Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,081
- Biblia 1,868
- Derecho canónico 1,550
- Teología dogmática 1,436
- Teología 1,414
- Iglesia Católica 1,192
- Padres de la Iglesia 920
- Crítica e interpretación 881
- Moral cristiana 845
- Església Catòlica 790
- Filosofía 704
- Development 673
- Bíblia 623
- Application software 614
- Història 549
- Liturgia 528
- Teologia 489
- Engineering & Applied Sciences 484
- Pontificia Università Lateranense (Vaticano) 480
- Tomás de Aquino 462
- Patrística 422
- Computer programs 409
- Litúrgia 397
- Teología moral 389
- -Historia 385
- Obras anteriores a 1800 373
- Design 369
- History 352
- Obres anteriors al 1800 342
- Programming 321
-
64381por Cunico, HernanTabla de Contenidos: “…8.3 EJB and data bean best practices -- 8.3.1 Customizing WebSphere Commerce tables -- 8.3.2 Customizing WebSphere Commerce EJBs -- 8.3.3 SQL security considerations -- 8.3.4 Using well-formed ejbCreate constructors -- 8.3.5 Lazy fetch data retrieval -- 8.3.6 Handling database vendor specific code -- 8.3.7 Using session beans -- 8.3.8 Managing concurrent updates -- 8.3.9 Flush remote method -- 8.3.10 Generating primary keys -- 8.4 Best practices for JSP programming -- 8.4.1 Using JSTL in place of Java code -- 8.4.2 Using WebSphere Commerce activation tags -- 8.4.3 Using WebSphere Commerce maps to get request parameters -- 8.4.4 Using StoreErrorDataBean for error handling -- 8.4.5 Using an appropriate includes mechanism -- 8.4.6 Using the JSPF file extension for JSP segments -- 8.4.7 Using the escapeXml attribute to preserve HTML formatting -- 8.4.8 Ensuring XHTML compliance -- 8.4.9 Using CSS to separate layout from content -- 8.4.10 Adding id attributes to links and form elements -- 8.4.11 Invoking controller commands from within a JSP page -- 8.4.12 Using the post method for form submission -- 8.5 Command best practices -- 8.5.1 New command naming and hierarchy -- 8.5.2 Using constants to hold class and method name -- 8.5.3 Command error handling -- 8.5.4 Tracing -- 8.6 General security considerations -- 8.6.1 Access control -- 8.6.2 Encrypting sensitive information -- 8.6.3 Protecting sensitive configuration files -- 8.6.4 Protecting sensitive parameters -- 8.6.5 Avoiding default credentials and port numbers -- Chapter 9. …”
Publicado 2005
Libro electrónico -
64382Publicado 2023Tabla de Contenidos: “…Knowing Your Options: Other Business Structures -- Going it alone: Sole proprietorships -- Being a sole proprietorship -- Shouldering full liability: The buck stops with you -- Exploring some more disadvantages -- Losing LLC benefits with disregarded entity taxation -- Adding a partner: General partnerships -- Doubling the trouble by doubling the partners -- Finding out other disadvantages -- Filing taxes with partnership taxation -- Throwing in a little legal protection: Limited partnerships -- Meeting the black sheep of the partnership family: LLPs and LLLPs -- Limited liability partnership (LLP) -- Limited liability limited partnership (LLLP) -- Separating yourself from your business: Corporations -- Creating a legal "person" -- Dealing with the blow of double taxation -- Easing the tax burden: S corporations -- Obtaining pass-through taxation, corporation style -- Complicating matters with IRS restrictions -- Getting Personal: Using an LLC to Achieve Your Specific Goals -- You're running a small business -- Relying on insurance - to a point -- Taking your business seriously so that others will too -- Combining all the perks in one entity: LLCs -- You want to work for yourself -- You're looking to raise venture capital -- Forming your business as a corporation to attract investors -- Knowing when an LLC will work -- You want to maximize your real estate investments -- Knowing when corps can kill -- Protecting real estate with LLCs -- You're looking to keep things in the family -- You need to protect what you've earned -- You're enrolling others in a project -- Part 2 Your First Steps: Forming Your LLC -- Chapter 4 Making a Few Key Decisions -- Stepping into the Driver's Seat: Making Essential Decisions Before Forming Your LLC -- Choosing the initial members -- Deciding how you want your company to be managed -- When the members manage…”
