Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Transport 612
- Transportation 522
- Transporte 430
- Business & Economics 369
- Transportation Economics 287
- Transportes 246
- Transporte acuático 230
- Historia 213
- Economic conditions 143
- Engineering & Applied Sciences 139
- Computer networks 126
- History 123
- Environmental aspects 116
- Economics 115
- Ferrocarriles 114
- Economic policy 112
- Technology: general issues 109
- History of engineering & technology 108
- Innovaciones tecnológicas 108
- European Conference of Ministers of Transport 106
- Research & information: general 104
- Investigación científica 102
- Management 99
- Derecho marítimo 98
- aspectos económicos 93
- Environment 91
- Transporte ferroviario 89
- Urbanismo 88
- Història 87
- Transportes urbanos 87
-
10741Publicado 2015“…This book intends to provide a guide to researchers, graduate students and practitioners by incorporating every aspect of management paradigms into overall supply chain functions such as procurement, warehousing, manufacturing, transportation and disposal. More specifically, this book aims to present recent approaches and ideas including experiences and applications in the field of supply chains, which may give a reference point and useful information for new research and to those allied, affiliated with and peripheral to the field of supply chains and its management…”
Libro electrónico -
10742Publicado 2010“…Such systems are called discrete event dynamic systems and are of a subject of immense interest in a variety of disciplines, which range from telecommunication systems and transport systems to manufacturing systems and beyond. …”
Libro electrónico -
10743por Gunasekera, Sheran. author“…You will: Identify data that should be secured Use the Android APIs to ensure confidentiality and integrity of data Build secure apps for the enterprise Implement Public Key Infrastructure and encryption APIs in apps Master owners, access control lists, and permissions to allow user control over app properties Manage authentication, transport layer encryption, and server-side security…”
Publicado 2020
Libro electrónico -
10744Publicado 2022“…About two-thirds of global greenhouse gas emissions are linked to the burning of fossil fuels used for heating, electricity, transport, and industry. Therefore, the world is looking for the most reliable, cost-effective, and environmentally friendly energy sources coupled with energy saving, which is a clean and low-cost solution to the growing demand for energy. …”
Libro electrónico -
10745Publicado 2011“…With additional commentary by Johnson himself, this book reveals the innovation found in a wide range of fields, including science, technology, energy, transportation, education, art, and sociology, making it vital, fresh, and fascinating reading for our time, and for the future…”
Grabación no musical -
10746Publicado 2020“…Mobile robots are widely used for surveillance, guidance, transportation and entertainment tasks, as well as medical applications. …”
Libro electrónico -
10747Publicado 2020“…Mobile robots are widely used for surveillance, guidance, transportation and entertainment tasks, as well as medical applications. …”
Libro electrónico -
10748Publicado 2019“…Hypersonic vehicles represent the next frontier of passenger transportation to and from space. However, several design issues must be addressed, including vehicle aerodynamics and aerothermodynamics, aeroshape design optimization, aerodynamic heating, boundary layer transition, and so on. …”
Libro electrónico -
10749Publicado 2020“…Mobile robots are widely used for surveillance, guidance, transportation and entertainment tasks, as well as medical applications. …”
Libro electrónico -
10750por Ragab AL-Refaey, Mahmoud“…"Emerging AI technologies provide support for the connectivity of buildings, data, energy, transport, and governance, allowing increasing innovations across industrial applications. …”
Publicado 2024
Libro electrónico -
10751Publicado 2017“…"Architecture is increasingly understood as a field of practice that is inextricably embedded in ecologies and energy systems, and yet embodied energy-the various forms of energy required to extract raw matter, to produce and transport building materials, and to assemble a given building-remains largely under-explored in its ramifications for both design and environment. …”
Libro -
10752por García, Víctor Hugo“…Esta metodología permite modelar simultáneamente los procesos de deformación tectónica (formación de fallas y pliegues) y los procesos de erosión-transporte-sedimentación (formación de ríos, cuencas de drenaje, abanicos aluviales, pedimentos). …”
Publicado 2010
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Tesis -
10753por Chesbrough, Henry William“…It is one thing to think of the automobile as a means for transportation, it's another to thing to provide transportation services over a life time"--…”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
10754Publicado 2017“…The emic and etic perception might differ especially when media do not only transport narratives or any religious knowledge but represent an idea of transcendence and evoke elementary religious feelings. …”
