Mostrando 8,961 - 8,980 Resultados de 12,164 Para Buscar '"Transporter"', tiempo de consulta: 0.16s Limitar resultados
  1. 8961
    Publicado 2020
    Tabla de Contenidos: “…Sutherland -- 5. Threat: Transportation and service corridors / Nick A. Littlewood, Ricardo Rocha, Rebecca K. …”
    Libro electrónico
  2. 8962
    por Stern, Hal
    Publicado 2001
    Tabla de Contenidos: “…IP Version 6 unspecified address; 1.4. Transport layer; 1.4.2. Port numbers; 1.5. The session and presentation layers; 1.5.2. …”
    Libro electrónico
  3. 8963
    Publicado 2006
    Tabla de Contenidos: “…PC Audio Editing with Adobe Audition 2.0: Broadcast, desktop and CD Audio Production; Copyright; Contents; Foreword; Preface; 1 Visual editing; 2 Some technical bits; 2.1 Loudness, decibels and frequencies; 2.2 Hearing safety; 2.3 Analog and digital audio; 2.4 Time code; 3 Transfer; 3.1 Reviewing material; 3.2 Head alignment; 3.3 Digital; 3.4 Analog; 3.5 Recording; 4 Editing; 4.1 Introduction; 4.2 Loading a file; 4.3 Transport; 4.4 Making an edit; 4.5 Visual editing; 5 Quarrying material; 5.1 Introduction; 5.2 Blue bar blues; 5.3 Copy, cut and paste; 6 Structuring material…”
    Libro electrónico
  4. 8964
    por Perez, Andre
    Publicado 2011
    Tabla de Contenidos: “…The Quality of Service report; Chapter 3. Transport Protocols; 3.1. Introduction; 3.2. The TCP…”
    Libro electrónico
  5. 8965
    Publicado 2015
    Tabla de Contenidos: “…2.1.3 Clean air act amendments of 1977 and prevention of significant deterioration2.1.3.1 Prevention of significant deterioration; 2.1.3.2 Nonattainment areas; 2.1.4 Clean air act amendments of 1990; 2.1.4.1 Title I: provisions for attainment and maintenance of national ambient air quality; 2.1.4.2 Title III: air toxics; 2.1.4.3 Title IV: acid deposition control; 2.1.4.3.1 The SO2 program; 2.1.4.3.2 The NOx program; 2.1.4.4 Title V: permitting; 2.1.5 Additional NOx regulations and trading programs; 2.1.5.1 Ozone transport commission NOx budget program (1999-2002)…”
    Libro electrónico
  6. 8966
    Publicado 2017
    Tabla de Contenidos: “…2.9 Coupling species transport and fluid mechanics2.10 Numerical simulations and advanced modeling methods; References; Select bibliography; 3 Interfaces in Microfluidic and Nanofluidic Systems; 3.1 Introduction; 3.2 Introduction to surfaces; 3.3 Surface charge; 3.4 Surface energy; 3.5 Thermodynamics of surfaces; 3.5.1 Formation of surface layers; 3.5.2 Surface modification methods; 3.5.2.1 Physical methods; 3.5.2.2 Chemical methods; 3.6 Surface characterization methods with relevance to microfluidics and nanofluidics; 3.6.1 Indirect methods; 3.6.2 Direct methods…”
    Libro electrónico
  7. 8967
    Publicado 2017
    Tabla de Contenidos: “…Introduction to Neutron, the OpenStack network service -- Introduction to Cinder, the OpenStack block storage service -- Introduction to Glance, the OpenStack image service -- Introduction to Swift, the OpenStack object store -- DevStack installation -- Creating a KeyStone user -- Assign role to the user -- Creating a VM using Nova -- Attach volume to VM -- Uploading an image to Swift -- Summary -- Chapter 4: Containerization in OpenStack -- The need for containers in OpenStack -- Efforts within the OpenStack community to support containers -- Nova -- Heat -- Magnum -- Zun -- Kuryr -- Kolla -- Murano -- Fuxi -- OpenStack-Helm -- Summary -- Chapter 5: Magnum - COE Management in OpenStack -- Magnum introduction -- Concepts -- Cluster template -- Cluster -- Cluster driver -- Heat Stack Template -- Template definition -- Certificate -- Service -- Stats -- Quotas -- Key features -- External load balancer for Kubernetes -- Transport Layer Security -- Scaling -- Storage -- Ephemeral storage -- Persistent storage -- Notifications -- Container monitoring -- Components -- Magnum API -- Magnum conductor -- Walk-through -- Magnum DevStack installation -- Managing COEs -- Summary -- Chapter 6: Zun - Container Management in OpenStack -- Introduction to Zun -- Concepts -- Containers -- Images -- Services -- Hosts -- Capsules -- Container drivers -- Image drivers -- Network drivers -- Key features -- Cinder integration -- Container composition -- Kuryr networking -- Container sandbox -- CPU sets -- Components -- zun-api -- Zun scheduler -- zun-compute -- Zun WebSocket proxy -- Walk-through -- Zun DevStack installation -- Managing containers -- Summary -- Chapter 7: Kuryr - Container Plugin for OpenStack Networking -- Introducing Kuryr -- Kuryr architecture -- Mapping the Docker libnetwork to the neutron API -- Providing the generic VIF-Binding infrastructure…”
    Libro electrónico
  8. 8968
    Publicado 2022
    Tabla de Contenidos: “…Javier Melgosa Arcos -- La resolución alternativa de litigios en transporte aéreo. Una via extrajudicial administrativa previa a la jurisdicción civil / Irene Nadal Gómez -- Una breve aproximación al arbitraje de consumo electrónico y a la mediación electrónica de consumo en España durante la COVID-19: ¿entre el mito y la realidad? …”
    Libro
  9. 8969
    por Huidobro Moya, Huidobro Moya
    Publicado 2014
    Tabla de Contenidos: “….) -- 3.4 ESTRUCTURA DE CANALES EN UMTS -- 3.4.1 Canales lógicos -- 3.4.2 Canales de transporte -- 3.4.3 Canales físicos -- 3.4.4 Pila de protocolos de UMTS -- 3.5 ARQUITECTURA DE UNA RED UMTS -- 3.5.1 Red de acceso UTRAN -- 3.5.2 Núcleo de red UMTS -- 3.5.3 Terminales UMTS -- 3.5.4 IMS (...) -- 3.6 CALIDAD DE SERVICIO (QOS) -- 3.7 REALIZACIÓN DE UNA LLAMADA -- 3.7.1 Llamada de voz -- 3.7.2 Llamada de datos -- 3.7.3 Llamada multimedia (con IMS) -- 3.7.4 Llamadas simultáneas de voz y datos (...) -- 3.8 INTERFACES DE UMTS (...) -- 3.8.1 Interfaz radio UMTS (...) -- 3.8.2 Interfaces UTRAN (...) -- 3.8.3 Interfaces Core (...) -- 3.8.4 Interfaces IMS (...) -- 3.9 PROTOCOLOS DE UMTS -- 3.9.1 Protocolos UTRAN…”
    Libro electrónico
  10. 8970
    Publicado 2022
    Tabla de Contenidos: “…Structured Cable-Beyond the Star -- Demarc -- Installing Structured Cabling -- Getting a Floor Plan -- Mapping the Runs -- Determining the Location of the Telecommunications Room -- Pulling Cable -- Making Connections -- Testing the Cable Runs -- NICs -- Buying NICs -- Link Lights -- Diagnostics and Repair of Physical Cabling -- Diagnosing Physical Problems -- Check Your Lights -- Check the NIC -- Cable Testing -- Problems in the Telecommunications Room -- Toners -- Chapter 5 Review -- Chapter 6 TCP/IP Basics -- Historical/Conceptual -- Test Specific -- The TCP/IP Protocol Suite -- Network Layer Protocols -- Transport Layer Protocols -- Application Layer Protocols -- IP and Ethernet -- IP Addresses -- IP Addresses in Action -- Class IDs -- CIDR and Subnetting -- Subnetting -- CIDR: Key Takeaways -- IP Address Assignment -- Static IP Addressing -- Dynamic IP Addressing -- Special IP Addresses -- Chapter 6 Review -- Chapter 7 Routing -- Historical/Conceptual -- How Routers Work -- Test Specific -- Routing Tables -- Freedom from Layer 2 -- Network Address Translation -- Dynamic Routing -- Routing Metrics -- Distance Vector