Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Teresa de Jesús 1,796
- Historia 1,154
- Semana Santa 1,049
- Història 946
- María 946
- Goigs 613
- Teresa del Niño Jesús 612
- Mara 602
- Biografia 556
- Biografías 490
- Culto 483
- Biografa 405
- Liturgia 390
- Setmana Santa 370
- Clara de Asís 361
- Crítica e interpretación 354
- Església Catòlica 335
- Meditaciones 335
- Sants 324
- Safety measures 296
- Litúrgia 293
- Edith Stein 280
- Semana Santa- 272
- Misticismo 271
- Santes 257
- Espiritualidad 252
- Teología 249
- Santos 205
- Teresa 203
- Monestir de Santa Maria de Poblet 200
-
36261Publicado 2018“…What You Will Learn Appreciate why networking is important in implementing distributed systems Write a non-asynchronous echo server over TCP that talks to a client over a network Parse JSON and binary data using parser combinators such as nom Write an HTTP client that talks to the server using reqwest Modify an existing Rust HTTTP server and add SSL to it Master asynchronous programming support in Rust Use external packages in a Rust project In Detail Rust is low-level enough to provide fine-grained control over memory while providing safety through compile-time validation. This makes it uniquely suitable for writing low-level networking applications. …”
Libro electrónico -
36262Publicado 2015“…You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. …”
Libro electrónico -
36263Publicado 2014“…Make your robots move with motors and wheels Build solar-powered robots that work without batteries Control robots via Wi-Fi, radio, or even across the Internet Program robots to respond to sensor inputs Use your standard TV remote to control your robots Create robots that detect intruders and shoot them with Nerf® darts Grab and carry objects using claws and grippers Build water-borne robots that float, submerge, and “swim” Create “artbots” that paint or draw original artworks Enable your robots to send text messages when they take specific actions Discover today’s new generation of hobbyist-friendly robotics kits Organize your ultimate robot-builder’s toolbox Master simple safety routines that protect you whatever you’re building…”
Libro electrónico -
36264Publicado 2023“…Use the Rust programming language to build fully functional web applications with async Rust to amplify security and boost the performance of your programs Key Features Work with cutting-edge web techniques such as distroless Rust servers, Terraform, and AWS deployment Get acquainted with async concepts such as actors and queuing tasks using lower-level frameworks like Tokio Build a full web application in Rust with a database, authentication, and frontend Book Description Are safety and high performance a big concern for you while developing web applications? …”
Libro electrónico -
36265Publicado 2020“…Aquests dos modes d’accés a l’Ésser guarden similituds amb la teoria tomista de la duplex cognitio de anima, que examinarem a partir de la descripció que ofereix Jaume Bofill i Bofill a la seva Metafísica del sentiment.Però per tal de donar un sentit profund a la comparació, s’analitzen abans l’ordenació que du a terme el cardenal Gaietà amb respecte a tres elements clau del pensament de Tomàs d’Aquino: l’ús de l’analogia, la concepció de l’ens com a nom i com a participi i els dos modes d’abstracció. …”
Accés lliure
Tesis -
36266Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Automotive IoT -- Chapter 1: Automotive Technology Trends -- Overview of current automotive trends -- CASE -- SDV and SOA -- Mobile apps and the cloud -- Modern software development -- Standards and regulations -- Introduction to automotive IoT -- Automotive IoT -- Automotive IoT use case examples -- Data management for automotive IoT use cases -- Summary -- References -- Chapter 2: Introducing Automotive IoT Use Cases -- Phone as a key -- Personalized in-car experience -- Connected car services -- Enhanced driver experience and safety -- Optimized fleet management -- Real-time vehicle tracking and telematics -- Driver performance monitoring -- Predictive maintenance -- Connected mobility revolution -- Smart parking solutions -- Vehicle-to-Everything (V2X) communication -- Connected supply chain and manufacturing -- Summary -- References -- Advanced driver-assistance systems -- Part 2: Vehicle Architectures -- Chapter 3: Vehicle Architecture and Frameworks -- The scale of vehicle architecture -- Distributed architecture -- Centralized zonal domain architecture -- A central computer with multiple domain-specific SoCs -- A central computer with a single SoC -- Standard frameworks to support vehicle architecture and IoT -- A high-level overview of the domain controller -- Summary -- References -- Chapter 4: Vehicle Diagnostics -- UDS -- UDS message structure -- DoIP -- DoIP message format -- DoIP example message flow -- Diagnostic communication workflow in Classic AUTOSAR -- Diagnostic service management in Adaptive AUTOSAR -- Reflecting on the application of remote diagnostics -- Summary -- References -- Chapter 5: Next Wave of Vehicle Diagnostics -- Technical requirements -- Needs beyond UDS -- SOVD -- REST…”
Libro electrónico -
36267Publicado 2020Tabla de Contenidos: “…44 2.6 Additional Terms 49 2.7 Problems 54 References 56 3 Main Elements of Risk Assessment 59 3.1 Introduction 59 3.2 Risk Assessment Process 60 3.3 Risk Assessment Report 76 3.4 Risk Assessment in Safety Legislation 81 3.5 Validity and Quality Aspects of a Risk Assessment 82 3.6 Problems 83 References 84 4 Study Object and Limitations 87 4.1 Introduction 87 4.2 Study Object 87 4.3 Operating Context 91 4.4 System Modeling and Analysis 92 4.5 Complexity 95 4.6 Problems 97 References 98 5 Risk Acceptance 99 5.1 Introduction 99 5.2 Risk Acceptance Criteria 99 5.3 Approaches to Establishing Risk Acceptance Criteria 106 5.4 Risk Acceptance Criteria for Other Assets than Humans 114 5.5 Closure 115 5.6 Problems 115 References 117 6 Measuring Risk 121 6.1 Introduction 121 6.2 Risk Metrics 121 6.3 Measuring Risk to People 123 6.4 Risk Matrices 148 6.5 Reduction in Life Expectancy 154 6.6 Choice and Use of Risk Metrics 156 6.7 Risk Metrics for Other Assets 158 6.8 Problems 159 References 163 7 Risk Management 167 7.1 Introduction 167 7.2 Scope, Context, and Criteria 170 7.3 Risk Assessment 170 7.4 Risk Treatment 171 7.5 Communication and Consultation 172 7.6 Monitoring and Review 173 7.7 Recording and Reporting 174 7.8 Stakeholders 175 7.9 Risk and Decision-Making 176 7.10 Safety Legislation 179 7.11 Problems 180 References 180 8 Accident Models 183 8.1 Introduction 183 8.2 Accident Classification 183 8.3 Accident Investigation 188 8.4 Accident Causation 188 8.5 Accident Models 190 8.6 Energy and Barrier Models 193 8.7 Sequential Accident Models 195 8.8 Epidemiological Accident Models 201 8.9 Event Causation and Sequencing Models 208 8.10 Systemic Accident Models 213 8.11 Combining Accident Models 228 8.12 Problems 229 References 230 9 Data for Risk Analysis 235 9.1 Types of Data 235 9.2 Quality and Applicability of Data 238 9.3 Data Sources 239 9.4 Expert Judgment 250 9.5 Data Dossier 254 9.6 Problems 254 References 257 10 Hazard Identification 259 10.1 Introduction 259 10.2 Checklist Methods 263 10.3 Preliminary Hazard Analysis 266 10.4 Job Safety Analysis 278 10.5 FMECA 287 10.6 HAZOP 295 10.7 STPA 306 10.8 SWIFT 316 10.9 Comparing Semiquantitative Methods 322 10.10 Master Logic Diagram 322 10.11 Change Analysis 324 10.12 Hazard Log 327 10.13 Problems 331 References 335 11 Causal and Frequency Analysis 339 11.1 Introduction 339 11.2 Cause and Effect Diagram Analysis 341 11.3 Fault Tree Analysis 344 11.4 Bayesian Networks 370 11.5 Markov Methods 384 11.6 Problems 396 References 400 12 Development of Accident Scenarios 401 12.1 Introduction 401 12.2 Event Tree Analysis 402 12.3 Event Sequence Diagrams 426 12.4 Cause-Consequence Analysis 426 12.5 Hybrid Causal Logic 428 12.6 Escalation Problems 429 12.7 Consequence Models 429 12.8 Problems 431 References 435 13 Dependent Failures and Events 437 13.1 Introduction 437 13.2 Dependent Failures and Events 437 13.3 Dependency in Accident Scenarios 439 13.4 Cascading Failures 441 13.5 Common-Cause Failures 442 13.6 Factor Model 452 13.7 Binomial Failure Rate Model 456 13.8 Multiple Greek Letter Model 457 13.9-Factor Model 459 13.10 Multiple-Factor Model 461 13.11 Problems 461 References 462 14 Barriers and Barrier Analysis 465 14.1 Introduction 465 14.2 Barriers and Barrier