Mostrando 12,381 - 12,400 Resultados de 13,418 Para Buscar 'Fermio~', tiempo de consulta: 1.65s Limitar resultados
  1. 12381
    Publicado 2019
    Tabla de Contenidos: “…Keratinocytes -- Other Cells of the Epidermis -- Thick and Thin Skin -- 5.3. The Dermis -- Papillary Layer -- Reticular Layer -- Skin Markings -- 5.4. …”
    Libro electrónico
  2. 12382
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  3. 12383
    Tabla de Contenidos: “…Título tomado del comienzo del texto Iniciales grabadas Anotaciones manuscritas Textos en español y latín Firma autógrafa al final del texto del Doctor y el Licenciado Grabado xilográfico de la Virgen María con el niño en A1 Berrio…”
    Colección
  4. 12384
    por Henao Robledo, Fernando
    Publicado 2015
    Tabla de Contenidos: “…Rotulado de sustancias químicas -- Riesgos para la salud -- Riesgo por inflamabilidad -- Riesgo por reactividad -- Riesgo especial -- Capítulo VIII. Límites máximos permisibles y almacenamiento -- 8.1. Límites máximos permisibles -- TLV-STEL (límite máximo permisible de corta duración) -- TLV-C (Límite máximo permisible techo) -- 8.2. …”
    Libro electrónico
  5. 12385
    Publicado 2007
    Tabla de Contenidos: “…7.1.3 Sequences -- 7 .1.4 Permutations -- 7.2 Induction -- 7.2.1 The Sum of Odd Numbers -- 7 .2.2 Subset Counting Revisited -- 7 .2.3 More Induction Proofs -- 7 .2.4 Counting Regions -- 7.3 Counting Subsets -- 7.3.1 The Number of Ordered Subsets -- 7 .3.2 The Number of Subsets of a Given Size -- 7 .3.3 The Binomial Theorem -- 7 .3.4 Distributing Presents -- 7 .3.5 Anagrams -- 7 .3.6 Distribution of Money -- 7.4 Pascal's Triangle -- 7 .4.1 Identities in the Pascal Triangle -- 7.4.2 A Bird's- Eye View at the Pascal Triangle -- 7.5 Combinatorial Probability -- 7.5.1 Events and Probabilities -- 7 .5.2 Independent Repetition of an Experiment -- 7 .5.3 The Law of Large Numbers -- 7.6 Fibonacci Numbers -- 7.6.1 Fibonacci's Exercise -- 7 .6.2 Lots of Identities -- 7 .6.3 A Formula for the Fibonacci Numbers -- 7.7 Integers, Divisors, and Primes -- 7. 7.1 Divisibility of Integers -- 7.7.2 Primes and Their History -- 7.7.3 Factorization into Primes -- 7.7.4 Fermat's "Little" Theorem -- 7.7.5 The Euclidean Algorithm -- 7. 7.6 Primality Test -- Chapter 8: Combinatorics -- 8.1 The Pigeonhole Principle -- 8.2 Strong Pigeonholes -- 8.2.1 Pigeonhole Principle Examples: Weighing Balls -- 8.3 Dilworth's Theorem -- 8.4 Problems -- 8.5 Sets of the Same Size: Bijections -- 8.6 Finite Sets -- 8.7 Inclusion-Exclusion -- 8.8 lnfinite Sets -- 8.9 Schroder-Bcrnstein Theorem -- 8.10 Countable Sets -- 8.11 The Continuum -- 8.12 Diagonal Argwnents -- 8.12.1 A Paradox -- 8.13 Set Theory Revisited -- 8.13.1 Bijections, Injections, Surjections -- 8.13.2 Finite Cardinality -- 8.14 Functions and Permutations -- 8.14.1 Surjection, Injection, Bijection -- 8.14.2 Permutation -- Chapter 9: Automata -- 9.1 Introduction -- 9.1.1 Abstraction -- 9.2 Decision Problems vs Functions -- 9.2.1 Strings -- 9.2.2 Operations on Strings -- 9.2.3 Operations on Sets…”
    Libro electrónico
  6. 12386
    Publicado 2017
    Tabla de Contenidos: “…3.3.2 Composition and Mechanical Behavior of Spongy Bone -- 3.4 Teeth -- 3.4.1 Tooth Anatomy and Evolution -- 3.4.2 Plaque, Organic Acids, Alter pH and Demineralize Tooth Surfaces -- 3.4.3 Dentin Exposure Through the Gum-line: Periodontal Disease -- 3.4.4 Tooth Statics and Dynamics: The Origins of Orthodontia -- 3.4.5 Endodonics: Resolving the Dying Internal Structure of a Tooth -- 3.4.6 Sealants as a Preventive Procedure to Fight Tooth Decay -- 3.4.7 Oral Surgery, Bone Implants, and Fracture Fixation -- 3.5 Conclusions -- 3.6 Problems -- References -- 4 Connective and Soft Tissues -- 4.1 Introduction -- 4.2 Protein Structure and Composition in the Circulatory System -- 4.3 Protein Structure of Valvular Tissue and Leaflets -- 4.3.1 Valve and Leaflet Defects -- 4.3.2 Aneurysms and Fistulae -- 4.3.3 Aortic Dissection -- 4.4 Dermal Tissues, Including Hair and Nerves -- 4.4.1 The Skin -- 4.4.2 The Subcutaneous or Adipose Tissues -- 4.4.3 The Dermis -- 4.4.4 The Stratum Corneum and Epidermis -- 4.4.5 Skin Care as a Business -- 4.5 Hair -- 4.5.1 Hair Morphology -- 4.5.2 Features and Attributes of Hair -- 4.5.3 Hair as a Business -- 4.6 Nails -- 4.7 Muscle Tissues -- 4.8 Looking Ahead -- 4.9 Conclusions -- 4.10 Problems -- References -- 5 Property Assessments of Tissues -- 5.1 Introduction -- 5.2 Mechanical Properties -- 5.2.1 Uniaxial Extension and Compression -- 5.3 How Much Does the Humerus Bone Length Shrink Upon Loading With the Bar? …”
