Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Physics 10
- Cosmology 8
- Cosmología 8
- Astrophysics 7
- black holes 6
- History 5
- Research & information: general 5
- Electrical & Computer Engineering 4
- Engineering & Applied Sciences 4
- Enginyeria acústica 4
- Internet marketing 4
- Telecommunications 4
- active galactic nuclei 4
- Astronomy 3
- Computer networks 3
- Dark Matter 3
- Economic conditions 3
- Forats negres (Astronomia) 3
- Gravitation 3
- Mathematical physics 3
- Science 3
- Social conditions 3
- cosmology 3
- galaxies: active 3
- jets 3
- Acústica 2
- Application software 2
- Black holes (Astronomy) 2
- Business 2
- Cisco IOS 2
-
61por Deal, Richard A.“…Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. …”
Publicado 2005
Libro electrónico -
62Publicado 2014Tabla de Contenidos: “…Size Matters: Quantify Your ImpactPart-Time Jobs and Internships; Extracurriculars; Volunteering; Start Something; Questions and Answers; Well, There Go the College Hires; Will Code for Food; The Un-manager; Chapter 3: Getting in the Door; The Black Hole: Online Job Submission; Making the Best of the Black Hole; Getting a Personal Referral; The Informational Interview; Reach Out to Recruiters; Alumni Network and Beyond; Career Fairs; Professional Recruiters; When Things Get Ugly: What to Watch Out For; Additional Avenues; Start Elsewhere; Contract Roles; Get Creative; Official Groups…”
Libro electrónico -
63Publicado 2014Tabla de Contenidos: “…The Voice of the Rising Generation: Family Wealth and Wisdom; Contents; Preface; Acknowledgments; Introduction; A Well-Known Family; The Challenge; The Journey; Our Approach; Aids to Navigation; Chapter 1: Setting Sail; The Black Hole; Talking about Silence; The Very Good Steward; The Meteor; Froggy; The Parallel Universe; The Anxious Heir; Mr. …”
Libro electrónico -
64Publicado 2004“…The book concludes with a discussion of black hole solutions of the supergravity theory that approximates string theory at low energies and the insight that string theory affords into the microscopic origin of the Bekenstein-Hawking entropy.Cosmology in Gauge Field Theory and String Theory provides a modern introduction to these important problems from a particle physicist's perspective. …”
Libro electrónico -
65Publicado 2018Tabla de Contenidos: “…MPLS VPN -- VPN Design -- IKE V1 versus IKE V2 -- WAN Encryption technique -- IPsec Layer-3 encryption -- MACsec-Layer-2 Encryption -- Optical Network-Layer-1 Encryption -- Summary -- Questions -- Further Reading -- Chapter 12: Summary and Scope of Security Technologies -- DDoS protection -- Remotely triggered black hole routing (RTBH) -- Black hole traffic from the source of the attack -- Black hole traffic to the destination of the attack -- BGP FlowSpec -- DDoS scrubbing -- Blockchain Technology for Fighting DDoS Attacks -- AI in cyber security -- Next Gen SIEM -- Software Defined Networking Firewall -- Bring-Your-Own-Identity (BYOI) -- Summary -- Further reading -- Assessment -- Other Books you may enjoy -- Index…”
Libro electrónico -
66Publicado 2014Tabla de Contenidos: “…Front Cover; Contents; Preface; Contributors; Chapter 1: Taxonomy and Holistic Detection of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks; Chapter 3: Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks; Chapter 4: Fighting against Black Hole Attacks in Mobile Ad Hoc Networks; Chapter 5: Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks; Chapter 6: Detection of Misbehaving Nodes in Vehicular Ad Hoc Network…”
Libro electrónico -
67por Doglio, Fernando. author“…Pro REST API Development with Node.js shines light into that black hole of modules for the developers trying to create an API. …”
Publicado 2018
Libro electrónico -
