Mostrando 461 - 480 Resultados de 722 Para Buscar '"The Hole"', tiempo de consulta: 0.08s Limitar resultados
  1. 461
    Publicado 2016
    Tabla de Contenidos: “…Building Reliable Code; Differentiating Reliability and Security; Defining the Roles of Reliability and Security; Avoiding Security Holes in Reliable Code; Focusing on Application Functionality; Developing Team Protocols; Creating a Lessons Learned Feedback Loop; Considering Issues of Packaged Solutions…”
    Libro electrónico
  2. 462
    por Montgomery, Angela
    Publicado 2024
    Tabla de Contenidos: “…Chapter 20 Slow, Slow, Quick, Quick, Slow -- Chapter 21 All That Fall -- Chapter 22 Aftershocks -- Chapter 23 Oh, Canada -- Chapter 24 Enter a Ghost -- Chapter 25 Inherent Conflict -- Chapter 26 East Coast, West Coast -- Chapter 27 Fire in the Hole -- Chapter 28 A Celebration -- Chapter 29 The Original Thought -- Chapter 30 Choices -- Chapter 31 The Human Constraint -- Chapter 32 A New Economics -- Part II AN INTRODUCTION TO SYSTEMIC MANAGEMENT AND SYSTEMIC THINKING PROCESSES FOR BUSINESS LEADERS -- Filling the Knowledge Gap for a New Economics of Throughput…”
    Libro electrónico
  3. 463
    por Rahmel, Dan
    Publicado 2004
    Tabla de Contenidos: “…Cover; Nuts and Bolts Filmmaking: Practical Techniques for the Guerilla Filmaker; Copyright; Contents; Introduction; CHAPTER 1 Safety; Applications; Safety gear; Safety guidelines; CHAPTER 2 Common Materials and Tools; Applications; Tools; PVC pipe cutter; Ratchet strap or ratchet tie-down; Tin snips; Cordless drill; Materials; Metal pipe nipple; PVC pipe; Flange; Union; 90° elbow bend; T-joint; Four-way joint; Corner joint; Threaded adapter; Conduit hanger with speed thread; Eyebolt; Conduit clamp or two-hole strap; Malleable coupling; Locking nut; Galvanized shingle or shingle flashing…”
    Libro electrónico
  4. 464
    Publicado 2006
    Tabla de Contenidos: “…Chapter 4: Watch What's Going On with the Observer and Chain of Responsibility PatternsNotifying Observers with the Observer Pattern; Using Java's Observer Interface and Observable Class; Using the Chain of Responsibility Pattern; Chapter 5: From One to Many: The Singleton and Flyweight Patterns; Instantiating Just One Object with the Singleton Pattern; The Flyweight Pattern Makes One Look like Many; Part II: Becoming an OOP Master; Chapter 6: Fitting Round Pegs into Square Holes with the Adapter and Facade Patterns; The Adapter Scenario; Fixing Connection Problems with Adapters…”
    Libro electrónico
  5. 465
    por Judd, Mike
    Publicado 1999
    Tabla de Contenidos: “…Electronics assemblies; Joints; Through-hole joints; Surface mounted components; Surface mounted joints; Assembly variations; Assembly classification; Chapter 3. …”
    Libro electrónico
  6. 466
    por Carr, Joseph J.
    Publicado 2000
    Tabla de Contenidos: “…Shielding Electronic Circuits; Approaches to Shielding; Skin Effect and Skin Depth; Ground Planes; Shielded Boxes; Holes in Shields; Double Shielding; Multicompartment Shielding; Spray-On Shielding; Connectors, Meters, and Dials; Installing a Coaxial Connector; Guard Shielding; Grounding and Ground Loops; Chapter 6. …”
    Libro electrónico
  7. 467
    por Renner, Eric
    Publicado 2008
    Tabla de Contenidos: “…Pinhole's History in the Exploration of Science and Ideology; The Pinhole Archetype-From the Darkness of Caves and Holed Stones; The Pinhole Archetype; Early Pinhole Optics-Eclipses, Telling Time, Astrolabes, and Optical Phenomena; The Camera Obscura and Human Understanding; Noon-Marks in Italian Renaissance Cathedrals; The Pinhole in the Wave Theory of Light; Diffraction; Interference; The Pinhole and the Eye; Research into Optimal Pinholes; Twentieth-Century Pinhole Imaging in High-Energy Physics…”
    Libro electrónico
  8. 468
    por Anderson, Brian
    Publicado 2010
    Tabla de Contenidos: “…USB Device Overflow; Overflow Overview; Analyzing This Attack; Device Drivers; Going with the Overflow; USB Development and the Hole in the Heap; Ever-Present Exposures; Overflow Outlook; Defensive Strategies; Drivers; Physical Protection Mechanisms; Summary; Endnote; Chapter 5. …”
    Libro electrónico
  9. 469
    por Holtsnider, Bill, 1956-
    Publicado 2010
    Tabla de Contenidos: “…Why Other Agile Methodologies Often FailWhy Waterfall Processes Often Fail; High Visibility; Death March; Man in a Room; The Rogue Developer; ""Are you Done Yet?""; Budget Black Hole; Why the Six Week Solution is Different; Chapter 3: Expectations: What It Meansfor Software to Succeed; Introduction; Software Development Sometimes (Accidentally) Succeeds; Is Aligned With Business Needs; Manages the Cost of Change; Is Built in an Automated Way; Factors Quality Into the Core of the Process; Is Not Constantly Being Redeployed; Progress is Constantly Being Made; Delivers Something of Value…”
