Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 26
- Computer networks 23
- Engineering & Applied Sciences 22
- Computer security 17
- Physics 16
- Technology: general issues 16
- Fisiología 14
- Historia 14
- History of engineering & technology 13
- Management 13
- Research & information: general 13
- Computer graphics 11
- Design and construction 11
- Development 11
- Electrical & Computer Engineering 11
- History 11
- microstructure 11
- Computer Science 10
- Computer-aided design 10
- Data processing 10
- Cosmología 9
- Digital techniques 9
- Documentales 9
- Photography 9
- residual stress 9
- Computer programs 8
- Cosmology 8
- Internet marketing 8
- Programming 8
- Telecommunications 8
-
641por Yates, David T.“…The research demonstrates the importance of large-scale animal husbandry in the mixed farming regimes as evidenced in the design of the field systems which incorporate droveways, stock proof fencing, watering holes, cow pens, sheep races and gateways for stockhandl…”
Publicado 2007
Libro electrónico -
642Publicado 2024Tabla de Contenidos: “…-- 3.3.7.3 We don't change good passwords (unless there are good reasons for it) -- 3.3.7.4 Good passwords are long passwords -- 3.3.7.5 Passphrases - Diceware -- 3.3.8 Storing passwords -- 3.3.9 Two- or multi-factor authentication -- 3.3.9.1 Toward passwordless systems -- 3.3.10 Paranoia -- 3.3.11 Up-to-date knowledge -- 3.3.12 Web browser -- 3.3.12.1 Use different browsers -- 3.3.13 Different risks to different "drawers" (or "pigeon holes") -- 3.3.14 Safe e-mail…”
Libro electrónico -
643
-
644Publicado 2017“…""Trends in Modern Cosmology"" invites the reader to tackle the big questions of the universe from cultural aspects of cosmology and its influence on arts, philosophy, and politics to more specialized technical advances in the field as the physics of dark sector, black holes, galaxies, large structure formation, and particles. …”
Libro electrónico -
645por Brickner, David“… For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. …”
Publicado 2005
Libro electrónico -
646por Ivens, Kathy“…With home networking you can move files from one computer to another, share resources, print to a single printer or multiple printers from any computer in the house, and IM the kids when they're holed up in their rooms. And the downside? Anyone who's ever had to troubleshoot a network glitch doesn't need to ask that question. …”
Publicado 2005
Libro electrónico -
647por Arora, Vijay Kumar“…Nanoengineering OverviewQuantum WavesNanoengineering CircuitsBioapplicationsGrowth and DecayScopeExamplesProblemsCAD/CAE ProjectsReferencesAtoms, Bands, and Quantum WellsBirth of a Quantum EraHydrogen-Like AtomPhoton Emission and AbsorptionSpherical Hydrogen-Like AtomAtoms to Crystals-Bands and BondsThermal Band/Bond TemperingImpurity Band/Bond TemperingCompound SemiconductorsBands to Quantum WellsA Prototype Quantum WellD (Bulk) Density of StatesD Quantum WellD Quantum WellQuantum Dots: QOD SystemsGeneralized DOSEllipsoidal Conduction Band ValleysHeavy/Light HolesElectrons in a Magnetic Field…”
Publicado 2015
Libro electrónico -
648Publicado 2022“…Other topics include early kick detection systems, an innovative drilling technique for hydraulic loosening and recovery of methane from gas-bearing coal seams, analytical solutions for stress accumulations near holes in elastic plates, prediction of pipe sticking problems, and estimation of thermal conductivity…”
Libro electrónico -
649Publicado 2020“…Invasive treatment and examination of digestive surgery has changed from large incisions to several Trocar holes, from surgery to endoscopic treatment, and from laparotomy to endoscopy or laparoscopy, which has changed the diagnosis treatment and management of digestive surgery, enhanced the recovery after surgery, and benefited the patients needing to undergo surgical procedures. …”
Libro electrónico -
650Publicado 2006“…Benjam discovers that bats still use tree-holes in summer, but since many of Europe's old forests have been felled, they've also learnt to share people's homes. …”
DVD -
651
-
652por Hawking, Stephen William, 1942-2018
Publicado 1990Biblioteca de la Universidad de Navarra (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Libro -
