Search Results - ((((java programming) OR (names programming))) OR ((names OR james) programming))

Search alternatives:

Refine Results
  1. 1701
  2. 1702

    ANSYS Mechanical APDL for Finite Element Analysis. by Thompson, Mary Kathryn

    Published 2017
    Table of Contents: “…Create a New Folder on Your Desktop Named "Intro-to-ANSYS"Create a New Folder in the "Intro-to-ANSYS" Folder Named "Exercise2-1"; Open a New Session of ANSYS Using the Mechanical APDL Product Launcher; Ensure That the Simulation Environment Is Set to "ANSYS" (Figure 2-1-2); Change the Working Directory to the New "Exercise2-1" Folder; Change the Jobname to "Exercise2-1"; Click Run to Start ANSYS; Before You Begin; Step 1: Define Geometry; 1-1 Create a rectangle to represent the plate; 1-2 Create a circle to represent the bottom notch; 1-3 Create a circle to represent the upper notch.…”
    Full text (MFA users only)
    Electronic eBook
  3. 1703

    Professional child and youth care

    Published 1993
    Table of Contents: “…The scope of child and youth care in Canada / Roy Ferguson, Alan Pence, and Carey Denholm -- Residential child and youth care / Gerry Fewster and Thom Garfat -- Child and youth care and the Canadian youth justice system / Del Phillips and Barbara Maslowsky -- Canadian school-based child and youth care / Carey Denholm and David Watkins -- Child-life programs : fostering coping and development of children and families in health settings / Carolyn Larsen, Roy Ferguson, and Leigh Parish -- Child day care in Canada : a child and youth care perspective / Alan Pence, Patricia Canning, and Sandra Griffin -- Infant development programs / Dana Brynelsen, Helen Cummings, and Valerie Gonzales -- Child and youth care work in the community / Peter Gabor and Valerie Kuehne -- Recreation services / Gary Young and Kevin Pike -- Children, youth, and disability : a community approach to rehabilitation / Roy Brown -- Parent education and support : an emerging field for child and youth care work / James Anglin and Robert Glossop.…”
    Full text (MFA users only)
    Electronic eBook
  4. 1704

    Microsoft Exchange Server 2007 infrastructure design : a service-oriented approach by Tschanz, David W.

    Published 2008
    Table of Contents: “…Chapter 3: Planning the Exchange InfrastructureA Rose by Any Other Name; Visualizing the Solution; An Overview of the Scope Statement Document; Developing the Scope Statement Document; An Overview of the Planning Process; Developing the Statement of Work; Chapter 4: Applying Planning Principles to Exchange Server 2007; Reviewing the Changes in Exchange Server 2007; Reviewing Exchange and Operating System Requirements; Determining Disk Storage Needs; Understanding Active Directory (AD) Requirements; Planning for Compliance; Planning Mail Archiving; In-House vs. …”
    Full text (MFA users only)
    Electronic eBook
  5. 1705

    Good derivatives : a story of financial and environmental innovation by Sandor, Richard L.

    Published 2012
    Table of Contents: “…Selling the Concept to Financial InstitutionsEnabling Legislation and Regulation for GNMA Futures; Transparent Markets--Greetings from the Grim Reaper; The GNMA Contract: Simple in Concept, Complex in Detail; The First Financial Good Derivative-- GNMA Mortgage Interest Rate Futures; Contracts without Lawyers; Her Name was Ginnie Mae; The Economic Benefits of GNMA Futures; Moving On; Chapter 6: Educating Users and Building the Market; Adapting at Conti; Travels with Charlie O. …”
    Full text (MFA users only)
    Electronic eBook
  6. 1706

    The Gold Coast transformed : from wilderness to urban ecosystem

    Published 2015
    Table of Contents: “…Few go to the mountains, many to the beach; Tourist data; Chapter 3 The Gold Coast before Cook named Mount Warning.…”
    Full text (MFA users only)
    Electronic eBook
  7. 1707

    Data architecture : a primer for the data scientist : big data, data warehouse and data vault by Inmon, William H., Lindstedt, Daniel

    Published 2015
    Table of Contents: “…Some Approaches to ContextualizationMapReduce; Manual Analysis; 2.5 -- Contextualizing repetitive unstructured data; Parsing Repetitive Unstructured Data; Recasting the Output Data; 2.6 -- Textual disambiguation; From Narrative into an Analytical Database; Input into Textual Disambiguation; Mapping; Input/Output; Document Fracturing/Named Value Processing; Preprocessing a Document; Emails -- A Special Case; Spreadsheets; Report Decompilation; 2.7 -- Taxonomies; Data Models and Taxonomies; Applicability of Taxonomies; What is a Taxonomy?…”
    Full text (MFA users only)
    Electronic eBook
  8. 1708

    Challenges Women Face In Retirement Security. by Larou, Jean B.

