Mostrando 4,761 - 4,780 Resultados de 6,504 Para Buscar '"The Set Up"', tiempo de consulta: 0.29s Limitar resultados
  1. 4761
    Publicado 2004
    Tabla de Contenidos: “…Practical procedures for high availability -- 5.1 Introduction -- 5.1.1 Out test case scenario -- 5.2 Library Server HACMP -- 5.2.1 Software installation -- 5.2.2 Library Server parameter values -- 5.2.3 File system setup and user IDs creation -- 5.2.4 DB2 and Content Manager instance creation on primary node -- 5.2.5 Setting up shared disks and LVM -- 5.2.6 DB2 and Content Manager instance creation on secondary node -- 5.2.7 HACMP topology configuration -- 5.2.8 Defining resource groups -- 5.2.9 HACMP post-configuration procedures -- 5.3 Resource Manager replication -- 5.3.1 Initial parameter definitions -- 5.3.2 Resource Manager installation and configuration -- 5.3.3 Cross-referencing server definitions -- 5.3.4 Enable collections for replication -- 5.3.5 Adjust replication schedule -- 5.3.6 Adjust Resource Manager fail-over settings -- 5.3.7 Replication test -- 5.4 The rest of the environment -- 5.4.1 Tivoli Storage Manager…”
    Libro electrónico
  2. 4762
    Publicado 2024
    Tabla de Contenidos: “…Intro -- Near Extensions and Alignment of Data in R -- Contents -- Preface -- Overview -- Structure -- 1 Variants 1-2 -- 1.1 The Whitney Extension Problem -- 1.2 Variants (1-2) -- 1.3 Variant 2 -- 1.4 Visual Object Recognition and an Equivalence Problem in R -- 1.5 Procrustes: The Rigid Alignment Problem -- 1.6 Non-rigid Alignment -- 2 Building -distortions: Slow Twists, Slides -- 2.1 c-distorted Diffeomorphisms -- 2.2 Slow Twists -- 2.3 Slides -- 2.4 Slow Twists: Action -- 2.5 Fast Twists -- 2.6 Iterated Slow Twists -- 2.7 Slides: Action -- 2.8 Slides at Different Distances -- 2.9 3D Motions -- 2.10 3D Slides -- 2.11 Slow Twists and Slides: Theorem 2.1 -- 2.12 Theorem 2.2 -- 3 Counterexample to Theorem 2.2 (part (1)) for card (E )&gt -- d -- 3.1 Theorem 2.2 (part (1)), Counterexample: k&gt -- d -- 3.2 Removing the Barrier k&gt -- d in Theorem 2.2 (part (1)) -- 4 Manifold Learning, Near-isometric Embeddings, Compressed Sensing, Johnson-Lindenstrauss and Some Applications Related to the near Whitney extension problem -- 4.1 Manifold and Deep Learning Via c-distorted Diffeomorphisms -- 4.2 Near Isometric Embeddings, Compressive Sensing, Johnson-Lindenstrauss and Applications Related to c-distorted Diffeomorphisms -- 4.3 Restricted Isometry -- 5 Clusters and Partitions -- 5.1 Clusters and Partitions -- 5.2 Similarity Kernels and Group Invariance -- 5.3 Continuum Limits of Shortest Paths Through Random Points and Shortest Path Clustering -- 5.3.1 Continuum Limits of Shortest Paths Through Random Points: The Observation -- 5.3.2 Continuum Limits of Shortest Paths Through Random Points: The Set Up -- 5.4 Theorem 5.6 -- 5.5 p-powerWeighted Shortest Path Distance and Longest-leg Path Distance -- 5.6 p-wspm,Well Separation Algorithm Fusion -- 5.7 Hierarchical Clustering in Rd -- 6 The Proof of Theorem 2.3 -- 6.1 Proof of Theorem 2.3 (part(2))…”
    Libro electrónico
  3. 4763
    Publicado 2022
    Tabla de Contenidos: “…Installing Kubebuilder -- Creating a Project -- Adding a Custom Resource to the Project -- Building and Deploying Manifests -- Running the Manager Locally -- Personalizing the Custom Resource -- Editing the Go Structures -- Enabling the Status Subresource -- Defining Printer Columns -- Regenerating the Files -- Implementing the Reconcile Function -- Adding RBAC Annotations -- Deploying the Operator on the Cluster -- Creating a New Version of the Resource -- Defining a New Version -- Implementing Hub and Convertible -- Setting Up the webhook -- Updating kustomization Files -- Using Various Versions -- Conclusion -- Index…”
    Libro electrónico
