Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,658
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 357
- Música 348
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
37341Publicado 2021“…Every Sunday, Christians all over the world recite the Nicene Creed as a confession of faith. While most do not know the details of the controversy that led to its composition, they are aware that the Council of Nicaea was a critical moment in the history of Christianity. …”
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
37342por Cervantes Saavedra, Miguel de, 1547-1616
Publicado 1784Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Central de Capuchinos de España)Accés lliure
Accés lliure
Accés lliure
Accés lliure
Accés lliure
Registre bibliogràfic del Catálogo de la Colección Cervantina
Libro -
37343Publicado 2022“…Is the F.C.C. doing its job? Can political ads be made less toxic? …”
Libro -
37344Publicado 1995“…How is moral consensus possible and how do small groups help create or distort consensus processes? …”
Libro -
37345por Hoornaert, Eduardo, 1930-
Publicado 1986Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Biblioteca Universidad de Deusto, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca de Pastoral Madrid, Biblioteca Diocesana de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Seminario Diocesano de Vitoria-Gasteiz, Universidad Loyola - Universidad Loyola Granada)Libro -
37346Publicado 2000Tabla de Contenidos: “…Essays by Virgilio Elizondo. 10. I Forgive But I Do Not Forget (1986). 11. Unmasking the Idols (1992). 12. …”
Libro -
37347por Rafael Arnáiz, Santo, 1911-1938
Publicado 1988Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Universidad de Deusto, Biblioteca Diocesana de Salamanca, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Diocesana Bilbao, Biblioteca Central de Capuchinos de España, Biblioteca de la Conferencia Episcopal Española, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Seminario Diocesano de Vitoria-Gasteiz)Libro -
37348por Marchetti, Giovanni ( 1753-1829)
Publicado 1801Red de bibliotecas Iglesia Navarra (Otras Fuentes: Biblioteca Universitat Ramon Llull, Institución Colombina, Universidad Loyola - Universidad Loyola Granada)Libro -
37349Red de Bibliotecas de la Archidiócesis de Granada (Otras Fuentes: Institución Colombina, Red de bibliotecas Iglesia Navarra)Libro
-
37350
-
37351Publicado 2005Tabla de Contenidos: “…9.3.3 Downloading a small file using the readAll() method -- 9.4 Distributed Program Call -- 9.5 Coding consideration for servlets and JSPs -- 9.5.1 Do not store large objects in HttpSessions -- 9.5.2 Releasing HttpSessions when finished -- 9.5.3 Do not create HttpSessions in JSPs by default -- 9.5.4 Do not use SingleThreadModel -- 9.5.5 Using the HttpServlet init() method -- 9.5.6 Using the HttpServlet destroy() method -- 9.5.7 Minimizing or eliminating the use of System.out.println() -- 9.5.8 Don't use Beans.instantiate() to create new bean instances -- 9.5.9 Using and reusing data sources for JDBC connections -- 9.5.10 Releasing JDBC resources when done -- 9.5.11 Page generation using strings -- 9.5.12 Consideration with static content -- 9.5.13 JSP include directive versus Action -- 9.5.14 Minimizing the useBean scope -- 9.6 Coding considerations for EJBs -- 9.6.1 Accessing entity beans from session beans -- 9.6.2 JNDI names -- 9.6.3 Reusing EJB home interfaces -- 9.6.4 Using info beans to reduce remote calls -- 9.6.5 Releasing resources in EJBs -- 9.6.6 Using local interfaces when possible -- 9.6.7 Removing stateful session beans when finished -- 9.6.8 Transactions -- 9.6.9 Using CMPs instead of BMPs -- 9.6.10 Message-driven beans -- 9.6.11 Using home methods -- 9.6.12 Using the setEntityContext() method -- 9.6.13 Don't use entity beans as simple data wrappers -- 9.6.14 Minimizing the use of stateful session beans -- 9.6.15 Using Data Class Access Beans -- 9.7 Profiling your application -- 9.7.1 Method speed -- 9.7.2 Finding memory leaks -- 9.8 Using a response time watcher -- Chapter 10. …”
