Mostrando 1,621 - 1,640 Resultados de 2,396 Para Buscar 'Guarrate~', tiempo de consulta: 1.47s Limitar resultados
  1. 1621
    Publicado 2020
    Tabla de Contenidos: “…Compiler as assistant -- 3.1. Documenting guarantees with type annotations -- 3.1.1. Adding optional type annotations -- 3.1.2. …”
    Libro electrónico
  2. 1622
    Publicado 1880
    Manuscrito
  3. 1623
  4. 1624
    Publicado 2019
    Libro electrónico
  5. 1625
    Publicado 2017
    Tabla de Contenidos: “…Prerequisites for the installation of Stream Analytics tools -- Development of a Stream Analytics job using Visual Studio -- Defining a Stream Analytics query for Vehicle Telemetry job analysis using Stream Analytics tools -- Query to define Vehicle Telemetry (Connected Car) engine health status and pollution index over cities -- Testing Stream Analytics queries locally or in the cloud -- Stream Analytics job configuration parameter settings in Visual Studio -- Implementation of an Azure Stream Analytics job using the Azure portal -- Provisioning for an Azure Stream Analytics job using the Azure Resource Manager template -- Azure ARM Template - Infrastructure as code -- Getting started with provisioning Azure Stream Analytics job using the ARM template -- Deployment and validation of the Stream Analytics ARM template to Azure Resource Group -- Configuration of the Azure Streaming job with different input data sources and output data sinks -- Data input types-data stream and reference data -- Data Stream inputs -- Reference data -- Job topology output data sinks of Stream Analytics -- Summary -- Chapter 5: Building Using Stream Analytics Query Language -- Built-in functions -- Scalar functions -- Aggregate and analytic functions -- Array functions -- Other functions -- Data types and formats -- Complex types -- Query language elements -- Windowing -- Tumbling windows -- Hopping windows -- Sliding windows -- Time management and event delivery guarantees -- Summary -- Chapter 6: How to achieve Seamless Scalability with Automation -- Understanding parts of a Stream Analytics job definition (input, output, reference data, and job) -- Deployment of Azure Stream Analytics using ARM template -- Configuring input -- Configuring output -- Building the sample test code -- How to scale queries using Streaming units and partitions -- Application and Arrival Time…”
    Libro electrónico
  6. 1626
    Publicado 2022
    Tabla de Contenidos: “…. -- Introduction -- Background -- The Front-Runner Models and Solidaristic Wage Policy -- Low-wage Guarantees Through Collective Bargaining -- Food Industry - Augmented Minimum-Wage Rise -- Retail - Prioritizing Those With a Stable Connection to the Industry -- Construction - Emergence of Low Wages in an Industry With No Tradition of Low-Wage Challenges -- Cleaning and Hospitality - Industries With Little Regulatory Capacity Through Collective Institutions -- Discussion -- Wages and the Problem of Low Wages Are the Responsibility of the Social Partners -- Instruments Need to Be Developed in a Changing Labour Market -- The Challenges - Can the Social Partners Also Ensure an Acceptable Wage Floor in the Future? …”
    Libro electrónico
  7. 1627
    por Pathak, R. P.
