Mostrando 35,821 - 35,840 Resultados de 35,981 Para Buscar 'Saketa~', tiempo de consulta: 1.22s Limitar resultados
  1. 35821
    Publicado 2016
    “…It is a statically typed language with syntax loosely derived from that of C, adding garbage collection, type safety, some dynamic-typing capabilities, additional built-in types such as variable-length arrays and key-value maps, and a large standard library. …”
    Libro electrónico
  2. 35822
    Publicado 2017
    “…What You Will Learn Use Redis and relational databases to store issued access tokens and refresh tokens Access resources protected by the OAuth2 Provider using Spring Security Implement a web application that dynamically registers itself to the Authorization Server Improve the safety of your mobile client using dynamic client registration Protect your Android client with Proof Key for Code Exchange Protect the Authorization Server from invalid redirection In Detail OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. …”
    Libro electrónico
  3. 35823
    Publicado 2020
    “…You’ll also learn all about: • “Speaking dog”—understanding body language, respect, and safety • What’s in Kaylee’s camera bag and treat bag (squeakers, snacks, and toys)! …”
    Libro electrónico
  4. 35824
    Publicado 2019
    Tabla de Contenidos: “…Chapter 1: Getting Started with Rust -- Chapter 2: Managing Projects with Cargo -- Chapter 3: Tests, Documentation, and Benchmarks -- Chapter 4: Types, Generics, and Traits -- Chapter 5: Memory Management and Safety -- Chapter 6: Error Handling -- Chapter 7: Advanced Concepts -- Chapter 8: Concurrency -- Chapter 9: Metaprogramming with Macros -- Chapter 10: Unsafe Rust and Foreign Function Interfaces -- Chapter 11: Logging -- Chapter 12: Network Programming in Rust -- Chapter 13: Building Web Applications with Rust -- Chapter 14: Lists, Lists, and More Lists -- Chapter 15: Robust Trees -- Chapter 16: Exploring Maps and Sets -- Chapter 17: Collections in Rust -- Chapter 18: Algorithm Evaluation -- Chapter 19: Ordering Things -- Chapter 20: Finding Stuff -- Chapter 21: Random and Combinatorial -- Chapter 22: Algorithms of the Standard Library…”
    Libro electrónico
  5. 35825
    Publicado 2018
    “…What You Will Learn Appreciate why networking is important in implementing distributed systems Write a non-asynchronous echo server over TCP that talks to a client over a network Parse JSON and binary data using parser combinators such as nom Write an HTTP client that talks to the server using reqwest Modify an existing Rust HTTTP server and add SSL to it Master asynchronous programming support in Rust Use external packages in a Rust project In Detail Rust is low-level enough to provide fine-grained control over memory while providing safety through compile-time validation. This makes it uniquely suitable for writing low-level networking applications. …”
    Libro electrónico
  6. 35826
    Publicado 2015
    “…You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. …”
    Libro electrónico
  7. 35827
    Publicado 2014
    “…Make your robots move with motors and wheels Build solar-powered robots that work without batteries Control robots via Wi-Fi, radio, or even across the Internet Program robots to respond to sensor inputs Use your standard TV remote to control your robots Create robots that detect intruders and shoot them with Nerf® darts Grab and carry objects using claws and grippers Build water-borne robots that float, submerge, and “swim” Create “artbots” that paint or draw original artworks Enable your robots to send text messages when they take specific actions Discover today’s new generation of hobbyist-friendly robotics kits Organize your ultimate robot-builder’s toolbox Master simple safety routines that protect you whatever you’re building…”
    Libro electrónico
  8. 35828
    Publicado 2023
    “…Use the Rust programming language to build fully functional web applications with async Rust to amplify security and boost the performance of your programs Key Features Work with cutting-edge web techniques such as distroless Rust servers, Terraform, and AWS deployment Get acquainted with async concepts such as actors and queuing tasks using lower-level frameworks like Tokio Build a full web application in Rust with a database, authentication, and frontend Book Description Are safety and high performance a big concern for you while developing web applications? …”
