Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 693
- Application software 600
- Engineering & Applied Sciences 492
- Historia 486
- History 440
- Java (Computer program language) 404
- Computer Science 396
- Python (Computer program language) 308
- Computer programming 291
- Classes socials 233
- Web site development 227
- Design 223
- Programming 222
- Història 212
- Microsoft .NET Framework 193
- Education 188
- Management 181
- Web sites 178
- Computer software 177
- Programming languages (Electronic computers) 171
- Clases sociales 170
- Ensenyament 158
- JavaScript (Computer program language) 155
- Computer programs 154
- Object-oriented programming (Computer science) 154
- C# (Computer program language) 151
- Social aspects 138
- C++ (Computer program language) 133
- Social conditions 128
- Software engineering 122
-
11481Publicado 2011Tabla de Contenidos: “…Cover -- Contents -- Preface -- Acknowledgements -- Chapter 1: Corporate Accounting (Company Accounts)-Issue of Share Capital -- 1.1 Definition -- 1.2 Characteristics of a Company -- 1.3 Kinds of Companies (or) Types of Companies -- 1.3.1 Statutory Companies -- 1.3.2 Government Company -- 1.3.3 Foreign Company -- 1.3.4 Holding Company -- 1.3.5 Subsidiary Company -- 1.3.6 Registered Company -- 1.3.7 Listed Company -- 1.3.8 Private Company -- 1.3.9 Limited Company -- 1.3.10 Unlimited Company -- 1.3.11 Distinction between Private Company and Public Limited Company -- 1.4 Privileges of a Private Limited Company -- 1.5 Documents -- 1.5.1 Memorandum of Association -- 1.5.2 Articles of Association -- 1.5.3 Certificate of Incorporation -- 1.5.4 Prospectus -- 1.5.5 Certificate of Commencement of Business -- 1.6 Share Capital -- 1.6.1 Authorized Capital (Nominal/Registered Capital) -- 1.6.2 Issued Capital -- 1.6.3 Subscribed Capital -- 1.6.4 Called-up Capital -- 1.6.5 Paid-up Capital -- 1.6.6 Uncalled Capital -- 1.6.7 Reserve Capital -- 1.7 Differences Between "Capital Reserve" and "Reserve Capital" -- 1.8 Shares of a Company -- 1.8.1 Meaning -- 1.8.2 Classes of Shares -- 1.8.2.1 Preference Share -- 1.8.3 Types or Kinds of Preference Shares -- 1.8.3.1 On the Basis of Dividend Right -- 1.8.3.2 On the Basis of Participation in Surplus Profits -- 1.8.3.3 On the Basis of Recovery of Capital -- 1.8.3.4 On the Basis of Conversion into Equity Shares -- 1.8.3.5 Guaranteed Preference Share -- 1.9 Equity Shares -- 1.9.1 Distinction Between Preference Share and Equity Share -- 1.10 Management of Companies -- 1.10.1 Shareholders -- 1.10.2 Board of Directors -- 1.10.3 Managing Director -- 1.10.4 Manager -- 1.11 General Meetings of the Company -- 1.11.1 Statutory Meeting -- 1.11.2 Annual General Meeting -- 1.11.3 Extraordinary General Meeting -- 1.12 Quorum…”
Libro electrónico -
11482Publicado 2018Tabla de Contenidos: “…8.5.2 Exploiting domain rules -- 8.6 Validating configuration -- 8.6.1 Causes for configuration-related security flaws -- 8.6.2 Automated tests as your safety net -- 8.6.3 Knowing your defaults and verifying them -- Summary -- 9 Handling failures securely -- 9.1 Using exceptions to deal with failure -- 9.1.1 Throwing exceptions -- 9.1.2 Handling exceptions -- 9.1.3 Dealing with exception payload -- 9.2 Handling failures without exceptions -- 9.2.1 Failures aren't exceptional -- 9.2.2 Designing for failures -- 9.3 Designing for availability -- 9.3.1 Resilience -- 9.3.2 Responsiveness -- 9.3.3 Circuit breakers and timeouts -- Always specify a timeout -- 9.3.4 Bulkheads -- 9.4 Handling bad data -- Cross-site scripting