Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Malalts terminals 240
- Cura 112
- Operating systems (Computers) 112
- Mort 101
- Linux 70
- Engineering & Applied Sciences 61
- Computer networks 60
- Historia 53
- Computer Science 52
- Development 49
- Aspectes religiosos 48
- Enfermos terminales 48
- Cuidados paliativos 46
- Application software 45
- Computer programming 45
- Aspectes psicològics 44
- Terminal care 43
- Tractament pal·liatiu 41
- Management 39
- Security measures 37
- TFC 36
- Examinations 35
- Cloud computing 32
- Computer security 31
- Python (Computer program language) 31
- Programming 30
- Certification 29
- Església Catòlica 27
- Mac OS 27
- History 26
-
1961Publicado 2022Tabla de Contenidos: “…Cover -- About the Authors -- Title Page -- Copyright Page -- Acknowledgments -- About this Book -- Contents at a Glance -- Contents -- Foreword -- Preface -- Introduction -- Instructor Website -- Chapter 1 Introduction and Security Trends -- The Computer Security Problem -- Definition of Computer Security -- Historical Security Incidents -- The Current Threat Environment -- Infrastructure Attacks -- Ransomware -- Threats to Security -- Viruses and Worms -- Intruders -- Insiders -- Criminal Organizations -- Nation-States, Terrorists, and Information Warfare -- Brand-Name Attacks -- Attributes of Actors -- Internal/External -- Level of Sophistication -- Resources/Funding -- Intent/Motivation -- Security Trends -- Targets and Attacks -- Specific Target -- Opportunistic Target -- Minimizing Possible Avenues of Attack -- Approaches to Computer Security -- Cybersecurity Kill Chain -- Threat Intelligence -- Open Source Intelligence -- Ethics -- Additional References -- Chapter 1 Review -- Chapter 2 General Security Concepts -- Basic Security Terminology -- Security Basics -- Security Tenets -- Security Approaches -- Security Principles -- Formal Security Models -- Confidentiality Models -- Integrity Models -- Additional References -- Chapter 2 Review -- Chapter 3 Operational and Organizational Security -- Policies, Procedures, Standards, and Guidelines -- Organizational Policies -- Change Management Policy -- Change Control -- Asset Management -- Security Policies -- Data Policies -- Credential Policies -- Password and Account Policies -- Human Resources Policies -- Code of Ethics -- Job Rotation -- Separation of Duties -- Employee Hiring (Onboarding) and Promotions -- Retirement, Separation, or Termination (Offboarding) -- Exit Interviews -- Onboarding/Offboarding Business Partners -- Adverse Actions -- Mandatory Vacations -- Acceptable Use Policy…”
Libro electrónico -
1962por MarksTabla de Contenidos: “…A Advisors -- Marketing the M& -- A Practice -- Target Audience -- Networking -- Marketing and Advertising -- Pretransaction Consulting -- Valuation Services -- Other Consulting Services -- Becoming an Expert -- Client Acceptance -- Confidentiality -- Client Engagement -- Identification of the Parties -- Scope of Service -- Limitations and Disclosures -- Fees-Selling Advisor -- Example Fee Structures -- Termination and Tail -- Buy-Side Engagements -- Licensure Issues in the M& -- A Business* -- Chapter 7 Sell-Side Representation and Process -- Selling Process Overview -- Step 1: Preliminary Discussions with Seller -- What Is the Transaction? …”
Publicado 2022
Libro electrónico -
1963Publicado 2017Tabla de Contenidos: “…. -- See also -- SSL termination proxy -- Getting ready -- How to do it... -- See also -- Rate limiting -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 8: Load Balancing -- Introduction -- Basic balancing techniques -- Round robin load balancing -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Least connected load balancing -- Getting ready -- How to do it... -- How it works... -- Hash-based load balancing -- How to do it... -- How it works... -- There's more... -- See also -- Testing and debugging NGINX load balancing -- Getting ready -- How to do it... -- There's more... -- See also -- TCP / application load balancing -- How to do it... -- How it works... -- Easy testing -- There's more... -- See also -- NGINX as an SMTP load balancer -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 9: Advanced Features -- Introduction -- Authentication with NGINX -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- WebDAV with NGINX -- Getting ready -- How to do it... -- How it works... -- See also -- Bandwidth management with NGINX -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Connection limiting with NGINX -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
