Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
43061Publicado 2019Tabla de Contenidos: “…La Escuela Normal de Magisterio de Castellón durante el primer Franquismo -- Periodo de control y desconcierto entre el personal docente y administrativo de la Escuela Normal d -- La difícil tarea de reconstruir el edificio de la Escuela Normal -- Improvisación y pérdida de calidad educativa en la formación de las nuevas promociones de alumnos de -- 4. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull, Universidad Loyola - Universidad Loyola Granada)Lectura limitada a 1 usuario concurrente.
Libro electrónico -
43062Publicado 2020Tabla de Contenidos: “…Vulnerabilidades de China: alimentos, hidrocarburos, control financierista y portaviones 9. ¿Grupo de Shanghai frena irredentismo de Estados Unidos/otan/Israel? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
43063por Moralejo Ordax, JavierTabla de Contenidos: “…EL CONTROL DEL TERRITORIO Y LAS FUENTES EPIGRÁFICAS -- 4.3.2. …”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
43064Publicado 2021Tabla de Contenidos: “…-- 10.4.2 Challenges -- 10.5 Overview of Blockchain and Hyper Ledger Methodologies -- 10.5.1 Blockchain -- 10.5.2 Electronic Health Records (EHRs) -- 10.5.3 Smart Contract -- 10.5.4 Access Control in Medical Domain -- 10.5.5 Hyperledger -- 10.5.6 Composer Tools -- 10.5.7 Playground -- 10.5.8 Off-chain Storage -- 10.5.9 User Experience From Patient's Side -- 10.6 Hyper Ledger-Based Proposed Architecture for Protecting Electronic Health Records -- 10.6.1 Proposed Architecture of the Blockchain System…”
Libro electrónico -
43065Publicado 2002Tabla de Contenidos: “…A complex meetings sample -- 9.1 Overview -- 9.2 Sample architecture -- 9.2.1 The MeetingUI class -- 9.2.2 The MeetingController class -- 9.2.3 The NWayChatUIDlg class -- 9.2.4 The MeetingLauncher class -- 9.2.5 The InviteUIDlg class -- 9.2.6 The MeetingDlg class -- 9.3 Preparing the MeetingUI class -- 9.3.1 Initialize MeetingUI class -- 9.3.2 Calling MeetingUI API -- 9.4 Four steps to create the meetings -- 9.4.1 The invitation -- 9.4.2 The place -- 9.4.3 Generating a token -- 9.4.4 Launch Sametime meeting -- 9.5 Summary -- Chapter 10. …”
Libro electrónico -
43066por Davies, SaidaTabla de Contenidos: “…Use Case 2: WBISF using WBI Adapter for mySAP.com -- 8.1 Operational model -- 8.2 Installation of WebSphere Business Integration components -- 8.2.1 Plan the installation -- 8.2.2 Install WSADIE V5.1 -- 8.2.3 Install WBISF V5.1 -- 8.2.4 Install IBM Remote Agent Controller V5.1 -- 8.2.5 Install WBI Adapter Framework V2.4 -- 8.2.6 Install WBI Adapter for mySAP.com V5.5 -- 8.3 Configuration of WebSphere Business Integration components -- 8.3.1 Configuration of WebSphere MQ -- 8.3.2 Configuration of WBI Adapter for mySAP.com -- 8.3.3 Configuration of WSADIE V5.1 -- 8.3.4 Configuration of WBISF -- 8.4 Development of a business process…”
Publicado 2004
Libro electrónico -
43067Publicado 2021Tabla de Contenidos: “…-- 13.3 Various Models Proposed for Managing a Pandemic Like COVID-19 Using IoT -- 13.3.1 Smart Disease Surveillance Based on Internet of Things -- 13.3.2 IoT PCR for Spread Disease Monitoring and Controlling -- 13.4 Global Technological Developments to Overcome Cases of COVID-19 -- 13.4.1 Noteworthy Applications of IoT for COVID-19 Pandemic -- 13.4.2 Key Benefits of Using IoT in COVID-19 -- 13.4.3 A Last Word About Industrial Maintenance and IoT -- 13.4.4 Issues Faced While Implementing IoT in COVID-19 Pandemic -- 13.5 Results & -- Discussions -- 13.6 Conclusion -- References -- 14 Mathematical Insight of COVID-19 Infection-A Modeling Approach -- 14.1 Introduction -- 14.1.1 A Brief on Coronaviruses…”
