Mostrando 10,841 - 10,860 Resultados de 26,561 Para Buscar '"performances"', tiempo de consulta: 0.18s Limitar resultados
  1. 10841
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  2. 10842
    por OECD
    Publicado 2019
    Tabla de Contenidos: “…Le soutien aux services d'intérêt général varie beaucoup selon les pays, aussi bien du point de vue de son importance que de ses priorités -- De manière générale, le poids que le soutien à l'agriculture fait peser sur l'économie des pays a baissé -- Les performances environnementales de l'agriculture : effets et évolutions de l'action publique -- Constatations récentes concernant les effets sur l'environnement des politiques de soutien agricole -- Évolutions récentes des performances environnementales de l'agriculture -- Les excédents d'éléments nutritifs ont diminué, les déficits ont été réduits, mais les pressions restent fortes dans certains pays -- Les émissions de gaz à effet de serre d'origine agricole ont augmenté, celles d'ammoniac ont diminué -- La tendance à la diminution des prélèvements d'eau se poursuit dans l'agriculture -- Le recul de la diversité des plantes cultivées et de l'hétérogénéité paysagère et l'utilisation accrue de pesticides ont de fortes répercussions sur la biodiversité sur les exploitations agricoles -- Progrès récents dans le domaine des indicateurs de suivi des engagements internationaux en matière de durabilité : mesure de l'avancement de l'ODD n 2.4 -- Évaluation du soutien et des réformes -- Les mesures plus efficaces et moins distorsives occupent beaucoup plus de place qu'auparavant, mais les progrès ont marqué le pas au cours de la décennie écoulée et le soutien reste très inégal entre pays et entre produits -- Les évolutions récentes de l'action publique découlent souvent de celles des marchés et des échanges -- De grandes opportunités s'offrent au secteur, mais il est difficile d'en tirer parti de manière durable -- Face aux défis et opportunités futurs, il est crucial d'améliorer la cohérence et la transparence de l'action publique…”
    Libro electrónico
  3. 10843
    Tabla de Contenidos: “…Performance environnementale : tendances et développements récents -- Changement climatique et mix et intensité énergétiques -- Graphique 1. …”
    Libro electrónico
  4. 10844
    Tabla de Contenidos: “…Tour d'horizon -- Perspectives relatives aux performances des PME -- Les PME dans la nouvelle économie -- Des entreprises de petite taille mais qui jouent un grand rôle -- Figure 1. …”
    Libro electrónico
  5. 10845
    “…S'il y a une nuance à apporter à ce bilan exceptionnel, c'est que la croissance très rapide des communications mobiles a eu tendance à masquer de grandes disparités dans les performances à l'intérieur de la zone de l'OCDE. Aussi importe-t-il d'analyser ces performances en se référant à des critères internationaux qui progressent rapidement. …”
    Libro electrónico
  6. 10846
    Publicado 2018
    Tabla de Contenidos: “…Analyzing current trends -- Extortion attacks -- Data manipulation attacks -- IoT device attacks -- Backdoors -- Mobile device attacks -- Hacking everyday devices -- Hacking the cloud -- Phishing -- Exploiting a vulnerability -- Zero-day -- Fuzzing -- Source code analysis -- Types of zero-day exploits -- Buffer overflows -- Structured exception handler overwrites -- Performing the steps to compromise a system -- Deploying payloads -- Installing and using a vulnerability scanner -- Using Metasploit -- Compromising operating systems -- Compromising systems using Kon-Boot or Hiren's BootCD -- Compromising systems using a Linux Live CD -- Compromising systems using preinstalled applications -- Compromising systems using Ophcrack -- Compromising a remote system -- Compromising web-based systems -- SQL injection -- Cross-site scripting -- Broken authentication -- DDoS attacks -- References -- Summary -- Chapter 6: Chasing a User's Identity -- Identity is the new perimeter -- Strategies for compromising a user's identity -- Gaining access to the network -- Harvesting credentials -- Hacking a user's identity -- Brute force -- Social engineering -- Pass the hash -- Other methods to hack identity -- References -- Summary -- Chapter 7: Lateral Movement -- Infiltration -- Network mapping -- Avoiding alerts -- Performing lateral movement -- Port scans -- Sysinternals -- File shares -- Remote Desktop -- PowerShell -- Windows Management Instrumentation -- Scheduled tasks -- Token stealing -- Pass-the-hash -- Active Directory -- Remote Registry -- Breached host analysis -- Central administrator consoles -- Email pillaging -- References -- Summary -- Chapter 8: Privilege Escalation -- Infiltration -- Horizontal privilege escalation -- Vertical privilege escalation -- Avoiding alerts -- Performing privilege escalation -- Exploiting unpatched operating systems…”
