Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 453
- History 424
- Development 371
- Economics 297
- Application software 283
- Education 278
- Social aspects 255
- Historia 220
- Computer programs 214
- Engineering & Applied Sciences 209
- Cloud computing 206
- Data processing 200
- Computer networks 183
- Artificial intelligence 174
- Economic aspects 147
- Computer Science 139
- Information technology 134
- Security measures 134
- Technological innovations 133
- Database management 132
- Computer security 130
- Government policy 129
- Economic conditions 128
- Social Issues/Migration/Health 125
- Leadership 120
- Research 116
- Computer software 115
- Business & Economics 109
- Design 109
- Social conditions 109
-
10421Publicado 2023Tabla de Contenidos: “…Intersection of cybersecurity with other disciplines -- Tool management -- Planning -- Acquisition and integration of supplier components -- Supplier capability assessment and the role of the CSIA -- The concept phase -- Item-level concept -- Cybersecurity concept -- Implications to component-level development -- Design and implementation -- Post-development requirements -- Configuration and calibration -- Weakness analysis -- Unit implementation -- Verification testing -- Validation testing -- Product release -- Cybersecurity case -- Cybersecurity assessment -- Production planning -- Operations and maintenance -- Monitoring -- Vulnerability analysis -- Vulnerability management -- Updates -- End of life -- Summary -- Chapter 6: Interactions Between Functional Safety and Cybersecurity -- A tale of two standards -- A unified versus integrated approach -- Establishing a foundational understanding of functional safety and cybersecurity -- Understanding the unique aspects and interdependencies between the two domains -- Differences between safety and security scope -- Differences in the level of interdependence between safety and security requirements -- Conflict resolution -- Extending the safety and quality supporting processes -- Planning -- Supplier management -- Concept -- Design -- Implementation -- Testing and validation -- Release -- Production -- End of life -- Creating synergies in the concept phase -- Item functions -- Item boundaries and operational environments -- Damage scenarios and hazards -- Safety and security goals -- Safety and security requirements -- Finding synergies and conflicts in the design phase -- Leveraging safety and security mechanisms -- Self-tests across safety and security -- Leveraging error detection safety mechanisms -- Eliminating inconsistencies in the error response -- Parallels in design principles…”
Libro electrónico -
10422Publicado 2024Tabla de Contenidos: “…Chapter 10: Using Evasion Techniques -- Technical requirements -- Obfuscation techniques in APIs -- Control flow obfuscation -- Code splitting -- Dead code injection -- Resource bloat -- Injection techniques for evasion -- Parameter pollution -- Null byte injection -- Using encoding and encryption to evade detection -- Encoding -- Encryption -- Defensive considerations -- Steganography in APIs -- Advanced use cases and tools -- Defensive considerations -- Polymorphism in APIs -- Characteristics of polymorphism -- Tools -- Defensive considerations -- Detection and prevention of evasion techniques in APIs -- Comprehensive logging and monitoring -- Behavioral analysis -- Signature-based detection -- Dynamic signature generation -- Machine learning and artificial intelligence -- Human-centric practices for enhanced security -- Summary -- Further reading -- Part 4: API Security for Technical Management Professionals -- Chapter 11: Best Practices for Secure API Design and Implementation -- Technical requirements -- Relevance of secure API design and implementation -- Designing secure APIs -- Threat modeling -- Implementing secure APIs -- Tools -- Secure API maintenance -- Tools -- Summary -- Further reading -- Chapter 12: Challenges and Considerations for API Security in Large Enterprises -- Technical requirements -- Managing security across diverse API landscapes -- Balancing security and usability -- Challenges -- Protecting legacy APIs -- Using API gateways -- Implementing web application firewalls (WAFs) -- Regular security audits -- Regularly updating and patching -- Monitoring and logging activity -- Encrypting data -- Developing secure APIs for third-party integration -- Security monitoring and IR for APIs -- Security monitoring -- IR -- Summary -- Further reading -- Chapter 13: Implementing Effective API Governance and Risk Management Initiatives…”
