Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 26
- Computer networks 23
- Engineering & Applied Sciences 22
- Computer security 17
- Physics 16
- Technology: general issues 16
- Fisiología 14
- Historia 14
- History of engineering & technology 13
- Management 13
- Research & information: general 13
- Computer graphics 11
- Design and construction 11
- Development 11
- Electrical & Computer Engineering 11
- History 11
- microstructure 11
- Computer Science 10
- Computer-aided design 10
- Data processing 10
- Cosmología 9
- Digital techniques 9
- Documentales 9
- Photography 9
- residual stress 9
- Computer programs 8
- Cosmology 8
- Internet marketing 8
- Programming 8
- Telecommunications 8
-
461Publicado 2016Tabla de Contenidos: “…Building Reliable Code; Differentiating Reliability and Security; Defining the Roles of Reliability and Security; Avoiding Security Holes in Reliable Code; Focusing on Application Functionality; Developing Team Protocols; Creating a Lessons Learned Feedback Loop; Considering Issues of Packaged Solutions…”
Libro electrónico -
462por Montgomery, AngelaTabla de Contenidos: “…Chapter 20 Slow, Slow, Quick, Quick, Slow -- Chapter 21 All That Fall -- Chapter 22 Aftershocks -- Chapter 23 Oh, Canada -- Chapter 24 Enter a Ghost -- Chapter 25 Inherent Conflict -- Chapter 26 East Coast, West Coast -- Chapter 27 Fire in the Hole -- Chapter 28 A Celebration -- Chapter 29 The Original Thought -- Chapter 30 Choices -- Chapter 31 The Human Constraint -- Chapter 32 A New Economics -- Part II AN INTRODUCTION TO SYSTEMIC MANAGEMENT AND SYSTEMIC THINKING PROCESSES FOR BUSINESS LEADERS -- Filling the Knowledge Gap for a New Economics of Throughput…”
Publicado 2024
Libro electrónico -
463por Rahmel, DanTabla de Contenidos: “…Cover; Nuts and Bolts Filmmaking: Practical Techniques for the Guerilla Filmaker; Copyright; Contents; Introduction; CHAPTER 1 Safety; Applications; Safety gear; Safety guidelines; CHAPTER 2 Common Materials and Tools; Applications; Tools; PVC pipe cutter; Ratchet strap or ratchet tie-down; Tin snips; Cordless drill; Materials; Metal pipe nipple; PVC pipe; Flange; Union; 90° elbow bend; T-joint; Four-way joint; Corner joint; Threaded adapter; Conduit hanger with speed thread; Eyebolt; Conduit clamp or two-hole strap; Malleable coupling; Locking nut; Galvanized shingle or shingle flashing…”
Publicado 2004
Libro electrónico -
464Publicado 2006Tabla de Contenidos: “…Chapter 4: Watch What's Going On with the Observer and Chain of Responsibility PatternsNotifying Observers with the Observer Pattern; Using Java's Observer Interface and Observable Class; Using the Chain of Responsibility Pattern; Chapter 5: From One to Many: The Singleton and Flyweight Patterns; Instantiating Just One Object with the Singleton Pattern; The Flyweight Pattern Makes One Look like Many; Part II: Becoming an OOP Master; Chapter 6: Fitting Round Pegs into Square Holes with the Adapter and Facade Patterns; The Adapter Scenario; Fixing Connection Problems with Adapters…”
Libro electrónico -
465por Judd, MikeTabla de Contenidos: “…Electronics assemblies; Joints; Through-hole joints; Surface mounted components; Surface mounted joints; Assembly variations; Assembly classification; Chapter 3. …”
Publicado 1999
Libro electrónico -
466por Carr, Joseph J.Tabla de Contenidos: “…Shielding Electronic Circuits; Approaches to Shielding; Skin Effect and Skin Depth; Ground Planes; Shielded Boxes; Holes in Shields; Double Shielding; Multicompartment Shielding; Spray-On Shielding; Connectors, Meters, and Dials; Installing a Coaxial Connector; Guard Shielding; Grounding and Ground Loops; Chapter 6. …”
Publicado 2000
Libro electrónico -
467por Renner, EricTabla de Contenidos: “…Pinhole's History in the Exploration of Science and Ideology; The Pinhole Archetype-From the Darkness of Caves and Holed Stones; The Pinhole Archetype; Early Pinhole Optics-Eclipses, Telling Time, Astrolabes, and Optical Phenomena; The Camera Obscura and Human Understanding; Noon-Marks in Italian Renaissance Cathedrals; The Pinhole in the Wave Theory of Light; Diffraction; Interference; The Pinhole and the Eye; Research into Optimal Pinholes; Twentieth-Century Pinhole Imaging in High-Energy Physics…”
Publicado 2008
Libro electrónico -
468por Anderson, BrianTabla de Contenidos: “…USB Device Overflow; Overflow Overview; Analyzing This Attack; Device Drivers; Going with the Overflow; USB Development and the Hole in the Heap; Ever-Present Exposures; Overflow Outlook; Defensive Strategies; Drivers; Physical Protection Mechanisms; Summary; Endnote; Chapter 5. …”
Publicado 2010
Libro electrónico -