68Publicado 2023Tabla de Contenidos: “…Adding a Collapsing Glowing Color -- Summary -- Chapter 6: Distortion Shaders -- Ice Texture Refraction -- Initial Setup -- Modify the Scene Color to Create Distortion -- Use an Ice Texture to Modify the Scene Color -- Customize the Shader with the Ice Texture and Color -- Black Hole Distortion -- Creation of the Center of the Black Hole -- Using Particle Systems for a Billboard Effect -- Creating a Spiral Texture Using the Twirl Node -- Modifying the Scene Color Using the Spiral Texture -- Masking the Spiral Texture -- Adding Dynamic Rotation to the Spiral Texture -- Summary -- Chapter 7: Advanced Shaders -- Cartoon Water Shader -- Initial Setup -- Accessing the Depth Buffer to Create Foam with the Scene Depth Node -- Scene Depth Node -- Implementing the Depth Information in the Shader -- Controlling the Depth Gradient with Divide Node -- Create Water Caustics -- Using the Voronoi Noise Node -- Using SubGraph to Reuse Groups of Nodes -- Add Radial Deformation Using Radial Shear -- Adding Movement to the Voronoi Cells -- Adding Extra Caustic Layers -- Adding Color to the Water Caustics Texture -- Deforming the Vertices of the Water Surface -- Iridescent Bubble Shader -- Initial Setup -- Create and Set Up Reflections -- Reflection Probes and Reflection Cubemaps -- Creating an Iridescent Dynamic Pattern -- Adding Thin-Film Interference Gradient -- Adding Rim Transparency and Color -- Adding Random Vertex Displacement -- Summary -- Chapter 8: Interactive Snow Effect -- Scene Setup -- Give Movement to the Character -- Set Up Your IDE -- Create a Character Movement Script -- Snow Plane 3D Object -- Subdivided Plane Creation -- Import the Plane to Unity -- Interactive Snow Shader Graph -- Shader Graph Setup -- Apply Displacement Using Noise -- Apply Snow Color and Occlusion -- Interact with the Snow -- Using a Render Texture -- Painting the Character Path…”
Libro electrónico -
69Publicado 2011Tabla de Contenidos: “…Phenomena Discovered from General RelativityBending of Light (Gravitational Lensing) Near a Large Mass (Such as the Sun); Anomalous Perihelion Precession of Mercury; Black Holes; Global Positioning System and Relativity; Epilogue; Index…”
Libro electrónico -
70por Fine, BenTabla de Contenidos: “…The BBI Syndrome -- 4.1 Introduction -- 4.2 Social Capital as Black Hole -- 4.3 BBI Gender on the Dark Side -- 4.4 Social Capital in Context - Or Vice Versa -- 4.5 BBBI by Way of Concluding Remarks -- 5. …”
Publicado 2010
Libro electrónico -
71por Alberro, HeatherTabla de Contenidos: “…Cover -- Endorsements Page -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Editor Bios -- Contributor Bios -- Introduction: Entangled Futurities -- Part 1 Monsters and Monstrosity -- 1 "In the Woods the Tox is Still Wild": The EcoGothic in Rory Power's Wilder Girls -- 2 The Human/Un(human): Monster, Ecophobia, and the Posthuman Horror(scape) in Dibakar Banerjee's "Monster," Ghost Stories -- 3 A Scourge Even Worse Than Disease: Richard Matheson's I Am Legend as Pandemic Political Allegory -- Part 2 Intersectional Critique -- 4 Fungal Imaginaries: The Reconfiguration of Post-Pandemic Society in Severance and The Last of Us -- 5 Five Hundred Years of Plague: Indigenous Apocalypse in Joca Reiners Terron's Death and the Meteor -- 6 Corruption and Cleansing: An Eco-Feminist Approach to the Nature/Culture Dichotomy in Naomi Novik's Uprooted -- 7 Through Currents of Contamination: The Failure of Immunizing Insularity in Sophie Mackintosh's The Water Cure -- Part 3 More-Than-Human Mutual Aid and Eco-Justice -- 8 Dystopian Prohibitions and Utopian Possibilities in Edmonton, Canada, at the Onset of the COVID-19 Pandemic -- 9 Affiliation as Environmental Justice in Three Climate Novels -- 10 "A vortex of Summons and Repulsion": The Productive Abject, Posthumanisms, and the Weird in Charles Burns' Black Hole -- 11 (Un)Caring Borders: More-Than-Human Solidarities in the Bialowieza Forest -- Part 4 Creative Resistance and Utopian Glimmers -- 12 "Preservation is an Action, not a State": DIY Utopian Enclaves and Ways out of Post-Pandemic Surveillance Capitalism in Sarah Pinsker's A Song for a New Day -- 13 Pandemic Dramaturgy: Co-Designing the Performance Dying Together/Futures with COVID-19 -- 14 Vitality of Nonhuman Entities: Plagues and Pandemics as Hyperobjects in Defoe, Camus, and Pamuk…”
