Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 10,992
- Crítica e interpretación 4,128
- Biblia 3,470
- Història 3,411
- Filosofía 3,156
- History 2,152
- Colecciones 2,041
- Aristóteles 1,852
- Bíblia 1,570
- Iglesia Católica 1,557
- Engineering & Applied Sciences 1,489
- Teología 1,462
- Església Catòlica 1,374
- Historia y crítica 1,319
- Literatura latina clásica 1,317
- Management 1,181
- Platón 1,136
- Development 1,091
- Computer Science 1,077
- Filosofía antigua 1,057
- Derecho canónico 1,045
- Política 1,040
- Filosofía griega 1,037
- Sermones 1,007
- Política y gobierno 967
- Moral cristiana 961
- Obres anteriors al 1800 926
- Crítica i interpretació 915
- Derecho 898
- Espiritualidad 883
-
296921por Ratcliff, Marc J.Tabla de Contenidos: “…Le parcours obligé au sein de la dynamique de relation -- Le triplet et les objets de langage -- La construction de la réalité : le triplet comme critère cognitif -- Le groupe des genevois et l'auteur collectif -- Contexte de réalité, envisionneurs et o.c.t. -- Efficience et stabilité -- La sphère morale du savant : le triplet comme critère normatif -- Les figures et comportements issus du parcours obligé -- Morale ou cognition : la négation du parcours obligé -- Conclusions générales la dialectique du confinement et de la relation -- Quatre auteurs, une histoire ? …”
Publicado 2019
Electrónico -
296922Publicado 2018Tabla de Contenidos: “…6.1.1 Solution Procedures to Dynamic General Function Models, Limitations, and Simulation Methods -- 6.1.2 Simulation of Financial Crises with Calibration Techniques -- 6.2 The Real Side -- 6.3 The Financial Side -- 6.3.1 A Stylized Financial Structure -- 6.3.2 Financial Market Equilibria -- 6.4 The Balance of Payments -- 6.5 Monetary and Exchange Rate Policy -- 6.6 Analytical Solution of the Model -- 6.7 Simulation Classifications and Assumptions -- 6.7.1 Financial Crises as a Cyclical Phenomenon -- 6.7.2 Financial Crises as an Adverse Exogenous Shock Phenomenon -- 6.8 Sensitivity Analysis and Method of Graphical Representation -- 6.9 Simulation of Financial Crises as a Cyclical Phenomenon -- 6.9.1 The Boom Phase -- 6.9.2 The Overborrowing Phase and the Upper Turning Point -- 6.9.3 The Bust Phase -- 6.10 Simulation of Financial Crises Caused by an Adverse Foreign Interest Rate Shock -- 7 Conclusion -- 7.1 New Perspectives for Economic Theory -- 7.2 Policy Recommendations -- A Tobin's q-Theory of Investment -- B Financial Constraints in Perfect Capital Markets -- C An Example of Off-Balance Sheet Transactions -- D Forward vs. …”
Electrónico -
296923Publicado 2019Tabla de Contenidos: “…Development of an innovative multi-performance system for LWS structures -- Seismic design criteria for CFS steel-sheathed shear walls -- Behaviour of aconcrete slab in compression in composite steel-concrete frame joints -- On the development of IoT platforms for the detection of damage in steel railway bridges -- Experimental and numerical studies on shear behaviour of stainless steel plate girders with inclined stiffeners -- Ultimate strength analysis of steel-concrete cross-sections atelevated temperatures -- Seismic design of two-storey X-bracings -- Experimental tests on bolted end-plate connections using thermal insulation layer attached to steel structures -- Assessment of Eurocode fire design rules for structural members made of high strength steels -- Numerical investigation on thin-walled CFS columns in fire -- FEM analysis of the buckling behavior of thin-walled CFS columns. Part I-Channel (C) and Double Channel (I) cross-sections -- FEM analysis of the buckling behaviour of thin-walled CFS columns. …”
Libro electrónico -
296924Publicado 2018Tabla de Contenidos: “…Resetting signals -- Listing traps -- Using traps inside a function -- Running scripts or processes even if the user logs out -- Creating dialog boxes with the dialog utility -- Creating a message box (msgbox) -- Creating a message box (msgbox) with a title -- The yes/no box (yesno) -- The input box (inputbox) -- The textbox (textbox) -- A password box -- The checklist box (checklist) -- The menu box (menu) -- The radiolist box (radiolist) -- The progress meter box (gauge) -- Summary -- Chapter 12: System Startup and Customizing a Linux System -- System startup, inittab, and run levels -- The kernel startup and init process -- Understanding run levels -- System initialization boot scripts -- User initialization scripts -- System-wide setting scripts -- User level settings - default files -- Summary -- Chapter 13: Pattern Matching and Regular Expressions with sed