Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 11,181
- Crítica e interpretación 4,335
- Biblia 3,585
- Història 3,399
- Filosofía 3,211
- History 2,152
- Colecciones 2,041
- Aristóteles 1,888
- Teología 1,650
- Iglesia Católica 1,576
- Bíblia 1,569
- Engineering & Applied Sciences 1,489
- Església Catòlica 1,373
- Historia y crítica 1,323
- Literatura latina clásica 1,317
- Derecho canónico 1,220
- Management 1,181
- Platón 1,136
- Development 1,091
- Computer Science 1,077
- Filosofía antigua 1,057
- Política 1,044
- Filosofía griega 1,036
- Sermones 1,015
- Política y gobierno 968
- Moral cristiana 961
- Derecho 956
- Obres anteriors al 1800 922
- Crítica i interpretació 914
- Espiritualidad 886
-
302981Publicado 2003Tabla de Contenidos: “…Troubleshooting -- Using the LEI log (leilog.nsf) -- Using the Domino log (log.nsf) -- Enabling log conflicts in replication activities -- Logging SQL statements -- Using the trace metaconnector -- Using Notes Server Diagnostic (NSD) -- Appendix C. Additional material -- Locating the Web material -- Using the Web material -- How to use the Web material -- Further useful downloads -- Glossary -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Index -- Back cover…”
Libro electrónico -
302982Tabla de Contenidos: “…DFSMSrmm enhancements -- 2.1 Changes introduced with z/OS V1R6 DFSMSrmm -- 2.1.1 ISPF dialog enhancements -- 2.1.2 DFSMSrmm client/server support -- 2.1.3 Enhanced IBM 3592 support -- 2.1.4 Command reference summary in Guide and Reference -- 2.1.5 C++ API with XML Output Option -- 2.2 Changes introduced with z/OS V1R5 DFSMSrmm -- 2.2.1 Enhanced multilevel security -- 2.3 Changes introduced with z/OS V1R3 DFSMS -- 2.3.1 Duplicate volume support -- 2.3.2 Backup at any time -- 2.3.3 Multilevel security support -- 2.3.4 CDS utilization displays now available…”
Libro electrónico -
302983Publicado 2003Tabla de Contenidos: “…Planning checklists -- Independent disk pool checklist -- Disk planning worksheet -- PCI card placement planning worksheet -- Appendix C. Disk unit selection criteria -- Appendix D. …”
Libro electrónico -
302984por Moore, BillTabla de Contenidos: “…Deploying the redbook sample code -- Prerequisites -- SAB404R material -- SAL301R sample application -- C compiler -- SMTP service -- Prerequisite checklist -- Components of our sample application -- Creating the legacy sample database - SAB404R -- Deploying the legacy agency system - SAB404R…”
Publicado 2005
Libro electrónico -
302985Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Section I Cyber Operations Introduction -- I.1 Phases of Cyber Operations -- I.1.1 1980s-2002 -- I.1.2 2003-2012 -- I.1.3 2013-present -- Chapter 1 Cyber Operations -- 1.1 Cyber Operations Introduction -- 1.1.1 Cyber - A 21st-Century Collection Channel -- 1.1.2 Hackers - Pre-Cyber Operations -- 1.1.3 Cyber and Counter-Terror/Insurgency -- 1.2 Early Internet and Cyber Operations -- 1.2.1 Maturing of Cyber Operations - ISIS and Russia -- 1.2.2 ISIS Cyber Operations -- 1.2.3 Russian Cyber Operations -- 1.3 Cyber Operations' Stage Descriptions -- 1.3.1 Stage I (late 1990s-~2010)(Community Development) -- 1.3.2 Stage II (~2010-~2015)(Tactical) -- 1.3.3 Stage III (~2015 to present)(Tactical and Strategic) -- 1.4 Cyber Operations Wrap-up -- Bibliography -- Chapter 2 ISIS and Web-Based Insurgency -- 2.1 Introduction -- 2.1.1 Terrorist Development of the Internet for Messaging -- 2.1.2 ISIS Adaptation of the Internet for Coordination, Command and Control (C2) -- 2.1.3 ISIS "Emergence" from Cyberspace to form a State -- 2.2 Cyber-Based Irregular Operations -- 2.2.1 Three-Phase Insurgency Model with Cyber - ISIS Example -- 2.2.2 ISIS Insurgency Phases -- 2.2.3 Counter-ISIS Operations in Cyber -- 2.3 ISIS and Web-Based Insurgency Wrap-up -- Bibliography -- Chapter 3 Cyber and Crime -- 3.1 Cyber and Crime -- 3.1.1 Cybercrime Definitions -- 3.1.2 Crimes Against Individuals -- 3.1.2.1 Cyber-Fraud Reporting -- 3.1.2.2 Spam -- 3.1.2.3 Phishing -- 3.1.3 Crimes Against Organizations -- 3.1.3.1 Telephony Phishing -- 3.1.3.2 Ransomware Introduction -- 3.1.3.3 Ransomware Tools Background -- 3.1.3.4 Ransomware as a Service -- 3.1.3.5 Cryptocurrency -- 3.1.4 Cyber Gangs - Membership Analogy to Organized Crime -- 3.1.5 Cybercrime Wrap-Up -- Bibliography -- Chapter 4 Nation-State Cyber Operations…”
Libro electrónico -
302986Publicado 2021Tabla de Contenidos: “…Front Cover -- Advanced Methods and Deep Learning in Computer Vision -- Copyright -- Contents -- List of contributors -- About the editors -- Preface -- 1 The dramatically changing face of computer vision -- 1.1 Introduction - computer vision and its origins -- 1.2 Part A - Understanding low-level image processing operators -- 1.2.1 The basics of edge detection -- 1.2.2 The Canny operator -- 1.2.3 Line segment detection -- 1.2.4 Optimizing detection sensitivity -- 1.2.5 Dealing with variations in the background intensity -- 1.2.6 A theory combining the matched filter and zero-mean constructs -- 1.2.7 Mask design-other considerations -- 1.2.8 Corner detection -- 1.2.9 The Harris `interest point' operator -- 1.3 Part B - 2-D object location and recognition -- 1.3.1 The centroidal profile approach to shape analysis -- 1.3.2 Hough-based schemes for object detection -- 1.3.3 Application of the Hough transform to line detection -- 1.3.4 Using RANSAC for line detection -- 1.3.5 A graph-theoretic approach to object location -- 1.3.6 Using the generalized Hough transform (GHT) to save computation -- 1.3.7 Part-based approaches -- 1.4 Part C - 3-D object location and the importance of invariance -- 1.4.1 Introduction to 3-D vision -- 1.4.2 Pose ambiguities under perspective projection -- 1.4.3 Invariants as an aid to 3-D recognition -- 1.4.4 Cross ratios: the `ratio of ratios' concept -- 1.4.5 Invariants for noncollinear points -- 1.4.6 Vanishing point detection -- 1.4.7 More on vanishing points -- 1.4.8 Summary: the value of invariants -- 1.4.9 Image transformations for camera calibration -- 1.4.10 Camera calibration -- 1.4.11 Intrinsic and extrinsic parameters -- 1.4.12 Multiple view vision -- 1.4.13 Generalized epipolar geometry -- 1.4.14 The essential matrix -- 1.4.15 The fundamental matrix -- 1.4.16 Properties of the essential and fundamental matrices…”
Libro electrónico -
302987por Jodidio, PhilipTabla de Contenidos: “…Conté volum 7: Banca dell’Occhio (Emilio Ambasz), p. 54; Saint Edward’s University (Alejandro Aravena), p. 64; Lusatian lakeland landmark (Architektur & landschaft), p. 70; The Yas hotel (Asymtote), p. 76; Sano clinic therapy square (Atelier-Den / Inahara Archi-lab), p. 82; UPENN weave bridge (Cecil Balmond), p. 88; Kielder observatory (Charles Barclay), p. 92; Marcus prize pavilion (Barkow leibinger architects), p. 98; Nordwesthaus (Baumschlager Eberle), p. 102; The Mountaing (BIG), p. 108; Former Arsenale La Maddalena ( Stefano Boeri), p. 116; Three Box House / Hanil Cement Information Center and Guesthouse ( Byoung-soo Cho), p. 122; Liège-Guillemins TGV Station ( Santiago Calatrava), p. 132; The Chronicles of Time (Giacomo Costa), p. 140; Underground (Rand Elliott), p. 146; Bubbletecture H (Shuhei Endo), p. 152; Bahnhof Pionen (Albert France-Lanord), p. 158; Eden Bio ( Edouard François), p. 164; Roof House (Terunobu Fujimori), p. 170; House H ( Sou Fujimoto), p. 176; Towards Paradise ( Gustafson Porter +Gustafson Guthrie Nichol), p. 182; Burnham Pavilion, JS Bach / Zaha Hadid Architects Music Hall (Zaha Hadid), p. 190; Munch Area (Herreros Arquitectos), p. 198; VitraHaus (Herzog &De Meuron), p. 202; Artfarm (HHF), p. 210; HEART: Hearning Museum of Contemporary Art, Knut Hamsun Center (Steven Holl), p. 216; Guangzhou TV and Sightseeing Tower (Information Based Architecture), p. 228; Princess Elisabeth Antarctica (International Polar Foundation), p. 232; Island House (Iroje KHM Architects), p. 244; Green houses (Junya Ishigami), p. 244; ZA-Koenji Public Theater (Toyo Ito), p. 250; The High Line (James Corner Field Operations/Diller Scofidio + Renfro), p. 256; Juvet Landscape Hotel (Jensen & Skodvin Architects), p. 262; Diaphanous Space (Kalhöfer-Korschildgen), p. 268; Church of the Holy Cross, Fiberline Factory ( KHR), p. 274; Top of Tyrol Mountain Platform (LAAC), p. 284; Hotel Aire en Bardenas (Emiliano López Mónica Rivera), p. 290; Blobwall and Toy Furniture (Greg Lynn Form), p. 296; Villa Chardonne (Made in Sàrl), p. 302; Delegation of the Ismaili Imamat (Fumihiko Maki), p. 308; 41 Cooper Square (Morphosis), p. 314; Gateway Art Tower (Eric Own Moss), p. 320; Walls in the Landscape (Susanne Nobis), p. 324; The Beacon of Amsterdam, The Ladies of the Lake (NOX), p. 330; Naoshima Public Baths (Shinro Ohtake), p. 338; Prada Transformer, CCTV Television Station and Headquarters (OMA*AMO/Rem Koolhaas), p. 344; La Olmeda Roman Villa (Paredes Pedrosa Arquitectos), p. 358; EWHA Womans University (Dominique Perrault), p. 364; Emilio and Annavianca Vedova Foundation (Renzo Piano), p. 372; Flowing Gardens (Plasma Studio), p. 378; Villa Navarra (Rudy Ricciotti), p. 384; Alexandra Heritage Center, Mapungubwe Interpretation Center (Peter Rich), p. 390; RDF181 (Rotor), p. 400; Miyajima Office (Hiroshi Sambuichi), p. 406; Serpentine Pavilion, Rolex Learning Center (Sanaa/Kazuyo Sejima + Ryue Nishizawa), p. 412; Termas Geométricas Hot Springs Complex, Villarrica National Park (Germán del Sol), p. 426; Burj Khalifa (Skidmore, Owings & Merrill), p. 432; Frog Queen (Splitterwerk), p. 438; Izu Photo Museum ( Hiroshi Sugimoto), p. 444; Kiltro House (Supersudaka), p. 450; Tenchi House ( Masaharu Takasaki), p. 456; Swarovski Ginza, Waterfall (Yoshioka Tokujin), p. 462; Production Facilities for Les Ballets C de la B and LOD (de Vylder Vinck Taillieu), p. 470.…”
Publicado 2001
Libro -
302988Publicado 2023Tabla de Contenidos: “…2.48.3 Mechanism of action -- 2.48.4 Pharmacokinetics -- 2.48.5 Side effects -- 2.49 Lurbinectedin -- 2.49.1 Indications (medical uses) -- 2.49.2 Dosage and administration -- 2.49.3 Mechanism of action -- 2.49.4 Pharmacokinetics -- 2.49.5 Side effects -- 2.50 Lutetium Lu 177-dotatate -- 2.50.1 Indications (medical uses) -- 2.50.2 Dosage and administration -- 2.50.3 Mechanism of action -- 2.50.4 Pharmacokinetics -- 2.50.5 Side effects -- 2.51 Mechlorethamine -- 2.51.1 Indications (medical uses) -- 2.51.2 Dosage and administration -- 2.51.3 Mechanism of action -- 2.51.4 Pharmacokinetics -- 2.51.5 Side effects -- 2.52 Melphalan -- 2.52.1 Indications (medical uses) -- 2.52.2 Dosage and administration -- 2.52.3 Mechanism of action -- 2.52.4 Pharmacokinetics -- 2.52.5 Side effects -- 2.53 Mercaptopurine -- 2.53.1 Indications (medical uses) -- 2.53.2 Dosage and administration -- 2.53.3 Mechanism of action -- 2.53.4 Pharmacokinetics -- 2.53.5 Side effects -- 2.54 Methotrexate -- 2.54.1 Indications (medical uses) -- 2.54.2 Dosage and administration -- 2.54.3 Mechanism of action -- 2.54.4 Pharmacokinetics -- 2.54.5 Side effects -- 2.55 Mitomycin-C -- 2.55.1 Indications (medical uses) -- 2.55.2 Dosage and