Mostrando 18,961 - 18,980 Resultados de 26,561 Para Buscar '"performance"', tiempo de consulta: 0.17s Limitar resultados
  1. 18961
    Publicado 2022
    Tabla de Contenidos: “…-- La poésie obscure -- La poésie introuvable -- "Expliquer un mystère par un mystère" -- Poésie et "métaphysique" -- Hermétisme du Don des langues -- La poésie, initiation critique -- La poésie, apprentissage critique -- Inventer la critique -- Contre les doctrines -- Échapper au temps littéraire -- L'événement subjectif -- Une méthode expérimentale -- Land-théorie -- Les voies expérimentales -- Vers une herméneutique -- Une parole critique performative -- Une phénoménologie critique -- "Lire -- Cette pratique"…”
    Libro
  2. 18962
    por Maddaus, Lisa
    Publicado 2013
    Tabla de Contenidos: “…Determining the costs of efficiency measures -- E. Performing a benefit-cost analysis -- F. Determining the benefit-to-cost ratio using present value analysis -- G. …”
    Libro electrónico
  3. 18963
    Publicado 2021
    Tabla de Contenidos: “…Domain 3 Security Architecture and Engineering -- Research, Implement, and Manage Engineering Processes Using Secure Design Principles -- ISO/IEC 19249 -- Threat Modeling -- Secure Defaults -- Fail Securely -- Separation of Duties -- Keep It Simple -- Trust, but Verify -- Zero Trust -- Privacy by Design -- Shared Responsibility -- Defense in Depth -- Understand the Fundamental Concepts of Security Models -- Primer on Common Model Components -- Information Flow Model -- Noninterference Model -- Bell-LaPadula Model -- Biba Integrity Model -- Clark-Wilson Model -- Brewer-Nash Model -- Take-Grant Model -- Select Controls Based Upon Systems Security Requirements -- Understand Security Capabilities of Information Systems -- Memory Protection -- Secure Cryptoprocessor -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Client-Based Systems -- Server-Based Systems -- Database Systems -- Cryptographic Systems -- Industrial Control Systems -- Cloud-Based Systems -- Distributed Systems -- Internet of Things -- Microservices -- Containerization -- Serverless -- Embedded Systems -- High-Performance Computing Systems -- Edge Computing Systems -- Virtualized Systems -- Select and Determine Cryptographic Solutions -- Cryptography Basics -- Cryptographic Lifecycle -- Cryptographic Methods -- Public Key Infrastructure -- Key Management Practices -- Digital Signatures and Digital Certificates -- Nonrepudiation -- Integrity -- Understand Methods of Cryptanalytic Attacks -- Brute Force -- Ciphertext Only -- Known Plaintext -- Chosen Plaintext Attack -- Frequency Analysis -- Chosen Ciphertext -- Implementation Attacks -- Side-Channel Attacks -- Fault Injection -- Timing Attacks -- Man-in-the-Middle -- Pass the Hash -- Kerberos Exploitation -- Ransomware -- Apply Security Principles to Site and Facility Design…”
    Libro electrónico
  4. 18964
    Publicado 2015
    Tabla de Contenidos: “…Intro -- Table of contents -- Basic statistics of Switzerland, 2014 -- Abbreviations and acronyms -- Executive summary -- The economy has performed well, but productivity growth has been weak -- The economy has been performing well -- Taming the housing market cycle -- Growth in real house prices -- Improving the efficiency of public spending -- Government spending -- Assessment and recommendations -- Figure 1. …”
    Libro electrónico
  5. 18965
    Publicado 2016
    Tabla de Contenidos: “…-- Prerequisites -- Steps to perform dynamic hooking with Frida -- Logging based vulnerabilities -- WebView attacks -- Accessing sensitive local resources through file scheme -- Other WebView issues -- Summary -- Chapter 9: Android Malware -- What do Android malwares do? …”
    Libro electrónico
  6. 18966
    Publicado 2023