    Libro electrónico
  10. 470
    Publicado 2010
    Tabla de Contenidos: “…Cover; Automated Lighting; Title Page; Copyright Page; Table of Contents; Foreword; SECTION 1: Introduction to Automated Lighting; Chapter 1 Automated Lighting in the Third Millennium; Chapter 2 The Foundation of the Automated Lighting Industry; The Genesis of the Automated Lighting Industry; Synchronicity; "If We Can Make It Change Color ..."; The Black Hole; For Sale: Automated Lighting; Sue Me, Sue You Blues; The Future of Automated Lighting; Chapter 3 Automated Lighting Systems; Systems Overview; Rigging Systems; Aluminum Structures; Theatrical Rigging; Rigging Hardware…”
    Libro electrónico
  11. 471
    por Tremblay, Thom, 1967-
    Publicado 2011
    Tabla de Contenidos: “…Chapter 7: Advanced Part Modeling Features Projecting Sketches and Lofting; Building a Hole Pattern; Exploring Advanced Efficiency Features; Chapter 8: Advanced Assembly and Engineering Tools; Controlling the Assembly Environment; Using Design Accelerators; Working with Additional Assembly Tools; Chapter 9: Creating Plastic Parts; Developing the Plastic Shapes; Creating and Working with Assemblies and Their Parts; Chapter 10: Working with Sheet Metal Parts; Defining Sheet Metal Material Styles; Building Sheet Metal Components; Preparing the Part for Manufacture; Documenting Sheet Metal Parts…”
    Libro electrónico
  12. 472
    por Tremblay, Thom Ducation
    Publicado 2012
    Tabla de Contenidos:
    Libro electrónico
  13. 473
    por Shavers, Brett
    Publicado 2013
    Tabla de Contenidos: “…; Motive and opportunity; Process of elimination; Timelines; Follow the Evidence; Computer user activity; Rabbit Holes; Summary; Bibliography; 6 Investigative Case Management; Introduction; Basic case tracking; The case name; Note taking; Analyzing your notes; Analysis with spreadsheets; Analysis with databases; Analysis using charts; Analysis using maps; Fresh set of eyes; Summary; Bibliography…”
    Libro electrónico
  14. 474
    Publicado 2014
    Tabla de Contenidos: “…Ponemon Institute HIPAA; The Payment Card Industry Data Security Standard (PCI DSS) ; State Breach Notification Laws ; Notes ; Chapter 4: Most Attacks Are Targeted ; Targeted Attacks ; Recent Targeted Attacks ; Targeted Attacks Against Law Firms ; Operation Shady Rat ; Operation Aurora ; Night Dragon ; Watering Hole Attacks ; Common Attack Vectors: Common Results ; Notes ; Chapter 5: Who Is Responsible for Security? …”
    Libro electrónico
  15. 475
    Publicado 2014
    Tabla de Contenidos: “…Retrieving a Specific ElementStepping Through a List; Appending, Substituting, and Removing Elements; Appending Elements; Substituting Elements; Removing Elements; Determining Whether an Item Exists in a List; Sorting the Elements of a List; Using Point Lists to Calculate Geometric Values; Measuring Angular and Distance Values; Calculating Points; Finding and Snapping to Points; Translating Points; Converting Measurement Units; Accessing the AutoCAD Calculator; Converting Lists to Strings and Strings to Lists; Exercise: Adding Holes to the Plate…”
    Libro electrónico
  16. 476
    Publicado 2005
    Tabla de Contenidos: “…Distant Microphone PlacementClose Microphone Placement; Accent Microphone Placement; Ambient Microphone Placement; Stereo Miking Techniques; Spaced Pair; X / Y; M/S; Decca Tree; Surround Miking Techniques; Ambient Surround Mics; Surround Decca Tree; Recording Direct; Microphone Placement Techniques; Brass Instruments; Trumpet; Trombone; Tuba; French Horn; Guitar; Acoustic Guitar; Miking Near the Sound Hole; Surround Guitar Miking; The Electric Guitar; Miking the Guitar Amp; Recording Direct; The Electric Bass Guitar; Keyboard Instruments; Grand Piano; Separation; Upright Piano…”
    Libro electrónico
  17. 477
    Publicado 2011
    Tabla de Contenidos:
    Libro electrónico
  18. 478
    Publicado 2023
    Tabla de Contenidos: “…The Business Email Compromise scam -- Fraud compensation -- Scambaiting -- Summary -- Chapter 4: Types of Social Engineering Attacks -- Technical requirements -- Disclaimer -- Phishing attacks -- History of phishing attacks -- Famous phishing attacks -- Types of phishing attacks -- Baiting -- Physical baiting -- Cyber baiting -- Protecting yourself against baiting -- Dumpster diving -- Tailgating -- Quid pro quo -- Free tech support -- Free software to download -- How to protect yourself against quid pro quo attacks -- Pretexting -- Fake job offers -- False charities -- Watering hole…”
    Libro electrónico
  19. 479
    Publicado 2020
    Tabla de Contenidos: “…Going Down the Rabbit Hole: An Interview with Amanda Brennan, Head of Content Insights and Social, Tumblr -- Chapter 4. …”
    Libro electrónico
  20. 480
    Publicado 2018
    DVD