Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Internet 2,829
- Engineering & Applied Sciences 800
- Computer networks 610
- Internet programming 605
- Revistes 582
- Computer Science 497
- Internet marketing 453
- Application software 445
- Security measures 411
- Development 399
- recursos en Internet 340
- Electrical & Computer Engineering 330
- Computer security 324
- Internet of things 317
- Telecommunications 317
- Web site development 314
- Operating systems (Computers) 312
- Management 304
- Marketing 298
- Web sites 274
- Universidad Pontificia de Salamanca (España) 265
- Aspectos sociales 251
- Design 246
- Social aspects 244
- Information technology 242
- Comercio electrónico 228
- Data processing 225
- Marketing en Internet 211
- Diseases 210
- Medios de comunicación social 206
-
25021Publicado 2023Tabla de Contenidos: “…Following the Three-Act Structure -- Making a good beginning -- Setting the scene -- Crafting an alluring opening line -- Starting in the middle with an inciting incident -- Keeping the tension going in the middle -- Ending well -- Building to the climax and resolution -- Examining types of endings -- Writing within a Time Frame -- Lining up a linear narrative -- Going linear with flashbacks -- Writing backward -- Jumping around in time -- Leaving a gap in the narrative -- Connecting short stories -- Telling a story within a story -- Going around in circles stories -- Chapter 10 From Drafting to Rewriting and Editing: Making Your Work Shine -- Producing the First Draft -- Trying different techniques -- Letting it go and coming back later -- Becoming Your Own Editor -- Reviewing your first draft -- Correcting common English errors -- Staying on top of spelling -- Grasping the basics of grammar -- Paying attention to sentence construction -- Eliminating overused words and phrases -- Ensuring that the structure's sound -- Cutting and pasting to improve readability -- Adding texture -- Paring down -- Eliminating backstory -- Recruiting a Trusted Reader -- Part 3 Writing Fiction -- Chapter 11 When Less is More: Crafting Short Stories -- Defining the Short Story -- Writing the Short Story -- Structuring a short story -- Making every word count -- Joining stories together -- Exploring Short-Story Genres -- Finding Short-Story Ideas -- Developing Your Writing Skills: Entering Short-Story Competitions -- Considering competition basics -- Making your story stand out from the crowd -- Finding an Outlet for Your Short Fiction -- Literary magazines -- Anthologies -- Women's magazines -- Science fiction magazines -- Radio -- The Internet -- Live events -- Growing a Short Story into a Novella -- Chapter 12 Writing the Novel -- Aspiring to the Literary Novel…”
Libro electrónico -
25022por Hurley, WilliamTabla de Contenidos: “…Finding Waldo in a Sea of Striped Hats -- Grabbing That Cash -- Insuring That Quantum Makes Its Mark -- Making the World Go Round with Logistics -- Dreaming of Machines Learning -- Searching for the New Oil in Quantum -- Making Materialism Matter -- Simulating Our Way to Better Health -- Finding New Pharmaceuticals -- Forecasting Future Fog -- Chapter 14 Quantum Computing Algorithms -- Mapping Quantum Computing Algorithms to Applications -- Understanding the Basics of Quantum Algorithms -- Mapping algorithms to use cases -- Investing in research -- Visiting the Quantum Zoo -- Finding New Kinds of Time -- Starting with the Deutsch-Jozsa Algorithm -- Making Shor Quantum Computing Will Be Big -- Searching with Grover -- Using the