    Tabla de Contenidos: “…The role of your Salesforce CoE in the roll-out phase -- Deploying your Salesforce solution through environments -- Performing system integration testing -- Driving UAT of your solution -- Planning for a successful UAT -- Checking your data migration preparedness and signing off to go live -- Evaluating your data migration preparedness -- Signing off to go live -- Summary -- Chapter 10: Communicating, Training, and Supporting to Drive Adoption -- Planning, communicating, and managing change -- Understanding the scale of change to come -- Preparing your change management plan template -- Training your users -- Providing hypercare and managing production support -- Providing hypercare -- Transitioning to ongoing production support -- Monitoring and the driving adoption of your Salesforce solution -- Defining and measuring adoption -- Setting targets for adoption and evaluating your original business case -- Summary -- Chapter 11: Common Issues to Avoid in the Roll-Out Phase -- Common issues in the roll-out phase and their root causes -- Difficulties deploying through environments and migrating data -- Difficulties creating, gaining support for, and executing your change management and roll-out plan -- Struggling with adoption and improving business performance -- Evaluating the state of your Salesforce project -- Checklist for your Salesforce project in the roll-out phase -- Summary -- Part 4: The Continuous Improvement Phase -- Chapter 12: Evolving Your Salesforce Org and DevOps Capabilities -- An overview of the continuous improvement phase -- Transforming your organization to become a product organization -- Understanding your products -- Aligning the vision, strategy, and ownership of your Salesforce platform -- Setting goals for your Salesforce platform and products -- Governing your Salesforce program and platform -- Updating your Salesforce CoE…”
    Libro electrónico
  7. 18967
    Publicado 2017
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Contents -- List of Contributors -- Series Preface -- Preface -- Companion Website -- Chapter 1 Advanced UAV Aerodynamics, Flight Stability and Control:: An Introduction -- 1.1 Unmanned Aircraft Aerodynamics -- 1.2 UAV Flight Stability and Control -- Chapter 2 Aerodynamics of UAV Configurations -- 2.1 Introduction -- 2.2 Emerging Technologies in UAV Aerodynamics -- 2.3 Aerodynamics and Stealth Compromises -- 2.4 Rotor Blade Tip Aerodynamics -- 2.5 Flight Dynamics of Canard Aircraft -- 2.6 Aerodynamics of the UCAV 1303 Delta‐wing Configuration -- 2.7 Flow Structure Modification using Plasma Actuators -- 2.8 Conclusion -- References -- Part I Novel Concepts in Unmanned Aircraft Aerodynamics -- 1.1 Fixed-wing (airplanes) -- Chapter 3 Aerodynamic Performance Analysis of Three Different Unmanned Re-entry Vehicles -- 3.1 Introduction -- 3.2 Vehicle Description -- 3.3 Flight Scenario and Flow‐regime Assessment -- 3.4 Rarefied and Transitional Regimes -- 3.5 Viscous-interaction Regime -- 3.6 High-temperature Real-gas Regime -- 3.7 Laminar-to-turbulent Transition Assessment -- 3.8 Design Approach and Tools -- 3.9 Aerodynamic Characterization -- 3.10 Low-order Methods Aerodynamic Results -- 3.11 CFD-based Aerodynamic Results -- References -- Chapter 4 Nonlinear Reduced-order Aeroservoelastic Analysis of Very Flexible Aircraft -- 4.1 Introduction -- 4.2 Large Coupled Computational Models -- 4.3 Coupled Reduced-order Models -- 4.4 Control System Design -- 4.5 Conclusion -- 4.6 Exercises -- References -- Chapter 5 Unmanned Aircraft Wind Tunnel Testing -- 5.1 Introduction -- 5.2 The Diana UAV Project -- 5.3 Experimental Facility -- 5.4 Force and Moment Measurements -- 5.5 Wind Tunnel and CFD Comparisons -- 5.6 Flow Visualization -- 5.7 Summary and Conclusions -- Acknowledgments -- References…”
    Libro electrónico
  8. 18968
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Configuring Your Own Zendesk -- The Zendesk environment -- The basic Zendesk setup -- Channels -- Self-service -- Apps and integrations -- Ticketing workflows and efficiency -- Triggers and automations -- Views -- Macros -- Service Level Agreements -- Groups -- Organizations -- Performance reporting -- Localization and branding -- Evaluating individual requirements -- Our example company -- Desired setup -- The initial contact/channels -- Email -- Twitter -- Facebook -- Widget -- Help Center / Support Form -- The ticket's journey -- Ticket views -- Agent workflow -- Zendesk setup -- Asking questions -- Listing tasks -- Creating the road map -- Summary -- Chapter 2: Agent Roles, Groups, Organizations, and User Tags -- Users/agents -- Custom agent roles -- Ticket permissions -- People permissions -- Help Center permissions -- Tools permissions -- Channels permissions -- System permissions -- Custom roles for our example -- Groups -- Organizations -- Tags -- Domains -- Group -- Users -- Details -- Notes -- Organizations for our example -- User tags -- Importing existing user databases -- Summary -- Chapter 3: Creating Custom Fields -- What are fields in Zendesk? …”
