Mostrando 51,581 - 51,600 Resultados de 60,866 Para Buscar '"industrial"', tiempo de consulta: 0.25s Limitar resultados
  1. 51581
    Publicado 2020
    Tabla de Contenidos: “…El cine como herramienta transmisora de valores: paradigma en el estudio de la Revolución Industrial -- 5. Conclusiones -- 6. Referencias -- 7. …”
    Libro electrónico
  2. 51582
    Publicado 2016
    Tabla de Contenidos: “…. -- About You and Your Challenges -- New Territory Requires a Guide -- A New Era -- Section I: State of Affairs -- Chapter 1: The Art of War . . . and Money -- China Has Risen and Is Here to Stay -- China Has Grown into a Formidable and Undeniable Force -- Societal Shift -- A Wake-Up Call for the West -- A New Global Paradigm of Business -- Chapter 2: East and West: The Current State of Affairs -- The Western World Has Dominated with a Position of Strength -- Bedrock of Innovation -- Entrepreneurial Spirit -- Education System -- Consumerism, Brands, and Differentiation -- Access to Low-Cost Suppliers Overseas -- Attitude of Growth -- The (Perceived) Role of the East: Areas of Strength and Specialization -- Execution Expertise -- Manufacturing Expertise -- Masterful Replication -- Inherently Driven -- Chapter 3: How China Came Up the Ladder (and So Quickly) -- Factors Contributing to China's Rapid Success and Growth -- Capitalism Became Okay -- Urbanization Impacted the Way the Chinese Do Business -- China's Rise to a Manufacturing Center for the West -- Right Place, Right Time -- Wealth Accumulation through Exchange Rate Management -- Government Assistance -- Acquisition of Know-How -- Emulation of Market and Industry Leaders, Replication of Product Designs -- Liberalization of Financing -- And Then the Shift Began . . . -- Chapter 4: The West No Longer Rules -- Melding of Positions -- China Today -- The West Today: What's Wrong? …”
    Libro electrónico
  3. 51583
    por Barcelona (Catalunya).
    Publicado 1987
    Tabla de Contenidos: “…Enric Steegmann i García, Pere Mora i Fuertes -- P.E. recinte de l'Escola Industrial / Servei de Planejament i Diputació de Barcelona -- P.E. mançana del Palau Robert ; P.E. mançana del Passatge Coradino / Servei de Planejament -- P.E. …”
    Libro
  4. 51584
    Publicado 2021
    Tabla de Contenidos: “…Smart Education -- 2.6. Smart Industry -- 2.7. Smart City -- 3. IoT challenges -- 3.1. …”
    Libro electrónico
  5. 51585
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Advanced Infrastructure Penetration Testing -- Information security overview -- Confidentiality -- Integrity -- Availability -- Least privilege and need to know -- Defense in depth -- Risk analysis -- Information Assurance -- Information security management program -- Hacking concepts and phases -- Types of hackers -- Hacking phases -- Reconnaissance -- Passive reconnaissance -- Active reconnaissance -- Scanning -- Port scanning -- Network scanning -- Vulnerability scanning -- Gaining access -- Maintaining access -- Clearing tracks -- Penetration testing overview -- Penetration testing types -- White box pentesting -- Black box pentesting -- Gray box pentesting -- The penetration testing teams -- Red teaming -- Blue teaming -- Purple teaming -- Pentesting standards and guidance -- Policies -- Standards -- Procedures -- Guidance -- Open Source Security Testing Methodology Manual -- Information Systems Security Assessment Framework -- Penetration Testing Execution Standard -- Payment Card Industry Data Security Standard -- Penetration testing steps -- Pre-engagement -- The objectives and scope -- A get out of jail free card -- Emergency contact information -- Payment information -- Non-disclosure agreement -- Intelligence gathering -- Public intelligence -- Social engineering attacks -- Physical analysis -- Information system and network analysis -- Human intelligence -- Signal intelligence -- Open source intelligence -- Imagery intelligence -- Geospatial intelligence -- Threat modeling -- Business asset analysis -- Business process analysis -- Threat agents analysis -- Threat capability analysis -- Motivation modeling -- Vulnerability analysis -- Vulnerability assessment with Nexpose -- Installing Nexpose…”
    Libro electrónico
  6. 51586
    por Vanderburg, Eric A.