Libro electrónico -
64383por Organization for Economic Co-operation and Development (OECD)Tabla de Contenidos: “…Knowledge-based service industries offer the potential for value-added growth -- 1.4.7. Digital transformation presents a major opportunity but requires continuous policy attention -- 1.4.8. …”
Publicado 2023
Libro electrónico -
64384por Hacker, PhilippTabla de Contenidos: “…Konsequenzen für einzelne Betroffenenrechte -- (2) Datenübermittlung an Drittunternehmen (personalisierte Werbung) -- (a) Werbenetzwerke (ad exchanges) -- (b) Weiterleitung im Internet der Dinge -- (3) Datenerhebung bei Dritten -- c) Datenschutzrechtliche Störerhaftung als dritte Kategorie? …”
Publicado 2020
Tesis -
64385Publicado 2023Tabla de Contenidos: “…Intro -- Contents -- Figures and Tables -- Figures -- Tables -- Abbreviations -- Notes on Contributors -- Introduction -- 1 Key Arguments Presented in This Volume -- 2 Statement of Purpose -- 3 Methodology -- 4 Setup -- 5 The Book's Added Value -- 6 Target Audience -- Part 1 Global Public Goods, Sustainable Development -- 1 Global Public Goods in Light of the New Paradigm -- 1 Introduction -- 2 Characteristics of Public Goods -- 3 Global Public Goods -- 4 Provision and Financing of GPG s -- 5 GPG s and Sustainability -- 5.1 SDG s and GPG s -- 5.2 Financing SDG s, Provision of GPG s, and Official Development Assistance -- 6 Conclusions -- 2 The Global Governance Complex -- 1 Introduction: Aims and Ways -- 2 The Size and Character of Globalization -- 2.1 Globalization of Human Activities -- 3 No Globalization without Institutionalization -- 3.1 Measuring Growth of Institutions -- 3.2 Measuring the Growth of Globalization and of Global Institutions Together -- 4 Defining and Measuring Shifts in Characteristics and in Authority -- 4.1 A Long Development Leading to Three Streams of Thought -- 4.2 Main Past Trends and Present Characteristics of Global Governance -- 4.3 Measuring the Shift of Authority -- 5 Challenges to the System: Ways to Improve it -- 5.1 Contested Governance and Its Consequences -- 5.2 A Systemic Dysfunction? …”
Libro electrónico -
64386Publicado 2024Tabla de Contenidos: “…Step 5 - Retrieving outputs from CloudFormation and passing them to environment variables -- Step 6 - Configuring the AWS IoT Greengrass v2 service policy on your account -- Preparing the device with the Snowball Edge CLI -- Step 1 - Installing the AWS Snow CLI client -- Step 2 - Configuring the AWS Snow CLI -- Step 3 - Unlocking your Snow device with the CLI -- Step 4 - Retrieving the output of the unlocking procedure -- Step 5 - Creating a virtual network interface -- Step 6 - Obtaining local credentials from your Snow device -- Step 7 - Retrieving the certificate from your Snow device -- Step 8 (optional) - Adding the EC2 endpoint URL to your AWS CLI config file -- Configuring AWS IoT Greengrass on the Snow device -- Step 1 - Creating an EC2 keypair on the Snow device -- Step 2 - Obtaining the ImageId value from your Snow device -- Step 3 - Launching the EC2 instance on your Snow device -- Step 4 - Attaching the VNI to your EC2 instance -- Step 5 - SSHing into your EC2 instance -- Step 6 - Installing the AWS IoT Greengrass prerequisites into your EC2 instance -- Step 7 - Installing the AWS IoT Greengrass v2 agent onto your EC2 instance -- Walkthrough of what you've created -- Controlling your EC2 instance remotely -- Exploring the Greengrass components on your device -- Summary -- Chapter 13: Deploying a Distributed Edge Computing Application -- Deploying a distributed EKS cluster with Terraform -- Architecture -- Components -- Cost -- Setting up your environment -- Deploying the EKS cluster -- Using Terraform to push a distributed application -- Components -- Deploying the distributed application -- Testing the application from multiple sources -- Checking the user experience from your desktop/laptop -- Checking the user experience from your mobile device -- Cleanup -- Notes -- Summary…”
Libro electrónico -
64387Publicado 2024Tabla de Contenidos: “…-- Windows Push Notification Service (WNS) -- Getting started with policy design -- Migrating existing policies from AD - Group Policy management -- Summary -- Questions -- Answers -- Further reading -- Chapter 10: Advanced Policy Management…”
Libro electrónico -
64388Publicado 2024Tabla de Contenidos: “…Additional resources -- Chapter 6: Go Packages and Functions -- Go packages -- About go get and go install -- Functions -- Anonymous functions -- Functions that return multiple values -- The return values of a function can be named -- Functions that accept other functions as parameters -- Functions can return other functions -- Variadic functions -- The defer keyword -- Big O complexity -- Developing your own packages -- The init() function -- Order of execution -- Using GitHub to store Go packages -- A package for working with SQLite -- Working with SQLite3 and Go -- Storing the Go package -- The design of the Go package -- The implementation of the Go package -- Testing the Go package -- Modules -- Creating better packages -- Generating documentation -- Workspaces -- Versioning utilities -- Summary -- Exercises -- Additional resources -- Chapter 7: Telling a UNIX System What to Do -- stdin, stdout, and stderr -- UNIX processes -- File I/O -- The io.Reader and io.Writer interfaces -- Using and misusing io.Reader and io.Writer -- Buffered and unbuffered file I/O -- Reading text files -- Reading a text file line by line -- Reading a text file word by word -- Reading a text file character by character -- Reading from /dev/random -- Reading a specific amount of data from a file -- Writing to a file -- Working with JSON -- Using Marshal() and Unmarshal() -- Structures and JSON -- Reading and writing JSON data as streams -- Pretty printing JSON records -- The viper package -- Using command line flags -- Reading JSON configuration files -- The cobra package -- A utility with three commands -- Adding command line flags -- Creating command aliases -- Creating subcommands -- Important Go features -- Embedding files -- ReadDir and DirEntry -- The io/fs package -- Updating the statistics application -- The slog package -- Sending logs to io.Discard…”
Libro electrónico -
64389Publicado 2024Tabla de Contenidos: “…-- Syntax errors -- Runtime errors -- Exercise 6.01 - runtime errors while adding numbers -- Semantic errors -- Exercise 6.02 - a semantic error with walking distance -- Error handling using other programming languages -- Error interface type -- Creating error values -- Exercise 6.03 - creating an application to calculate pay for the week -- Panic -- Exercise 6.04 - Crashing the program on errors using a panic -- Recover -- Exercise 6.05 - recovering from a panic -- Guidelines when working with errors and panics -- Error wrapping -- Activity 6.01 - creating a custom error message for a banking application -- Activity 6.02 - validating a bank customer's direct deposit submission -- Activity 6.03 - panic on invalid data submission -- Activity 6.04 - preventing a panic from crashing the app…”
Libro electrónico -