    Publicado 2011
    Tabla de Contenidos: “…Process of instruction and methods of teaching -- Aims of education and organization of curriculum -- Discipline and interest -- Influence of Dewey on Modern Education -- Epistemology of Pragmatism -- The Metaphysics of Pragmatism -- The world is all foreground -- The world is characterized throughout by process and change -- The world is precarious -- The world is incomplete and indeterminate -- The world is pluralistic -- The world has ends within its own process -- Man is one with the world -- Man is not the active cause of the world -- The world does not guarantee progress -- The Axiology of Pragmatism -- Pragmatism and Education -- Aim of education -- Pragmatism and problems of education -- Pragmatism and the educative process -- Pragmatism and methods of teaching -- Education as a Social Institution -- The Pupil -- The Objective of Education -- The Educative Process -- Progressive education -- Summary -- Key Words -- Notes and References -- Additional Readings -- Chapter 7: Realism in Education -- Definitions of Realism -- Differences between realism and naturalism -- Differences between realism and pragmatism -- Concept of Realism -- Historical Perspective of Realism -- The pupil -- The curriculum -- Methods of teaching -- The teacher -- Assessment of realism -- Realism in Education -- Aims of education -- Effect of realism upon education -- Realism of Aristotle -- Realism in Jainism -- Summary -- Key Words -- Additional Readings -- Chapter 8: Existential/Logical Position of Education -- Meaning of Logical Positivism -- Concepts of Existentialism -- Historical Development of Logical Positivism -- Sources of logical positivism -- Meaning of education in existentialism -- Methods of teaching in existentialism -- Logical Positivism and the Way We Think -- Metaphysics of Logical Positivism -- Logical Positivism and the Philosophy of Education…”
    Libro electrónico
  8. 1628
    Publicado 2007
    Tabla de Contenidos: “…-- Basic hypotheses, material and methods of the project -- The importance of seeking to create meaning without guaranteeing that it will lead to a shared meaning -- The psychobiological founded source of musicality of the human being -- Interaction and shared experience -- The esthetical perspective -- Using something else than training as a starting point or laissez faire -- Lasse, an example -- Acknowledgment -- Notes -- References -- To sing and dance together -- Communicative musicality is part of us, the way we converse by moving -- Innate rhythms and expressions of relating -- Moving to move others -- An exact science of musical movement -- Being moved by song -- Coda: A strategy for finding the variables of human sympathy in movement -- Acknowledgements -- References -- On circular re-enactment of care and abuse, and on other-centred moments in psychotherapy -- When toddlers afford proto-care, even altruism -- Basis for circular re-enactment -- Empirical support: Abused toddlers are more likely to become abusive than other toddlers, and many adult abusers have been childhood victims of abuse…”
    Libro electrónico
  9. 1629
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1 - Serverless Essentials -- Chapter 1: Serverless Computing and Function as a Service -- Evolution of computing in the cloud -- Benefits of cloud computing -- CAPEX versus OPEX -- Virtualization, software-defined networking, and containers -- Types of cloud computing -- Cloud service delivery models - IaaS, PaaS, and SaaS -- Serverless and FaaS -- FaaS and BaaS -- Microservice architecture -- Containers, orchestration, and microservices -- Event-driven architecture -- Events -- Structure and components of an EDA -- Benefits of EDA -- Use cases -- Disadvantages -- Brokers -- FaaS in detail - self-hosted FaaS -- Cloud FaaS versus self-hosted FaaS -- API gateways and the rise of serverless API services -- The case for serverless -- Summary -- Chapter 2: Backend as a Service and Powerful Serverless Platforms -- BaaS -- Messaging systems -- Message queues -- Pub-sub -- Message brokers and clusters -- Messaging protocols -- Push versus pull -- Guarantees in messaging -- Dead-letter queues -- Cloud messaging -- Object stores -- Design and features -- Workflow automation -- Cloud workflows -- NoSQL platforms -- Cloud NoSQL platforms -- Edge computing -- PoP -- CDNs -- Serverless at the edge -- IoT clouds -- Stream processing -- Future of serverless -- Trends in serverless -- Summary -- Part 2 - Platforms and Solutions in Action -- Chapter 3: Serverless Solutions in AWS -- Technical requirements -- Useful AWS concepts to know and refresh yourself on -- CloudFormation primer -- Advanced constructs in the CloudFormation template language -- Lambda - FaaS in AWS -- How Lambda works -- Important concepts -- Important configurations -- Lambda programming model -- Edge computing -- API Gateway -- HTTP API -- WebSocket API -- REST API -- Private REST API…”
