Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,400
- Application software 1,242
- History 1,188
- Historia 743
- Management 741
- Artificial intelligence 628
- Python (Computer program language) 606
- Computer programs 597
- Data processing 580
- Cloud computing 535
- Social aspects 530
- Machine learning 514
- Computer networks 493
- Engineering & Applied Sciences 476
- Security measures 403
- Design 393
- Computer programming 364
- Computer security 360
- Computer software 360
- Programming 358
- Operating systems (Computers) 354
- Philosophy 347
- Web site development 341
- Computer Science 337
- Information technology 331
- History and criticism 327
- Education 325
- Filosofía 324
- Technological innovations 313
- Data mining 312
-
4541Publicado 2022Tabla de Contenidos: “…Introduction -- Bivariate correlation and regression -- Multiple regression/correlation with two or more independent variables -- Data visualization, exploration, and assumption checking: diagnosing and solving regression problems I -- Data-analytic strategies using multiple regression/correlation -- Quantitative scales, curvilinear relationships, and transformations -- Interactions among continuous variables -- Categorical or nominal independent variables -- Interactions with categorical variables -- Outliers and multicollinearity: diagnosing and solving regression problems II -- Missing data -- Multiple regression/correlation and causal models -- Alternative regression models: logistic, Poisson regression, and the generalized linear model -- Random coefficient regression and multilevel models -- Longitudinal regression methods -- Multiple dependent variables: set correlation…”
Libro electrónico -
4542por Giuseppini, GabrieleTabla de Contenidos: “…Cover; Contents; Foreword; Chapter 1 Introducing Log Parser; Chapter 2 Monitoring IIS; Chapter 3 Exploring the Windows Event Log; Chapter 4 Examining Network Traffic and Performance Logs with Log Parser; Chapter 5 Managing Snort Alerts; Chapter 6 Managing Log Files; Chapter 7 Investigating Intrusions; Chapter 8 Security Auditing; Chapter 9 Enhancing Log Parser; Chapter 10 Formatting, Reporting, and Charting; Chapter 11 Handling Complex Data; Appendix A SQL Grammar Reference; Appendix B Function Reference; Appendix C Input Format Reference; Output Format Reference; Index; Related Titles…”
Publicado 2004
Libro electrónico -
4543por Carkhuff, Robert R.Tabla de Contenidos: “…Responding-Facilitating Exploring; Chapter 6. Personalizing-Facilitating Understanding; Chapter 7. …”
Publicado 2010
Libro electrónico -
4544por Leung, Tim. authorTabla de Contenidos: “…Part I: Getting Started -- 1: Introducing PowerApps -- 2: Subscribing to PowerApps -- 3: Creating your First App -- 4: Sharing Apps -- Part II: Refining Your Application -- 5: Exploring Data Sources -- 6: Using Formulas -- 7: Customizing Screens -- 8: Using Controls -- 9: Working with Data -- 10: Working with Images -- 11: Mapping Data -- 12: Using Charts -- 13: Securing Apps -- Part III: Maintaining Your Application -- 14: Importing and Exporting Data -- 15: Using Flow -- Part IV: Extending Your Application -- 16: Working Offline -- 17: Creating Custom Data Connectors -- 18: Data Models…”
Publicado 2017
Libro electrónico -
4545Publicado 2018Tabla de Contenidos: “…-- No one does it alone, so why should you? -- The power of exploring, discovering, and expressing what you want -- Building your dream team and keeping squares out of your circle -- The yin and yang of expectations and goals -- We learn better when we learn together -- Asking questions and listening for understanding -- Communication and the power of the safe haven -- Good givers are great getters -- Why being a good teammate matters -- High-performing groups and high-performing teams -- Crafting a people plan -- A call to action and poetry…”
Libro electrónico -
