Mostrando 641 - 660 Resultados de 724 Para Buscar '"The Hole"', tiempo de consulta: 0.08s Limitar resultados
  1. 641
    por Yates, David T.
    Publicado 2007
    “…The research demonstrates the importance of large-scale animal husbandry in the mixed farming regimes as evidenced in the design of the field systems which incorporate droveways, stock proof fencing, watering holes, cow pens, sheep races and gateways for stockhandl…”
    Libro electrónico
  2. 642
    Publicado 2024
    Tabla de Contenidos: “…-- 3.3.7.3 We don't change good passwords (unless there are good reasons for it) -- 3.3.7.4 Good passwords are long passwords -- 3.3.7.5 Passphrases - Diceware -- 3.3.8 Storing passwords -- 3.3.9 Two- or multi-factor authentication -- 3.3.9.1 Toward passwordless systems -- 3.3.10 Paranoia -- 3.3.11 Up-to-date knowledge -- 3.3.12 Web browser -- 3.3.12.1 Use different browsers -- 3.3.13 Different risks to different "drawers" (or "pigeon holes") -- 3.3.14 Safe e-mail…”
    Libro electrónico
  3. 643
    por Burt, Ronald S.
    Publicado 2015
    Libro
  4. 644
    Publicado 2017
    “…""Trends in Modern Cosmology"" invites the reader to tackle the big questions of the universe from cultural aspects of cosmology and its influence on arts, philosophy, and politics to more specialized technical advances in the field as the physics of dark sector, black holes, galaxies, large structure formation, and particles. …”
    Libro electrónico
  5. 645
    por Brickner, David
    Publicado 2005
    “… For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. …”
    Libro electrónico
  6. 646
    por Ivens, Kathy
    Publicado 2005
    “…With home networking you can move files from one computer to another, share resources, print to a single printer or multiple printers from any computer in the house, and IM the kids when they're holed up in their rooms. And the downside? Anyone who's ever had to troubleshoot a network glitch doesn't need to ask that question. …”
    Libro electrónico
  7. 647
    por Arora, Vijay Kumar
    Publicado 2015
    “…Nanoengineering OverviewQuantum WavesNanoengineering CircuitsBioapplicationsGrowth and DecayScopeExamplesProblemsCAD/CAE ProjectsReferencesAtoms, Bands, and Quantum WellsBirth of a Quantum EraHydrogen-Like AtomPhoton Emission and AbsorptionSpherical Hydrogen-Like AtomAtoms to Crystals-Bands and BondsThermal Band/Bond TemperingImpurity Band/Bond TemperingCompound SemiconductorsBands to Quantum WellsA Prototype Quantum WellD (Bulk) Density of StatesD Quantum WellD Quantum WellQuantum Dots: QOD SystemsGeneralized DOSEllipsoidal Conduction Band ValleysHeavy/Light HolesElectrons in a Magnetic Field…”
    Libro electrónico
  8. 648
    Publicado 2022
    “…Other topics include early kick detection systems, an innovative drilling technique for hydraulic loosening and recovery of methane from gas-bearing coal seams, analytical solutions for stress accumulations near holes in elastic plates, prediction of pipe sticking problems, and estimation of thermal conductivity…”
    Libro electrónico
  9. 649
    Publicado 2020
    “…Invasive treatment and examination of digestive surgery has changed from large incisions to several Trocar holes, from surgery to endoscopic treatment, and from laparotomy to endoscopy or laparoscopy, which has changed the diagnosis treatment and management of digestive surgery, enhanced the recovery after surgery, and benefited the patients needing to undergo surgical procedures. …”
    Libro electrónico
  10. 650
    Publicado 2006
    “…Benjam discovers that bats still use tree-holes in summer, but since many of Europe's old forests have been felled, they've also learnt to share people's homes. …”
    DVD
  11. 651
    por Hawking, Stephen 1942-2018
    Publicado 1992
    Otros
  12. 652
  13. 653
    Publicado 2015
    “…The book thus maps out a universe of many moral worlds without, as Velleman puts it, “moral black holes”. The six self-standing chapters discuss such diverse topics as online avatars and virtual worlds, lying in Russian and truth-telling in Quechua, the pleasure of solitude and the fear of absurdity. …”
    Libro electrónico
  14. 654
    por Velleman, James David
    Publicado 2013
    “…The book thus maps out a universe of many moral worlds without, as Velleman puts it, "moral black holes”. The five self-standing chapters discuss such diverse topics as online avatars and virtual worlds, lying in Russian and truth-telling in Quechua, the pleasure of solitude and the fear of absurdity. …”
    Libro electrónico
  15. 655
    Publicado 2017
    Tabla de Contenidos: “…6.13.5.3 Rear Wall Load -- 6.13.6 Trial Size -- 6.13.7 Numerical Integration Method -- 6.13.8 Numerical Integration for Side Wall -- 6.13.9 Numerical Integration for Rear Wall -- 6.13.9.1 Side Wall (In-Plane Loading) -- 6.13.9.2 Trial Size -- 6.13.10 Roof Slab (in Plane Loads) -- 6.13.11 Nominal Shear Capacity -- 6.13.12 Roof Slab (Out-of-Plane Bending) -- 6.13.13 Roof Beam -- 6.13.14 Foundation -- References -- 7 Design of a Foundation Under Vibrating Equipment -- 7.1 Introduction -- 7.2 Machine Requirements -- 7.3 Foundation Design Guideline -- 7.3.1 Foundation Dynamic Analysis -- 7.3.2 Soil Parameter -- 7.3.3 Modes of Motion -- 7.3.4 Mass Moment of Inertia -- 7.3.5 Limiting Dynamic Condition -- 7.4 Vibration Isolation -- 7.4.1 Isolating Liners -- 7.4.2 Spring and Rubber Mounts -- 7.4.3 Inertia Block Bolt or Pad Mounting Bolt Installation -- 7.4.4 Grouting -- 7.5 Design Checklist -- References -- 8 Soil Investigation and Pile Design -- 8.1 Introduction -- 8.2 Soil Exploration Methods -- 8.2.1 Planning the Program -- 8.2.2 Organization of Field Work -- 8.2.3 Soil Boring Methods -- 8.2.3.1 Wash Borings -- 8.2.3.2 Sampling Methods -- 8.2.4 Standard Penetration Test -- 8.2.5 Cone Penetration Test -- 8.2.6 Vane Test -- 8.2.7 Cross-Hole Test -- 8.2.7.1 Body Waves -- 8.2.7.2 Surface Waves -- 8.3 Soil Investigation Report -- 8.4 Deep Foundation -- 8.4.1 Steel Piles -- 8.4.2 Concrete Piles -- 8.4.3 Prestressed Pile -- 8.4.3.1 Pile Calculation -- 8.4.4 Pile Caps -- 8.5 Retaining Wall -- 8.5.1 Preliminary Retaining Wall Dimensions -- 8.5.1.1 Check Stability Against Overturning -- 8.5.1.2 Check Stability Against Sliding -- 8.5.1.3 Check Stability Against Bearing Capacity -- 8.6 Soil With Problems -- 8.6.1 Dynamic Compaction -- 8.6.2 Vibro Compaction -- 8.6.3 Compaction Grouting -- 8.6.4 Wick Drain -- References…”
    Libro electrónico
  16. 656
    por Klevinsky, T. J.
    Publicado 2002
    “…Specific topics covered in this book include: Hacking myths Potential drawbacks of penetration testing Announced versus unannounced testing Application-level holes and defenses Penetration through the Internet, including zone transfer, sniffing, and port scanning War dialing Enumerating NT systems to expose security holes Social engineering methods Unix-specific vulnerabilities, such as RPC and buffer overflow attacks The Windows NT Resource kit Port scanners and discovery tools Sniffers and password crackers Web testing tools Remote control tools Firewalls and intrusion detection systems Numerous DoS attacks and tools 0201719568B01042002…”
    Libro electrónico
  17. 657
    Publicado 2011
    “…These two ways of conceptualizing Freud's negation have led to a panoply of ideas that include negative hallucination, psychic holes, negative narcissism, selfishly motivated erasure of the Other, and the so-called "work of the negative". …”
    Libro electrónico
  18. 658
    Publicado 2007
    “…The research demonstrates the importance of large-scale animal husbandry in the mixed farming regimes as evidenced in the design of the field systems which incorporate droveways, stock proof fencing, watering holes, cow pens, sheep races and gateways for stockhandling. …”
    Libro electrónico
  19. 659
    Publicado 2022
    “…A third chapter proposes that gravity attributed to dark matter is due to the sprinkling of black holes throughout galaxies, which is supported by LIGO/Virgo observations. …”
    Libro electrónico
  20. 660
    Publicado 2001
    “…With this book you will learn how to determine an acceptable level of risk, develop security tests, and plug security holes before software is even shipped"--Resource description page…”
    Libro electrónico