Classification 466 14.3 Barrier Management 474 14.4 Barrier Properties 476 14.5 Safety-Instrumented Systems 477 14.6 Hazard-Barrier Matrices 487 14.7 Safety Barrier Diagrams 488 14.8 Bow-Tie Diagrams 490 14.9 Energy Flow/Barrier Analysis 490 14.10 Layer of Protection Analysis 493 14.11 Barrier and Operational Risk Analysis 502 14.12 Systematic Identification and Evaluation of Risk Reduction Measures 512 14.13 Problems 518 References 520 15 Human Reliability Analysis 525 15.1 Introduction 525 15.2 Task Analysis 536 15.3 Human Error Identification 543 15.4 HRA Methods 552 15.5 Problems 573 References 574 16 Risk Analysis and Management for Operation 579 16.1 Introduction 579 16.2 Decisions About Risk 581 16.3 Aspects of Risk to Consider 583 16.4 Risk Indicators 585 16.5 Risk Modeling 594 16.6 Operational Risk Analysis - Updating the QRA 596 16.7 MIRMAP 598 16.8 Problems 601 References 602 17 Security Assessment 605 17.1 Introduction 605 17.2 Main Elements of Security Assessment 608 17.3 Industrial Control and Safety Systems 615 17.4 Security Assessment 617 17.5 Security Assessment Methods 625 17.6 Application Areas 626 17.7 Problems 627 References 628 18 Life Cycle Use of Risk Analysis 631 18.1 Introduction 631 18.2 Phases in the Life Cycle 631 18.3 Comments Applicable to all Phases 634 18.4 Feasibility and Concept Selection 635 18.5 Preliminary Design 637 18.6 Detailed Design and Construction 639 18.7 Operation and Maintenance 641 18.8 Major Modifications 641 18.9 Decommissioning and Removal 643 18.10 Problems 643 References 643 19 Uncertainty and Sensitivity Analysis 645 19.1 Introduction 645 19.2 Uncertainty 647 19.3 Categories of Uncertainty 648 19.4 Contributors to Uncertainty 651 19.5 Uncertainty Propagation 656 19.6 Sensitivity Analysis 661 19.7 Problems 663 References 664 20 Development and Applications of Risk Assessment 667 20.1 Introduction 667 20.2 Defense and Defense Industry 668 20.3 Nuclear Power Industry 670 20.4 Process Industry 674 20.5 Offshore Oil and Gas Industry 678 20.6 Space Industry 681 20.7 Aviation 683 20.8 Railway Transport 685 20.9 Marine Transport 686 20.10 Machinery Systems 689 20.11 Food Safety 690 20.12 Other Application Areas 692 20.13 Closure 695 References 697 Appendix A Elements of Probability Theory 701 A.1 Introduction 701 A.2 Outcomes and Events 701 A.3 Probability 706 A.4 Random Variables 710 A.5 Some Specific Distributions 718 A.6 Point and Interval Estimation 728 A.7 Bayesian Approach 732 A.8 Probability of Frequency Approach 733 References 739 Appendix B Acronyms 741 Author Index 747 Subject Index…”
Libro electrónico -
36268Publicado 2020“…As AI (and associated AI-hype) grows more pervasive in our lives, its impact on society is ever more significant, raising ethical concerns and challenges regarding issues such as privacy, safety and security, surveillance, inequality, data handling and bias, personal agency, power relations, effective modes of regulation, accountability, sanctions, and workforce displacement. …”
Libro electrónico -
36269Publicado 2020“…It includes high-quality peer-reviewed papers featuring substantive new research in one of five main research areas:User Modeling for Recommender SystemsAdaptive & Personalized Educational SystemsIntelligent User InterfacesUser modeling in health and safetyResponsible personalization (UMAP 2020 theme)Personality, cognitive aspects and emotions in user modeling This year, we received 139 long paper and 62 short paper submissions. …”
Libro electrónico -
36270Publicado 2017“…Non solamente per ribadire il valore dell’art. 7 della Costituzione, per il quale «lo Stato e la Chiesa cattolica sono, ciascuno nel proprio ordine, indipendenti e sovrani», ma anche per rinnovare lo spirito di collaborazione al servizio del popolo italiano. La salita al Colle di Francesco dello scorso 10 giugno – la seconda del suo pontificato, dopo quella del 14 novembre 2013 al presidente Napolitano – è la nona visita di un Papa al Quirinale dopo la costituzione della Repubblica. …”
Artículo -
36271Publicado 2001“…And how can some of these answers change if you're writing multithread-safe code? Does exception safety affect class design, or can it be retrofitted in as an afterthought? …”
Libro electrónico -
