Mostrando 42,781 - 42,800 Resultados de 51,016 Para Buscar 'Nontron~', tiempo de consulta: 1.49s Limitar resultados
  1. 42781
    por Musciano, Chuck
    Publicado 2011
    Tabla de Contenidos: “…2.11 Frames2.12 Stylesheets and JavaScript; 2.13 Forging Ahead; Anatomy of an HTML Document; 3.1 Appearances Can Deceive; 3.2 Structure of an HTML Document; 3.3 Tags and Attributes; 3.3.1 The Syntax of a Tag; 3.3.2 Sample Tags; 3.3.3 Starting and Ending Tags; 3.3.4 Proper and Improper Nesting; 3.3.5 Tags Without Ends; 3.3.6 Omitting Tags; 3.3.7 Ignored or Redundant Tags; 3.4 Well-Formed Documents and XHTML; 3.5 Document Content; 3.5.1 Advice Versus Control; 3.5.2 Character Entities; 3.5.3 Comments; 3.6 HTML/XHTML Document Elements; 3.6.1 The Tag; 3.6.1.1 The dir attribute…”
    Libro electrónico
  2. 42782
    Publicado 2008
    Tabla de Contenidos: “…3.1.2 Semi-Transparent Pixels3.1.3 Summing the Layers; 3.2 Multipass Compositing; 3.2.1 Diffuse and Specular Passes; 3.2.2 Occlusion and Shadow Passes; 3.2.3 Re. ection Pass; 3.2.4 Creative Control; 3.3 Depth Compositing; 3.4 Multiplane Compositing; 3.5 Sims; 3.6 Particle Systems; 3.7 Working with Premultiplied CGI; 3.7.1 Color Correcting; 3.7.2 Transformations and Filters; 3.7.3 The Common Mistake; Chapter4 Bluescreen Compositing; 4.1 The Bluescreen Composite; 4.1.1 Pulling the Matte; 4.1.2 The Basic Composite; 4.2 About Keyers; 4.2.1 How Keyers Work; 4.2.2 Despill; 4.2.3 Color Correction…”
    Libro electrónico
  3. 42783
    por Grout, Ian
    Publicado 2008
    “…Totally practical in nature, the book features numerous (quantify when known) case study designs using a variety of Field Programmable Gate Array (FPGA) and Complex Programmable Logic Devices (CPLD), for a range of applications from control and instrumentation to semiconductor automatic test equipment.Key features include:* Case studies that provide a walk through of the design process, highlighting the trade-offs involved.* Discussion of real world issues su…”
    Libro electrónico
  4. 42784
    por Toutain, Laurent
    Publicado 2011
    Tabla de Contenidos: “…Format of IPv4 datagrams; 7.4. The ICMP (Internet Control Message Protocol) (RFC 792); 7.4.1. The message cannot reach its destination; 7.4.2. …”
    Libro electrónico
  5. 42785
    Publicado 2012
    Tabla de Contenidos: “…Safdar -- 16.1 Introduction 443 -- 16.2 Cognitive Radio: A Definition 443 -- 16.3 Spectrum Sensing in CRNs 448 -- 16.4 Spectrum Assignment / Medium Access Control in CRNs 452 -- 16.5 Security in Cognitive Radio Networks 461 -- 16.6 Applications of CRNs 468 -- 16.7 Summary 470 -- 17 Antenna Design for Small Devices 473 / Tim Brown -- 17.1 Antenna Fundamentals 474 -- 17.2 Figures of Merit and their Impact on the Propagation Channel 477 -- 17.3 Challenges in Mobile Terminal Antenna Design 484 -- 17.4 Multiple-Antenna Minaturization Techniques 485 -- 17.5 Multiple Antennas with Multiple Bands 489 -- 17.6 Multiple Users and Antenna Effects 491 -- 17.7 Small Cell Antennas 492 -- 17.8 Summary 492 -- 18 Statistical Characterization of Antennas in BANs 495 / Carla Oliveira, Michal Mackowiak and Luis M. …”
    Libro electrónico
  6. 42786
    Publicado 2011