administration -- 2.55.3 Mechanism of action -- 2.55.4 Pharmacokinetics -- 2.55.5 Side effects -- 2.56 Mitoxantrone -- 2.56.1 Indications (medical uses) -- 2.56.2 Dosage and administration -- 2.56.3 Mechanism of action -- 2.56.4 Pharmacokinetics -- 2.56.5 Side effects -- 2.57 Nelarabine -- 2.57.1 Indications (medical uses) -- 2.57.2 Dosage and administration -- 2.57.3 Mechanism of action -- 2.57.4 Pharmacokinetics -- 2.57.5 Side effects -- 2.58 Oxaliplatin -- 2.58.1 Indications (medical uses) -- 2.58.2 Dosage and administration -- 2.58.3 Mechanism of action -- 2.58.4 Pharmacokinetics -- 2.58.5 Side effects -- 2.59 Paclitaxel -- 2.59.1 Indications (medical uses)…”
Libro electrónico -
302989por Maldonado Dávila y Saavedra, JoséTabla de Contenidos: “….: Rodrigo Caro en el l . 1, c . 22 de las Antigüedades de Sevilla (h . 239 r.)…”
Publicado 1671
Manuscrito -
302990por Caro, RodrigoTabla de Contenidos: “…Pater Hyacintus Carolus Quinterus C.M . Autoria operi Epigramaton (h . 244 v.) . vv.: Ludite iam pueri resonat dum laeta jubentus / et tollit Carum turba sacrata virum (h . 244 v.) . 7 . …”
Publicado 1760
Manuscrito -
302991Publicado 1780Tabla de Contenidos: “….: Rex pacificus unigenitus, qui est in sinu Patris (h . 172 r.) . c) [Texto] (h . 173 r.-188 v.) (incompleto) . Inc.: Capitulo 1 . …”
Manuscrito -
302992Publicado 1651Tabla de Contenidos: “…-v.) . b) Condado de Castrillo de que hizo Merced el Rey Don Felipe Quarto a Don Bernardino Delgadillo y Avellaneda (h . 307 r.) . c) Condado de Galvez hizo Merced del el Rey Don Felipe 2o a Don Balthasar de la Cerda y Mendoza (h . 307 v.) . 18 . …”
Manuscrito -
302993Publicado 2022“…Andy began his professional career as a C/C++ developer and morphed into Java, C#, and other languages as the years passed by. …”
Video -
302994Publicado 2011“…Aux rédacteurs et chargés de contenu web Aux chefs de projet, architectes de l'information, référenceurs et tout responsable de site web (y compris les décideurs et chefs d'entreprise) Aux agences web, responsables de communication et chargés de marketing Le contenu, clef de voûte d'un référencement durable Au-delà du graphisme et des prouesses techniques, c'est le contenu d'un site web qui fait la différence - avant tout, c'est pour lui que vient l'internaute. …”
Libro electrónico -
302995Publicado 2023“…Andy began his professional career as a C/C++ developer and transitioned into Java, C#, and other languages as the years passed. …”
Video -
302996por Denoyelle, Corinne“…C’est pourquoi encore une introduction à caractère théorique tente de mieux en cerner les contours sur le plan générique…”
Publicado 2016
Electrónico -
302997Publicado 2017“…Lowell, Brian O. K. Reeves, Elizabeth C. Robertson, Brian M. Ronaghan, Laura Roskowski, Nancy Saxberg, Jennifer C. …”
Libro electrónico -
302998Publicado 2019“…The second edition was revised to add the latest C-Codes from the most recent release as well as update the make_define macro that accompanies this book in order to add the capability to handle C-Codes. …”
Libro electrónico -
302999Publicado 2019“…What You Need: Code in C++ (>= C++11), Python (2.x or 3.x) and JavaScript (using the HTML5 canvas). …”
Libro electrónico -
303000Publicado 2015“…Reproduce major stylized facts of equity and options markets yourself Apply Fourier transform techniques and advanced Monte Carlo pricing Calibrate advanced option pricing models to market data Integrate advanced models and numeric methods to dynamically hedge options Recent developments in the Python ecosystem enable analysts to implement analytics tasks as performing as with C or C++, but using only about one-tenth of the code or even less. …”
Libro electrónico