Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,228
- Història 1,562
- Universidad Pontificia de Salamanca (España) 1,505
- Documentales 1,157
- Engineering & Applied Sciences 827
- History 658
- Development 588
- Computer Science 583
- Església Catòlica 570
- Mapes 494
- Fonts 482
- Application software 475
- Documents pontificis 414
- Management 404
- Computer programs 359
- HTML (Document markup language) 354
- Design 352
- Web sites 336
- Web site development 318
- Iglesia Católica 299
- Data processing 295
- Fonts històriques 283
- Color 277
- Crítica e interpretación 277
- Documentos 269
- Universidad Pontificia de Salamanca, Facultad de Educación 241
- Política y gobierno 227
- Business & Economics 226
- Computer networks 226
- Operating systems (Computers) 220
-
27601Publicado 2021Tabla de Contenidos: “…. -- Introduction -- A specific strategy nurses can use to support patients -- Decision making aids -- Having the conversation -- Documentation -- Support for nurses who support the patient -- Ongoing training -- References…”
Libro electrónico -
27602por World Health Organization.Tabla de Contenidos: “…Publication history -- Acknowledgements -- Executive summary -- Introduction -- Objectives -- Scope -- Target audience -- Population of interest -- Priority questions -- Outcomes of interest -- Presentation of the recommendations -- Description of the interventions -- Evidence and recommendations -- Summary of considerations common to all recommendations -- Immediate support to initiate and establish breastfeeding -- Feeding practices and additional needs of infants -- Creating an enabling environment -- Implementation of the guideline -- Implementation considerations -- Regulatory considerations -- Ethical and equity considerations -- Monitoring and evaluation of guideline implementation -- Research gaps -- Guideline development process -- WHO steering group -- Guideline development group -- External resource persons -- Systematic review teams -- Management of conflicts of interests -- Identification of priority questions and outcomes -- Evidence identification and retrieval -- Quality assessment and grading of evidence -- Formulation of recommendations -- Consensus decision-making rules and procedures -- Document preparation and peer-review -- Dissemination and plans for updating -- Dissemination -- Plans for updating the guideline -- References -- Annex 1. …”
Publicado 2017
Libro electrónico -
27603Publicado 2019Tabla de Contenidos: “…Tucker -- Case vectors: spatial representations of the law using document embeddings / Elliott Ash and Daniel L. Chen -- Reference networks and civil codes / Adam B. …”
Libro -
27604Publicado 2016Tabla de Contenidos: “…Litts -- Build in Progress : Building Process-Oriented Documentation / Tiffany Tseng -- Developing a Maker Mindset / Lisa Regalla…”
Libro -
27605Publicado 2015Tabla de Contenidos: “…Remarque -- On Edlef Köppen -- Documentation and narrative: Edlef Köppen's Heeresbericht and the anti-war novel of the late Weimar republic -- On Leonhard Frank -- War, identity, truth and love: Leonhard Frank's Karl und Anna -- On Arnold Zweig -- Arnold Zweig -- On Hans Chlumberg -- Memory and prophecy among the war-graves: Chlumberg's Wunder um Verdun…”
Libro -
27606Publicado 2006Tabla de Contenidos: “…-- Scholarship as self-knowledge: a case study -- Secrecy, politics, and science: probing the meaning of the cold war -- The politics of phosphorus-32: a cold war fable based on fact -- Secrecy and science revisited: from politics to historical practice and back -- History detectives: new ways of approaching modern science, medicine, and technology -- The conflict of memories and documents: dilemmas and pragmatics of oral history -- Reading photographs: photographs as evidence in writing the history of modern science -- New voices: omitted and novel perspectives -- What we still don't know about south-north technoscientific exchange: north-centrism, scientific diffusion and the social studies of science -- Witnessing the witnesses: potentials and pitfalls of the witness seminar in the history of twentieth century medicine -- The mutt historian: the perils and opportunities of doing history of science on-line…”
Libro -
27607por Redmond, Tony, 1959-Tabla de Contenidos: “…_Common Elements -- Actions -- Animations -- Annotations_Buttons -- Objects -- Using the Images -- 4. Working with Documents -- 04.01 Insert Documents to the Right of Existing Tabs -- 04.02 Recent Files -- 04.03 Working with Documents on Multiple Monitors -- 04.04 Navigate Open Document Windows -- 04.05 Close the Current Document Window -- 04.06 Open a File Location from the File Tab -- 04.07 Open the File Menu Drop-Down List from Your Keyboard -- 04.08 Using the IDE Navigator -- Navigator Areas -- Active files -- Active tool windows -- 04.09 Multiple Views of the Same Document -- Special Note for VB Users in Visual Studio 2010 -- Multiple Views -- 04.10 Closing Just the Selected Files You Want -- 04.11 Understanding the File Open Location -- 04.12 Show Previous Versions -- 04.13 Using Custom File Extension Associations -- 5. …”
Publicado 2013
Libro electrónico -
27608Publicado 2021Tabla de Contenidos: “…Building Your Own Data Set: Documenting Knife Crime in the United Kingdom -- 8. …”
Libro electrónico -
27609Publicado 2018Tabla de Contenidos: “…Sending HATEOAS Links in Response -- Spring Boot Starter HATEOAS -- Validation -- Enabling Validation on the Controller Method -- Defining validations on the Bean -- Unit Testing Validations -- Documenting REST Services -- Generating a Swagger Specification -- Swagger UI -- Customizing Swagger Documentation Using Annotations -- Securing REST Services with Spring Security -- Adding Spring Security Starter -- Basic Authentication -- Integration Testing -- Unit Testing -- OAuth 2 Authentication -- High-level flow -- Implementing OAuth 2 authentication for Our Service -- Setting up Authorization and Resource Servers: -- Executing OAuth Requests -- Obtaining an Access Token -- Executing the Request Using the Access Token -- Integration Test -- Internationalization -- Caching -- Spring-boot-starter-cache -- Enabling Caching -- Caching Data -- JSR-107 Caching Annotations -- Auto-Detection Order -- Summary -- Assessments -- Lesson 3: Advanced Spring Boot Features -- Externalised Configuration -- Customizing Frameworks Through application.properties -- Logging -- Embedded Server Configuration -- Spring MVC -- Spring Starter Security -- Data Sources, JDBC and JPA -- Other Configuration Options -- Custom Properties in Application.Properties -- Configuration properties - Type-Safe Configuration Management -- Profiles -- Profiles-Based Bean Configuration -- Other Options for Application Configuration Values -- YAML Configuration -- Embedded Servers -- Switching to Jetty and Undertow -- Building a WAR file -- Developer Tools -- Live Reload -- Spring Boot Actuator -- HAL Browser -- Configuration Properties -- Environment Details -- Health -- Mappings -- Beans -- Metrics -- Auto-Configuration -- Debugging -- Deploying an Application to Cloud -- Cloud Foundry -- Summary -- Assessments -- Appendix: Assessment Answers…”
Libro electrónico -
27610Publicado 2021Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Part I - Data Ingestion -- Chapter 1: Tabular Formats -- Tidying Up -- CSV -- Sanity Checks -- The Good, the Bad, and the Textual Data -- The Bad -- The Good -- Spreadsheets Considered Harmful -- SQL RDBMS -- Massaging Data Types -- Repeating in R -- Where SQL Goes Wrong (and How to Notice It) -- Other Formats -- HDF5 and NetCDF-4 -- Tools and Libraries -- SQLite -- Apache Parquet -- Data Frames -- Spark/Scala -- Pandas and Derived Wrappers -- Vaex -- Data Frames in R (Tidyverse) -- Data Frames in R (data.table) -- Bash for Fun -- Exercises -- Tidy Data from Excel -- Tidy Data from SQL -- Denouement -- Chapter 2: Hierarchical Formats -- JSON -- What JSON Looks Like -- NaN Handling and Data Types -- JSON Lines -- GeoJSON -- Tidy Geography -- JSON Schema -- XML -- User Records -- Keyhole Markup Language -- Configuration Files -- INI and Flat Custom Formats -- TOML -- Yet Another Markup Language -- NoSQL Databases -- Document-Oriented Databases -- Missing Fields -- Denormalization and Its Discontents -- Key/Value Stores -- Exercises -- Exploring Filled Area -- Create a Relational Model -- Denouement -- Chapter 3: Repurposing Data Sources -- Web Scraping -- HTML Tables -- Non-Tabular Data -- Command-Line Scraping -- Portable Document Format -- Image Formats -- Pixel Statistics -- Channel Manipulation -- Metadata -- Binary Serialized Data Structures -- Custom Text Formats -- A Structured Log -- Character Encodings -- Exercises -- Enhancing the NPY Parser -- Scraping Web Traffic -- Denouement -- Part II - The Vicissitudes of Error -- Chapter 4: Anomaly Detection -- Missing Data -- SQL -- Hierarchical Formats -- Sentinels -- Miscoded Data -- Fixed Bounds -- Outliers -- Z-Score -- Interquartile Range -- Multivariate Outliers -- Exercises -- A Famous Experiment -- Misspelled Words…”
Libro electrónico -
27611Publicado 2009Tabla de Contenidos: “…3.4 Implement a basic wireless networkReview Questions; Answers to Review Questions; Chapter 4 - Domain 4 Network Management; 4.1 Explain the function of each layer of the OSI model; 4.2 Identify types of configuration management documentation; 4.3 Given a scenario, evaluate the network based on configuration management documentation; 4.4 Conduct network monitoring to identify performance and connectivity issues; 4.5 Explain different methods and rationales for network performance optimization; 4.6 Given a scenario implement network troubleshooting methodology…”
Libro electrónico -
27612Publicado 2015Tabla de Contenidos: “…Accept a ConnectionEnable Ideas; Configure Ideas Themes; Enable Social Contacts; Configure Salesforce1; Leave Feedback on Documents in Content; Upload Documents to Content; Customize Libraries and Content; Enable Libraries and Content; Chapter 7: Configuring Security; View Object Security; Change Default Record Access; View the Role Hierarchy; Configure Session Settings; Create a New Role; Enable Field History; Configure the Password Policy; Configure Network Access; Configure Remote Site Settings; Reset a Security Token; Grant Login Access; Create a Validation Rule; Disable a Validation Rule…”
Libro electrónico -
27613Publicado 2015Tabla de Contenidos: “…Bibliometrical studies; 2.2.1.4. Document and genre studies; 2.2.1.5. Epistemological and critical studies…”
Libro electrónico -
27614Publicado 2015Tabla de Contenidos: “…Chapter 2: Configuring Persistence with MongoDBLearning outcomes of MongoDB; An introduction to MongoDB; Documents; Collections; Databases; An example - a product order database; Connecting to MongoDB; Linux and Mac OS X; Windows; Creating a database; Creating our collections; Creating relations between documents; Querying MongoDB; Searching by ID; Searching by property value; Advanced queries; Connecting MongoDB and Node.js; Setting up a basic project; Connecting to MongoDB; Summary; Chapter 3: Creating an API; Learning outcomes of the RESTful API; RESTing easy; It's all hypermedia; GET…”
Libro electrónico -
27615Publicado 2023Tabla de Contenidos: “…Intro -- Table of Contents -- Title Page -- Copyright Page -- DISCLAIMER -- LIST OF SECF TABLES -- LIST OF SECF FIGURES -- LIST OF SECAG TABLES -- LIST OF SECAG FIGURES -- INCOSE NOTICES -- ACKNOWLEDGEMENTS -- INTRODUCTION -- PURPOSE -- SCOPE -- PART I: SYSTEMS ENGINEERING COMPETENCY FRAMEWORK -- SECF INTRODUCTION -- SECF SCOPE -- SECF PURPOSE -- SECF CONTEXT -- SECF OBJECTIVE -- SECF DOCUMENT OVERVIEW -- INCOSE SE COMPETENCY FRAMEWORK DEFINITION -- COMPETENCY OVERVIEW -- FRAMEWORK STRUCTURE -- COMPETENCE PROFICIENCY LEVELS -- LANGUAGE STANDARDIZATION WITHIN THE FRAMEWORK -- COMPETENCY AREA TABLE FORMAT -- USING THE COMPETENCY FRAMEWORK -- TYPICAL USAGE SCENARIOS -- TAILORING THE FRAMEWORK -- THE RELATIONSHIP BETWEEN ROLES, JOB DESCRIPTIONS, AND COMPETENCIES -- SECF ACRONYMS AND ABBREVIATIONS -- SECF GLOSSARY -- SECF BIBLIOGRAPHY -- SECF ANNEX A: SUMMARY AND RATIONALE FOR CHANGES IN THE SECF SECOND EDITION -- SECF STRUCTURAL CHANGES -- PRIMARY TECHNICAL CHANGES -- SECF ANNEX B: ALIGNMENT WITH INCOSE AND OTHER INITIATIVES -- INCOSE SYSTEMS ENGINEERING HANDBOOK FOURTH EDITION -- INCOSE SYSTEMS ENGINEERING PROFESSIONAL (SEP) CERTIFICATION PROGRAM -- INCOSE VISION 2035 ROLES AND COMPETENCIES -- INCOSE MODEL‐BASED SYSTEMS ENGINEERING (MBSE) INITIATIVE -- ATLAS PROFICIENCY MODEL -- SECF ANNEX C: DEFINING ROLES USING THE FRAMEWORK -- DEFINING ROLES ‐ INTRODUCTION -- CONSIDERATIONS WHEN DEFINING ROLE STATEMENTS -- ROLE STATEMENT STRUCTURE -- ASSIGNING COMPETENCIES TO A ROLE STATEMENT -- ROLE TAILORING AND ORGANIZATION -- ACTIVITY PRIORITIZATION AND ROLE TAILORING -- SECF ANNEX D: SINCOSE SYSTEMS ENGINEERING COMPETENCY FRAMEWORK -- SECF ANNEX E: SECF COMMENT FORM -- PART II: SECAG ‐ SYSTEMS ENGINEERING COMPETENCY ASSESSMENT GUIDE -- SECAG INTRODUCTION -- SECAG SCOPE -- SECAG PURPOSE -- SECAG CONTEXT -- SECAG OBJECTIVE…”
