Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
42661Publicado 2012Tabla de Contenidos: “…7.4 IP Layer 216 -- 7.5 MPLS Resilience 224 -- 7.6 Resilience in the BTS Access 231 -- 7.7 Resilience in the Controllers and the Core Interface 244 -- 7.8 Summary 247 -- 8 QoS 250 / Thomas Dei, Jouko Kapanen, Esa Metsala and Csaba Vulkan -- 8.1 End User Service, Radio Network Layers and the Transport Layer Service 250 -- 8.2 TCP and UDP as End User Transport Layer Protocols 255 -- 8.3 DSCP, Traffic Class, and Priority Bits 263 -- 8.4 Ingress and Egress Functions 275 -- 8.5 2G 281 -- 8.6 3G/HSPA 282 -- 8.7 LTE 293 -- 8.8 Summary 300 -- 9 Security 303 / Esa Metsala and Jose Manuel Tapia Perez -- 9.1 Security in 3GPP Mobile Networks 303 -- 9.2 Protection of the Backhaul 313 -- 9.3 IP Layer Protection 316 -- 9.4 IP Sec VPN Deployment 331 -- 9.5 Summary 344 -- 10 Packet Backhaul Solutions 346 / Erik Salo and Juha Salmelin -- 10.1 Creating a Packet Based MBH Solution 346 -- 10.2 MBH Solution Starting Points 347 -- 10.3 MBH Optimization Considerations 349 -- 10.4 MBH Solution Alternatives 352 -- 10.5 Outsourcing the MBH Network or Parts of it 360 -- 10.6 Selecting MBH Access Solution for a Particular Case 363 -- 10.7 From the Selected MBH Solution to Detailed Network Plans 368 -- 10.8 Summary 369 -- 11 Summary 370 / Esa Metsala and Juha Salmelin -- Index 373.…”
Libro electrónico -
42662por Mitchell, Shawn RossTabla de Contenidos: “…Creating Conan the Caveman -- Setting up the basic game objects -- No more bullets or bullet collisions -- Game objects and map collisions -- ShooterObject is now PlatformerObject -- The Camera class -- Camera-controlled map -- The Player class -- Possible additions -- Summary -- Index…”
Publicado 2013
Libro electrónico -
42663Publicado 2014Tabla de Contenidos: “…Looks and Sound -- The Looks Palette -- Changing Costumes to Animate -- Sprites That Speak and Think -- Image Effects -- Size and Visibility -- Layers -- The Sound Palette -- Playing Audio Files -- Playing Drums and Other Sounds -- Composing Music -- Controlling Sound Volume -- Setting the Tempo -- Scratch Projects -- Dancing on Stage -- Fireworks -- Summary -- Problems -- 4. …”
Libro electrónico -
42664Publicado 2016Tabla de Contenidos: “…Brode's equation (Brode, 1959)Isentropic expansion; Isothermal expansion; Thermodynamic availability; 2.2.3 EXPLOSION TYPES; 2.2.3.1 Vapor cloud explosion; 2.2.3.2 Boiling liquid expanding vapor explosion; 2.2.3.3 Dust explosion; Explosibility classification; Minimum ignition temperature; Minimum explosive concentration; Minimum ignition energy; Explosion pressure characteristics; 2.2.4 EXPLOSION PREVENTION; 2.2.4.1 Inerting; Vacuum purging; Pressure purging; Combined pressure-vacuum purging; Sweep-through purging; 2.2.4.2 Controlling static electricity; 2.2.4.3 Ventilation; 2.3 TOXIC EFFECTS…”
Libro electrónico -
42665Publicado 2013Tabla de Contenidos: “…Automated Web Testing -- The world of testing beyond humans and browsers -- Continuous integration -- Continuous deployment -- Other scenarios -- Automating browser environments -- Remote controlled web browsers -- Simulated browser environments -- Headless web browsers -- Multiple environment aggregators -- Headless testing with PhantomJS -- Installing PhantomJS and the supporting tools -- Running Backbone.js tests with PhantomJS -- Automating tests in the code samples -- Parting thoughts, next steps, and future ideas -- Summary -- Index…”
