Mostrando 179,761 - 179,780 Resultados de 180,405 Para Buscar '"B. S."', tiempo de consulta: 0.46s Limitar resultados
  1. 179761
    “…In particular, the OECD recommends to: a) improve the quantity and quality of regional statistics and formulate urban and rural taxonomies that help tailor policies to places; b) involve territorial constituencies in the design of policy interventions and allocate to them more implementation responsibilities within the framework of the National Development Plan; c) promote coordination among subnational bodies to scale up investment in territories to avoid that public investment – and royalty payments – gets dispersed in a myriad of small-scale projects…”
    Libro electrónico
  2. 179762
    por Donnelly, Marian C.
    Publicado 1992
    “…Donnelly's account begins with the earliest known remains of dwellings dating to around 7500 B.C. and closes with the commercial buildings of the 1970s. …”
    Libro electrónico
  3. 179763
    por Olczak, Anatole
    Publicado 2000
    “…Siegel, Solution Engineer, Pershing, a Division of Donaldson Lufkin and Jenrette 0201675234B05022001…”
    Libro electrónico
  4. 179764
    por Stroustrup, Bjarne
    Publicado 1994
    “…Presents Stroustrup's unique programming and design views. 0201543303B04062001…”
    Libro electrónico
  5. 179765
    por Binstock, Cliff
    Publicado 2002
    “…Additional topics include: Applications for schemas Simple and complex types XML schema processing and validation Namespaces in XML Using schemas with DOM and SAX XML schema document syntax XML Information Sets XML Schema applications of XPath Whether designing a schema from scratch or integrating schemas into contemporary technologies, The XML Schema Complete Reference is the most complete and definitive sourcebook available for the XML Schema environment. 0672323745B08162002…”
    Libro electrónico
  6. 179766
    por Halloway, Stuart Dabbs
    Publicado 2002
    “…KEY TOPICS INCLUDE HOW TO: Use and troubleshoot Class Loaders Build dynamic and generic services through reflection Control an object's serialized representation Load and use native code components Extend the Java class format to add custom services Automate development with code generation This is a cutting-edge approach to Java programming: An emphasis on deployment can be the best way to take advantage of some of the most valuable, yet less heralded, aspects of Java technology. 0201753065B11212001…”
    Libro electrónico
  7. 179767
    por Eastlake, Donald
    Publicado 2002
    “…Topics covered in-depth include: XML basics—documents, namespaces, structures, DTDs and schemas, and stylesheets XPath, XPointer, and SOAP Digital cryptography basics--secret and public key ciphers, asymmetric keys, digital signatures, and certificates XML canonicalization, signatures, and authentication XML encryption Key management and combining encryption with signatures Cryptographic algorithms and noncryptographic algorithms Detailed and practical, this book provides reliable solutions for securing XML and for safeguarding information flow across today's sophisticated Web. 0201756056B06262002…”
    Libro electrónico
  8. 179768
    por Klein, Laura
    Publicado 2013
    “…Determine whether people will buy your product before you build it Listen to your customers throughout the product’s lifecycle Understand why you should design a test before you design a product Get nine tools that are critical to designing your product Discern the difference between necessary features and nice-to-haves Learn how a Minimum Viable Product affects your UX decisions Use A/B testing in conjunction with good UX practices Speed up your product development process without sacrificing quality…”
    Libro electrónico
  9. 179769
    Publicado 2020
    “…Explore the observability challenges Istio addresses Use request routing, traffic shifting, fault injection, and other features essential to running a solid service mesh Generate and collect telemetry information Try different deployment patterns, including A/B, blue/green, and canary Get examples of how to develop and deploy real-world applications with Istio support…”
    Libro electrónico
  10. 179770
    Publicado 2022
    “…The generated knowledge helps (a) consumer and user innovators to shape and validate their marketing strategies, (b) business administrators to respond to an influx of consumer innovators as competitors, and (c) economists in understanding the market impacts of commercial consumer innovation diffusion…”
    Libro electrónico
  11. 179771
    Publicado 2023
    “…Insbesondere wenn Sie bereits ein wenig mit z.B. Java oder C++ vertraut sind, ist dieses Buch die ideale Wahl, um solide in Python einzusteigen…”
    Libro electrónico
  12. 179772
    Publicado 2024
    “…Insbesondere wenn Sie bereits ein wenig mit z.B. C++ oder C# vertraut sind, ist dieses Buch die ideale Wahl, um fundiert in Java einzusteigen und eigene Experimente zu beginnen…”
    Libro electrónico
  13. 179773
    Publicado 1770
    Tabla de Contenidos: “…Tít. tomado de cabecera de texto. Sign. : [ ]1, B2, [ ]1. Núm. de identificación: CCPB000242804-0…”
    Colección
  14. 179774
    por Friesen, Geoff
    Publicado 2011
    “…For this reason, Appendixes A, B, C, and D are not included in this book's pages. …”
    Libro electrónico
  15. 179775
    Publicado 2020
    “…Los resultados obtenidos en este estudio indican que a) el MSC ha producido efectos en autocompasión, mindfulness y ansiedad en relación a un grupo control (GC); b) el MBSR ha producido efectos en mindfulness, ansiedad y depresión en comparación con un GC; c) se han conseguido replicar los resultados del estudio 2 de Neff y Germer (2013) sobre la eficacia del MSC; d) el MBSR prácticamente no difiere en eficacia en relación al programa MSC; e) se han encontrado correlaciones significativas entre las variables autocompasión, mindfulness, ansiedad, estrés y depresión; f) por último ambos protocolos podrían ser un recurso de utilidad para mejorar las competencias y el bienestar de los psicólogos en formación. …”
    Clic para texto completo. Acceso abierto.
    Tesis
  16. 179776
    Publicado 2015
    “…Platelets are equipped with a variety of Pathogen Recognition Receptors such as TLRs; they have a complete signalosome, which is functional until the phosphorylation of NFkB; they have been proved to retro-transcribe RNA and synthesize de novo proteins; etc. …”
    Libro electrónico
  17. 179777
    Publicado 2014
    “…—Mark Frauenfelder, co-founder of bOING bOING You'll learn how to: Create a basic Apple Wi-Fi network, and connect to it from OS X, iOS, Windows 10, Android, and Chrome OS. …”
    Libro electrónico
  18. 179778
    Publicado 2021
    “…On the other hand, new forms of regulation are suggested: For example, does Regulation P2B Regulation (2019/1150) not fit many of the problems of platform work? …”
    Libro electrónico
  19. 179779
    Publicado 2018
    “…In diesem Buch findest du zahlreiche Ideen z.B. für verschiedene Habit Tracker und das Aufschreiben persönlicher Dinge wie Stimmung, Schlaf u.v.m. …”
    Libro electrónico
  20. 179780
    por Martínez Sánchez, Rubén
    Publicado 2014
    Tabla de Contenidos: “….) -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 CONCEPTOS IMPRESCINDIBLES Y PROTOCOLO TCP/IP -- INTRODUCCIÓN -- 1.1 CÓMO SE ORGANIZA INTERNET -- 1.1.1 INTERNET SOCIETY -- 1.1.2 INTERNET ENGINEERING TASK FORCE -- 1.1.3 INTERNET ENGINEERING STEERING GROUP -- 1.1.4 INTERNET ARCHITECTURE BOARD -- 1.1.5 INTERNET ASSIGNED NUMBERS AUTHORITY -- 1.1.6 WORLD WIDE WEB CONSORTIUM -- 1.1.7 CERT UNIVERSITY OF CARNEGIE MELLON -- 1.2 EL USO DE DOCUMENTACIÓN RFC -- 1.3 LAS DIRECCIONES IP -- 1.4 TIPOS DE REDES -- 1.4.1 DIRECCIONES DE CLASE A -- 1.4.2 DIRECCIONES DE CLASE B -- 1.4.3 DIRECCIONES DE CLASE C -- 1.4.4 DIRECCIONES DE CLASE D -- 1.4.5 DIRECCIONES DE CLASE E -- 1.5 MÁSCARAS DE RED -- 1.5.1 SUBREDES -- 1.6 ENRUTAMIENTO -- 1.6.1 NATTING -- 1.6.2 REDES TRONCALES -- 1.7 WELL KNOWN PORTS -- 1.8 NOMBRES DE DOMINIO, DNS -- 1.9 PROTOCOLOS -- 1.10 PROTOCOLOS A NIVEL DE RED -- 1.10.1 PROTOCOLO IP -- 1.10.2 IPV4 -- v1.10.3 IPV6 -- 1.10.4 PROTOCOLO ARP -- 1.10.5 PROTOCOLO ICMP -- 1.11 PROTOCOLOS A NIVEL DE TRANSPORTE -- 1.11.1 PROTOCOLO TCP -- 1.11.2 PROTOCOLO UDP -- 1.12 PROTOCOLOS A NIVEL DE APLICACIÓN -- 1.12.1 PROTOCOLO SMB1.12.1 PROTOCOLO SMB -- 1.12.2 PROTOCOLO SNMB -- 1.13 CONCLUSIONES -- 2 BUSCAR UN VECTOR DE ATAQUE -- 2.1 SEGUIMIENTO DE UN OBJETIVO -- 2.2 RECOPILANDO INFORMACIÓN DESDE INTERNET -- 2.2.1 LAS PRIMERAS TÉCNICAS Y HERRAMIENTAS -- 2.2.2 BASES DE DATOS WHOIS, RIPE, NIC -- 2.2.3 TRANSFERENCIAS DNS NO AUTORIZADAS -- 2.2.4 TRAZADO DE RUTAS -- 2.2.5 BARRIDOS PING -- 2.2.6 CONSULTAS ICMP (INTERNET CONTROL MESSAGE PROTOCOL -- 2.2.7 ESCANEO DE PUERTOS -- 2.2.7.1 NMAP -- 2.2.7.2 NETCAT -- 2.2.7.3 HPING -- 2.3. …”
    Libro electrónico