and second-order attacks -- 9.4.1 Don't repair data before validation -- 9.4.2 Never echo input verbatim -- Summary -- 10 Benefits of cloud thinking -- 10.1 The twelve-factor app and cloud-native concepts -- 10.2 Storing configuration in the environment -- 10.2.1 Don't put environment configuration in code -- 10.2.2 Never store secrets in resource files -- 10.2.3 Placing configuration in the environment -- 10.3 Separate processes -- 10.3.1 Deploying and running are separate things -- 10.3.2 Processing instances don't hold state -- 10.3.3 Security benefits -- 10.4 Avoid logging to file -- 10.4.1 Confidentiality -- 10.4.2 Integrity -- 10.4.3 Availability -- 10.4.4 Logging as a service -- 10.5 Admin processes -- 10.5.1 The security risk of overlooked admin tasks -- 10.5.2 Admin tasks as first-class citizens -- Admin of log files -- 10.6 Service discovery and load balancing -- 10.6.1 Centralized load balancing -- 10.6.2 Client-side load balancing -- 10.6.3 Embracing change -- 10.7 The three R's of enterprise security -- 10.7.1 Increase change to reduce risk -- 10.7.2 Rotate -- 10.7.3 Repave -- 10.7.4 Repair -- Summary…”
Libro electrónico -
11483Publicado 2022Tabla de Contenidos: “…IDS Usage Contract Language -- 7.3.2 Usage Control Dimensions -- 7.3.3 Operators for Usage Control Rules -- 7.4 The Policy Information Point -- 7.5 The Participant Information Service (ParIS) -- 7.6 Conclusion: The IDS-IM as the Bridge Between Expressions, Infrastructure, and Enforcement -- References -- Chapter 8: Data Usage Control -- 8.1 Introduction -- 8.2 Usage Control -- 8.2.1 Access Control -- 8.2.2 Usage Control -- 8.2.3 Usage Control Components and Communication Flow -- 8.2.4 Specification, Management, and Negotiation -- 8.2.5 Related Concepts -- 8.2.5.1 Data Leak/Loss Prevention -- 8.2.5.2 Digital Rights Management -- 8.2.5.3 User Managed Access -- 8.2.5.4 Windows Information Protection -- 8.3 Usage Control in the IDS -- 8.3.1 Usage Control Policies -- 8.3.1.1 Policy Classes -- 8.3.1.2 Policy Negotiation -- 8.3.2 Usage Control Technologies -- 8.3.2.1 Integration Concept…”
Libro electrónico -
11484Publicado 2017Tabla de Contenidos: “…Luden / Time of Day and Training Status Both Impact the Efficacy of Caffeine for Short Duration Cycling Performance, Reprinted from: Nutrients 2016, 8(10), 639; doi: 10.3390/nu8100639 -- Chihiro Kojima, Aya Ishibashi, Kumiko Ebi and Kazushige Goto / The Effect of a 20 km Run on Appetite Regulation in Long Distance Runners, Reprinted from: Nutrients 2016, 8(11), 672; doi: 10.3390/nu8110672 -- Wagner Santos Coelho, Luis Viveiros de Castro, Elizabeth Deane, Alexandre Magno-França Adriana Bassini and Luiz-Claudio Cameron / Investigating the Cellular and Metabolic Responses of World-Class Canoeists Training: A Sportomics Approach, Reprinted from: Nutrients 2016, 8(11), 719; doi: 10.3390/nu8110719 -- Heidi M. …”
Libro electrónico -
11485Publicado 2023Tabla de Contenidos: “…3 Assessing the Accuracy of Digital Elevation Models for Darjeeling-Sikkim Himalayas -- 3.1 Introduction -- 3.2 Study Area -- 3.3 Materials and Methods -- 3.3.1 Generation of Cartosat-1 DEM and Orthoimage -- 3.3.2 TanDEM-X -- 3.3.3 ALOS PALSAR -- 3.3.4 DGPS Survey for Obtaining Ground Control Points (GCPs) -- 3.3.5 Datum Transformation -- 3.3.6 Accuracy Assessment Methods -- 3.3.6.1 Vertical Accuracy -- 3.3.6.2 Spatial Accuracy -- 3.4 Results and Discussion -- 3.4.1 Vertical Accuracy Assessment: Comparison of DEMs With Reference to GCPs -- 3.4.2 Vertical Accuracy of DEMs for Different Land Use