Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,213
- Usos y costumbres 2,908
- Bible 1,923
- Bíblia 1,278
- Historia 1,198
- RELIGION 1,015
- Crítica e interpretación 421
- Criticism, interpretation, etc 373
- History 272
- Història 269
- Crítica, interpretación, etc 257
- Comentarios 229
- Engineering & Applied Sciences 228
- Crítica, interpretació, etc 211
- crítica e interpretación 205
- Descripción y viajes 194
- Religion 184
- Business & Economics 176
- Doble imposición 172
- Theology 155
- Computer Science 147
- Application software 146
- Transportation 143
- Computer networks 142
- Development 141
- Operating systems (Computers) 127
- Web sites 126
- Design 121
- Historia y crítica 120
- Transport 116
-
28261Publicado 2010Tabla de Contenidos: “…Cover -- Title -- Contents -- Introduction -- WOMEN'S FASHIONS -- Cowl-neck shirt with cap and low-waist pants -- Tank top and leggings -- Bubble skirt with straps -- Tank top and bubble skirt -- Rolled up cotton overalls -- Top and baggy pants -- T-shirt dress with leggings -- Tank top and harem pants -- Checked shirt, pashmina, and leggings -- Miniskirt and short sleeve shirt -- Shirt and draped skirt -- Batwing-sleeve jacket with wide-leg jeans -- Hooded sweatshirt with leggings -- Zip-up jacket with puff sleeves and tracksuit pants -- Tank top, vest, and baggy pants -- Cotton sweater and classic pants -- Hooded blouse with stand-up collar and ruched pants -- Shorts and jacket with bell sleeves -- Checked shirt with denim vest and leggings -- Top, long cotton vest, and wide-leg pants -- Strapless jumpsuit with jacket/cape -- Turtleneck sweater with batwing sleeves -- Hooded sweatshirt and tracksuit pants -- Strap dress with knitted vest, stockings, and knee-high boots -- Turtleneck sweater and wide-leg pants -- Shirt, miniskirt, and elastic belt -- Turtleneck sweater, tuxedo vest, and baggy pants -- Sweater and jeans with wide belt -- Hooded windbreaker and leggings -- T-shirt, jeans, and thigh-high boots -- Fringed draped dress -- Strapless dress with sash belt -- Shirt dress with short vest -- Minidress with leather vest -- Boatneck dress with padded shoulders and belt -- Sleeveless minidress with stand-up collar -- Dress with ruffled sleeves and sash belt -- Draped strap dress -- Dress with puff sleeves and wide belt -- Minidress with leg of mutton sleeves -- Turtleneck minidress -- Dress with low neckline and belt -- Beach dress -- V-neck dress and sash belt -- Minidress worn with long scarf -- Silk empire dress -- Strapless baggy jumpsuit -- Minidress with three-quarter sleeves and Mao collar -- Long V-neck jumpsuit and pashmina…”
Libro electrónico -
28262Publicado 2020Tabla de Contenidos: “…3.2.3 Der Tester im Sicherheitslebenszyklus -- 3.2.4 Gliederung der Norm -- 3.2.5 Kritikalitätsabstufungen des ASIL -- 3.2.6 Auswahl der Testmethoden -- 3.3 AUTOSAR -- 3.3.1 Ziele -- 3.3.2 Entwicklungsmethodik -- 3.3.3 Logische Systemarchitektur -- 3.3.4 Technische Systemarchitektur -- 3.3.5 Steuergeräte-Softwarearchitektur -- 3.3.6 Generierung der Steuergerätesoftware -- 3.3.7 Einfluss auf den Test -- 3.3.7.1 Softwarekomponententest -- 3.3.7.2 Softwareintegrationstest und Softwaretest -- 3.3.7.3 Steuergeräteintegrationstest und Steuergerätetest -- 3.3.7.4 Systemintegrationstest -- 3.4 Gegenüberstellung der Standards -- 3.4.1 Zielsetzung -- 3.4.2 Teststufen -- 3.4.3 Testverfahren und Testansätze -- 4 Virtuelle Testumgebungen -- 4.1 Grundlagen -- 4.1.1 Testobjekt -- 4.1.2 Testrahmen -- 4.1.3 Systemsteuerung -- 4.2 Arten von Testumgebungen -- 4.2.1 Model-in-the-Loop-Testumgebung (MiL) -- Aufbau -- Einsatz -- 4.2.2 Software-in-the-Loop-Testumgebung (SiL) -- Aufbau -- Einsatz -- 4.2.3 Hardware-in-the-Loop-Testumgebung (HiL) -- Aufbau -- Einsatz -- 4.3 Auswahl und Einsatz der Testumgebungen -- Stärken und Schwächen -- Testziele -- Teststufen -- 5 Testansätze und