Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Mecánica 618
- Engineering & Applied Sciences 343
- Materiales 308
- Technology: general issues 259
- History of engineering & technology 239
- Medicine 216
- Mechanical Engineering 212
- Research & information: general 199
- Law and legislation 196
- Taxation 185
- Propiedades mecánicas 183
- mechanical properties 183
- Mechanical engineering 177
- Development 176
- Física 165
- Engineering and Technology 146
- Physical Sciences 143
- Application software 141
- Management 134
- Computer networks 131
- Engineering 127
- Data processing 124
- History 122
- Security measures 121
- Computer security 113
- microstructure 113
- Economics 112
- Artificial intelligence 107
- Research 104
- Mechanical Engineering - General 103
-
8501
-
8502Publicado 2023Tabla de Contenidos: “…Front Cover -- Half Title -- Title Page -- Copyright Page -- About the authors -- Brief contents -- Detailed contents -- Preface -- Student and lecturer resources -- Acknowledgements -- Part A INTRODUCTION -- 1 Economic issues -- 1.1 Global Economic Issues -- COVID-19 and the global health emergency -- Global inflation -- The environment and the global climate emergency -- 1.2 The Core of Economics -- The problem of scarcity -- Demand and supply -- 1.3 Dividing Up the Subject -- Microeconomics -- Macroeconomics -- 1.4 Modelling Economic Relationships -- The production possibility curve -- The circular flow of goods and incomes -- Models and data -- 1.5 Economic Systems -- The command economy -- The free-market economy -- The price mechanism -- The mixed market economy -- Chapter 1 Boxes -- 1.1 The Opportunity Costs of Studying: What are you sacrificing? …”
Libro electrónico -
8503por MacCharles, AlanTabla de Contenidos: “…-- 10.1 Common Issues -- 10.2 IJV Scope, Partner Contributions and Exclusivity -- 10.3 Measure of Success -- 10.4 Equity Split, Control and Governance -- 10.5 Accounting Consolidation -- 10.6 Valuation and (Accounting) Goodwill -- 10.7 Entity Structure Design (Corporate Tree) -- 10.8 Dispute Mechanism and Exit Provisions -- 10.9 IP and Know-How, Including Its Transfer and Retaining Control Over It -- 10.10 Connected Transactions Between The IJV and Partners (i.e. …”
Publicado 2024
Libro electrónico -
8504Publicado 2007Tabla de Contenidos: “…Sample Scenario of STP Election Process -- STP Topology Changes -- Per VLAN Spanning Tree Plus -- MAC Address Allocation and Reduction -- STP and IEEE 802.1Q Trunks -- Configuring the Basic Parameters of PVST+ -- Configuring the Root Bridge -- Configuring Port Cost -- Verifying the STP Configuration -- Rapid Spanning Tree Protocol -- RSTP Port States -- RSTP Port Roles -- RSTP BPDU Format and BPDU Handling -- Rapid Transition to Forwarding -- RSTP Topology Change Mechanism -- Compatibility with 802.1D -- Multiple Spanning Tree -- PVST+ Case -- 802.1Q Case -- MST Case -- MST Regions -- IST Instances -- MST Instances -- Configuring Basic Parameters of MST -- Study Tips -- Summary -- Configuration Exercise: Configuring and Verifying Spanning-Tree Bridge Priorities and Spanning-Tree Port Cost -- Required Resources -- Exercise Objective -- Network Diagram -- Command List -- Task 1: Configure and Verify Spanning Tree Root and Backup Bridges and STP Priorities -- Task 2: Configure and Verify Spanning Tree Port Cost -- Task 3: Identifying STP Topology Changes -- Review Questions -- Chapter 6 Adding Resiliency to Spanning Tree Using Advanced Features and Troubleshooting STP Issues -- Enhancements to 802.1D Spanning Tree Protocol -- PortFast -- UplinkFast -- BackboneFast -- Improving Spanning-Tree Resiliency -- BPDU Guard -- BPDU Filtering -- Root Guard -- Preventing Forwarding Loops and Black Holes -- Loop Guard -- Comparison Between Aggressive Mode UDLD and Loop Guard -- Troubleshooting STP -- Potential STP Problems -- Troubleshooting Methodology for STP Problems -- Know the Network -- Identify a Bridging Loop -- Restore Connectivity -- Check Port Status -- Look for Resource Errors -- Disable Unneeded Features -- Study Tips -- Summary -- Configuration Exercise: Configuring BackboneFast, UplinkFast, Root Guard, and PortFast -- Required Resources…”
Libro electrónico -
8505Publicado 2017Tabla de Contenidos: “…The Object class (java.lang.Object) -- Important object methods -- The String class (java.lang.String) -- Primitive wrapper classes (Integer, Long, Short, Char, Float, Double in java.lang) -- Autoboxing examples -- Exceptions and errors (java.lang.Exception and java.lang.Error) -- The Collections API - java.util.ArrayList and java.util.HashMap -- ArrayList (java.util.ArrayList) -- Commonly used methods of the ArrayList class -- ArrayList usage example -- HashMap (java.util.HashMap) -- Commonly used methods of the HashMap class -- HashMap usage example -- Preparing your classes for the Collections API -- About hashCode() -- About equals () -- The hashing mechanism -- Running JVM applications on the command line -- At least one class must have a static main() method -- Required directory structure for class files -- Setting ClassPath for a JVM instance -- Placing class files inside a JAR archive -- Runnable JAR file -- Running a program with the java command -- Run a project consisting of separate class files -- Running a project that is placed inside a runnable JAR file -- Other useful parameters of the java command -- -D to pass properties and values -- -ea to enable assertions -- A hands-on example project to run on JVM -- A ClassPath example -- Eclipse IDE -- Downloading Eclipse IDE -- Installing Eclipse IDE -- Summary -- Chapter 3: Java -- OOP in Java -- Defining classes -- Class access modifiers -- Final class modifier - locking a class -- Defining packages -- Importing classes -- Adding class members - variables and methods -- Instance variables -- Methods -- Modifiers -- Protecting class members with access modifiers -- Access modifier example -- Static modifier - instance variables and class variables -- Final modifier - locking a class member -- Overloading methods -- Constructors and finalizers -- Constructors -- Finalizers…”
Libro electrónico -
8506Publicado 2017Tabla de Contenidos: “…. -- Throttle the backfill and recovery: -- Chapter 9: Ceph under the Hood -- Introduction -- Ceph scalability and high availability -- Understanding the CRUSH mechanism -- CRUSH map internals -- How to do it…”
Libro electrónico -
8507Publicado 2010Tabla de Contenidos: “…Display Advertising -- Sponsorships and Affiliate Advertising -- Ad Exchanges -- Chapter 64 Email Marketing -- Chapter 65 Mobility Marketing -- Widgets, Gadgets, and Mobile Applications -- A Growing Tidal Wave of Opportunity -- How Companies Use Mobile Phones to Drive Business -- Chapter 66 Social Media: Build Your Brand and Connect with Customers -- A Shift of Power -- The Real Value of Social Media -- Social Media Principles -- Chapter 67 What We Know So Far: Surprising Statistics -- Business Results from Social Media -- Chapter 68 Measuring the Effectiveness of Social Media -- Operationalize Social Media -- Chapter 69 Social Media Networks -- LinkedIn -- Facebook -- Twitter -- Social Bookmarking Sites -- Chapter 70 The Blogosphere -- Getting Started -- Chapter 71 Social Media Strategy and Planning Guide -- Social Media Strategy -- Chapter 72 Word of Mouth: Viral