Classes -- 3.4.2.1 Dense Forest -- 3.4.2.2 Open Forest -- 3.4.2.3 Tea Garden -- 3.4.2.4 Built-up Area -- 3.4.3 Spatial Accuracy Assessment: Comparison of DEMs With Reference to Stream Networks -- 3.5 Conclusions -- Acknowledgments -- References -- 4 An Overview of Morphometry Software Packages, Tools, and Add-ons -- 4.1 Introduction -- 4.2 Overview of Morphometry Tools and Toolboxes -- 4.3 Stand-Alone Tools -- 4.4 Tools that Run within Coding Bases -- 4.5 Conclusion -- References -- 5 Landscape Modeling, Glacier and Ice Sheet Dynamics, and the Three Poles: A Review of Models, Softwares, and Tools -- 5.1 Introduction -- 5.2 Taxonomy -- 5.2.1 Geomorphic Process-Based Models -- 5.2.2 Classification Based on Process of Modeling -- 5.2.2.1 Based on Geomorphic Processes -- 5.2.2.2 Based on Modeling Process -- 5.3 Working Principles for Geomorphological Models -- 5.3.1 Soil Production -- 5.3.2 Hillslope Transport -- 5.3.3 Land Sliding -- 5.3.4 Fluvial Incision and Transport -- 5.3.5 Glacial Erosion -- 5.4 Landscape Evolution Models -- 5.4.1 DEM-Based Models -- 5.4.2 SIBERIA -- 5.4.3 GOLEM -- 5.4.4 CASCADE -- 5.4.5 ZScape -- 5.4.6 CHILD -- 5.4.7 CAESAR -- 5.4.8 APERO -- 5.4.9 SIGNUM (Simple Integrated Geomorphological Numerical Model)…”
Libro electrónico -
11486Publicado 2023Tabla de Contenidos: “…-- 10.3 Variance of the Solvency Position -- 10.4 Characteristics of Various Asset Classes and Liabilities -- 10.5 Our Scenarios -- 10.6 Results -- 10.7 Simulations -- 10.8 Exercise and Discussion - an Insurer With Predominately Short-Term Liabilities -- 10.9 Potential Exercise -- 10.10 Conclusions -- 10.11 Recommended Reading -- 11 Hedging: Protecting Against a Fall in Equity Markets -- 11.1 Introduction -- 11.2 Our Example -- 11.2.1 Futures Contracts - A Brief Explanation -- 11.2.2 Our Task -- 11.3 Adopting a Better Hedge -- 11.4 Allowance for Contract and Portfolio Sizes -- 11.5 Negative Hedge Ratio -- 11.6 Parameter and Model Risk -- 11.7 A Final Reminder on Hedging -- 11.8 Recommended Reading -- 12 Immunisation - Redington and Beyond -- 12.1 Introduction -- 12.2 Outline of Redington Theory and Alternatives -- 12.3 Redington's Theory of Immunisation -- 12.4 Changes in the Shape of the Yield Curve -- 12.5 A More Realistic Example -- 12.5.1 Determining a Suitable Bond Allocation -- 12.5.2 Change in Yield Curve Shape -- 12.5.3 Liquidity Risk -- 12.6 Conclusion -- 12.7 Recommended Reading -- 13 Copulas -- 13.1 Introduction -- 13.2 Copula Theory - The Basics -- 13.3 Commonly Used Copulas -- 13.3.1 The Independent Copula -- 13.3.2 The Gaussian Copula -- 13.3.3 Archimedian Copulas -- 13.3.4 Clayton Copula -- 13.3.5 Gumbel Copula -- 13.4 Copula Density Functions…”
Libro electrónico -
11487por Kumar, Kukatlapalli PradeepTabla de Contenidos: “…6.4.2.2 Gradient Tree Boosting -- 6.4.2.3 XGBoost -- 6.4.3 Stacking -- 6.5 Results -- 6.5.1 Bagging Meta Estimator -- 6.5.2 Random Forest -- 6.5.3 AdaBoost -- 6.5.4 Gradient Tree Boosting -- 6.5.5 XGBoost -- 6.5.6 Stacking -- 6.5.7 Comparison with Single Classifiers -- 6.6 Conclusion -- Acknowledgement -- References -- Chapter 7 Feature Engineering and Selection Approach Over Malicious Image -- 7.1 Introduction -- 7.2 Feature Engineering Techniques -- 7.2.1 Methodologies in Feature Engineering -- 7.2.2 Strides in Feature Engineering -- 7.2.3 Feature Extraction -- 7.2.4 Feature Selection -- 7.2.5 Feature Engineering in Image Processing -- 7.2.6 Importance of Feature Engineering in Image Processing -- 7.3 Malicious Feature Engineering -- 7.4 Image Processing