64390por Brooks, RaymondTabla de Contenidos: “…-- 8.3 Historical Returns -- 8.4 Standard Deviation as a Measure of Risk -- Normal Distributions -- 8.5 Returns in an Uncertain World (Expectations and Probabilities) -- Finance Follies "Scam of the Century": Bernie Madoff and the 50 Billion Fraud -- Determining the Probabilities of All Potential Outcomes -- 8.6 The Risk-and-Return Trade-Off -- Investment Rules -- 8.7 Diversification: Minimizing Risk or Uncertainty -- When Diversification Works -- Adding More Stocks to the Portfolio: Systematic and Unsystematic Risk -- 8.8 Beta: The Measure of Risk in a Well-Diversified Portfolio -- 8.9 The Capital Asset Pricing Model and the Security Market Line -- The Capital Asset Pricing Model -- Application of the SML -- Key Terms -- Questions -- Prepping for Exams -- Problems -- Advanced Problems for Spreadsheet Application -- Mini-Case Lawrence's Legacy: Part 2 -- Part 3: Capital Budgeting -- Chapter 9. …”
Publicado 2022
Libro electrónico -
64391Publicado 2023Tabla de Contenidos: “…Creating an IAM policy and role for DMS -- Configuring DMS settings and performing a full load from MySQL to S3 -- Querying data with Amazon Athena -- Hands-on - ingesting streaming data -- Configuring Kinesis Data Firehose for streaming delivery to Amazon S3 -- Configuring Amazon Kinesis Data Generator (KDG) -- Adding newly ingested data to the Glue Data Catalog -- Querying the data with Amazon Athena -- Summary -- Chapter 7: Transforming Data to Optimize for Analytics -- Technical requirements -- Overview of how transformations can create value -- Cooking, baking, and data transformations -- Transformations as part of a pipeline -- Types of data transformation tools -- Apache Spark -- Hadoop and MapReduce -- SQL -- GUI-based tools -- Common data preparation transformations -- Protecting PII data -- Optimizing the file format -- Optimizing with data partitioning -- Data cleansing -- Common business use case transformations -- Data denormalization -- Enriching data -- Pre-aggregating data -- Extracting metadata from unstructured data -- Working with Change Data Capture (CDC) data -- Traditional approaches - data upserts and SQL views -- Modern approaches - Open Table Formats (OTFs) -- Apache Iceberg -- Apache Hudi -- Databricks Delta Lake -- Hands-on - joining datasets with AWS Glue Studio -- Creating a new data lake zone - the curated zone -- Creating a new IAM role for the Glue job -- Configuring a denormalization transform using AWS Glue Studio -- Finalizing the denormalization transform job to write to S3 -- Create a transform job to join streaming and film data using AWS Glue Studio -- Summary -- Chapter 8: Identifying and Enabling Data Consumers -- Technical requirements -- Understanding the impact of data democratization -- A growing variety of data consumers -- How a data mesh helps data consumers…”
Libro electrónico -
64392Publicado 2023Tabla de Contenidos: “…-- Model computation -- Introduction to CBOW -- Using a pretrained model for semantic search -- Adding and subtracting words/concepts -- Example 1 -- Example 2 -- Visualizing Word2Vec with TensorBoard -- Training your own Word2Vec model in CBOW and Skip-Gram -- Load the data -- Text preprocessing…”
Libro electrónico -
64393Publicado 2024Tabla de Contenidos: “…11 Applications of the fast Fourier transform -- 11.1 CUFFT -- 11.2 Spectral derivatives -- 11.3 Convolution -- 11.4 Poisson solver -- 11.4.1 Vortex dynamics -- 12 Ray tracing -- 12.1 Generating an image file -- PPM file format -- Implementation -- 12.2 Vectors in CUDA Fortran -- Implementation of the RGB module -- 12.3 Rays, a simple camera, and background -- First ray-tracing code -- 12.4 Adding a sphere -- Theory -- Implementation -- 12.5 Surface normals and multiple objects -- Surface normals -- Multiple objects -- 12.6 Antialiasing -- Implementation -- CUDA implementation -- 12.7 Material types -- 12.7.1 Diffuse materials -- Implementation -- Random number generation -- Modifications to the color() routine -- 12.7.2 Metal -- Theory -- Implementation -- Material derived types -- Initialization of spheres and material types -- The scatter() function and Cray pointers -- 12.7.3 Dielectrics -- Theory -- Implementation -- 12.8 Positionable camera -- 12.9 Defocus blur -- Implementation -- 12.10 Where next? …”
