Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 100
- Historia 80
- Management 29
- Social aspects 20
- Philosophy 19
- RELIGION 18
- Leadership 17
- Opus Dei 17
- Política y gobierno 17
- Social conditions 16
- Vida cristiana 16
- Aspectos sociales 14
- Success in business 14
- Economic conditions 13
- Filosofía 13
- Information technology 13
- Politics and government 13
- Application software 12
- Business & Economics 12
- Economic aspects 12
- Development 11
- Hierro 11
- Marketing 11
- Technological innovations 11
- History and criticism 10
- Psychological aspects 10
- Puppet (Computer file) 10
- Relaciones 10
- Biblia 9
- Commerce 9
-
581Publicado 2017Tabla de Contenidos:Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
582Publicado 2018Tabla de Contenidos: “…-- A brief history of the genre -- Characteristics of an RPG -- Story and setting -- A glimpse of a cRPG story -- Exploration and quests -- A glimpse at our exploration and quests -- Inventory system -- Character attributes and actions -- Experience and leveling -- Combat system -- User interaction and graphics -- Existing or upcoming RPG games -- MU Legend -- Titan Siege -- Citadel: Forged with Fire -- Cyberpunk 2077 -- Patterns in RPG -- Terminology -- Contest tree -- Last Man Standing -- Negotiated Contest -- Summary -- Chapter 2: Planning the Game -- Building our RPG -- The story of the Zazar dynasty -- Backstory -- Exploration and quests -- Awakening -- The village -- Broken forest - the horizon -- The kingdom -- Asset inventory -- Environment assets -- Medieval Environment Pack -- Terrain Toolkit 2017 -- Nature Starter Kit 2 -- Character assets -- Barbarians -- Orcs -- Villagers -- Free Assets -- Level design -- Setting the stage -- Terrain toolkit in a nutshell -- The Awakening -- Using the terrain model -- Using a custom toolkit -- Skybox -- Testing the level -- Creating the main menu -- Creating the GameMaster script -- Summary -- Chapter 3: RPG Character Design -- Character definitions -- Character assets -- Base character class attributes -- Character states -- Character model -- Default character models -- Barbarian -- Villager -- Orc -- Let's get started -- Rigging your model -- Character motion -- Animator Controller -- Animation states -- Character controller -- Modification to animations -- Inverse Kinematics -- Setting the animation curve -- Summary -- Chapter 4: The Game Mechanics -- Customizing the player character -- Customizable parts -- User interface…”
Libro electrónico -
583Publicado 2018Tabla de Contenidos: “…Introduce Fresh Alternatives to Trite Jargon -- Be Discerning about Nuance -- Use Plain Language-Even If It's Technical -- Piquing Investors' Interest -- Forge a Compelling Storyline for Your Piece -- Craft Alluring Headlines -- Incorporate Storytelling and Anecdotes -- Animate Your Writing with Quotations, Metaphors, and Other References -- The Value of a Style Guide for Investment Writing -- Key Areas to Cover in Your Firm's Style Rules -- Syntax, Wording, and Formatting -- First-Person Pronouns and Possessives -- Chart Labeling -- International Considerations -- Inessential Words -- Cumbersome Constructions -- Legal Considerations -- Tone -- Principles for Creating Scannable Copy -- Addressing Common Language Mistakes -- A Parting Note on Style -- Notes -- Chapter 5: Developing an Architecture of Investment Content -- Part 1: Foundational Literature -- Firm-Overview and Investment-Capabilities Brochures -- Strategy and Product Profiles -- Packaging Your Strategy or Product Profile with Other Literature -- RFP Responses -- Pitch Books -- Case Studies -- Topical Brochures -- Concluding