intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Core technologies

Xem 1-20 trên 252 kết quả Core technologies
  • Industrial Revolution 4.0 with core elements of artificial intelligence, internet connection and big data has been opening up many methods and providing many means in digital transformation of the economy. in general and the commercial banking system in particular; In particular, Blockchain technology has become the foundation for the development of UPAS L/C in international payments.

    pdf10p leminhvu111 07-06-2024 1 0   Download

  • Welcome to the second book from RSA Press, RSA Security’s Official Guide to Cryptography! As the Internet becomes a more pervasive part of daily life, the need for e-security becomes even more critical. Any organization engaged in online activity must assess and manage the e-security risks associated with this activity. Effective use of cryptographic techniques is at the core of many of these risk-management strategies.

    pdf449p zizaybay1103 29-05-2024 3 2   Download

  • Established for more than 75 years, Ebook The Washington manual of medical therapeutics, 36th edition, provides concise, high-yield content that reflects today’s fast-changing advances in medical technology and therapeutics. In one convenient, portable resource, you’ll find complete coverage of every area of medicine and the core subspecialties—all at your fingertips for quick review and reference. Discover why housestaff and faculty worldwide depend on this best-selling resource for day-to-day clinical practice in internal medicine.

    pdf3623p vimeyers 29-05-2024 4 2   Download

  • Ebook "Organic sonochemistry: Challenges and perspectives for the 21st century" provides informative, useful, and stimulating reading on the topic of organic sonochemistry – the core of ultrasound-based applications. Given the increasing interest in new and improved technologies, allied to their green and sustainable character (not always a valid premise), there is a great attraction for organic chemists to apply these protocols in synthesis and process chemistry.

    pdf130p tracanhphuonghoa1007 22-04-2024 7 3   Download

  • In this paper, the static and dynamic behaviour of sandwich beams with porous core are numerically analyzed and validated by experimental tests. The beam consists of a thick porous core with a uniform porosity distribution over its domain and two outer face layers.

    pdf16p viohoyo 25-04-2024 3 2   Download

  • Ebook "The web application hackers handbook - Discovering and exploiting security flaws" includes content: Web application (In)security, core defense mechanisms, web application technologies, mapping the application, bypassing client side controls, attacking authentication, attacking session management, attacking access controls, injecting code, exploiting path traversal,... and other contents.

    pdf771p longtimenosee08 31-03-2024 3 1   Download

  • The Cisco Systems series of certifications provide you with a means of validating your expertise in certain core areas of study to current or prospective employers and to your peers. More network professionals are pursuing the Cisco Certified Security Professional (CCSP) certification because network security has become a critical element in the overall security plan of 21st-century businesses. This book is designed to help you attain this prestigious certification.

    pdf584p longtimenosee08 31-03-2024 4 1   Download

  • Performance is a key indicator for the survival of any business. Organizational culture must have strong liaison with the goals of organizations because it has direct association with organizational performance. Therefore, the core objective of this study was to investigate the influence of supply chain cultural capabilities on the performance of Thai SMEs with the mediation role of supply chain technology adoption. To achieve the objective of this study, the data was collected from the managers of SMEs by using survey questioner approach.

    pdf10p longtimenosee04 06-03-2024 3 2   Download

  • Ebook Building service provider networks: Part 1 includes content: Chapter 1 what is the problem to be solved?; chapter 2 the service provider landscape; chapter 3 services, service level agreements, and delivering service; chapter 4: translating service definitions to technical requirements: policies; chapter 5 administration, addressing, and naming; chapter 6 carrier facilities: getting physical; chapter 7 the provider edge: layer 1, layer 2, and the PSTN; chapter 8 transporting the bits: the sub-ip and physical intraprovider core.

    pdf335p longtimenosee03 22-02-2024 6 2   Download

  • Ebook Building service provider networks: Part 2 includes content: Chapter 9 basic BGP and the customer side of exterior routing; chapter 10 subscriber to provider, and subscriber to subscriber edge: ip; chapter 11 the intraprovider core: IP/MPLS; chapter 12 the provider-to-provider border; chapter 13 VPNs and related services.

    pdf258p longtimenosee03 22-02-2024 4 2   Download

  • Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 1 includes contents: Chapter 1: web application (in)security, chapter 2: core defense mechanisms, chapter 3: web application technologies, chapter 4: mapping the application, chapter 5: bypassing client-side controls, chapter 6: attacking authentication, chapter 7: attacking session management, chapter 8: attacking access controls, chapter 9: injecting code.

    pdf367p haojiubujain010 14-12-2023 5 3   Download

  • Ebook "Core techniques and algorithms in game programming" includes content: A chronology of game programming, game architecture, data structures and algorithms, design patterns, user input, fundamental AI technologies, action oriented AI, tactical AI, network programming, 2D game programming, outdoors algorithms, character animation, texture mapping,... and other contents.

    pdf745p haojiubujain09 21-11-2023 3 3   Download

  • Ebook "Mail order retailing in Britain: A business and social history" examines the rise of internet shopping and the new challenges and opportunities it provided for the mail order industry. Here the story is one of continuity and fracture as the established mail order companies struggle to adjust to a business environment which they had partly created, but which also rested on a new range of core competencies and technological and demographic change.

    pdf259p loivantrinh 29-10-2023 6 3   Download

  • Part 1 of ebook "Tutor support material: Electrical installation work - 2330 certificate in electrotechnical technology (Levels 2 & 3)" provides readers with contents including: certificate in electrotechnical technology; core unit 1 (level 2) working effectively and safely in an electrotechnical environment; core unit 2 (level 2) principles of electrotechnology; core unit 3 (level 2) applications of health and safety and electrical principles; occupational unit 4 (level 2) electrical installation (buildings and structures);...

    pdf187p dangsovu 20-10-2023 8 7   Download

  • Part 1 of ebook "BIM handbook: A guide to building information modeling for owners, designers, engineers, contractors, and facility managers" provides readers with contents including: introduction; core technologies and software; collaboration and interoperability; BIM for owners and facility managers; BIM for architects and engineers; BIM for contractors; BIM for subcontractors and fabricators;...

    pdf346p dangsovu 20-10-2023 6 4   Download

  • Ebook "Field guide to hadoop" includes content: Core technologies, database and data management, serialization, management and monitoring, analytic helpers, data transfer, security, access control, and auditing, cloud computing and virtualization.

    pdf132p haojiubujain07 20-09-2023 6 4   Download

  • Part 1 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: cyber security in the mobile age; intel’s embedded solutions: from management to security; building blocks of the security and management engine; the engine - safeguarding itself before safeguarding others;...

    pdf120p tieulangtran 28-09-2023 7 3   Download

  • There are two main tendencies in Medical Informatics. One is the development of core theory in the information technology itself and the other one is the use of technologies in applications for health improving. In this paper, we will present an architectural model of the Medical Diagnostic Laboratory (MDL) and some result.

    pdf8p vifriedrich 06-09-2023 6 1   Download

  • Part 1 of ebook "Managing innovation: Integrating technological, market, and organizational change" provides readers with contents including: managing innovation; innovation – what it is and why it matters; innovation as a core business process; building the innovative organization; developing an innovation strategy; sources of innovation; innovation networks;...

    pdf328p hanlinhchi 29-08-2023 9 4   Download

  • Ebook "Business communication: In person, in print, online" you learn today's most important business communication concepts in detail and within the context of how communication happens in organizations today. Company examples and situations demonstrate how principles work in the real business world. In addition to refining core written and oral communication skills, you learn to navigate complex relationships and use current, sophisticated technologies.

    pdf524p tichhythan 17-08-2023 9 6   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
3=>0