Libro electrónico -
43068Publicado 2022Tabla de Contenidos: “…2.4.2.2 Variety -- 2.4.2.3 Velocity -- 2.4.2.4 Veracity -- 2.4.2.5 Value -- 2.4.3 Architectural Framework of Big Data -- 2.4.4 Data Protection Versus Data Security in Healthcare -- 2.4.4.1 Phishing Attacks -- 2.4.4.2 Malware and Ransomware -- 2.4.4.3 Cloud Threats -- 2.4.5 Technology in Use to Secure the Healthcare Data -- 2.4.5.1 Access Control Policy -- 2.4.6 Monitoring and Auditing -- 2.4.7 Standard for Data Protection -- 2.4.7.1 Healthcare Standard in India -- 2.4.7.2 Security Technical Standards -- 2.4.7.3 Administrative Safeguards Standards -- 2.4.7.4 Physical Safeguard Standards -- References -- 3 Ontology-Based System for Patient Monitoring -- 3.1 Introduction -- 3.1.1 Basics of Ontology -- 3.1.2 Need of Ontology in Patient Monitoring -- 3.2 Literature Review -- 3.2.1 Uses of Ontology in Various Domains -- 3.2.2 Ontology in Patient Monitoring System -- 3.3 Architectural Design -- 3.3.1 Phases of Patient Monitoring System -- 3.3.2 Reasoner in Patient Monitoring -- 3.4 Experimental Results -- 3.4.1 SPARQL Results -- 3.4.2 Comparison Between Other Systems -- 3.5 Conclusion and Future Enhancements -- References -- 4 Semantic Web Solutions for Improvised Search in Healthcare Systems -- 4.1 Introduction -- 4.1.1 Key Benefits and Usage of Technology in Healthcare System -- 4.2 Background -- 4.2.1 Significance of Semantics in Healthcare Systems -- 4.2.2 Scope and Benefits of Semantics in Healthcare Systems -- 4.2.3 Issues in Incorporating Semantics -- 4.2.4 Existing Semantic Web Technologies -- 4.3 Searching Techniques in Healthcare Systems -- 4.3.1 Keyword-Based Search -- 4.3.2 Controlled Vocabularies Based Search -- 4.3.3 Improvising Searches With Semantic Web Solutions -- 4.3.4 Health Domain-Specific Resources for Semantic Search -- 4.3.4.1 Ontologies -- 4.3.4.2 Libraries -- 4.3.4.3 Search Engines…”
Libro electrónico -
43069por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Entreprises publiques sous contrôle budgétaire : comptes financiers -- Tableau 11. …”
Publicado 1999
Libro electrónico -
43070por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Réforme des systèmes de budgétisation et de contrôle financier -- ... et une nette contraction prévue pour 1999 -- Le budget de l'État -- Tableau 8. …”
Publicado 1999
Libro electrónico -
43071por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Services pour les végétaux et le bétail -- 5. Contrôle de qualité et contrôle sanitaire -- I. Politiques fiscales et mesures de sécurité sociale…”
Publicado 2001
Libro electrónico -
43072Publicado 2004Tabla de Contenidos: “…Liquidation des banques placées sous le contrôle du FADE…”
Libro electrónico -
43073por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…La structure de la dette marocaine a changé en 25 ans -- Encadré 2.6. Le contrôle des capitaux au Maroc -- Le système bancaire est solide, mais l'évolution du crédit reste modérée et concentrée -- Graphique 2.23. …”
Publicado 2017
Libro electrónico -
43074por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Liens entre le type d'actionnariat et la performance -- Les interactions entre le contrôle interne et le contrôle étranger devraient améliorer le gouvernement d'entreprise -- Aspects régionaux et sectoriels de la restructuration des entreprises -- L'activité industrielle s'est contractée dans les trois pays -- Graphique 32. …”