    Libro electrónico
  7. 10847
    Publicado 2017
    Tabla de Contenidos: “…. -- Chapter 6: SSIS Performance and Scalability -- Introduction -- Using SQL Server Management Studio to execute an SSIS package -- Getting ready -- How to do it... -- How it works... -- Using T-SQL to execute an SSIS package -- How to do it... -- How it works... -- Using the DTExec command-line utility to execute an SSIS package -- How to do it... -- How it works... -- There's more... -- Scheduling an SSIS package execution -- Getting ready -- How to do it... -- How it works... -- Using the cascading lookup pattern -- How to do it... -- How it works... -- Using the lookup cache -- How to do it... -- How it works... -- Using lookup expressions -- How to do it... -- How it works... -- Determining the maximum number of worker threads in a data flow -- How to do it... -- How it works... -- Using the master package concept -- How to do it... -- How it works... -- Requesting an execution tree in SSDT -- How to do it... -- How it works... -- Monitoring SSIS performance -- Establishing a performance monitor session -- How to do it... -- How it works…”
    Libro electrónico
  8. 10848
    Publicado 2023
    Tabla de Contenidos: “…Creating a Data Explorer pool using the Azure CLI -- Summary -- Chapter 3: Exploring Azure Synapse Studio -- Technical requirements -- Exploring the user interface of Azure Synapse Studio -- Running your first query -- Creating a database -- Loading the data -- Verifying whether your data has loaded successfully -- Working with data in Azure Synapse notebooks -- Saving your work and configuring source control -- Managing and monitoring Data Explorer pools -- Scaling Data Explorer pools -- Pausing and resuming pools -- Monitoring Data Explorer pools -- Summary -- Chapter 4: Real-World Usage Scenarios -- Technical requirements -- Building a multi-purpose end-to-end analytics environment -- Sources -- Ingest -- Store -- Process -- Enrich -- Serve -- User -- Summary -- Managing IoT data -- Processing and analyzing geospatial data -- Enabling real-time analytics with big data -- Performing time series analytics -- Summary -- Part 2: Working with Data -- Chapter 5: Ingesting Data into Data Explorer Pools -- Technical requirements -- Understanding the data loading process -- Defining a retention policy -- Choosing a data load strategy -- Streaming ingestion -- Batching ingestion -- Performing data ingestion -- Using KQL control commands -- Building an Azure Synapse pipeline -- Implementing continuous ingestion -- Using other data ingestion mechanisms -- Summary -- Chapter 6: Data Analysis and Exploration with KQL and Python -- Technical requirements -- Analyzing data with KQL -- Selecting data -- Working with calculated columns -- Plotting charts -- Obtaining percentiles -- Creating a time series -- Detecting outliers -- Using linear regression -- Exploring Data Explorer pool data with Python -- Creating an Apache Spark pool -- Working with Azure Synapse notebooks -- Reading data from Data Explorer pools -- Plotting charts…”
    Libro electrónico
  9. 10849
    Publicado 2024
    Tabla de Contenidos: “…-- Building a Python Flight server -- Building a Go Flight server -- What is Flight SQL? -- Setting up a performance test -- Everyone gets a containerized development environment! …”
    Libro electrónico
  10. 10850
    por Smaini, Lydi, 1974-
    Publicado 2012
    Tabla de Contenidos: “…Machine generated contents note: 1 Chapter 1: Introduction to Communication System- On-Chip, RF analog front-end, OFDM modulation, and performance metrics 1.1 Communication System-on-Chip 1.1.1 Introduction 1.1.2 CMOS technology 1.1.3 Coexistence Issues 1.2 RF Analog Front-End Overview 1.2.1 Introduction 1.2.2 Super-heterodyne transceiver 1.2.3 Homodyne transceiver 1.2.4 Low-IF transceiver 1.2.5 Analog baseband Filter order vs. …”