469por Holtsnider, Bill, 1956-Tabla de Contenidos: “…Why Other Agile Methodologies Often FailWhy Waterfall Processes Often Fail; High Visibility; Death March; Man in a Room; The Rogue Developer; ""Are you Done Yet?""; Budget Black Hole; Why the Six Week Solution is Different; Chapter 3: Expectations: What It Meansfor Software to Succeed; Introduction; Software Development Sometimes (Accidentally) Succeeds; Is Aligned With Business Needs; Manages the Cost of Change; Is Built in an Automated Way; Factors Quality Into the Core of the Process; Is Not Constantly Being Redeployed; Progress is Constantly Being Made; Delivers Something of Value…”
Publicado 2010
Libro electrónico -
470Publicado 2010Tabla de Contenidos: “…Cover; Automated Lighting; Title Page; Copyright Page; Table of Contents; Foreword; SECTION 1: Introduction to Automated Lighting; Chapter 1 Automated Lighting in the Third Millennium; Chapter 2 The Foundation of the Automated Lighting Industry; The Genesis of the Automated Lighting Industry; Synchronicity; "If We Can Make It Change Color ..."; The Black Hole; For Sale: Automated Lighting; Sue Me, Sue You Blues; The Future of Automated Lighting; Chapter 3 Automated Lighting Systems; Systems Overview; Rigging Systems; Aluminum Structures; Theatrical Rigging; Rigging Hardware…”
Libro electrónico -
471por Tremblay, Thom, 1967-Tabla de Contenidos: “…Chapter 7: Advanced Part Modeling Features Projecting Sketches and Lofting; Building a Hole Pattern; Exploring Advanced Efficiency Features; Chapter 8: Advanced Assembly and Engineering Tools; Controlling the Assembly Environment; Using Design Accelerators; Working with Additional Assembly Tools; Chapter 9: Creating Plastic Parts; Developing the Plastic Shapes; Creating and Working with Assemblies and Their Parts; Chapter 10: Working with Sheet Metal Parts; Defining Sheet Metal Material Styles; Building Sheet Metal Components; Preparing the Part for Manufacture; Documenting Sheet Metal Parts…”
Publicado 2011
Libro electrónico -
472
-
473por Shavers, BrettTabla de Contenidos: “…; Motive and opportunity; Process of elimination; Timelines; Follow the Evidence; Computer user activity; Rabbit Holes; Summary; Bibliography; 6 Investigative Case Management; Introduction; Basic case tracking; The case name; Note taking; Analyzing your notes; Analysis with spreadsheets; Analysis with databases; Analysis using charts; Analysis using maps; Fresh set of eyes; Summary; Bibliography…”
Publicado 2013
Libro electrónico -
474Publicado 2014Tabla de Contenidos: “…Ponemon Institute HIPAA; The Payment Card Industry Data Security Standard (PCI DSS) ; State Breach Notification Laws ; Notes ; Chapter 4: Most Attacks Are Targeted ; Targeted Attacks ; Recent Targeted Attacks ; Targeted Attacks Against Law Firms ; Operation Shady Rat ; Operation Aurora ; Night Dragon ; Watering Hole Attacks ; Common Attack Vectors: Common Results ; Notes ; Chapter 5: Who Is Responsible for Security? …”
Libro electrónico -
475Publicado 2014Tabla de Contenidos: “…Retrieving a Specific ElementStepping Through a List; Appending, Substituting, and Removing Elements; Appending Elements; Substituting Elements; Removing Elements; Determining Whether an Item Exists in a List; Sorting the Elements of a List; Using Point Lists to Calculate Geometric Values; Measuring Angular and Distance Values; Calculating Points; Finding and Snapping to Points; Translating Points; Converting Measurement Units; Accessing the AutoCAD Calculator; Converting Lists to Strings and Strings to Lists; Exercise: Adding Holes to the Plate…”
Libro electrónico -
476Publicado 2005Tabla de Contenidos: “…Distant Microphone PlacementClose Microphone Placement; Accent Microphone Placement; Ambient Microphone Placement; Stereo Miking Techniques; Spaced Pair; X / Y; M/S; Decca Tree; Surround Miking Techniques; Ambient Surround Mics; Surround Decca Tree; Recording Direct; Microphone Placement Techniques; Brass Instruments; Trumpet; Trombone; Tuba; French Horn; Guitar; Acoustic Guitar; Miking Near the Sound Hole; Surround Guitar Miking; The Electric Guitar; Miking the Guitar Amp; Recording Direct; The Electric Bass Guitar; Keyboard Instruments; Grand Piano; Separation; Upright Piano…”
Libro electrónico -
477Publicado 2011Tabla de Contenidos:Libro electrónico
-
478Publicado 2023Tabla de Contenidos: “…The Business Email Compromise scam -- Fraud compensation -- Scambaiting -- Summary -- Chapter 4: Types of Social Engineering Attacks -- Technical requirements -- Disclaimer -- Phishing attacks -- History of phishing attacks -- Famous phishing attacks -- Types of phishing attacks -- Baiting -- Physical baiting -- Cyber baiting -- Protecting yourself against baiting -- Dumpster diving -- Tailgating -- Quid pro quo -- Free tech support -- Free software to download -- How to protect yourself against quid pro quo attacks -- Pretexting -- Fake job offers -- False charities -- Watering hole…”
Libro electrónico -
479Publicado 2020Tabla de Contenidos: “…Going Down the Rabbit Hole: An Interview with Amanda Brennan, Head of Content Insights and Social, Tumblr -- Chapter 4. …”
Libro electrónico -
480