Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
721por Daniélou, Jean, 1905-1974
Publicado 1950Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada, Red de bibliotecas Iglesia Navarra, Biblioteca Universitat Ramon Llull, Biblioteca Central de Capuchinos de España, Biblioteca Universidad de Deusto, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Seminario Metropolitano de Oviedo, Biblioteca de la Universidad de Navarra, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
722por Rodríguez Fernández, Celso
Publicado 1985Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca del Seminario de Ciudad Rodrigo, Biblioteca Universitat Ramon Llull)Libro -
723por Machovec, Milan
Publicado 1974Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Red de bibliotecas Iglesia Navarra, Universidad Loyola - Universidad Loyola Granada, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca Diocesana de Salamanca, Biblioteca Seminario Metropolitano de Oviedo, Biblioteca de Pastoral Madrid, Biblioteca de la Universidad de Navarra, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Central de Capuchinos de España, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca del Seminario Diocesano de Jaén, Biblioteca Diocesana Bilbao, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
724por Trejos Herrera, AnaTabla de Contenidos: “…-- ¿Debo decirle a mi hijo (a) que guarde el secreto de su diagnóstico de VIH? -- ¿Qué cosas debo tener en cuenta ahora que mi hijo (a) con VIH se hizo adolescente? …”
Publicado 2017
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
725por Smith, Harold Ivan, 1947-Tabla de Contenidos: “…Alter--Rather than Abandon--Traditions Anticipate the Holidays Appreciate the Grief Styles and Decisions of Others Ask Your Church for Help Be Alert to the Culture's Obsession with Excitement Befriend Your Grief Befuddle Someone Carolize Your Season Celebrate Sensitively Consider the Needs of Everyone Create New Traditions Create Ornaments or Decorations That Symbolize Your Loved One and Eternal Life Cry If You Want To Define Your Boundaries Do What You Need to Do Donate to Your Church or a Charity in Honor of Your Loved One Don't Fast-Forward to January 5 Forgive Those You Believe Are Responsible for the Death Give Your Grief Its Voice Give Yourself Permission to Say, "No," or "I'll Pass" Guard Your Heart Invite God's Help Journal Your Grief Keep the Future in Mind Let Others In on Your Grief Make Gratitude Minimize the Seasonal Stressors Miss the Invitations to Parties and Other Social Events Nap Network with Other Grievers Nurture Yourself Observe a Quiet Holy Day Organize Your Living Environment Prepare Read Remain Open to Seasonal Surprises Remember Realistically Resist the Temptation to Make It Up to Others for What They've Been Through Rethink Your Holiday Shopping Habits Say Your Loved One's Name Toast Your Loved One Try Events Unplug the Christmas Mania Use Some of Your Seasonal Decorations Visit the Cemetery or Scattering Ground Volunteer at a Social Service Agency Vote Your Choices Watch Children Watch Out for Numbing Influences Weigh Any Criticism of Your Grief Style and Holiday Decisions Worship Write a Year-End Letter to Your Deceased Loved One "Yes" Invitations That Feel Right "Zestize" Your Season How to Pray This Holiday Season…”
Publicado 1999
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
726Publicado 2020Tabla de Contenidos: “…-- Sharing Your Game -- Bonus Challenges -- What You Learned -- 4 Robot Heist: Creating Rules and Obstacles -- How Robot Heist Works -- Brainstorming Objects and Interactions -- Getting Started -- Player Swapping -- Building a Test Level -- Adding Pushing Rules -- Creating Win Conditions -- Making Gates That Open and Close -- Adding the Security Lasers -- Bonus Challenges -- What You Learned -- 5 Robot Heist: Creating Consequences for Losing -- Getting Caught -- Adding Robot Guards -- Realtime Mode -- Extra Challenges: Make It Look Good -- What You Learned -- 6 Robot Heist: Refining Your Level Design -- Brainstorming the Story -- Exploring the Palette -- Creating Your First Level -- Refining Your First Level -- Designing Levels for Both Robots -- Putting It All Together -- What You Learned -- 7 Where to Go from Here -- Asking Questions -- More PuzzleScript Games to Try -- Game Challenges -- Keep Exploring and Creating! …”
