Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,464
- Biblia 2,979
- Història 1,612
- Filosofía 1,455
- Crítica e interpretación 1,391
- Bíblia 1,249
- Teología 1,181
- Església Catòlica 1,081
- Teología dogmática 980
- Iglesia Católica 954
- Liturgia 898
- Moral cristiana 853
- History 818
- Obres anteriors al 1800 785
- Sermones 723
- Derecho canónico 688
- Litúrgia 573
- -Historia 564
- Management 560
- Derecho 554
- Engineering & Applied Sciences 545
- Teologia 507
- Biografías 506
- Matemáticas 503
- Religión 500
- Música 487
- Historia y crítica 467
- Estudio y enseñanza (Primaria) 424
- Sermons castellans 423
- Jesucristo 408
-
170641Publicado 2020Libro electrónico
-
170642por Moltenbrey, Michael“…Leser*innen erlernen den Umgang mit dieser Bildbearbeitungssoftware, die sich in vielen Punkten von den Produkten der Mitbewerber unterscheidet. So kann z.B. mithilfe der Rauschunterdrückung DeepPrime mit KI das letzte Quñtchen Qualitt̃ aus den Bildern herausgeholt werden. …”
Publicado 2022
Libro electrónico -
170643
-
170644
-
170645
-
170646Publicado 2020Libro electrónico
-
170647
-
170648por Ghallab, Malik“…Automated Planning mirrors this dialogue by offering a comprehensive, up-to-date resource on both the theory and practice of automated planning. The book goes well b…”
Publicado 2004
Libro electrónico -
170649
-
170650
-
170651por Contreras, Claudio AnibalTabla de Contenidos: “…Participación en la representación de los partidosy especialización técnica de los ministerios -- b. Representación Parlamentaria y grupos de interéspor acción concertada -- Conclusiones: el problema de la crisisdel socialismo en la República Federal -- Capítulo décimo segundo -- Bibliografía…”
Publicado 2020
Libro electrónico -
170652A CISO Guide to Cyber Resilience A How-To Guide for Every CISO to Build a Resilient Security ProgramPublicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Attack on BigCo -- Chapter 1: The Attack on BigCo -- BigCo - the attack -- BigCo - cross-team co-ordination -- BigCo - recovery -- BigCo - the anatomy of an attack -- Summary -- Part 2: Security Resilience: Getting the Basics Down -- Chapter 2: Identity and Access Management -- Two-factor authentication and why you need it -- Something you know -- Something you are -- Something you have -- Password complexity and NIST 800-63-3B -- Application security -- Password manager -- Quick reference -- Summary -- Chapter 3: Security Policies -- Where are your policies, and are they being used? …”
Libro electrónico -
170653Publicado 2023Tabla de Contenidos: “…Creating a model by adding material using the Revolve tool -- Creating a sketch profile -- Adjusting the sketch size using the Sketch Scale tool -- Finalizing the model with the Revolve tool -- Modifying the sketch -- Creating a model by removing material using the Revolve tool -- Creating the reverse sketch -- Revolve using the cut profile -- Adding fillets -- Modifying the sketch -- Creating a model by stacking with the Extrude tool -- Creating the doorknob component -- Completing the doorknob with the Mirror tool -- Summary -- Part 2: Bicycle Water Bottle Holder Project -- Chapter 6: Designing a Simple Bottle Holder -- Technical requirements -- Planning out the design -- Drawing out ideas -- Version A -- Version B -- Version C -- Taking measurements with calipers -- What are calipers? …”
Libro electrónico -
170654Publicado 2024Tabla de Contenidos: “…Kata in the Classroom -- The JPW Fund -- Professional Associations -- Continuing Education through Communities of Practice -- Recommendations for Public Administrators -- Continuing Public Sector Journey to Lean -- Advancing from Reaction-Driven to Results-Driven Maturity -- Every COE Needs a COOP -- Diffusion of Lean Thinking and Commitment -- To Promote the General Welfare -- To Insure Domestic Tranquility -- The Threshold of Knowledge -- Appendix A Deming's 14 Points for Management -- Appendix B ASPA Code of Ethics -- Appendix C Applying the Lessons -- Appendix D Internal Training Programs -- Appendix E Annotated Bibliography of CI Literature on My Bookshelf -- Index…”
Libro electrónico -
170655Publicado 2023Tabla de Contenidos: “…7.1 Objectives and outcomes -- 7.2 Applications of finite automata and regular expressions -- 7.3 Applications of grammars -- 7.4 Applications of pushdown automata -- 7.5 Applications of Turing machine -- 7.6 Concept of cellular automata -- 7.7 Chapter summary -- 7.8 Multiple choice questions -- References -- 8 Automata theory with recent trends -- 8.1 Objectives and outcomes -- 8.2 Introduction -- 8.3 Automata and cybersecurity -- 8.3.1 System software -- 8.3.2 Network testing -- 8.3.3 Protocol testing -- 8.3.4 Cloud security testing -- 8.3.5 Application testing -- 8.4 Automata and artificial intelligence (AI)/machine learning (ML) -- 8.5 Chapter summary -- 8.6 Multiple choice questions -- References -- A Answers to multiple choice questions -- B Notations -- Index -- Back Cover…”
Libro electrónico -
170656por Shah, Imdad AliTabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Acknowledgements -- Chapter 1 Cybersecurity Issues and Challenges in Civil Aviation Security -- 1.1 Introduction -- 1.2 Literature Review -- 1.3 Research Methods -- 1.4 Cyber Risk in Aviation -- 1.4.1 Voice (Very High Frequency - VHF) -- 1.4.2 Automatic Dependent Surveillance-Broadcast (ADS-B) -- 1.4.3 Importance of Satellite Navigation (GPS) -- 1.5 Distributed Denial of Service (DDoS) -- 1.5.1 Impact of DDoS on Air Transportation -- 1.6 Discussion -- 1.6.1 Importance of IoT in Civil Aviation -- 1.6.2 Cybersecurity Challenges in Civil Aviation -- 1.7 Conclusion -- 1.8 Future Work -- References -- Chapter 2 Addressing Security Issues and Challenges in Smart Logistics Using Smart Technologies -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Methodology -- 2.4 Evaluation of Logistics and Smart Technologies -- 2.4.1 Connectivity -- 2.4.2 Sensors Collection -- 2.4.3 Data Processing Analysis -- 2.4.4 Automation and Control -- 2.4.5 Remote Monitoring and Management -- 2.5 Transportation Technology's Types -- 2.5.1 Underground Tunneling -- 2.5.2 Aerospace -- 2.5.3 Autonomous Vehicles -- 2.5.4 Last-Mile Robots -- 2.5.5 Electric Vehicles -- 2.6 Transportation Technology in Development -- 2.6.1 Blockchain Technology -- 2.6.2 Autonomous Vehicles -- 2.6.3 Connected Vehicles -- 2.7 Discussion -- 2.8 Conclusion -- 2.9 Future Work -- References -- Chapter 3 Global Navigation Satellite Systems for Logistics: Cybersecurity Issues and Challenges -- 3.1 Introduction -- 3.2 Literature Review -- 3.3 Research Methods -- 3.4 Global Navigation Satellite Systems -- 3.4.1 Types of Global Navigation Satellite Systems -- 3.4.2 Global Positioning System (United States) -- 3.4.3 GLONASS (Russia) -- 3.4.4 Galileo (European Union) -- 3.4.5 BeiDou (China) -- 3.4.6 IRNSS (India)…”
Publicado 2024
Libro electrónico -
170657Publicado 2008Libro electrónico
-
170658por Sarkar, AnaitaTabla de Contenidos: “…Edit with CapCut -- Always have a list -- Film B-roll content (and make it a habit) -- Think of ONE story to share per day -- Use the BE SEEN framework -- Behind the scenes (BTS) -- Enemy -- Storytelling -- Expertise -- Experience -- Newsjacking -- Chapter 11 TOFU strategy #6: TikTok ads -- 10x your followers and engagement -- Objective -- Budget -- Audience -- Optimisation goal -- Ad creation -- Chapter 12 TOFU strategy #7: Instagram -- 1. …”
Publicado 2024
Libro electrónico -
170659
-
170660Publicado 1990Tabla de Contenidos: “…Affect Policy Decisions -- Implantable Devices -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost -- Reduce Unexplained Variations in Medical Practice -- Intensive Care Units -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost -- Reduce Unexplained Variations in Medical Practice -- Address Social and Ethical Implications -- Advance Medical Knowledge -- Affect Policy Decisions -- Organ Transplantation and Replacement -- Improve Individual Patient Outcome -- Affect a Large Patient Population -- Reduce Unit or Aggregate Cost -- Address Social and Ethical Implications -- Advance Medical Knowledge -- Affect Policy Decisions -- 4 Next Steps -- 5 Conclusions and Recommendations -- Appendixes -- A Clinical Conditions and Medical Technologies Considered by the Priority-Setting Group -- B Comparison of Priority-Setting Criteria -- C Organizations Providing Background Information -- American College of Physicians (ACP) -- American Hospital Association (AHA) -- American Medical Association (AMA) -- Blue Cross and Blue Shield Association (BCBS) -- Ecri -- Hewlett-Packard Company -- Institute for Health Policy Analysis (IHPA), Georgetown University -- Institute of Medicine Committee on the Effectiveness Initiative of the Health Care Financing Adminis ... -- Metropolitan Life Insurance Company -- Office of Health Technology Assessment (OHTA), National Center for Health Services Research -- Office of Medical Applications of Research (OMAR), National Institutes of Health (NIH) -- Office of Technology Assessment (OTA), U.S. …”
Libro electrónico