  4. 4764
    por Jakobsen, Adam Tilmar
    Publicado 2024
    Tabla de Contenidos: “…8.5.3.2 DNS Configuration -- 8.5.3.3 Wi‐Fi SSID -- 8.5.4 File Execution and Information -- 8.5.4.1 Cronjobs -- 8.5.4.2 Processes -- 8.5.4.3 SGID -- 8.5.4.4 SUID -- 8.5.5 External Drive -- 8.5.5.1 Dmesg -- 8.5.5.2 USB Log -- 8.5.6 Persistence -- 8.5.6.1 Cron Jobs -- 8.5.6.2 SSH Key Authentication -- 8.6 Summary -- Chapter 9 iOS -- 9.1 File System -- 9.2 Security -- 9.2.1 Keychain -- 9.3 Applications -- 9.4 Acquisition -- 9.4.1 Jailbreaking -- 9.4.2 Locked Devices -- 9.5 iCloud -- 9.6 Analysis -- 9.6.1 KnowledgeC -- 9.7 Evidence of Location -- 9.7.1 Device Info -- 9.7.1.1 General Device Info -- 9.7.1.2 Operating System Version -- 9.7.1.3 Last Boot Time -- 9.7.2 User Settings -- 9.7.2.1 Homescreen Icon Layout -- 9.7.2.2 Cloud Sync Settings -- 9.7.2.3 iCloud Offline Cache -- 9.7.2.4 Blocked Dialers -- 9.7.3 Account and Password -- 9.7.3.1 Account Information -- 9.7.3.2 Account Information Used to Set Up Apps -- 9.7.3.3 iCloud Email Account Information -- 9.7.4 Communication -- 9.7.4.1 Call Log -- 9.7.4.2 SMS, iMessage, and FaceTime -- 9.7.4.3 Voicemail -- 9.7.5 Application Usage -- 9.7.5.1 TCC.db -- 9.7.5.2 Application Snapshots -- 9.7.5.3 Contacts -- 9.7.5.4 Contact Images -- 9.7.5.5 Calendar -- 9.7.5.6 Notes -- 9.7.5.7 Health Data -- 9.7.6 Device Backup -- 9.7.6.1 iTunes Backup -- 9.7.7 Third‐Party Apps -- 9.7.7.1 App‐Specific Data -- 9.7.7.2 App‐Specific Cache -- 9.7.8 Multimedia -- 9.7.8.1 User Created/Saved Photos -- 9.7.8.2 Picture Thumbnails Databases -- 9.7.8.3 Photo Albums Metadata -- 9.7.8.4 Photos and Videos Database -- 9.7.9 Browser Activity -- 9.7.9.1 History -- 9.7.9.2 Safari Bookmarks -- 9.7.9.3 Safari Cookies -- 9.7.9.4 Safari Download History -- 9.7.9.5 Safari Tabs Screenshots -- 9.7.10 Location -- 9.7.10.1 Apple Maps History -- 9.7.10.2 Application Traces and GeoFence Information -- 9.7.10.3 Cache&amp -- uscore -- encryptedB…”
    Libro electrónico
  5. 4765
    Publicado 2018
    Tabla de Contenidos: “…The style of the Node.js core API -- The npm ecosystem -- Setting up Node.js -- Node.js development -- Working with the filesystem -- Working with databases -- Working with REST APIs -- Hello world (http) -- Hello world (Express.js) -- Routing with Express -- Express middleware -- Architecting Node.js application - the MVC design pattern -- Model -- Repository -- Controller -- Database -- View -- Index -- Controllers and routing with inversify-express-utils -- Model, repository, database, and view -- Types -- Controller -- InversifyJS configuration -- Index -- Other applications of Node.js -- Summary -- Chapter 11: Frontend Development with React and TypeScript -- Working with React -- About the sample application -- Serving a React application with Node.js -- Working with react-dom and JSX -- Working with the react-router -- Working with React components -- Components as classes -- Properties and state -- Functional stateless components -- React component life cycle -- Smart components and dumb components -- Working with MobX -- Understanding the MobX architecture -- Working with actions and observables -- Dependency injection in MobX -- MobX alternatives -- Development tools -- Summary -- Chapter 12: Frontend Development with Angular and TypeScript -- Working with Angular -- About the sample application -- Serving an Angular application with Node.js -- Bootstrapping an Angular application -- Working with NgModules -- Working with Angular components -- Our first component -- Components and directives -- Data binding -- Working with @Attribute and @Input -- Using structural directives -- Using the &lt -- ng-content&gt -- directive -- Working with @Output and EventEmitter -- Working with the component's host -- Working with the Angular router -- Angular component life cycle hooks -- Working with services -- Smart components and dumb components…”
