Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Malalts terminals 240
- Cura 112
- Operating systems (Computers) 112
- Mort 101
- Linux 70
- Engineering & Applied Sciences 61
- Computer networks 60
- Historia 53
- Computer Science 52
- Development 49
- Aspectes religiosos 48
- Enfermos terminales 48
- Cuidados paliativos 46
- Application software 45
- Computer programming 45
- Aspectes psicològics 44
- Terminal care 43
- Tractament pal·liatiu 41
- Management 39
- Security measures 37
- TFC 36
- Examinations 35
- Cloud computing 32
- Computer security 31
- Python (Computer program language) 31
- Programming 30
- Certification 29
- Església Catòlica 27
- Mac OS 27
- History 26
-
1981Publicado 2023Tabla de Contenidos: “…DaemonSets -- Jobs -- CronJobs -- Ensuring resilience and high availability with Kubernetes resources -- Understanding advanced Pod application patterns -- Init containers -- Sidecar containers -- Ambassador containers -- Adaptor containers -- Verifying application health -- Understanding the execution of probes -- Termination of Pods -- Container life cycle hooks -- Resource management and scalability -- Horizontal Pod autoscaling -- Improving application security with Pods -- Security contexts -- Security best practices -- Labs -- Summary -- Chapter 10: Leveraging Application Data Management in Kubernetes -- Technical requirements -- Understanding the data within your application -- Applying configurations using ConfigMaps -- Using the downward API to inject configuration data -- Managing sensitive data using Secret resources -- Managing stateless and stateful data -- Using volumes for storing data -- Enhancing storage management in Kubernetes with PV resources -- Provisioning and decommissioning storage -- Labs -- Summary -- Chapter 11: Publishing Applications -- Technical requirements -- Understanding Kubernetes features for publishing applications cluster-wide -- Proxying and forwarding applications for debugging -- Kubernetes client proxy feature -- Kubernetes client port-forward feature -- Using the host network namespace for publishing applications -- Using the hostNetwork key -- Using hostPort -- Publishing applications with Kubernetes' NodePort feature -- Providing access to your Services with LoadBalancer Services -- Understanding Ingress Controllers -- Deploying an Ingress Controller -- Ingress resources -- Improving our applications' security -- Network policies -- Service mesh -- Labs -- Improving application access by deploying your own Ingress Controller…”
Libro electrónico -
1982por Knapp, Eric D.Tabla de Contenidos: “…Common Industrial Security Recommendations -- Identification of critical systems -- Network segmentation/isolation of systems -- Defense in depth -- Access control -- Advanced Industrial Security Recommendations -- Security Monitoring -- Policy whitelisting -- Application whitelisting -- Common Misperceptions About Industrial Network Security -- Assumptions made in this book -- Summary -- 3 - Industrial Cybersecurity History and Trends -- The convergence of OT and IT -- Importance of securing industrial networks -- The evolution of the cyber threat -- APTs and weaponized malware -- Industroyer -- Night dragon -- Stuxnet -- TRISIS -- Advanced persistent threats and cyber warfare -- Still to come -- Defending against modern cyber threats -- The insider -- Hacktivism, cybercrime, cyberterrorism, and cyberwar -- Summary -- 4 - Introduction to Industrial Control Systems and Operations -- System assets -- Programmable logic controller -- Ladder diagrams -- Sequential function charts -- Remote terminal unit -- Intelligent electronic device -- Human-machine interface -- Supervisory workstations -- Data historian -- Business information consoles and dashboards -- Other assets -- System operations -- Control loops -- Control processes -- Feedback loops -- Production information management -- Business information management -- Process management -- Safety instrumented systems -- The smart grid -- Network architectures -- Summary -- 5 - Industrial Network Design and Architecture -- Introduction to industrial networking -- Common topologies -- Network segmentation -- Higher layer segmentation -- Physical versus logical segmentation -- Microsegmentation -- Cryptographic microsegmentation -- Network services -- Wireless networks -- Remote access -- Performance considerations -- Latency and jitter -- Bandwidth and throughput…”