    Tabla de Contenidos: “…-- Well-Formedness Rules -- XML Encoding -- Special Characters -- Summary -- 2 Native XML Storage: XMLType -- Creating XMLTypes -- XML Schema-based XMLType -- Querying XMLTypes -- Updating XMLTypes -- Transforming XMLTypes -- Reading Binary XMLTypes in Java -- Summary -- 3 XML Database Repository -- Creating Resources -- Deleting Resources -- Querying XML DB Repository -- Using RESOURCE_VIEW and PATH_VIEW -- Using XDBUriType -- Linking to Resources -- Updating Resources -- Version Control -- Using XML DB Repository Events -- Creating Event Handlers -- Registering Event Handlers -- Summary -- 4 Parsing XML -- DOM Parsing in Java -- Basic DOM Parsing -- Splitting XML Using DOM -- Scalable DOM Parsing -- Cutting and Pasting Across Documents -- DOM Parsing in SQL -- Retrieving and Creating a CDATA Section -- Importing a DOM Node -- SAX Parsing -- Basic SAX Parsing -- SAX Print -- Parsing Binary XML -- Writing XML to Binary XML -- Reading from Binary XML -- Summary -- 5 Validating XML -- DTD Validation -- Using Oracle XDK Command-Line Utility -- Using Oracle XDK Java APIs -- Using Oracle XML DB -- XML Schema Validation -- XML Schema and Namespaces -- Using Oracle XDK Command-Line Utility -- Using Oracle XDK Java APIs -- Using Oracle XML DB -- Using JAXB with XML Schemas -- Summary -- 6 Navigating XML with XPath -- XPath Basics -- Processing XPath in Java -- Extracting XPath from XML Documents -- Summary -- 7 XSL Transformations -- Understanding XSLT Processing -- Basic XSLT Features -- Multiple XML Inputs -- Building an XSL Index -- Creating XSLT Extensions -- Advanced XSLT Features -- Modularizing XSLT Processing with Temporary Trees…”
    Libro electrónico
  7. 42787
    por Moraschi, Davide
    Publicado 2013
    “…MicroStrategy products allow you to take control of your business intelligence, and this book gives you the know-how to undertake successful data analysis. …”
    Libro electrónico
  8. 42788
    Publicado 2014
    “…Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level hardware issues (such as buffer organization, router delay, and flow control) to the high-level issues immediately concerning application or system users (including parallel programming, middleware, and OS support for such computing systems). …”
    Libro electrónico
  9. 42789
    por Wright, Steve
    Publicado 2011
    Tabla de Contenidos: “…3 Compositing CGI3.1 THE CGI COMPOSITE; 3.1.1 Scaling the Background; 3.1.2 Semi-transparent Pixels; 3.1.3 Summing the Layers; 3.2 MULTIPASS COMPOSITING; 3.2.1 Diffuse and Specular Passes; 3.2.2 Occlusion and Shadow Passes; 3.2.3 Reflection Pass; 3.2.4 Creative Control; 3.3 DEPTH COMPOSITING; 3.4 MULTIPLANE COMPOSITING; 3.5 SIMS; 3.6 PARTICLE SYSTEMS; 3.7 WORKING WITH PREMULTIPLIED CGI; 3.7.1 Color Correcting; 3.7.2 Transformations and Filters; 3.7.3 The Common Mistake; 3.8 3D COMPOSITING; 3.8.1 The 3D Compositing Environment; 3.8.2 Placing 3D in Live Action; 3.8.3 Placing Live Action in 3D…”
    Libro electrónico
  10. 42790
    Publicado 2017
    Tabla de Contenidos: “…. -- Installing domain controllers and DNS -- Getting ready -- How to do it... -- How it works... -- There's more... -- Configuring zones and resource records in DNS -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing and authorizing a DHCP server -- Getting ready -- How to do it... -- How it works... -- There's more... -- Configuring DHCP scopes -- Getting ready -- How to do it... -- How it works... -- There's more... -- Configuring DHCP server failover and load balancing -- Getting ready -- How to do it... -- How it works... -- There's more... -- Building a public key infrastructure -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating and managing AD users, groups, and computers -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding users to AD using a CSV file -- Getting ready -- How to do it... -- How it works... -- There's more... -- Reporting on AD users -- Getting ready -- How to do it... -- How it works... -- There's more... -- Finding expired computers in AD -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a privileged user report -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 9: Managing Network Shares -- Introduction -- Securing your SMB file server -- Getting ready -- How to do it... -- How it works... -- There's more…”