Libro electrónico -
27616Publicado 2008Tabla de Contenidos: “…Teach Yourself Visually MacBook; Table of Contents; Chapter 1 Explore the MacBook; Tour MacBook; Start Up and Log In; Explore the Mac OS X Desktop; Point and Click, Double-click, or Right-click; Understand Disks, Volumes, Discs, Folders, and Files; Sleep, Log Out, Restart, or Shut Down; Chapter 2 Look Through Mac OS X Finder Windows; Understand Finder, Application, and Document Windows; Open, View, and Scroll in Windows; Minimize, Resize, Move, or Close Windows; View Finder Windows in Icon View; View Finder Windows in List View; View Finder Windows in Column View…”
Libro electrónico -
27617Publicado 2018Tabla de Contenidos: “…JavaScript and Danger-Driven Development -- The global object and local variables -- Avoiding global variables -- Evaluating local variables -- Avoiding bad idioms and keeping an eye on the very bad parts -- Bad idioms -- Bad constructs - the with statement -- Bad constructs - the eval statement -- Bad constructs - the try-catch-finally construct -- Avoiding inefficient loops -- Linters and strict mode -- Using the DOM efficiently -- Modifying the document tree -- Updating an invisible element -- Making style changes -- Searching for nodes -- Inspecting a large number of nodes -- Managing references from one document to another -- Caching DOM values -- Structuring and loading a JavaScript application -- Minimizing costly operations -- Cleaning up, minifying, and compressing resources -- Loading page resources -- Caching page resources -- Summary -- Functional JavaScript -- Simplifying functions -- Functional programming principles -- Functions as first-class citizens -- Dealing with side effects -- Immutability -- Functional programming techniques -- Map -- Filter -- Reduce -- Tail-call optimization -- What is TCO? …”
Libro electrónico -
27618por McFedries, PaulTabla de Contenidos: “…CUSTOMIZE A LAYOUT by removing placeholdersChange layouts when you CREATE YOUR OWN MASTERS; ADD A WATERMARK to your slides; PLACE SLIDE NUMBERS on all slides; REPLACE ALL INSTANCES OF A FONT in your presentation; MAKE A DOCUMENT THEME THE DEFAULT for new presentations; CREATE UNIQUE BULLETS from your own custom graphics; CHANGE THE LAYOUT of an existing slide; Add emphasis by inserting a CUSTOM BACKGROUND IMAGE; Display Content in DIFFERENT LANGUAGES; Create a CUSTOM SLIDE THEME; Chapter 3 Add Impact with Graphics; Communicate Information with a SMARTART GRAPHIC…”
Publicado 2007
Libro electrónico -
27619Publicado 2020Tabla de Contenidos: “…Analysis and Planning -- Analysing the problem -- Anticipating possible errors and issues, and mitigating them -- The role of documentation -- Summary -- 7. Writing Good-Quality Code -- Coding the solution -- Naming conventions -- The importance of layout and commenting -- Comments as documentation -- Handling errors and exceptions -- Code review methods -- Tips for good coding -- Summary -- 8. …”
Libro electrónico -
27620por Webb, Jeff, 1961-Tabla de Contenidos: “…Removing Users and Editing PermissionsGrouping Users; Putting SharePoint to Work; Creating a Company Phone List; Replacing Network Drives with Libraries; Using Document Version Control; Best Practices; Word, Excel, and Outlook; Setting Client Security; Editing, Saving, and Sharing Documents; Using the Task Pane; Working Offline in Office 2007; Working Offline in Office 2003; Resolving Conflicting Updates; Requiring Check Out to Avoid Conflicts; Editing Lists in Excel; Viewing SharePoint Lists in Excel; Editing Lists Offline and Resolving Conflicts; Importing Data into SharePoint from Excel…”
Publicado 2007
Libro electrónico