Technique -- 7.4.1 Steps Involved in Image Processing Technique -- 7.4.2 Image Processing Task -- 7.4.2.1 Image Enhancement -- 7.4.2.2 Image Restoration -- 7.4.2.3 Coloring Image Processing -- 7.4.2.4 Wavelets Processing and Multiple Solutions -- 7.4.2.5 Image Compression -- 7.4.2.6 Character Recognition -- 7.4.2.7 Characteristics of Image Processing -- 7.5 Image Processing Techniques for Analysis on Malicious Images -- 7.6 Conclusion -- References -- Blog -- Chapter 8 Cubic-Regression and Likelihood Based Boosting GAM to Model Drug Sensitivity for Glioblastoma -- 8.1 Introduction -- 8.1.1 Glioblastoma -- 8.2 Literature Survey -- 8.3 Materials and Methods -- 8.3.1 Methodology -- 8.3.1.1 Generalized Additive Models (GAMs) -- 8.3.1.2 Model-Based Boosting - Boosted GAM -- 8.3.2 Datasets Description -- 8.4 Evaluations, Results and Discussions -- 8.4.1 Akaike Information Criterion (AIC) -- 8.4.2 Adjusted R-Squared -- 8.4.3 Discussion -- Conclusion -- References -- Chapter 9 Unobtrusive Engagement Detection through Semantic Pose Estimation and Lightweight ResNet for an Online Class Environment…”
Publicado 2023
Libro electrónico -
11488por Organisation for Economic Co-operation and Development.“…It highlights the number of students involved, where they are educated – special schools, special classes or regular classes – and in what phases of education – pre-primary, primary, lower secondary and upper secondary education. …”
Publicado 2007
Libro electrónico -
11489Publicado 2022“…The book largely reflect the structural diversity of echinoderm metabolites including triterpene glycosides and fucosylated chondroitin sulfates, as well as branched fatty acids, di- and triacylglycerols and other lipid classes from the sea cucumbers, polyhydroxysteroids from starfish and different classes of sphingolipids from sea cucumbers and starfish. …”
Libro electrónico -
11490Publicado 2012“…In C++ Primer Plu s, you’ll find depth, breadth, and a variety of teaching techniques and tools to enhance your learning: A new detailed chapter on the changes and additional capabilities introduced in the C++11 standard Complete, integrated discussion of both basic C language and additional C++ features Clear guidance about when and why to use a feature Hands-on learning with concise and simple examples that develop your understanding a concept or two at a time Hundreds of practical sample programs Review questions and programming exercises at the end of each chapter to test your understanding Coverage of generic C++ gives you the greatest possible flexibility Teaches the ISO standard, including discussions of templates, the Standard Template Library, the string class, exceptions, RTTI, and namespaces Table of Contents 1: Getting Started with C++ 2: Setting Out to C++ 3: Dealing with Data 4: Compound Types 5: Loops and Relational Expressions 6: Branching Statements and Logical Operators 7: Functions: C++’s Programming Modules 8: Adventures in Functions 9: Memory Models and Namespaces 10: Objects and Classes 11: Working with Classes 12: Classes and Dynamic Memory Allocation 13: Class Inheritance 14: Reusing Code in C++ 15: Friends, Exceptions, and More 16: The string Class and the Standard Template Library 17: Input, Output, and Files 18: The New C++11 Standard A Number Bases B C++ Reserved Words C The ASCII Character Se..…”
Libro electrónico -
11491
-
11492
-
11493
-
11494
-
11495
-
11496
-
11497
-
11498
-
11499por Belleville, Pierre
Publicado 1967Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro -
11500