    Libro electrónico
  6. 4766
    Publicado 2018
    Tabla de Contenidos: “…-- Contradictions -- Hesitation -- Behavioral changes -- Gestures -- NLP -- Codes of NLP -- Voice -- Sentence structuring -- Word choice -- Interview and interrogation -- Expert interrogation techniques -- Gesturing -- Attentive listening -- Building rapport -- Human buffer overflow -- Fuzzing the brain -- Embedded commands -- Tips -- Summary -- Chapter 3: Influence and Persuasion -- Introduction -- Five fundamental aspects of persuasion -- Setting up the environment -- Influence tactics -- Reciprocation -- Obligation -- Concession -- Scarcity -- Authority -- Legal authority -- Organizational authority -- Social authority -- Commitment and consistency -- Liking -- Social proof -- Reality alteration (framing) -- Manipulation -- Negative manipulation tactics…”
    Libro electrónico
  7. 4767
    Publicado 2022
    Tabla de Contenidos: “…Using the Mobile APP Bluetooth Terminal -- Changing the PIN on the HC-06 -- Using AT Commands -- Using Tera Term to Change the PIN -- Using PuTTY to Program the HC-06 -- Programming the HC-06 with AT Command from the PIC Micro -- Analysis of Listing 8-2 -- The HC-SR501 PIR Motion Sensor -- Analysis of Listing 8-3 -- Summary -- Chapter 9: Communication -- Getting the PIC to Communicate with Other Devices -- The SPI Mode -- The Buffer Full (BF) Flag in the SSPSTAT Register -- Synchronizing the Sequence -- SSPSTAT Register -- The SSPCON1 Register -- Using the SPI to Read from the TC72 -- Operating Modes for the TC72 -- The Registers of the TC72 -- The Algorithm for Using the TC72 -- Displaying the Temperature Reading -- Binary Numbers -- Adding Binary Numbers -- Analysis of Listing 9-1 -- Reading the Temperature from the TC72 -- Examples of the 2's Complement Process -- Using the Sprintf Function -- Analysis of Listing 9-2 -- Comparing the Two Approaches -- Using the PIC18f4525 as the Slave -- Analysis of Listing 9-3 -- Analysis of Listing 9-4 -- Summary -- Chapter 10: Using the I2C Protocol -- I2C Communication Protocol -- EEPROM -- 24LC256 EEPROM -- Writing to the EEPROM -- Reading from the EEPROM -- TC74 Temperature Sensor -- Reading the Temperature -- Using I2C with 24LC256 and TC74 -- Analysis of Listing 10-1 -- That Little Thought -- Summary -- Chapter 11: Using the UART -- UART at a Glance -- Interrupts and How They Work -- Analysis of Listing 11-1 -- The Baud Rate -- Using Tera Term -- Using Handshaking -- Analysis of Listing 11-2 -- Two PICs Communicate via the UART -- Analysis of Listing 11-3 -- Summary -- Chapter 12: Real-Time Clock and Interrupts -- The RTC Program -- Analysis of Listing 12-1 -- The DS1307 RTC Module -- Setting Up and Reading from the DS1307 -- The I2C Protocol -- Writing to the Slave -- The Start Bit…”
    Libro electrónico
  8. 4768
    Publicado 2022
    Tabla de Contenidos: “…-- READER SUPPORT FOR THIS BOOK -- PART I: Getting Started with Python -- Lesson 1: Setting Up a Python Programming Environment -- PYTHON OVERVIEW -- USING REPLIT ONLINE -- GETTING STARTED WITH JUPYTER NOTEBOOK -- A QUICK LOOK AT VISUAL STUDIO CODE -- USING PYTHON FROM THE COMMAND LINE -- SUMMARY -- EXERCISES -- Lesson 2: Understanding Programming Basics -- THE FUTURE OF COMPUTER PROGRAMMING -- PROGRAMMING LANGUAGES -- DATA TYPES AND VARIABLES -- SUMMARY -- EXERCISES -- Lesson 3: Exploring Basic Python Syntax -- USING WITH SINGLE-LINE COMMANDS -- USING SEMICOLONS -- CONTINUING WITH BACKSLASH -- WORKING WITH CASE STRUCTURE -- ADDING COMMENTS -- USING THE INPUT FUNCTION -- STORING INPUT -- UNDERSTANDING VARIABLE TYPES -- DISPLAYING VARIABLE VALUES -- NAMING VARIABLES -- SUMMARY -- EXERCISES -- Lesson 4: Working