and awk -- The basics of regular expressions -- sed - non-interactive stream editor -- Understanding sed -- Addressing in sed -- How to modify a file with sed -- Printing - the p command -- Deleting - the d command -- Substitution - the s command -- Range of selected lines the comma -- Multiple edits - the e command -- Reading from files - the r command -- Writing to files - the w command -- Appending - the a command -- Inserting - the i command -- Changing - the c command -- Transform - the y command -- Quit - the q command -- Holding and getting - the h and g commands -- Holding and exchanging - the h and x commands -- sed scripting -- Using awk -- The meaning of awk -- Using awk -- Input from files -- Input from commands -- How awk works -- awk commands from within a file -- Records and fields -- Records -- The record separator -- The 0 variable -- The NR variable -- Fields -- Field separators -- The input field separator -- Patterns and actions -- Patterns -- Actions…”
Libro electrónico -
296925Publicado 2016Tabla de Contenidos: “…16.1 Introduction 523 -- 16.2 Layering as Optimization Decomposition 524 -- 16.3 Cross-Layer Optimization 533 -- 16.4 Optimization Problem Decomposition Methods 543 -- References 554 -- 17 Network Information Theory 557 -- 17.1 Capacity of Ad Hoc Networks 557 -- 17.2 Information Theory and Network Architectures 569 -- 17.3 Cooperative Transmission in Wireless Multihop Ad Hoc Networks 577 -- References 584 -- 18 Stability of Advanced Network Architectures 585 -- 18.1 Stability of Cooperative Cognitive Wireless Networks 585 -- 18.2 System Model 586 -- 18.4 Optimal Control Policy 592 -- 18.5 Achievable Rates 594 -- 18.6 Stabilizing Transmission Policies 598 -- References 605 -- 19 Multi-Operator Spectrum Sharing 607 -- 19.1 Business Models for Spectrum Sharing 607 -- 19.2 Spectrum Sharing in Multi-hop Networks 638 -- References 656 -- 20 Large Scale Networks and Mean Field Theory 659 -- 20.1 MFT for Large Heterogeneous Cellular Networks 659 -- 20.2 Large Scale Network Model Compression 664 -- 20.3 Mean Field Theory Model of Large Scale DTN Networks 668 -- 20.4 Mean Field Modeling of Adaptive Infection Recovery in Multicast DTN Networks 674 -- 20.5 Mean Field Theory for Scale-Free Random Networks 701 -- 20.6 Spectrum Sharing and MFT 709 -- 20.7 Modeling Dynamics of Complex System 711 -- Appendix A.20 Iterative Algorithm to Solve Systems of Nonlinear ODEs (DiNSE-Algorithm) 721 -- Appendix B.20 Infection Rate of Destinations for DNCM 722 -- Appendix C.20 Infection Rate for Basic Epidemic Routing 722 -- References 722 -- 21 mmWave Networks 726 -- 21.1 mmWave Technology in Subcellular Architecture 726 -- 21.2 Microeconomics of Dynamic mmWave Networks 737 -- References 747 -- 22 Cloud Computing in Wireless Networks 750 -- 22.1 Technology Background 750 -- 22.2 System Model 752 -- 22.3 System Optimization 756 -- 22.4 Dynamic Control Algorithm 758 -- 22.5 Achievable Rates 761 -- 22.6 Stabilizing Control Policies 763 -- References 769 -- 23 Wireless Networks and Matching Theory 771.…”
Libro electrónico -
296926Publicado 2021Tabla de Contenidos: “…-- Culture Fit -- Ability to Buy -- Motivation -- Competence in M& -- A -- Trust and Alignment of Values -- Vetting Buyers for the Right Fit -- Research -- M& -- A Professionals -- Interview Others -- Build Personal Relationships -- Become a Customer or Vendor -- Partner Up -- Using Partnerships to Trigger Acquisitions -- How to Make Contact with Interested Parties -- Introductions and Referrals -- Networking -- Cold Emails -- Be So Good They Can't Ignore You -- Move Up the List in Reverse Order -- Use Brokers -- The Golden Rule in Making Contact -- Chapter 9 The Communication Process with Buyers -- Liabilities and Responsibilities -- How to Handle Communications -- Gauging Initial Interest -- Nailing the Follow-Up -- Awareness and Discovery -- Learning -- Consideration -- Comparison Shopping -- Trust -- Due Diligence -- Negotiation -- Finding the Decision-Maker -- C-Suite Executives -- Corporate Development -- Advisors -- Transaction Leads -- Business Unit Leaders -- Chapter 10 Preparing for a Successful First Meeting…”
Libro electrónico -