    Libro electrónico
  9. 18969
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Acknowledgments -- About the Authors -- About the Technical Editors -- Contents at a Glance -- Contents -- Introduction -- Overview of the CISSP Exam -- The Elements of This Study Guide -- Interactive Online Learning Environment and Test Bank -- Study Guide Exam Objectives -- Objective Map -- How to Contact the Publisher -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Security Governance Through Principles and Policies -- Security 101 -- Understand and Apply Security Concepts -- Confidentiality -- Integrity -- Availability -- DAD, Overprotection, Authenticity, Nonrepudiation, and AAA Services -- Protection Mechanisms -- Security Boundaries -- Evaluate and Apply Security Governance Principles -- Third-Party Governance -- Documentation Review -- Manage the Security Function -- Alignment of Security Function to Business Strategy, Goals, Mission, and Objectives -- Organizational Processes -- Organizational Roles and Responsibilities -- Security Control Frameworks -- Due Diligence and Due Care -- Security Policy, Standards, Procedures, and Guidelines -- Security Policies -- Security Standards, Baselines, and Guidelines -- Security Procedures -- Threat Modeling -- Identifying Threats -- Determining and Diagramming Potential Attacks -- Performing Reduction Analysis -- Prioritization and Response -- Supply Chain Risk Management -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 2 Personnel Security and Risk Management Concepts -- Personnel Security Policies and Procedures -- Job Descriptions and Responsibilities -- Candidate Screening and Hiring -- Onboarding: Employment Agreements and Policy-Driven Requirements -- Employee Oversight -- Offboarding, Transfers, and Termination Processes -- Vendor, Consultant, and Contractor Agreements and Controls…”
    Libro electrónico
  10. 18970
    por Bhattacharyya, Dipak Kumar
    Publicado 2012
    Tabla de Contenidos: “…Problems in achieving decentralization -- Line and Staff Relations -- Span of Management -- Wide Versus Narrow Spans -- Factors Determining Spans -- Open Systems Approach in Organizations -- Case: CEOs Can Work as a Team: Lessons from Wipro -- Summary -- Key Terms -- Review Questions -- Critical Thinking Questions -- References -- Further Reading -- Chapter 4: Staffing in Organizations -- Introduction -- Concept of Recruitment -- Functions of Recruitment -- Internal Recruitment -- Recruitment Policy -- Recruitment Process -- Preliminary Screening of Applicants -- Review of Application Blanks -- Reference Checking -- Psychological Testing -- Attitude Measurement -- Techniques of Attitude Measurement -- Thurstone scale -- Likert Scale -- Semantic differential scale -- Reliability and validity of attitude measurement scales -- Levels of Attitude Measurement -- Nominal scale -- Ordinal scale -- Interval scale -- Ratio scale -- Other Measures of Attitudes -- Physiological Measures -- Attitude Surveys -- Human Resource Management and Attitudinal Change -- Interview -- Induction and Placement -- Induction -- Objectives of an induction programme -- Components of an induction programme -- Steps in an induction programme -- Employee socialization process -- Placement -- Importance of Induction and Placement -- Staffing Costs -- Areas of Staffing Costs -- Recruitment Ratios -- Recruiting cost ratio -- Recruiting efficiency -- New hire performance -- Case: Staffing Solutions of Knowledge Hub: Lessons from the KPO Industry -- Summary -- Key Terms -- Review Questions -- Critical Thinking Questions -- References -- Further Reading -- Annexure 4.1 -- Chapter 5: Directing Through Motivation -- Introduction -- Motivation in Organizations -- Process of Motivation -- Objectives of Motivation -- Mechanism of Motivation -- Significance of Motivation in Organizations…”
    Libro electrónico
  11. 18971
    Publicado 2013
    Tabla de Contenidos: “…Protecting Intellectual Property -- Section 6.1 Triage: Assessing Business Needs -- Process Mapping of Analytics Needs -- Innovation: Identifying New Killer Apps -- Scrutinizing the Inventory -- Assigning Rigor and Deducing Resources -- Section 6.2 Evaluating Analytics Prowess: The White-Glove Treatment -- Leading and Organizing -- Progress in Acculturating Analytics -- Evaluating Decision-Making Capabilities -- Evaluating Technical Coverage -- Executing Best Statistical Practice -- Constructing Effective Building Blocks -- Business Analytics Maturity Model -- Section 6.3 Innovation and Change from a Producer on the Edge -- Emphasis on Speed -- Continual Improvement15 -- Accelerating the Offense-For Those Who Are Struggling -- Notes -- Part II The Three Pillars of Best Statistical Practice -- Blind Man's Russian Roulette Bluff -- 7 Statistical Qualifications -- Section 7.1 Leadership and Communications for Analytics Professionals -- Leadership -- Communication -- Leadership and Communication Training -- Section 7.2 Training for Making Analytics-Based Decisions -- Statistical "Mythodologies" -- Section 7.3: Statistical Training for Performing Advanced Analytics14 -- The Benefi ts of Training -- Academic Training23 -- Post-Academic Training-Best Statistical Practice -- Training Through Review -- Section 7.4 Certifi cation for Analytics Professionals -- The PSTAT® (ASA) (Professional Statistician)-ASA's New Accreditation by Ronald L. …”
    Libro electrónico
  12. 18972
    Publicado 2011
    Tabla de Contenidos: “…17.2 Paradigm Shift from SDR to CR -- 17.3 Challenge and Trends in RFIC/System -- 17.4 Analog Signal Processing -- 17.5 Spectrum Sensing -- 17.6 Multi-Resolution Spectrum Sensing -- 17.7 MRSS Performance -- 17.8 Conclusions -- References -- Index…”
    Libro electrónico
  13. 18973
    Publicado 2018
    Tabla de Contenidos: “…-- Software architects are technical leaders -- Software architects perform a number of duties -- Ivory tower software architects -- What are software architects expected to know? …”
    Libro electrónico
  14. 18974
    Publicado 2018
    Tabla de Contenidos: “…-- Time to say goodbye to SSL and early TLS -- SSL certificate component -- Root certificate -- Intermediate certificate -- SSL certificates classes -- TLS versus SSL -- Public Key Infrastructure -- Symmetric encryption -- Asymmetric encryption -- Hash function -- Attacks against PKI -- Microsoft Windows and IIS -- OpenSSL -- SSL Management tools -- Summary -- Questions -- Further reading -- Chapter 10: Firewall Placement and Detection Techniques -- Technical requirements -- Firewall and design considerations -- Firewall terminology -- Firewall generations -- Firewall performance -- Firewall placement and design network topology -- Single firewall architecture -- Single firewall architecture with a single IP subnet -- Single firewall architecture with multiple IP subnets -- Multilayer firewall architecture -- Firewall sandwich design -- Demilitarized Zone -- DMZ to Internal Access Policy -- OSI model versus TCP/IP model -- Firewall performance, capabilities, and function -- Firewall management -- Application proxies -- Detecting firewalls -- Debugging tools -- Summary -- Questions -- Further Reading -- Chapter 11: VPN and WAN Encryption -- Overview -- Classes of VPN -- Type of VPN protocol -- Point-to-Point tunneling protocol -- Layer 2 Tunneling Protocol -- Secure Socket Tunneling protocol -- Internet Protocol Security -- SSL VPN…”
    Libro electrónico
  15. 18975
    por World Health Organization
    Publicado 2021
    Tabla de Contenidos: “…7.1 Introduction -- 7.2 Linkage from HIV testing to enrolment in care -- 7.3 Differentiated service delivery for HIV treatment -- 7.4 People-centred care -- 7.5 Initiating and maintaining treatment -- 7.6 Continuity of care -- 7.7 Task sharing -- 7.8 Decentralization -- 7.9 Integrating services -- 7.10 Delivering HIV services to children -- 7.11 Service delivery for adolescents -- 7.12 Improving the quality of HIV care services -- 7.13 Procurement and supply management systems for HIV health products -- 7.14 Laboratory and diagnostic services -- 7.15 Laboratory connectivity -- 8.1 Introduction -- 8.2 Selection of key indicators to improve service delivery and assess impact -- 8.3 Data collection and disaggregation -- 8.4 Strengthening data systems -- 8.5 Evaluation, including impact and programme performance -- 8.6 Monitoring ARV drug toxicity -- 8.7 HIV drug resistance -- 9.1 Publication -- 9.2 Dissemination and implementation -- 9.3 Useful analytical tools for planning -- 9.4 Evaluation -- Foreword -- Abbreviations and acronyms -- ACKNOWLEDGEMENTS -- Executive summary…”
