Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
42781por Musciano, ChuckTabla de Contenidos: “…2.11 Frames2.12 Stylesheets and JavaScript; 2.13 Forging Ahead; Anatomy of an HTML Document; 3.1 Appearances Can Deceive; 3.2 Structure of an HTML Document; 3.3 Tags and Attributes; 3.3.1 The Syntax of a Tag; 3.3.2 Sample Tags; 3.3.3 Starting and Ending Tags; 3.3.4 Proper and Improper Nesting; 3.3.5 Tags Without Ends; 3.3.6 Omitting Tags; 3.3.7 Ignored or Redundant Tags; 3.4 Well-Formed Documents and XHTML; 3.5 Document Content; 3.5.1 Advice Versus Control; 3.5.2 Character Entities; 3.5.3 Comments; 3.6 HTML/XHTML Document Elements; 3.6.1 The Tag; 3.6.1.1 The dir attribute…”
Publicado 2011
Libro electrónico -
42782Publicado 2008Tabla de Contenidos: “…3.1.2 Semi-Transparent Pixels3.1.3 Summing the Layers; 3.2 Multipass Compositing; 3.2.1 Diffuse and Specular Passes; 3.2.2 Occlusion and Shadow Passes; 3.2.3 Re. ection Pass; 3.2.4 Creative Control; 3.3 Depth Compositing; 3.4 Multiplane Compositing; 3.5 Sims; 3.6 Particle Systems; 3.7 Working with Premultiplied CGI; 3.7.1 Color Correcting; 3.7.2 Transformations and Filters; 3.7.3 The Common Mistake; Chapter4 Bluescreen Compositing; 4.1 The Bluescreen Composite; 4.1.1 Pulling the Matte; 4.1.2 The Basic Composite; 4.2 About Keyers; 4.2.1 How Keyers Work; 4.2.2 Despill; 4.2.3 Color Correction…”
Libro electrónico -
42783por Grout, Ian“…Totally practical in nature, the book features numerous (quantify when known) case study designs using a variety of Field Programmable Gate Array (FPGA) and Complex Programmable Logic Devices (CPLD), for a range of applications from control and instrumentation to semiconductor automatic test equipment.Key features include:* Case studies that provide a walk through of the design process, highlighting the trade-offs involved.* Discussion of real world issues su…”
Publicado 2008
Libro electrónico -
42784por Toutain, LaurentTabla de Contenidos: “…Format of IPv4 datagrams; 7.4. The ICMP (Internet Control Message Protocol) (RFC 792); 7.4.1. The message cannot reach its destination; 7.4.2. …”
Publicado 2011
Libro electrónico -
42785Publicado 2012Tabla de Contenidos: “…Safdar -- 16.1 Introduction 443 -- 16.2 Cognitive Radio: A Definition 443 -- 16.3 Spectrum Sensing in CRNs 448 -- 16.4 Spectrum Assignment / Medium Access Control in CRNs 452 -- 16.5 Security in Cognitive Radio Networks 461 -- 16.6 Applications of CRNs 468 -- 16.7 Summary 470 -- 17 Antenna Design for Small Devices 473 / Tim Brown -- 17.1 Antenna Fundamentals 474 -- 17.2 Figures of Merit and their Impact on the Propagation Channel 477 -- 17.3 Challenges in Mobile Terminal Antenna Design 484 -- 17.4 Multiple-Antenna Minaturization Techniques 485 -- 17.5 Multiple Antennas with Multiple Bands 489 -- 17.6 Multiple Users and Antenna Effects 491 -- 17.7 Small Cell Antennas 492 -- 17.8 Summary 492 -- 18 Statistical Characterization of Antennas in BANs 495 / Carla Oliveira, Michal Mackowiak and Luis M. …”
Libro electrónico -
42786Publicado 2011Tabla de Contenidos: “…-- Well-Formedness Rules -- XML Encoding -- Special Characters -- Summary -- 2 Native XML Storage: XMLType -- Creating XMLTypes -- XML Schema-based XMLType -- Querying XMLTypes -- Updating XMLTypes -- Transforming XMLTypes -- Reading Binary XMLTypes in Java -- Summary -- 3 XML Database Repository -- Creating Resources -- Deleting Resources -- Querying XML DB Repository -- Using RESOURCE_VIEW and PATH_VIEW -- Using XDBUriType -- Linking to Resources -- Updating Resources -- Version Control -- Using XML DB Repository Events -- Creating Event Handlers -- Registering Event Handlers -- Summary -- 4 Parsing XML -- DOM Parsing in Java -- Basic DOM Parsing -- Splitting XML Using DOM -- Scalable DOM Parsing -- Cutting and Pasting Across Documents -- DOM Parsing in SQL -- Retrieving and Creating a CDATA Section -- Importing a DOM Node -- SAX Parsing -- Basic SAX Parsing -- SAX Print -- Parsing Binary XML -- Writing XML to Binary XML -- Reading from Binary XML -- Summary -- 5 Validating XML -- DTD Validation -- Using Oracle XDK Command-Line Utility -- Using Oracle XDK Java APIs -- Using Oracle XML DB -- XML Schema Validation -- XML Schema and Namespaces -- Using Oracle XDK Command-Line Utility -- Using Oracle XDK Java APIs -- Using Oracle XML DB -- Using JAXB with XML Schemas -- Summary -- 6 Navigating XML with XPath -- XPath Basics -- Processing XPath in Java -- Extracting XPath from XML Documents -- Summary -- 7 XSL Transformations -- Understanding XSLT Processing -- Basic XSLT Features -- Multiple XML Inputs -- Building an XSL Index -- Creating XSLT Extensions -- Advanced XSLT Features -- Modularizing XSLT Processing with Temporary Trees…”
