搜索:policies

找到约 8 项符合「policies」的查询结果

结果 8
https://www.eeworm.com/dl/534/386396.html 其他

alert this paper illuminates the corresponding policies

alert this paper illuminates the corresponding policies,managements and role of distinguished interest-individualin differentstages,which administerssuggestionsonhow to putforwardpoliciesand implementing ordinanceto China’sPackagingW aste M anagement.
下载 138
·
查看 1044
https://www.eeworm.com/dl/505/23433.html 电源技术

电子设备电源节能讲解

Abstract: The "vampire" drain on electricity by household gadgets is only one indicator of the lack of policies to conserve energy and protect people and businesses from a major energy disaster. Most
下载 178
·
查看 1078
https://www.eeworm.com/dl/633/343734.html Java编程

OPIAM stands for Open Identity and Access Management. This Suite will provide modules for user & rig

OPIAM stands for Open Identity and Access Management. This Suite will provide modules for user & right centralized management: user profile management, ldap content consultation, access control based on RBAC & provisioning policies, and Web SSO.
下载 108
·
查看 1061
https://www.eeworm.com/dl/540/366040.html 软件工程

Testability is the concern most often voiced by Texas Instruments (TI&#228 ) application specific i

Testability is the concern most often voiced by Texas Instruments (TI&#228 ) application specific integrated circuit (ASIC) users. This document is intended to consolidate TI policies into a coherent approach to designing for testability. It is not intended as a specification, bu ...
下载 36
·
查看 1066
https://www.eeworm.com/dl/542/358741.html 其他书籍

This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s

This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s i ntended as a simple guide to logistics i n NATO. It does not attempt to examine current i ssues or provide answers to the problems that logisticians will face, but i t rather ai ...
下载 149
·
查看 1091
https://www.eeworm.com/dl/684/391471.html 软件设计/软件工程

Memory Management—Algorithms and implementation in C/C++ Introduction Chapter 1 - Memory Manag

Memory Management—Algorithms and implementation in C/C++ Introduction Chapter 1 - Memory Management Mechanisms Chapter 2 - Memory Management Policies Chapter 3 - High-Level Services Chapter 4 - Manual Memory Management Chapter 5 - Automatic Memory Management Chapter 6 - Miscel ...
下载 86
·
查看 1100
https://www.eeworm.com/dl/522090.html 书籍

Radio+Spectrum+Management

An understanding of the policies, regulations, standards and techniques of radio spectrum management is useful to those who manage and administrate it, to operators, to equipment providers and to the users of wireless communication (i.e., all of us). For many years the author has ...
下载 1
·
查看 93
https://www.eeworm.com/dl/534/391049.html 其他

Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the ...
下载 149
·
查看 1074