Libro electrónico -
42666Publicado 2018Tabla de Contenidos: “…-- Code Sample 2.7 -- Play testing -- Building -- Summary -- Test your knowledge -- Further reading -- Chapter 3: Creating a Space Shooter -- Looking ahead - the completed project -- Getting started with a space shooter -- Creating a player object -- Player input -- Code Sample 3.1 -- Configuring the game camera -- Bounds locking -- Code Sample 3.2 -- Health -- Code Sample 3.3 -- Death and particles -- Code Sample 3.4 -- Enemies -- Code Sample 3.6 -- Code Sample 3.7 -- Code Sample 3.8 -- Enemy spawning -- Code Sample 3.9 -- Summary -- Test your knowledge -- Further reading -- Chapter 4: Continuing the Space Shooter -- Guns and gun turrets -- Ammo prefabs -- Code Sample 4-1 -- Ammo spawning -- Code Sample 4.2 -- Code Sample 4.3 -- User controls -- Scores and scoring - UI and text objects -- Working with scores - scripting with text -- Code Sample 4.4 -- Polishing -- Testing and diagnosis -- Building -- Summary -- Test your knowledge -- Further Reading -- Chapter 5: Creating a 2D Adventure Game -- A 2D Adventure - getting started -- Importing assets -- Creating an environment - getting started -- Environment Physics -- Creating a player…”
Libro electrónico -
42667Publicado 2010Tabla de Contenidos: “…Headings and paragraphs -- General styles for text -- Other HTML elements for giving text meaning -- Presentational elements-never use these -- Summary -- Chapter 14: Whitespace -- Reiterating the importance of whitespace -- The box model -- Setting padding, border and margin via CSS -- Controlling spacing within paragraphs -- Centering content on a page -- Summary -- Chapter 15: Links -- Link syntax -- Different kinds of link target -- Link best practices -- Link styling -- Link CSS -- Adding icons to links -- Summary -- Chapter 16: Images -- HTML syntax -- CSS background image syntax -- A crash course in image formats -- Image best practices -- Tiles and gradients -- Image replacement -- CSS "sprites" -- The Chez Sous Le Vent case study -- Summary -- Chapter 17: Lists -- The three list types -- Choosing among list types -- Nesting lists -- List styling -- Using lists for navigation menus -- Summary -- Chapter 18: Tables -- Basic table elements -- Advanced table elements -- Styling tables -- Summary -- Chapter 19: Forms -- Form best practices -- HTML for forms -- Styling forms -- HTML5 forms -- Summary…”
Libro electrónico -
42668Publicado 2012Tabla de Contenidos: “…Planning a Reader-Friendly Report -- Right and Wrong, Boss and Book -- What Business Writing Isn't and Is -- Understanding the Assignment -- Assessing the Audience -- Determining the Controlling Purpose -- Organizing a Report -- Recognizing the Difference between a Topic and a Thesis -- Stating the Thesis in the First Paragraph -- Constructing Subheaded Segments -- Afterword -- II. …”
Libro electrónico -
42669Publicado 2023Tabla de Contenidos: “…. -- Stabilization of Silver Nanoparticles on Polyester Fabric Using Organo-Matrices for Controlled -- Antimicrobial Performance -- Reprinted from: Polymers 2022, 14, 1138, doi:10.3390/polym14061138 143 -- Jaime Bueno, Leire Virto, Manuel Toledano-Osorio, Elena Figuero, Manuel Toledano and -- Antonio L. …”
Libro electrónico -
