Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
2681Publicado 2013Tabla de Contenidos: “…Young, Nick Koenig, Daniel Schmerling and Natalie Wright Dixon -- The predictive validity of conscious and nonconscious motives on career advancement / Ann Howard -- Goal setting and organizational transformation / Lise M. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
2682por Weingartner, PaulTabla de Contenidos: “…2.4.4.2 The Definition which Connects Perfection with Being (Premise 5. of 2.4.3)2.4.4.3 The Most Perfect Thing is the Cause of All Perfection; 2.5 The Fifth Way; 2.5.1 The Latin Text and its Translation into English; 2.5.2 The Premises and Conclusions of the Text; 2.5.3 Reconstruction; 2.5.4 Commentary; 2.5.4.1 Natural Beings Lacking Intelligence; 2.5.4.2 The Question of the Validity of the Argument; 2.6 The Question of the Uniqueness in the Conclusions of the Five Ways; 2.6.1 First Question; 2.6.2 Second Question; 2.7 Commentary to the Objections; References…”
Publicado 2010
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
2683por Davis, Don, 1928-Tabla de Contenidos: “…Heyser (1931-1987)2.9 Calculators and Computers; 2.10 The Meaning of Communication; 2.11 Historical Notes; Chapter 3 Sound and Our Brain; 3.1 The Human Brain; 3.2 The Current Era; 3.3 Unexpected Validation; Chapter 4 Psychoacoustics; 4.1 Motivations; 4.2 Sound Reproduction; 4.3 Is it Better to be Born Blind or Deaf ?…”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2684Publicado 2014Tabla de Contenidos: “…Chapter 2 Calibration and Self-Calibration of Smart Sensors2.1 Introduction; 2.2 Calibration of Smart Sensors; 2.2.1 Calibration Terminology; 2.2.2 Limited Validity of a Calibration; 2.2.3 Specifics of Smart Sensor Calibration; 2.2.4 Storing Calibration Data in the Sensor; 2.2.5 Calibration in the Production Process; 2.2.6 Opportunities for Smart Sensor Calibration; 2.2.7 Case Study: A Smart Temperature Sensor; 2.3 Self-Calibration; 2.3.1 Limitations of Self-Calibration; 2.3.2 Self-Calibration by Combining Multiple Sensors; 2.3.3 Self-Calibrating Sensactors…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2685Publicado 2019Tabla de Contenidos: “…(Case of Ogan Community Settlement in South Sumatera) -- The Informational Network of Bajo Sea-People in Indonesia and Malaysia Using Information Technologies -- Classification and Utilization System of Communal Land in the Mentawai Community -- Implementation of Organization Value on Staff's Performance at Bank Negara Library -- Peace on the Border (Social Harmonisation Study of Communities in Indonesia-Malaysia Border) -- Toward of SDGs 2030 and Maternal Mortality in Indonesia: a Cultural Perspective Review (West Sumatera case) -- Living Qualities of Urban Village Communities in Kuala Lumpur: Validation of the Indicators -- The Role of Ndungndungen in Karo Community -- Theories of Urban Sprawl -- Integrating Flood Risk Reduction Measures in Local Development Plans: A Study Based on Selected Local Plans in Kelantan, Malaysia -- Women's Pathway into National Parliament: The Case of Wives of Governor and Bupati in the West Sumatera -- The Enabling of Structure in Traffic Violations Social Practice…”
Libro electrónico -
2686por International Energy Agency.Tabla de Contenidos: “…Policies for Buildings -Key findings -Near-term recommendations -Policies to overcome market barriers -Component-level policies --Research and development --Field evaluation: validation of performance --Demonstrations (case studies): initial market introduction --Incentives: moving beyond a niche market --Appliance and equipment labelling and education --Mandatory policies --Challenges to policy implementation --Integration of component-level policies -Systems-level policies --Whole-building programmes to promote energy efficiency --Building codes --Existing building efficiency improvement programmes --Zero-energy and very low-energy buildings -Recommendations Annexes Annex A. …”
Publicado 2013
Libro electrónico -
2687Publicado 2019Tabla de Contenidos: “…-- Chapter 2 Introduction to the XOI Method -- 2.1 A Risk Modelling Doctrine -- 2.2 A Knowledge Management Process -- 2.3 The eXposure, Occurrence, Impact (XOI) Approach -- 2.4 The Return of AI: Bayesian Networks for Risk Assessment -- Chapter 3 Lessons Learned in 10 Years of Practice -- 3.1 Risk and Control Self-Assessment -- 3.2 Loss Data -- 3.3 Quantitative Models -- 3.4 Scenarios Workshops -- 3.5 Correlations -- 3.6 Model Validation -- Part Two Challenges of Operational Risk Measurement -- Chapter 4 Definition and Scope of Operational Risk -- 4.1 On Risk Taxonomies -- 4.2 Definition of Operational Risk -- Chapter 5 The Importance of Operational Risk -- 5.1 The Importance of Losses -- 5.2 The Importance of Operational Risk Capital -- 5.3 Adequacy of Capital to Losses -- Chapter 6 The Need for Measurement -- 6.1 Regulatory Requirements -- 6.2 Nonregulatory Requirements -- Chapter 7 The Challenges of Measurement -- 7.1 Introduction -- 7.2 Measuring Risk or Measuring Risks? …”
Libro electrónico -
2688por Pereyra, IreneTabla de Contenidos: “…. -- 87 Expect the unexpected. -- Validate -- 88 Voice assistants suck. -- 89 Don't ask for unnecessary things. -- 90 Manage errors effectively. -- 91 Accept many inputs. -- 92 Confirm user actions. -- 93 Broken pages shouldn't feel broken. -- 94 Fill the gap imagination can't bridge. -- 95 Metric-based design is silly. -- 96 Most issues can be spotted a mile ahead. -- 97 Don't grade your own homework. -- 98 Get the most bang for your buck. -- 99 Stay involved postlaunch. -- 100 Lower expectations for high satisfaction. -- About the Author -- Acknowledgments -- Index -- Copyright…”
Publicado 2023
Libro electrónico -
2689Publicado 2023Tabla de Contenidos: “…SQL Injection Example -- Surprising Output -- Overly Powerful Input -- Denial-of-Service Threats to Parsers -- Bad Advice -- Chained Parsers -- Specific Parsing Scenario Threats -- Parsing Protocols + Document Formats -- C Code + Memory Safety -- Defenses -- The Robustness Principle -- Input Validation -- Memory Safety -- LangSec -- Conclusion -- Chapter 9 Kill Chains -- Threats: Kill Chains -- Server Kill Chain -- Desktop Kill Chains -- Acquire or Use Credentials -- Kill Chains for Specific Scenarios -- Cloud -- IoT -- Mobile (IoS, Android) -- Weaponization as a Subchain -- "No One Would Ever Do That" -- Ransomware -- Elements of Network Kill Chains -- History -- History of Kill Chains -- Defenses -- Types of Defenses -- Defensive Scenarios -- Conclusion -- Epilogue -- Glossary -- Bibliography -- Story Index -- Episode I: The Phantom Menace -- Episode III: Revenge of the Sith -- Obi-Wan (Television Series) -- Rogue One -- Star Wars: A New Hope -- The Empire Strikes Back -- Return of the Jedi -- Index -- EULA…”
Libro electrónico -
2690Publicado 2023Tabla de Contenidos: “…Detecting vulnerabilities with Defender -- Summary -- Chapter 4: Ransomware Countermeasures - Windows Endpoints, Identity, and SaaS -- Technical requirements -- Securing endpoints -- ASR rules -- Microsoft Defender and antimalware -- Update management -- Securing Microsoft Office apps -- Securing the web browser -- Other miscellaneous endpoint countermeasures -- DNS filtering -- PowerShell -- SMB protocol -- LOLBins -- Default applications -- Securing user identity -- Securing Active Directory -- Securing email services -- Protecting the domains -- Protecting the content and URLs -- Other countermeasures -- Summary -- Chapter 5: Ransomware Countermeasures - Microsoft Azure Workloads -- Technical requirements -- Network segmentation and design -- Identity and access management in Microsoft Azure -- Hub-and-spoke virtual networks -- The anatomy of a VM in Azure -- Microsoft Defender for Servers -- Azure Policy -- Azure Backup -- Overall recommendations for Azure-based workloads -- Summary -- Chapter 6: Ransomware Countermeasures - Networking and Zero-Trust Access -- Attackers and lateral movement -- Providing users with secure access to services -- Microsoft -- Citrix -- Cloudflare -- SASE -- File access -- Remote management services -- DDoS protection -- Summary -- Chapter 7: Protecting Information Using Azure Information Protection and Data Protection -- Technical requirements -- Data exfiltration -- Data classification -- Azure Information Protection -- DLP features and the future of AIP -- Encryption on SQL Server -- Best practices for backups and data protection -- Summary -- Part 3: Assume Breach -- Chapter 8: Ransomware Forensics -- You got ransomware, now what? -- Phase one - validating an alert -- Phase two - discovering the impact -- Phase three - understanding the attack vector and what to look for -- A manual approach…”
Libro electrónico -
2691Publicado 2016Tabla de Contenidos: “…4.3.3 The Realization of the Integrated Optimization Method 4.3.4 Implementation of the Genetic Algorithm; 4.3.5 LQG Controller Design; 4.3.6 Simulations and Result Analysis; 4.4 Time-lag Problem and its Control of a Semi-active Suspension ; 4.4.1 Causes and Impacts of Time-lag; 4.4.2 Time-lag Variable Structure Control of an MR (Magneto-Rheological) Semi-active Suspension; 4.4.3 Simulation Results and Analysis; 4.4.4 Experiment Validation; 4.5 Design of an Active Suspension System ; 4.5.1 The Dynamic Model of an Active Suspension System; 4.5.2 Design of the Control Scheme…”
Libro electrónico -
2692Publicado 2025Tabla de Contenidos: “…Refresher Connection: Costs of Sales Revenue, Inventory, Accounts Payable, and Other Expenses -- Accounting Policies and Procedures Summary -- Let's Crunch Some Numbers -- Inventory Control and Management -- Accounting Issues -- Chapter 8 Long-Term Assets, Useful Lives, and Non-cash Expenses -- Intangible Assets Basics -- Refresher Connection: Long-Term Capital Assets and Depreciation and Amortization Expense -- Accounting Policies and Procedures Summary -- Let's Crunch Some Numbers -- Accounting Issues -- Chapter 9 Other Current Liabilities: A Breeding Ground for Abuse -- Refresher Connection: Accrued Liabilities, Other Current Liabilities, Sales Revenue, and Expenses -- Accounting Policies and Procedures Summary -- Let's Crunch Some Numbers -- Accounting Issues -- Chapter 10 Bringing It All Togetherwith Cash -- Accounting Adjustment Cheat Sheet -- Comparing the Income Statements -- Comparing the Balance Sheets and Statements of Cash Flow -- History, Cash, and Artistry -- Part Three Financial Analysis and Bonus Material -- Chapter 11 Financial Statement Ratios and Analysis: Strength -- Financial Reporting Ground Rules -- Financial Statement Preliminaries -- Benchmark Financial Ratios: Strength -- Final Comments -- Chapter 12 Financial Statement Ratios and Analysis: Performance -- Financial Performance versus Financial Strength -- Two Cash Flow Ratios to Chew On -- Chapter 13 How to Manufacture Cash from the Balance Sheet -- When Capital Markets Turn Hostile -- Crunching the Numbers: Let's Visualize SEB's Efforts -- PEB's Unintended Consequences -- Raising Cash Quickly, Not for the Faint of Heart -- Chapter 14 Net Profits and Cash Flow: Real or Imaginary -- Fixed, Variable, and Semi-Variable Expenses -- Generating Real Profits -- Manufacturing Imaginary Profits -- Cash Flow as Our Validation -- Chapter 15 Deciphering the Cap Table and Cap Stack…”
Libro electrónico -
2693Publicado 2018Tabla de Contenidos: “…-- The rules -- Summary -- Chapter 6: Handling Real-World Use Cases -- Technical requirements -- Form validation -- The interactions -- Modeling the observable state -- Onto the actions -- Completing the triad with reactions -- React components -- The UserEnrollmentForm component -- Other observer components -- Page routing -- The Cart checkout workflow -- Modeling the observable state -- A route for a step, a step for a route -- The WorkflowStep -- Actions and reactions of the workflow -- Loading a step -- The HistoryTracker -- The React components -- The TemplateStepComponent -- The ShowCart component -- A state-based router -- Summary -- Chapter 7: Special API for Special Cases -- Technical requirements -- Direct manipulation with the object API -- Granular reads and writes -- From MobX to JavaScript -- Watching the events flow by -- Hooking into the observability -- Lazy loading the temperature -- Gatekeeper of changes -- Intercepting the change -- observe() the changes -- Development utilities -- Using spy() to track the reactivity -- Tracing a reaction -- Visual debugging with mobx-react-devtools -- A few other APIs -- Querying the reactive system -- Probing deeper into the reactive system -- Summary -- Chapter 8: Exploring mobx-utils and mobx-state-tree -- Technical requirements -- The utility functions of mobx-utils -- Visualizing async-operations with fromPromise() -- Using lazyObservable() for deferred updates -- A generalized lazyObservable() with fromResource() -- A view model to manage edits -- There is lot more to discover -- An opinionated MobX with mobx-state-tree…”