Testverfahren -- 5.1 Testansätze -- 5.1.1 Anforderungsbasiertes Testen -- 5.1.2 Erfahrungsbasiertes Testen -- 5.1.3 Risikobasiertes Testen -- 5.1.4 Modellbasiertes Testen -- 5.2 Statische Testverfahren -- 5.2.1 Statische Analyseverfahren -- Syntaxanalyse -- Datenflussanalyse -- Kontrollflussanalyse -- Komplexitätsanalyse -- 5.2.2 Reviewverfahren -- 5.2.2.1 Review der Testbasis -- 5.2.2.2 Qualitätsmerkmale von Anforderungen -- Abgegrenzt -- Atomar -- Eindeutig -- Konsistent -- Verfolgbar -- Verifizierbar -- Vollständig -- Weitere Qualitätsmerkmale -- 5.2.2.3 Reviewcheckliste für Anforderungen -- 5.2.3 MISRA-C-Programmierrichtlinien -- Nachteile der Programmiersprache C.…”
Libro electrónico -
28263Publicado 2023Tabla de Contenidos:Libro electrónico
-
28264Publicado 2012Tabla de Contenidos: “…An Introduction to BASH -- Job Control -- Environment Variables -- Printing Environment Variables -- Setting Environment Variables -- Unsetting Environment Variables -- Pipes -- Redirection -- Command-Line Shortcuts -- Filename Expansion -- Environment Variables as Parameters -- Multiple Commands -- Backticks -- Documentation Tools -- The man Command -- The texinfo System -- Files, File Types, File Ownership, and File Permissions -- Normal Files -- Directories -- Hard Links -- Symbolic Links -- Block Devices -- Character Devices -- Named Pipes -- Listing Files: ls -- Change Ownership: chown -- Change Group: chgrp -- Change Mode: chmod -- File Management and Manipulation -- Copy Files: cp -- Move Files: mv -- Link Files: ln -- Find a File: find -- File Compression: gzip -- bzip2 -- Create a Directory: mkdir -- Remove a Directory: rmdir -- Show Present Working Directory: pwd -- Tape Archive: tar -- Concatenate Files: cat -- Display a File One Screen at a Time: more -- Disk Utilization: du -- Show the Directory Location of a File: which -- Locate a Command: whereis -- Disk Free: df -- Synchronize Disks: sync -- Moving a User and Its Home Directory -- List Processes: ps -- Show an Interactive List of Processes: top -- Send a Signal to a Process: kill -- Signals -- Security Issues -- Examples Using the kill Command -- Miscellaneous Tools -- Show System Name: uname -- Who Is Logged In: who -- A Variation on who: w -- Switch User: su -- Editors -- vi -- emacs -- joe -- pico -- Summary -- Chapter 6: Booting and Shutting Down -- Boot Loaders -- GRUB Legacy -- Stage 1 -- Stage 2 -- Conventions Used in GRUB -- Installing GRUB -- Backing Up the MBR -- Installing GRUB Legacy from the GRUB Shell -- USB GRUB Legacy Boot Disk -- Installing GRUB Legacy on the MBR Using a USB GRUB Legacy Disk -- Configuring GRUB Legacy -- Adding a New Kernel to Boot with GRUB Legacy…”
Libro electrónico -
28265Publicado 2024Tabla de Contenidos: “…-- DAW Hardware -- The Desktop Computer -- The Laptop Computer -- System Interconnectivity -- USB -- Thunderbolt -- FireWire -- Audio over Ethernet -- The Audio Interface -- Audio Driver Protocols -- Latency -- Need Additional I/O? …”
Libro electrónico -
28266Publicado 2024Tabla de Contenidos: “…-- Why use pseudocode? -- Why use flowcharting? -- When to use one over the other? …”
Libro electrónico -
28267Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Virtually Everything for Everyone -- What is virtual reality to you? …”
Libro electrónico -
28268Publicado 2012Tabla de Contenidos: “…Using LEDs, LCDs and GLCDs in Microcontroller Projects; Contents; Preface; Acknowledgements; 1 Introduction to Microcontrollers and Display Systems; 1.1 Microcontrollers and Microprocessors; 1.2 Evolution of the Microcontroller; 1.3 Parts of a Microcontroller; 1.3.1 Address; 1.3.2 ALU; 1.3.3 Analogue Comparator; 1.3.4 Analogue-to-Digital Converter; 1.3.5 Brown-out Detector; 1.3.6 Bus; 1.3.7 CAN; 1.3.8 CISC; 1.3.9 Clock; 1.3.10 CPU; 1.3.11 EEPROM; 1.3.12 EPROM; 1.3.13 Ethernet; 1.3.14 Flash Memory; 1.3.15 Harvard Architecture; 1.3.16 Idle Mode; 1.3.17 Interrupts; 1.3.18 LCD Drivers…”
Libro electrónico -
28269CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Cybersecurity -- Chapter 1 What Exactly Is Cybersecurity? …”
Libro electrónico -
28270Publicado 2022Tabla de Contenidos: “…Contents at a Glance Introduction. 1 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work. 7 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work. 19 Chapter 3: Applying the Science Behind Human Behavior and Risk Management. 33 Part 2: Building a Security Awareness Program. 51 Chapter 4: Creating a Security Awareness Strategy. 53 Chapter 5: Determining Culture and Business Drivers. 61 Chapter 6: Choosing What to Tell The Users. 75 Chapter 7: Choosing the Best Tools for the Job 89 Chapter 8: Measuring Performance. 107 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program. 121 Chapter 10: Running Your Security Awareness Program 143 Chapter 11: Implementing Gamification 165 Chapter 12: Running Phishing Simulation Campaigns. 181 Part 4: The Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Chapter 15: Ten Fundamental Awareness Topics. 221 Chapter 16: Ten Helpful Security Awareness Resources. 227 Appendix: Sample Questionnaire 233 Index. 253 Table of Contents Introduction 1 About This Book. 1 Foolish Assumptions. 2 Icons Used in This Book. 3 Beyond the Book. 3 Where to Go from Here. 4 Part 1: Getting to Know Security Awareness. 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness. 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss. 10 Knowing How Security Awareness Programs Work. 11 Establishing and measuring goals. 12 Showing users how to "do things right". 14 Recognizing the Role of Awareness within a Security Program. 15 Disputing the Myth of the Human Firewall. 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work. 19 Making a Case Beyond Compliance Standards. 20 Treating Compliance as a Must. 21 Motivating users to take action. 22 Working within the compliance budget. 22 Limiting the Popular Awareness Theories. 23 Applying psychology to a diverse user base. 23 Differentiating between marketing and awareness. 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work. 27 Making Perfection the Stated Goal. 28 Measuring from the Start. 29 Prioritizing Program Over Product. 29 Choosing Substance Over Style. 30 Understanding the Role of Security Awareness. 31 Table of Contents Chapter 3: Applying the Science Behind Human Behavior and Risk Management. 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science. 35 Recognizing incidents as system failures. 36 Responding to incidents. 37 Applying Accounting Practices to Security Awareness. 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology. 40 The ABCs of behavioral science. 41 The Fogg Behavior Model. 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve. 44 Remembering That It's All About Risk. 45 Optimizing risk. 46 The risk formula. 46 Part 2: Building a Security Awareness Program. 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program. 54 Choosing effective communications tools. 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All. 58 Chapter 5: Determining Culture and Business Drivers. 61 Understanding Your Organization's Culture. 62 Determining security culture. 64 Recognizing how culture relates to business drivers. 65 Identifying Subcultures. 65 Interviewing Stakeholders. 67 Requesting stakeholder interviews. 67 Scheduling the interviews 70 Creating interview content. 70 Taking names. 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users. 75 Basing Topics on Business Drivers. 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right". 77 Common Topics Covered in Security Awareness Programs. 79 Security Awareness For Dummies Phishing 79 Social engineering. 80 Texting and instant messaging security. 80 Physical security. 81 Malware 81 Ransomware 81 Password security. 82 Cloud security 82 USB device security. 82 Internet of Things 83 Travel security. 83 Wi-Fi security 84 Mobile devices. 84 Work from home. 84 Basic computer security. 85 Insider threat. 85 Protecting children on the internet 85 Social media security 86 Moving security. 86 Compliance topics. 87 Chapter 7: Choosing the Best Tools for the Job. 89 Identifying Security Ambassadors 90 Finding ambassadors. 90 Maintaining an ambassador program. 91 Knowing the Two Types of Communications Tools. 92 Reminding users to take action. 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase. 95 Posters 96 Hardcopy newsletters. 97 Monitor displays 97 Screen savers. 98 Pamphlets. 98 Desk drops. 99 Table tents. 99 Coffee cups or sleeves 99 Stickers. 100 Mouse pads 100 Pens and other useful giveaways. 100 Camera covers. 101 Squishy toys and other fun giveaways. 101 Active communications tools. 101 Table of Contents Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts. 108 Meeting Compliance Requirements. 109 Collecting Engagement Metrics. 111 Attendance metrics. 111 Likability metrics. 112 Knowledge metrics. 112 Measuring Improved Behavior. 113 Tracking the number of incidents. 113 Examining behavior with simulations 114 Tracking behavior with gamification. 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics. 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program. 121 Knowing Your Budget. 122 Finding additional sources for funding 123 Allocating for your musts. 125 Limiting your discretionary budget. 126 Appreciating your team as your most valuable resource. 126 Choosing to Implement One Program or Multiple Programs. 127 Managing multiple programs 128 Beginning with one program. 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy. 131 Ensuring that your message sticks. 133 Distributing topics over three months. 133 Deciding Whether to Include Phishing Simulations. 136 Planning Which Metrics to Collect and When. 137 Considering metrics versus topics 137 Choosing three behavioral metrics. 138 Incorporating Day 0 metrics 138 Scheduling periodic updates. 138 Biasing your metrics. 139 Branding Your Security Awareness Program 139 Creating a theme. 139 Maintaining brand consistency. 140 Coming up with a catchphrase and logo. 140 Promoting your program with a mascot. 140 Security Awareness For Dummies Chapter 10: Running Your Security Awareness Program. 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors. 145 Recognizing the role of general project management. 146 Getting All Required Approvals. 146 Getting the Most from Day 0 Metrics. 147 Creating Meaningful Reports. 149 Presenting reports as a graphical dashboard. 149 Adding index scores. 152 Creating an awareness index. 152 Reevaluating Your Program. 153 Reconsidering your metrics. 154 Evaluating your communications tools 155 Measuring behavioral changes. 156 Redesigning Your Program 157 Anything stand out? …”
Libro electrónico -
28271Publicado 2023Tabla de Contenidos: “…Cover -- Copyright -- Contibutors -- Table of Contents -- Preface -- Section 1: Importing and Organizing -- Chapter 1: Quick Start: An Introduction to FCP -- A brief history of editing -- Interface basics -- Overview -- In the central bar -- In the Browser -- In the Viewer pane -- Other important windows and controls -- Controlling the main window -- The Touch Bar -- An editing workflow overview -- Terminology -- Workflow -- Part 1: Importing and Organizing -- Part 2: Rough Cut to Fine Cut -- Part 3: Finishing and Exporting -- Hardware recommendations -- A Mac -- Active media storage -- Backup storage -- Displays -- Audio -- Media card reader -- Miscellaneous USB gear -- Anything else? …”
Libro electrónico -
28272Publicado 2023Tabla de Contenidos: “…KDE Plasma general keyboard shortcuts -- GNOME edition and settings -- The other editions - Cinnamon, Lxde, Mate, and so on -- Summary -- Chapter 4: Help, Online Resources, Forums, and Updates -- Help -- Troubleshooting -- Online resources -- The news -- The forum - the greatest collection of knowledge -- Notices -- Introduce Yourself -- Non-technical Questions -- Support -- ARM -- Announcements -- Manjaro Development -- Contributions -- Languages -- Feedback -- The Rolling Release Development Model -- Updates -- Summary -- Part 2: Daily Usage -- Chapter 5: Officially Supported Software - Part 1 -- Pamac - the Add/Remove SW GUI application -- The Flatpak, Snap, and AppImage containers -- For advanced users -- AUR -- The Manjaro repositories -- Office tools, calendars, and mail clients -- Mail clients with calendars -- Office -- Browsers -- Test results -- Photo, video, image, and graphics -- Photo/images -- Graphics -- Summary -- Chapter 6: Officially Supported Software Part 2, 3D Games, and Windows SW -- Music and audio -- Classic audio players -- Streaming players -- Audio editors and DAWs -- Music servers -- Teams, Zoom, Viber, Spotify, WhatsApp, Signal, and Telegram -- A note regarding Signal, Telegram, and WhatsApp -- Text editors -- Lightweight/simple editors -- Sophisticated editors -- IDEs -- Terminal editors -- Recommendations -- Drivers, tools, and simple games -- Drivers on Manjaro Linux -- NVIDIA, open source, and other hardware drivers -- Screenshot tools -- Virtual machines -- Education and Science -- For video and/or audio conversion -- Others -- Simple Games -- Advanced 2D/3D game support on Linux -- Game controller support and further points -- For advanced users -- Creating application shortcuts, and converting .deb and .rpm packages -- Converting .deb and .rpm packages -- How to use Windows software on Linux…”
Libro electrónico -
28273Publicado 2024Tabla de Contenidos: “…-- A better definition -- Using C# and .NET in systems programming -- Higher-level languages for systems programming -- Kernel mode and user mode -- Why use .NET? …”
Libro electrónico -
28274por Huidobro, José ManuelTabla de Contenidos: “…SD y HD -- 1.10 LA TELEVISIÓN DIGITAL -- 1.10.1 La televisión digital terrestre -- 1.10.1.1 El sintonizador digital TDT -- 2 MEDIOS DE TRANSMISIÓN -- 2.1 MEDIOS DE TRANSMISIÓN -- 2.2 EL PAR DE COBRE -- 2.2.1 Interferencia entre pares -- 2.2.1.1 Agrupación en mazos de cables -- 2.2.2 Bobinas híbridas -- 2.2.3 Ancho de banda y velocidad de transmisión -- 2.2.4 ADSL (...) -- 2.3 EL CABLE COAXIAL -- 2.4 LA FIBRA ÓPTICA -- 2.4.1 Características de las fibras ópticas…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
28275por Munagavalasa, SriniTabla de Contenidos: “…Intro -- Title Page -- Copyright and Credits -- Contributors -- About the reviewers -- Table of Contents -- Preface -- Part 1: Planning and Analysis - BRD/Prioritized Product Backlog -- Chapter 1: Identifying Requirements -- The role of business analysis in identifying requirement sources -- Types of requirements -- Securing support from the project sponsor -- Common sources where you can identify business requirements -- Document analysis -- Identify key stakeholders -- Navigate the organization -- Current system usage -- Identify the key end user -- Needs decomposition -- Get a system walkthrough -- Active participation -- Existing systems -- Note-taking -- Assumptions -- Meeting minutes -- Real-life scenarios with examples -- Scenario 1 -- Scenario 2 -- Scenario 3 -- Practical tips for success -- Summary -- Questions -- Further reading -- Chapter 2: Elicitation and Document Requirements -- Elicitation planning -- Elicitation tasks -- Requirement elicitation techniques -- Observation -- Brainstorming -- Surveys -- Interviews / focus groups -- Conference room pilots / requirements workshops -- Prototyping -- Process models -- User stories -- Requirement documentation -- The art of elicitation -- Practical tips for success -- Summary -- Questions -- Further reading -- Chapter 3: Prioritizing Requirements -- The importance of requirement prioritization -- Reviewing prioritization techniques -- MoSCoW analysis -- Story mapping -- Dependency map between requirements -- Managing prioritization meetings -- Practical tips for success -- Simple CRM requirement prioritization and roadmap scenario -- Summary -- Questions -- Further reading -- Chapter 4: Process Flows - "As-Is" versus "To-Be" -- Reviewing the process flow -- Process flow types -- Understanding and capturing the current state "as-is" -- Current state swim lane process flow diagram…”
Publicado 2022
Libro electrónico -
28276Publicado 2018Tabla de Contenidos: “…Solutions 130 Chapter 35: Opportunity Assessment Technique 131 Chapter 36: Customer Letter Technique 133 Chapter 37: Startup Canvas Technique 135 Breakout: The Biggest Risk 136 Discovery Planning Techniques 138 Chapter 38: Story Map Technique 139 Chapter 39: Customer Discovery Program Technique 141 Breakout: Defining Product/Market Fit 147 Chapter 40: Profile: Martina Lauchengco of Microsoft 148 Discovery Ideation Techniques 150 Chapter 41: Customer Interviews 151 Chapter 42: Concierge Test Technique 153 Chapter 43: The Power of Customer Misbehavior Technique 154 Breakout: The Power of Developer Misbehavior 156 Chapter 44: Hack Days 157 Discovery Prototyping Techniques 158 Chapter 45: Principles of Prototypes 160 Chapter 46: Feasibility Prototype Technique 161 Chapter 47: User Prototype Technique 163 Chapter 48: Live-Data Prototype Technique 165 Chapter 49: Hybrid Prototype Technique 167 Discovery Testing Techniques 168 Chapter 50: Testing Usability 169 Chapter 51: Testing Value 174 Chapter 52: Demand Testing Techniques 176 Breakout: Discovery Testing in Risk-Averse Companies 178 Chapter 53: Qualitative Value Testing Techniques 180 Chapter 54: Quantitative Value Testing Techniques 183 Breakout: The Role of Analytics 185 Breakout: Flying Blind 188 Chapter 55: Testing Feasibility 190 Breakout: Discovery for Hardware Products 192 Chapter 56: Testing Business Viability 193 Breakout: User Test vs. …”
Libro electrónico -
28277Publicado 2012Tabla de Contenidos: “…Intro -- Table des matières -- Signes conventionnels et abréviations -- Tableaux par pays -- Australie -- Tableau 1.a. …”
Libro electrónico -
28278por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Intro -- Avant-propos -- Table des matières -- Éditorial -- Quels sont les autres enseignements de cette étude ? …”
Publicado 2013
Libro electrónico -
28279Publicado 2021Tabla de Contenidos: “…Delays -- Finite-State Machine -- Working with Loops -- Communicating Digitally -- Communicating with Analog Components -- Serial Communication -- SerialEvent -- Using Arduino Libraries -- TinyGPS++ -- Putting Together the Arduino Language Basics -- Summary -- Chapter 3: Modeling with Fusion 360 -- Installing and Setting Up Fusion 360 -- Download Fusion 360 -- Installation Procedures for Fusion 360 -- Getting to Know Fusion 360 -- Fusion 360's User Interface -- Fusion 360 Sketch Tools -- Fusion 360 3D Tools -- Fusion 360 Tools -- Importing Files -- Your First 3D Model in Fusion 360 -- Creating a Sketch -- Using the Extrude Function -- Parametric Modeling in Fusion 360 -- Summary -- Chapter 4: 3D Printing -- What Is 3D Printing -- Types of 3D Printers -- Tools of the Trade -- Parts of a 3D Printer -- What Is a Slicer -- Different Slicing Programs -- Simplify3D -- The Main Screen -- Common Settings -- Troubleshooting -- Over/Under Extrusion -- Ghosting -- Parts Do Not Stay on Build Plate -- Our First Print -- Summary -- Exercise -- Chapter 5: PCB Design -- What Is a PCB -- PCB Design Software -- Eagle -- Eagle's Main Windows -- Loading a Library -- Creating a Schematic -- Laying Out a PCB…”
Libro electrónico -
28280por Henao Robledo, FernandoTabla de Contenidos:
Publicado 2011Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico