Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 953
- Management 817
- Computer networks 801
- Control de calidad 753
- Computer Science 715
- History 702
- Security measures 662
- Historia 614
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
50381por Armstrong, Denise E.“…These stories also uncover hidden boundaries, rites, and rituals which operate beneath a veneer of order, control, and stability, and shape administrators’ work lives in imperceptible ways. …”
Publicado 2009
Libro electrónico -
50382Publicado 2016“…Furthermore, studying natural behaviour as a basis for controlling robots and other devices results in greater robustness, responsiveness and approachability. …”
Libro electrónico -
50383Publicado 2016“…How do surveillance (pervasive monitoring) and agnotology (culturally induced ignorance or doubt, particularly the publication of inaccurate or misleading scientific data) coincide as mutually reinforcing technologies of control and restraint? If technology makes the assumptions of its society manifest as instrumentality -- then what ideology is being realized in the form of the digital computer? …”
Libro electrónico -
50384por Chélini, Michel-Pierre, 1956-“…Au fil du récit, le lecteur voit se dérouler les différentes étapes du processus : le dérapage de 1944-1945 qui aurait pu être contenu, l'incohérence de 1946 et l'impuissance de 1947, le redressement enfin de 1948-1949, malheureusement provisoire. « La politique des prix est ainsi analysée dans une triple perspective : pour elle-même d'abord, sous le double aspect de la réglementation et du contrôle ; elle est ensuite replacée dans le cadre de la politique économique, monétaire, budgétaire, fiscale et planificatrice, replacée enfin dans le mouvement général de l'économie. …”
Publicado 1998
Electrónico -
50385por Corriol, Vincent“…Elle en possède les caractéristiques essentielles, où derrière la relation personnelle qui unit le serf à son maître se lit la volonté de contrôler la terre et les hommes. Mais loin de n’être qu’un outil fiscal ou un instrument d’oppression de la paysannerie, le servage constitue un phénomène pleinement sociologique. …”
Publicado 2019
Electrónico -
50386Publicado 2016“…Course Requirements Knowledge and understanding of BGP and its attributes Table of Contents Module 1: Troubleshooting BGP Peering Issues Lesson 1: Troubleshooting BGP Peering Down 1.1: Verifying Configurations 1.2: Verifying Reachability 1.3: BGP Authentication 1.4: Verifying ACLs 1.5: Verifying TCP Sessions 1.6: Decoding BGP Messages 1.7: Troubleshooting Blocked Processes in IOS XR Lesson 2: Troubleshooting Flapping BGP Peers 2.1: Understanding BGP Flapping States 2.2: Understanding BGP Notifications 2.3: Troubleshooting MTU Mismatch Issues 2.4: Troubleshooting High CPU Causing BGP Flaps 2.5: Troubleshooting Interface Queue Drops 2.6: Troubleshooting Control Plane Policing Lesson 3: Dynamic BGP Peering 3.1: Dynamic BGP Peering Overview 3.2: Dynamic BGP Peering Configuration 3.3: Verifying Dynamic BGP Peers 3.4: Challenges with Dynamic BGP Peering Module 2: Troubleshooting Platform Issues Caused by BGP Lesson 4: High CPU Caused by BGP 4.1: BGP Process in IOS 4.2: High CPU Caused by BGP Scann..…”
-
50387Publicado 2015“…HTML File Using JavaScript Convert Celsius to Fahrenheit Create an Image Rollover Create a Function to Output User Messages Demonstrate the Scope of Variables Display Information Using the navigator Object Read the Date and Time Implement a Simple Spam Detector Function Manipulate Array Values Extend Your Spam Detector Extend an Object Using prototype Extend JavaScript's Own Objects Use the childNodes Property Use getElementsByTagName() Replace Child Elements Create Dynamic Page Menus Manipulate JSON Objects Move a Ball Using Drag and Drop in HTML5 Interact with the Local File System Set Style Properties Select a Particular Stylesheet Control Lighting Effects Use the getElements() Method Create a Simple jQuery Animation Drag and Drop with jQuery UI Code an Ajax Form with jQuery Write Cookies Use Cookies Check Out const Understand the MVC Framework Through a Real-World Example Use a Basic AngularJS Application Create a Chrome Extension to Get Airport Information Convert Code into Unobtrusive Code Use Your Browser's Debugging Tools Write a Banner-Cycling Script Apply a Home-Cook..…”
-
50388por Diogenes, Yuri“…You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system. …”
Publicado 2019
Libro electrónico -
50389Publicado 2018“…What You Will Learn Install and configure your MySQL 8 instance without any hassle Get to grips with new features of MySQL 8 like CTE, Window functions and many more Perform backup tasks, recover data and set up various replication topologies for your database Maximize performance by using new features of MySQL 8 like descending indexes, controlling query optimizer and resource groups Learn how to use general table space to suit the SaaS or multi-tenant applications Analyze slow queries using performance schema, sys schema and third party tools Manage and monitor your MySQL instance and implement efficient performance-tuning tasks In Detail MySQL is one of the most popular and widely used relational databases in the World today. …”
Libro electrónico -
50390Publicado 2014“…Compare Swift with Objective-C, JavaScript, Python, Ruby, and C Collect data with arrays and dictionaries, and store it with variables and constants Group commonly-used code into functions for easy reuse Structure your code with enums, structs, and classes Use generics to get more done with less code Write closures to share small blocks of functionality Use optionals to write more robust, crash-resistant, and cleaner code Integrate existing Objective-C code into new Swift apps Program on the bit and byte level with advanced operators Implement efficient design patterns with protocols and delegates Create animated 2D games with SpriteKit, and 3D games with SceneKit Contents at a Glance 1 Getting Your Feet Wet Building Blocks of Swift Optionals: A Gift to Unwrap Tuples Number Types and Converting Between Them Coming to Swift from Objective-C and C 2 Collecting Data Using Arrays Modifying Arrays Using Dictionaries 3 Making Things Happen: Functions Defining Functions More on Parameters 4 Structuring Code: Enums, Structs, and Classes Enums Structs 5 Making a Game Building a User Interface (UI) The Action-Packed View Controller 6 Reusable Code: Closures What Are Closures? …”
