Mostrando 1,041 - 1,060 Resultados de 2,801 Para Buscar '"Safed"', tiempo de consulta: 0.11s Limitar resultados
  1. 1041
    Publicado 2024
    Tabla de Contenidos: “…Designing fast selection logic -- Selecting from a huge number of items -- Interoperability with .NET 8 -- Tip - creating a service in Linux -- Achieving security by design -- List of practices for achieving a safe architecture -- Authentication -- Sensitive data -- Web security -- Summary -- Questions -- Further reading -- Chapter 3: Managing Requirements -- Technical requirements -- Introducing Azure DevOps -- Managing system requirements in Azure DevOps -- Epic work items -- Feature work items -- Product Backlog items/User Story work items -- Azure DevOps repository -- Package feeds -- Test Plans -- Pipelines -- Usage -- Introducing GitHub projects -- Summary -- Questions -- Chapter 4: Best Practices in Coding C# 12 -- Technical requirements -- The simpler your code, the better a programmer you are -- Maintainability index -- Cyclomatic complexity -- Depth of inheritance -- Class coupling -- Number of lines of code -- Using a version control system -- Dealing with version control systems in teams -- Writing safe code in C# -- try-catch -- try-finally and using -- The IDisposable interface -- .NET 8 tips and tricks for coding -- Identifying well-written code -- Understanding and applying tools that can evaluate C# code -- Applying extension tools to analyze code -- Applying SonarAnalyzer -- Checking the final code after analysis -- Summary -- Questions -- Further reading -- Chapter 5: Implementing Code Reusability in C# 12 -- Technical requirements -- Understanding the principles of code reusability -- What code reuse is not -- What code reuse is -- Reusability in the development life cycle -- Using .NET 8 for code reuse -- Creating a reusable class library -- How does C# deal with code reuse? …”
    Libro electrónico
  2. 1042
    Publicado 2019
    Tabla de Contenidos: “…3.2.5 VST3 and the GUID -- 3.2.6 VST3 Plugin Class Factory -- 3.3 Description: Plugin Description Strings -- 3.4 Description: Plugin Options/Features -- 3.4.1 Side Chain Input -- 3.4.2 Latency -- 3.4.3 Tail Time -- 3.4.4 Custom GUI -- 3.4.5 Factory Presets and State Save/Load -- 3.4.6 VST3 Support for 64-bit Audio -- 3.5 Initialization: Defining Plugin Parameters -- 3.5.1 Thread-Safe Parameter Access -- 3.5.2 Initialization: Defining Plugin Channel I/O Support -- 3.5.3 Initialization: Channel Counts and Sample Rate Information -- 3.6 The Buffer Process Cycle -- 3.6.1 Processing: Updating Plugin Parameters From GUI Controls -- 3.6.2 Processing: Resetting the Algorithm and Preparing for Streaming -- 3.6.3 Processing: Accessing the Audio Buffers -- 3.6.4 Processing: Writing Output Parameters -- 3.6.5 Processing: VST3 Soft Bypass -- 3.7 Destruction/Termination -- 3.8 Retrieving VST3 Host Information -- 3.9 Validating Your Plugin -- 3.10 Using ASPiK to Create VST3 Plugins -- 3.11 Bibliography -- Chapter 4: AU Programming Guide -- 4.1 Setting Up the AU SDK -- 4.1.1 AU Sample Projects -- 4.1.2 AU Documentation -- 4.2 AU Architecture and Anatomy -- 4.2.1 AU Base Classes -- 4.2.2 MacOS Bundle ID -- 4.2.3 AU Programming Notes -- 4.3 Description: Plugin Description Strings -- 4.4 Description: Plugin