Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Transport 612
- Transportation 522
- Transporte 430
- Business & Economics 369
- Transportation Economics 287
- Transportes 246
- Transporte acuático 230
- Historia 215
- Economic conditions 143
- Engineering & Applied Sciences 139
- Computer networks 126
- History 123
- Environmental aspects 116
- Economics 115
- Ferrocarriles 114
- Economic policy 112
- Technology: general issues 109
- History of engineering & technology 108
- Innovaciones tecnológicas 108
- European Conference of Ministers of Transport 106
- Research & information: general 104
- Investigación científica 102
- Management 99
- Derecho marítimo 98
- aspectos económicos 93
- Environment 91
- Transporte ferroviario 89
- Urbanismo 89
- Transportes urbanos 87
- Història 86
-
8921por Xiong, Gang, 1976-Tabla de Contenidos: “…; 1.3 How Do We Benefit from SSME?; 1.3.1 Transportation System; 1.3.2 Logistics System; 1.3.3 Health Care System; 1.3.4 E-Commerce System; 1.3.5 Financial System; 1.4 Summary; References; 2 Servitization Strategy: Priorities, Capabilities, and Organizational Features…”
Publicado 2012
Libro electrónico -
8922Publicado 2015Tabla de Contenidos: “…7.5 VARIABLE GATE RESISTANCE DRIVE7.6 DIGITAL GATE DRIVE; 7.7 SUMMARY; REFERENCES; Chapter 8 - IGBT Models; 8.1 PHYSICS-BASED CIRCUIT MODEL; 8.2 IGBT ANALOG BEHAVIORAL MODEL; 8.3 MODEL PARAMETER EXTRACTION; 8.4 SUMMARY; REFERENCES; Chapter 9 - IGBT Applications: Transportation; 9.1 GASOLINE-POWERED VEHICLES; 9.2 ELECTRIC AND HYBRID-ELECTRIC VEHICLES; 9.3 EV CHARGING STATIONS; 9.4 ELECTRIC TRANSIT BUS; 9.5 ELECTRIC TRAMS AND TROLLEYS; 9.6 SUBWAY AND AIRPORT TRAINS; 9.7 ELECTRIC LOCOMOTIVES; 9.8 DIESEL-ELECTRIC LOCOMOTIVES; 9.9 HIGH-SPEED ELECTRIC TRAINS; 9.10 MARINE PROPULSION…”
Libro electrónico -
8923Publicado 2011Tabla de Contenidos: “…Rosenbloom -- Business uses of life insurance -- Appendix A: to Chapter 15: permanent life insurance plans and features -- Appendix B: to Chapter 15: universal life insurance programs / Susan Conant -- Work/life benefits -- Time-off benefits and family and medical leave programs -- Appendix A: to Chapter 16: flsa exempt and nonexempt workers -- Appendix B: to Chapter 16: guidelines for the term "serious health condition" under the family and medical leave act / Serafina Maniaci -- Dependent care programs / Ann Costello -- Selected additional benefits : educational assistance programs, group legal services plans, transportation fringe benefits and voluntary benefits / Craig J. …”
Libro electrónico -
8924por Kaminow, Ivan P., 1930-Tabla de Contenidos: “…2.1 Introduction 2.2 Optical Channel Designs; 2.3 100G Channel-From Wish to Reality; 2.4 Introduction of 100G Channels to Service Provider Networks; 2.5 Impact of Commercial 100G System to Transport Network; 2.6 Outlook Beyond Commercial 100G Systems; 2.7 Summary; References; 3 Advances in Tb/s Superchannels; 3.1 Introduction; 3.2 Superchannel Principle; 3.3 Modulation; 3.4 Multiplexing; 3.4.1 Overview of multiplexing schemes; 3.4.2 Seamless multiplexing; 3.4.2.1 O-OFDM with single-carrier-modulated signals; 3.4.2.2 O-OFDM with OFDM-modulated signals; 3.4.3 Multiplexing with guard band…”
Publicado 2013
Libro electrónico -
8925Publicado 2019Tabla de Contenidos: “…Handling application-level failures -- 6.3. Understanding transport-level failures -- 6.4. Case study: Supervision, failure, chat bots -- Summary -- Chapter 7. …”
Libro electrónico -
8926Satellite networking principles and protocolsSatellite NetworkingPublicado 2014Tabla de Contenidos: “…1.8 The ATM Protocol Reference Model1.8.1 Narrowband ISDN (N-ISDN); 1.8.2 Broadband ISDN (B-ISDN); 1.8.3 ATM Technology; 1.8.4 Reference Model; 1.8.5 Problems: Lack of Available Services and Applications; 1.9 Internet Protocols Reference Model; 1.9.1 Network Layer: IP Protocol; 1.9.2 Network Technologies; 1.9.3 Transport Layer: TCP and UDP; 1.9.4 Application Layer; 1.9.5 QoS and Control on Resources; 1.10 Satellite Network; 1.10.1 Access Network; 1.10.2 Transit Network; 1.10.3 Broadcast Network; 1.10.4 Space Segment; 1.10.5 Ground Segment; 1.10.6 Satellite Orbits…”