296927Publicado 2021Tabla de Contenidos: “…Step 1: Generate Your API Token in Cloud App Security -- Step 2: Create Your Trigger in Microsoft Flow -- Step 3: Create the Teams Message Action in Microsoft Flow -- Step 4: Generate an Email in Microsoft Flow -- Connecting the Flow in Cloud App Security -- Performing an Automated Response Using Azure Security Center -- Using Machine Learning and Artificial Intelligence in Threat Response -- Overview of Fusion Detections -- Overview of Azure Machine Learning -- Summary -- Chapter 5 Microsoft Cybersecurity Reference Architecture and Capability Map -- Introduction -- Microsoft Security Architecture versus the NIST Cybersecurity Framework (CSF) -- Microsoft Security Architecture -- The Identify Function -- The Protect Function -- The Detect Function -- The Respond Function -- The Recover Function -- Using the Microsoft Reference Architecture -- Microsoft Threat Intelligence -- Service Trust Portal -- Security Development Lifecycle (SDL) -- Protecting the Hybrid Cloud Infrastructure -- Azure Marketplace -- Private Link -- Azure Arc -- Azure Lighthouse -- Azure Firewall -- Azure Web Application Firewall (WAF) -- Azure DDOS Protection -- Azure Key Vault -- Azure Bastion -- Azure Site Recovery -- Azure Security Center (ASC) -- Microsoft Azure Secure Score -- Protecting Endpoints and Clients -- Microsoft Endpoint Manager (MEM) Configuration Manager -- Microsoft Intune -- Protecting Identities and Access -- Azure AD Conditional Access -- Passwordless for End-to-EndSecure Identity -- Azure Active Directory (aka Azure AD) -- Azure MFA -- Azure Active Directory Identity Protection -- Azure Active Directory Privilege Identity Management (PIM) -- Microsoft Defender for Identity -- Azure AD B2B and B2C -- Azure AD Identity Governance -- Protecting SaaS Apps -- Protecting Data and Information -- Azure Purview -- Microsoft Information Protection (MIP)…”
Libro electrónico -
296928Publicado 2016Tabla de Contenidos: “…Promoting competition and improving the business environment -- C. Reforming education and strengthening skill use and school-to-work transitions -- D. …”
Libro electrónico -
296929por OECDTabla de Contenidos: “…. -- Основные выводы по компонентам -- Обеспечение равных условий деятельности в странах Восточного партнерства -- Защита конкуренции -- Принудительное исполнение договоров и альтернативное урегулирование споров -- Коммерческая добросовестность -- Компонент А - Адаптивное государственное управление -- Институционально-нормативная база -- Условия деятельности -- Процедуры банкротства и предоставление второго шанса -- Компонент B - Предприимчивость в развитии человеческого капитала -- Развитие предприимчивости в процессе обучения и поддержка предпринимательской деятельности женщин -- Умения МСП -- Компонент C - Доступ к финансированию -- Доступ к финансированию -- Компонент D - Доступ к рынкам -- Государственные закупки -- Стандарты и технические нормативы -- Интернационализация -- Компонент E - Поддержка инноваций и предпринимательства -- Услуги по развитию бизнеса -- Политика в области инноваций -- Применение принципов зеленой экономики -- Основные результаты оценки по странам…”
Publicado 2020
Libro electrónico -
296930por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Produit intérieur brut -- Tableau C. Comptes des ménages et des institutions privées sans but lucratif -- Tableau D. …”
Publicado 2001
Libro electrónico -
296931Publicado 2017Tabla de Contenidos: “…. -- Passing formatted arguments to a command by reading stdin -- Using xargs with find -- Counting the number of lines of C code in a source code directory -- While and subshell trick with stdin -- Translating with tr -- Getting ready -- How to do it... -- How it works... -- There's more... -- Deleting characters using tr -- Complementing character sets -- Squeezing characters with tr -- Character classes -- Checksum and verification -- Getting ready -- How to do it... -- How it works... -- There's more…”
Libro electrónico -
296932Publicado 2017Tabla de Contenidos: “…. -- Randomized grid search alternative -- Visualize the nonlinear RBF decision boundary -- More meaning behind C and gamma -- Multiclass classification with SVM -- Getting ready -- How to do it... -- OneVsRestClassifier -- Visualize it -- How it works... -- Support vector regression -- Getting ready -- How to do it... -- Chapter 9: Tree Algorithms and Ensembles -- Introduction -- Doing basic classifications with decision trees -- Getting ready -- How to do it... -- Visualizing a decision tree with pydot -- How to do it... -- How it works... -- There's more... -- Tuning a decision tree -- Getting ready -- How to do it... -- There's more... -- Using decision trees for regression -- Getting ready -- How to do it... -- There's more... -- Reducing overfitting with cross-validation -- How to do it... -- There's more... -- Implementing random forest regression -- Getting ready -- How to do it…”
Libro electrónico -
