Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 213
- Development 148
- Computer networks 135
- Application software 131
- Leadership 123
- Engineering & Applied Sciences 115
- Artificial intelligence 88
- Security measures 87
- Technological innovations 81
- Business & Economics 80
- Data processing 77
- Computer security 69
- History 67
- Examinations 65
- Design 62
- Information technology 61
- Social aspects 60
- Economic aspects 59
- Finance 59
- Success in business 59
- Economics 58
- Electrical & Computer Engineering 57
- Historia 56
- Programming 55
- Computer programs 53
- Organizational change 53
- Python (Computer program language) 52
- Computer Science 50
- Telecommunications 50
- Operating systems (Computers) 49
-
3881por Michael H. MoffettTabla de Contenidos: “…10.4 Transaction Exposure Management: The Case of Aidan -- GLOBAL FINANCE IN PRACTICE 10.2 Currency Losses at Greenpeace -- GLOBAL FINANCE IN PRACTICE 10.3 Forward Rates and the Cost of Hedging -- 10.5 Risk Management in Practice -- GLOBAL FINANCE IN PRACTICE 10.4 The Credit Crisis and Option Volatilities in 2009 -- Summary Points -- MINI-CASE: China Noah Corporation -- Questions -- Problems -- Internet Exercises -- Chapter 11 Translation Exposure -- 11.1 Overview of Translation -- 11.2 Translation Methods -- 11.3 Aidan Corporation's Translation Exposure -- GLOBAL FINANCE IN PRACTICE 11.1 When the Hedge Becomes the Problem -- GLOBAL FINANCE IN PRACTICE 11.2 Foreign Subsidiary Valuation -- 11.4 Managing Translation Exposure -- GLOBAL FINANCE IN PRACTICE 11.3 Foreign Currency Hedge Accounting -- Summary Points -- MINI-CASE: McDonald's, Hoover Hedges, and Cross-Currency Swaps -- Questions -- Problems -- Internet Exercises -- Chapter 12 Operating Exposure -- 12.1 A Multinational's Operating Exposure -- GLOBAL FINANCE IN PRACTICE 12.1 Expecting the Devaluation-Ford and Venezuela -- 12.2 Measuring Operating Exposure: Aidan Turkey -- 12.3 Strategic Management of Operating Exposure -- GLOBAL FINANCE IN PRACTICE 12.2 Do Fixed Exchange Rates Increase Corporate Currency Risk in Emerging Markets? …”
Publicado 2021
Libro electrónico -
3882por McFedries, PaulTabla de Contenidos: “…, AOL, or Microsoft Outlook -- Setting up an account with another provider -- Setting up corporate email -- See Me, Read Me, File Me, Delete Me: Working with Messages -- Reading messages -- Threading messages -- Managing messages -- Searching emails -- Dealing with attachments -- More things you can do with messages -- Sending Email -- Sending an all-text message -- Formatting text in an email -- Sending a photo or video with an email message -- Adding an attachment to an email message -- Marking up an attachment -- Replying to a message -- Forwarding a message -- Saving a draft -- Scheduling an email to be sent later -- Unsending an email -- Settings for sending email -- Setting Your Message and Account Settings -- Checking and viewing email settings -- Altering account settings -- Chapter 6 Text Messaging…”
Publicado 2024
Libro electrónico -
3883Publicado 2023Tabla de Contenidos: “…-- Section 3 Get the Team Together: Teammate Tricks to Move the Work Forward -- Chapter 10 Craft Clear Communications to Move Others to Action -- What Methods Does Your Organization Use to Communicate? …”
Libro electrónico -
3884Publicado 2023Tabla de Contenidos: “…Future research directions/a way forward towards decentralized applications -- 11. …”
Libro electrónico -
3885Publicado 2023Tabla de Contenidos: “…F.5 Ingress Is Not Getting an External IP Address -- F.6 Going Forward -- Index…”
Libro electrónico -
