Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Malalts terminals 240
- Cura 112
- Operating systems (Computers) 112
- Mort 101
- Linux 70
- Engineering & Applied Sciences 61
- Computer networks 60
- Historia 54
- Computer Science 52
- Development 49
- Aspectes religiosos 48
- Enfermos terminales 48
- Cuidados paliativos 46
- Application software 45
- Computer programming 45
- Aspectes psicològics 44
- Terminal care 43
- Tractament pal·liatiu 41
- Management 39
- Security measures 37
- TFC 36
- Examinations 35
- Cloud computing 32
- Computer security 31
- Python (Computer program language) 31
- Programming 30
- Certification 29
- Església Catòlica 27
- Mac OS 27
- History 26
-
1881por Ogden, BillTabla de Contenidos: “…6.1 Linux desktop windows -- 6.2 FLEX-ES system and resource definitions -- 6.2.1 Building a shell script -- 6.2.2 IPL z/OS -- 6.2.3 User terminal connection -- 6.2.4 IODF requirements -- 6.2.5 System performance monitors -- 6.2.6 TCP/IP for z/OS -- 6.3 Shutting down -- 6.4 More comments -- Chapter 7. …”
Publicado 2003
Libro electrónico -
1882Publicado 2009Tabla de Contenidos: “…3.1.7 Miscellaneous features3.1.8 Summing up the architecture overview; 3.2 Mobile devices; 3.2.1 Different types of devices; 3.2.2 Terminals becoming general-purpose devices; 3.2.3 Some challenges; 3.2.4 Concluding words on mobile devices; 3.3 Relationship of EPC to radio networks; 3.3.1 Overview of radio networks for mobile services; 3.3.2 Functionality of radio networks; 3.3.3 GSM; 3.3.4 WCDMA; 3.3.5 LTE; Chapter 4 EPS deployment scenarios and operator cases; 4.1 Scenario 1: EPS with LTE deployment with existing 3GPP installations; 4.2 Scenario 2: LTE and EPS for Greenfield operators…”
Libro electrónico -
1883por Manganaro, GabrieleTabla de Contenidos: “…Half Title; Title Page; Copyright; Contents; 1 Wireless Infrastructure; Introduction; 1.1 The cellular infrastructure; 1.2 The satellite infrastructure; 1.3 Challenges; 1.4 This book; Conclusive Remarks; 2 CMOS Transceivers for Modern Cellular Terminals; Introduction; 2.1 2G transceiver architecture design; 2.1.1 GSM/EDGE receiver requirement; 2.1.2 GSM/EDGE transmitter requirement; 2.1.2.1 Power and mask requirements; 2.1.2.2 Phase error and EVM requirements; 2.2 3/4G transceiver architecture design; 2.2.1 3G receiver requirements; 2.2.1.1 Sensitivity; 2.2.1.2 Blocking requirements…”
Publicado 2013
Libro electrónico -
1884Publicado 2015Tabla de Contenidos: “…2.2 Asymmetrical Current 2.2.1 General Terms; 2.2.2 DC Time Constant; 2.2.3 Asymmetrical Current in Three-Phase Systems; 2.3 Short-Circuit Current Impact on System and Components; 2.4 Fault Statistics; 2.4.1 Occurrence and Nature of Short-Circuits; 2.4.2 Magnitude of Short-Circuit Current; References; 3 Fault-Current Breaking and Making; 3.1 Introduction; 3.2 Fault-Current Interruption; 3.3 Terminal Faults; 3.3.1 Introduction; 3.3.2 Three-Phase Current Interruption; 3.4 Transformer-Limited Faults; 3.4.1 Transformer Modelling for TRV Calculation; 3.4.2 External Capacitances…”
Libro electrónico -
1885Publicado 2021Tabla de Contenidos: “…-- Making Excuses -- Efficiency and Honesty -- Chapter 15 The Purchase Agreement -- How to Review the Purchase Agreement -- The Definitions -- Purchase Price and Payment Execution -- Warranties and Representations -- Indemnification -- Termination Provisions and Breakup Fees -- Closing Conditions -- Covenants -- Terms and Clauses to Watch -- Jurisdiction -- Stock Exchange Ratio -- Asset Purchases -- Earnouts -- Express Nonreliance -- No-Shop versus Go-Shop Clauses -- Pandemic and Epidemic Carve-Outs -- Typical Purchase Agreement Outline -- Lawyers and the Purchase Agreement -- Choosing the Right M& -- A Lawyer -- Experience Fit -- Global versus Local -- Value for the Money -- Alignment -- Bandwidth and