Suggested Topics within your search.
Suggested Topics within your search.
- History 11
- Computer-aided design 9
- Architectural drawing 5
- Computer graphics 5
- Engineering & Applied Sciences 5
- Examinations 5
- Leadership 5
- AutoCAD 4
- Certification 4
- Data processing 4
- Electronic data processing personnel 4
- Microsoft Windows (Computer file) 4
- Operating systems (Computers) 4
- microstructure 4
- Autodesk Revit 3
- Clasificación 3
- Coleópteros 3
- Computer Science 3
- Computer networks 3
- Computer programs 3
- Europa (Centro) 3
- Science 3
- Success in business 3
- mechanical properties 3
- structure 3
- texture 3
- Architectural design 2
- Architecture 2
- Autodesk Inventor (Electronic resource) 2
- Business & Economics 2
-
1
-
2
-
3
-
4
-
5by Singh, BintiTable of Contents: “…List of figures -- List of contributors -- Foreword: Adapt or Die -- Acknowledgements -- 1 Negotiating Resilience with Hard and Soft City PART I: City and Its Vulnerabilities -- 2 Ethnically Diverse Neighborhoods and the New Meaning of "Community" in the Global North -- 3 Resilient Tactics and Everyday Lives in the Textile Mill Areas of Mumbai -- 4 Informal Housing of Migrants in Italy -- 5 Cities, Housing Exclusion, and Homelessness from a European Perspective -- 6 Just and Healthy Cities in Times of Global Threats: Perspectives from the Global North The Case of Settling Deonar Dump Yard Site, Mumbai Environmental Injustice: Air Pollution and Data Inequity in Kibera, Nairobi PART II: Relocation, Resettlement, and Resilience -- 7 Resilience at the City Margins-Roma Settlements in Bulgaria -- 8 Tolerance to Heat as a Coping Strategy of Low-Income Households in India and Austria -- 9 Home-Based Income Generation in Addis Ababa, Ethiopia -- 10 "Nothing Is to Be Gained by Involving Them": Exploring Residents' Lived Experiences of Resettlement in a Medium-Sized City in India -- 11 The Vertical versus Horizontal City: Why Vertical Resettlement (Mostly) Does Not Work for the Urban Poor -- 12 Conclusion: Towards Just Resilience…”
Published 2023
eBook -
6Published 2023Table of Contents: “…List of figuresList of contributorsForeword: Adapt or Die -- Acknowledgements -- 1 Negotiating Resilience with Hard and Soft City PART I: City and Its Vulnerabilities -- 2 Ethnically Diverse Neighborhoods and the New Meaning of "Community" in the Global North -- 3 Resilient Tactics and Everyday Lives in the Textile Mill Areas of Mumbai -- 4 Informal Housing of Migrants in Italy -- 5 Cities, Housing Exclusion, and Homelessness from a European Perspective -- 6 Just and Healthy Cities in Times of Global Threats: Perspectives from the Global North The Case of Settling Deonar Dump Yard Site, Mumbai Environmental Injustice: Air Pollution and Data Inequity in Kibera, Nairobi PART II: Relocation, Resettlement, and Resilience -- 7 Resilience at the City Margins-Roma Settlements in Bulgaria -- 8 Tolerance to Heat as a Coping Strategy of Low-Income Households in India and Austria -- 9 Home-Based Income Generation in Addis Ababa, Ethiopia -- 10 "Nothing Is to Be Gained by Involving Them": Exploring Residents' Lived Experiences of Resettlement in a Medium-Sized City in India -- 11 The Vertical versus Horizontal City: Why Vertical Resettlement (Mostly) Does Not Work for the Urban Poor -- 12 Conclusion: Towards Just Resilience…”
eBook -
7
-