Publicado 2024
Libro electrónico -
1983Publicado 2022Tabla de Contenidos: “…-- Part I Security and Risk Management -- Chapter 1 Cybersecurity Governance -- Fundamental Cybersecurity Concepts and Terms -- Confidentiality -- Integrity -- Availability -- Authenticity -- Nonrepudiation -- Balanced Security -- Other Security Terms -- Security Governance Principles -- Aligning Security to Business Strategy -- Organizational Processes -- Organizational Roles and Responsibilities -- Security Policies, Standards, Procedures, and Guidelines -- Security Policy -- Standards -- Baselines -- Guidelines -- Procedures -- Implementation -- Personnel Security -- Candidate Screening and Hiring -- Employment Agreements and Policies -- Onboarding, Transfers, and Termination Processes -- Vendors, Consultants, and Contractors -- Compliance Policies -- Privacy Policies -- Security Awareness, Education, and Training Programs -- Degree or Certification? …”
Libro electrónico -
1984Publicado 2018Tabla de Contenidos: “…-- Installing backend tools and dependencies -- Installing ASP.NET Core -- Installing PostgreSQL -- Choosing and installing an IDE -- Productivity tools -- Installing VS Code extensions -- Installing the Vue.js Chrome devtools extension -- Installing a Terminal Emulator on Windows (optional) -- Summary -- Chapter 3: Getting Started with the Project -- ASP.NET Core SPA templates versus CLI tools -- An introduction to webpack -- What is webpack? …”
Libro electrónico -
1985Publicado 2018Tabla de Contenidos: “…-- Types of AWK -- When and where to use AWK -- Getting started with AWK -- Installation on Linux -- Using the package manager -- Compiling from the source code -- Workflow of AWK -- Action and pattern structure of AWK -- Example data file -- Pattern-only statements -- Action-only statements -- Printing each input line/record -- Using the BEGIN and END blocks construct -- The BEGIN block -- The body block -- The END block -- Patterns -- Actions -- Running AWK programs -- AWK as a Unix command line -- AWK as a filter (reading input from the Terminal) -- Running AWK programs from the source file -- AWK programs as executable script files -- Extending the AWK command line on multiple lines -- Comments in AWK -- Shell quotes with AWK -- Data files used as examples in this book -- Some simple examples with default usage -- Multiple rules with AWK -- Using standard input with names in AWK -- AWK standard options -- Standard command-line options -- The -F option - field separator -- The -f option (read source file) -- The -v option (assigning variables) -- GAWK-only options -- The --dump-variables option (AWK global variables) -- The --profile option (profiling) -- The --sandbox option -- The -i option (including other files in your program) -- Include other files in the GAWK program (using @include) -- The -V option -- Summary -- Chapter 2: Working with Regular Expressions -- Introduction to regular expressions -- What is a regular expression? …”
Libro electrónico -
1986Publicado 2021Tabla de Contenidos: “…-- Making Excuses -- Efficiency and Honesty -- Chapter 15 The Purchase Agreement -- How to Review the Purchase Agreement -- The Definitions -- Purchase Price and Payment Execution -- Warranties and Representations -- Indemnification -- Termination Provisions and Breakup Fees -- Closing Conditions -- Covenants -- Terms and Clauses to Watch -- Jurisdiction -- Stock Exchange Ratio -- Asset Purchases -- Earnouts -- Express Nonreliance -- No-Shop versus Go-Shop Clauses -- Pandemic and Epidemic Carve-Outs -- Typical Purchase Agreement Outline -- Lawyers and the Purchase Agreement -- Choosing the Right M& -- A Lawyer -- Experience Fit -- Global versus Local -- Value for the Money -- Alignment -- Bandwidth and Priority -- Dealing with Legal Counsel -- Chapter 16 Strategic versus Financial Acquisitions -- Different Types of Acquisitions -- Financial Acquisitions -- Strategic Acquisitions -- Reasons for Strategic Acquisitions -- Growth -- Roll-Ups -- Strength in Competition -- Extending Control over the Supply Chain -- Legal and Regulations -- Entering New Geographic Markets -- Buying versus Building New Products and Tech -- Economies of Scale -- Branding -- Acquihires -- Removing the Competition -- How to Know What Drives the Buyer's Motivation -- Consider What Type of Organization the Buyer Is -- Ask -- What They're Asking and Focusing On -- Their Track Record -- What's Happening with Its Business…”