Quantum Phase Estimation Algorithm -- Applying Simon's Algorithm -- Implementing the Quantum Fourier Transform (QFT) Algorithm -- Stepping into Vaidman's Quantum Zeno Effect -- Getting Linear with the HHL Algorithm -- Solving and Simulating with QAOA -- Getting Grounded with VQE -- Assessing Additional Algorithms -- Identifying What's Ahead -- Chapter 15 Cloud Access Options -- Exploring the Major Types of Options -- Grouping public cloud providers -- Examining quantum computer manufacturers -- Looking at access providers -- Noting the Importance of Amazon Braket -- Counting on Azure Quantum -- Investigating Google Quantum AI -- Opening Quantum Computer Vendor's Portals -- Unlocking Quantum Potential with Strangeworks -- Perusing a classical catalog of quantum technologies -- Exploring compute providers -- Understanding managed applications -- Chapter 16 Educational Resources -- Connecting with Online Classes -- MIT Quantum Information Sciences -- Quantum Cryptography -- The Quantum Internet and Quantum Computers: How Will They Change the World? …”
Publicado 2023
Libro electrónico -
25023por Scott, Sharon M.Tabla de Contenidos: “…Providing Community Access and Security -- Chapter 7 Cranking It Up: Developing Your Music Collection -- Building a Physical Library -- Thinking about shelving (and space) -- Choosing an organizational method -- Collecting your materials and getting to work -- Venturing into vinyl -- Learning CD selectivity -- Tangling with tapes -- Programming albums -- Marking materials for safekeeping -- Developing a Digital Library -- Seeking digital selections -- Managing digital files -- Using software to keep the music going -- Archiving Original In-House Productions -- Chapter 8 Going for the Gold: Developing Station Income -- Making Friends and Creating Opportunities -- Organizing a Capital Campaign -- Building Station Membership -- Developing Partnerships and Sponsorships -- Working with Underwriters -- Finding Government Money -- Considering Incentive Programs -- Driving Vehicle Donations -- Maximizing Merch Sales -- Hosting Fundraising Events -- Chapter 9 Holding the Line: Managing Station Expenses -- Maintaining Your Home-Base -- Factoring in The Price of Technology -- Internet service -- Webhosting -- Remote access -- Video conferencing -- Licensing Music -- FM transmission -- Digital transmission -- Hiring Personnel and Growing a Happy Team -- Showing staff and donor appreciation -- Funding continuing education -- Joining Professional Organizations -- Budgeting for Communications -- Keeping Financial Records -- Bookkeeping -- Filing annual taxes -- Maintaining transparency -- Remembering Everything Else, Too -- Saving up for sundries -- Buying merch -- Launching events -- Saving for station updates -- Part 4 Star Systems: (Low) Power to the People! …”
Publicado 2023
Libro electrónico -
25024por Tezanos, José FélixTabla de Contenidos: “…Las relaciones sociales en la pandemia del COVID-19 -- 2.1 Introducción -- 2.2 Individualización e Internet -- 2.3 «Presencia/ausencia conectada» -- 2.4 Complementariedad -- 2.5 Proposición -- 2.6 Los datos del CIS -- 2.7 Sociabilidad antes y después del confinamiento de la pandemia -- 2.8 Conclusión -- Bibliografía -- 3. …”
Publicado 2022
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
