Mostrando 4,701 - 4,720 Resultados de 4,960 Para Buscar '"Seven"', tiempo de consulta: 0.10s Limitar resultados
  1. 4701
    Publicado 2022
    Tabla de Contenidos: “…-- Advice From a CEO To startup Executives: Remember That The CEO Role Is Tough -- Onboarding Successfully As a Startup Leader Requires Balancing Short-term Wins With long-term Priorities -- Setting Your Objectives and Key Results (OKRs) -- Setting OKRs-example: Sample Marketing OKRs -- Okrs and Bonus Compensation -- Delivering Your First Quarterly Business Review (QBR) -- Here's a Guide for What to Include in Your First 90-day QBR Presentation -- Chapter Seven Build Key Relationships: CEO, Board, Team -- Building A relationship With your CEO And/or Co-founder -- Here's a Sample CEO 1:1 Agenda -- Building Trust with Your CEO: Values Alignment -- Set Up Communication Expectations with Your CEO and Leadership Team -- Get to Know Your Cross-functional Partners and Build Rapport -- Learn How Your Key Stakeholders Like to Work -- Don't Be Afraid to Disagree-respectfully -- Why Companies Bring in "Big Company Executives" and How to Work with Them If You're Coming from a Startup Background -- Building Strong Relationships With your Board -- Managing to your Board's Expectations -- Learn The interests, Hobbies, and Family Members of your Executive Team -- Chapter Eight Know Thyself: Strengths, Weaknesses, and Areas To improve -- Your Relationship With yourself As a Startup Leader…”
    Libro electrónico
  2. 4702
    Publicado 2019
    Tabla de Contenidos: “…Summary -- References -- Further reading -- Chapter Seven: Toxicity assessment of metal oxide nanoparticles on terrestrial plants -- 1. …”
    Libro electrónico
  3. 4703
    Publicado 2017
    Tabla de Contenidos: “…1.4.3 Improve the Pricing Mechanism, Making the Development of Natural Gas Electrical Power Generation Justifiable -- 1.4.4 Adjust Gas Prices for Residential and Chemical Industry Use, and Reduce Cross-Subsidies for Different Users -- 1.5 Measures to Ensure a Safe and Efficient Gas Supply -- 1.5.1 Attracting New Players to Resource Exploitation to Expand Natural Gas Production -- 1.5.2 Achieving Import Diversification, Safeguarding the Security of Natural Gas Imports -- 1.5.3 Accelerating the Construction of Pipeline Network, Promoting Network Interconnectivity -- 1.5.4 Accelerate the Construction of Natural Gas Reserve Facilities and Implement Corresponding Institutional Reform -- 1.5.5 Improve Technology Capacity and Strengthen the Long-Term Development Capability -- 1.6 Constructing a Modern Natural Gas Market Mechanism and Management System -- 1.6.1 Liberalisation of the Upstream Sector and True Import Liberalisation -- 1.6.2 Step-by-Step Natural Gas Price Reform, Accelerated Construction of Natural Gas Trade Hubs -- 1.6.3 Clear Allocation of Functions and Robust Supervision to Support Unbundling and Third-Party Access -- 1.6.4 Strengthen Energy Resource Management, Establish a Regulatory System and Build Regulatory Capacity -- 1.6.5 Support the Development of Professional Services and Technological Companies -- Use Market Forces to Promote the Expansion of the Division of Labour -- 1.7 Deepen the Laws and Regulations System of the Gas Sector, and Establish a Sound Legal System -- Analysis of Natural Gas Demand -- 2 Developments in Global Natural Gas Consumption -- 2.1 Major Factors Affecting Natural Gas Consumption Growth in Other Countries -- 2.1.1 Proportion of Energy Consumption of Natural Gas in Various Countries -- 2.1.2 Breakdown of Natural Gas Consumption Growth in Seven Benchmark Countries…”
