Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,622
- History and criticism 773
- History 700
- Política y gobierno 622
- Història 595
- Edificios, estructuras, etc 458
- Management 441
- TFC 437
- Música 416
- Development 396
- Arquitectura 381
- Application software 338
- Engineering & Applied Sciences 317
- Bancs 305
- Civilización y cultura 297
- Edificis, estructures, etc 279
- Database management 220
- Data processing 218
- Computer Science 216
- Operating systems (Computers) 210
- Crítica e interpretación 208
- Computer programs 196
- Filosofía 195
- Música sagrada 195
- Politics and government 194
- Bach, Johann Sebastian 193
- Relaciones 193
- Situación social 190
- Computer networks 180
- Photography 177
-
28901Publicado 2020Tabla de Contenidos: “…Key points -- Activity -- 29 Managing your research project -- Overview -- 29.1 Introduction -- 29.2 Advice for consideration -- 29.3 Conclusion -- Key points -- Glossary -- References -- Index -- Back Cover…”
Libro electrónico -
28902Publicado 2021Tabla de Contenidos: “…12.1.1 Continuous integration -- 12.1.2 Continuous delivery -- 12.2 The role of automated tests in a CI/CD pipeline -- 12.3 Version-control checks -- Summary -- 13 A culture of quality -- 13.1 Using type systems to make invalid states unrepresentable -- 13.2 Reviewing code to catch problems machines can't -- 13.3 Using linters and formatters to produce consistent code -- 13.4 Monitoring your systems to understand how they actually behave -- 13.5 Explaining your software with good documentation -- Summary -- index -- inside back cover…”
Libro electrónico -
28903Publicado 2021Tabla de Contenidos: “…The network is homogeneous -- CAP theorem and eventual consistency -- Sagas and compensating transactions -- Choreography-based sagas -- Orchestration-based sagas -- Making your system fault tolerant and available -- Calculating your system's availability -- Building fault-tolerant systems -- Redundancy -- Leader election -- Consensus -- Replication -- Master-slave replication -- Multi-master replication -- Queue-based load leveling -- Back pressure -- Detecting faults -- Sidecar design pattern -- Heartbeat mechanism -- Leaky bucket counter -- Minimizing the impact of faults -- Retrying the call -- Avoiding cascading failures -- Circuit breaker -- Bulkhead -- Geodes -- Integrating your system -- Pipes and filters pattern -- Competing consumers -- Transitioning from legacy systems -- Anti-corruption layer -- Strangler pattern -- Achieving performance at scale -- CQRS and event sourcing -- Command-query responsibility segregation -- Command-query separation -- Event sourcing -- Caching -- Updating caches -- Write-through approach -- Write-behind approach -- Cache-aside -- Deploying your system -- The sidecar pattern -- Deploying a service with tracing and a reverse proxy using Envoy -- Zero-downtime deployments -- Blue-green deployments -- Canary releases -- External configuration store -- Managing your APIs -- API gateways -- Summary -- Questions -- Further reading -- Chapter 5: Leveraging C++ Language Features -- Technical requirements -- Designing great APIs -- Leveraging RAII -- Specifying the interfaces of containers in C++ -- Using pointers in interfaces -- Specifying preconditions and postconditions -- Leveraging inline namespaces -- Leveraging std::optional -- Optional function parameters -- Optional function return values -- Optional class members -- Writing declarative code -- Showcasing a featured items gallery -- Introducing standard ranges…”
Libro electrónico -