36272Publicado 2017“…The pillar of memory safety is treated in depth as we explore the various pointer kinds. …”
Libro electrónico -
36273Publicado 2017“…We'll use Kotlin's basic programming concepts such as functions, lambdas, properties, object-oriented code, safety aspects, type parameterization, testing, and concurrency, which will guide you through writing Kotlin code into production. …”
Libro electrónico -
36274Publicado 2020“…Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. …”
Libro electrónico -
36275Publicado 2007“…Tactics and strategy: protecting Internet infrastructure from top to bottom Building more secure transport, messaging, identities, networks, platforms, and more Gaining safety without sacrificing the Internet’s unique power and value Making the Internet safer for honest people without sacrificing ubiquity, simplicity, or privacy Spam: draining the swamp, once and for all Why spam contributes to virtually every form of Internet crime–and what we can do about it Design for deployment: how to really make it happen Defining security objectives, architecture, strategy, and design–and evangelizing them How to Build a Safer, Better Internet You’ll find yourself deeply concerned, then fascinated, then hopeful as you read about • Building an Internet that resists online crime • Phishing, botnets, and spam: tactical, workable, immediate countermeasures • Establishing the “Accountable Web”: a strategic, long-term solution to Internet crime • Improving security without sacrificing what people love about the Internet The Internet is today’s Wild West: too much lawlessness, too little accountability. …”
Libro electrónico -
36276Publicado 2017“…Auf die Arbeit mit dem Bürosoftware-Paket LibreOffice geht er dabei besonders ein. Im weiteren Verlauf des praxisnahen Buches erhalten Sie wertvolle Informationen und Tipps in Sachen Multimedia, Mobilität, Datensicherung in der Cloud oder Sicherheit Ihres Systems. …”
Libro electrónico -
36277por Alger, Douglas“…A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company’s valuable information. …”
Publicado 2005
Libro electrónico -
36278Publicado 2013“…You'll discover breakthrough ways of changing the key behaviors that lead to greater safety, productivity, quality, and customer service. …”
Libro electrónico -
36279Publicado 2017Tabla de Contenidos: “…Cover -- Copyrights -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Beginning Your Kotlin Adventure -- Say hello to Kotlin -- Awesome Kotlin examples -- Dealing with Kotlin code -- Kotlin Playground -- Android Studio -- Configuring Kotlin for the project -- Using Kotlin in a new Android project -- Java to Kotlin converter (J2K) -- Alternative ways to run Kotlin code -- Kotlin under the hood -- The Kotlin standard library -- More reasons to use Kotlin -- Summary -- Chapter 2: Laying a Foundation -- Variables -- Type inference -- Strict null safety -- Safe call -- Elvis operator -- Not-null assertion -- The let function -- Nullability and Java -- Casts -- Safe/unsafe cast operator -- Smart casts -- Type smart casts -- Non-nullable smart cast -- Primitive data types -- Numbers -- Char -- Arrays -- The Boolean type -- Composite data types -- Strings -- String templates -- Ranges -- Collections -- Statements versus expressions -- Control flow -- The if statement -- The when expression -- Loops -- The for loop -- The while loop -- Other iterations -- Break and continue -- Exceptions -- The try... catch block -- Compile-time constants -- Delegates -- Summary -- Chapter 3: Playing with Functions -- Basic function declaration and usage -- Parameters -- Returning functions -- Vararg parameter -- Single-expression functions -- Tail-recursive functions -- Different ways of calling a function -- Default argument values -- Named arguments syntax -- Top-level functions -- Top-level functions under the hood -- Local functions -- Nothing return type -- Summary -- Chapter 4: Classes and Objects -- Classes -- Class declaration -- Properties -- Read-write versus read-only -- Property access syntax between Kotlin and Java -- Increment and decrement operators…”
Libro electrónico -
36280Publicado 2020“…Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. …”
Libro electrónico