Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 5,917
- Història 3,606
- Biblia 2,944
- History 2,149
- Crítica e interpretación 2,002
- Colecciones 1,994
- Bíblia 1,599
- Engineering & Applied Sciences 1,489
- Església Catòlica 1,397
- Filosofía 1,367
- Management 1,180
- Teología 1,172
- Iglesia Católica 1,162
- Literatura griega clásica 1,145
- Development 1,091
- Filosofía griega 1,087
- Computer Science 1,077
- Aristóteles 1,069
- Derecho canónico 1,044
- Crítica i interpretació 961
- Obres anteriors al 1800 948
- Literatura latina clásica 902
- Application software 875
- -Historia 867
- Política 765
- Traducción al francés 742
- Espiritualidad 720
- Moral cristiana 680
- RELIGION 676
- historia 663
-
224721por Cristofolini, Paolo“…À côté des nombreux travaux consacrés à l'herméneutique biblique chez Spinoza et chez Hobbes, ou à la question du théologico-politique et de la naissance des institutions politiques modernes, cet ouvrage veut montrer comment, à partir d'une interprétation nouvelle de l'ancien – l'Écriture sainte –, quelque chose d'inédit a été produit dans la pensée des institutions politiques, du droit, du corps politique et de la multitude. C'est paradoxalement en interprétant à nouveaux frais l'Écriture que la politique peut devenir, chez Hobbes, une création humaine ou, chez Spinoza, une œuvre humaine dont la rationalité peut être pensée à différents degrés ; ce qui revient à penser comment la modernité est aussi issue d'une politique de la Parole…”
Publicado 2016
Electrónico -
224722Publicado 2016“…This new edition has been updated to include: A UK/Euro focused appendix, enhancing the book’s accessibility to students and professionals of television production around the world An advanced discussion of the job of the Director and the Command Cue Language Fresh discussion of tapeless protocols in the control room, Media Object Server newsroom control software (iNews), editing systems, switcher embedded image store, and DPM (DVE) Brand new sections on UHDTV (4K), set design, lighting design, microphones, multiviewers, media asset management, clip-servers, and the use of 2D and 3D animation Expanded coverage of clip types used in ENG and video journalism (VO, VO/SOT, and PKG) An all new companion website (www.focalpress.com/cw/utterback) with pre-recorded lectures by the author, sample video clips, an expanded full color image archive, vocabulary flashcards, and more Note: the companion website is still under development, but in the meantime the author's filmed lectures are all freely available on Youtube: https://www.youtube.com/channel/UCRp_aSpO0y8cDqLjFGZ2s9A…”
Libro electrónico -
224723“…Let Expert Indexing in Oracle Database 12c be your guide to deep mastery of the most fundamental performance optimization structure in Oracle Database. …”
Libro electrónico -
224724Publicado 2015“…Set up your Swift development environment Master Swift’s fundamental data types and operators Make the most of arrays and dictionaries Control program flow, modify execution paths, and iterate code Perform complex actions with functions Work with higher-order functions and closures Harness the power of structs, enums, classes, and class inheritance Customize initializers of classes, structs, and enums Implement instance methods, type methods, and advanced type functionality Take full advantage of Swift’s advanced memory allocation Extend type functionality with protocols and extensions Leverage the power of generics, chaining, and other advanced features Interoperate with Objective-C code Interact with user interfaces Take advantage of Swift’s Standard Library features and functions Who Should Read this Book Beginner-intermediate level programmers Advanced programmers who are not yet familiar with Swift can benefit…”
Libro electrónico -
224725por Harter, Hélène“…En analysant le rôle des ingénieurs municipaux, c'est en fait les réalités urbaines de la fin du XIXe siècle que nous cernons mieux…”
Publicado 2020
Electrónico -
224726por Allmen-Schmidt, Valérie Von“…Le « héros voyageur » n'apparaît pas alors comme une catégorie homogène, et pourtant son appropriation par les sociétés, le pouvoir en place ou les créateurs, fait de lui un modèle qui fonctionne et nourrit l'imaginaire, depuis la période archaïque jusqu'à nos jours, comme le démontre la richesse des productions littéraires et visuelles : c'est ce processus qu'analysent les articles rassemblés dans ce volume…”
Publicado 2016
Electrónico -
224727Publicado 2023“…Reste à comprendre comment on a pu en arriver là.C'est ce que nous propose cette étude magistrale, en analysant quelques cas parmi les plus alarmants d'impostures mystiques du xxe et du xxie siècle. …”
991009740329006719 -
224728Publicado 2018“…S'il défie la modernité, et s'il passe pour un traître à son pays et parfois même à sa classe sociale, c'est à la fois en sage et en fou, en excentrique et en réservé qu'il donne et rend tous les coups. …”
991005301569706719 -
224729por Kotansky, Roy David, aut 1953-“…Using the figure of the frog, C(h)arour, to symbolize the biblical plague but also the Egyptian concept of rebirth, the instruction was intended to strengthen group cohesion and especially to prepare the novices that were about to receive their baptism during the Easter celebration for a life devoted to the Koinonia and its principles. …”
Publicado 2021
Artículo -
224730Publicado 2018“…Prior exposure and understanding of C#, JavaScript, HTML, and CSS syntax is assumed…”
