Mostrando 10,861 - 10,880 Resultados de 14,733 Para Buscar 'Tranent~', tiempo de consulta: 1.61s Limitar resultados
  1. 10861
    por Hébert, Fred, 1988-
    Publicado 2013
    Tabla de Contenidos: “…-- Generic Finite-State Machines -- The init Function -- The StateName Function -- The handle_event Function -- The handle_sync_event Function -- The code_change and terminate Functions -- A Trading System Specification -- Show Me Your Moves -- Defining the State Diagrams and Transitions -- Game Trading Between Two Players -- The Public Interface -- FSM-to-FSM Functions -- The gen_fsm Callbacks -- That Was Really Something -- Fit for the Real World? …”
    Libro electrónico
  2. 10862
    Publicado 2011
    Tabla de Contenidos: “…Quiz -- Types of Trust Relationships -- Transitive Trusts -- Forest Trusts -- External Trusts and Realm Trusts -- Shortcut Trusts -- Creating and Configuring Trust Relationships -- Creating a Forest Trust Relationship -- Creating External Trust Relationships -- Creating Realm Trust Relationships -- Creating Shortcut Trust Relationships -- Managing Trust Relationships -- Validating Trust Relationships -- Authentication Scope -- SID Filtering -- Removing a Cross-forest Trust Relationship -- Review All the Key Topics -- Complete the Tables and Lists from Memory -- Definitions of Key Terms -- Chapter 11 Creating and Applying Group Policy Objects -- "Do I Know This Already?" …”
    Libro electrónico
  3. 10863
    por Pohit, Goutam
    Publicado 2004
    Tabla de Contenidos: “…Flexible Coupling -- Pintype Flexible Coupling -- Oldham Flexible Coupling -- Universal Coupling or Hooke's Joint -- Clutches -- Positive Contact Clutches -- Gradual Engagement Clutches -- Exercise -- Chapter 12: Pipe Joints -- Threaded Joint -- Flanged Joint -- Spigot and Socket Joint -- Expansion Joint -- Union Joint -- Pipe Drawings -- Pipe Fittings -- Types of Pipe Drawings -- Single line Drawings -- Double Line Drawings -- Dimensioning Pipe Drawings -- Pipe Drawings Using AutoCAD -- Pipe Drawing in 3-D -- Exercise -- Chapter 13: Valves -- Cocks -- Flap Valve -- Stop Valve -- Feed Check Valve -- Safety Valve -- Dead Weight Safety Valve -- Lever Safety Valve -- Spring Loaded Safety Valve -- Exercise -- Chapter 14: Gears -- Spur Gears -- Spur Gear Nomenclature -- Gear Tooth Profile -- Pressure Angle -- Involute Tooth Profile -- Base Circle -- Line of Action -- Construction of Involute Gear with AutoCAD -- Gear Pair in Mesh -- Effect of Change of Center Distance -- Development of Gear Pair in Solid Model -- Rack and Pinion -- Rack and Pinion in Solid Model -- Annular Gear and Pinion -- Bevel Gear -- Exercise -- Chapter 15: Production Drawing -- AutoCAD and Production Drawing -- Geometric Tolerances -- Implementation of Geometric Tolerances -- Positioning of Feature Control Frame -- Datum Flags -- Dimensional Tolerances -- Selection of Tolerance -- Representation of Dimensional Tolerance in Drawing -- Implementation of Dimensional Tolerances in AutoCAD -- Fits -- Clearance Fit -- Interference Fit -- Transition Fit -- Hole Basis and Shaft Basis System -- Representation of Fits in Drawing -- General Tolerance for Linear and Angular Dimensions -- Surface Roughness -- Symbols Indicating Surface Texture in Technical Drawings -- Exercise -- Chapter 16: Miscellaneous Machine Components -- Bearings -- Sliding Bearings -- Thrust Bearings…”
    Libro electrónico
  4. 10864
    Publicado 2021
    Tabla de Contenidos: “…-- In Touch with Data and Research: Money in a Prisoner-of-War Camp -- The Functions of Money -- In Touch with Data and Research: Monetary Aggregates in the United Kingdom -- In Touch with Data and Research: The Effect of Dollarization on the United States and Other Nations -- 7.2 Portfolio Allocation and the Demand for Assets -- Expected Return -- Risk -- Liquidity -- Time to Maturity -- Types of Assets and Their Characteristics -- In Touch with Data and Research: The Housing Crisis of 2007 to 2011 -- Asset Demands -- 7.3 The Demand for Money -- The Price Level -- Real Income -- Interest Rates -- The Money Demand Function -- Other Factors Affecting Money Demand -- Application Bitcoin and Cryptocurrencies -- Velocity and the Quantity Theory of Money -- 7.4 Asset Market Equilibrium -- Asset Market Equilibrium: an Aggregation Assumption -- The Asset Market Equilibrium Condition -- 7.5 Money Growth and Inflation -- Application Money Growth and Inflation in European Countries in Transition -- The Inflation Rate and the Nominal Interest Rate -- Application Inflation Expectations and Linkers -- Part 3 Business Cycles and Macroeconomic Policy -- Chapter 8 Business Cycles -- 8.1 What Is a Business Cycle? …”
