Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
7241Publicado 2011“…Today's nuclear reactors are safe and highly efficient energy systems that offer electricity and a multitude of co-generation energy products ranging from potable water to heat for industrial applications. …”
Libro electrónico -
7242Publicado 2017“…What You Will Learn Deep dive into the details of the how various operating systems currently implement multithreading Choose the best multithreading APIs when designing a new application Explore the use of mutexes, spin-locks, and other synchronization concepts and see how to safely pass data between threads Understand the level of API support provided by various C++ toolchains Resolve common issues in multithreaded code and recognize common pitfalls using tools such as Memcheck, CacheGrind, DRD, Helgrind, and more Discover the nature of atomic operations and understand how they can be useful in optimizing code Implement a multithreaded application in a distributed computing environment Design a C++-based GPGPU application that employs multithreading In Detail Multithreaded applications execute multiple threads in a single processor environment, allowing developers achieve concurrency. …”
Libro electrónico -
7243Executive's guide to personal securityExecutive's Guide to Personal SecurityExecutive's Guide to Personal SecurityPublicado 2020“…You will learn how to analyze risks, prepare for emergencies, travel safely, and utilize counter-surveillance techniques to enable you to recognize if you are being followed or targeted. …”
Libro electrónico -
7244Publicado 2019“…You’ll begin with basics like creating functions, choosing data types, and binding variables and then move on to more advanced concepts, such as: •Ownership and borrowing, lifetimes, and traits •Using Rust’s memory safety guarantees to build fast, safe programs •Testing, error handling, and effective refactoring •Generics, smart pointers, multithreading, trait objects, and advanced pattern matching •Using Cargo, Rust’s built-in package manager, to build, test, and document your code and manage dependencies •How best to use Rust’s advanced compiler with compiler-led programming techniques You’ll find plenty of code examples throughout the book, as well as three chapters dedicated to building complete projects to test your learning: a number guessing game, a Rust implementation of a command line tool, and a multithreaded server. …”
Libro electrónico -
7245Publicado 2020“…This book includes: A concise account of the invention and modification of the chrysotype process, including early discoveries about gold and colour and the significance of moisture for printing in gold How to set up your workspace for printing, including useful equipment and materials Advice on safe chemical practice A step-by-step guide to creating suitable digital and film negatives Guidance on paper selection and how to successfully coat paper An overview guide to creating a chrysotype print Step-by step directions for creating the chrysotype solutions An explanation of mixing ratios and solution volumes that control contrast An illustrated explanation of the effect of humidity on colour, including split tone colours and ways to control humidity Step-by-step directions on post-exposure hydration to lengthen tonal range and lower contrast Step-by-step tray processing directions Advanced techniques such as handling translucent papers, additional chrysotype formulas and procedures, and alternative developing agents that support longer development, colour formation and remedy problems that affect image quality Troubleshooting chrysotype printing, including advice and photographic examples Illustrated profiles of contemporary artists making chrysotype prints, including their methods and tips Chrysotype serves to inform, encourage and challenge a new generation of alternate process practitioners and a growing chrysotype community, from the newly curious to the experienced professional…”
Libro electrónico -
7246Publicado 2020“…The platform supports business value delivery in agile frameworks such as LeSS, DAD, and SAFe. It also caters to organizations that mix agile with waterfall to support scaled bimodal delivery. …”
Libro electrónico -
7247Publicado 2020“…You’ll not only learn the fundamentals of Solidity but also get to grips with its safe handling and best practices. This course avoids extensive theory by giving you a direct lab entry where you’ll learn by doing. …”
-
7248Publicado 2021“…In End-to-End Web Testing with Cypress, you’ll learn how to use different Cypress tools, including time travel, snapshots, errors, and console output, to write fail-safe and non-flaky tests. You’ll discover techniques for performing test-driven development (TDD) with Cypress and write cross-browser tests for your web applications. …”
Libro electrónico -
7249Publicado 2018“…Creating and implementing an effective online security plan is vital in keeping a business safe, but how can the non-technical business manager participate in such planning without the language and understanding required to do so? …”
-
7250Publicado 2015“…Establish secure authentication and session management processes Implement a robust access control design for multi-tenant web applications Defend against cross-site scripting, cross-site request forgery, and clickjacking Protect sensitive data while it is stored or in transit Prevent SQL injection and other injection attacks Ensure safe file I/O and upload Use effective logging, error handling, and intrusion detection methods Follow a comprehensive secure software development lifecycle "In this book, Jim Manico and August Detlefsen tackle security education from a technical perspective and bring their wealth of industry knowledge and experience to application designers. …”
Libro electrónico -
7251por Fiore, Frank“…Or maybe a financial consulting firm to help people safely invest their money? Or even an indulgent day-spa? …”
Publicado 2005
Libro electrónico -
7252Publicado 2024“…When we let FOPO take control, we play it safe and small because we're afraid of what will happen on the other side of critique. …”
Grabación no musical -
7253Publicado 2019“…Development of green nanotechnology is generating the interest of researchers towards the synthesis of eco-friendly, safe, non-toxic applications, which can be used for manufacture at a large scale. …”
Libro electrónico -
7254Publicado 2007“…This document was written to assist z/VM support and security personnel in providing the enterprise with a safe, secure and manageable environment. This IBM℗ʼ Redbooks℗ʼ publication provides an overview of security and integrity provided by z/VM and the processes for the implementation and configuration of z/VM Security Server, z/VM LDAP Server, IBM Tivoli℗ʼ Directory Server for z/OS℗ʼ, and Linux℗ʼ on System z with PAM for LDAP authentication. …”
Libro electrónico -
7255por Grimes, Roger A.“…Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. …”
Publicado 2024
Libro electrónico -
7256Publicado 2024“…Learn Rust in a Month of Lunches teaches you to write super fast and super safe Rust code through lessons you can fit in your lunch break. …”
Grabación no musical -
7257Publicado 2021“…But their search for a safe haven had only just begun. Hideous violence stalked them in the camps, where death loomed constantly. …”
Libro -
7258Publicado 2023“…Vera doesn’t know what comes over her, but after calling the cops like any good citizen would, she sort of . . . swipes the flash drive from the body and tucks it safely into the pocket of her apron. Why? Because Vera is sure she would do a better job than the police possibly could, because nobody sniffs out a wrongdoing quite like a suspicious Chinese mother with time on her hands. …”
Libro -
7259Publicado 2020Tabla de Contenidos: “…6.3.2 Priority Control 100 -- 6.4 Public Safety Standardization 100 -- 6.5 Flawless Mobile Broadband for Public Safety and Security 101 -- 6.6 Applications in Different Scenarios 102 -- 6.7 Public Safety Systems and Architectures 103 -- 6.7.1 Airwave 103 -- 6.7.2 LMR 104 -- 6.7.3 TETRA Security Analysis 105 -- 6.7.4 TETRA Services System 106 -- 6.7.5 The Architecture of TETRA 106 -- 6.7.5.1 The Interfaces of TETRA Network 106 -- 6.7.6 TETRA Network Components 106 -- 6.7.6.1 The Mobile Station 108 -- 6.7.6.2 TETRA Line Station 108 -- 6.7.6.3 The Switching Management Infrastructure 108 -- 6.7.6.4 Network Management Unit 108 -- 6.7.6.5 The Gateways 108 -- 6.7.6.6 How the TETRA System Operates 108 -- 6.7.7 TETRA Mobility Management 109 -- 6.7.8 The Security of TETRA Networks 109 -- 6.7.8.1 Confidentiality 109 -- 6.7.8.2 Integrity 109 -- 6.7.8.3 Reliability 109 -- 6.7.8.4 Non-repudiation 109 -- 6.7.8.5 Authentication 110 -- 6.7.9 The Process of Authentication in TETRA 110 -- 6.7.10 The Authentication Key 110 -- 6.7.11 Symmetric Key Algorithms 110 -- 6.7.12 The Process of Authentication Key Generation 111 -- 6.7.12.1 ESN (In United Kingdom) 111 -- 6.8 Emergency Services Network (ESN) in the United Kingdom 112 -- 6.8.1 Overview of the ESN 112 -- 6.8.2 The Deliverables of ESN 112 -- 6.8.3 The Main Deliverables of ESN 112 -- 6.9 SafeNet in South Korea 113 -- 6.10 FirstNet (in USA) 115 -- 6.10.1 The Benefits of FirstNet 117 -- 6.10.2 Public Safety Core of SafetyNet 117 -- 6.10.2.1 End-to-End Encryption 117 -- 6.10.3 Round the Clock Security Surveillance 118 -- 6.10.4 User Authentication 118 -- 6.10.5 Mission Critical Functionalities 118 -- 6.10.5.1 Tactical LTE Coverage 118 -- 6.11 Canadian Interoperability Technology Interest Group (CITIG) 118 -- 6.12 Centre for Disaster Management and Public Safety (CDMPS) at the University of Melbourne 119 -- 6.13 European Emergency Number Association (EENA) 120 -- 6.13.1 European Standardization Organization (ESO) 121 -- 6.13.2 Public Safety Communications ́ô Europe (PSCE) 121.…”
Libro electrónico -
7260Publicado 2020“….,1986), Escala de Bienestar Psicológico de Ryff (Ryff, 1989), Taxonomía de los Cinco Grandes en español (Iraegui, 1998), Escala de Afrontamiento del Estrés (CAE) (Sandín y Chorot, 2002), Escala de Resiliencia (Wagnild y Young, 1993). …”
Clic para texto completo. Acceso restringido UPSA.
Tesis