Libro electrónico -
42787por Moraschi, Davide“…MicroStrategy products allow you to take control of your business intelligence, and this book gives you the know-how to undertake successful data analysis. …”
Publicado 2013
Libro electrónico -
42788Publicado 2014“…Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level hardware issues (such as buffer organization, router delay, and flow control) to the high-level issues immediately concerning application or system users (including parallel programming, middleware, and OS support for such computing systems). …”
Libro electrónico -
42789por Wright, SteveTabla de Contenidos: “…3 Compositing CGI3.1 THE CGI COMPOSITE; 3.1.1 Scaling the Background; 3.1.2 Semi-transparent Pixels; 3.1.3 Summing the Layers; 3.2 MULTIPASS COMPOSITING; 3.2.1 Diffuse and Specular Passes; 3.2.2 Occlusion and Shadow Passes; 3.2.3 Reflection Pass; 3.2.4 Creative Control; 3.3 DEPTH COMPOSITING; 3.4 MULTIPLANE COMPOSITING; 3.5 SIMS; 3.6 PARTICLE SYSTEMS; 3.7 WORKING WITH PREMULTIPLIED CGI; 3.7.1 Color Correcting; 3.7.2 Transformations and Filters; 3.7.3 The Common Mistake; 3.8 3D COMPOSITING; 3.8.1 The 3D Compositing Environment; 3.8.2 Placing 3D in Live Action; 3.8.3 Placing Live Action in 3D…”
Publicado 2011
Libro electrónico -
42790Publicado 2017Tabla de Contenidos: “…. -- Installing domain controllers and DNS -- Getting ready -- How to do it... -- How it works... -- There's more... -- Configuring zones and resource records in DNS -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing and authorizing a DHCP server -- Getting ready -- How to do it... -- How it works... -- There's more... -- Configuring DHCP scopes -- Getting ready -- How to do it... -- How it works... -- There's more... -- Configuring DHCP server failover and load balancing -- Getting ready -- How to do it... -- How it works... -- There's more... -- Building a public key infrastructure -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating and managing AD users, groups, and computers -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding users to AD using a CSV file -- Getting ready -- How to do it... -- How it works... -- There's more... -- Reporting on AD users -- Getting ready -- How to do it... -- How it works... -- There's more... -- Finding expired computers in AD -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a privileged user report -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 9: Managing Network Shares -- Introduction -- Securing your SMB file server -- Getting ready -- How to do it... -- How it works... -- There's more…”
Libro electrónico -
42791Publicado 2018Tabla de Contenidos: “…-- Building blocks of information security -- Computer security -- Network security -- Firewalls -- Intrusion detection systems / intrusion prevention systems -- Multitier topology -- Internet security -- Password -- System upgrade and updates -- Phishing -- Beware of phishing phone calls -- Phishing protection -- Security issues, threats, and attacks -- IoT security risk -- Computer security risk -- Security Risk-Border Gateway Protocol -- Security and threats -- Natural disasters -- Human threats -- Security vulnerabilities -- Technology weaknesses -- Configuration weaknesses -- Security policy weaknesses -- Using unencrypted or weak encryption for a website -- Summary -- Questions -- Further reading -- Chapter 2: Secure Network Design -- Access control -- Asset classification and physical security -- Authentication, authorization, and accounting -- Network management and security design -- Network segmentation -- Segmentation strategy steps -- Network protection consideration and design -- Hardening your TCP/IP stack -- DoS and DDoS attacks -- Volume-based attacks -- Application layer attacks -- Low-rate attacks -- IP spoofing -- Anti-spoofing using access lists -- Encryption -- Anti-spoofing using RPF checks -- Ping sweeps and Port scans -- Mitigation -- DNS vulnerabilities -- How does DNS work? …”
Libro electrónico -