    Published 2009
    Table of Contents: “…OVERVIEW OF GENDER DISPARITIES IN CURRENT RETIREE INCOME SOURCESGENDER DISPARITIES IN RETIREMENT PROGRAM PARTICIPATION AMONG CURRENT WORKERS; INCREASING IMPORTANCE OF INDIVIDUAL ACCOUNT PLANS FOR FUTURE RETIREMENT INCOME SECURITY; RETIREMENT INCOME ADEQUACY; RESULTS; REFERENCES; Chapter 9: WHAT EVERY WOMAN SHOULD KNOW; WHAT SOCIAL SECURITY MEANS TO YOU; YOUR SOCIAL SECURITY RECORD AND NUMBER; IF YOU CHANGE YOUR NAME ; IF YOU ARE A VICTIM OF FAMILY VIOLENCE; SOCIAL SECURITY NUMBERS FOR CHILDREN; WHAT YOUR SOCIAL SECURITY TAXES PAY FOR; SOME SPECIAL EMPLOYMENT SITUATIONS; WHEN YOU RETIRE.…”
    Full text (MFA users only)
    Electronic eBook
  9. 1709

    Transform Customer Experience : How to achieve customer success and create exceptional CX by Villani, Isabella

    Published 2019
    Table of Contents: “…Segmenting customers by buying patternsSegmenting customers by value; Identifying persuadable customers; Customer personas; Chapter 5 Customer journey mapping; Ideas for customer journey maps; The name and description of the interaction; Customer personas; Triggers; Stages and steps; Touchpoints; Transitions; Other parties; Customer sentiment; Moments of truth; Points of pain; Points of delight; Metrics; Timeline; Eric's fridge purchase; Assembling your journey map; Gathering data; Preparing your map; The evolving map; Chapter 6 Omnichannel CX; Redrawing the retail map…”
    Full text (MFA users only)
    Electronic eBook
  10. 1710
  11. 1711

    On the outskirts by Kinsella, John, 1963-

    Published 2017
    Table of Contents: “…Cover -- Author biography -- Also by John Kinsella -- Title page -- Imprint page -- Dedication -- Contents -- The Bulldozer Poem -- House Lights and A Refusal to Let Space and Place Fall to Story Programming -- Psychogeography of a Temporary Locality: A Prelude -- Tangential to Blake's Illustration to Dante's Hell, Canto 1 -- The Big Picture: Via Blake's Illustration to Dante's Hell, Canto 2 (God Image: 'The Mission of Virgil') -- Into Blake's Illustration to Dante's Hell, Canto 3 (lines 1-10), 'Leave every Hope you who in Enter' -- A Bat in the Conservatory: Blake's Illustration to Dante's Hell, Canto 4 -- The VOC Gluttony of Spraycan Graffiti on the Outskirts of Tübingen and Blake's Illustration to Dante's Hell, Canto 6 -- Cerberus in the Highlands Overlooking the Sea: Blake's Illustration to Dante's Hell, Canto 6 -- Crossing to Long Island and Blake's Illustration to Dante's Hell, Canto 7 -- Crossing the Irish Sea and Blake's Illustration to Dante's Hell, Cantos 7 and 8 -- Seventh Circle: On Blake's Illustration to Dante's Hell, Canto 12 -- A Middle-Spotted Woodpecker Sounds Out a Warning As I Reflect Over Blake's Illustration to Dante's Hell, Canto 13 -- Buzzards Over the Österberg: On Blake's Vision of Dante's Hell, Canto 18 ('Ditch of Flatterers') -- Fasnet and Blake's Illustration to Dante's Hell, Canto 20 -- Cybernetic Gestures from the Max Planck Institute, Tübingen: Skewiff to Blake's Illustration to Dante's Hell, Canto 21 (lines 46-56) -- It Says So Much More ... …”
    Full text (MFA users only)
    Electronic eBook
  12. 1712

    Ninth Annual Symposium on Frontiers of Engineering

    Published 2004
    Table of Contents: “…BALLHAUS, JR. -- APPENDIXES -- Breakout Sessions -- Contributors -- Program -- Participants…”
    Full text (MFA users only)
    Electronic Conference Proceeding eBook
  13. 1713

    Penetration testing : a hands-on introduction to hacking by Weidman, Georgia

    Published 2014
    Table of Contents: “…Opening a Command Shell Listener / Peter Van Eeckhoutte -- Pushing a Command Shell Back to a Listener / Peter Van Eeckhoutte -- Automating Tasks with cron Jobs / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 3. Programming / Peter Van Eeckhoutte -- Bash Scripting / Peter Van Eeckhoutte -- Ping / Peter Van Eeckhoutte -- A Simple Bash Script / Peter Van Eeckhoutte -- Running Our Script / Peter Van Eeckhoutte -- Adding Functionality with if Statements / Peter Van Eeckhoutte -- A for Loop / Peter Van Eeckhoutte -- Streamlining the Results / Peter Van Eeckhoutte -- Python Scripting / Peter Van Eeckhoutte -- Connecting to a Port / Peter Van Eeckhoutte -- if Statements in Python / Peter Van Eeckhoutte -- Writing and Compiling C Programs / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 4. …”
    Full text (MFA users only)
    Electronic eBook
  14. 1714

    Messaging solutions in a Linux environment

    Published 2005
    Table of Contents: “…Implementing highly available brokers -- 7.1 Scenario overview -- 7.1.1 Using brokers with WebSphere MQ clustering for high availability -- 7.1.2 Using hardware failover for high-availability in brokers -- 7.2 Introduction to WebSphere BI Message Broker -- 7.2.1 WebSphere BI Message Broker architecture -- 7.2.2 The broker -- 7.2.3 Introducing message flows -- 7.2.4 Introduction to message modeling and message sets -- 7.2.5 Message Brokers Toolkit for WebSphere Studio -- 7.2.6 WebSphere BI Message Broker configuration manager -- 7.2.7 User name server -- 7.3 Installing and configuring the broker -- 7.3.1 Installing and configuring WebSphere MQ -- 7.3.2 Installing and configuring DB2 -- 7.3.3 Installing and configuring WebSphere BI Message Broker -- 7.4 Implementation steps -- 7.5 Creating databases and tables -- 7.5.1 Creating databases on the WebSphere Application Server -- 7.5.2 Database setup on Windows win6336 -- 7.5.3 DB2 client setup on hosts brk1 and brk2 -- 7.6 Design and development of the message set -- 7.6.1 Designing the message set -- 7.6.2 Developing the message set -- 7.6.3 Creating the message definition file -- 7.6.4 Creating the logical structure of the message -- 7.7 Design and development of message flow -- 7.7.1 Message flow design -- 7.7.2 Message flow development -- 7.8 Configuring the broker domain -- 7.8.1 Queue manager configuration -- 7.8.2 Creation and configuration of configuration manager -- 7.8.3 Broker creation -- 7.8.4 Connecting brokers to the configuration manager -- 7.9 Deploying the message flow and message set -- 7.9.1 Creating a message broker archive -- 7.9.2 Deploying a bar file -- 7.10 WebSphere Application Server configuration -- 7.11 Message generation application -- 7.12 Message retrieval application -- 7.12.1 The servlet MonitorStatusServlet.java -- 7.12.2 The class -- 7.13 Application in action.…”
    Full text (MFA users only)
    Electronic eBook
  15. 1715
  16. 1716

    The Atlantic world and Virginia, 1550-1624

    Published 2007
    Table of Contents: “…Schwartz -- Conference Program.…”
    Full text (MFA users only)
    Electronic eBook
  17. 1717

    Collected papers of Michael E. Soulé : early years in modern conservation biology by Soulé, Michael E., Peters, Robert L.

    Published 2014
    Table of Contents: “…Note from the Publisher -- Preface -- Introduction -- James A. Estes -- Conservation Biology: Its Scope and Its Challenge -- Michael E. …”
    Full text (MFA users only)
    Electronic eBook
  18. 1718

    Hack proofing your Web applications

    Published 2001
    Full text (MFA users only)
    Electronic eBook
  19. 1719
  20. 1720

    The First Amendment in schools : a guide from the First Amendment Center

    Published 2003
    Table of Contents: “…A brief introduction to the U.S. court system -- Decoding a legal citation -- The birth of the first amendment -- The call for a new government -- The role of James Madison -- The adoption of the first amendment -- I: First amendment schools: educating for freedom and responsibility -- Vision statement -- Project schools -- II: Core issues for all schools to consider -- Religious liberty: the establishment clause -- Religious liberty: the free exercise clause -- Accommodating the religious needs and requirements of students -- School prayer and student religious expression -- Student extracurricular clubs and activities -- Teaching about religion -- Religious holidays -- Use of school facilities by outside groups -- Cooperative agreements between public schools and religious communities -- Released-time programs -- Free expression rights of students -- Speech codes -- Student distribution of literature -- Student dress and school uniforms -- Students and the Internet -- Student publications -- Teacher and administrator rights and responsibilities -- Book selection and other decisions about the curriculum -- III: 50 key legal cases -- Case directory -- Supreme Court case summaries -- Lower court case summaries -- IV: Resources -- Selected programs and organizations -- Selected education groups -- Selected advocacy groups -- Selected bibliography.…”
    Full text (MFA users only)
    Electronic eBook