Publicado 2024
Libro electrónico -
72Publicado 2007Tabla de Contenidos: “…Physics -- Gravitational Wave Signals from Simulations of Black Hole Dynamics -- The SuperN-Project: Understanding Core Collapse Supernovae -- MHD Code Optimizations and Jets in Dense Gaseous Halos -- Anomalous Water Optical Absorption: Large-Scale First-Principles Simulations -- The Electronic Structures of Nanosystems: Calculating the Ground States of Sodium Nanoclusters and the Actuation of Carbon Nanotubes -- Object-Oriented SPH-Simulations with Surface Tension -- Simulations of Particle Suspensions at the Institute for Computational Physics -- Solid State Physics -- Nano-Systems in External Fields and Reduced Geometry: Numerical Investigations -- Signal Transport and Finite Bias Conductance in and Through Correlated Nanostructures -- Atomistic Simulations of Dislocation — Crack Interaction -- Monte Carlo Simulations of Strongly Correlated and Frustrated Quantum Systems -- Chemistry -- Characterization of Catalyst Surfaces by STM Image Calculations -- Theoretical Investigation of the Self-Diffusion on Au(100) -- TrpAQP: Computer Simulations to Determine the Selectivity of Aquaporins -- Computational Fluid Dynamics -- Direct Numerical Simulation and Analysis of the Flow Field Around a Swept Laminar Separation Bubble -- Direct Numerical Simulation of Primary Breakup Phenomena in Liquid Sheets -- Direct Numerical Simulation of Mixing and Chemical Reactions in a Round Jet into a Crossflow — a Benchmark -- Numerical Simulation of the Bursting of a Laminar Separation Bubble -- Parallel Large Eddy Simulation with UG -- LES and DNS of Melt Flow and Heat Transfer in Czochralski Crystal Growth -- Efficient Implementation of Nonlinear Deconvolution Methods for Implicit Large-Eddy Simulation -- Large-Eddy Simulation of Tundish Flow -- Large Eddy Simulation of Open-Channel Flow Over Spheres -- Prediction of the Resonance Characteristics of Combustion Chambers on the Basis of Large-Eddy Simulation -- Investigations of Flow and Species Transport in Packed Beds by Lattice Boltzmann Simulations -- Rheological Properties of Binary and Ternary Amphiphilic Fluid Mixtures -- The Effects of Vortex Generator Arrays on Heat Transfer and Flow Field -- Investigation of the Influence of the Inlet Geometry on the Flow in a Swirl Burner -- Numerical Investigation and Simulation of Transition Effects in Hypersonic Intake Flows -- Aeroelastic Simulations of Isolated Rotors Using Weak Fluid-Structure Coupling -- Computational Study of the Aeroelastic Equilibrium Configuration of a Swept Wind Tunnel Wing Model in Subsonic Flow -- Structural Mechanics -- Numerical Prediction of the Residual Stress State after Shot Peening -- Computer-Aided Destruction of Complex Structures by Blasting -- Wave Propagation in Automotive Structures Induced by Impact Events -- Miscellaneous Topics -- Continental Growth and Thermal Convection in the Earth’s Mantle -- Efficient Satellite Based Geopotential Recovery -- Molecular Modeling of Hydrogen Bonding Fluids: Monomethylamine, Dimethylamine, and Water Revised -- The Application of a Black-Box Solver with Error Estimate to Different Systems of PDEs -- Scalable Parallel Suffix Array Construction…”
Libro electrónico -