with Basic Python Data Types -- REVIEW OF DATA TYPES -- NUMBER DATA TYPES -- IDENTIFYING DATA TYPES -- MATHEMATICAL OPERATIONS -- PEMDAS -- COMMON MATH FUNCTIONS -- MATH LIBRARY FUNCTIONS -- USING NUMBERS WITH USER INPUT -- BOOLEAN TYPES AND BOOLEAN OPERATIONS -- LOGIC OPERATIONS -- COMPARATIVE OPERATORS -- SUMMARY -- EXERCISES -- Lesson 5: Using Python Control Statements -- CONTROL STRUCTURES REVIEW -- UNDERSTANDING SEQUENCE CONTROL STRUCTURE -- UNDERSTANDING SELECTION STATEMENTS -- UNDERSTANDING CONDITIONAL STATEMENTS -- IF-ELSE STATEMENTS -- WORKING WITH NESTED CONDITIONS -- EMBEDDING CONDITIONS -- SUMMARY -- EXERCISES -- Lesson 6: Pulling It All Together: Income Tax Calculator -- GETTING STARTED -- STEP 1: GATHER REQUIREMENTS -- STEP 2: DESIGN THE PROGRAM -- STEP 3: CREATE THE INPUTS -- STEP 4: CALCULATE THE TAXABLE INCOME -- STEP 5: CALCULATE THE TAX RATE -- STEP 6: UPDATE THE APPLICATION -- STEP 7: ADDRESS THE UI -- ON YOUR OWN -- SUMMARY…”
    Libro electrónico
  9. 4769
    Publicado 2021
    Tabla de Contenidos: “…Security by cloud models -- Data security in the cloud -- Securing Kubernetes and APIs -- Cloud-native security -- Controlling access to the Kubernetes API -- Controlling access to kubelet -- Preventing containers from loading unwanted kernel modules -- Restricting access to etcd -- Avoiding the use of alpha or beta features in production -- Third-party integrations -- Hardening database services -- Testing your cloud security -- Azure Security Center -- Amazon CloudWatch -- AppDynamics -- Nessus vulnerability scanner -- InsightVM -- Intruder -- Summary -- Further reading -- Chapter 12: Mastering Web App Security -- Technical requirements -- Gathering intelligence about your site/web application -- Importance of public data gathering -- Open Source Intelligence -- Hosting information -- Checking data exposure with Google hacking (dorks) -- Leveraging DVWA -- Installing DVWA on Kali Linux -- Overviewing the most common attacks on web applications -- Exploring XSS attacks -- Using Burp Suite -- Burp Suite versions -- Setting up Burp Suite on Kali -- SQL injection attack on DVWA -- Fixing a common error -- Brute forcing web applications' passwords -- Analyzing the results -- Summary -- Further reading -- Section 3: Deep Dive into Defensive Security -- Chapter 13: Vulnerability Assessment Tools -- Technical requirements -- Dealing with vulnerabilities -- Who should be looking for vulnerabilities? …”
    Libro electrónico
  10. 4770
    Tabla de Contenidos: “…Very few difficulties setting up a business -- 4.4.2. Businesses call for a more predictable operating environment -- 4.4.3. …”
    Libro electrónico
  11. 4771
    Publicado 2016
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Moodle Installation -- Moodle installation - an overview -- Choosing the best setup -- Moodle prerequisites -- Hardware requirements -- Software requirements -- Installation in a LAMP environment -- Downloading Moodle -- Creating the Moodle database and the data directory -- Using a hosted server -- Using the command line -- Creating the Moodle data directory -- Running the installer script -- Finalizing the installation -- Setting up the cron process -- Installation in a Windows environment -- Installation in a Mac OS X environment -- Installation via the Command Line Interface -- Updating Moodle -- Manual update -- Creating a backup -- Creating your new Moodle system -- Running the update script -- Updating Moodle via CLI -- Update notifications -- Summary -- Chapter 2: The Moodle System -- Moodle architecture -- The LAMP architecture -- The Moodle layer -- Code and data locations -- Finding your way around in Moodle -- The Navigation bar -- The administrator search facility -- Moodle bookmarks -- Moodle Docs and Help -- File management -- The Moodle file management interface -- Uploading files -- Private files -- To link or to copy? …”