Libro electrónico -
727Publicado 2024Tabla de Contenidos: “…-- Modules type -- Avoiding anti-pattern - single module app -- Optimizing the usage of common modules - the SharedModule pattern -- Improving the size of your app - lazy loading -- Summary -- Chapter 3: TypeScript Patterns for Angular -- Technical requirements -- Creating classes and types -- Primitive and basic types -- Classes -- Interfaces -- Type aliases -- When to use classes, interfaces, or types -- Creating methods and functions -- Working with null values -- Decreasing verbosity - type inference -- Validating types - type guards -- Using a better alternative to the any type -- Summary -- Chapter 4: Components and Pages -- Technical requirements -- Creating components -- Communication between components - inputs and outputs -- Best practice - using the TrackBy property…”
Libro electrónico -
728Publicado 2018Tabla de Contenidos: “…-- Swift Variables and Constants -- Declaring Swift Variables -- Variables Versus Constants -- Type Inference -- Variable Naming -- Working with Variables -- Tuples -- Creating a Tuple -- Optionals -- Declaring an Optional -- Working with Optionals -- Optional nil Values -- Accessing Optional Values -- Force Unwrapping an Optional -- Conditionally Unwrapping Optionals -- The Swift guard Statement -- Activity: Variable Summary -- Swift Data Types -- Numeric Data Types -- Int on 64-Bit Versus 32-Bit Platforms -- Built-In Numeric Data Types -- Choosing the Appropriate Numeric Data Type -- Declaring and Assigning Integer Variables -- Declaring and Assigning Floating Point Numbers -- Numeric Literal Grouping -- Numeric Type Conversions -- Boolean -- Character -- Assigning a Character -- Constructing a Character Literal -- String -- Instantiating a String -- String Concatenation -- Extracting Characters -- String Length -- Activity: Data Type Summary -- Enums -- Basic Enum Syntax -- Enum with Raw Values -- Activity: Using Swift Enums -- Summary -- Swift Operators and Control Flow -- Swift Operators -- Assignment Operator -- Arithmetic Operators -- Standard Arithmetic Operators -- Remainder Operator -- Unary minus Operator -- Compound Assignment Operators -- Comparison Operators -- Equality -- Inequality -- Comparison between Two Values -- Ternary Conditional Operator -- Logical Operators -- Bitwise Operators -- Nil-Coalescing Operator -- Range Operators -- Closed Range Operator -- Half-Open Range Operator -- One-Sided Range Operator -- Activity: Operators -- Branching -- The if Statement -- Condition Lists -- Optional Unwrapping with if -- The switch Statement -- switch Statement Rules -- The break Keyword -- The fallthrough Keyword -- Matching Non-Scalar Values…”
Libro electrónico -
729por Breger, MaxTabla de Contenidos: “…8.5 Notwendig, effektiv, legal, unschädlich: Phänomenstruktur -- 9 Transfer und Transformation von organisationalem Folterwissen -- 9.1 Feindmethoden: Kontinuitäten aus dem Kalten Krieg I -- 9.2 „KUBARK" und „HRET": Kontinuitäten aus dem Kalten Krieg II -- 9.3 Rezeption von Folterwissen in Guantánamo -- 9.4 Diffusion von Folterwissen innerhalb des US-Militärs -- Teil III Folter als Verkettung von Situationen -- 10 Raumzeitliche Übergänge als Foltersituationen -- 10.1 Folter als totale Institution -- 10.2 Gefangennahme und Übergabe an US-Kräfte -- 10.3 Erzwungene Nacktheit im Übergangsprozess -- 10.4 Flugzeug als Folterraum -- 10.5 Ankunft und Processing -- 11 Regel als Folter: Gefängnisalltag und die Rolle der guards -- 11.1 Guards und ihr Verhältnis zum Verhör -- 11.2 Comfort Items und Privilegiensystem -- 11.3 IRF-Teams und Strafgewalt -- 11.4 Ungeregelte Regeln -- 12 Gefolterte zwischen Ohnmacht und Widerständigkeit -- 12.1 Erfahrung von Ohnmacht und ‚Kooperationsbereitschaft' -- 12.2 Informationsverarbeitung -- 12.3 Gebete und Anrufungen als Situationstransformationen -- 12.4 Kommunikation mit Mitgefangenen -- 12.5 Hungerstreik -- 12.6 Organisationale Reaktionen: Zwangsernährung und Looping -- 13 Gewaltsames Othering (und seine Grenzen) -- 13.1 Religiöse und national-ethnische Differenzierung -- 13.2 Geschlechtlichkeit und Sexualität -- 13.3 Tiere, Menschen und Gegenstände -- 13.4 Othering im Spannungsverhältnis zu angenommener Gleichartigkeit -- 14 Foltersituationen als Konstellationen situativer Elemente -- 14.1 Drohungen -- 14.2 Artefakte -- 14.3 Medizinisches Personal -- 14.4 Psychologisches und psychiatrisches Personal -- 14.5 Dolmetscher:innen und linguistische Differenzen -- 14.6 Situative Sichtbarkeiten und Dritte -- 15 Schluss -- 15.1 Dezentralität und Verkettung -- 15.2 Folterwissen und Psychologisierung…”
