Mostrando 1,781 - 1,800 Resultados de 4,825 Para Buscar 'Forwardis~', tiempo de consulta: 2.20s Limitar resultados
  1. 1781
    Publicado 2004
    Tabla de Contenidos: “…Event management products and best practices -- 6.1 Filtering and forwarding events -- 6.1.1 Filtering and forwarding with NetView -- 6.1.2 Filtering and forwarding using IBM Tivoli Enterprise Console -- 6.1.3 Filtering and forwarding using IBM Tivoli Monitoring -- 6.2 Duplicate detection and throttling -- 6.2.1 IBM Tivoli NetView and Switch Analyzer for duplicate detection and throttling -- 6.2.2 IBM Tivoli Enterprise Console duplicate detection and throttling -- 6.2.3 IBM Tivoli Monitoring for duplicate detection and throttling -- 6.3 Correlation -- 6.3.1 Correlation with NetView and IBM Tivoli Switch Analyzer -- 6.3.2 IBM Tivoli Enterprise Console correlation -- 6.3.3 IBM Tivoli Monitoring correlation -- 6.4 Notification -- 6.4.1 NetView -- 6.4.2 IBM Tivoli Enterprise Console -- 6.4.3 Rules -- 6.4.4 IBM Tivoli Monitoring -- 6.5 Escalation -- 6.5.1 Severities -- 6.5.2 Escalating events with NetView -- 6.6 Event synchronization -- 6.6.1 NetView and IBM Tivoli Enterprise Console…”
    Libro electrónico
  2. 1782
    Publicado 2011
    “…It shows you how to build the support, trust and respect you need to propel your life forwards to take on challenge after challenge. Based on over twenty years of influencing experience, the author combines psychological principles with case studies and examples to show you how to: - Use body language and appearance to establish instant rapport. - Select words to gain lasting trust and respect. - Understand how people make decisions so you get a ‘yes’, every time. - Know how to apply a ‘win-win’ negotiation approach, so you never lose. …”
    Libro electrónico
  3. 1783
    Publicado 2024
    “…This IBM Redpaper publication provides a basic understanding of Red Hat OpenShift Container Platform on IBM Z and LinuxONE, discusses architectural considerations for implementation as well as resource considerations, basic deployment examples and some best practices to move forwards in your own implementations. It has been written for IT architects and IT specialists…”
    Libro electrónico
  4. 1784
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Introduction: Relationships Under Siege -- Relationship Complexity -- Connecting in the Digital Economy -- A Way Forward -- Chapter 1 The Right Amount of Tension (Accountability) -- Leadership Is a Choice -- These Are Our Expectations -- A Disciplined Optimist -- The Delicate Dance -- Chapter 2 Forgiveness Every Day (Forgiveness) -- Stand Behind Them -- Grace and Fire -- To Promote Mercy -- Chapter 3 Jump Back Together (Resilience) -- Sudden Change -- Resilience in Groups -- Crush Your Dreams -- Perception and Reality -- Facing Every Unique Trial -- Chapter 4 The Vocabulary of Trust (Trust) -- I'm in Their Corner -- The Our, the Us, and the We -- I'm Here, and I See That You're There -- Call Me Bob -- The Common Thread -- Chapter 5 From Pie in the Sky to History (Coalition-Building) -- We're All on Board for This -- There Could Be a Better Way If They Bought In -- Leaders Create Coalitions -- Chapter 6 The Long and Winding Road (Loyalty) -- Sometimes, It's Pay It Forward -- You Don't Want to Drop the Ball -- Dreams 4 All -- Chapter 7 Stable Ground (Stability) -- You're Going to Celebrate the Organization -- Love Is a Verb -- Could I Get Fired for This? …”
    Libro electrónico
  5. 1785
    Publicado 2017
    Tabla de Contenidos: “…Sustaining an Accountable Culture: Tune-Ups Required -- Accountability Tip: Do Not Shoulder Their Accountabilities -- Do Not Dwell on Why: Keep Moving Forward -- Accountability in Times of Change: Overcome Fear and Denial -- The Pinnacle: The Accountable Organization -- Live and Lead Accountably -- Index -- EULA…”
    Libro electrónico
  6. 1786
    Publicado 2013
    Tabla de Contenidos: “…Specialising in I2S -- Moving Forward -- 31. A View of the Future -- 32. How I2S Functions as a Discipline -- 33. …”