Priority -- Dealing with Legal Counsel -- Chapter 16 Strategic versus Financial Acquisitions -- Different Types of Acquisitions -- Financial Acquisitions -- Strategic Acquisitions -- Reasons for Strategic Acquisitions -- Growth -- Roll-Ups -- Strength in Competition -- Extending Control over the Supply Chain -- Legal and Regulations -- Entering New Geographic Markets -- Buying versus Building New Products and Tech -- Economies of Scale -- Branding -- Acquihires -- Removing the Competition -- How to Know What Drives the Buyer's Motivation -- Consider What Type of Organization the Buyer Is -- Ask -- What They're Asking and Focusing On -- Their Track Record -- What's Happening with Its Business…”
Libro electrónico -
1886Publicado 2017Tabla de Contenidos: “…. -- See also -- SSL termination proxy -- Getting ready -- How to do it... -- See also -- Rate limiting -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 8: Load Balancing -- Introduction -- Basic balancing techniques -- Round robin load balancing -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Least connected load balancing -- Getting ready -- How to do it... -- How it works... -- Hash-based load balancing -- How to do it... -- How it works... -- There's more... -- See also -- Testing and debugging NGINX load balancing -- Getting ready -- How to do it... -- There's more... -- See also -- TCP / application load balancing -- How to do it... -- How it works... -- Easy testing -- There's more... -- See also -- NGINX as an SMTP load balancer -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 9: Advanced Features -- Introduction -- Authentication with NGINX -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- WebDAV with NGINX -- Getting ready -- How to do it... -- How it works... -- See also -- Bandwidth management with NGINX -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Connection limiting with NGINX -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
1887Publicado 2015Tabla de Contenidos: “…Dispute Resolution -- o. Termination -- C. Export Distributor and Sales Agent Agreements -- 1. …”
Libro electrónico -
1888por MacCharles, AlanTabla de Contenidos: “…11.3.7 Importance of Realistic Expectations -- 11.4 Part 4: The Most Important Joint Venture Contract Clauses -- 11.4.1 Important Clauses -- 11.4.2 Responsibilities of the Parties -- 11.4.3 Technology and Brand -- 11.4.4 Corporate Governance -- 11.4.5 Management Organization -- 11.4.6 Non-Competition and Exclusivity -- 11.4.7 Termination -- 11.4.8 Dispute Resolution and Governing Laws -- 11.5 Part 5: Typical Challenges in Negotiating JVCs -- 11.5.1 Confusion -- 11.5.2 Too Difficult to Agree for Now -- CHAPTER TWELVE JV End Stages - Successful Exit, Manageable De-Coupling or Toxic Dispute -- 12.1 Section 1: Why do IJVs End? …”
Publicado 2024
Libro electrónico -
1889por Gurfinkel, ArieTabla de Contenidos: “…4.1 Generating Attractor Caches from Sub-Games -- 4.2 Constructing Sub-games from Abstract Strategy Templates -- 5 Game Solving with Abstract Template-Based Caching -- 6 Experimental Evaluation -- 7 Related Work -- 8 Conclusion -- References -- Learning -- Bisimulation Learning -- 1 Introduction -- 2 Illustrative Example -- 3 Stutter-Insensitive Bisimulations of Deterministic Transition Systems -- 3.1 Model Checking -- 4 Counterexample-Guided Bisimulation Learning -- 4.1 Learner-Verifier Framework for Bisimulation Learning -- 4.2 Binary Decision Tree Partition Templates -- 5 Experimental Evaluation -- 5.1 Discrete-Time Clock Synchronization -- 5.2 Conditional Termination -- 6 Conclusion -- References -- Regular Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Regular Languages -- 3.2 Rational Transductions -- 3.3 Markov Decision Processes -- 4 Regular Markov Decision Processes -- 4.1 Undecidability of Values -- 