    Libro electrónico
  11. 10851
    Publicado 2022
    Tabla de Contenidos: “…. -- See also -- Analyzing population structure -- Getting ready -- How to do it... -- See also -- Performing a PCA…”
    Libro electrónico
  12. 10852
    Publicado 2023
    Tabla de Contenidos: “…Khanapur, Kristina Foˇrtov ́a, Diana Mariakov ́a, Bhavna Tripathi -- and Tarush Chandra et al. -- Design of Performance-Based Concrete Using Sand Reclaimed from Construction and -- Demolition Waste-Comparative Study of Czechia and India -- Reprinted from: Materials 2022, 15, 7873, doi:10.3390/ma15227873 21 -- Byung-Jun Kim, Geon-Wook Lee and Young-Cheol Choi -- Hydration and Mechanical Properties of High-Volume Fly Ash Concrete with Nano-Silica and -- Silica Fume -- Reprinted from: Materials 2022, 15, 6599, doi:10.3390/ma15196599 49 -- Todor Zhelyazov -- Numerical Simulation of the Response of Concrete Structural Elements Containing a -- Self-Healing Agent -- Reprinted from: Materials 2022, 15, 1233, doi:10.3390/ma15031233 65 -- Woo Sung Yum, Juan Yu, Dongho Jeon, Haemin Song, Sungwon Sim and Do Hoon Kim et -- al. -- Mechanical and Durability Properties of Cementless Concretes Made Using Three Types of -- CaO-Activated GGBFS Binders -- Reprinted from: Materials 2021, 15, 271, doi:10.3390/ma15010271 79 -- Solmoi Park, Namkon Lee, Gi-Hong An, Kyeong-Taek Koh and Gum-Sung Ryu -- Modeling the Effect of Alternative Cementitious Binders in Ultra-High-Performance Concrete -- Reprinted from: Materials 2021, 14, 7333, doi:10.3390/ma14237333 95 -- Wilfrido Martinez-Molina, Hugo L. …”
    Libro electrónico
  13. 10853
    por Hughes, Chris
    Publicado 2024
    Tabla de Contenidos: “…Risk Management and Patching -- Building a Patch Management Program -- People -- Process -- Technology -- Summary -- Chapter 3 Secure Configuration -- Regulations, Frameworks, and Laws -- NSA and CISA Top Ten Cybersecurity Misconfigurations -- Default Configurations of Software and Applications -- Improper Separation of User/Administrator Privilege -- Insufficient Internal Network Monitoring -- Lack of Network Segmentation -- Poor Patch Management -- Bypass of System Access Controls -- Weak or Misconfigured Multifactor Authentication Methods -- Lack of Phishing-Resistant MFA -- Insufficient Access Control Lists on Network Shares and Services -- Poor Credential Hygiene -- Unrestricted Code Execution -- Mitigations -- Default Configurations of Software Applications -- Improper Separation of User/Administration Privilege -- Insufficient Network Monitoring -- Poor Patch Management -- Wrapping up the CIS Misconfigurations Guidance -- CIS Benchmarks -- DISA Security Technical Implementation Guides -- Summary -- Chapter 4 Continuous Vulnerability Management -- CIS Control 7-Continuous Vulnerability Management -- Establish and Maintain a Vulnerability Management Process -- Establish and Maintain a Remediation Process -- Perform Automated Operating System Patch Management -- Perform Automated Application Patch Management -- Perform Automated Vulnerability Scans of Internal Enterprise Assets -- Perform Automated Vulnerability Scans of Externally Exposed Enterprise Assets -- Remediate Detected Vulnerabilities -- Continuous Monitoring Practices -- Summary -- Chapter 5 Vulnerability Scoring and Software Identification -- Common Vulnerability Scoring System -- CVSS 4.0 at a Glance -- Base Metrics -- Exploitability Metrics -- Threat Metrics -- Environmental Metrics -- Supplemental Metrics -- Qualitative Severity Rating Scale -- Vector String…”
    Libro electrónico
  14. 10854
    Publicado 2013
    Tabla de Contenidos: “…Model Estimation -- Types of Factors -- Idiosyncratic Risk -- APPLICATIONS OF EQUITY RISK MODELS -- Portfolio Construction -- Analyzing Portfolio Risk Using Multifactor Models -- Performance Attribution -- Factor-Based Scenario Analysis -- KEY POINTS -- NOTES -- REFERENCES -- Factor-Based Equity Portfolio Construction and Analysis -- FACTOR-BASED TRADING -- DEVELOPING FACTOR-BASED TRADING STRATEGIES -- Basic Framework and Building Blocks -- RISK TO TRADING STRATEGIES -- DESIRABLE PROPERTIES OF FACTORS -- SOURCES FOR FACTORS -- BUILDING FACTORS FROM COMPANY CHARACTERISTICS -- WORKING WITH DATA -- Data Integrity -- Potential Biases from Data -- Dealing with Common Data Issues -- Methods to Adjust Factors -- Outlier Detection and Management -- ANALYSIS OF FACTOR DATA -- Example 1: EBITDA/EV -- Example 2: Revisions -- Example 3: Share Repurchase -- KEY POINTS -- NOTES -- REFERENCES -- Cross-Sectional Factor-Based Models and Trading Strategies -- CROSS-SECTIONAL METHODS FOR EVALUATION OF FACTOR PREMIUMS -- Portfolio Sorts -- FACTOR MODELS -- Econometric Considerations for Cross-Sectional Factor Models -- Fama-MacBeth Regression -- Information Coefficients -- Factor Portfolios -- PERFORMANCE EVALUATION OF FACTORS -- MODEL CONSTRUCTION METHODOLOGIES FOR A FACTOR-BASED TRADING STRATEGY -- The Data Driven Approach -- The Factor Model Approach -- The Heuristic Approach -- The Optimization Approach -- Importance of Model Construction and Factor Choice -- BACKTESTING -- Understanding In-Sample and Out-of-Sample Methodologies -- A Comment on the Interaction between Factor-Based Strategies and Risk Models -- BACKTESTING OUR FACTOR TRADING STRATEGY -- KEY POINTS -- APPENDIX: THE COMPUSTAT POINT-IN-TIME, IBES CONSENSUS DATABASES AND FACTOR DEFINITIONS -- Value Factors -- Quality Factors -- Growth -- Momentum -- Summary Statistics -- NOTES -- REFERENCES…”
    Libro electrónico
  15. 10855
    Publicado 2017
    Tabla de Contenidos: “…Building a Robust People Pipeline -- Performance without Potential -- Potential without Performance -- 3. …”
    Libro electrónico
  16. 10856
    Publicado 2022
    Tabla de Contenidos: “…Understanding that AI can't eliminate safety issues -- Chapter 7 Using AI to Address Medical Needs -- Implementing Portable Patient Monitoring -- Wearing helpful monitors -- Relying on critical wearable monitors -- Using movable monitors -- Making Humans More Capable -- Using games for therapy -- Considering the use of exoskeletons -- Addressing a Range of Physical Abilities -- Considering the software-based solutions -- Relying on hardware augmentation -- Seeing AI in prosthetics -- Completing Analysis in New Ways -- Relying on Telepresence -- Defining telepresence -- Considering examples of telepresence -- Understanding telepresence limitations -- Devising New Surgical Techniques -- Making surgical suggestions -- Assisting a surgeon -- Replacing the surgeon with monitoring -- Performing Tasks Using Automation -- Working with medical records -- Predicting the future -- Making procedures safer -- Creating better medications -- Combining Robots and Medical Professionals -- Chapter 8 Relying on AI to Improve Human Interaction -- Developing New Ways to Communicate -- Creating new alphabets -- Working with emoji and other meaningful graphics -- Automating language translation -- Incorporating body language -- Exchanging Ideas -- Creating connections -- Augmenting communication -- Defining trends -- Using Multimedia -- Embellishing Human Sensory Perception -- Shifting data spectrum -- Augmenting human senses -- Part 3 Working with Software-Based AI Applications -- Chapter 9 Performing Data Analysis for AI -- Defining Data Analysis -- Understanding why analysis is important -- Reconsidering the value of data -- Defining Machine Learning -- Understanding how machine learning works -- Understanding the benefits of machine learning -- Being useful -- being mundane -- Specifying the limits of machine learning -- Considering How to Learn from Data…”
    Libro electrónico
  17. 10857
    Diversity, equity, and inclusion for dummies
    Diversity, Equity, and Inclusion For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Chapter 14 Launching DEI Councils and Employee Resource Groups -- Differentiating Between DEI Councils and Employee Resource Groups -- Understanding how diversity councils can support ERGs -- Looking at what diversity councils and ERGs can accomplish together -- Drilling down into the importance of ERGs -- Ensuring Engagement from the Top: The Importance of the Executive Sponsor -- Establishing an Effective DEI Council -- Knowing your company and finding a champion -- Establishing your mission, vision, and strategic areas of focus -- Setting goals and establishing roles and responsibilities -- Recruiting and securing DEI council members -- Developing a DEI council charter -- Offering Employee Resource Groups to Support DEI Initiatives -- Realizing the benefits of the ERGs for employees and the organization -- Identifying the various types of employee resource groups -- Deciding when to launch ERGs and which to launch first -- Recruiting ERG members and executive sponsors -- Establishing an ERG charter and measures of success -- Part 4 Sustaining DEI in Your Organization -- Chapter 15 Understanding Implicit Bias and Its Impact in the Workplace -- An Important Word on Bias -- Tracing the Origins of Biases and How They're Reinforced -- Identifying Ways Biases Show Up in Everyday Life -- Distinguishing among the Various Biases -- Describing the Ways Biases Affect Decision Making in the Workplace -- Reprogramming Your Brain to Make Less Biased Decisions -- Mitigating bias as an individual -- Managing bias within a system -- Chapter 16 Moving from Unconscious Bias to Inclusive Leadership -- Realizing the Benefits of Becoming an Inclusive Leader -- Driving financial performance -- Enhancing employer brand that attracts top talent -- Increasing employee engagement, satisfaction, and team performance -- Achieving greater innovation in products and services…”
    Libro electrónico
  18. 10858
    Publicado 2016
    Tabla de Contenidos: “…-- Types of Fund -- Summary -- Part 1 - Introduction to Investment -- Investment environment -- Islamic investment funds -- Investment Objectives -- The Meaning of an Offering or Placement -- The Meaning of a Unit or Share of an AIF -- The Meaning of Investor -- PR 2.3 Minimum Information to be Included in a Prospectus -- Collective Investment Schemes (CIS) and the Investment Management Process -- Unregulated funds -- Asset Classes-Securities, Derivatives, Alternatives -- Investment strategies -- Using derivatives -- Portfolio management -- Investment performance -- Risk versus reward -- Performance ratios -- Alpha Ratio -- Beta Ratio -- Sharpe Ratio -- Treynor Ratio -- Investment management fees and costs -- Annual Management Fees -- Performance Fees -- Initial and Exit Fees -- Summary -- Part 2 - Regulation and Fund Structures -- Overview of regulation -- Regulation and directives -- AIFMD and AIFMs -- EEA Firms -- Retail funds -- UCITS Directive -- Money laundering -- Principles and recommendations -- Fund Structures-Companies, Trusts, Partnerships, Common Funds -- Fund of funds -- Multimanager funds -- Other structures -- Retail funds -- Alternative Investment Funds -- Hedge funds -- Open Ended and Closed Funds -- Fund Jurisdictions -- Key Players in the Operation of a Fund -- Retail/mutual fund custodian -- Fund administration -- Prime broker/brokers -- Setting up a Fund -- Outsourcing -- Documentation and agreements -- Summary…”
    Libro electrónico
  19. 10859
    Publicado 2012
    Tabla de Contenidos: “…-- Characteristics of Stakeholders -- Identify Stakeholders -- Stakeholder Register -- Stakeholder Classification Model -- Planning -- Contents of Overall Plan -- Product Visioning -- Product Roadmap -- Release Planning -- Iteration (Cycle) Planning -- Daily Planning -- Work Authorization System -- Iteration (Cycle) Execution -- Direct and Manage Iteration Execution -- Project Management Information Systems -- Configuration Management (Tool) -- Configuration Management Activities -- Work Performance Information -- Monitoring and Control Project Work -- Performance Reports -- Closing -- Chapter 4: Communications -- Communications Management -- Dimensions of Communication -- General Communication Process -- Sending Messages -- Receiving Messages…”
    Libro electrónico
  20. 10860
    Publicado 2003
    Tabla de Contenidos: “…9.5.2 Securing WebSphere MQ Integrator resources -- 9.6 Security design principles summary -- Chapter 10. Performance and availability -- 10.1 Introduction -- 10.2 Performance analysis -- 10.3 Performance considerations in messaging -- 10.3.1 Connection pooling -- 10.3.2 Multithreaded programs -- 10.3.3 Persistent versus non-persistent messages -- 10.3.4 One-phase commit optimization -- 10.3.5 Caching WebSphere MQ JMS objects -- 10.3.6 Message-driven beans performance considerations -- 10.4 High availability with WebSphere MQ -- 10.4.1 Overview of WebSphere MQ cluster components -- 10.4.2 WebSphere MQ simplified management -- Part 3 Implementation -- Chapter 11. …”
    Libro electrónico