Libro electrónico -
1987Publicado 2018Tabla de Contenidos: “…Wissenschaftliche Aufsätze -- a) Analyse -- aa) Substituierbarkeit wissenschaftlicher Aufsätze -- bb) Substituierbarkeit wissenschaftlicher Zeitschriften aus Autorensicht -- (1) Austauschbarkeit mit Publikationen einer anderen Art -- (2) Austauschbarkeit mit Publikationen derselben Art -- (3) Austauschbarkeit mit Open-Access-Zeitschriften ("Golden Open Access") -- (a) Veröffentlichungskosten -- (b) Langzeitverfügbarkeit -- (c) Renommee -- (d) Zwischenergebnis -- (4) Zwischenergebnis -- cc) Substituierbarkeit wissenschaftlicher Artikel aus Nutzersicht -- (1) Öffentlich verfügbare Kopien des Artikels -- (a) Öffentliche Verfügbarmachung nach deutschem Recht -- (aa) Öffentliche Zugänglichmachung für Unterricht und Forschung -- (bb) Wiedergabe von Werken an elektronischen Leseplätzen in öffentlichen Bibliotheken, Museen und Archiven -- (cc) Kopienversand auf Bestellung -- (dd) Zwischenergebnis -- (b) Öffentliche Verfügbarmachung nach französischem Recht -- (aa) Wiedergabe oder Vervielfältigung für Unterricht und Forschung -- (bb) Wiedergabe an Terminals in öffentlichen Bibliotheken, Museen und Archiven -- (cc) Zwischenergebnis -- (c) Zwischenergebnis -- (2) Open-Access-Zweitveröffentlichung ("Green Open Access") -- (a) Angebot -- (aa) Zweitveröffentlichungsrecht -- [1] Preprints -- [2] Postprints -- (bb) Gebrauch des Zweitveröffentlichungsrechts -- (b) Substituierbarkeit -- (c) Zwischenergebnis -- (3) Zweitverwertung -- (4) Zwischenergebnis -- dd) Preiselastizität -- ee) Zwischenergebnis -- b) Bewertung…”
Libro electrónico -
1988por Russinovich, Mark E.Tabla de Contenidos: “…Foreword -- Acknowledgments -- Introduction -- Concepts and Tools -- Windows Operating System Versions -- Foundation Concepts and Terms -- Windows API -- Services, Functions, and Routines -- Processes, Threads, and Jobs -- Virtual Memory -- Kernel Mode vs. User Mode -- Terminal Services and Multiple Sessions -- Objects and Handles -- Security -- Registry -- Unicode -- Digging into Windows Internals -- Reliability and Performance Monitor -- Kernel Debugging -- Windows Software Development Kit -- Windows Driver Kit -- Sysinternals Tools -- Conclusion -- System Architecture -- Requirements and Design Goals -- Operating System Model -- Architecture Overview -- Portability -- Symmetric Multiprocessing -- Scalability -- Differences Between Client and Server Versions -- Checked Build -- Key System Components -- Environment Subsystems and Subsystem DLLs -- Ntdll.dll -- Executive -- Kernel -- Hardware Abstraction Layer -- Device Drivers -- System Processes -- Conclusion -- System Mechanisms -- Trap Dispatching -- Interrupt Dispatching -- Exception Dispatching -- System Service Dispatching -- Object Manager -- Executive Objects -- Object Structure -- Synchronization -- High-IRQL Synchronization -- Low-IRQL Synchronization -- System Worker Threads -- Windows Global Flags -- Advanced Local Procedure Calls (ALPCs) -- Kernel Event Tracing -- Wow64 -- Wow64 Process Address Space Layout -- System Calls -- Exception Dispatching -- User Callbacks -- File System Redirection -- Registry Redirection and Reflection -- I/O Control Requests -- 16-Bit Installer Applications -- Printing -- Restrictions -- User-Mode Debugging -- Kernel Support -- Native Support -- Windows Subsystem Support -- Image Loader -- Early Process Initialization -- Loaded Module Database -- Import Parsing -- Post Import Process Initialization -- Hypervisor (Hyper-V) -- Partitions -- Root Partition…”
Publicado 2009
Libro electrónico -
1989Publicado 2018Tabla de Contenidos: “…Iterating over a range -- Iterating over a sequence -- Iterators and iterables -- Iterating over multiple sequences -- The while loop -- The break and continue statements -- A special else clause -- Putting all this together -- A prime generator -- Applying discounts -- A quick peek at the itertools module -- Infinite iterators -- Iterators terminating on the shortest input sequence -- Combinatoric generators -- Summary -- Chapter 4: Functions, the Building Blocks of Code -- Why use functions? …”
Libro electrónico -