25025Publicado 2014Tabla de Contenidos: “…11.2.5 Session Auditing -- 11.2.6 SYSDBA-Aktivitäten überwachen -- 11.2.7 Fine Grained Auditing (FGA) -- 11.3 Virtual Private Database (VPD) -- 11.3.1 Application Context -- 11.3.2 Eine VPD konfigurieren -- 11.4 Database Vault -- Kapitel 12: Der Oracle Resource Manager -- Kapitel 13: Globalization Support -- 13.1 Datentypen mit Zeitzonen -- 13.2 Die Hierarchie der NLS-Parameter -- 13.3 Linguistische Sortierung und Vergleiche -- 13.4 Der Oracle Locale Builder -- 13.5 Der Character Set Scanner -- 13.6 Sprachen im Enterprise Manager -- Kapitel 14: Die XML-Datenbank -- 14.1 Die Architektur der XML-DB -- 14.2 XML-Dokumente speichern -- 14.2.1 Die dokumentenbasierte Speicherung -- 14.2.2 Die objektrelationale Speicherung -- 14.3 XML-Dokumente abfragen -- Kapitel 15: Automatic Storage Management (ASM) -- 15.1 Storage-Systeme -- 15.1.1 Network Attached Storage (NAS) -- 15.1.2 Internet SCSI (iSCSI) -- 15.1.3 Storage Area Network (SAN) -- 15.2 Die ASM-Architektur im Überblick -- 15.3 ASM-Disks -- 15.3.1 ASM-Disks auf verschiedenen Plattformen -- 15.3.2 Eine Testumgebung aufsetzen -- 15.4 Die ASM-Instanz -- 15.5 Diskgruppen -- 15.6 ASM überwachen und verwalten -- 15.6.1 ASM-Performance -- 15.6.2 ASMCMD -- 15.6.3 Verwaltung mit dem Enterprise Manager -- 15.7 Das ASM Cluster-Filesystem -- 15.7.1 General Purpose ACFS-Dateisystem -- 15.8 CRS Managed ACFS-Dateisystem -- 15.8.1 ACFS Snapshots -- 15.9 Eine Datenbank nach ASM konvertieren -- Kapitel 16: Upgrade und Patching -- 16.1 Ein Upgrade umfassend planen -- 16.2 Upgrade-Pfad -- 16.3 Upgrade-Methoden -- 16.4 Upgrade mit dem DBUA -- 16.5 Upgrade mit dem Oracle Enterprise Manager -- 16.6 Manuelles Upgrade -- 16.7 Upgrade auf Pluggable Database -- 16.8 Patching -- 16.8.1 Patching mit OPatch -- 16.8.2 Patching mit dem Enterprise Manager -- Teil III: Erweiterte Administration und Spezialthemen…”
Libro electrónico -
25026por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Abonnés au téléphone mobile cellulaire -- Graphique A3. L'accès à Internet -- Annexe III - Soutien public à la recherche industrielle : comparaison internationale -- Tableau A4. …”
Publicado 1999
Libro electrónico -
25027por Organisation for Economic Co-operation and Development“…Entreprises du secteur des TIC et de l'Internet Chapter 12. Annexe B. Méthodologie et définitions Chapter 13. …”
Publicado 2004
Libro electrónico -
25028Publicado 2017Tabla de Contenidos: “…4.10.3 Handover between LTE and CDMA2000 -- 4.11 Carrier Aggregation -- 4.11.1 CA Types, Bandwidth Classes and Band Combinations -- 4.11.2 CA Configuration, Activation and Deactivation -- 4.12 Network Planning Aspects -- 4.12.1 Single Frequency Network -- 4.12.2 Cell-Edge Performance -- 4.12.3 Self-Organizing Network Functionality -- 4.13 CS-Fallback for Voice and SMS Services with LTE -- 4.13.1 SMS over SGs -- 4.13.2 CS-Fallback for Voice Calls -- 4.14 Voice in Combined LTE and CDMA2000 Networks (SV-LTE) -- 4.15 Network Sharing - MOCN and MORAN -- 4.15.1 National Roaming -- 4.15.2 MOCN (Multi-Operator Core Network) -- 4.15.3 MORAN (Mobile Operator Radio Access Network) -- 4.16 From Dipoles to Active Antennas and Gigabit Backhaul -- 4.17 IPv6 in Mobile Networks -- 4.17.2 IPv6 and International Roaming -- 4.17.3 IPv6 and Tethering -- 4.17.4 IPv6-Only Connectivity -- 4.18 Network Function Virtualization -- 4.18.1 Virtualization on the Desktop -- 4.18.2 Running an Operating System in a Virtual Machine -- 4.18.3 Running Several Virtual Machines Simultaneously -- 4.18.4 Virtual Machine Snapshots -- 4.18.5 Cloning a Virtual Machine -- 4.18.6 Virtualization in Data Centers in the Cloud -- 4.18.7 Managing Virtual Machines in the Cloud -- 4.18.8 Network Function Virtualization -- 4.18.9 