Mostrando 41,701 - 41,720 Resultados de 51,016 Para Buscar 'Nontron~', tiempo de consulta: 1.61s Limitar resultados
  1. 41701
    por Rahmel, Dan
    Publicado 2013
    “…templates that use multiple stylesheets; use advanced administration techniques; and employ MySQL data reporting, remote deployment, and quality control using automated testing. Advanced Joomla! …”
    Libro electrónico
  2. 41702
    por GeoX 2010
    Publicado 2010
    “…The contributions cover a wide range of topics, including deformation and strain localization in soils, rocks and sediments; fracture and damage assessment in rocks, asphalt and concrete; transport in porous media; oil and gas exploration and production; neutron tomography and other novel experimental and analytical techniques; image-based computational modeling; and software and visualization tools. …”
    Libro electrónico
  3. 41703
    por Muniz, Joseph
    Publicado 2013
    Tabla de Contenidos: “…Penetration Test Executive Report -- Compliance -- Industry standards -- Professional services -- Documentation -- Report format -- Cover page -- Confidentiality statement -- Document control -- Timeline -- Executive summary -- Methodology -- Detailed testing procedures -- Summary of findings -- Vulnerabilities -- Network considerations and recommendations -- Appendices -- Glossary -- Statement of Work (SOW) -- External Penetration Testing -- Additional SOW material -- Kali reporting tools -- Dradis -- KeepNote -- Maltego CaseFile -- MagicTree -- CutyCapt -- Sample reports -- Summary -- Index…”
    Libro electrónico
  4. 41704
    por Dixon, Daryl
    Publicado 2012
    “…More Australians than ever are deciding to take control of their super, and Daryl's insights go beyond the standard requirements for running an SMSF. …”
    Libro electrónico
  5. 41705
    Publicado 2018
    Tabla de Contenidos: “…Monitoring and debugging with AWS CloudWatch -- CloudWatch metrics -- CloudWatch alarms -- CloudWatch logs -- Tracing with AWS X-Ray -- Summary -- Chapter 12: Securing Your Serverless Application -- Technical requirements -- Authentication and user control access -- Securing API access -- User management with AWS Cognito -- Setting up a test user via the AWS Management Console -- Setup using Cognito Golang SDK -- Encrypted environment variables -- Data encryption at rest -- Data encryption in transit -- Logging AWS Lambda API calls with CloudTrail -- Vulnerability scanning for your dependencies -- Summary -- Questions -- Chapter 13: Designing Cost-Effective Applications -- Lambda pricing model -- Lambda cost calculator -- Optimal memory size -- Code optimization -- Lambda cost and memory tracking -- Summary -- Chapter 14: Infrastructure as Code -- Technical requirements -- Deploying AWS Lambda with Terraform -- Creating the Lambda function -- Setting up DynamoDB table -- Configuring API Gateway -- Cleaning up -- Deploying AWS Lambda with CloudFormation -- CloudFormation designer -- Deploying AWS Lambda with SAM -- Exporting a serverless application -- Summary -- Questions -- Assessments -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  6. 41706
    Publicado 2015
    “… Membrane Technology and Engineering for Water Purification, 2nd edition is written in a practical style with emphasis on: process description; key unit operations; systems design and costs; plant equipment description; equipment installation; safety and maintenance; process control; plant start-up; and operation and troubleshooting. …”
    Libro electrónico
  7. 41707
    Publicado 2011
    Tabla de Contenidos: “…-- The Blue Bar -- The Footer -- The Profile Page -- The Home Page -- Other Kinds of Pages -- Chapter 2 Signing Up and Setting Up Your Profile -- Registering With Facebook -- Getting Started -- Editing Your Profile -- Adding Likes and Interests -- Setting Your Status -- Editing Your Account Info -- Setting a Username -- Changing Notification Settings -- Chapter 3 Friends -- Connecting With Networks -- Adding Friends -- Removing a Friend -- Alternatives to Defriending -- Viewing Your Friends -- The Politics of Friending -- How to Pump Up Your Friends List -- Creating and Using Friend Lists -- Chapter 4 Privacy and Security -- An Ounce of Discretion Is Worth a Ton of Privacy Settings -- Friend Management: The Key to Choosing Your Audience -- Privacy Settings: Controlling Who Sees What -- Facebook Security 101 -- Reporting Abuse -- Phishing Lessons -- Beware of Links Bearing Trojans -- Clickjacking 101 -- If You'Re Under 18 -- Keeping a Low Profile -- Quitting Facebook -- Chapter 5 Sharing Content on Facebook -- The Facebook Publisher: One-Stop Posting and Sharing -- Wall Basics -- Care and Feeding of Your Wall -- Feeding Frenzy: Using Feeds to Keep Track of Your Friends -- The Tao of Status Updates -- Word of Face: Reaching Your Audience on Facebook -- Notes: Blogging on Facebook -- Importing Stories From An Outside Blog As Notes -- Posted Items: Sharing Links on Facebook -- Facebook Places: Location, Location, Location -- Choosing the Audience for Each Post -- Commenting on Facebook Stories -- Liking Facebook Stories -- Facebook and Other Websites -- Downloading An Archive of Your Facebook Content -- Chapter 6 Communicating on Facebook…”
    Libro electrónico
  8. 41708
    por Marston, R. M.
