Mostrando 381 - 400 Resultados de 495 Para Buscar 'Kassassin~', tiempo de consulta: 1.65s Limitar resultados
  1. 381
    por Hagestad, William T., II
    Publicado 2012
    Tabla de Contenidos: “…Information Warfare: A new form of people's warIdeas Guide Action; Information War Depends on the Integrity of the Information System; Chapter 6: Chinese CyberWarfare Doctrines; Chinese Cyberwarfare Doctrinal Development; Importance of Information Warfare; Goals of Chinese Information Warfare; Integrated Network Electronic Warfare (INEW); The 'Three Warfares' concept; The PRC's concept of 21st century warfare; Secrecy and Deception in PLA Military Strategy; Asymmetric Warfighting; Assassin's Mace Programs; Major General Dai Qingmin's Cyberwar; Conclusions…”
    Libro electrónico
  2. 382
    por Murphy, Brenda, 1950-
    Publicado 2014
    Tabla de Contenidos: “…Two Streetcars in Evolutionary PerspectiveStreetcar in a Changing American Culture; Dynamic Processing in 1947 and 1951; Conclusion; A Broken Romance: Tennessee Williams and America's Mid-Century Theatre Culture; "Stupidity is no longer profitable": Williams and his Critics, 1937-1948; "A radical departure": Williams and his Critics, 1951-1958; "A butterfly to a cannon": Williams and his Critics, 1959 and Beyond; "Assassins, before, now, and after": Conclusion; "A Vast Traumatic Eye": Culture Absorbed and Refigured in Tennessee Williams's Transitional Plays…”
    Libro electrónico
  3. 383
    Publicado 2016
    Tabla de Contenidos: “…Installing and configuring OpenStackReferences; Summary; Chapter 8: Configuration Management; Introducing configuration management; Open source configuration management tools; Chef; SaltStack (Salt); Ansible; Puppet; Installing and configuring Puppet; References; Summary; Chapter 9: Some Additional Tricks and Tools; SSH for remote connection; Securing SSH and the root login configuration; SSH key-based authentication; Installing and configuring SpamAssassin ; Setting up the Clamav antivirus; Configuring Mytop for a MySQL database; Setting up Samba and NFS for file sharing…”
    Libro electrónico
  4. 384
    por Adelstein, Tom
    Publicado 2007
    Tabla de Contenidos: “…Providing Domain Name ServicesAdding a Relational Database: MySQL; Configuring Mail Securely with Postfix, POP3, and IMAP; Putting Apache to Work; Adding FTP Services with ProFTPD; Summarizing Your Web Statistics with Webalizer; Synchronizing the System Clock; Installing Perl Modules Needed by SpamAssassin; What's Next; The Domain Name System; DNS Basics; Advantages of Localized DNS Administration; Getting into the BIND; Components of BIND; Setting Up a DNS Server; Using a chroot Environment for Security; Configuring an Authoritative DNS Server; Your Responsibility in DNS…”
    Libro electrónico
  5. 385
    por Parks, Dave
    Publicado 2011
    Tabla de Contenidos: “…Title Page; Copyright Page; Dedication Page; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; CHAPTER 1 Overview Health Care Reform Past and Future; Quick History of Health Care Insurance; World War II Spurs Insurance Growth; Assassination Turns Nation to Medicare; America's Breathtaking Rise of Medical Care Costs; Political Primer on Health Care Reform; Health Care Enters the 2008 Presidential Campaign; Washington Battles over Health Care Reform; Obama Targets Insurers Despite Their Support; Health Care Reform Summary, Schedule…”
    Libro electrónico
  6. 386
    Publicado 2015
    Tabla de Contenidos: “…Metric System: Key Customer MetricsAnalyze This: Using Correlation Analysis; Sheer Perfection: Using Customer Experience to Mold the "Perfect Customer"; That'll Cost You: The High Price of Poor Customer Experience; Chapter 3: Identifying Customer Experience Killers; Three Universal Actions That Kill Customer Experience; The know-nothing ninja; The shuffling assassin; The ownership killer; Battling an Inside-Out Perspective; "They're All Crooks!" …”
    Libro electrónico
  7. 387
    Publicado 2021
    Tabla de Contenidos: “…EL VINO DE LOS TRAPEROS -- CVI. LE VIN DE L'ASSASSIN - CVI. EL VINO DEL ASESINO -- CVII. LE VIN DU SOLITAIRE - CVII. …”
    Libro electrónico
  8. 388
    Publicado 2016
    Tabla de Contenidos: “…Mario Lentano, Parlare di Cicerone sotto il governo del suo assassino. Una lettura della controversia VII, 2 di Seneca e la politica Augustea della memoria ; Gianluca Ventrella, Da esercizio retorico a realtà vivente : la declamazione contro i tiranni nella polemica anti-domizianea di Dione di Prusa (Or. 6) ; Pascale Fleury, Évanescence de la déclamation dans le corpus frontonien ; Estelle Oudot, La déclamation chez Ælius Aristide : un lieu possible pour une nouvelle histoire d'Athènes?…”
    Electrónico
  9. 389
    Publicado 2017
    Tabla de Contenidos: “…How to Build Robust AI for Your Game / section II Architecture -- chapter 8 Modular AI / chapter 9 Overcoming Pitfalls in Behavior Tree Design / chapter 10 From Behavior to Animation -- A Reactive AI Architecture for Networked First-Person Shooter Games / chapter 11 A Character Decision-Making System for FINAL FANTASY XV by Combining Behavior Trees and State Machines / chapter 12 A Reusable, Light-Weight Finite-State Machine / chapter 13 Choosing Effective Utility-Based Considerations / chapter 14 Combining Scripted Behavior with Game Tree Search for Stronger, More Robust Game AI / section III Movement and Pathfinding -- chapter 15 Steering against Complex Vehicles in Assassins Creed Syndicate / chapter 16 Predictive Animation Control Using Simulations and Fitted Models / chapter 17 Fast Cars, Big City -- The AI of Driver San Francisco / chapter 18 A Unified Theory of Locomotion / chapter 19 RVO and ORCA -- How They Really Work / chapter 20 Optimization for Smooth Paths / chapter 21 3D Flight Navigation Using Sparse Voxel Octrees / chapter 22 Faster A* with Goal Bounding / chapter 23 Faster Dijkstra Search on Uniform Cost Grids / section IV Tactics and Strategy -- chapter 24 Being Where It Counts -- Telling Paragon Bots Where to Go / chapter 25 Combat Outcome Prediction for Real-Time Strategy Games / chapter 26 Guide to Effective Auto-Generated Spatial Queries / chapter 27 The Role of Time in Spatio-Temporal Reasoning -- Three Examples from Tower Defense / chapter 28 Pitfalls and Solutions When Using Monte Carlo Tree Search for Strategy and Tactical Games / chapter 29 Petri Nets and AI Arbitration / chapter 30 Hierarchical Portfolio Search in Prismata / section V Character Behavior -- chapter 31 Behavior Decision System -- Dragon Age Inquisitions Utility Scoring Architecture / chapter 32 Paragon Bots -- A Bag of Tricks / chapter 33 Using Your Combat AI Accuracy to Balance Difficulty / chapter 34 1000 NPCs at 60 FPS / chapter 35 Ambient Interactions -- Improving Believability by Leveraging Rule-Based AI / chapter 36 Stochastic Grammars -- Not Just for Words! …”
    Libro electrónico
  10. 390