73Publicado 2013Tabla de Contenidos: “…SOCIO-ENVIRONMENTAL APPROACHES POINT OUT NEW WAYS TOWARD LOCAL HARM REDUCTION 203 8.1 A "BLACK HOLE" IN EUROPE? THE SOCIAL AND DISCURSIVE REALITY OF CRIME IN BOSNIA-HERZEGOVINA AND THE INTERNATIONAL COMMUNITY'S TACIT COMPLICITY 211 8.2 TRAFFICKING IN ORGANS, TISSUES, AND CELLS IS SOMETIMES PART OF HUMAN TRAFFICKING 233 9.1 ORGANIZED CRIME AND CORRUPTION - NATIONAL AND EUROPEAN PERSPECTIVES 239 10.1 CIVIL SOCIETY'S ROLE IN THE FIGHT AGAINST THE 'NDRANGHETA 267 10.2 AN ALTERNATIVE METHOD TO COMBAT THE MAFIA: CONFISCATION OF CRIMINAL ASSETS 277 11.1 THE MAFIA AND ORGANIZED CRIME IN GERMANY 285 IV. …”
Libro electrónico -
74por Académie Européenne Interdisciplinaire des Sciences, authorTabla de Contenidos: “…-- 13 Loop quantum gravity and exploding black holes -- Quatrième partie Une nouvelle révolution scientifique à l'horizon ? …”
Publicado 2018
Libro electrónico -
75Publicado 2011“…The enormous losses of territory and population in Austria’s post-Habsburg state of existence, however, did not result in a political, economic, cultural, and intellectual black hole. The essays in the twentieth anniversary volume of Contemporary Austrian Studies argue that the small Austrian nation found its place in the global arena of the twentieth century and made a mark both on Europe and the world. …”
Libro electrónico -
76Publicado 2010“…The enormous losses of territory and population in Austria’s post-Habsburg state of existence, however, did not result in a political, economic, cultural, and intellectual black hole. The essays in the twentieth anniversary volume of Contemporary Austrian Studies argue that the small Austrian nation found its place in the global arena of the twentieth century and made a mark both on Europe and the world. …”
Libro electrónico -
77por Holtsnider, Bill, 1956-Tabla de Contenidos: “…Why Other Agile Methodologies Often FailWhy Waterfall Processes Often Fail; High Visibility; Death March; Man in a Room; The Rogue Developer; ""Are you Done Yet?""; Budget Black Hole; Why the Six Week Solution is Different; Chapter 3: Expectations: What It Meansfor Software to Succeed; Introduction; Software Development Sometimes (Accidentally) Succeeds; Is Aligned With Business Needs; Manages the Cost of Change; Is Built in an Automated Way; Factors Quality Into the Core of the Process; Is Not Constantly Being Redeployed; Progress is Constantly Being Made; Delivers Something of Value…”
Publicado 2010
Libro electrónico -
78Publicado 2010Tabla de Contenidos: “…Cover; Automated Lighting; Title Page; Copyright Page; Table of Contents; Foreword; SECTION 1: Introduction to Automated Lighting; Chapter 1 Automated Lighting in the Third Millennium; Chapter 2 The Foundation of the Automated Lighting Industry; The Genesis of the Automated Lighting Industry; Synchronicity; "If We Can Make It Change Color ..."; The Black Hole; For Sale: Automated Lighting; Sue Me, Sue You Blues; The Future of Automated Lighting; Chapter 3 Automated Lighting Systems; Systems Overview; Rigging Systems; Aluminum Structures; Theatrical Rigging; Rigging Hardware…”
Libro electrónico -
79Publicado 2011Tabla de Contenidos:Libro electrónico
-
80Publicado 2015Tabla de Contenidos: “…Yes, the Media Are Still Important Press Releases and the Journalistic Black Hole; The Old Rules of PR; Learn to Ignore the Old Rules; Chapter 2: The New Rules of Marketing and PR; The Most Important Communication Revolution in Human History; Open for Business; The Long Tail of Marketing; Tell Me Something I Don't Know, Please; Bricks-and-Mortar News; The Long Tail of PR; The New Rules of Marketing and PR; The Convergence of Marketing and PR on the Web; Chapter 3: Reaching Your Buyers Directly; The Right Marketing in a Wired World; Let the World Know about Your Expertise…”
Libro electrónico