Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,081
- Biblia 1,868
- Derecho canónico 1,550
- Teología dogmática 1,436
- Teología 1,414
- Iglesia Católica 1,192
- Padres de la Iglesia 920
- Crítica e interpretación 881
- Moral cristiana 845
- Església Catòlica 790
- Filosofía 704
- Development 673
- Bíblia 623
- Application software 614
- Història 549
- Liturgia 528
- Teologia 489
- Engineering & Applied Sciences 484
- Pontificia Università Lateranense (Vaticano) 480
- Tomás de Aquino 462
- Patrística 422
- Computer programs 409
- Litúrgia 397
- Teología moral 389
- -Historia 385
- Obras anteriores a 1800 373
- Design 369
- History 352
- Obres anteriors al 1800 342
- Programming 321
-
64201por OECDTabla de Contenidos: “…Intro -- Preface -- Foreword -- Table of contents -- Acronyms and abbreviations -- Country groupings -- Executive summary -- 1 Recent SME developments and forthcoming challenges -- Recent SME performance has been uneven across firms, sectors and countries -- Firm dynamics have displayed marked heterogeneity across countries and sectors -- Firm entry growth slowed markedly and exits accelerated in the aftermath of the war in Ukraine -- Bankruptcies accelerated in 2022 -- Micro firms have outperformed SMEs in the past two years -- Number of firms -- Start-ups -- Sales -- Value-added and employment -- Productivity and wages -- SMEs face mounting short-term challenges -- SMEs direct exposure to Ukraine and Russia is limited -- Elevated uncertainties and geopolitical tensions -- Inflation and rising costs -- Heightening labour and skill shortages -- Supply-chain pressures -- Tightened credit conditions -- Change in the nature of direct fiscal support to SMEs -- The pace of digitalisation is rapid but still brings challenges to SMEs -- The transition to a decarbonised economy requires rethinking industrial systems and business models -- References -- Part I Thematic chapters -- 2 The role of networks for SME innovation, resilience and sustainability -- SMEs need to transform and their networks can enable them to leapfrog -- SMEs are part of a complex network of networks -- Networks are critical for SME transitions towards higher productivity, resilience and sustainability -- Networks can enable SMEs to leapfrog -- SMEs can achieve greater resilience through their networks -- Greater sustainability for networking and networks for greater sustainability -- SMEs' ability to integrate networks and take advantage of them remains limited -- There is a large range of policy measures to support SME network expansion -- References -- Annex 2.A. …”
Publicado 2023
Libro electrónico -
64202Publicado 2023Tabla de Contenidos: “…Creating and funding an account with MetaMask -- Using MetaMask and Remix IDE to deploy a smart contract -- Adding a custom network to MetaMask and connecting it with Remix IDE -- Importing accounts into MetaMask using keystore files -- Deploying a contract with MetaMask -- Interacting with a contract through MetaMask using Remix IDE -- Summary -- Chapter 11 : Tools, Languages, and Frameworks for Ethereum Developers -- Languages -- The Solidity compiler -- Installing solc -- Experimenting with solc -- Tools, libraries, and frameworks -- Node.js -- Ganache -- ganache-cli -- Ganache UI -- Truffle -- Drizzle -- Other tools -- Contract development and deployment -- Writing smart contracts -- Testing smart contracts -- Deploying smart contracts -- The Solidity language -- Functions -- Variables -- Local variables -- Global variables -- State variables -- Data types -- Value types -- Reference types -- Control structures -- Events -- Inheritance -- Libraries -- Error handling -- Summary -- Chapter 12 : Web3 Development Using Ethereum -- Interacting with contracts using Web3 and Geth -- Deploying contracts -- Using solc to generate ABI and code -- Querying contracts with Geth -- Interacting with Geth using POST requests -- Interacting with contracts via frontends -- Installing the web3.js JavaScript library -- Creating a web3 object -- Creating an app.js JavaScript file -- Creating a frontend webpage -- Calling contract functions -- Creating a frontend webpage -- Deploying and interacting with contracts using Truffle -- Installing and initializing Truffle -- Compiling, testing, and migrating using Truffle -- Interacting with the contract -- Using Truffle to test and deploy smart contracts -- Deployment on decentralized storage using IPFS -- Summary -- Chapter 13 : The Merge and Beyond -- Introduction -- Ethereum after The Merge -- The Beacon Chain…”
Libro electrónico -