Libro electrónico -
224731Publicado 2017“…Transition from Objective-C and move code into Swift the right way. Boost API design using proper naming and labeling. …”
Libro electrónico -
224732Publicado 2017“…Discover how to: • Determine when a tabular or multidimensional model is right for your project • Build a tabular model using SQL Server Data Tools in Microsoft Visual Studio 2015 • Integrate data from multiple sources into a single, coherent view of company information • Choose a data-modeling technique that meets your organization’s performance and usability requirements • Implement security by establishing administrative and data user roles • Define and implement partitioning strategies to reduce processing time • Use Tabular Model Scripting Language (TMSL) to execute and automate administrative tasks • Optimize your data model to reduce the memory footprint for VertiPaq • Choose between in-memory (VertiPaq) and pass-through (DirectQuery) engines for tabular models • Select the proper hardware and virtualization configurations • Deploy and manipulate tabular models from C# and PowerShell using AMO and TOM libraries Get code samples, including complete apps, at: https://aka.ms/tabular/downloads About This Book • For BI professionals who are new to SQL Server 2016 Analysis Services or already familiar with previous versions of the product, and who want the best reference for creating and maintaining tabular models. • Assumes basic familiarity with database design and business analytics concepts…”
Libro electrónico -
224733Publicado 2018“…In order to account for hardware security as a rapidly developing discipline, ASHES routinely offers four categories of submission: Full papers; Short papers;Systematization of Knowledge (SoK) papers, which structure or survey a certain subarea within hardware security; Wild and Crazy (WaC) papers, whose aim is to distribute a promising and potentially seminal research idea at an early stage to the community. …”
Libro electrónico -
224734Publicado 2014“…Coverage includes: How analytical and conventional decision making differ — and the challenging implications How to determine who your analytics deciders are, and ought to be Proven best practices for actually applying analytics to decision-making How to optimize your use of analytics as an analyst, manager, executive, or C-level officer Applied Business Analytics will be invaluable to wide audiences of professionals, decision-makers, and consultants involved in analytics, including Chief Analytics Officers, Chief Data Officers, Chief Scientists, Chief Marketing Officers, Chief Risk Officers, Chief Strategy Officers, VPs of Analytics and/or Big Data, data scientists, business strategists, and line of business executives. …”
Libro electrónico -
224735Publicado 2017“…Please note that an account with Box is not required to access these files: https://informausa.app.box.com/s/plwbtwndq4wab55a1p7xlcr7lypvz64c…”
Libro electrónico -
224736por Maurer, Paul J.“…You'll also find: A complete system of cybersecurity ethics relevant to C-suite leaders and executives, front-line cybersecurity practitioners, and students preparing for careers in cybersecurity. …”
Publicado 2024
Libro electrónico -
224737por Rodriguez, Claudia Salzberg“…Coverage includes Data structures x86 and PPC assembly language Viewing kernel internals Linux process model User and kernel space Interrupts and exceptions Memory allocation and tracking Tracing subsystem behavior I/O interactions Filesystems and file operations Scheduling and synchronization Kernel boot process Kernel build system Configuration options Device drivers And more... If you know C, this book teaches you all the skills and techniques you need to succeed with Linux kernel programming. …”
Publicado 2005
Libro electrónico -
224738Publicado 2008“…Then, to demonstrate how TPM can solve many of today’s most challenging security problems, they present four start-to-finish case studies, each with extensive C-based code examples. Coverage includes What services and capabilities are provided by TPMs TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments Using TPM to enhance the security of a PC’s boot sequence Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more Linking PKCS#11 and TSS stacks to support applications with middleware services What you need to know about TPM and privacy--including how to avoid privacy problems Moving from TSS 1.1 to the new TSS 1.2 standard TPM and TSS command references and a complete function library…”
Libro electrónico -
224739por Shalloway, Alan“…With illustrative examples in C++ and Java, the book demystifies the "whys," "why nots," and "hows" of patterns and explains pattern implementation. …”
Publicado 2002
Libro electrónico -
224740por Howard, Michael, 1965-“…Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilities Use of magic URLs, predictable cookies, and hidden form fields Buffer overruns Format string problems Integer overflows C++ catastrophes Insecure exception handling Command injection Failure to handle errors Information leakage Race conditions Poor usability Not updating easily Executing code with too much privilege Failure to protect stored data Insecure mobile code Use of weak password-based systems Weak random numbers Using cryptography incorrectly Failing to protect network traffic Improper use of PKI Trusting network name resolution…”
Publicado 2009
Libro electrónico