Mostrando 20,281 - 20,300 Resultados de 25,452 Para Buscar 'Piibe~', tiempo de consulta: 1.14s Limitar resultados
  1. 20281
    Publicado 2022
    Tabla de Contenidos: “…-- Chapter 17 Understanding Tier 2/Subcontracting Spend -- Tracing the History of Subcontracting -- Stepping through the Levels: Tier 1, Tier 2, and Beyond -- Tier 1 suppliers -- Tier 2 suppliers -- Tier 3 suppliers -- Tier 4 suppliers and below -- Managing Subcontractors and Tiered Procurement -- Influencing Your Prime Vendors to Use Diverse Suppliers -- Knowing the Importance of Tracking and Utilizing Tier 2 Data -- Chapter 18 Getting a Grip on Goal Setting in Supplier Diversity…”
    Libro electrónico
  2. 20282
    Publicado 2018
    Tabla de Contenidos: “…Designing application solutions using Azure Functions -- Durable Functions -- Workflow-driven applications using Logic Apps -- Designing application solutions using Logic Apps -- Designing for serverless computing using Azure Container Instances -- Creating containers -- Container orchestrations -- Azure Service Fabric -- Life cycle management -- API Management -- API Gateway -- API Management portal -- Developer portal -- Cloud-native deployments versus migrating assets -- Summary -- Questions -- Further reading -- Chapter 5: Robust Networking Implementations -- Technical requirements -- Azure Virtual Network -- IP addresses -- Public IP address -- Private IP address -- Creating a public IP address -- DNS -- Creating a VNet with two subnets -- Azure Load Balancer -- Probes -- Azure Traffic Manager -- Azure Application Gateway -- External connectivity for Azure Virtual Networks -- Azure VPN -- Site-to-site VPN -- VNet-to-VNet VPN -- Point-to-site VPN -- ExpressRoute -- Network security strategies -- DMZ -- Network Security Groups -- Creating a NSG -- User Defined Routes -- Creating User Defined Routes -- Virtual network service tunneling -- Web Application Firewall -- Summary -- Questions -- Further reading -- Chapter 6: Connecting Hybrid Applications -- Azure Relay service -- Hybrid connections -- WCF Relays -- Azure Data Management Gateway for Data Factory -- Azure On-premises Data Gateway -- Azure App Service Hybrid Connections -- Azure App Service Virtual Network Integration -- Azure AD Application Proxy -- Joining VMs to domains -- Enabling Azure AD Domain Services -- Adding the VM to the managed domain -- Summary -- Questions -- Further reading -- Chapter 7: Using Storage Solutions -- Technical requirements -- Azure Storage and replication types -- Storage account types -- General-purpose v1 (GPv1) -- Blob storage -- General-purpose v2 (GPv2)…”
    Libro electrónico
  3. 20283
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- Silicon Photonics -- Copyright Page -- Dedication -- Contents -- Preface -- The Reasoning for the Book and Its Organization -- References -- Acknowledgments -- 1 Silicon Photonics: Disruptive and Ready for Prime Time -- 1.1 Introduction -- 1.2 Silicon Photonics: An Introduction -- 1.2.1 The Application of Silicon Photonics -- 1.3 The Significance of Silicon Photonics -- 1.3.1 Silicon Photonics From a Photonics Perspective -- 1.3.2 Silicon Photonics From a Semiconductor Perspective -- 1.3.3 Silicon Photonics From a System Perspective -- 1.4 The Status of Silicon Photonics -- 1.5 Silicon Photonics: Market Opportunities and Industry Disruption -- 1.5.1 The Market Opportunities for Silicon Photonics -- 1.5.2 Silicon Photonics is a Disruptive Technology -- References -- 2 Layers and the Evolution of Communications Networks -- 2.1 Introduction -- 2.1.1 The Cloud as an Information Resource -- 2.1.2 Optical Networking is Central to the Internet -- 2.1.3 Silicon Photonics: A Technology to Tackle the Industry's Challenges -- 2.2 The Concept of Layering -- 2.3 The Telecom Network-Layer 4 -- 2.3.1 Cloud Computing is Driving the Need for High-Bandwidth Links Between Data Centers -- 2.3.2 The Importance of Optics for Communications -- 2.4 The Data Center-Layer 3 -- 2.4.1 Data Center Networking is a Key Opportunity for Silicon Photonics -- 2.5 Platforms-Layer 2 -- 2.6 The Silicon Chip-Layer 1 -- 2.7 Telecom and Datacom Industry Challenges -- 2.7.1 Approaching the Traffic-Carrying Capacity of Fiber -- 2.7.2 Internet Businesses Have Their Own Challenges -- 2.7.3 Approaching the End of Moore's law -- 2.8 Silicon Photonics: Why the Technology Is Important for All the Layers -- References -- 3 The Long March to a Silicon-Photonics Union -- 3.1 Moore's Law and 50 Years of the Chip Industry -- 3.1.1 The Shrinking Transistor-But Not for Much Longer…”
    Libro electrónico
  4. 20284
    Publicado 2018
    Tabla de Contenidos: “…Working with the OpenSSL command line -- Introduction -- Mathematics -- Set -- Group -- Field -- A finite field -- Order -- An abelian group -- Prime fields -- Ring -- A cyclic group -- Modular arithmetic -- Cryptography -- Confidentiality -- Integrity -- Authentication -- Entity authentication -- Data origin authentication -- Non-repudiation -- Accountability -- Cryptographic primitives -- Symmetric cryptography -- Stream ciphers -- Block ciphers -- Block encryption mode -- Electronic Code Book -- Cipher Block Chaining -- Counter mode -- Keystream generation mode -- Message authentication mode -- Cryptographic hash mode -- Data Encryption Standard -- Advanced Encryption Standard -- How AES works -- Summary -- Chapter 4: Public Key Cryptography -- Asymmetric cryptography -- Integer factorization -- Discrete logarithm -- Elliptic curves -- Public and private keys -- RSA -- Encryption and decryption using RSA -- Elliptic Curve Cryptography -- Mathematics behind ECC -- Point addition -- Point doubling -- Discrete logarithm problem in ECC -- RSA using OpenSSL -- RSA public and private key pair -- Private key -- Public key -- Exploring the public key -- Encryption and decryption -- Encryption -- Decryption -- ECC using OpenSSL -- ECC private and public key pair -- Private key -- Private key generation -- Hash functions -- Compression of arbitrary messages into fixed-length digest -- Easy to compute -- Preimage resistance -- Second preimage resistance -- Collision resistance -- Message Digest -- Secure Hash Algorithms -- Design of Secure Hash Algorithms -- Design of SHA-256 -- Design of SHA-3 (Keccak) -- OpenSSL example of hash functions -- Message Authentication Codes -- MACs using block ciphers -- Hash-based MACs -- Merkle trees -- Patricia trees -- Distributed Hash Tables -- Digital signatures -- RSA digital signature algorithm -- Sign then encrypt…”
    Libro electrónico
  5. 20285
    Publicado 2021
    Tabla de Contenidos: “…-- Free IDS/IPS -- IPS versus IDS -- Summary -- Chapter 9: Deep Diving into Physical Security -- Technical requirements -- Understanding physical security and associated threats -- The powerful LAN Turtle -- The stealthy Plunder Bug LAN Tap -- The dangerous Packet Squirrel -- The portable Shark Jack -- The amazing Screen Crab -- The advanced Key Croc -- USB threats -- Equipment theft -- Environmental risks -- Physical security mechanisms -- Mastering physical security -- Clean desk policy -- Physical security audits -- Summary -- Further reading -- Chapter 10: Applying IoT Security -- Understanding the Internet of Things -- The risks -- The vulnerabilities -- Understanding IoT networking technologies -- LoRaWAN -- Zigbee -- Sigfox -- Bluetooth -- Security considerations -- Improving IoT security -- Creating cybersecurity hardware using IoT-enabled devices -- Raspberry Pi firewall and intrusion detection system -- Defensive security systems for industrial control systems (SCADA) -- Secure USB-to-USB copy machine -- Creating a 10 honeypot -- Advanced monitoring of web apps and networks -- Creating an internet ad blocker -- Access control and physical security systems -- Bonus track - Understanding the danger of unauthorized IoT devices -- Detecting unauthorized IoT devices -- Detecting a Raspberry Pi -- Disabling rogue Raspberry Pi devices -- Summary -- Further reading -- Chapter 11: Secure Development and Deployment on the Cloud -- Technical requirements -- Secure deployment and implementation of cloud applications…”
    Libro electrónico
  6. 20286
    Tabla de Contenidos: “…Digues d'État et digues régionales -- 4.2.3. Prise en charge de l'érosion côtière par le Land et les collectivités locales -- 4.3. …”
    Libro electrónico
  7. 20287
    por OECD
    Publicado 2018
    Tabla de Contenidos: “…-- Pratiques de CRI des organismes nationaux de réglementation : constats -- Organisation et gouvernance de la CRI -- Incorporation des instruments internationaux -- Évaluation des effets de la CRI -- Prise en compte des effets internationaux dans les analyses d'impact de la réglementation ex ante…”
    Libro electrónico
  8. 20288
    Tabla de Contenidos: “…Gaz à effet de serre : émissions et objectifs de l'Islande -- Encadré 8. Piles à hydrogène -- Pollution atmosphérique -- Tableau 18. …”
    Libro electrónico
  9. 20289
    Tabla de Contenidos: “…Le climat dans le secteur privé -- Tableau 6. Prévisions à court terme -- II. …”
    Libro electrónico
  10. 20290
    Tabla de Contenidos:
    Libro electrónico
  11. 20291
    Publicado 2017
    Tabla de Contenidos: “…Twisted - a simple web client -- Chat Server using Twisted -- Eventlet -- Greenlets and Gevent -- Microservice architecture -- Microservice frameworks in Python -- Microservices example - restaurant reservation -- Microservices - advantages -- Pipe and Filter architectures -- Pipe and Filter in Python -- Summary -- 9. …”
    Libro electrónico
  12. 20292
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Demystifying Software Architecture Patterns -- Envisioning the software-defined world -- Software patterns -- Why software patterns? -- The prime ingredients of a software pattern -- The types of software patterns -- Software architecture patterns -- Object-oriented architecture (OOA) -- Component-based assembly (CBD) architecture -- Domain-driven design (DDD) architecture -- Client/server architecture -- Multi-tier distributed computing architecture -- Layered/tiered architecture -- Event-driven architecture (EDA) -- The major issues with EDA -- Service-oriented architecture (SOA) -- Service-inspired integration (SOI) -- Event-driven service-oriented architecture -- The EDA fundamental principles -- The ED-SOA composite pattern benefits -- Microservices architecture (MSA) -- Event-driven microservices patterns -- Space-based architecture (SBA) -- Combining architecture patterns -- Special-purpose architectures -- Real-time context-aware prediction architecture -- Summary -- Additional reading materials -- Chapter 2: Client/Server Multi-Tier Architectural Patterns -- Domain name service (DNS) server and DNS client -- The workings of a DNS -- Functional requirements in two-tier client-server patterns -- Distribution of functional requirements in a client-server pattern -- The remote data access client-server pattern -- The remote presentation client-server pattern -- The split logic data client-server architecture pattern -- The three-tier pattern / multi-tier pattern client-server -- The master-slave pattern -- Issues in the master-slave pattern -- Peer-to-peer patterns -- Advantages of two-tier client-server patterns -- Design considerations - when to use a two-tier client-server pattern?…”
    Libro electrónico
  13. 20293
    Publicado 2015
    Tabla de Contenidos: “…Cover Page -- Half Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- Acknowledgements -- Chapter 1 Thinking Wealthy -- Rule 1 Anybody can be wealthy - you just need to apply yourself -- Rule 2 Decide on your definition of wealth -- Rule 3 Set your objectives -- Rule 4 Keep it under your hat -- Rule 5 Most people are too lazy to be wealthy -- Rule 6 Get a reality check -- Rule 7 Understand your money beliefs and where they come from -- Rule 8 Understand that wealth is a consequence, not a reward* -- Rule 9 Decide what you want money for -- Rule 10 Understand that money begets money -- Rule 11 Calculate the net return -- Rule 12 If you see money as the solution you'll find it becomes the problem -- Rule 13 You can make lots of money, you can enjoy your job, and you can sleep nights -- Rule 14 Don't make money by being bad -- Rule 15 Money and happiness - understand their relationship -- Rule 16 Know the difference between price and value -- Rule 17 Know how the wealthy think -- Rule 18 Don't envy what others have -- Rule 19 It's harder to manage yourself than it is to manage your money -- Chapter 2 Getting Wealthy -- Rule 20 You've got to know where you are before you start -- Rule 21 You've got to have a plan -- Rule 22 Get your finances under control -- Rule 23 Insurance pays someone, and odds are it's not you -- Rule 24 Only by looking wealthy can you become wealthy -- Rule 25 Speculate to accumulate (no, this isn't gambling) -- Rule 26 Decide your attitude to risk -- Rule 27 Think through the alternatives to taking a risk -- Rule 28 If you don't trust someone, don't do business with them -- Rule 29 It's never too late to start getting wealthy -- Rule 30 Start saving young (or teach your kids this one if it's too late for you) -- Rule 31 Understand that your financial needs change at different stages of your life…”