    Libro electrónico
  9. 35829
    Publicado 2020
    “…Aquests dos modes d’accés a l’Ésser guarden similituds amb la teoria tomista de la duplex cognitio de anima, que examinarem a partir de la descripció que ofereix Jaume Bofill i Bofill a la seva Metafísica del sentiment.Però per tal de donar un sentit profund a la comparació, s’analitzen abans l’ordenació que du a terme el cardenal Gaietà amb respecte a tres elements clau del pensament de Tomàs d’Aquino: l’ús de l’analogia, la concepció de l’ens com a nom i com a participi i els dos modes d’abstracció. …”
    Accés lliure
    Tesis
  10. 35830
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Copyright -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Automotive IoT -- Chapter 1: Automotive Technology Trends -- Overview of current automotive trends -- CASE -- SDV and SOA -- Mobile apps and the cloud -- Modern software development -- Standards and regulations -- Introduction to automotive IoT -- Automotive IoT -- Automotive IoT use case examples -- Data management for automotive IoT use cases -- Summary -- References -- Chapter 2: Introducing Automotive IoT Use Cases -- Phone as a key -- Personalized in-car experience -- Connected car services -- Enhanced driver experience and safety -- Optimized fleet management -- Real-time vehicle tracking and telematics -- Driver performance monitoring -- Predictive maintenance -- Connected mobility revolution -- Smart parking solutions -- Vehicle-to-Everything (V2X) communication -- Connected supply chain and manufacturing -- Summary -- References -- Advanced driver-assistance systems -- Part 2: Vehicle Architectures -- Chapter 3: Vehicle Architecture and Frameworks -- The scale of vehicle architecture -- Distributed architecture -- Centralized zonal domain architecture -- A central computer with multiple domain-specific SoCs -- A central computer with a single SoC -- Standard frameworks to support vehicle architecture and IoT -- A high-level overview of the domain controller -- Summary -- References -- Chapter 4: Vehicle Diagnostics -- UDS -- UDS message structure -- DoIP -- DoIP message format -- DoIP example message flow -- Diagnostic communication workflow in Classic AUTOSAR -- Diagnostic service management in Adaptive AUTOSAR -- Reflecting on the application of remote diagnostics -- Summary -- References -- Chapter 5: Next Wave of Vehicle Diagnostics -- Technical requirements -- Needs beyond UDS -- SOVD -- REST…”
    Libro electrónico
  11. 35831
    Publicado 2020
    Tabla de Contenidos: “…44 2.6 Additional Terms 49 2.7 Problems 54 References 56 3 Main Elements of Risk Assessment 59 3.1 Introduction 59 3.2 Risk Assessment Process 60 3.3 Risk Assessment Report 76 3.4 Risk Assessment in Safety Legislation 81 3.5 Validity and Quality Aspects of a Risk Assessment 82 3.6 Problems 83 References 84 4 Study Object and Limitations 87 4.1 Introduction 87 4.2 Study Object 87 4.3 Operating Context 91 4.4 System Modeling and Analysis 92 4.5 Complexity 95 4.6 Problems 97 References 98 5 Risk Acceptance 99 5.1 Introduction 99 5.2 Risk Acceptance Criteria 99 5.3 Approaches to Establishing Risk Acceptance Criteria 106 5.4 Risk Acceptance Criteria for Other Assets than Humans 114 5.5 Closure 115 5.6 Problems 115 References 117 6 Measuring Risk 121 6.1 Introduction 121 6.2 Risk Metrics 121 6.3 Measuring Risk to People 123 6.4 Risk Matrices 148 6.5 Reduction in Life Expectancy 154 6.6 Choice and Use of Risk Metrics 156 6.7 Risk Metrics for Other Assets 158 6.8 Problems 159 References 163 7 Risk Management 167 7.1 Introduction 167 7.2 Scope, Context, and Criteria 170 7.3 Risk Assessment 170 7.4 Risk Treatment 171 7.5 Communication and Consultation 172 7.6 Monitoring and Review 173 7.7 Recording and Reporting 174 7.8 Stakeholders 175 7.9 Risk and Decision-Making 176 7.10 Safety Legislation 179 7.11 Problems 180 References 180 8 Accident Models 183 8.1 Introduction 183 8.2 Accident Classification 183 8.3 Accident Investigation 188 8.4 Accident Causation 188 8.5 Accident Models 190 8.6 Energy and Barrier Models 193 8.7 Sequential Accident Models 195 8.8 Epidemiological Accident Models 201 8.9 Event Causation and Sequencing Models 208 8.10 Systemic Accident Models 213 8.11 Combining Accident Models 228 8.12 Problems 229 References 230 9 Data for Risk Analysis 235 9.1 Types of Data 235 9.2 Quality and Applicability of Data 238 9.3 Data Sources 239 9.4 Expert Judgment 250 9.5 Data Dossier 254 9.6 Problems 254 References 257 10 Hazard Identification 259 10.1 Introduction 259 10.2 Checklist Methods 263 10.3 Preliminary Hazard Analysis 266 10.4 Job Safety Analysis 278 10.5 FMECA 287 10.6 HAZOP 295 10.7 STPA 306 10.8 SWIFT 316 10.9 Comparing Semiquantitative Methods 322 10.10 Master Logic Diagram 322 10.11 Change Analysis 324 10.12 Hazard Log 327 10.13 Problems 331 References 335 11 Causal and Frequency Analysis 339 11.1 Introduction 339 11.2 Cause and Effect Diagram Analysis 341 11.3 Fault Tree Analysis 344 11.4 Bayesian Networks 370 11.5 Markov Methods 384 11.6 Problems 396 References 400 12 Development of Accident Scenarios 401 12.1 Introduction 401 12.2 Event Tree Analysis 402 12.3 Event Sequence Diagrams 426 12.4 Cause-Consequence Analysis 426 12.5 Hybrid Causal Logic 428 12.6 Escalation Problems 429 12.7 Consequence Models 429 12.8 Problems 431 References 435 13 Dependent Failures and Events 437 13.1 Introduction 437 13.2 Dependent Failures and Events 437 13.3 Dependency in Accident Scenarios 439 13.4 Cascading Failures 441 13.5 Common-Cause Failures 442 13.6 Factor Model 452 13.7 Binomial Failure Rate Model 456 13.8 Multiple Greek Letter Model 457 13.9-Factor Model 459 13.10 Multiple-Factor Model 461 13.11 Problems 461 References 462 14 Barriers and Barrier Analysis 465 14.1 Introduction 465 14.2 Barriers and Barrier Classification 466 14.3 Barrier Management 474 14.4 Barrier Properties 476 14.5 Safety-Instrumented Systems 477 14.6 Hazard-Barrier Matrices 487 14.7 Safety Barrier Diagrams 488 14.8 Bow-Tie Diagrams 490 14.9 Energy Flow/Barrier Analysis 490 14.10 Layer of Protection Analysis 493 14.11 Barrier and Operational Risk Analysis 502 14.12 Systematic Identification and Evaluation of Risk Reduction Measures 512 14.13 Problems 518 References 520 15 Human Reliability Analysis 525 15.1 Introduction 525 15.2 Task Analysis 536 15.3 Human Error Identification 543 15.4 HRA Methods 552 15.5 Problems 573 References 574 16 Risk Analysis and Management for Operation 579 16.1 Introduction 579 16.2 Decisions About Risk 581 16.3 Aspects of Risk to Consider 583 16.4 Risk Indicators 585 16.5 Risk Modeling 594 16.6 Operational Risk Analysis - Updating the QRA 596 16.7 MIRMAP 598 16.8 Problems 601 References 602 17 Security Assessment 605 17.1 Introduction 605 17.2 Main Elements of Security Assessment 608 17.3 Industrial Control and Safety Systems 615 17.4 Security Assessment 617 17.5 Security Assessment Methods 625 17.6 Application Areas 626 17.7 Problems 627 References 628 18 Life Cycle Use of Risk Analysis 631 18.1 Introduction 631 18.2 Phases in the Life Cycle 631 18.3 Comments Applicable to all Phases 634 18.4 Feasibility and Concept Selection 635 18.5 Preliminary Design 637 18.6 Detailed Design and Construction 639 18.7 Operation and Maintenance 641 18.8 Major Modifications 641 18.9 Decommissioning and Removal 643 18.10 Problems 643 References 643 19 Uncertainty and Sensitivity Analysis 645 19.1 Introduction 645 19.2 Uncertainty 647 19.3 Categories of Uncertainty 648 19.4 Contributors to Uncertainty 651 19.5 Uncertainty Propagation 656 19.6 Sensitivity Analysis 661 19.7 Problems 663 References 664 20 Development and Applications of Risk Assessment 667 20.1 Introduction 667 20.2 Defense and Defense Industry 668 20.3 Nuclear Power Industry 670 20.4 Process Industry 674 20.5 Offshore Oil and Gas Industry 678 20.6 Space Industry 681 20.7 Aviation 683 20.8 Railway Transport 685 20.9 Marine Transport 686 20.10 Machinery Systems 689 20.11 Food Safety 690 20.12 Other Application Areas 692 20.13 Closure 695 References 697 Appendix A Elements of Probability Theory 701 A.1 Introduction 701 A.2 Outcomes and Events 701 A.3 Probability 706 A.4 Random Variables 710 A.5 Some Specific Distributions 718 A.6 Point and Interval Estimation 728 A.7 Bayesian Approach 732 A.8 Probability of Frequency Approach 733 References 739 Appendix B Acronyms 741 Author Index 747 Subject Index…”