Marketing and Buzz -- Stunts and Pranksters -- Historical Milestone -- Chapter 73 Public Relations -- What's New, Who Cares? -- The Mechanics -- Part II: Create a Tactical Plan with Execution Built-In -- Marketing and Sales Program ROI Analysis -- Chapter 74 Make Marketing Measurable -- Individual Tactics Description -- Chapter 75 Implementation Calendar and Budget -- Implement -- Summary: Section V -- Section VI: Execute and Evaluate: Create a Culture of Execution -- Chapter 76 The Problem with Marketing -- How to Fix the Biggest Problems in Sales and Marketing -- Chapter 77 Asset-Based Marketing Measurement -- Holistic Marketing Measurement -- Key Performance Measures -- Chapter 78 Evaluate: What Is Measured Improves -- Purpose -- Research -- Analyze -- Implement -- Strategize -- Evaluate and Execute -- Chapter 79 ROI OptimizerTM: Increase the Effectiveness of How Marketing Is Measured -- ROI OptimizerTM Process -- Top-Down and Bottom-Up Analysis -- Demand Chain Optimization…”
Libro electrónico -
8508Publicado 2022Tabla de Contenidos: “…LMTD for the IoT: a qualitative survey -- 11.4.1. Data: MTD mechanism against side-channel channel attacks -- 11.4.2. …”
Libro electrónico -
8509Publicado 2019Tabla de Contenidos: “…And Peter Schneider 4.1 Introduction 53 4.2 Data Handling for the System View 61 4.3 Electrical Challenges 62 4.4 Mechanical Challenges 67 4.5 Thermal Challenges 68 4.6 Thermomechanical Challenges 72 Acknowledgments 77 References 77 5 Physical Design Flow for 3D/CoWoS® Stacked ICs 81; Yu-Shiang Lin, Sandeep K. …”
Libro electrónico -
8510Publicado 2023Tabla de Contenidos: “…5.4.3 Entity Behaviour Analytics -- 5.5 Transforming Data into Intelligence -- 5.5.1 Structured Geospatial Analytical Method -- 5.5.2 Analysis of Competing Hypotheses -- 5.5.3 Poor Practices -- 5.6 Sharing Intelligence -- 5.6.1 Machine Readable Intelligence -- 5.7 Measuring the Effectiveness of Generated Intelligence -- Summary -- References -- Chapter 6 Attribution -- 6.1 Holding Perpetrators to Account -- 6.1.1 Punishment -- 6.1.2 Legal Frameworks -- 6.1.3 Cyber Crime Legislation -- 6.1.4 International Law -- 6.1.5 Crime and Punishment -- 6.2 Standards of Proof -- 6.2.1 Forensic Evidence -- 6.3 Mechanisms of Attribution -- 6.3.1 Attack Attributes -- 6.3.1.1 Attacker TTPs -- 6.3.1.2 Example - HAFNIUM -- 6.3.1.3 Attacker Infrastructure -- 6.3.1.4 Victimology -- 6.3.1.5 Malicious Code -- 6.3.2 Asserting Attribution -- 6.4 Anti-Attribution Techniques -- 6.4.1 Infrastructure -- 6.4.2 Malicious Tools -- 6.4.3 False Attribution -- 6.4.4 Chains of Attribution -- 6.5 Third Party Attribution -- 6.6 Using Attribution -- Summary -- References -- Chapter 7 Professionalism -- 7.1 Notions of Professionalism -- 7.1.1 Professional Ethics -- 7.2 Developing a New Profession -- 7.2.1 Professional Education -- 7.2.2 Professional Behaviour and Ethics -- 7.2.2.1 Professionalism in Medicine -- 7.2.2.2 Professionalism in Accountancy -- 7.2.2.3 Professionalism in Engineering -- 7.2.3 Certifications and Codes of Ethics -- 7.3 Behaving Ethically -- 7.3.1 The Five Philosophical Approaches -- 7.3.2 The Josephson Model -- 7.3.3 PMI Ethical Decision Making Framework -- 7.4 Legal and Ethical Environment -- 7.4.1 Planning -- 7.4.1.1 Responsible Vulnerability Disclosure -- 7.4.1.2 Vulnerability Hoarding -- 7.4.2 Collection, Analysis, and Processing -- 7.4.2.1 PRISM Programme -- 7.4.2.2 Open and Closed Doors -- 7.4.3 Dissemination -- 7.4.3.1 Doxxing -- 7.5 Managing the Unexpected…”
Libro electrónico -
8511Publicado 2023Tabla de Contenidos: “…3.5.2 Benchmark Test on CEC-17 Functions -- 3.6 Analytical Validation of Proposed Variant -- 3.6.1 Convergence Rate Test -- 3.6.2 Box Plot Analysis -- 3.6.3 Wilcoxon Rank Sum Test -- 3.6.4 Scalability Test -- 3.7 Design Analysis of Harmonic Estimator -- 3.7.1 Assessment of Harmonic Estimator Design Problem 1 -- 3.7.2 Assessment of Harmonic Estimator Design Problem 2 -- 3.8 Conclusion -- References -- Chapter 4 Applications of Cuckoo Search Algorithm in Reliability Optimization -- 4.1 Introduction -- 4.2 Cuckoo Search Algorithm -- 4.2.1 Performance of Cuckoo Search Algorithm -- 4.2.2 Levy Flights -- 4.2.3 Software Reliability -- 4.3 Modified Cuckoo Search Algorithm (MCS) -- 4.4 Optimization in Module Design -- 4.5 Optimization at Dynamic Implementation -- 4.6 Comparative Study of Support of Modified Cuckoo Search Algorithm -- 4.7 Results and Discussions -- 4.8 Conclusion -- References -- Chapter 5 Series-Parallel Computer System Performance Evaluation with Human Operator Using Gumbel-Hougaard Family Copula -- 5.1 Introduction -- 5.2 Assumptions, Notations, and Description of the System -- 5.2.1 Notations -- 5.2.2 Assumptions -- 5.2.3 Description of the System -- 5.3 Reliability Formulation of Models -- 5.3.1 Solution of the Model -- 5.4 Some Particular Cases Based on Analytical Analysis of the Model -- 5.4.1 Availability Analysis -- 5.4.2 Reliability Analysis -- 5.4.3 Mean Time to Failure (MTTF) -- 5.4.4 Cost-Benefit Analysis -- 5.5 Conclusions Through Result Discussion -- References -- Chapter 6 Applications of Artificial Intelligence in Sustainable Energy Development and Utilization -- 6.1 Energy and Environment -- 6.2 Sustainable Energy -- 6.3 Artificial Intelligence in Industry 4.0 -- 6.4 Introduction to AI and its Working Mechanism -- 6.5 Biodiesel -- 6.6 Transesterification Process -- 6.7 AI in Biodiesel Applications -- 6.8 Conclusion…”
Libro electrónico -
8512Publicado 2018Tabla de Contenidos:Libro electrónico
-
8513Publicado 2020Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Book 1: An Accounting Primer -- Chapter 1 Principles of Accounting -- The Purpose of Accounting -- The big picture -- Managers, investors, and entrepreneurs -- External creditors -- Government agencies -- Business form generation -- Reviewing the Common Financial Statements -- The income statement -- Balance sheet -- Statement of cash flows -- Other accounting statements -- Putting it all together -- The Philosophy of Accounting -- Revenue principle -- Expense principle -- Matching principle -- Cost principle -- Objectivity principle -- Continuity assumption -- Unit-of-measure assumption -- Separate-entity assumption -- A Few Words about Tax Accounting -- Chapter 2 Double-Entry Bookkeeping -- The Fiddle-Faddle Method of Accounting -- How Double-Entry Bookkeeping Works -- The accounting model -- Talking mechanics -- Almost a Real-Life Example -- Recording rent expense -- Recording wages expense -- Recording supplies expense -- Recording sales revenue -- Recording cost of goods sold -- Recording the payoff of accounts payable -- Recording the payoff of a loan -- Calculating account balance -- Using T-account analysis results -- A Few Words about How QuickBooks Works -- Chapter 3 Special Accounting Problems -- Working with Accounts Receivable -- Recording a sale -- Recording a payment -- Estimating bad-debt expense -- Removing uncollectible accounts receivable -- Recording Accounts Payable Transactions -- Recording a bill -- Paying a bill -- Taking some other accounts payable pointers -- Inventory Accounting -- Dealing with obsolete inventory -- Disposing of obsolete inventory -- Dealing with inventory shrinkage -- Accounting for Fixed Assets…”
Libro electrónico -
8514por Benedetelli, DanieleTabla de Contenidos: “…the timer block -- conclusion -- Comic continued -- 11. building the SUP3R CAR -- main assembly -- hood assembly -- main assembly -- car roof assembly -- main assembly -- steering assembly -- main assembly -- building the R3MOTE -- conclusion -- Comic continued -- 12. programming the SUP3R CAR -- electronic vs. mechanical differentials -- using variables -- using arrays -- using the variable block with numeric and logic arrays -- using the array operations block -- using the switch block with multiple cases -- running parallel sequences (multitasking) -- building the My Blocks -- the ResetSteer My Block -- the Steer My Block -- the Drive My Block -- the ReadRemote2 My Block -- programming the car to drive around -- programming the car for remote control -- using arrays to clean up the Read Remote My Block -- programming the car to follow the beacon -- the Sign My Block -- the Saturation My Block -- the ReadBeacon My Block -- the range block -- the Followbeacon program -- adding a siren effect to the SUP3R CAR -- the loop interrupt block -- the stop program block -- conclusion -- Comic continued -- 13. building the SENTIN3L -- main assembly -- right leg assembly -- main assembly -- left leg assembly -- main assembly -- chest assembly -- main assembly -- left arm assembly -- right arm assembly -- main assembly -- back shield assembly -- back shield middle subassembly -- continuing the back shield assembly -- head subassembly -- completing the back shield assembly -- main assembly -- building the COLOR CUB3 -- conclusion -- Comic continued -- 14. programming the SENTIN3L -- the file access block -- creating and deleting a file and writing data -- reading data from a file -- detecting the end of a file -- the random block -- building the My Blocks -- the ResetLegs My Block -- the WalkFWD My Block -- the Laser My Block -- the Turn My Block…”
Publicado 2013
Libro electrónico -
8515por Pindyck, Robert S.Tabla de Contenidos: “…-- Corporate Decision Making: The Toyota Prius -- Public Policy Design: Fuel Efficiency Standards for the Twenty-First Century -- Summary -- Questions for Review -- Exercises -- 2 The Basics of Supply and Demand -- 2.1 Supply and Demand -- The Supply Curve -- The Demand Curve -- 2.2 The Market Mechanism -- 2.3 Changes in Market Equilibrium -- 2.4 Elasticities of Supply and Demand -- Point versus Arc Elasticities -- 2.5 Short-Run versus Long-Run Elasticities -- Demand -- Supply -- *2.6 Understanding and Predicting the Effects of Changing Market Conditions -- 2.7 Effects of Government Intervention-Price Controls -- Summary -- Questions for Review -- Exercises -- Part Two Producers, Consumers, and Competitive Markets -- 3 Consumer Behavior -- Consumer Behavior -- 3.1 Consumer Preferences -- Market Baskets -- Some Basic Assumptions about Preferences -- Indifference Curves -- Indifference Maps -- The Shape of Indifference Curves -- The Marginal Rate of Substitution -- Perfect Substitutes and Perfect Complements -- 3.2 Budget Constraints -- The Budget Line -- The Effects of Changes in Income and Prices -- 3.3 Consumer Choice -- Corner Solutions -- 3.4 Revealed Preference -- 3.5 Marginal Utility and Consumer Choice -- Rationing -- *3.6 Cost-of-Living Indexes -- Ideal Cost-of-Living Index -- Laspeyres Index -- Paasche Index…”
Publicado 2018
Libro electrónico -
8516Publicado 2023Tabla de Contenidos: “…-- 4.5 (Reframed:) In the Future, In What Ways Might It Be Possible, If at All, to Elaborate and Support the Mechanisms of Teaching for Robust Understanding, and to Understand the Impact of the Contexts Within Which Teaching Takes Place? …”
Libro electrónico -
8517Publicado 2023Tabla de Contenidos: “…Diseases-An Updated Perspective -- Reprinted from: Plants 2021, 10, 1228, doi:10.3390/plants10061228 377 -- Sifeddine Rafik, Mohamed Rahmani, Juan Pablo Rodriguez, Said Andam, Amine Ezzariai -- and Mohamed El Gharous et al. -- How Does Mechanical Pearling Affect Quinoa Nutrients and Saponin Contents? …”
Libro electrónico -
8518por Wahli, UeliTabla de Contenidos: “…Web services standards -- Categorization of Web services standards -- Core standards -- SOAP: Simple Object Access Protocol -- WSDL: Web Services Description Language -- UDDI: Universal Description, Discovery, and Integration -- XML -- Description and discovery -- WS-Inspection: Web Services Inspection Language (WSIL) -- WS-Discovery -- WS-MetadataExchange -- WS-Policy -- WS-PolicyAssertions -- WS-PolicyAttachement -- DNS Endpoint Discovery (DNS-EPD) -- Messaging -- ASAP: Asynchronous Services Access Protocol -- SOAP Messages with Attachments (SwA) -- SOAP Message Transmission Optimization Mechanism -- WS-Addressing -- WS-Notification -- WS-Eventing -- WS-Enumeration -- WS-MessageDelivery -- WS-Reliability -- WS-ReliableMessaging -- WS-Resources -- WS-Transfer -- Management -- WSDM: Web Services Distributed Management -- WS-Manageability -- SPML: Service Provisioning Markup Language -- WS-Provisioning -- Business processes -- BPEL: Business Process Execution Language -- WS-CDL -- WS-CAF -- Transactions -- WS-Coordination (WS-COOR) -- WS-Transaction -- WS-AtomicTransaction (WS-AT) -- WS-BusinessActivity (WS-BA) -- Security -- XML-Encryption -- XML-Signature -- WS-Security -- WS-SecureConversation -- WS-SecurityPolicy -- WS-Trust -- WS-Federation -- SAML: Security Assertion Markup Language -- User experience -- WSRP: Web Services for Remote Portlets -- J2EE 1.4 and Java JSRs…”
Publicado 2005
Libro electrónico -
8519por Cunico, HernanTabla de Contenidos: “…8.3 EJB and data bean best practices -- 8.3.1 Customizing WebSphere Commerce tables -- 8.3.2 Customizing WebSphere Commerce EJBs -- 8.3.3 SQL security considerations -- 8.3.4 Using well-formed ejbCreate constructors -- 8.3.5 Lazy fetch data retrieval -- 8.3.6 Handling database vendor specific code -- 8.3.7 Using session beans -- 8.3.8 Managing concurrent updates -- 8.3.9 Flush remote method -- 8.3.10 Generating primary keys -- 8.4 Best practices for JSP programming -- 8.4.1 Using JSTL in place of Java code -- 8.4.2 Using WebSphere Commerce activation tags -- 8.4.3 Using WebSphere Commerce maps to get request parameters -- 8.4.4 Using StoreErrorDataBean for error handling -- 8.4.5 Using an appropriate includes mechanism -- 8.4.6 Using the JSPF file extension for JSP segments -- 8.4.7 Using the escapeXml attribute to preserve HTML formatting -- 8.4.8 Ensuring XHTML compliance -- 8.4.9 Using CSS to separate layout from content -- 8.4.10 Adding id attributes to links and form elements -- 8.4.11 Invoking controller commands from within a JSP page -- 8.4.12 Using the post method for form submission -- 8.5 Command best practices -- 8.5.1 New command naming and hierarchy -- 8.5.2 Using constants to hold class and method name -- 8.5.3 Command error handling -- 8.5.4 Tracing -- 8.6 General security considerations -- 8.6.1 Access control -- 8.6.2 Encrypting sensitive information -- 8.6.3 Protecting sensitive configuration files -- 8.6.4 Protecting sensitive parameters -- 8.6.5 Avoiding default credentials and port numbers -- Chapter 9. …”
Publicado 2005
Libro electrónico -
8520Publicado 2023Tabla de Contenidos: “…-- Making sure we are ready with UITableView -- "How does the queuing mechanism work in a UITableView, and what are some best practices for optimizing its performance?" …”
Libro electrónico