    Publicado 1996
    Tabla de Contenidos: “…Practical ICsUsing '4016/4066' ICs; Digital Control Circuits; Synthesized Multi-gang Pots, etc; Miscellaneous Applications; Chapter 8. …”
    Libro electrónico
  9. 41709
    Publicado 2013
    Tabla de Contenidos: “…Chapter 5: The Threat Ecosystem -- The Threat Ecosystem -- The Technical Element -- The Human Element -- The Evolution of the Threat Ecosystem -- Advanced Persistent Threat -- The Attack Method -- The Attack Profitability -- Malware Economy -- Malware Outsourcing -- We've Covered -- Chapter 6: The Malware Factory -- The Need to Evade Antivirus -- Malware Incident Handling Process -- Malware Detection -- Circumventing the Antivirus Product -- The Need for an Army of Malware -- Next-Generation Malware Kits -- Stand-Alone Armoring Tools -- The Impact of an Armored Army of Malware -- The Malware Factory -- The Malware Assembly Line -- The Proliferation of Attacker Tools -- Malware Population Explosion -- We've Covered -- Chapter 7: Infection Vectors -- Infection Vectors -- Physical Media -- E-mail -- Instant Messaging and Chat -- Social Networking -- URL Links -- File Shares -- Software Vulnerabilities -- The Potential of Becoming an Infection Vector -- We've Covered -- Chapter 8: The Compromised System -- The Malware Infection Process -- Installation of Malware Files -- Setting Up Malware Persistency -- Removing Evidence of the Malware Installer -- Passing Control to the Malware -- The Active Malware -- Maintaining the Foothold -- Communicating with the Attacker -- Executing the Payload -- We've Covered -- Part III: The Enterprise Strikes Back -- Chapter 9: Protecting the Organization -- The Threat Incident Responders -- Understanding the Value of the System -- Value to the Organization -- Value to the Attacker -- Understanding the Characteristics of the System -- System Type -- Operational Impact -- Sensitivity of Hosted Data -- Users of the System -- Network Location -- Accessibility to the Asset -- Asset Access Rights -- Recovery -- System Status -- Prioritizing the Systems -- The Organization's Security Posture…”
    Libro electrónico
  10. 41710
    “…Pro Oracle SQL, Second Edition also helps you minimize parsing overhead, read execution plans, test for correct results, understand performance management, and exert control over SQL execution in your database. You’ll learn when to create indexes, how to verify that they make a difference, how to use SQL Baselines and Profiles to optimize and stabilize SQL execution plans, and much more. …”
    Libro electrónico
  11. 41711
    Publicado 2015
    “…Inside, you'll get up and running on OS X basics; customizing your workspace; working with the Dock; finding files with Spotlight; working with Mission Control and Launchpad; organizing your life with Calendar, Reminders, Notes, and Notifications; browsing the web with Safari; setting up, sending, and receiving e-mail; communicating through Messages; enjoying…”
    Libro electrónico
  12. 41712
    Publicado 2001
    “…Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users.While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting social promise. …”
    Libro electrónico
  13. 41713
    por Buttfield-Addison, Paris
    Publicado 2023
    “…You'll find solutions for: 2D and 3D graphics Math, physics, and character control Animation and movement Behavior and AI Sound and music Narrative and dialogue Input and gameplay Scripting and user interface Simulation and synthetic data creation Networking and accessing web content Analytics and telemetry…”
    Libro electrónico
  14. 41714
    Publicado 2016
    Tabla de Contenidos: “…Locomotion disorders ; Theatre Session 01; Early lameness detection, cow comfort and infectious lesion control: lessons from the UK; N. Bell; Gait cycle in dairy cows and its application to detect lameness; M. …”
    Libro electrónico
  15. 41715
    Publicado 2013
    Tabla de Contenidos: “…EN CONCLUSIÓN; RENOVACIÓN DE LAS AUTORIZACIONES DE EXPLOTACIÓN DE LAS CENTRALES NUCLEARES; I. EL CONTROL PÚBLICO DE LA SEGURIDAD NUCLEAR; II. EL RÉGIMEN DE AUTORIZACIONES; III. …”
    Libro electrónico
  16. 41716
    Publicado 2024