Libro electrónico -
8927Publicado 2008Tabla de Contenidos: “…Logistics (L); 2.5.4. Transportation (TA)…”
Libro electrónico -
8928por Schavemaker, PieterTabla de Contenidos: “…5.3.2 Secondary Control or Load Frequency Control (LFC)5.4 Voltage Control and Reactive Power; 5.4.1 Generator Control (AVR); 5.4.2 Tap-changing Transformers; 5.4.3 Reactive Power Injection; 5.5 Control of Transported Power; 5.5.1 Controlling Active Power Flows; 5.5.2 Controlling Reactive Power Flows; 5.5.3 Unified Power-Flow Controller (UPFC); 5.6 Flexible AC Transmission Systems (FACTS); 6 Energy Management Systems; 6.1 Introduction; 6.2 Loadflow or Power Flow Computation; 6.2.1 Loadflow Equations; 6.2.2 General Scheme of the Newton-Raphson Loadflow; 6.2.3 Decoupled Loadflow…”
Publicado 2008
Libro electrónico -
8929por Ribes Ribes, AuroraTabla de Contenidos: “…Impuesto Especial sobre determinados medios de transporte; 2.6.2. Impuesto sobre las ventas minoristas de determinados hidrocarburos; CAPÍTULO II. …”
Publicado 2012
Libro electrónico -
8930Publicado 2017Tabla de Contenidos: “…/ por Verónica Alarcón Sevilla -- La controvertida cuestión reguladora en la economía colaborativa / por Rosalía Alfonso Sánchez -- Economía colaborativa y cooperativismo / por Francisco José Torres Pérez -- La intervención administrativa en la economía colaborativa desde la perspectiva de los servicios de la sociedad de la información /por Julián Valero Torriojos -- El control administrativo en el nuevo régimen jurídico del "crowdfunding" financiero: una visión de conjunto / por María Magnolia Pardo López -- La economía colaborativa desde la perspectiva de la comisión nacional de los mercados y la competencia / por Isabel Girona Cascales y Aitor Pérez Riquelme -- La economía colaborativa en los sectores regulados (I). aspectos mercantiles de las plataformas de financiación participativas / por Fernando L. de la Vega García -- La economía colaborativa en los sectores regulados (II). el sector asegurador / por María Luisa Muñoz Paredes -- La economía colaborativa en los sectores regulados (III). transporte de viajeros / por Juan Manuel Contreras Delgado de Cos, Mateo Silos Ribas y María Sobrino Ruiz -- La economía colaborativa en los sectores regulados (V). alojamientos turísticos / por Juan Manuel Contreras Delgado De Cos, Mateo Silos Ribas y María Sobrino Ruiz -- El contrato de intermediación entre las plataformas colaborativas y sus usuarios / por María Isabel Grimaldos García -- Delimitación de fronteras: diferencias entre trabajo colaborativo y relación laboral no declarada por Alejandra Selma Penalva -- Los nuevos modelos de prestación de servicios y la economía colaborativa: una aproximación jurídico-laboral / por Faustino Cavas Martínez -- La tutela colectiva de los derechos de los trabajadores que operan a través de plataformas colaborativas / por Francisca Ma. …”
Libro -
8931por Navas Cuenca, EstefaníaTabla de Contenidos: “…MANIPULACIÓN MANUAL DE CARGAS -- RIESGOS ASOCIADOS A LA MANIPULACIÓN MANUAL DE CARGAS -- REGLAS PARA UN ADECUADO TRANSPORTE MANUAL DE CARGAS -- LO QUE HEMOS APRENDIDO: TEMA 5 -- MÓDULO 6 TEST 5: MANIPULACIÓN MANUAL DE CARGAS -- TEMA 6. …”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
8932Publicado 2019Tabla de Contenidos: “…Introducción -- 2. Transportes y comunicaciones -- 2.1. Terrestres y fluviales -- 2.2. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
8933por Sautter, HermannTabla de Contenidos: “…The Potentiality of Deregulation -- 1. Road Transport -- 2. Water Transport -- 3. Railways -- 4. …”
Publicado 2022
Libro electrónico -