Libro electrónico -
37352
-
37353
-
37354por Castillo Ramos-Bossini, Susana E.Tabla de Contenidos: “…LA ADMINISTRACIÓN Y SU TRANSFORMACIÓN DIGITAL : EL ESTA DO DE LA CUESTIÓN (...) -- 4. BALANCE DE LA SITUACIÓN EN LAS ADMINISTRACI ONES PÚBLICAS DIGITALES : LOS (...) -- CONCLUSIONES -- REFERENCIAS BIBLIOGRÁFICAS…”
Publicado 2022
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
37355por Heller, FranziskaTabla de Contenidos: “…Intro -- Inhalt -- Dank -- KAPITEL 1 Einleitung -- 1.1 „Why do they keep updating the historic movies that are part of our soul?" …”
Publicado 2020
Libro electrónico -
37356Publicado 2020Tabla de Contenidos: “…-- 21.3 Basic approach to thematic analysis -- 21.4 More sophisticated version of thematic analysis -- 21.5 Conclusion -- Key points -- Activity -- 22 Grounded theory -- Overview -- 22.1 Introduction -- 22.2 Development of grounded theory -- 22.3 Data in grounded theory -- 22.4 How to do grounded theory analysis -- 22.5 Computer grounded theory analysis -- 22.6 Evaluation of grounded theory -- 22.7 Conclusion -- Key points -- Activity -- 23 Discourse analysis -- Overview -- 23.1 Introduction -- 23.2 Basic discourse analysis theory -- 23.3 The agenda of discourse analysis -- 23.4 Doing discourse analysis -- 23.5 Conclusion -- Key points -- Activities -- 24 Conversation analysis -- Overview -- 24.1 Introduction -- 24.2 Precepts of conversation analysis -- 24.3 Stages in conversation analysis -- 24.4 Conclusion -- Key points -- Activities -- 25 Interpretative phenomenological analysis -- Overview -- 25.1 Introduction -- 25.2 Philosophical foundations of interpretative phenomenological analysis -- 25.3 Stages in interpretative phenomenological analysis -- 25.4 Conclusion -- Key points -- Activities -- 26 Evaluating qualitative research -- Overview -- 26.1 Introduction -- 26.2 Criteria for novices -- 26.3 Evaluating qualitative research -- 26.4 Validity -- 26.5 Conclusion -- Key points -- Activities -- 27 Improving your qualitative write-up -- Overview -- 27.1 Introduction -- 27.2 Poorly written qualitative report -- 27.3 Critical evaluation -- 27.4 Conclusion -- Key points -- Activities -- Part 5 Research for projects, dissertations and theses -- 28 Developing ideas for research -- Overview -- 28.1 Introduction -- 28.2 Why not a replication study? …”
Libro electrónico -
37357Publicado 2019Tabla de Contenidos: “…-- Definition of Economics -- Two Big Economic Questions -- What, How, and For Whom? -- Do Choices Made in the Pursuit of Self-Interest also Promote the Social Interest? …”
Libro electrónico -
37358Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: DevSecOps Drivers and Challenges -- Security compliance -- ISO 27001 -- Cloud Security Alliance (CSA) -- Federal Information Processing Standards (FIPS) -- Center for Internet Security (CIS) and OpenSCAP - securing your infrastructure -- National Checklist Program (NCP) repository -- OpenSCAP tools -- Legal and security compliance -- New technology (third-party, cloud, containers, and virtualization) -- Virtualization -- Dockers -- Infrastructure as Code (IaC) -- Cloud services hacks/abuse -- Case study - products on sale -- What do hackers do? -- Rapid release -- Summary -- Questions -- Further reading -- Chapter 2: Security Goals and Metrics -- Organization goal -- Strategy and metrics -- Policy and compliance -- Education and guidance -- Development goal/metrics -- Threat assessment -- Threat assessment for GDPR -- Deliverables and development team self-assessment -- Security requirements -- QA goal/metrics -- Design review -- Implementation review -- Third-party components -- IDE-plugin code review -- Static code review -- Target code review -- Security testing -- Operation goal/metrics -- Issue management -- Environment Hardening -- Secure configuration baseline -- Constant monitoring mechanism -- Operational enablement -- Code signing for application deployment -- Application communication ports matrix -- Application configurations -- Summary -- Questions -- Further reading -- Chapter 3: Security Assurance Program and Organization -- Security assurance program -- SDL (Security Development Lifecycle) -- OWASP SAMM -- Security guidelines and processes -- Security growth with business -- Stage 1 - basic security control -- Stage 2 - building a security testing team -- Stage 3 - SDL activities…”