    Tabla de Contenidos: “…-- Do the Right Thing -- Corporate Culture + Empathy + Honesty = Awesomeness -- Eye of the Tiger -- People Leaders' CTAs -- Executives' and HR's CTAS -- Notes -- CHAPTER 6: Trust and Accountability Are a Team Sport -- Command‐and‐control Had Its Heyday -- A Funky Beat for The People Age -- Performance Management Sucks -- Virtual Insanity -- Failing Your Way to Success -- Trust Needs Its Counter‐Power -- People Leaders' CTAs -- Executives' and HR's CTAs -- Notes -- CHAPTER 7: Intelligence Is Getting Amplified -- Everybody, Meet ChatGPT -- ChatGPT, Meet Everybody -- Machine Intelligence + Human Intelligence = Amplified Intelligence -- Bad Bot, Whatcha Gonna Do? …”
    Libro electrónico
  17. 41717
    por R M Harrison
    Publicado 2015
    Tabla de Contenidos: “…Cover; Preface; Contents; Editors; List of Contributors; Global Atmosphere - The Antarctic Ozone Hole; 1 Introduction; 2 Observations of Antarctic Ozone; 3 Causes of Antarctic Ozone Depletion; 3.1 Dynamical Preconditioning; 3.2 Polar Stratospheric Clouds; 3.3 Catalytic Ozone Loss Cycles; 3.4 Modelling of Polar Ozone Depletion; 4 Ozone Depletion at Other Latitudes; 4.1 Arctic; 4.2 Mid-latitudes; 4.3 Tropics; 5 Regulation and Control: The Montreal Protocol; 5.1 Chlorine and Bromine Source Gases; 5.2 The Montreal Protocol; 5.3 Reasons for Success of the Montreal Protocol…”
    Libro electrónico
  18. 41718
    Publicado 2019
    Tabla de Contenidos: “…6.4 Synchronous Counters -- 6.5 Other Counters -- 6.6 HDL Models of Registers and Counters -- 7 Memory and Programmable Logic -- 7.1 Introduction -- 7.2 Random‐Access Memory -- 7.3 Memory Decoding -- 7.4 Error Detection and Correction -- 7.5 Read‐Only Memory -- 7.6 Programmable Logic Array -- 7.7 Programmable Array Logic -- 7.8 Sequential Programmable Devices -- 8 Design at the Register Transfer Level -- 8.1 Introduction -- 8.2 Register Transfer Level (RTL) Notation -- 8.3 RTL Descriptions -- 8.4 Algorithmic State Machines (ASMs) -- 8.5 Design Example (ASMD CHART) -- 8.6 HDL Description of Design Example -- 8.7 Sequential Binary Multiplier -- 8.8 Control Logic -- 8.9 HDL Description of Binary Multiplier -- 8.10 Design with Multiplexers -- 8.11 Race‐Free Design (Software Race Conditions) -- 8.12 Latch‐Free Design (Why Waste Silicon?) …”
    Libro electrónico
  19. 41719
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Microfrontends -- Chapter 1: Introducing Microfrontends -- Technical requirements -- Defining Microfrontends -- Understanding the Microfrontend Premium -- Exploring the benefits of Microfrontends -- Understanding Microfrontend patterns -- The Multi-SPA Pattern -- The Micro Apps Pattern -- Choosing a suitable pattern -- Team Composition -- Frequency of Deployments -- Hello World with Microfrontends -- Summary -- Chapter 2: Key Principles and Components of Microfrontends -- Understanding the Key Principles -- Domain Driven Teams -- Isolating Failure -- Deploying Independently -- Preferring Runtime Integrations -- Avoiding the "Distributed Monolith" trap -- Technology agnostic -- Granular Scaling -- Culture of Automation and DevOps -- The key Components of a Microfrontend Architecture -- Routing Engine -- A global state and a Communication Channel -- Source code Version Control -- A Component Library -- Summary -- Chapter 3: Monorepos versus Polyrepos for Microfrontends -- Technical requirements -- Repo types and their nuances -- Monorepos -- Polyrepos -- Differences between Polyrepos and Monorepos -- Choosing Monorepos for Microfrontends -- Popular Monorepo tools -- Setting up our Monorepo -- Running the app locally -- Creating a new app with Nx Console -- Setting permissions in your Monorepo -- Summary -- Part 2: Architecting Microfrontends -- Chapter 4: Implementing the Multi-SPA Pattern for Microfrontends -- Technical requirements -- Understanding the multi-SPA architecture -- Building our Multi-SPA Microfrontend -- Setting up our mini-apps -- Using a shared component library -- Setting up Routing -- Setting up a mocked product list -- Adding the product grid and checkout components -- Setting up a Global Shared State…”
    Libro electrónico
  20. 41720
    Publicado 2023
    Tabla de Contenidos: “…-- Factors to consider when laying out your dashboard -- Purpose and audience -- Clarity and simplicity -- Hierarchy and organization -- Consistency and visual harmony -- Interactivity and user controls -- Data visualization techniques -- Accessibility and documentation -- Common dashboard elements -- PivotTables -- Charts -- Text boxes and labels -- Images and shapes -- Sparklines -- Conditional formatting -- Making your dashboard interactive -- Slicers -- Hyperlinks -- Summary -- Chapter 8: Visualization Elements for Your Dashboard - Slicers, PivotCharts, Conditional Formatting, and Shapes…”
    Libro electrónico