Mostrando 9,281 - 9,300 Resultados de 12,164 Para Buscar '"The Transporter"', tiempo de consulta: 0.12s Limitar resultados
  1. 9281
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- List of Contributors -- Preface -- Chapter 1 Biofuels: Classification, Conversion Technologies, Optimization Techniques and Applications -- 1.1 Introduction -- 1.2 Classification of Biofuels -- 1.2.1 First-Generation Biofuels -- 1.2.2 Second-Generation Biofuels -- 1.2.3 Third-Generation Algal Biofuels -- 1.3 Commonly Used Conversion Technologies -- 1.3.1 Gasification -- 1.3.1.1 Factors Influencing Gasification -- 1.3.2 Pyrolysis -- 1.3.2.1 Production of Bio-Oil from Pyrolysis -- 1.3.3 Hydrothermal Processes -- 1.3.3.1 Hydrothermal Carbonization -- 1.3.3.2 Hydrothermal Liquefaction -- 1.3.3.3 Hydrothermal Gasification -- 1.3.4 Transesterification -- 1.4 Commonly Used Optimization Techniques -- 1.4.1 Response Surface Methodology -- 1.4.2 Genetic Algorithm -- 1.5 Application of Biofuels in Transportation Sector -- 1.5.1 Automobile Sector -- 1.5.2 Aviation Sector -- Conclusion -- References -- Chapter 2 Technical Challenges and Prospects of Renewable Fuel Generation and Utilization at a Global Scale -- 2.1 Introduction -- 2.2 Biofuel Synthesis -- 2.2.1 Biomass Energy -- 2.2.2 Biofuels -- 2.2.3 Biodiesel -- 2.3 Challenges for Bioenergy Generation -- 2.3.1 Operation Challenges in Biomass Energy Process -- 2.3.2 Economic Challenges in Biomass Energy Process -- 2.3.3 Social Challenges in Biomass Energy Processes -- 2.3.3.1 Conflicting Decision on Utility of Biomass Resources -- 2.3.3.2 Land Use Issue or Problems on Biomass Cultivation or Utilization -- 2.3.3.3 Environmental Impact of Biomass Resources -- 2.3.4 Policy and Regulatory Challenges for Biomass Energy Utility -- 2.4 Conclusions -- Abbreviations -- References -- Chapter 3 Engineered Microbial Systems for the Production of Fuels and Industrially Important Chemicals -- 3.1 Introduction…”
    Libro electrónico
  2. 9282
    por Frenzel, Louis E., Jr
    Publicado 2018
    Tabla de Contenidos: “…-- Synchronous Optical Network -- Optical Transport Network -- HOW THE INTERNET WORKS -- WIRELESS NETWORKS -- Wi-Fi -- Bluetooth -- ZigBee -- ISM-Band Radios -- Radio Frequency Identification and Near-Field Communications -- BROADBAND TECHNOLOGY -- Cable TV Connectivity -- Digital Subscriber Lines -- Wireless Broadband -- THE INTERNET OF THINGS -- How Internet of Things Works -- Wireless Technologies of Internet of Things and Machine 2 Machine -- The Issues of Internet of Things -- 10 - Audio Electronics: Digital Voice and Music Dominate -- INTRODUCTION -- THE NATURE OF SOUND -- Microphones -- Speakers -- DIGITAL AUDIO -- Past Recording Media -- Digitizing Sound -- Digital Compression -- How an MP3 Player Works -- The Compact Disc -- AUDIO-VIDEO RECEIVER -- Radio Choices -- Surround Sound -- SPECIAL SOUND APPLICATIONS -- Wireless Speakers and Headphones -- Downloading and Streaming Audio -- Musical Instruments -- Noise-Canceling Earphones -- Sonar -- Hearing Aids -- 11 - Video Technology: TV and Video Is All Digital Now -- INTRODUCTION -- VIDEO FUNDAMENTALS FOR THE IMPATIENT -- Scanning Fundamentals -- Aspect Ratio -- Persistence of Vision -- Analog TV -- Digital TV -- Color Video Principles -- Video Compression -- TV Transmission -- TV Screen Technology -- Summary of Screen Technologies -- 3D TV -- CABLE TELEVISION -- SATELLITE TV -- OVER-THE-TOP TV -- CELL PHONE TV -- CLOSED-CIRCUIT TV -- DIGITAL VIDEO DISCS -- How a DVD Player Works…”
    Libro electrónico
  3. 9283
    Publicado 2004
