Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,228
- Història 1,562
- Universidad Pontificia de Salamanca (España) 1,505
- Documentales 1,157
- Engineering & Applied Sciences 827
- History 658
- Development 588
- Computer Science 583
- Església Catòlica 570
- Mapes 494
- Fonts 482
- Application software 475
- Documents pontificis 414
- Management 404
- Computer programs 359
- HTML (Document markup language) 354
- Design 352
- Web sites 336
- Web site development 318
- Iglesia Católica 299
- Data processing 295
- Fonts històriques 283
- Color 277
- Crítica e interpretación 277
- Documentos 269
- Universidad Pontificia de Salamanca, Facultad de Educación 241
- Política y gobierno 227
- Business & Economics 226
- Computer networks 226
- Operating systems (Computers) 220
-
29501por Mesa Fernández, ElisaTabla de Contenidos: “…El género de adab como fuente documental; 4. AB L-FARAY AL-ISFAH N Y EL KIT B AL-AG; 4.1. …”
Publicado 2008
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
29502Publicado 2010Tabla de Contenidos: “…Síntesis de la esencia y los significados; 3.3. La revisión documental; 3.4. Verificación y credibilidad; 3.5. El grupo de estudiantes; 3.6. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
29503por Badillo Cano, SandraTabla de Contenidos: “…Aplicación de procedimientos de gestión documental -- 9. Medios de almacenamiento y tratamiento de la información. …”
Publicado 2023
Libro electrónico -
29504Publicado 2022Tabla de Contenidos: “…EXPERIENCIAS, SENTIDOS Y ESPERANZAS -- LOS TALLERES COMO ESPACIOS DE APERTURA A LO SITUACIONAL Y LO CONTEXTUAL DESDE LA PROPUESTA NARRATIVA. -- DOCUMENTAL. LA RADIO COMUNITARIA, UNA HERRAMIENTA PARA EL APRENDIZAJE Y LA PARTICIPACIÓN COMUNITARIA -- MESA 5. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
29505por Edwards, James, 1962-Tabla de Contenidos:
Publicado 2009Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
29506Publicado 2013Tabla de Contenidos: “…Storyboard and Concept Art; 6.1 Using Basic Design Documentation; 6.2 Seeing the Story; 6.3 Nonlinear Thinking; 6.4 Storyboarding Process; 6.5 Cut-Scenes; 6.6 Storyboards and Interactive Media; Interview: Mathieu Raynault, Digital Matte Painter; Chapter 7. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
29507por Kennedy, Joseph P.Tabla de Contenidos: “…The Structure of the Patent Document; 5.6.1. The Cover Sheet; 5.6.2. Specification; 5.6.3. …”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
29508Publicado 2014Tabla de Contenidos: “…CONCLUSION: UN MODÈLE DIDACTIQUE FONDÉ SUR LES GENRES D'ACTIVITÉ 63DEUXIÈME PARTIE: INSTRUMENTS MÉTHODOLOGIQUES; CHAPITRE 3: CADRE THÉORICO-MÉTHODOLOGIQUE ET MÉTHODES 69; Présupposés théorico-méthodologiques 69; Unité de base de l'analyse: la séquence d'enseignement 70; Méthodes 75; Expliquer et comprendre 75; Dispositif semi-expériemental 80; Recueil des données 82; Population et contrat de recherche 82; Consigne et conditions d'observation 82; Modalités techniques d'observation 83; Enregistrements 83; Entretiens 84; Traitement des données 85; Documents préparatoires 85; Synopsis 85…”
Libro electrónico -
29509Publicado 2021Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Preface -- Chapter 1: Web Development -- Machine Learning Overview -- Web Communication -- Organizing the Web with HTML -- Web Development Using IDEs/Editors -- Building Blocks of Web Development -- HTML and CSS Programming -- Dynamic HTML -- Cascading Style Sheets -- Inline Style Sheets -- Embedded Style Sheets -- External Style Sheets -- JavaScript Basics -- Including the JavaScript -- Where to Insert JS Scripts -- JavaScript for an Event-Driven Process -- Document Object Model Manipulation -- Introduction to jQuery -- Summary -- References -- Chapter 2: Browser-Based Data Processing -- JavaScript Libraries and API for ML on