Mostrando 34,861 - 34,880 Resultados de 35,981 Para Buscar 'Saketa~', tiempo de consulta: 1.18s Limitar resultados
  1. 34861
    Publicado 2015
    “…Master high quality software development driven by unit tests About This Book Design and implement robust system components by means of the de facto unit testing standard in Java Reduce defect rate and maintenance effort, plus simultaneously increase code quality and development pace Follow a step-by-step tutorial imparting the essential techniques based on real-world scenarios and code walkthroughs Who This Book Is For No matter what your specific background as a Java developer, whether you're simply interested in building up a safety net to reduce regressions of your desktop application or in improving your server-side reliability based on robust and reusable components, unit testing is the way to go. …”
    Libro electrónico
  2. 34862
    Publicado 2017
    “…Then, we move on to null safety aspects and type parameterization. We show you how to destructure expressions and even write your own. …”
    Libro electrónico
  3. 34863
    Publicado 2022
    “…Por meio de um trabalho a Sherlock Holmes, Glauco Bastos se apropria brilhantemente de matérias escritas pelo articulista Rosalvo Florentino no jornal "A Gazeta" para nos presentear com uma peça extraordinária para o entendimento dos muitos caminhos percorridos pelo magistério nacional até os dias atuais. …”
    Libro electrónico
  4. 34864
    Publicado 2024
    Tabla de Contenidos: “…Training large language models – 3. Data privacy and safety with LLMs – 4. The evolution of created content – 5. …”
    Libro
  5. 34865
    Publicado 2023
    Tabla de Contenidos: “…Intersection of cybersecurity with other disciplines -- Tool management -- Planning -- Acquisition and integration of supplier components -- Supplier capability assessment and the role of the CSIA -- The concept phase -- Item-level concept -- Cybersecurity concept -- Implications to component-level development -- Design and implementation -- Post-development requirements -- Configuration and calibration -- Weakness analysis -- Unit implementation -- Verification testing -- Validation testing -- Product release -- Cybersecurity case -- Cybersecurity assessment -- Production planning -- Operations and maintenance -- Monitoring -- Vulnerability analysis -- Vulnerability management -- Updates -- End of life -- Summary -- Chapter 6: Interactions Between Functional Safety and Cybersecurity -- A tale of two standards -- A unified versus integrated approach -- Establishing a foundational understanding of functional safety and cybersecurity -- Understanding the unique aspects and interdependencies between the two domains -- Differences between safety and security scope -- Differences in the level of interdependence between safety and security requirements -- Conflict resolution -- Extending the safety and quality supporting processes -- Planning -- Supplier management -- Concept -- Design -- Implementation -- Testing and validation -- Release -- Production -- End of life -- Creating synergies in the concept phase -- Item functions -- Item boundaries and operational environments -- Damage scenarios and hazards -- Safety and security goals -- Safety and security requirements -- Finding synergies and conflicts in the design phase -- Leveraging safety and security mechanisms -- Self-tests across safety and security -- Leveraging error detection safety mechanisms -- Eliminating inconsistencies in the error response -- Parallels in design principles…”
    Libro electrónico
  6. 34866
    Publicado 2024
    “…Readers will explore the intricate art of cryptography, the nuances of securing both mobile and web applications, and the complexities inherent in ensuring the safety of cloud environments. Through meticulously crafted case studies tailored for each chapter, readers will witness theoretical concepts' practical implications and applications. …”
    Libro electrónico
  7. 34867
    Publicado 2023
    “…Maggie Engler is an engineer and researcher currently working on safety for large language models. She focuses on applying data science and machine learning to abuses in the online ecosystem, and is a domain expert in cybersecurity and trust and safety. …”
    Grabación no musical
  8. 34868
    por Neves, Raphael
    Publicado 2024
    “…Readers will explore the intricate art of cryptography, the nuances of securing both mobile and web applications, and the complexities inherent in ensuring the safety of cloud environments. Through meticulously crafted case studies tailored for each chapter, readers will witness theoretical concepts' practical implications and applications. …”
    Libro electrónico
  9. 34869
    Publicado 2012
    “…Enfermo, en grandes cantidades, convertido en puzzle, hecho añicos, plantado en maceta, tumbado en un diván, en una ecuación, triturado, reconstruido... …”
    Libro
  10. 34870
    Publicado 2008
    “…Se exponen las pautas de movilidad ocupacional de los pescadores artesanales dedicados a la ar- tracción de la merluza, utilizando datos secundarios recolectados a través de una encuesta admi- nistrada a 302 pescadores aplicada en caletas de la Región del Biobío. Las conclusiones indican que los pescadores prefieren movilizarse dentro del mismo sector efectuando labores paralelas a la pesca de merluza y, cuando lo hacen hacia fuera, siguen vinculados al sector pesquero en el ámbito industrial o desarrollando trabajos informales de baja cualificación que no desembocan ni en un ascenso económico ni en la adquisición de mayor estatus social. …”
    Acceso restringido con credenciales UPSA.
    Artículo digital
  11. 34871
    Publicado 1995
    “…Por último, los comentarios de los lectores aclaran algunas facetas de su enseñanza. Así, leyendo este libro, que asocia su persona con su enseñanza, el lector moderno podrá conocer a Jacques Lacan tal y como se merece este inclasificable pensador…”
    Libro
  12. 34872
    por Wallach, Wendell
    Publicado 2009
    “…Wallach argue that as robots take on more and more responsibility, they must be programmed with moral decision-making abilities, for our own safety. Taking a fast paced tour through the latest thinking about philosophical ethics and artificial intelligence, the authors argue that even if full moral agency for machines is a long way off, it is already necessary to start building a kind of functional morality, in which artificial moral agents have some basic ethical sensitivity. …”
    Libro
  13. 34873
    Publicado 2020
    “…La sociabilidad constituye un objeto de interés histórico que este estudio aborda mediante el análisis de un extenso y variado corpus documental, haciendo especial foco en las carreras de Derecho, Ingeniería y Medicina, para echar luz sobre las prácticas de este grupo social heterogéneo en sus facetas formales e informales…”
    Enlace del recurso
    Libro electrónico
  14. 34874
    Publicado 2018
    “…This coupled with concurrent developments to enhance the safety and efficacy of the PPCI procedure has heralded an era where STEMI interventions are increasingly considered an important subspecialty within interventional cardiology. …”
    Libro electrónico
  15. 34875
    Publicado 2020
    “…Chemical control or decontamination techniques may be quite efficient; however, the more sustainable and restricted use of fungicides, the lack of efficiency in some foods, and the consumer demand for chemical-residue-free foods require new approaches to control this hazard. Therefore, food safety demands continued research efforts for exploring new strategies to reduce mycotoxin contamination. …”
    Libro electrónico
  16. 34876
    Publicado 2019
    “…Therefore, the methodological design proposal is completed giving specific attention to recent guidelines for urban safety design. The idea of joining these approaches at different levels, from territorial to micro-urban ones, is defined the “s-RGB Design” (safe Regeneration and Green Blue Design)…”
    Libro electrónico
  17. 34877
    Publicado 2019
    “…In recent years, the mechanism of RNAi agents has been well investigated, and the technique has been optimized for better effectiveness and safety. On the other hand, the clustered regularly interspaced short palindromic repeats (CRISPR)-associated Cas9/gRNA system is a recent, novel, targeted genome-editing technique derived from the bacterial immune system. …”
    Libro electrónico
  18. 34878
    Publicado 2019
    “…Both sides of a sensitive problem are assessed by Professor Gellhorn in this penetrating analysis of national security and its effect upon scientific progress.The costs and advantages of secrecy in certain areas of science and the conflict between national safety and individual rights in the administration of our federal loyalty program are presented; all the arguments are objectively weighed. …”
    Libro electrónico
  19. 34879
    Publicado 2018
    “…Does the enforcement of employees’ entitlements to social benefits depend on the fulfilment of employers’ obligations in the fields of social insurance and occupational safety law? The answer to these questions contributes fundamentally to the understanding of Russian social security law. …”
    Libro electrónico
  20. 34880
    Publicado 2019
    “…Therefore, to reduce damage and downtime in addition to protecting life and promoting safety, new resilient structure technologies must be proposed and developed. …”
    Libro electrónico