    Tabla de Contenidos: “…Components and architecture -- 2.1 Components and functions -- 2.2 Web application -- 2.2.1 Web application structure -- 2.2.2 Web application user interface functions -- 2.2.3 Role-based security -- 2.2.4 Problem determination for Web application -- 2.3 Monitor functions -- 2.3.1 Process structure of the monitor -- 2.3.2 Files used by the monitor -- 2.3.3 Performance data sources -- 2.3.4 Setting options -- 2.3.5 Problem determination for the monitor -- 2.4 Communication and security -- 2.4.1 User authentication mechanism -- 2.4.2 Communication port usage -- 2.4.3 Certificates and authentication with SSL -- 2.4.4 Transport between DB2 and monitor -- 2.5 Database structure -- 2.5.1 Configuration tables -- 2.5.2 Measurement tables -- Chapter 3. …”
    Libro electrónico
  4. 9284
    Publicado 2002
    Tabla de Contenidos: “…Fiber cabling services -- G.1 Fiber connectivity solution options -- G.2 zSeries Fiber Cabling Service for z800 and z900 -- G.3 Fiber Transport Services (FTS) -- Glossary…”
    Libro electrónico
  5. 9285
    Publicado 2011
    Tabla de Contenidos: “…Privacy Laws -- European Laws -- Ethics -- SANS Institute IT Code of Ethics -- Chapter Review -- Questions -- Answers -- Part II Cryptography and Applications -- Chapter 4 Cryptography -- Algorithms -- Hashing -- SHA -- RIPEMD -- Message Digest -- Hashing Summary -- Symmetric Encryption -- DES -- 3DES -- AES -- CAST -- RC -- Blowfish -- Twofish -- IDEA -- Symmetric Encryption Summary -- Asymmetric Encryption -- RSA -- Diffie-Hellman -- ElGamal -- ECC -- Asymmetric Encryption Summary -- Quantum Cryptography -- Steganography -- Cryptography Algorithm Use -- Confidentiality -- Integrity -- Nonrepudiation -- Authentication -- Digital Signatures -- Key Escrow -- Transport Encryption -- Cryptographic Applications -- Chapter Review -- Questions -- Answers -- Chapter 5 Public Key Infrastructure -- The Basics of Public Key Infrastructures -- Certificate Authorities -- Registration Authorities -- Local Registration Authorities…”
    Libro electrónico
  6. 9286
    por Marchioni, Francesco
    Publicado 2013
    Tabla de Contenidos: “…Creating a Database login module -- Encrypting passwords -- Using the Database login module in your application -- Securing EJBs -- Securing web services -- Securing the transport layer -- Enabling the Secure Socket Layer on JBoss AS -- Certificate management tools -- Securing the HTTP communication with a self-signed certificate -- Securing HTTP communication with a certificate signed by a CA -- Securing EJB communication -- Generating the server and client certificates -- Creating an SSL-aware security realm -- Creating an SSL-aware security realm -- Summary -- A. …”
    Libro electrónico
  7. 9287
    por Sharma, Reetika
    Publicado 2010
    Tabla de Contenidos: “…Hydropower Projects -- Kaladan Multi Modal Transit Transport Project -- Stilwell Road -- Cultural and Other Areas of Cooperation -- Operation Sahayata -- The Way Ahead -- Learning Points... -- Think Yourself -- Section C: India's Relationship with the Rest of the World -- Chapter 1: India-US Relations -- Political Cooperation -- Economic Cooperation -- Security and Defence Cooperation -- Science and Technological Cooperation -- Energy and Climate Change Issues -- The Future Ahead -- Learning Points... -- Think Yourself -- Chapter 2: India-Russia Relations -- Contextualizing Indo-Russia Relation -- Variants of Indo-Russia Relations -- Defence Cooperation -- Economic Cooperation -- Energy Cooperation -- Cooperation in the Area of Science and Technology -- Indo-Russia Cooperation at Global Level: Areas of Convergence -- Cooperation at Shanghai Cooperation Organization (SCO) -- Russia-India-China Triangle and Cooperation at BRIC Level -- The Way Ahead -- Learning Points... -- Think Yourself -- Chapter 3: India-Japan Relations -- Security Cooperation -- Recent Developments -- Economic Relations -- Cooperation in the field of Science and Technology -- Nuclear Non-Proliferation -- Reform in the UN Security Council -- The Future Ahead -- Learning Points... -- Think Yourself -- Chapter 4: India-ASEAN Relations -- Political and Strategic cooperation -- Economic Cooperation -- Defence Cooperation -- Cultural Cooperation -- The Future Ahead -- Learning Points... -- Think Yourself -- Chapter 5: India and West Asia (Middle-East) Relationship -- Political Factor -- Economic Factor and Energy Security -- Cultural Aspect -- Strategic and Security Aspects -- India-Israel -- Learning Points... -- Think Yourself -- Chapter 6: India-Central Asia Relations -- Significance of Central Asian Region -- Issues between India and Central Asia -- Political Cooperation…”
    Libro electrónico
  8. 9288
    Publicado 2020
    Tabla de Contenidos: “…Chapter 7 Using Mindfulness for Yourself and Others -- Using a Mini Mindful Exercise -- Introducing the breathing space -- Practising the breathing space -- Using the breathing space between activities -- Using Mindfulness to Look After Yourself -- Exercising mindfully -- Preparing for sleep with mindfulness -- Looking at a mindful work-life balance -- Using Mindfulness in Relationships -- Starting with your relationship with yourself -- Dealing with arguments in romantic relationships: A mindful way to greater peace -- Engaging in deep listening -- Being aware of expectations -- Looking into the mirror of relationships -- Working with your emotions -- Seeing everyone as your teacher -- Chapter 8 Using Mindfulness in Your Daily Life -- Using Mindfulness at Work -- Beginning the day mindfully -- Dropping in with mini meditations -- Going from reacting to responding -- Solving problems creatively -- Practising mindful working -- Trying single-tasking: Discovering the multi-tasking myth -- Finishing by letting go -- Using Mindfulness on the Move -- Walking mindfully -- Driving mindfully -- Travelling mindfully on public transport -- Using Mindfulness in the Home -- Waking up mindfully -- Doing everyday tasks with awareness -- Second hunger: Overcoming problem eating -- Living Mindfully in the Digital Age -- Assessing your level of addiction to technology -- Using mindfulness to get back in control -- Using technology to enhance mindful awareness -- Chapter 9 Establishing Your Own Mindfulness Routine -- Trying an Evidence-Based Mindfulness Course -- Week One: Understanding automatic pilot -- Week Two: Dealing with barriers -- Week Three: Being mindful in movement -- Week Four: Staying present -- Week Five: Embracing acceptance -- Week Six: Realising that thoughts are just thoughts -- Week Seven: Taking care of yourself…”
    Libro electrónico
  9. 9289
    Publicado 2010
    Tabla de Contenidos: “…IdMgrRepositoryConfig -- Chapter 13 Databases and Authorization -- Database Basics -- Terminology -- A Simple Example -- Troubleshooting Configuration Problems -- Advanced Settings -- Databases Reference Section -- JDBCProviderManagement Group -- VariableConfiguration Group -- Useful MBeans -- Summary -- Chapter 14 Messaging -- An Introduction to Messaging -- Messaging Basics -- Terminology -- Example: Creating a Bus -- Example: Deleting a Bus -- Security -- Enabling Bus Security -- Example: Enabling Bus Access Security -- Example: Enabling Transport