the Web -- W3C WebML CG (Community Group) -- Manipulating HTML Elements Using JS Libraries -- p5.js -- Drawing Graphical Objects -- Manipulating DOM Objects -- DOM onEvent(mousePressed) Handling -- Multiple DOM Objects onEvent Handling -- HTML Interactive Elements -- Interaction with HTML and CSS Elements -- Hierarchical (Parent-Child) Interaction of DOM Elements -- Accessing DOM Parent-Child Elements Using Variables -- Graphics and Interactive Processing in the Browser Using p5.js -- Interactive Graphics Application -- Object Instance, Storage of Multiple Values, and Loop Through Object -- Getting Started with Machine Learning in the Browser Using ml5.js and p5.js -- Design, Develop, and Execute Programs Locally -- Method 1: Using Python - HTTP Server -- Method 2: Using Visual Studio Code Editor with Node.js Live Server -- Summary -- References -- Chapter 3: Human Pose Estimation in the Browser -- Human Pose at a Glance -- PoseNet vs. …”
Libro electrónico -
29510Building a digital future a transformational blueprint for innovating with microsoft dynamics 365Building a Digital FutureBuilding a Digital FuturePublicado 2021Tabla de Contenidos: “…Why Invest in Strategic OCM Before Starting the Project -- Organization After Implementation and Role Change -- Gain Meaningful Digital Insights for Change -- Embedding Required Cultural Transformation in the Organization -- Measuring User Adoption, Key Performance Indicators, and Benefits Realization -- Measure Benefits Realized Post Go-Live -- Summing Up -- Notes -- Chapter 7 Fundamentals of Executing a Successful Dynamics 365 Project -- Effective Communication -- Importance of Design Thinking, UX Design, and Customer Journey Mapping -- Establishing Clear Design Principles at the Outset -- Shortening Project Timescales Through Empowered Decision Making and Collocated Teams -- Pragmatic Approach to the Agile Implementation of Dynamics 365 -- Incorporating Traditional Planning Approaches with the Flexibility of Agile and Scrum -- Embrace Change: Deliver to Time and Budget -- Summing Up -- Part Three Driving Innovation and Improvements with Dynamics 365 -- Chapter 8 Makers and Shakers of Dynamics 365 Transformation -- Project Charter: Roles and Responsibilities -- Critical Role of the User on a Dynamics 365 Project -- Understanding of Value to Use -- Delivering Value and Getting an Equitable Return -- Why Users Should Create Dynamics 365 Documentation -- Role of Microsoft Customer Success Manager -- Leverage Your Community -- Summing Up -- Notes -- Chapter 9 What Does Post Go-LiveLook Like? …”
Libro electrónico -
29511Publicado 2016Tabla de Contenidos: “…-- I.8 IDENTIFYING REMOTE COMMUNICATION SOURCES -- I.9 GETTING DOCUMENTATION -- 1 THE HISTORY OF WHOIS -- 1.1 IN THE BEGINNING -- 1.2 THE SANDS OF TIME -- 1.3 1950s: ON THE WIRES AND IN THE AIR -- 1.4 1960s: SPARKING THE INTERNET TO LIFE -- 1.5 1970s: OK, NOW THAT WE HAVE AN INTERNET, HOW DO WE KEEP TRACK OF EVERYONE? …”
Libro electrónico -
29512por Conférence Européenne des Ministres des Transports.Tabla de Contenidos: “…Membres du Groupe de direction -- Publications et documents récents et à venir…”
Publicado 2002
Libro electrónico -
29513Publicado 2010Tabla de Contenidos: “…Natural Language and Dialogue Processing; 4.1 Introduction; 4.2 Natural Language Understanding; 4.2.1 Syntactic Parsing; 4.2.2 Semantic Parsing; 4.2.3 Contextual Interpretation; 4.3 Natural Language Generation; 4.3.1 Document Planning; 4.3.2 Microplanning; 4.3.3 Surface Realisation; 4.4 Dialogue Processing; 4.4.1 Discourse Modelling; 4.4.2 Dialogue Management; 4.4.3 Degrees of Initiative; 4.4.4 Evaluation; 4.5 Conclusion; References; Chapter 5. …”
Libro electrónico -
29514Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Introduction to Big Data Visualization -- An explanation of data visualization -- Conventional data visualization concepts -- Training options -- Challenges of big data visualization -- Big data -- Using Excel to gauge your data -- Pushing big data higher -- The 3Vs -- Volume -- Velocity -- Variety -- Categorization -- Such are the 3Vs -- Data quality -- Dealing with outliers -- Meaningful displays -- Adding a fourth V -- Visualization philosophies -- More on variety -- Velocity -- Volume -- All is not lost -- Approaches to big data visualization -- Access, speed, and storage -- Entering Hadoop -- Context -- Quality -- Displaying results -- Not a new concept -- Instant gratifications -- Data-driven documents -- Dashboards -- Outliers -- Investigation and adjudication -- Operational intelligence -- Summary -- Chapter 2: Access, Speed, and Storage with Hadoop -- About Hadoop -- What else but Hadoop? …”
Libro electrónico -
29515Publicado 2014Tabla de Contenidos: “…3.2.1 A Matter of Age3.2.2 The Approach; 3.3 CERN's Role; 3.3.1 A Possible Definition; 3.3.2 Making it Work; 3.3.3 On Documents; 3.3.4 The Director General; 3.3.5 Al Gore, the LHC, and the Rest is History; 3.4 What-if Musings; 3.4.1 Money, Money, Money . . .; 3.4.2 And if Not?…”
Libro electrónico -
29516Publicado 2023Tabla de Contenidos: “…SQL Injection Example -- Surprising Output -- Overly Powerful Input -- Denial-of-Service Threats to Parsers -- Bad Advice -- Chained Parsers -- Specific Parsing Scenario Threats -- Parsing Protocols + Document Formats -- C Code + Memory Safety -- Defenses -- The Robustness Principle -- Input Validation -- Memory Safety -- LangSec -- Conclusion -- Chapter 9 Kill Chains -- Threats: Kill Chains -- Server Kill Chain -- Desktop Kill Chains -- Acquire or Use Credentials -- Kill Chains for Specific Scenarios -- Cloud -- IoT -- Mobile (IoS, Android) -- Weaponization as a Subchain -- "No One Would Ever Do That" -- Ransomware -- Elements of Network Kill Chains -- History -- History of Kill Chains -- Defenses -- Types of Defenses -- Defensive Scenarios -- Conclusion -- Epilogue -- Glossary -- Bibliography -- Story Index -- Episode I: The Phantom Menace -- Episode III: Revenge of the Sith -- Obi-Wan (Television Series) -- Rogue One -- Star Wars: A New Hope -- The Empire Strikes Back -- Return of the Jedi -- Index -- EULA…”
Libro electrónico -
29517Publicado 2016Tabla de Contenidos: “…Corpus annotation; 1.4.6. Corpus documentation; 1.4.7. Statistical analysis of data; 1.4.8. …”
Libro electrónico -
29518Publicado 2024Tabla de Contenidos: “…-- A brief history of APIs -- API types and protocols -- SOAP -- REST -- gRPC -- JSON-RPC -- GraphQL -- Importance of API security -- Common API vulnerabilities -- Summary -- Further reading -- Chapter 2: Setting Up the Penetration Testing Environment -- Technical requirements -- Selecting tools and frameworks -- Building a testing lab -- Installing Docker -- Installing OWASP Software -- Installing Burp Suite -- Installing Postman and Wireshark -- Installing other tools -- Configuring testing environments -- Summary -- Further reading -- Part 2: API Information Gathering and AuthN/AuthZ Testing -- Chapter 3: API Reconnaissance and Information Gathering -- Technical requirements -- Identifying and enumerating APIs -- Analyzing WebGoat -- Looking at crAPI -- Analyzing API documentation and endpoints -- Leveraging OSINT -- Identifying data and schema structures -- Summary -- Further reading -- Chapter 4: Authentication and Authorization Testing -- Technical requirements -- Examining authentication mechanisms -- API keys -- Basic authentication -- OAuth -- Session tokens -- JSON Web Tokens (JWTs) -- Testing for weak credentials and default accounts -- Brute-force attacks -- Common credentials and default accounts -- Exploring authorization mechanisms -- Role-based access control -- Attribute-based access control -- OAuth scopes -- Bypassing access controls -- Broken Object Level Authorization (BOLA) -- Broken Function Level Authorization (BFLA) -- Summary -- Further reading -- Part 3: API Basic Attacks -- Chapter 5: Injection Attacks and Validation Testing -- Technical requirements -- Understanding injection vulnerabilities…”
Libro electrónico -
29519Publicado 2023Tabla de Contenidos: “…2.8 Given a scenario, use common data destruction and disposal methods -- 2.9 Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks -- 2.10 Given a scenario, install and configure browsers and relevant security settings -- Chapter 3: Software Troubleshooting -- Introduction -- Practice Exam Questions -- 3.1 Given a scenario, troubleshoot common Windows OS problems -- 3.2 Given a scenario, troubleshoot common personal computer (PC) security issues -- 3.3 Given a scenario, use best practice procedures for malware removal -- 3.4 Given a scenario, troubleshoot common mobile OS and application issues -- 3.5 Given a scenario, troubleshoot common mobile OS and application security issues -- Chapter 4: Operational Procedures -- Introduction -- Practice Exam Questions -- 4.1 Given a scenario, implement best practices associated with documentation and support systems information management -- 4.2 Explain basic change-management best practices -- 4.3 Given a scenario, implement workstation backup and recovery methods -- 4.4 Given a scenario, use common safety procedures -- 4.5 Summarize environmental impacts and local environmental controls -- 4.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts -- 4.7 Given a scenario, use proper communication techniques and professionalism -- 4.8 Identify the basics of scripting -- 4.9 Given a scenario, use remote access technologies -- Mock Exam -- Solutions -- Index -- Other Books You May Enjoy -- Coupon Code for CompTIA A+ Exam Vouchers and Labs…”
Libro electrónico -
29520Publicado 2007Tabla de Contenidos: “…II: PUTTING VBA TO WORK -- 7 Programming Word -- Working with Documents -- Working with Text -- Working with the Range Object -- Using the Selection Object -- Using the Words Object -- Working with the Sentences Object -- Programming the Paragraph Object -- 8 Programming Excel -- Excel's Application Object -- Manipulating Workbook Objects -- Dealing with Worksheet Objects -- Working with Range Objects -- 9 Programming PowerPoint -- PowerPoint's Presentation Object -- Working with PowerPoint Slide Objects -- Dealing with Shape Objects -- Operating a Slide Show -- 10 Programming Access Databases -- Getting Ready: Two Steps Before You Begin -- Working with Database Records: Opening a Recordset -- Working with a Recordset -- Retrieving Data into Excel -- 11 Programming Outlook Email -- Getting Started -- Working with Outlook Folders -- Handling Incoming and Outgoing Messages -- Working with Email Messages -- Sending a Message -- Working with Attachments -- Programming Outlook from Other Applications -- III: GETTING THE MOST OUT OF VBA -- 12 Creating Custom VBA Dialog Boxes -- Adding a Form to Your Project -- Changing the Form's Design-Time Properties -- Working with Controls -- Handling Form Events -- Types of Form Controls -- Using a Form in a Procedure -- 13 Customizing the Office 2007 Ribbon -- Understanding Ribbon Extensibility -- Extending the Ribbon: An Example -- Hiding the Built-In Ribbon -- Creating Custom Tabs -- Creating Custom Groups -- Creating Custom Controls -- 14 VBA Tips and Techniques -- Working with Modules -- Configuring Macro Security Settings -- Digitally Signing a VBA Project -- Saving Application Settings in the Registry -- Accessing the File System Through VBA -- Tips for Faster Procedures -- 15 Trapping Program Errors -- A Basic Error-Trapping Strategy -- Working with the Err Object -- Trappable VBA Errors…”
Libro electrónico