Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 1,702
- Historia 1,527
- obras anteriores a 1800 1,092
- Derecho canónico 801
- Obras anteriores a 1800 794
- Moral cristiana 671
- Teología dogmática 662
- Iglesia Católica 609
- Teología 530
- Sermones 446
- Derecho 327
- Filosofía 303
- Crítica e interpretación 284
- Tomás de Aquino 254
- Derecho Canónico 248
- Derecho romano 233
- Derecho civil 208
- Aristóteles 199
- Virgen María 197
- Biografías 185
- Liturgia 180
- Comentarios 178
- Pleitos 167
- Medicina 159
- Corpus Juris Civilis 154
- Iglesia 154
- Vida cristiana 152
- Jesucristo 147
- Historia- 143
- Ascetismo 140
-
681Publicado 2020Tabla de Contenidos: “…-- HERRAMIENTAS SANDBOX PARA ENTORNOS WINDOWS -- HERRAMIENTAS SANDBOX PARA ENTORNOS LINUX -- 6- ATAQUES INFORMÁTICOS -- TIPOS DE ATAQUES INFORMÁTICOS -- ANATOMÍA DE UN ATAQUE -- 7- BUSCANDO EL OBJETIVO -- LA IMPORTANCIA DE LA INFORMACIÓN -- FOOTPRINTING -- WHOIS -- GOOGLE HACKING -- SHODAN -- MALTEGO -- FOCA -- ROBTEX -- THE HARVESTER -- RECON-NG -- FINGERPRINTING -- NMAP -- OTRAS HERRAMIENTAS -- TRABAJANDO SOBRE LOS DNS -- FINGERPRINTING WEB -- ICMP -- BANNER GRABBING -- SMB -- SMTP…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
682por Giordano, Anthony, 1959-Tabla de Contenidos: “…-- The Role of Metadata in Data Integration -- Categories of Metadata -- Metadata as Part of a Reference Architecture -- Metadata Users -- Managing Metadata -- Summary -- End-of-Chapter Questions -- Chapter 15 Data Quality -- The Data Quality Framework -- The Data Quality Life Cycle -- The Define Phase -- The Audit Phase -- The Renovate Phase -- Final Thoughts on Data Quality -- Summary -- End-of-Chapter Questions -- Appendix A: Exercise Answers -- Appendix B: Data Integration Guiding Principles -- Write Once, Read Many -- Grab Everything -- Data Quality before Transforms -- Transformation Componentization -- Where to Perform Aggregations and Calculations -- Data Integration Environment Volumetric Sizing -- Subject Area Volumetric Sizing -- Appendix C: Glossary -- Index…”
Publicado 2011
Libro electrónico -
683Publicado 2014“…Brimming with techniques that have been used on actual 3D productions and can easily be incorporated into your own workflows, Rick Baumgartner's 3D Postproduction offers you: - The best practices for 3D preproduction and production to ensure a smooth post process, saving both time and money - Abundant workflow diagrams, screen grabs, and checklists to reinforce your learning with visual cues - Common postproduction considerations such as dailies, assembly, cutting, color correction, and how they differ between 3D and 2D post pipelines - Examples of 3D gone bad and how those scenarios can be avoided - In-depth interviews with working professionals and extensive tutorials that provide practical insight from the trenches of real-world 3D postproduction - A companion website (www.focalpress.com/cw/baumgartner) with video examples of techniques described in the book and project files for you to work with An effective 3D postpostproduction workflow allows for easier and more flexible editing, greater capacity for visual effects enhancement, the ability to fix production mistakes, and much more. …”
Libro electrónico -
684Publicado 2010Tabla de Contenidos: “…Print Queues -- The Finder's Print Command -- Chapter 18: Connecting to the Internet -- Connecting to the Internet -- Using the Network Setup Assistant -- Working with Locations -- Setting Internet Options in Network Preferences -- Manually Connecting to an ISP -- Chapter 19: Internet Applications -- Internet Applications -- Mail -- iChat -- Safari -- MobileMe's Web-Based Features -- Using MobileMe with Mac OS X -- MobileMe Sync -- iDisk -- Back to My Mac -- Chapter 20: Networking -- Networking -- Network Interfaces -- AirPort -- FireWire -- Ethernet -- Bluetooth -- Sharing Services -- Users, Groups, & -- Privileges -- Connecting to Another Computer for File Sharing -- Network Utility -- Chapter 21: Multiple Users -- Multiple Users -- Configuring Mac OS X for Multiple Users -- Parental Controls -- Login Options -- Fast User Switching -- The Home Folder -- Sharing Files with Other Users -- Chapter 22: Security -- Security Features -- Keychain Access -- General Security Options -- FileVault -- Firewall -- Chapter 23: System Preferences -- System Preferences -- Date & -- Time -- Displays -- Energy Saver -- Language & -- Text -- Keyboard -- Mouse -- Trackpad -- Software Update -- Sound -- Speech -- Startup Disk -- Universal Access -- Locking Preference Settings -- Chapter 24: Mac OS Utilities -- Mac OS Utilities -- Activity Monitor -- Audio MIDI Setup -- Boot Camp Assistant -- ColorSync Utility -- Console -- DigitalColor Meter -- Grab -- Grapher -- Migration Assistant -- System Profiler -- Terminal -- VoiceOver Utility -- Automation Tools -- Application Services -- Chapter 25: Getting Help -- Getting Help -- Help Tags -- Mac Help -- Application Help -- Help & -- Troubleshooting Advice -- Appendix A: Menus & -- Keyboard Equivalents -- Menus & -- Keyboard Equivalents -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L.…”
Libro electrónico -
685Publicado 2022Tabla de Contenidos: “…. -- Chapter 5: Indoor Scene Classification with TensorFlow Lite for Microcontrollers and the Arduino Nano -- Technical requirements -- Taking pictures with the OV7670 camera module -- Getting ready -- How to do it... -- Grabbing camera frames from the serial port with Python -- Getting ready -- How to do it... -- Converting QQVGA images from YCbCr422 to RGB888 -- Getting ready -- How to do it... -- Building the dataset for indoor scene classification -- Getting ready -- How to do it…”
Libro electrónico -
686Publicado 2017Tabla de Contenidos: “…. -- 2.3.2 Hinweis zur Abgrenzung fremder von eigenen Inhalten -- 2.3.3 Hinweis auf Lieferbeschränkungen -- 2.3.4 Urhebervermerk -- 2.4 Domain der Website -- 2.4.1 Aufbau und Vergabe von Domains -- 2.4.2 Vertragliche Konstellation bei der Domain-Registrierung -- 2.4.3 Domain-Grabbing -- 2.4.4 Marken und Namen -- 2.4.5 Irreführende Domain-Namen -- 2.4.6 »Unsere« Domain gehört jemand anderem - was tun? …”
Libro electrónico -
687por Amberg, EricTabla de Contenidos: “…-- 7.4.2 Erste Schritte mit Metasploit (MSF) -- 7.4.3 Nmap in Metasploit nutzen -- 7.5 Weitere Tools und Verfahren -- 7.5.1 Paketerstellung und Scanning mit hping3 -- 7.5.2 Weitere Packet-Crafting-Tools -- 7.5.3 Banner Grabbing mit Telnet und Netcat -- 7.5.4 Scannen von IPv6-Netzwerken -- 7.6 Gegenmaßnahmen gegen Portscanning und Banner Grabbing…”
Publicado 2024
Libro electrónico -
688Publicado 2017Tabla de Contenidos: “…-- The importance of caching -- The Cache API -- Methods -- The asset manifest -- Setting up our cache -- The install event -- Opening up the cache -- Fetching the asset manifest -- Parsing the JSON -- Adding the relevant URLs to the cache -- The fetch event -- The activate event -- Grab the list of cache names -- Loop over them -- Testing our cache -- Summary -- Chapter 13: Auditing Our App -- What is Lighthouse? …”
Libro electrónico -
689Publicado 1740Tabla de Contenidos: “….: A12. Texto a dos col. Grab. xil. con símbolos pontificios y letras capitales en h. 1. …”
Colección -
690Publicado 2018Tabla de Contenidos: “…-- Variables in Elixir -- Immutability in Elixir -- Understanding the different types in Elixir -- Getting more information with the i helper -- Getting more information with the h helper -- Using IEx and helpers to understand types -- Your objects have no power here -- Introduction to Phoenix -- Installing Phoenix 1.3 -- Creating a new Phoenix project -- Running the Phoenix Mix Task -- Running the Phoenix server for the first time -- Phoenix's default application structure -- Configuration files -- Assets files -- Private files -- Tests -- Other directories -- The most important directory: lib -- A note about how data flows in Phoenix -- Summary -- Chapter 2: Building Controllers, Views, and Templates -- Understanding the flow of Phoenix connections -- Creating our Social Voting project -- Creating a poll controller -- Understanding the controller's structure -- Building the poll controller -- Understanding templates -- Passing data to our templates -- Writing controller tests -- Understanding the code behind tests -- Writing the poll controller test -- Summary -- Chapter 3: Storing and Retrieving Vote Data with Ecto Pages -- Understanding the role of schemas -- Creating a new migration -- Creating the Polls table migration -- Creating our Options table migration -- Creating our Poll schema -- Testing our Poll schema -- Creating our Option schema -- Understanding the gotchas of associations -- Understanding the role of contexts -- Creating a Votes context -- Grabbing a list of data -- Understanding Ecto query writing -- Hooking up the context to our controller -- Creating a new poll -- Creating the new action in the controller…”
Libro electrónico -
691Publicado 2017Tabla de Contenidos: “…-- Why network sniffing is important -- Scan a single IP -- Scan a host -- Scan a range of IPs -- Scan a subnet -- Nmap port selection -- Scan a single port -- Scan a range of ports -- Scan 100 most common ports (fast) -- Scan all 65535 ports -- Nmap port scan types -- Scan using TCP SYN scan (default) -- Scan using TCP connect -- Service and OS detection -- Detect OS and services -- Standard service detection -- More aggressive service detection -- Lighter banner-grabbing detection -- Nmap output formats -- Save default output to file -- Save in all formats -- Scan using a specific NSE script -- Scan with a set of scripts -- Lab 1-a scan to search for DDoS reflection UDP services -- Using Wireshark filters -- Wireshark filter cheat sheet -- Lab 2 -- Sparta -- Brute-force passwords -- Lab 3-scanning -- Scanning a subnet -- Spoofing and decoy scans -- Evading firewalls -- Gathering version info -- UDP scan -- The reason switch -- Using a list -- Output to a file -- Commands -- Starting the listener -- Countermeasures -- Summary -- Chapter 3: How to Crack Wi-Fi Passwords -- Why should we crack our own Wi-Fi? …”
Libro electrónico -
692Publicado 2017Tabla de Contenidos: “…-- Authentication 2.0 - grabbing a golden ticket -- The basic authentication -- Form-based authentication -- Digest-based authentication -- Trust but verify -- This is the session you are looking for -- Munching on some cookies? …”
Libro electrónico -
693Publicado 2010Tabla de Contenidos: “…-- GETTING DOWN TO BUSINESS -- Chapter 17: Defining the Rules of Engagement -- INSIDE THE OUTSIDE: ASSESSING THREATS AND OPPORTUNITIES -- POLICIES AND GUIDELINES -- EXAMPLE GUIDELINES AND POLICIES -- THE LOUISIANA PURCHASE AND THE GREAT BRAND GRAB -- RULES OF ENGAGEMENT -- INTEL'S DIGITAL IQ PROGRAM -- WITH SOCIAL MEDIA COMES GREAT RESPONSIBILITY -- NOTES -- Chapter 18: The Conversation Prism -- I'M YOUR CUSTOMER ... …”
Libro electrónico -
694Publicado 2019Tabla de Contenidos: “…-- Quick Start Action: Grab Attention with Your Headlines -- Write Winning Proposals -- Steps to Writing a Proposal -- Writing the Proposal -- Track Your Clients -- Tips to Become a Better Marketer -- Quick Start Lists -- 10 Surviving the First Year -- Chapter Overview -- Take Care of Your Health -- Manage Your Time -- The Big Jobs -- Do the Hardest First -- Invoice Ease -- Tickler Files -- Establish Good Business Habits -- The Basics -- Financial Advice -- Client Counsel -- Delight Your Clients -- Balance Your Life -- Identify Any Imbalance -- Make Your Own Rules -- Enjoy the Doing -- Take Time Off -- Identify Other Interests -- Take Advantage of Being Your Own Boss -- Manage Your Balance -- Did You Hear the One About the Consultant . . . ? …”
Libro electrónico -
695por Holland, Margaret B.Tabla de Contenidos: “…-- Formalization for Conservation and Climate Mitigation -- Seeking Formal Recognition as a Form of Resistance to Land and Resource Development -- Formalization as Legal Recognition of the Rights of Nature -- Aligning Top-Down and Bottom-Up for Strengthening Tenure Security -- References -- 12: Securing Communal Tenure Complemented by Collaborative Platforms for Improved Participatory Landscape Management and Sustainable Development: Lessons from Northern Tanzania and the Maasai Mara in Kenya -- The Relationships between Tenure, Sustainable Development, and Conservation -- The Mara-Serengeti-Tarangire Ecosystem Chain: Two Case Studies across One Border -- The Last Vestige of the Hadzabe: Tanzania's Last Hunter-Gatherers -- Conversion to Agriculture and Land Grabs: The Loss of Hadzabe Lands and Resources -- Certificate of Customary Right of Occupancy: Retrofitting Communality to the Village Acts -- Fragmenting the Manyatta: How Privatization and the Subdivision of Lands Blocked Collective Action on the Mara -- Collaborative Civil Society: Maasai Mara Wildlife Conservancies Association Busting down a Siloed Landscape and Breaking Tragedy of the Commons Mythology -- Conclusions and Recommendations: Communal Tenure, Collaborative Platforms, Conservation Incentives, and Explicit Management Agreements -- References -- 13: Beyond the Traditional: Voluntary Market-Based Initiatives to Promote Land Tenure Security -- The Causes of Forest Land Tenure Insecurities in Developing Countries -- FSC Certification as a Way to Address Forest Land Tenure Insecurity and Promote Forest Conservation…”
Publicado 2022
Libro electrónico -
696Publicado 2024Tabla de Contenidos: “…Heading, weight, and balance -- Motion paths as a visual guide -- Tilting while turning -- Leaning into it -- Copying keyframes to another channel -- Copying keyframes -- Keying a single property -- Pasting keyframes -- Scaling keyframe values -- Summary -- Questions -- Chapter 4: Looking into Object Relationships -- Technical requirements -- Understanding object origins -- The truth about objects and origins -- Centering the origin -- Grabbing the origin -- Parenting objects -- The parent/child relationship -- Understanding constraints -- Adding a constraint -- World space versus local space -- Copying constraints -- Following a path -- Editing the animation path -- Adding a Follow Path constraint -- Animating the path -- Drivers -- Adding a driver -- Editing a driver -- Driver F-curves -- The final chart of object relationships -- Summary -- Questions -- Chapter 5: Rendering an Animation -- Technical requirements -- Setting up the camera -- Adding a camera to the scene -- Camera view-finding -- The animated camera -- Rendering basics -- What is rendering, really? …”
Libro electrónico -
697por Ribera, Manuel Bernardo de (1720-1765) (O.SS.T.)Tabla de Contenidos: “…Sign.: A-M4. Port. con grab. xil. Núm. de identificación: CCPB000234266-9…”
Publicado 1758
Colección -
698Publicado 2022Tabla de Contenidos: “…-- Using the Help Content Optimization Matrix to Visualize How to Improve Support Content -- Improving Training Content -- Improving Consumption -- Improving Customer Satisfaction Rates -- Improving Certifications -- Make Questions Hard, but Not Too Hard -- There Is Such Thing as a Bad Question -- Knowing When to Archive Content -- Chapter 14 Step 12: Demonstrate the ROI of Customer Education -- Collecting the Data to Measure Business Impact -- The Formula for ROI -- Using a Training Score to Create a Cohort Analysis -- Telling the Story of Your Impact -- Know Your Audience -- Best Practices for Storytelling -- Grab Your Seat at the Table -- Chapter 15 Your Roadmap to High-Performance Customer Education -- The Five-Stage Maturity Model for Customer Education -- Stage One: Keeping Up with Live Training Needs -- Stage Two: Laying a Digital Foundation for Scale -- Stage Three: Making Learning More Personal and Easier to Consume -- Stage Four: Delivering Business Impact…”
Libro electrónico -
699Publicado 1766Tabla de Contenidos: “…Sign.: []3. Port. con grab. de escudo real. Al final del texto: "Antonio Martinez de Salazar" Reclutamiento y alistamiento-S.XVIII-España. …”
Colección -
700Publicado 2019Tabla de Contenidos: “…Discussion Questions -- Hands-On MIS Projects -- Management Decision Problems -- Achieving Operational Excellence: Creating a Simple Blog -- Improving Decision Making: Analyzing Web Browser Privacy -- Collaboration and Teamwork Project -- Business Problem-Solving Case Facebook Privacy: Your Life for Sale -- Part II Information Technology Infrastructure -- 5 IT Infrastructure: Hardware and Software -- Chapter-Opening Case: Southeast Asia's Grab Leverages Information Technology to Enhance Its Services -- 5-1 What are the components of IT infrastructure? …”
Libro electrónico