Virtualizing Routers -- 4.18.10 Software-Defined Networking -- 4.19 Machine Type Communication and the Internet of Things -- 4.19.1 LTE Cat-1 Devices -- 4.19.2 LTE Cat-0 Devices and PSM -- 4.19.3 LTE Cat-M1 Devices -- 4.19.4 LTE NB1 (NB-IoT) Devices -- 4.19.5 NB-IoT - Deployment Options -- 4.19.6 NB-IoT - Air Interface -- 4.19.7 NB-IoT - Control Channels and Scheduling -- 4.19.8 NB-IoT Multicarrier Operation -- 4.19.9 NB-IoT Throughput and Number of Devices per Cell -- 4.19.10 NB-IoT Power Consumption Considerations -- 4.19.11 NB-IoT - High Latency Communication…”
Libro electrónico -
25029Publicado 2024Tabla de Contenidos: “…-- 3.3.1.1 MPEG and VCEG -- 3.3.1.2 The Development Process -- 3.3.1.3 Standards and Intellectual Property Rights -- 3.3.2 H.120, H.261 and MPEG-1: Early Video Coding Standards -- 3.3.3 MPEG-2: Digital TV and DVD-Video -- 3.3.4 H.263 and MPEG-4 Part 2: Internet and Mobile Video -- 3.3.5 H.264: Multi-Purpose Video Coding -- 3.3.6 H.265/HEVC -- 3.3.7 H.266/VVC -- 3.3.8 Other Standards and Formats -- 3.3.8.1 VC-1 -- 3.3.8.2 VP8, VP9 and AV1 -- 3.3.8.3 Essential Video Coding and Low-ComplexityEnhancement Video Coding -- 3.4 Comparing Video Coding Standards -- 3.5 Conclusions -- References -- Chapter 4 Structures -- 4.1 Introduction -- 4.1.1 How Does a Video Codec Use Structures? …”
Libro electrónico -
25030por Gavin, Lee“…Today, e-commerce means much more than just EDI: it means supporting interactive Web sites; it means enabling the communications with multiple exchanges; it means using XML and the Internet to conduct interactive business-to-customer and business-to-business communications. …”
Publicado 2003
Libro electrónico -
25031Publicado 2004Tabla de Contenidos: “…Introduction to LDAP -- 1.1 Directories -- 1.1.1 Directory versus database -- 1.1.2 LDAP: Protocol or directory -- 1.1.3 Directory clients and servers -- 1.1.4 Distributed directories -- 1.2 Advantages of using a directory -- 1.3 LDAP history and standards -- 1.3.1 OSI and the Internet -- 1.3.2 X.500 the Directory Server Standard -- 1.3.3 Lightweight Access to X.500 -- 1.3.4 Beyond LDAPv3 -- 1.4 Directory components -- 1.5 LDAP standards -- 1.6 IBM's Directory-enabled offerings -- 1.7 Directory resources on the Web -- Chapter 2. …”
Libro electrónico -
25032por Moore, BillTabla de Contenidos: “…4.3.4 Installing Microsoft Internet Explorer -- 4.3.5 Installing Netscape Navigator -- 4.3.6 Completing the installation of prerequisite software -- 4.4 Installing IBM DB2 Universal Database -- 4.4.1 Checking database installation prerequisites -- 4.4.2 Installing DB2 UDB Express -- 4.5 Installing WebSphere Business Integration Server Express -- Chapter 5. …”
Publicado 2005
Libro electrónico -
25033por Suresh, A.Tabla de Contenidos: “…2.8 Evolution of Networks and Services Towards NGN -- 2.8.1 Significant Stages in Network and Services -- 2.8.2 Network Convergence and Development -- 2.8.3 IP Base Network Management System -- 2.8.4 Service Extension and Network Integration -- 2.9 Advanced Network and Service Management Technologies -- 2.9.1 Technology of Artificial Intelligence -- 2.9.2 Smart Agent Technology -- 2.10 Conclusion -- References -- Chapter 3 Evolution of Next Generation Networks and Its Contribution Towards Industry 5.0 -- 3.1 Introduction -- 3.2 Networks of 4G -- 3.3 5G and its Vision -- 3.3.1 Requirements for 5G -- 3.3.2 Network Architecture -- 3.3.3 Economic Contributions and Networks Intelligent Automation of 5G -- 3.3.3.1 Internet of Things (IoT): Artificial Intelligent Plus 