Foundational Literature with a Call to Action -- Part 2: Intellectual Capital -- The Strategic Use of Intellectual Capital -- The Elements of Intellectual Capital -- The Packaging of Intellectual Capital -- The Process of Writing Long-Form Literature -- Part 3: Educational Literature -- Part 4: Digital and Social Media -- Part 5: Shareholder Communications -- Fund-Performance Commentary -- Now That You've Mapped Architecture ... -- Notes -- Chapter 6: How to Simplify Complex Investment Subjects -- Think Bits-Not Pieces -- Visualize the Idea for Your Readers -- Start with a Preamble -- Lay Out a Table -- Use a Frame of Reference, Analogy, or Metaphor -- Give an Example -- Note -- Chapter 7: How to Make Investment Writing Legally Compliant…”
Libro electrónico -
584por DiBona, ChrisTabla de Contenidos: “…2.4.2. VoIP2.4.3. SourceForge; 2.5. Software Distribution; 2.5.2. Online Updating/Installation; 2.6. …”
Publicado 2005
Libro electrónico -
585por Swift, K. G.Tabla de Contenidos: “…Chapter 3 - Casting Processes 3.1 Sand Casting; 3.2 Shell Moulding; 3.3 Gravity Die Casting; 3.4 Pressure Die Casting; 3.5 Centrifugal Casting; 3.6 Investment Casting; 3.7 Ceramic Mould Casting; 3.8 Plaster Mould Casting; 3.9 Squeeze Casting; Chapter 4 - Forming Processes; 4.1 Forging; 4.2 Rolling; 4.3 Drawing; 4.4 Cold Forming; 4.5 Cold Heading; 4.6 Swaging; 4.7 Superplastic Forming; 4.8 Sheet-metal Shearing; 4.9 Sheet-metal Forming; 4.10 Spinning; 4.11 Powder Metallurgy; 4.12 Metal Injection Moulding; 4.13 Continuous Extrusion (Metals); Chapter 5 - Plastics and Composites Processing…”
Publicado 2013
Libro electrónico -
586Publicado 2018Tabla de Contenidos: “…Introduction / Nathalie Henry Riche, Christophe Hurter, Nicholas Diakopoulos, and Sheelagh Carpendale : Research in data visualization : from understanding to exploration to data storytelling ; Practice in data journalism: from communication to data ; Evidence to data storytelling ; Forging new interdisciplinary prospectives -- Storytelling in the wild: implications for data storytelling / Barbara Tversky : Perceiving and understanding events ; Spontaneous retellings of events ; Kinds of discourse ; Graphic descriptions, explanations, and storytelling ; How graphics work ; Designing effective graphic displays ; Looking forward: insights from comix ; Returning to data ; Design of the world: Spraction ; Pulling things together -- Exploration and explanation in data-driven storytelling / Alice Thudt, Jagoda Walny, Theresia Gschwandtner, Jason Dykes, and John Stasko : Characterizing exploration and explanation in visual data-drive stories ; Dimensions of data-driven visual stories : Flexibility; Interpretation ; Benefits of exploration and explanation -- Data-driven storytelling techniques: analysis of a curated collection of visual stories / Charles D. …”
Libro electrónico -
587Publicado 2024Tabla de Contenidos: “…. -- Getting to Know HTML -- Working with HTML elements and tags -- Dealing with tag attributes -- A barebones HTML page -- Giving your page a title -- Adding some text -- Getting Familiar with CSS -- Understanding cascading style sheets -- Styles: Bundles of formatting options -- Sheets: Collections of styles -- Cascading: How styles propagate -- Getting comfy with CSS rules and declarations -- Applying styles to a page -- Inserting inline styles -- Embedding an internal style sheet -- Linking to an external style sheet -- Chapter 2 Constructing Pages with Good Bones -- Getting to Know HTML's Basic Structure Tags -- Forging paragraphs -- Naming page parts with headings -- Giving a line a break -- Structuring the Page -- The < -- header> -- tag -- The < -- nav> -- tag -- The < -- main> -- tag -- The < -- article> -- tag -- The < -- section> -- tag -- The < -- aside> -- tag -- The < -- footer> -- tag -- Handling non-semantic content with < -- div> -- -- Handling words and characters with < -- span> -- -- Chapter 3 Adding Links, Lists, and Images -- Applying the Basic Text Tags -- Emphasizing text -- Marking important text -- Adding quotations -- Creating Links -- Building Bulleted and Numbered Lists -- Making your point with bulleted lists -- Numbered lists: Easy as one, two, three -- Inserting Special Characters -- Inserting Images -- First, a mercifully brief look at image formats -- Inserting an image -- Turning an image into a link -- Chapter 4 Building Web Forms…”
Libro electrónico -
588Publicado 2010Tabla de Contenidos: “…Chapter 16. Using Our Voice: Forging a Public Health Practice for Social Justice Rajiv Bhatia, June Weintraub, Lili Farhang, Karen Yu and Paula Jones Chapter 17. …”
Libro -
589Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface: Five Practices for Becoming an Exemplary Leader -- Prologue: When Leaders Are at Their Personal Best -- The Five Practices of Exemplary Leadership -- Model the Way -- Inspire a Shared Vision -- Challenge the Process -- Enable Others to Act -- Encourage the Heart -- The Ten Commitments of Exemplary Leadership -- Practice #1: Model the Way -- Reflections from the Student Leadership Practices Inventory -- Chapter 1 Commitment #1: Clarify Values -- Find Your Voice -- Let Your Values Guide You -- Say It in Your Own Words -- Affirm Shared Values -- Give People Reasons to Care -- Forge Unity, Don't Force It -- Reflect and Act: Clarify Values -- Reflect -- Act -- Chapter 2 Commitment #2: Set the Example -- Live the Shared Values -- Spend Your Time and Attention Wisely -- Watch Your Language -- Ask Purposeful Questions -- Seek Feedback -- Teach Others to Model the Values -- Confront Critical Incidents -- Tell Stories -- Reinforce through Systems and Processes -- Reflect and Act: Set the Example -- Reflect -- Act -- Practice #2: Inspire a Shared Vision -- Reflections from the Student Leadership Practices Inventory -- Chapter 3 Commitment #3: Envision the Future -- Imagine the Possibilities -- Reflect on Your Past -- Attend to the Present -- Prospect the Future -- Express Your Passion -- Find a Common Purpose -- Listen Deeply to Others -- Make It a Cause for Commitment -- Look Forward in Times of Rapid Change -- Reflect and Act: Envision the Future -- Reflect -- Act -- Chapter 4 Commitment #4: Enlist Others -- Appeal to Common Ideals -- Connect to What's Meaningful to Others -- Take Pride in Being Unique -- Align Your Dream with the People's Dream -- Animate the Vision -- Use Symbolic Language -- Create Images of the Future -- Practice Positive Communication -- Express Your Emotions…”
Libro electrónico -
590por Musciano, ChuckTabla de Contenidos: “…2.12 Style Sheets and JavaScript2.13 Forging Ahead; Anatomy of an HTMLDocument; 3.1 Appearances Can Deceive; 3.2 Structure of an HTML Document; 3.3 Tags and Attributes; 3.3.1 The Syntax of a Tag; 3.3.2 Sample Tags; 3.3.3 Starting and Ending Tags; 3.3.4 Proper and Improper Nesting; 3.3.5 Tags Without Ends; 3.3.6 Omitting Tags; 3.3.7 Ignored or Redundant Tags; 3.4 Well-Formed Documents and XHTML; 3.5 Document Content; 3.5.1 Advice Versus Control; 3.5.2 Character Entities; 3.5.3 Comments; 3.6 HTML/XHTML Document Elements; 3.6.1 The Tag; 3.6.1.1 The dir attribute…”
Publicado 2011
Libro electrónico -