42670Publicado 2018Tabla de Contenidos: “…Fakhrullin Halloysite Nanotubes: Controlled Access and Release by Smart Gates Reprinted from: Nanomaterials 2017, 7, 199, doi: 10.3390/nano7080199 173 -- Tolesa Fita Chala, Chang-Mou Wu, Min-Hui Chou, Molla Bahiru Gebeyehu and Kuo-Bing Cheng Highly Efficient Near Infrared Photothermal Conversion Properties of Reduced Tungsten Oxide/Polyurethane Nanocomposites Reprinted from: Nanomaterials 2017, 7, 191, doi: 10.3390/nano7070191 185 -- Jordina Fornell, Jorge Soriano, Miguel Guerrero, Juan de Dios Sirvent, Marta Ferran-Marqu ́es, Elena Ib ́a ̃nez, Leonardo Barrios, Maria Dolors Bar ́o, Santiago Suri ̃nach, Carme Nogu ́es, Jordi Sort and Eva Pellicer Biodegradable FeMnSi Sputter-Coated Macroporous Polypropylene Membranes for the Sustained Release of Drugs Reprinted from: Nanomaterials 2017, 7, 155, doi: 10.3390/nano7070155 198 -- Caitlin Brocker, Hannah Kim, Daniel Smith and Sutapa Barua Heteromer Nanostars by Spontaneous Self-Assembly Reprinted from: Nanomaterials 2017, 7, 127, doi: 10.3390/nano7060127 210.…”
Libro electrónico -
42671Publicado 2024Tabla de Contenidos: “…-- Block variations -- Adding a block style using PHP or JavaScript -- Adding a block style from a theme -- Removing a default block style -- Using PHP -- Approaches to creating a block style -- Custom block style using PHP with inline CSS -- Custom block style using PHP with a stylesheet -- JavaScript approaches -- Summary -- Questions -- Answers -- Further reading -- Chapter 4: Blocks and Styles Wrap-Up -- Unleashing creativity - combining design tools -- Effects on groups to create shadows -- Design tools are evolving -- Sidebar controls and component system -- Growing the blocks and tools -- Adding options -- Tips and tricks -- block.json and block styles -- Summary -- Questions -- Answers -- Part 2: Block Patterns -- Chapter 5: Understanding Block Patterns -- What is a block pattern? …”
Libro electrónico -
42672Publicado 2017Tabla de Contenidos: “…Suttle -- The response of heterotropic prokaryote and viral communities to labile organic carbon inputs is controlled by the predator food chain structure / Ruth-Anne Sandaa, Bernadette Pree, Aud Larsen, Selooina Vage, Birte Topper, Joachim P. …”
Libro electrónico -
42673por Kaltmeier, OlafTabla de Contenidos: “…Introduction: Biodiversity and the Anthropocene in Latin America from the Mid‐Nineteenth Century to 1950 -- References -- Biodiversity in the Southern Cone from the Mid‐Nineteenth Century to 1950 -- Environmental Knowledge -- Extracting Plants and Animals -- Agriculture and Rural Colonization -- Forestry and Deforestation -- Cattle and Animal Husbandry -- Fish Farming -- Neobiotic Transformations -- The Protection of Biodiversity -- Impacting Socio‐Biodiversity: Conquest, Colonization, and First Acceleration -- References -- Biodiversity in the Andes from the Mid‐Nineteenth Century to 1950 -- Naming, Controlling, and Classifying the Biodiversity of the Tropical Andes -- Exploiting Biodiversity: Plantations and Extractive Enclaves -- Coast -- Sierra -- Eastern Piedmont -- Biodiversity and Andean Subsistence Agriculture -- Domestication Processes -- The Advance over the Agricultural Frontier -- Conservation Strategies and the Development of Protected Areas -- Conclusions -- References -- Biodiversity in the Amazon from the Mid‐Nineteenth Century to 1950 -- Amazon: The Gestation of a World -- Collections and Commerce: Amazonian Biodiversity as Economic and Scientific Value in Validating New Scientific Theories -- Prospecting Amazonian Biodiversity -- The "Goblin of the Amazon" -- Final Considerations -- References -- Biodiversity in Mesoamerica from the Mid‐Nineteenth Century to 1950 -- The Clash between Two Models of Relationship with Nature -- Two Ways to Relate to Biodiversity: Mesoamerican Civilization vs. …”