5Generation is a Smart IoT -- 3.3.3.2 Autonomous Vehicles, Smart Cars -- 3.3.3.3 Manufacturing Sector and Smart Factory -- 3.3.3.4 Healthcare Industry -- 3.3.3.5 Smart Grids and Cities -- 3.4 A Vision and a Need for 6G Communications -- 3.4.1 Development Projects -- 3.4.2 System Architecture of 6G -- 3.4.3 Satellite Network of 6G -- 3.5 Emerging of 7G -- Findings -- 3.6 Conclusions -- References -- Chapter 4 Understanding the Salient Features Related To Resource Management in Broadband Wireless Networks -- 4.1 Introduction -- 4.1.1 Network Topology Related to Wireless Networks -- 4.1.2 Challenges in Wireless Broadband Network -- 4.1.3 Radio Channel -- 4.1.4 Scarcity in the Spectrum Utilization -- 4.1.5 Quality of Service (QoS) -- 4.1.6 OFDM with WiMAX Technology -- 4.1.7 Advanced Modulation and Coding Techniques in WiMAX -- 4.1.8 Conclusion -- References -- Chapter 5 Network Routing and Its Real-Time Practice in Broadband Wireless Networks -- 5.1 Introduction -- 5.2 Outline of Broadband Wireless Networking -- 5.2.1 Type of Broadband Wireless Networks -- 5.2.1.1 Fixed Networks -- 5.2.1.2 WiMAX…”
Publicado 2023
Libro electrónico -
25034Publicado 2023“…Although readers may be able to find source code for some metaheuristic algorithms on the Internet, the coding styles and explanations are generally quite different, and thus requiring expanded knowledge between theory and implementation. …”
Libro electrónico -
25035por Weigend, MichaelTabla de Contenidos: “…6.6.3 Erweiterung des Presenters -- 6.7 Daten aus dem Internet -- 6.8 Projekt: Goethe oder Schiller? -- 6.8.1 Methoden der String-Objekte -- 6.8.2 Programmierung -- 6.9 Daten finden mit regulären Ausdrücken -- 6.9.1 Reguläre Ausdrücke -- 6.9.2 Die Funktion findall() -- 6.9.3 Projekt: Staumelder -- 6.9.4 Programmierung -- 6.10 Aufgaben -- Kapitel 7: Projekte mit Zeitfunktionen -- 7.1 Projekt: Fünf Sekunden stoppen und gewinnen -- 7.2 Datum und Zeit im Überblick -- 7.3 Projekt: Digitaluhr -- 7.3.1 Woher bekommt der RPi die Zeit? …”
Publicado 2024
Libro electrónico -
25036Publicado 2016Tabla de Contenidos: “…. -- Los medios de comunicación en redes sociales, el apogeo de Internet y la llamada Deep Web105, han generado nuevas formas de representar la violencia y de comunicarla en planos descontextualizados, virales y de rápido consumo, que reducen la capacidad de decodificación del mensaje hasta solo producir un efecto de. . . -- CAPÍTULO V Aproximaciones a un modelo preventivo del terrorismo transnacional en México(pp. 197-240) -- CAPÍTULO V Aproximaciones a un modelo preventivo del terrorismo transnacional en México(pp. 197-240) -- https://doi.org/10.2307/j.ctv2zp4sgz.8 -- https://www.jstor.org/stable/j.ctv2zp4sgz.8 -- La función de este apartado final es presentar un modelo que sirva de propuesta para una política criminal preventiva del terrorismo transnacional en México, tras encontrar que las características particulares de este fenómeno en territorio mexicano están marcadas por patrones cuya tendencia lleva a la fusión entre grupos del crimen organizado como Los Zetas y células terroristas del yihadismo. -- La prevención del terrorismo transnacional en México, así como de otros fenómenos criminales que tienen un carácter transfronterizo, requiere de la estructura de un Estado Democrático de Derecho con nuevas formas que no centralicen los círculos del control social, pues al. . . -- Bibliografía(pp. 241-248) -- Bibliografía(pp. 241-248) -- https://doi.org/10.2307/j.ctv2zp4sgz.9 -- https://www.jstor.org/stable/j.ctv2zp4sgz.9 -- Back Matter(pp. 249-250) -- Back Matter(pp. 249-250) -- https://doi.org/10.2307/j.ctv2zp4sgz.10 -- https://www.jstor.org/stable/j.ctv2zp4sgz.10…”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull)Acceso con credenciales UPSA