1990Publicado 2018Tabla de Contenidos: “…Deploying a service to the flexible environment -- Pricing in the flexible environment -- App Engine resources and integrations -- Task queues -- Push and pull queues -- Push queues -- Named queues -- Pull queues -- Creating tasks -- Structuring tasks queues -- Scheduled tasks -- Deploying a cron definition -- Trying the App Engine cron service -- Scaling App Engine services -- Autoscaling -- Basic and manual scaling -- Externalizing configuration and managing secrets -- Application configuration files -- Compute Engine metadata server -- Runtime Configurator -- Cloud Key Management Service (KMS) -- General considerations -- Networking and security -- The App Engine firewall -- Cloud Endpoints -- Google Cloud IAP -- Virtual private networks -- Summary -- Chapter 5: Google Kubernetes Engine -- Google Kubernetes Engine -- When to choose GKE -- GKE or App Engine Flex -- Creating and maintaining a GKE cluster -- Node pools -- Multi-zonal and regional clusters -- Container Registry -- Deploying workloads to GKE -- Rolling updates -- Rolling back updates -- Scaling deployments -- Manually scaling deployments -- Automatically scaling deployments -- Exposing GKE Services -- Exposing services within a cluster -- Exposing services to external traffic -- Managing secrets with GKE -- Creating/Storing secrets -- Using secrets -- Billing -- Summary -- Chapter 6: Google Cloud Functions -- Functions as a Service -- Google Cloud Functions -- Advantages of Cloud Functions -- Price -- Scalability -- Developer velocity -- Considerations when using Cloud Functions -- Invoking Cloud Functions -- HTTP functions -- Processing HTTP requests -- Background functions -- Cloud Pub/Sub functions -- Cloud Storage functions -- Background function retries and termination -- Developing Cloud Functions -- Using the Cloud Console -- Local development -- Debugging functions…”
Libro electrónico -
1991Publicado 2017Tabla de Contenidos: “…. -- Visualizing memory usage in the Terminal -- See also -- Chapter 10: Building Microservice Systems -- Introduction…”
Libro electrónico -
1992Publicado 2017Tabla de Contenidos: “…Comparing the two versions -- The third example - the merge sort algorithm -- Shared classes -- The serial version -- The SerialMergeSort class -- The SerialMetaData class -- The concurrent version -- The MergeSortTask class -- The ConcurrentMergeSort class -- The ConcurrentMetaData class -- Comparing the two versions -- Other methods of the fork/join framework -- Summary -- Chapter 8: Processing Massive Datasets with Parallel Streams - The Map and Reduce Model -- An introduction to streams -- Basic characteristics of streams -- Sections of a stream -- Sources of a stream -- Intermediate operations -- Terminal operations -- MapReduce versus MapCollect -- The first example - a numerical summarization application -- The concurrent version -- The ConcurrentDataLoader class -- The ConcurrentStatistics class -- Customers from the United Kingdom -- Quantity from the United Kingdom -- Countries for product -- Quantity for product -- Multiple data filter -- Highest invoice amounts -- Products with a unit price between 1 and 10 -- The ConcurrentMain class -- The serial version -- Comparing the two versions -- The second example - an information retrieval search tool -- An introduction to the reduction operation -- The first approach - full document query -- The basicMapper() method -- The Token class -- The QueryResult class -- The second approach - reduced document query -- The limitedMapper() method -- The third approach - generating an HTML file with the results -- The ContentMapper class -- The fourth approach - preloading the inverted index -- The ConcurrentFileLoader class -- The fifth approach - using our own executor -- Getting data from the inverted index - the ConcurrentData class -- Getting the number of words in a file -- Getting the average tfxidf value in a file -- Getting the maximum and minimum tfxidf values in the index…”
Libro electrónico -
1993Publicado 2017Tabla de Contenidos: “…. -- Registering participants in Phaser -- Forcing the termination of Phaser -- See also -- Controlling phase change in concurrent-phased tasks -- Getting ready -- How to do it... -- How it works... -- See also -- Exchanging data between concurrent tasks -- Getting ready -- How to do it... -- How it works... -- There's more... -- Completing and linking tasks asynchronously -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also... -- Chapter 4: Thread Executors -- Introduction -- Creating a thread executor and controlling its rejected tasks -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Executing tasks in an executor that returns a result -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also…”