    Publicado 2021
    Tabla de Contenidos: “…Maintenance Automation -- Monitoring Techniques -- Collector Protocols and Methods -- Tagging -- Log Analysis -- Baselines -- Thresholds -- Trending -- Automated Event Responses -- Log Scrubbing -- Verification of Continuous Monitoring Activities -- Management Tools -- Chapter Review -- Questions -- Answers -- Chapter 11 Security in the Cloud -- Data Security -- Encryption -- Public Key Infrastructure -- Encryption Protocols -- Tunneling Protocols -- Ciphers -- Storage Security -- Protected Backups -- Network Security -- Segmentation -- Firewall -- DDoS Protection -- Packet Capture -- Network Flow -- IDS/IPS -- Packet Broker -- APIs -- Effects of Cloud Service Models on Security Implementation -- Endpoint Protection -- Host-Based Firewall -- Antivirus/Antimalware -- Endpoint Detection and Response -- Data Loss Prevention -- Exercise 11-1: Creating a DLP Policy for Office 365 -- NAC -- Hardening -- Application Whitelisting -- Impact of Security Tools to Systems and Services -- Access Control -- Identification -- Authentication -- Authorization -- Single Sign-On -- Federation -- Access Control Protocols -- Access Control Methodologies -- Multifactor Authentication -- Chapter Review -- Questions -- Answers -- Chapter 12 Security Best Practices -- Cloud Security Engineering -- Implementing Layered Security -- Protecting Against Availability Attacks -- Least Privilege -- Separation of Duties -- Security Automation -- Security Governance and Strategy -- Developing Company Security Policies -- Account Management Policies -- Documenting Security Procedures -- Assessment and Auditing -- Leveraging Established Industry Standards and Regulations -- Applying Platform-Specific Security Standards -- Data Classification -- Legal Holds -- Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365 -- Keeping Employees and Tools Up to Date…”
    Libro electrónico
  7. 51587
    Publicado 2017
    Tabla de Contenidos: “…. -- B The Steele Progeny: A Motley Crew of Circuit Court Tests -- III Doctrinal Analysis: Use-Based Rights and Commercial Effects -- A The Common Law Roots of Lanham Act Subject-Matter Jurisdiction -- B An Element of Modernity: The Effects-on-Commerce Factor -- IV A Bird's-Eye View: Taking Stock of Lanham Act Extraterritoriality -- A The Antitrust Gene: A Dominance of Effects -- B Common Law Goodwill Protection: Tea Rose/Rectanus Goes Global -- V Summary: An Era of International Trademark Propertization -- Conclusions -- 3 A Ragged Landscape of Theories -- Introduction -- Section 1 Traditional Civil Law Trademark Conflicts -- I The Principle of Territoriality -- II Analysis: The Curse of Formal Reasoning and Conduct Orientation -- Section 2 Modern Civil Law Unfair Competition Conflicts -- I The Marketplace Principle, Determination of Effects, and the De Minimis Rule -- A Collision-of-Interests and Substantive-Purpose Analysis -- B Multistate Scenarios: Determination of Marketplace Effects and De Minimis Limitations -- II Analysis: The Obsolescence of Tort Foundations -- Section 3 The New Paradigm-A Law of Market Regulation -- I Antitrust Conflicts Reloaded: The Effects Principle -- II Analysis: The Unboundedness of Unqualified Effects -- Section 4 Modern Soft Law-WIPO Recommendation, ALI Principles, and Others -- I Nonbinding Suggestions of Substantive Law and Conflicts Resolution -- A The Joint Recommendation Concerning Provisions on the Protection of Marks, and Other Industrial Property Rights in Signs, on the Internet -- B ALI Principles, CLIP Principles, and the Japanese Transparency Proposal -- II Analysis: "Chips off the Old Block" -- A The Joint Recommendation…”
    Libro electrónico
  8. 51588
    Cryptocurrency All-in-One For Dummies