1964Publicado 2016Tabla de Contenidos: “…Linux and OSS in a Forensic Context -- Advantages of Linux and OSS in Forensics Labs -- Disadvantages of Linux and OSS in Forensics Labs -- Linux Kernel and Storage Devices -- Kernel Device Detection -- Storage Devices in /dev -- Other Special Devices -- Linux Kernel and Filesystems -- Kernel Filesystem Support -- Mounting Filesystems in Linux -- Accessing Filesystems with Forensic Tools -- Linux Distributions and Shells -- Linux Distributions -- The Shell -- Command Execution -- Piping and Redirection -- Closing Thoughts -- Chapter 3: Forensic Image Formats -- Raw Images -- Traditional dd -- Forensic dd Variants -- Data Recovery Tools -- Forensic Formats -- EnCase EWF -- FTK SMART -- AFF -- SquashFS as a Forensic Evidence Container -- SquashFS Background -- SquashFS Forensic Evidence Containers -- Closing Thoughts -- Chapter 4: Planning and Preparation -- Maintain an Audit Trail -- Task Management -- Shell History -- Terminal Recorders -- Linux Auditing -- Organize Collected Evidence and Command Output -- Naming Conventions for Files and Directories -- Scalable Examination Directory Structure -- Save Command Output with Redirection -- Assess Acquisition Infrastructure Logistics -- Image Sizes and Disk Space Requirements -- File Compression -- Sparse Files -- Reported File and Image Sizes -- Moving and Copying Forensic Images -- Estimate Task Completion Times -- Performance and Bottlenecks -- Heat and Environmental Factors -- Establish Forensic Write-Blocking Protection -- Hardware Write Blockers -- Software Write Blockers -- Linux Forensic Boot CDs -- Media with Physical Read-Only Modes -- Closing Thoughts -- Chapter 5: Attaching Subject Media to an Acquisition Host -- Examine Subject PC Hardware -- Physical PC Examination and Disk Removal -- Subject PC Hardware Review -- Attach Subject Disk to an Acquisition Host -- View Acquisition Host Hardware…”
Libro electrónico -
1965Publicado 2017Tabla de Contenidos: “…Providing a RESTful API interface for PostgreSQL -- A PostgreSQL full text search -- The tsquery and tsvector data types -- The tsvector data type -- The tsquery data type -- Pattern matching -- Full text search indexing -- Summary -- Chapter 10: Transactions and Concurrency Control -- Transactions -- Transaction and ACID properties -- Transaction and concurrency -- MVCC in PostgreSQL -- Transaction isolation levels -- Explicit locking -- Table-level locks -- Table locking modes -- Row-level locks -- Row-level lock modes -- Deadlocks -- Advisory locks -- Summary -- Chapter 11: PostgreSQL Security -- Authentication in PostgreSQL -- PostgreSQL pg_hba.conf -- Listen addresses -- Authentication best practices -- PostgreSQL default access privileges -- Role system and proxy authentication -- PostgreSQL security levels -- Database security level -- Schema security level -- Table-level security -- Column-level security -- Row-level security -- Encrypting data -- PostgreSQL role password encryption -- pgcrypto -- One-way encryption -- Two-way encryption -- Summary -- Chapter 12: The PostgreSQL Catalog -- The system catalog -- System catalog for administrators -- Getting the database cluster and client tools version -- Terminating and canceling user sessions -- Defining and getting database cluster settings -- Getting the database and database object size -- Cleaning up the database -- Cleaning up the database data -- Tuning for performance -- Selective dump -- Summary -- Chapter 13: Optimizing Database Performance -- PostgreSQL configuration tuning -- Maximum number of connections -- Memory settings -- Hard disk settings -- Planner-related settings -- Bench marking is your friend -- Tuning performance for write -- Tuning performance for read -- Explain command and execution plan -- Detecting problems in query plans -- Common mistakes in writing queries…”