Libro electrónico -
1994Publicado 2024Tabla de Contenidos: “…Meters -- Gas Controls and Safety Features -- Gas Ignition Devices -- Purging and Testing -- Gas Appliances -- Balanced Flue Appliances -- Open Flue Appliances -- Flue Blocks -- Open Flue Terminals -- Stainless Steel Flue Lining -- Shared Flues -- Fan-Assisted Gas Flues -- Ventilation Requirements -- Combusted Gas Analysis -- Gas Laws -- Gas Consumption -- Gas Pipe and Flue Sizing -- Part Eleven-Electrical Supply and Installations -- Three-Phase Generation and Supply -- Electricity Distribution -- Electricity Intake to a Building -- Earthing Systems and Bonding -- Consumer Unit -- Power and Lighting Circuits -- Overload Protection -- Insulated Cable -- Testing Completed Installation -- Cable Rating -- Diversity -- Industrial Installations -- Electric Space Heating -- Controls for Electric Night Storage Space Heaters -- Construction Site Electricity -- Light Sources, Lamps and Luminaires -- Lighting Controls - Dwellings -- Extra-Low-Voltage Lighting -- Lighting Design -- Daylighting -- Telecommunications Installation -- Electric Vehicle Charger -- Part Twelve-Mechanical Conveyors - Lifts, Escalators and Travelators -- Planning Lift Installations -- Roping Systems for Electric Lifts -- Controls -- Lift Doors -- Lift Machine Room and Equipment -- Lift Safety Features -- Installation Details -- Typical Single Lift Dimensions -- Paternoster Lifts -- Oil-Hydraulic Lifts -- Lift Performance -- Estimating the Number of Lifts Required -- Firefighting Lifts -- Vertical Transportation for the Disabled -- Builders' and Electricians' Work -- Escalators -- Travelators -- Stair Lifts -- Ropeless Lifts -- Part Thirteen-Fire Prevention and Control Services -- Sprinklers -- Drenchers -- Hose Reel Installations -- Hydrants -- Foam Installations -- Gas Extinguishers -- Fire Alarms -- Smoke, Fire and Heat Detectors -- Fire Detection Electrical Circuits…”
Libro electrónico -
1995Publicado 2017Tabla de Contenidos: “…. -- There's more... -- Terminating rogue connections -- Getting ready -- How to do it... -- How it works... -- There's more... -- Reducing contention with concurrent indexes -- Getting ready -- How to do it... -- How it works... -- There's more... -- No transactions -- One at a time -- Danger with OLTP use -- See also -- Managing system migrations -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Managing software upgrades -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Mitigating the impact of hardware failure -- Getting ready -- How to do it... -- How it works... -- There's more... -- Copying WAL files more easily -- Adding compression -- Secondary delay -- See also -- Applying bonus kernel tweaks -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 3: Pooling Resources -- Introduction -- Determining connection costs and limits -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing PgBouncer -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Configuring PgBouncer safely -- Getting ready -- How to do it... -- How it works... -- There's more... -- What about pool_mode? …”
Libro electrónico -
1996Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Terminating iterations over ranges with iterator sentinels -- How to do it... -- Automatically checking iterator code with checked iterators -- How to do it... -- How it works... -- There's more... -- Building your own zip iterator adapter -- How to do it... -- There's more... -- Ranges library -- Chapter 4: Lambda Expressions -- Introduction -- Defining functions on the run using lambda expressions -- How to do it... -- How it works... -- Capture list -- mutable (optional) -- constexpr (optional) -- exception attr (optional) -- return type (optional) -- Adding polymorphy by wrapping lambdas into std::function -- How to do it... -- How it works... -- Composing functions by concatenation -- How to do it... -- How it works... -- Creating complex predicates with logical conjunction -- How to do it... -- There's more... -- Calling multiple functions with the same input -- How to do it... -- How it