    Libro electrónico
  12. 4772
    Publicado 2014
    Tabla de Contenidos: “…SOVEREIGN SUKUK -- SUKUK -- DEBT CAPITAL MARKETS -- REGULATORY ISSUES -- CROSS-BORDER FINANCING -- CONCLUSION -- ABOUT THE AUTHOR -- Chapter 15: Kenya -- ISLAMIC FINANCE BANKS -- ISLAMIC WINDOWS -- MICROFINANCE -- TAKAFUL AND RE- TAKAFUL -- ISLAMIC CAPITAL MARKETS -- SUKUK AND DEBT CAPITAL MARKETS -- REGULATORY CHALLENGES AND SHARI'AH CONCERNS -- THE TECHNOLOGY INDUSTRY AND ISLAMIC FINANCE -- CONCLUSION -- NOTES -- ABOUT THE AUTHOR -- Chapter 16: Kuwait -- ASSET MANAGEMENT -- TAX AND ACCOUNTING -- RETAIL AND MICROFINANCE -- ISLAMIC BANKING -- TAKAFUL AND RE- TAKAFUL -- SOVEREIGN WEALTH FUNDS -- Engaging in Prudent Investment Practices -- Spearheading the Economic Development Agenda -- Enhancing the Domestic Financial Services Sector -- Supporting Kuwait's Real Estate Market -- Playing a Major Role in Domestic Health Care -- Building Kuwait's SMEs -- SUKUK -- DEBT CAPITAL MARKETS -- Equities -- The Securitisation Market -- REGULATION -- CROSS-BORDER FINANCINGS -- CONCLUSION -- ABOUT THE AUTHOR -- Chapter 17: Luxembourg -- ASSET MANAGEMENT -- Adaptability of the Undertakings for Collective Investment in Transferable Securities -- Alternative Investment Funds -- MICROFINANCE -- TAKAFUL AND RE- TAKAFUL -- SOVEREIGN WEALTH FUNDS -- SUKUK AND DEBT CAPITAL MARKETS -- The Securitisation Law of 2004 -- Listing of Sukuk -- REGULATORY ISSUES -- Setting Up a Shari'ah Board -- Rules Applicable to Sukuk -- Discrepancies between the Luxembourg Law and Shari'ah Principles -- TAX AND ACCOUNTING -- Tax Treatment of the Murabahah Contract -- Tax Treatment of Sukuk -- Financial Reporting Standards -- CROSS-BORDER FINANCING -- CONCLUSION -- NOTES -- ABOUT THE AUTHORS -- Chapter 18: Malaysia -- ISLAMIC BANKING -- ASSET MANAGEMENT -- Mutual Funds -- Exchange Traded Funds -- Endowment Funds -- Wealth Assets -- TAX AND ACCOUNTING -- Financial Reporting Standards…”
    Libro electrónico
  13. 4773
    Publicado 2022
    Tabla de Contenidos:
    Libro electrónico
  14. 4774
    por Nomani, Qamar
    Publicado 2024
    Tabla de Contenidos: “…-- Onboarding containers to CSPM tools -- Understanding Microsoft Defender for Containers features -- Defender for Containers architecture diagram -- Enabling Microsoft Defender for Containers for Kubernetes clusters -- Onboarding roadblocks and mitigation tips -- Latest trends and advancements in container security -- Summary -- Further reading -- Chapter 8: Exploring Environment Settings -- Environment settings overview -- Managing users and permissions -- User management -- User group management -- Built-in user roles -- Managing API tokens -- Key challenges in permission management -- Best practices to overcome permission-related challenges -- CSPM integrations with other tools -- SSO integration -- Ticketing system integration -- Collaboration and communication (notifications) integrations -- Reporting and analytics integration -- Monitoring (SIEM/SOAR) tool integration -- Storage integrations -- Key integration challenges -- Best practices to overcome integration challenges -- Setting up an effective reporting environment -- Activity logging -- User activities -- System activities -- Security events -- Challenges in activity logging -- Best practices for activity logging -- Summary -- Further reading -- Part 3: Security Posture Enhancement -- Chapter 9: Exploring Cloud Asset Inventory -- Understanding the cloud asset inventory landscape -- Cloud assets overview -- Cloud asset classification -- Tagging concepts and asset classification -- Key challenges in asset inventory management…”
    Libro electrónico
  15. 4775
