Mostrando 841 - 860 Resultados de 916 Para Buscar '"dragón"', tiempo de consulta: 0.11s Limitar resultados
  1. 841
    Publicado 2017
    Tabla de Contenidos: “…-- AI to Leverage Humans -- Collaboration at Work -- Your Role as Manager -- Working with Data Scientists -- Taking the Right Steps -- Expressing the Value of Marketing -- Know Your Place -- AI for Best Practices -- Notes -- Chapter 10: Mentoring the Machine -- How to Train a Dragon -- What Problem Are You Trying to Solve? -- What Makes a Good Hypothesis? …”
    Libro electrónico
  2. 842
    por Coronado Schwindt, Gisela
    Publicado 2013
    Tabla de Contenidos: “…Borges: reescrituras; El dragón: un símbolo de la literatura fantástica. A propósito de El libro de los seres imaginarios de J. …”
    Libro electrónico
  3. 843
    Publicado 2006
    Tabla de Contenidos: “…PEQUEÑA TEORÍA DEL ENCANTAMIENTO3. DRAGONES, MONSTRUOS Y MAGOS; 4. EL D.N.I. DE DON QUIJOTE; 5. …”
    Libro electrónico
  4. 844
    por Tamayo Hernádez, Yamilet
    Publicado 2014
    Tabla de Contenidos: “….- Constelación de Casiopea; 4.2.2.- Constelación del Dragón; 4.2.3.- Constelación de la Osa Mayor; 4.2.4.- Constelaciones de primavera; Constelación del Cangrejo (Cáncer); Constelación del León; La Virgen (Virgo); Constelación el Boyero; 4.2.5.- Constelaciones de verano; El triángulo de verano…”
    Libro electrónico
  5. 845
    por Melling, Barbara
    Publicado 2014
    Tabla de Contenidos: “…AÑO NUEVO CHINO; FAROL CHINO; MARIONETAS DE PALO CHINAS; MARIONETA DE DRAGÓN CHINO; 17. LOS TRES CERDITOS; CASAS DE PAJA, PALILLOS Y LADRILLOS; MÁSCARA DE CERDITO; MARIONETAS DE DEDOS DEL CERDITO Y EL LOBO; 18. …”
    Libro electrónico
  6. 846
    Publicado 2018
    Tabla de Contenidos: “…Anonymize Resumes 30 Look Harder Part B: Minding the Gap 32 Stacking the Loop and Mining for Diamonds 35 Set Explicit Diversity Goals, Then Mirror Your Interview Loop to Match 37 Pay Big Bonuses for Employee Referrals of Candidates from Underrepresented Backgrounds 40 Mining for Diamonds and "Custom Grooming" 41 Straight Talk: Lisa Maki 47 Chapter 3 Solution 2: In It to Win It: Supporting Women's Development 49 Reverse Mentoring 49 Increasing Female Visibility 54 Straight Talk: Eugenia Harvey 63 Straight Talk: Maria Hess 64 Chapter 4 Solution 3: Listen Louder 65 Dragon Slayers and Deliberators 66 Star Shooters and Stratosphere Blasters 68 Identical Pitches Yield Biased Results 70 How Men Can Change the Way They Listen 72 Straight Talk: Karen Cooper 80 Straight Talk: Susannah Malarkey 81 Chapter 5 Solution 4: Creating a Family-Forward Culture 83 One: No Meetings before 9:00 a.m. 86 Two: Men Should Take Just as Much Parental Leave as Women 89 Three: Shut Down Email at Night 92 Four: Create Family-Friendly Spaces, Not Bro-Friendly Spaces 96 Straight Talk: Christina Watt 105 Straight Talk: Dr. …”
    Libro electrónico
  7. 847
    Publicado 2016
    Tabla de Contenidos: “…Efficient RPG UI overlays -- The adventurer's overlay -- A context-sensitive overlay -- Modern floating UI approach -- Balancing the need -- Bring on the GUI -- Laying out the HUD -- Displaying the correct buttons -- Going further -- Summary -- Chapter 10: The Battle Begins -- Designing an interesting battle system -- Leveling up -- Balancing -- Preparing to attack a single enemy -- Beefing up the enemy AI -- The enemy profile/controller -- Updating the Dragon prefab -- Setting up the enemy profile in the code -- Selecting an attack -- Adding a visual effect to attack selection -- Selecting a target -- The selection circle prefab -- Adding selection logic to the EnemyController class -- Attack! …”
    Libro electrónico
  8. 848
    por Careaga Guzmán, Christian
    Publicado 2015
    “…Sus observaciones y reflexiones sobre la evolución de los valores culturales de las sociedades de los EEUU, la Unión Europea y sobre el despertar industrial y comercial del Imperio del Centro, así como los deseos de homologación internacional del Gran Dragón se materializan ahora en esta reflexión académica. …”
    Texto completo en Odilo
    Otros
  9. 849
    Publicado 1996
    Tabla de Contenidos: “…Tiempo -- Manhattan Rain / Carlos Angeles -- Jacaranda Trees / Carlos Angeles -- Crossing 14th St. and Avenue A / Luis Cabalquinto -- Sunday with the Smiths / Luis Cabalquinto -- Dragon / Rene J. Navarro -- An Imaginary Letter to My Twin Sons / Gemino H. …”
    Libro
  10. 850
    por Perez Salomon, Omar
    Publicado 2010
    Tabla de Contenidos: “…2.2- De la Telefonía2.3- Servicios telefónicos; 2.3.1- En La Habana; 2.3.2- Red Telefónica Oficial de la Habana; 2.3.3- Comienzos de las operaciones de la Cuban Telephone Company; 2.3.4- La primera central telefónica automática de La Habana; 2.3.5- Reorganización en la Cuban Telephone Company; 2.3.6- Enlace Telefónico Submarino Cuba - Estados Unidos; 2.3.7- Nace la ITT; 2.3.8- La Radiodifusión comercial por vía telefónica; 2.3.9- Edificio de Águila y Dragones; 2.3.10- Destalles sobre la construcción del nuevo edificio; 2.3.11- Sistema telefónico Cuba - España…”
    Libro electrónico
  11. 851
    Publicado 2018
    Tabla de Contenidos: “…BLANCA NIEVES Y LOS SIETE ENANOS -- FIGURA 1.26. DRAGONES DE EL SALADO -- FIGURA 1.27. MANO NEGATIVA EN ROJO SOBRE MAMUT NEGRO. …”
    Libro electrónico
  12. 852
    Publicado 2013
    “…A lo largo de los diversos capítulos de esta obra se contempla la situación política, económica y social del dragón asiático en el momento en que acaba de ascender al poder la quinta generación de líderes chinos. …”
    Libro electrónico
  13. 853
    por Knapp, Eric D.
    Publicado 2024
    Tabla de Contenidos: “…Common Industrial Security Recommendations -- Identification of critical systems -- Network segmentation/isolation of systems -- Defense in depth -- Access control -- Advanced Industrial Security Recommendations -- Security Monitoring -- Policy whitelisting -- Application whitelisting -- Common Misperceptions About Industrial Network Security -- Assumptions made in this book -- Summary -- 3 - Industrial Cybersecurity History and Trends -- The convergence of OT and IT -- Importance of securing industrial networks -- The evolution of the cyber threat -- APTs and weaponized malware -- Industroyer -- Night dragon -- Stuxnet -- TRISIS -- Advanced persistent threats and cyber warfare -- Still to come -- Defending against modern cyber threats -- The insider -- Hacktivism, cybercrime, cyberterrorism, and cyberwar -- Summary -- 4 - Introduction to Industrial Control Systems and Operations -- System assets -- Programmable logic controller -- Ladder diagrams -- Sequential function charts -- Remote terminal unit -- Intelligent electronic device -- Human-machine interface -- Supervisory workstations -- Data historian -- Business information consoles and dashboards -- Other assets -- System operations -- Control loops -- Control processes -- Feedback loops -- Production information management -- Business information management -- Process management -- Safety instrumented systems -- The smart grid -- Network architectures -- Summary -- 5 - Industrial Network Design and Architecture -- Introduction to industrial networking -- Common topologies -- Network segmentation -- Higher layer segmentation -- Physical versus logical segmentation -- Microsegmentation -- Cryptographic microsegmentation -- Network services -- Wireless networks -- Remote access -- Performance considerations -- Latency and jitter -- Bandwidth and throughput…”