    Libro electrónico
  10. 1630
    Publicado 2024
    Tabla de Contenidos: “…-- Choosing Go -- Concurrency and goroutines -- Concurrency -- Goroutines -- CSP-inspired model -- Share by communication -- Interacting with the OS -- Tooling -- go build -- go test -- go run -- go vet -- go fmt -- Cross-platform development with Go -- Summary -- Chapter 2: Refreshing Concurrency and Parallelism -- Technical requirements -- Understanding goroutines -- WaitGroup -- Changing shared state -- Managing data races -- Atomic operations -- Mutexes -- Making sense of channels -- How to use channels -- An unbuffered channel -- Buffered channels -- The guarantee of delivery -- Latency -- State and signaling -- State -- Signaling -- Choosing your synchronization mechanism -- Summary -- Part 2: Interation with the OS -- Chapter 3: Understanding System Calls -- Technical requirements -- Introduction to system calls -- The catalog of services and identification -- Information exchange -- The syscall package -- A closer look at the os and x/sys packages -- x/sys package - low-level system calls -- Operating system functionality -- Portability -- Everyday system calls -- Tracing system calls -- Tracing specific system calls -- Developing and testing a CLI program -- Standard streams -- File descriptors -- Creating a CLI application -- Redirections and standard streams -- Making it testable -- Summary -- Chapter 4: File and Directory Operations -- Technical requirements -- Identifying unsafe file and directory permissions -- Files and permissions -- Scanning directories in Go -- Understanding file paths -- Using the path/filepath package -- Traversing directories -- Symbolic links and unlinking files -- Symbolic links - the shortcut of the file world -- Unlinking files - the great escape act…”
    Libro electrónico
  11. 1631
    por OECD
    Publicado 2024
    Tabla de Contenidos: “…The foreign influence activities covered by the scheme should take into account not only influence on decision-making processes, but also on public debate -- 3.2.4. In order to guarantee fundamental freedoms and fluid state-to-state relations, France's scheme on the transparency of foreign influence activities may include a list of legitimate exemptions -- 3.3. …”
    Libro electrónico
  12. 1632
    Publicado 2024
    Tabla de Contenidos: “…Most common vulnerabilities and threats in CI -- Inadequately secured industrial control systems (ICS) -- Common vulnerabilities in industrial control systems (ICS) -- Ransomware targeting CI -- Supply chain attacks on CI components -- Legacy systems and lack of security updates -- Physical security breaches -- Internet of Things (IoT) vulnerabilities -- Summary -- References -- Part 2: Dissecting Cyberattacks on CI -- Chapter 4: The Most Common Attacks Against CI -- DDoS attack -- Volumetric attacks -- Reflection and amplification attacks -- Resource depletion attacks -- Protocol-based attacks -- Application layer attacks -- Ransomware attack -- Infection -- Encryption -- Ransom note -- Ransom payment -- Data recovery -- No guarantee of data recovery -- Supply chain attack -- Scope of attack -- Attack vector -- Stealth and persistence -- Data exfiltration -- Software supply chain attacks -- Hardware supply chain attacks -- Impersonation and trust exploitation -- Mitigation challenges -- Notable examples -- APT -- Phishing -- The anatomy of a phishing attack -- Impersonation and trust exploitation -- Pretexting and urgency -- Mimicking authority figures -- Deception and lure -- Malicious links and attachments -- Why do phishing tactics persist? …”
    Libro electrónico
  13. 1633
    Publicado 2021
    Tabla de Contenidos: “…Easier Parallelization of Algorithms Since C++17 -- Sorting and Output of a Container -- More Convenience with Ranges -- Non-Owning Ranges with Views -- Comparing Two Sequences -- Take Advantage of Boost -- More Libraries That You Should Know About -- Proper Exception and Error Handling -- Prevention Is Better Than Aftercare -- No Exception Safety -- Basic Exception Safety -- Strong Exception Safety -- The No-Throw Guarantee -- An Exception Is an Exception, Literally! …”