591por Musciano, ChuckTabla de Contenidos: “…2.11 Frames2.12 Stylesheets and JavaScript; 2.13 Forging Ahead; Anatomy of an HTML Document; 3.1 Appearances Can Deceive; 3.2 Structure of an HTML Document; 3.3 Tags and Attributes; 3.3.1 The Syntax of a Tag; 3.3.2 Sample Tags; 3.3.3 Starting and Ending Tags; 3.3.4 Proper and Improper Nesting; 3.3.5 Tags Without Ends; 3.3.6 Omitting Tags; 3.3.7 Ignored or Redundant Tags; 3.4 Well-Formed Documents and XHTML; 3.5 Document Content; 3.5.1 Advice Versus Control; 3.5.2 Character Entities; 3.5.3 Comments; 3.6 HTML/XHTML Document Elements; 3.6.1 The Tag; 3.6.1.1 The dir attribute…”
Publicado 2011
Libro electrónico -
592Publicado 2008Tabla de Contenidos: “…Water Jet Machining -- Abrasive Water-Jet Machining -- Abrasive Jet Machining -- Plasma ARC Cutting -- Multiple Choice Questions -- Answers -- Short Answer Questions -- True/False Statements -- Answers -- Review Questions -- Chapter 12: Powder Metallurgy -- Multiple Choice Questions -- Answers -- Short Answer Questions -- True/False Statements -- Answers -- Review Questions -- Chapter 13: Forming Processes -- Rolling -- Drawing -- Forging -- Extrusion -- Sheet Metal Operations -- Deep Drawing -- Other Sheet Metal Operations -- Multiple Choice Questions -- Answers -- Short Answer Questions -- True/False Statements -- Answers -- Numerical Problems -- Review Questions -- Chapter 14: Metrology -- Multiple Choice Questions -- Answers -- Short Answer Questions -- True/False Statements -- Answers -- Review Questions -- Chapter 15: Elements of Modern Manufacturing -- Inventory and Inventory Control -- Material Requirements Planning (MRP) -- Manufacturing Resource Planning (MRP II) -- Enterprise Resource Planning (ERP) -- Just-in-Time (JIT) -- Supply Chain Management -- Quality Circle -- Kaizen -- Total Quality Control (TQC) -- Statistical Quality Control -- Total Quality Management -- Electronic Data Interchange -- Computer-Aided Design -- Computer-Aided Manufacturing -- Computer Integrated Manufacturing -- Flexible Manufacturing System -- Numerical Control and Computer Numerical Control -- Group Technology -- Cellular Manufacturing -- Concurrent Engineering -- Multiple Choice Questions -- Answers -- Short Answer Questions -- True/False Statements -- Answers -- Review Questions -- References -- Chapter Index -- Subject Index…”
Libro electrónico -
593Publicado 2022Tabla de Contenidos: “…Server software component (T1505) -- Escalating privileges -- Exploiting for privilege escalation (T1068) -- Creating or modifying system process (T1543) -- Process injection (T1055) -- Abuse elevation control mechanism (T1548) -- Bypassing defenses -- Exploiting for defense evasion (T1211) -- Deobfuscating/decoding files or information (T1140) -- File and directory permissions modification (T1222) -- Impairing defenses (T1562) -- Indicator removal on host (T1070) -- Signed binary proxy execution (T1218) -- Accessing credentials -- Brute force (T1110) -- OS credential dumping (T1003) -- Steal or forge Kerberos tickets (T1558) -- Moving laterally -- Exploiting remote services (T1210) -- Remote services (T1021) -- Using alternate authentication material (T1550) -- Collecting and exfiltrating data -- Data from local system (T1005) -- Data from network shared drives (T1039) -- Email collection (T1114) -- Archive collected data (T1560) -- Exfiltration over web service (T1567) -- Automated exfiltration (T1020) -- Ransomware deployment -- Inhibit system recovery (T1490) -- Data encrypted for impact (T1490) -- Summary -- Chapter 6: Collecting Ransomware-Related Cyber Threat Intelligence -- Threat research reports -- Community -- Threat actors -- Summary -- Section 3: Practical Incident Response -- Chapter 7: Digital Forensic Artifacts and Their Main Sources -- Volatile memory collection and analysis -- Non-volatile data collection -- Master file table -- Prefetch files -- LNK files -- Jump lists -- SRUM -- Web browsers -- Windows Registry -- Windows event logs -- Other log sources -- Summary -- Chapter 8: Investigating Initial Access Techniques -- Collecting data sources for an external remote service abuse investigation -- Investigating an RDP brute-force attack -- Collecting data sources for a phishing attack investigation…”