3886Publicado 1996Tabla de Contenidos: “…5.4 SPECT IMAGE RECONSTRUCTION -- 5.4.1 The SPECT Reconstruction Problem -- 5.4.2 SPECT Image Reconstruction Methods -- Compensation Methods -- Three-Dimensional Reconstruction Methods for Special Collimator Designs -- 5.5 RESEARCH OPPORTUNITIES -- 5.6 Suggested Reading -- Chapter 6 Positron Emission Tomography -- 6.1 INTRODUCTION -- 6.1.1 History -- 6.1.2 Applications -- 6.1.3 Principle of Operation -- 6.2 CURRENT STATUS OF PET TECHNOLOGY -- 6.2.1 γ-Ray Detectors -- 6.2.2 Limitations of the Spatial Resolution -- 6.2.3 System Electronics -- 6.2.4 Data Correction and Reconstruction Algorithms -- 6.3 THREE-DIMENSIONAL ACQUISITION AND RECONSTRUCTION -- 6.3.1 Principle of Three-Dimensional Acquisition -- 6.3.2 Three-Dimensional Reconstruction -- 6.3.3 Scatter Correction in Three Dimensions -- 6.3.4 Attenuation Correction in Three Dimensions -- 6.4 RESEARCH OPPORTUNITIES -- 6.5 Suggested Reading -- Chapter 7 Ultrasonics -- 7.1 INTRODUCTION -- 7.2 INSTRUMENTATION -- 7.2.1 Transducers -- Field Distributions -- Acoustics and Vibration -- Electromechanical Properties of Ferroelectric Materials -- 7.2.2 Ultrasonic Beam Forming -- 7.2.3 Signal Processing -- 7.3 SCATTERING -- 7.4 ULTRASONIC TOMOGRAPHY -- 7.5 RESEARCH OPPORTUNITIES -- 7.6 Suggested Reading -- Chapter 8 Electrical Source Imaging -- 8.1 INTRODUCTION -- 8.2 OUTLINE OF ESI RECONSTRUCTION METHODS -- 8.2.1 Forward Problem -- 8.2.2 Inverse Problem -- 8.2.3 Temporal Regularization -- 8.3 RESEARCH PROBLEMS AND OPPORTUNITIES -- 8.4 Suggested Reading -- Chapter 9 Electrical Impedance Tomography -- 9.1 INTRODUCTION -- 9.2 COMPARISON TO OTHER MODALITIES -- 9.3 PRESENT STATUS OF EIT AND LIMITATIONS -- 9.4 RESEARCH OPPORTUNITIES -- 9.5 Suggested Reading -- Chapter 10 Magnetic Source Imaging -- 10.1 INTRODUCTION -- 10.2 MATHEMATICAL CONSIDERATIONS -- 10.3 SOURCE MODELS -- 10.4 RESOLUTION -- 10.5 SUMMARY…”
Libro electrónico -
3887Publicado 2018Tabla de Contenidos: “…. -- There's more... -- See also -- Forwarding container ports -- Getting ready -- How to do it... -- Container-to-container communication -- Pod-to-Pod communication -- Working with NetworkPolicy -- Pod-to-Service communication -- External-to-internal communication -- Working with Ingress -- There's more... -- See also -- Ensuring flexible usage of your containers -- Getting ready -- How to do it... -- Pod as DaemonSets -- Running a stateful Pod -- How it works... -- Pod recovery by DaemonSets -- Pod recovery by StatefulSet -- There's more... -- See also -- Submitting Jobs on Kubernetes -- Getting ready -- How to do it... -- Pod as a single Job -- Create a repeatable Job -- Create a parallel Job -- Schedule to run Job using CronJob -- How it works... -- See also -- Working with configuration files -- Getting ready -- YAML -- JSON -- How to do it... -- How it works... -- Pod -- Deployment -- Service -- See also…”
Libro electrónico -
3888Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Splunk Interface -- Logging in to Splunk -- The home app -- The top bar -- The Search & -- Reporting app -- Data generator -- The Summary view -- Search -- Actions -- Timeline -- The field picker -- Fields -- Search results -- Options -- Events viewer -- Using the time picker -- Using the field picker -- The settings section -- Splunk Cloud -- Try before you buy -- A quick cloud tour -- The top bar in Splunk Cloud -- Splunk reference app - PAS -- Universal forwarder -- eventgen -- Next steps -- Summary -- Chapter 2: Understanding Search -- Using search terms effectively -- Boolean and grouping operators -- Clicking to modify your search -- Event segmentation -- Field widgets -- Time -- Using fields to search -- Using the field picker -- Using wildcards efficiently -- Supplementing wildcards in fields -- All about time -- How Splunk parses time -- How Splunk stores time -- How Splunk displays time -- How time zones are determined and why it matters -- Different ways to search against time -- Presets -- Relative -- Real-time -- Windowed real-time versus all-time real-time searches -- Date range -- Date and time range -- Advanced -- Specifying time in-line in your search -- _indextime versus _time -- Making searches faster -- Sharing results with others -- The URL -- Save As Report -- Save As Dashboard Panel -- Save As Alert -- Save As Event Type -- Searching job settings -- Saving searches for reuse -- Creating alerts from searches -- Enable Actions -- Action Options -- Sharing -- Event annotations -- An illustration -- Summary -- Chapter 3: Tables, Charts, and Fields -- About the pipe symbol -- Using top to show common field values -- Controlling the output of top -- Using stats to aggregate values…”
