Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Agustí 1,047
- Historia 806
- History 602
- Història 513
- Església Catòlica 498
- Business & Economics 493
- Economics 446
- Economic conditions 442
- Crítica i interpretació 417
- Economic policy 398
- Cartes pastorals 371
- Finance 302
- Management 300
- Derecho internacional privado 246
- Precios 245
- Economic History 230
- Biografia 211
- Bíblia 203
- Goigs 191
- Development 189
- Economic aspects 160
- Litúrgia 152
- Engineering & Applied Sciences 151
- Filosofía 150
- Obres anteriors al 1800 149
- Cristianisme 143
- Marketing 130
- Personajes célebres 129
- Pares de l'Església 126
- Crítica e interpretación 125
-
20121por McCormack, Joseph, 1965-Tabla de Contenidos: “…Machine generated contents note: Foreword ACKNOWLEDGEMENTS PREFACE Introduction PART ONE Awareness Heightened Awareness in a World Begging for BRIEF CHAPTER ONE Why Brevity is Vital Get to the point or pay the price Executive -- Interrupted Who's responsible for adapting when the message is not being heard? …”
Publicado 2014
Libro electrónico -
20122Principles of data science learn the techniques and math you need to start making sense of your dataPublicado 2016Tabla de Contenidos: “…Feature extraction and principal component analysis -- Summary -- Chapter 12: Beyond the Essentials -- The bias variance tradeoff -- Error due to bias -- Error due to variance -- Two extreme cases of bias/variance tradeoff -- Underfitting -- Overfitting -- How bias/variance play into error functions -- K folds cross-validation -- Grid searching -- Visualizing training error versus cross-validation error -- Ensembling techniques -- Random forests -- Comparing Random forests with decision trees -- Neural networks -- Basic structure -- Summary -- Chapter 13: Case Studies -- Case study 1 - predicting stock prices based on social media -- Text sentiment analysis -- Exploratory data analysis -- Regression route -- Classification route -- Going beyond with this example -- Case study 2 - why do some people cheat on their spouses? …”
Libro electrónico -
20123Publicado 2018Tabla de Contenidos: “…. -- Configuring the static geometry -- Configuring the light probes -- Baking the lights -- How it works... -- See also -- Chapter 6: Vertex Functions -- Introduction -- Accessing a vertex color in a Surface Shader -- Getting ready -- How to do it... -- How it works... -- There's more... -- Animating vertices in a Surface Shader -- Getting ready -- How to do it... -- How it works... -- Extruding your models -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding extrusion maps -- Implementing a snow shader -- Getting ready -- How to do it... -- How it works... -- Coloring the surface -- Altering the geometry -- See also -- Implementing a volumetric explosion -- Getting ready -- How to do it...…”
Libro electrónico -
20124Publicado 2018Tabla de Contenidos: “…Handling duplicate users -- Authenticating users -- Retrieving users from the database -- Authenticating a user's password -- Splitting out the services -- Creating a Flask server -- Web sessions -- Creating a sign-up page -- Logging users out -- Logging users in -- Prepending the email to our messages -- Summary -- Chapter 7: Online Video Game Store with Django -- Setting up the development environment -- Installing Node.js -- Creating a new Django project -- Exploring the Django project's structure -- Diving into the SQLite -- Looking at the project's package directory -- Creating the project's main app -- Installing client-side dependencies -- Adding login and logout views -- Testing the login/logout forms -- Creating new users -- Creating the views of the user creation -- Creating the game data model -- Creating the price list data model -- Creating the game list and details page -- Adding list games views -- Creating the shopping cart model -- Creating the shopping cart form -- Creating the shopping cart view -- Adding items to the cart -- Summary -- Chapter 8: Order Microservice -- Setting up the environment -- Creating the service models -- Creating the model's managers -- Learning to test -- Creating the test files -- Testing the cancel order function -- Testing the get all orders function -- Getting customer's incomplete orders -- Getting customer's completed orders -- Getting orders by status -- Getting orders by period -- Setting the order's next status -- Setting the order's status -- Creating the order model serializer -- Creating the views -- Adding views -- Setting up the service URLs -- Integration with the game online store -- Testing the integration -- Deploying to AWS -- Modifying the settings.py file -- Deploying the order service -- Summary -- Chapter 9: Notification Serverless Application -- Setting up the environment…”
Libro electrónico -
20125por Janert, Philipp K.Tabla de Contenidos: “…An Invitation -- A Hands-On Example -- Hoping for the Best -- Establishing Control -- Adding It Up -- Summary -- Code to Play With -- 2.Feedback Systems -- Systems and Signals -- Tracking Error and Corrective Action -- Stability, Performance, Accuracy -- The Setpoint -- Uncertainty and Change -- Feedback and Feedforward -- Feedback and Enterprise Systems -- Code to Play With -- 3.System Dynamics -- Lags and Delays -- Forced Response and Free Response -- Transient Response and Steady-State Response -- Dynamics in the Physical World and in the Virtual World -- Dynamics and Memory -- The Importance of Lags and Delays for Feedback Loops -- Avoiding Delays -- Theory and Practice -- Code to Play With -- 4.Controllers -- Block Diagrams -- On/Off Control -- Proportional Control -- Why Proportional Control Is Not Enough -- Integral Control -- Integral Control Changes the Dynamics -- Integral Control Can Generate a Constant Offset -- Derivative Control -- Problems with Derivative Control -- The Three-Term or PID Controller -- Code to Play With -- 5.Identifying Input and Output Signals -- Control Input and Output -- Directionality of the Input/Output Relation -- Examples -- Thermal Control 1 Heating -- Item Cache -- Server Scaling -- Controlling Supply and Demand by Dynamic Pricing -- Thermal Control 2 Cooling -- Criteria for Selecting Control Signals -- For Control Inputs -- For Control Outputs -- A Note on Multidimensional Systems -- 6.Review and Outlook -- The Feedback Idea -- Iteration -- Process Knowledge -- Avoiding Instability -- The Setpoint -- pt. …”
Publicado 2013
Libro electrónico -
20126Publicado 2023Tabla de Contenidos: “…-- Hoshin Kanri: Overview -- History -- Old Golf Ball -- Company Purpose and the Cost Equations -- Evolution of Hoshin Kanri: PDCA, PDSA, MBO, and the Deming Prize -- Hoshin Process -- Purpose and Key Elements of Hoshin Planning -- Planning Terms -- PDCA and Hoshin Planning -- Hoshin Methodology -- First Aspect Is the Layered Development of the How -- Second Major Aspect of the Hoshin Structure Is the Review Process -- Problems with Planning -- Hoshin Plan -- Chapter Questions -- Notes -- Additional Readings -- 6. …”
Libro electrónico -
20127Publicado 2018Tabla de Contenidos: “…Bank Internal Funds Transfer Pricing (FTP or IFP) -- Optimum Liabilities Strategy and Managing the Liquid Assets Buffer -- Collateral Funding Management, FVA, and Central Clearing for OTC Derivatives -- Negative Interest Rates and the Impact on ALM Policy -- Part 3: Summary and Analysis of PRA CP21/16 and CP13/17: "Pillar 2: Liquidity -- Part 4: Sample Policy Statements -- Selected Bibliography and References -- Chapter 13: Market Risk and Non-Traded Market Risk (Interest-Rate Risk in the Banking Book) -- Understanding and Managing Market and Interest-Rate Risks -- Managing Interest-Rate Risk in The Banking Book (IRRBB) -- BCBS386: The Basel Committee and High Level Principles for Interest-Rate Risk in the Banking Book -- Illustration: Strategic ALM Policy and Approach to IRRBB -- Interest-Rate Risk Policy and ALCO -- Selected Bibliography and References -- Chapter 14: The Future of Bank Treasury and Balance Sheet Risk Management -- The New Treasury -- The Treasury "Second Line of Defence -- Treasury and the Risk Triumvirate: The Need for an Aggregate Approach Enabling Integrated Management of the Balance Sheet -- Appendix 14.A: Sample Group ALCO Template -- Selected Bibliography and References -- Chapter 15: Regulatory Reporting and Principles of Policy Documentation -- Regulatory Reporting for Capital and Liquidity -- Principles of Policy Documentation -- Template Policy Documentation -- Selected Bibliography and References -- Part IV: The Future of Banking: Strategy, Governance and Culture -- Chapter 16: Strategy Setting: Principles for Sustained Bank Viability -- Bank Strategy Inputs and Setting -- From Vision to a Strategic Plan -- Example: "Swot" Analysis for Medium-Sized UK Commercial Bank -- Conclusions -- Selected Bibliography and References -- Chapter 17: Present and Future Principles of Governance and Culture…”
Libro electrónico -
20128por Provost, Lloyd P.Tabla de Contenidos: “…Other Tools for Learning from Variation.Frequency Plots.Pareto Charts.Scatter Plot.5 Understanding Variation Using Shewhart Charts.Selecting the Type of Shewhart Chart.Chart Selection Guide.Shewhart Charts for Continuous Data.I Charts.Examples of Shewhart Charts for Individual Measurements.Rational Ordering with an Individual Chart.Effect of the Distribution of the Measurements Example of Individual Chart for Deviations from a Target.X-Bar and S Chart.Shewhart Charts for Attribute Data.Subgroup Size For Attribute Charts.The P Chart for Classification Data.Examples of P Charts.Creation of Funnel Limits for P chart.C and U Charts for Counts of Nonconformities.C Charts.U Charts.Creation of Funnel Limits for a U chart.Process Capability.Process Capability from an I Chart.Capability of a Process from X-bar and S Chart (or R chart).Capability of a Process from Attribute Control Charts.Capability from a P Chart.Capability from a C or U Chart.Appendix 5.1: Calculating Shewhart Limits.Part II Advanced Theory and Methods with Data.6 Shewhart Chart Savvy: Dealing with Some Issues.Designing Effective Shewhart Charts.Typical Problems with Software for Calculating Shewhart Charts.Some Cautions when Using I Charts.7 More Shewhart-Type Charts.Other Shewhart-Type Charts.NP Chart.X-Bar and Range Chart.Median Chart.Shewhart Charts for Rare Events.G Chart for Opportunities Between Rare Events.T Chart for Time Between Rare Events.Some Alternatives to Shewhart-Type Charts.Moving Average Chart.Cumulative Sum (CUSUM) Chart.Exponentially Weighted Moving Average (EWMA) Chart.Standardized Shewhart Charts.Multivariate Shewhart-Type Charts.8 Special Uses for Shewhart Charts.Shewhart Charts with a Changing Center Line.Shewhart Charts with Sloping Center Line.Shewhart Charts with Seasonal Effects.Transformation of Data with Shewhart Charts.Shewhart Charts for Autocorrelated Data.Shewhart Charts for Attribute Data with Large Subgroup Sizes (Over-Dispersion).Prime Charts (P&' and U').Comparison Charts.Confidence Intervals and Confidence Limits.Shewhart Charts for Case-Mix Adjustment.9 Drilling Down into Aggregate Data for Improvement.What are Aggregate Data?…”
Publicado 2011
Libro electrónico -
20129Publicado 2023Tabla de Contenidos: “…Quality Drives Sales -- Quality Drives Pricing -- Quality Reduces Cost -- A Final Thought . . . -- Quality Drives Profit -- Chapter 21 Walk Behind the Tractor -- The Lake Wobegon Effect -- Follow Them Home -- The Power of Verbatim -- Predictive and Diagnostic Measurements -- A Final Thought . . . -- Walk Behind the Tractor -- Chapter 22 A Vow to Wow -- Find a Corner of the Market -- Wowing Your Customers -- Service Recovery Paradox -- Quality as a Process (Three Ss) -- More About Simple -- A Final Thought . . . -- A Vow to Wow -- Implementing the Five Must-Have Skills from the Manager's Handbook -- Notes -- Index -- EULA…”
Libro electrónico -