and Path Vector -- Link State -- EIGRP -- Dynamic Routing Makes the Internet -- Route Redistribution and Administrative Distance -- Working with Routers -- Connecting to Routers -- Basic Router Configuration -- Router Problems -- Chapter 7 Review -- Chapter 8 TCP/IP Applications -- Historical/Conceptual -- Transport Layer and Network Layer Protocols -- How People Communicate -- Test Specific -- TCP -- UDP -- ICMP -- IGMP -- The Power of Port Numbers -- Registered Ports -- Connection Status -- Rules for Determining Good vs. …”
    Libro electrónico
  11. 8971
    por Mitteregger, Mathias
    Publicado 2021
    Tabla de Contenidos: “…-- 1.3 EIN GANZ NEUER WEG -- 2. STRASSEN: TRANSPORT UND LEBENSRAUM -- 2.1 DIE BEDEUTUNG DES STRASSENRAUMS FÜR URBANITÄT -- 2.2 SICHERHEIT UND ÖFFENTLICHKEIT -- 2.3 AUGEN AUF DER STRASSE -- 2.4 DAS ENDE GLEICHER VERHÄLTNISSE -- 3. …”
    Libro electrónico
  12. 8972
    Publicado 2016
    Tabla de Contenidos: “…Grain and non-grain freight rates -- Recommendations to improve competition in transportation -- Easing interprovincial barriers to trade and labour mobility -- The Agreement on Internal Trade (AIT) -- Box 1.2. …”
    Libro electrónico
  13. 8973
    Tabla de Contenidos: “…Structure du marché de l'assurance sur la base des primes payées en 2000 -- Les secteurs non financiers -- Les transports -- La poste et les télécommunications -- L'énergie -- Tableau 23. …”
    Libro electrónico
  14. 8974
    Publicado 2020
    Tabla de Contenidos: “…44 2.6 Additional Terms 49 2.7 Problems 54 References 56 3 Main Elements of Risk Assessment 59 3.1 Introduction 59 3.2 Risk Assessment Process 60 3.3 Risk Assessment Report 76 3.4 Risk Assessment in Safety Legislation 81 3.5 Validity and Quality Aspects of a Risk Assessment 82 3.6 Problems 83 References 84 4 Study Object and Limitations 87 4.1 Introduction 87 4.2 Study Object 87 4.3 Operating Context 91 4.4 System Modeling and Analysis 92 4.5 Complexity 95 4.6 Problems 97 References 98 5 Risk Acceptance 99 5.1 Introduction 99 5.2 Risk Acceptance Criteria 99 5.3 Approaches to Establishing Risk Acceptance Criteria 106 5.4 Risk Acceptance Criteria for Other Assets than Humans 114 5.5 Closure 115 5.6 Problems 115 References 117 6 Measuring Risk 121 6.1 Introduction 121 6.2 Risk Metrics 121 6.3 Measuring Risk to People 123 6.4 Risk Matrices 148 6.5 Reduction in Life Expectancy 154 6.6 Choice and Use of Risk Metrics 156 6.7 Risk Metrics for Other Assets 158 6.8 Problems 159 References 163 7 Risk Management 167 7.1 Introduction 167 7.2 Scope, Context, and Criteria 170 7.3 Risk Assessment 170 7.4 Risk Treatment 171 7.5 Communication and Consultation 172 7.6 Monitoring and Review 173 7.7 Recording and Reporting 174 7.8 Stakeholders 175 7.9 Risk and Decision-Making 176 7.10 Safety Legislation 179 7.11 Problems 180 References 180 8 Accident Models 183 8.1 Introduction 183 8.2 Accident Classification 183 8.3 Accident Investigation 188 8.4 Accident Causation 188 8.5 Accident Models 190 8.6 Energy and Barrier Models 193 8.7 Sequential Accident Models 195 8.8 Epidemiological Accident Models 201 8.9 Event Causation and Sequencing Models 208 8.10 Systemic Accident Models 213 8.11 Combining Accident Models 228 8.12 Problems 229 References 230 9 Data for Risk Analysis 235 9.1 Types of Data 235 9.2 Quality and Applicability of Data 238 9.3 Data Sources 239 9.4 Expert Judgment 250 9.5 Data Dossier 254 9.6 Problems 254 References 257 10 Hazard Identification 259 10.1 Introduction 259 10.2 Checklist Methods 263 10.3 Preliminary Hazard Analysis 266 10.4 Job Safety Analysis 278 10.5 FMECA 287 10.6 HAZOP 295 10.7 STPA 306 10.8 SWIFT 316 10.9 Comparing Semiquantitative Methods 322 10.10 Master Logic Diagram 322 10.11 Change Analysis 324 10.12 Hazard Log 327 10.13 Problems 331 References 335 11 Causal and Frequency Analysis 339 11.1 Introduction 339 11.2 Cause and Effect Diagram Analysis 341 11.3 Fault Tree Analysis 344 11.4 Bayesian Networks 370 11.5 Markov Methods 384 11.6 Problems 396 References 400 12 Development of Accident Scenarios 401 12.1 Introduction 401 12.2 Event Tree Analysis 402 12.3 Event Sequence Diagrams 426 12.4 Cause-Consequence Analysis 426 12.5 Hybrid Causal Logic 428 12.6 Escalation Problems 429 12.7 Consequence Models 429 12.8 Problems 431 References 435 13 Dependent Failures and Events 437 13.1 Introduction 437 13.2 Dependent Failures and Events 437 13.3 Dependency in Accident Scenarios 439 13.4 Cascading Failures 441 13.5 Common-Cause Failures 442 13.6 Factor Model 452 13.7 Binomial Failure Rate Model 456 13.8 Multiple Greek Letter Model 457 13.9-Factor Model 459 13.10 Multiple-Factor Model 461 13.11 Problems 461 References 462 14 Barriers and Barrier Analysis 465 14.1 Introduction 465 14.2 Barriers and Barrier Classification 466 14.3 Barrier Management 474 14.4 Barrier Properties 476 14.5 Safety-Instrumented Systems 477 14.6 Hazard-Barrier Matrices 487 14.7 Safety Barrier Diagrams 488 14.8 Bow-Tie Diagrams 490 14.9 Energy Flow/Barrier Analysis 490 14.10 Layer of Protection Analysis 493 14.11 Barrier and Operational Risk Analysis 502 14.12 Systematic Identification and Evaluation of Risk Reduction Measures 512 14.13 Problems 518 References 520 15 Human Reliability Analysis 525 15.1 Introduction 525 15.2 Task Analysis 536 15.3 Human Error Identification 543 15.4 HRA Methods 552 15.5 Problems 573 References 574 16 Risk Analysis and Management for Operation 579 16.1 Introduction 579 16.2 Decisions About Risk 581 16.3 Aspects of Risk to Consider 583 16.4 Risk Indicators 585 16.5 Risk Modeling 594 16.6 Operational Risk Analysis - Updating the QRA 596 16.7 MIRMAP 598 16.8 Problems 601 References 602 17 Security Assessment 605 17.1 Introduction 605 17.2 Main Elements of Security Assessment 608 17.3 Industrial Control and Safety Systems 615 17.4 Security Assessment 617 17.5 Security Assessment Methods 625 17.6 Application Areas 626 17.7 Problems 627 References 628 18 Life Cycle Use of Risk Analysis 631 18.1 Introduction 631 18.2 Phases in the Life Cycle 631 18.3 Comments Applicable to all Phases 634 18.4 Feasibility and Concept Selection 635 18.5 Preliminary Design 637 18.6 Detailed Design and Construction 639 18.7 Operation and Maintenance 641 18.8 Major Modifications 641 18.9 Decommissioning and Removal 643 18.10 Problems 643 References 643 19 Uncertainty and Sensitivity Analysis 645 19.1 Introduction 645 19.2 Uncertainty 647 19.3 Categories of Uncertainty 648 19.4 Contributors to Uncertainty 651 19.5 Uncertainty Propagation 656 19.6 Sensitivity Analysis 661 19.7 Problems 663 References 664 20 Development and Applications of Risk Assessment 667 20.1 Introduction 667 20.2 Defense and Defense Industry 668 20.3 Nuclear Power Industry 670 20.4 Process Industry 674 20.5 Offshore Oil and Gas Industry 678 20.6 Space Industry 681 20.7 Aviation 683 20.8 Railway Transport 685 20.9 Marine Transport 686 20.10 Machinery Systems 689 20.11 Food Safety 690 20.12 Other Application Areas 692 20.13 Closure 695 References 697 Appendix A Elements of Probability Theory 701 A.1 Introduction 701 A.2 Outcomes and Events 701 A.3 Probability 706 A.4 Random Variables 710 A.5 Some Specific Distributions 718 A.6 Point and Interval Estimation 728 A.7 Bayesian Approach 732 A.8 Probability of Frequency Approach 733 References 739 Appendix B Acronyms 741 Author Index 747 Subject Index…”
    Libro electrónico
  15. 8975
    Publicado 2019
    Tabla de Contenidos: “…Value chain -- 2.1.2.1 Exploration and production -- Associated and non-associated gas -- Total production -- Reserves -- Market participants for production in Mexico -- 2.1.2.2 Processing -- 2.1.2.2.1 Natural gas -- 2.1.2.2.2 LPG -- 2.1.2.3 Storage and transportation -- 2.1.2.3.1 Natural gas -- SISTRANGAS -- Access to SISTRANGAS -- Market participants for transport and storage -- Other systems -- 2.1.2.3.2 LPG -- 2.1.2.4 Distribution -- 2.1.2.4.1 Natural gas -- 2.1.2.4.2 LPG -- 2.1.2.5 Retail -- 2.1.2.5.1 Natural gas -- 2.1.2.5.2 LPG -- 2.1.2.6 Commercialisation -- 2.1.2.6.1. …”
    Libro electrónico
  16. 8976
    Publicado 2014
    Tabla de Contenidos: “…ACFS Enhancements -- File Support -- Highly Available NFS -- ACFS Snapshots -- Other Enhancements -- End of Line -- Chapter 5: Backup, Recovery, and Data Guard New Features -- RMAN-Related New Features -- Improvements in Incremental and Multisection Backups -- Recovery of Databases Over the Network Using Backup Sets from a Standby Database -- Active Database Duplication Improvements -- Cross-Platform Backup and Recovery Improvements -- Recovering Tables and Partitions with RMAN -- Miscellaneous RMAN New Features -- Oracle Data Guard New Features -- The SYSDG Privilege -- The Far Sync Instance -- Cascaded Redo Transport Destinations -- Fast-Sync Mode -- Other New Standby Database and Data Guard Features -- End of Line -- Chapter 6: Oracle Database 12c SQL and PL/SQL New Features -- Oracle Database 12c DML New Features -- Row Pattern Matching -- Enhancements to the Oracle Native Left Outer Join Syntax -- Top-n Query New Features -- Concurrent Execution of Union and Union All Branches -- Oracle Database 12c DDL New Features -- Increased Size Limits for VARCHAR2, NVARCHAR2, and RAW Data Types -- Identity Columns -- Cascading Truncate Statements -- Invisible Columns -- Default Values for Columns Based on Oracle Sequences -- Default Values for Columns on Explicit NULL Insertion -- Sequence-Related New Features -- Creating Multiple Indexes on the Same Column Set -- With Clause New Features -- Oracle Database 12c PL/SQL New Features -- Using the Bequeath Clause on Views -- PL/SQL Subprogram White Lists -- Using PL/SQL-Specific Data Types Across the PL/SQL-to-SQL Interface -- Changes to Security Privileges on Invoker Rights PL/SQL Program Units -- Granting Roles to PL/SQL Packages and Stand-Alone Subprograms -- A Final Word on PL/SQL New Features -- End of Line -- Chapter 7: Partitioning Enhancements -- Moving Partitions Online…”
    Libro electrónico
  17. 8977
    Publicado 2009
    Tabla de Contenidos: “…Configuration Management During Online Insertion and Removal Events -- Case 1: Insert or Remove a Node -- Case 2: Replace the Node with a Different Node -- Case 3: Replace the Node with a Higher Density Node -- Case 4: Replace the Node with a Lower Density Node -- Configuration Management During Package Activation and Deactivation -- Interface Preconfiguration -- Configuration Template -- Configuration Management During Router Startup -- Configuration Rollback -- Chapter 5 Cisco IOS XR Monitoring and Operations -- Using SNMP -- Configuring SNMP -- Cisco IOS XR Syslog -- SNMP in the Context of a VRF -- Logging Destination -- Local Archiving of Logging Messages -- Embedded Event Manager -- EEM Event Detectors and Events Processing -- Timer Services Event Detector -- Syslog Event Detector -- None Event Detector -- Watchdog System Monitor Event Detector -- Distributed Event Detectors -- Registering and Using Onboard EEM Policies -- User-Defined EEM Policy -- EEM Reliability Metrics -- Monitoring Processes -- WDSYSMON -- Monitoring Memory -- Using the show system verify Command -- Operations and Monitoring Best Practices -- Chapter 6 Cisco IOS XR Security -- Secure Operating System -- Securing Access to the Router -- Admin Plane -- SDR Plane -- User Groups and Task Groups -- User Group and Task Group Inheritance -- External AAA -- Configuring a TACACS+ Server -- Authentication Using RADIUS -- Configuring Secure Shell -- Management Plane Protection -- Securing the Forwarding Plane -- Access Control Lists -- Unicast RPF -- Local Packet Transport Service -- Mechanics Behind LPTS: A High-Level Overview -- Configuring LPTS -- Chapter 7 Routing IGP -- Routing Information Protocol -- Understanding RIP Fundamentals -- RIP Versions -- Configuring RIP in Cisco IOS XR -- Configuring Route Policy Language -- Configuring Passive Interface…”
    Libro electrónico
  18. 8978
    Publicado 2019
    Tabla de Contenidos: “…Uptake by plants -- 5.2. Transport in plants -- 5.3. Assimilation and transformation in plants -- 5.4. …”
    Libro electrónico
  19. 8979
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  20. 8980
    por Pérez Chávez, José
    Publicado 2019
    Tabla de Contenidos: “…Anticipos pagados por sociedades cooperativas de producción y sociedades o asociaciones civiles a sus miembros -- Cuotas de peaje pagadas en carreteras -- Gastos de empresas dedicadas al transporte aéreo de pasajeros -- Gastos por adquisición de combustibles para vehículos marítimos, aéreos y terrestres -- Capítulo IV -- Costo de lo vendido -- Generalidades -- Normas financieras aplicables a los inventarios -- Elementos que conforman el costo para efectos fiscales -- Sistemas de valuación de inventarios -- Métodos de valuación de inventarios -- Modificaciones al valor de los inventarios (pérdidas) -- Arrendamiento financiero -- Prestadores de servicios -- Desarrolladores inmobiliarios -- Costo deducible en la prestación de servicios de hospedaje o de salones de belleza y peluquería, así como en la elaboración y venta de pan, pasteles y canapés -- Capítulo V -- Deducción de inversiones -- Concepto de inversiones -- Reglas para la deducción de las inversiones -- Inicio de la deducción de inversiones -- Porcientos máximos autorizados por la ley -- Inversiones que se enajenan o dejan de ser útiles -- Otras reglas para la deducción de inversiones -- Pérdidas por caso fortuito o fuerza mayor -- Bienes adquiridos en arrendamiento financiero -- Deducción de refrigeradores y enfriadores a disposición de otros -- Capítulo VI -- Determinación de la parte deducible en el ISR correspondiente a los pagos a trabajadores que se encuentren exentos de este impuesto -- Capítulo VII -- Deducción adicional por enajenación, pérdida o inutilización de inversiones deducidas de manera inmediata -- Conforme a la Ley del ISR vigente hasta el 31/XII/2013 -- Bienes deducidos de manera inmediata que se enajenan, se pierden o dejan de ser útiles conforme a decreto -- Capítulo VIII -- Ajuste anual por inflación deducible -- Concepto de crédito -- Concepto de deuda -- Capítulo IX…”
    Libro electrónico