Publicado 2000
Libro electrónico -
43075Publicado 2017Tabla de Contenidos: “…. -- 8.7 Conclusions -- References -- 9 An Overview of the Challenges for Cost-Effective and Energy-Efficient Retrofits of the Existing Building Stock -- 9.1 Introduction -- 9.2 Challenges in Building Energy Retrofitting -- 9.2.1 Priorities of Stakeholders -- 9.2.2 Time Period -- 9.2.3 Capital Investment -- 9.2.4 Cost Effectiveness -- 9.2.5 Risk Analysis -- 9.2.6 Technology -- 9.2.7 Government Policies -- 9.2.8 Reliable Prediction of Building Energy Performance -- 9.3 Optimization Approaches for the Design of Building Energy Retrofit -- 9.4 Building Energy Retrofit and Sustainability -- 9.5 Conclusions -- Acknowledgment -- References -- 10 Smart Heating Systems for Cost-Effective Retrofitting -- 10.1 Introduction -- 10.2 Technology -- 10.2.1 "Smartness" in the Primary Systems -- 10.2.2 "Smartness" in the Secondary Systems -- 10.2.3 The Control and the Building Automation -- 10.2.4 The Heat Metering -- 10.2.5 The Users Interfaces…”
Libro electrónico -
43076Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Academic Burnout Predisposition in Latin American Public University Students Based on Personality Type -- 1.1 Introduction -- 1.2 Review of Related Literature -- 1.2.1 Personality Types -- 1.2.2 Academic Burnout -- 1.2.3 Variables Associated with Academic Burnout -- 1.2.4 Variables of the Academic Context -- 1.2.5 Environmental and/or Social Context -- 1.2.6 Intrapersonal Variables -- 1.3 Method -- 1.4 Results -- 1.4.1 Model Measurement -- 1.4.2 Convergent Validity -- 1.4.3 Discriminant Validity -- 1.4.4 Cross Loads -- 1.4.5 Structural Model -- 1.5 Discussion -- 1.6 Conclusion -- References -- Chapter 2 Virtual Classroom Platform Development -- 2.1 Introduction -- 2.1.1 Free and Open Source Software -- 2.1.2 Review of Literature -- 2.1.3 Methodology -- 2.2 User Login/Registration Processes -- 2.2.1 Students' Registration Process -- 2.2.2 Teachers' Registration Process -- 2.2.3 Administrator's Registration -- 2.3 Students E-Classroom -- 2.4 Teacher's Control Panel -- 2.5 Administrator's Control Panel -- 2.6 Live Videos Sessions -- 2.7 Online Examinations -- 2.7.1 Examination Login -- 2.7.2 Start Examination -- 2.7.3 Examination Page -- 2.8 Conclusion -- References -- Chapter 3 Assessment of Modern Methods for Remote Teaching in Some Selected Educational Institutions in Kolkata City of West Bengal, India -- 3.1 Introduction -- 3.1.1 Scenario of COVID-19 Situation in West Bengal -- 3.2 Materials and Methods -- 3.2.1 Basic Principles of Quantitative Strategic Planning Matrix (QSPM) -- 3.3 Results and Discussion -- 3.3.1 Various Applications Used for Online Teaching -- 3.3.1.1 Google Meet -- 3.3.1.2 Zoom -- 3.3.1.3 Cisco Webex -- 3.4 SWOT Analysis of Online Education in Kolkata -- 3.4.1 Strengths -- 3.4.2 Weakness -- 3.4.3 Opportunity -- 3.4.4 Threats -- 3.5 Conclusion…”
Libro electrónico -
43077Publicado 2022Tabla de Contenidos: “…Project WBS and planning -- 2.3. Control of test activities -- 2.4. Analyze -- 2.5. …”
Libro electrónico -
43078Publicado 2023Tabla de Contenidos: “…3.3.3 Graceful terminations -- 3.3.4 Folder watcher -- 3.3.5 Action scripts -- 3.4 Running watchers -- 3.4.1 Testing watcher execution -- 3.4.2 Scheduling watchers -- Summary -- 4 Handling sensitive data -- 4.1 Principles of automation security -- 4.1.1 Do not store sensitive information in scripts -- 4.1.2 Principle of least privilege -- 4.1.3 Consider the context -- 4.1.4 Create role-based service accounts -- 4.1.5 Use logging and alerting -- 4.1.6 Do not rely on security through obscurity -- 4.1.7 Secure your scripts -- 4.2 Credentials and secure strings in PowerShell -- 4.2.1 Secure strings -- 4.2.2 Credential objects -- 4.3 Storing credentials and secure strings in PowerShell -- 4.3.1 The SecretManagement module -- 4.3.2 Set up the SecretStore vault -- 4.3.3 Set up a KeePass vault -- 4.3.4 Choosing the right vault -- 4.3.5 Adding secrets to a vault -- 4.4 Using credentials and secure strings in your automations -- 4.4.1 SecretManagement module -- 4.4.2 Using Jenkins credentials -- 4.5 Know your risks -- Summary -- 5 PowerShell remote execution -- 5.1 PowerShell remoting -- 5.1.1 Remote context -- 5.1.2 Remote protocols -- 5.1.3 Persistent sessions -- 5.2 Script considerations for remote execution -- 5.2.1 Remote execution scripts -- 5.2.2 Remote execution control scripts -- 5.3 PowerShell remoting over WSMan -- 5.3.1 Enable WSMan PowerShell remoting -- 5.3.2 Permissions for WSMan PowerShell remoting -- 5.3.3 Execute commands with WSMan PowerShell remoting -- 5.3.4 Connect to the desired version of PowerShell -- 5.4 PowerShell remoting over SSH -- 5.4.1 Enable SSH PowerShell remoting -- 5.4.2 Authenticating with PowerShell and SSH -- 5.4.3 SSH environment considerations -- 5.4.4 Execute commands with SSH PowerShell remoting -- 5.5 Hypervisor-based remoting -- 5.6 Agent-based remoting -- 5.7 Setting yourself up for success with PowerShell remoting…”
Libro electrónico -
43079Publicado 2015Tabla de Contenidos: “…3.2.1 Example: ANOVA for the One-Way Layout -- 3.2.2 Comparing Two Nested Normal Linear Models -- 3.2.3 Likelihood-Ratio Test Comparing Models -- 3.2.4 Example: Test That All Effects in a Normal Linear Model Equal Zero -- 3.2.5 Non-null Behavior of Statistic Comparing Nested Models -- 3.2.6 Expected Mean Squares and Power for One-Way ANOVA -- 3.2.7 Testing a General Linear Hypothesis -- 3.2.8 Example: Testing That a Single Model Parameter Equals Zero -- 3.2.9 Testing Terms in an Unbalanced Factorial ANOVA -- 3.3 Confidence Intervals and Prediction Intervals for Normal Linear Models -- 3.3.1 Confidence Interval for a Parameter of a Normal Linear Model -- 3.3.2 Confidence Interval for E(y) = x0 -- 3.3.3 Prediction Interval for a Future y -- 3.3.4 Example: Confidence Interval and Prediction Interval for Simple Linear Regression -- 3.3.5 Interpretation and Limitations of Prediction Intervals -- 3.4 Example: Normal Linear Model Inference -- 3.4.1 Inference for Modeling House Selling Prices -- 3.4.2 Model Checking -- 3.4.3 Conditional versus Marginal Effects: Simpson's Paradox -- 3.4.4 Partial Correlation -- 3.4.5 Testing Contrasts as a General Linear Hypothesis -- 3.4.6 Selecting or Building a Model -- 3.5 Multiple Comparisons: Bonferroni, Tukey, and FDR Methods -- 3.5.1 Bonferroni Method for Multiple Inferences -- 3.5.2 Tukey Method of Multiple Comparisons -- 3.5.3 Controlling the False Discovery Rate -- Chapter Notes -- Exercises -- 4 Generalized Linear Models: Model Fitting and Inference -- 4.1 Exponential Dispersion Family Distributions for a Glm -- 4.1.1 Exponential Dispersion Family for a Random Component -- 4.1.2 Poisson, Binomial, and Normal in Exponential Dispersion Family -- 4.1.3 The Canonical Link Function of a Generalized Linear Model -- 4.2 Likelihood and Asymptotic Distributions for GLMS -- 4.2.1 Likelihood Equations for a GLM…”
Libro electrónico -
43080Publicado 2019Tabla de Contenidos: “…Hardening Measures -- 5.2.2. Control Flow -- 5.2.3. Process Memory -- 5.2.4. Runtime Data -- 5.3. …”
Libro electrónico