    Libro electrónico
  16. 18976
    por OECD
    Publicado 2023
    Tabla de Contenidos: “…Performance in citizen well-being -- Moving ahead towards the UN Sustainable Development Goals (SDGs) -- Key constraints to development in El Salvador -- The model of economic development has not delivered robust inclusive growth…”
    Libro electrónico
  17. 18977
    por CohenMiller, Anna
    Publicado 2022
    Tabla de Contenidos: “…-- "I Will Go and Marry" - Women's Responses to Pressure and Experience -- Performing Gender - Agency in Context -- Implications and Conclusion -- References -- 2 Marginalized Masculinities in Australian Higher Education: Gendered Subjectivities, Discursive Spaces and First-In-Family ... -- Introduction -- Theorizing Contemporary Working-Class Masculinities and Social Change -- Masculinities in Higher Education -- The First-In-Family Males Project -- Findings -- Becoming Themselves: Acclimatizing to University Life -- Being Themselves: Connecting at University -- Experiences With Class Prejudice -- Discussion and Recommendations -- Conclusion -- Funding -- References -- 3 Gendered Precarity, Intersectionality and Barriers to Higher Education for Women Seeking Asylum in Australia -- Introduction -- Gendered Precarity and Intersectionality -- Precarity -- Intersectionality -- Gender -- Background of the Study -- Methodology -- Co-Researchers - Women Seeking Asylum -- Guided Conversations and Collaborative Analysis -- Gendered Precarity Among Women Seeking Asylum -- Existence -- Status -- Gender Roles: "[There Is] Still a Man Behind" -- Time -- Family Responsibilities: Extra Burden On Women…”
    Libro electrónico
  18. 18978
    por Tank, WAI Architecture Think
    Publicado 2023
    Tabla de Contenidos: “…65 Animal-Centered Design: Design for behaviors, conditions, and characteristics of animal species -- 66 Commoning: Spatial design for the sharing of resources and experiences -- 67 Social Condenser: Projects designed for large social gatherings -- 68 Participatory Design: Designing by the exchange of ideas and collective deliberation -- 69 Grid: Determining spatial paraments by networks of lines -- 70 Post-Domestic Architecture: Spaces that facilitate life without labor related to the home -- 71 Ephemeral Architecture: Design that is transient and leaves no physical mark -- 72 Phenomenology: Design approach that considers and centers on experience -- 73 Architecture of Isolation: Spatial design that avoids collective human interactions -- 74 Defensive Architecture: Spaces and structures that protect against attacks -- 75 Simulation Design: Models reproducing architectural and contextual conditions -- 76 AI Cities: Machines or computers performing urban tasks and decision-making -- 77 Self-Generating Architecture: Structures producing building components and elements on-site -- 78 Authorless Architecture: Collective design processes against singular authorship -- 79 Design-Build: Performing every part of the process, from design to construction -- 80 Building Construction Moratorium: Imposed or voluntary restriction of the construction of architecture -- Imaginaries -- 81 Utopia: Architectures of ideal or cautionary societies, cities, and states -- 82 Futurisms: Projections of futures formed by particular characteristics -- 83 Organic Architecture: Designing a close relationship between architecture and the land -- 84 Queer Cartographies: Spatial interventions challenging the role of heteronormative design -- 85 Space Magicians: Designing spaces, situations, and experiences through fantasy…”
    Libro electrónico
  19. 18979
    Publicado 2019
    Tabla de Contenidos: “…Karpuz Approach of mining equipment performance with simulation of the use of autonomous trucks W.S. …”
    Libro electrónico
  20. 18980
    Publicado 2016
    Tabla de Contenidos: “…Representation of Power Performance -- 13.4. Estimation of the MAEP -- 13.4.1. …”
    Libro electrónico