4546Publicado 2014Tabla de Contenidos: “…Cover; Title Page; Table of Contents; Introduction; Chapter 1: Finding Your Way Around the Hudl; Chapter 2: Setting Up Your Hudl; Chapter 3: Exploring the Hudl; Chapter 4: Connecting the Hudl; Chapter 5: Staying in Touch; Chapter 6: Taking Photographs; Chapter 7: Watching TV and Films; Chapter 8: Listening to Music; Chapter 9: Discovering Books and Magazines; Chapter 10: Games and Entertainment; Chapter 11: Using Your Hudl to Get Organised; Chapter 12: Shopping on Your Hudl; Chapter 13: Ten Troubleshooting Tips; Chapter 14: Ten Ways to Customise Your Hudl; About the Author…”
Libro electrónico -
4547Publicado 2011Tabla de Contenidos: “…Chapter Seven: Phobic attachments: internal impediments to change Chapter Eight: Two impulses to end an analysis: exploring the transference and countertransference; Chapter Nine: The elusive concept of analytic survival…”
Libro electrónico -
4548por Schroder, Deborah, 1957-Tabla de Contenidos: “…Cover; Little Windows into Art Therapy; Contents; ACKNOWLEDGMENTS; Introduction; Part I: Getting to Know You; 1 Beginning a Relationship Using Art; 2 The Path to the Issue: Working Toward a Plan; 3 Getting to know the Reluctant Client; 4 Welcome to the Living Room; Part II: Deepening the Relationship; 5 Moving into Deeper Work; 6 Exploring and Containing Sadness; 7 Visualizing and Expressing Anger; 8 Embracing All Images; 9 Thoughts on Trauma; 10 Moving Toward Healing; Part II: Moving Toward Good-Bye; 11 Termination Issues; 12 Validating the Work that was done; 13 Anticipating the Future…”
Publicado 2005
Libro electrónico -
4549Publicado 2011Tabla de Contenidos: “…The Problem Of `What We Perceive’ And The Phenomenological Exploration Of New Effects / Index…”
Libro electrónico -
4550por Damonte, AlessiaTabla de Contenidos: “…Causal Inference and Policy Evaluation from Case Studies using Bayesian Process Tracing -- 9. Exploring Interventions ogn Social Outcomes with in Silico, Agent-Based Experiments -- 10. …”
Publicado 2023
Libro electrónico -
4551por Peterlini, Hans Karl. authorTabla de Contenidos: “…Heimat – Shelter or Cuckoo Nest?Exploration of a concept between belonging and exclusion. -- Who am I? …”
Publicado 2023
Libro electrónico -
4552por Seltzer, Vivian Center, authorTabla de Contenidos: “…Phase I Continued: Supplementary Protocols for Further Exploration -- 11. Phase II: Defensive Glitch Protocols -- 12. …”
Publicado 2009
Libro electrónico -
4553por Gisondi, JoeTabla de Contenidos: “…Auto racing -- Baseball -- Basketball -- Bowling -- Cross country -- Field hockey -- Football -- Golf -- Ice hockey -- Lacrosse -- Rowing -- Rugby -- Soccer -- Softball -- Swimming & diving -- Tennis -- Track & field -- Triathlons -- Volleyball -- Wrestling -- Exploring further. Working with sports information directors -- -- Covering fantasy sports -- Avoiding clichés -- Ethics : sports writers can't act like fans -- Broadcasting games on radio -- Assignment desk : exercises…”
Publicado 2011
Libro -
4554Publicado 2022Tabla de Contenidos: “…Introduction Forbidden History -- Reassessing History, Recasting Modernization -- Part I Ideology and Propaganda -- Spiritual Pollutions and Sugar-Coated Bullets -- The Scourge of Bourgeois Liberalization -- Part II The Economy -- Liberating the Productive Forces -- The Powers of the Market -- Part III Technology -- Responding to the New Technological Revolution -- A Matter of the Life and Death of the Nation -- Part IV Political Modernization -- Masters of the Country -- Explore without Fear -- Part V Before Tiananmen -- Two Rounds of Applause -- A Great Flood -- We Came Too Late -- Part VI Tiananmen and After -- Political Crackdown and Narrative Crisis -- Recasting Reform and Opening -- The Socialist Survivor in a Capitalist World -- Conclusion A New Era…”
Libro -
4555por Smith, MichaelTabla de Contenidos: “…-- Objectivity and moral realism: on the significance of the phenomenology of moral experience -- In defense of The moral problem: a reply to Brink, Copp, and Sayre-McCord -- Exploring the implications of the dispositional theory of value -- Internalism's wheel -- Evaluation, uncertainty, and motivation -- Ethics and the a priori: a modern parable…”
Publicado 2004
Libro -