20130Publicado 2018Tabla de Contenidos: “…Repudiation -- Information disclosure - confidentiality -- Denial of service - availability -- Elevation of privilege - authorization -- Test strategies -- Summary -- Chapter 8: Source Code Review -- Programming background -- Enterprise secure coding guidelines -- Static code analysis - manual scan versus automatic scan -- Secure coding checklist -- Summary -- Chapter 9: Network Penetration Testing -- Passive information gathering - reconnaissance - OSINT -- Web search engines -- Google Hacking Database - Google dorks -- Online tools -- Kali Linux tools -- WHOIS lookup -- Domain name system - DNS enumeration -- Gathering email addresses -- Active information gathering - services enumeration -- Identifying live hosts -- Identifying open ports/services -- Service probing and enumeration -- Vulnerability assessment -- OpenVas -- Exploitation -- Finding exploits -- Listener setup -- Generating a shell payload using msfvenom -- Custom shells -- Privilege escalation -- File transfers -- Using PowerShell -- Using VBScript -- Administrator or root -- Summary -- Chapter 10: Web Intrusion Tests -- Web Intrusion Test workflow -- Identifying hidden contents -- Common web page checklist -- Special pages checklist -- Reporting -- Common Vulnerability Scoring System - CVSS -- First case - SQLi -- Second case - Reflected XSS -- Report template -- Summary -- Chapter 11: Pentest Automation Using Python -- Python IDE -- Downloading and installing PyCharm -- PyCharm quick overview -- Penetration testing automation -- Automate.py in action -- Utility functions -- Service enumeration -- DTO service class -- The scanner core -- Summary -- Appendix A: Nmap Cheat Sheet -- Target specification -- Host discovery -- Scan types and service versions -- Port specification and scan order -- Script scan -- Timing and performance -- Firewall/IDS evasion and spoofing -- Output…”
Libro electrónico -
20131Publicado 2017Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Financial Modeling -- Chapter 1 Introducing Financial Modeling -- Defining Financial Modeling -- What it is -- Who uses it -- Why it matters -- Looking at Examples of Financial Models -- Project finance models -- Pricing models -- Integrated financial statement models -- Valuation models -- Reporting models -- Chapter 2 Getting Acquainted with Excel -- Making Sense of the Different Versions of Excel -- A rundown of recent Excel versions -- Focusing on file formats -- Defining Modern Excel -- Recognizing the Dangers of Using Excel -- Capacity -- Lack of discipline -- Errors -- Looking at Alternatives and Supplements to Excel -- Chapter 3 Planning and Designing Your Financial Model -- Identifying the Problem That Your Financial Model Needs to Solve -- Designing How the Problem's Answer Will Look -- Gathering Data to Put in Your Model -- Documenting the Limitations of Your Model -- Considering the Layout and Design of Your Model -- Structuring your model: What goes where -- Defining inputs, calculations, and output blocks -- Determining your audience -- Chapter 4 Building a Financial Model by the Rulebook -- Document Your Assumptions -- Create Dynamic Formulas Using Links -- Only Enter Data Once -- Model with Consistent Formulas -- Build in Error Checks -- Allowing tolerance for error -- Applying conditional formatting to an error check -- Format and Label for Clarity -- Chapter 5 Using Someone Else's Financial Model -- Considering Templates for Building a Financial Model -- Why templates can be appealing -- What's wrong with using templates -- Why you should build your own model -- Inheriting a File: What to Check For…”
Libro electrónico -
20132Publicado 2017Tabla de Contenidos: “…: Listening to Understand -- Maintain Eye Contactand Posture -- Take Notes -- Change the Norm -- Ask Probing Questions -- Ask Closed Questions or Open-Ended Questions, Depending on Your Goal -- Confirm and Clarify -- Chapter 6 See It. …”
Libro electrónico -
20133Publicado 2018Tabla de Contenidos: “…-- Features -- Visual Studio Code -- IntelliSense -- Debugging -- SCM support -- Terminal -- Hello World example -- Using variables, types, and functions -- Type inference -- Using const -- Using let -- Using functions -- Arrow functions -- Working with classes and interfaces -- Interface -- Classes -- Inheritance -- Working with arrays -- Summary -- Chapter 9: Angular in a Nutshell -- Understanding Angular -- Anatomy of a component -- Components live and die -- Component in code -- Pipes -- Modules -- Bootstrapping process -- Angular 2 and beyond -- Angular CLI -- Project structure -- Rapid development…”
