Mostrando 381 - 400 Resultados de 415 Para Buscar '"Aba"', tiempo de consulta: 0.19s Limitar resultados
  1. 381
    Publicado 2024
    “…Nahj al-Balāghah , the celebrated compendium of orations, letters, and sayings of Ê¿AlÄ« ibn AbÄ« á1¬Älib (d. 40/661) compiled by al-SharÄ«f al-Raá ̧ōÄ« (d. 406/1015), is a masterpiece of Arabic literature and Islamic wisdom studied and memorized avidly and continually for over a thousand years. …”
    Libro electrónico
  2. 382
    Publicado 2008
    “…With its foundation in applied behavior analysis (ABA), positive behavior support (PBS) is a social ecology approach that continues to play an increasingly integral role in public education as well as mental health and social services nationwide. …”
    Libro electrónico
  3. 383
    Publicado 2014
    Tabla de Contenidos: “…Interrupting threads and the graceful shutdownVolatile variables; The Java Memory Model; Immutable objects and final fields; Summary; Exercises; Chapter 3: Traditional Building Blocks of Concurrency; The Executor and ExecutionContext objects; Atomic primitives; Atomic variables; Lock-free programming; Implementing locks explicitly; The ABA problem; Lazy values; Concurrent collections; Concurrent queues; Concurrent sets and maps; Concurrent traversals; Creating and handling processes; Summary; Exercises; Chapter 4: Asynchronous Programming with Futures and Promises; Futures…”
    Libro electrónico
  4. 384
    por Wallis, Pete
    Publicado 2010
    Tabla de Contenidos: “…THE CRIMINAL JUSTICE SYSTEMChapter 6:A Swift Navigation through the Criminal Justice System; Background; Age of criminal responsibility; ABCs, ABAs, ASBOs and CRASBOs; Reporting the crime; The investigation; The decision to prosecute; Pre-court options; Court; The court case; Sentencing; Appeals; Compensation orders; Criminal injuries compensation; Probation Service; Victim's Code of Practice: Being kept informed; Resources; Chapter 7:Restorative Approaches; What is a restorative approach?…”
    Libro electrónico
  5. 385
  6. 386
    por Carter, Rob
    Publicado 2012
    Tabla de Contenidos: “…3 Syntax and CommunicationTypographic syntax; Typographic space; Visual Hierarchy; ABA form; 4 Legibility; Basic principles of legibility; Distinguishing characteristics of letters; The nature of words; Capital and lowercase letters; Interletter and interword spacing; Type size, line length, and interline spacing; Weight; Character width; Italics; Legibility and color; Justified and unjustified typography; Paragraphs and indentions; Legibility and electronic page design; Typographic details; 5 The Typographic Grid; Background; Structure and space; Proportion; Single column grids…”
    Libro electrónico
  7. 387
    Publicado 1850
    Tabla de Contenidos: “…Tomo I: A-ALL (1156 páginas, [9] hojas de láminas, [2] hojas de láminas plegadas) -- Tomo II: AMA-AZZ (1106 páginas, [16] hojas de láminas, [3] hojas de láminas plegadas) –- Tomo III: B-BYZ (1092 páginas, [12] hojas de láminas, [3] hojas de láminas plegadas) –- Tomo IV: C-CEL (1097 páginas, [4] hojas de láminas, [1] hoja de lámina plegada) –- Tomo V: CLL-CON (952 páginas, [7] hojas de láminas, [1] hoja de mapas plegados) –- Tomo VI: CON-CHU (1847 páginas, [5] hojas de láminas, [1] hojas de láminas plegadas) -- Tomo VII: D-DZE (1023 páginas, [3] hojas de láminas) -- Tomo VIII: E-EZZ (1247 páginas, [4] hojas de láminas, [3] hojas de láminas plegadas) -- Tomo IX: F-FYT (875 páginas, [1] hojas de láminas) -- Tomo X: G-GYU (1010 páginas, [6] hojas de láminas, [1] hojas de láminas plegadas) -- Tomos XI: H-IZU (1166 páginas, [6] hojas de láminas, [1] hoja de lámina plegada) -- Tomo