Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 489
- Filosofía griega 456
- Diálogos griegos 207
- Tragedia griega 172
- Society & social sciences 162
- Prosa histórica griega 118
- Educación pedagogía 93
- Política 84
- teoría 84
- Derecho romano 57
- Humanities 51
- Cultura y civilización 47
- Filosofía 45
- Prosa griega 44
- Historia / General 43
- Guerra del Peloponeso, 431-404 a.C 42
- Literatura 42
- Teatro griego 41
- Platón 38
- Iglesia Católica 34
- Ciencias Políticas / General 33
- Economía 33
- Oratoria griega 31
- Història 30
- Sermones 29
- Economics, finance, business & management 27
- Medicina 27
- Documentos pontificios 25
- Padres de la Iglesia 20
- Visigodos 19
-
4041
-
4042
-
4043
-
4044
-
4045
-
4046Publicado 2019Tabla de Contenidos: “…Morales Break line and shotpile surfaces modeling in design of large-scale blasts S.V. Lukichev, O.V. Nagovitsyn & A.S. Shishkin Incorporation of mineralisation risk into underground mine planning R.C. …”
Libro electrónico -
4047Publicado 2021Tabla de Contenidos: “…Univariate Stochastic Volatility models -- 7.5.1. Zero-Mean AR(1) SV Model -- 7.5.2. Normal Mixture Approximation -- 7.5.3. …”
Libro electrónico -
4048
-
4049Publicado 2017Tabla de Contenidos: “…4.10.3 Handover between LTE and CDMA2000 -- 4.11 Carrier Aggregation -- 4.11.1 CA Types, Bandwidth Classes and Band Combinations -- 4.11.2 CA Configuration, Activation and Deactivation -- 4.12 Network Planning Aspects -- 4.12.1 Single Frequency Network -- 4.12.2 Cell-Edge Performance -- 4.12.3 Self-Organizing Network Functionality -- 4.13 CS-Fallback for Voice and SMS Services with LTE -- 4.13.1 SMS over SGs -- 4.13.2 CS-Fallback for Voice Calls -- 4.14 Voice in Combined LTE and CDMA2000 Networks (SV-LTE) -- 4.15 Network Sharing - MOCN and MORAN -- 4.15.1 National Roaming -- 4.15.2 MOCN (Multi-Operator Core Network) -- 4.15.3 MORAN (Mobile Operator Radio Access Network) -- 4.16 From Dipoles to Active Antennas and Gigabit Backhaul -- 4.17 IPv6 in Mobile Networks -- 4.17.2 IPv6 and International Roaming -- 4.17.3 IPv6 and Tethering -- 4.17.4 IPv6-Only Connectivity -- 4.18 Network Function Virtualization -- 4.18.1 Virtualization on the Desktop -- 4.18.2 Running an Operating System in a Virtual Machine -- 4.18.3 Running Several Virtual Machines Simultaneously -- 4.18.4 Virtual Machine Snapshots -- 4.18.5 Cloning a Virtual Machine -- 4.18.6 Virtualization in Data Centers in the Cloud -- 4.18.7 Managing Virtual Machines in the Cloud -- 4.18.8 Network Function Virtualization -- 4.18.9 Virtualizing Routers -- 4.18.10 Software-Defined Networking -- 4.19 Machine Type Communication and the Internet of Things -- 4.19.1 LTE Cat-1 Devices -- 4.19.2 LTE Cat-0 Devices and PSM -- 4.19.3 LTE Cat-M1 Devices -- 4.19.4 LTE NB1 (NB-IoT) Devices -- 4.19.5 NB-IoT - Deployment Options -- 4.19.6 NB-IoT - Air Interface -- 4.19.7 NB-IoT - Control Channels and Scheduling -- 4.19.8 NB-IoT Multicarrier Operation -- 4.19.9 NB-IoT Throughput and Number of Devices per Cell -- 4.19.10 NB-IoT Power Consumption Considerations -- 4.19.11 NB-IoT - High Latency Communication…”
Libro electrónico -
4050por Ferrer Martínez, JuanTabla de Contenidos: “….) -- 2.3.1 XAML -- 2.3.2 XUL -- 2.3.3 UIML -- 2.3.4 SvG -- 2.3.5 MXML -- 2.4 HERRAMIENTAS LIBRES Y PROPIETARIAS (...) -- 2.4.1 GLADE -- 2.4.2 BLEND PARA vISUAL STUDIO -- 2.5 PALETAS Y VISTAS -- 2.5.1 GLADE -- 2.5.2 BLEND PARA VISUAL STUDIO -- 2.6 COMPONENTES CONTENEDORES DE CONTROLES -- 2.6.1 GLADE -- 2.6.2 BLEND PARA vISUAL STUDIO -- 2.7 CONTROLES, PROPIEDADES -- 2.8 UBICACIÓN, TAMAÑO Y ALINEAMIENTO DE CONTROLES -- 2.9 EVENTOS, CONTROLADORES. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4051Publicado 2020“…This book will be updated to comprehensively include SAN Volume Controller SA2 and SV2 and FlashSystem 7200 in due course…”
Libro electrónico -
4052
-
4053Publicado 2015“…Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. …”
Libro electrónico -
4054Publicado 2013“…Como en tantas otras ocasiones, el Diccionario de Autoridades (1726, s.v. architectura) roza la perfección: Ciéncia que enseña à edificar tales fábricas, que puedan commodamente habitar en ellas los hombres, atendiendo à su firmeza, conveniéncia y hermosúra, proporcionándolas al fin para que se erígen. …”
Enlace del recurso
Electrónico