    Libro electrónico
  14. 854
    Publicado 2016
    Tabla de Contenidos: “…-- Writing Subroutines -- Try It Out 10-1 -- Subroutine Input and Output -- Try It Out 10-2 -- Nesting Subroutines -- Try It Out 10-3 -- Create a Dragon Game -- Step 1: Open the Startup File -- Step 2: Write the SetUp() Subroutine -- Step 3: Add a Bit of Chance -- Step 4: Let the Player Know What's Going On -- Step 5: Get the Player in the Game with GetChoice() -- Step 6: Process the Player's Choice -- Step 7: Add Motion with MoveKnight() -- Step 8: Shoot Arrows with ShootArrow() -- Step 9: Swing the Sword with StabDragon() -- Step 10: Breathe Fire -- Try It Out 10-4 -- Programming Challenges -- Chapter 11: Event-Driven Programming -- GraphicsWindow Events -- Create Patterns with the MouseDown Event -- Try It Out 11-1 -- Fire Missiles with the KeyDown Event -- Try It Out 11-2 -- Make a Typewriter Using the TextInput Event -- Try It Out 11-3 -- Draw Pictures with the MouseMove Event -- Try It Out 11-4 -- Useful Tips -- Create a Gold Rush Game -- Step 1: Open the Startup File…”
    Libro electrónico
  15. 855
    Publicado 2017
    Tabla de Contenidos: “…. -- 3:4 Netwatch for SMM -- 3:5 Packet-in-Packet Mitigation Bypass -- 3:6 An RDRAND Backdoor in Bochs -- 3:7 Kosher Firmware for the Nokia 2720 -- 3:8 Tetranglix Boot Sector -- 3:9 Defusing the Qualcomm Dragon -- 3:10 Tales of Python's Encoding -- 3:11 Angecryption -- Chapter 4: Tract de la Société Secrète -- 4:1 Let me tell you a story -- 4:2 Epistle on the Bountiful Seeds of 0Day -- 4:3 This OS is a Boot Sector -- 4:4 Prince of PoC -- 4:5 New Facedancer Framework -- 4:6 Power Glitching Tamagotchi -- 4:7 A Plausibly Deniable Cryptosystem -- 4:8 Hardening Pin Tumbler Locks -- 4:9 Intro to Chip Decapsulation -- 4:10 Forget Not the Humble Timing Attack -- 4:11 This Truecrypt is a PDF -- 4:12 How to Manually Attach a File to a PDF -- 4:13 Ode to ECB -- Chapter 5: Address to the Inhabitants of Earth…”
    Libro electrónico
  16. 856
    Publicado 2015
    Tabla de Contenidos: “…Security Monitoring -- Policy Whitelisting -- Application Whitelisting -- Common Misperceptions About Industrial Network Security -- Assumptions Made in This Book -- Summary -- Chapter 3 - Industrial Cyber Security History and Trends -- Information in this Chapter -- Importance of Securing Industrial Networks -- The Evolution of the Cyber Threat -- APTs and Weaponized Malware -- Night Dragon -- Stuxnet -- Advanced Persistent Threats and Cyber Warfare -- Still to Come -- Defending Against Modern Cyber Threats -- The Insider -- Hacktivism, Cyber Crime, Cyber Terrorism, and Cyber War -- Summary -- Chapter 4 - Introduction to Industrial Control Systems and Operations -- Information in this Chapter -- System Assets -- Programmable Logic Controller -- Ladder Diagrams -- Sequential Function Charts -- Remote Terminal Unit -- Intelligent Electronic Device -- Human-Machine Interface -- Supervisory Workstations -- Data Historian -- Business Information Consoles and Dashboards -- Other Assets -- System Operations -- Control Loops -- Control Processes -- Feedback Loops -- Production Information Management -- Business Information Management -- Process Management -- Safety Instrumented Systems -- The Smart Grid -- Network Architectures -- Summary -- Chapter 5 - Industrial Network Design and Architecture -- Information in this Chapter -- Introduction to Industrial Networking -- Common Topologies -- Network Segmentation -- Higher Layer Segmentation -- Physical vs. …”
    Libro electrónico
  17. 857
    Publicado 2017