Publicado 2024
Libro electrónico -
42674por National Research Council (U.S.).Tabla de Contenidos: “…DNA Technology in Forensic Science -- Copyright -- Preface -- A Statement by the Committee on DNA Technology in Forensic Science -- Contents -- Summary -- TECHNICAL CONSIDERATIONS -- Recommendations -- STATISTICAL BASIS FOR INTERPRETATION -- Recommendations -- STANDARDS -- Recommendations -- DATABANKS AND PRIVACY OF INFORMATION -- Recommendations -- DNA INFORMATION IN THE LEGAL SYSTEM -- Recommendations -- DNA TYPING AND SOCIETY -- Recommendations -- 1 Introduction -- BACKGROUND -- GENETIC BASIS OF DNA TYPING -- STRUCTURE AND FUNCTION OF DNA -- Individual Variation in DNA -- TECHNOLOGICAL BASIS OF DNA TYPING -- Restriction Fragment Length Polymorphisms -- Polymerase Chain Reaction for Amplifying DNA -- POPULATION GENETICS RELEVANT TO THE INTERPRETATION OF DNA TYPING -- Estimating the Frequency of Alleles in Populations -- Population Substructure -- CHARACTERISTICS OF AN OPTIMAL FORENSIC DNA TYPING SYSTEM -- REFERENCES -- 2 DNA Typing: Technical Considerations -- ESSENTIALS OF A FORENSIC DNA TYPING PROCEDURE -- Scientific Foundations -- Written Laboratory Protocol -- Procedure For Identifying Patterns -- Procedure For Declaring a Match -- Identification of Potential Artifacts -- Sensitivity to Quantity, Mixture, and Contamination -- Experiential Foundation -- Publication and Scientific Scrutiny -- TECHNICAL ISSUES IN RFLP ANALYSIS -- Choice of Probes -- Southern Blot Preparation -- Identification of DNA Patterns -- Examination of a Control Pattern -- Single-Band Patterns -- Anomalous Bands -- Reporting of Anomalies -- Measurement of Fragments -- Match Criteria -- Retention of Sample -- TECHNICAL ISSUES IN PCR-BASED METHODS -- Technical Issues Related to Amplification -- Amplification Conditions -- Qualitative and Quantitative Fidelity -- Amplification Inhibition -- Contamination -- Issues Related to Detection of Amplified Product…”
Publicado 1992
Libro electrónico -
42675Publicado 1991Tabla de Contenidos: “…Un modelo de comportamiento / Antonio Fuentes Labrador, María Angeles Sampedro Talabán, Florencia Corrionero Salinero, María Jesús Velasco ;La Universidad española de los cuarenta: discursos de inauguración y apertura de curso de la "Ciudad Universitaria de Madrid" / María Pilar Amador Carretero --La Universidad de los años cuarenta: mediocridad y control ideológico. Investigación en la posguerra --Oligarquías y clientelas en el mundo de la investigación científica: el Consejo Superior en la Universidad de posguerra / Gonzalo Vicente Pasamar Alzuria ;La Universidad de los cuarenta: por una cultura unitaria y tradicional / María Encarna Nicolás Marín ;La investigación histórica en la Universidad de Murcia (1940-1960) / Ana Legaz García --Renovación ministerial y cambio generacional. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
42676Publicado 2024Tabla de Contenidos: “…/ Davide Tumminelli -- Transparencia y justicia algorítmica en el sector público: un análisis entre el factor humano y el aprendizaje profundo / Gabriele Vestri -- Amministrazione, digitalizzazione ed effettività amministrativa / Maria De Benedetto -- La automatización del control administrativo anticorrupción de la contratación pública / Oscar Capdeferro Villagrasa -- L’impiego di sistemi di Intelligenza artificiale nei contratti pubblici: l’alba di un nuovo potere amministrativo? …”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
42677por Ariganello, ErnestoTabla de Contenidos: “…INTRODUCCIÓN A OSPF -- PROCESO DE CONFIGURACIÓN OSPF EN UNA SOLA ÁREA -- Elección de un DR y un BDR -- Administración de la selección del DR y BDR -- Cálculo del coste -- Valores de coste por defecto -- Ajustes de los temporizadores -- Autenticación -- CASO PRÁCTICO -- Configuración de OSPF en una sola área -- OSPF EN MULTIPLES ÁREAS -- PROCESO DE CONFIGURACIÓN DE OSPF EN MÚLTIPLES ÁREAS -- Configuración de router interno -- Configuración de router ABR -- Configuración de router ASBR -- VERIFICACIÓN OSPF -- Verificación del estado y prioridad -- Verificación del estado de los routers del proceso OSPF -- Resumen de comandos OSPF -- INTRODUCCIÓN A EIGRP -- Métricas EIGRP -- PROCESO DE CONFIGURACIÓN DE EIGRP -- CASO PRÁCTICO -- Configuración de EIGRP -- Equilibrado de carga -- Ajustes de los temporizadores -- Filtrados de rutas -- Desactivación de una interfaz EIGRP -- CASO PRÁCTICO -- Configuración de filtro de ruta EIGRP -- Redistribución estática -- AUTENTICACIÓN EIGRP -- VERIFICACIÓN EIGRP -- Resumen de comandos EIGRP -- INTRODUCCIÓN A BGP -- Iguales BGP -- Selección de ruta BGP -- PROCESO DE CONFIGURACIÓN DE BGP -- Identificación del IBGP -- Horizonte dividido BGP -- Reflector de ruta BGP -- Control de las normas de enrutamiento BGP -- Configuración de las listas de prefijos -- Sintaxis de la configuración de las listas de prefijos -- CASO PRÁCTICO -- Configuración básica de BGP -- VERIFICACIÓN BGP -- Resumen de comandos BGP -- 4 LISTAS DE CONTROL DE ACCESO -- ADMINISTRACIÓN DEL TRÁFICO IP -- Prueba de las condiciones de una ACL -- TIPOS DE LISTAS DE ACCESO -- Listas de acceso estándar -- Listas de acceso extendidas -- Listas de acceso dinámicas -- Listas de acceso con nombre -- Listas de acceso reflexivas -- Listas de acceso turbo -- APLICACIÓN DE UNA LISTA DE ACCESO -- Lista de acceso entrante -- Lista de acceso saliente -- WILDCARD EN LAS ACL…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
42678por Huidobro Moya, Huidobro MoyaTabla de Contenidos: “….) -- 3.2.3 Multiplexación por códigos -- 3.2.4 Control de potencia -- 3.2.5 Soft y softer handover -- 3.3 HSPA (...) -- 3.3.1 HSDPA (...) -- 3.3.2 HSUPA (...) -- 3.3.3 HSPA+ (...) -- 3.4 ESTRUCTURA DE CANALES EN UMTS -- 3.4.1 Canales lógicos -- 3.4.2 Canales de transporte -- 3.4.3 Canales físicos -- 3.4.4 Pila de protocolos de UMTS -- 3.5 ARQUITECTURA DE UNA RED UMTS -- 3.5.1 Red de acceso UTRAN -- 3.5.2 Núcleo de red UMTS -- 3.5.3 Terminales UMTS -- 3.5.4 IMS (...) -- 3.6 CALIDAD DE SERVICIO (QOS) -- 3.7 REALIZACIÓN DE UNA LLAMADA -- 3.7.1 Llamada de voz -- 3.7.2 Llamada de datos -- 3.7.3 Llamada multimedia (con IMS) -- 3.7.4 Llamadas simultáneas de voz y datos (...) -- 3.8 INTERFACES DE UMTS (...) -- 3.8.1 Interfaz radio UMTS (...) -- 3.8.2 Interfaces UTRAN (...) -- 3.8.3 Interfaces Core (...) -- 3.8.4 Interfaces IMS (...) -- 3.9 PROTOCOLOS DE UMTS -- 3.9.1 Protocolos UTRAN…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
42679Publicado 2018Tabla de Contenidos: “…. -- Kubernetes master -- API server (kube-apiserver) -- Scheduler (kube-scheduler) -- Controller manager (kube-controller-manager) -- Command-line interface (kubectl) -- Kubernetes node -- kubelet -- Proxy (kube-proxy) -- How it works... -- etcd -- Kubernetes network -- See also -- Setting up the Kubernetes cluster on macOS by minikube -- Getting ready -- How to do it... -- How it works... -- See also -- Setting up the Kubernetes cluster on Windows by minikube -- Getting ready -- How to do it... -- How it works... -- See also -- Setting up the Kubernetes cluster on Linux via kubeadm -- Getting ready -- How to do it... -- Package installation -- Ubuntu -- CentOS -- System configuration prerequisites -- CentOS system settings -- Booting up the service -- Network configurations for containers -- Getting a node involved -- How it works... -- See also -- Setting up the Kubernetes cluster on Linux via Ansible (kubespray) -- Getting ready -- Installing pip -- Installing Ansible -- Installing python-netaddr -- Setting up ssh public key authentication -- How to do it... -- Maintaining the Ansible inventory -- Running the Ansible ad hoc command to test your environment -- Ansible troubleshooting -- Need to specify a sudo password -- Need to specify different ssh logon user -- Need to change ssh port -- Common ansible issue -- How it works... -- See also -- Running your first container in Kubernetes -- Getting ready -- How to do it... -- Running a HTTP server (nginx) -- Exposing the port for external access -- Stopping the application -- How it works... -- See also…”
Libro electrónico -
42680Publicado 2017Tabla de Contenidos: “…Anwendung ausführen -- Zusammenfassung -- Kapitel 4 - Komponenten und Datenbindung -- Datenbindung in Angular -- Rückblick auf AngularJS 1.x -- Property-Binding -- Event-Bindings -- Das Zusammenspiel von Property- und Event-Bindings -- Bindings im Template -- Two-Way-Bindings -- Eigene Komponenten mit Datenbindung -- Eine Komponente mit Property-Binding -- Implementierung der Komponente mit Property-Bindings -- Komponente registrieren und aufrufen -- Komponenten mit Event-Bindings -- Implementierung der Komponente mit Event-Binding -- Komponente aufrufen -- Komponenten mit Two-Way-Bindings -- Life-Cycle-Hooks -- Ausgewählte Hooks -- Experiment mit Life-Cycle-Hooks -- DateControl mit Life-Cycle-Hooks -- Zusammenfassung -- Kapitel 5 - Pipes -- Überblick -- Built-in Pipes -- Eigene Pipes -- Pure Pipes -- Implementierung einer einfachen Pipe -- Pipes registrieren und nutzen -- Zusammenfassung -- Kapitel 6 - Services und Dependency Injection -- Austauschbarkeit dank Dependency Injection -- Services implementieren und nutzen -- Ein erster Service -- Einen Service global registrieren -- Einen Service nutzen -- Einen Service lokal registrieren -- Arten von Providern -- Token -- useClass -- useValue -- useFactory -- useExisting -- multi -- Konstanten als Token -- Zusammenfassung -- Kapitel 7 - Module -- Motivation -- Eine Angular-typische Modulstruktur -- Shared Modules -- Feature-Modules -- Root-Modules -- Module reexportieren -- Zusammenfassung -- Kapitel 8 - Routing -- Überblick -- Routing und Platzhalter -- Routen einsetzen -- Erste Schritte mit dem Router -- Routing-Konfiguration einrichten -- Root-Komponente einrichten -- AppModule anpassen -- Strukturierung mit Modulen -- Hierarchisches Routing mit Child-Routes -- Überblick zu Child-Routes -- Child-Routes implementieren -- Parametrisierte Routen -- Parameter an Routen übergeben…”
Libro electrónico