    Libro electrónico
  11. 42791
    Publicado 2018
    Tabla de Contenidos: “…-- Building blocks of information security -- Computer security -- Network security -- Firewalls -- Intrusion detection systems / intrusion prevention systems -- Multitier topology -- Internet security -- Password -- System upgrade and updates -- Phishing -- Beware of phishing phone calls -- Phishing protection -- Security issues, threats, and attacks -- IoT security risk -- Computer security risk -- Security Risk-Border Gateway Protocol -- Security and threats -- Natural disasters -- Human threats -- Security vulnerabilities -- Technology weaknesses -- Configuration weaknesses -- Security policy weaknesses -- Using unencrypted or weak encryption for a website -- Summary -- Questions -- Further reading -- Chapter 2: Secure Network Design -- Access control -- Asset classification and physical security -- Authentication, authorization, and accounting -- Network management and security design -- Network segmentation -- Segmentation strategy steps -- Network protection consideration and design -- Hardening your TCP/IP stack -- DoS and DDoS attacks -- Volume-based attacks -- Application layer attacks -- Low-rate attacks -- IP spoofing -- Anti-spoofing using access lists -- Encryption -- Anti-spoofing using RPF checks -- Ping sweeps and Port scans -- Mitigation -- DNS vulnerabilities -- How does DNS work? …”
    Libro electrónico
  12. 42792
    Publicado 2021
    Tabla de Contenidos: “…-- 2 Studio techniques and working on location -- 2.1 Equipment -- 2.2 Practicalities at the recording venue -- 2.3 Rigging microphones and running cables -- 2.4 The control room -- 2.5 Studio communications: talkback, telephones, and cue lights -- 2.6 Optimising recording workflow -- 2.7 Running the session -- Part II Recording -- 3 Basic two-microphone stereo techniques -- 3.1 Co-incident microphone techniques -- 3.2 Spaced omnis -- 3.3 Spaced and angled cardioids -- 4 Solo instruments -- 4.1 Classical guitar and flamenco guitar -- 4.2 Harp -- 4.3 Violin -- 4.4 Cello -- 4.5 Woodwinds -- 4.6 Harpsichord -- 5 The piano -- 5.1 The nature of the sound of a piano -- 5.2 The physical layout of a grand piano -- 5.3 The piano lid -- 5.4 Recording aims -- 5.5 Recording a solo piano: the spaced pair -- 5.6 The Decca piano technique -- 5.7 Techniques for other scenarios -- 5.8 Practical issues when recording pianos -- 6 Voice: solo and accompanied -- 6.1 The singer in a recording session -- 6.2 The classical voice and microphone placement -- 6.3 Using two microphones on the voice -- 6.4 Microphone choice -- 6.5 Use of ambient pairs -- 6.6 Concert recording layout -- 6.7 Studio recording and reverse concert positions -- 6.8 Classical voice and lute/theorbo/guitar -- 6.9 Mixing and fader riding for a singer -- 7 Solo instruments and piano -- 7.1 Violin and piano in concert -- 7.2 Violin and piano: studio layout -- 7.3 Cello and piano in concert…”
    Libro electrónico
  13. 42793
    Publicado 2004