    Tabla de Contenidos: “…Event-driven architecture and messaging -- Tactical patterns -- Patterns to model the domain -- Entities -- Value objects -- Domain services -- Modules -- Aggregates -- Factories -- Repositories -- Emerging patterns -- Domain events -- Event sourcing -- Other patterns -- Summary -- References and further reading materials -- Chapter 6: Enterprise Architecture Platforms and Tools -- Overview of enterprise architecture frameworks -- Getting started with TOGAF -- Architecture development method (ADM) -- Deliverables, artifacts, and building blocks -- Enterprise continuum -- Architecture repository -- Advantages of using TOGAF -- Limitations of TOGAF -- Zachman framework for enterprise architecture -- Advantages -- Restrictions -- Guidelines for choosing EAF -- Enterprise architecture platforms and tools -- Enterprise Architect from Sparx Systems -- Dragon1 -- ABACUS from avolution software -- Architecture of ABACUS -- Summary -- References -- Chapter 7: Service-Oriented Architecture (SOA) -- Web services and SOA -- Introduction to SOA -- Life cycle of SOA -- Primary characteristics of SOA -- Service interconnectivity with well-defined interfaces -- Standard interfaces and Service level agreements -- Event-driven and messaging -- Flexible -- Evolution -- Principles of SOA -- Standardized service contract -- Service interoperability -- Service abstraction -- Service autonomy -- Service composability -- Service discoverability -- Service loose coupling -- Service reusability -- Service statelessness -- SOA design patterns -- Service messaging -- Message screening -- Agnostic services -- Atomic service transaction -- Authentication broker -- Message origin authentication -- Service façade -- Multiple service contract -- Service callback -- Event-driven messaging -- Service refactoring -- Metadata centralization -- Principles and patterns cross reference…”
    Libro electrónico
  18. 858
    Publicado 2016
    Tabla de Contenidos: “…ATYPICAL ACCIDENT SCENARIOS -- 3. BLACK SWANS -- 4. DRAGON KINGS -- 5. SMALL THINGS -- 6. CONCLUSIONS -- REFERENCES -- ll - Dynamic Risk Analysis -- 2.1 - Hazard Identification -- 3 - Advanced Technique for Dynamic Hazard Identification -- 1. …”
    Libro electrónico
  19. 859
    por Papantuono, Matteo
    Publicado 2023
    Tabla de Contenidos: “…Las palabras son mágicas: utilizar el lenguaje analógico en las clases -- Dibujar dragones en las nubes -- El lenguaje analógico y los niños -- Evocar sensaciones -- Superar la resistencia y aumentar la colaboración -- Los profesores pueden utilizar el lenguaje analógico para... -- Orientaciones útiles para escoger la analogía correcta -- IV. …”
    Libro electrónico
  20. 860
    Publicado 2021
    Tabla de Contenidos: “…Writing Tests -- The Basics of Testing -- Reporting Test Failures -- Setting Up and Tearing Down -- Storing Sample Test Data -- Caching Test Results -- Testing Your Public API -- Use go-cmp to Compare Test Results -- Table Tests -- Checking Your Code Coverage -- Benchmarks -- Stubs in Go -- httptest -- Integration Tests and Build Tags -- Finding Concurrency Problems with the Race Checker -- Wrapping Up -- Chapter 14. Here There Be Dragons: Reflect, Unsafe, and Cgo -- Reflection Lets Us Work with Types at Runtime -- Types, Kinds, and Values -- Making New Values -- Use Reflection to Check If an Interface's Value Is nil -- Use Reflection to Write a Data Marshaler -- Build Functions with Reflection to Automate Repetitive Tasks -- You Can Build Structs with Reflection, but Don't -- Reflection Can't Make Methods -- Only Use Reflection If It's Worthwhile -- unsafe Is Unsafe -- Use unsafe to Convert External Binary Data -- unsafe Strings and Slices -- unsafe Tools -- Cgo Is for Integration, Not Performance -- Wrapping Up -- Chapter 15. …”
    Libro electrónico