    Libro electrónico
  7. 1787
    por Allen-Yazzie, Christine Diane
    Publicado 2007
    Tabla de Contenidos: “…Intro -- Table of Contents -- The Plan -- The Plan, Amended -- New Breasts = New Bras -- To Food -- Dear James -- You Got to Cut Its Throat -- Hello, Please Help Me -- How to Make the World a Better Place -- Just So You're All Right Now -- All That Matters -- The Arc and the Sediment -- A Sore Cursing -- Hello, Kitty -- Fruit Sauce Should Always Be Served on the Side -- The Curiously Multifaceted Nature of Victimization -- The Wavering Red Light -- An Unspeakable Shine -- Entering the Third Dimension -- Forward, Anywhere -- What Becomes of Virginia Dare -- In the Vat Lies the Fruit -- Second Place Is Pretty Good, Considering -- A Little Reluctance Goes a Long Way -- I Want Some Cookies -- Who's Your Butterfly? …”
    Libro electrónico
  8. 1788
    por Seo, Jin Keun
    Publicado 2013
    Tabla de Contenidos: “…Machine generated contents note: Preface List of Abbreviations 1 Introduction 1.1 Forward Problem 1.2 Inverse Problem 1.3 Issues in Inverse Problem Solving 1.4 Linear, Nonlinear and Linearized Problems 2 Signal and System as Vectors 2.1 Vector Space 2.1.1 Vector Space and Subspace 2.1.2 Basis, Norm and Inner Product 2.1.3 Hilbert Space 2.2 Vector Calculus 2.2.1 Gradient 2.2.2 Divergence 2.2.3 Curl 2.2.4 Curve 2.2.5 Curvature 2.3 Taylor's Expansion 2.4 Linear System of Equations 2.4.1 Linear System and Transform 2.4.2 Vector Space of Matrix 2.4.3 Least Square Solution 2.4.4 Singular Value Decomposition (SVD) 2.4.5 Pseudo-inverse 2.5 Fourier Transform 2.5.1 Series Expansion 2.5.2 Fourier Transform 2.5.3 Discrete Fourier Transform (DFT) 2.5.4 Fast Fourier Transform (FFT) 2.5.5 Two-dimensional Fourier Transform References 3 Basics for Forward Problem 3.1 Understanding PDE using Images as Examples 3.2 Heat Equation 3.2.1 Formulation of Heat Equation 3.2.2 One-dimensional Heat Equation 3.2.3 Two-dimensional Heat Equation and Isotropic Diffusion 3.2.4 Boundary Conditions 3.3 Wave Equation 3.4 Laplace and Poisson Equations 3.4.1 Boundary Value Problem 3.4.2 Laplace Equation in a Circle 3.4.3 Laplace Equation in Three-dimensional Domain 3.4.4 Representation Formula for Poisson Equation References 4 Analysis for Inverse Problem 4.1 Examples of Inverse Problems in Medical Imaging 4.1.1 Electrical Property Imaging 4.1.2 Mechanical Property Imaging 4.1.3 Image Restoration 4.2 Basic Analysis 4.2.1 Sobolev Space 4.2.2 Some Important Estimates 4.2.3 Helmholtz Decomposition 4.3 Variational Problems 4.3.1 Lax-Milgram Theorem 4.3.2 Ritz Approach 4.3.3 Euler-Lagrange Equations 4.3.4 Regularity Theory and Asymptotic Analysis 4.4 Tikhonov Regularization and Spectral Analysis 4.4.1 Overview of Tikhonov Regularization 4.4.2 Bounded Linear Operators in Banach Space 4.4.3 Regularization in Hilbert Space or Banach Space 4.5 Basics of Real Analysis 4.5.1 Riemann Integrable 4.5.2 Measure Space 4.5.3 Lebesgue Measurable Function 4.5.4 Pointwise, Uniform, Norm Convergence and Convergence in Measure 4.5.5 Differentiation Theory References 5 Numerical Methods 5.1 Iterative Method for Nonlinear Problem 5.2 Numerical Computation of One-dimensional Heat equation 5.2.1 Explicit Scheme 5.2.2 Implicit Scheme 5.2.3 Crank-Nicolson Method 5.3 Numerical Solution of Linear System of Equations 5.3.1 Direct Method using LU Factorization 5.3.2 Iterative Method using Matrix Splitting 5.3.3 Iterative Method using Steepest Descent Minimization 5.3.4 Conjugate Gradient (CG) Method 5.4 Finite Difference Method (FDM) 5.4.1 Poisson Equation 5.4.2 Elliptic Equation 5.5 Finite Element Method (FEM) 5.5.1 One-dimensional Model 5.5.2 Two-dimensional Model 5.5.3 Numerical Examples References 6 CT, MRI and Image Processing Problems 6.1 X-ray CT 6.1.1 Inverse Problem 6.1.2 Basic Principle and Nonlinear Effects 6.1.3 Inverse Radon Transform 6.1.4 Artifacts in CT 6.2 MRI 6.2.1 Basic Principle 6.2.2 K-space Data 6.2.3 Image Reconstruction 