Libro electrónico -
10755por Dutu, Richard“…Despite having low government spending, Switzerland scores highly in various public policy outcomes, including health, education and transportation. But, as the population grows and ages, efficiency of public spending will have to rise to maintain low tax rates. …”
Publicado 2016
Capítulo de libro electrónico -
10756Publicado 2017“…Deploy Hybrid WAN connectivity to increase WAN capacity and improve application performance Overlay DMVPN on WAN transport to simplify operations, gain transport independence, and improve VPN scalability Secure DMVPN tunnels and IWAN routers Use Application Recognition to support QoS, Performance Routing (PfR), and application visibility Improve application delivery and WAN efficiency via PfR Monitor hub, transit, and branch sites, traffic classes, and channels Add application-level visibility and per-application monitoring to IWAN routers Overcome latency and bandwidth inefficiencies that limit application performance Use Cisco WAAS to customize each location’s optimizations, application accelerations, and virtualization Smoothly integrate Cisco WAAS into branch office network infrastructure Ensure appropriate WAN application responsiveness and experience Improve SaaS application performance with Direct Internet Access (DIA) Perform pre-migration tasks, and prepare your current WAN for IWAN Migrate current point-to-point and multipoint technologies to IWAN…”
Libro electrónico -
10757Publicado 2016“…The course concentrates on the concepts, equipment, and protocols used in the Layer 2 (data link), Layer 3 (network), and Layer 4 (transport) components of the OSI networking framework. …”
-
10758Publicado 2020“…Chapter 8 presents a useful data mining algorithm to conduct life cycle asset management in residential developments built on transport systems…”
Libro electrónico -
10759por Lázaro Domínguez, FranciscoTabla de Contenidos: “…-- 5.1.2 Linux en la investigación forense -- 5.1.3 Poniendo en marcha una estación de trabajo con Linux -- 5.1.4 Descarga, compilación e instalación de herramientas -- 5.1.5 Montaje automático de particiones -- 5.2 ESTRUCTURA TÍPICA DE UN SISTEMA LINUX -- 5.2.1 Arquitectura y sistemas de archivos -- 5.2.2 Jerarquía de directorios -- 5.2.3 Archivos y permisos -- 5.2.4 Marcas de tiempo -- 5.3 INFORMACIÓN VOLÁTIL -- 5.3.1 Fecha y hora del sistema -- 5.3.2 Información de interés -- 5.3.3 Puertos y conexiones abiertas -- 5.3.4 Procesos en ejecución -- 5.4 ADQUISICIÓN FORENSE -- 5.4.1 Adquisición con dd -- 5.4.2 Adepto -- 5.5 ANÁLISIS -- 5.5.1 La línea de tiempo -- 5.5.2 Herramientas para elaborar una línea de tiempo -- 5.5.3 Recuperación de archivos borrados -- 5.6 OTRAS HERRAMIENTAS -- 5.6.1 Chkrootkit y Rkhunter -- 5.6.2 Md5deep -- 6 REDES E INTERNET -- 6.1 COMPONENTES DE UNA RED -- 6.1.1 Visión general de una red corporativa -- 6.1.2 Archivos de registro -- 6.1.3 Preservación de elementos de evidencia en redes -- 6.1.4 Siguiendo pistas -- 6.2 PROTOCOLOS -- 6.2.1 Capa de transporte: TCP -- 6.2.2 Puertos -- 6.2.3 Capa de red: IP -- 6.2.4 Enrutamiento -- 6.2.5 Capa de enlace de datos: interfaces Ethernet -- 6.2.6 Protocolos de nivel superior: HTTP y SMB…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
10760por Martínez Sánchez, RubénTabla de Contenidos: “….) -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 CONCEPTOS IMPRESCINDIBLES Y PROTOCOLO TCP/IP -- INTRODUCCIÓN -- 1.1 CÓMO SE ORGANIZA INTERNET -- 1.1.1 INTERNET SOCIETY -- 1.1.2 INTERNET ENGINEERING TASK FORCE -- 1.1.3 INTERNET ENGINEERING STEERING GROUP -- 1.1.4 INTERNET ARCHITECTURE BOARD -- 1.1.5 INTERNET ASSIGNED NUMBERS AUTHORITY -- 1.1.6 WORLD WIDE WEB CONSORTIUM -- 1.1.7 CERT UNIVERSITY OF CARNEGIE MELLON -- 1.2 EL USO DE DOCUMENTACIÓN RFC -- 1.3 LAS DIRECCIONES IP -- 1.4 TIPOS DE REDES -- 1.4.1 DIRECCIONES DE CLASE A -- 1.4.2 DIRECCIONES DE CLASE B -- 1.4.3 DIRECCIONES DE CLASE C -- 1.4.4 DIRECCIONES DE CLASE D -- 1.4.5 DIRECCIONES DE CLASE E -- 1.5 MÁSCARAS DE RED -- 1.5.1 SUBREDES -- 1.6 ENRUTAMIENTO -- 1.6.1 NATTING -- 1.6.2 REDES TRONCALES -- 1.7 WELL KNOWN PORTS -- 1.8 NOMBRES DE DOMINIO, DNS -- 1.9 PROTOCOLOS -- 1.10 PROTOCOLOS A NIVEL DE RED -- 1.10.1 PROTOCOLO IP -- 1.10.2 IPV4 -- v1.10.3 IPV6 -- 1.10.4 PROTOCOLO ARP -- 1.10.5 PROTOCOLO ICMP -- 1.11 PROTOCOLOS A NIVEL DE TRANSPORTE -- 1.11.1 PROTOCOLO TCP -- 1.11.2 PROTOCOLO UDP -- 1.12 PROTOCOLOS A NIVEL DE APLICACIÓN -- 1.12.1 PROTOCOLO SMB1.12.1 PROTOCOLO SMB -- 1.12.2 PROTOCOLO SNMB -- 1.13 CONCLUSIONES -- 2 BUSCAR UN VECTOR DE ATAQUE -- 2.1 SEGUIMIENTO DE UN OBJETIVO -- 2.2 RECOPILANDO INFORMACIÓN DESDE INTERNET -- 2.2.1 LAS PRIMERAS TÉCNICAS Y HERRAMIENTAS -- 2.2.2 BASES DE DATOS WHOIS, RIPE, NIC -- 2.2.3 TRANSFERENCIAS DNS NO AUTORIZADAS -- 2.2.4 TRAZADO DE RUTAS -- 2.2.5 BARRIDOS PING -- 2.2.6 CONSULTAS ICMP (INTERNET CONTROL MESSAGE PROTOCOL -- 2.2.7 ESCANEO DE PUERTOS -- 2.2.7.1 NMAP -- 2.2.7.2 NETCAT -- 2.2.7.3 HPING -- 2.3. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico