搜索结果

找到约 8 项符合 policies 的查询结果

其他 alert this paper illuminates the corresponding policies

alert this paper illuminates the corresponding policies,managements and role of distinguished interest-individualin differentstages,which administerssuggestionsonhow to putforwardpoliciesand implementing ordinanceto China’sPackagingW aste M anagement.
https://www.eeworm.com/dl/534/386396.html
下载: 138
查看: 1027

电源技术 电子设备电源节能讲解

Abstract: The "vampire" drain on electricity by household gadgets is only one indicator of the lack of policies to conserve energy and protect people and businesses from a major energy disaster. Most
https://www.eeworm.com/dl/505/23433.html
下载: 178
查看: 1044

Java编程 OPIAM stands for Open Identity and Access Management. This Suite will provide modules for user & rig

OPIAM stands for Open Identity and Access Management. This Suite will provide modules for user & right centralized management: user profile management, ldap content consultation, access control based on RBAC & provisioning policies, and Web SSO.
https://www.eeworm.com/dl/633/343734.html
下载: 108
查看: 1039

其他书籍 This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s

This Handbook, published under the auspices of the Senior NATO Logisticians’ Conference (SNLC), i s i ntended as a simple guide to logistics i n NATO. It does not attempt to examine current i ssues or provide answers to the problems that logisticians will face, but i t rather aims at i ntroducing t ...
https://www.eeworm.com/dl/542/358741.html
下载: 149
查看: 1051

软件工程 Testability is the concern most often voiced by Texas Instruments (TI&#228 ) application specific i

Testability is the concern most often voiced by Texas Instruments (TI&#228 ) application specific integrated circuit (ASIC) users. This document is intended to consolidate TI policies into a coherent approach to designing for testability. It is not intended as a specification, but as a guide you can ...
https://www.eeworm.com/dl/540/366040.html
下载: 36
查看: 1050

其他 Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. ...
https://www.eeworm.com/dl/534/391049.html
下载: 149
查看: 1044

软件设计/软件工程 Memory Management—Algorithms and implementation in C/C++ Introduction Chapter 1 - Memory Manag

Memory Management—Algorithms and implementation in C/C++ Introduction Chapter 1 - Memory Management Mechanisms Chapter 2 - Memory Management Policies Chapter 3 - High-Level Services Chapter 4 - Manual Memory Management Chapter 5 - Automatic Memory Management Chapter 6 - Miscellaneous Topics Index ...
https://www.eeworm.com/dl/684/391471.html
下载: 86
查看: 1056

书籍 Radio+Spectrum+Management

An understanding of the policies, regulations, standards and techniques of radio spectrum management is useful to those who manage and administrate it, to operators, to equipment providers and to the users of wireless communication (i.e., all of us). For many years the author has been deeply involve ...
https://www.eeworm.com/dl/522090.html
下载: 1
查看: 64