Libro electrónico -
3889Publicado 2017Tabla de Contenidos: “…. -- Chapter 3: IPv6, Unix Domain Sockets, and Network Interfaces -- Introduction -- Forwarding a local port to a remote host -- How to do it... -- How it works... -- Pinging hosts on the network with ICMP -- Getting ready -- How to do it... -- How it works... -- Waiting for a remote network service -- How to do it... -- How it works... -- Enumerating interfaces on your machine -- Getting ready -- How to do it... -- How it works... -- Finding the IP address for a specific interface on your machine -- Getting ready -- How to do it... -- How it works... -- Finding whether an interface is up on your machine -- Getting ready -- How to do it... -- How it works... -- Detecting inactive machines on your network -- Getting ready -- How to do it... -- How it works... -- Performing a basic IPC using connected sockets (socketpair) -- Getting ready -- How to do it... -- How it works... -- Performing IPC using Unix domain sockets -- How to do it... -- How it works... -- Finding out if your Python supports IPv6 sockets -- Getting ready -- How to do it... -- How it works... -- Extracting an IPv6 prefix from an IPv6 address -- How to do it... -- How it works... -- Writing an IPv6 echo client/server -- How to do it... -- How it works... -- Chapter 4: Programming with HTTP for the Internet -- Introduction -- Downloading data from an HTTP server -- How to do it... -- How it works... -- Serving HTTP requests from your machine -- How to do it... -- How it works... -- Extracting cookie information after visiting a website -- How to do it... -- How it works... -- Submitting web forms -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
3890Publicado 2023Tabla de Contenidos: “…DNS Devolution -- Record Weighting -- Netmask Ordering -- DnsUpdateProxy Group -- DNS Policies -- Introducing DNS Record Types -- Start of Authority (SOA) Records -- Name Server Records -- Host Record -- Alias Record -- Pointer Record -- Mail Exchanger Record -- Service Record -- Configuring DNS -- Installing DNS -- Load Balancing with Round-Robin -- Configuring a Caching-Only Server -- Setting Zone Properties -- Configuring Zones for Dynamic Updates -- Delegating Zones for DNS -- DNS Forwarding -- Manually Creating DNS Records -- DNS Aging and Scavenging -- DNS PowerShell Commands -- Summary -- Exam Essentials -- Review Questions -- Chapter 6 Configuring DHCP and IPAM -- Understanding DHCP -- Introducing the DORA Process -- Advantages and Disadvantages of DHCP -- Ipconfig Lease Options -- Understanding Scope Details -- Installing and Authorizing DHCP -- Installing DHCP -- Introducing the DHCP Snap-In -- Authorizing DHCP for Active Directory -- Creating and Managing DHCP Scopes -- Creating a New Scope in IPv4 -- Creating a New Scope in IPv6 -- Changing Scope Properties (IPv4 and IPv6) -- Changing Server Properties -- Managing Reservations and Exclusions -- Setting Scope Options for IPv4 -- Activating and Deactivating Scopes -- Creating a Superscope for IPv4 -- Creating IPv4 Multicast Scopes -- Integrating Dynamic DNS and IPv4 DHCP -- Using DHCP Failover Architecture -- Working with the DHCP Database Files -- Working with Advanced DHCP Configuration Options -- Implement DHCPv6 -- Configure High Availability for DHCP, Including DHCP Failover and Split Scopes -- Configure DHCP Name Protection -- Understanding IPAM -- Installing IPAM -- Provision IPAM Manually or by Using Group Policy -- Configure Server Discovery -- Create and Manage IP Blocks and Ranges -- Auditing IPAM -- PowerShell Commands -- Summary -- Exam Essentials -- Review Questions…”
Libro electrónico -
