Mostrando 37,821 - 37,840 Resultados de 38,315 Para Buscar 'Saketa~', tiempo de consulta: 1.42s Limitar resultados
  1. 37821
    Publicado 2022
    “…These multiple simulation environments will also allow you to further build public trust in the safety of artificial intelligence within drones and small UAS. …”
    Libro electrónico
  2. 37822
    “…Nondestructive testing (NDT) emerges as a pivotal method for detecting and assessing defects, offering support for safety pre-warning and maintenance decisions in industrial structures. …”
    Libro electrónico
  3. 37823
    por Fosalba, Eugenia
    Publicado 2024
    “…La combinación de ambas facetas ilumina los rincones oscuros de la razón de ser de buena parte de sus composiciones…”
    Libro electrónico
  4. 37824
    por Soper, Mark Edward
    Publicado 2010
    “…View, organize, fix, and share photos with Live Photo Gallery Share your life with Live Messenger and Live Spaces social networking Take total control over email with Hotmail and Live Mail Get organized with Live Mail Calendar Back up and share files online with Skydrive Create great movies with Movie Maker Protect yourself and your kids online with Windows Live Toolbar and Family Safety Stay connected from smartphones with Windows Live’s new sync tools Use free Windows Live services even if you’re not running Windows Learn Fast, Learn Easy! …”
    Libro electrónico
  5. 37825
    por Baichtal, John
    Publicado 2013
    “…First, he guides you gently up the learning curve, teaching you all you need to know about Arduino boards, basic electronics, safety, tools, soldering, and a whole lot more. Then, you walk step-by-step through projects that reveal Arduino’s incredible potential for sensing and controlling the environment–projects that inspire you to create, invent, and build the future! …”
    Libro electrónico
  6. 37826
    Publicado 2022
    Tabla de Contenidos: “…Summary -- Build your resilience -- Step 3 Sharpen your focus -- Self-talk: you are what you think -- 'The little voice' -- Technical, tactical and emotional self-talk -- Positive, negative or neutral and curious self-talk -- Mantras -- Internal or external focus -- Narrow or broad: switching focus -- Getting in the zone or flow -- Self-regulation -- Distractions -- Secondary errors -- Being in the present -- Attention to detail -- Focus on what you can control -- Visual and physical cues -- Body language -- Use of time -- Chunking and race plans -- The Tan -- Adopting and adapting a plan -- Routines and clarity -- Summary -- Build your focus -- Step 4 Champion your leadership -- Diamonds: leadership by example -- Influence -- The what and the how of leadership -- Leading self -- Leading culture -- Leading others -- Leading situations -- Leading structure and systems -- Leadership growth -- Formal and informal leadership -- Leadership density -- Leadership groups -- Captain class -- Leadership qualities -- Contributor -- Sport integrity -- Team and others focus -- Communication -- Determination -- Composure -- Positive performer -- Self-belief -- Summary -- Build your leadership -- Step 5 Foster your culture -- Culture in practice -- Thinking, decisions and behaviour -- High-performance environments -- Individual athlete and coach influence on culture -- Cultural consistency -- Psychological safety -- Learn and grow -- Emotional intelligence -- Relationships and communication -- Mastery climate -- The New Zealand All Blacks -- Building culture -- Terminology and engagement -- Clear values and behaviours described -- Support people and performance -- Leaders live, model and drive culture -- Coaching, celebrating and accountability -- Display and share -- Integrate into processes -- Monitoring and evolving culture with data and measurement…”
    Libro electrónico
  7. 37827
    Tabla de Contenidos: “…Chapter 1. General Operation Safety of Network System -- Chapter 2. Cabling Engineering -- Chapter 3. …”
    Libro electrónico
  8. 37828
    Publicado 2021
    “…One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). …”
    Libro
  9. 37829
    Publicado 1997
    “…Topics include: User safety--browser vulnerabilities (with an emphasis on Netscape Navigator and Microsoft Internet Explorer), privacy concerns, issues with Java, JavaScript, ActiveX, and plug-ins. …”
    Libro electrónico
  10. 37830
    Publicado 2004
    “…Coverage includes: Introductory material for developers getting started with Swing, including sections on basic components such as text fields, labels, and buttons, as well as on using images The latest advice from the Swing team about thread safety Advanced Swing material, including changing key bindings, manipulating the focus, using data models, and adding painting code that uses the powerful Java 2DTM API How-to discussions on using individual components and containers, including advanced components such as tables, trees, and text editors Over 150 complete, working code examples For the novice or experienced Java developer looking to create robust, powerful, and visually stunning GUIs, The JFC Swing Tutorial, Second Edition, is an indispensable tutorial and reference…”
    Libro electrónico
  11. 37831
    Publicado 2008
    “…RYAN O’DONNELL, Cofounder and CEO, BullEx Digital Safety Your own business: Take the leap, make it happen, and make it succeed! …”
    Libro electrónico
  12. 37832
    Publicado 2017