Libro electrónico -
25037Publicado 2018Tabla de Contenidos: “…Solved Problem 4.4 -- APPLICATION Substituting Alcohol for Marijuana -- Solved Problem 4.5 -- Income and Substitution Effects with an Inferior Good -- Solved Problem 4.6 -- Compensated Demand Curve -- Solved Problem 4.7 -- Slutsky Equation -- 4.4 Cost-of-Living Adjustment -- Inflation Indexes -- Effects of Inflation Adjustments -- APPLICATION Reducing the CPI Substitution Bias -- 4.5 Revealed Preference -- Recovering Preferences -- Substitution Effect -- CHALLENGE SOLUTION Paying Employees to Relocate -- Summary -- Exercises -- Chapter 5 Consumer Welfare and Policy Analysis -- CHALLENGE Per-Hour Versus Lump-Sum Childcare Subsidies -- 5.1 Uncompensated Consumer Welfare -- Willingness to Pay -- An Individual's Consumer Surplus -- APPLICATION Willingness to Pay and Consumer Surplus on eBay -- Effect of a Price Change on Consumer Surplus -- Solved Problem 5.1 -- Market Consumer Surplus -- 5.2 Compensated Consumer Welfare -- Indifference Curve Analysis -- APPLICATION Compensating Variation and Equivalent Variation for the Internet -- Compensated Demand Curves and Consumer Welfare -- Comparing the Three Welfare Measures -- Solved Problem 5.2 -- 5.3 Effects of Government Policies on Consumer Welfare -- Quotas -- Food Stamps -- APPLICATION Food Stamps Versus Cash -- 5.4 Deriving Labor Supply Curves -- Labor-Leisure Choice -- Solved Problem 5.3 -- Income and Substitution Effects -- Solved Problem 5.4 -- Shape of the Labor Supply Curve -- APPLICATION Working After Winning the Lottery -- Income Tax Rates and the Labor Supply Curve -- Solved Problem 5.5 -- CHALLENGE SOLUTION Per-Hour Versus Lump-Sum Childcare Subsidies -- Summary -- Exercises -- Chapter 6 Firms and Production -- CHALLENGE Labor Productivity During Downturns -- 6.1 The Ownership and Management of Firms -- Private, Public, and Nonprofit Firms -- APPLICATION Chinese State-Owned Enterprises…”
Libro electrónico -
25038Publicado 2018Tabla de Contenidos: “…11.2 Organization of the I/O Function -- 11.3 Operating System Design Issues -- 11.4 I/O Buffering -- 11.5 Disk Scheduling -- 11.6 RAID -- 11.7 Disk Cache -- 11.8 UNIX SVR4 I/O -- 11.9 Linux I/O -- 11.10 Windows I/O -- 11.11 Summary -- 11.12 Key Terms, Review Questions, and Problems -- Chapter 12 File Management -- 12.1 Overview -- 12.2 File Organization and Access -- 12.3 B-Trees -- 12.4 File Directories -- 12.5 File Sharing -- 12.6 Record Blocking -- 12.7 Secondary Storage Management -- 12.8 UNIX File Management -- 12.9 Linux Virtual File System -- 12.10 Windows File System -- 12.11 Android File Management -- 12.12 Summary -- 12.13 Key Terms, Review Questions, and Problems -- PART 6 EMBEDDED SYSTEMS -- Chapter 13 Embedded Operating Systems -- 13.1 Embedded Systems -- 13.2 Characteristics of Embedded Operating Systems -- 13.3 Embedded Linux -- 13.4 TinyOS -- 13.5 Key Terms, Review Questions, and Problems -- Chapter 14 Virtual Machines -- 14.1 Virtual Machine Concepts -- 14.2 Hypervisors -- 14.3 Container Virtualization -- 14.4 Processor Issues -- 14.5 Memory Management -- 14.6 I/O Management -- 14.7 VMware ESXi -- 14.8 Microsoft Hyper-V and Xen Variants -- 14.9 Java VM -- 14.10 Linux Vserver Virtual Machine Architecture -- 14.11 Summary -- 14.12 Key Terms, Review