LEADER 01158nam a2200277 i 4500 001 991002027099707536 005 20020503160351.0 008 000505s1975 fr ||| | fre 020 $a2222028655 035 $ab10306432-39ule_inst 035 $aEXGIL96310$9ExL 040 $aBiblioteca Interfacoltà$bita 082 0 $a831.7 110 2 $aCentre national de la recherche scientifique : Institut des textes et manuscrits modernes. Centre régional de publication de Paris$0466408 245 10$aCahier Heine /$c[publié par] Michael Werner 260 $aParis :$bPresses de l'Ecole normale supérieure,$c1975 300 $a149 p. ;$c21 cm 490 0 $aPublications du Centre d'histoire et d'analyse des manuscrits modernes 650 4$aHeine, Heinrich 700 1 $aWerner, Michael$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0307129 907 $a.b10306432$b17-02-17$c27-06-02 912 $a991002027099707536 945 $aLE002 Fr. VIII A 25$g1$i2002000969996$lle002$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10361911$z27-06-02 996 $aCahier Heine$91445530 997 $aUNISALENTO 998 $ale002$b01-01-00$cm$da $e-$ffre$gfr $h0$i1 LEADER 03041oam 2200493 450 001 9910483185403321 005 20210530214736.0 010 $a1-4842-6408-8 024 7 $a10.1007/978-1-4842-6408-9 035 $a(CKB)4100000011645187 035 $a(DE-He213)978-1-4842-6408-9 035 $a(MiAaPQ)EBC6422824 035 $a(CaSebORM)9781484264089 035 $a(PPN)252518438 035 $a(EXLCZ)994100000011645187 100 $a20210530d2021 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDynamics 365 field service $eimplementing business solutions for the enterprise /$fSanjaya Yapa, Indika Abayarathne 205 $a1st ed. 2021. 210 1$a[Place of publication not identified] :$cApress,$d[2021] 210 4$d©2021 215 $a1 online resource (XV, 314 p. 350 illus.) 300 $aIncludes index. 311 $a1-4842-6407-X 327 $aChapter 1: Introduction to Field Services -- Chapter 2: Core Entities and Configuring the Mobile App -- Chapter 3: Work Orders and Scheduling -- Chapter 4: Agreements -- Chapter 5: Setting Up Inventory -- Chapter 6: Inventory Movement -- Chapter 7: Processing Work Orders. 330 $aConfigure and customize Microsoft Dynamics 365 Field Services to help your organization deliver onsite service to customer locations. This book will guide you in setting up and implementing Dynamics 365 Field Services to automate workflow and schedule algorithms for mobile users. The book starts with an introduction to Field Services and setting up your Dynamics 365 subscription. Next, you will configure your application. You are shown how to allocate work, manage resources, and move inventory. You will configure both Field Services and the new Field Services Mobile app. One of the main topics covered is applying security to both Field Services and the Field Services Mobile App and how to use both flavors of the application to implement effective solutions. You will go through examples to understand and apply the concepts and features for configuration of Field Services. You also will learn best practices for configuring and customizing Field Services. After reading this book, you will be able to develop and implement enterprise-scale solutions using Dynamics 365 Field Services. You will: Create and process Work Orders Manage inventory movement in the field Set up security in Field Services and Field Services Mobile App Generate Work Orders with agreement Utilize Microsoft Power Automate with Field Service. 606 $aMobile apps 606 $aEnterprise resource planning 615 0$aMobile apps. 615 0$aEnterprise resource planning. 676 $a005.35 700 $aYapa$b Sanjaya$01058362 702 $aAbayarathne$b Indika 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a9910483185403321 996 $aDynamics 365 field service$92846655 997 $aUNINA LEADER 04073nam 22005535 450 001 9910299347803321 005 20200704012646.0 010 $a3-319-93677-8 024 7 $a10.1007/978-3-319-93677-2 035 $a(CKB)4100000005323521 035 $a(DE-He213)978-3-319-93677-2 035 $a(MiAaPQ)EBC5477803 035 $a(PPN)229503721 035 $a(EXLCZ)994100000005323521 100 $a20180726d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in Smart Grid /$fby Asmaa Abdallah, Xuemin Shen 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIV, 126 p. 30 illus., 23 illus. in color.) 225 1 $aSpringerBriefs in Electrical and Computer Engineering,$x2191-8112 311 $a3-319-93676-X 330 $aThis SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid?s different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid?s control center doesn?t get enough information about customers? requirements and consequently can?t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers? requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid?s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid?s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency. 410 0$aSpringerBriefs in Electrical and Computer Engineering,$x2191-8112 606 $aData protection 606 $aElectrical engineering 606 $aWireless communication systems 606 $aMobile communication systems 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aWireless and Mobile Communication$3https://scigraph.springernature.com/ontologies/product-market-codes/T24100 615 0$aData protection. 615 0$aElectrical engineering. 615 0$aWireless communication systems. 615 0$aMobile communication systems. 615 14$aSecurity. 615 24$aCommunications Engineering, Networks. 615 24$aWireless and Mobile Communication. 676 $a621.319028558 700 $aAbdallah$b Asmaa$4aut$4http://id.loc.gov/vocabulary/relators/aut$0985803 702 $aShen$b Xuemin$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910299347803321 996 $aSecurity and Privacy in Smart Grid$92253242 997 $aUNINA