Mostrando 41,321 - 41,340 Resultados de 51,016 Para Buscar 'Nontron~', tiempo de consulta: 1.56s Limitar resultados
  1. 41321
    Publicado 2007
    Tabla de Contenidos: “….] -- Habitat and landscape factors associated with neotropical waterbird occurrence and richness in wetland fragments / Demetrio Luis Guadagnin, Leonardo Maltchik -- Livestock husbandry as a tool for carnivore conservation in Africa's community rangelands : a case-control study / Rosie Woodroffe ... [et al.] -- Comparison of funding and demand for the conservation of the charismatic koala with those for the critically endangered wombat Lasiorhinus krefftii / Clem Tisdell and Hemanath Swarna Nantha -- Nest site selection in middle and great spotted woodpeckers Dendrocopos medius & D. major : implications for forest management and conservation / Gilberto Pasinelli -- An evaluation of the contribution of cultivated allspice (Pimenta dioca) to vertebrate biodiversity conservation in Nicaragua / David I. …”
    Libro
  2. 41322
    Publicado 2006
    Tabla de Contenidos: “…Roseff -- Blood storage / Ian Chin-Yee and Richard K. Spence -- Quality control and hospital blood utilization / Kathleen Walsh-Kaminsky -- Preoperative autologous donation / Francesco Mercuriali, Giovanni Inghilleri and Richard K. …”
    Libro
  3. 41323
    por Mangas Martín, Araceli
    Publicado 2016
    “…El Tratado de Funcionamiento de la Unión establece detalladamente las políticas, la delimitación de las competencias y los procesos de decisión y control. Posteriormente, la crisis económico-financiera y de las deudas soberanas propiciaron nuevas reformas mediante nuevos Tratados e importantes novedades en el Derecho derivado y desarrollos jurisprudenciales. …”
    Libro
  4. 41324
    Publicado 2017
    Tabla de Contenidos: “…273 7.2 Electronic Communications Privacy Act 275 7.2.1 Stored Communications Act 276 7.2.1.1 Section 2701: Third-Party Hacking of Stored Communications 278 7.2.1.2 Section 2702: Restrictions on Service Providers' Ability to Disclose Stored Communications and Records to the Government and Private Parties 279 7.2.1.2.1 The Cybersecurity Act of 2015: Allowing Service Providers to Disclose Cybersecurity Threats to the Government 282 7.2.1.3 Section 2703: Government's Ability to Force Service Providers to Turn Over Stored Communications and Customer Records 284 7.2.2 Wiretap Act 286 7.2.3 Pen Register Act 290 7.2.4 National Security Letters 291 7.3 Communications Assistance for Law Enforcement Act (CALEA) 293 7.4 Encryption and the All Writs Act 294 8 Cybersecurity and Federal Government Contractors 299 8.1 Federal Information Security Management Act 300 8.2 NIST Information Security Controls for Government Agencies and Contractors 301 8.3 Classified Information Cybersecurity 306 8.4 Covered Defense Information and Controlled Unclassified Information 309 9 Privacy Laws 317 9.1 Section 5 of the FTC Act and Privacy 318 9.2 Health Insurance Portability and Accountability Act 324 9.3 Gramm-Leach-Bliley Act and California Financial Information Privacy Act 326 9.4 CAN-SPAM Act 327 9.5 Video Privacy Protection Act 328 9.6 Children's Online Privacy Protection Act 330 9.7 California Online Privacy Laws 332 9.7.1 California Online Privacy Protection Act (CalOPPA) 332 9.7.2 California Shine the Light Law 333 9.7.3 California