Libro electrónico -
1966Publicado 2023Tabla de Contenidos: “…General Data Protection Regulation -- EU-US Safe Harbor -- US Privacy Act of 1974 -- International Cooperation -- Import/Export Restrictions -- Trans-border Data Flow -- Important Laws and Regulations -- US Computer Fraud and Abuse Act -- HIPAA -- United States Breach Notification Laws -- Ethics -- The (ISC)2 Code of Ethics -- The (ISC)2 Code of Ethics Canons in Detail -- Computer Ethics Institute -- IABs Ethics and the Internet -- Information Security Governance -- Security Policy and Related Documents -- Policy -- Components of Program Policy -- Policy Types -- Procedures -- Standards -- Guidelines -- Baselines -- Personnel Security -- Candidate Screening and Hiring -- Onboarding -- Employee Termination -- Security Awareness and Training -- Gamification -- Security Champions -- Access Control Defensive Categories and Types -- Preventive -- Detective -- Corrective -- Recovery -- Deterrent -- Compensating -- Comparing Access Controls -- Risk Analysis -- Assets -- Threats and Vulnerabilities -- Risk=Threat x Vulnerability -- Impact -- Risk Analysis Matrix -- Calculating Annualized Loss Expectancy -- Asset Value -- Exposure Factor -- Single Loss Expectancy -- Annual Rate of Occurrence -- Annualized Loss Expectancy -- Total Cost of Ownership -- Return on Investment -- Budget and Metrics -- Risk Response -- Accept the Risk -- Risk Acceptance Criteria -- Mitigate the Risk -- Transfer the Risk -- Risk Avoidance -- Quantitative and Qualitative Risk Analysis -- The Risk Management Process -- Risk Maturity Modeling -- Security and Third Parties -- Service Provider Contractual Security -- Minimum Security Requirements -- Service Level Agreements and Service Level Requirements -- Attestation -- Right to Penetration Test/Right to Audit -- Supply Chain Risk Management -- Risks Associated With Hardware, Software, and Services -- Vendor Governance -- Acquisitions…”
Libro electrónico -
1967Publicado 2022Tabla de Contenidos: “…Understand, Adhere to, and Promote Professional Ethics -- (ISC)2 Code of Professional Ethics -- Organizational code of ethics -- Understand and Apply Security Concepts -- Confidentiality -- Integrity -- Availability -- Authenticity -- Nonrepudiation -- Evaluate and Apply Security Governance Principles -- Alignment of security function to business strategy, goals, mission, and objectives -- Organizational processes -- Organizational roles and responsibilities -- Security control frameworks -- Due care and due diligence -- Determine Compliance and Other Requirements -- Contractual, legal, industry standards, and regulatory requirements -- Privacy requirements -- Understand Legal and Regulatory Issues That Pertain to Information Security -- Cybercrimes and data breaches -- Licensing and intellectual property requirements -- Import/export controls -- Transborder data flow -- Privacy -- Understand Requirements for Investigation Types -- Develop, Document, and Implement Security Policies, Standards, Procedures, and Guidelines -- Policies -- Standards (and baselines) -- Procedures -- Guidelines -- Identify, Analyze, and Prioritize Business Continuity (BC) Requirements -- Business impact analysis -- Develop and document the scope and the plan -- Contribute to and Enforce Personnel Security Policies and Procedures -- Candidate screening and hiring -- Employment agreements and policies -- Onboarding, transfers, and termination processes -- Vendor, consultant, and contractor agreements and controls -- Compliance policy requirements -- Privacy policy requirements -- Understand and Apply Risk Management Concepts -- Identify threats and vulnerabilities -- Risk assessment/analysis -- Risk appetite and risk tolerance -- Risk treatment -- Countermeasure selection and implementation -- Applicable types of controls -- Control assessments (security and privacy)…”
Libro electrónico -
1968Publicado 2018Tabla de Contenidos: “…-- Loading -- Linking -- Initialization -- Instantiation -- Execution -- Garbage collection -- Application termination -- JVM architecture -- Runtime data areas -- Classloader -- Execution engine -- Threads -- Extending the Thread class -- What is daemon? …”