    Tabla de Contenidos: “…SAP BW performance -- 8.1 The approach -- 8.2 Health check -- 8.2.1 SAP Notes related to performance and system configuration -- 8.2.2 How to keep DB2 database statistics current with SAP BW -- 8.2.3 How to control DB2 log space consumption with SAP BW -- 8.2.4 Recommended configuration parameters -- 8.3 Performance tuning -- 8.3.1 General SAP BW tuning -- 8.3.2 Tuning DB2 UDB ESE -- 8.4 Performance monitoring of SAP BW on DB2 UDB -- 8.4.1 Performance bottlenecks -- 8.4.2 Proactive monitoring -- 8.4.3 Problem analysis and resolution -- Chapter 9. …”
    Libro electrónico
  14. 42794
    Publicado 2019
    Tabla de Contenidos: “…Nanoceria and disease control -- 3.1.2. Industrial applications -- 3.1.3. …”
    Libro electrónico
  15. 42795
    Publicado 2024
    Tabla de Contenidos: “…Things Not to Do-By Anyone -- Don't Wait for an Edict -- Don't Confuse Your Title with Your Role -- Don't Arbitrarily Use the Language in This Book -- Tips for Unclogging the Pipeline -- Return to Their Previous Specialist or Professional Role Those Leaders Who Won't Make Time For or Can't Do Leadership Work -- Increase the Span-of-Control to Reduce Role Confusion -- Final Note -- 10 Meaningful Dialogues for Performance, Engagement, and Retention -- Where to Start -- What to Watch Out For -- Leaders Working at the Wrong Level -- Roles Remaining Undefined -- Using Leadership Pipeline Performance Circles -- Performance Gaps Will Always Emerge When Someone Is Appointed to a New Leadership Level -- Development Must Go on Until They Reach Full Performance -- Full Performers Should Be Tested for Excess Capacity-Then Promoted If They Demonstrate It -- Strategies for Getting to Full Performance -- Strategy 1: Start with the Manager, Not the Direct Report -- Strategy 2: Search for Evidence of an Appropriate Values Shift -- Strategy 3: Support Leaders in Their Transition -- Strategy 4: Address Inappropriate Performance Immediately -- The Retention-Development Connection -- 11 How the Leadership Pipeline Model Is Applied to Unique Roles -- Project Leader -- Scaled Agile Organizations Leader -- Squad Lead -- Chapter Lead -- Tribe Lead -- Leader of Contractors -- Section Leader -- Group Leader -- Challenges of the Role -- Benefits of the Role -- What Success in the Role Looks Like -- The Authors -- Index -- EULA…”
    Libro electrónico
  16. 42796
    Publicado 2022
    Tabla de Contenidos: “…Operational reports (KPI reports) -- Knowing important analytical tools -- Query tools -- Spreadsheet tools -- Programming language tools -- Visualization tools -- Business services -- All-purpose tools -- Which tools you should learn to use -- Summary -- Practice questions -- Questions -- Answers -- Chapter 12: Reporting Process -- Understanding the report development process -- Creating a plan -- Getting the plan approved -- Creating the report -- Delivering the report -- Knowing what to consider when making a report -- Business requirements -- Dashboard-specific requirements -- Understanding report elements -- Understanding report delivery -- Designing reports -- Branding -- Fonts, layouts, and chart elements -- Color theory -- Summary -- Practice questions -- Questions -- Answers -- Chapter 13: Common Visualizations -- Understanding infographics and word clouds -- Infographics -- Word clouds -- Comprehending bar charts -- Bar charts -- Stacked charts -- Histograms -- Waterfall charts -- Charting lines, circles, and dots -- Line charts -- Pareto charts -- Pie charts -- Scatter plots -- Bubble charts -- Understanding heat maps, tree maps, and geographic maps -- Heat maps -- Tree maps -- Geographic maps -- Summary -- Practice questions -- Questions -- Answers -- Chapter 14: Data Governance -- Understanding data security -- Access requirements -- Security requirements -- Knowing use requirements -- Acceptable use policy -- Data processing -- Data deletion -- Data retention -- Understanding data classifications -- Personally identifiable information -- Personal health information -- Payment Card Industry -- Handling entity relationship requirements -- Summary -- Practice questions -- Questions -- Answers -- Chapter 15: Data Quality and Management -- Understanding quality control -- When to check for quality -- Data quality dimensions…”