    Libro electrónico
  5. 10865
    Cybersecurity
    Cybersecurity For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning…”
    Libro electrónico
  6. 10866
    Publicado 2022
    Tabla de Contenidos: “…Security monitoring and audit trails using Azure Monitor -- Best practices for using Azure Monitor -- Security monitoring and approval process using Customer Lockbox -- Best practices for using Customer Lockbox -- Security monitoring and audit trail using Google Cloud Logging -- Security monitoring using Google Security Command Center -- Security monitoring and approval process using Access Transparency and Access Approval -- Conducting threat detection and response -- Using Amazon Detective for threat detection -- Using Amazon GuardDuty for threat detection -- Security monitoring using Microsoft Defender for Cloud -- Using Azure Sentinel for threat detection -- Using Azure Defender for threat detection -- Using Google Security Command Center for threat detection and prevention -- Conducting incident response and digital forensics -- Conducting incident response in AWS -- Conducting incident response in Azure -- Conducting incident response in Google Cloud Platform -- Summary -- Chapter 7: Applying Encryption in Cloud Services -- Technical requirements -- Introduction to encryption -- Symmetric encryption -- Asymmetric encryption -- Best practices for deploying KMSes -- AWS Key Management Service (KMS) -- AWS CloudHSM -- Azure Key Vault -- Azure Dedicated/Managed HSM -- Google Cloud Key Management Service (KMS) -- Best practices for deploying secrets management services -- AWS Secrets Manager -- Google Secret Manager -- Best practices for using encryption in transit -- IPSec -- Transport Layer Security (TLS) -- Best practices for using encryption at rest -- Object storage encryption -- Block storage encryption -- Full database encryption -- Row-level security -- Encryption in use -- AWS Nitro Enclaves -- Azure Confidential Computing -- Google Confidential Computing -- Summary -- Section 3: Threats and Compliance Management…”
    Libro electrónico
  7. 10867
    por Oehmer-Pedrazzi, Franziska
    Publicado 2022
    Tabla de Contenidos: “…Content Analysis in the Research Field of Political Coverage -- 1 Introduction -- 2 Trends in the Field -- 3 Common Research Designs and Results -- 4 Political News Content -- 5 Effects of Political (News) Content -- 6 Limitations of the Method &amp -- Future Direction of the Field -- References -- Content Analysis in the Research Field of Transnational Public Spheres -- 1 Introduction -- 2 Research Designs -- 3 Main Constructs -- 4 Desiderata -- References -- Content Analysis in the Research Field of Election (Campaign) Coverage -- 1 Introduction -- 2 Frequent Research Designs -- 3 Main Constructs -- 4 Research Desiderata -- References -- Content Analysis in the Research Field of War Coverage -- 1 Introduction -- 2 Theoretical Approaches and Frequent Research Questions in Content Analyses on War Coverage -- 3 Common Research Designs and Combinations of Methods -- 4 Main Results for Relevant Variables and Constructs in War Coverage -- 5 Research Desiderata -- References -- Content Analysis in the Research Field of Terrorism Coverage -- 1 Introduction -- 2 Common Research Designs and Combinations of Methods -- 3 Main Constructs -- 4 Research Desiderata -- References -- Die Inhaltsanalyse im Forschungsfeld der Justiz- und Kriminalitätsberichterstattung -- 1 Einleitung -- 2 Trends inhaltanalytischer Studien zur Justizberichterstattung -- 3 Zentrale Konstrukte inhaltanalytischer Studien zur Justizberichterstattung -- 3.1 Wissen über Justiz &amp -- Stil der Berichterstattung -- 3.2 Merkmale der berichteten Gerichtsprozesse. -- 3.3 Darstellung der Prozessbeteiligten -- 4 Forschungsdesiderata -- Literatur -- Content Analysis in the Research Field of Economic News Coverage -- 1 Introduction -- 2 Frequent Research Designs and Combination of Methods -- 3 Constructs and Main Results -- 4 Research Desiderata -- References…”
    Libro electrónico
  8. 10868
    Publicado 2023
    Tabla de Contenidos: “…-- Pillars of modern data architecture on AWS -- Analytics case studies on AWS -- Case study - data analytics -- Case study - big data and data lake -- Summary -- Part 3: Security and Networking Transformation -- Chapter 10: Transforming Security on the Cloud Using AWS -- Understanding the security implications of digital transformation -- Introducing security on the cloud -- Data security -- Identity and access management (IAM) -- Compliance -- Governance -- Shared responsibility model -- Top cloud security considerations -- Architecting secure workloads on the cloud with AWS -- Building a threat model -- Identity and access management using AWS -- Understanding the concept behind IAM -- Features -- Business use cases -- Fraud and anomaly detection using AWS -- AWS Security Hub -- Amazon GuardDuty -- Network and application protection on AWS -- AWS services for host-level protection -- Data protection using AWS -- Data classification -- Protecting data at rest -- Protecting data in transit -- Summary -- Chapter 11: Transforming Networking on the Cloud Using AWS -- Introduction to networking on the cloud…”
    Libro electrónico
  9. 10869
    Publicado 2023
    Tabla de Contenidos: “…Choice of Demand Forecasting Unit -- Product Transitions -- Product Segmentation for Forecasting -- Summary -- 9 The Role of Inventory -- Components of Inventory -- Managing Inventories -- An Inventory Management Example -- Cycle Stock and Safety Stock -- Calculating Safety Stock -- Variability in Demand -- Seasonality -- Variability in Lead Time -- Combined Variability -- Cycle Service Level and Fill Rate -- Safety Stock and Lot Size Impact -- Summary -- 10 Typical Scheduling Process Steps -- The Planning and Scheduling Process -- Exception Management -- Preparing to Plan -- Creating the Production Plan -- Creating the Detailed Schedule -- Communicating the Plan -- The Packing Line Schedule -- ERP and Shop Floor Systems -- The Mixing Schedule -- The Spice and Liquid Prep Rooms -- Preparing for Tomorrow -- The Detailed Scheduling Process -- Scheduling the Constraint -- Manual Scheduling -- Just-in-Time Scheduling -- Repetitive Sequence Scheduling -- KPI-Based Algorithms and Solvers -- Resources -- Evaluating and Adjusting the Schedule -- Releasing Firm or Committed Orders -- 11 Multi-Level Scheduling -- Product Mix and Moving Bottlenecks -- Types of Scheduling Problems -- Degrees of Freedom between Levels -- Impact of the Constraint's Location -- More Than Two Levels -- Batch and Lot Size Restrictions -- Distribution Rules -- Logical Relationships between Levels -- Linking between activities -- The Multi-Level Scheduling Process -- Scheduling with Inventory Constraints between Levels -- 12 Tanks, Bins, and Flow Paths -- Tank and Bin Scheduling -- Tank Scheduling Example -- Specific Flow Paths -- Converging Flows -- Diverging Flows -- Before and after APS Implementation -- Simplifying the Complex -- 13 The Role of ERP Systems in Planning and Scheduling -- Assumption of Infinite Capacity -- Daily Time Resolution -- Assumption of Independence…”
    Libro electrónico
  10. 10870
    Publicado 2023
    Tabla de Contenidos: “…-- Fit for Purpose -- As a Transition to a Full Agile Approach -- What Are the Benefits of a Hybrid Agile Approach? …”
    Libro electrónico
  11. 10871
    por Nikolova, Lolita
    Publicado 2017
    Tabla de Contenidos: “…-- 4.9 The Radiocarbon Dating of the Human Bones Found with the Tablets -- 4.10 The Enigma of the Charred Human Being, the Cultic Sacrifice and the Cannibalistic Ritual -- 4.11 The Puzzle of the Corpse's Identity -- 4.11.1 Sex and Age -- 4.11.2 The Height -- 4.11.3 The Anthropological Type -- 4.11.4 Paleopathologic Aspects -- 4.11.5 The Posture -- 4.12 We are not Dealing with a Ritual Pit and a Votive Deposit but with a Consecrated Grave of a Nov -- 4.13 Milady Tărtăria and her Casket with Magic Tools -- 4.14 Transylvanian Tablets and the Sacred Script for Initiates -- 4.15 Conclusions -- Bibliography -- 5 About the Prehistoric Burial Rites, Rituals and Anthropological Data in Dobroudja (Eneolithic-Iron -- 5.1 Introduction -- 5.2 Archaeological Data -- 5.2.1 Early Eneolithic Period -- 5.2.1.1 Hamangia Culture -- 5.2.2 The Transitional Period to the Bronze Age and the Bronze Age -- 5.2.2.1 Cernavodă III -- 5.2.2.2 The Tumular Burials -- 5.2.3 Early Iron Age (Hallstatt Period) -- 5.2.3.1 Babadag Culture -- 5.3 Conclusions -- Bibliography -- 6 A Copper Age Workshop for Gold at Cheile Turzii, Peştera Ungurească (Turda Canyon, Hungarian Cave) -- 6.1 Location -- 6.2 Short History -- 6.3 Stratigraphy -- 6.4 The Horizon with "Pastilatte Handles Pottery"/Scheibenhenckel-Late Bodrogkeresztúr -- 6.5 The Construction…”
    Libro electrónico
  12. 10872
    Publicado 2018
    Tabla de Contenidos: “…Sci. 2018, 8, 231, doi: 10.3390/app8020231 -- Haifei Zhu, Shichao Gu, Li He, Yisheng Guan and Hong Zhang Transition Analysis and Its Application to Global Path Determination for a Biped Climbing Robot Reprinted from: Appl. …”
    Libro electrónico
  13. 10873
    Publicado 2020
    Tabla de Contenidos: “…El caso peruano en el contexto de las nuevas formas de familia / María-Pía Guadalupe Díaz Díaz -- Aspectos taxonómicos y subsecuentes problemas del reconocimiento, en otro estado de la unión europea, de matrimonios entre personas del mismo sexo y uniones registradas entre personas del mismo sexo y del sexo opuesto / Roberto Garetto -- «Unioni registrate» e convivenze di fatto allaluce del regolamento ue n. 2016/1104 e della legge n. 76/2016 / Riccardo Mazzariol -- Comunión de bienes y rechazo de co-compra enel derecho de familia italiano y español / Francesco Longobucco -- La protección jurídica del menor a propósitode la seguridad esperable en el consumo, con una especial referencia al ordenamiento jurídico chileno / Erika Isler Soto -- Transnational divorces and "public policy" / Marco Rizzuti -- L'evoluzione europea del diritto di famiglia: l'ordine pubblico nei regolamenti (eu) 1103/2016e 1104/2016 / Giovanni Russo…”
    Libro electrónico
  14. 10874
    por Tyson, Eric
    Publicado 2024
    Tabla de Contenidos: “…Chapter 6 Figuring Out How Much the Business is Worth -- Exploring Valuation Methods: Multiple of Earnings and Book Value -- Getting a Professional Appraisal -- Tracking Businesses You've Explored That Have Sold -- Tapping the Knowledge of Advisors Who Work with Similar Companies -- Consulting Research Firms and Publications -- Turning to Trade Publications -- Enlisting the Services of a Business Broker -- Chapter 7 Financing Your Deal -- Outsourcing Financing -- Taking advantage of seller financing -- Banking on banks -- Getting money from nonbanks -- The Small Business Administration (SBA) -- Small Business Investment Companies (SBICs) -- Certified Development Companies (CDCs) -- Your state's Economic Development Department -- Angels: Investors with heart -- Venture capital -- Crowdfunding -- Minority funding resources -- Financing Yourself: Bootstrapping -- Chapter 8 Preparing a Purchase Offer -- Writing a Letter of Intent or an Indication of Interest (IOI) -- Drafting an Indication of Interest (IOI) -- Writing a Letter of Intent (LOI) -- Developing Purchase Offer Contingencies -- Allocating the Purchase Price -- Doing More Due Diligence -- Think about income statement issues -- Consider legal and tax concerns -- Part 4 Managing a Smooth Transition -- Chapter 9 Moving into Your Business -- Getting Important Things Down on Paper -- Considering the Business Entity -- Sole proprietorships -- Understanding the "solo" advantages -- Weighing the disadvantages of operating "solo" -- C corporations -- Getting a handle on liability protection -- Investigating liability insurance -- Understanding corporate taxes -- Examining other incorporation considerations -- Knowing where to get advice -- S corporations -- S corporation tax specifics -- S corporation requirements -- Partnerships -- Limited liability companies (LLCs) -- Gaining Insight from Others…”
    Libro electrónico
  15. 10875
    por Rajendran, Sathiyaraj
    Publicado 2024
    Tabla de Contenidos: “…5.4 Results and Analysis -- 5.5 Conclusion -- References -- Chapter 6 AI-Powered Drones for Healthcare Applications -- 6.1 Introduction -- 6.1.1 Role of Artificial Intelligence in Drone Technology -- 6.1.2 Unmanned Aerial Vehicle-Drone Technology -- 6.2 Kinds of Drones Used by Medical Professionals -- 6.2.1 Multirotor -- 6.2.2 Only One Rotor -- 6.2.3 Permanent-Wing Drones -- 6.2.4 Drones for Passenger Ambulances -- 6.3 Medical and Public Health Surveillance -- 6.3.1 Telemedicine -- 6.3.2 Drones as Medical Transportation Devices -- 6.3.3 Advanced System for First Aid for the Elderly People -- 6.4 Potential Benefits of Drones in the Healthcare Industry -- 6.4.1 Top Medical Drone Delivery Services -- 6.4.2 Limitations of Drones in Healthcare -- 6.4.3 The Influence of COVID on Drones -- 6.4.4 Limitations of Drone Technology in the Healthcare Industry -- 6.4.4.1 Privacy -- 6.4.4.2 Legal Concerns -- 6.4.4.3 Rapid Transit-One of the Biggest Drawbacks of Drones is Time -- 6.4.4.4 Bugs in the Technology -- 6.4.4.5 Dependence on Weather -- 6.4.4.6 Hackable Drone Technology -- 6.5 Conclusion -- References -- Chapter 7 An Approach for Avoiding Collisions with Obstacles in Order to Enable Autonomous Cars to Travel Through Both Static and Moving Environments -- 7.1 Introduction -- 7.1.1 A Brief Overview of Driverless Cars -- 7.1.2 Objectives -- 7.1.3 Possible Uses for a Car Without a Driver -- 7.2 Related Works -- 7.3 Methodology of the Proposed Work -- 7.4 Experimental Results and Analysis -- 7.5 Results and Analysis -- 7.6 Conclusion -- References -- Chapter 8 Drivers' Emotions' Recognition Using Facial Expression from Live Video Clips in Autonomous Vehicles -- 8.1 Introduction -- 8.2 Related Work -- 8.2.1 Face Detection -- 8.2.2 Facial Emotion Recognition -- 8.3 Proposed Method -- 8.3.1 Dataset -- 8.3.2 Preprocessing -- 8.3.3 Grayscale Equalization…”
    Libro electrónico
  16. 10876
    Publicado 2024
    Tabla de Contenidos: “…-- A case study of how DocuSign transitioned from Agile to DevOps -- The genesis of DocuSign -- The transformation to DevOps -- Obstacles encountered by DocuSign's product team -- Summary -- Questions -- Chapter 6: Understanding the Basics of CI/CD -- The ABCs of CI/CD -- What is a CI/CD pipeline? …”
    Libro electrónico
  17. 10877
    Publicado 2024
    Tabla de Contenidos: “…-- The monolithic way -- The microservices way -- Monolithic versus microservices -- Security considerations in microservices architectures -- Complexity paradigm -- Responsibility domain shift -- Lightweight components -- Securing communication between services -- Zero trust principle -- Types of communication -- Data in transit encryption -- Service mesh -- Application programming interfaces (APIs) -- Implementing fine-grained access control -- IAM as the backbone -- Secure end-user authentication -- Decoupling authorizations -- Summary -- Questions -- Answers -- Further reading -- Chapter 7: Implementing Security for Serverless Deployments -- Introduction to serverless security -- What is serverless? …”
    Libro electrónico
  18. 10878
    por Brown, Theodore
    Publicado 2021
    Tabla de Contenidos:
    Libro electrónico
  19. 10879
    por Brown, Theodore
    Publicado 2021
    Tabla de Contenidos:
    Libro electrónico
  20. 10880
    Publicado 2021
    Tabla de Contenidos: “…-- Sorting out equipment -- Taking the Make-or-Buy Decision -- Making it yourself - pros and cons -- Outsourcing - a low investment option -- Setting quality standards -- Choosing a Supplier -- Evaluating trading terms -- Building a relationship -- Buying online -- Minimising Risk and Assessing Liability -- Protecting your employees -- Covering yourself against an employee suing -- Protecting assets -- Covering loss of profits -- Goods in transit -- Protecting yourself -- Guaranteeing goods and services -- Dissecting Directors -- Finding and Choosing Business Advisers -- Tallying up an accountant -- Investing in a bank -- Soliciting for a lawyer -- Managing a consultant -- Taking Cyber Security Seriously -- Recognising common types of cyber crime -- Adopting preventative measures -- Making a Virtue Out of Going Green -- Chapter 13 Keeping Track of Finances -- Keeping the Books -- Recording financial information -- Starting simple with single entry -- Dealing with double entry…”
    Libro electrónico