Libro electrónico -
1969Publicado 2018Tabla de Contenidos: “…Node.js installation -- Installation steps -- Node.js tutorial in VS Code -- Running Hello Readers -- Integrated Terminal -- Postman -- Installation -- Installing on macOS -- Installing on Windows -- Linux installation -- Updating Postman - native app (macOS, Windows, and Linux) -- Postman Echo -- Sending the first request using Postman -- How does this work in Postman? …”
Libro electrónico -
1970Publicado 2017Tabla de Contenidos: “…Getting information -- Comparing containers -- Changing Items -- Finding Items -- Sorting items -- Using the numeric libraries -- Compile time arithmetic -- Complex numbers -- Using the Standard Library -- Summary -- Chapter 9: Using Strings -- Using the string class as a container -- Getting information about a string -- Altering strings -- Searching strings -- Internationalization -- Using facets -- Strings and numbers -- Converting strings to numbers -- Converting numbers to strings -- Using stream classes -- Outputting floating point numbers -- Outputting integers -- Outputting time and money -- Converting numbers to strings using streams -- Reading numbers from strings using streams -- Using regular expressions -- Defining regular expressions -- Standard Library classes -- Matching expressions -- Using iterators -- Replacing strings -- Using strings -- Creating the project -- Processing header subitems -- Summary -- Chapter 10: Diagnostics and Debugging -- Preparing your code -- Invariants and conditions -- Conditional compilation -- Using pragmas -- Adding informational messages -- Compiler switches for debugging -- Pre-processor symbols -- Producing diagnostic messages -- Trace messages with the C runtime -- Tracing messages with Windows -- Using asserts -- Application termination -- Error values -- Obtaining message descriptions -- Using the Message Compiler -- C++ exceptions -- Exception specifications -- C++ exception syntax -- Standard exception classes -- Catching exceptions by type -- Function try blocks -- System errors -- Nested exceptions -- Structured Exception Handling -- Compiler exception switches -- Mixing C++ and SEH exception handling -- Writing exception-safe classes -- Summary -- Index…”
Libro electrónico -
1971Publicado 2021Tabla de Contenidos: “…Looping -- The for loop -- Iterating over a range -- Iterating over a sequence -- Iterators and iterables -- Iterating over multiple sequences -- The while loop -- The break and continue statements -- A special else clause -- Assignment expressions -- Statements and expressions -- Using the walrus operator -- A word of warning -- Putting all this together -- A prime generator -- Applying discounts -- A quick peek at the itertools module -- Infinite iterators -- Iterators terminating on the shortest input sequence -- Combinatoric generators -- Summary -- Chapter 4: Functions, the Building Blocks of Code -- Why use functions? …”
Libro electrónico -
1972por Leblanc, RichardTabla de Contenidos: “…Risk Management: A New Challenge -- Areas of Concern -- Synthesis -- Key Takeaways -- About the Authors -- Selected References -- Chapter 10 A Critique of the Investment Fund Governance Regime in Canada -- Introduction -- Investment Funds -- Types of Investment Fund -- Relationship with the Fund Manager -- How Funds Are Constituted -- The Problem -- Addressing the Problem -- Fund Governance in the United States -- Termination of the Management Agreement -- Approval of the Management Agreement -- Management of Conflicts of Interest -- Oversight of the Compliance Function -- Other Responsibilities -- The Fund Governance Regime in Canada -- Comparison with the United States -- Standard of Care -- Mandate -- Scope of Authority -- Membership -- Impact of the IRC -- Limitations of the IRC -- In Sum -- About the Author -- Notes -- Chapter 11 Third Stage Corporate Governance: Investors and Companies Divided by a Common Language -- About the Authors -- Notes -- Part III Technology Governance -- Chapter 12 Technology and the Corporate Board: Critical Considerations Going Forward -- Introduction -- History -- Exponential Thinking -- Emerging Technologies -- Artificial Intelligence -- Blockchain -- Cloud/Edge -- Telecommunications 5G/6G -- IoT and the Metaverse -- Quantum Computing -- Cybercrime -- Other Technologies -- Business Models and Disruptive Technology -- Conclusion -- References -- About the Author -- Chapter 13 Questions the Board Should Ask About Artificial Intelligence -- 1. …”