28904Publicado 2018Tabla de Contenidos: “…-- Maltego for network data gathering -- Step 1 - opening Maltego -- Step 2 - choosing a machine -- Step 3 - choosing a target -- Step 4 - results -- Using Maltego to collect data on an individual -- Step 1 - selecting the machine -- Step 2 - specifying a target -- Step 3 - results -- Google -- Hacking personal information -- Hacking servers -- Apache servers -- Microsoft servers -- Oracle servers -- IBM servers -- Netscape servers -- Red Hat servers -- System reports -- Error message queries -- Social engineer toolkit (SET) -- Spear phishing -- Web attack vector -- Infectious media generator -- SMS spoofing attack vector -- Wireless access point attack vector -- QRCode attack vector -- Third-party modules - fast track exploitation -- Create a payload and listener -- Mass mailer attack -- Phone tools -- Caller ID spoofing -- Scripts -- The way back machine -- Spokeo -- Metagoofil -- Fingerprinting Organizations with Collected Archives (FOCA) -- The credential harvester attack method -- Social engineering exercise -- Phishing with BeEF -- Zabasearch.com -- Job postings -- Shodan.io -- Default passwords -- Hardware keyloggers -- Toll-free number providers -- Netcraft website -- Netcraft toolbar -- Microsoft Edge SmartScreen -- Windows Defender application guard -- SmartScreen filter -- Windows Defender network protection -- Highly recommended -- Ask the experts -- Tips -- Summary -- Chapter 9: Prevention and Mitigation -- Learning to identify social engineering attacks…”
Libro electrónico -
28905Publicado 2004Tabla de Contenidos: “…3.3.4 Security considerations with sudo -- 3.4 Securing Internet services with TCP_wrappers -- 3.4.1 TCP_wrappers access control specification -- 3.4.2 Configuring TCP_wrappers -- 3.5 Securing Linux using Bastille -- 3.5.1 Configuring security settings with Bastille -- 3.5.2 Reverting changes -- 3.5.3 Copying the Bastille setup to other hosts -- Chapter 4. …”
Libro electrónico -
28906Publicado 2021Tabla de Contenidos: “…Updating the PageRank of tree graph when a batch of edges changes -- 1.4.2. An example of updating the PageRank of a tree -- 1.5. …”
Libro electrónico -
28907Publicado 2021Tabla de Contenidos: “…Managing, scaling, and monitoring Jenkins -- 13 Collecting continuous delivery metrics -- 13.1 Monitoring Jenkins cluster health -- 13.2 Centralized logging for Jenkins logs with ELK -- 13.2.1 Streaming logs with Filebeat -- 13.2.2 Streaming logs with the Logstash plugin -- 13.3 Creating alerts based on metrics -- Summary -- 14 Jenkins administration and best practices -- 14.1 Exploring Jenkins security and RBAC authorization -- 14.1.1 Matrix authorization strategy -- 14.1.2 Role-based authorization strategy -- 14.2 Configuring GitHub OAuth for Jenkins -- 14.3 Keeping track of Jenkins users' actions -- 14.4 Extending Jenkins with shared libraries -- 14.5 Backing up and restoring Jenkins -- 14.6 Setting up cron jobs with Jenkins -- 14.7 Running Jenkins locally as a Docker container -- Summary -- Wrapping up -- index…”
Libro electrónico -
28908Publicado 2022Tabla de Contenidos: “…Meeting the quadcopter -- Defining Uses for Drones -- Seeing drones in nonmilitary roles -- Powering up drones using AI -- Understanding regulatory issues -- Chapter 14 Utilizing the AI-Driven Car -- Getting a Short History -- Understanding the Future of Mobility -- Climbing the six levels of autonomy -- Rethinking the role of cars in our lives -- Taking a step back from unmet expectations -- Getting into a Self-Driving Car -- Putting all the tech together -- Letting AI into the scene -- Understanding that it's not just AI -- Overcoming Uncertainty of Perceptions -- Introducing the car's senses -- Putting together what you perceive -- Part 5 Considering the Future of AI -- Chapter 15 Understanding the Nonstarter Application -- Using AI Where It Won't Work -- Defining the limits of AI -- Applying AI incorrectly -- Entering a world of unrealistic expectations -- Considering the Effects of AI Winters -- Understanding the AI winter -- Defining the causes of the AI winter -- Rebuilding expectations with new goals -- Creating Solutions in Search of a Problem -- Defining a gizmo -- Avoiding the infomercial -- Understanding when humans do it better -- Looking for the simple solution -- Chapter 16 Seeing AI in Space -- Observing the Universe -- Seeing clearly for the first time -- Finding new places to go -- Considering the evolution of the universe -- Creating new scientific principles -- Performing Space Mining -- Harvesting water -- Obtaining rare earths and other metals -- Finding new elements -- Enhancing communication -- Exploring New Places -- Starting with the probe -- Relying on robotic missions -- Adding the human element -- Building Structures in Space -- Taking your first space vacation -- Performing scientific investigation -- Industrializing space -- Using space for storage -- Chapter 17 Engaging in Human Endeavors…”