6.3 Image Restoration 6.3.1 Role of p in (6.35) 6.3.2 Total Variation Restoration 6.3.3 Anisotropic Edge-preserving Diffusion 6.3.4 Sparse Sensing 6.4 Segmentation 6.4.1 Active Contour Method 6.4.2 Level Set Method 6.4.3 Motion Tracking for Echocardiography References 7 Electrical Impedance Tomography 7.1 Introduction 7.2 Measurement Method and Data 7.2.1 Conductivity and Resistance 7.2.2 Permittivity and Capacitance 7.2.3 Phasor and Impedance 7.2.4 Admittivity and Trans-impedance 7.2.5 Electrode Contact Impedance 7.2.6 EIT System 7.2.7 Data Collection Protocol and Data Set 7.2.8 Linearity between Current and Voltage 7.3 Representation of Physical Phenomena 7.3.1 Derivation of Elliptic PDE 7.3.2 Elliptic PDE for Four-electrode Method 7.3.3 Elliptic PDE for Two-electrode Method 7.3.4 Min-max Property of Complex Potential 7.4 Forward Problem and Model 7.4.1 Continuous Neumann-to-Dirichlet Data 7.4.2 Discrete Neumann-to-Dirichlet Data 7.4.3 Nonlinearity between Admittivity and Voltage 7.5 Uniqueness Theory and Direct Reconstruction Method 7.5.1 Calderon's Approach 7.5.2 Uniqueness and Three-dimensional Reconstruction: Infinite Measurements 7.5.3 Nachmann's D-bar Method in Two Dimension 7.6 Backprojection Algorithm 7.7 Sensitivity and Sensitivity Matrix 7.7.1 Perturbation and Sensitivity 7.7.2 Sensitivity Matrix 7.7.3 Linearization 7.7.4 Quality of Sensitivity Matrix 7.8 Inverse Problem of EIT 7.8.1 Inverse Problem of RC Circuit 7.8.2 Formulation of EIT Inverse Problem 7.8.3 Ill-posedness of EIT Inverse Problem 7.9 Static Imaging 7.9.1 Iterative Data Fitting Method 7.9.2 Static Imaging using 4-channel EIT System 7.9.3 Regularization 7.9.4 Technical Difficulty of Static Imaging 7.10 Time-difference Imaging 7.10.1 Data Sets for Time-difference Imaging 7.10.2 Equivalent Homogeneous Admittivity 7.10.3 Linear Time-difference Algorithm using Sensitivity Matrix 7.10.4 Interpretation of Time-difference Image 7.11 Frequency-difference Imaging 7.11.1 Data Sets for Frequency-difference Imaging 7.11.2 Simple Difference Ft,ω2− Ft,ω1 7.11.3 Weighted Difference Ft,ω2− [alpha] Ft,ω1 7.11.4 Linear Frequency-difference Algorithm using Sensitivity Matrix 7.11.5 Interpretation of Frequency-difference Image References 8 Anomaly Estimation and Layer Potential Techniques 8.1 Harmonic Analysis and Potential Theory 8.1.1 Layer Potentials and Boundary Value Problems for Laplace Equation 8.1.2 Regularity for Solution of Elliptic Equation along Boundary of Inhomogeneity 8.2 Anomaly Estimation using EIT 8.2.1 Size Estimation Method 8.2.2 Location Search Method 8.3 Anomaly Estimation using Planar Probe 8.3.1 Mathematical Formulation 8.3.2 Representation Formula References 9 Magnetic Resonance Electrical Impedance Tomography 9.1 Data Collection using MRI 9.1.1 Measurement of Bz 9.1.2 Noise in Measured Bz Data 9.1.3 Measurement of B = (Bx,By,Bz) 9.2 Forward Problem and Model Construction 9.2.1 Relation between J , Bz and σ 9.2.2 Three Key Observations 9.2.3 Data Bz Traces σ∇u © e z-directional Change of σ 9.2.4 Mathematical Analysis toward MREIT Model 9.3 Inverse Problem Formulation using B or J 9.4 Inverse Problem Formulation using Bz 9.4.1 Model with Two Linearly Independent Currents 9.4.2 Uniqueness 9.4.3 Defected Bz Data in a Local Region 9.5 Image Reconstruction Algorithm 9.5.1 J-substitution Algorithm 9.5.2 Harmonic Bz Algorithm 9.5.3 Gradient Bz Decomposition and Variational Bz Algorithm 9.5.4 Local Harmonic Bz Algorithm 9.5.5 Sensitivity Matrix Based Algorithm 9.5.6 Anisotropic Conductivity Reconstruction Algorithm 9.5.7 Other Algorithms 9.6 Validation and Interpretation 9.6.1 Image Reconstruction Procedure using Harmonic Bz Algorithm 9.6.2 Conductivity Phantom Imaging 9.6.3 Animal Imaging 9.6.4 Human Imaging 9.7 Applications References 10 Magnetic Resonance Elastography 10.1 Representation of Physical Phenomena 10.1.1 Overview of Hooke's Law 10.1.2 Strain Tensor in Lagrangian Coordinates 10.2 Forward Problem and Model 10.3 Inverse Problem in MRE 10.4 Reconstruction Algorithms 10.4.1 Reconstruction of [mu] with the Assumption of Local Homogeneity 10.4.2 Reconstruction of [mu] without the Assumption of Local Homogeneity 10.4.3 Anisotropic Elastic Moduli Reconstruction 10.5 Technical Issues in MRE References…”
    Libro electrónico
  9. 1789
    Publicado 2022
    Tabla de Contenidos: “…Back to the future: Recuperating educational administration? / 2. Leading forward by salvaging for the future / 3. Wayfinding: Navigating complexity for sustainable school leadership, / 4. …”
    Libro
  10. 1790
    Publicado 1991
    Libro electrónico
  11. 1791
    “…The most costly component of the international traffic transport chain is now the inland leg, which explains why forwarders are so keen to gain control over inland transport operations. …”
    Libro electrónico
  12. 1792
    por Deal, Richard A.
    Publicado 2005
    “…Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. …”
    Libro electrónico
  13. 1793
    Publicado 2021
    “…TLS support is explained, including scenarios of TLS termination and TLS forwarding. Traefik supports TLS termination using Let's Encrypt. …”
    Libro electrónico
  14. 1794
    por Hussain, Iftekhar
    Publicado 2004
    “…Design and deploy high availability IP and MPLS network architectures with this comprehensive guide Includes a detailed overview of the IP/MPLS forwarding and control plane protocols, including OSPF, IS-IS, LDP, BGP, and RSVP Analyze fault-tolerant IP/MPLS control plane architectures with the explanations in this book Develop a clear understanding of various high availability aspects of IP/MPLS networks Learn how to seamlessly deploy IP/MPLS control plane restart mechanisms Master the application of fault-tolerant control-plane architectures in designing and deploying highly reliable and available MPLS applications, such as traffic engineering, L2VPNs, and L3VPNs Understand the layered architecture of network-level fault recovery mechanisms, such as optical, SONET, MPLS, and interactions between different layers In the wake of increased traffic, today's service providers and enterprises must assure high availability across a variety of networked services and applications. …”
    Libro electrónico
  15. 1795
    por Dovey, James
    Publicado 2012
    Tabla de Contenidos: “…Chapter 4 Objective-C Language FeaturesStrong and Weak References; Autorelease Pools; Exceptions; Synchronization; In-Depth: Messaging; Message Orientation; Sending Messages; Proxies and Message Forwarding; Blocks; Lexical Closures; Grand Central Dispatch; Summary; Chapter 5 Using the Filesystem; Files, Folders, and URLs; URLs; Creating and Using URLs; Resources; Access Permissions; File Reference URLs; Security Scope; Filesystem Metadata; Managing Folders and Locations; Accessing File Contents; Random-Access Files; Streaming File Contents; Rolling Your Own Streams…”
    Libro electrónico
  16. 1796
    Publicado 2021
    Tabla de Contenidos: “…File Transfers -- Windows Host Destination -- Linux Host Destination -- Windows System Exploitation -- Windows Kernel Exploits -- Getting the OS Version -- Find a Matching Exploit -- Executing the Payload and Getting a Root Shell -- The Metasploit PrivEsc Magic -- Exploiting Windows Applications -- Running As in Windows -- PSExec Tool -- Exploiting Services in Windows -- Interacting with Windows Services -- Misconfigured Service Permissions -- Overriding the Service Executable -- Unquoted Service Path -- Weak Registry Permissions -- Exploiting the Scheduled Tasks -- Windows PrivEsc Automated Tools -- PowerUp -- WinPEAS -- Summary -- Chapter 12 Pivoting and Lateral Movement -- Dumping Windows Hashes -- Windows NTLM Hashes -- SAM File and Hash Dump -- Using the Hash -- Mimikatz -- Dumping Active Directory Hashes -- Reusing Passwords and Hashes -- Pass the Hash -- Pivoting with Port Redirection -- Port Forwarding Concepts -- SSH Tunneling and Local Port Forwarding -- Remote Port Forwarding Using SSH -- Dynamic Port Forwarding -- Dynamic