Libro electrónico -
20134Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started with pfSense -- Technical requirements -- The pfSense project -- What pfSense can do -- The pfSense community -- Objectives of this book -- Summary -- Questions -- Further reading -- Chapter 2: Installing pfSense -- Technical requirements -- Networking fundamentals -- The seven-layer OSI model -- LANs, WANs, and MANs -- Client-server and peer-to-peer networking -- Layers 1 and 2 - topology and data link protocols -- Layers 3 and 4 - network and transport -- IP addressing -- Typical pfSense deployment scenarios -- Hardware requirements and sizing guidelines -- Minimum requirements -- Hardware sizing guidelines -- Budget-priced options -- Using an old desktop system -- Using a thin client -- Using an old laptop -- Installing pfSense -- Step-by-step installation guide -- Initial pfSense configuration -- Configuration from the console -- Configuration from the web GUI -- Advanced WAN configuration -- Additional setup options -- SSH login -- Summary -- Questions -- Further reading -- Chapter 3: Configuring pfSense -- Technical requirements -- IPv4 and IPv6 addressing -- Additional setup options -- SSH login -- Adding interfaces -- Configuration of LAN-type interfaces -- WAN configuration -- Adding a DHCP server -- DHCP configuration at the console -- DHCP configuration in the web GUI -- DHCP static configuration -- DHCPv6 configuration in the web GUI -- DHCP and DHCPv6 relay -- DHCP and DHCPv6 leases -- VLAN configuration -- VLAN configuration at the console -- VLAN configuration in the web GUI -- QinQ and link aggregation -- Remaining considerations -- Summary -- Questions -- Further reading -- Chapter 4: Captive Portal -- Technical requirements -- Captive portal basics -- Captive portal best practices…”
Libro electrónico -
20135Publicado 2023Tabla de Contenidos: “…Adding a Collapsing Glowing Color -- Summary -- Chapter 6: Distortion Shaders -- Ice Texture Refraction -- Initial Setup -- Modify the Scene Color to Create Distortion -- Use an Ice Texture to Modify the Scene Color -- Customize the Shader with the Ice Texture and Color -- Black Hole Distortion -- Creation of the Center of the Black Hole -- Using Particle Systems for a Billboard Effect -- Creating a Spiral Texture Using the Twirl Node -- Modifying the Scene Color Using the Spiral Texture -- Masking the Spiral Texture -- Adding Dynamic Rotation to the Spiral Texture -- Summary -- Chapter 7: Advanced Shaders -- Cartoon Water Shader -- Initial Setup -- Accessing the Depth Buffer to Create Foam with the Scene Depth Node -- Scene Depth Node -- Implementing the Depth Information in the Shader -- Controlling the Depth Gradient with Divide Node -- Create Water Caustics -- Using the Voronoi Noise Node -- Using SubGraph to Reuse Groups of Nodes -- Add Radial Deformation Using Radial Shear -- Adding Movement to the Voronoi Cells -- Adding Extra Caustic Layers -- Adding Color to the Water Caustics Texture -- Deforming the Vertices of the Water Surface -- Iridescent Bubble Shader -- Initial Setup -- Create and Set Up Reflections -- Reflection Probes and Reflection Cubemaps -- Creating an Iridescent Dynamic Pattern -- Adding Thin-Film Interference Gradient -- Adding Rim Transparency and Color -- Adding Random Vertex Displacement -- Summary -- Chapter 8: Interactive Snow Effect -- Scene Setup -- Give Movement to the Character -- Set Up Your IDE -- Create a Character Movement Script -- Snow Plane 3D Object -- Subdivided Plane Creation -- Import the Plane to Unity -- Interactive Snow Shader Graph -- Shader Graph Setup -- Apply Displacement Using Noise -- Apply Snow Color and Occlusion -- Interact with the Snow -- Using a Render Texture -- Painting the Character Path…”
Libro electrónico -
20136Publicado 2013Tabla de Contenidos: “…Summary -- Introduction -- 1.1 Protein aggregation and amyloidoses -- 1.1.1 Mechanisms of amyloid fibril formation -- 1.1.2 Oligomer structural polymorphism: fibrillar and prefibrillar oligomers -- 1.1.3 Oligomer toxicity: common mechanism of pathogenesis -- 1.1.4 Amyloid formation is an inherent property of polypeptide chains: functional amyloid and disease unreleated amyloid -- 1.2 HypF-N: model protein of amyloid aggregation unrelated to disease -- 1.2.1 Function, structure and aggregation of HypF-N -- 1.2.2 HypF-N protofibrils interact with cell membranes originating a cytotoxic cascade -- 1.2.3 A causative link between the structure of HypF-N oligomers and their ability to cause cellular dysfunction -- 1.3 Alzheimer's disease -- 1.3.1 The Alzheimer phenotype -- 1.3.2 The elaborate processing of APP -- 1.3.3 The genetics of Alzheimer's disease -- 1.3.4 Peripheral cells as a tool to identify and test hypotheses on AD pathophysiology -- 1.3.5 Adult neurogenesis and stem cell technology for AD -- 1.4 Cholesterol and gangliosides in the central nervous system (CNS) -- 1.4.1 Brain cholesterol metabolism -- 1.4.2 Ganglioside metabolism -- 1.4.3 Lipid rafts -- 1.4.4 Role of cholesterol in AD -- 1.4.5 Role of gangliosides in AD -- 1.5 Aim of the study -- Materials & Methods -- 2.1 Materials -- 2.1.1 Chemicals -- 2.1.2 Fluorescent probes -- 2.1.3 Peptides and aggregation protocols -- 2.2 Cell cultures -- 2.3 Methods -- 2.3.1 Separation processes -- 2.3.2 Differentiation of human mesenchymal stromal cells -- 2.3.3 Modulation of membrane cholesterol levels -- 2.3.4 Modulation of membrane GM1 levels -- 2.3.5 Cholesterol content measurements -- 2.3.6 GM1 content measurements -- 2.3.7 Cell exposure to peptide aggregates -- 2.3.8 Analysis of aggregate interaction with the cells -- 2.3.9 Analysis of aggregate interaction with GM1 -- 2.3.10 Analysis of aggregate internalisation -- 2.3.11 Analysis of membrane permeability -- 2.3.12 Analysis of cytosolic Ca2+ dyshomeostasis -- 2.3.13 Evaluation of ROS production -- 2.3.14 Analysis of lipid peroxidation -- 2.3.15 Cytotoxicity assay and cell death analysis: apoptotic and necrotic markers -- 2.3.16 Steady-state fluorescence anisotropy -- 2.3.17 Atomic force microscopy (AFM) -- 2.3.18 Measurements of the fluorescence intensities -- 2.3.19 Statistical analysis -- Results -- 3.1 Results I -- 3.1.1 A protective role for lipid raft cholesterol against amyloidinduced membrane damage in human neuroblastoma cells -- 3.1.2 Aß42 oligomer binding to the cell surface and its cytotoxic effect are modulated by membrane cholesterol content -- 3.1.3 Aß42 oligomers colocalize with lipid rafts -- 3.1.4 Isolation and characterization of DRMs -- 3.1.5 Effects of ADDLs on lipid raft structural order -- 3.1.6 AFM imaging of supported DRMs purified from cells exposed to ADDLs -- 3.2 Results II -- 3.2.1 Lipid rafts mediate amyloid-induced calcium dyshomeostasis and oxidative stress in Alzheimer's disease -- 3.2.2 Lipid rafts are primary interaction sites for Aß42 oligomers at the plasma membrane -- 3.2.3 Cholesterol and GM1 mediate Aß42 accumulation at the plasma membrane -- 3.2.4 Cholesterol and GM1 mediate Ca2+ dyshomeostasis and extensive membrane permeabilization induced by Aß42 oligomers -- 3.2.5 GM1 modulates lipid peroxidation and cytotoxicity induced by Aß42 oligomers -- 3.2.6 GM1 mediates Aß42-induced Ca2+ dyshomeostasis, lipid peroxidation and cytotoxicity in rat cortical neurons -- 3.3 Results III -- 3.3.1 Membrane lipid composition and its physicochemical properties define cell vulnerability to aberrant protein oligomers -- 3.3.2 Membrane cholesterol content modulates oligomer cytotoxicity -- 3.3.3 Membrane cholesterol modulates oligomer-induced alteration of intracellular Ca2+ homeostasis and ROS levels -- 3.3.4 Cholesterol levels modulate membrane permeability to the oligomers -- 3.3.5 Membrane GM1 affects the cytotoxic and permeabilizing effects of HypF-N oligomers -- 3.3.6 GM1, rather than cholesterol, plays a dominant role in oligomer cytotoxicity and membrane permeability -- 3.4 Results IV -- 3.4.1 Neuronal differentiation of human mesenchymal stromal cells increases their resistance to Aß42 aggregate toxicity -- 3.4.2 Neuronal differentiation of hMSCs results in reduced levels of membrane GM1 -- 3.4.3 Neuronal differentiation of hMSCs reduces the interaction of Aß42 oligomers with the cell surface -- 3.4.4 Neuronal differentiation of hMSCs reduces Aß42 oligomerinduced intracellular Ca2+ dyshomeostasis and oxidative stress -- 3.4.5 Neuronal differentiation of hMSCs increases cell resistance to Aß42 aggregates Discussion -- 4.1 A protective role for lipid raft cholesterol against amyloid-induced membrane damage in human neuroblastoma cells -- 4.2 Lipid rafts mediate amyloid-induced calcium dyshomeostasis and membrane permeabilization in Alzheimer's fibroblasts -- 4.3 Membrane lipid composition and its physicochemical properties define cell vulnerability to aberrant protein oligomers -- 4.4 Neuronal differentiation of human mesenchymal stromal cells increases their resistance to Aß42 aggregate toxicity -- 4.5 Concluding remarks -- Abbreviations -- References…”
Libro electrónico -
20137Publicado 2022Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Section 1: A Brief History and Outline of Cryptography -- Chapter 1: Deep Dive into Cryptography -- An introduction to cryptography -- Binary numbers, ASCII code, and notations -- Fermat's Last Theorem, prime numbers, and modular mathematics -- A brief history and a panoramic overview of cryptographic algorithms -- Rosetta Stone -- The Caesar cipher -- ROT13 -- The Beale ciphers -- The Vernam cipher -- Notes on security and computation -- Summary -- Section 2: Classical Cryptography (Symmetric and Asymmetric Encryption) -- Chapter 2: Symmetric Encryption Algorithms -- Notations and operations in Boolean logic -- DES algorithms -- Simple DES -- Bit initialization -- Bit expansion -- Key generation -- Bit encryption -- DES -- Key generation in DES -- Analysis of the DES algorithm -- Violation of DES -- Triple DES -- DESX -- AES Rijndael -- Description of AES -- Attacks and vulnerabilities in AES -- Summary -- Chapter 3: Asymmetric Encryption Algorithms -- Introduction to asymmetric encryption -- The pioneers -- The Diffie-Hellman algorithm -- The discrete logarithm -- Explaining the D-H algorithm -- Analyzing the algorithm -- Possible attacks and cryptanalysis on the D-H algorithm -- RSA -- Explaining RSA -- Analyzing RSA -- Conventional attacks on the algorithm -- The application of RSA to verify international treaties -- Unconventional attacks -- PGP -- The ElGamal algorithm -- Summary -- Chapter 4: Hash Functions and Digital Signatures -- A basic explanation of hash functions -- Overview of the main hash algorithms -- Logic and notations to implement hash functions -- Explanation of the SHA-1 algorithm -- Notes and example on SHA-1 -- Example of one block encoded with SHA- 1 -- Authentication and digital signatures -- RSA digital signatures -- Why do digital signatures work?…”
Libro electrónico -
20138por Tello Lasso de la Vega, Diego (O. de M.)Tabla de Contenidos: “…De festo SSme . Trinitatis ad ritum prime classis elevando [al fin]: Apud S . Hadrian de urbe 14 Novemb . 1731=Tellius (h . 177 r.-180 v.) . 11 . …”
Publicado 1774
Manuscrito -
20139por Fabricius, Johann AlbertTabla de Contenidos: “…Ejusdem Libanii Epistolae quaedam & Emanuelis Phile Poema de Elephante, aliaque Poematia...-- V,IV: Bibliothecae Graecae volumen octavum, sive libri V. pars IV. ac paenultima, in qua de philosophis, Themistio, Theone, Pappo, Syriano, Proclo, Simplicio et aliis, nec non de ecclesiae doctoribus celebratissimis haereticisque et de Ioanne Stobaeo atque aliis locorum communium scriptoribus Graecis disseritur. …”
Publicado 1718
Libro -
20140Publicado 2015Tabla de Contenidos: “…Teaching Well-Being and Resilience in Primary and SecondarySchool Chieko Kibe and Ilona Boniwell 19. Cultivating Adolescents' Motivation Reed W. …”
Libro electrónico