    Libro electrónico
  14. 1634
    Publicado 2021
    Tabla de Contenidos: “…The World Bank -- Background and Summary -- Introduction -- Focus on Smallholder Agricultural Development -- The International Development Association in the Context of Bank Instruments -- Lending and Administrative Budget Pressures -- The 1980s: Structural Adjustment and the Debt Crisis Legacy -- The 1990s: "The Lost Decade"-The Wapenhans Report and Debt Relief -- Rising Debt and Debt Relief for Heavily Indebted Countries -- The 2000s: Toward a Food and Financial Crisis -- The Bank's Gender Strategy and Implementation -- The World Bank's Work on Land Policy -- World Development Report 2008: Agriculture for Development -- Crisis Response -- The Bank's Assessment of Its Performance in Agriculture -- Going Forward -- The Bank Going Forward in a Changed Context -- Latest Readjustment for the World Bank -- Appendix A: Chronology of the World Bank -- Appendix B: Role of the International Finance Corporation -- Appendix C: Role of the Multilateral Investment Guarantee Agency -- Appendix D: Independent Evaluation Group and World Bank Project Performance Ratings -- 9. …”
    Libro electrónico
  15. 1635
    Publicado 2024
    Tabla de Contenidos: “…Understanding the major causes of fraud -- Common myths and misconceptions about financial fraud -- Myth 1-the impact of fraud is insignificant -- Myth 2-fraud is very hard to detect -- Myth 3-prosecution completely deters fraud -- Myth 4-preventing fraud is only important for big institutions -- Myth 5-large companies are the common targets of fraud -- Interpreting financial reports -- Horizontal or trend analysis -- Vertical analysis -- Competitor and industry analysis -- Cash flow analysis -- Learning how fraudulent transactions affect overall financial report integrity -- Fictitious revenues -- Improper capitalization of expenses -- Misrepresentation of liabilities and debt -- Detecting and preventing fraudulent transactions and anomalies -- Tone at the top -- Implementing strong internal controls -- Management review -- Ratio analysis -- Utilizing data analytics and machine learning in fraud detection -- Summary -- Further reading -- Part 3: Modern Strategies to Manage the Data Integrity of Finance Systems -- Chapter 8: Using Database Locking Techniques for Financial Transaction Integrity -- Technical requirements -- Getting started with SQL -- Installing PostgreSQL -- Creating a database -- Creating a table -- Inserting data into the table -- Learning how race conditions impact the transaction integrity of financial systems -- Reviewing how database locks prevent financial transaction integrity issues -- Guaranteeing transaction integrity with database locks -- Best practices when using database locks -- Summary -- Further reading -- Chapter 9: Using Managed Ledger Databases for Finance Data Integrity -- Technical requirements -- Introduction to ledger databases -- Creating an AWS account -- Creating an S3 bucket -- Creating the Amazon QLDB ledger -- Reviewing the internals of ledger databases -- Getting the digest -- Creating a table…”
    Libro electrónico
  16. 1636
    Publicado 2025
    Tabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright -- Contents -- About the Editors -- List of Contributors -- Section 1 Introduction to CR-IoV -- 1 Intelligent Transportation System in Cognitive Radio Internet of Vehicles -- 1.1 Introduction -- 1.2 Cognitive Radio in the IoV -- 1.2.1 Cognitive Radio -- 1.2.2 Cognitive Cycle -- 1.3 Applications of CR-based IoV in ITSs -- 1.3.1 Safety -- 1.3.2 Service-Oriented Applications -- 1.4 Application Requirements -- 1.4.1 Delay -- 1.4.2 Guaranteed Delivery -- 1.4.3 Bandwidth -- 1.5 Issues and Challenges -- 1.5.1 Unreliable Delivery -- 1.5.2 Dynamic Topology -- 1.5.3 Routing Overhead -- 1.5.4 Scalability -- 1.5.5 Energy -- 1.5.6 Spectral Efficiency -- 1.6 Conclusion -- References -- Section 2 Machine Learning in CR-IoV -- 2 Machine Learning Applications in CR-IoV -- 2.1 Introduction -- 2.2 Overview of ML Techniques -- 2.2.1 Categorization of ML Techniques -- 2.2.2 Supervised Learning -- 2.2.3 Distributed Training and Inference of ML Models -- 2.3 ML Challenges and Enablers in the CR-IoV -- 2.3.1 Definitions -- 2.3.2 The CR-IoV -- 2.3.3 ML in CR -- 2.3.4 ML in the IoV -- 2.3.5 Towards a ML-Enabled CR-IoV -- 2.4 ML Applications in the CR-IoV -- 2.4.1 Spectrum Sensing and Channel Allocation -- 2.4.2 Road Safety -- 2.4.3 Security Issues -- 2.5 Challenges, Issues, and Future Directions -- 2.5.1 Machine Learning-Related Challenges -- 2.5.2 State and Network Dynamics -- 2.5.3 Multi-Agent RL (MARL) in the CR-IoV -- 2.5.4 Distributed Learning and the CR-IoV -- 2.5.5 Scalability and Universality in the CR-IoV -- 2.6 Conclusion -- References -- Section 3 Protocol and Infrastructure -- 3 Machine Learning Techniques in Conjunction with Data Science Applications for CR-IoV -- 3.1 Introduction -- 3.2 The Communication of CR-IoV -- 3.3 Demand of Machine Learning and Data Science in CR-IoV…”
