Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
1441Publicado 2014Tabla de Contenidos: “…4.4.4 File-System Performance -- 4.4.5 Defragmenting Disks -- 4.5 EXAMPLE FILE SYSTEMS -- 4.5.1 The MS-DOS File System -- 4.5.2 The UNIX V7 File System -- 4.5.3 CD-ROM File Systems -- 4.6 RESEARCH ON FILE SYSTEMS -- 4.7 SUMMARY -- 5 INPUT/OUTPUT -- 5.1 PRINCIPLES OF I/O HARDWARE -- 5.1.1 I/O Devices -- 5.1.2 Device Controllers -- 5.1.3 Memory-Mapped I/O -- 5.1.4 Direct Memory Access -- 5.1.5 Interrupts Revisited -- 5.2 PRINCIPLES OF I/O SOFTWARE -- 5.2.1 Goals of the I/O Software -- 5.2.2 Programmed I/O -- 5.2.3 Interrupt-Driven I/O -- 5.2.4 I/O Using DMA -- 5.3 I/O SOFTWARE LAYERS -- 5.3.1 Interrupt Handlers -- 5.3.2 Device Drivers -- 5.3.3 Device-Independent I/O Software -- 5.3.4 User-Space I/O Software -- 5.4 DISKS -- 5.4.1 Disk Hardware -- 5.4.2 Disk Formatting -- 5.4.3 Disk Arm Scheduling Algorithms -- 5.4.4 Error Handling -- 5.4.5 Stable Storage -- 5.5 CLOCKS -- 5.5.1 Clock Hardware -- 5.5.2 Clock Software -- 5.5.3 Soft Timers -- 5.6 USER INTERFACES: KEYBOARD, MOUSE, MONITOR -- 5.6.1 Input Software -- 5.6.2 Output Software -- 5.7 THIN CLIENTS -- 5.8 POWER MANAGEMENT -- 5.8.1 Hardware Issues -- 5.8.2 Operating System Issues -- 5.8.3 Application Program Issues -- 5.9 RESEARCH ON INPUT/OUTPUT -- 5.10 SUMMARY -- 6 DEADLOCKS -- 6.1 RESOURCES -- 6.1.1 Preemptable and Nonpreemptable Resources -- 6.1.2 Resource Acquisition -- 6.2 INTRODUCTION TO DEADLOCKS -- 6.2.1 Conditions for Resource Deadlocks -- 6.2.2 Deadlock Modeling -- 6.3 THE OSTRICH ALGORITHM -- 6.4 DEADLOCK DETECTION AND RECOVERY -- 6.4.1 Deadlock Detection with One Resource of Each Type -- 6.4.2 Deadlock Detection with Multiple Resources of Each Type -- 6.4.3 Recovery from Deadlock -- 6.5 DEADLOCK AVOIDANCE -- 6.5.1 Resource Trajectories -- 6.5.2 Safe and Unsafe States -- 6.5.3 The Banker's Algorithm for a Single Resource -- 6.5.4 The Banker's Algorithm for Multiple Resources…”
Libro electrónico -
1442Publicado 2018Tabla de Contenidos: “…Cover -- Title -- Copyright -- Contents -- Preface -- Acknowledgements -- Chapter 1 Electrical and electronic principles -- 1.1 Safe working practices -- 1.1.1 Introduction -- 1.1.2 Risk assessment and reduction -- 1.2 Basic electrical principles -- 1.2.1 Introduction -- 1.2.2 Electron flow and conventional flow -- 1.2.3 Effects of current flow -- 1.2.4 Fundamental quantities -- 1.2.5 Describing electrical circuits -- 1.2.6 Conductors, insulators and semiconductors -- 1.2.7 Factors affecting the resistance of a conductor -- 1.2.8 Resistors and circuit networks -- 1.2.9 Magnetism and electromagnetism -- 1.2.10 Electromagnetic induction -- 1.2.11 Mutual induction -- 1.2.12 Definitions and laws -- 1.3 Electronic components and circuits -- 1.3.1 Introduction -- 1.3.2 Components -- 1.3.3 Integrated circuits -- 1.3.4 Amplifiers -- 1.3.5 Bridge circuits -- 1.3.6 Schmitt trigger -- 1.3.7 Timers -- 1.3.8 Filters -- 1.3.9 Darlington pair -- 1.3.10 Stepper motor driver -- 1.3.11 Digital-to-analogue conversion -- 1.3.12 Analogue-to-digital conversion -- 1.4 Digital electronics -- 1.4.1 Introduction to digital circuits -- 1.4.2 Logic gates -- 1.4.3 Combinational logic -- 1.4.4 Sequential logic -- 1.4.5 Timers and counters -- 1.4.6 Memory circuits -- 1.4.7 Clock or astable circuits -- 1.5 Microprocessor systems -- 1.5.1 Introduction -- 1.5.2 Ports -- 1.5.3 Central processing unit (CPU) -- 1.5.4 Memory -- 1.5.5 Buses -- 1.5.6 Fetch-execute sequence -- 1.5.7 A typical microprocessor -- 1.5.8 Microcontrollers -- 1.5.9 Testing microcontroller systems -- 1.5.10 Programming -- 1.6 Measurement -- 1.6.1 What is measurement? …”
Libro electrónico -
1443Publicado 2019Tabla de Contenidos: “…Design Order of Precedence -- 7.4.14. Fail-Safe Design Concept -- 7.4.15. Series or Parallel Architecture -- 7.4.16. …”
Libro electrónico -
1444por Davis, Lynn E. 1943-“…Finding ways to safely store and ultimately dispose of nuclear waste remains a matter of considerable debate. …”
Publicado 2012
Libro electrónico -
1445por O’Donnell + Tuomey Architects,“…This recently completed primary school illustrates how architecture can contribute to creating a safe and warm environment in a difficult area and can meet the particular needs of the student community. …”
Publicado 2007
Capítulo de libro electrónico -
1446Publicado 2012“…In this webcast, Mike Halsey, the author of Troubleshooting Windows 7 Inside Out, walks you through the process of keeping your children and your family safe online from viruses, criminals and inappropriate content with simple to use free tools…”
-
1447Publicado 2019“…Path Planning (PP) is one of the prerequisites in ensuring safe navigation and manoeuvrability control for driverless vehicles. …”
Libro electrónico -
1448por Bos, Robert“…"Manual Sobre os Direitos Humanos à Água Potável e Saneamento para Profissionais is the Portuguese translation of Manual on the Human Rights to Safe Drinking Water and Sanitation for Practitioners. …”
Publicado 2017
Libro electrónico -
1449Publicado 2022“…What you will learn Write JavaScript code that uses cryptography running within a Node.js environment for the server-side or in frontend applications for web browsers Use modern, safe hashing functions for calculating digests and key derivation, including SHA-2 and Argon2 Practice encrypting messages and files with a symmetric key using AES and ChaCha20-Poly1305 Use asymmetric and hybrid encryption, leveraging RSA and Elliptic Curve Cryptography with ECDH and ECIES Calculate and verify digital signatures using RSA and ECDSA/EdDSA Manage passwords and encryption keys safely Who this book is for This cryptography book is an introductory guide for software developers who don't necessarily have a background in cryptography but are interested in learning how to integrate it in their solutions, correctly and safely. …”
Libro electrónico -
1450por Foa, Edna B.“…Clients are exposed to safe but anxiety-provoking situations as a way of overcoming their trauma-related fears. …”
Publicado 2009
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1451Publicado 2021“…Automated vehicles heavily rely on accurate self-localization to operate safely and efficiently in dynamic road traffic scenarios. …”
Libro electrónico -
1452Publicado 2011“…Whether you are new to investing, or already have a share portfolio, this is an intelligent guidebook will guide you safely through the often confusing world of investing. …”
Libro electrónico -
1453Publicado 2023“…The authors offer advice on creativity, control, and how to experiment safely…”
Libro electrónico -
1454Publicado 2007“…The Water Front, a documentary film detailing the plight of Highland Park residents fighting to preserve their basic human right to safe, affordable water, will be shown at 6:30pm on Friday, May 11th at the Highland Park Community High School Auditorium in Highland Park. …”
DVD -
1455Publicado 2017“…This reference covers current and developing technologies, equipment, and methods for the safe and secure operation and maintenance of transmission lines, including satellite remote sensing technology, infrared and ultraviolet detection technology, helicopter inspection technology, and condition monitoring technology. …”
Libro electrónico -
1456por Butow, Eric. author“…Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks. …”
Publicado 2018
Libro electrónico -
1457Publicado 2014“…Discover how to connect Elev-8 components, program the microcontroller, use GPS, and safely fly your quadcopter. This fun, do-it-yourself guide fuels your creativity with ideas for radical enhancements, including return-to-home functionality, formation flying, and even artificial intelligence! …”
Libro electrónico -
1458Publicado 2018“…In many cases, energy-efficient driving also implies a safe driving technique. In some cases, however, energy-efficient driving can lead to a decline in driving safety. …”
Libro electrónico -
1459por OECD“…For many OECD countries, how to ensure the safe and dignified return to their origin countries of migrants who do not have grounds to remain is a key question. …”
Publicado 2020
Libro electrónico -
1460Publicado 2024“…You’ll work through a hands-on project step by step as you use ScyllaDB to store data and learn to configure, monitor, and safely operate a distributed database. Along the way, you’ll discover how ScyllaDB’s unique “shard per core” approach helps you deliver impressive performance in real-time systems…”
Grabación no musical