Options/Features -- 4.4.1 Side Chain Input -- 4.4.2 Latency -- 4.4.3 Tail Time -- 4.4.4 Custom GUI -- 4.4.5 Factory Presets and State Save/Load -- 4.5 Initialization: Defining Plugin Parameters -- 4.5.1 Thread-Safe Parameter Access -- 4.5.2 Initialization: Defining Plugin Channel I/O Support -- 4.5.3 Initialization: Channel Counts and Sample Rate Information -- 4.6 The Buffer Process Cycle -- 4.6.1 Processing: Updating Plugin Parameters From GUI Controls -- 4.6.2 Processing: Resetting the Algorithm and Preparing for Streaming…”
    Libro electrónico
  3. 1043
    Publicado 2018
    Tabla de Contenidos: “…Value equality -- Values in collections -- Working with mocks -- Asynchronous assertions -- React component snapshots -- Unit test coverage -- Summary -- Chapter 5: Streamlining Development and Refactoring with Type-Safe React Components -- What does type-safety solve? …”
    Libro electrónico
  4. 1044
    Publicado 2019
    Tabla de Contenidos: “…-- 1 SILLY NAME GENERATOR -- Project #1: Generating Pseudonyms -- Planning and Designing a Project -- The Code -- Summary -- Further Reading -- Practice Projects -- Challenge Projects -- 2 FINDING PALINGRAM SPELLS -- Finding and Opening a Dictionary -- Project #2: Finding Palindromes -- Project #3: Finding Palingrams -- dnE ehT -- Further Reading -- Practice Project: Dictionary Cleanup -- Challenge Project: Recursive Approach -- 3 SOLVING ANAGRAMS -- Project #4: Finding Single-Word Anagrams -- Project #5: Finding Phrase Anagrams -- Project #6: Finding Voldemort: The Gallic Gambit -- Project #7: Finding Voldemort: The British Brute-Force -- Summary -- Further Reading -- Practice Project: Finding Digrams -- Challenge Project: Automatic Anagram Generator -- 4 DECODING AMERICAN CIVIL WAR CIPHERS -- Project #8: The Route Cipher -- Project #9: The Rail Fence Cipher -- Summary -- Further Reading -- Practice Projects -- Challenge Projects -- 5 ENCODING ENGLISH CIVIL WAR CIPHERS -- Project #10: The Trevanion Cipher -- Project #11: Writing a Null Cipher -- Summary -- Further Reading -- Practice Projects -- 6 WRITING IN INVISIBLE INK -- Project #12: Hiding a Vigenère Cipher -- The Platform -- The Strategy -- The Pseudocode -- The Code -- Detecting the Hidden Message -- Summary -- Further Reading -- Practice Project: Checking the Number of Blank Lines -- Challenge Project: Using Monospace Font -- 7 BREEDING GIANT RATS WITH GENETIC ALGORITHMS -- Finding the Best of All Possible Solutions -- Project #13: Breeding an Army of Super-Rats -- Project #14: Cracking a High-Tech Safe -- Further Reading…”
    Libro electrónico
  5. 1045
    Publicado 2023
    Tabla de Contenidos: “…Part I : FOOD SYSTEM CONCEPT AND SUMMARIZED RECOMMENDATIONS -- Chapter 1: Food systems: seven priorities to end hunger and protect the planet -- Chapter 2: Food system concepts and definitions for science and political action -- Part II: ACTIONS ON HUNGER AND HEALTHY DIETS -- Chapter 3: Healthy diet - A Definition for the United Nations Food Systems Summit 2021 -- Chapter 4: Ensuring Access to Safe and Nutritious Food for All Through Transformation of Food Systems -- Chapter 5: Shift to Healthy and Sustainable Consumption Patterns -- Chapter 6: Fruits and Vegetables for Healthy Diets: Priorities for Food System Research and Action -- Chapter 