Libro electrónico -
28909Android Smartphone Photography for DummiesAndroid Smartphone Photography For DummiesPublicado 2021Tabla de Contenidos: “…Using shadows to create artistic portraits -- Placing family members in the shade for even light -- Photographing from a lower position -- Photography Tips for Your Next Portrait Session -- Taking multiple photos at your location -- Avoiding objects sticking out of people's heads -- Composing small for artistic portraits -- Including family member's interests -- Practicing close-up portraits -- Including mirrors for hands-free selfies -- Using food as bait for pet photos -- Chapter 8 Photographing During Your Travels and Vacations -- Camera Considerations: Multiple Lenses and Exposure -- Photographing the same scene with multiple lenses -- Quickly using exposure control for fleeting subjects -- Gear Considerations -- Protecting your Android smartphone -- Packing a tripod -- Lighting Considerations -- Front light -- Back light -- Side light -- 45-degree diagonal light -- Blue and golden hour light -- Lens flares from photographing into the setting sun -- Making use of cloudy days -- Photography Tips for Your Next Trip -- Leaving space for text -- Placing s-curves in your compositions -- Composing using geometric forms -- Reviewing newly discovered businesses -- Searching for faces -- Chapter 9 Creating Dynamic Still Life and Product Photography -- Camera Considerations: Creating Background Blur -- Gear Considerations -- Choosing the background for your product -- Using tabletop tripods -- Lighting Considerations -- Using raking light for products -- Positioning for sunset light rays -- Exterior architecture photography -- Interior architecture photography -- Creating Beautiful Still Life Photos -- Positioning your background for equidistance -- Photographing through a window -- Photographing food -- Chapter 10 Taking It to the Streets: Photographing Strangers -- Camera Considerations: Choosing Lenses and Locations -- Choosing your lens…”
Libro electrónico -
28910por OECDTabla de Contenidos: “…Attract investment in line with national SDG priorities -- 3.2.2. Get people back to work in decent, sustainable jobs…”
Publicado 2020
Libro electrónico -
28911Publicado 2017Tabla de Contenidos: “…14.7 Returns By Age -- 14.8 Discussion and Conclusion -- Acknowledgments -- References -- Appendix -- Index -- Back Cover…”
Libro electrónico -
28912Publicado 2016Tabla de Contenidos: “…Usage of Futures and Options in Investment Management -- Pension Funds -- Basic Illustration of Derivatives Use in Asset Allocation -- Income Enhancement -- Hedging -- Index Tracking -- OTC derivatives -- Introduction -- Products -- Forwards -- Forward Rate Agreements -- Swaps -- Interest Rate Swaps ("IRS") -- Currency Swap -- OTC Options -- Common OTC Option Types -- Total Return Swap -- Credit Default Swap -- Contracts for Differences (Equities) -- Settlement of OTC Products -- Confirmations -- Post Trade Environment -- Event Calendar -- Other Settlement Issues -- Derivatives Valuation and Accounting -- OTC Derivatives Clearing -- Summary -- Appendix A-useful reference websites -- Appendix B-OCC STANS -- Methodology -- Introduction -- General Features -- 3. …”
Libro electrónico -