    Libro electrónico
  14. 20294
    Publicado 2017
    Tabla de Contenidos: “…. -- Route based on the originating virtual port (default policy) -- Route based on source MAC hash -- Route based on IP hash -- Using the explicit failover order -- Link status only (default) -- Beacon probing -- Designing a vSphere Distributed Switch for load balancing and failover -- Getting ready -- How to do it... -- How it works... -- What to know when offloading checksum -- Getting ready -- How to do it... -- How it works... -- Selecting the correct virtual network adapter -- Getting ready -- How to do it... -- How it works... -- Improving performance through VMDirectPath I/O -- Getting ready -- How to do it... -- Improving performance through NetQueue -- Getting ready -- How to do it... -- How it works... -- Improving network performance using the SplitRx mode for multicast traffic -- Getting ready -- How to do it... -- How it works... -- Designing a multi-NIC vMotion -- Getting ready -- How to do it... -- Improving network performance using network I/O control -- Getting ready -- How to do it... -- Monitoring network capacity and performance matrix -- Getting ready -- How to do it... -- Chapter 4: DRS, SDRS, and Resource Control Design -- Introduction -- Using DRS algorithm guidelines -- Getting ready -- How to do it... -- How it works... -- Using resource pool guidelines -- Getting ready -- How to do it... -- How it works... -- Avoiding the use of a resource pool as a folder structure -- How to do it... -- How it works... -- Choosing the best SIOC latency threshold -- Getting ready -- How to do it... -- How it works... -- Using storage capability and policy-driven storage -- Getting ready -- How to do it... -- How it works... -- Anti-affinity rules in the SDRS cluster -- Getting ready -- How to do it…”
    Libro electrónico
  15. 20295
    por Mishra, Sunita
    Publicado 2011
    Tabla de Contenidos: “…Demonstrate Leadership Qualities -- Kinds of Questions Expected at Interviews -- Leading Questions -- Open-Ended Questions -- Probing Questions -- Close-Ended Questions -- The Interview Process -- Step 1: Initiation of the Interview -- Step II: Investigating the Tenor of Behaviour -- Step III: Assessing the Candidate's Knowledge and Understanding -- Step IV: Assessment of Interpersonal and Social Qualities -- Step V: All-in-All Assessment -- Norms for Assessment of a Candidate -- Summary -- Review Questions -- Chapter 10: Telephone Skills, Meetings and Minutes -- Telephonic Communication -- 1. …”
    Libro electrónico
  16. 20296
    Publicado 2016
    Tabla de Contenidos: “…Intro -- Series Page -- Title Page -- Copyright -- Preface -- About the Author -- Codification Taxonomy -- Chapter 1: ASC 105 Generally Accepted Accounting Principles -- Perspectives and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 2: ASC 205 Presentation of Financial Statements -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- ASC 205-30, Liquidation Basis of Accounting -- Chapter 3: ASC 210 Balance Sheet -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 4: ASC 215 Statement of Shareholder Equity -- Perspective and Issues -- Chapter 5: Asc 220 Comprehensive Income -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 6: Asc 225 Income Statement -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 7: Asc 230 Statement of Cash Flows -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 8: ASC 235 Notes to Financial Statements -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 9: ASC 250 Accounting Changes and Error Corrections -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 10: ASC 255 Changing Prices -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 11: ASC 260 Earnings Per Share -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Comprehensive Example -- Chapter 12: ASC 270 Interim Reporting -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Part I-Requirements Applicable to all Reporting Entities -- Part II-Requirements Applicable to Public Reporting Entites -- Chapter 13: ASC 272 Limited Liability Entities…”
    Libro electrónico
  17. 20297
    Publicado 2012
    Tabla de Contenidos: “…Iteration (Cycle) Planning -- Estimate the Tasks -- Time-boxing -- Daily Planning -- Adaptive Planning and Organizational Culture -- Effective Planning -- Agile Contracting Methods -- Agile Project Tracking -- Information Radiators -- Self-assessment -- Burn Charts -- Burn-down Charts -- Release Burn-down -- Cone of Uncertainty Theory -- Burn-up Charts -- Combined Chart -- Cumulative Flow Diagram (Cumulative Chart) -- Lead Time -- Earned Value of Agile Projects -- Task/Kanban Board -- Main Features of the Kanban Board -- WIP Limits -- Retrospectives -- Agile Project Accounting Principles -- Innovation Games -- A Boat for Retrospective Findings -- Process Tailoring -- Chapter 6: Agile Metrics and Estimations -- Relative Sizing -- Story Points -- Story Points Measurement -- Wideband Delphi -- Probe Technique -- Planning Poker -- Ideal Time -- Affinity Diagram and Estimating -- Step 1: Silent Relative Sizing -- Step 2: Editing of Wall -- Step 3: Place Items into Relative Sizing Buckets -- Step 4: Product Owner 'Challenge -- Step 5: Get it into an Electronic Tool -- Velocity -- Cycle Time -- Agile Project Cost Management -- Project Cost Management -- Cost Estimation -- Four Common Estimating Styles -- Types of Costs -- Types of Cost Estimates -- Basis of Costs -- Problems in Estimating Accurate Costs -- Budget -- Project Funding Requirements -- S Curve -- Control Cost -- Forecasting -- Earned Value Management (EVM) -- To Complete Performance Index (TCPI) -- Earned Value of Agile Projects -- Earned Value of at Release Level -- Earned Value of at Sprint Level -- Other Concepts in Costing -- Measuring Progress of Individual Tasks -- Work Performance Measurement -- Budget Forecasts -- Variance and Trend Analysis -- Escaped Defects -- Chapter 7: Agile Analysis and Design -- Introduction -- Product Roadmap -- Backlog -- Product Backlog…”
    Libro electrónico
  18. 20298
    Publicado 2022
    Tabla de Contenidos: “…3.3 DISTRIBUTED ANTENNA SYSTEMS (DASs) -- 3.3.1 Technology Scope -- 3.3.2 More Detailed Exemplary Arrangement -- 3.3.3 Traffic-aware DAS -- 3.3.4 BBU and DAS/RRU Connectivity -- 3.3.5 Ethernet/IP Transport Connectivity of DAS -- REFERENCES -- Chapter 4 Traditional Sensor Networks/IoT Services -- 4.1 OVERVIEW And ENVIRONMENT -- 4.2 ARCHITECTURAL CONCEPTS -- 4.3 WIRELESS TECHNOLOGIES FOR THE IoT -- 4.3.1 Pre-5G Wireless Technologies for the IoT -- 4.3.2 NB-IoT -- 4.3.3 LTE-M -- 4.3.4 5G Technologies for the IoT -- 4.3.5 WAN-Oriented IoT Connectivity Migration Strategies -- 4.4 EXAMPLES OF SEVEN-LAYER IoT PROTOCOL STACKS -- 4.4.1 UPnP -- 4.4.2 ZigBee -- 4.4.3 Bluetooth -- 4.5 GATEWAY-BASED IoT OPERATION -- 4.6 EDGE COMPUTING IN THE IoT ECOSYSTEM -- 4.7 SESSION ESTABLISHMENT EXAMPLE -- 4.8 IoT SECURITY -- 4.8.1 Challenges -- 4.8.2 Applicable Security Mechanisms -- 4.8.3 Hardware Considerations -- 4.8.4 Other Approaches: Blockchains -- REFERENCES -- Chapter 5 Evolved Campus Connectivity -- 5.1 ADVANCED SOLUTIONS -- 5.1.1 802.11ax Basics -- 5.1.2 Key 802.11ax Processes -- 5.1.3 Summary -- 5.2 VOICE OVER WI-FI (VOWI-FI) -- 5.3 5G TECHNOLOGIES -- 5.3.1 Emerging Services -- 5.3.2 New Access and Core Elements -- 5.3.3 New 5GC Architecture -- 5.3.4 Frequency Spectrum and Propagation Challenges -- 5.3.5 Resource Management -- 5.3.6 Requirements for Small Cells -- 5.3.7 Comparison to Wi-Fi 6 -- 5.4 IOT -- 5.5 5G DAS SOLUTIONS -- 5.6 INTEGRATED SOLUTIONS -- REFERENCES -- Chapter 6 De-densification of Spaces and Work Environments -- 6.1 OVERVIEW -- 6.2 BASIC APPROACHES -- 6.3 RTLS METHODOLOGIES AND TECHNOLOGIES -- 6.3.1 RFID Systems -- 6.3.2 Wi-Fi-based Positioning System (WPS) -- 6.3.3 Bluetooth -- 6.3.4 UWB -- 6.3.5 Automatic Vehicle Location (AVL) -- 6.4 STANDARDS -- 6.5 APPLICATIONS -- REFERENCES…”
    Libro electrónico
  19. 20299
    por Nomani, Qamar
    Publicado 2024
    Tabla de Contenidos: “…Look for automation capabilities -- 6. Evaluate pricing and licensing -- Vendor selection process checklists for CSPM -- POC for CSPM tools -- What is the key outcome of the CSPM tool's POC? …”
    Libro electrónico
  20. 20300
    Tabla de Contenidos: “…Assurer la prospérité malgré le ralentissement de la croissance -- Le ralentissement de la croissance -- Graphique 1. Croissance du PIB et du PNB : l'écart se creuse -- Graphique 2. …”
    Libro electrónico