42792Publicado 2021Tabla de Contenidos: “…-- 2 Studio techniques and working on location -- 2.1 Equipment -- 2.2 Practicalities at the recording venue -- 2.3 Rigging microphones and running cables -- 2.4 The control room -- 2.5 Studio communications: talkback, telephones, and cue lights -- 2.6 Optimising recording workflow -- 2.7 Running the session -- Part II Recording -- 3 Basic two-microphone stereo techniques -- 3.1 Co-incident microphone techniques -- 3.2 Spaced omnis -- 3.3 Spaced and angled cardioids -- 4 Solo instruments -- 4.1 Classical guitar and flamenco guitar -- 4.2 Harp -- 4.3 Violin -- 4.4 Cello -- 4.5 Woodwinds -- 4.6 Harpsichord -- 5 The piano -- 5.1 The nature of the sound of a piano -- 5.2 The physical layout of a grand piano -- 5.3 The piano lid -- 5.4 Recording aims -- 5.5 Recording a solo piano: the spaced pair -- 5.6 The Decca piano technique -- 5.7 Techniques for other scenarios -- 5.8 Practical issues when recording pianos -- 6 Voice: solo and accompanied -- 6.1 The singer in a recording session -- 6.2 The classical voice and microphone placement -- 6.3 Using two microphones on the voice -- 6.4 Microphone choice -- 6.5 Use of ambient pairs -- 6.6 Concert recording layout -- 6.7 Studio recording and reverse concert positions -- 6.8 Classical voice and lute/theorbo/guitar -- 6.9 Mixing and fader riding for a singer -- 7 Solo instruments and piano -- 7.1 Violin and piano in concert -- 7.2 Violin and piano: studio layout -- 7.3 Cello and piano in concert…”
Libro electrónico -
42793Publicado 2004Tabla de Contenidos: “…SAP BW performance -- 8.1 The approach -- 8.2 Health check -- 8.2.1 SAP Notes related to performance and system configuration -- 8.2.2 How to keep DB2 database statistics current with SAP BW -- 8.2.3 How to control DB2 log space consumption with SAP BW -- 8.2.4 Recommended configuration parameters -- 8.3 Performance tuning -- 8.3.1 General SAP BW tuning -- 8.3.2 Tuning DB2 UDB ESE -- 8.4 Performance monitoring of SAP BW on DB2 UDB -- 8.4.1 Performance bottlenecks -- 8.4.2 Proactive monitoring -- 8.4.3 Problem analysis and resolution -- Chapter 9. …”
Libro electrónico -
42794Publicado 2019Tabla de Contenidos: “…Nanoceria and disease control -- 3.1.2. Industrial applications -- 3.1.3. …”
Libro electrónico -
42795Publicado 2024Tabla de Contenidos: “…Things Not to Do-By Anyone -- Don't Wait for an Edict -- Don't Confuse Your Title with Your Role -- Don't Arbitrarily Use the Language in This Book -- Tips for Unclogging the Pipeline -- Return to Their Previous Specialist or Professional Role Those Leaders Who Won't Make Time For or Can't Do Leadership Work -- Increase the Span-of-Control to Reduce Role Confusion -- Final Note -- 10 Meaningful Dialogues for Performance, Engagement, and Retention -- Where to Start -- What to Watch Out For -- Leaders Working at the Wrong Level -- Roles Remaining Undefined -- Using Leadership Pipeline Performance Circles -- Performance Gaps Will Always Emerge When Someone Is Appointed to a New Leadership Level -- Development Must Go on Until They Reach Full Performance -- Full Performers Should Be Tested for Excess Capacity-Then Promoted If They Demonstrate It -- Strategies for Getting to Full Performance -- Strategy 1: Start with the Manager, Not the Direct Report -- Strategy 2: Search for Evidence of an Appropriate Values Shift -- Strategy 3: Support Leaders in Their Transition -- Strategy 4: Address Inappropriate Performance Immediately -- The Retention-Development Connection -- 11 How the Leadership Pipeline Model Is Applied to Unique Roles -- Project Leader -- Scaled Agile Organizations Leader -- Squad Lead -- Chapter Lead -- Tribe Lead -- Leader of Contractors -- Section Leader -- Group Leader -- Challenges of the Role -- Benefits of the Role -- What Success in the Role Looks Like -- The Authors -- Index -- EULA…”
Libro electrónico -
