Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
19541Publicado 2012Tabla de Contenidos: “…Exercise 2-2: Iterating Through an ArrayList While Applying Conditions -- The while Iteration Statement -- The do-while Iteration Statement -- Exercise 2-3: Performing Code Refactoring -- Exercise 2-4: Knowing Your Statement-Related Keywords -- Create and Use Transfer of Control Statements -- The break Transfer of Control Statement -- The continue Transfer of Control Statement -- The return Transfer of Control Statement -- The labeled Statement -- Certification Summary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 3: Programming with Java Operators and Strings -- Understand Fundamental Operators -- Assignment Operators -- Exercise 3-1: Using Compound Assignment Operators -- Arithmetic Operators -- Relational Operators -- Logical Operators -- Understand Operator Precedence -- Operator Precedence -- Overriding Operator Precedence -- Use String Objects and Their Methods -- Strings -- The String Concatenation Operator -- Exercise 3-2: Uncovering Bugs that Your Compiler May Not Find -- Methods of the String Class -- Use StringBuilder Objects and Their Methods -- Methods of the StringBuilder Class -- Exercise 3-3: Using Constructors of the StringBuilder Class -- Test Equality Between Strings and other Objects -- equals Method of the String Class -- Exercise 3-4: Working with the compareTo Method of the String Class -- Certification Summary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 4: Working with Basic Classes and Variables -- Understand Primitives, Enumerations, and Objects -- Primitive Variables -- Objects -- Exercise 4-1: Compile and Run an Object -- Arrays -- Enumerations -- Java Is Strongly Typed -- Naming Conventions -- Use Primitives, Enumerations, and Objects -- Literals -- Examples of Primitives, Enumerations, and Objects -- Exercise 4-2: Creating Getters and Setters -- Certification Summary…”
Libro electrónico -
19542Publicado 2012Tabla de Contenidos: “…-- Bringing IP Networks Together -- Hosts and Networks -- Subnetting -- Netmasks -- Static Routing -- Routing Tables -- Limitations of Static Routing -- Dynamic Routing with RIP -- RIP's Algorithm (and Why You Should Use OSPF Instead) -- Digging into tcpdump -- A Few General Notes -- Wireshark (The Tool Formerly Known as Ethereal) -- Reading and Writing Dumpfiles -- Capturing More or Less per Packet -- Performance Impact -- Don't Capture Your Own Network Traffic -- Why Is DNS Slow? …”
Libro electrónico -
19543Publicado 2011“…Develop, Compile, and Debug High-Performance Java Applications Take your Java skills to the next level using the expert programming techniques contained in this Oracle Press guide. …”
Libro electrónico -
19544Publicado 2007Tabla de Contenidos: “…13.2 Measuring Application Performance -- 13.3 Configuring for Multiple Page Sizes -- PART FIVE: File Systems -- Chapter 14 File System Framework -- 14.1 File System Framework -- 14.2 Process-Level File Abstractions -- 14.3 Solaris File System Framework -- 14.4 File System Modules -- 14.5 The Virtual File System (vfs) Interface -- 14.6 The Vnode -- 14.7 File System I/O -- 14.8 File Systems and Memory Allocation -- 14.9 Path-Name Management -- 14.10 The Directory Name Lookup Cache -- 14.11 The File System Flush Daemon -- 14.12 File System Conversion to Solaris 10 -- 14.13 MDB Reference -- Chapter 15 The UFS File System -- 15.1 UFS Development History -- 15.2 UFS On-Disk Format -- 15.3 The UFS Inode -- 15.4 Access Control in UFS -- 15.5 Extended Attributes in UFS -- 15.6 Locking in UFS -- 15.7 Logging -- 15.8 MDB Reference -- PART SIX: Platform Specifics -- Chapter 16 Support for NUMA and CMT Hardware -- 16.1 Memory Hierarchy Designs -- 16.2 Memory Placement Optimization Framework -- 16.3 Initial Thread Placement -- 16.4 Scheduling -- 16.5 Memory Allocation -- 16.6 Lgroup Implementation -- 16.7 MPO APIs -- 16.8 Locality Group Hierarchy -- 16.9 MPO Statistics -- 16.10 MDB Reference -- Chapter 17 Locking and Synchronization -- 17.1 Synchronization -- 17.2 Parallel Systems Architectures -- 17.3 Hardware Considerations for Locks and Synchronization -- 17.4 Introduction to Synchronization Objects -- 17.5 Mutex Locks -- 17.6 Reader/Writer Locks -- 17.7 Turnstiles and Priority Inheritance -- 17.8 Kernel Semaphores -- 17.9 DTrace Lockstat Provider -- PART SEVEN: Networking -- Chapter 18 The Solaris Network Stack -- 18.1 STREAMS and the Network Stack -- 18.2 Solaris 10 Stack: Design Goals -- 18.3 Solaris 10 Network Stack Framework -- 18.4 TCP as an Implementation of the New Framework -- 18.5 UDP -- 18.6 Synchronous STREAMS -- 18.7 IP…”
Libro electrónico -
19545Publicado 2022Tabla de Contenidos: “…. -- There's more... -- Performing actions on many tables -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding/removing columns on a table -- How to do it... -- How it works... -- There's more...…”
Libro electrónico -
19546Publicado 2022Tabla de Contenidos: “…Contents at a Glance Introduction. 1 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work. 7 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work. 19 Chapter 3: Applying the Science Behind Human Behavior and Risk Management. 33 Part 2: Building a Security Awareness Program. 51 Chapter 4: Creating a Security Awareness Strategy. 53 Chapter 5: Determining Culture and Business Drivers. 61 Chapter 6: Choosing What to Tell The Users. 75 Chapter 7: Choosing the Best Tools for the Job 89 Chapter 8: Measuring Performance. 107 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program. 121 Chapter 10: Running Your Security Awareness Program 143 Chapter 11: Implementing Gamification 165 Chapter 12: Running Phishing Simulation Campaigns. 181 Part 4: The Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Chapter 15: Ten Fundamental Awareness Topics. 221 Chapter 16: Ten Helpful Security Awareness Resources. 227 Appendix: Sample Questionnaire 233 Index. 253 Table of Contents Introduction 1 About This Book. 1 Foolish Assumptions. 2 Icons Used in This Book. 3 Beyond the Book. 3 Where to Go from Here. 4 Part 1: Getting to Know Security Awareness. 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness. 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss. 10 Knowing How Security Awareness Programs Work. 11 Establishing and measuring goals. 12 Showing users how to "do things right". 14 Recognizing the Role of Awareness within a Security Program. 15 Disputing the Myth of the Human Firewall. 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work. 19 Making a Case Beyond Compliance Standards. 20 Treating Compliance as a Must. 21 Motivating users to take action. 22 Working within the compliance budget. 22 Limiting the Popular Awareness Theories. 23 Applying psychology to a diverse user base. 23 Differentiating between marketing and awareness. 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work. 27 Making Perfection the Stated Goal. 28 Measuring from the Start. 29 Prioritizing Program Over Product. 29 Choosing Substance Over Style. 30 Understanding the Role of Security Awareness. 31 Table of Contents Chapter 3: Applying the Science Behind Human Behavior and Risk Management. 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science. 35 Recognizing incidents as system failures. 36 Responding to incidents. 37 Applying Accounting Practices to Security Awareness. 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology. 40 The ABCs of behavioral science. 41 The Fogg Behavior Model. 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve. 44 Remembering That It's All About Risk. 45 Optimizing risk. 46 The risk formula. 46 Part 2: Building a Security Awareness Program. 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program. 54 Choosing effective communications tools. 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All. 58 Chapter 5: Determining Culture and Business Drivers. 61 Understanding Your Organization's Culture. 62 Determining security culture. 64 Recognizing how culture relates to business drivers. 65 Identifying Subcultures. 65 Interviewing Stakeholders. 67 Requesting stakeholder interviews. 67 Scheduling the interviews 70 Creating interview content. 70 Taking names. 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users. 75 Basing Topics on Business Drivers. 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right". 77 Common Topics Covered in Security Awareness Programs. 79 Security Awareness For Dummies Phishing 79 Social engineering. 80 Texting and instant messaging security. 80 Physical security. 81 Malware 81 Ransomware 81 Password security. 82 Cloud security 82 USB device security. 82 Internet of Things 83 Travel security. 83 Wi-Fi security 84 Mobile devices. 84 Work from home. 84 Basic computer security. 85 Insider threat. 85 Protecting children on the internet 85 Social media security 86 Moving security. 86 Compliance topics. 87 Chapter 7: Choosing the Best Tools for the Job. 89 Identifying Security Ambassadors 90 Finding ambassadors. 90 Maintaining an ambassador program. 91 Knowing the Two Types of Communications Tools. 92 Reminding users to take action. 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase. 95 Posters 96 Hardcopy newsletters. 97 Monitor displays 97 Screen savers. 98 Pamphlets. 98 Desk drops. 99 Table tents. 99 Coffee cups or sleeves 99 Stickers. 100 Mouse pads 100 Pens and other useful giveaways. 100 Camera covers. 101 Squishy toys and other fun giveaways. 101 Active communications tools. 101 Table of Contents Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts. 108 Meeting Compliance Requirements. 109 Collecting Engagement Metrics. 111 Attendance metrics. 111 Likability metrics. 112 Knowledge metrics. 112 Measuring Improved Behavior. 113 Tracking the number of incidents. 113 Examining behavior with simulations 114 Tracking behavior with gamification. 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics. 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program. 121 Knowing Your Budget. 122 Finding additional sources for funding 123 Allocating for your musts. 125 Limiting your discretionary budget. 126 Appreciating your team as your most valuable resource. 126 Choosing to Implement One Program or Multiple Programs. 127 Managing multiple programs 128 Beginning with one program. 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy. 131 Ensuring that your message sticks. 133 Distributing topics over three months. 133 Deciding Whether to Include Phishing Simulations. 136 Planning Which Metrics to Collect and When. 137 Considering metrics versus topics 137 Choosing three behavioral metrics. 138 Incorporating Day 0 metrics 138 Scheduling periodic updates. 138 Biasing your metrics. 139 Branding Your Security Awareness Program 139 Creating a theme. 139 Maintaining brand consistency. 140 Coming up with a catchphrase and logo. 140 Promoting your program with a mascot. 140 Security Awareness For Dummies Chapter 10: Running Your Security Awareness Program. 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors. 145 Recognizing the role of general project management. 146 Getting All Required Approvals. 146 Getting the Most from Day 0 Metrics. 147 Creating Meaningful Reports. 149 Presenting reports as a graphical dashboard. 149 Adding index scores. 152 Creating an awareness index. 152 Reevaluating Your Program. 153 Reconsidering your metrics. 154 Evaluating your communications tools 155 Measuring behavioral changes. 156 Redesigning Your Program 157 Anything stand out? …”
Libro electrónico -
19547Troubleshooting and supporting Windows 11 creating robust, reliable, sustainable, and secure systemsPublicado 2023Tabla de Contenidos: “…-- Creating and Managing Support Reporting -- Summary -- Part II: Troubleshooting Windows 11 -- Chapter 8: Events and Reliability Troubleshooting -- Reliability History -- Getting Reliability Information with PowerShell -- Performance Monitor -- Resource Monitor -- Event Viewer -- Creating Custom Event Views -- Attaching a Task to an Event -- Using PowerShell with Events -- The Blue Screen of Death -- System Information -- Using PowerShell to Get System Information -- File and Disk Information -- Hardware and System Information -- Processes and Services Information -- Summary -- Chapter 9: Integrity and Updating Troubleshooting -- Built-In System Repair Utilities -- ChkDsk -- SFC -- DISM -- Windows Update -- Managing Windows Update and Update Channels -- General Availability Channel -- Windows Update for Business -- Long-Term Servicing Channel -- How Long Is a Windows Feature Update Supported For? …”
Libro electrónico -
19548Publicado 2023Tabla de Contenidos: “…Exploring the phases of cloud migration -- Phase 1 - Discover -- Phase 2 - Plan -- Phase 3 - Migrate -- Phase 4 - Automate -- Phase 5 - Optimize -- Summary -- Further reading -- Chapter 3: Preparing for Cloud Migration -- Learning about cloud migration insights -- Begin with cost savings, evolve with innovation -- Cloud migration propels cultural shift -- High-level metrics are not enough -- Proper planning drives successful migration -- Thinking beyond CapEx and OpEx -- There are many great cloud providers -- Choosing the right cloud partner for your business -- Security -- Certifications, compliance, standards, and attestation frameworks -- Innovation and roadmap -- Service-level agreements and contracts -- Support model -- Pricing model -- Vendor lock-in criteria and exit provisions -- Reliability and performance -- Service dependencies and partnerships -- Overall business health -- Checklist for choosing a strong partner -- Evaluation of potential vendor lock-ins -- Unraveling the multi-cloud - benefits, challenges, and strategy -- Benefits -- Challenges -- Multi-cloud strategy -- Aligning your IT landscape with the cloud - best practices -- Summary -- Further reading -- Chapter 4: Implementing Cloud Migration Strategies -- Introducing cloud migration strategies -- What is a cloud migration strategy? …”
Libro electrónico -
19549Publicado 2024Tabla de Contenidos: “…-- Microsoft Intune -- High-level architecture components and responsibilities -- Configuration Manager support -- Co-management and Windows 365 -- Disaster recovery -- Sizes and performance of fixed-price licenses -- GPU-Enhanced Cloud PCs -- Connect to your on-premises network -- Provisioning policies -- Windows 365 - gallery images -- Custom images -- Windows Updates via Autopatch -- Roles and delegation -- The Watchdog service -- Optimized Teams on Windows 365 -- Screen capture protection and watermarking -- Migrate GPOs to a Settings Catalog policy -- Summary -- Questions -- Answers -- Further reading -- Chapter 5: Deploying Windows 365 -- Technical requirements for deploying Windows 365 -- Required URLs -- RDP requirements and optimizations -- Connect to on-premises networks (optional) -- Purchasing and assigning Cloud PC licenses -- Provision a Cloud PC -- Image management - creating a custom image (optional) -- Reprovisioning a Cloud PC -- Local administrator permissions -- Security baselines for a Cloud PC -- Zero Trust: Conditional Access management for Cloud PCs -- Connecting to your Cloud PC -- Windows App -- Deploy Windows App via Intune -- Windows App - User Actions -- Bulk User Actions via Intune -- Supported redirections per endpoint platform -- Windows 365 Boot shared mode -- Windows 365 Boot dedicated mode -- What if you have multiple Cloud PCs? …”
Libro electrónico -
19550Publicado 2023Tabla de Contenidos: “…VPC networks -- Network connectivity products -- Basic Google Cloud networking services -- Cloud DNS -- Cloud Armor -- Cloud CDN -- Network Service Tiers -- Sample architecture -- Summary -- Further reading -- Chapter 9: Time-Saving Google Cloud Services -- Cloud Storage for object storage and retrieval -- Introducing Cloud Storage -- Bucket locations and storage classes -- Cloud Tasks for asynchronous task execution -- Firestore in Datastore mode for high-performance NoSQL storage -- Cloud Workflows for service orchestration -- Pub/Sub for inter-service messaging -- Secret Manager for storing sensitive data -- Cloud Scheduler for running jobs at the right time -- A hands-on exercise -- Reading the list of cities -- Getting weather information for each city -- Storing weather information in a central location -- Updating the weather web page -- The end-to-end workflow for our weather solution -- Updating our web page every 30 minutes -- What's next? …”
Libro electrónico -
