Mostrando 28,101 - 28,120 Resultados de 31,524 Para Buscar 'USBL~', tiempo de consulta: 0.97s Limitar resultados
  1. 28101
    por Hamstead, Zoé A.
    Publicado 2021
    Tabla de Contenidos: “…5.1.3 Knowledge Systems Analysis -- 5.2 New York City Flood Map Case Study -- 5.3 Discussion and Conclusion -- References -- 6 Positive Futures -- 6.1 Approach -- 6.1.1 A Framework for Positive Futures -- 6.1.2 Development of the UREx SRN Scenarios -- 6.2 Scoping and Framing -- 6.3 Goals and Intervention Strategies -- 6.4 Scenario Specificity -- 6.5 Evaluation and Dissemination -- 6.6 Conclusion -- References -- 7 Setting the Stage for Co-Production -- 7.1 Co-Production to Address Urban Resilience Challenges -- 7.2 Co-Production of Positive Long-Term Visions in the UREx SRN -- 7.3 Elements of Co-Production -- 7.3.1 Process and Outcomes -- 7.3.2 Collective Commitment -- 7.3.3 Credibility and Legitimacy -- 7.3.4 Diversity of Perspectives -- 7.4 Confronting the Challenges of Co-Production -- 7.4.1 Power Dynamics -- 7.4.2 Short-Term Needs and Long-Term Thinking -- 7.4.3 Clear Expectations -- 7.4.4 Inclusivity and Retention -- 7.5 Moving Co-Production Forward -- References -- 8 Assessing Future Resilience, Equity, and Sustainability in Scenario Planning -- 8.1 An Instrument for Assessment -- 8.1.1 Defining Resilience, Equity, Sustainability -- 8.1.2 Qualitative Assessment-How It Works -- 8.2 Comparing Drought and Heat Scenarios -- 8.2.1 Identifying Key Components -- 8.2.2 Assessing Resilience-Building Mechanisms -- 8.2.3 Assessing Sustainability and Equity -- 8.3 Discussion and Conclusion -- References -- 9 Modeling Urban Futures: Data-Driven Scenarios of Climate Change and Vulnerability in Cities -- 9.1 Data-Driven Models of Urban Land Use and Climate Hazards -- 9.2 Land Surface Temperature Projections in Cities -- 9.2.1 Surface Temperature Projections at City Scales: New York City Case Study -- 9.3 Urban Flooding -- 9.4 Modeling Future Land Use/Cover Change Scenarios -- 9.4.1 Land Use/Cover Scenarios Modeling: San Juan, Puerto Rico Case Study…”
    Libro electrónico
  2. 28102
    Publicado 2017
    Tabla de Contenidos: “…. -- Creating a DHCP relay using the Common tenant -- Creating a global DHCP relay -- How it works... -- There's more... -- Utilizing DNS -- How to do it... -- How it works... -- There's more... -- Routing with BGP -- How to do it... -- Configuring a layer-3 outside interface for tenant networks -- How to do it... -- Creating routed interfaces -- Configuring an external SVI -- Configuring routed sub-interfaces -- Associating a bridge domain with an external network -- How to do it... -- Using route reflectors -- How to do it... -- How it works... -- Routing with OSPF -- How to do it... -- Routing with EIGRP -- How to do it... -- Using IPv6 within ACI -- How to do it... -- How it works... -- Setting up multicast for ACI tenants -- How to do it... -- How it works... -- Configuring multicast on the bridge domain and interfaces -- How it works... -- How it works... -- There's more... -- ACI transit routing and route peering…”
    Libro electrónico
  3. 28103
    Publicado 2014
    Tabla de Contenidos: “…EV3-Softwareumgebung - von der Einführung bis zum ersten Programm3.1 Home-Version; 3.2 Hilfefunktion; 3.3 Import von Sensor-Blöcken; 3.4 Programmierumgebung; 3.5 Übersicht; 3.5.1 LEGO® MINDSTORMS EV3-Software; 3.5.2 10 wesentliche Fakten zur Programmierung mit EV3; 3.5.3 Beschreibung eines Programmblocks in EV3 am Beispiel eines Motor-Blocks; 3.5.4 Vom einzelnen Programmblock zum Programm; 3.6 Das erste Programm schreiben (in weniger als fünf Minuten); 3.6.1 Programmname eingeben; 3.6.2 Anbindung des Roboters mit USB, Bluetooth und WLAN…”
    Libro electrónico
  4. 28104
    por Amberg, Eric
    Publicado 2014
    Tabla de Contenidos: “…4.5.9 Eine Übung zum Vertiefen4.6 Man-Pages - Hilfe zur Selbsthilfe; 4.6.1 Die Man-Pages nutzen; 4.6.2 whatis und apropos; 4.6.3 info - die neuen Man-Pages; 4.7 Zusammenfassung und Weiterführendes; Kapitel 5: Einbinden von Dateisystemen; 5.1 mount und umount; 5.2 Die virtuellen Dateisysteme; 5.2.1 udev - Dynamische Geräteverwaltung; 5.2.2 USB-Geräte; 5.3 Die Datei /etc/fstab; 5.4 udev, HAL und D-Bus; 5.5 Zusammenfassung und Weiterführendes; Kapitel 6: Der Linux-Systemstart; 6.1 GRUB - Der Linux-Bootloader; 6.1.1 GRUB 2; 6.1.2 UEFI; 6.1.3 GUID Partition Table (GPT); 6.2 System V versus systemd…”
    Libro electrónico
  5. 28105
    por Gödl, Robert
    Publicado 2022
    Tabla de Contenidos: “…-- 1.2 Ubuntu -- 1.2.1 Die Vorteile von Ubuntu -- Kapitel 2: Ubuntu ausprobieren und installieren -- 2.1 Ubuntu herunterladen -- 2.2 Startmedium erstellen -- 2.2.1 ISOburn - bootfähige DVDs brennen -- 2.2.2 Etcher - bootfähige USB-Sticks erstellen -- 2.3 Den Computer vom Startmedium starten -- 2.4 Ubuntu ausprobieren -- 2.5 Ubuntu installieren -- 2.5.1 Partitionierung der Festplatte -- 2.5.2 Benutzer anlegen und Installation abschließen -- Kapitel 3: Der Desktop -- 3.1 Ubuntu GNOME kennenlernen -- 3.1.1 Das GNOME-Anwendungsmenü -- 3.1.2 Virtuelle Arbeitsflächen -- 3.1.3 Das Benutzermenü -- 3.1.4 Kalender und Benachrichtigungen -- 3.1.5 Das Dock -- 3.1.6 Wichtige Tastenkombinationen -- 3.2 GNOME anpassen -- 3.2.1 Ins Internet mit Ubuntu-GNOME -- 3.2.2 Desktop-Einstellungen -- 3.2.3 Eigene Icons im Dock -- 3.2.4 Mehr Desktop-Einstellungen -- 3.2.5 GNOME Extensions - Erweiterungen -- 3.2.6 Mehr Themes für Ubuntu -- 3.3 Kleine Tipps rund um Ubuntu mit GNOME -- 3.3.1 Clipboard Indicator - bessere Zwischenablage für Ubuntu -- 3.3.2 GSConnect - Ubuntu mit dem Smartphone verbinden -- 3.3.3 Laufwerke - externe Datenträger formatieren und SMART-Werte auslesen -- 3.3.4 Alacarte - eigene Einträge im Anwendungsmenü -- 3.3.5 Der Schnellstarter - der Ausführen-Dialog -- 3.4 Weitere Desktop-Umgebungen -- 3.4.1 KDE Plasma - klassisch und anpassbar -- 3.4.2 XFCE - schlank und schnell -- 3.4.3 Cinnamon - einfach und beliebt bei Windows-Umsteigern -- 3.4.4 Mate - schlank, für GNOME-2-Nutzer…”
    Libro electrónico
  6. 28106
    por Parasram, Shiva V. N.
    Publicado 2023
    Tabla de Contenidos: “…Configuring our WINE installation -- Testing our WINE installation -- Summary -- Part 2: Digital Forensics and Incident Response Fundamentals and Best Practices -- Chapter 6: Understanding File Systems and Storage -- History and types of storage media -- IBM and the history of storage media -- Removable storage media -- Magnetic tape drives -- Floppy disks -- Optical storage media -- Blu-ray Disc -- Flash storage media -- USB ash drives -- Flash memory cards -- Hard disk drives -- Integrated Drive Electronics HDDs -- Serial Advanced Technology Attachment HDDs -- Solid-state drives -- File systems and operating systems -- Microsoft Windows -- Macintosh (macOS) -- Linux -- Data types and states -- Metadata -- Slack space -- Volatile and non-volatile data and the order of volatility -- The importance of RAM, the paging file, and cache in DFIR -- Summary -- Chapter 7: Incident Response, Data Acquisitions, and DFIR Frameworks -- Evidence acquisition procedures -- Incident response and first responders -- Evidence collection and documentation -- Physical acquisition tools -- Live versus post-mortem acquisition -- Order of volatility -- Powered-on versus powered-off device acquisition -- The CoC -- The importance of write blockers -- Data imaging and maintaining evidence integrity -- Message Digest (MD5) hash -- Secure Hashing Algorithm (SHA) -- Data acquisition best practices and DFIR frameworks -- DFIR frameworks -- Summary -- Part 3: Kali Linux Digital Forensics and Incident Response Tools -- Chapter 8: Evidence Acquisition Tools -- Using the fdisk command for partition recognition -- Device identification using the fdisk command -- Creating strong hashes for evidence integrity -- Drive acquisition using DC3DD -- Verifying the hash output of image files -- Erasing a drive using DC3DD -- Drive acquisition using DD -- Drive acquisition using Guymager…”
    Libro electrónico
  7. 28107
    por Bava, J. A.