    Libro electrónico
  7. 12387
    Publicado 2008
    Tabla de Contenidos: “…David Chipperfield Architects, b720 Arquitectes (Fermín Vázquez)…”
    Libro
  8. 12388
    por D'Addio, Anna Christina
    Publicado 2005
    “…This report tries to explain observed changes in fertility rates across OECD countries, with an emphasis on socio-economic considerations. …”
    Capítulo de libro electrónico
  9. 12389
    por Ohyama, Takuji
    Publicado 2021
    “…Farmers can use convenient chemical nitrogen fertilizers to obtain high crop yields. However, the inappropriate use of nitrogen fertilizers causes environmental problems such as nitrate leaching, contamination in groundwater, and the emission of N2O gas. …”
    Libro electrónico
  10. 12390
    Tabla de Contenidos: “…Les prix et la production de la viande porcine -- Graphique 21. Fermeté relative des prix mondiaux des produits laitiers -- Graphique 22. …”
    Libro electrónico
  11. 12391
    Publicado 2020
    Tabla de Contenidos: “…Frontmatter -- Contents -- Introduction -- 1. Making Fertility Precarious: Egg Freezing and the Politicization of Reproductive Aging -- 2. …”
    Libro electrónico
  12. 12392
    por Fontaine, Jean-Marc
    Publicado 1991
    “…Given the very low consumption of fertilizers in sub-Saharan Africa — a consumption level which is currently the lowest for all world regions — its agricultural development calls imperatively for an increase in the use of fertilizers. …”
    Capítulo de libro electrónico
  13. 12393
    por Sleebos, Joëlle
    Publicado 2003
    “…Fertility rates have declined in most OECD countries to levels that are well below those needed to secure generation replacement. …”
    Capítulo de libro electrónico
  14. 12394
    Tabla de Contenidos: “…Foreword -- How perceptions, norms, and attitudes can affect family formation in Norway -- Overview: Facing a future with demographic change in Norway -- Norway's comprehensive model of family policies -- Executive summary -- The work/family balance in Norway -- Family formation in Norway -- The economic and social impact of low fertility in Norway…”
    Libro electrónico
  15. 12395
    Publicado 2022
    “…In this regard, all terrestrial animals perform internal fertilization, whereas aquatic animals perform different reproductive strategies such as internal fertilization without mating, external fertilization, viviparous, oviparous, and parthenogenesis. …”
    Libro electrónico
  16. 12396
    por Gonand, Frédéric
    Publicado 2005
    “…However, uncertainty about future longevity gains and fertility rates account for a large range of results for dependency ratios by 2050. …”
    Capítulo de libro electrónico
  17. 12397
    por Dubos, Bernard
    Publicado 2020
    “…This guide designs fertilization schemes for oil palm plantations. It explains in clear language how to develop a fertilization scheme tailored to individual plantations taking the specific characteristics of each site into account. …”
    Libro electrónico
  18. 12398
    Publicado 2018
    “…Spermatozoa, the haploid male gametes, are highly specialized cells capable to fertilize eggs in order to produce diploid zygote. …”
    Libro electrónico
  19. 12399
    Publicado 2020
    “…This Special Issue hosts a collection of original research articles, focusing on the following topics: (1) The germinative and post-germinative behavior of Brassica napus seeds when severe S limitation is applied to the parent plants; (2) the independence of S-deficiency from the mRNA degradation initiation enzyme PARN in Arabidopsis; (3) the glucosinolate distribution in the aerial parts of sel1-10, a disruption mutant of the sulfate transporter SULTR1;2, in mature Arabidopsis thaliana plants; (4) the accumulation of S-methylcysteine as its γ-glutamyl dipeptide in Phaseolus vulgaris; and (5) the role of ferric iron chelation-strategy components in the leaves and roots of maize, have provided new insights into the effect of S availability on plant functionality. …”
    Libro electrónico
  20. 12400