    Publicado 2017
    Tabla de Contenidos: “…Installing and Managing Software by Using Microsoft Office 365 and Windows Store Apps -- Sideloading Apps into Online and Offline Images -- Integrating Microsoft Accounts Including Personalization Settings -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 9 Managing Authorization and Authentication -- Understanding User Accounts -- Account Types -- Built-In Accounts -- Local and Domain User Accounts -- Working with User Accounts -- Using the Local Users and Groups Utility -- Using the User Accounts Option in Control Panel -- Creating New Users -- Disabling User Accounts -- Deleting User Accounts -- Renaming User Accounts -- Changing a User's Password -- Using a Microsoft Passport, Pictures, and Biometrics -- Using Device Guard -- Understanding Credential Guard -- Configuring Device Health Attestation -- Managing User Properties -- Managing User Group Membership -- Setting Up User Profiles, Logon Scripts, and Home Folders -- Troubleshooting User Account Authentication -- Managing and Creating Groups -- Using Built-In Groups -- Creating Groups -- Managing Group Membership -- Deleting Groups -- Managing Security Using GPOs and LGPOs -- Understanding the GPO and LGPO Basics -- Using the Group Policy Result Tool -- Managing and Applying LGPOs -- Configuring Local Security Policies -- Using Account Policies -- Using Local Policies -- Configuring User Account Control -- Privilege Elevation -- Registry and File Virtualization -- Understanding Smart Cards -- Configuring Remote Management -- Remote Assistance -- Remote Desktop -- Configuring a VPN Connection -- Transparent Caching -- Broadband Tethering -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 10 Configuring Monitoring and Recovery -- Understanding Recovery -- Knowing the Advanced Boot Options -- Starting in Safe Mode -- Enabling Boot Logging…”
    Libro electrónico
  16. 4776
    Publicado 2023
    Tabla de Contenidos: “…-- The tradeoff between assertion and image recognition -- Designing your own system -- Toward specification by example -- Specification by example -- Low-code and no-code test automation -- Batch- and model-driven test automation -- This chapter is completely wrong -- Summary -- Chapter 5: Specialized Testing -- Technical requirements -- Understanding load and performance testing -- Getting to know the basics of load testing -- Setting up a load test -- Exploring security testing -- Security concepts -- Checking out common security vulnerabilities -- Learning about industry standards -- Investigating some security testing tools -- Delving into accessibility testing -- What is accessibility? …”
    Libro electrónico
  17. 4777
    Publicado 2023
    Tabla de Contenidos: “…The government should develop tools to raise firms' awareness of and ability to cope with regulatory changes -- Priority 2: Judicial capacity and independence registered some progress, but dispute resolution tools can be further improved -- Judicial and dispute resolution reforms have been a priority for the government -- Recent judicial reform has focussed on strengthening judicial capacity and independence -- Advancing fair and accessible dispute resolution for businesses has become a priority for the government -- Despite improvements, contract enforcement and dispute resolution continue to be perceived as a major challenge for businesses -- Dispute resolution reforms need to be inclusive -- Dispute resolution can sometimes lack impartiality -- The absence of specialised judges weakens the protection of intellectual property rights -- More support to domestic businesses' use of dispute resolution tools, and an improved protection of intellectual property rights are required for better contract enforcement -- The government should pursue