    “…El lector podrá encontrar información esencial del estado de la cuestión de la educación multidisciplinar contemporánea ilustrado desde diferentes facetas de la educación para la igualdad de género: sociales, lingüísticas, literarias, artístico-ambientales, tecnológicas y científicas…”
    Libro electrónico
  13. 37833
    Publicado 2021
    “…Processing and storage can cause changes and interactions in food components that have effects on nutritional value, organoleptic characteristics or even food safety. This book includes 19 research works showing important and interesting advances, as well as new approaches, in this research topic. …”
    Libro electrónico
  14. 37834
    Publicado 2010
    “…Covers all exam objectives, including how to: Work with CPUs, RAM, motherboards, power supplies, and other PC components Install, partition, and format hard drives Install, upgrade, and troubleshoot WIndows 2000, Windows XP, and Windows Vista Troubleshoot PCs and implement security measures Install video and multimedia cards Work with portable PCs, PDAs, smartphones, and wireless technologies Manage printers and connect to networks and the Internet Understand safety and environmental issues Establish good communication skills and adhere to privacy policies The CD-ROM features: Practice exams for 701 & 702 600+ chapter review questions New video introduction to CompTIA A+ One-hour video training segment Mike's favorite PC tools and utilities Searchable e-book Mike Meyers , CompTIA A+, CompTIA Network+, MCP, is the industry's leading authority on CompTIA A+ certification and training. …”
    Libro electrónico
  15. 37835
    por McNavage, Terry
    Publicado 2010
    “…Then in the last two chapters, you'll leave the safety of Firebug and hand-code an uber cool JavaScript application in your preferred text editor. …”
    Libro electrónico
  16. 37836
    Publicado 2011
    “…Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authentication technologies See how real-world session attacks leak sensitive data and how to fortify your applications Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments Safety deploy XML, social networking, cloud computing, and Web 2.0 services Defend against RIA, Ajax, UGC, and browser-based, client-side exploits Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures…”
    Libro electrónico
  17. 37837
    Publicado 2018
    Tabla de Contenidos: “…11 The Realization of Nanotechnology -- 11.1 Nanospeci cation -- 11.2 Standardization of Nanotechnology -- 11.3 Nanometrology -- 11.4 The Nanometrology Instrument Industry -- References -- Further Reading -- 12 The Business Environment -- 12.1 The Universality of Nanotechnology -- 12.2 The Radical Nature of Nanotechnology -- 12.3 Intellectual Needs -- 12.4 Company-University Collaboration -- 12.5 Clusters -- 12.6 Assessing Demand for Nanotechnology -- 12.6.1 Modeling -- 12.6.2 Judging Innovation Value -- 12.6.3 Anticipating Bene t -- 12.7 Technical and Commercial Readiness (Availability) Levels -- 12.8 Predicting Development Timescales -- 12.9 Patents -- 12.10 Generic Business Models -- 12.11 Why Nanotechnology Companies Often Fail -- References -- Further Reading -- 13 The Fiscal Environment of Nanotechnology -- 13.1 Sources of Funds -- 13.2 Private Investment -- 13.3 Government Funding -- 13.4 Endogenous Funding -- 13.5 Geographical Differences Between Nanotechnology Funding -- References -- Further Reading -- 14 The Safety of Nanofacture and Nanomaterials -- 14.1 Public Perception of the Safety of Nanoproducts -- 14.2 Evaluating Risk -- 14.3 Evaluating the Toxicity of Nanomaterials -- 14.4 Characteristic Features of Nano-Objects -- 14.5 Exposure -- 14.5.1 Occupational Exposure (During Nanofacture) -- 14.5.2 Public Exposure (During Use) -- 14.6 Penetrability and clearance -- 14.7 Hazard -- 14.8 Variability of Individual Response -- 14.9 Risks to Vital Ecosystems -- 14.10 "Natural" Exposure to Nanoparticles -- 14.11 A Rational Basis for Safety Measures -- 14.12 Bow Tie Diagrams -- References -- Further Reading -- 15 Regulation -- References -- Further Reading -- 16 Some Successful and Unsuccessful Nanotechnology Companies -- 16.1 NanoMagnetics -- 16.2 MesoPhotonics -- 16.3 Enact Pharma -- 16.4 Oxonica -- 16.5 NanoCo -- 16.6 Hyperion -- 16.7 CDT…”
    Libro electrónico
  18. 37838
    Publicado 2021
    “…The authors of The Phoenix Encounter Method don’t advise safety. In fact, their method of leadership thinking requires you to imagine burning your business to the ground—throwing yourself into a firestorm change—and turning the upheaval to your organization’s advantage. …”
    Libro electrónico
  19. 37839
    Publicado 2013
    “…And Arc Attack member Craig Newswanger shows us how to build the awesome Six-Pack Tesla Coil, made with a beer-bottle capacitor, that’ll throw 15” electrical arcs. Other fun, and 100% safety-approved projects include: How to make a phonograph out of Lego bricks A light-up hoodie from Electroluminescent (EL) wire An impressive "high-gain" home media projection screen using little more than latex house paint and sandblasting glass All this, along with the latest developments in maker tech--hardware, software and tools for 3D printing, Arduino, Raspberry Pi, robotics--and much, much more…”
    Libro electrónico
  20. 37840
    Publicado 2018
    Tabla de Contenidos: “…; Case study: hindsight and shooting down an airliner; Safety reporting and honest disclosure; Case study: a nurse's error became a crime; The criminalization of human error; Case study: industry responses to criminalization; What is the right thing to do?…”
    Libro electrónico