    Libro electrónico
  17. 1637
    Publicado 2017
    Tabla de Contenidos: “…-- How mature is your organization? -- Helping to guarantee success -- Business alignment -- Information security is a business project not an IT project -- Organizational change management -- Key information security program plan elements -- Develop your information security program strategy -- Establish key initiatives -- Define roles and responsibilities -- Defining enforcement authority -- Pulling it all together -- Summary -- Chapter 6: Continuous Testing and Monitoring -- Types of technical testing -- SDLC considerations for testing -- Project initiation -- Requirements analysis -- System design -- System implementation -- System testing -- Operations and maintenance -- Disposition -- SDLC summary -- Continuous monitoring -- Information security assessment automation -- Effective reporting of information security status…”
    Libro electrónico
  18. 1638
    Publicado 2004
    Tabla de Contenidos: “…Products for near-realtime BI -- 4.1 Data warehousing - Base for BI -- 4.1.1 DB2 - the database of choice -- 4.2 WebSphere MQ for guaranteed data delivery -- 4.2.1 Queue clustering -- 4.2.2 DB2 MQ Listener -- 4.2.3 DB2 MQ functions -- 4.2.4 WebSphere business integration brokers -- 4.3 Information integration -- 4.3.1 DB2 Information Integrator -- 4.3.2 Data replication -- 4.3.3 Data federation -- 4.4 Data transformation -- 4.4.1 DB2 Warehouse Manager -- 4.4.2 Ascential Software -- 4.5 Workload management -- 4.5.1 DB2 Query Patroller for workload management -- 4.5.2 DB2 Governor for resource management -- Chapter 5. …”
    Libro electrónico
  19. 1639
    Publicado 2009
    Tabla de Contenidos: “…-- The Puzzle of the 'Head Count' -- Poverty Beyond the 'Poverty Line' -- Poverty as Capability Deprivation and Lack of Social Opportunity -- Poverty, Hunger and Food Insecurity -- Poverty and Unemployment -- State Planning and the Fight Against Poverty -- Public Distribution System -- Employment Guarantee Schemes -- Economic Growth, Inequality of Opportunity and Regional Disparity -- Exclusion and Social Conflict -- Suggested Readings -- Questions…”
    Libro electrónico
  20. 1640
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1 - Basic MongoDB - Design Goals and Architecture -- Chapter 1: MongoDB - A Database for the Modern Web -- Technical requirements -- The evolution of SQL and NoSQL -- The evolution of MongoDB -- MongoDB for SQL developers -- MongoDB for NoSQL developers -- MongoDB's key characteristics and use cases -- Key characteristics -- Use cases for MongoDB -- MongoDB criticism -- MongoDB configuration and best practices -- Operational best practices -- Schema design best practices -- Best practices for write durability -- Best practices for replication -- Best practices for sharding -- Best practices for security -- Best practices for AWS -- Reference documentation and further reading -- Summary -- Chapter 2: Schema Design and Data Modeling -- Technical requirements -- Relational schema design -- MongoDB schema design -- Data modeling -- Data types -- Modeling data for atomic operations -- Read isolation and consistency -- Modeling relationships -- One-to-one -- One-to-many and many-to-many -- Modeling data for keyword searches -- Modeling data for Internet of Things -- Connecting to MongoDB -- Connecting using Ruby -- Connecting using Python -- Connecting using PHP -- Summary -- Part 2 - Querying Effectively -- Chapter 3: MongoDB CRUD Operations -- Technical requirements -- CRUD using the shell -- Scripting for the mongo shell -- Administration -- MapReduce in the mongo shell -- Aggregation framework -- Securing the shell -- Authentication with MongoDB -- The new mongosh shell -- MongoDB Stable API -- Summary -- Chapter 4: Auditing -- Technical requirements -- Auditing and logging differences -- Audit setup in MongoDB Enterprise Edition -- Audit events and format -- Audit filters -- Audit guarantee -- Audit setup in MongoDB Atlas…”
    Libro electrónico