    Cryptocurrency All–in–One For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Knowing What Happens When You Kick the Bucket -- Choosing the multi-sig solution -- Scheduling future transactions -- Using a digital inheritance feature -- Book 4 Ethereum -- Chapter 1 Getting to Know Ethereum -- Exploring Ethereum's Consensus, Mining, and Smart Contracts -- Buying, Spending, and Trading Ether -- Getting Started with DAO and ICO -- Delving into Development Tools -- Chapter 2 Exploring Use Cases for Ethereum -- Diving into Ethereum Applications -- Exploring Financial Services -- Banking -- Creating Ethereum escrow applications -- Examining ICOs -- Establishing Digital Identity Management -- Managing individual and device identities -- Reducing fraud and identity theft -- Examining the ERC-725 standard and beyond -- Examining Industry Applications -- Healthcare -- Energy -- Supply chain -- Enabling Effective Governance -- Tax payment -- Government spending -- Voting -- Policy development -- Notary -- Chapter 3 Examining the Ethereum Ecosystem and Development Life cycle -- Exploring the Ethereum Blockchain Block Structure -- Describing Smart Contracts -- Introducing Solidity, the Language of Smart Contracts -- Working with the Ethereum Virtual Machine -- Fueling Your Code with Gas -- Surveying Tools for Developing, Testing, and Deploying Ethereum Apps -- Ethereum blockchain client -- Development and testing blockchain -- Compiler and testing framework -- Source code editor/IDE -- Describing the Ethereum Development Life cycle -- Introducing Smart Contract Development Tools -- Chapter 4 Getting and Configuring Ethereum Development Tools -- Examining Why Multiple Ethereum Development Tools Are Available -- Downloading, Installing, and Configuring All the Pieces -- Installing the blockchain client -- Installing the test blockchain -- Installing the testing environment -- Getting ready to install Truffle…”
    Libro electrónico
  9. 51589
    Publicado 2016
    Tabla de Contenidos: “…Share of higher education R&D financed by industry -- Figure 1.13. Externally developed goods and services used in innovation -- Appropriate framework conditions are needed to increase productivity -- Removing obstacles for firm expansion and start-up creation will boost productivity…”
    Libro electrónico
  10. 51590
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…Technological upgrades and farmers' organisations could open up new opportunities in food processing and sales to the tourism industry -- 2.3.3. Attracting more young people into agriculture and reducing government involvement, could make agricultural sectors in the OECS region more dynamic -- 2.3.4. …”
    Libro electrónico
  11. 51591
    Tabla de Contenidos: “…La diffusion de la normalisation dans les économies en transition -- Ouvrir l'économie aux pressions concurrentielles -- Privatisation et libéralisation dans les industries de réseau -- Énergie -- Télécommunications -- Le processus d'adhésion à l'UE -- Tableau 24. …”
    Libro electrónico
  12. 51592
    Tabla de Contenidos: “…The politics: Geopolitical competition also presents opportunities for development -- The policies: Do not overlook the power of domestic political economy -- Towards a new agenda for international development -- Address the global political economy challenge -- Improve co-operation among donors to prevent duplication of efforts -- Reinforce the value and legitimacy of multilateralism -- Greening international development co-operation -- In the context of growing power rivalries and polarisation, developing countries should strengthen regional development and security co-operation -- Address domestic political economy challenges -- Base development strategies on local strengths and structural transformation rather than focusing on deficiencies -- Developing countries themselves should engage stakeholders to develop a long-term vision within an institutional framework and leverage endogenous innovation to achieve long-term economic transformation -- Leverage the strengths of ODA in crisis situations and fragile contexts, using it to steer other resources, and increase transparency and accountability of ODA flows for the public and recipients -- Address transversal challenges -- Leverage the role of emerging technologies and the Fourth Industrial Revolution -- Give gender and youth the place they deserve in development -- Capitalise on the global private sector -- Conclusion -- References -- 3 In focus: Reforming climate finance -- Key messages -- Soaring climate costs underscore a critical need for "new and additional" finance -- Greater climate finance transparency can ensure promises are kept to the Global South -- Debt-free climate finance must become the norm -- Tracking gender-responsive finance is key to measuring impact and equity -- A new global climate finance goal is an opportunity to commit to climate justice -- References -- Notes…”