64203Publicado 2020Tabla de Contenidos: “…The Bargaining Zone -- Bargaining Surplus -- Negotiator's Surplus -- Value-Claiming Strategies -- Accurately Assess Your BATNA -- Unpack Alternatives -- Improve Your BATNA -- Determine Your Reservation Point, but Do Not Reveal It -- Research the Other Party's BATNA and Estimate Their Reservation Point -- Set High Aspirations (Be Realistic but Optimistic) -- First Offers -- Anchoring Information Model -- Anchoring Effect -- Range Offers -- Precise versus Round Numbers -- Early versus Late First Offers -- Re-anchoring -- Concessions -- Reciprocity versus Aversion -- Concession Pattern -- Magnitude of Concessions -- Timing of Concessions -- Substantiation -- Power Conversation Tactics -- Constraints versus Disparagement -- "Agreement" versus "Option" -- Fairness Arguments -- Social Comparison -- Equity Principle -- Final Offers -- Face-Saving -- Chapter Capstone -- Chapter 4: Integrative Negotiation: Expanding the Pie -- Fixed-Sum versus Variable-Sum Negotiation -- False Conflict -- Fixed-Pie Perception -- Integrative Negotiation -- Compromise versus Integrative Negotiation -- Pareto Optimal Agreements -- Assessing the Likelihood of Win-Win Agreement -- Multiple Issues -- Add Issues -- Side Deals -- Differing Strengths of Preference -- Strategies for Expanding the Pie -- Separate Positions from Interests -- Perspective Taking -- Ask Questions about Interests and Priorities -- Reveal Information about Interests and Priorities -- Unbundle the Issues -- Value-Added Trade-offs (Logrolling) -- Multi-issue Offers versus Single-Issue Offers -- MESOs: Multiple Equivalent Simultaneous Offers -- Contingent Contracts -- Pre-settlement Settlements (PreSS) -- Post-settlement Settlements -- Focal Points and Turning Points -- Decision-Making Model of Integrative Agreements -- Resource Assessment -- Assessment of Differences -- Offers and Trade-offs…”
Libro electrónico -
64204por Courtland L. BoveeTabla de Contenidos: “…Emphasizing the Positive -- Using Bias-free Language -- Adapting to Your Audience: Building Strong Relationships -- Establishing Your Credibility -- Projecting Your Company's Image -- Adapting to Your Audience: Controlling Your Style and Tone -- Creating a Conversational Tone -- Using Plain Language -- Selecting the Active or Passive Voice -- Composing Your Message: Choosing Powerful Words -- Using Words Correctly -- Using Words Effectively -- Understanding Denotation and Connotation -- Balancing Abstract and Concrete Words -- Composing Your Message: Creating Effective Sentences -- Choosing from the Four Types of Sentences -- Using Sentence Style to Emphasize Key Thoughts -- Composing Your Message: Crafting Unified, Coherent Paragraphs -- Creating the Elements of a Paragraph -- Choosing the Best Way to Develop Each Paragraph -- Writing Messages for Mobile Devices -- Communication Challenges at Lumen/kaleigh Moore -- Key Terms -- Summary of LearningObjectives -- Test Your Knowledge -- Apply Your Knowledge -- Practice Your Skills -- Expand Your Skills -- Build Your Career -- Intelligent Communication Technology Amplifying Your Writing with Augmented Writing Software -- Apply Your Skills Now Think Now, Write Later -- 6 Completing Business Messages -- Communication Close-up at Type Together -- Revising Your Message: Evaluating the First Draft -- Evaluating Your Content, Organization, Style, and Tone -- Evaluating, Editing, and Revising the Work of Others -- Revising to Improve Readability -- Varying the Length of Your Sentences -- Keeping Your Paragraphs Short -- Using Lists and Bullets to Clarify and Emphasize -- Adding Headings and Subheadings -- Editing for Clarity and Conciseness -- Editing for Clarity -- Editing for Conciseness -- Producing Your Message -- Designing for Readability -- Formatting Formal Letters and Memos…”
Publicado 2021
Libro electrónico -
64205Publicado 2024Tabla de Contenidos: “…-- The importance of data-driven insights in business -- An overview of Microsoft Dynamics 365 AI for Business Insights -- The objectives and structure of the book -- Summary -- Questions -- Answers -- Chapter 2: Microsoft Dynamics 365 AI Architecture and Foundations -- An overview of the architecture of Microsoft Dynamics 365 AI -- Cloud-based architecture -- AI technologies integration -- Modular components and microservices -- Data management and storage -- Security and compliance -- API and SDKs -- Real-time analytics engine -- Streamlined user interface -- Infrastructure resilience and fault tolerance -- Extensibility and future-proofing -- The key components and their interactions -- Data storage - the bedrock of AI -- AI models - the analytical engines -- Cognitive services - adding a layer of intelligence -- Integration interfaces - the connective tissue -- Cross-component collaboration - a symphony of interactions -- Business empowerment - the ultimate goal -- Scalability and adaptability - designed for growth -- Security and compliance across components -- Integration considerations and best practices -- Data integration - the starting point -- Security measures - non-negotiable -- Scalability - planning for growth -- Performance optimization - getting the most out of your system -- Documentation and training - the human element -- The iterative nature of integration -- Summary -- Questions -- Answers -- Part 2: Implementing Dynamics 365 AI Across Business Functions -- Chapter 3: Implementing Dynamics 365 AI for Sales Insights -- Leveraging AI for customer segmentation and targeting…”
Libro electrónico -
64206Publicado 2024Tabla de Contenidos: “…Generating code -- Cleaning up -- Summary -- Chapter 4: Securing Your Code with Cloud Workstations -- Technical requirements -- Introduction to Cloud Workstations -- Cloud Workstations architecture -- Configuring workstations for developers -- Creating a workstation cluster -- Creating a workstation configuration for the base editor -- Creating a workstation configuration for the IntelliJ IDEA Ultimate IDE -- Creating workstations and assigning them to developers -- Customizing Cloud Workstations -- Creating a custom image and workstation configuration -- Updating Cloud workstations -- Coding on Cloud Workstations -- Accessing a Cloud workstation configured with the base editor -- Accessing a Cloud workstation configured with a JetBrains IDE -- Cleaning up -- Summary -- Part 2: Build and Package Your Application -- Chapter 5: Automating Continuous Integration with Cloud Build -- Technical requirements -- Cloud Build architecture and capabilities -- Building your application manually -- Running a simple build from the command line -- Adding automated tests to your build -- Building your application using Skaffold -- Using substitutions -- Customizing your build workers -- Custom machine types -- Private worker pools -- Generating security information for your build -- Producing digitally signed provenance -- Viewing vulnerability reports and provenance -- Automating builds -- Creating your source code repository -- Connecting your source code repository to Cloud Build -- Creating a trigger for your build -- Running an automated build after a code commit -- Summary -- Chapter 6: Securely Store Your Software on Artifact Registry -- Technical requirements -- Managing container images with Artifact Registry -- Creating an Artifact Registry repository to store your image -- Viewing role-based access control on a repository…”
Libro electrónico -
64207Publicado 2024Tabla de Contenidos: “…GCP partner solutions -- Comparing AWS, Azure, and GCP blockchain services -- AWS -- Azure -- GCP -- Strengths and weaknesses -- Blockchain data security -- Summary -- Further reading -- Chapter 3: DevOps for Cloud-Native Blockchain Solutions -- Introduction to DevOps for cloud-native blockchain solutions -- The blockchain challenge for DevOps -- DevOps - Definition and core principles -- The role of DevOps in cloud-native blockchain solutions -- Benefits of using DevOps in cloud-native blockchain solutions -- CI/CD for blockchain solutions -- CI and CD -- Smart contract design -- Smart contract testing -- Test data generation -- CI/CD tools -- IaC for blockchain solutions -- IaC - Definition and benefits -- Popular IaC tools for blockchain infrastructure management -- Implementing IaC for blockchain solutions -- Monitoring and logging for blockchain solutions -- Importance of monitoring and logging for blockchain solutions -- Popular monitoring and logging tools for blockchain solutions -- Implementing monitoring and logging for blockchain solutions -- Best practices for DevOps in cloud-native blockchain solutions -- Summary -- Part 2: Deploying and Implementing Blockchain Solutions on AWS -- Chapter 4: Getting Started with Amazon Managed Blockchain -- Technical requirements -- Introduction to AMB -- Features of AMB -- Benefits of AMB -- Choosing a blockchain framework -- Creating a managed blockchain network -- Inviting members and managing access -- Inviting members to the network -- Managing member access and permissions -- Deploying and managing nodes -- Adding a new node -- Removing a node -- Monitoring node health -- Key considerations for security, scalability, and monitoring -- Security considerations -- Scalability considerations -- Monitoring considerations -- Building a tracking application -- Reference architecture -- Network Setup…”
Libro electrónico -
64208Publicado 2023Tabla de Contenidos: “…-- Designing big data solutions -- Data warehousing -- Data analytics -- IoT and telemetry -- Utilizing AI for intelligent solutions -- Azure Machine Learning -- Azure Cognitive Services -- Azure Bot Service -- Designing intelligent solutions -- Summary -- Chapter 10: Architecting Secure Applications on a Trusted Platform -- The Cloud Adoption Framework for Azure -- Azure security services -- Azure AD -- Managed identities and service principals -- Azure Key Vault -- Azure security policies and locks -- Azure resource locks -- How does Azure Policy work? …”
Libro electrónico -
64209Publicado 2024Tabla de Contenidos: “…Creating a development certificate -- Securing TCP streams -- Next steps -- Chapter 13: The One with the Deployment Dramas -- Technical requirements -- From development to production -- Publishing and file copy -- Publish using Visual Studio -- Publishing using the CLI -- Using Azure DevOps and GitHub -- Deploying to Azure -- Enabling continuous integration in Azure DevOps -- Enabling CI from GitHub -- Building installers with Visual Studio -- Building a simple installer -- Writing a Custom Action -- Incorporating the custom action in the setup -- Using Docker -- Adding Docker support to your background worker -- Deploying your Docker images -- Production-ready Docker repository -- Next steps -- Chapter 14: The One with the Linux Leaps -- Technical requirements -- An overview of Linux -- A short history of Linux -- What is Linux? …”
Libro electrónico -
64210Publicado 2024Tabla de Contenidos: “…-- Use in distributed systems -- Designing a key-value store -- Enhancing scalability and data replication -- Boosting scalability -- Consistent hashing -- Virtual nodes -- Data duplication strategies -- Implementing get and put functions -- Implementing get and put operations -- Using r and w -- Ensuring fault tolerance and identifying failures in a key-value store -- Managing temporary failures -- Addressing permanent failures -- Ring membership promotion for failure detection -- A system design interview - key value store design questions and strategies -- DynamoDB -- No fixed schema -- API functions -- Partitioning data in DynamoDB -- Throughput optimizations in DynamoDB -- High availability in DynamoDB -- Column-family databases -- HBase -- HBase details -- Graph-based databases -- The Neo4j graph database -- Neo4j details -- Relational modeling versus graph modeling -- Graph modeling -- Adding a new node to an existing graph -- Summary -- References -- Chapter 6: Distributed Cache -- What is caching? …”
Libro electrónico -
64211por Chilingerian, Jon A.Tabla de Contenidos: “…SUMMARIZING THE LEGACY: SOME CONCLUSIONS AND THOUSAND FOR THE FUTURE -- A STRATEGIC FRAMEWORK FOR ANALYZING THE PHPP EXPERIENCE: BASIC AND INTEGRATIVE ELEMENTS -- DEVELOPING STRATEGIC PROGRAM VISIONS: BASIC ELEMENTS -- Recruiting Faculty and Fellows: Examples of internal and External Targeting -- An Evolving Educational Service Concept -- A Focused Operating Strategy -- Developing a Strong Curriculum That Ensures Academic Success and Survival -- Faculty Deployment -- Changing Behavior Patterns via Service-Oriented Culture -- Cost-Effectiveness -- Developing an Educational Program into a Well-Designed Delivery System -- Role of Key People -- Physical Layout -- Changing Rules and Procedures -- DEVELOPING STRATEGIC PROGRAM VISIONS: INTEGRATIVE ELEMENTS -- Positioning Each Program -- Leveraging Program Costs Over the Value of the Program to the Follows -- Building on Core Competencies -- Adding Value via Network Effects -- Combining a Standard Curriculum with Customized Elements -- Deep Involvement of the Fellows -- Integrating the Operating Strategy and the Educational Program -- Matching Fellows with Faculty -- Application of Computer Technology -- Integration Through IOM…”
Publicado 1997
Libro electrónico -