Port Forwarding Using SSH -- Summary -- Chapter 13 Cryptography and Hash Cracking -- Basics of Cryptography -- Hashing Basics -- One-Way Hash Function -- Hashing Scenarios -- Hashing Algorithms -- Message Digest 5 -- Secure Hash Algorithm -- Hashing Passwords -- Securing Passwords with Hash -- Hash-Based Message Authenticated Code -- Encryption Basics -- Symmetric Encryption -- Advanced Encryption Standard -- Asymmetric Encryption -- Rivest Shamir Adleman -- Cracking Secrets with Hashcat -- Benchmark Testing -- Cracking Hashes in Action -- Attack Modes -- Straight Mode -- Combinator -- Mask and Brute-Force Attacks -- Brute-Force Attack -- Hybrid Attacks -- Cracking Workflow -- Summary -- Chapter 14 Reporting -- Overview of Reports in Penetration Testing -- Scoring Severities…”
    Libro electrónico
  17. 1797
    Publicado 2018
    Tabla de Contenidos: “…-- How to Use This Book -- Contact Me -- Chapter 1: The Basics of Networking -- Network Architecture and Protocols -- The Internet Protocol Suite -- Data Encapsulation -- Headers, Footers, and Addresses -- Data Transmission -- Network Routing -- My Model for Network Protocol Analysis -- Final Words -- Chapter 2: Capturing Application Traffic -- Passive Network Traffic Capture -- Quick Primer for Wireshark -- Alternative Passive Capture Techniques -- System Call Tracing -- The strace Utility on Linux -- Monitoring Network Connections with DTrace -- Process Monitor on Windows -- Advantages and Disadvantages of Passive Capture -- Active Network Traffic Capture -- Network Proxies -- Port-Forwarding Proxy -- SOCKS Proxy -- HTTP Proxies -- Forwarding an HTTP Proxy -- Reverse HTTP Proxy -- Final Words -- Chapter 3: Network Protocol Structures -- Binary Protocol Structures -- Numeric Data -- Booleans -- Bit Flags -- Binary Endian -- Text and Human-Readable Data -- Variable Binary Length Data -- Dates and Times -- POSIX/Unix Time -- Windows FILETIME -- Tag, Length, Value Pattern -- Multiplexing and Fragmentation -- Network Address Information -- Structured Binary Formats -- Text Protocol Structures -- Numeric Data -- Text Booleans -- Dates and Times -- Variable-Length Data -- Structured Text Formats -- Encoding Binary Data -- Hex Encoding -- Base64 -- Final Words -- Chapter 4: Advanced Application Traffic Capture -- Rerouting Traffic -- Using Traceroute -- Routing Tables -- Configuring a Router -- Enabling Routing on Windows -- Enabling Routing on *nix -- Network Address Translation -- Enabling SNAT…”
    Libro electrónico
  18. 1798
    Publicado 1999
    Tabla de Contenidos: “…Reconciling culture and economy: ways forward in the analysis of ethnicity and gender / Harriet Bradley and Steve Fenton -- 6. …”
    Enlace del recurso
    Libro electrónico
  19. 1799
    por Carolan, Michael S.
    Publicado 2013
    Tabla de Contenidos: “…A failed project -- Food security: a brief history -- Calorie-ization of food security -- Neoliberalization of food security -- Empty calorie-ization of food security -- Pieces missed -- Well-being and nutrition -- Life expectancy -- Subjective indicators of well-being -- Aggregate well-being indicators -- Nutritional well-being -- Sustainability -- Greenhouse gas emissions -- Energy consumption -- Water -- Waste -- Meat -- Environmental performance index: agriculture -- Food sovereignty, safety and access -- Farmer dependency -- Constricting consumer choice -- Food safety -- Import dependency -- Looking forward -- The food and human security index -- Individual and society well-being -- Ecological sustainability -- Potential for food independence -- Nutritional well-being -- Freedom in agrifood chain -- Results -- Lessons learned -- From Green Revolution to rainbow evolution -- So what can we eat if not GDP? …”
    Enlace del recurso
    Libro electrónico
  20. 1800
    Publicado 2003
    Tabla de Contenidos: “…Figuères -- Conclusion : The way forward / Caroline M. Figuères, Johan Rockström and Cecilia Tortajada…”
    Enlace del recurso
    Libro electrónico