Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Malalts terminals 240
- Cura 112
- Operating systems (Computers) 112
- Mort 101
- Linux 70
- Engineering & Applied Sciences 61
- Computer networks 60
- Historia 54
- Computer Science 52
- Development 49
- Aspectes religiosos 48
- Enfermos terminales 48
- Cuidados paliativos 46
- Application software 45
- Computer programming 45
- Aspectes psicològics 44
- Terminal care 43
- Tractament pal·liatiu 41
- Management 39
- Security measures 37
- TFC 36
- Examinations 35
- Cloud computing 32
- Computer security 31
- Python (Computer program language) 31
- Programming 30
- Certification 29
- Església Catòlica 27
- Mac OS 27
- History 26
-
1721por Meggelen, Jim VanTabla de Contenidos: “…Power Supply RequirementsRedundant power supplies; Environment; Grounding; Electrical Circuits; The Equipment Room; Temperature; Dust; Security; Telephony Hardware; Digital interface cards; Channel banks; Other types of PSTN interfaces; Connecting Exclusively to a Packet-Based Telephone Network; Echo Cancellation; Types of Phones; Proprietary digital telephones; ISDN telephones; IP telephones; Softphones; Telephony Adaptors; Communications Terminals; Linux Considerations; Conclusion; 3. Installing Asterisk; Obtaining the Source Code; Extracting the Source Code; Menuselect; Compiling Zaptel…”
Publicado 2007
Libro electrónico -
1722
-
1723por White, BillTabla de Contenidos: “…Useful procedures -- Setting up a HyperTerminal session…”
Publicado 2003
Libro electrónico -
1724por Ratliff, BudTabla de Contenidos: “…Administering ISA Server RemotelyISA Management Console; Terminal Services; Remote Control Applications; ISA Server Community; Chapter 2: Installing and Configuring Microsoft ISA Server 2004 Standard Edition; Before You Begin; Where Not to Install ISA Server; Installing ISA Server 2004 Standard Edition; Installing ISA Server 2004 Standard Edition with a Single Network Adapter; Functionality Available with ISA Server Configured with a Single Network Adapter; Patching ISA Server 2004 Standard Edition; Installing ISA Server 2004 Standard Edition Unattended…”
Publicado 2006
Libro electrónico -
1725por Feuerstein, StevenTabla de Contenidos: “….; DAT-10: Clean up data structures when your program terminates (successfully or with an error).; DAT-11: Beware of and avoid implicit datatype conversions.; Declaring and Using Package Variables; DAT-12: Package application-named literal constants together.; DAT-13: Centralize TYPE definitions in package specifications…”
Publicado 2001
Libro electrónico -
1726por Negus, Chris, 1957-Tabla de Contenidos: “…Chapter 3: Using the Shell Terminal Windows and Shell Access; Using the Shell; Acquiring Super-User Power; Using Environment Variables; Creating Simple Shell Scripts; Summary; Chapter 4: Working with Files; Understanding File Types; Setting File and Directory Permissions; Traversing the File System; Copying Files; Changing File Attributes; Searching for Files; Finding Out More About Files; Summary; Chapter 5: Manipulating Text; Matching Text with Regular Expressions; Editing Text Files; Listing, Sorting, and Changing Text; Summary; Chapter 6: Playing with Multimedia; Working with Audio…”
Publicado 2008
Libro electrónico -
1727por Negus, Chris, 1957-Tabla de Contenidos: “…Fedora Linux Toolbox; About the Authors; Credits; Contents at a Glance; Contents; Acknowledgments; Introduction; Who Should Read This Book; What This Book Covers; How This Book Is Structured; What You Need to Use This Book; Conventions; Chapter 1: Starting with Fedora Linux; About Fedora, Red Hat, and Linux; Focusing on Linux Commands; Summary; Chapter 2: Installing Fedora and Adding Software; Installing Fedora; Working with Software Packages; Using yum Software Repositories; Managing Software with rpm; Summary; Chapter 3: Using the Shell; Terminal Windows and Shell Access; Using the Shell…”
Publicado 2008
Libro electrónico -
1728por Clarke, JustinTabla de Contenidos: “…Injecting Strings InlineInjecting Numeric Values Inline; Terminating SQL Injection; Database Comment Syntax; Using Comments; Executing Multiple Statements; Time Delays; Automating SQL Injection Discovery; Tools for Automatically Finding SQL Injection; HP WebInspect; IBM Rational AppScan; HP Scrawlr; SQLiX; Paros Proxy; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: Reviewing Codefor SQL Injection; Introduction; Reviewing Source Code for SQL Injection; Dangerous Coding Behaviors; Dangerous Functions; Following the Data; Following Data in PHP; Following Data in Java…”
Publicado 2009
Libro electrónico -
1729por Zacker, CraigTabla de Contenidos: “…Selecting ClientsSelecting Network Components; Selecting a Router; Selecting Cables, Adapters, and Switches; Network Adapters; Switches; Diagramming the Network; Preparing for the Installation; Connecting Your Router; Provisioning Disk Space; Selecting Names; Domain Naming; User Naming; Installing Windows SBS 2008; Performing an OEM Windows SBS 2008 Installation; Understanding the Installation Process; AD DS; DHCP Server; DNS Server; File Services; Network Policy and Access Services; Terminal Services; Web Server (IIS); Performing a Windows SBS 2008 Migration Installation; Install Updates…”
Publicado 2009
Libro electrónico -
1730por Russel, CharlieTabla de Contenidos: “…Preparation and Planning; Standard Edition; 64-Bit Architecture; Greater Security and Data Protection; SBS Console; Remote Web Workplace; SharePoint Services; Backup; Premium Edition; SQL Server 2008; Terminal Services…”
Publicado 2009
Libro electrónico -
1731por Liu, FeipengTabla de Contenidos: “…Mapping texture to 3D objects with the OpenGL ES 1.x APIDrawing 3D graphics with the OpenGL ES 2.0 API; Displaying graphics with EGL; Chapter 5: Android Native Application API; Introduction; Creating a native activity with the native_activity.h interface; Creating a native activity with the Android native app glue; Managing native windows at Android NDK; Detecting and handling input events at Android NDK; Accessing sensors at Android NDK; Managing assets at Android NDK; Chapter 6: Android NDK Multithreading; Introduction; Creating and terminating native threads at Android NDK…”
Publicado 2013
Libro electrónico -
1732por Howard, Michael, 1965-Tabla de Contenidos: “…; A Method of Choosing Good ACLs; Creating ACLs; Getting the ACE Order Right; Be Wary of the Terminal Server and Remote Desktop SIDs; NULL DACLs and Other Dangerous ACE Types; Other Access Control Mechanisms; Summary; Chapter 7. …”
Publicado 2004
Libro electrónico -
1733Publicado 2014Tabla de Contenidos: “…Preface ix -- Acknowledgements xi -- Abbreviations and Acronyms xiii -- 1 Introduction to Circularly Polarized Antennas 1 -- 1.1 Introduction 1 -- 1.2 Antenna Parameters 2 -- 1.3 Basic CP Antenna Types 7 -- 1.4 Antenna Modelling Techniques 23 -- 1.5 Typical Requirements and Challenges in CP Antenna Designs 24 -- 1.6 Summary 25 -- References 25 -- 2 Small Circularly Polarized Antenna 29 -- 2.1 Introduction 29 -- 2.2 Basic Theory of Antenna Size Reduction 29 -- 2.3 Small CP Patch Antennas 30 -- 2.4 Small Helix, QHAs and PQHAs 46 -- 2.5 Small CP Slot Antennas 53 -- 2.6 Small CP DRAs 59 -- 2.7 Other Small CP Antennas 63 -- 2.8 Summary 66 -- References 69 -- 3 Broadband Circularly Polarized Antennas 73 -- 3.1 Introduction 73 -- 3.2 Broadband CP Microstrip Patch Antennas 73 -- 3.3 Broadband Helix, QHAs and PQHAs 93 -- 3.4 Spiral Antennas 103 -- 3.5 Broadband CP Slot Antennas 106 -- 3.6 Broadband CP DRAs 116 -- 3.7 Broadband CP Loop Antennas 120 -- 3.8 Other Broadband CP Antennas 123 -- 3.9 Summary 124 -- References 126 -- 4 Multi-Band Circularly Polarized Antennas 131 -- 4.1 Introduction 131 -- 4.2 Multi-Band CP Microstrip Patch Antennas 131 -- 4.3 Multi-Band QHAs and PQHAs 150 -- 4.4 Multi-Band CP Slot Antennas 158 -- 4.5 Multi-Band CP DRAs 171 -- 4.6 Multi-Band CP Loop Antennas 175 -- 4.7 Other Multi-Band CP Antennas 177 -- 4.8 Summary 186 -- References 187 -- 5 Circularly Polarized Arrays 191 -- 5.1 Introduction 191 -- 5.2 CP Patch Antenna Arrays 191 -- 5.3 CP Dielectric Resonator Antenna Arrays 203 -- 5.4 CP Slot Array Antenna 210 -- 5.5 CP Printed Reflectarrays 222 -- 5.6 Integrated CP Array and Active CP Array 234 -- 5.7 CP Array with Reconfigurable Beams 243 -- 5.8 Other CP Arrays 252 -- 5.9 Summary 258 -- References 258 -- 6 Case Studies 263 -- 6.1 Introduction 263 -- 6.2 Dual-Band CP Patch Array for GNSS Reflectometry Receiver on Board Small Satellites 263 -- 6.3 Small Printed Quadrifilar Helix Antenna for Mobile Terminals in Satellite communications 271 -- 6.4 Printed Broadband CP Rectangular Bi-Loop Antenna for RFID Readers 278.…”
Libro electrónico -
1734Publicado 2012Tabla de Contenidos: “…Stand Up for Your RightsSAFETY Act; Tell the Truth (Even If Somebody's Been Fooling You); Handling Terminations; Chapter 7 Keep Your Nose Clean; Suspension and Debarment; Basic Ethics Requirements; Interactions with Individual Federal Employees; Interactions with the Government; Interactions with Your Employees; Interactions with Third Parties; Chapter 8 When You Lose; Debriefs; Protests; Protest Forum: The GAO; Protest Forum: Court of Federal Claims; Final Note; Chapter 9 Import with Care; Buy American Act; Trade Agreements Act; Domestic Preferences for Defense Department Contractors…”
Libro electrónico -
1735por Leonard, AndyTabla de Contenidos: “…; Strong-Typing the Data; Introducing a Data-Staging Pattern; Variable-Length-Rows; Reading into a Data Flow; Splitting Record Types; Terminating the Streams; Header and Footer Rows; Consuming a Footer Row…”
Publicado 2012
Libro electrónico -
1736por Abbott, Doug, 1944-Tabla de Contenidos: “…; Install Cross-Tool Chain; Install Root File System; The Terminal Emulator, minicom; Networking; Network Address; What About Wireless?…”
Publicado 2013
Libro electrónico -
1737por Björk, PeterTabla de Contenidos: “…Deploying updated packages using VMware Horizon Application Manager Summary; Chapter 6: Design and Implementation Considerations using ThinApp; Protecting your packages; Default isolation modes; Sandbox considerations; Implementing ThinDirect, automated browser redirection; Designing for a physical client implementation; Designing for a virtual desktop infrastructure (VDI) implementation; Designing for a terminal server/Citrix XenApp implementation; Designing for a mixed environment; Sizing of your streaming file share; Summary; Chapter 7: Troubleshooting; The theory behind troubleshooting…”
Publicado 2012
Libro electrónico -
1738Publicado 2012Tabla de Contenidos: “…Archaeology and Perceptions of Landscape -- 2 Hay Cave: A 30,000-year cultural sequence from the Mitchell-Palmer limestone zone, north Queensland, Australia (pp. 27-64) -- 3 An early-Holocene Aboriginal coastal landscape at Cape Duquesne, southwest Victoria, Australia (pp. 65-102) -- 4 Aboriginal exploitation of toxic nuts as a late-Holocene subsistence strategy in Australiaʹs tropical rainforests (pp. 103-120) -- 5 Terrestrial engagements by terminal Lapita maritime specialists on the southern Papuan coast (pp. 121-156) -- 6 Otoia, ancestral village of the Kerewo: Modelling the historical emergence of Kerewo regional polities on the island of Goaribari, south coast of mainland Papua New Guinea (pp. 157-176) -- 7 Cranial metric, age and isotope analysis of human remains from Huoshiliang, western Gansu, China (pp. 177-192) -- 8 Not for the squeamish: A new microfossil indicator for the presence of humans (pp. 193-196) -- 9 Science, sentiment and territorial chauvinism in the acacia name change debate (pp. 197-220) -- 10 Nature, culture and time: Contested landscapes among environmental managers in Skåne, southern Sweden (pp. 221-238) -- II. …”
Libro electrónico -
1739por Hill, TerriTabla de Contenidos: “…Authentication, Granting Access to the HP NonStop Server; Guardian Authentication; OSS Authentication; Safeguard-Controlled Terminals; Granting Access to the Remote Nodes; CMON; Chapter 5. …”
Publicado 2004
Libro electrónico -
1740Publicado 2014Tabla de Contenidos: “…Identifying important tablesDefusing cache poisoning; Exploring the magic of virtual IPs; Terminating rogue connections; Reducing contention with concurrent indexes; Managing system migrations; Managing software upgrades; Mitigating the impact of hardware failure; Applying bonus kernel tweaks; Chapter 3: Pooling Resources; Introduction; Determining connection costs and limits; Installing PgBouncer; Configuring PgBouncer safely; Connecting to PgBouncer; Listing PgBouncer server connections; Listing PgBouncer client connections; Evaluating PgBouncer pool health; Installing pgpool…”
Libro electrónico