296933Publicado 2018Tabla de Contenidos: “…Deploying Cloud Functions -- Deploying from a local machine -- Deploying from a source repository -- Integrating with other Google services -- IAM and billing -- Cloud Functions and IAM -- Frameworks and tooling -- Summary -- Chapter 7: Google Compute Engine -- Understanding Compute Engine -- IaaS -- Infrastructure as Code (IaC) -- More than virtual machines -- When to use Compute Engine -- A straightforward migration path -- Host anything -- Building a robust global presence -- Long running and resource intensive processes -- Security and compliance -- Virtual machines on Google Compute Engine (GCE) -- Machine types -- Standard machine types -- High-memory machine types -- Mega-memory machine types -- High-CPU machine types -- Shared-core machine types -- Custom machine types -- Extended memory -- Other resources -- Disk storage -- GPUs -- Images -- Public images -- Premium images -- Community images -- Container images -- Managing Compute Engine instances -- Creating instances -- Remote access -- SSH access -- SCP access -- Remote Desktop Protocol (RDP) access -- Metadata server -- Default metadata -- Project-wide metadata -- Instance-specific metadata -- Setting and removing metadata -- Querying metadata from within instances -- Trying it out -- Modifying API responses -- Startup and shutdown scripts -- Startup scripts -- Shutdown Scripts -- Windows machines -- Updates and patches -- Availability policies -- Maintenance behavior -- Restart behavior -- Relocating an instance -- Storage solutions -- Persistent disks -- Standard and solid-state drive (SSD) persistent disks -- Persistent disk performance -- Boot disks -- Managing persistent disks -- Persistent disk snapshots -- Local SSDs -- Creating scalable solutions with GCE -- Custom images -- Creating images from a persistent disk -- Copying an image -- Creating images from snapshots…”
Libro electrónico -
296934por Hochstein, LorinTabla de Contenidos: “…Default Settings -- Appendix C. Using IAM Roles for EC2 Credentials -- AWS Management Console -- Command-Line -- Glossary -- Bibliography -- Index -- About the Author…”
Publicado 2015
Libro electrónico -
296935Publicado 2023Tabla de Contenidos: “…-- Lean and Marketing -- Lessons from an AP Kaizen -- Traditional Metrics Discussion -- We Should Have Part of Our Accounting Report Entitled -- Discover the Opportunities -- Summary -- Part 3: Lean Accounting by Jerold Solomon -- Value Streams -- Accounting for Lean -- Why a Traditional Standard Cost System Is Incompatible with Lean -- Summary -- Chapter Questions -- Notes -- Additional Readings -- Appendix A - Study Guide -- Appendix B - Acronyms -- Appendix C - Glossary -- Index…”
Libro electrónico -
296936Publicado 2016Tabla de Contenidos: “…-- An Introduction to CSS -- More CSS -- Selectors -- Properties -- Precedence in Styles -- The Style Sheet -- Adding CSS to Your Pages -- Creating Embedded and Inline Style Sheets -- Applying Styles -- Managing Styles -- Summary -- Chapter 4 Programming in C# and VB.NET -- Introduction to Programming -- Data Types and Variables…”
Libro electrónico -
296937por Hollander, MylesTabla de Contenidos: “…A Distribution-Free Test for General Alternatives in a Randomized Block Design with an Equal Number c(> -- 1) of Replications Per Treatment-Block Combination (Mack-Skillings) -- Procedure -- Large-Sample Approximation -- Ties -- Comments -- Properties -- Problems -- 7.10. …”
Publicado 2014
Libro electrónico -
296938por Gutjahr, ClaraTabla de Contenidos: “…-- Neuhumanismus und Neoliberalismus - eine verhängnisvolle Verbindung -- Politische Gemeinschaft statt Vereinzelung -- Literaturverzeichnis -- C.H.Beck & -- Co. enteignen! -- 1. Einführung -- 2. …”
Publicado 2024
Libro electrónico -
296939Publicado 2021Tabla de Contenidos: “…-- At COP26, Governments Must Make the Leap On Enforceable and Rising Carbon Pricing -- Pricing Can Trigger Rapid Changes in Behaviours -- Time to Announce a 'C-Day' -- The Price of Carbon - Set a Minimum, a Timeline, and an Adjustable Glidepath -- Cap-and-trade Schemes -- Europe's ETS - the World Leader, Despite Troubles -- China's ETS - a Lot of Room to Grow -- Whither the US On Carbon Pricing -- A Thin Regional Patchwork, With Some Successes -- A National US ETS is Needed -- Learn Lessons and Apply Them Globally and Locally -- Carbon Prices: How High is High Enough? …”
Libro electrónico -
296940Publicado 1947Tabla de Contenidos: “…Joies greco-romanes de l'Estanyol (Girona) / per Josep de C. Serra i Ràfols. La construcció a tornajornals / per Joan Amades. …”
991004128899706719