Libro electrónico -
50391Publicado 2021“…The book concludes by sharing tips for testing and deploying your end-to-end application suite for a smooth user experience.By the end of this book, youll be able to deliver modern enterprise applications using Delphi confidently.What you will learn* Discover the latest enhancements in the Delphi IDE* Overcome the barriers that hold you back from embracing cross-platform development* Become fluent with FireMonkey controls, styles, LiveBindings, and 3D objects* Build Delphi packages to extend RAD Server or modularize your applications* Use FireDAC to get quick and direct access to any data* Leverage IoT technologies such as Bluetooth and Beacons and learn how to put your app on a Raspberry Pi* Enable remote apps with backend servers on Windows and Linux through REST APIs* Develop modules for IIS and Apache web serversWho this book is forThis book is for Delphi developers interested in expanding their skillset beyond Windows programming by creating professional-grade applications on multiple platforms, including Windows, Mac, iOS, Android, and back-office servers. …”
Libro electrónico -
50392Publicado 2022“…Up to over 4,000 directly attached serial-attached SCSI (SAS) disks or solid-state drives (SSDs) Up to 1,000 virtual machines (VMs) with logical partitions (LPARs) per system System control unit, providing redundant system master Flexible Service Processor (FSP) Supports IBM Power System Private Cloud Solution with Dynamic Capacity This publication is for professionals who want to acquire a better understanding of Power servers. …”
Libro electrónico -
50393Publicado 2021“…Jeffery weaves in his experience of building the Unicon programming language to give better context to the concepts where relevant examples are provided in both Unicon and Java so that you can follow the code of your choice of either a very high-level language with advanced features, or a mainstream language.By the end of this book, you'll be able to build and deploy your own domain-specific languages, capable of compiling and running programs.What you will learn* Perform requirements analysis for the new language and design language syntax and semantics* Write lexical and context-free grammar rules for common expressions and control structures* Develop a scanner that reads source code and generate a parser that checks syntax* Build key data structures in a compiler and use your compiler to build a syntax-coloring code editor* Implement a bytecode interpreter and run bytecode generated by your compiler* Write tree traversals that insert information into the syntax tree* Implement garbage collection in your languageWho this book is forThis book is for software developers interested in the idea of inventing their own language or developing a domain-specific language. …”
Libro electrónico -
50394Publicado 2022“…Topics include: Data Privacy and Protection Risk Mitigation Importance of Policies, Procedures, and Controls Analyzing Logs and Impact Analysis SIEMs and Query Writing E-Mail Analysis Automation About the Instructor Aamir Lakhani is a leading senior security strategist. …”
Video -
50395Publicado 2022“…What you will learn Develop a comprehensive understanding of SASE from a market and technical perspective Understand SASE services and components included in SASE solutions Move logically from prescriptive design to policy-based design and orchestration Understand standard SASE use cases and how to integrate future components Convert from a legacy network design model to a secure DevOps model for future projects Use a functional design overlay to eliminate inter-service competition for the control plane of the SASE service Who this book is for This book is for technology and security leaders and specifically for any CTO, CSO, CISO, or CIO looking for an executive approach to SASE for their organization. …”
Libro electrónico -
50396Publicado 2021“…AI, IIoT, and robotics solutions are highlighted for the food and beverage industry, presenting use cases addressing novel AI-based environmental monitoring; autonomous environment-aware, quality control systems for Champagne production; and production process optimisation and predictive maintenance for soybeans manufacturing. …”
Libro electrónico -
50397por Organisation for Economic Co-operation and Development“…Dans l’essai IL-8 Luc, la variation d’expression de IL-8 est mesurée de façon indirecte via l’activité du gène de la luciférase qui se trouve sous contrôle du promoteur IL-8. L’intensité relative de fluorescence ou luminescence des cellules traitées, comparée à celle du témoin de solvant/véhicule, est calculée et utilisée dans un modèle prédictif, pour aider à distinguer les sensibilisants des non-sensibilisants…”
Publicado 2018
Libro electrónico -
50398por Winsor, Tom“…Au plan international, l’indépendance de ces autorités vis-à-vis des interventions et des considérations politiques est considérée comme une caractéristique importante d’une régulation économique efficace mais, malgré cela, cette indépendance peut être soumise à une telle pression que le système se fissure, ce qui conduit à une sérieuse perte de confiance dans le système de régulation et porte atteinte à la réputation du Gouvernement hôte quant à son impartialité et au respect de l’intégrité des mécanismes de contrôle qui ont été institués pour protéger les investissements. …”
Publicado 2010
Capítulo de libro electrónico -
50399por Organisation de coopération et de développement économiques.“…Généralement, au moins trois groupes d'essai et un groupe de contrôle devraient être employés. Des niveaux de dose devraient être choisis, en tenant compte de toutes données de toxicité existantes et de (toxico-) cinétique disponibles. …”
Publicado 2016
Libro electrónico -
50400por Organisation de coopération et de développement économiques.“…Un exemple est présenté sous la forme d’une étude de cas évaluant la viabilité politique du contrôle réglementaire centralisé comme stratégie institutionnelle à partir de l’expérience des États-Unis. …”
Publicado 2008
Libro electrónico