Publicado 2024
Libro electrónico -
1973Publicado 2001Tabla de Contenidos: “…The Linear Address Fields -- Page Table Handling -- Physical Memory Layout -- Process Page Tables -- Kernel Page Tables -- Provisional kernel Page Tables -- Final kernel Page Table when RAM size is less than 896 MB -- Final kernel Page Table when RAM size is between 896 MB and 4096 MB -- Final kernel Page Table when RAM size is more than 4096 MB -- Fix-Mapped Linear Addresses -- Handling the Hardware Cache and the TLB -- Handling the hardware cache -- Handling the TLB -- Processes -- Processes, Lightweight Processes, and Threads -- Process Descriptor -- Process State -- Identifying a Process -- Process descriptors handling -- Identifying the current process -- Doubly linked lists -- The process list -- The lists of TASK_RUNNING processes -- Relationships Among Processes -- The pidhash table and chained lists -- How Processes Are Organized -- Wait queues -- Handling wait queues -- Process Resource Limits -- Process Switch -- Hardware Context -- Task State Segment -- The thread field -- Performing the Process Switch -- The switch_to macro -- The _ _switch_to ( ) function -- Saving and Loading the FPU, MMX, and XMM Registers -- Saving the FPU registers -- Loading the FPU registers -- Using the FPU, MMX, and SSE/SSE2 units in Kernel Mode -- Creating Processes -- The clone( ), fork( ), and vfork( ) System Calls -- The do_fork( ) function -- The copy_process( ) function -- Kernel Threads -- Creating a kernel thread -- Process 0 -- Process 1 -- Other kernel threads -- Destroying Processes -- Process Termination -- The do_group_exit( ) function -- The do_exit( ) function -- Process Removal -- Interrupts and Exceptions -- The Role of Interrupt Signals -- Interrupts and Exceptions -- IRQs and Interrupts -- The Advanced Programmable Interrupt Controller (APIC) -- Exceptions -- Interrupt Descriptor Table…”
Libro electrónico -
1974Publicado 2017Tabla de Contenidos: “…The basic working -- Authentication with the help of an asymmetric key -- Digital signatures -- The benefits and use cases of a digital signature -- SSL/TLS -- Scenario 1 - A man-in-the-middle attack-storing credentials -- Scenario 2 - A man-in-the-middle attack-integrity attacks -- Working of SSL/TLS -- Client Hello -- Server Hello -- Certificate -- Server key exchange -- Server Hello done -- Client key exchange -- Change cipher spec -- Security related to SSL/TLS -- Grading TLS configuration with SSL Labs -- Default Settings -- Perfect forward secrecy -- Implementation of perfect forward secrecy in nginx -- HTTP Strict Transport Security -- Implementing HSTS in nginx -- Verifying the integrity of a certificate -- Online certificate status protocol -- OCSP stapling -- Challenge 1 -- Challenge 2 -- An ideal solution -- Architecture -- Implementing TLS termination at the ELB level -- Selecting cipher suites -- Importing certificate -- AWS certificate manager -- Use case 1 -- Use case 2 -- Introduction to AWS Certificate Manager -- Summary -- Chapter 6: Automation in Security -- Configuration management -- Ansible -- Remote command execution -- The structure of the Ansible playbook -- Playbook for SSH hardening -- Running Ansible in dry mode -- Run and rerun and rerun -- Ansible mode of operations -- Ansible pull -- Attaining the desired state with Ansible pull -- Auditing servers with Ansible notifications -- The Ansible Vault -- Deploying the nginx Web Server -- Solution -- Ansible best practices -- Terraform -- Infrastructure migration -- Installing Terraform -- Working with Terraform -- Integrating Terraform with Ansible -- Terraform best practices -- AWS Lambda -- Cost optimization -- Achieving a use case through AWS Lambda -- Testing the Lambda function -- Start EC2 function -- Integrating the Lambda function with events -- Summary…”
Libro electrónico -
1975Publicado 2012Tabla de Contenidos: “…Intro -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I: Enterprise Security -- 1 Cryptographic Tools -- Determine Appropriate Tools and Techniques -- Advanced PKI Concepts -- Hashing -- Cryptographic Applications -- Digital Signatures -- Code Signing -- Nonrepudiation -- Transport Encryption -- Implications of Cryptographic Methods and Design -- Entropy -- Pseudorandom Number Generation -- Perfect Forward Secrecy -- Confusion -- Diffusion -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 2 Computing Platforms -- Advantages and Disadvantages of Virtualizing Servers and Minimizing Physical Space Requirements -- VLAN -- Securing Virtual Environments, Appliances, and Equipment -- Vulnerabilities Associated with a Single Physical Server Hosting Multiple Companies' Virtual Machines -- Vulnerabilities Associated with a Single Platform Hosting Multiple Companies' Virtual Machines -- Secure Use of On-demand/Elastic Cloud Computing -- Vulnerabilities Associated with Co-mingling of Hosts with Different Security Requirements -- Virtual Desktop Infrastructure (VDI) -- Terminal Services -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 3 Enterprise Storage -- Explain the Security Implications of Enterprise Storage -- Virtual Storage -- NAS-Network Attached Storage -- SAN-Storage Area Network -- VSAN -- iSCSI -- FCOE -- LUN Masking -- HBA Allocation -- Redundancy (Location) -- Secure Storage Management -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 4 Infrastructure -- Advanced Network Design -- Complex Network Security Solutions for Data Flow -- Secure Data Flows to Meet Changing Business Needs -- Secure DNS -- Secure Directory Services -- Network Design Consideration…”
Libro electrónico -
1976Publicado 2007Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Preface -- About the Authors -- Acknowledgments -- PART ONE: Introduction to Solaris Internals -- Chapter 1 Introduction -- 1.1 Key Features of Solaris 10, Solaris 9, and Solaris 8 -- 1.2 Key Differentiators -- 1.3 Kernel Overview -- 1.4 Processes, Threads, and Scheduling -- 1.5 Interprocess Communication -- 1.6 Signals -- 1.7 Memory Management -- 1.8 Files and File Systems -- 1.9 Resource Management -- PART TWO: The Process Model -- Chapter 2 The Solaris Process Model -- 2.1 Components of a Process -- 2.2 Process Model Evolution -- 2.3 Executable Objects -- 2.4 Process Structures -- 2.5 Kernel Process Table -- 2.6 Process Resource Attributes -- 2.7 Process Creation -- 2.8 System Calls -- 2.9 Process Termination -- 2.10 The Process File System -- 2.11 Signals -- 2.12 Sessions and Process Groups -- 2.13 MDB Reference -- Chapter 3 Scheduling Classes and the Dispatcher -- 3.1 Fundamentals -- 3.2 Processor Abstractions -- 3.3 Dispatcher Queues, Structures, and Variables -- 3.4 Dispatcher Locks -- 3.5 Dispatcher Initialization -- 3.6 Scheduling Classes -- 3.7 Thread Priorities -- 3.8 Dispatcher Functions -- 3.9 Preemption -- 3.10 The Kernel Sleep/Wakeup Facility -- 3.11 Interrupts -- 3.12 Summary -- 3.13 MDB Reference -- Chapter 4 Interprocess Communication -- 4.1 The System V IPC Framework -- 4.2 System V IPC Resource Controls -- 4.3 Configuring IPC Tuneables on Solaris 10 -- 4.4 System V Shared Memory -- 4.5 System V Semaphores -- 4.6 System V Message Queues -- 4.7 POSIX IPC -- 4.8 Solaris Doors -- 4.9 MDB Reference -- Chapter 5 Process Rights Management -- 5.1 Then and Now -- 5.2 Least Privilege in Solaris -- 5.3 Process Privilege Models -- 5.4 Privilege Awareness: The Details -- 5.5 Least Privilege Interfaces -- PART THREE: Resource Management -- Chapter 6 Zones -- 6.1 Introduction -- 6.2 Zone Runtime…”
Libro electrónico -
1977Publicado 2023Tabla de Contenidos: “…Chapter 13: Industrial Network and Communication Protocols Fundamentals -- Understanding industrial networks -- Understanding network topology -- Network media - wired and wireless (Bluetooth, Wi-Fi, and cellular communication - 1G, 2G, 3G, 4G, and 5G) -- Network connectors and other network components -- Understanding network protocols -- Wired network protocols -- Wireless network protocols -- Common industrial network protocol - Foundation Fieldbus -- Common industrial network protocol - PROFIBUS -- Common industrial network protocol - Modbus -- Modbus Remote Terminal Unit (RTU) -- Modbus Transmission Control Protocol/Internet Protocol (TCP/IP) -- Common industrial network protocol - HART -- Common industrial network protocol - PROFINET -- Summary -- Questions -- Chapter 14: Exploring Smart Factory (Industry 4.0) with 5G -- Understanding Industry 4.0 -- Exploring the key technologies in Industry 4.0 -- The benefits of Industry 4.0 -- Basic steps for building a smart factory -- The benefits of a 5G-enabled smart factory -- Connecting your PLC or machine data to the cloud -- Summary -- Questions -- Assessments -- Index -- Other Books You May Enjoy…”
Libro electrónico -
1978Publicado 2024Tabla de Contenidos: “…. -- Mimicking keys, menu items, and terminal output -- How to do it... -- How it works... -- There's more... -- Arranging topics like a puzzle -- How to do it... -- How it works... -- Building a word cloud -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 8: Producing Contents, Indexes, and Bibliographies -- Tuning tables of contents and lists of figures and tables -- How to do it... -- How it works... -- There's more... -- Creating a bibliography -- How to do it... -- How it works... -- There's more…”
Libro electrónico -
1979Publicado 2023Tabla de Contenidos: “…-- 3.3 Research Systems Constraints -- 3.4 Systems Value Modeling for Research -- 3.5 Research Management by Project -- 3.6 Research for the Grand Challenges of Engineering -- 3.7 Defining a Project Systems Structure for Research -- 3.8 Research Problem Identification -- 3.9 Research Project Definition -- 3.10 Research Project Planning -- 3.11 Research Project Organizing -- 3.12 Research Resource Allocation -- 3.13 Research Activity Scheduling -- 3.14 Research Tracking and Reporting -- 3.15 Research Control -- 3.16 Research Project Termination -- 3.17 Systems Hierarchy for Research -- References -- Chapter 4 General Project Management Process -- 4.1 What Is Project Management? …”
Libro electrónico -
1980por Diamond, StephanieTabla de Contenidos: “…Introducing AI-generated art -- Observing data visualization -- Looking at image enhancement -- Generating Audio and Voice -- Using voice assistants -- Generating music -- Turning text into speech -- Creating and Editing Videos -- Summarizing videos -- Adding special effects -- Using auto-editing tools -- Choosing the Right Output Type for Your Project -- Matching output to objectives -- Considering cost, complexity, and sophistication -- Chapter 3 Navigating the Leading Platforms -- Setting Up Accounts and Managing Usage -- Step 1: Choosing a platform -- Step 2: Creating an account -- Step 3: Choosing the best plan -- Step 4: Setting preferences -- Step 5: Customizing your experience -- Understanding the Terms of Service -- Understanding the data usage policy -- Looking at API limitations -- Taking care of content ownership -- Dealing with service availability -- Reading termination clauses -- Reviewing payment and refund policies -- Looking at the governing laws -- Updating terms -- Managing Data Privacy Concerns -- Adding AI to Your Current Tools and Workflow -- Looking at Some Real-World Examples of AI Tools -- Getting into Workflow Automation -- Discovering Cost-Saving Tips and Free Tools -- Reviewing pay-as-you-go and token systems -- Viewing community-supported and open-source options -- Choosing special deals and price cuts -- Reviewing pick-and-choose packages -- Paying attention to differing levels of pricing -- Considering free trials and freemium models -- Watching out for hidden costs -- Looking at Real-World Implementations -- Part 2 Mastering the Art of Prompting -- Chapter 4 Creating and Writing Successful AI Prompts -- Discovering the Importance of Prompts -- Maximizing the Benefits of Your AI Prompts -- Boosting productivity -- Enhancing creativity -- Improving collaboration -- Mitigating risk -- Fostering career advancement…”
Publicado 2024
Libro electrónico