8934Publicado 2018Tabla de Contenidos: “…Docker breakout -- Poisoned images -- Database passwords and data theft -- Docker bench security -- Docker vulnerability static analysis with Clair -- Building a penetration testing laboratory -- Summary -- Chapter 6: Exploiting Git and Continuous Integration Servers -- Software development methodologies -- Continuous integration -- Types of tests -- Continuous integration versus continuous delivery -- DevOps -- Continuous integration with GitHub and Jenkins -- Installing Jenkins -- Continuous integration attacks -- Continuous integration server penetration testing -- Rotten Apple project for testing continuous integration or continuous delivery system security -- Continuous security with Zed Attack Proxy -- Summary -- Chapter 7: Metasploit and PowerShell for Post-Exploitation -- Dissecting Metasploit Framework -- Metasploit architecture -- Modules -- Exploits -- Payloads -- Auxiliaries -- Encoders -- NOPs -- Posts -- Starting Metasploit -- Bypassing antivirus with the Veil-Framework -- Writing your own Metasploit module -- Metasploit Persistence scripts -- Weaponized PowerShell with Metasploit -- Interactive PowerShell -- PowerSploit -- Nishang - PowerShell for penetration testing -- Defending against PowerShell attacks -- Summary -- Chapter 8: VLAN Exploitation -- Switching in networking -- LAN switching -- MAC attack -- Media Access Control Security -- DHCP attacks -- DHCP starvation -- Rogue DHCP server -- ARP attacks -- VLAN attacks -- Types of VLANs -- VLAN configuration -- VLAN hopping attacks -- Switch spoofing -- VLAN double tagging -- Private VLAN attacks -- Spanning Tree Protocol attacks -- Attacking STP -- Summary -- Chapter 9: VoIP Exploitation -- VoIP fundamentals -- H.323 -- Skinny Call Control Protocol -- RTP/RTCP -- Secure Real-time Transport Protocol -- H.248 and Media Gateway Control Protocol -- Session Initiation Protocol…”
Libro electrónico -
8935Publicado 2021Tabla de Contenidos: “…-- A Little Internet History -- TCP/IP Standards and RFCs -- The TCP/IP Protocol Framework -- Network interface layer -- Network layer -- Transport layer -- Application layer -- Chapter 3 IP Addresses -- Understanding Binary -- Counting by ones -- Doing the logic thing -- Working with the binary Windows Calculator -- Introducing IP Addresses -- Networks and hosts -- The dotted-decimal dance…”
Libro electrónico -
8936Publicado 2022Tabla de Contenidos: “…Updating an Index When Data Is Modified -- Index Rebuilds -- Database Recovery After Failure or Shutdown -- Joins -- Summary -- Chapter 17: Setting Up TPM Attestation -- Prerequisites for Your SQL Server to Support TPM Attestation -- Artifacts That Are Required by Attestation -- TPM Endorsement Key Certificate -- TPM Baseline -- Code Integrity Policy -- Installing and Configuring HGS -- Configuring the SQL Server -- Install the Attestation Client Components -- Making Sure VBS Is Configured Correctly -- Configure the Attestation URL -- Configuring a Code Integrity Policy -- Collect and Register Attestation Artifacts -- Check SQL Server Can Attest Successfully -- Configure the Enclave Type in SQL Server -- Summary -- Part V: Completing the Picture -- Chapter 18: Encryption In Transit Using Transport Layer Security -- How TLS Works -- Obtaining a Certificate to Use for TLS -- Setting Up TLS on Your SQL Server -- Performance -- Summary -- Chapter 19: Hashing and Salting of Passwords -- Hashing -- Salting -- Using the HASHBYTES Function -- Storing Passwords Using HASHBYTES and a Salt Value -- Summary -- Chapter 20: Extensible Key Management (EKM) -- Creating the Required Objects in Azure -- Creating the Resource Group -- Creating the Azure Active Directory App Registration -- Creating the Key Vault -- Setting Up TDE to Use Azure Key Vault -- Creating the Key for TDE -- Setting Up the SQL Server -- Working with Always Encrypted and EKM -- Creating a CMK in Azure Key Vault -- Encrypting Columns and Working with Data -- Working with Azure Key Vault from Your Application -- Summary -- Chapter 21: Other Methods of Column Encryption -- Encryption Using a Symmetric Key -- Your Key Hierarchy -- Working with Automated Key Management -- Creating the Keys -- Encrypting and Decrypting Data -- Using an Authenticator -- Where the DMK Is Not Protected by the SMK…”
Libro electrónico -
8937por OECDTabla de Contenidos: “…A regional fast-ferry service, and better organisation of existing intra-regional maritime transport, could improve intra-regional connectivity and reduce transport costs -- 2.8. …”
Publicado 2022
Libro electrónico -