    Libro electrónico
  4. 4704
    Publicado 2017
    Tabla de Contenidos: “…5.2.3 Distribution of Heavy Metals in Concrete -- 5.3 SIMULATION OF GASEOUS MERCURY ADSORPTION OF DIFFERENT BUILDING MATERIALS -- 5.3.1 Characterization of Building Materials -- 5.3.1.1 X-Ray Fluorescence Analysis of Building Materials -- 5.3.1.2 SEM Analysis of Building Materials -- 5.3.1.3 Analysis of Particle Sizes -- 5.3.2 Gaseous Mercury Adsorption Analysis of Different Building Materials -- 5.3.3 Gaseous Mercury Adsorption Simulation of Standard Concrete Block -- 5.4 INTERACTION OF EXOGENOUS ORGANIC POLLUTANTS AND CONSTRUCTION WASTE -- 5.4.1 SEM Analysis of Contaminated Waste -- 5.4.2 Analysis of Pollutants and Industrial C&amp -- D Waste Combination Using FT-IR -- 5.4.3 Absorption of Heavy Metals and Organic Matters on C&amp -- D Waste -- Six - Migration Patterns of Pollutants in Construction &amp -- Demolition Waste -- 6.1 ACID NEUTRALIZING CAPACITY AND DISSOLUTION OF HEAVY METAL -- 6.1.1 Acid Neutralizing Capacity -- 6.1.2 Dissolution Ability of Heavy Metals -- 6.2 MIGRATION OF HEAVY METALS UNDER ACID RAIN -- 6.2.1 Leachate Amount Generated in Landfilling -- 6.2.2 Variation of pH During Landfill Process -- 6.2.3 Electrical Conductivity and Total Dissolved Solid in Leachate -- 6.2.4 Migration of Heavy Metal and Calcium -- 6.3 MIGRATION AND TRANSFER PATTERNS OF ORGANIC POLLUTANTS UNDER VARIOUS CONDITIONS -- 6.3.1 Effect of Sunlight, Ventilation, Temperature, and Moisture -- 6.3.2 Migration of Pesticides in Simulated Washing Procedure -- Seven - Pollution Control for Contaminated Construction and Demolition Waste -- 7.1 POLLUTION CONTROL FOR HEAVY METAL-CONTAMINATED WASTE -- 7.1.1 Citric Acid Elution Process -- 7.1.2 Washing Test of Contaminated Recycled Gravel With Different Eluting Agents (Glyphosate) -- 7.1.3 Immobilization Heavy Metals in Contaminated Recycled Gravel…”
    Libro electrónico
  5. 4705
    Publicado 2016
    Tabla de Contenidos: “…Managers and Their Competencies -- Manager Delegate -- Seven Manager Competencies -- 2.1.3. Business Strategies -- The Strategy is the Means to an End -- 2.1.4. …”
    Libro electrónico
  6. 4706
    por Sakiyama, Kazuo, 1971-
    Publicado 2015
    Tabla de Contenidos: “…3.2.2 Basic Loop Architecture 53 -- 3.3 Pipeline Architecture 55 -- 3.3.1 Pipeline Architecture for Block Ciphers 55 -- 3.3.2 Advanced Pipeline Architecture for Block Ciphers 56 -- 3.4 AES Hardware Implementations 58 -- 3.4.1 Straightforward Implementation for AES-128 58 -- 3.4.2 Loop Architecture for AES-128 61 -- 3.4.3 Pipeline Architecture for AES-128 65 -- 3.4.4 Compact Architecture for AES-128 66 -- Further Reading 67 -- 4 Cryptanalysis on Block Ciphers 69 -- 4.1 Basics of Cryptanalysis 69 -- 4.1.1 Block Ciphers 69 -- 4.1.2 Security of Block Ciphers 70 -- 4.1.3 Attack Models 71 -- 4.1.4 Complexity of Cryptanalysis 73 -- 4.1.5 Generic Attacks 74 -- 4.1.6 Goal of Shortcut Attacks (Cryptanalysis) 77 -- 4.2 Differential Cryptanalysis 78 -- 4.2.1 Basic Concept and Definition 78 -- 4.2.2 Motivation of Differential Cryptanalysis 79 -- 4.2.3 Probability of Differential Propagation 80 -- 4.2.4 Deterministic Differential Propagation in Linear Computations 83 -- 4.2.5 Probabilistic Differential Propagation in Nonlinear Computations 86 -- 4.2.6 Probability of Differential Propagation for Multiple Rounds 89 -- 4.2.7 Differential Characteristic for AES Reduced to Three Rounds 91 -- 4.2.8 Distinguishing Attack with Differential Characteristic 93 -- 4.2.9 Key Recovery Attack after Differential Characteristic 95 -- 4.2.10 Basic Differential Cryptanalysis for Four-Round AES + 96 -- 4.2.11 Advanced Differential Cryptanalysis for Four-Round AES + 103 -- 4.2.12 Preventing Differential Cryptanalysis + 106 -- 4.3 Impossible Differential Cryptanalysis 110 -- 4.3.1 Basic Concept and Definition 110 -- 4.3.2 Impossible Differential Characteristic for 3.5-round AES 111 -- 4.3.3 Key Recovery Attacks for Five-Round AES 114 -- 4.3.4 Key Recovery Attacks for Seven-Round AES + 123 -- 4.4 Integral Cryptanalysis 131 -- 4.4.1 Basic Concept 131 -- 4.4.2 Processing P through Subkey XOR 132 -- 4.4.3 Processing P through SubBytes Operation 133 -- 4.4.4 Processing P through ShiftRows Operation 134 -- 4.4.5 Processing P through MixColumns Operation 134.…”
    Libro electrónico
  7. 4707
    Publicado 2018
    Tabla de Contenidos: “…6.1.2 Managing permissions between GitHub and CircleCI -- 6.1.3 Signing commits and tags with Git -- 6.2 Access control for container storage -- 6.2.1 Managing permissions between Docker Hub and CircleCI -- 6.2.2 Signing containers with Docker Content Trust -- 6.3 Access control for infrastructure management -- 6.3.1 Managing permissions using AWS roles and policies -- 6.3.2 Distributing secrets to production systems -- Summary -- Part 2: Watching for anomalies and protecting services against attacks -- Chapter 7: Collecting and storing logs -- 7.1 Collecting logs from systems and applications -- 7.1.1 Collecting logs from systems -- 7.1.2 Collecting application logs -- 7.1.3 Infrastructure logging -- 7.1.4 Collecting logs from GitHub -- 7.2 Streaming log events through message brokers -- 7.3 Processing events in log consumers -- 7.4 Storing and archiving logs -- 7.5 Accessing logs -- Summary -- Chapter 8: Analyzing logs for fraud and attacks -- 8.1 Architecture of a log-analysis layer -- 8.2 Detecting attacks using string signatures -- 8.3 Statistical models for fraud detection -- 8.3.1 Sliding windows and circular buffers -- 8.3.2 Moving averages -- 8.4 Using geographic data to find abuses -- 8.4.1 Geoprofiling users -- 8.4.2 Calculating distances -- 8.4.3 Finding a user's normal connection area -- 8.5 Detecting anomalies in known patterns -- 8.5.1 User-agent signature -- 8.5.2 Anomalous browser -- 8.5.3 Interaction patterns -- 8.6 Raising alerts to operators and end users -- 8.6.1 Escalating security events to operators -- 8.6.2 How and when to notify end users -- Summary -- Chapter 9: Detecting intrusions -- 9.1 The seven phases of an intrusion: the kill chain -- 9.2 What are indicators of compromise? …”
    Libro electrónico
  8. 4708
    Publicado 2014
    Tabla de Contenidos: “…IEEE Ethernet Standards -- Evolution of the Ethernet Standard -- Ethernet Media Standards -- IEEE Supplements -- Draft Standards -- Differences Between DIX and IEEE Standards -- Organization of IEEE Standards -- The Seven Layers of OSI -- IEEE Sublayers Within the OSI Model -- Levels of Compliance -- The Effect of Standards Compliance -- IEEE Media System Identifiers -- 10 Megabit per Second (Mb/s) Media Systems -- 100 Mb/s Media Systems -- 1000 Mb/s Media Systems -- 10 Gb/s Media Systems -- 40 Gb/s Media Systems -- 100 Gb/s Media Systems -- Chapter 3. …”
    Libro electrónico
  9. 4709
    Publicado 2020
    Tabla de Contenidos: “…Preface xiii -- Acknowledgments xv -- About the Companion Website xvii -- Part I Probability 1 -- 1 Basic Concepts of Probability Theory 3 -- 1.1 Statistical Regularity and Relative Frequency 3 -- 1.2 Set Theory and Its Applications to Probability 5 -- 1.3 The Axioms and Corollaries of Probability 12 -- 1.4 Joint Probability and Conditional Probability 18 -- 1.5 Statistically Independent Events and Mutually Exclusive Events 21 -- 1.6 Law of Total Probability and Bayes’ Theorem 28 -- 1.7 Summary 32 -- Problems 32 -- 2 Applications in Probability 37 -- 2.1 Odds and Risk 37 -- 2.2 Gambler’s Ruin Problem 41 -- 2.3 Systems Reliability 43 -- 2.4 Medical Diagnostic Testing 47 -- 2.5 Bayesian Spam Filtering 50 -- 2.6 Monty Hall Problem 51 -- 2.7 Digital Transmission Error 54 -- 2.8 How to Make the Best Choice Problem 56 -- 2.9 The Viterbi Algorithm 59 -- 2.10 All Eggs in One Basket 61 -- 2.11 Summary 63 -- Problems 63 -- 3 Counting Methods and Applications 67 -- 3.1 Basic Rules of Counting 67 -- 3.2 Permutations and Combinations 72 -- 3.2.1 Permutations without Replacement 73 -- 3.2.2 Combinations without Replacement 73 -- 3.2.3 Permutations with Replacement 74 -- 3.2.4 Combinations with Replacement 74 -- 3.3 Multinomial Counting 77 -- 3.4 Special Arrangements and Selections 79 -- 3.5 Applications 81 -- 3.5.1 Game of Poker 81 -- 3.5.2 Birthday Paradox 83 -- 3.5.3 Quality Control 86 -- 3.5.4 Best-of-Seven Championship Series 86 -- 3.5.5 Lottery 89 -- 3.6 Summary 90 -- Problems 90 -- Part II Random Variables 95 -- 4 One Random Variable: Fundamentals 97 -- 4.1 Types of Random Variables 97 -- 4.2 The Cumulative Distribution Function 99 -- 4.3 The Probability Mass Function 102 -- 4.4 The Probability Density Function 104 -- 4.5 Expected Values 107 -- 4.5.1 Mean of a Random Variable 107 -- 4.5.2 Variance of a Random Variable 110 -- 4.5.3 Moments of a Random Variable 113 -- 4.5.4 Mode and Median of a Random Variable 114 -- 4.6 Conditional Distributions 116 -- 4.7 Functions of a Random Variable 120.…”
    Libro electrónico
  10. 4710
    por Roeder, Larry W.
    Publicado 2013
    Tabla de Contenidos: “….-6.6.10 Protocols -- 6.7 The Impact of Program Budget Implications (PBI) -- 6.8 Sovereignty, the New World Order and Implementing a Deal -- 6.9 Rights of Indigenous Peoples: -- 6.10 Non-ratification or Non implementation -- Chapter Seven: War and Peace – Roles for NGOs -- Extract -- 7.1 Law of War -- 7.2 At the Peace Table -- 7.3Neutrality and Working With or Avoiding the Military -- 7.4 An International Army and Peace Keeping -- 7.4.1 Operational Advantage -- 7.4.2 The Saarland and the First Multilateral Force -- 7.4.3 Misuse of a Force -- 7.4.4 The Veto As a Positive Tool -- 7.4.5 Conclusions -- 7.5 Working with Armed Non-State Actors (ANSAs) -- Chapter Eight: Failed and Weak Nation-states -- Highlights of Chapter Eight: -- 8.1 Introduction -- 8.1.1 Coalition Building with Local NGOs -- 8.2 A Common Political and Economic Vision: -- 8.3 A Framework that is Inclusive and Avoids Retribution: -- 8.4 Democracy can be a quality control tool for economic policies -- 8.5 The Case of Egyptian Economic Development -- 8.6 Inform the Public.- 8.7 Equality of Opportunity and Good Governance Create Stable Politics -- Chapter Nine: International Funding -- Extract: -- 9.1 Introduction -- 9.2 Who Receives Government Funding? …”
    Libro electrónico
  11. 4711
    por Srinivasan, A.