    Tabla de Contenidos: “…-- INTRODUCTION -- Objective -- Rationale -- CONCEPTUAL DISCOURSES -- Terror -- On Terrorism -- Political Terrorism -- Criminal Terrorism -- Repressive Terrorism -- Revolutionary Terrorism -- Sub-revolutionary Terrorism -- State Terrorism -- Violence and Political Violence -- Terrorism and Liberation Activities: The Politics Of Nomenclature -- Spectrum of Political Conflict -- THE NATURE OF TERRORISM -- Anatomy of Terrorism -- Manifestations of Terrorism -- Some Cases of Terrorism -- The Entebbe Affair -- The Beirut and Rome Operations -- Political Terrorism in Cotonou -- Action aguinst Geneva Peace Conference -- Terrorism against OAU Heads -- Hijacking of a British Airliner -- The Black Septembist Munich Terrorism -- Terrorism by drug barons in Bogota -- Assassination of Prime Minister Rabin -- United States Embassy Bombings -- West Jerusalem Bombing -- World Trade Center Destruction -- Bombing of London City -- Algeria -- IMPLICATIONS OF TERRORISM FOR NATIONAL SECURITY -- Uses/Goals and consequences of terrorism -- Courter terrorism measures -- TERRORISM: AN OVERVIEW OF THE NIGERIAN EXPERIENCE -- TERRORISM AS AN EMERGING THREAT TO GOOD GOVERNANCE, SUSTAINABLE DEVELOPMENT, DEMOCRACY, PROSPERITY AND NATIONAL SURVIVAL: THE CASE OF THE UNITED STATES -- THE MANAGEMENT OF TERRORISM IN CORPORATE ORGANIZATIONS -- Preventive Measures -- Measures For Avoidance of Terrorist Attacks -- Measures For Handling Terrorist Attacks -- Situation Control -- Strategy Review -- CONCLUSION -- APPENDIX I -- APPENDIX II -- THE WORKING OF A BOMB AND PREVENTIVE MEASURES -- Terror as a political weapon: reflections on the bomb explosions in Abacha's Nigeria -- Introduction -- Définition of Terrorism -- The Political Antecedents and Dimensions of the Bomb Attacks -- Who were the Terrorists? …”
    Libro electrónico
  11. 391
    Publicado 2020
    “…It offers an in-depth analysis of historical writing, society and politics in the pan-European period of crisis and change called the Age of Nationalism Marie de Médicis (1575-1642), reine de France, est restée dans les mémoires comme une souveraine incapable, obsédée par le pouvoir et soupçonnée d'avoir assassiné son mari. Ses actions culturelles et politiques ont souvent été réduites à une parenthèse féminine et italienne entre le règne d'Henri IV et le ministériat de Richelieu. …”
    Libro electrónico
  12. 392
    Publicado 2006
    Tabla de Contenidos: “…Adler -- Classified federal records and the end of the Cold War : the experience of the Assassination Records Review Board / William L. Joyce -- "Just a car" : the Kennedy car, the Lincoln chair, and the study of objects / Judith E. …”
    Libro
  13. 393
    Publicado 2018
    Tabla de Contenidos: “…jvm.options -- logback.xml -- Managing a deployment pipeline -- Orchestration tools -- Configuration management tools -- Recommended approach -- Local repository for downloadable files -- Summary -- Chapter 5: Performance Tuning -- Cassandra-Stress -- The Cassandra-Stress YAML file -- name -- size -- population -- cluster -- Cassandra-Stress results -- Write performance -- Commitlog mount point -- Scaling out -- Scaling out a data center -- Read performance -- Compaction strategy selection -- Optimizing read throughput for time-series models -- Optimizing tables for read-heavy models -- Cache settings -- Appropriate uses for row-caching -- Compression -- Chunk size -- The bloom filter configuration -- Read performance issues -- Other performance considerations -- JVM configuration -- Cassandra anti-patterns -- Building a queue -- Query flexibility -- Querying an entire table -- Incorrect use of BATCH -- Network -- Summary -- Chapter 6: Managing a Cluster -- Revisiting nodetool -- A warning about using nodetool -- Scaling up -- Adding nodes to a cluster -- Cleaning up the original nodes -- Adding a new data center -- Adjusting the cassandra-rackdc.properties file -- A warning about SimpleStrategy -- Streaming data -- Scaling down -- Removing nodes from a cluster -- Removing a live node -- Removing a dead node -- Other removenode options -- When removenode doesn't work (nodetool assassinate) -- Assassinating a node on an older version -- Removing a data center -- Backing up and restoring data -- Taking snapshots -- Enabling incremental backups -- Recovering from snapshots -- Maintenance -- Replacing a node -- Repair -- A warning about incremental repairs -- Cassandra Reaper -- Forcing read repairs at consistency - ALL -- Clearing snapshots and incremental backups -- Snapshots -- Incremental backups -- Compaction…”
    Libro electrónico
  14. 394
    por Persse, James R., 1957-
    Publicado 2006
    Tabla de Contenidos: “…The Drill Sergeant; 3.10.6. The Assassin; 3.10.7. The Element of Change; 3.11. Helpful Change Agent Skills; 3.11.2. …”
    Libro electrónico
  15. 395
    Publicado 2015
    Tabla de Contenidos: “…2.6.1 Hybrid between Video and Digital Cinema2.6.2 Use in Independent Productions; 2.6.3 Use in Special Cases; 2.6.4 Pros and Cons; 2.6.5 Technicolor Cinestyle; 2.6.6 Magic Lantern; 2.6.7 Documentary Short: Baby Faced Assassin; Part 3 Best Practices for Production; 3.1 The Digital Loader and the Digital Imaging Technician (DIT); 3.1.1 Origins of the DIT; 3.1.2 Digital Loader; 3.1.3 Digital Imaging Technician; 3.1.4 Data Management Tools; 3.2 Data Management in Practice; 3.2.1 Checksum Verification; 3.2.2 Shot Verification (against Script Supervisor Report); 3.2.3 Back-Up to Redundant Drives…”
    Libro electrónico
  16. 396
    por Antenhofer, Christina
    Publicado 2024
    Tabla de Contenidos: “…-- Perpetuierung tradierter Geschlechtervorstellungen - Eine Fragestellung -- Alte Gebäude in neuem (Erziehungs‐)Gewand -- Arbeit und Freiräume machen Geschlechter -- Die wohnende Frau, der arbeitende Mann -- Räumliche und geschlechtsspezifische Aspekte der Anstaltsrichtlinien -- Schlussüberlegungen -- Die Okkupation des Raumes -- Sophie Taeuber‐Arp for Greatness -- Performance und Performativität -- Raum -- Fazit -- Performanz -- Die Maske des Ahnen -- 1 Einleitung -- 2 Imago, cera, eikōn: Maske aus Wachs und Abbild des Ahnen -- 3 Die anwesenden Abwesenden -- 3.1 Imagines maiorum und die pompa funebris -- 3.2 Die Masken im Atrium -- 3.3 Die Maske des Ahnen - ein wertvolles Gut -- 4 Fazit: Sozialisation junger »ehrgeiziger« Römer -- 5 Abkürzungen antiker Quellen -- Live Like a Viking -- Einleitung: »When you leave here, you'll leave as Vikings« -- Historische Authentizität in den Historical Game Studies -- Ein Gefühl von Geschichte: Authentizität als Marketingtechnik -- LikeAViking: Assassin's Creeds Versprechen vom Geschichtstourismus -- Narrative und spielmechanische Techniken von Genderkonstruktionen entlang des Gegensatzes Wikinger:innen und Christentum -- Fazit -- Autor:innen -- Personenregister…”
    Libro electrónico
  17. 397
    Publicado 2020
    Libro electrónico
  18. 398
    Publicado 2005
    Tabla de Contenidos: “…Hagiografía y alusión en la poesía lírica devota de la contrarreforma / La hagiografía en las relaciones de milagros publicadas en el siglo XVII / Las adaptaciones de las vidas de santo en la poesía de José Pérez de Montoro / La vida de santa Rosalía: de la ópera sacra italiana a la comedia de santos española / Imagen y hagiografía en el Madrid del siglo xvn: La difusión del culto al Padre Simón de Rojas / Pros y contras de la influencia gongorina en el Triunfo parténico (1683) de Sigüenza y Gongo / Le silence éloquent d'une sainte: la Farce de sainte Barbe de Diego Sánchez de Badajoz / Tipología de los sermones a San Justo y San Pastor / La vida, el martirio, la invención, las grandezas y las translaciones de los gloriosos niños mártires San Justo y Pastor de Ambrosio de Morales: una hagiografía en