4.2 Discounted Optimization -- 4.3 Finiteness Conditions -- 4.4 Q-Learning in RMDPs -- 5 Deep Regular Reinforcement Learning -- 5.1 Token Passing -- 5.2 Duplicating Pebbles -- 5.3 Shunting Yard Algorithm -- 5.4 Modified Tangrams -- 6 Conclusion -- References -- LTL Learning on GPUs -- 1 Introduction -- 2 Formal Preliminaries -- 3 High-Level Structure of the Algorithm -- 4 In-Memory Representation of Search Space -- 5 Correctness and Complexity of the Branch-Free Implementation of Temporal Operators -- 6 Relaxed Uniqueness Checks -- 7 Divide & -- Conquer -- 8 Evaluation of Algorithm Performance -- 9 Conclusion -- References -- Safe Exploration in Reinforcement Learning by Reachability Analysis over Learned Models -- 1 Introduction -- 2 Problem Setup -- 3 Verified Exploration Through Learned Models -- 3.1 Symbolic Environment Models -- 3.2 Shielding for Verified Safe Exploration…”
Publicado 2024
Libro electrónico -
1890por Bryant, RussellTabla de Contenidos: “…Outside Connectivity -- The Basics of Trunking -- Fundamental Dialplan for Outside Connectivity -- PSTN Circuits -- Traditional PSTN Trunks -- Installing PSTN Trunks -- VoIP -- Coping with Network Address Translation -- PSTN Termination -- PSTN Origination -- VoIP to VoIP -- Configuring VoIP Trunks -- Emergency Dialing -- Conclusion -- Chapter 8. …”
Publicado 2013
Libro electrónico -
1891Publicado 2007Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Preface -- About the Authors -- Acknowledgments -- PART ONE: Introduction to Solaris Internals -- Chapter 1 Introduction -- 1.1 Key Features of Solaris 10, Solaris 9, and Solaris 8 -- 1.2 Key Differentiators -- 1.3 Kernel Overview -- 1.4 Processes, Threads, and Scheduling -- 1.5 Interprocess Communication -- 1.6 Signals -- 1.7 Memory Management -- 1.8 Files and File Systems -- 1.9 Resource Management -- PART TWO: The Process Model -- Chapter 2 The Solaris Process Model -- 2.1 Components of a Process -- 2.2 Process Model Evolution -- 2.3 Executable Objects -- 2.4 Process Structures -- 2.5 Kernel Process Table -- 2.6 Process Resource Attributes -- 2.7 Process Creation -- 2.8 System Calls -- 2.9 Process Termination -- 2.10 The Process File System -- 2.11 Signals -- 2.12 Sessions and Process Groups -- 2.13 MDB Reference -- Chapter 3 Scheduling Classes and the Dispatcher -- 3.1 Fundamentals -- 3.2 Processor Abstractions -- 3.3 Dispatcher Queues, Structures, and Variables -- 3.4 Dispatcher Locks -- 3.5 Dispatcher Initialization -- 3.6 Scheduling Classes -- 3.7 Thread Priorities -- 3.8 Dispatcher Functions -- 3.9 Preemption -- 3.10 The Kernel Sleep/Wakeup Facility -- 3.11 Interrupts -- 3.12 Summary -- 3.13 MDB Reference -- Chapter 4 Interprocess Communication -- 4.1 The System V IPC Framework -- 4.2 System V IPC Resource Controls -- 4.3 Configuring IPC Tuneables on Solaris 10 -- 4.4 System V Shared Memory -- 4.5 System V Semaphores -- 4.6 System V Message Queues -- 4.7 POSIX IPC -- 4.8 Solaris Doors -- 4.9 MDB Reference -- Chapter 5 Process Rights Management -- 5.1 Then and Now -- 5.2 Least Privilege in Solaris -- 5.3 Process Privilege Models -- 5.4 Privilege Awareness: The Details -- 5.5 Least Privilege Interfaces -- PART THREE: Resource Management -- Chapter 6 Zones -- 6.1 Introduction -- 6.2 Zone Runtime…”
Libro electrónico -