works... -- Implementing transform_if using std::accumulate and lambdas -- How to do it... -- How it works... -- Generating cartesian product pairs of any input at compile time -- How to do it... -- How it works... -- Chapter 5: STL Algorithm Basics -- Introduction -- Copying items from containers to other containers -- How to do it... -- How it works... -- Sorting containers -- How to do it... -- How it works... -- Removing specific items from containers -- How to do it... -- How it works... -- Transforming the contents of containers -- How to do it... -- How it works... -- Finding items in ordered and unordered vectors -- How to do it... -- How it works... -- Limiting the values of a vector to a specific numeric range with std::clamp -- How to do it... -- How it works…”
Libro electrónico -
1997Publicado 2016Tabla de Contenidos: “…Keys in Google Cloud Datastore -- Putting data into Google Cloud Datastore -- Reading data from Google Cloud Datastore -- Google App Engine users -- Embedding denormalized data -- Transactions in Google Cloud Datastore -- Using transactions to maintain counters -- Avoiding early abstraction -- Querying in Google Cloud Datastore -- Votes -- Indexing -- Embedding a different view of entities -- Casting a vote -- Accessing parents via datastore.Key -- Line of sight in code -- Exposing data operations over HTTP -- Optional features with type assertions -- Response helpers -- Parsing path parameters -- Exposing functionality via an HTTP API -- HTTP routing in Go -- Context in Google App Engine -- Decoding key strings -- Using query parameters -- Anonymous structs for request data -- Writing self-similar code -- Validation methods that return an error -- Mapping the router handlers -- Running apps with multiple modules -- Testing locally -- Using the admin console -- Automatically generated indexes -- Deploying apps with multiple modules -- Summary -- Chapter 10: Micro-services in Go with the Go kit Framework -- Introducing gRPC -- Protocol buffers -- Installing protocol buffers -- Protocol buffers language -- Generating Go code -- Building the service -- Starting with tests -- Constructors in Go -- Hashing and validating passwords with bcrypt -- Modeling method calls with requests and responses -- Endpoints in Go kit -- Making endpoints for service methods -- Different levels of error -- Wrapping endpoints into a Service implementation -- An HTTP server in Go kit -- A gRPC server in Go kit -- Translating from protocol buffer types to our types -- Creating a server command -- Using Go kit endpoints -- Running the HTTP server -- Running the gRPC server -- Preventing a main function from terminating immediately -- Consuming the service over HTTP…”
Libro electrónico -
1998Publicado 2023Tabla de Contenidos: “…Launching the VS Code terminal…”
Libro electrónico -
1999Publicado 2022Tabla de Contenidos: “…For instance, are you discussing reductions of programme expenditure or eve -- Finally, the European Union (EU) has terminated its African Peace Facility (APF) at the end of 2020. …”
Libro electrónico -
2000Publicado 2014Tabla de Contenidos: “…4.1 Evernote kann E-Mails verschicken -- 4.2 Notizen für andere zugänglich machen -- 4.3 Öffentliche Freigabe von Notizbüchern -- 4.3.1 Freigabe für jedermann -- 4.3.2 Private Freigabe -- 4.3.3 Berechtigungen vergeben -- 4.4 Evernote Business - für Unternehmen -- Kapitel 5: Erinnern und Erledigen -- 5.1 Zeitlose Erinnerungen -- 5.2 Terminierte Erinnerungen -- 5.3 Termine per Mail erhalten -- 5.4 Das Einstellungsmenü für Erinnerungen -- 5.5 Weitere Besonderheiten der Erinnerungsfunktionen -- 5.6 Spezielle Parameter für Suchvorgänge und Mailversand -- Kapitel 6: Suchen und Finden -- 6.1 Das Suchfeld und seine Nachbarn -- 6.2 Texterkennung bei Fotos und handschriftlichen Notizen -- 6.3 Gespeicherte Suchen - Ihr eigenes Sucharchiv -- 6.4 Die komplexe Suche -- 6.4.1 Aufbau einer Suche -- 6.4.2 Wichtige Suchparameter -- 6.4.3 ODER-Verknüpfung mit »any:« -- 6.4.4 Ausschlussverfahren: Die Minusfunktion -- 6.4.5 Such- und Filterbeispiele: Zeitspannen und Hochzeitsvorbereitungen -- 6.5 Wichtige Suchparameter -- Kapitel 7: Mobil und flexibel -- 7.1 Informationen jederzeit griffbereit -- 7.1.1 Zugang über den Webbrowser -- 7.1.2 Smartphones und Tablets - iPhone, Android & -- Co. -- 7.1.3 Besonderheiten der mobilen Anwendungen -- 7.1.4 Schon gewusst? …”
Libro electrónico