3891Publicado 2018Tabla de Contenidos: “…Max pooling and subsampling -- Hidden layers and formal description on forwarding propagation -- CNN examples -- CNN training and backpropagation -- RNN -- Training and inference for IoT -- IoT data analytics and machine learning comparison and assessment -- Summary -- Chapter 12: IoT Security -- Cyber security vernacular -- Attack and threat terms -- Defense terms -- Anatomy of IoT cyber attacks -- Mirai -- Stuxnet -- Chain Reaction -- Physical and hardware security -- Root of Trust -- Key management and trusted platform modules -- Processor and memory space -- Storage security -- Physical security -- Cryptography -- Symmetric cryptography -- Asymmetric cryptography -- Cryptographic hash (authentication and signing) -- Public Key Infrastructure -- Network stack - Transport Layer Security -- Software defined perimeter -- Software-Defined Perimeter architecture -- Blockchains and cryptocurrencies in IoT -- Bitcoin (blockchain-based) -- IOTA (directed acyclical graph-based) -- Government regulations and intervention -- US Congressional Bill -Internet of Things (IoT) Cybersecurity Improvement Act of 2017 -- Other governmental bodies -- IoT security best practices -- Holistic security -- Security checklist -- Summary -- Chapter 13: Consortiums and Communities -- PAN consortia -- Bluetooth SIG -- Thread Group -- Zigbee Alliance -- Miscellaneous -- Protocol consortia -- Open Connectivity Foundation and Allseen Alliance -- OASIS -- Object Management Group -- IPSO Alliance -- Miscellaneous -- WAN consortia -- Weightless -- LoRa Alliance -- Internet Engineering Task Force -- Wi-Fi Alliance -- Fog and edge consortia -- OpenFog -- EdgeX Foundry -- Umbrella organizations -- Industrial Internet Consortium -- IEEE IoT -- Miscellaneous -- US government IoT and security entities -- Summary -- Other Books You May Enjoy…”
Libro electrónico -
3892Publicado 2024Tabla de Contenidos: “…-- Converting SSH2 keys to the OpenSSH format -- What we are trying to achieve -- How to convert the SSH2-formatted key to OpenSSH -- The other direction: Converting SSH2 keys to the OpenSSH format -- SSH-agent -- Common SSH errors and the -v (verbose) argument -- File transfer -- SFTP -- SCP -- Clever examples -- Without SFTP or SCP -- Directory upload and .tar.gz compression -- Tunnels -- Local forwarding -- Proxying -- The configuration file -- Conclusion -- Chapter 14: Version Control with Git -- Some background on Git -- What is a distributed version control system? …”
Libro electrónico -
3893Publicado 2004Tabla de Contenidos: “…7.1 NetView Integrated TCP/IP services component -- 7.1.1 Concepts -- 7.1.2 Configure NetView Integrated TCP/IP Services Component -- 7.1.3 Verification -- 7.2 Event integration with IBM Tivoli Enterprise Console -- 7.2.1 Customizing TEC rulebase -- 7.2.2 Configuring event forwarding -- 7.2.3 Sample event automation program -- 7.3 Event integration with IBM Tivoli NetView for z/OS -- 7.3.1 Setting up Event Automation Service -- 7.3.2 Defining threshold and event generation -- 7.3.3 Automating NetView alert -- Chapter 8. …”
Libro electrónico -
3894Publicado 2010Tabla de Contenidos: “…Sending and Receiving with Database Mail -- Using SQL Server Agent Mail -- Related Views and Procedures -- Summary -- 16 SQL Server Scheduling and Notification -- What's New in Scheduling and Notification -- Configuring the SQL Server Agent -- Viewing the SQL Server Agent Error Log -- SQL Server Agent Security -- Managing Operators -- Managing Jobs -- Managing Alerts -- Scripting Jobs and Alerts -- Multiserver Job Management -- Event Forwarding -- Summary -- 17 Administering SQL Server 2008 with PowerShell -- What's New with PowerShell -- Overview of PowerShell -- PowerShell Scripting Basics -- PowerShell in SQL Server 2008 -- Step-By-Step Examples -- Summary -- 18 SQL Server High Availability -- What's New in High Availability -- What Is High Availability? …”
Libro electrónico -
3895Publicado 2018Tabla de Contenidos: “…. -- See also -- Using the Universal Forwarder to gather data -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding the receiving indexer via outputs.conf -- Receiving data using the HTTP Event Collector -- Getting ready -- How to do it... -- How it works... -- Getting data from databases using DB Connect -- Getting ready -- How to do it... -- How it works... -- Loading the sample data for this book -- Getting ready -- How to do it... -- How it works... -- See also -- Data onboarding - defining field extractions -- Getting ready -- How to do it... -- How it works... -- See also -- Data onboarding - defining event types and tags -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding event types and tags using eventtypes.conf and tags.conf -- See also -- Installing the Machine Learning Toolkit -- Getting ready -- How to do it... -- How it works... -- Chapter 2: Diving into Data - Search and Report -- Introduction…”
Libro electrónico -
3896Publicado 2011Tabla de Contenidos: “…Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 17: CONFIGURING AND MONITORING A LAN -- Setting Up the Hardware -- Configuring the Systems -- NetworkManager: Configures Network Connections -- Setting Up Servers -- Introduction to Cacti -- More Information -- Chapter Summary -- Exercises -- Advanced Exercises -- PART V: USING CLIENTS AND SETTING UP SERVERS -- CHAPTER 18: OPENSSH: SECURE NETWORK COMMUNICATION -- Introduction to OpenSSH -- Running the ssh, scp, and sftp OpenSSH Clients -- Setting Up an OpenSSH Server (sshd) -- Troubleshooting -- Tunneling/Port Forwarding -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 19: FTP: TRANSFERRING FILES ACROSS A NETWORK -- Introduction to FTP -- Running the ftp and sftp FTP Clients -- Setting Up an FTP Server (vsftpd) -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 20: EXIM4: SETTING UP MAIL SERVERS, CLIENTS, AND MORE -- Introduction to exim4 -- Setting Up a Mail Server (exim4) -- Working with exim4 Messages -- Configuring an exim4 Mail Server -- SpamAssassin -- Additional Email Tools -- Authenticated Relaying -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 21: NIS AND LDAP -- Introduction to NIS -- Running an NIS Client -- Setting Up an NIS Server -- LDAP -- Setting Up an LDAP Server -- Other Tools for Working with LDAP -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 22: NFS: SHARING FILESYSTEMS -- Introduction to NFS -- Running an NFS Client -- Setting Up an NFS Server -- automount: Mounts Directory Hierarchies on Demand -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 23: SAMBA: LINUX AND WINDOWS FILE AND PRINTER SHARING -- Introduction to Samba -- Setting Up a Samba Server -- Working with Linux Shares from Windows -- Working with Windows Shares from Linux -- Troubleshooting -- Chapter Summary -- Exercises…”
Libro electrónico -
3897“…It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. …”
Libro electrónico -
3898Publicado 2021“…It’s the leading channel-based messaging platform used by millions to align their teams, unify their systems, and drive their businesses forward. As a developer, you can use Slack to create tools such as bots that handle and maintain routine and time-consuming tasks. …”
Libro electrónico -
3899Publicado 2021Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Section 1: Introduction to WinUI and Windows Applications -- Chapter 1: Introduction to WinUI -- Technical requirements -- Before UWP - Windows 8 XAML applications -- Windows application UI design -- Windows Runtime (WinRT) -- User backlash and the path forward to Windows 10 -- Windows 10 and UWP application development -- Language choice with UWP development -- Lifting app restrictions -- UWP backward compatibility -- What is XAML? …”
Libro electrónico -
3900Publicado 2018Tabla de Contenidos: “…Innovating pedagogy and practice: the P3 Project study findings -- 9.4. Moving forward: the application of RVS to achieve synergetic configuration and student success -- 9.5. …”
Libro electrónico