4556Publicado 2009Tabla de Contenidos: “…Introduction : brain change and social change -- How the brain shapes the political mind -- Anna Nicole on the brain -- The political unconscious -- The brain's role in family values -- The brain's role in political ideologies -- Political challenges for the twenty-first-century mind -- A new consciousness -- Traumatic ideas : the War on Terror -- Framing reality : privateering -- Fear of framing -- Confronting stereotypes : sons of the welfare queen -- Aim above the bad apples -- Cognitive policy -- Contested concepts everywhere -- The technical is the political -- Exploring the political brain -- The problem of self-interest -- The metaphors defining rational action -- Why hawks win -- The brain's language -- Language in the new enlightenment -- Afterword : what if it works? …”
Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
4557por Cushion, StephenTabla de Contenidos: “…Introduction: from mediation to mediatization -- Interpreting news conventions as journalistic interventions: exploring the changing nature of television journalism and political reporting -- Embracing or resisting a rolling news logic? …”
Publicado 2015
Libro -
4558Publicado 2023Tabla de Contenidos: “…Reviewing the changed files -- Commenting on code -- Suggesting changes -- Finishing the review -- Reading More about Pull Requests -- Part 4 Managing and Contributing to Large Projects -- Chapter 9 Exploring and Contributing to OSS -- Exploring GitHub -- Exploring topics -- Trending repositories -- Exploring collections -- Exploring events -- Exploring GitHub Sponsors -- Getting by with help from your friends -- Finding Places to Contribute -- Surveying a Project for Contribution -- Reading the contributing guide -- Reading the contributing code guide -- Reading the code of conduct -- Setting Contributor Expectations -- They won't fix every issue -- They won't merge every pull request -- They don't owe you anything -- Keeping Tabs on a Project -- Chapter 10 Starting Your Own OSS -- Creating an Open Source Repository -- Adding a license -- Adding contributor guidelines -- Adding a code of conduct -- Making a Repository Public -- Enforcing a Code of Conduct -- Responding with kindness -- Leveraging the ban hammer -- Blocking users -- Writing a README.md File -- Writing Good Documentation -- Managing Issues -- Labeling issues -- Triaging issues -- Issue templates -- Saved replies -- Ending Your Project -- Archiving a project -- Transferring ownership -- Chapter 11 Inner-Source Your Code on GitHub -- Why Code in Private? …”
Libro electrónico -
4559Publicado 2025Tabla de Contenidos: “…-- Choose the Right Printer -- Unpack and Install a New Printer -- Set Up a Printer to Work with Windows -- Set a Default Printer -- Set Printer Preferences -- Manage a Print Queue -- Remove a Printer -- Part 2 Getting Up to Speed with Windows -- Chapter 4 Working with Apps in Windows -- Discover the Names of Functions -- Start an App -- Exit an App -- Find Your Way Around in a Desktop App -- Find Your Way Around in a Microsoft Store App -- Work with a Window -- Switch among Running Apps -- Move and Copy Data between Apps -- Install New Apps -- Remove Apps -- Chapter 5 Managing Your Personal Files -- Understand How Windows Organizes Data -- Explore the File Explorer Interface -- Move between Different Locations -- Locate Files and Folders…”
Libro electrónico -
4560Publicado 2024Tabla de Contenidos: “…-- A simple example -- Unpacking malware functionality and behavior -- Types of malware -- Reverse shells -- Practical example: reverse shell -- Practical example: reverse shell for Windows -- Demo -- Leveraging Windows internals for malware development -- Practical example -- Exploring PE-file (EXE and DLL) -- Practical example -- The art of decieving a victim's systems -- Summary -- Chapter 2: Exploring Various Malware Injection Attacks -- Technical requirements -- Traditional injection approaches - code and DLL -- A simple example -- Code injection example -- DLL injection -- DLL injection example -- Exploring hijacking techniques -- DLL hijacking -- Practical example -- Understanding APC injection -- A practical example of APC injection -- A practical example of APC injection via NtTestAlert -- Mastering API hooking techniques -- What is API hooking? …”
Libro electrónico