Libro electrónico -
64394Publicado 2023Tabla de Contenidos: “…-- 12.2 Architectural Diagrams -- 12.3 Application Policies -- 12.4 Summary -- Chapter 13: Basic Cloud Architectures -- 13.1 A Basic Load-Balanced Architecture -- 13.2 Adding Caching to the Architecture -- 13.3 An Ingress to Multiple Load-Balanced Systems -- 13.4 Summary -- Chapter 14: A Basic Microservice Architecture -- 14.1 What Is a Microservice Architecture? …”
Libro electrónico -
64395Publicado 2024Tabla de Contenidos: “…Manipulation with Blobs and Containers -- Leveraging AzCopy for Data Transfer between Storage Accounts -- Implementing Basic Operations from C# Code -- Managing Metadata and Security Settings for Storage Accounts -- Encryption -- Firewalls -- Metadata and Tags -- Retrieving Metadata Using C# Code -- Lifecycle Management -- Cost Savings -- Summary -- Further Reading -- Exam Readiness Drill - Chapter Review Questions -- Chapter 7: Implementing User Authentication and Authorization -- Technical Requirements -- Understanding the Microsoft Identity Platform -- Service Principals -- Permissions and Consent Types -- Permission Types -- Consent Types -- Exercise 1: Experiencing Permissions and Consent -- Task 1: Implementing Authentication with the Default Permissions -- Task 2: Testing the Dynamic Consent Experience -- Task 3: Defining Static Permissions for Admin Consent -- Exercise 2: Implementing Conditional Access -- Task 1: Creating a Conditional Access Policy -- Implementing Authentication with the MSAL -- Authentication Flows -- Client Applications -- Exercise 3: Implementing Authentication with the MSAL -- Task 1: Creating a New Console App and Adding the MSAL.NET Package -- Task 2: Implementing Authentication in a Console App Using the MSAL -- Discovering Microsoft Graph -- Exercise 4: Microsoft Graph -- Task 1: Using Graph Explorer -- Task 2: Querying the Microsoft Graph API Using the SDK -- Using SASs -- The SAS Token Structure -- SAS Types -- Exercise 5: Using Shared Access Signatures -- Task 1: Creating a Storage Account Using the Azure CLI -- Task 2: Generating a SAS -- Stored Access Policies -- Exercise 6: Implementing Stored Access Policies -- Task 1: Creating and Using a Stored Access Policy -- Summary -- Further Reading -- Exam Readiness Drill - Chapter Review Questions -- Chapter 8: Implementing Secure Azure Solutions…”
Libro electrónico -
64396Publicado 2024Tabla de Contenidos:Libro electrónico
-
64397por Bion, Wilfred R. 1897-1979“…A classic study which, by synthesizing the approaches of psychoanalysis and group dynamics, has added a new dimension to the understanding of group phenomena…”
Publicado 1961
Libro electrónico -
64398Publicado 2022“…In addition, some works on sustainability in agriculture are added…”
Libro electrónico -
64399Publicado 2022“…Biomass from the palm oil industry has been converted into value-added products to a limited extent via thermochemical, chemical, physical, and biochemical conversion routes. …”
Libro electrónico -
64400por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Droits de douane spécifiques et composites et contingents tarifaires sans équivalent ad valo... -- 2.4. Progressivité des droits selon le stade de transformation (%) 30 -- 2.5. …”
Publicado 2001
Libro electrónico