Security -- Reference Section -- Creating Message Buses -- Deleting a Bus and Bus Components -- Modifying a Bus and Bus Components -- Displaying Buses and Bus Components -- Bus Security -- Summary -- Chapter 15 Administering Web Services -- Web Services Basics -- WS-I Profiles -- WSDL and SOAP -- A Web Service Example -- Web Services Runtimes -- Managing Web Services -- Exploring Web Services -- Listing Web Services -- Listing Web Services Information -- Exporting the WSDL for a Web Service -- Web Service Policy Sets -- Policy Set Bindings -- Policy Set Attachment -- Policy Topics Summary -- Additional Topics -- Enable/Disable Endpoints -- WS-Notification -- Web Services and the Service Integration Bus -- Mediations -- Web Services Gateway -- Online References -- AdminTask Web Services Reference -- SIBWebServices Group -- KeyManagerCommands -- KeyStoreCommands -- KeySetCommands -- PolicySetManagement Group -- WebServicesAdmin Group -- Chapter 16 Version 7.0 Scripting Libraries -- Library Organization -- Scripting Library Help -- Default Failure Action -- AdminApplication Script Library Module -- AdminApplication Group 1-Install and Uninstall Applications -- AdminApplication Group 2-Query Application Configurations -- AdminApplication Group 3-Update Applications…”
    Libro electrónico
  10. 9290
    Publicado 2012
    Tabla de Contenidos: “…Intro -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I: Enterprise Security -- 1 Cryptographic Tools -- Determine Appropriate Tools and Techniques -- Advanced PKI Concepts -- Hashing -- Cryptographic Applications -- Digital Signatures -- Code Signing -- Nonrepudiation -- Transport Encryption -- Implications of Cryptographic Methods and Design -- Entropy -- Pseudorandom Number Generation -- Perfect Forward Secrecy -- Confusion -- Diffusion -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 2 Computing Platforms -- Advantages and Disadvantages of Virtualizing Servers and Minimizing Physical Space Requirements -- VLAN -- Securing Virtual Environments, Appliances, and Equipment -- Vulnerabilities Associated with a Single Physical Server Hosting Multiple Companies' Virtual Machines -- Vulnerabilities Associated with a Single Platform Hosting Multiple Companies' Virtual Machines -- Secure Use of On-demand/Elastic Cloud Computing -- Vulnerabilities Associated with Co-mingling of Hosts with Different Security Requirements -- Virtual Desktop Infrastructure (VDI) -- Terminal Services -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 3 Enterprise Storage -- Explain the Security Implications of Enterprise Storage -- Virtual Storage -- NAS-Network Attached Storage -- SAN-Storage Area Network -- VSAN -- iSCSI -- FCOE -- LUN Masking -- HBA Allocation -- Redundancy (Location) -- Secure Storage Management -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 4 Infrastructure -- Advanced Network Design -- Complex Network Security Solutions for Data Flow -- Secure Data Flows to Meet Changing Business Needs -- Secure DNS -- Secure Directory Services -- Network Design Consideration…”
    Libro electrónico
  11. 9291
    Publicado 2021
    Tabla de Contenidos:
    Libro electrónico
  12. 9292
    por Kreibig, Nina
    Publicado 2022