1892por Stapleton, JeffTabla de Contenidos: “…4.3.4 RFC 3647 Identification and Authentication for Revocation Requests -- 4.4 RFC 2527 Certificate Lifecycle Operational Requirements -- 4.4.1 RFC 3647 Certificate Application -- 4.4.2 RFC 3647 Certificate Application Processing -- 4.4.3 RFC 3647 Certificate Issuance -- 4.4.4 RFC 3647 Certificate Acceptance -- 4.4.5 RFC 3647 Key Pair and Certificate Usage -- 4.4.6 RFC 3647 Certificate Renewal -- 4.4.7 RFC 3647 Certificate Rekey -- 4.4.8 RFC 3647 Certificate Modification -- 4.4.9 RFC 3647 Certificate Revocation and Suspension -- 4.4.10 RFC 3647 Certificate Status Services -- 4.4.11 RFC 3647 End of Subscription -- 4.4.12 RFC 3647 Key Escrow and Recovery -- 4.5 RFC 3647 Facility, Management, and Operational and Physical Controls -- 4.5.1 RFC 3647 Physical Security Controls -- 4.5.2 RFC 3647 Procedural Controls -- 4.5.3 RFC 3647 5.3 Personnel Security Controls -- 4.5.4 RFC 3647 Audit Logging Procedures -- 4.5.5 RFC 3647 Records Archival -- 4.5.6 RFC 3647 Key Changeover -- 4.5.7 RFC 3647 Compromise and Disaster Recovery -- 4.5.8 RFC 3647 CA or RA Termination -- 4.6 RFC 2527 Technical Security Controls -- 4.6.1 RFC 3647 Key Pair Generation and Installation -- 4.6.2 RFC 3647 Private Key Protection and Cryptographic Module Controls -- 4.6.3 RFC 3647 Other Aspects of Key Pair Management -- 4.6.4 RFC 3647 Activation Data -- 4.6.5 RFC 3647 Computer Security Controls -- 4.6.6 RFC 3647 Life Cycle Security Controls -- 4.6.7 RFC 3647 Network Security Controls -- 4.6.8 RFC 3647 Time Stamping -- 4.7 RFC 2527 Certificate, CRL, and OCSP Profiles -- 4.7.1 RFC 3647 Certificate Profile -- 4.7.2 RFC 3647 CRL Profile -- 4.7.3 RFC 3647 OCSP Profile -- 4.7.4 Other PKI-Related Profiles -- 4.8 RFC 2527 Compliance Audits and Other Assessments -- 4.8.1 RFC 3647 Frequency or Circumstances -- 4.8.2 RFC 3647 Identity/Qualifications of Assessor…”
Publicado 2024
Libro electrónico -
1893Publicado 2018Tabla de Contenidos: “…Launching the network device -- The VyOS role -- Running the playbook -- Summary -- Questions -- Further reading -- Chapter 8: Moving to the Cloud -- Technical requirements -- Interacting with DigitalOcean -- Generating a personal access token -- Installing dopy -- Launching a Droplet -- Running the playbook -- WordPress on DigitalOcean -- The host inventory -- Variables -- The playbook -- The droplet role -- Running the playbook -- Summary -- Questions -- Further reading -- Chapter 9: Building Out a Cloud Network -- Technical requirements -- An introduction to AWS -- Amazon Virtual Private Cloud overview -- Creating an access key and secret -- The VPC playbook -- The VPC role -- The subnets role -- The internet gateway role -- The security group role -- The ELB role -- Summary -- Questions -- Further reading -- Chapter 10: Highly Available Cloud Deployments -- Technical requirements -- Planning the deployment -- Costing the deployment -- WordPress considerations and high availability -- The playbook -- Amazon VPC -- Amazon RDS -- Amazon EFS -- Testing the playbook -- Terminating resources -- EC2 instances -- Instance discovery -- New deployment -- Existing deployment -- Stack -- Default variables -- Deploy -- WordPress -- AMI -- Autoscaling -- Running the playbook -- Terminating all the resources -- Summary -- Questions -- Further reading -- Chapter 11: Building Out a VMware Deployment -- Technical requirements -- An introduction to VMware -- The VMware modules -- Requirements -- vCloud Air -- The vca_fw module -- The vca_nat module -- The vca_vapp module -- VMware vSphere -- The vmware_cluster module -- The vmware_datacenter module -- The vmware_vm_facts module -- The vmware_vm_shell module -- The vmware_vm_vm_drs_rule module -- The vmware_vm_vss_dvs_migrate module -- The vsphere_copy module -- The vsphere_guest module -- VMware vCentre…”
Libro electrónico -
1894Publicado 2024Tabla de Contenidos: “…. -- See also -- Using an application load balancer with TLS termination at the ELB -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using a network load balancer with TLS termination at EC2 -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Securing S3 using CloudFront and TLS -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using a WAF -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 7: Monitoring with CloudWatch, CloudTrail, and Config -- Technical requirements…”