28913Publicado 2015Tabla de Contenidos: “…Rule 67 Don't answer ads that promise get-rich-quick schemes - it won't be you who gets rich quick -- Rule 68 There are no secrets -- Rule 69 Don't just read this - do something -- Chapter 3 Getting Even Wealthier -- Rule 70 Carry out a finance health check regularly -- Rule 71 Get some money mentors -- Rule 72 Play your hunches -- Rule 73 Don't sit back -- Rule 74 Get someone to do the stuff you can't -- Rule 75 Know yourself - solo, duo or team player -- Rule 76 Look for the hidden asset/opportunity -- Rule 77 Don't try to get rich too quickly -- Rule 78 Always ask what's in it for them -- Rule 79 Make your money work for you -- Rule 80 Know when to let go of investments -- Rule 81 Know your own style -- Rule 82 Know why you should be able to read a balance sheet - and how -- Rule 83 Be one step ahead of your tax collector -- Rule 84 Learn how to make your assets work for you -- Rule 85 Don't ever believe you're only worth what you are being paid -- Rule 86 Don't follow the same route as everyone else -- Chapter 4 Staying Wealthy -- Rule 87 Shop for quality -- Rule 88 Check the small print -- Rule 89 Don't spend it before you've got it -- Rule 90 Put something aside for your old age - no, more than that! …”
Libro electrónico -
28914Publicado 2019Tabla de Contenidos: “…Conclusion -- References -- Index -- Back Cover…”
Libro electrónico -
28915Publicado 2018Tabla de Contenidos: “…. -- Recording and playing back ROS topics -- Getting ready -- How it works... -- There's more... -- Chapter 5: Accessing Sensors and Actuators through ROS -- Introduction -- Understanding the Arduino-ROS interface -- Getting ready -- How to do it... -- How it works... -- Interfacing 9DoF Razor IMU-Arduino-ROS -- Getting ready -- How to do it... -- How it works... -- Using a GPS system - Ublox…”
Libro electrónico -
28916Publicado 2017Tabla de Contenidos: “…Understanding the& -- #160 -- CBO statistics collection -- Statistics collection functions -- Filter operator -- Join operator -- Build side selection -- Understanding multi-way JOIN ordering optimization -- Understanding performance improvements using whole-stage code generation -- Summary -- Chapter 12: Spark SQL in Large-Scale Application Architectures -- Understanding Spark-based application architectures -- Using Apache Spark for batch processing -- Using Apache Spark for stream processing -- Understanding the Lambda architecture -- Understanding the Kappa Architecture -- Design considerations for building scalable stream processing applications -- Building robust ETL pipelines using Spark SQL -- Choosing appropriate data formats -- Transforming data in ETL pipelines -- Addressing errors in ETL pipelines -- Implementing a scalable monitoring solution -- Deploying Spark machine learning pipelines -- Understanding the challenges in typical ML deployment environments -- Understanding types of model scoring architectures -- Using cluster managers -- Summary -- Index…”
Libro electrónico -
28917Publicado 2018Tabla de Contenidos: “…Providing capital -- Social purpose - blockchain as leveler -- Banking the unbanked -- Silk road LLC - privacy and ethics -- Tracking all the things -- Defeating some privacy issues with zero-knowledge proofs -- Unwrapping the concept of zero-knowledge proofs -- Summary -- Chapter 9: Cryptocurrency Wallets -- Introduction to cryptocurrency wallets -- Transactions in cryptocurrency wallets -- Types of cryptocurrency wallets -- Currency support -- Tenancy -- Software wallets -- Hardware wallets -- Paper wallets -- Brain wallet -- Usage frequency -- Key derivation -- Non-deterministic wallet -- Deterministic wallets -- Hierarchical deterministic wallets -- Mnemonic codes -- Key generation process in HD wallets -- Child key derivation -- Private key generation -- Extended keys -- Summary -- Chapter 10: Alternate Blockchains -- Various uses of blockchain -- Government -- Healthcare -- Medical research -- Supply chain -- Copyright -- Fine art -- Shipping -- Energy -- Computation and data storage -- Identification and social security -- Enterprise -- Ripple -- Transactions -- Stellar -- Tendermint -- Monax -- Summary -- Chapter 11: Hyperledger and Enterprise Blockchains -- History of Hyperledger -- Hyperledger projects -- Hyperledger Burrow -- Hyperledger Sawtooth -- Sawtooth architecture -- Transaction families -- Transactions and batches -- The key pieces -- Hyperledger Fabric -- Architecture choices and features -- Organizational focus -- Private channels -- Assets -- Smart contracts -- Advantages of Fabric -- Hyperledger Iroha -- Hyperledger Indy -- Tools in Hyperledger -- Hyperledger Caliper -- Hyperledger Composer -- Hyperledger Cello -- Hyperledger Explorer -- Hyperledger Quilt -- Relationships between the tools -- Which Hyperledger project should you use? …”