8Published 2021“…Given optimal solutions to these subproblems, the dynamic program then combines them into an optimal solution for the original problem. 2-SAT programming refers to the procedure of reducing a problem to a set of 2-SAT formulas, that is, boolean formulas in conjunctive normal form in which each clause contains at most two literals. …”
eBook -
9Published 2022Table of Contents: “…Physical Access Control -- The Data Center -- Service Level Agreements -- Summary -- Chapter 2 Access Controls -- Access Control Concepts -- Subjects and Objects -- Privileges: What Subjects Can Do with Objects -- Data Classification, Categorization, and Access Control -- Access Control via Formal Security Models -- Implement and Maintain Authentication Methods -- Single-Factor/Multifactor Authentication -- Accountability -- Single Sign-On -- Device Authentication -- Federated Access -- Support Internetwork Trust Architectures -- Trust Relationships (One-Way, Two-Way, Transitive) -- Extranet -- Third-Party Connections -- Zero Trust Architectures -- Participate in the Identity Management Lifecycle -- Authorization -- Proofing -- Provisioning/Deprovisioning -- Identity and Access Maintenance -- Entitlement -- Identity and Access Management Systems -- Implement Access Controls -- Mandatory vs. …”
eBook -
10
-
11Published 2017Table of Contents: “…A Hard Price to Pay -- 10. Donate Everything -- 11. …”
eBook -
12
-
13
-
14
-
15
-
16
-
17
-
18by Cattini, RolandTable of Contents: “…Intro -- CompTIA Server+ -- Impressum -- Kapitel 1: Einführung -- 1.1 Das Ziel dieses Buchs -- 1.2 Die CompTIA-Server+-Zertifizierung -- 1.3 Voraussetzungen für CompTIA Server+ -- 1.4 Die Autoren -- 1.5 Sind Sie bereit für CompTIA Server+? …”
Published 2022
eBook -
19
-
20Published 2018Table of Contents: “…Schlüssel und Adressen in Python implementieren -- Fortgeschrittene Schlüssel und Adressen -- Verschlüsselte private Adressen (Encrypted Private Keys, BIP-38) -- Pay-to-Script-Hash-(P2SH-)Adressen und Multisig-Adressen -- Vanity-Adressen -- Paper-Wallets -- Kapitel 5: Wallets -- Wallet-Technologie in der Übersicht -- Nichtdeterministische (zufallsbasierte) Wallets -- Deterministische (Seed-basierte) Wallets -- HD-Wallets (BIP-32/BIP-44) -- Seeds und mnemonische Codes (BIP-39) -- Die Wallet-Best-Practices -- Eine Bitcoin-Wallet verwenden -- Details der Wallet-Technologie -- Mnemonische Codewörter (BIP-39) -- Eine HD-Wallet aus dem Seed-Wert erzeugen -- Einen erweiterten öffentlichen Schlüssel in einem Webshop nutzen -- Kapitel 6: Transaktionen -- Einführung -- Transaktionen im Detail -- Transaktionen - hinter den Kulissen -- Transaktions-Outputs und -Inputs -- Transaktions-Outputs -- Transaktions-Inputs -- Transaktionsgebühren (Fees) -- Gebühren in Transaktionen einfügen -- Transaktionsskripte und Skriptsprache -- Turing-Unvollständigkeit -- Zustandslose Verifikation -- Konstruktion von Skripten (Lock + Unlock) -- Pay-to-Public-Key-Hash (P2PKH) -- Digitale Signaturen (ECDSA) -- Wie digitale Signaturen funktionieren -- Die Signatur verifizieren -- Arten von Signatur-Hashes (SIGHASH) -- Die Mathematik hinter ECDSA -- Die Bedeutung der Zufälligkeit für Signaturen -- Bitcoin-Adressen, Guthaben und andere Abstraktionen -- Kapitel 7: Transaktionen und Skripting für Fortgeschrittene -- Einführung -- Multisignatur -- Pay-to-Script-Hash (P2SH) -- P2SH-Adressen -- Vorteile von P2SH -- Redeem-Skript und Validierung -- Data Recording Output (RETURN) -- Timelocks -- Transaktions-Locktime (nLocktime) -- Check Lock Time Verify (CLTV) -- Relative Timelocks -- Relative Timelocks mit nSequence -- Relative Timelocks mit CSV -- Median-Time-Past…”
eBook