653Publicado 2015“…The book thus maps out a universe of many moral worlds without, as Velleman puts it, “moral black holes”. The six self-standing chapters discuss such diverse topics as online avatars and virtual worlds, lying in Russian and truth-telling in Quechua, the pleasure of solitude and the fear of absurdity. …”
Libro electrónico -
654por Velleman, James David“…The book thus maps out a universe of many moral worlds without, as Velleman puts it, "moral black holes”. The five self-standing chapters discuss such diverse topics as online avatars and virtual worlds, lying in Russian and truth-telling in Quechua, the pleasure of solitude and the fear of absurdity. …”
Publicado 2013
Libro electrónico -
655Publicado 2017Tabla de Contenidos: “…6.13.5.3 Rear Wall Load -- 6.13.6 Trial Size -- 6.13.7 Numerical Integration Method -- 6.13.8 Numerical Integration for Side Wall -- 6.13.9 Numerical Integration for Rear Wall -- 6.13.9.1 Side Wall (In-Plane Loading) -- 6.13.9.2 Trial Size -- 6.13.10 Roof Slab (in Plane Loads) -- 6.13.11 Nominal Shear Capacity -- 6.13.12 Roof Slab (Out-of-Plane Bending) -- 6.13.13 Roof Beam -- 6.13.14 Foundation -- References -- 7 Design of a Foundation Under Vibrating Equipment -- 7.1 Introduction -- 7.2 Machine Requirements -- 7.3 Foundation Design Guideline -- 7.3.1 Foundation Dynamic Analysis -- 7.3.2 Soil Parameter -- 7.3.3 Modes of Motion -- 7.3.4 Mass Moment of Inertia -- 7.3.5 Limiting Dynamic Condition -- 7.4 Vibration Isolation -- 7.4.1 Isolating Liners -- 7.4.2 Spring and Rubber Mounts -- 7.4.3 Inertia Block Bolt or Pad Mounting Bolt Installation -- 7.4.4 Grouting -- 7.5 Design Checklist -- References -- 8 Soil Investigation and Pile Design -- 8.1 Introduction -- 8.2 Soil Exploration Methods -- 8.2.1 Planning the Program -- 8.2.2 Organization of Field Work -- 8.2.3 Soil Boring Methods -- 8.2.3.1 Wash Borings -- 8.2.3.2 Sampling Methods -- 8.2.4 Standard Penetration Test -- 8.2.5 Cone Penetration Test -- 8.2.6 Vane Test -- 8.2.7 Cross-Hole Test -- 8.2.7.1 Body Waves -- 8.2.7.2 Surface Waves -- 8.3 Soil Investigation Report -- 8.4 Deep Foundation -- 8.4.1 Steel Piles -- 8.4.2 Concrete Piles -- 8.4.3 Prestressed Pile -- 8.4.3.1 Pile Calculation -- 8.4.4 Pile Caps -- 8.5 Retaining Wall -- 8.5.1 Preliminary Retaining Wall Dimensions -- 8.5.1.1 Check Stability Against Overturning -- 8.5.1.2 Check Stability Against Sliding -- 8.5.1.3 Check Stability Against Bearing Capacity -- 8.6 Soil With Problems -- 8.6.1 Dynamic Compaction -- 8.6.2 Vibro Compaction -- 8.6.3 Compaction Grouting -- 8.6.4 Wick Drain -- References…”
Libro electrónico -
656por Klevinsky, T. J.“…Specific topics covered in this book include: Hacking myths Potential drawbacks of penetration testing Announced versus unannounced testing Application-level holes and defenses Penetration through the Internet, including zone transfer, sniffing, and port scanning War dialing Enumerating NT systems to expose security holes Social engineering methods Unix-specific vulnerabilities, such as RPC and buffer overflow attacks The Windows NT Resource kit Port scanners and discovery tools Sniffers and password crackers Web testing tools Remote control tools Firewalls and intrusion detection systems Numerous DoS attacks and tools 0201719568B01042002…”
Publicado 2002
Libro electrónico -
657Publicado 2011“…These two ways of conceptualizing Freud's negation have led to a panoply of ideas that include negative hallucination, psychic holes, negative narcissism, selfishly motivated erasure of the Other, and the so-called "work of the negative". …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
658Publicado 2007“…The research demonstrates the importance of large-scale animal husbandry in the mixed farming regimes as evidenced in the design of the field systems which incorporate droveways, stock proof fencing, watering holes, cow pens, sheep races and gateways for stockhandling. …”
Libro electrónico -
659Publicado 2022“…A third chapter proposes that gravity attributed to dark matter is due to the sprinkling of black holes throughout galaxies, which is supported by LIGO/Virgo observations. …”
Libro electrónico -
660Publicado 2001“…With this book you will learn how to determine an acceptable level of risk, develop security tests, and plug security holes before software is even shipped"--Resource description page…”
Libro electrónico