Libro electrónico -
594Publicado 1993Tabla de Contenidos: “…Participation in the Children's Vaccine Initiative -- STRATEGY 1: RETAIN THE CURRENT SYSTEM -- Option 1: Increased Funding for CVI Vaccine Research -- Contribution to the Global CVI -- Option 2: Purchase Existing Vaccines -- Contribution to the Global CVI -- Option 3: Improve Vaccine Delivery -- Contribution to the Global CVI -- STRATEGY 2: FORGING NEW PARTNERSHIPS BETWEEN THE PUBLIC AND PRIVATE SECTORS -- Option 1: Broker CVI R& -- D and Pilot Manufacture -- Contribution to the Global CVI -- Option 2: Develop an Entity with CVI-Related R& -- D and Pilot Manufacturing Capabilities -- Contribution to the Global CVI -- STRATEGY 3: EMBARK ON A PUBLIC-SECTOR MODEL -- Contribution to the Global CVI -- E Public Health Service Act (1944) -- PUBLIC LAWS-CH. 373-JULY 1, 1944 PART F-BIOLOGICAL PRODUCTS Regulation of Biological Products -- Interference With Officers -- Penalties for Offenses -- F National Vaccine Program Legislation -- TITLE XXI-VACCINES SUBTITLE 1-NATIONAL VACCINE PROGRAM -- Establishment -- Program Responsibilities -- Plan -- Report -- National Vaccine Advisory Committee -- Authorizations -- G Immunization Schedules -- H Historical Record of Vaccine Product License Holders in the United States -- I Working Group Participants June 11-13, 1992 -- NOTES -- J Committee and Staff Biographies -- K Acronyms…”
Libro electrónico -
595Publicado 2018Tabla de Contenidos: “…-- 3.5.2 Exporting data to text files -- 3.5.3 Exporting data to JSON text files -- 3.5.4 Exporting data to CSV text files -- 3.5.5 Exporting data to a database -- 3.5.6 Exporting data to MongoDB -- 3.5.7 Exporting data to MySQL -- 3.6 Building complete data conversions -- 3.7 Expanding the process -- Summary -- Chapter 4: Working with unusual data -- 4.1 Getting the code and data -- 4.2 Importing custom data from text files -- 4.3 Importing data by scraping web pages -- 4.3.1 Identifying the data to scrape -- 4.3.2 Scraping with Cheerio -- 4.4 Working with binary data -- 4.4.1 Unpacking a custom binary file -- 4.4.2 Packing a custom binary file -- 4.4.3 Replacing JSON with BSON -- 4.4.4 Converting JSON to BSON -- 4.4.5 Deserializing a BSON file -- Summary -- Chapter 5: Exploratory coding -- 5.1 Expanding your toolkit -- 5.2 Analyzing car accidents -- 5.3 Getting the code and data -- 5.4 Iteration and your feedback loop -- 5.5 A first pass at understanding your data -- 5.6 Working with a reduced data sample -- 5.7 Prototyping with Excel -- 5.8 Exploratory coding with Node.js -- 5.8.1 Using Nodemon -- 5.8.2 Exploring your data -- 5.8.3 Using Data-Forge -- 5.8.4 Computing the trend column -- 5.8.5 Outputting a new CSV file -- 5.9 Exploratory coding in the browser -- Putting it all together…”
Libro electrónico -
596Publicado 2021Tabla de Contenidos: “…A paradigm born in the United States and forged at the heart of the OECD -- 2.2.2. To adopt OECD recommendations, or have them imposed? …”
Libro electrónico -
