Mostrando 664,541 - 664,560 Resultados de 668,645 Para Buscar 'C5N~', tiempo de consulta: 2.25s Limitar resultados
  1. 664541
    Publicado 2022
    “…With a clear structure covering the key areas of the Evolution of Cybersecurity, Cybersecurity Basics, Cybersecurity Tools, Cybersecurity Regulation, Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk Management, Cybersecurity Risk Management Strategy, and Vendor Risk Management Strategy, the book provides a guide for professionals as well as a key text for students studying this field.The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how they can respond. …”
    Libro electrónico
  2. 664542
    Publicado 2024
    Tabla de Contenidos: “…Chapter 1 Introduction to “The Philosophy” -- Chapter 2 Team Dynamics -- Chapter 3 Remote Teams -- Chapter 4 Cloud Native Software Development -- Chapter 5: Not So Agile -- Chapter 6: Radical Process -- Chapter 7: Ethical AI -- Chapter 8: Positive Feedback -- Chapter 9: Open Source -- Chapter 10: Not so Agile -- Chapter 11: Infinite Possibilities -- Chapter 12: Radical Therapy for Organizations -- Chapter 13: Fostering Empathy and Resilience -- Chapter 14: An Example to Build On -- Chapter 15 Terms…”
    Libro electrónico
  3. 664543
    Publicado 2021
    Tabla de Contenidos: “…Developing a Posthuman Approach: A Framework and Instrument 5. Developing the Intrasubjective Mediating Framework / Richard S. …”
    Libro electrónico
  4. 664544
    Publicado 2018
    Tabla de Contenidos: “…About the Special Issue Editors -- Hai-Wen Li, Min Zhu, Craig Buckley and Torben R. Jensen Functional Materials Based on Metal Hydrides, Reprinted from: Inorganics 2018, 6, 91, doi: 10.3390/inorganics6030091 -- Julián Puszkiel, Sebastiano Garroni, Chiara Milanese, Fabiana Gennari, Thomas Klassen, Martin Dornheim and Claudio Pistidda Tetrahydroborates: Development and Potential as Hydrogen Storage Medium Reprinted from: Inorganics 2017, 5, 74, doi: 10.3390/inorganics5040074 -- Juan Luis Carrillo-Bucio, Juan Rogelio Tena-García and Karina Suárez-Alcántara Dehydrogenation of Surface-Oxidized Mixtures of 2LIBH + Al/Additives (TiF3 or CeO2), Reprinted from: Inorganics 2017, 5, 82, doi: 10.3390/inorganics5040082 -- Yuki Nakagawa, Shigehito Isobe, Takao Ohki and Naoyuki Hashimoto Unique Hydrogen Desorption Properties of LIAIH,/h-BN Composites, Reprinted from: Inorganics 2017, 5, 71, doi: 10.3390/inorganics5040071 -- Liuzhang Ouyang, Hao Zhong, Hai-Wen Li and Min Zhu A Recycling Hydrogen Supply System of NaBH, Based on a Facile Regeneration Process: A Review Reprinted from: Inorganics 2018, 6, 10, doi: 10.3390/inorganics6010010 -- Michael Heere, Seyed Hosein Payandeh Gharib Doust, Matteo Brighi, Christoph Frommen, Magnus H. …”
    Libro electrónico
  5. 664545
    por Billionnet, Alain , author
    Publicado 2021
    Tabla de Contenidos: “…Frontmatter -- Introduction -- Contents -- Chapter 1 Basic Problem and Variants -- Chapter 2 Fragmentation -- Chapter 3 Connectivity -- Chapter 4 Compactness -- Chapter 5 Other Spatial Aspects -- Chapter 6 Biological Corridors -- Chapter 7 Species Survival Probabilities -- Chapter 8 Scenarios -- Chapter 9 Species Survival Probabilities' Scenarios -- Chapter 10 Phylogenetic Diversity -- Chapter 11 Specific and Genetic Diversity -- Chapter 12 Climate Change -- Appendix -- Index…”
    Libro electrónico
  6. 664546
    Publicado 2021
    “…The studies in this book range from evaluation methods for the perception of noise and outline forecast criteria that can be integrated with applications for acoustic mapping as well as the use of innovative techniques and materials for its abatement. …”
    Libro electrónico
  7. 664547
    Publicado 2019
    “…This book emphasises the power of metacognition at different levels of learning. It can be seen as a parallel intervention approach, with expanded knowledge on how to extend existing skills for young children, which is a pre-intervention. …”
    Libro electrónico
  8. 664548
    Publicado 2022
    Tabla de Contenidos: “…Leveraging Livestock Production Systems for Human Nutrition in Developing Countries 5. Importance of Monitoring the Peripartal Period to Increase Reproductive Performance in Dairy Cattle 6. …”
    Libro electrónico
  9. 664549
    por Bouvier, Charlène
    Publicado 2022
    “…Support for the world of livestock farming can no longer be thought of solely in terms of development, it must also take into account the necessary transitions. …”
    Libro electrónico
  10. 664550
    Publicado 2010
    “…It has in fact been marked for centuries by a failure to recognise the needs of the youngsters and their own subjectivity, to the point of arriving at disturbing levels of violence and coercion. …”
    Libro electrónico
  11. 664551
    Publicado 2022
    “…But are executives themselves really the greedy, self-interested, fat cats of popular culture? Based on a thought experiment and survey of beliefs of over a thousand senior executives from around the world, Pepper and his colleagues found that business executives in fact tend not to justify their pay levels as if they were ethical egoists entitled to act entirely in their own self-interest. …”
    Libro electrónico
  12. 664552
    Publicado 2022
    “…This is a comprehensive description of a language spoken some 450 km offshore from the mainland of Papua New Guinea. …”
    Libro electrónico
  13. 664553
    Publicado 2018
    “…Encountering a short story about a lonely marine biologist in Antarctica, Temple Grandin remembers her past with an uncharacteristic emotional intensity, and she reminds the reader of the myriad ways in which people can relate to fiction. Why must there be a norm?…”
    Libro electrónico
  14. 664554
    Publicado 2018
    Tabla de Contenidos: “…Vertigo, 1920–1928 -- Chapter 5. Depression, 1928–1938 -- Chapter 6. Assertion, 1938–1946 -- Chapter 7. …”
    Libro electrónico
  15. 664555
    Publicado 2022
    “…The examples described in this volume suggest how intentional attention to health data sharing can enable unparalleled advances, securing a healthier and more equitable future for all…”
    Libro electrónico
  16. 664556
    “…Also underscored are actions that clinicians can take to improve their skills and effectiveness in the face of the growing need, including leadership engagement to ensure that communities have the resources and tools that clinicians require to fulfill their responsibilities…”
    Libro electrónico
  17. 664557
    Publicado 2009
    “…We identified one randomized controlled trial showing that osteopathy can potentially reduce the degree of postural asymmetry among infants, but the study did not reveal any changes in vegetative parameters following treatment. …”
    Libro electrónico
  18. 664558
    Publicado 2019
    Tabla de Contenidos: “…Front Cover -- Tilte Page -- Copyright Page -- Contents -- Preface -- 1 Digital Systems and Binary Numbers -- 1.1 Digital Systems -- 1.2 Binary Numbers -- 1.3 Number‐Base Conversions -- 1.4 Octal and Hexadecimal Numbers -- 1.5 Complements of Numbers -- 1.6 Signed Binary Numbers -- 1.7 Binary Codes -- 1.8 Binary Storage and Registers -- 1.9 Binary Logic -- 2 Boolean Algebra and Logic Gates -- 2.1 Introduction -- 2.2 Basic Definitions -- 2.3 Axiomatic Definition of Boolean Algebra -- 2.4 Basic Theorems and Properties of Boolean Algebra -- 2.5 Boolean Functions -- 2.6 Canonical and Standard Forms -- 2.7 Other Logic Operations -- 2.8 Digital Logic Gates -- 2.9 Integrated Circuits -- 3 Gate‐Level Minimization -- 3.1 Introduction -- 3.2 The Map Method -- 3.3 Four‐Variable K‐Map -- 3.4 Product‐of‐Sums Simplification -- 3.5 Don't‐Care Conditions -- 3.6 NAND and NOR Implementation -- 3.7 Other Two‐Level Implementations -- 3.8 Exclusive‐OR Function -- 3.9 Hardware Description Languages (HDLs) -- 3.10 Truth Tables in HDLs -- 4 Combinational Logic -- 4.1 Introduction -- 4.2 Combinational Circuits -- 4.3 Analysis of Combinational Circuits -- 4.4 Design Procedure -- 4.5 Binary Adder-Subtractor -- 4.6 Decimal Adder -- 4.7 Binary Multiplier -- 4.8 Magnitude Comparator -- 4.9 Decoders -- 4.10 Encoders -- 4.11 Multiplexers -- 4.12 HDL Models of Combinational Circuits -- 4.13 Behavioral Modeling -- 4.14 Writing a Simple Testbench -- 4.15 Logic Simulation -- 5 Synchronous Sequential Logic -- 5.1 Introduction -- 5.2 Sequential Circuits -- 5.3 Storage Elements: Latches -- 5.4 Storage Elements: Flip‐Flops -- 5.5 Analysis of Clocked Sequential Circuits -- 5.6 Synthesizable HDL Models of Sequential Circuits -- 5.7 State Reduction and Assignment -- 5.8 Design Procedure -- 6 Registers and Counters -- 6.1 Registers -- 6.2 Shift Registers -- 6.3 Ripple Counters…”
    Libro electrónico
  19. 664559
    por Sánchez, John Paul
    Publicado 2024
    Tabla de Contenidos: “…Midwest Region -- Chapter 5. LHS+ Medical Student History and Heritage of the U.S. …”
    Libro electrónico
  20. 664560
    Publicado 2023
    “…Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security.It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval.The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. …”
    Libro electrónico