    Tabla de Contenidos: “…Elisabeths‐Kirchengemeinde -- IV.3.2.2 Architektonischer und inhaltlicher Wandel der Leichenhäuser (ab 1854) -- IV.3.2.3 Neue Positionen in der Leichenhausfrage (1858‐1864) -- IV.3.2.4 Aktive Partizipation der Kommunalbehörden (1864‐1866) -- IV.3.2.5 Die endgültige Akzeptanz der Leichenhäuser (1866‐1869) -- IV.3.2.6 Das Ende des Leichenfuhrpachtfonds (1869‐1871) -- Ausblick (1872‐1895) -- IV.3.3 Brüche und Neuausrichtungen: Der Bedeutungswandel der Leichenhäuser -- IV.4 Formalitäten und Restriktionen bei der Leichenhausnutzung -- IV.4.1 Verordnungen für die Berliner Leichenhäuser -- IV.4.2 Formalia bei der Nutzung und Errichtung der Berliner Leichenhäuser -- Die Finanzierung von Leichenhäusern -- Einrichtung und Nutzung der Berliner Leichenhäuser -- Transport der Leichen -- Die Aufnahmekonditionen der Leichenhäuser Berlins -- IV.5 Die Ambivalenz von Wunsch und Wirklichkeit -- IV.5.1 Die Nutzer*innen der Leichenhäuser in Berlin: Inklusion und Exklusion -- Inkludierte Leichen -- Exkludierte Leichen -- IV.5.2 Das Eigene, das Andere und das Fremde -- IV.5.3 Disziplinierungsmaßnahmen und Leichenhauszwang -- Forderungen nach einer Nutzungspflicht der Leichenhäuser -- Die Forderung nach einer gesetzlichen Einführung von Leichenhäusern -- IV.6 Differenzen und Analogien -- IV.6.1 Ideal und Wirklichkeit: Der tatsächliche Gebrauch der Berliner Leichenhäuser -- Zielvorgaben und Erfolge in der Berliner Leichenhausfrage…”
    Libro electrónico
  13. 9293
    Publicado 2022
    Tabla de Contenidos: “…Part IV Communication and Network Security -- Chapter 11 Networking Fundamentals -- Data Communications Foundations -- Network Reference Models -- Protocols -- Application Layer -- Presentation Layer -- Session Layer -- Transport Layer -- Network Layer -- Data Link Layer -- Physical Layer -- Functions and Protocols in the OSI Model -- Tying the Layers Together -- Local Area Networks -- Network Topology -- Medium Access Control Mechanisms -- Layer 2 Protocols -- Transmission Methods -- Layer 2 Security Standards -- Internet Protocol Networking -- TCP -- IP Addressing -- IPv6 -- Address Resolution Protocol -- Dynamic Host Configuration Protocol -- Internet Control Message Protocol -- Simple Network Management Protocol -- Domain Name Service -- Network Address Translation -- Routing Protocols -- Intranets and Extranets -- Metropolitan Area Networks -- Metro Ethernet -- Wide Area Networks -- Dedicated Links -- WAN Technologies -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 12 Wireless Networking -- Wireless Communications Techniques -- Spread Spectrum -- Orthogonal Frequency Division Multiplexing -- Wireless Networking Fundamentals -- WLAN Components -- WLAN Standards -- Other Wireless Network Standards -- Other Important Standards -- Evolution of WLAN Security -- 802.11 -- 802.11i -- 802.11w -- WPA3 -- 802.1X -- Best Practices for Securing WLANs -- Mobile Wireless Communication -- Multiple Access Technologies -- Generations of Mobile Wireless -- Satellites -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 13 Securing the Network -- Applying Secure Design Principles to Network Architectures -- Secure Networking -- Link Encryption vs. …”
    Libro electrónico
  14. 9294
    por Charantimath, Poornima M.
    Publicado 2005
    Tabla de Contenidos: “…Venture Capital -- Summary -- Key Words -- Exercises -- References -- Annexure 4.1 -- Chapter 5: Setting Up a Small Business Enterprise -- Identifying the Business Opportunity -- Business Opportunities in Various Sectors -- Green Business -- Biotechnology -- Events Management -- IT Enabled Services -- Food, Fruits and Vegetables Processing, Refrigeration, and Transportation -- Mineral Water -- Courier Services -- Insurance Sector…”
    Libro electrónico
  15. 9295
    Publicado 1962
    Libro
  16. 9296
    Publicado 1962
    Libro
  17. 9297
    Publicado 1962
    Libro
  18. 9298
    Libro
  19. 9299
    Publicado 1987
    Libro
  20. 9300
    Publicado 1992
    Libro