Publicado 2024
Libro electrónico -
730Publicado 2000Tabla de Contenidos: “…Never outshine the master -- Never put too much trust in friends, learn how to use enemies -- Conceal your intentions -- Always say less than necessary -- So much depends on reputation : guard it with your life -- Court attention at all cost -- Get others to do the work for you, but always take the credit -- Make other people come to you : use bait if necessary -- Win through your actions, never through argument -- Infection : avoid the unhappy and the unlucky -- Learn to keep people dependent on you -- Use selective honesty and generosity to disarm your victim -- When asking for help, appeal to people's self-interest, never to their mercy or gratitude -- Pose as a friend, work as a spy -- Crush your enemy totally -- Use absence to increase respect and honor -- Keep others in suspended terror : cultivate an air of unpredictability -- Do not build fortresses to protect yourself--isolation is dangerous -- Know who you're dealing with--do not offend the wrong person-- Do not commit to anyone -- Play a sucker to catch a sucker : seem dumber than your mark -- Use the surrender tactic : transform weakness into power -- Concentrate your forces -- Play the perfect courtier -- Re-create yourself -- Keep your hands clean -- Play on people's need to believe to create a cultlike following -- Enter action with boldness -- Plan all the way to the end -- Make your accomplishments seem effortless -- Control the options : get others to play with the cards you deal -- Play to people's fantasies -- Discover each man's thumbscrew -- Be royal in your own fashion : act like a king to be treated like one -- Master the art of timing -- Disdain things you cannot have : ignoring them is the best revenge -- Create compelling spectacles -- Think as you like but behave like others -- Stir up waters to catch fish -- Despise the free lunch -- Avoid stepping into a great man's shoes -- Strike the shepherd and the sheep will scatter -- Work on the hearts and minds of others-- Disarm and infuriate with the mirror effect -- Preach the need for change, but never reform too much at once -- Never appear too perfect -- Do not go past the mark you aimed for; in victory, learn when to stop -- Assume formlessness…”
Libro electrónico -
731Publicado 2018“…The financial crisis and the recession that followed caught many people off guard, including experts in the financial sector whose jobs involve predicting market fluctuations. …”
Libro electrónico -
732por Peñamaría de Llano, Antonio
Publicado 1981Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universidad de Deusto, Biblioteca Diocesana Bilbao, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra)Libro -
733por Kahneman, Daniel, 1934-“…He offers practical and enlightening insights into how choices are made in both our business and our personal lives, and how we can use different techniques to guard against the mental glitches that often get us into trouble. …”
Publicado 2013
Libro -
734Publicado 2018Tabla de Contenidos: “…Building frontend views -- Creating the navigation component -- Creating the home view and template -- Creating the bikes router-outlet -- Creating the bike-list view and template -- Creating the bike-detail view and template -- Creating the builders router-outlet -- Creating the builder-list view and template -- Creating the builder-detail view and template -- Creating the login view and template -- Creating the register view and template -- Testing routes and views -- Summary -- Chapter 9: Creating Services and User Authentication -- Preparing the baseline code -- Dealing with models and classes -- Creating the User class model -- Creating the builders class model -- Creating the Bike class model -- Using the new HttpClient to deal with XHR requests -- Creating the auth service -- Creating the Register function -- Creating the Login function -- Creating the Logout function -- Creating the setToken and getToken functions -- Creating the getUser function -- Creating the isAuthenticated function -- Creating the handleError function -- Creating the bikes service -- Creating CRUD functions -- Creating the voteOnBike function -- Creating the handleError function -- Creating the builders service -- Dealing with the HttpErrorHandler service -- Creating a handler error service -- Importing HttpErrorHandler into app.module.ts -- Refactoring the builders service -- Refactoring the bikes service -- How to use authorization headers -- Creating an HTTP interceptor -- Adding AppHttpInterceptorService to the main module -- How to protect application routes with route guards -- Creating the route guard for bike-detail -- Summary -- Chapter 10: Frontend Views with Bootstrap 4 and NgBootstrap -- Preparing the baseline code -- Installing the Bootstrap CSS framework -- Removing the Bootstrap CSS import -- Adding Bootstrap SCSS imports -- Overriding Bootstrap variables…”
Libro electrónico -
735Publicado 2018Tabla de Contenidos: “…-- Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus -- Types and Effects -- Failure is Not an Option: An Exceptional Type Theory -- Let Arguments Go First -- Behavioural equivalence via modalities for algebraic effects -- Explicit Effect Subtyping -- Concurrency -- A separation logic for a promising semantics -- Logical Reasoning for Disjoint Permissions -- Deadlock-Free Monitors -- Fragment Abstraction for Concurrent Shape Analysis -- Security -- Reasoning About a Machine with Local Capabilities - Provably Safe Stack and Return Pointer Management -- Modular Product Programs -- Program Verification -- A Fistful of Dollars: Formalizing Asymptotic Complexity Claims via Deductive Program Verification -- Verified Learning Without Regret -- Program Verification by Coinduction -- Velisarios: Byzantine Fault Tolerant Protocols Powered by Coq -- Program Analysis and Automated Verification -- Evaluating Design Tradeoffs in Numeric Static Analysis for Java -- An Abstract Interpretation Framework for Input Data Usage -- Higher-Order Program Verification via HFL Model Checking -- Quantitative Analysis of Smart Contracts -- Session Types and Concurrency -- Session-Typed Concurrent Contracts -- A Typing Discipline for Statically Verified Crash Failure Handling in Distributed Systems -- On Polymorphic Sessions and Functions: A Tale of Two (Fully Abstract) Encodings -- Concurrent Kleene Algebra: Free Model and Completeness -- Concurrency and Distribution -- Correctness of a Concurrent Object Collector for Actor Languages -- Paxos Consensus, Deconstructed and Abstracted -- On Parallel Snapshot Isolation and Release/Acquire Consistency -- Eventual Consistency for CRDTs -- Compiler Verification -- A Verified Compiler from Isabelle/HOL to CakeML -- Compositional Verification of Compiler Optimisations on Relaxed Memory…”
Libro electrónico -
736por Lopp, Michael. authorTabla de Contenidos: “…PART I The Management Quiver -- Chapter 1 Don't Be a Prick -- Chapter 2 Managers Are Not Evil -- Chapter 3 Stables and Volatiles -- Chapter 4 The Rands Test -- Chapter 5 How to Run a Meeting -- Chapter 6 The Twinge -- Chapter 7 The Update, the Vent, and the Disaster -- Chapter 8 The Monday Freakout -- Chapter 9 Lost in Translation -- Chapter 10 Agenda Detection -- Chapter 11 Dissecting the Mandate -- Chapter 12 Information Starvation -- Chapter 13 Subtlety, Subterfuge, and Silence -- Chapter 14 Managementese -- Chapter 15 You’re Not Listening -- Chapter 16 Fred Hates the Off-Site -- Chapter 17 A Different Kind of DNA -- Chapter 18 An Engineering Mindset -- Chapter 19 Tear It Down -- Chapter 20 Titles are Toxic -- Chapter 21 Saying No -- PART II The Process is the Product -- Chapter 22 1.0 -- Chapter 23 The Process Myth -- Chapter 24 How to Start -- Chapter 25 Taking Time to Think -- Chapter 26 The Value of the Soak -- Chapter 27 Capturing Context -- Chapter 28 Trickle