    Libro electrónico
  17. 42797
    Publicado 2024
    Tabla de Contenidos: “…Numeric values in the ACL -- Ownership -- Transactions -- File catalog commands -- About hashing -- New-FileCatalog -- Test-FileCatalog -- Summary -- Chapter 11: Windows Management Instrumentation -- Working with WMI -- WMI classes -- WMI commands -- CIM commands -- Getting instances -- Getting classes -- Calling methods -- Creating instances -- Removing instances -- Working with CIM sessions -- Associated classes -- The WMI Query Language -- Understanding SELECT, WHERE, and FROM -- Escape sequences and wildcards -- Comparison operators -- WQL filters and dates -- Logic operators -- Quoting values -- Associated classes -- WMI object paths -- Using ASSOCIATORS OF -- WMI type accelerators -- Getting instances -- Working with dates -- Getting classes -- Calling methods -- Creating instances -- Associated classes -- Permissions -- Sharing permissions -- Creating a shared directory -- Getting a security descriptor -- Adding an access control entry -- Setting the security descriptor -- WMI permissions -- Getting a security descriptor -- The access mask -- WMI and SDDL -- Summary -- Chapter 12: Working with HTML, XML, and JSON -- ConvertTo-Html -- Multiple tables -- Adding style -- ConvertTo-Html and Send-MailMessage -- Windows PowerShell and ConvertTo-Html -- Modifying HTML content -- XML commands -- About XML -- Elements and attributes -- Namespaces -- Schemas -- Select-Xml -- Select-Xml and namespaces -- ConvertTo-Xml -- System.Xml -- The XML type accelerator -- XPath and XmlDocument -- SelectNodes and XPathNodeList -- Working with namespaces -- Creating XML documents -- Modifying element and attribute values -- Adding elements -- Removing elements and attributes -- Copying nodes between documents -- Schema validation -- Inferring a schema -- System.Xml.Linq -- Opening documents -- Selecting nodes -- Creating documents -- Working with namespaces…”
    Libro electrónico
  18. 42798
    Publicado 2018
    Tabla de Contenidos: “…based Mobile Networks 88 -- 4.4.1 Data Link Security 88 -- 4.4.2 Control Channels Security 89 -- 4.4.3 Traffic Monitoring 91 -- 4.4.4 Access Control 91 -- 4.4.5 Network Resilience 91 -- 4.4.6 Security Systems and Firewalls 92 -- 4.4.7 Network Security Automation 92.…”
    Libro electrónico
  19. 42799
    Publicado 2010
    Tabla de Contenidos: “….) -- MEDIO AMBIENTE, AGENTES CAUSALES, HUÉSPED Y SU INTERRELACIÓN -- MANIFESTACIONES GENERALES DE LAS ENFERMEDADES -- PRINCIPALES ENFERMEDADES ZOONÓTICAS TRANSMISIBLES POR BOVINOS -- MECANISMO DE TRANSMISIÓN EN EL HOMBRE -- MECANISMO DE TRANSMISIÓN EN LOS ANIMALES -- BRUCELOSIS -- MEDIDAS PROFILÁCTICAS PARA EL CONTROL DE ENFERMEDADES -- CONCEPTO E IMPORTANCIA DEL AISLAMIENTO Y CUARENTENA DE BOVINOS -- NORMAS DE BIOSEGURIDAD, BUENAS PRÁCTICAS AGRÍCOLAS Y BUENAS PRÁCTICAS (...) -- CAPÍTULO 2. …”
    Enlace del recurso
    Libro electrónico
  20. 42800
    Publicado 2019
    Tabla de Contenidos: “….) -- BIBLIOGRAFÍA -- CAPÍTULO 14. EL CONTROL URBANÍSTICO…”
    Libro electrónico