    Libro electrónico
  13. 51593
    Publicado 2023
    Tabla de Contenidos: “…Chapter 6 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- 3 Securing a Business -- Chapter 1 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network -- Determine how backups are handled -- Be careful where you work remotely…”
    Libro electrónico
  14. 51594
    Publicado 2016
    Tabla de Contenidos: “…Why they still work (less and less) -- A4.4. What would an industry breaker do? -- A4.5. Conclusion -- Appendix 5: Tips on Deepening Understanding by Using Trialectics -- A5.1. …”
    Libro electrónico
  15. 51595
    Publicado 2024
    Tabla de Contenidos: “…Discussion Questions -- Hands-On MIS Projects -- Management Decision Problem -- Achieving Operational Excellence: Creating an Executive Payroll Register with Spreadsheet Software -- Improving Decision Making: Using the Internet to Locate Jobs Requiring Information Systems Knowledge -- Collaboration and Teamwork Project -- Business Problem-Solving Case: Adyen and Fintech: Driving Change in the Financial Services Industry -- Chapter 1 References -- Chapter 2. Global E-business and Collaboration -- Chapter-Opening Case: Microsoft Teams Helps Toyota Motor North America (TMNA) Do Even Better -- 2-1 Identify the major features of a business that are important for understanding the role of information systems. -- Organizing a Business: Basic Business Functions -- Business Processes -- Managing a Business and Firm Hierarchies -- The Business Environment -- The Role of Information Systems in a Business -- 2-2 Explain how information systems serve different management groups in a business, and how systems that link the enterprise improve organizational performance. -- Systems for Different Management Groups -- Spotlight On: Organizations: Carbon Lighthouse Lights Up with the Internet of Things (IoT), Big Data, and Cloud Computing -- Systems for Linking the Enterprise -- E-business, E-commerce, and E-government -- 2-3 Understand why systems for collaboration, social business, and knowledge management are so important and the technologies they use. -- What is Collaboration? …”
    Libro electrónico
  16. 51596
    Tabla de Contenidos: “…Front Cover -- FTTx Networks -- FTTx Networks: Technology Implementation and Operation -- Copyright -- Dedication -- Contents -- About the Authors -- Acknowledgments -- 1 - Overview of FTTx -- 1 - Introduction -- PHYSICAL TECHNOLOGIES FOR COMMUNICATION -- PURPOSE OF THE BOOK -- TERMINOLOGY -- COMMON FTTH SYSTEMS -- OTHER FTTH PHYSICAL ARCHITECTURES -- FTTH DATA LINK AND NETWORK PROTOCOLS -- 2 - Deciding to Build an FTTx Network -- INTRODUCTION -- TYPES OF ORGANIZATIONS BUILDING FTTH NETWORKS -- System 1: US Municipal Electric System -- System 2: Incumbent Local Exchange Carrier, Small European Country -- System 3: Northern European Municipal Power Utility -- System 4: US Municipality-Owned Utility -- THE DECISION-MAKING PROCESS -- Business Considerations -- Technology Considerations -- Those Hidden Extras -- Organizational Considerations -- INDUSTRY ORGANIZATION -- Endnotes -- 2 - FTTx Technologies -- 3 - EPON -- INTRODUCTION -- EPON AND VARIATIONS -- EPON KEY FEATURES -- Speed -- DC Elimination and Clock Synchronization -- Encryption -- Flow Control Versus Multipoint Control Protocol -- Discovering the New Guy -- After Discovery -- Logical Link Identifier -- PtP Ethernet Versus PON -- LLID Downstream -- Then the Great Multicast Morph of 2012 -- LLID Upstream -- System Management -- Element Management -- Operational Support Systems -- EXTENSIONS TO EPON -- PON OPTICS -- EPON Optics Options -- SRS Effects -- SUMMARY -- Endnotes -- 4 - GPON -- INTRODUCTION -- GPON KEY FEATURES -- Speed -- DC Elimination and Clock Synchronization -- Encryption -- Flow Control in GPON -- Discovering the New Guy -- After Discovery -- PON Protection -- Type B Protection -- Type C Protection -- OMCI -- ELEMENT MANAGEMENT -- OPERATIONAL SUPPORT SYSTEMS -- PON OPTICS -- GPON Optics Options -- XG-PON Optics Options -- SRS Effects -- SUMMARY -- Endnotes…”
    Libro electrónico
  17. 51597
    Publicado 2020
    Tabla de Contenidos: “…Intro -- Blank Page -- Blank Page -- Preface -- By Þórdís Kolbrún Reykfjörð Gylfadóttir, Minister of Tourism, Industry and Innovation -- Preface -- By Páll Gunnar Pálsson, Director General of the Icelandic Competition Authority -- Foreword -- Acknowledgements -- Abbreviations and acronyms -- Units of measurement -- Executive Summary -- Construction -- Tourism -- Conclusion -- 1 Assessment and recommendations -- 1.1. …”
    Libro electrónico
  18. 51598
    Publicado 2023
    Tabla de Contenidos: “…-- Limitations in Bitcoin -- Altcoins -- Overview of blockchain use cases in the industry and government -- Financial services -- Healthcare -- Blockchain use cases led by government -- Ushering in the world of Ethereum -- Smart contract -- EVM -- Account -- Summary -- Chapter 2: Ethereum Architecture and Ecosystem -- Technical requirements -- Introducing the Eth1 Architecture -- Ethereum - the world computer -- Web 2.0, Web3, to the Metaverse -- DApps -- Diving deep into Eth1 -- Accounts -- Two types of accounts -- EOAs -- CAs -- Transactions and messages -- Smart contracts -- Ether and gas -- The EVM -- Addresses and wallets -- Examining mining in Eth 1.0 -- Mining and the consensus protocol -- Ethereum transactions and block structure -- Transaction validation and block verification -- Understanding scaling challenges in Ethereum -- The blockchain scalability trilemma -- Modular blockchain architecture -- Ethereum scaling solutions -- Introducing Beacon Chains and Eth2 -- PoS in Eth2 -- How the beacon chain works -- Benefits from the transition to PoS -- Merging Eth1 and Eth2 -- Merging Eth1 data into Eth2…”
    Libro electrónico
  19. 51599
    Publicado 2005
    Tabla de Contenidos: “…NETWORK STANDARDS AND STANDARDS ORGANIZATIONS -- Proprietary, Open, and De Facto Standards -- Proprietary Standards -- Open Standards -- De Facto Standards -- Networking Standards -- International Networking Standards Organizations -- Networking Industry Groups -- Internet Standards Organizations (ISOC, IAB, IESG, IETF, IRSG, and IRTF) -- Internet Registration Authorities and Registries (IANA, ICANN, APNIC, ARIN, LACNIC, and RIPE NCC) -- Internet Centralized Registration Authorities -- Modern Hierarchy of Registration Authorities -- Internet Standards and the Request for Comment (RFC) Process -- RFC Categories -- The Internet Standardization Process -- 4. …”
    Libro electrónico
  20. 51600
    por Mariappan, P., Dr
    Publicado 2013
    Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Preface -- About the Author -- Chapter 1: Introduction -- 1.1 The History of Operations Research -- 1.2 The Meaning of Operations Research -- 1.3 Models of Operations Research -- 1.4 Scope of Operations Research -- 1.4.1 Agriculture -- 1.4.2 In Organisation/Industry -- 1.4.3 In Military Operations -- 1.4.4 Planning -- 1.4.5 In Transport -- 1.4.6 In Hospitals -- 1.4.7 In Production Management -- 1.4.8 In Marketing -- 1.4.9 In Finance -- 1.4.10 L.I.C. -- 1.5 Phases of OR -- 1.6 Limitations of Operations Research -- Exercise Problems -- Review Questions -- Chapter 2: Linear Programming Problem (LPP) -- 2.1 Introduction -- 2.2 General Model of the Linear Programming Problem -- 2.3 Characteristics of an LPP -- 2.4 Assumptions of Linear Programming -- 2.4.1 Limitations of Linear Programming -- 2.5 Formulation of an LPP -- 2.6 Standard Form of an LPP -- 2.6.1 Conversion of an LPP into Standard Form with Maximization Objective -- 2.7 Solution to an LPP -- 2.8 Types of Possible Solutions to an LPP -- 2.8.1 Basic Solution -- 2.8.2 Basic Feasible Solution -- 2.8.3 Basic Infeasible Solution -- 2.8.5 Unique Optimum Solution -- 2.8.6 Multiple Optimum Solution -- 2.8.7 Basic and Non-Basic Variables -- 2.8.8 Degenerate Solution -- 2.8.4 Optimal Solution -- 2.9 Convex Set and Extreme Point -- 2.9.1 Important Points to be Remembered -- 2.10 Graphical Solution to an LPP -- 2.11 Simplex Methods -- 2.11.1 Simplex Method-I/Ordinary Simplex Method -- 2.12 Penalty Method/Big-M Method/Charnes Method -- 2.13 Two-phase Method -- 2.14 The Duality Concept in a Linear Programming -- 2.14.1 Definition of the Dual problem -- 2.14.2 Standard Form of the Primal -- 2.14.3 Standard Form of the Dual -- 2.14.4 Structural and Computational Relationship Between Primal and Dual Problems -- 2.14.5 In Matrix Notation (Primal & Dual)…”
    Libro electrónico