Libro electrónico -
28918Publicado 2016Tabla de Contenidos: “…9.3.1 Introduction -- 9.3.2 High-Level Design -- 9.3.3 Building and Testing the Simulator -- 9.3.4 Debugging with the LLVM HSA Simulator -- References -- Index -- Back Cover…”
Libro electrónico -
28919Publicado 2016Tabla de Contenidos: “…9.5 FOCUS GROUP 2: THE LIBRARY JOB CLUB -- 9.5.1 Library Usage -- 9.5.2 Benefits of the Library Job Club -- 9.5.3 Extracting Information Poverty Indicators From the Library Job Club Focus Group -- 9.5.4 Focus Group 2: Key Findings -- 9.6 LEARNING FROM OTHER LOCATIONS -- 9.7 SUMMARY AND CONCLUSIONS -- 10 - Concluding Thoughts and Recommendations -- 10.1 INTRODUCTION -- 10.2 SUMMING UP -- 10.3 FUTURE CHALLENGES FOR PUBLIC LIBRARIES -- 10.4 RECOMMENDATIONS FOR POLICY AND PRACTICE -- 10.4.1 Recommendation 1: Develop an Information Poverty Strategy -- 10.4.2 Recommendation 2: Develop and Implement a Community Engagement Strategy -- 10.4.3 Recommendation 3: Further Develop the Educational Role of Public Libraries -- 10.4.4 Recommendation 4: Further Develop the Social Role of Public Libraries -- 10.4.5 Recommendation 5: Raising Awareness and Marketing -- 10.4.6 Recommendation 6: Identifying and Targeting Groups -- 10.4.7 Recommendation 7: Developing Services for the Unemployed -- 10.4.8 Recommendation 8: Improving Stock -- 10.4.9 Recommendation 9: Library Staff -- 10.5 CONCLUDING THOUGHTS -- APPENDICES -- APPENDIX 1: MACRO- AND MESO-LEVEL INTERVIEWEES -- APPENDIX 2: SURVEY QUESTIONS -- APPENDIX 3: INFORMATION POVERTY INDICATORS FROM THE MACRO-LEVEL DATA -- APPENDIX 4: THE 20 MOST CITED INDICATORS OF INFORMATION POVERTY IN THE LITERATURE -- REFERENCES -- INDEX -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- S -- T -- U -- W -- Z -- Back Cover…”
Libro electrónico -
28920Publicado 2014Tabla de Contenidos: “…The Money Market -- The Stock Market -- Securities and Securitization -- Conclusion -- REGULATORY ISSUES -- The Shari'ah Supervisory Board -- Standardization -- Conclusion -- CROSS-BORDER FINANCING -- Cross-Border Inflow -- CONCLUSION -- ABOUT THE AUTHOR -- Chapter 4: Brunei -- THE PRINCIPAL LEGISLATION REGULATING ISLAMIC BANKS AND FINANCE COMPANIES -- ISLAMIC ASSET MANAGEMENT -- Offshore International Banks -- Investment Advisors -- Mutual Funds -- TAX AND ACCOUNTING -- RETAIL AND MICROFINANCE -- The Retail Sector -- An Islamic Finance Company -- Microfinance -- TAKAFUL AND RE- TAKAFUL -- SOVEREIGN SUKUK -- DEBT CAPITAL MARKETS -- CROSS-BORDER FINANCING -- REGULATORY ISSUES -- HUMAN RESOURCES DEVELOPMENT -- CONCLUSION -- ABOUT THE AUTHORS -- Chapter 5: Canada -- PAST PERFORMANCE -- PROSPECTS -- ASSET MANAGEMENT -- TAX AND ACCOUNTING -- Mudaraba -- Murabahah -- Diminishing Musharaka with Ijara -- Ijara Sukuk -- RETAIL AND MICROFINANCE -- TAKAFUL -- SUKUK AND THE DEBT CAPITAL MARKET -- REGULATORY ISSUES -- Key Regulatory Challenges -- Other Regulatory Issues -- CONCLUSION -- ABOUT THE AUTHOR -- Chapter 6: China -- ASSET MANAGEMENT -- Mutual Funds -- Exchange Traded Funds -- Endowment Funds -- Banking Assets -- Wealth Assets -- TAX AND ACCOUNTING -- Financial Reporting Standards -- Tax Neutrality -- Other Tax Issues -- RETAIL AND MICROFINANCE -- TAKAFUL AND RE- TAKAFUL -- Risk Management in Takaful -- Regulatory Issues in Takaful -- The Potential for Takaful -- SUKUK -- Asset-Backed Sukuk -- The Globalization of Sukuk -- DEBT CAPITAL MARKETS -- The Money Market -- The Stock Market -- Securities and Securitization -- REGULATORY ISSUES -- Shari'ah Supervisory Boards -- Standardization -- CONCLUSION -- NOTES -- ABOUT THE AUTHOR -- Chapter 7: Egypt -- ASSET MANAGEMENT -- TAX AND ACCOUNTING -- RETAIL AND MICROFINANCE -- TAKAFUL AND RE- TAKAFUL…”
Libro electrónico