Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
6741por Nichols, AndrewTabla de Contenidos: “…Trusting measurementAccuracy and precision; Measurement, analysis, and improvement (Section 8); General (subsection 8.1); Monitoring and measurement (subsection 8.2); Customer satisfaction (clause 8.2.1); Internal audits (clause 8.2.2); Monitoring and measurement of processes (clause 8.2.3); Speed; Fuel; Engine condition; Monitoring and measuring of product (clause 8.2.4); Control of nonconforming product (subsection 8.3); Analysis of data (subsection 8.4); Improvement (subsection 8.5); Continual improvement (clause 8.5.1); Corrective action (clause 8.5.2); Preventive action (clause 8.5.3)…”
Publicado 2013
Libro electrónico -
6742por Kac, SergejTabla de Contenidos: “…Application script examples for EnterpriseOne 8.9 with HACMP/ES v5.1 -- 4.1 Application startup scripts -- 4.2 Application shutdown scripts -- 4.3 Application monitor script for application server asJDE -- 4.4 Application monitor settings for application server asJDE -- Chapter 5. …”
Publicado 2005
Libro electrónico -
6743Publicado 2014Tabla de Contenidos: “…1.2.3 Applications of CNT-based sensors for metal ion monitoring1.3 Graphene-based sensors; 1.3.1 Graphene-based electrochemical sensors; 1.3.2 Graphene sensors for pesticides; 1.3.3 Graphene sensors for other pollutants; 1.4 Conclusions and future work; Acknowledgments; References; 2 Advanced Nanosensors for Environmental Monitoring; 2.1 Introduction; 2.2 Nanostructured sensing materials developed; 2.2.1 Incorporation of metal nanoparticles in photopolymerized organic conducting polymers; 2.2.1.1 Polymerization mechanism; 2.2.1.2 Polypyrrole films for vapor sensing…”
Libro electrónico -
6744Publicado 2017Tabla de Contenidos: “…-- Getting ready -- How to do it... -- Working with monitor mode and packet injection -- Getting ready -- How to do it... -- Performing a data replay -- Getting ready -- How to do it... -- Cracking WEP -- Getting ready -- How to do it... -- Phase one - configuring monitor mode -- Phase two - packet injection -- Phase three - capturing IVs -- Phase four - performing a fake authentication -- Phase five - ARP replay mode -- Phase six - obtaining the WEP key…”
Libro electrónico -
6745Publicado 2015Tabla de Contenidos: “…Conclusion -- References -- Chapter 5 - Internal intelligence sources -- Information in This Chapter: -- Introduction -- Asset, vulnerability, and configuration management -- Configuration management -- Network logging -- The trouble with SIEMs -- The power of SIEMs -- Managed security service providers -- Access control -- Network monitoring -- Conclusion -- References -- Chapter 6 - External intelligence sources -- Information in This Chapter: -- Introduction -- Brand monitoring versus intelligence -- Asset, vulnerability, and configuration management -- Network logging -- IP addresses as pivot points -- Domain names as pivot points -- File hashes as pivot points -- Pivoting from MSSP alerts -- Network monitoring -- YARA -- Protecting against zero-day attacks -- Incident response and intelligence -- Collaborative research into threats -- Conclusion -- ReferenceS -- Chapter 7 - Fusing internal and external intelligence -- Information in This Chapter: -- Introduction -- Security awareness training -- Customer security awareness training -- OpenIOC, CyBOX, STIX, and TAXII -- OpenIOC -- CyBOX -- STIX and TAXII -- Threat intelligence management platforms -- TIMPs as a Rosetta Stone -- Big data security analytics -- Hadoop -- Conclusion -- Reference -- Chapter 8 - CERTs, ISACs, and intelligence-sharing communities -- Information in This Chapter: -- Introduction -- CERTs and CSIRTs -- CERT/Coordination Center -- US-CERT and country-level CSIRTs -- Company-level CSIRTs -- ISACs -- The ISACs -- Intelligence-sharing communities -- Conclusion -- References -- Chapter 9 - Advanced intelligence capabilities -- Information in This Chapter: -- Introduction -- Malware analysis -- Why it is a bad idea -- Setting up a malware lab -- Planning the network -- Virtual machines versus cloning -- Getting the malware to the lab -- Malware tools -- System tools -- Sandbox…”
Libro electrónico -
6746Publicado 2011Tabla de Contenidos: “…-- Step 8: Vmware Esx Host License -- Step 9: Guest Os License and Installation Materials -- Step 10: Service Console Network Information -- Step 11: Memory Allocated to the Service Console -- Step 12: Vmkernel Network Information -- Step 13: Number of Virtual Network Switches -- Step 14: Virtual Network Switch Label Name(S) -- Step 15: File System Layouts -- Step 16: Configure the Server and the Fc Hba to Boot From San or Boot From Iscsi -- Step 17: Start Esx/Esxi Host Installations -- Step 18: Connecting to the Management User Interface for the First Time -- Step 19: Third-Party Tools to Install -- Step 20: Additional Software Packages to Install -- Step 21: Patch Esx or Esxi -- Step 22: Guest Operating System Software -- Step 23: Guest Operating System Licenses -- Step 24: Network Information for Each Guest Operating System -- Step 25: Guest Upgrades -- Automating Installation -- Exi 4.1 -- Esx 4 -- Kickstart Directives -- Conclusion -- Chapter 4 Auditing And Monitoring -- Auditing Recipe -- Esx and Esxi -- Esx -- Esxi -- Auditing Conclusion -- Monitoring Recipe -- Host Hardware Monitoring -- Virtual Machine State Monitoring -- Network Monitoring -- Performance Monitoring -- Application Monitoring -- Security Monitoring -- Esx-Specific Auditing and Monitoring Concerns -- Vmkernel Considerations -- Vmotion and Fault Tolerance Considerations -- Other Esx Considerations…”
Libro electrónico -
6747Publicado 2001Tabla de Contenidos: “…(I-Am-In) -- Throw Core -- Veritas Disk Check -- Disk-Space Checker -- Port Monitor -- Service Monitoring -- Web Content -- SMTP and POP3 -- DNS -- More Monitoring Suggestions -- Pinging with Cisco -- Simple SNMP Agent -- Switch Port Control -- Wireless Networking -- SNMP: The Object-Oriented Way -- Extending SNMP::Info -- Final Words -- MRTG -- Using MRTG…”
Libro electrónico -
6748por Dikmans, LonnekeTabla de Contenidos: “…Find services -- Troubleshooting -- Change process -- Registries and repositories in your IT landscape -- Enterprise architecture tools -- Business Process Management tool -- Configuration Management Database -- Bug and issue tracker system -- ESB -- Business Activity Monitoring -- Infrastructure monitoring -- Summary -- 9. …”
Publicado 2012
Libro electrónico -
6749Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: Profiling Cyber Adversaries and Their Tactics -- Types of threat actors -- Summary of threat actor categories -- Motivations and objectives of threat actors -- Tactics, Techniques, and Procedures (TTPs) -- Real-world examples of cyberattacks and consequences -- Nation-state actors: NotPetya attack (2017) -- Nation-state actors: SolarWinds supply chain attack -- Cybercriminals: WannaCry ransomware attack (2017) -- Cybercriminals: Colonial Pipeline ransomware attack -- Summary -- Chapter 2: Identifying and Assessing Organizational Weaknesses -- Understanding organizational weaknesses and vulnerabilities -- Types of organizational weaknesses -- Types of organizational vulnerabilities -- Real-world examples -- Techniques for identifying and assessing weaknesses -- Security audits -- Vulnerability assessments -- Threat modeling -- Penetration testing -- Social engineering tests -- Conducting risk assessments -- Risk assessment methodologies -- Identifying assets and establishing the scope -- Prioritizing risks and developing mitigation strategies -- Documentation and reporting -- Monitoring and reviewing -- Prioritizing and remediating weaknesses -- Understanding risk and impact levels -- Risk mitigation strategies -- Attack surface reduction -- Continuous monitoring and reassessment -- Summary -- Chapter 3: Staying Ahead: Monitoring Emerging Threats and Trends -- The importance of monitoring emerging threats and trends -- Understanding the cybersecurity landscape -- The risks of emerging threats -- The role of threat intelligence -- From awareness to action -- The attacker's mindset -- The significance of understanding the attacker's perspective -- Motivations and objectives of attackers -- Psychological and behavioral traits of attackers…”
Libro electrónico -
6750por Lonergan, Bernard J. F.Tabla de Contenidos: “…1971""; ""1 The General Character of the Natural Theology of Insight""; ""1 Presuppositions""; ""2 Insight's Argument and Traditional Formulations""; ""3 'The Real Is Completely Intelligible'""; ""4 The Existence of God""; ""2 Horizons""; ""1 Self-transcendence as the Possibility of Horizon""; ""2 Intentional Response and Values""; ""3 Judgments of Value""; ""4 Faith""; ""Questions""; ""3 Faith and Beliefs""; ""1 Man's Capacity for Religious Involvement""; ""2 What Is Religious Involvement?""…”
Publicado 2004
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
6751
-
6752por OECDTabla de Contenidos: “…The strategic use of policy instruments -- Regulatory policy and governance -- Budgetary Governance -- Core questions for consideration -- Additional resources -- References -- 4 Toward sound policy implementation -- Managing implementation -- Public service leadership and skills for implementation -- Better service design and delivery through digital government -- Public Procurement as a strategic lever to pursue policy objectives -- Public-Private partnerships (PPPs) and public-civil partnerships -- Agile and innovative approaches to policy and service delivery -- A strategic approach to the implementation of the SDGs -- Core questions for consideration -- Monitoring performance -- Monitoring government-wide policy priorities -- Monitoring financial performance and budget execution -- Measuring regulatory performance and ensuring implementation -- Building robust governance indicators -- Core questions for consideration -- Additional resources: -- References -- 5 Toward robust policy evaluation -- Building an institutional framework for policy evaluation -- Promoting the quality and use of evaluations -- Reviewing the impact of regulations -- Core questions for consideration -- Additional resources -- References…”
Publicado 2020
Libro electrónico -
6753Publicado 1994Tabla de Contenidos: “…Cytogenetic Monitoring in Hungary…”
Libro electrónico -
6754Publicado 2016Tabla de Contenidos: “…Cluster services and performanceMonitoring the node status; Monitoring the resources; When a resource refuses to start; Checking the availability of core components; Summary; Chapter 6: Measuring and Increasing Performance; Setting up a sample database; Downloading and installing the Employees database; Introducing initial cluster tests; Test 1 - retrieving all fields from all records; Test 2 - performing JOIN operations; Performing a failover; Measuring and improving performance; Apache's configuration and settings; Loading and disabling modules…”
Libro electrónico -
6755Publicado 2017Tabla de Contenidos: “…Intro -- Title Page -- Copyright -- Dedication -- Table of Contents -- Preface -- About the Companion Website -- List of Abbreviations -- Chapter 1: Introduction -- 1.1 System Overview -- 1.2 Example: A Wireless Electrocardiogram -- 1.3 Organisation of the Book -- Chapter 2: Applications -- 2.1 Civil Infrastructure Monitoring -- 2.2 Medical Diagnosis and Monitoring -- 2.3 Water-quality Monitoring -- References -- Chapter 3: Conditioning Circuits -- 3.1 Voltage and Current Sources -- 3.2 Transfer Function -- 3.3 Impedance Matching -- 3.4 Filters -- 3.5 Amplification -- References -- Chapter 4: Electrical Sensing -- 4.1 Resistive Sensing -- 4.2 Capacitive Sensing -- 4.3 Inductive Sensing -- 4.4 Thermoelectric Effect -- References -- Chapter 5: Ultrasonic Sensing -- 5.1 Ultrasonic Wave Propagation -- 5.2 Wave Equation -- 5.3 Factors Affecting Ultrasonic Wave Propagation -- References -- Chapter 6: Optical Sensing -- 6.1 Photoelectric Effect -- 6.2 Compton Effect -- 6.3 Pair Production -- 6.4 Raman Scattering -- 6.5 Surface Plasmon Resonance -- References -- Chapter 7: Magnetic Sensing -- 7.1 Superconducting Quantum Interference Devices -- 7.2 Anisotropic Magnetoresistive Sensing -- 7.3 Giant Magnetoresistance -- 7.4 Tunnelling Magnetoresistance -- 7.5 Hall-effect Sensing -- References -- Chapter 8: Medical Sensing -- 8.1 Excitable Cells and Biopotentials -- 8.2 Cardiac Action Potentials -- 8.3 Brain Action Potentials -- References -- Chapter 9: Microelectromechanical Systems -- 9.1 Miniaturisation and Scaling -- 9.2 Technology -- 9.3 Micromachining -- 9.4 System Integration -- 9.5 Micromechanical Sensors -- References -- Chapter 10: Energy Harvesting -- 10.1 Factors Affecting the Choice of an Energy Source -- 10.2 Architecture -- 10.3 Prototypes -- References -- Chapter 11: Sensor Selection and Integration -- 11.1 Sensor Selection…”
Libro electrónico -
6756Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Workspace Structure -- How Android Studio differs -- Workspace structure -- Editor windows -- Tool windows -- The Android SDK -- Virtual devices -- Instant Run -- Importing projects into Android Studio -- Summary -- Chapter 2: UI Design -- The Layout Editor -- Linear and relative layout classes -- The constraint layout -- Creating a ConstraintLayout -- Applying constraints -- Graphic Properties tool -- Baseline alignment -- Controlling position with bias -- The constraints toolbar -- Multiple screen previewing -- Hardware profiles -- Virtual storage -- Summary -- Chapter 3: UI Development -- Material design -- Android styles -- Material themes -- The& -- #160 -- Theme Editor -- XML fonts -- The design library -- The coordinator layout -- Snackbars and Floating Action Buttons -- Collapsing app bars -- Raw text resources -- The percent library -- Summary -- Chapter 4: Device Development -- Screen orientation -- Virtual devices -- Layout and image qualification -- Scale and platform -- Alternative emulators -- Android Wear -- Connecting to a wearable AVD -- Wearable layouts -- The WatchViewStub class -- Shape - aware layouts -- Accessing sensors -- Sensor emulation -- Device monitoring -- Project templates -- Monitoring and profiling -- Summary -- Chapter 5: Assets and Resources -- Asset Studio -- Image Asset Studio -- Layered icons -- Launcher icon tools -- Vector Asset Studio -- Vector drawables -- Animated icons -- Other animations -- General drawables -- The palette library -- Summary -- Chapter 6: Templates and Plugins -- Project templates -- The Navigation Drawer template -- The Structure Explorer -- Class inspection plugins -- The Master/Detail Flow template -- Custom templates…”
Libro electrónico -
6757por Antognini, Christian. authorTabla de Contenidos: “…""Implementing Generic Tables""""Not Using Constraints to Enforce Data Integrity""; ""Lack of Physical Database Design""; ""Not Choosing the Right Data Type""; ""Not Using Bind Variables Correctly""; ""Not Using Advanced Database Features""; ""Not Using PL/SQL for Data-Centric Processing""; ""Performing Unnecessary Commits""; ""Steadily Opening and Closing Database Connections""; ""Do You Have Performance Problems?""; ""System Monitoring""; ""Response-Time Monitoring""; ""Compulsive Tuning Disorder""; ""How Do You Approach Performance Problems?""…”
Publicado 2014
Libro electrónico -
6758por Dulaney, Emmett A.Tabla de Contenidos: “…Understanding Network ProtocolsThe Basics of Cabling, Wires, and Communications; Employing Removable Storage; Summary; Exam Essentials; Hands-On Labs; Review Questions; Answers to Review Questions; Chapter 4: Monitoring Activity and Intrusion Detection; Monitoring the Network; Understanding Intrusion Detection Systems; Working with Wireless Systems; Understanding Instant Messaging's Features; Working with 8.3 File Naming; Understanding Protocol Analyzers; Understanding Signal Analysis and Intelligence; Summary; Exam Essentials; Hands-On Labs; Review Questions; Answers to Review Questions…”
Publicado 2009
Libro electrónico -
6759
-
6760por Institute of Medicine (U.S.).Tabla de Contenidos: “…Notification; Participation; Access; Physical Environment; NOTE ON STAFFING STANDARDS; General; Social Services; Licensed and Registered Nurses; 4 Monitoring Nursing Home Performance ; THE ISSUES; PROBLEMS WITH THE SURVEY PROCESS; Predictability; Inefficiency; Paper Compliance; Insensitivity to Resident Needs; Inconsistency; Isolation from Related Monitoring Processes; Variable State Regulatory Capacity; REDESIGNING THE SURVEY PROCESS; Consolidation of Medicare and Medicaid Survey Procedures; Timing and Frequency of Surveys; Two-Stage Survey Approach; The Resident Assessment Audit…”
Publicado 1986
Libro electrónico