Libro electrónico -
1895Publicado 2008Tabla de Contenidos: “…Cover -- Contents -- Introduction -- Part I: TCP/IP Version 4 -- Chapter 1 How to Subnet -- Class A-E Addresses -- Converting Between Decimal Numbers and Binary -- Subnetting a Class C Network Using Binary -- Subnetting a Class B Network Using Binary -- Binary ANDing -- The Enhanced Bob Maneuver for Subnetting -- Chapter 2 VLSM -- IP Subnet Zero -- VLSM Example -- Chapter 3 Route Summarization -- Example for Understanding Route Summarization -- Route Summarization and Route Flapping -- Requirements for Route Summarization -- Part II: Introduction to Cisco Devices -- Chapter 4 Cables and Connections -- Connecting a Rollover Cable to Your Router or Switch -- Terminal Settings -- LAN Connections -- Serial Cable Types -- Which Cable to Use? …”
Libro electrónico -
1896Publicado 2018Tabla de Contenidos: “…. -- Echoing output to raw terminal devices -- Getting ready -- How to do it... -- How it works... -- Creating simple frontend GUIs for Bash scripts -- Getting ready -- How to do it... -- How it works... -- Compiling and installing your own Bash shell -- Getting ready -- How to do it... -- How it works... -- Recording terminal sessions for automation -- Getting ready -- How to do it... -- How it works... -- Writing high-quality scripts by example -- Getting ready -- How to do it... -- How it works... -- Other Books You May Enjoy -- Index…”
Libro electrónico -
1897Publicado 2019Tabla de Contenidos: “…-- Hormones Act by Binding to Receptors -- Hormone Action Must Be Terminated -- The Classification of Hormones -- Most Hormones Are Peptides or Proteins -- Steroid Hormones Are Derived from Cholesterol -- Some Hormones Are Derived from Single Amino Acids -- Control of Hormone Release -- The Endocrine Cell Is the Sensor in Simple Endocrine Reflexes…”
Libro electrónico -
1898Publicado 2011Tabla de Contenidos: “…Conté "Infraestructuras y urbanismo": Vip-Gac Flughafen Wien-Schwechat / DI Ernst Giselbrecht-Partner ZT GMBH ;Air Baltic Terminal / Unknown ; Chikura Station on Jr Line / Miyahara architect office ; New Terminal for Stockholm's ferry connections / C.F. …”
Libro -
1899por Jantti, JoukoTabla de Contenidos: “…IMS shared queues -- 5.1 Shared queues overview -- 5.1.1 Description of facility and use of Parallel Sysplex -- 5.2 Shared queue components -- 5.3 Common Queue Server (CQS) -- 5.3.1 Base Primitive Environment -- 5.3.2 Components of a list structure -- 5.3.3 List headers -- 5.3.4 List entries -- 5.3.5 Unit of work ID -- 5.3.6 Lock table -- 5.3.7 Event monitor controls -- 5.3.8 CQS queue types -- 5.3.9 Private queue types -- 5.3.10 Full function queue types -- 5.3.11 Fast Path queue types -- 5.3.12 Queue names -- 5.3.13 IMS queue manager -- 5.4 Register interest -- 5.4.1 Registering interest in PSBs for Fast Path -- 5.4.2 Registering interest in terminals -- 5.5 Significant status -- 5.6 Accessing shared queues -- 5.6.1 Message queue overflow structure -- 5.6.2 Overflow processing -- 5.6.3 Processing without an overflow structure -- 5.6.4 Full structure -- 5.6.5 CQS checkpoint data sets -- 5.6.6 CQS structure recovery data sets -- 5.6.7 Structure integrity -- 5.6.8 CQS security -- 5.6.9 OS/390 System Logger -- 5.6.10 OS/390 logging structure -- 5.6.11 System Logger data space -- 5.6.12 OS/390 staging log data set -- 5.6.13 Log data sets -- Chapter 6. …”
Publicado 2003
Libro electrónico -
1900Publicado 2012Tabla de Contenidos: “…Atencion en Urgencias al paciente terminal Sección II. Los 10 problemas de salud que solicitan asistencia urgente 1 Alteración del nivel de conciencia 1.1 Coma 1.2 Shock 1.3 Epilepsia. …”
Lectura en línea. Acceso restringido con credenciales UPSA
Videotutorial
Tutorial de uso de Eureka
Libro