Libro electrónico -
2694Publicado 2017Tabla de Contenidos: “…The componentWillReceiveProps method -- The shouldComponentUpdate method -- The componentWillUpdate method -- The componentDidUpdate method -- Setting default React component properties -- Validating React component properties -- Creating a Collection component -- Summary -- Chapter 8: Building Complex React Components -- Creating the TweetList component -- Creating the CollectionControls component -- Creating the CollectionRenameForm component -- Creating the Button component -- Creating the CollectionExportForm component -- Summary -- Chapter 9: Testing Your React Application with Jest -- Why write unit tests? …”
Libro electrónico -
2695por National Research Council (U.S.).Tabla de Contenidos: “…DIRECT EXPOSURE FROM DUMPS -- Arsenic -- Lead Exposure -- Mixed Chemical Exposure -- DETECTION OF CONTAMINANTS -- Pesticide Contamination Of Food -- Animals As Sentinels -- CONCLUSIONS -- References -- 7 Biologic Markers in Studies of Hazardous-Waste Sites -- TYPES OF MARKERS -- USE OF BIOLOGIC MARKERS IN STUDIES OF HAZARDOUS SUBSTANCES -- Biologic Monitoring Of Hazardous-Waste And Other Workers -- General Environmental And Occupational Health Research -- Goal Of Biologic Monitoring Studies -- VALIDATION -- MARKERS OF EXPOSURE, EFFECT, AND SUSCEPTIBILITY -- DNA And Protein Adducts, Markers Of Exposure -- Immune-System Markers Of Effect -- Alpha-1-Antitrypsin, Marker Of Susceptibility -- ETHICAL AND LEGAL ISSUES -- CONCLUSIONS -- References -- 8 General Conclusions -- STATE AND FEDERAL CONSTRAINTS -- PROBLEMS OF EXPOSURE ASSESSMENT -- AIR POLLUTION FROM HAZARDOUS WASTES -- DOMESTIC WATER CONTAMINATED WITH HAZARDOUS WASTES -- SOIL CONTAMINATED WITH HAZARDOUS WASTES -- CONCLUSIONS -- Index…”
Publicado 1991
Libro electrónico -
2696Publicado 2005Tabla de Contenidos: “…Dimensions; 8.1 Concepts; 8.2 Creating a Dimension; 8.3 Describing a Dimension; 8.4 Validating a Dimension; 8.5 Summary…”
Libro electrónico -
2697por Redmond, Tony, 1959-Tabla de Contenidos: “…3.12 User naming conventions3.13 Server naming conventions; 3.14 Moving from the basics; Chapter 4 The Exchange Management Shell; 4.1 EMS: Exchange's management shell; 4.2 Learning from EMC; 4.3 Using EMS to work with mailboxes; 4.4 Working with distribution groups; 4.5 Delegation through the shell; 4.6 Creating efficient filters; 4.7 Bulk updates; 4.8 Reporting mailbox data; 4.9 Using the shell for other management tasks; 4.10 Command validation; 4.11 Working with remote servers; 4.12 Working with non-Exchange 2007 servers; 4.13 Testing Exchange 2007…”
Publicado 2007
Libro electrónico -
2698por Varghese, George, 1960-Tabla de Contenidos: “…3.6 SUMMARY3.7 EXERCISES; CHAPTER 4 Principles in Action; 4.1 BUFFER VALIDATION OF APPLICATION DEVICE CHANNELS; 4.2 SCHEDULER FOR ASYNCHRONOUS TRANSFER MODE FLOW CONTROL; 4.3 ROUTE COMPUTATION USING DIJKSTRA'S ALGORITHM; 4.4 ETHERNET MONITOR USING BRIDGE HARDWARE; 4.5 DEMULTIPLEXING IN THE X-KERNEL; 4.6 TRIES WITH NODE COMPRESSION; 4.7 PACKET FILTERING IN ROUTERS; 4.8 AVOIDING FRAGMENTATION OF LINK STATE PACKETS; 4.9 POLICING TRAFFIC PATTERNS; 4.10 IDENTIFYING A RESOURCE HOG; 4.11 GETTING RID OF THE TCP OPEN CONNECTION LIST; 4.12 ACKNOWLEDGMENT WITHHOLDING…”
Publicado 2005
Libro electrónico -
2699por Celko, JoeTabla de Contenidos: “…Data Migration and Scrubbing; 4.1 Pumping Data; 4.2 Verification and Validation; 4.3 Extract, Transform, and Load (ETL); 4.4 Databases Also Evolved; 4.5 Data Warehouses; 4.6 Extract, Load, and then Transform (E-L-T); 4.7 Scrubbing Data with Non-First-Normal-Form (1NF) Tables; Chapter 5. …”
Publicado 2006
Libro electrónico -
2700por Rothwell, KevinTabla de Contenidos: “…Handbook of Investment Administration; Contents; About the Author; Introduction; Part I: Introductory Elements; 1 Wealth Management; 1.1 Introduction; 1.2 Wealth Management Market; 1.3 Types of Business; 1.4 Investment Services and Products; 1.5 Investment Firms; 1.6 Investment Administration; Part II: Investment Administration; 2 New and Closing Business; 2.1 Introduction; 2.2 New Business; 2.3 Client Types; 2.4 Know your Customer; 2.5 Agreements; 2.6 Account Opening; 2.7 Money Laundering; 2.8 Validating the Assets; 2.9 Transferring Assets; 2.10 Raising Assets…”
Publicado 2007
Libro electrónico