8938por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Mettre à profit les enseignements des sciences comportementales pour encourager des choix plus viables en matière de transport -- Cadrage des informations relatives à la consommation de carburant, aux émissions et au coût de fonctionnement des véhicules -- Conclusion concernant les choix en matière de transport et de modèle de véhicule -- Notes -- Références -- Évaluation de l'intervention : méthodologie -- Résultats -- Source -- Évaluation de l'intervention : méthodologie -- Résultats -- Graphique 4.A2.1. …”
Publicado 2017
Libro electrónico -
8939Publicado 2021Tabla de Contenidos: “…Regions and Cities Must Lead the Way -- False Narratives and Tackling Climate Change -- The Luntz Memo's Deleterious Effect -- Beware the Danger of False Narratives and Rabbit Holes -- Social Media and Amoral, Unthinking Algorithms -- Talk About It: How Conversations Can Change Minds and Advance the Green Consensus -- Sewerage, Libraries, and Taxation -- Pension Demographics and Longevity -- Scotland's Big Climate Conversation -- Talking Together Changes Our Story and Our Outcomes -- Create Narratives That Resonate With a Locale and With Your Community -- Narrative Shifts Can Be Slow Until They Are Sudden -- The Greta Effect -- Extinction Rebellion's Direct Effect -- Climate Change Narratives Are Also Spiritual -- Declaring an Emergency Shifts the Narrative -- Americans Are Changing Their Climate Story -- The End of the Luntz Effect -- The Biden Administration Policy Shift Supports a Global Climate Break Point -- Devolution of the Climate Change Dialogue and the Ability to Act -- The UK Example -- Cities as Hubs of Green Innovation and Sustainable Liveability -- Cities and the Built Environment -- Transport, Mobility, and Our Cityscapes -- Powering Our Communities -- A Better, Localized, Green, Sustainable, Liveable Future -- Constructing New Tales and Travelling With Them Into the Future -- References -- 8 On Decarbonization, Economic Growth, and a Just Transition -- Growth Or No Growth -- Optimism Or Doom and Disaster - a False Choice -- New Contours for a Green Tomorrow -- Constructing Green Globalization 2.0 -- Green New Deals for All of Us -- Governments Can Afford to Invest in Green Reseeding -- A Greener, More Productive Economy -- But What of the Cost of GNDs? …”
Libro electrónico -
8940Publicado 2023Tabla de Contenidos: “…Cover -- Part 1: Getting Started -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Role of Cryptography in the Connected World -- Evolution of cryptography -- The advent of TLS and the internet -- Increasing connectivity -- Connectivity versus security - larger attack surface -- Connectivity versus marginal attack cost -- Connectivity versus scaling attacks -- Increasing complexity -- Complexity versus security - features -- Complexity versus security - emergent behavior -- Complexity versus security - bugs -- Example attacks -- The Mirai botnet -- Operation Aurora -- The Jeep hack -- Commonalities -- Summary -- Chapter 2: Secure Channel and the CIA Triad -- Technical requirements -- Preliminaries -- Confidentiality -- Integrity -- Authentication -- Message authentication -- Entity authentication -- Secure channels and the CIA triad -- Summary -- Chapter 3: A Secret to Share -- Secret keys and Kerckhoffs's principle -- Cryptographic keys -- One key for each task -- Key change and session keys -- Key space -- Key length -- Crypto-agility and information half-life -- Key establishment -- Key transport -- Key agreement -- Randomness and entropy -- Information-theoretic definition of entropy -- Entropy in cryptography -- True randomness and pseudo-randomness -- Summary -- Chapter 4: Encryption and Decryption -- Preliminaries -- Symmetric cryptosystems -- Information-theoretical security (perfect secrecy) -- A first example -- The one-time pad -- Computational security -- Asymptotic approach and efficient computation -- Negligible probabilities -- Pseudorandomness -- Stream ciphers -- RC4 -- Pseudorandom functions and chosen-plaintext attacks -- Summary -- Chapter 5: Entity Authentication -- The identity concept -- Basic principles of identification protocols -- Basic factors for identification…”
Libro electrónico