7: Modelling Actions for Transforming Agrifood Systems -- Part IV: ACTIONS FOR EQUITY AND RESILIENCE IN FOOD SYSTEMS -- Chapter 8: Advance Equitable Livelihoods -- Chapter 9: A Review of Evidence on Gender Equality, Women‘s Empowerment and Food Systems -- Chapter 10: The Future of Small Farms: Innovations for Inclusive Transformation -- Chapter 11: Diversification for enhanced food systems resilience -- Chapter 12: Addressing Food Crises in Violent Conflicts -- Chapter 13: In brief: The White/Wiphala Paper on Indigenous Peoples’ food systems -- Chapter 14: Marginal areas and indigenous people – Priorities for research and action -- Chapter 15: Priorities for inclusive urban food system transformations in the Global South -- Chapter 16: Secondary Cities as Catalysts for Nutritious Diets in Low- And Middle-Income Countries -- Part V: ACTIONS FOR SUSTAINABLE FOOD PRODUCTION AND RESOURCE MANAGEMENT -- Chapter 17: Boost Nature Positive Production. …”
    Libro electrónico
  6. 1046
    Publicado 2017
    Tabla de Contenidos: “…Machine generated contents note: Preface xi Acknowledgements xiii About the Author xv CHAPTER 1 Introduction 1 The Airplane Ticket Trade 1 The Bull Cycle 2 The Renegades 3 Claws of the Bear 3 Zugzwang 4 The Sceptics 5 A Sad Truth 5 Common Mistakes 6 Imprecise but Effective 7 Hedging Against Implausible Scenarios 8 A Black Swan in Correlation 8 Taking Profits 8 The Good, the Bad and the Ugly 9 The Great Escape 9 Having a Plan 10 Trend Following as a Defensive Strategy 11 Taking the Offensive 12 The Pre-Conditions for Market Crises 12 Banks: The Great Multiplier 13 A Change in Risk Regime 13 CHAPTER 2 "Safe" Havens and the Second Leg Down 14 The Matterhorn 15 Mrs. …”
    Libro electrónico
  7. 1047
    Publicado 2023
    Tabla de Contenidos: “…. -- Governing through Covid Indicators David Nelken (King's College, London, UK)28. -- Safe but not Secure? Risk Management, Communication and Preparedness for a Pandemic in Aviation John Woodlock (Lund University, Sweden)29. -- The Interlegal Evocation of Peace in Colombia Nicolás Serrano Cardona (Lund University, Sweden) PART VIAPPLIED SOCIOLOGY OF LAW30. -- Trade Union Solidarity and the Issue of Minimum Wage Regulation in the EU Ann-Christine Hartzén (Lund University, Sweden)31. -- Constitutional Imaginaries: A Socio-legal Perspective of Political and Societal Constitutions Jirí Pribán (Cardiff University, UK)32. -- Public Sentiments on Justice, Legal Consciousness, and the Study of Marginalised GroupsPeter Scharf Smith (University of Oslo, Norway)33. -- Challenging Legal Orthodoxy: New Orientations in Space and Timein Discourses Over Land Tenure Anne Griffiths (Edinburgh University, UK)34. -- Sexual Violence, Standard(s) of Proof, and Arbitrariness in Judicial Decision-Making Hildur Fjóla Antonsdóttir (University of Iceland)…”
    Libro electrónico
  8. 1048
    por McLaughlin, Brett
    Publicado 2005
    Tabla de Contenidos: “…Prevent Early Burn-In; 11. Move Your TV Safely; 12. Fix Panasonic&s Picture Glitch; 2.5.2. …”
    Libro electrónico
  9. 1049
    por Lovelace, Mary
    Publicado 2005