Libro electrónico -
10423Publicado 2021“…React Hooks are targeted JavaScript functions that let you reuse and share functionality across components. Use them to split components into smaller functions, manage state and side effects, and access React features without classes-- all without having to rearrange your component hierarchy. …”
Libro electrónico -
10424Publicado 2021Tabla de Contenidos: “…8.7 Conclusion -- References -- Chapter 9: Harnessing Artificial Intelligence for Secure ECG Analytics at the Edge for Cardiac Arrhythmia Classification -- 9.1 Introduction -- 9.2 Literature Review -- 9.3 Dataset Preparation -- 9.4 Methodology -- 9.4.1 ECG Pre-processing Phase -- 9.4.2 Heartbeat Segmentation Phase -- 9.4.3 Feature Extraction Phase -- 9.4.4 Learning/Classification Phase -- 9.5 Experimental Setups, Results and Discussion -- 9.5.1 Performance Indicators -- 9.5.2 Results for Experimental Setup 1 -- 9.5.3 Results for Experimental Setup 2 -- 9.6 Conclusion -- References -- Chapter 10: On Securing Electronic Healthcare Records Using Hyperledger Fabric Across the Network Edge -- 10.1 Introduction -- 10.2 Existing Decentralized Security Methods: Can Blockchain Be Used At the Edge? …”
Libro electrónico -
10425Publicado 2022Tabla de Contenidos: “…2.2 Electromagnetic Field Distribution Across a Microstrip Line -- 2.3 Effective Relative Permittivity, εr,eff MSTRIP -- 2.4 Microstrip Design Graphs and CAD Software -- 2.5 Operating Frequency Limitations -- 2.6 Skin Depth -- 2.7 Examples of Microstrip Components -- 2.7.1 Branch‐Line Coupler -- 2.7.2 Quarter‐Wave Transformer -- 2.7.3 Wilkinson Power Divider -- 2.8 Microstrip Coupled‐Line Structures -- 2.8.1 Analysis of Microstrip Coupled Lines -- 2.8.2 Microstrip Directional Couplers -- 2.8.2.1 Design of Microstrip Directional Couplers -- 2.8.2.2 Directivity of Microstrip Directional Couplers -- 2.8.2.3 Improvements to Microstrip Directional Couplers -- 2.8.3 Examples of Other Common Microstrip Coupled‐Line Structures -- 2.8.3.1 Microstrip DC Break -- 2.8.3.2 Edge‐Coupled Microstrip Band‐Pass Filter -- 2.8.3.3 Lange Coupler -- 2.9 Summary -- 2.10 Supplementary Problems -- References -- Chapter 3 Fabrication Processes for RF and Microwave Circuits -- 3.1 Introduction -- 3.2 Review of Essential Material Parameters -- 3.2.1 Dielectrics -- 3.2.2 Conductors -- 3.3 Requirements for RF Circuit Materials -- 3.4 Fabrication of Planar High‐Frequency Circuits -- 3.4.1 Etched Circuits -- 3.4.2 Thick‐Film Circuits (Direct Screen Printed) -- 3.4.3 Thick Film Circuits (Using Photoimageable Materials) -- 3.4.4 Low‐Temperature Co‐Fired Ceramic Circuits -- 3.5 Use of Ink Jet Technology -- 3.6 Characterization of Materials for RF and Microwave Circuits -- 3.6.1 Measurement of Dielectric Loss and Dielectric Constant -- 3.6.1.1 Cavity Resonators -- 3.6.1.2 Dielectric Characterization by Cavity Perturbation -- 3.6.1.3 Use of the Split Post Dielectric Resonator (SPDR) -- 3.6.1.4 Open Resonator -- 3.6.1.5 Free‐Space Transmission Measurements -- 3.6.2 Measurement of Planar Line Properties -- 3.6.2.1 The Microstrip Resonant Ring -- 3.6.2.2 Non‐resonant Lines…”
Libro electrónico -
10426por J.K. Lasser Institute“…In the newest edition of this celebrated series, you'll find: Special features on how to interpret recent IRS rulings and Tax Court decisions Pointers for how to file properly and optimum tax planning strategies to help you save money New information about the American Rescue Plan Act (ARPA) and the Consolidated Appropriations Act, 2021 (CAA) Trusted by Americans across the country for over seventy-five years, J.K. …”
Publicado 2022
Libro electrónico -
10427por Hajnsek, Irena“…As a consequence, the wider distribution of polarimetric data sets across the remote sensing community boosted activity and development in polarimetric SAR applications, also in view of future missions. …”
Publicado 2021
Libro electrónico -
10428Publicado 2019“…The latter is based on the extensive deployment of Cyber-Physical Production Systems (CPPS) and Industrial Internet of Things (IIoT) technologies in the manufacturing shopfloor, as well as on the seamless and timely exchange of digital information across supply chain participants. The benefits of Industry 4.0 have been already proven in the scope of pilot and production deployments in a number of different use cases including flexibility in automation, predictive maintenance, zero defect manufacturing and more. …”
Libro electrónico -
10429Publicado 2016“…An overarching narrative is that optimizing the energy system simultaneously across different objectives may be impossible, i.e., lowest cost, least environmental impact, minimal downtime, regional supply. …”
Libro electrónico -
10430Publicado 2016“…Shared Memory Application Programming presents the key concepts and applications of parallel programming, in an accessible and engaging style applicable to developers across many domains. Multithreaded programming is today a core technology, at the basis of all software development projects in any branch of applied computer science. …”
Libro electrónico -
10431Publicado 2022Tabla de Contenidos: “…9.5.1 Findings: Vehicle Detection Across Multiple Images -- 9.5.2 Findings: Vehicle Detection Performance on an MP4 File -- 9.5.3 Findings: Vehicle Detection on Livestream Camera -- 9.5.4 Findings: Iteration 3 -- 9.5.5 Addressing the Research Questions -- 9.5.6 Assessment of Suitability -- 9.5.7 Future Improvements -- 9.6 Conclusion -- References -- Chapter 10 A Review on Applications of the Standard Series IEC 61850 in Smart Grid Applications -- 10.1 Introduction -- 10.2 Overview of IEC 61850 Standards -- 10.3 IEC 61850 Protocols and Substandards -- 10.3.1 IEC 61850 Standards and Classifications -- 10.3.2 Basics of IEC 61850 Architecture Model -- 10.3.3 IEC 61850 Class Model -- 10.3.4 IEC 61850 Logical Interfaces (Functional Hierarchy of IEC 61850) -- 10.4 IEC 61850 Features -- 10.4.1 MMS -- 10.4.2 GOOSE -- 10.4.3 Sampled Measured Value (SMV) or SV -- 10.4.4 R‐GOOSE and R‐SV -- 10.4.4.1 Application in Transmission Systems -- 10.4.4.2 Application in Distribution Systems -- 10.4.5 Web Services -- 10.5 Relevant Application -- 10.5.1 Substation Automation System (SAS) -- 10.5.2 Energy Management System (EMS) -- 10.5.3 Distribution Management System (DMS) -- 10.5.3.1 Feeder Balancing and Loss Minimization Distribution -- 10.5.3.2 Voltage/VAR Optimization (VVO) and Conservation Voltage Reduction -- 10.5.3.3 Fault Location, Isolation, and Service Restoration -- 10.5.4 Distribution Automation (DA) -- 10.5.4.1 Voltage/VAR Control -- 10.5.4.2 Fault Detection and Isolation -- 10.5.4.3 Service Restoration Use Case -- 10.5.5 Distributed Generation and Demand Response Management (Distributed Energy Resource [DER]) -- 10.5.5.1 Storage -- 10.5.5.2 Solar Panels -- 10.5.5.3 Wind Farm -- 10.5.5.4 Virtual Power Plant (VPP) -- 10.5.6 Advanced Metering Infrastructure (AMI) -- 10.5.7 Electric Vehicle (EV)…”
Libro electrónico -
10432por Abualigah, Laith“…Metaheuristic Optimization Algorithms: Optimizers, Analysis, and Applications presents the most recent optimization algorithms and their applications across a wide range of scientific and engineering research fields. …”
Publicado 2024
Libro electrónico -
10433Publicado 2024Tabla de Contenidos: “…The smartness of edge across artificial intelligence with the IoT -- 4.2.1. …”
Libro electrónico -
10434por Dubois, FlorenceTabla de Contenidos: “…Merge in place: Working with metadata tables -- Creating metadata tables -- DDL for creation of ZMCODDB -- DDL for creation of ZMCOD_STOGROUP -- DDL for creation of ZMCOD_DATABASE -- DDL for creation of ZMCOD_TABLESPACE -- DDL for creation of ZMCOD_TABLES -- DDL for creation of ZMCOD_INDEXES -- Populating metadata tables -- SETUPSTG -- SETUPDB -- SETUPTS -- SETUPTAB -- SETUPIX -- JCL to run the population REXX procedures -- Moving metadata tables across systems -- JCL to unload metadata tables on the source system -- JCL to load metadata tables into the target system -- JCL to reset copy pending status on tablespaces -- Working with metadata tables -- DUPLICDB -- JCL to run the duplicate resolution REXX procedure -- Updating metadata tables -- POSTDDL -- POSTDDL2 -- JCL used to run the update REXX procedures -- Appendix C. …”
