Mostrando 35,501 - 35,520 Resultados de 35,981 Para Buscar 'Saketa~', tiempo de consulta: 1.43s Limitar resultados
  1. 35501
    Publicado 2004
    “…Coverage includes: Introductory material for developers getting started with Swing, including sections on basic components such as text fields, labels, and buttons, as well as on using images The latest advice from the Swing team about thread safety Advanced Swing material, including changing key bindings, manipulating the focus, using data models, and adding painting code that uses the powerful Java 2DTM API How-to discussions on using individual components and containers, including advanced components such as tables, trees, and text editors Over 150 complete, working code examples For the novice or experienced Java developer looking to create robust, powerful, and visually stunning GUIs, The JFC Swing Tutorial, Second Edition, is an indispensable tutorial and reference…”
    Libro electrónico
  2. 35502
    Publicado 2008
    “…RYAN O’DONNELL, Cofounder and CEO, BullEx Digital Safety Your own business: Take the leap, make it happen, and make it succeed! …”
    Libro electrónico
  3. 35503
    Publicado 2017
    “…El lector podrá encontrar información esencial del estado de la cuestión de la educación multidisciplinar contemporánea ilustrado desde diferentes facetas de la educación para la igualdad de género: sociales, lingüísticas, literarias, artístico-ambientales, tecnológicas y científicas…”
    Libro electrónico
  4. 35504
    Publicado 2021
    “…Processing and storage can cause changes and interactions in food components that have effects on nutritional value, organoleptic characteristics or even food safety. This book includes 19 research works showing important and interesting advances, as well as new approaches, in this research topic. …”
    Libro electrónico
  5. 35505
    Publicado 2010
    “…Covers all exam objectives, including how to: Work with CPUs, RAM, motherboards, power supplies, and other PC components Install, partition, and format hard drives Install, upgrade, and troubleshoot WIndows 2000, Windows XP, and Windows Vista Troubleshoot PCs and implement security measures Install video and multimedia cards Work with portable PCs, PDAs, smartphones, and wireless technologies Manage printers and connect to networks and the Internet Understand safety and environmental issues Establish good communication skills and adhere to privacy policies The CD-ROM features: Practice exams for 701 & 702 600+ chapter review questions New video introduction to CompTIA A+ One-hour video training segment Mike's favorite PC tools and utilities Searchable e-book Mike Meyers , CompTIA A+, CompTIA Network+, MCP, is the industry's leading authority on CompTIA A+ certification and training. …”
    Libro electrónico
  6. 35506
    por McNavage, Terry
    Publicado 2010
    “…Then in the last two chapters, you'll leave the safety of Firebug and hand-code an uber cool JavaScript application in your preferred text editor. …”
    Libro electrónico
  7. 35507
    Publicado 2011
    “…Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authentication technologies See how real-world session attacks leak sensitive data and how to fortify your applications Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments Safety deploy XML, social networking, cloud computing, and Web 2.0 services Defend against RIA, Ajax, UGC, and browser-based, client-side exploits Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures…”
    Libro electrónico
  8. 35508
    Publicado 2018
    Tabla de Contenidos: “…11 The Realization of Nanotechnology -- 11.1 Nanospeci cation -- 11.2 Standardization of Nanotechnology -- 11.3 Nanometrology -- 11.4 The Nanometrology Instrument Industry -- References -- Further Reading -- 12 The Business Environment -- 12.1 The Universality of Nanotechnology -- 12.2 The Radical Nature of Nanotechnology -- 12.3 Intellectual Needs -- 12.4 Company-University Collaboration -- 12.5 Clusters -- 12.6 Assessing Demand for Nanotechnology -- 12.6.1 Modeling -- 12.6.2 Judging Innovation Value -- 12.6.3 Anticipating Bene t -- 12.7 Technical and Commercial Readiness (Availability) Levels -- 12.8 Predicting Development Timescales -- 12.9 Patents -- 12.10 Generic Business Models -- 12.11 Why Nanotechnology Companies Often Fail -- References -- Further Reading -- 13 The Fiscal Environment of Nanotechnology -- 13.1 Sources of Funds -- 13.2 Private Investment -- 13.3 Government Funding -- 13.4 Endogenous Funding -- 13.5 Geographical Differences Between Nanotechnology Funding -- References -- Further Reading -- 14 The Safety of Nanofacture and Nanomaterials -- 14.1 Public Perception of the Safety of Nanoproducts -- 14.2 Evaluating Risk -- 14.3 Evaluating the Toxicity of Nanomaterials -- 14.4 Characteristic Features of Nano-Objects -- 14.5 Exposure -- 14.5.1 Occupational Exposure (During Nanofacture) -- 14.5.2 Public Exposure (During Use) -- 14.6 Penetrability and clearance -- 14.7 Hazard -- 14.8 Variability of Individual Response -- 14.9 Risks to Vital Ecosystems -- 14.10 "Natural" Exposure to Nanoparticles -- 14.11 A Rational Basis for Safety Measures -- 14.12 Bow Tie Diagrams -- References -- Further Reading -- 15 Regulation -- References -- Further Reading -- 16 Some Successful and Unsuccessful Nanotechnology Companies -- 16.1 NanoMagnetics -- 16.2 MesoPhotonics -- 16.3 Enact Pharma -- 16.4 Oxonica -- 16.5 NanoCo -- 16.6 Hyperion -- 16.7 CDT…”
    Libro electrónico
  9. 35509
    Publicado 2021
    “…The authors of The Phoenix Encounter Method don’t advise safety. In fact, their method of leadership thinking requires you to imagine burning your business to the ground—throwing yourself into a firestorm change—and turning the upheaval to your organization’s advantage. …”
    Libro electrónico
  10. 35510
    Publicado 2013
    “…And Arc Attack member Craig Newswanger shows us how to build the awesome Six-Pack Tesla Coil, made with a beer-bottle capacitor, that’ll throw 15” electrical arcs. Other fun, and 100% safety-approved projects include: How to make a phonograph out of Lego bricks A light-up hoodie from Electroluminescent (EL) wire An impressive "high-gain" home media projection screen using little more than latex house paint and sandblasting glass All this, along with the latest developments in maker tech--hardware, software and tools for 3D printing, Arduino, Raspberry Pi, robotics--and much, much more…”
    Libro electrónico
  11. 35511
    Publicado 2018
    Tabla de Contenidos: “…; Case study: hindsight and shooting down an airliner; Safety reporting and honest disclosure; Case study: a nurse's error became a crime; The criminalization of human error; Case study: industry responses to criminalization; What is the right thing to do?…”
    Libro electrónico
  12. 35512
    Publicado 2010
    Tabla de Contenidos: “…11.1.4 Public import Declarations -- 11.1.5 Static import Declarations -- 11.1.6 Selective imports -- 11.1.7 Renaming in imports -- 11.1.8 The module Declaration -- 11.1.9 Module Summaries -- 11.2 Safety -- 11.2.1 Defined and Undefined Behavior -- 11.2.2 The @safe, @trusted, and @system Attributes -- 11.3 Module Constructors and Destructors -- 11.3.1 Execution Order within a Module -- 11.3.2 Execution Order across Modules -- 11.4 Documentation Comments -- 11.5 Interfacing with C and C++ -- 11.6 Deprecated -- 11.7 Version Declarations -- 11.8 Debug Declarations -- 11.9 D's Standard Library -- 12 Operator Overloading -- 12.1 Overloading Operators -- 12.2 Overloading Unary Operators -- 12.2.1 Using mixin to Consolidate Operator Definitions -- 12.2.2 Postincrement and Postdecrement -- 12.2.3 Overloading the cast Operator -- 12.2.4 Overloading Ternary Operator Tests and if Tests -- 12.3 Overloading Binary Operators -- 12.3.1 Operator Overloading [sup(2)] -- 12.3.2 Commutativity -- 12.4 Overloading Comparison Operators -- 12.5 Overloading Assignment Operators -- 12.6 Overloading Indexing Operators -- 12.7 Overloading Slicing Operators -- 12.8 The Operator -- 12.9 Overloading foreach -- 12.9.1 Foreach with Iteration Primitives -- 12.9.2 Foreach with Internal Iteration -- 12.10 Defining Overloaded Operators in Classes -- 12.11 And Now for Something Completely Different: opDispatch -- 12.11.1 Dynamic Dispatch with opDispatch -- 12.12 Summary and Quick Reference -- 13 Concurrency -- 13.1 Concurrentgate -- 13.2 A Brief History of Data Sharing -- 13.3 Look, Ma, No (Default) Sharing -- 13.4 Starting a Thread -- 13.4.1 Immutable Sharing -- 13.5 Exchanging Messages between Threads -- 13.6 Pattern Matching with receive -- 13.6.1 First Match -- 13.6.2 Matching Any Message -- 13.7 File Copying-with a Twist -- 13.8 Thread Termination -- 13.9 Out-of-Band Communication…”
    Libro electrónico
  13. 35513
    Publicado 2013
    “…Moving beyond the basics, this practical guide explores larger questions such as online safety, be it playing in multi-player worlds or posting on forums or YouTube. …”
    Libro electrónico
  14. 35514
    Publicado 2012
    Tabla de Contenidos: “…-- How to Pass the CompTIA A+ Exams -- Historical/Conceptual -- Chapter Review -- Questions -- Answers -- Chapter 2 Operational Procedures -- 801 -- The Professional Tech -- Appearance -- The Traits of a Tech -- Communication -- Assertive Communication -- Respectful Communication -- Eliciting Answers -- Expectations and Follow-up -- Safety and Tools -- Electrostatic Discharge (ESD) -- Anti-static Tools -- Electromagnetic Interference (EMI) -- Radio Frequency Interference (RFI) -- Physical Safety -- Tools of the Trade -- Chapter Review -- Questions -- Answers -- Chapter 3 The Visible PC -- Historical/Conceptual -- How the PC Works -- Input -- Processing -- Output -- Storage -- The Art of the PC Technician -- 801 -- The Complete PC -- External Connections -- Devices and Their Connectors -- Inside the System Unit -- Case -- CPU -- RAM -- Motherboard -- Power Supply -- Floppy Drive -- Hard Drive -- Optical Drives -- Know Your Parts -- Chapter Review -- Questions -- Answers -- Chapter 4 Visible Windows -- Historical/Conceptual -- A Brief History of Microsoft Windows -- Early Windows -- Modern Windows -- 802 -- Windows XP -- Windows Vista -- Windows 7 -- Enter 64-bit Windows -- The Windows Interface -- User Interface -- Hot Keys -- Operating System Folders -- System Folder -- Program and Personal Document Folders…”
    Libro electrónico
  15. 35515
    Publicado 2019
    “…"Protecting the health and safety of health care workers is vital to the health of each of us. …”
    Libro electrónico
  16. 35516
    Publicado 2014
    “…Genomic data can identify new drug targets for both common and rare diseases, can predict which patients are likely to respond to a specific treatment, and has the potential to significantly reduce the cost of clinical trials by reducing the number of patients that must be enrolled in order to demonstrate safety and efficacy. A key component of the approval of targeted therapeutics is the ability to identify the population of patients who will benefit from treatment, and this has largely hinged on the co-development and co-submission to the FDA of a companion diagnostic test. …”
    Libro electrónico
  17. 35517
    “…This report assesses the global demand for products of animal origin in 2050 within the framework of ensuring global food security; evaluates how climate change and natural resource constraints may impact the ability to meet future global demand for animal products in sustainable production systems; and identifies factors that may impact the ability of the United States to meet demand for animal products, including the need for trained human capital, product safety and quality, and effective communication and adoption of new knowledge, information, and technologies. …”
    Libro electrónico
  18. 35518
    Publicado 2014
    “…As a result, regulatory reviewers are consistently required to draw conclusions about a drug's safety and efficacy from imperfect data. Efforts are underway within the drug development community to enhance the evaluation and communication of the benefits and risks associated with pharmaceutical products, aimed at increasing the predictability, transparency, and efficiency of pharmaceutical regulatory decision making. …”
    Libro electrónico
  19. 35519
    Publicado 2018
    “…However, generating the necessary data to confirm safety and efficacy during expedited drug development programs can present a unique set of challenges and opportunities. …”
    Libro electrónico
  20. 35520
    Publicado 2020
    “…This report addresses the current state of knowledge regarding TMD research, education and training, safety and efficacy of clinical treatments of TMDs, and burden and costs associated with TMDs. …”
    Libro electrónico