597Publicado 2023Tabla de Contenidos: “…. -- See also -- Chapter 8: Business Logic Testing -- Technical requirements -- Test ability to forge requests -- Getting ready -- How to do it... -- How it works... -- See also -- Test for process timing -- Getting ready -- How to do it... -- How it works... -- See also -- Testing for the circumvention of workflows -- Getting ready -- How to do it... -- How it works... -- See also -- Testing upload of unexpected file types with a malicious payload -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 9: Client-Side Testing -- Technical requirements -- Testing for DOM-based cross-site scripting -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing for JavaScript execution -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing for HTML injection -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing for client-side URL redirect -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing cross-origin resource sharing -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing WebSockets -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 10: Advanced Attack Techniques -- Technical requirements…”
Libro electrónico -
598por Cerniglia, FlorianaTabla de Contenidos: “…COVID-19 and the Corporate Digital Divide -- Introduction -- 10.1 Adoption of Digital Technologies and Their Increased Use after COVID-19 -- 10.1.1 Taking Stock of Digital Adoption -- 10.1.2 The Dual Impact of COVID-19 on Digital Adoption -- 10.2 Who Are the Firms Falling Behind? Who Is Forging Ahead? -- 10.3 Firm Performance along the Digital Divide Grid -- 10.4 Obstacles to Investment in the EU -- 10.5 Conclusion -- References -- 11. …”
Publicado 2021
Libro electrónico -
599Publicado 2016Tabla de Contenidos: “…Creating a Metasploit Payload -- Determining Your Target Make -- Interactive Probing -- Passive CAN Bus Fingerprinting -- Responsible Exploitation -- Summary -- Chapter 12: Attacking Wireless Systems with SDR -- Wireless Systems and SDR -- Signal Modulation -- Hacking with TPMS -- Eavesdropping with a Radio Receiver -- TPMS Packets -- Activating a Signal -- Tracking a Vehicle -- Event Triggering -- Sending Forged Packets -- Attacking Key Fobs and Immobilizers -- Key Fob Hacks -- Attacking a PKES System -- Immobilizer Cryptography -- Physical Attacks on the Immobilizer System -- Flashback: Hotwiring -- Summary -- Chapter 13: Performance Tuning -- Performance Tuning Trade-Offs -- ECU Tuning -- Chip Tuning -- Flash Tuning -- Stand-Alone Engine Management -- Summary -- Appendix A: Tools of the Trade -- Hardware -- Lower-End CAN Devices -- Higher-End CAN Devices -- Software -- Wireshark -- PyOBD Module -- Linux Tools -- CANiBUS Server -- Kayak -- SavvyCAN -- O2OO Data Logger -- Caring Caribou -- c0f Fingerprinting Tool -- UDSim ECU Simulator -- Octane CAN Bus Sniffer -- AVRDUDESS GUI -- RomRaider ECU Tuner -- Komodo CAN Bus Sniffer -- Vehicle Spy -- Appendix B: Diagnostic Code Modes and PIDs -- Modes Above 0x10 -- Useful PIDs -- Appendix C: Creating Your Own Open Garage -- Filling Out the Character Sheet -- When to Meet -- Affiliations and Private Memberships -- Defining Your Meeting Space -- Contact Information -- Initial Managing Officers -- Equipment -- Abbreviations -- Index -- Footnotes -- Chapter 10: Vehicle-to-Vehicle Communication -- Chapter 12: Attacking Wireless Systems with SDR…”
Libro electrónico -
600Publicado 2017Tabla de Contenidos: “…Trendy hacks come and go -- Clickjacking (bWAPP) -- Punycode -- Forged or hijacked certificates -- Summary -- Chapter 11: Breaking the Application Logic -- Speed-dating your target -- Cashing in with e-commerce -- Financial applications - Show me the money -- Hacking human resources -- Easter eggs of evil -- So many apps to choose from... -- Functional Feng Shui -- Basic validation checks -- Sometimes, less is more? …”
Libro electrónico