; Health Insurance; Life Insurance; Bills; Retirement Accounts; Snooping: How to Find Information Legally; Inventory and Safeguard Your Stuff; Collections and Other Valuables; Documents; Safe Deposit Boxes and Storage Units; Social Security; Your Will and Powers of Attorney; Domestic Violence; Find a Lawyer (and Make Your Lawyer's Job Easier); War Chest; Divorce Calendar; Divorce To Do List…”
    Libro electrónico
  7. 947
    Publicado 2015
    Tabla de Contenidos: “…Understanding Why Employees Behave Safely from a Self-Determination Theory Perspective / Natasha Scott, Mark Fleming, and E. …”
    Libro
  8. 948
    Publicado 2017
    Tabla de Contenidos: “…Possible Ways Ahead; 1.4 Multidisciplinary Problem Solving; 2 Environmental and Social Impacts, from Garment Level to Industry Sector Level; 2.1 Life Cycle Assessment, from Garment Level to Industry Sector Level Environmental Performance; 2.1.1 Selected Garments and Their Life Cycle Models; 2.1.2 Scaling up to Swedish National Clothing Consumption; 2.1.3 Results ; 2.2 Social Impact Assessment of the Swedish Clothing Industry Sector2.2.1 Results; 2.3 Use Phase Assumptions and National Statistics; 2.4 Generality and Representativeness for Other Contexts; 2.4.1 Amounts of Garments Consumed Per Capita; 2.4.2 The Electricity Mix Used for Washing and Drying Garments in the Use Phase; 2.4.3 The Washing Habits of the Consumers; 2.4.4 Consumer Transports; 2.4.5 Summary of Scenario Parameters; 2.4.6 Results from the Scenarios; 3 Defining Sustainable Clothing from the Perspective of a Safe and just Operating Space; 3.1 Sustaining Ecosystem Functioning ; 3.2 Fulfilling Human Needs in an Equitable Way3.2.1 The Clothing Sector's Contribution to Human Needs; 3.3 Sustainability Targets in the Fashion Industry; 3.3.1 Targets for Environmental Sustainability; 3.3.2 Targets for Social Sustainability; 4 Evaluation of Interventions; 4.1 Interventions for Environmental Impact Reduction; 4.2 Climate Change Reduction of Selected Interventions; 4.3 Interventions for Social Impact Reduction and Their Effect; 5 Discussion; 5.1 Growing Use of LCA in the Clothing Sector; 5.2 LCA as an Quantitative Approach to Textile Sustainability ; 5.3 LCA on Industrial Sector Level5.4 Concluding Remarks; Appendix; References; 2 Sustainability in the Textile and Fashion Industries: Animal Ethics and Welfare; Abstract; 1 Introduction; 2 Methodology; 3 Sustainability and Animal Ethics and Welfare in the Textile and Fashion Industries; 3.1 The UN Global Compact; 3.1.1 Code of Conduct and Manual for the Fashion and Textile Industry: The First "Sectorial" Initiative of the Global Compact; 4 Code of Conduct and Manual for the Textile and Fashion Industry's Principle 11: Animal Ethics and Welfare ; 5 Sustainability with Cruelty to Animals? …”
    Libro electrónico
  9. 949
    Publicado 2024
    Tabla de Contenidos: “…Hardware/software integration: Ideal project flow ; Hardware design ; Board bring-up -- Reading a datasheet: Datasheet sections you need when things go wrong ; Datasheet sections for software developers ; Evaluating components using the datasheet -- Your processor is a language -- Reading a schematic -- Practice reading a schematic: Arduino! -- Keep your board safe -- Creating your own debugging toolbox: Digital multimeter ; Oscilloscopes and logic analyzers ; Setting up a scope -- Testing the hardware (and software): Building tests ; Flash test example ; Command and response ; Command pattern -- Dealing with errors: Consistent methodology ; Error checking flow ; Error-handling library ; Debugging timing errors -- Further Reading -- 4. …”
    Libro
  10. 950
    Publicado 2018
    Tabla de Contenidos: “…-- Engage your customers -- Deliver great content -- Listen to your customers -- Build your business network -- Find your cheerleaders and raving fans -- Do it all over and over again -- Your details are not safe online ... or are they? -- What if it goes wrong? …”
    Libro electrónico
  11. 951
    Publicado 2025
    Tabla de Contenidos: “…-- Explore Different Types of Internet Connections -- Identify the Hardware Required -- Set Up a Wi-Fi Internet Connection -- Assess Your Software Situation -- Chapter 8 Browsing the Web -- Meet the Edge Browser -- Search the Web -- Find Content on a Web Page -- Pin a Tab -- Create and Manage a Favorites List -- Use Favorites -- View Your Browsing History -- Print a Web Page -- Create Collections -- Customize the New Tab Page and the Home Page -- Adjust Microsoft Edge Settings -- Chapter 9 Staying Safe While Online -- Understand Technology Risks on the Internet -- Download Files Safely -- Use InPrivate Browsing -- Use SmartScreen Filter and Block Unwanted Apps -- Change Edge Privacy Settings -- Understand Information Exposure -- Keep Your Information Private -- Spot Phishing Scams and Other Email Fraud -- Create Strong Passwords -- Chapter 10 Keeping in Touch with Email -- Sign Up for an Email Account -- Set Up Accounts in the Outlook App -- Get to Know the Outlook Interface -- Receive Messages -- Reply to or Forward a Message -- Create and Send Email -- Manage Addresses -- Send an Attachment -- Change Outlook Account Settings -- Chapter 11 Working in the Cloud…”
    Libro electrónico
  12. 952
    por Hendrycks, Dan
    Publicado 2024
    Tabla de Contenidos: “…NINES OF RELIABILITY -- 4.3. SAFE DESIGN PRINCIPLES -- 4.3.1. Redundancy -- 4.3.2. …”
    Libro electrónico
  13. 953
    Publicado 2016
    Tabla de Contenidos: “…Groundwater Crisis in a Mega City – A Case Study of New Delhi, India -- 15. Safe Water Supply Determinants in Peri-Urban Communities of South-East Nigeria -- 16. …”
    Libro electrónico
  14. 954
    Tabla de Contenidos: “…Pedestrian Performance Data -- Federal Investigation of the Evacuation of the World Trade Center on September 11, 2001 -- Free speed distributions — Based on empirical data in different traffic conditions -- Collecting Pedestrian Trajectory Data In Real-time -- Full-Scale Evacuation Experiments in a smoke filled Rail Carriage — a detailed study of passenger behaviour under reduced visibility -- Minimum Stair Width for Evacuation, Overtaking Movement and Counterflow — Technical Bases and Suggestions for the Past, Present and Future -- Study on information guiding based on human psych-physiological responses in China -- Research on pedestrian crowd characteristics and behaviours in peak-time on Chinese campus -- Pedestrian Dynamics -- Behaviour on tunnel fire -- Earthquake — the importance of earthquake-resistant design in case of emergency evacuations -- Decision Loads and Route Qualities for Pedestrians — Key Requirements for the Design of Pedestrian Navigation Services -- Cyclone and Storm Surge, Pedestrian Evacuation and Emergency Response in India -- Experimental Study and Theoretical Analysis of Signage Legibility Distances as a Function of Observation Angle -- Exploring Pedestrian Shopping Decision Processes — an Application of Gene Expression Programming -- Evacuation Simulation -- A Discrete choice framework for acceleration and direction change behaviors in walking pedestrians -- Calibration and validation of the Legion simulation model using empirical data -- Evacuation Simulation for Road Tunnels — Findings from the use of microscopic methodology for escape route analyses -- A Data-Driven Model of Pedestrian Movement -- Distributed intelligence in pedestrian simulations -- Design of Escape Routes by Simulating Evacuation Dynamics in Conjunction with a Probabilistic Safety Concept -- The 2001 World Trade Centre Evacuation -- Dynamic Navigation Field — a local and on-demand family of algorithms for wayfinding -- Microscopic calibration and validation of pedestrian models — Cross-comparison of models using experimental data -- Pedestrian flow optimization with a genetic algorithm based on Boolean grids -- Developing a Pedestrian Agent Model for Analyzing an Overpass accident -- The simulation of crowd dynamics at very large events — Calibration, empirical data, and validation -- Moore and more and symmetry -- The RiMEA Project — Development of a new Regulation -- Football Stadium Simulation — A microscopic simulation of the pedestrian access -- Instability of pedestrian flow in two-dimensional optimal velocity model -- Evacuation Simulation at Linz Central Station — Usefulness during design, approval and start-up -- Why “Faster is Slower” in Evacuation Process -- Development of an Agent-based Behavior Module for Evacuation Models — Focused on the Behaviors in the Dark -- Comparative Investigation of the Dynamic Simulation of Foot Traffic Flow -- Evacuation from underground railway stations — Available and required safe egress time for different station types and general evaluation criteria -- A discrete microscopic model for pedestrian dynamics to manage emergency situations in airport terminals -- Steps Toward the Fundamental Diagram — Empirical Results and Modelling -- Model for Office Building Usage Simulation -- Features of Discrete Event Simulation Systems for Spatial Pedestrian and Evacuation Dynamics -- Evolving Direct Perception Models of Human Behavior in Building Systems -- Fundamental diagram of a one-dimensional cellular automaton model for pedestrian flow — the ASEP with shuffled update -- Ship Evacuation -- Implementing Ship Motion in AENEAS — Model Development and First Results -- Data Collection in Support of the Modelling of Naval Vessels -- Collective animal motion -- Self-organised choice based on inter-attraction: the example of gregarious animals -- Traffic on bi-directional ant-trails -- Herding in Real Escape Panic -- From Ant Trails to Pedestrian Dynamics — Learning from Nature…”
    Libro electrónico
  15. 955
    Publicado 2018
    Tabla de Contenidos: “…Sending HATEOAS Links in Response -- Spring Boot Starter HATEOAS -- Validation -- Enabling Validation on the Controller Method -- Defining validations on the Bean -- Unit Testing Validations -- Documenting REST Services -- Generating a Swagger Specification -- Swagger UI -- Customizing Swagger Documentation Using Annotations -- Securing REST Services with Spring Security -- Adding Spring Security Starter -- Basic Authentication -- Integration Testing -- Unit Testing -- OAuth 2 Authentication -- High-level flow -- Implementing OAuth 2 authentication for Our Service -- Setting up Authorization and Resource Servers: -- Executing OAuth Requests -- Obtaining an Access Token -- Executing the Request Using the Access Token -- Integration Test -- Internationalization -- Caching -- Spring-boot-starter-cache -- Enabling Caching -- Caching Data -- JSR-107 Caching Annotations -- Auto-Detection Order -- Summary -- Assessments -- Lesson 3: Advanced Spring Boot Features -- Externalised Configuration -- Customizing Frameworks Through application.properties -- Logging -- Embedded Server Configuration -- Spring MVC -- Spring Starter Security -- Data Sources, JDBC and JPA -- Other Configuration Options -- Custom Properties in Application.Properties -- Configuration properties - Type-Safe Configuration Management -- Profiles -- Profiles-Based Bean Configuration -- Other Options for Application Configuration Values -- YAML Configuration -- Embedded Servers -- Switching to Jetty and Undertow -- Building a WAR file -- Developer Tools -- Live Reload -- Spring Boot Actuator -- HAL Browser -- Configuration Properties -- Environment Details -- Health -- Mappings -- Beans -- Metrics -- Auto-Configuration -- Debugging -- Deploying an Application to Cloud -- Cloud Foundry -- Summary -- Assessments -- Appendix: Assessment Answers…”
    Libro electrónico
  16. 956
    Publicado 2016
    Tabla de Contenidos: “…IntroductionInstalling a Single Node Hadoop Cluster; Installing a multi-node Hadoop cluster; Adding new nodes to existing Hadoop clusters; Executing balancer command for uniform data distribution; Entering and exiting from the safe mode in a Hadoop cluster; Decommissioning DataNodes; Performing benchmarking on a Hadoop cluster; Introduction; Loading data from a local machine to HDFS; Exporting data from HDFS to local machine; Changing the replication factor of an existing file in HDFS; Setting the HDFS block size for all the files in a cluster…”
    Libro electrónico
  17. 957
    Publicado 2015
    Tabla de Contenidos: “…DiscussionSee Also; 2.5 Persisting a Collection Between Application Sessions; Problem; Solution; Discussion; See Also; 2.6 Testing Every Element in an Array or List; Problem; Solution; Discussion; See Also; 2.7 Creating Custom Enumerators; Problem; Solution; Discussion; See Also; 2.8 Dealing with finally Blocks and Iterators; Problem; Solution; Discussion; See Also; 2.9 Implementing Nested foreach Functionality in a Class; Problem; Solution; Discussion; See Also; 2.10 Using a Thread-Safe Dictionary for Concurrent Access Without Manual Locking; Problem; Solution; Discussion; See Also…”
    Libro electrónico
  18. 958
    por Lavigne, Dru
    Publicado 2004
    Tabla de Contenidos: “…Create a Trash Directory; The Code; Replacing rm with ~/bin/trash; Running the Code Safely; Taking Out the Trash; Hacking the Hack; 9. …”
    Libro electrónico
  19. 959
    por Davison, Andrew
    Publicado 2005
    Tabla de Contenidos: “…Application Timing ResultsTiming Results Using currentTimeMillis(); WormChase as an Applet; The WormChaseApplet Class; The WormPanel Class; Timing Results; Compilation in J2SE 5.0; What Is a Type-Safe Collection?; Dealing with Raw Types in J2SE 5.0; Full-Screen Worms; An Almost Full-Screen (AFS) Worm; The AFS WormChase Class; Stopping Window Movement; Timings for AFS; An Undecorated Full-Screen (UFS) Worm; The UFS WormChase Class; The Game Panel; Button Behavior; Drawing the Game Canvas; Exiting the Game; Timings for UFS; A Full-Screen Exclusive Mode (FSEM) Worm; The FSEM WormChase Class…”
    Libro electrónico
  20. 960
    Publicado 2007
    Tabla de Contenidos: “…Creating Image SlideshowsGetting Noticed on YouTube; Creating a Vlog; Chapter 9: Getting Famous on YouTube; Creating Specialty Accounts; Finding Performers on the Tube; Part IV: Famous Final Scene: YouTube for Fun and Profit; Chapter 10: Thinking outside the YouTube Box; Promoting Products and Services on YouTube; Creating a Professional Presentation; Adding a Video to an eBay Auction; YouTube + MySpace = YouTopia; YouTube and Other Online Communities; Advertising on YouTube; Chapter 11: Playing It Smart, Playing It Safe; Understanding the YouTube Community Guidelines…”
    Libro electrónico