Mostrando 170,281 - 170,300 Resultados de 170,893 Para Buscar '"B. S."', tiempo de consulta: 0.41s Limitar resultados
  1. 170281
    por Gamma, Erich
    Publicado 2003
    “…Whether you need to get up to speed immediately or want to better understand the design rationale behind Eclipse, Contributing to Eclipse is the Eclipse resource for you. 0321205758B10142003…”
    Libro electrónico
  2. 170282
    por Chen, Zhiqun, 1969-
    Publicado 2000
    “…This book provides the authoritative and practical information you need to enter this rapidly growing arena. 0201703297B04062001…”
    Libro electrónico
  3. 170283
    Publicado 2000
    “…The book is suitable for students, researchers, and everyone interested in this emerging and quickly growing field, it does not require any specialist background knowledge.(Series B)…”
    Libro electrónico
  4. 170284
    Publicado 2018
    “…The focus of this Special Issue of Toxins is to provide updated information on the use of B. thuringiensis and their toxins on different field crops, the interactions of these toxins with other molecules, analyze the biochemical and molecular basis of emerging cases of resistance and, in general, to provide information which can contribute to an effective pest management with these toxins…”
    Libro electrónico
  5. 170285
    Publicado 2023
    “…In addition to classical cytogenetic analyses such as chromosome banding, the use of molecular cytogenetics, especially the FISH mapping technique, with both specific molecular markers (generally BAC clones) and chromosome painting probes were emphasized in all papers to better study the following: (a) Chromosomal abnormalities; (b) The chromosomal evolution of species; (c) Physical gene mapping in light of genomic sequences in the most important domestic species. …”
    Libro electrónico
  6. 170286
    Publicado 2021
    “…Se aborda desde el origen de esta figura jurídica en el siglo xvi hasta la aplicación de los precedentes judiciales actuales en materia del ámbito objetivo y subjetivo de una ley de estas características y el requisito de obrar de buena fe objetiva -en la relación mercantil entre empresarios (B2B) o empresarios y consumidores (B2C)- que debe subyacer en todo «modelo social de regulación del mercado» en el cual es la sociedad la beneficiaria y no los empresarios o profesionales. …”
    Libro electrónico
  7. 170287
    Publicado 1770
    Tabla de Contenidos: “…Tít. tomado de cabecera de texto. Sign. : [ ]1, B2, [ ]1. Núm. de identificación: CCPB000242804-0…”
    Colección
  8. 170288
    “…In particular, the OECD recommends to: a) improve the quantity and quality of regional statistics and formulate urban and rural taxonomies that help tailor policies to places; b) involve territorial constituencies in the design of policy interventions and allocate to them more implementation responsibilities within the framework of the National Development Plan; c) promote coordination among subnational bodies to scale up investment in territories to avoid that public investment – and royalty payments – gets dispersed in a myriad of small-scale projects…”
    Libro electrónico
  9. 170289
    por Donnelly, Marian C.
    Publicado 1992
    “…Donnelly's account begins with the earliest known remains of dwellings dating to around 7500 B.C. and closes with the commercial buildings of the 1970s. …”
    Libro electrónico
  10. 170290
    por Olczak, Anatole
    Publicado 2000
    “…Siegel, Solution Engineer, Pershing, a Division of Donaldson Lufkin and Jenrette 0201675234B05022001…”
    Libro electrónico
  11. 170291
    por Stroustrup, Bjarne
    Publicado 1994
    “…Presents Stroustrup's unique programming and design views. 0201543303B04062001…”
    Libro electrónico
  12. 170292
    por Binstock, Cliff
    Publicado 2002
    “…Additional topics include: Applications for schemas Simple and complex types XML schema processing and validation Namespaces in XML Using schemas with DOM and SAX XML schema document syntax XML Information Sets XML Schema applications of XPath Whether designing a schema from scratch or integrating schemas into contemporary technologies, The XML Schema Complete Reference is the most complete and definitive sourcebook available for the XML Schema environment. 0672323745B08162002…”
    Libro electrónico
  13. 170293
    por Halloway, Stuart Dabbs
    Publicado 2002
    “…KEY TOPICS INCLUDE HOW TO: Use and troubleshoot Class Loaders Build dynamic and generic services through reflection Control an object's serialized representation Load and use native code components Extend the Java class format to add custom services Automate development with code generation This is a cutting-edge approach to Java programming: An emphasis on deployment can be the best way to take advantage of some of the most valuable, yet less heralded, aspects of Java technology. 0201753065B11212001…”
    Libro electrónico
  14. 170294
    por Eastlake, Donald
    Publicado 2002
    “…Topics covered in-depth include: XML basics—documents, namespaces, structures, DTDs and schemas, and stylesheets XPath, XPointer, and SOAP Digital cryptography basics--secret and public key ciphers, asymmetric keys, digital signatures, and certificates XML canonicalization, signatures, and authentication XML encryption Key management and combining encryption with signatures Cryptographic algorithms and noncryptographic algorithms Detailed and practical, this book provides reliable solutions for securing XML and for safeguarding information flow across today's sophisticated Web. 0201756056B06262002…”
    Libro electrónico
  15. 170295
    por Klein, Laura
    Publicado 2013
    “…Determine whether people will buy your product before you build it Listen to your customers throughout the product’s lifecycle Understand why you should design a test before you design a product Get nine tools that are critical to designing your product Discern the difference between necessary features and nice-to-haves Learn how a Minimum Viable Product affects your UX decisions Use A/B testing in conjunction with good UX practices Speed up your product development process without sacrificing quality…”
    Libro electrónico
  16. 170296
    Publicado 2020
    “…Explore the observability challenges Istio addresses Use request routing, traffic shifting, fault injection, and other features essential to running a solid service mesh Generate and collect telemetry information Try different deployment patterns, including A/B, blue/green, and canary Get examples of how to develop and deploy real-world applications with Istio support…”
    Libro electrónico
  17. 170297
    Publicado 2022
    “…The generated knowledge helps (a) consumer and user innovators to shape and validate their marketing strategies, (b) business administrators to respond to an influx of consumer innovators as competitors, and (c) economists in understanding the market impacts of commercial consumer innovation diffusion…”
    Libro electrónico
  18. 170298
    Publicado 2023
    “…Insbesondere wenn Sie bereits ein wenig mit z.B. Java oder C++ vertraut sind, ist dieses Buch die ideale Wahl, um solide in Python einzusteigen…”
    Libro electrónico
  19. 170299
    Publicado 2024
    “…Insbesondere wenn Sie bereits ein wenig mit z.B. C++ oder C# vertraut sind, ist dieses Buch die ideale Wahl, um fundiert in Java einzusteigen und eigene Experimente zu beginnen…”
    Libro electrónico
  20. 170300
    por Martínez Sánchez, Rubén
    Publicado 2014
    Tabla de Contenidos: “….) -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 CONCEPTOS IMPRESCINDIBLES Y PROTOCOLO TCP/IP -- INTRODUCCIÓN -- 1.1 CÓMO SE ORGANIZA INTERNET -- 1.1.1 INTERNET SOCIETY -- 1.1.2 INTERNET ENGINEERING TASK FORCE -- 1.1.3 INTERNET ENGINEERING STEERING GROUP -- 1.1.4 INTERNET ARCHITECTURE BOARD -- 1.1.5 INTERNET ASSIGNED NUMBERS AUTHORITY -- 1.1.6 WORLD WIDE WEB CONSORTIUM -- 1.1.7 CERT UNIVERSITY OF CARNEGIE MELLON -- 1.2 EL USO DE DOCUMENTACIÓN RFC -- 1.3 LAS DIRECCIONES IP -- 1.4 TIPOS DE REDES -- 1.4.1 DIRECCIONES DE CLASE A -- 1.4.2 DIRECCIONES DE CLASE B -- 1.4.3 DIRECCIONES DE CLASE C -- 1.4.4 DIRECCIONES DE CLASE D -- 1.4.5 DIRECCIONES DE CLASE E -- 1.5 MÁSCARAS DE RED -- 1.5.1 SUBREDES -- 1.6 ENRUTAMIENTO -- 1.6.1 NATTING -- 1.6.2 REDES TRONCALES -- 1.7 WELL KNOWN PORTS -- 1.8 NOMBRES DE DOMINIO, DNS -- 1.9 PROTOCOLOS -- 1.10 PROTOCOLOS A NIVEL DE RED -- 1.10.1 PROTOCOLO IP -- 1.10.2 IPV4 -- v1.10.3 IPV6 -- 1.10.4 PROTOCOLO ARP -- 1.10.5 PROTOCOLO ICMP -- 1.11 PROTOCOLOS A NIVEL DE TRANSPORTE -- 1.11.1 PROTOCOLO TCP -- 1.11.2 PROTOCOLO UDP -- 1.12 PROTOCOLOS A NIVEL DE APLICACIÓN -- 1.12.1 PROTOCOLO SMB1.12.1 PROTOCOLO SMB -- 1.12.2 PROTOCOLO SNMB -- 1.13 CONCLUSIONES -- 2 BUSCAR UN VECTOR DE ATAQUE -- 2.1 SEGUIMIENTO DE UN OBJETIVO -- 2.2 RECOPILANDO INFORMACIÓN DESDE INTERNET -- 2.2.1 LAS PRIMERAS TÉCNICAS Y HERRAMIENTAS -- 2.2.2 BASES DE DATOS WHOIS, RIPE, NIC -- 2.2.3 TRANSFERENCIAS DNS NO AUTORIZADAS -- 2.2.4 TRAZADO DE RUTAS -- 2.2.5 BARRIDOS PING -- 2.2.6 CONSULTAS ICMP (INTERNET CONTROL MESSAGE PROTOCOL -- 2.2.7 ESCANEO DE PUERTOS -- 2.2.7.1 NMAP -- 2.2.7.2 NETCAT -- 2.2.7.3 HPING -- 2.3. …”
    Libro electrónico