Questions, and Problems -- Chapter 15 Operating System Security -- 15.1 Intruders and Malicious Software -- 15.2 Buffer Overflow -- 15.3 Access Control -- 15.4 UNIX Access Control -- 15.5 Operating Systems Hardening -- 15.6 Security Maintenance -- 15.7 Windows Security -- 15.8 Summary -- 15.9 Key Terms, Review Questions, and Problems -- Chapter 16 Cloud and IoT Operating Systems -- 16.1 Cloud Computing -- 16.2 Cloud Operating Systems -- 16.3 The Internet of Things -- 16.4 IoT Operating Systems -- 16.5 Key Terms and Review Questions -- APPENDICES -- Appendix A Topics in Concurrency…”
Libro electrónico -
25039Publicado 2021Tabla de Contenidos: “…Overriding a default value from a subclass -- Adding extra parameters from a subclass -- Calling a base class method -- Using the same name twice -- Chapter 7 Sidestepping Errors -- Understanding Exceptions -- Handling Errors Gracefully -- Being Specific about Exceptions -- Keeping Your App from Crashing -- Adding an else to the Mix -- Using try . . . except . . . else . . . finally -- Raising Your Own Exceptions -- Book 3 Working with Libraries -- Chapter 1 Working with External Files -- Understanding Text and Binary Files -- Opening and Closing Files -- Reading a File's Contents -- Looping through a File -- Looping with readlines() -- Looping with readline() -- Appending versus overwriting files -- Using tell() to determine the pointer location -- Moving the pointer with seek() -- Reading and Copying a Binary File -- Conquering CSV Files -- Opening a CSV file -- Converting strings -- Converting to integers -- Converting to date -- Converting to Boolean -- Converting to floats -- Converting from CSV to Objects and Dictionaries -- Importing CSV to Python objects -- Importing CSV to Python dictionaries -- Chapter 2 Juggling JSON Data -- Organizing JSON Data -- Understanding Serialization -- Loading Data from JSON Files -- Converting an Excel date to a JSON date -- Looping through a keyed JSON file -- Converting Firebase timestamps to Python dates -- Loading unkeyed JSON from a Python string -- Loading keyed JSON from a Python string -- Changing JSON data -- Removing data from a dictionary -- Dumping Python Data to JSON -- Chapter 3 Interacting with the Internet -- Seeing How the Web Works -- Understanding the mysterious URL -- Exposing the HTTP headers -- Opening a URL from Python -- Posting to the web with Python -- Scraping the web with Python -- Parsing part of a page -- Storing the parsed content -- Saving scraped data to a JSON file…”
Libro electrónico -
25040Publicado 2016Tabla de Contenidos: “…-- Resources for Implementing a CAA -- 11.2 ACL, NetSuite, BusinessObjects, and Other Continuous Assurance Systems -- 11.3 Benefi ts of CAA -- 11.4 Computer-Assisted Audit Tools and Techniques -- 11.5 Determining the Need for CAATTS -- 11.6 Steps to Building Effective CAATTS -- 11.7 Importance of Using CAATTS for Audit Evidence Gathering -- 11.8 XBRL: The Internet-Based Extensible Marking Language -- XBRL Defined -- Implementing XBRL -- Notes -- Chapter 12: Control Self-Assessments and Internal Audit Benchmarking -- 12.1 Importance of Control Self-Assessments -- 12.2 CSA Model -- 12.3 Launching the CSA Process -- Performing the Facilitated CSA Review -- Performing the Questionnaire‐Based CSA Review -- Performing the Management‐Produced Analysis CSA Review -- 12.4 Evaluating CSA Results -- 12.5 Benchmarking and Internal Audit -- Implementing Benchmarking to Improve Processes -- Benchmarking and the IIA's GAIN Initiative…”
Libro electrónico