movimiento / Saint Pedro Arbués, l'inquisiteur assassiné / Los estilos de la relación de milagro: algunos ejemplos de escritura diferenciada de los milagros de la Virgen de Guadalupe de los siglos XV a XVII / La lectura del espejo sagrado: una hermenéutica del Flos sanctorum de Pedro de Ribadeneyra / L'Espagne chrétienne dans le miroir de l'hagiographie de la fin de l'Antiquité: martyrs et saints espagnols connus de Grégoire de Tours à la fin du VIe siècle / Elementos hagiográficos en la propaganda francófoba de 1635 / El concepto de santidad en la comedia áurea. …”
    Libro electrónico
  19. 399
    Publicado 2011
    Tabla de Contenidos: “…Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 17: CONFIGURING AND MONITORING A LAN -- Setting Up the Hardware -- Configuring the Systems -- NetworkManager: Configures Network Connections -- Setting Up Servers -- Introduction to Cacti -- More Information -- Chapter Summary -- Exercises -- Advanced Exercises -- PART V: USING CLIENTS AND SETTING UP SERVERS -- CHAPTER 18: OPENSSH: SECURE NETWORK COMMUNICATION -- Introduction to OpenSSH -- Running the ssh, scp, and sftp OpenSSH Clients -- Setting Up an OpenSSH Server (sshd) -- Troubleshooting -- Tunneling/Port Forwarding -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 19: FTP: TRANSFERRING FILES ACROSS A NETWORK -- Introduction to FTP -- Running the ftp and sftp FTP Clients -- Setting Up an FTP Server (vsftpd) -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 20: EXIM4: SETTING UP MAIL SERVERS, CLIENTS, AND MORE -- Introduction to exim4 -- Setting Up a Mail Server (exim4) -- Working with exim4 Messages -- Configuring an exim4 Mail Server -- SpamAssassin -- Additional Email Tools -- Authenticated Relaying -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 21: NIS AND LDAP -- Introduction to NIS -- Running an NIS Client -- Setting Up an NIS Server -- LDAP -- Setting Up an LDAP Server -- Other Tools for Working with LDAP -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 22: NFS: SHARING FILESYSTEMS -- Introduction to NFS -- Running an NFS Client -- Setting Up an NFS Server -- automount: Mounts Directory Hierarchies on Demand -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 23: SAMBA: LINUX AND WINDOWS FILE AND PRINTER SHARING -- Introduction to Samba -- Setting Up a Samba Server -- Working with Linux Shares from Windows -- Working with Windows Shares from Linux -- Troubleshooting -- Chapter Summary -- Exercises…”
    Libro electrónico
  20. 400
    por Jonoska, Nataša, 1961-
    Publicado 2023
    Tabla de Contenidos: “…2 Sociobiology -- 3 Prior DNA Nanorobots -- 3.1 Prior DNA Walkers -- 3.2 Prior Programmable DNA Nanorobots -- 3.3 Prior Autonomous DNA Walkers that Do Molecular Cargo-Sorting on a 2D Nanostructure -- 4 Design and Simulation of Social DNA Nanorobots -- 4.1 Social DNA Nanorobot Behaviors Designed and Simulated -- 4.2 Software for Stochastic Simulations of the Social DNA Nanorobots Behaviors -- 4.3 A Prior DNA Nanorobot that Autonomously Walks -- 4.4 Prior Demonstrated Technique for Hybridization Inhibition of Short Sequences Within the Hairpin Loops -- 4.5 A Novel DNA Nanorobot that Executes a Self-Avoiding Walk -- 4.6 Flocking: Novel DNA Nanorobots that Follow a Leader -- 4.7 Novel DNA Nanorobots that Vote by Assassination -- 5 Discussion -- 5.1 Further Development of Simulation Software for Social Nanorobots -- 5.2 Experimental Demonstrations of Social DNA Nanorobots -- 5.3 Further Social DNA Nanorobot Behaviors -- 5.4 Communication Between Distant Social Nanorobots -- References -- Models of Gellular Automata -- 1 Introduction: Why Cellular Automata? …”
    Libro electrónico