Theory -- Chapter 29 When the Sky Falls -- Chapter 30 Hacking Is Important -- Chapter 31 Entropy Crushers -- PART III Versions of You -- Chapter 32 Bored People Quit -- Chapter 33 Bellwethers -- Chapter 34 The Ninety-Day Interview -- Chapter 35 Managing Nerds -- Chapter 36 NADD -- Chapter 37 A Nerd in a Cave -- Chapter 38 Meeting Creatures -- Chapter 39 Incrementalists and Completionists -- Chapter 40 Organics and Mechanics -- Chapter 41 Inwards, Outwards, and Holistics -- Chapter 42 The Wolf -- Chapter 43 Free Electrons -- Chapter 44 The Old Guard -- Chapter 45 Rules for the Reorg -- Chapter 46 An Unexpected Connection -- Chapter 47 Avoiding the Fez -- Chapter 48 A Glimpse and a Hook -- Chapter 49 Nailing the Phone Screen -- Chapter 50 Your Resignation Checklist -- Chapter 51 Shields Down -- Chapter 52 Chaotic Beautiful Snowflakes -- Glossary…”
Publicado 2016
Libro electrónico -
737Publicado 2011Tabla de Contenidos: “…Prospects for Consolidating the American Nation"This Most August Sovereign"; Elites in the American Republic; Bache's Program for National Consolidation II; The United States Coast Survey; The National Institute; Bache's Speech at the 1844 Meeting of the National Institute; European Conditions; Guarding the Palladium; American Science by an American Union; Bache's Program for National Consolidation III; The American Association for the Advancement of Science; Bache's 1851 Speech as Outgoing AAAS President; Bache, Benjamin Peirce, and the Lazzaroni in 1854; A National Club…”
Libro electrónico -
738por GPCE (Conference)Tabla de Contenidos: “…Invited Talks -- Object-Oriented Reengineering Patterns — An Overview -- abc: The AspectBench Compiler for AspectJ -- Certifiable Program Generation -- Domain-Specific Language -- A Generative Programming Approach to Developing DSL Compilers -- Efficient Code Generation for a Domain Specific Language -- On Domain-Specific Languages Reengineering -- Bossa Nova: Introducing Modularity into the Bossa Domain-Specific Language -- Aspect-Oriented Programming -- AOP++: A Generic Aspect-Oriented Programming Framework in C++ -- Model Compiler Construction Based on Aspect-Oriented Mechanisms -- FeatureC++: On the Symbiosis of Feature-Oriented and Aspect-Oriented Programming -- Shadow Programming: Reasoning About Programs Using Lexical Join Point Information -- Meta-programming and Transformation -- Generalized Type-Based Disambiguation of Meta Programs with Concrete Object Syntax -- A Versatile Kernel for Multi-language AOP -- Semi-inversion of Guarded Equations -- Generative Techniques I -- A Generative Programming Approach to Interactive Information Retrieval:Insights and Experiences -- Optimizing Marshalling by Run-Time Program Generation -- Applying a Generative Technique for Enhanced Genericity and Maintainability on the J2EE Platform -- Multi-stage Programming -- Multi-stage Programming with Functors and Monads: Eliminating Abstraction Overhead from Generic Code -- Implicitly Heterogeneous Multi-stage Programming -- Generative Techniques II -- Source-Level Optimization of Run-Time Program Generators -- Statically Safe Program Generation with SafeGen -- A Type System for Reflective Program Generators -- Sorting Out the Relationships Between Pairs of Iterators, Values, and References -- Components and Templates -- Preprocessing Eden with Template Haskell -- Syntactic Abstraction in Component Interfaces -- Component-Oriented Programming with Sharing: Containment is Not Ownership -- Generic Programming -- Language Requirements for Large-Scale Generic Libraries -- Mapping Features to Models: A Template Approach Based on Superimposed Variants -- Demonstrations -- Developing Dynamic and Adaptable Applications with CAM/DAOP: A Virtual Office Application -- Metamodeling Made Easy – MetaEdit+ (Tool Demonstration)…”
Publicado 2005
Libro electrónico -
739Publicado 2003Tabla de Contenidos: “…Bricker and the slow death of old guard Republicanism / Richard O. Davies -- James A. …”
Libro electrónico -
740por Wilhelm, ThomasTabla de Contenidos: “…Discovering Weak Points in Area DefensesTraffic Patterns; Gates, Guns, and Guards; Information Diving; Summary; Endnotes; Chapter 10. …”
Publicado 2011
Libro electrónico