Mostrando 49,941 - 49,960 Resultados de 57,537 Para Buscar 'Cuark~', tiempo de consulta: 1.30s Limitar resultados
  1. 49941
    Publicado 2019
    Tabla de Contenidos: “…LOS ABOGADOS NO ESTÁN POR ENCIMA DEL COMERCIO: CORTE SUPREMA DE ESTADOS (...) -- 8.3. REGLAS CLARAS PARA ABOGADOS QUE SE RETIRAN DE UNA FIRMA -- 8.4. …”
    Libro electrónico
  2. 49942
    por Neumann, Manfred
    Publicado 2022
    Tabla de Contenidos: “…. -- III. -- IV. -- V. -- Carl Christian von Weizsäcker, Bern: Was leistet die Property Rights Theorie für aktuelle wirtschaftspolitische Fragen? …”
    Libro electrónico
  3. 49943
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Advanced Infrastructure Penetration Testing -- Information security overview -- Confidentiality -- Integrity -- Availability -- Least privilege and need to know -- Defense in depth -- Risk analysis -- Information Assurance -- Information security management program -- Hacking concepts and phases -- Types of hackers -- Hacking phases -- Reconnaissance -- Passive reconnaissance -- Active reconnaissance -- Scanning -- Port scanning -- Network scanning -- Vulnerability scanning -- Gaining access -- Maintaining access -- Clearing tracks -- Penetration testing overview -- Penetration testing types -- White box pentesting -- Black box pentesting -- Gray box pentesting -- The penetration testing teams -- Red teaming -- Blue teaming -- Purple teaming -- Pentesting standards and guidance -- Policies -- Standards -- Procedures -- Guidance -- Open Source Security Testing Methodology Manual -- Information Systems Security Assessment Framework -- Penetration Testing Execution Standard -- Payment Card Industry Data Security Standard -- Penetration testing steps -- Pre-engagement -- The objectives and scope -- A get out of jail free card -- Emergency contact information -- Payment information -- Non-disclosure agreement -- Intelligence gathering -- Public intelligence -- Social engineering attacks -- Physical analysis -- Information system and network analysis -- Human intelligence -- Signal intelligence -- Open source intelligence -- Imagery intelligence -- Geospatial intelligence -- Threat modeling -- Business asset analysis -- Business process analysis -- Threat agents analysis -- Threat capability analysis -- Motivation modeling -- Vulnerability analysis -- Vulnerability assessment with Nexpose -- Installing Nexpose…”
    Libro electrónico
  4. 49944
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Penetration Testing and Web Applications -- Proactive security testing -- Different testing methodologies -- Ethical hacking -- Penetration testing -- Vulnerability assessment -- Security audits -- Considerations when performing penetration testing -- Rules of Engagement -- The type and scope of testing -- Client contact details -- Client IT team notifications -- Sensitive data handling -- Status meeting and reports -- The limitations of penetration testing -- The need for testing web applications -- Reasons to guard against attacks on web applications -- Kali Linux -- A web application overview for penetration testers -- HTTP protocol -- Knowing an HTTP request and response -- The request header -- The response header -- HTTP methods -- The GET method -- The POST method -- The HEAD method -- The TRACE method -- The PUT and DELETE methods -- The OPTIONS method -- Keeping sessions in HTTP -- Cookies -- Cookie flow between server and client -- Persistent and nonpersistent cookies -- Cookie parameters -- HTML data in HTTP response -- The server-side code -- Multilayer web application -- Three-layer web application design -- Web services -- Introducing SOAP and REST web services -- HTTP methods in web services -- XML and JSON -- AJAX -- Building blocks of AJAX -- The AJAX workflow -- HTML5 -- WebSockets -- Summary -- Chapter 2: Setting Up Your Lab with Kali Linux -- Kali Linux -- Latest improvements in Kali Linux -- Installing Kali Linux -- Virtualizing Kali Linux versus installing it on physical hardware -- Installing on VirtualBox -- Creating the virtual machine -- Installing the system -- Important tools in Kali Linux -- CMS &amp -- Framework Identification -- WPScan -- JoomScan -- CMSmap…”
    Libro electrónico
  5. 49945
    Publicado 2017
    Tabla de Contenidos: “…. -- B The Steele Progeny: A Motley Crew of Circuit Court Tests -- III Doctrinal Analysis: Use-Based Rights and Commercial Effects -- A The Common Law Roots of Lanham Act Subject-Matter Jurisdiction -- B An Element of Modernity: The Effects-on-Commerce Factor -- IV A Bird's-Eye View: Taking Stock of Lanham Act Extraterritoriality -- A The Antitrust Gene: A Dominance of Effects -- B Common Law Goodwill Protection: Tea Rose/Rectanus Goes Global -- V Summary: An Era of International Trademark Propertization -- Conclusions -- 3 A Ragged Landscape of Theories -- Introduction -- Section 1 Traditional Civil Law Trademark Conflicts -- I The Principle of Territoriality -- II Analysis: The Curse of Formal Reasoning and Conduct Orientation -- Section 2 Modern Civil Law Unfair Competition Conflicts -- I The Marketplace Principle, Determination of Effects, and the De Minimis Rule -- A Collision-of-Interests and Substantive-Purpose Analysis -- B Multistate Scenarios: Determination of Marketplace Effects and De Minimis Limitations -- II Analysis: The Obsolescence of Tort Foundations -- Section 3 The New Paradigm-A Law of Market Regulation -- I Antitrust Conflicts Reloaded: The Effects Principle -- II Analysis: The Unboundedness of Unqualified Effects -- Section 4 Modern Soft Law-WIPO Recommendation, ALI Principles, and Others -- I Nonbinding Suggestions of Substantive Law and Conflicts Resolution -- A The Joint Recommendation Concerning Provisions on the Protection of Marks, and Other Industrial Property Rights in Signs, on the Internet -- B ALI Principles, CLIP Principles, and the Japanese Transparency Proposal -- II Analysis: "Chips off the Old Block" -- A The Joint Recommendation…”
    Libro electrónico
  6. 49946
    Publicado 2021
    Tabla de Contenidos: “…Selecting algorithms based on function -- Using Spark to generate real-time big data analytics -- Chapter 4 Math, Probability, and Statistical Modeling -- Exploring Probability and Inferential Statistics -- Probability distributions -- Conditional probability with Naïve Bayes -- Quantifying Correlation -- Calculating correlation with Pearson's r -- Ranking variable-pairs using Spearman's rank correlation -- Reducing Data Dimensionality with Linear Algebra -- Decomposing data to reduce dimensionality -- Reducing dimensionality with factor analysis -- Decreasing dimensionality and removing outliers with PCA -- Modeling Decisions with Multiple Criteria Decision-Making -- Turning to traditional MCDM -- Focusing on fuzzy MCDM -- Introducing Regression Methods -- Linear regression -- Logistic regression -- Ordinary least squares (OLS) regression methods -- Detecting Outliers -- Analyzing extreme values -- Detecting outliers with univariate analysis -- Detecting outliers with multivariate analysis -- Introducing Time Series Analysis -- Identifying patterns in time series -- Modeling univariate time series data -- Chapter 5 Grouping Your Way into Accurate Predictions -- Starting with Clustering Basics -- Getting to know clustering algorithms -- Examining clustering similarity metrics -- Identifying Clusters in Your Data -- Clustering with the k-means algorithm -- Estimating clusters with kernel density estimation (KDE) -- Clustering with hierarchical algorithms -- Dabbling in the DBScan neighborhood -- Categorizing Data with Decision Tree and Random Forest Algorithms -- Drawing a Line between Clustering and Classification -- Introducing instance-based learning classifiers -- Getting to know classification algorithms -- Making Sense of Data with Nearest Neighbor Analysis -- Classifying Data with Average Nearest Neighbor Algorithms…”
    Libro electrónico
  7. 49947
    Publicado 2022
    Tabla de Contenidos: “…Telling Office which languages you will use -- Marking text as foreign language text -- Translating Foreign Language Text -- Chapter 6 Desktop Publishing with Word -- Experimenting with Themes -- Sprucing Up Your Pages -- Decorating a page with a border -- Putting a background color on pages -- Getting Word's help with cover letters -- Making Use of Charts, Diagrams, Shapes, and Photos -- Working with the Drawing Canvas -- Positioning and Wrapping Objects Relative to the Page and Text -- Wrapping text around an object -- Positioning an object on a page -- Working with Text Boxes -- Inserting a text box -- Making text flow from text box to text box -- Dropping In a Drop Cap -- Watermarking for the Elegant Effect -- Putting Newspaper-Style Columns in a Document -- Doing the preliminary work -- Running text into columns -- Landscape Documents -- Printing on Different Size Paper -- Showing Online Video in a Document -- Chapter 7 Getting Word's Help with Office Chores -- Highlighting Parts of a Document -- Commenting on a Document -- Entering comments -- Viewing and displaying comments -- Replying to and resolving comments -- Caring for and feeding comments -- Tracking Changes to Documents -- Telling Word to start marking changes -- Reading and reviewing a document with revision marks -- Marking changes when you forgot to turn on revision marks -- Accepting and rejecting changes to a document -- Printing an Address on an Envelope -- Printing a Single Address Label (Or a Page of the Same Label) -- Churning Out Letters, Envelopes, and Labels for Mass Mailings -- Preparing the source file -- Merging the document with the source file -- Printing form letters, envelopes, and labels -- Chapter 8 Tools for Reports and Scholarly Papers -- Alphabetizing a List -- Outlines for Organizing Your Work -- Viewing the outline in different ways…”
    Libro electrónico
  8. 49948
    Publicado 2022
    Tabla de Contenidos: “…Sample Questions -- Notes -- Chapter 3 Continuous Improvement Tools for Smart Manufacturing -- Introduction -- Voice of the Customer in the Age of Smart Manufacturing -- Voice of the Customer Using Net Promoter Score -- Voice of the Customer Using the Delphi Technique -- Voice of the Customer Using the Kano Model -- Affinity Diagrams to Organize Many Ideas into Common Themes -- Critical to Quality to Convert the VOC to Measurable Objectives -- Types of Data -- Benchmarking -- Process Maps -- Types of Process Maps -- SIPOC -- Process Maps with Decision Points -- Process Maps with Swim Lanes -- Limited Data Collection and the Hawthorne Effect Impacting Process Mapping -- Value Stream Maps to Eliminate Waste -- Value-Added Activity versus Non-Value-Added Activity -- Root Cause Analysis Using a Fishbone Diagram and Risk Matrix -- Root Cause Analysis Using the Five Whys -- Changes Coming to Root Cause Analysis with Smart Technologies -- Pareto Chart -- Kanban Pull System -- Poka-Yoke to Error-Proof Processes and Products -- Five S -- Heijunka -- Plan-Do-Check-Act -- Kaizen -- Setup Time Reduction Using Single Minute Exchange of Dies -- Gage Repeatability and Reproducibility (Gage R&amp -- R) -- Failure Modes and Effects Analysis (FMEA) to Solve Complex Problems -- Pugh Matrix to Design New Processes and Products -- Quality Function Deployment (House of Quality) -- History of QFD -- Structure of the House of Quality Used in QFD -- Building a House of Quality -- Benefits of Using QFD -- Using QFD in Combination with the Pugh Matrix -- Smart Technologies to Automate QFD -- Summary -- Sample Questions -- Notes -- Chapter 4 Improving Supply Chain Resiliency Using Smart Technologies -- Introduction -- Supply Chain Resilience -- Supply Chain Risk Heat Maps -- Supply Chain Mapping at a Macro and Micro Level -- Preferred Supplier Programs…”
    Libro electrónico
  9. 49949
    Tabla de Contenidos: “…Analysing the Influence of Financing Incentives (Imputation Relief, and Dividend Withholding Tax ... -- Chart VII.I. Illustration of non-resident withholding tax rate reduction…”
    Libro electrónico
  10. 49950
    Publicado 2017
    Tabla de Contenidos: “…-- Running Commands -- Configuring Your Login Script -- Running Shell Scripts -- Making Shell Scripts More Intuitive -- Why Shell Scripts? -- Let's Get Cracking -- Chapter 1: The Missing Code Library -- What Is POSIX? …”
    Libro electrónico
  11. 49951
    Publicado 2016
    Tabla de Contenidos: “…Modifying the getOrAddCustodian() function -- Improving the ingestDirectory() function -- A closer look at the formatTimestamp() function -- Converting the writeOutput() function -- Simplifying the writeCSV() function -- Condensing the writeHTML() function -- Running our new and improved script -- Challenge -- Summary -- Chapter 6: Extracting Artifacts from Binary Files -- UserAssist -- Understanding the ROT-13 substitution cipher - rot13.py -- Evaluating code with timeit -- Working with the Registry module -- Introducing the Struct module -- Creating spreadsheets with the xlsxwriter module -- Adding data to a spreadsheet -- Building a table -- Creating charts with Python -- The UserAssist framework -- Developing our UserAssist logic processor - userassist.py -- Evaluating the main() function -- Defining the createDictionary() function -- Extracting data with the parseValues() function -- Processing strings with the getName() function -- Writing Excel spreadsheets - xlsx_writer.py -- Controlling output with the excelWriter() function -- Summarizing data with the dashboardWriter() function -- Writing artifacts in the userassistWriter() function -- Defining the fileTime() function -- Processing integers with the sortByCount() function -- Processing DateTime objects with the sortByDate() function -- Writing generic spreadsheets - csv_writer.py -- Understanding the csvWriter() function -- Running the UserAssist framework -- Additional challenges -- Summary -- Chapter 7: Fuzzy Hashing -- Background on hashing -- Hashing files in Python -- Deep dive into rolling hashes -- Implementing rolling hashes - hashing_example.py -- Limitations of rolling hashes -- Exploring fuzzy hashing - fuzzy_hasher.py -- Starting with the main function -- Working with files in the fileController() function -- Working with directories in the directoryController() function…”
    Libro electrónico
  12. 49952
    Publicado 2017
    Tabla de Contenidos: “…Threads in Java -- Threads in Java - characteristics and states -- The Thread class and the Runnable interface -- First example: matrix multiplication -- Common classes -- Serial version -- Parallel versions -- First concurrent version - a thread per element -- Second concurrent version - a thread per row -- Third concurrent version - the number of threads is determined by the processors -- Comparing the solutions -- Second example - file search -- Common classes -- Serial version -- Concurrent version -- Comparing the solutions -- Summary -- Chapter 3: Managing Lots of Threads - Executors -- An introduction to executors -- Basic characteristics of executors -- Basic components of the Executor framework -- First example - the k-nearest neighbors algorithm -- k-nearest neighbors - serial version -- K-nearest neighbors - a fine-grained concurrent version -- k-nearest neighbors - a coarse-grained concurrent version -- Comparing the solutions -- Second example - concurrency in a client/server environment -- Client/server - serial version -- The DAO part -- The command part -- The server part -- Client/version - parallel version -- The server part -- The command part -- Extra components of the concurrent server -- The status command -- The cache system -- The log system -- Comparing the two solutions -- Other methods of interest -- Summary -- Chapter 4: Getting the Most from Executors -- Advanced characteristics of executors -- Cancellation of tasks -- Scheduling the execution of tasks -- Overriding the executor methods -- Changing some initialization parameters -- First example - an advanced server application -- The ServerExecutor class -- The statistics object -- The rejected task controller -- The executor tasks -- The executor -- The command classes -- The ConcurrentCommand class -- The concrete commands -- The server part…”
    Libro electrónico
  13. 49953
    Tabla de Contenidos: “…-- Task.Delay -- Task.WhenAll -- Task.WhenAll, Error Handling -- Task.WhenAny -- async/await Mechanics -- Summary -- Chapter 8: Everything a Task -- TaskCompletionSource -- Worked Example: Creating a Foreground Task -- Unit Testing and Stubbing Asynchronous Methods -- Building Task-Based Combinators -- Improved WhenAny -- Alternative WhenAll, WhenAllOrFail -- Summary -- Chapter 9: Server-Side Async -- Natural Parallelism -- The Problem of I/O -- ASP.NET WebForms -- A Synchronous WebForms Implementation -- Asynchronous Pages in WebForms 4.0 -- Mark the Page As Asynchronous -- Registering the Asynchronous Methods -- Implementing the "Begin" Method -- Implementing the "End" Method -- Dealing with Multiple Asynchronous I/O Requests -- Handling Errors in Asynchronous Pages Using APM -- Asynchronous Pages in WebForms 4.5 -- ASP.NET MVC -- Asynchronous MVC Processing in .NET 4.0 -- Implementing IndexAsync -- Implementing the IndexCompleted Method -- Take Care with APM -- Performing Multiple Async I/O Operations Within an Asynchronous Action -- Asynchronous MVC Processing in .NET 4.5 -- ASP.NET Web API -- Asynchronous Web API Operations in .NET 4.0.…”
    Libro electrónico
  14. 49954
    por Rybaric, Robert
    Publicado 2023
    Tabla de Contenidos: “…Presenting configuration and customization tools -- Microsoft Dataverse and model-driven app tools -- Power Apps Maker Portal -- Model-driven app designer -- Introducing XrmToolBox -- Power Apps Studio -- Power Pages Studio -- Power Automate Maker Portal -- Power Virtual Agents designer -- AI Builder -- Dataflows designer -- Power BI designer tools -- Power BI Desktop -- Power BI Builder -- Power BI service -- Microsoft AppSource -- ISV Studio -- Presenting custom development tools -- Visual Studio -- Visual Studio Code -- Power Apps Command-Line Interface (CLI) -- Power Platform extensions for Visual Studio -- NuGet developer tools and assemblies -- The code generation tool -- The plug-in registration tool -- XrmToolBox -- Postman -- CRMRestBuilder -- Testing tools -- Testing the user interface -- Testing backend components -- Using network traffic analyzers -- Presenting application lifecycle management tools -- NuGet developer tools and assemblies -- The configuration migration tool -- The package deployer tool -- The solution packager tool -- Azure DevOps -- Contoso Inc. project team workplace setup -- Enabling the core project team -- Enabling citizen developers -- Summary -- Chapter 5: Application Lifecycle Management -- Contoso Inc. implementing application lifecycle management -- Understanding application lifecycle management -- Environment complexity -- Power Platform solution complexity -- ALM for the Power Platform -- Introducing solutions management -- Overview of solutions -- Environment variables -- Solution properties -- Solution types -- Unmanaged solution -- Managed solution -- Default solution -- Common Data Services Default Solution -- Managed properties -- Forms, views, charts, and dashboards properties -- Columns properties -- Tables properties -- Dependencies and solution segmentation -- Solution layering -- Layering behavior…”
    Libro electrónico
  15. 49955
    Publicado 2023
    Tabla de Contenidos: “…Chapter 6 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- 3 Securing a Business -- Chapter 1 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network -- Determine how backups are handled -- Be careful where you work remotely…”
    Libro electrónico
  16. 49956
    Publicado 2022
    Tabla de Contenidos: “…Using Cost-Volume-Profit Analysis to Make Savvy Business Decisions -- Deciding to advertise -- Lowering your price without losing your profit -- Combining the results of two products -- Costing and pricing a new product -- The Tax Man Cometh, the Profits Goeth -- Understanding pre-tax dollars -- Adjusting target net income for income taxes -- Chapter 4 Estimating Costs with Job Costing -- Understanding How Job Costing Works -- Cost objects: The sponges that absorb money -- Charging customers for direct and indirect costs -- Implementing job costing in manufacturing: An example -- Computing direct costs -- Calculating indirect costs -- Presenting total job costs -- Deciding on costing for IT consulting projects -- Determining project needs -- Plugging in job costing -- Taking a Closer Look at Indirect Costs using Normal Costing -- Budgeting for indirect costs -- Following a normal job costing system -- Computing direct costs and indirect costs -- Introducing the job cost sheet -- Following the Flow of Costs through a Manufacturing System -- Control starts with control accounts -- Explaining the debit and credit process -- Walking through a manufacturing cost example -- Applying the methodology to other control accounts -- Chapter 5 More Activity, More Cost: Activity-Based Costing -- Avoiding the Slippery Peanut Butter Costing Slope -- Recognizing a single indirect cost allocation -- A fly in the peanut butter: Dealing with different levels of client activity -- Missing the mark: Undercosting and overcosting -- Designing an Activity-Based Costing System -- Refining your approach -- Grouping costs using a cost hierarchy -- Testing your ABC design -- Using Activity-Based Costing to Compute Total Cost, Profit, and Sale Price -- Allocating indirect costs evenly by product -- Analyzing and reallocating cost activities -- Changing allocations to cost pools…”
    Libro electrónico
  17. 49957
    Publicado 2019
    Tabla de Contenidos: “…-- Challenges to Effective Project Management -- Flexibility and Adaptability -- Deep Understanding of the Business and Its Systems -- Take Charge of the Project and Its Management -- Project Management Is Organized Common Sense -- Managing the Creeps -- Scope Creep -- Hope Creep -- Effort Creep -- Feature Creep -- What Are Requirements, Really? …”
    Libro electrónico
  18. 49958
    Publicado 2023
    Tabla de Contenidos: “…7.6.1 QS, Biofilm Growth, and MIC -- 7.6.2 Bioinformatics Analysis -- 7.7 Adhesion-Induced Emergent Properties in Biofilm -- 7.8 Methods to Inhibit Quorum Sensing -- 7.9 Conclusion -- Acknowledgments -- References -- Chapter 8 Data-Driven 2D Material Discovery Using Biofilm Data and Information Discovery System (Biofilm-DIDS) -- 8.1 Introduction -- 8.1.1 Microbial Community, Biofilm, and Material-Biofilm Interaction -- 8.1.2 Complex System Design: SDLC and Agile Methodology Meets Big Data -- 8.1.3 Big Data Mining and Knowledge Discovery -- 8.2 Interface between the Living and the Non-Living: a System Thinking Approach -- 8.2.1 System Understanding of Biointerface -- 8.2.2 Big Data in Biointerfaces -- 8.3 Biofilm-DIDS Overview -- 8.4 Using Biofilm-DIDS to Extract Biocorrosion Gene of Interest from the Literature and Material Dimension Prediction -- 8.4.1 Expert Informed Relevant Dataset Extraction from User Free Text Question -- 8.4.2 Downstream Analysis for Material Dimension Prediction -- 8.5 Conclusions -- Acknowledgments -- References -- Chapter 9 Machine Learning-Guided Optical and Raman Spectroscopy Characterization of 2D Materials -- 9.1 Introduction -- 9.2 Established Surface Characterization Techniques -- 9.3 ML-Guided Optical Detection of 2D Materials -- 9.4 ML-Guided Raman Spectroscopy Detection of 2D Materials -- 9.5 Common Challenges to ML in Raman Spectroscopy -- 9.6 Future Prospects -- 9.7 Summary -- References -- Chapter 10 Atomistic Experiments for Discovery of 2D Coatings: Biological Applications -- 10.1 Introduction -- 10.2 Molecular Dynamics (Algorithms and Methods) -- 10.2.1 Empirical Forcefields -- 10.2.2 Periodic Boundary Conditions -- 10.2.3 Binding Energy -- 10.2.4 Free Energy -- 10.2.5 Umbrella Sampling -- 10.2.6 Coarse-Grained Modeling -- 10.3 Employment of MD on Functional 2D Materials…”
    Libro electrónico
  19. 49959
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Conventions Used in This Book -- What You're Not to Read -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Introduction to Integration -- Chapter 1 An Aerial View of the Area Problem -- Checking Out the Area -- Comparing classical and analytic geometry -- Finding definite answers with the definite integral -- Slicing Things Up -- Untangling a hairy problem using rectangles -- Moving left, right, or center -- Defining the Indefinite -- Solving Problems with Integration -- We can work it out: Finding the area between curves -- Walking the long and winding road -- You say you want a revolution -- Differential Equations -- Understanding Infinite Series -- Distinguishing sequences and series -- Evaluating series -- Identifying convergent and divergent series -- Chapter 2 Forgotten but Not Gone: Review of Algebra and Pre-Calculus -- Quick Review of Pre-Algebra and Algebra -- Working with fractions -- Adding fractions -- Subtracting fractions -- Multiplying fractions -- Dividing fractions -- Knowing the facts on factorials -- Polishing off polynomials -- Powering through powers (exponents) -- Understanding zero and negative exponents -- Understanding fractional exponents -- Expressing functions using exponents -- Rewriting rational functions using exponents -- Simplifying rational expressions by factoring -- Review of Pre-Calculus -- Trigonometry -- Noting trig notation -- Figuring the angles with radians -- Identifying some important trig identities -- Asymptotes -- Graphing common parent functions -- Linear and polynomial functions -- Exponential and logarithmic functions -- Trigonometric functions -- Transforming continuous functions -- Polar coordinates -- Summing up sigma notation…”
    Libro electrónico
  20. 49960
    Publicado 2020
    Tabla de Contenidos: “…Street construction fee and parking space requirements -- 3.2.1. Regulatory requirements -- 3.2.2. …”
    Libro electrónico