    Libro electrónico
  12. 35832
    Publicado 2020
    “…As AI (and associated AI-hype) grows more pervasive in our lives, its impact on society is ever more significant, raising ethical concerns and challenges regarding issues such as privacy, safety and security, surveillance, inequality, data handling and bias, personal agency, power relations, effective modes of regulation, accountability, sanctions, and workforce displacement. …”
    Libro electrónico
  13. 35833
    Publicado 2020
    “…It includes high-quality peer-reviewed papers featuring substantive new research in one of five main research areas:User Modeling for Recommender SystemsAdaptive & Personalized Educational SystemsIntelligent User InterfacesUser modeling in health and safetyResponsible personalization (UMAP 2020 theme)Personality, cognitive aspects and emotions in user modeling This year, we received 139 long paper and 62 short paper submissions. …”
    Libro electrónico
  14. 35834
    Publicado 2017
    “…Non solamente per ribadire il valore dell’art. 7 della Costituzione, per il quale «lo Stato e la Chiesa cattolica sono, ciascuno nel proprio ordine, indipendenti e sovrani», ma anche per rinnovare lo spirito di collaborazione al servizio del popolo italiano. La salita al Colle di Francesco dello scorso 10 giugno – la seconda del suo pontificato, dopo quella del 14 novembre 2013 al presidente Napolitano – è la nona visita di un Papa al Quirinale dopo la costituzione della Repubblica. …”
    Artículo
  15. 35835
    Publicado 2001
    “…And how can some of these answers change if you're writing multithread-safe code? Does exception safety affect class design, or can it be retrofitted in as an afterthought? …”
    Libro electrónico
  16. 35836
    Publicado 2017
    “…The pillar of memory safety is treated in depth as we explore the various pointer kinds. …”
    Libro electrónico
  17. 35837
    Publicado 2017
    “…We'll use Kotlin's basic programming concepts such as functions, lambdas, properties, object-oriented code, safety aspects, type parameterization, testing, and concurrency, which will guide you through writing Kotlin code into production. …”
    Libro electrónico
  18. 35838
    Publicado 2020
    “…Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. …”
    Libro electrónico
  19. 35839
    Publicado 2007
    “…Tactics and strategy: protecting Internet infrastructure from top to bottom Building more secure transport, messaging, identities, networks, platforms, and more Gaining safety without sacrificing the Internet’s unique power and value Making the Internet safer for honest people without sacrificing ubiquity, simplicity, or privacy Spam: draining the swamp, once and for all Why spam contributes to virtually every form of Internet crime–and what we can do about it Design for deployment: how to really make it happen Defining security objectives, architecture, strategy, and design–and evangelizing them How to Build a Safer, Better Internet You’ll find yourself deeply concerned, then fascinated, then hopeful as you read about • Building an Internet that resists online crime • Phishing, botnets, and spam: tactical, workable, immediate countermeasures • Establishing the “Accountable Web”: a strategic, long-term solution to Internet crime • Improving security without sacrificing what people love about the Internet The Internet is today’s Wild West: too much lawlessness, too little accountability. …”
    Libro electrónico
  20. 35840
    Publicado 2017
    “…Auf die Arbeit mit dem Bürosoftware-Paket LibreOffice geht er dabei besonders ein. Im weiteren Verlauf des praxisnahen Buches erhalten Sie wertvolle Informationen und Tipps in Sachen Multimedia, Mobilität, Datensicherung in der Cloud oder Sicherheit Ihres Systems. …”
    Libro electrónico