Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Malalts terminals 240
- Cura 112
- Operating systems (Computers) 112
- Mort 101
- Linux 70
- Engineering & Applied Sciences 61
- Computer networks 60
- Historia 54
- Computer Science 52
- Development 49
- Aspectes religiosos 48
- Enfermos terminales 48
- Cuidados paliativos 46
- Application software 45
- Computer programming 45
- Aspectes psicològics 44
- Terminal care 43
- Tractament pal·liatiu 41
- Management 39
- Security measures 37
- TFC 36
- Examinations 35
- Cloud computing 32
- Computer security 31
- Python (Computer program language) 31
- Programming 30
- Certification 29
- Església Catòlica 27
- Mac OS 27
- History 26
-
1841Publicado 2017Tabla de Contenidos: “…The basic working -- Authentication with the help of an asymmetric key -- Digital signatures -- The benefits and use cases of a digital signature -- SSL/TLS -- Scenario 1 - A man-in-the-middle attack-storing credentials -- Scenario 2 - A man-in-the-middle attack-integrity attacks -- Working of SSL/TLS -- Client Hello -- Server Hello -- Certificate -- Server key exchange -- Server Hello done -- Client key exchange -- Change cipher spec -- Security related to SSL/TLS -- Grading TLS configuration with SSL Labs -- Default Settings -- Perfect forward secrecy -- Implementation of perfect forward secrecy in nginx -- HTTP Strict Transport Security -- Implementing HSTS in nginx -- Verifying the integrity of a certificate -- Online certificate status protocol -- OCSP stapling -- Challenge 1 -- Challenge 2 -- An ideal solution -- Architecture -- Implementing TLS termination at the ELB level -- Selecting cipher suites -- Importing certificate -- AWS certificate manager -- Use case 1 -- Use case 2 -- Introduction to AWS Certificate Manager -- Summary -- Chapter 6: Automation in Security -- Configuration management -- Ansible -- Remote command execution -- The structure of the Ansible playbook -- Playbook for SSH hardening -- Running Ansible in dry mode -- Run and rerun and rerun -- Ansible mode of operations -- Ansible pull -- Attaining the desired state with Ansible pull -- Auditing servers with Ansible notifications -- The Ansible Vault -- Deploying the nginx Web Server -- Solution -- Ansible best practices -- Terraform -- Infrastructure migration -- Installing Terraform -- Working with Terraform -- Integrating Terraform with Ansible -- Terraform best practices -- AWS Lambda -- Cost optimization -- Achieving a use case through AWS Lambda -- Testing the Lambda function -- Start EC2 function -- Integrating the Lambda function with events -- Summary…”
Libro electrónico -
1842por Diamond, StephanieTabla de Contenidos: “…Introducing AI-generated art -- Observing data visualization -- Looking at image enhancement -- Generating Audio and Voice -- Using voice assistants -- Generating music -- Turning text into speech -- Creating and Editing Videos -- Summarizing videos -- Adding special effects -- Using auto-editing tools -- Choosing the Right Output Type for Your Project -- Matching output to objectives -- Considering cost, complexity, and sophistication -- Chapter 3 Navigating the Leading Platforms -- Setting Up Accounts and Managing Usage -- Step 1: Choosing a platform -- Step 2: Creating an account -- Step 3: Choosing the best plan -- Step 4: Setting preferences -- Step 5: Customizing your experience -- Understanding the Terms of Service -- Understanding the data usage policy -- Looking at API limitations -- Taking care of content ownership -- Dealing with service availability -- Reading termination clauses -- Reviewing payment and refund policies -- Looking at the governing laws -- Updating terms -- Managing Data Privacy Concerns -- Adding AI to Your Current Tools and Workflow -- Looking at Some Real-World Examples of AI Tools -- Getting into Workflow Automation -- Discovering Cost-Saving Tips and Free Tools -- Reviewing pay-as-you-go and token systems -- Viewing community-supported and open-source options -- Choosing special deals and price cuts -- Reviewing pick-and-choose packages -- Paying attention to differing levels of pricing -- Considering free trials and freemium models -- Watching out for hidden costs -- Looking at Real-World Implementations -- Part 2 Mastering the Art of Prompting -- Chapter 4 Creating and Writing Successful AI Prompts -- Discovering the Importance of Prompts -- Maximizing the Benefits of Your AI Prompts -- Boosting productivity -- Enhancing creativity -- Improving collaboration -- Mitigating risk -- Fostering career advancement…”
Publicado 2024
Libro electrónico -
1843Publicado 2023Tabla de Contenidos: “…DaemonSets -- Jobs -- CronJobs -- Ensuring resilience and high availability with Kubernetes resources -- Understanding advanced Pod application patterns -- Init containers -- Sidecar containers -- Ambassador containers -- Adaptor containers -- Verifying application health -- Understanding the execution of probes -- Termination of Pods -- Container life cycle hooks -- Resource management and scalability -- Horizontal Pod autoscaling -- Improving application security with Pods -- Security contexts -- Security best practices -- Labs -- Summary -- Chapter 10: Leveraging Application Data Management in Kubernetes -- Technical requirements -- Understanding the data within your application -- Applying configurations using ConfigMaps -- Using the downward API to inject configuration data -- Managing sensitive data using Secret resources -- Managing stateless and stateful data -- Using volumes for storing data -- Enhancing storage management in Kubernetes with PV resources -- Provisioning and decommissioning storage -- Labs -- Summary -- Chapter 11: Publishing Applications -- Technical requirements -- Understanding Kubernetes features for publishing applications cluster-wide -- Proxying and forwarding applications for debugging -- Kubernetes client proxy feature -- Kubernetes client port-forward feature -- Using the host network namespace for publishing applications -- Using the hostNetwork key -- Using hostPort -- Publishing applications with Kubernetes' NodePort feature -- Providing access to your Services with LoadBalancer Services -- Understanding Ingress Controllers -- Deploying an Ingress Controller -- Ingress resources -- Improving our applications' security -- Network policies -- Service mesh -- Labs -- Improving application access by deploying your own Ingress Controller…”
Libro electrónico -
1844Publicado 2022Tabla de Contenidos: “…-- Part I Security and Risk Management -- Chapter 1 Cybersecurity Governance -- Fundamental Cybersecurity Concepts and Terms -- Confidentiality -- Integrity -- Availability -- Authenticity -- Nonrepudiation -- Balanced Security -- Other Security Terms -- Security Governance Principles -- Aligning Security to Business Strategy -- Organizational Processes -- Organizational Roles and Responsibilities -- Security Policies, Standards, Procedures, and Guidelines -- Security Policy -- Standards -- Baselines -- Guidelines -- Procedures -- Implementation -- Personnel Security -- Candidate Screening and Hiring -- Employment Agreements and Policies -- Onboarding, Transfers, and Termination Processes -- Vendors, Consultants, and Contractors -- Compliance Policies -- Privacy Policies -- Security Awareness, Education, and Training Programs -- Degree or Certification? …”
Libro electrónico -