19551Publicado 2023Tabla de Contenidos: “…11.4.2 Innovation Design Feasibility -- 11.4.3 Innovation Design Stages -- 11.4.4 Innovation Compatibility -- 11.4.5 Administrative Compatibility -- 11.4.6 Technical Compatibility -- 11.4.7 Workforce Integration Strategies -- 11.4.8 Hybridization of Innovation Cultures -- 11.5 Innovation Quality Interfaces -- 11.5.1 Innovation Accountability -- 11.5.2 Design of Quality -- 11.5.3 Evaluation of Innovation Quality -- 11.5.4 Justification of Innovation -- 11.5.5 Earned Value Technique for Innovation -- 11.5.6 Integration of Innovation -- 11.6 Badiru's Umbrella Model for Innovation Management -- 11.6.1 Umbrella Theory for Innovation -- 11.7 Innovation Readiness Measure -- References -- Chapter 12 Learning Curves in Research Management -- 12.1 Introduction -- 12.2 Badiru's Half-Life Theory of Learning Curves -- 12.3 Human-Technology Performance Degradation -- 12.4 Half-Life Derivations -- 12.4.1 Half-life of the Log-Linear Model -- 12.5 Half-Life Computational Examples -- 12.6 Half-Life of Decline Curves -- 12.7 Research Learning Perspective -- References -- Appendix A: Research-oriented Academies of the World -- Appendix B: Conversion Factors for Research Management -- Index…”
Libro electrónico -
19552por Massou, LucTabla de Contenidos: “…Epistemological and methodological issues -- 10.2.1. Performance, notoriety and visibility: a disruptive discourse -- 10.2.2. …”
Publicado 2024
Libro electrónico -
19553Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction and Code Your Application -- Chapter 1: Introducing Continuous Delivery and Software Supply Chain Security -- Introduction to CD -- CD practices -- The impact of CD on software delivery performance -- Understanding continuous integration -- How to implement CI -- Understanding continuous testing -- Test types -- Implementing continuous testing -- Understanding deployment automation -- Implementing deployment automation -- Securing your software delivery pipeline -- Source code management threats and remediations -- Build threats and remediations -- Dependency threats and remediations -- Summary -- Chapter 2: Using Skaffold for Development, Build, and Deploy -- Technical requirements -- Understanding Skaffold's capabilities and architecture -- Skaffold for building -- Skaffold for deploying -- Skaffold's architecture -- Installing Skaffold -- Using Skaffold with your application -- Initializing your repository using skaffold init -- Testing your application while you code using skaffold dev -- Building your application using skaffold build -- Testing your application using skaffold test -- Deploying your application using skaffold deploy -- Deploying and rendering separately using skaffold render and skaffold apply -- Running the end-to-end pipeline using skaffold run -- Managing deployment in different environments -- Cleaning up -- Summary -- Chapter 3: Developing and Testing with Cloud Code -- Technical requirements -- About Cloud Code -- Continuously deploying and testing locally while you code -- Checking application logs from your editor -- Creating a GKE cluster from your editor -- Continuously deploying and testing a Kubernetes app remotely while you code -- Debugging -- Code with AI assistance -- Getting help to understand code…”
Libro electrónico -
19554por Laudon, KennethTabla de Contenidos: “…Tools for Interactivity and Active Content -- Java, Java Server Pages (JSP), and JavaScript -- Active Server Pages (ASP) and ASP.NET -- ColdFusion -- PHP, Ruby on Rails (RoR), and Django -- Other Design Elements -- Personalization Tools -- The Information Policy Set -- 4.6 Developing a Mobile Website and Building Mobile Applications -- Insight on Society: Designing for Accessibility -- Planning and Building a Mobile Presence -- Mobile Presence: Design Considerations -- Cross-Platform Mobile App Development Tools -- Mobile Presence: Performance and Cost Considerations -- 4.7 Careers in E-commerce -- The Company -- Position: UX Designer -- Insight on Technology: Klook Sets Its Sights on New Vistas -- Qualifications/Skills -- Preparing for the Interview -- Possible First Interview Questions -- 4.8 Case Study: Skyscanner: The One-stop Travel Platform -- 4.9 Review -- Key Concepts -- Questions -- Projects -- References -- Chapter 5: E-Commerce Security and Payment Systems -- Learning Objectives -- Ransomware: The New Business of Hostage-Taking -- 5.1 The E-commerce Security Environment -- The Scope of the Problem -- The Underground Economy Marketplace: The Value of Stolen Information -- What Is Good E-commerce Security? …”
Publicado 2021
Libro electrónico -
19555Publicado 2023“…If schools wish to improve their performance and provide each child with an education that is tailored to their unique learning style, motivations, and needs, the whole school workforce--including support staff--must be equipped to develop their professional skills…”
Libro electrónico -
19556por Engelmann, SvenTabla de Contenidos: “…17.1 THERMOFORMING -- 17.2 INJECTION MOLDING -- 17.2.1 Door Handles -- 17.2.2 The Tripartite Dashboard -- 17.2.3 Instrument Board -- 17.2.4 Radio Bezel and Gear Shift Cover -- 17.3 TACTILE EFFECTS -- 17.4 OTHER SECTOR PARTS -- 17.5 MULTI-DECO MOLDING -- 17.6 THE AUTOMATED SEQUENCE PROCESS -- Chapter 18 Smart Manufacturing -- 18.1 TRANSATLANTIC COOPERATION -- 18.2 DESIGN OF EXPERIMENT -- 18.3 CONCLUSION -- 18.4 REMOTE THERMOFORMING LINE COMMISSIONING AND REMOTE SERVICE SUPPORT -- Chapter 19 Automotive Body Parts Made of PA + ABS -- Chapter 20 Softfeel Made from ABS/TPU Material -- Chapter 21 Introduction to Packaging -- Chapter 22 Optimizing a Thermoforming Process for Packaging -- 22.1 METHOD FOR OPTIMIZING A PROCESS TO PRODUCE A THERMOFORMED ARTICLE FROM POLYMERIC MATERIAL -- 22.2 CHARACTERIZATION OF RESINS BY PERFORMANCE PARAMETERS -- 22.3 VARIABLES THAT CAN BE ALTERED TO INFLUENCE THE PLUG FORCE AND CAVITY PRESSURE -- 22.4 APPLICATION EXAMPLES -- Chapter 23 Analysis of Thermoforming Films -- 23.1 GENERAL ANALYSIS OF THERMOFORMING FILMS1 -- 23.2 TESTS MEASURING FREE SHRINKAGE -- 23.3 TESTS MEASURING THICKNESS -- 23.4 TENSILE STRENGTH TEST -- 23.5 SURFACE TEXTURE TEST FOR THE GLOSS FACTOR -- 23.6 FLAME COLORATION -- Chapter 24 Advanced Analysis of Thermoforming Films -- 24.1 PRODUCT QUALITY DEMANDS -- 24.2 DIFFERENTIAL SCANNING CALORIMETRY -- 24.3 DMA (DYNAMIC MECHANICAL ANALYSIS) -- 24.3.1 The Functional Principle -- 24.3.2 The Complex E-modulus E* in Conjunction with Temperature -- 24.4 TORSION PENDULUM TEST -- 24.5 SUMMARY -- Chapter 25 Analysis of Thermoformed Products -- 25.1 WALL THICKNESS DISTRIBUTION -- 25.1.1 Examples of Measuring Wall Thickness of Cups -- 25.2 TOP LOAD -- 25.3 VISUAL APPEARANCE -- 25.4 WATER VAPOR PERMEABILITY -- 25.5 OXYGEN PERMEABILITY -- 25.6 TRANSPARENCY…”
Publicado 2023
Libro electrónico -
19557Publicado 2023“…5 features a variety of impressive new features that align with current web standards and enable you to experience lightning-fast performance for optimal web page optimization, leverage the new code architecture, and tap into the WebService API, among others. …”
Libro electrónico -
19558Publicado 2024“…By the end of this book, you'll be able to build and automate the deployment of a scalable and high-performing distributed solution using Spring Boot 3. …”
Libro electrónico -
19559Publicado 2024Tabla de Contenidos: “…-- Taking the driver's seat -- Our wins - embracing outsourcing as a key enabler -- Building trust and partnership -- Educational foundations -- Documentation and pilot projects - essential tools -- Fostering quality, upskilling, and collaboration -- Choosing your approach -- Contracts and KPIs - the triple-A approach -- Navigating challenges and pitfalls -- Evolution of outsourcing and insourcing -- Outsourcing data engineering and beyond -- Embracing outsourced education and data literacy -- Data science - a selective outsourcing strategy -- Outsourcing innovation and incubations -- Achieving maximum performance - nearshore versus offshore…”
Libro electrónico -
19560Publicado 2024“…Build your first production-grade web application from scratch using Node.js, Express, MongoDB, authentication, and testing with the help of expert guidance and step-by-step explanations Key Features Learn JavaScript, async programming, and event-driven architectures in Node.js Discover best practices for secure deployment and testing of Node.js apps Build a feature-rich web app from scratch using MongoDB, Express.js, and passport.js, including testing Purchase of the print or Kindle book includes a free PDF eBook Book Description Node.js is a runtime environment that revolutionizes server-side JavaScript development and combines high performance, a unified language stack, a rich ecosystem of packages, and scalability, empowering developers to build efficient, scalable, and versatile applications across a range of use cases. …”
Libro electrónico