Minor "Eraser Law" 335 9.8 Illinois Biometric Information Privacy Act 337 10 International Cybersecurity Law 339 10.1 European Union 340 10.2 Canada 346 10.3 China 350 10.4 Mexico 353 10.5 Japan 356 Appendix A: Text of Section 5 of the FTC Act 361 Appendix B: Summary of State Data Breach Notification Laws 369 Appendix C: Text of Section 1201 of the Digital Millennium Copyright Act 413 Appendix D: Text of the Computer Fraud and Abuse Act 425 Appendix E: Text of the Electronic Communications Privacy Act 433 Index 485.…”
    Libro electrónico
  5. 41325
    por Guerra Soto, Mario
    Publicado 2016
    Tabla de Contenidos: “…CIFRADO HÍBRIDO -- 9.7 RESUMEN (HASHING) -- 10 AUTENTICACIÓN Y CONTROL DE ACCESO -- 10.1 FILTRADO DE SEGURIDAD -- 10.1.1 LISTAS DE CONTROL DE ACCESOS DE RED (ACL) -- 10.1.2 FILTRADO DE PUERTOS -- 10.2 CONTROLES DE SEGURIDAD EN EL MODELO TCP/IP -- 10.2.1 SEGURIDAD EN LA CAPA DE RED -- 10.2.2 VPN -- 10.2.3 SSL y -- 10.2.4 L2TP -- 10.2.5. …”
    Libro electrónico
  6. 41326
    Publicado 2018
    Tabla de Contenidos: “…Exclusión del monotributo por razones de control. -- Artículo 914. Exclusión del monotributo por incumplimiento. -- Artículo 915. …”
    Libro electrónico
  7. 41327
    Publicado 2022
    Tabla de Contenidos: “….) -- DISEÑO DE UNA RED: CONECTAR TODOS LOS PUNTOS -- PLANIFICACIÓN Y CONTROL: PROCESOS, PREVISIONES, INVENTARIOS, (...) -- INCERTIDUMBRE EN LA DEMANDA Y LA OFERTA -- PRIMERA CLAVE PARA EL PROCESO D2S: PREVISIÓN DE LA DEMANDA DEL MERCADO -- SEGUNDA CLAVE PARA EL PROCESO D2S: PLANIFICACIÓN DE LA CAPACIDAD -- TERCERA CLAVE PARA EL PROCESO D2S: PLANIFICACIÓN Y PROGRAMACIÓN DE LA (...) -- CUARTA CLAVE PARA EL PROCESO D2S: PRODUCCIÓN Y CALIDAD -- QUINTA CLAVE PARA EL PROCESO D2S: GESTIÓN DE INVENTARIOS (REPOSICIÓN) -- CLAVES DE O2C Y P2P: CONDICIONES DE PAGO Y REGLAS INCOTERMS -- INFORMACIÓN, SISTEMAS Y ASPECTOS ORGANIZATIVOS LA INFORMACIÓN EN EL (...) -- ASPECTOS ORGANIZATIVOS: EL DEPARTAMENTO DE LA CADENA DE SUMINISTRO Y (...) -- RESUMEN -- 4 LA DIMENSIÓN DEL LIDERAZGO DE LA CADENA DE SUMINISTRO -- PONER A LA GENTE EN MARCHA: CÓMO MEDIR EL RENDIMIENTO Y ESTABLECER (...) -- GESTIÓN DE LAS PARTES INTERESADAS, SILOS FUNCIONALES Y CULTURA CORPORATIVA…”
    Libro electrónico
  8. 41328
    Publicado 2019
    Tabla de Contenidos: “…10.1.2 Safety -- 10.1.3 Cost -- 10.1.4 Temperature Tolerance -- 10.1.5 Shipment and Storage -- 10.1.6 Power Characteristics -- 10.1.7 Environmentally Friendly Technology (Clean Tech) -- 10.1.8 Pressure Tolerance -- 10.1.9 Control -- 10.2 Electric Aircraft -- 10.3 Satellites -- 10.4 Cars -- 10.5 Buses -- 10.6 Trucks -- 10.7 Electric Scooter and Electric Bikes -- 10.8 Marine -- 10.9 Energy Storage -- 10.10 Low‐Temperature Applications -- 10.11 Defense -- 10.12 Looking Ahead -- 10.13 Conclusion -- Chapter 11 Battery Engineering -- 11.1 Mechanical Considerations -- 11.2 Thermal and Electrical Considerations -- References -- Chapter 12 Case Study -- 12.1 Introduction -- 12.2 A Potted History of Eternal Solar Flight -- 12.3 Why Has It Been So Difficult? …”
    Libro electrónico
  9. 41329
    Publicado 2014
    “…Installation, Architektur, Infrastruktur Backup, Recovery, Sicherheit, Automatic Storage Management Pluggable Database, Performance Tuning, Oracle Warehouse Builder, Enterprise Manager: Cloud Control Dieses Buch ist keine einfache Überarbeitung des Vorgängers, sondern wurde auf Basis der Schwerpunkte und neuen Features der Version 12c neu strukturiert und gestaltet. …”
    Libro electrónico
  10. 41330
    Publicado 2022
    Tabla de Contenidos: “…7.6.4 Dynamic compilation and monomorphic calls -- 7.6.5 Reading the compilation logs -- 7.6.6 Deoptimization -- 7.7 JDK Flight Recorder -- 7.7.1 Flight Recorder -- 7.7.2 Mission Control -- Summary -- Part 3. Non-Java languages on the JVM -- 8 Alternative JVM languages -- 8.1 Language zoology -- 8.1.1 Interpreted vs. compiled languages -- 8.1.2 Dynamic vs. static typing -- 8.1.3 Imperative vs. functional languages -- 8.1.4 Reimplementation vs. original -- 8.2 Polyglot programming on the JVM -- 8.2.1 Why use a non-Java language? …”
    Libro electrónico
  11. 41331
    Publicado 2014
    Tabla de Contenidos: “…4.3.1.2 CEN technical bodies -- 4.3.1.3 European standards -- 4.3.1.4 Technical specifications -- 4.3.1.6 CENELEC workshop agreements (CWA) -- 4.3.1.7 CEN members -- 4.3.1.8 CEN/TC 225 -- 4.3.1.9 CENELEC -- 4.3.1.10 Smart grids: EC Mandate M/490 -- 4.3.1.11 ISO/IEC JTC 1/SWG 05 on the Internet of Things (IoT) -- 4.3.1.12 ISO/IEC JTC 1/WG 7 Sensor Networks -- 4.3.1.13 ISO/IEC JTC 1/SC 31 Automatic identification and data capture techniques -- 4.3.2 ETSI -- 4.3.3 IEEE -- 4.3.3.1 Overview -- 4.3.3.2 Cloud Computing -- 4.3.3.3 eHealth -- 4.3.3.4 eLearning -- 4.3.3.5 Intelligent Transportation Systems (ITS) -- 4.3.3.6 Network and Information Security (NIS) -- 4.3.3.7 Smart Grid -- 4.3.4 IETF -- 4.3.5 ITU-T -- 4.3.6 OASIS -- 4.3.6.1 Transactional Reliability -- 4.3.6.2 Modularity, reusability, and devices in the cloud -- 4.3.6.3 All that big data from all those things: access control, cybersecurity and privacy -- 4.3.6.4 Access control -- 4.3.6.5 Encryption and cybersecurity -- 4.3.6.6 Privacy -- 4.3.7 OGC -- 4.3.8 oneM2M -- 4.3.9 GS1 -- 4.3.9.1 The Role of Standards -- 4.3.9.2 GS1 Standards: Identify, Capture, Share -- 4.3.9.3 Looking forward -- 4.4 IERC Research Projects Positions -- 4.4.1 BETaaS Advisory Board Experts Position -- 4.4.2 IoT6 Position -- 4.5 Conclusions -- References -- 5 Dynamic Context-Aware Scalable and Trust-based IoT Security, Privacy Framework -- 5.1 Introduction -- 5.2 BackgroundWork -- 5.3 Main Concepts and Motivation of the Framework -- 5.3.1 Identity Management -- 5.3.2 Size and Heterogeneity of the System -- 5.3.3 Anonymization of User Data and Metadata -- 5.3.4 Action's Control -- 5.3.5 Privacy by Design -- 5.3.6 Context Awareness -- 5.3.7 Summary -- 5.4 A Policy-based Framework for Security and Privacy in Internet of Things -- 5.4.1 Deployment in a Scenario -- 5.4.2 Policies and Context Switching…”
    Libro electrónico
  12. 41332
    Publicado 2023
    Tabla de Contenidos: “…5.2.1 Management -- 5.2.2 Workers -- 5.2.3 Data -- 5.2.4 IT -- 5.3 A Brief Review of IoT's Involvement in the Food Industry -- 5.4 Challenges to the Food Industry and Role of IoT -- 5.4.1 Handling and Sorting Complex Data -- 5.4.2 A Retiring Skilled Workforce -- 5.4.3 Alternatives for Supply Chain Management -- 5.4.4 Implementation of IoT in Food and Beverage Manufacturing -- 5.4.5 Pilot -- 5.4.6 Plan -- 5.4.7 Proliferate -- 5.5 Applications of IoT in a Food Industry -- 5.5.1 IoT for Handling of Raw Material and Inventory Control -- 5.5.2 Factory Operations and Machine Conditions Using IoT -- 5.5.3 Quality Control With the IoT -- 5.5.4 IoT for Safety -- 5.5.5 The Internet of Things and Sustainability -- 5.5.6 IoT for Product Delivery and Packaging -- 5.5.7 IoT for Vehicle Optimization -- 5.5.8 IoT-Based Water Monitoring Architecture in the Food and Beverage Industry -- 5.6 A FW Tracking System Methodology Based on IoT -- 5.7 Designing an IoT-Based Digital FW Monitoring and Tracking System -- 5.8 The Internet of Things (IoT) Architecture for a Digitized Food Waste System -- 5.9 Hardware Design: Intelligent Scale -- 5.10 Software Design -- References -- Chapter 6 Opportunities: Machine Learning for Industrial IoT Applications -- 6.1 Introduction -- 6.2 I-IoT Applications -- 6.3 Machine Learning Algorithms for Industrial IoT -- 6.3.1 Supervised Learning -- 6.3.2 Semisupervised Learning -- 6.3.3 Unsupervised Learning -- 6.3.4 Reinforcement Learning -- 6.3.5 The Most Common and Popular Machine Learning Algorithms -- 6.4 I-IoT Data Analytics -- 6.4.1 Tools for IoT Analytics -- 6.4.2 Choosing the Right IoT Data Analytics Platforms -- 6.5 Conclusion -- References -- Chapter 7 Role of IoT in Industry Predictive Maintenance -- 7.1 Introduction -- 7.2 Predictive Maintenance -- 7.3 IPdM Systems Framework and Few Key Methodologies…”
    Libro electrónico
  13. 41333
    Publicado 2023
    Tabla de Contenidos: “…5.2.1 Management -- 5.2.2 Workers -- 5.2.3 Data -- 5.2.4 IT -- 5.3 A Brief Review of IoT's Involvement in the Food Industry -- 5.4 Challenges to the Food Industry and Role of IoT -- 5.4.1 Handling and Sorting Complex Data -- 5.4.2 A Retiring Skilled Workforce -- 5.4.3 Alternatives for Supply Chain Management -- 5.4.4 Implementation of IoT in Food and Beverage Manufacturing -- 5.4.5 Pilot -- 5.4.6 Plan -- 5.4.7 Proliferate -- 5.5 Applications of IoT in a Food Industry -- 5.5.1 IoT for Handling of Raw Material and Inventory Control -- 5.5.2 Factory Operations and Machine Conditions Using IoT -- 5.5.3 Quality Control With the IoT -- 5.5.4 IoT for Safety -- 5.5.5 The Internet of Things and Sustainability -- 5.5.6 IoT for Product Delivery and Packaging -- 5.5.7 IoT for Vehicle Optimization -- 5.5.8 IoT-Based Water Monitoring Architecture in the Food and Beverage Industry -- 5.6 A FW Tracking System Methodology Based on IoT -- 5.7 Designing an IoT-Based Digital FW Monitoring and Tracking System -- 5.8 The Internet of Things (IoT) Architecture for a Digitized Food Waste System -- 5.9 Hardware Design: Intelligent Scale -- 5.10 Software Design -- References -- Chapter 6 Opportunities: Machine Learning for Industrial IoT Applications -- 6.1 Introduction -- 6.2 I-IoT Applications -- 6.3 Machine Learning Algorithms for Industrial IoT -- 6.3.1 Supervised Learning -- 6.3.2 Semisupervised Learning -- 6.3.3 Unsupervised Learning -- 6.3.4 Reinforcement Learning -- 6.3.5 The Most Common and Popular Machine Learning Algorithms -- 6.4 I-IoT Data Analytics -- 6.4.1 Tools for IoT Analytics -- 6.4.2 Choosing the Right IoT Data Analytics Platforms -- 6.5 Conclusion -- References -- Chapter 7 Role of IoT in Industry Predictive Maintenance -- 7.1 Introduction -- 7.2 Predictive Maintenance -- 7.3 IPdM Systems Framework and Few Key Methodologies…”
    Libro electrónico
  14. 41334
    Publicado 2003
    Tabla de Contenidos: “…-- 5.2 Understanding eClient architecture -- 5.2.1 Overview -- 5.2.2 Inspecting eClient control flow -- 5.3 Customization and integration -- 5.3.1 Overview -- 5.3.2 eClient JSPs -- 5.3.3 Customizing eClient graphics -- Chapter 6. …”
    Libro electrónico
  15. 41335
    por Lovelace, Mary
    Publicado 2004
    Tabla de Contenidos: “…Cutover to production -- 9.1 EDGRMMxx PARMLIB options -- 9.1.1 OPTION command -- 9.1.2 VLPOOL command -- 9.2 Control access to DFSMSrmm functions -- 9.3 Activate exits -- 9.4 Remove TLMS -- 9.5 Modifying CA-Disk -- 9.6 Inventory management -- 9.7 Interface to tape libraries -- 9.7.1 System-managed IBM 3494 and IBM 3495 tape libraries -- 9.7.2 Other tape libraries…”
    Libro electrónico
  16. 41336
    Publicado 2003
    Tabla de Contenidos: “…Implementing DFSMStvs -- 8.1 Implementation overview -- 8.2 Setting up a Parallel Sysplex environment -- 8.3 Define coupling facility structures -- 8.4 Define the DFSMS environment -- 8.4.1 Define SMSplex environment -- 8.4.2 Define cache structures in the SMS base configuration -- 8.4.3 Define storage classes for VSAM files -- 8.4.4 Change ACS routines for VSAM data sets -- 8.4.5 Define SMS environment for the system logger -- 8.4.6 Modify SYS1.PARMLIB member IGDSMSxx -- 8.4.7 Modify SYS1.PARMLIB member IFAPRDxx -- 8.5 Define the Sharing Control Data Set (SHCDS) -- 8.6 Define the system logger environment…”
    Libro electrónico
  17. 41337
    Publicado 2002
    Tabla de Contenidos: “…Overview -- 1.1 Introduction to the enhancements -- 1.2 Availability and recoverability -- 1.2.1 Database Recovery Control (DBRC) enhancements -- 1.2.2 Database Image Copy 2 enhancements -- 1.2.3 HALDB enhancements -- 1.2.4 Batch Resource Recovery Service (RRS) support -- 1.2.5 Remote Site Recovery (RSR) enhancement -- 1.2.6 Enhanced availability by using the Resource Manager (RM) -- 1.2.7 Common Queue Server (CQS) enhancements -- 1.2.8 APPC and OTMA enhancements -- 1.2.9 APPC/IMS enhancements -- 1.2.10 IMS Online Recovery Service (ORS) support -- 1.2.11 System Log Data Set (SLDS) dynamic backout processing -- 1.3 Performance and capacity enhancements -- 1.3.1 Fast Path enhancements -- 1.3.2 Parallel database processing enhancement -- 1.3.3 IMS MSC FICON CTC support -- 1.3.4 Virtual storage constraint relief -- 1.4 Systems management enhancements -- 1.4.1 BPE enhancements -- 1.4.2 Common Service Layer -- 1.4.3 Installation and configuration enhancements -- 1.4.4 Syntax Checker -- 1.4.5 Transaction trace -- 1.5 Application enablement enhancements -- 1.5.1 Java enhancements -- Part 2 IMS Version 8 base enhancements -- Chapter 2. …”
    Libro electrónico
  18. 41338
    Publicado 2023
    Tabla de Contenidos: “…18.1.2 The vision search operator -- 18.1.3 The marketing research operator -- 18.2 Implementation of SE for the one-max problem -- 18.2.1 Declaration of functions and parameters -- 18.2.2 The main loop -- 18.2.3 Additional functions -- 18.3 Simulation results of SE for the one-max problem -- 18.4 Discussion -- Supplementary source code -- 19 Advanced applications -- 19.1 Data clustering -- 19.1.1 Problem description and definition -- 19.1.2 Solution encoding -- 19.1.3 Metaheuristic algorithm for data clustering -- 19.2 Cluster-head selection -- 19.2.1 Problem description and definition -- 19.2.2 Solution encoding -- 19.2.3 Metaheuristic algorithm for cluster-head selection -- 19.3 Traffic light control -- 19.3.1 Problem description and definition -- 19.3.2 Solution encoding -- 19.3.3 Metaheuristic algorithm for traffic light control -- 19.4 Hyperparameter optimization -- 19.4.1 Problem description and definition -- 19.4.2 Solution encoding -- 19.4.3 Metaheuristic algorithm for hyperparameter optimization -- 19.5 Convolutional neural network filter pruning -- 19.5.1 Problem description and definition -- 19.5.2 Solution encoding -- 19.5.3 Metaheuristic algorithm for convolutional neural network pruning -- 19.6 Discussion -- 20 Conclusion and future research directions -- 20.1 Conclusion -- 20.2 Future research directions -- A Interpretations and analyses of simulation results -- A.1 Interpretations of metaheuristics -- A.1.1 Quality of the end result -- A.1.2 Convergence curves -- A.1.3 Number of evaluations and computation time -- A.2 Analyses of metaheuristics -- A.2.1 Impact of parameters and operators -- A.2.2 Complexity and statistical analyses -- A.3 Discussion -- Supplementary source code -- B Implementation in Python -- Supplementary source code -- References -- Index -- Back Cover…”
    Libro electrónico
  19. 41339
    Publicado 2013
    Tabla de Contenidos: “…6.4.2 Pipe Material -- 6.4.3 Depth of Sanitary Sewer -- 6.4.4 Diameter and Slope of Pipes -- 6.4.5 Hydraulic Criteria -- 6.4.6 Manholes -- 6.4.7 Pump Stations -- 6.4.8 Force Mains -- 6.4.9 Hydrogen-Sulfide Control -- 6.4.10 Combined Sewers -- 6.5 Design Computations -- 6.5.1 Design Aids -- 6.5.1.1 Manning's n -- 6.5.1.2 Minimum slope for self-cleansing -- 6.5.2 Procedure for System Design -- Problems -- 7 Design of Hydraulic Structures -- 7.1 Introduction -- 7.2 Culverts -- 7.2.1 Hydraulics -- 7.2.1.1 Submerged entrances -- 7.2.1.2 Unsubmerged entrances -- 7.2.2 Design Constraints -- 7.2.3 Sizing Calculations -- 7.2.3.1 Fixed-headwater method -- 7.2.3.2 Fixed-flow method -- 7.2.3.3 Minimum-performance method -- 7.2.4 Roadway Overtopping -- 7.2.5 Riprap/Outlet Protection -- 7.3 Gates -- 7.3.1 Free Discharge -- 7.3.2 Submerged Discharge -- 7.3.3 Empirical Equations -- 7.4 Weirs -- 7.4.1 Sharp-Crested Weirs -- 7.4.1.1 Rectangular weirs -- 7.4.1.2 V-notchweirs -- 7.4.1.3 Compound weirs -- 7.4.1.4 Other types of sharp-crested weirs -- 7.4.2 Broad-Crested Weirs -- 7.4.2.1 Rectangular weirs -- 7.4.2.2 Compound weirs -- 7.4.2.3 Gabionweirs -- 7.5 Spillways -- 7.5.1 Uncontrolled Spillways -- 7.5.2 Controlled (Gated) Spillways -- 7.5.2.1 Gates seated on the spillway crest -- 7.5.2.2 Gates seated downstream of the spillway crest -- 7.6 Stilling Basins -- 7.6.1 Type Selection -- 7.6.2 Design Procedure -- 7.7 Dams and Reservoirs -- 7.7.1 Types of Dams -- 7.7.2 Reservoir Storage -- 7.7.2.1 Sediment accumulation -- 7.7.2.2 Determination of storage requirements -- 7.7.3 Hydropower -- 7.7.3.1 Turbines -- 7.7.3.2 Turbine performance -- 7.7.3.3 Feasibility of hydropower -- Problems -- 8 Probability and Statistics in Water-Resources Engineering -- 8.1 Introduction -- 8.2 Probability Distributions -- 8.2.1 Discrete Probability Distributions…”
    Libro electrónico
  20. 41340
    Publicado 2019
    Tabla de Contenidos: “…System Analysis -- 1.2.6. System Control -- 1.3. Summary -- Chapter 2: Systems engineering and integration -- 2.1. …”
    Libro electrónico