    Publicado 2014
    Tabla de Contenidos: “…-- 2.4.2 Migrating to the Cloud: Deployment Considerations -- 2 .4.3 Benefits of the Cloud -- 2 .4.4 Communication Revolution -- 2 .4.5 Cloud Case Studies -- 2.4.6 Cloud Inside the Firewall -- 2.4.7 Secure Sensitive Data -- 2.4.8 Trusted Partners -- 2.4.9 Applications on Cloud Platform -- 2.4.10 Consumer versus Enterprise -- 2.4.11 Remotely Mirrored Servers -- 2.4.12 Payment Procedure -- 2.5 Seven-step Model -- Summary -- Key Terms -- Review Questions -- Chapter 3: Types of Cloud -- 3.1 Public and Private Cloud -- 3.1.1 Types of Cloud Computing…”
    Libro electrónico
  12. 4712
    Publicado 1988
    Libro
  13. 4713
    Publicado 2022
    “…With British Honduras' independence from Great Britain in 1981 as Belize, and the acquisition by Panama of full sovereignty over its territory in 1999, Central America increasingly defined itself as region of seven countries. The Oxford Handbook of Central American History offers critical analyses of major themes in the historiography of this seven-nation region of Latin America. …”
    Libro
  14. 4714
    Publicado 2021
    Tabla de Contenidos: “…-- 7.2 Creating your own file formats for data storage -- 7.2.1 Writing data to disk with serde and the bincode format -- 7.3 Implementing a hexdump clone -- 7.4 File operations in Rust -- 7.4.1 Opening a file in Rust and controlling its file mode -- 7.4.2 Interacting with the filesystem in a type-safe manner with std::fs::Path -- 7.5 Implementing a key-value store with a log-structured, append-only storage architecture -- 7.5.1 The key-value model -- 7.5.2 Introducing actionkv v1: An in-memory key-value store with a command-line interface -- 7.6 Actionkv v1: The front-end code -- 7.6.1 Tailoring what is compiled with conditional compilation -- 7.7 Understanding the core of actionkv: The libactionkv crate -- 7.7.1 Initializing the ActionKV struct -- 7.7.2 Processing an individual record -- 7.7.3 Writing multi-byte binary data to disk in a guaranteed byte order -- 7.7.4 Validating I/O errors with checksums -- 7.7.5 Inserting a new key-value pair into an existing database -- 7.7.6 The full code listing for actionkv -- 7.7.7 Working with keys and values with HashMap and BTreeMap -- 7.7.8 Creating a HashMap and populating it with values -- 7.7.9 Retrieving values from HashMap and BTreeMap -- 7.7.10 How to decide between HashMap and BTreeMap -- 7.7.11 Adding a database index to actionkv v2.0 -- Summary -- 8 Networking -- 8.1 All of networking in seven paragraphs -- 8.2 Generating an HTTP GET request with reqwest -- 8.3 Trait objects -- 8.3.1 What do trait objects enable? …”
    Libro electrónico
  15. 4715
    Publicado 2022
    “…With cutting-edge new content, Alan Weiss will show you how to grow your business into a seven-figure firm today…”
    Libro electrónico
  16. 4716
    Publicado 2023
    “…With cutting-edge new content, Alan Weiss will show you how to grow your business into a seven-figure firm today…”
    Grabación no musical
  17. 4717
    Publicado 2016
    “…Regardless of playing field, mindful thinking is the new competitive advantage, and the seven fixes are a magic set of tools for achieving it. …”
    Libro electrónico
  18. 4718
    Publicado 2009
    “…The Certified Secure Software Lifecycle Professional (CSSLP) is an international certification incorporating new government, commercial, and university derived secure software development methods; it is a natural complement to the CISSP credential The study guide covers the seven domains of the CSSLP Common Body of Knowledge (CBK), namely Secure Software Concepts, Secure Software Requirements, Secure Software Design, and Secure Software Implementation/Coding and Testing,Secure Software Testing, Software Acceptance, and Software Deployment, Operations, Maintenance and Disposal Provides in-depth exploration and explanation of the seven CSSLP domains Includes a CD with hundreds of practice exam questions and answers The CSSLP Prep Guide prepares you for the certification exam and career advancement…”
    Libro electrónico
  19. 4719
    Publicado 2011
    “…Overall cancer incidence was not studied in the seven observational studies.When analysing site-specific cancers, prostate cancer was the only cancer type where increased risk was shown for folic acid supplements. …”
    Libro electrónico
  20. 4720
    por Lindgren, Peter
    Publicado 2022
    “…Conceptually, the Business Model Cube was formed using the seven dimensions which could be used both in a 2D and a 3D version…”
    Libro electrónico