XII: J-LOU (1143 páginas, [4] hojas de láminas) -- Tomo XIII: LOU-MOL (1007 páginas, [5] hojas de láminas, [1] hoja de lámina plegada) -- Tomo XIV: MI-ÑUP (1208 páginas, [4] hojas de láminas, [1] hoja de mapa plegado) -- Tomo XV: O-PEN (1232 páginas, [7] hojas de láminas, [1] hoja de mapa plegado) -- Tomo XVI: PEN-POL (1004 páginas, [7] hojas de láminas) -- Tomo XVII: POL-QVI (895 páginas) -- Tomo XVIII: R-RZE (1080 páginas, [7] hojas de láminas, [1] hojas de mapa plegado) -- Tomo XIX: S-SEN (1035 páginas, [3] hojas de láminas) -- Tomo XXI: T-TMO (1122 páginas, [4] hojas de láminas) -- Tomo XXII: TO-VAR (987, 171 páginas, [4] hojas de lámina) -- Tomo XXIII: VAR-ZYR (876, 415 páginas, [3] hojas de láminas, [1] hojas de mapa plegado) -- Tomo XXIV: ABA-GUZ (1204 páginas) -- T.XXV: HAB-ZUL (1240 páginas) -- Tomo XXVI: A-EZZE Nuevo apéndice (1380 páginas, [7] hojas de láminas) -- Tomo XXVII: E-NUB Nuevo apéndice (1331, [1] páginas, [7] hojas de láminas) -- Tomo XXVIII: O-Z Nuevo apéndice (1046 páginas, [4] hojas de láminas, [1] hoja de mapa plegado)…”
    Libro
  8. 388
    Libro electrónico
  9. 389
    Publicado 2020
    “…A Literary History of Medicine by the Syrian physician Ibn AbÄ« Uá1£aybiÊ¿ah (d. 1270) is the earliest comprehensive history of medicine. …”
    Libro electrónico
  10. 390
    Publicado 2016
    “…La modificación de conducta, o análisis aplicado de la conducta (ABA, según sus siglas en inglés) es un área de la psicología experimental dirigida a la aplicación de los principios del aprendizaje a la modificación del comportamiento humano. …”
    Libro
  11. 391
    Publicado 2015
    Tabla de Contenidos: “…; Using locks; Lock statement; Monitor class; Reader-writer lock; Spin lock; Thread.SpinWait; System.Threading.SpinWait; System.Threading.SpinLock; Optimization strategy; Lock localization; Shared data minimization; Summary; Chapter 2: Lock-free Concurrency; Memory model and compiler optimizations; The System.Threading.Interlocked class; Interlocked internals; Writing lock-free code; The ABA problem; The lock-free stack…”
    Libro electrónico
  12. 392
    por Herlihy, Maurice
    Publicado 2012
    Tabla de Contenidos: “…Practice -- 7 Spin Locks and Contention -- 7.1 Welcome to the Real World -- 7.2 Test-And-Set Locks -- 7.3 TAS-Based Spin Locks Revisited -- 7.4 Exponential Backoff -- 7.5 Queue Locks -- 7.6 A Queue Lock with Timeouts -- 7.7 A Composite Lock -- 7.7.1 A Fast-Path Composite Lock -- 7.8 Hierarchical Locks -- 7.9 One Lock To Rule Them All -- 7.10 Chapter Notes -- 7.11 Exercises -- 8 Monitors and Blocking Synchronization -- 9 Linked Lists: The Role of Locking -- 10 Concurrent Queues and the ABA Problem -- 11 Concurrent Stacks and Elimination -- 12 Counting, Sorting, and Distributed Coordination -- 13 Concurrent Hashing and Natural Parallelism -- 14 Skip lists and Balanced Search -- 15 Priority Queues -- 16 Futures, Scheduling, and Work Distribution -- 17 Barriers -- 18 Transactional Memory -- III. …”
    Libro electrónico
  13. 393
    por Penate, Juan, Escarpanter, Jose, aut
    Publicado 2010
    Tabla de Contenidos: “…La neutralización y el archifonema; La sí1aba; El diptongo; El triptongo; El hiato; Sinéresis; 4 LA MORFOLOGÍA; El morfema y sus clases; La palabra. …”
    Libro electrónico
  14. 394
    por Jacobs, Sheri
    Publicado 2014
    Tabla de Contenidos: “…; Lead Scoring Basics; Assigning Points: A Range of Methods; Scoring Model for Legal Association; Determining Lifetime Value; Case Study: The ABA's Approach to Grabbing Low-Hanging Fruit; Listen, Tweak, and Improve; Keep It Fresh; The VIP Sure Thing; Action Steps to Create the Right List; Action Steps to Apply the Right Marketing; Chapter 6: Behavior and Preference Are Very Different Things; Dig Below the Obvious to Make Decisions; People Don't Know What They Don't Know…”
    Libro electrónico
  15. 395
    por Torres, Pablo Sebastián
    Publicado 2009
    “…Among these, we identified a new factor that is secreted by Xcc, which has the ability to reverse the stomatal closure induced by abscisic acid (ABA), lipopolysaccharide (LPS) or bacteria. rpfC and rpfF mutants cannot reverse the stomatal closure, showing that the synthesis of this factor is also regulated by the rpf / DSF system…”
    Enlace del recurso
    Tesis
  16. 396
    Publicado 2014
    Tabla de Contenidos: “…3.7.1 C2H2 ZF DBD and overall structure of Zat73.8 Conclusion and future perspectives; References; 4 Plant Resistance under Cold Stress: Metabolomics, Proteomics, and Genomic Approaches; 4.1 Introduction; 4.2 Causes of freezing injury; 4.3 Freezing-tolerance mechanisms; 4.3.1 Metabolomic approaches; 4.3.2 LEA proteins; 4.3.3 HSP proteins; 4.3.4 COR genes; 4.3.5 Osmoprotectants; 4.4 Antioxidant defense under cold stress; 4.5 Cold signal transducers; 4.5.1 Ca2+ influx channels; 4.5.2 ABA and stress signal transduction networks; 4.6 Conclusion and future prospects; References…”
    Libro electrónico
  17. 397
  18. 398
    por Martón Gómez, José Javier
    Publicado 2013
    Tabla de Contenidos: “….; 2.1 Modelo basado en una curva cardioide; 2.2 Comparación entre variedades y mutantes de Lotus japonicus; 2.2.1 Comparación entre variedades; 2.2.2 Comparación entre cada variedad y sus genotipos mutantes; 2.2.3 Comparación entre las semillas secas y embebidas; 2.2.4 Comparación de semillas secas de MG-20 con el mutante beyma insensible a ABA; 2.3 Comparación entre variedades y mutantes de Medicago; 2.3.1 Comparación de la variedad A17 de M. truncatula con su mutante sickle…”
    Libro electrónico
  19. 399
    Publicado 2020
    “…A Literary History of Medicine by the Syrian physician Ibn AbÄ« Uá1£aybiÊ¿ah (d. 1270) is the earliest comprehensive history of medicine. …”
    Libro electrónico
  20. 400
    Publicado 2022
    Tabla de Contenidos: “…-- Preparation -- Identification or Analysis -- Containment, Mitigation, or Eradication -- Recovery -- Post-incident -- Your Computer Security Incident Response Team -- Cybersecurity Frameworks -- NIST Cybersecurity Framework -- ISO 27000 Cybersecurity Frameworks -- CIS Controls -- COBIT Cybersecurity Framework -- Security Frameworks and Cloud Security -- Chapter 6 Step 6: Control Your Data Assets -- The CIA Triad -- Access Control -- Patch Management -- Physical Security and Your Data -- Malware -- Cryptography Basics -- Bring Your Own Device and Working from Home -- Managed Service Providers -- The Dark Web and Your Data -- Security Leaders on Cyber Defense -- Control Your Data -- Chapter 7 Step 7: Understand the Human Factor -- Social Engineering -- Phishing -- What Can NFTs and ABA Teach Us About Social Engineering? -- How to Prevent Social Engineering Attacks on Your Business -- UI and UX Design -- Internal Threats -- Hacktivism -- Chapter 8 Step 8: Build Redundancy and Resilience -- Understanding Data and Networks -- Building Capacity and Scalability with the Power of the Cloud -- Back It Up, Back It Up, Back It Up -- RAID -- What Ransomware Taught Business About Backups -- Business Continuity -- Disaster Recovery -- Chapter 9 Afterword -- Step 1 -- The Most Notorious Cyberattacker Was Actually a Con Man -- A Strong Security Culture Requires All Hands on Deck -- Hackers Are the Good Guys, Actually -- What Is Security Culture? …”
    Libro electrónico