Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,464
- Biblia 2,979
- Història 1,612
- Filosofía 1,455
- Crítica e interpretación 1,391
- Bíblia 1,249
- Teología 1,181
- Església Catòlica 1,081
- Teología dogmática 980
- Iglesia Católica 954
- Liturgia 898
- Moral cristiana 853
- History 818
- Obres anteriors al 1800 785
- Sermones 723
- Derecho canónico 688
- Litúrgia 573
- -Historia 564
- Management 560
- Derecho 554
- Engineering & Applied Sciences 545
- Teologia 507
- Biografías 506
- Matemáticas 503
- Religión 500
- Música 487
- Historia y crítica 467
- Estudio y enseñanza (Primaria) 424
- Sermons castellans 423
- Jesucristo 408
-
169821por Rahner, Karl (S.I.)Tabla de Contenidos: “…Das Zweite Vatikanum : beiträge zum Konzil und seiner Interpretation / bearbeitet von Günther Wassilowsky -- 22.1a y 22.1b. Dogmatik nach dem Konzil. Grundlegung der Theologie, Gotteslehre und Christologie -- 22.2. …”
Publicado 1995
Libro -
169822Publicado 2010Tabla de Contenidos: “…Teaching Social Inequalities in Health: Barriers and Opportunities Carles Muntaner and Haejoo Chung APPENDICES A. Selected References B. Guidelines for Health Equity C. Figure 1. How Social Justice Becomes Embodied D. …”
Libro -
169823Publicado 1996Tabla de Contenidos: “…Evelina Galang -- Fredo Avila / Gina Apostol -- Night Sweats / Joel B. Tan -- States of Being / Bino Realuyo -- The Lowest Blue Flame Before Nothing / Lara Stapleton -- Rolling the R's / R. …”
Libro -
169824Publicado 1896Tabla de Contenidos: “…Proceso común (continuación), B. Idem. Proceso familiar, Apéndice). -- T. XXIV : (comprende las convocatorias de las Cortes de Barcelona de 1460, de Lérida de 1460, de Barcelona de 1472; el parlamento de cervera de 1468-1469 y las Cortes de Perpiñán-Barcelona de 1473-1479, A. …”
Libro -
169825por Cabanzo de Ponce de León, RocíoTabla de Contenidos: “…Think about becoming -- B. The Rhizome Model -- C. On the logics of One and Two -- D. …”
Publicado 2020
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
169826Publicado 2013Tabla de Contenidos: “…< -- /BLOCKQUOTE> -- -- FORMATO DE TEXTO -- TEXTO EN NEGRITAS < -- B> -- ...< -- /B> -- -- TEXTO EN CURSIVA O ITÁLICA < -- I> -- ...…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
169827por Schwartz, JorgeTabla de Contenidos: “…(Hugh) -- Austen, Jane -- Austin -- autofiguración -- representaciones autobiográficas -- Avellaneda -- Avellanos, José, doctor -- Averno -- Averroes -- Avicena -- Axum, fortaleza de -- Ayacucho -- Áyax -- Azorín -- Azote de Dios -- B -- Baal -- Baal Shem Tobh [Tov], Israel -- Bacon, Francis -- Bacourt, baronesa de -- Baedeker, guía -- Bahr, Hermann…”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
169828Publicado 2014Tabla de Contenidos: “…Rodríguez Jiménez -- Fiabilidad y apliabilidad de las pruebas CMJ, RM y ROM en bailarines de danza clásica / B- Pascual, V. Javaloyes, C. Blasco-Lafarga, E. …”
Accés lliure a "Apuntes para reescribir la historia: Marina Lie Goubonina (Noreg). Ballet y franquismo" de Ester Vendrell
Libro -
169829Publicado 1996Tabla de Contenidos: “…Cantallops/E. Cantallops/D. Closes/B. Remoué/M. Simón ; E. Donato/M. Jiménez ; C. …”
Libro -
169830por Ferrer, AldoTabla de Contenidos:
Publicado 1977Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
169831Publicado 2014Tabla de Contenidos: “…Cover -- Title Page -- Contents -- Preface -- Acknowledgments -- About the Author -- Chapter 0 Guide for Readers and Instructors -- 0.1 Outline of the Book -- 0.2 A Roadmap for Readers and Instructors -- 0.3 Internet and Web Resources -- 0.4 Standards -- Unit One Fundamentals -- Part One Overview -- Chapter 1 Data Communications, Data Networks, and the Internet -- 1.1 Data Communications and Networking for Today's Enterprise -- 1.2 A Communications Model -- 1.3 Data Communications -- 1.4 Networks -- 1.5 The Internet -- 1.6 An Example Configuration -- Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications -- 2.1 The Need for a Protocol Architecture -- 2.2 A Simple Protocol Architecture -- 2.3 The TCP/IP Protocol Architecture -- 2.4 Standardization within a Protocol Architecture -- 2.5 Traditional Internet-Based Applications -- 2.6 Multimedia -- 2.7 Sockets Programming -- 2.8 Recommended Reading and Animation -- 2.9 Key Terms, Review Questions, and Problems -- 2.10 Sockets Programming Assignments -- Appendix 2A The Trivial File Transfer Protocol -- Part Two Data Communications -- Chapter 3 Data Transmission -- 3.1 Concepts and Terminology -- 3.2 Analog and Digital Data Transmission -- 3.3 Transmission Impairments -- 3.4 Channel Capacity -- 3.5 Recommended Reading -- 3.6 Key Terms, Review Questions, and Problems -- Appendix 3A Decibels and Signal Strength -- Chapter 4 Transmission Media -- 4.1 Guided Transmission Media -- 4.2 Wireless Transmission -- 4.3 Wireless Propagation -- 4.4 Line-of-Sight Transmission -- 4.5 Recommended Reading -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Signal Encoding Techniques -- 5.1 Digital Data, Digital Signals -- 5.2 Digital Data, Analog Signals -- 5.3 Analog Data, Digital Signals -- 5.4 Recommended Reading and Animations -- 5.5 Key Terms, Review Questions, and Problems -- Chapter 6 Error Detection and Correction -- 6.1 Types of Errors -- 6.2 Error Detection -- 6.3 Parity Check -- 6.4 The Internet Checksum -- 6.5 Cyclic Redundancy Check (CRC) -- 6.6 Forward Error Correction -- 6.7 Recommended Reading and Animations -- 6.8 Key Terms, Review Questions, and Problems -- Chapter 7 Data Link Control Protocols -- 7.1 Flow Control -- 7.2 Error Control -- 7.3 High-Level Data Link Control (HDLC) -- 7.4 Recommended Reading and Animations -- 7.5 Key Terms, Review Questions, and Problems -- Chapter 8 Multiplexing -- 8.1 Frequency-Division Multiplexing -- 8.2 Synchronous Time-Division Multiplexing -- 8.3 Cable Modem -- 8.4 Asymmetric Digital Subscriber Line -- 8.5 xDSL -- 8.6 Multiple Channel Access -- 8.7 Recommended Reading and Animations -- 8.8 Key Terms, Review Questions, and Problems -- Part Three Wide Area Networks -- Chapter 9 WAN Technology and Protocols -- 9.1 Switched Communications Networks -- 9.2 Circuit-Switching Networks -- 9.3 Circuit-Switching Concepts -- 9.4 Softswitch Architecture -- 9.5 Packet-Switching Principles -- 9.6 Asynchronous Transfer Mode -- 9.7 Recommended Reading -- 9.8 Key Terms, Review Questions, and Problems -- Chapter 10 Cellular Wireless Networks -- 10.1 Principles of Cellular Networks -- 10.2 Cellular Network Generations -- 10.3 LTE-Advanced -- 10.4 Recommended Reading -- 10.5 Key Terms, Review Questions, and Problems -- Part Four Local Area Networks -- Chapter 11 Local Area Network Overview -- 11.1 Bus and Star Topologies -- 11.2 LAN Protocol Architecture -- 11.3 Bridges -- 11.4 Hubs and Switches -- 11.5 Virtual LANs -- 11.6 Recommended Reading and Animations -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Ethernet -- 12.1 Traditional Ethernet -- 12.2 High-Speed Ethernet -- 12.3 IEEE 802.1Q VLAN Standard -- 12.4 Recommended Reading and Animations -- 12.5 Key Terms, Review Questions, and Problems -- Appendix 12A Digital Signal Encoding for LANs -- Appendix 12B Scrambling -- Chapter 13 Wireless LANs -- 13.1 Overview -- 13.2 IEEE 802.11 Architecture and Services -- 13.3 IEEE 802.11 Medium Access Control -- 13.4 IEEE 802.11 Physical Layer -- 13.5 Gigabit Wi-Fi -- 13.6 IEEE 802.11 Security Considerations -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- Part Five Internet and Transport Protocols -- Chapter 14 The Internet Protocol -- 14.1 Principles of Internetworking -- 14.2 Internet Protocol Operation -- 14.3 Internet Protocol -- 14.4 IPv6 -- 14.5 Virtual Private Networks and IP Security -- 14.6 Recommended Reading and Animations -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Transport Protocols -- 15.1 Connection-Oriented Transport Protocol Mechanisms -- 15.2 TCP -- 15.3 UDP -- 15.4 Recommended Reading and Animations -- 15.5 Key Terms, Review Questions, and Problems -- Unit Two A dvanced Topics in Data Communications and Networking -- Part Six Data Communications and Wireless Networks -- Chapter 16 Advanced Data Communications Topics -- 16.1 Analog Data, Analog Signals -- 16.2 Forward Error-Correcting Codes -- 16.3 ARQ Performance Issues -- 16.4 Recommended Reading and Animations -- 16.5 Key Terms, Review Questions, and Problems -- Chapter 17 Wireless Transmission Techniques -- 17.1 MIMO Antennas -- 17.2 OFDM, OFDMA, and SC-FDMA -- 17.3 Spread Spectrum -- 17.4 Direct Sequence Spread Spectrum -- 17.5 Code Division Multiple Access -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Networks -- 18.1 Fixed Broadband Wireless Access -- 18.2 WiMAX/IEEE 802.16 -- 18.3 Bluetooth Overview -- 18.4 Bluetooth Radio Specification -- 18.5 Bluetooth Baseband Specification -- 12.5 Key Terms, Review Questions, and Problems -- Appendix 12A Digital Signal Encoding for LANs -- Appendix 12B Scrambling -- Chapter 13 Wireless LANs -- 13.1 Overview -- 13.2 IEEE 802.11 Architecture and Services -- 13.3 IEEE 802.11 Medium Access Control -- 13.4 IEEE 802.11 Physical Layer -- 13.5 Gigabit Wi-Fi -- 13.6 IEEE 802.11 Security Considerations -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- Part Five Internet and Transport Protocols -- Chapter 14 The Internet Protocol -- 14.1 Principles of Internetworking -- 14.2 Internet Protocol Operation -- 14.3 Internet Protocol -- 14.4 IPv6 -- 14.5 Virtual Private Networks and IP Security -- 14.6 Recommended Reading and Animations -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Transport Protocols -- 15.1 Connection-Oriented Transport Protocol Mechanisms -- 15.2 TCP -- 15.3 UDP -- 15.4 Recommended Reading and Animations -- 15.5 Key Terms, Review Questions, and Problems -- Unit Two A dvanced Topics in Data Communications and Networking -- Part Six Data Communications and Wireless Networks -- Chapter 16 Advanced Data Communications Topics -- 16.1 Analog Data, Analog Signals -- 16.2 Forward Error-Correcting Codes -- 16.3 ARQ Performance Issues -- 16.4 Recommended Reading and Animations -- 16.5 Key Terms, Review Questions, and Problems -- Chapter 17 Wireless Transmission Techniques -- 17.1 MIMO Antennas -- 17.2 OFDM, OFDMA, and SC-FDMA -- 17.3 Spread Spectrum -- 17.4 Direct Sequence Spread Spectrum -- 17.5 Code Division Multiple Access -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Networks -- 18.1 Fixed Broadband Wireless Access -- 18.2 WiMAX/IEEE 802.16 -- 18.3 Bluetooth Overview -- 18.4 Bluetooth Radio Specification -- 18.5 Bluetooth Baseband Specification -- 24.3 Web Access and HTTP -- 24.4 Recommended Reading and Animations -- 24.5 Key Terms, Review Questions, and Problems -- Chapter 25 Internet Multimedia Support -- 25.1 Real-Time Traffic -- 25.2 Voice Over IP -- 25.3 Session Initiation Protocol -- 25.4 Real-Time Transport Protocol (RTP) -- 25.5 Recommended Reading -- 25.6 Key Terms, Review Questions, and Problems…”
Libro electrónico -
169832Publicado 2019Tabla de Contenidos: “…Couverture des indicateurs -- Annexe B. Participation au Cycle de suivi 2018.…”
Libro electrónico -
169833por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…La loi de responsabilité budgétaire de 1994 -- Tableau B1. Le cadre budgétaire dans un certain nombre de pays -- Le processus de réforme depuis 1996 -- Encadré 3. …”
Publicado 1999
Libro electrónico -
169834por Ozer, JanTabla de Contenidos: “…Keep Your Shots Steady -- Follow The Action -- Use Trucking Shots -- Find Unusual Angles -- Lean Forward Or Backward -- Get Wide And Tight Shots -- Shoot Matched Action -- Get Sequences -- Avoid Fast Pans And Snap Zooms -- Shoot Cutaways -- Use Lights -- Grab Good Sound Bites -- Get Plenty Of Natural Sound -- Plan Your Shoot -- Capturing Video -- Three Dv/Hdv-Capturing Scenarios -- Capturing An Entire Tape -- Using Batch Capture And Scene Detection -- Use A Clip-Naming Convention -- Use Scene Detection -- Tackling Manual Analog Movie Capture -- Capturing Hdv And Hd Video -- 5 Creating Cuts-Only Videos -- Topics Covered In This Lesson -- Getting Started -- Using A Storyboard To Build A Rough Cut -- Arranging Your Storyboard -- Automating Your Storyboard To A Sequence -- Editing Clips On The Timeline -- Trimming A Clip -- Using The Ripple Edit Tool -- Moving Clips To, From, And Within The Timeline -- Using The Current-Time Indicator To Establish The Edit Point -- Adding Clips To The Timeline With The Source Monitor -- Working With Source Monitor Editing Tools -- More Practice -- Adjusting Clips In The Trim Panel -- Using Other Editing Tools -- 6 Adding Video Transitions -- Topics Covered In This Lesson -- Getting Started -- Using Transitions With Restraint -- Adding Whimsy -- Adding Visual Interest -- Trying Some Transitions -- Sequence Display Changes -- Changing Parameters In The Effect Controls Panel -- Using A/B Mode To Fine-Tune A Transition -- Working With The Effect Controls Panel'S A/B Feature -- Dealing With Inadequate (Or No) Head Or Tail Handles -- Applying Transitions To Multiple Clips At Once -- Adding Audio Transitions -- 7 Creating Dynamic Titles -- Topics Covered In This Lesson -- Getting Started -- Strengthening Your Project With Titles -- Changing Text Parameters -- Building Text From Scratch -- Putting Text On A Path…”
Publicado 2010
Libro electrónico -
169835Tabla de Contenidos: “…Step 2: Configure Policies for the Client Group(s) -- Step 3: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination) -- Step 4: Configure Router AAA and Add VPN Client Users -- Step 5: Create VPN Client Policy for Security Association Negotiation -- Step 6: Configure the Crypto Map (IKE Phase 2) -- Step 7: Apply the Crypto Map to the Interface -- Step 8: Verify the VPN Service -- Configuring IPsec Site-to-Site VPNs Using CLI -- Step 1: Configure the ISAKMP Policy (IKE Phase 1) -- Step 2: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination) -- Step 3: Configure the Crypto ACL (Interesting Traffic, Secure Data Transfer) -- Step 4: Configure the Crypto Map (IKE Phase 2) -- Step 5: Apply the Crypto Map to the Interface (IKE Phase 2) -- Step 6: Configure the Firewall Interface ACL -- Step 7: Verify the VPN Service -- Configuring GRE Tunnels over IPsec -- Step 1: Create the GRE Tunnel -- Step 2: Specify the IPsec VPN Authentication Method -- Step 3: Specify the IPsec VPN IKE Proposals -- Step 4: Specify the IPsec VPN Transform Sets -- Step 5a: Specify Static Routing for the GRE over IPsec Tunnel -- Step 5b: Specify Routing with OSPF for the GRE over IPsec Tunnel -- Step 6: Enable the Crypto Programming at the Interfaces -- Appendix: Create Your Own Journal Here…”
Libro electrónico -
169836Publicado 2014Tabla de Contenidos: “…2.18 Forms containing the quadratic trinomial a+bx+cx2 and the binomial α+βx -- 2.2 Algebraic functions -- 2.20 Introduction -- 2.21 Forms containing the binomial a+bxk and √x -- 2.22-2.23 Forms containing n(a + bx)k -- The square root -- Cube root -- 2.24 Forms containing a+bx and the binomial α+βx -- 2.25 Forms containing a+bx+cx2 -- Integration techniques -- 2.26 Forms containing a+bx+cx2 and integral powers of x -- 2.2712 Forms containing a+c x2 and integral powers of x -- 2.28 Forms containing a+bx+c x2 and first-and second-degree polynomials -- 2.29 Integrals that can be reduced to elliptic or pseudo-elliptic integrals -- 2.3 The Exponential Function -- 2.31 Forms containing eax -- 2.32 The exponential combined with rational functions of x -- 2.4 Hyperbolic Functions -- 2.41-2.43 Powers of sinh x, cosh x, tanh x, and coth x -- Powers of hyperbolic functions and hyperbolic functions of linear functions of the argument -- 2.44-2.45 Rational functions of hyperbolic functions -- 2.46 Algebraic functions of hyperbolic functions -- 2.47 Combinations of hyperbolic functions and powers -- 2.48 Combinations of hyperbolic functions, exponentials, and powers -- 2.5-2.6 Trigonometric Functions -- 2.50 Introduction -- 2.51-2.52 Powers of trigonometric functions -- 2.53-2.54 Sines and cosines of multiple angles and of linear and more complicated functions of the argument -- 2.55-2.56 Rational functions of the sine and cosine -- 2.57 Integrals containing a ± b sin x or a ± b cos x -- 2.58-2.62 Integrals reducible to elliptic and pseudo-elliptic integrals -- 2.63-2.65 Products of trigonometric functions and powers -- 2.66 Combinations of trigonometric functions and exponentials -- 2.67 Combinations of trigonometric and hyperbolic functions -- 2.7 Logarithms and Inverse-Hyperbolic Functions -- 2.71 The logarithm…”
Libro electrónico -
169837por OECDTabla de Contenidos: “…Caractéristiques de la population et des ménages immigrés -- Annexe B. Compétences et marché du travail -- Annexe C. …”
Publicado 2023
Libro electrónico -
169838por Sintowoko, Dyah Ayu WiwidTabla de Contenidos: “…The potential of digital wedding invitations -- b. There is a shift in cultural values in the Surakarta community -- 4 Conclusion -- References -- Computer generated photography: Still image to moving image -- 1 Introduction -- 2 Research Methods -- 3 Result and Discussion -- 3.1 Medium of creation -- 3.2 Image processing techniques -- 3.3 Aesthetic analysis -- 4 Conclusion -- References -- The legal status of metaverse law and its implementation in modern era -- 1 Introduction -- 2 Research Methods -- 3 Theoretical Concept & -- x00026 -- Lega Status Of Metaverse -- 3.1 Concept of metaverse -- 3.2 Potential legal issues in the metaverse -- 3.2.1 Falsification on data and privacy -- 3.2.2 Intellectual property rights -- 4 Future Concept of Metaverse…”
Publicado 2023
Libro electrónico -
169839
-
169840