    Tabla de Contenidos: “…Planning for volume copies and data set renames -- 2.1 MS/VCR functionality overview -- 2.2 MS/VCR requirements for FlashCopy and SnapShot -- 2.3 Overview of MS/VCR implementation steps -- 2.3.1 MS/VCR for point-in-time copy situations -- 2.3.2 MS/VCR for Split of Continuous Mirror situations -- 2.3.3 Optional MS/VCR commands -- 2.3.4 A batch implementation example overview -- 2.4 Identify what you want to clone -- 2.4.1 Encompassing all required data -- 2.4.2 Migrated data -- 2.4.3 Understanding FlashCopy and SnapShot pairing rules -- 2.4.4 Selecting volumes by volser mask or storage group -- 2.4.5 Source volume status and considerations -- 2.4.6 Identification of source volume catalogs with FINDUCATS -- 2.4.7 Using empty or populated catalogs for target volume data sets -- 2.4.8 SMS class assignments -- 2.4.9 Identify target data set rename masks -- 2.4.10 Not renaming all data sets -- 2.4.11 MS/VCR COPY SIMULATE command -- 2.4.12 MS/VCR RENAME SIMULATE command -- 2.4.13 MS/VCR RENAME SAFE command -- 2.4.14 MS/VCR DB2UPDATE SIMULATE command -- 2.4.15 MS/VCR DB2FIX SIMULATE command -- 2.4.16 MS/VCR DB2SQL SIMULATE command -- 2.5 Potential errors -- Chapter 3. …”
    Libro electrónico
  10. 1050
    Publicado 2013
    Tabla de Contenidos: “…Required Multi-Master Configuration Settings -- Optional Multi-Master Configuration Settings -- Other Configuration Variables to Consider -- Example Configuration -- Replication Setup -- Multi-Master Replication Verification -- Manual Failover Process -- Real World Usage Complications -- Additional Slave Servers -- Read and Write Load Balancing -- Circular Replication -- Other Replication Topologies -- Automating High Availability Failovers -- Conclusion -- Chapter 5: MySQL Replication Tools -- Various MySQL Toolkits -- Openark Kit -- Percona Toolkit -- MySQL Workbench Utilities -- Replication Failover Managers -- MySQL MHA -- MMM -- Flipper -- Cluster Control -- Cluster Management -- Percona Replication Manager (PRM) -- Replication Prefetch -- MySQL Patches and Variants -- Independent Community Users -- Commercial Organizations -- Conclusion -- Chapter 6: Extending Replication for Practical Needs -- Highly Requested Replication Features -- MySQL Cluster -- Galera Cluster for MySQL -- Current Limitations -- References -- Installation -- Percona XtraDB Cluster -- MariaDB Galera Cluster -- Galera Wrap-Up -- Tungsten Replicator -- Features -- References -- Prerequisites -- Installation with Tungsten Sandbox -- Manual Tungsten Installation -- Alternative Tungsten Deployments -- Unique Characteristics -- Continuent Tungsten -- Continuent Wrap-Up -- SchoonerSQL -- MySQL Replication Listener -- MySQL in the Cloud -- Amazon RDS for MySQL -- Google Cloud SQL -- Other Offerings -- Conclusion -- Chapter 7: MySQL Configuration Options -- About MySQL System Variables -- Binary Logging -- MySQL Replication -- Semisynchronous Replication -- Security -- MySQL Server Variables -- InnoDB Variables -- MySQL 5.6 Features -- Universally Unique Identifier (UUID) -- Crash-Safe Slaves -- Replication Checksums -- Multi-Threaded Slaves -- Global Transaction Identifier (GTID)…”
    Libro electrónico
  11. 1051
    por Zwicky, Elizabeth D.
    Publicado 2000
    Tabla de Contenidos: “…Weakest Link; 3.5. Fail-Safe Stance; 3.5.2. Default Permit Stance: That Which Is Not Expressly Prohibited Is Permitted; 3.6. …”
    Libro electrónico
  12. 1052
    por Karp, David A.