Libro electrónico -
37359Publicado 2018Tabla de Contenidos: “…The switch statement (a GAWK-specific feature) -- Looping statement -- The while loop -- do...while loop statement -- The for loop statement -- For each loop statement -- Statements affecting flow control -- Break usage -- Usage of continue -- Exit usage -- Next usage -- Summary -- Chapter 8: AWK Functions -- Built-in functions -- Arithmetic functions -- The sin (expr) function -- The cos (expr) function -- The atan2 (x, y) function -- The int (expr) function -- The exp (expr) function -- The log (expr) function -- The sqrt (expr) function -- The rand() function -- The srand ([expr]) function -- Summary table of built-in arithmetic functions -- String functions -- The index (str, sub) function -- The length ( string ) function -- The split (str, arr, regex) function -- The substr (str, start, [ length ]) function -- The sub (regex, replacement, string) function -- The gsub (regex, replacement, string) function -- The gensub (regex, replacement, occurrence, [ string ]) function -- The match (string, regex) function -- The tolower (string) function -- The toupper (string) function -- The sprintf (format, expression) function -- The strtonum (string) function -- Summary table of built-in string functions -- Input/output functions -- The close (filename [to/from]) function -- The fflush ([ filename ]) function -- The system (command) function -- The getline command -- Simple getline -- Getline into a variable -- Getline from a file -- Using getline to get a variable from a file -- Using getline to output into a pipe -- Using getline to change the output into a variable from a pipe -- Using getline to change the output into a variable from a coprocess -- The nextfile() function -- The time function -- The systime() function -- The mktime (datespec) function -- The strftime (format, timestamp) function -- Bit-manipulating functions…”
Libro electrónico -
37360Publicado 2021Tabla de Contenidos: “…Looking up the new mapping via /proc/iomem -- MMIO - performing the actual I/O -- Performing 1- to 8-byte reads and writes on MMIO memory regions -- Performing repeating I/O on MMIO memory regions -- Setting and copying on MMIO memory regions -- Understanding and using port-mapped I/O -- PMIO - performing the actual I/O -- A PIO example - the i8042 -- Looking up the port(s) via /proc/ioports -- Port I/O - a few remaining points to note -- Summary -- Questions -- Further reading -- Chapter 4: Handling Hardware Interrupts -- Technical requirements -- Hardware interrupts and how the kernel handles them -- Allocating the hardware IRQ -- Allocating your interrupt handler with request_irq() -- Freeing the IRQ line -- Setting interrupt flags -- Understanding level- and edge-triggered interrupts - a brief note -- Code view 1 - the IXGB network driver -- Implementing the interrupt handler routine -- Interrupt context guidelines - what to do and what not to do -- Don't block - spotting possibly blocking code paths -- Interrupt masking - the defaults and controlling it -- Keep it fast -- Writing the interrupt handler routine itself -- Code view 2 - the i8042 driver's interrupt handler -- Code view 3 - the IXGB network driver's interrupt handler -- IRQ allocation - the modern way - the managed interrupt facility -- Working with the threaded interrupts model -- Employing the threaded interrupt model - the API -- Employing the managed threaded interrupt model - the recommended way -- Code view 4 - the STM32 F7 microcontroller's threaded interrupt handler -- Internally implementing the threaded interrupt -- Why use threaded interrupts? …”
Libro electrónico