its efforts to improve the quality of the court system -- The government should improve domestic businesses' awareness of available alternative dispute resolution tools -- The government should set up an effective institutional framework for intellectual property rights enforcement -- Priority 3: Trade procedures have become more accessible and protective of IP rights, but restrictions to trade remain in the services sector -- Kazakhstan has improved the regulatory framework, with a focus on digitalisation of procedures and intellectual property rights -- Implementation lags behind for trade facilitation and regulatory barriers to services trade remain -- Implementation and access to trade-related information remain an issue for businesses…”
    Libro electrónico
  18. 4778
    Publicado 2003
    Tabla de Contenidos: “…Prerequisites: Getting ready for SSO -- 2.1 iSeries server software requirements -- 2.1.1 Program temporary fixes -- 2.2 Working with WebSphere Application Server - Express V5 -- 2.2.1 Using QShell to start or stop WebSphere Application Server - Express -- 2.2.2 Removing a WebSphere Application Server - Express instance -- 2.3 Setting up the Domino example used in this book -- 2.3.1 Copying the Domino database to the Domino server's data directory -- 2.3.2 Signing the Domino database -- 2.3.3 Changing the Domino application -- 2.3.4 Testing the Domino application from a Web browser -- Chapter 3. …”
    Libro electrónico
  19. 4779
    Publicado 2017
    Tabla de Contenidos: “…. -- How it works... -- See also -- Setting up a PowerShell profile -- How to do it... -- How it works... -- There's more... -- See also -- Understanding the pipeline -- How to do it... -- How it works... -- There's more... -- See also -- Working with variables and objects -- How to do it... -- How it works... -- There's more... -- Variable expansion in strings -- Strongly typed variables -- Working with arrays and hash tables -- How to do it... -- How it works... -- There's more... -- See also -- Looping through items -- How to do it... -- How it works... -- There's more... -- See also -- Creating custom objects -- How to do it... -- How it works... -- There's more... -- See also -- Using debugger functions -- How to do it... -- How it works... -- There's more... -- See also -- Understanding the new execution policy -- How to do it... -- How it works... -- There's more... -- See also -- Using the Save-Help function -- How to do it... -- How it works... -- See also -- Working with script repositories -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 2: Exchange Management Shell Common Tasks -- Introduction -- Performing some basic steps -- Manually configuring remote PowerShell connections -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also…”
    Libro electrónico
  20. 4780
    Publicado 2017
    Tabla de Contenidos: “…Implementing a prime number counting algorithm -- How to code the power digit sum algorithm -- Implementing a humanize counting algorithm -- Implementing a date algorithm -- How to code a Fibonacci digit counter -- Implementing a permutation algorithm -- Implementing an amicable number algorithm -- Implementing a factorial algorithm -- Implementing an even Fibonacci number algorithm -- Implementing the least common multiple -- Summary -- Chapter 19: Machine Learning -- Big data analysis -- Basic decision tree implementation -- Addition of attributes -- Addition of training data and its values -- Calling the ID3 method -- Function of the train method -- Addition of the test method -- Setting up decision variables -- Print the results out -- Testing the program -- Advantage of decision trees over if...else statements -- How to develop a big data analysis application in Ruby -- Summary -- Index…”
    Libro electrónico