Publicado 2003
Libro electrónico -
10435Publicado 2010Tabla de Contenidos: “…Discount Factors -- 2.1.1. Discount Factors across Maturities -- 2.1.2. Discount Factors over Time -- 2.2. …”
Libro electrónico -
10436Publicado 2012“…This book has been class-tested and tuned to the requirements of undergraduate computer engineering courses across universities in India…”
Libro electrónico -
10437por Gavin, LeeTabla de Contenidos: “…Adapter development -- 1.1 Technical assessment -- 1.2 Getting started with the development -- 1.2.1 Understanding the application -- 1.2.2 Identifying the directionality of the connector -- 1.2.3 Identifying the application-specific business objects -- 1.2.4 Investigating the application data interaction interface -- 1.2.5 Investigating the event management and notification mechanism -- 1.2.6 Investigating communication across operating systems -- 1.3 Getting started with the development project -- Chapter 2. …”
Publicado 2005
Libro electrónico -
10438por Peterson, David L.Tabla de Contenidos: “…7.4.2 Risk Communication -- 7.5 Key Findings -- 7.6 Key Information Needs -- 7.6.1 Understudied Health Effects -- 7.6.2 Health Benefits and Trade-Offs of Public Health Interventions -- 7.6.3 Economic Impacts -- 7.6.4 Central Repository of Standards and Actions -- 7.7 Conclusions -- References -- 8 Resource Manager Perspectives on the Need for Smoke Science -- 8.1 Introduction -- 8.2 Managing Wildland Fire to Improve Ecosystem Conditions While Minimizing Smoke Impacts -- 8.2.1 Smoke Concerns and Barriers to Prescribed Fire -- 8.2.2 Applying Prescribed Fire Across Large Landscapes -- 8.2.3 Utilizing Wildfires and Natural Ignitions -- 8.2.4 Implications of Wildfire Response Actions and Suppression for Air Quality -- 8.2.5 Alternatives to Burning-Evaluating Emissions Reduction -- 8.2.6 Effects of Fuel Moisture on Emissions and Dispersion -- 8.2.7 Fuel Type, Fuel Loading, and Fuel Consumption -- 8.2.8 Techniques for Minimizing Smoke Impacts -- 8.2.9 Components of Wildland Fire Smoke -- 8.2.10 Soils and Emissions -- 8.2.11 Remote Sensing and Data for Fuels, Fire, and Smoke -- 8.2.12 Prescribed Fire Tracking Data -- 8.2.13 Fire Emissions and the National Emissions Inventory -- 8.3 Wildland Fire and Smoke Decision Tools -- 8.3.1 Multiple Fires and Airshed Analysis -- 8.3.2 Fire Growth Models and Smoke Dispersion -- 8.3.3 Background Air Quality Conditions -- 8.3.4 Smoke Models for Fire Planning -- 8.3.5 Use of Air Quality Measurements -- 8.3.6 Air Quality Impacts of Prescribed Fire Versus Wildfire -- 8.3.7 Smoke Model Performance and Accuracy -- 8.3.8 Long-Range Forecasts and Projections for Planning and Early Warning -- 8.3.9 Tools and Data Needs for the Future -- 8.3.10 Identifying Areas at High Risk from Wildfire and Smoke -- 8.4 Health, Safety, and Societal Impacts of Smoke -- 8.4.1 What is a Smoke-Affected Day?…”
Publicado 2022
Libro electrónico -
10439Publicado 2023“…The chapters herein cover scientific advancements across a diversified spectrum that includes differential as well as integral equations with applications, computational fluid dynamics, nanofluids, network theory and optimization, control theory, machine learning and artificial intelligence, big data analytics, Internet of Things, cryptography, fuzzy automata, statistics, and many more. …”
Libro electrónico -
10440Publicado 2023“…The chapters herein cover scientific advancements across a diversified spectrum that includes differential as well as integral equations with applications, computational fluid dynamics, nanofluids, network theory and optimization, control theory, machine learning and artificial intelligence, big data analytics, Internet of Things, cryptography, fuzzy automata, statistics, and many more. …”
Libro electrónico