    Publicado 1995
    Tabla de Contenidos: “….) -- 2-7 CLASIFICACIÓN DE LÍNEAS DE TRANSMISIÓN -- 2-8 MODOS DE PROPAGACIÓN EN COAXILES -- 2-9 CABLES DE RADIOFRECUENCIAS. LÍNEAS (...) -- 2-10 MATERIALES EMPLEADOS EN LA FABRICACIÓN (...) -- 2-11 CRITERIOS PARA LA ELECCIÓN DE CABLES (...) -- 2-1 2 LÍNEAS DE MICROTIRA -- 2-1 3 DISEÑO DE LÍNEAS DE MICROTIRA -- 2-14 CÁLCULO DE MICROTIRAS -- 2-15 MATERIALES IMPRESOS PARA MICROTIRAS -- 2-16 GUÍAS DE ONDAS -- 2-1 7 CONCEPTO ELEMENTAL DE UNA GUÍA DE (...) -- 2-1 8 VENTAJAS DE LA GUÍA DE ONDA -- 2-19 REFLEXIÓN EN UNA SUPERFICIE METÁLICA -- 2-20 UBICACIÓN DE LOS CAMPOS -- 2-21 TRANSMISIÓN EN GUÍAS DE ONDAS -- 2-22 MODOS DE ORDEN SUPERIOR -- 2-23 RANGO DE OPERACIÓN PRÁCTICO -- 2-24 DIMENSIONES DE LA GUÍA -- 2-25 IMPEDANCIA DE LA GUÍA DE ONDA -- 2-26 GUÍA DE ONDA CIRCULAR -- 2-27 CÁLCULO DE GUÍAS DE ONDAS RECTANGULARES -- 2-28 CÁLCULO DE UNA GUÍA CILINDRICA -- 2-29 MATERIALES PARA LAS GUÍAS DE ONDAS -- CAPÍTULO 3. …”
    Libro electrónico
  8. 28108
    Publicado 2017
    Tabla de Contenidos: “…Fold operation on a list -- Filter operation for a linked list -- Append on a linked list -- The flatMap method on a linked list -- The concept of a monad -- Option monad -- Try monad -- Analysis of the complexity of a recursive algorithm -- Performance of functional programming -- Summary -- Chapter 5: Efficient Searching - Binary Search and Sorting -- Search algorithms -- Binary search -- Complexity of the binary search algorithm -- Sorting -- Selection sort -- Complexity of the selection sort algorithm -- Insertion sort -- Complexity of insertion sort -- Bubble sort -- Inversions -- Complexity of the bubble sort algorithm -- A problem with recursive calls -- Tail recursive functions -- Non-tail single recursive functions -- Summary -- Chapter 6: Efficient Sorting - Quicksort and Merge Sort -- Quicksort -- Complexity of quicksort -- Random pivot selection in quicksort -- Merge sort -- The complexity of merge sort -- Avoiding the copying of tempArray -- Complexity of any comparison-based sorting -- The stability of a sorting algorithm -- Summary -- Chapter 7: Concepts of Tree -- A tree data structure -- The traversal of a tree -- The depth-first traversal -- The breadth-first traversal -- The tree abstract data type -- Binary tree -- Types of depth-first traversals -- Non-recursive depth-first search -- Summary -- Chapter 8: More About Search - Search Trees and Hash Tables -- Binary search tree -- Insertion in a binary search tree -- Invariant of a binary search tree -- Deletion of an element from a binary search tree -- Complexity of the binary search tree operations -- Self-balancing binary search tree -- AVL tree -- Complexity of search, insert, and delete in an AVL tree -- Red-black tree -- Insertion -- Deletion -- The worst case of a red-black tree -- Hash tables -- Insertion -- The complexity of insertion -- Search -- Complexity of the search…”
    Libro electrónico
  9. 28109
    Publicado 2017
    Tabla de Contenidos: “…. -- Breadth-first traversal -- Benefits of a binary search tree -- Expression trees -- Parsing a reverse Polish expression -- Balancing trees -- Heaps -- Summary -- Chapter 7: Hashing and Symbol Tables -- Hashing -- Perfect hashing functions -- Hash table -- Putting elements -- Getting elements -- Testing the hash table -- Using [] with the hash table -- Non-string keys -- Growing a hash table -- Open addressing -- Chaining -- Symbol tables -- Summary -- Chapter 8: Graphs and Other Algorithms -- Graphs -- Directed and undirected graphs -- Weighted graphs -- Graph representation -- Adjacency list -- Adjacency matrix -- Graph traversal -- Breadth-first search -- Depth-first search -- Other useful graph methods…”
    Libro electrónico
  10. 28110
    Publicado 2017
    Tabla de Contenidos: “…-- Systemic Risk Drivers -- Why Systemic Risk Must Be Understood, Monitored, and Managed -- Key Points -- Knowledge Check -- Notes -- Chapter 2: How We Got Here: A History of Financial Crises -- Introduction -- Common Drivers of Historical Crises -- Bursting of Asset Bubbles -- Banking Crises -- Sovereign Debt Crisis -- International Contagion -- Key Points -- Knowledge Check -- Notes -- Chapter 3: The Credit Crisis of 2007-2009 -- Introduction -- Planting the Seeds of a Bubble: The Early 2000s -- Wall Street's Role -- The U.S. …”
    Libro electrónico
  11. 28111
    Publicado 2017
    Tabla de Contenidos: “…. -- 7:11 Cyber Criminal's Song -- Chapter 8: Exploits Sit Lonely on the Shelf -- 8:1 Please stand -- now, please be seated -- 8:2 Witches, Warlocks, and Wassenaar -- 8:3 Compiler Bug Backdoors -- 8:4 A Protocol for Leibowitz -- 8:5 Jiggling into a New Attack Vector -- 8:6 Hypervisor Exploit, Five Years Old -- 8:7 Stegosploit -- 8:8 On Error Resume Next -- 8:9 Unbrick My Part -- 8:10 Backdoors up my Sleeve -- 8:11 Naughty Signals -- 8:12 Weird Crypto -- Useful Tables -- Index -- Colophon -- Footnotes -- Introduction -- Chapter 0: A CFP with POC -- Chapter 1: Proceedings of the Society of PoC∥GTFO -- Chapter 2: The Children's Bible Coloring Book of PoC∥GTFO…”
    Libro electrónico
  12. 28112
    Publicado 2013
    Tabla de Contenidos: “…-- Where's the good in bubbles and busts? -- A complex of crises: 1970 to 2009 -- The internet: too early to tell -- What lessons for the future? …”
    Libro electrónico
  13. 28113
    Publicado 2017
    Tabla de Contenidos: “…- A real-world example -- Connecting the dots -- Instantiation code example -- Implementing instantiation -- Creating an initializer method in a Ruby class -- Adding an initializer to a Ruby class -- Working with optional values -- Using named arguments -- Overriding default values -- The working of OOP inheritance -- Overview of private versus public methods -- Private versus public methods -- Private method code example -- The working of polymorphism and usage of super -- So how does polymorphism fit in? …”
    Libro electrónico
  14. 28114
    por Pugh, Steve
    Publicado 2009
    Tabla de Contenidos: “…LI(U)NIX SYSTEM ADMINISTRATION -- Fixing Bad Filenames -- Fixing Bad Filenames -- fixFilename.rb -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- Adding a User -- Adding a User -- addUser.rb -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- Modifying a User -- Modifying a User -- modUser.rb -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- Killing a Stuck Process -- Killing a Stuck Process -- killProcess.rb -- The Code -- Running the Code -- The Results -- How It Works -- Validating Symlinks -- Validating Symlinks -- symlinkCheck.rb -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- 4. …”
    Libro electrónico
  15. 28115
  16. 28116
    por Auriac, Jean
    Publicado 2019
    Electrónico
  17. 28117
  18. 28118
    Publicado 2004
    Tabla de Contenidos:
    Libro electrónico
  19. 28119
    Publicado 2002
    Tabla de Contenidos: “…Overview -- 12.1 Multilingual front-end -- 12.1.1 Multilingual user interface -- 12.1.2 Multilingual main functions -- 12.2 Multilingual Web Services -- Chapter 13. …”
    Libro electrónico
  20. 28120
    Publicado 2016
    Tabla de Contenidos: “…; Die Ubuntu-Versionen; Die Konzeption dieses Buches; Kapitel 1: Ubuntu - zu den Quellen; 1.1 Ubuntu im Internet; 1.2 Ubuntu auf einer DVD-ROM; 1.3 Ubuntu auf einem bootfähigen USB-Stick; Kapitel 2: Ubuntu-Live und vollständige Installation; 2.1 Live-Version oder Festinstallation, allein oder parallel?…”
    Libro electrónico