1845Publicado 2011Tabla de Contenidos: “…Higher Brain Centers for Intelligent Motor Control in Insects -- Introduction -- Learning and Memory in the Central Complex for Approaching Objects -- Experimental Evidence -- The Central Complex Model -- Intelligent Motor Control beyond the Current Model -- An Integrator for the Orientation in Gradients -- Motor Learning -- A Representation of Body Size in the Brain -- Termination of Inappropriate Behavior -- Conclusion -- References -- An Insect-Inspired, Decentralized Memory for Robot Navigation -- Introduction -- The Model -- Results -- Discussion -- References -- Models of Visually Guided Routes in Ants: Embodiment Simplifies Route Acquisition -- Introduction -- Background -- Overview of Our Approach -- Detailed Methods -- Results -- Summary -- References -- Intelligent Visual Systems -- Robust Object Tracking for Resource-Limited Hardware Systems -- Introduction -- Overview of Tracking System -- Dominant Color-Spatial Based Object Representation -- Dominant Color Mode Extraction -- Spatial Layout of the Dominant Color -- Similarity Measure for Matching -- Cross Bin-Ratio Based Color Similarity Measure -- Spatial Similarity Measure -- Swarm Intelligence Based Searching Method -- Annealed Particle Swarm Optimization -- Integral Image of Model Parameters -- Experimental Results -- Different Object Representations -- Different Similarity Measure -- Different Searching Methods -- Conclusion -- References -- Adaptive Rank Transform for Stereo Matching -- Introduction -- Adaptive Rank Transform -- The Motivation Behind Adaptive Rank Transform -- Adaptive Rank Window -- New Transform Rules -- Comparison between Adaptive and Original Rank Transform -- Obtaining the Match Window from Multiple Rank Windows -- Experiments -- Conclusion -- References -- Real Time Vision Based Multi-person Tracking for Mobile Robotics and Intelligent Vehicles -- Introduction…”
Libro electrónico -
1846por Doménech, Juan Luis 1956-Tabla de Contenidos: “…LA REGRESIÓN DE Homo erectus Y NEANDERTHAL Neanderthal: un caso terminal La regresión de Homo erectus 3a segregación pliocénica 4a segregación 5a segregación 6a segregación VIII LA REGRESIÓN CULTURAL DEL Homo erectus IX. …”
Publicado 1999
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Seminario Metropolitano de Oviedo)Libro -
1847por Reyes Salinas, AlejandroTabla de Contenidos: “…Perlitas; Ejercicios; CAPÍTULO 10 FLUJO ALREDEDOR DE OBJETOS SUMERGIDOS; 10.1. Velocidad Terminal; 10.2. Coeficientes de arrastre; Ejercicios; CAPÍTULO 11 FLUIDIZACIÓN; 11.1. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
1848Publicado 2008Tabla de Contenidos: “…CASO DE LA CONSTRUCCIÓN DE LA SUBESTACIÓN ELÉCTRICA DE LA LÍNEA L10 DEL DISEÑO DE UNA SOLUCIÓN DE AGOTAMIENTO PARA LA EXCAVACIÓN DEL PANTALÓN DE ACCESO A LA NUEVA TERMINAL SUR. LÍNEA 9 DEL METRO DE BA; EVALUACIÓN DEL IMPACTO HIDROLÓGICO DEL TÚNEL DEL TRAMO PADRÓN-OSEBE DEL EJE ATLÁNTICO DE ALTA VELOCIDAD MEDIANTE UN MODELO DE FL; LA MODELACIÓN, UN ELEMENTO CLAVE EN EL SEGUIMIENTO HIDROGEOLÓGICO DE LAS OBRAS DE LA LAV. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1849Publicado 2015Tabla de Contenidos: “…Contenido de "Relatos sin calibre" : Últimas ruinas encontradas -- Escritor sin salida -- El cuasi-sapiens -- Un día distinto -- Defectos de la monotonía -- Fragmento insaciable -- Defensa del acusado -- El juego de los aburridos -- Pintura de un fracaso rotundo -- Recuerdos agradables trazados sobre un papel -- Tareas figurantes -- Relato con Big-Bang (Otro relato egocéntrico) -- Se busca -- Personaje inconcluso -- Prestigio figurante -- Relato sin tiempo -- Cajas y muñecas extranjeras -- Relato inverosímil -- Muerte de un personaje principal -- El figuródromo -- Otra enfermedad terminal -- Amor caníbal -- Atrapada en un texto -- Relato estrecho -- Religiones y costumbres secundarias -- En la punta de la lengua -- Un agujero en la habitación -- Epidemia de hambre -- Asesino en serie -- Rebelión de los figurantes -- Oculta en un baúl -- Enumeración tediosa para dejar de sentirse culpable -- Cuestión de tiempo -- Otro desconocido más -- Control de la natalidad -- La ineludible compañía -- Aferrado al fracaso -- Cultos secundarios -- Un personaje miedoso -- El miedo de los figurantes -- Trastornos congénitos -- Retrato hablado de un asesino -- Fragmento de egocentrismo -- Nacimiento de una preocupación -- Palabras con pinzas -- Más sobre epidemias -- La mujer de sus sueños -- Los zapatos del delincuente -- Fuera de control -- La importancia de tener espalda -- Demoliciones cotidianas -- Otro dolor de cabeza -- Mal de la memoria -- Personaje sin cabeza -- El último lector -- Frutos muertos -- Mariposas en el estómago -- Agujereado -- Teratogénesis -- Tiempo de frutos…”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
1850por Fonseca Casas, PauTabla de Contenidos: “…Inicialització dels blocs GENERATE; 8.2.Terminate; 8.3. Advance; 8.4. Seize; 8.5. Release; 8.6. …”
Publicado 2009
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1851por Jagger, Jon, 1966-Tabla de Contenidos: “…9.2.3 Grammar ambiguitiesRationale: the "following token" set; Similar cast expression ambiguity; F(G>7); 9.3 Lexical analysis; 9.3.1 Line terminators; 9.3.2 Comments; 9.3.3 White space; 9.4 Tokens; 9.4.1 Unicode escape sequences; No escapes in verbatim strings; No escapes in comments; 9.4.2 Identifiers; Identifier normalization; The humble underscore; Keyword escape mechanism; Code generation; 9.4.3 Keywords; Language evolution; 9.4.4 Literals; 9.4.4.1 Boolean literals; Boolean arguments considered harmful?…”
Publicado 2007
Libro electrónico -
1852Publicado 2016Tabla de Contenidos: “…1.2.3 Virtualisation, Cloud, And Ultra-Flexible Rans 1.2.4 Energy- And Spectrum-Efficient Networking ; 1.2.5 New Spectrum Bands For Mobile Broadband ; 1.2.6 Radio Channels And Propagation Modelling ; 1.3 Scope Of The Book ; Chapter 2 - Urban Radio Access Networks ; 2.1 Radio Propagation In Urban Scenarios ; 2.1.1 Radio Propagation Measurement And Stochastic Modelling ; 2.1.1.1 Channel Characterisation In Various Urban Scenarios Relay ; 2.1.1.2 Updated Models In Challenging Conditions Container Terminals ; 2.1.1.3 Effects Of User Mobility, Existence Of Pedestrians, And Tx/Rx Antenna Height…”
Libro electrónico -
1853Publicado 2016Tabla de Contenidos: “…Kapitel 4: Finetuning - Ubuntu wird eingerichtet4.1 Ubuntu nach den eigenen Bedürfnissen einrichten; 4.2 Die Netzwerkverbindungen einrichten; Per LAN-Kabel; Per WLAN; Per Smartphone; Per UMTS-Stick; Mit Ihrem WLAN im Netzwerk anmelden; 4.3 System aktualisieren; 4.4 Sprachpakete komplettieren; 4.5 Die Grafikkarte einrichten; 4.6 Drucker einrichten; 4.7 Einen Scanner einrichten; 4.8 Anwendungen nachinstallieren; Troubleshooting; 4.9 Programme aus einer anderen Quelle installieren; Programme mit Hilfe des Terminals installieren; 4.10 Weitere Quellen in Ubuntu-Software einbinden; PPA einbinden…”
Libro electrónico -
1854Publicado 2017Tabla de Contenidos: “…-- Nonoperated Ventures or Operated by Others -- Public-Private Partnerships -- Joint Ventures in Practice-The "How -- Treatment of Sources and Uses of Cash Flow -- How to Create Real Options with Contract Rights -- Exit and Termination -- Operating Model Complications -- Notes -- Chapter 7: Financial Implications -- Financial Strategy and Policy -- 1. …”
Libro electrónico -
1855por Barrett, Daniel J.Tabla de Contenidos: “…-- Eine Shell aufrufen -- Shell versus Terminal -- Warmlaufen für die Befehle -- Struktur von Befehlen -- User und Administratoren -- Das Dateisystem -- Home-Verzeichnisse -- Systemverzeichnisse -- Kernelbezogene Verzeichnisse -- Dateiberechtigungen -- Ausgewählte bash-Features -- Welche Shell nutzen Sie? …”
Publicado 2024
Libro electrónico -
1856Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Getting Ready -- ESP8266EX -- ESP-01 -- Board features and connections -- Connections -- Connecting with a breadboard -- Power supply -- Connecting through USB for flashing -- Using a serial terminal program -- AT commands -- Using AT commands -- Using the Arduino IDE -- Installing the Arduino core for an ESP8266 Wi-Fi chip -- Hello world -- Listing 1-1 - Blink a LED -- Using chassis kits and accessories to build robots -- Mini 3-Layer Round Robot Chassis Kit -- Zumo chassis kit -- Romi chassis kit -- Mini robot rover chassis kit -- Rover 5 robot platform -- Wheel encoder kit -- Parallel Gripper Kit A - Channel mount -- Summary -- Chapter 2: Building a Mini Round Robot with Original ESP8266 -- Things you will need -- Assembling the Mini 3-Layer Round Robot chassis kit -- Assembling the wheels -- Assembling the chassis -- Attaching 9V battery box to the chassis layer -- Connecting the middle chassis -- Attaching 4 x AA battery box to the chassis layer -- Mounting the Arduino board -- Wiring them together -- Connecting the Arduino with motor driver -- Connecting the motors with the motor driver -- Connecting the ESP01 with Arduino -- Writing sketches -- Using Blynk -- Installing the Blynk library for Arduino -- Writing the Arduino sketch -- Working with the Blynk Sketch Code Builder -- Listing 2-1 - Example code generated with the Blynk Sketch Code Builder -- Listing 2-2 - complete sketch for mini round robot -- Uploading the sketch -- Applying power -- Playing the robot -- Summary -- Chapter 3: Using Encoders -- Things you will need -- The Wheel Encoder Kit -- Connecting the encoders with motors -- Wiring the encoders with Arduino -- Reading encoders -- Creating a Blynk app…”
Libro electrónico -
1857por Williams, TimTabla de Contenidos: “…Conductor resistanceVoltage breakdown and crosstalk; Constant impedance; 2.2.2 Hole and pad size; Vias; Through hole pads; Surface mount pads; 2.2.3 Track routing; 2.2.4 Ground and power distribution; Ground rail inductance; Gridded ground layout; The ground plane; Inside or outside layers; Multiple ground planes; 2.2.5 Copper plating and finishing; 2.2.6 Solder resist; Screen printed resists; Photo-imaged film; 2.2.7 Terminations and connections; Two-part connectors; Edge connectors; 2.3 Board assembly: surface mount and through hole; 2.3.1 Surface mount design rules; Solder process…”
Publicado 2004
Libro electrónico -
1858Publicado 2009Tabla de Contenidos: “…Distributed Transform Coding; 2.1 Introduction; 2.2 Foundations of Centralized Transform Coding; 2.2.1 Transform Coding Overview; 2.2.2 Lossless Compression; 2.2.3 Quantizers; 2.2.4 Bit Allocation; 2.2.5 Transforms; 2.2.6 Linear Approximation; 2.3 The Distributed Karhunen--Loève Transform; 2.3.1 Problem Statement and Notation; 2.3.2 The Two-terminal Scenario…”
Libro electrónico -
1859Publicado 2008Tabla de Contenidos: “…5.5 High Current Power Supply Systems5.6 Half-Wave and Full-Wave Rectification; 5.7 Direct Current Supply Line Ripple Rejection; 5.8 Voltage Regulator Systems; 5.9 Series Regulator Layouts; 5.10 Overcurrent Protection; 5.11 Integrated Circuit (Three Terminals) Voltage Regulator ICs; 5.12 Typical Contemporary Commercial Practice; 5.13 Battery Supplies; 5.14 Switch-Mode Power Supplies; Reference; Part III: Preamplifiers and Amplifiers; Chapter 6: Introduction to Audio Amplification; Chapter 7: Preamplifiers and Input Signals; 7.1 Requirements; 7.2 Signal Voltage and Impedance Levels…”
Libro electrónico -
1860por Martinez Perea, RogelioTabla de Contenidos: “…; 5.2 SIP Services and SIP Entities; 5.3 Terminal-Based or Network-Based SIP Services; 5.4 SIP Programming Interfaces; 5.5 Media-Programming APIs; 5.6 APIs Used in This Book; 5.7 Summary; PART II: CORE PROTOCOLS; CHAPTER 6 SIP Protocol Operation…”
Publicado 2008
Libro electrónico