Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 448
- Filosofía griega 415
- Diálogos griegos 184
- Tragedia griega 166
- Society & social sciences 162
- Prosa histórica griega 106
- Educación pedagogía 93
- Política 71
- teoría 70
- Humanities 51
- Historia / General 43
- Derecho romano 42
- Filosofía 42
- Guerra del Peloponeso, 431-404 a.C 41
- Teatro griego 40
- Prosa griega 38
- Iglesia Católica 37
- Cultura y civilización 35
- Ciencias Políticas / General 33
- Sermones 32
- Platón 31
- Oratoria griega 30
- Economics, finance, business & management 27
- Història 27
- Documentos pontificios 25
- Medicina 25
- Economía 23
- Literatura 23
- Padres de la Iglesia 20
- Escultura 18
-
4281
-
4282
-
4283Publicado 2020Tabla de Contenidos: “…. -- 229 -- a storytelling experimental beach in Laigueglia sv pp 280249 2020 Authors CC BY 40 International DOI 1036253978885518147124 -- 242 -- between biodiversity and anthropization pp 288258 2020 Authors CC BY 40 International DOI 1036253978885 -- 250 -- the long and winding road from waste to resource pp 297269 2020 Authors CC BY 40 International DOI 1036253978885518147126 -- 259 -- Giuseppe Mazzeo Domitian Coast Rehabilitation outlooks of the Northern coast of Campania pp 308279 2020 Authors CC BY 40 International DOI ... -- 270 -- Andrea Marçel Pidalà Le coste dei Nebrodi tra mosaico paesaggistico beni culturali e criticità complesse Visioni e Scenari Strategici progettuali nel pa ... -- 289 -- il porto e le metamorfosi del waterfront pp 337308 2020 Authors CC BY 40 International DOI 1036253978885518147130 -- 299 -- toward innovative integrated biodiversity management pp 347315 2020 Authors CC BY 40 International DOI 1036253978885518147131 -- 309 -- Claudio Saragosa Michela Chiti Spatial configurations and flows in the morphogenetic processes of settlements A planning experience on the Tuscan ... -- 316 -- Matteo Scamporrino View management in cityport landscapes Livorno applicative experience pp 364337 2020 Authors CC BY 40 International DO ... -- 326 -- Giuseppe Tagarelli Nicola Cantasano Tommaso Caloiero Gaetano Pellicone Integrated Coastal Zone Management of Natura 2000 and cultural heritag ... -- 338 -- a flooding archipelago pp 386362 2020 Authors CC BY 40 International DOI 1036253978885518147135 -- 348 -- Francesco Zullo Lorena Fiorini Alessandro Marucci Bernardino Romano Analysis of the theoretical settlement scenario implemented by the municipa ... -- 363 -- Roberto Bedini Paolo Colantoni Christine PergentMartini Coastal erosion in the Gulf of Follonica and Baratti and coastal defense methods pp 417384 ... -- 379 -- from the Eastern Mediterranean Sea Shoreline Through the Lake Bafa pp 423391 2020 Authors CC BY 40 International DOI 103625397888 -- 385 -- Barış Akçalı Ergün Taşkın Gökhan Kaman Alper Evcen Hayati Çalık Onur Akyol Posidonia Oceanica Monitoring System on the Coast of Aegean Sea ... -- 475 -- Leonardo Beccarisi Cosimo Gaspare Giannuzzi Giorgio DAndria Marco Greco Habitat and flora monitoring in the Regional Nature Reserve of Palud ... -- 483 -- Roberto Bedini Marco Bedini Elisa Salvadori A new transplanting method of Posidonia oceanicaLinnaeus Delile 1813 plants pp 530500 2020 Autho ... -- 492 -- A Preliminary Assessment of the Efficiency of Drones in Mapping ShallowWater Benthic Assemblages pp 539509 2020 Authors CC BY 40 Internati ... -- 501 -- Giancarlo Bellissimo Benedetto Sirchia Vincenzo Ruvolo Monitoring of Posidonia oceanica meadows in the Sicilian coasts under the Water Framewo ... -- 510 -- Giancarlo Bellissimo Benedetto Sirchia Vincenzo Ruvolo Assessment of the ecological status of Sicilian coastal waters according to a macroalgae base ... -- 519 -- Maria Carla de Francesco Igino Chiuchiarelli Ludovico Frate Maria Laura Carranza Tommaso Pagliani Angela Stanisci Towards new marinecoastal N ... -- 529 -- Halyna Humeniuk Olena Voloshyn Volodymyr Voloshyn Seasonal Dynamics of Cadmium and Plumbum in the Turiya and Pripyat Rivers pp 57854 ... -- 540 -- Hajar Idmoussi Laila Somoue Karim Hilmi Omar Ettahiri Tarik Baibai Ahmed Makaoui Ahmed Errhif Phytoplankton assemblage Characterization al ... -- 547 -- primi risultati -- 557 -- the case of the gulf of Lion Marine -- 569 -- FV Romano V Scalcione P DAntonio C DAntonio E Lacetra Precision agriculture and conservation of coastal landscapes pp 618585 2020 Authors C ..…”
Libro electrónico -
4284
-
4285
-
4286
-
4287
-
4288
-
4289
-
4290
-
4291
-
4292
-
4293Publicado 2019Tabla de Contenidos: “…Morales Break line and shotpile surfaces modeling in design of large-scale blasts S.V. Lukichev, O.V. Nagovitsyn & A.S. Shishkin Incorporation of mineralisation risk into underground mine planning R.C. …”
Libro electrónico -
4294Publicado 2021Tabla de Contenidos: “…Univariate Stochastic Volatility models -- 7.5.1. Zero-Mean AR(1) SV Model -- 7.5.2. Normal Mixture Approximation -- 7.5.3. …”
Libro electrónico -
4295Publicado 2020“…This book will be updated to comprehensively include SAN Volume Controller SA2 and SV2 and FlashSystem 7200 in due course…”
Libro electrónico -
4296Publicado 2017Tabla de Contenidos: “…4.10.3 Handover between LTE and CDMA2000 -- 4.11 Carrier Aggregation -- 4.11.1 CA Types, Bandwidth Classes and Band Combinations -- 4.11.2 CA Configuration, Activation and Deactivation -- 4.12 Network Planning Aspects -- 4.12.1 Single Frequency Network -- 4.12.2 Cell-Edge Performance -- 4.12.3 Self-Organizing Network Functionality -- 4.13 CS-Fallback for Voice and SMS Services with LTE -- 4.13.1 SMS over SGs -- 4.13.2 CS-Fallback for Voice Calls -- 4.14 Voice in Combined LTE and CDMA2000 Networks (SV-LTE) -- 4.15 Network Sharing - MOCN and MORAN -- 4.15.1 National Roaming -- 4.15.2 MOCN (Multi-Operator Core Network) -- 4.15.3 MORAN (Mobile Operator Radio Access Network) -- 4.16 From Dipoles to Active Antennas and Gigabit Backhaul -- 4.17 IPv6 in Mobile Networks -- 4.17.2 IPv6 and International Roaming -- 4.17.3 IPv6 and Tethering -- 4.17.4 IPv6-Only Connectivity -- 4.18 Network Function Virtualization -- 4.18.1 Virtualization on the Desktop -- 4.18.2 Running an Operating System in a Virtual Machine -- 4.18.3 Running Several Virtual Machines Simultaneously -- 4.18.4 Virtual Machine Snapshots -- 4.18.5 Cloning a Virtual Machine -- 4.18.6 Virtualization in Data Centers in the Cloud -- 4.18.7 Managing Virtual Machines in the Cloud -- 4.18.8 Network Function Virtualization -- 4.18.9 Virtualizing Routers -- 4.18.10 Software-Defined Networking -- 4.19 Machine Type Communication and the Internet of Things -- 4.19.1 LTE Cat-1 Devices -- 4.19.2 LTE Cat-0 Devices and PSM -- 4.19.3 LTE Cat-M1 Devices -- 4.19.4 LTE NB1 (NB-IoT) Devices -- 4.19.5 NB-IoT - Deployment Options -- 4.19.6 NB-IoT - Air Interface -- 4.19.7 NB-IoT - Control Channels and Scheduling -- 4.19.8 NB-IoT Multicarrier Operation -- 4.19.9 NB-IoT Throughput and Number of Devices per Cell -- 4.19.10 NB-IoT Power Consumption Considerations -- 4.19.11 NB-IoT - High Latency Communication…”
Libro electrónico -
4297por Ferrer Martínez, JuanTabla de Contenidos: “….) -- 2.3.1 XAML -- 2.3.2 XUL -- 2.3.3 UIML -- 2.3.4 SvG -- 2.3.5 MXML -- 2.4 HERRAMIENTAS LIBRES Y PROPIETARIAS (...) -- 2.4.1 GLADE -- 2.4.2 BLEND PARA vISUAL STUDIO -- 2.5 PALETAS Y VISTAS -- 2.5.1 GLADE -- 2.5.2 BLEND PARA VISUAL STUDIO -- 2.6 COMPONENTES CONTENEDORES DE CONTROLES -- 2.6.1 GLADE -- 2.6.2 BLEND PARA vISUAL STUDIO -- 2.7 CONTROLES, PROPIEDADES -- 2.8 UBICACIÓN, TAMAÑO Y ALINEAMIENTO DE CONTROLES -- 2.9 EVENTOS, CONTROLADORES. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4298
-
4299Publicado 2015“…Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. …”
Libro electrónico -
4300Publicado 2013“…Como en tantas otras ocasiones, el Diccionario de Autoridades (1726, s.v. architectura) roza la perfección: Ciéncia que enseña à edificar tales fábricas, que puedan commodamente habitar en ellas los hombres, atendiendo à su firmeza, conveniéncia y hermosúra, proporcionándolas al fin para que se erígen. …”
Enlace del recurso
Electrónico