    Publicado 2005
    Tabla de Contenidos: “…Solution 3: Brute force; 2.2.6.4. Solution 4: Use the Safe Mode with Command Prompt; 2.2.6.5. Solution 5: Use the Recovery Console; 2.2.6.6. …”
    Libro electrónico
  13. 1053
    por Stolarz, Damien
    Publicado 2005
    Tabla de Contenidos: “…Hacking High Voltages Safely; 2. Automotive Audio Entertainment; 12. Get a Headful About Your Car Audio; 2.2.2. …”
    Libro electrónico
  14. 1054
    por Hayun, Roy Ben
    Publicado 2009
    Tabla de Contenidos: “….; 7.2 DoJa - the Basics; 7.3 I Love JAM; 7.4 DoJa Basic Operations Manual; 7.5 Eclipsing DoJa; 7.6 Dirty Hands; 7.7 A Safe Port; 7.8 DoJa 5.1 Profile; 7.9 Summary; 8 Writing MIDP Games; 8.1 What Is a Game?…”
    Libro electrónico
  15. 1055
    por Reddy, Martin
    Publicado 2011
    Tabla de Contenidos: “…3.2.2 Making Singletons Thread Safe 3.2.3 Singleton versus Dependency Injection; 3.2.4 Singleton versus Monostate; 3.2.5 Singleton versus Session State; 3.3 Factory Methods; 3.3.1 Abstract Base Classes; 3.3.2 Simple Factory Example; 3.3.3 Extensible Factory Example; 3.4 API Wrapping Patterns; 3.4.1 The Proxy Pattern; 3.4.2 The Adapter Pattern; 3.4.3 The Façade Pattern; 3.5 Observer Pattern; 3.5.1 Model-View-Controller; 3.5.2 Implementing the Observer Pattern; 3.5.3 Push versus Pull Observers; Chapter 4: Design; 4.1 A Case for Good Design; 4.1.1 Accruing Technical Debt…”
    Libro electrónico
  16. 1056
    por Harmsen, Jan
    Publicado 2013
    Tabla de Contenidos: “…3.2.3.4 Reaction3.2.3.4.1 Reaction Cases with no By-Product Formation; 3.2.3.4.2 Reaction Cases with By-Product Formation by Consecutive Reactions; 3.2.3.4.3 Reaction Cases By-Products by Parallel Reactions; 3.2.3.4.4 Reaction Cases Specialty and Performance Products; 3.2.3.5 Separation; 3.2.3.6 Safe; 3.2.3.7 Socially Acceptable; 3.2.3.8 Low Cost; 3.2.3.9 Analysis; 3.2.3.10 Evaluation; 3.2.3.11 Reporting; 3.2.4 Role of Modelling and Simulation; 3.2.5 Essential Physical, Chemical and Thermodynamic Property Determination; 3.2.6 Research Stage-Gate Decision; 4 Development Stage…”
    Libro electrónico
  17. 1057
    Publicado 2018
    Tabla de Contenidos: “…Area 1: Math/Science/General Engineering -- Area 2: System's Domain &amp -- &amp -- Operational Context -- Systems Proficiency Cluster -- Area 3: Systems Engineering Discipline -- Area 4: Systems Mindset -- Professional Proficiency Cluster -- Area 5: Interpersonal Skills -- Area 6: Technical Leadership -- Example Positions -- Systems Engineers are Π-Shaped -- The Whole Package -- Notes and References -- Chapter 5 Hidden in Plain Sight -- Case 1: Japanese Bullet Train: Fast, Frequent, Safe, and Punctual -- Case 2: Boeing 777: Maintaining the Vision from Start to End -- Case 3: Healthcare.gov: Disastrous Start, Incredible Recovery -- Notes and References -- Chapter 6 Proficiency Profiles -- Assessing Proficiency -- The Self-Assessment Rubric -- MITRE's Early Use of Atlas and Personal Proficiency profiles -- Exemplar and Recommended Proficiency Profiles -- Aggregate Proficiency Profiles -- Notes and References -- Chapter 7 Three Forces -- Force 1: Experiences -- Force 2: Mentoring -- Force 3: Education &amp -- Training -- Force Multipliers -- Personal Characteristics as Force Multipliers -- Self-Assessing Personal Characteristics -- Organizational Characteristics as Force Multipliers -- Notes and References -- Chapter 8 Successful Careers -- Nicole Hutchison Grows into a Systems Engineer -- Two Datasets about Senior Systems Engineers -- Four Questions -- The Education of Systems Engineers -- The Education of Interviewed Chief Systems Engineers -- The Education of INCOSE Systems Engineering Professionals -- Overall Conclusions About the Education of Systems Engineers -- The Experiences of Chief Systems Engineers -- Lifecycle Phases in Which Chief Systems Engineers Have Worked -- Roles That Chief Systems Engineers Perform -- Experiences of Expert Systems Engineering Professionals…”
    Libro electrónico
  18. 1058
    Publicado 2022
    Tabla de Contenidos: “…Natural Does Not Mean Safe By Onyenmechi Johnson Afonne and Emeka Chinedu Ifediba 10 VIEW ABSTRACT -- 23. …”
    Libro electrónico
  19. 1059
    Publicado 2023
    Tabla de Contenidos: “…-- Introducing this book and its contents -- Setting up your development environment -- Understanding .NET -- Building console apps using Visual Studio 2022 -- Building console apps using Visual Studio Code -- Making good use of the GitHub repository for this book -- Looking for help -- Practicing and exploring -- Summary -- Chapter 2: Speaking C# -- Introducing the C# language -- Discovering your C# compiler version -- Understanding C# grammar and vocabulary -- Working with variables -- Exploring more about console apps -- Understanding async and await -- Practicing and exploring -- Summary -- Chapter 3: Controlling Flow, Converting Types, and Handling Exceptions -- Operating on variables -- Understanding selection statements -- Understanding iteration statements -- Storing multiple values in an array -- Casting and converting between types -- Handling exceptions -- Checking for overflow -- Practicing and exploring -- Summary -- Chapter 4: Writing, Debugging, and Testing Functions -- Writing functions -- Debugging during development -- Hot reloading during development -- Logging during development and runtime -- Unit testing -- Throwing and catching exceptions in functions -- Practicing and exploring -- Summary -- Chapter 5: Building Your Own Types with Object-Oriented Programming -- Talking about OOP -- Building class libraries -- Storing data in fields -- Working with methods and tuples -- Controlling access with properties and indexers -- Pattern matching with objects -- Working with record types -- Practicing and exploring -- Summary -- Chapter 6: Implementing Interfaces and Inheriting Classes -- Setting up a class library and console application -- Static methods and overloading operators -- Making types safely reusable with generics…”
    Libro electrónico
  20. 1060
    Publicado 2018
    Tabla de Contenidos: “…. -- Changing the default user password -- Ensuring that you shut down safely -- Preparing an SD card manually -- Expanding the system to fit in your SD card -- Accessing the RECOVERY/BOOT partition -- Using the tools to back up your SD card in case of failure -- Networking and connecting your Raspberry Pi to the internet via an Ethernet port, using a CAT6 Ethernet cable -- Getting ready -- How to do it... -- There's more... -- Using built-in Wi-Fi and Bluetooth on Raspberry Pi -- Getting ready -- How to do it... -- Connecting to your Wi-Fi network -- Connecting to Bluetooth devices -- Configuring your network manually -- Getting ready -- How to do it... -- There's more... -- Networking directly to a laptop or computer -- Getting ready -- How to do it... -- How it works... -- There's more... -- Direct network link -- See also -- Networking and connecting your Raspberry Pi to the internet via a USB Wi-Fi dongle -- Getting ready -- How to do it... -- There's more... -- Using USB wired network adapters -- Connecting to the internet through a proxy server -- Getting ready -- How to do it... -- How it works... -- There's more... -- Connecting remotely to Raspberry Pi over the network using VNC -- Getting ready…”
    Libro electrónico