64212Publicado 2024Tabla de Contenidos: “…Exploiting Windows services and applications -- Server-side exploits -- Client-side exploits -- Exploring the Windows Registry -- Windows Registry exploitation -- Exploiting the Windows logs -- Summary -- Lab -- Brute force password crack -- Rainbow table crack -- Assessment -- Answers -- Chapter 6: Hacking the Linux Operating System -- Exploiting the Linux operating system -- Exploring the Linux filesystem -- Exploiting the filesystem -- Linux hidden files -- Important files -- Exploiting Linux networking -- Exploiting Linux authentication -- Cracking passwords -- Linux updates and patching -- The Linux logging system -- Exploiting the Linux kernel -- Checking your kernel version -- Exploiting the kernel -- Lab -- Summary -- Assessment -- Answers -- Chapter 7: Ethical Hacking of Web Servers -- Web servers' architecture, configuration, and vulnerabilities -- Adding processing logic -- Threats, vulnerabilities, and exploits to web services -- Web server authentication -- Basic authentication -- OAuth -- Some real-world web servers and ways to combat attacks -- IIS hardening tasks -- Apache web server hardening tasks -- Types of web server/website attacks -- Website defacement -- DoS/DDoS attack -- HTTP response-splitting attack -- Cross-Site Request Forgery -- Deep linking -- Directory traversal attack -- Man-in-the-Middle/sniffing attack -- Cookie tampering -- Cookie-based session attacks -- Session hijacking -- DNS -- Lab -- Summary -- Assessment -- Answer -- Chapter 8: Hacking Databases -- Finding databases on the network -- Discovering databases on the network -- Mitigating database discovery -- Exploring databases and database structures -- Database threats and vulnerabilities -- Network-based database attacks -- Database engine faults and bugs -- Brute-force attacks on weak or default passwords -- Misconfigurations -- Remote code execution…”
Libro electrónico -
64213por Dhanasekaran, Chandra MohanTabla de Contenidos: “…-- Infrastructure Automation Using IaC -- Advantages of IaC -- Various Options for Implementing IaC -- Ad Hoc Scripts -- Configuration Management Tools -- Cloud-Based IaC Services -- Cloud-Agnostic IaC Tools -- What Is Terraform? …”
Publicado 2024
Libro electrónico -
64214Publicado 2014“…Brian will teach you how to model a character, including forming the character body, adding hair, and adding symmetry and making adjustments. …”
-
64215por Huddleston, Rob“…Key tasks covered in the book include setting up a Web page, reducing image resolution, creating radio buttons, adding a hit counter, adding an embedded sound, adding content from other sites such as integrating a blog and creating an RSS feed. …”
Publicado 2008
Libro electrónico -
64216Publicado 2022Tabla de Contenidos: “…LA VALORACIÓN CASUÍSTICA DE LA NEGLIGENCIA MÉDICA (LEX ARTIS AD HOC) -- 3.8. PROTOCOLOS MÉDICOS Y ALGORITMOS -- 3.9. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
64217Publicado 2019Tabla de Contenidos: “…11.6.1 The Water Component -- 11.6.2 The Oil Component -- 11.6.3 The Gas Component -- 11.6.4 Appearance and Disappearance of Phases -- 11.7 Well Models -- 11.7.1 Inflow-Performance Relationships -- 11.7.2 Multisegment Wells -- 11.8 Black-Oil Simulation with MRST -- 11.8.1 Simulating the SPE 1 Benchmark Case -- 11.8.2 Comparison against a Commercial Simulator -- 11.8.3 Limitations and Potential Pitfalls -- 12 The AD-OO Framework for Reservoir Simulation -- 12.1 Overview of the Simulator Framework -- 12.2 Model Hierarchy -- 12.2.1 PhysicalModel - Generic Physical Models -- 12.2.2 ReservoirModel - Basic Reservoir Models -- 12.2.3 Black-Oil Models -- 12.2.4 Models of Wells and Production Facilities -- 12.3 Solving the Discrete Model Equations -- 12.3.1 Assembly of Linearized Systems -- 12.3.2 Nonlinear Solvers -- 12.3.3 Selection of Time-Steps -- 12.3.4 Linear Solvers -- 12.4 Simulation Examples -- 12.4.1 Depletion of a Closed/Open Compartment -- 12.4.2 An Undersaturated Sector Model -- 12.4.3 SPE 1 Instrumented with Inflow Valves -- 12.4.4 The SPE 9 Benchmark Case -- 12.5 Improving Convergence and Reducing Runtime -- Part IV Reservoir Engineering Workflows -- 13 Flow Diagnostics -- 13.1 Flow Patterns and Volumetric Connections -- 13.1.1 Volumetric Partitions -- 13.1.2 Time-of-Flight Per Partition Region: Improved Accuracy -- 13.1.3 Well Allocation Factors -- 13.2 Measures of Dynamic Heterogeneity -- 13.2.1 Flow and Storage Capacity -- 13.2.2 Lorenz Coefficient and Sweep Efficiency -- 13.3 Residence-Time Distributions -- 13.4 Case Studies -- 13.4.1 Tarbert Formation: Volumetric Connections -- 13.4.2 Heterogeneity and Optimized Well Placement -- 13.5 Interactive Flow Diagnostics Tools -- 13.5.1 Synthetic 2D Example: Improving Areal Sweep -- 13.5.2 SAIGUP: Flow Patterns and Volumetric Connections -- 14 Grid Coarsening -- 14.1 Grid Partitions…”
Libro electrónico -
64218por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…. -- Graphique III.1. Droits spécifiques et ad valorem appliqués à certains produits agro-alimentaires... -- Tableau III.6. …”
Publicado 2001
Libro electrónico -
64219Publicado 1781991006220169706719
-
64220