42796Publicado 2022Tabla de Contenidos: “…Operational reports (KPI reports) -- Knowing important analytical tools -- Query tools -- Spreadsheet tools -- Programming language tools -- Visualization tools -- Business services -- All-purpose tools -- Which tools you should learn to use -- Summary -- Practice questions -- Questions -- Answers -- Chapter 12: Reporting Process -- Understanding the report development process -- Creating a plan -- Getting the plan approved -- Creating the report -- Delivering the report -- Knowing what to consider when making a report -- Business requirements -- Dashboard-specific requirements -- Understanding report elements -- Understanding report delivery -- Designing reports -- Branding -- Fonts, layouts, and chart elements -- Color theory -- Summary -- Practice questions -- Questions -- Answers -- Chapter 13: Common Visualizations -- Understanding infographics and word clouds -- Infographics -- Word clouds -- Comprehending bar charts -- Bar charts -- Stacked charts -- Histograms -- Waterfall charts -- Charting lines, circles, and dots -- Line charts -- Pareto charts -- Pie charts -- Scatter plots -- Bubble charts -- Understanding heat maps, tree maps, and geographic maps -- Heat maps -- Tree maps -- Geographic maps -- Summary -- Practice questions -- Questions -- Answers -- Chapter 14: Data Governance -- Understanding data security -- Access requirements -- Security requirements -- Knowing use requirements -- Acceptable use policy -- Data processing -- Data deletion -- Data retention -- Understanding data classifications -- Personally identifiable information -- Personal health information -- Payment Card Industry -- Handling entity relationship requirements -- Summary -- Practice questions -- Questions -- Answers -- Chapter 15: Data Quality and Management -- Understanding quality control -- When to check for quality -- Data quality dimensions…”
Libro electrónico -
42797Publicado 2024Tabla de Contenidos: “…Numeric values in the ACL -- Ownership -- Transactions -- File catalog commands -- About hashing -- New-FileCatalog -- Test-FileCatalog -- Summary -- Chapter 11: Windows Management Instrumentation -- Working with WMI -- WMI classes -- WMI commands -- CIM commands -- Getting instances -- Getting classes -- Calling methods -- Creating instances -- Removing instances -- Working with CIM sessions -- Associated classes -- The WMI Query Language -- Understanding SELECT, WHERE, and FROM -- Escape sequences and wildcards -- Comparison operators -- WQL filters and dates -- Logic operators -- Quoting values -- Associated classes -- WMI object paths -- Using ASSOCIATORS OF -- WMI type accelerators -- Getting instances -- Working with dates -- Getting classes -- Calling methods -- Creating instances -- Associated classes -- Permissions -- Sharing permissions -- Creating a shared directory -- Getting a security descriptor -- Adding an access control entry -- Setting the security descriptor -- WMI permissions -- Getting a security descriptor -- The access mask -- WMI and SDDL -- Summary -- Chapter 12: Working with HTML, XML, and JSON -- ConvertTo-Html -- Multiple tables -- Adding style -- ConvertTo-Html and Send-MailMessage -- Windows PowerShell and ConvertTo-Html -- Modifying HTML content -- XML commands -- About XML -- Elements and attributes -- Namespaces -- Schemas -- Select-Xml -- Select-Xml and namespaces -- ConvertTo-Xml -- System.Xml -- The XML type accelerator -- XPath and XmlDocument -- SelectNodes and XPathNodeList -- Working with namespaces -- Creating XML documents -- Modifying element and attribute values -- Adding elements -- Removing elements and attributes -- Copying nodes between documents -- Schema validation -- Inferring a schema -- System.Xml.Linq -- Opening documents -- Selecting nodes -- Creating documents -- Working with namespaces…”
Libro electrónico -
42798Publicado 2018Tabla de Contenidos: “…based Mobile Networks 88 -- 4.4.1 Data Link Security 88 -- 4.4.2 Control Channels Security 89 -- 4.4.3 Traffic Monitoring 91 -- 4.4.4 Access Control 91 -- 4.4.5 Network Resilience 91 -- 4.4.6 Security Systems and Firewalls 92 -- 4.4.7 Network Security Automation 92.…”
Libro electrónico -
42799Publicado 2010Tabla de Contenidos: “….) -- MEDIO AMBIENTE, AGENTES CAUSALES, HUÉSPED Y SU INTERRELACIÓN -- MANIFESTACIONES GENERALES DE LAS ENFERMEDADES -- PRINCIPALES ENFERMEDADES ZOONÓTICAS TRANSMISIBLES POR BOVINOS -- MECANISMO DE TRANSMISIÓN EN EL HOMBRE -- MECANISMO DE TRANSMISIÓN EN LOS ANIMALES -- BRUCELOSIS -- MEDIDAS PROFILÁCTICAS PARA EL CONTROL DE ENFERMEDADES -- CONCEPTO E IMPORTANCIA DEL AISLAMIENTO Y CUARENTENA DE BOVINOS -- NORMAS DE BIOSEGURIDAD, BUENAS PRÁCTICAS AGRÍCOLAS Y BUENAS PRÁCTICAS (...) -- CAPÍTULO 2. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
42800Publicado 2019Tabla de Contenidos: “….) -- BIBLIOGRAFÍA -- CAPÍTULO 14. EL CONTROL URBANÍSTICO…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico