Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
741Publicado 2012Tabla de Contenidos: “…The religious belief in rationality, science and democracy -- Moral imaginaries -- The ideals of religious freedom and the Enlightenment -- The liberal dogma -- Who shall guard whom? -- 6. Psychology as science or psychology as religion -- From Protestantism to therapy -- The turning away from religion -- Psychology as religion -- Psychology as religion reconsidered -- Going back to the roots -- Conclusion -- 7: Science without God -- Introduction: science vs. religion -- Scientific fundamentalism -- Can science explain religion? …”
Libro electrónico -
742por Petrucelli, Joseph R., 1960-“…Organized by business processes which succinctly describe how fraud manifests itself on a daily basis, the authors explain ways in which everyone can help guard against fraud by familiarizing themselves with its building blocks and methods used to…”
Publicado 2012
Libro electrónico -
743Publicado 2020“…Electric power systems are headed for a true changing of the guard, due to the urgent need for achieving sustainable energy delivery. …”
Libro electrónico -
744Publicado 2013“…In contrast with previous conflicts, the all-volunteer military has experienced numerous deployments of individual service members; has seen increased deployments of women, parents of young children, and reserve and National Guard troops; and in some cases has been subject to longer deployments and shorter times at home between deployments. …”
Libro electrónico -
745Publicado 2024Tabla de Contenidos: “…Army Suppliers and War Commissaries as Profiteers of the Seven Years' War -- Marian Füssel -- 4 Intergenerationality as a Challenge: The Swiss Guard Company of the Erlach Family, 1639–1770 -- Benjamin Ryser -- 5 Beyond Gender Boundaries: Women's Involvement in Military Careers in the Swiss Foreign Service (18th–19th Centuries) -- Jasmina Cornut -- SECTION: Public-Private Partnership, Feudal Patterns, and the Relativity of †̃State' and †̃Private' -- 6 Military Enterprise and Civil War: Private Armies and Warfare in France around the Fronde , 1641–52 -- David Parrott -- 7 Merchant of Death: Maximilien Titon (1632–1711) and the Supply of Arms in Louis XIV's France -- Guy Rowlands -- 8 The Officer as Military Entrepreneur in Miles Perpetuus : Examples from the Armies of the Empire 1650–1800 -- Alexander Querengässer -- PART 2: Transnational Fields of Action -- SECTION: Networks, Hubs, Markets -- 9 A Polity Full of Contractors: The Swiss Cantons and Their Business of War (15th to 19th Centuries) -- André Holenstein and Philippe Rogger -- 10 The Republic of Geneva as a Fiscal-Military Hub, 1685–1709: Finance, Information, and Espionage -- John Condren -- 11 At the Crossroads of Population and Capital: Recruiting in Geneva for the French Service under the Ancien Régime -- Sébastien Dupuis -- 12 Foreign Military Labour in Early Modern Europe -- Peter H. …”
Libro electrónico -
746Publicado 2024Tabla de Contenidos: “…-- Chapter 5: Designing Authentication and Authorization -- Technical requirements -- Designing an auth workflow -- JWT life cycle -- TypeScript operators for safe data handling -- Null and undefined checking -- The conditional or ternary operator -- The null coalescing operator -- The nullish coalescing operator -- Optional chaining -- Implementing data entities and interfaces -- Classes, Interfaces, and Enums -- Reusable services leveraging OOP concepts -- Creating an auth service -- Implement an abstract auth service -- Abstract functions -- A cache service using localStorage -- Caching the JWT -- An in-memory auth service -- Simple login -- Logout -- Resuming a JWT session -- An HTTP interceptor -- Summary -- Further reading -- Questions -- Chapter 6: Implementing Role-Based Navigation -- Technical requirements -- Dynamic UI components and navigation -- Implementing the login component -- Conditional navigation -- Common validations for forms -- UI service using environment provider -- Side navigation -- Role-based routing using guards -- Route guards -- Auth guards -- Auth service fake and common testing providers -- A Firebase authentication recipe -- Create a Firebase application…”
Libro electrónico -
747Publicado 2020Tabla de Contenidos: “…-- Lazy Loading verwenden -- Module asynchron vorladen: Preloading -- Den BookMonkey erweitern -- Guards: Routen absichern -- Grundlagen zu Guards -- Guards implementieren -- Guards verwenden -- Den BookMonkey erweitern -- Routing: Wie geht's weiter? …”
Libro electrónico -
748Publicado 2017Tabla de Contenidos: “…Installing and Managing Software by Using Microsoft Office 365 and Windows Store Apps -- Sideloading Apps into Online and Offline Images -- Integrating Microsoft Accounts Including Personalization Settings -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 9 Managing Authorization and Authentication -- Understanding User Accounts -- Account Types -- Built-In Accounts -- Local and Domain User Accounts -- Working with User Accounts -- Using the Local Users and Groups Utility -- Using the User Accounts Option in Control Panel -- Creating New Users -- Disabling User Accounts -- Deleting User Accounts -- Renaming User Accounts -- Changing a User's Password -- Using a Microsoft Passport, Pictures, and Biometrics -- Using Device Guard -- Understanding Credential Guard -- Configuring Device Health Attestation -- Managing User Properties -- Managing User Group Membership -- Setting Up User Profiles, Logon Scripts, and Home Folders -- Troubleshooting User Account Authentication -- Managing and Creating Groups -- Using Built-In Groups -- Creating Groups -- Managing Group Membership -- Deleting Groups -- Managing Security Using GPOs and LGPOs -- Understanding the GPO and LGPO Basics -- Using the Group Policy Result Tool -- Managing and Applying LGPOs -- Configuring Local Security Policies -- Using Account Policies -- Using Local Policies -- Configuring User Account Control -- Privilege Elevation -- Registry and File Virtualization -- Understanding Smart Cards -- Configuring Remote Management -- Remote Assistance -- Remote Desktop -- Configuring a VPN Connection -- Transparent Caching -- Broadband Tethering -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 10 Configuring Monitoring and Recovery -- Understanding Recovery -- Knowing the Advanced Boot Options -- Starting in Safe Mode -- Enabling Boot Logging…”
Libro electrónico -
749Publicado 2025Tabla de Contenidos: “…SECURING COMMUNICATIONS -- The Favored Operating System: Linux -- Step 1: Let Us Get Secure: Encrypting Files and Using Secure Shell -- Gnu Privacy Guard -- Encrypting and Decrypting Using GNU Privacy Guard -- Secure Shell Access to Servers -- Moving Files Securely -- Exercise for the Reader -- 4. …”
Libro electrónico -
750por Gordon, JonTabla de Contenidos: “…Soup: A Recipe to Nourish Your Team and Culture; Contents; Acknowledgments; Introduction; Chapter 1: Hungry; Chapter 2: Grandma's Soup House; Chapter 3: Grandma; Chapter 4: Nancy; Chapter 5: Another Bowl; Chapter 6: Who Stirs the Pot Matters; Chapter 7: Teachers Are Everywhere; Chapter 8: Soup = Culture; Chapter 9: A Culture of Greatness; Chapter 10: Nightmare; Chapter 11: Lead With Optimism; Chapter 12: Leadership Is a Transfer of Belief; Chapter 13: Guard Against Pessimism; Chapter 14: The Mirror Test; Chapter 15: Nancy Stirs the Pot; Chapter 16: Hire Possibility Thinkers…”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
751por Attarpour, SamiraTabla de Contenidos: “…The Contribution of women to trade and production in Elam society / Iran and Central Asia : The Grand'Route of Khorasan (Great Khorasan Road) during the third millennium BC and the "dark stone" artefacts / Bronze Age interaction on the Iranian Plateau : From Kerman to the Oxus through seals / Prestige objects in South East of Iran during the Bronze Age in the National Museum of Iran / Exchanges and trade during the Bronze Age in Iran / The biography of a dagger type : The diachronic transformation of the dagers with the crescent-shaped guard / The Transition to Iron Age. The Bronze Age and the Iron Age on the Central Iranian Plateau : Two successive cultures or the appearance of a new culture? …”
Publicado 2020
Electrónico -
752Publicado 2016Tabla de Contenidos: “…Identify Your PrioritiesKnow When to Say No; Attack Procrastination; Managing Your Concentration; Meetings with Meaning; Balancing It All; Don't Be Stupid: Value Integrity; Integrity Breach-Everyone Is Vulnerable; Trustworthy; Guarding Trust; Leading with Integrity; Cornerstones of Integrity; 1. …”
Libro electrónico -
753por Greenwald, RickTabla de Contenidos: “…Data Guard and RAC; 1.9.4.6. Automated Storage Management; 1.9.4.7. …”
Publicado 2004
Libro electrónico -
754por Olsson, Mikael. authorTabla de Contenidos: “…Constant GuidelineChapter 18: Preprocessor; Including Source Files; Define; Undefine; Predefined Macros; Macro Functions; Conditional Compilation; Compile if Defined; Error and Warning; Line; Pragma; Chapter 19: Memory Management; Malloc; Free; Realloc; Void Pointer; Chapter 20: Command Line Arguments; Chapter 21: Headers; Why to Use Headers; What to Include in Headers; Include Guards; Index; Contents; About the Author; About the Technical Reviewer…”
Publicado 2015
Libro electrónico -
755por Owen, JoTabla de Contenidos: “…CHAPTER 27: HOW TO DEAL WITH MR AND MRS NASTYCHAPTER 28: PROFESSIONAL GUARD; THE DAILY SKILLS OF MANAGEMENT; CHAPTER 29: THE DAILY SKILLS OF MANAGEMENT; CHAPTER 30: MANAGE TIME EFFECTIVELY; CHAPTER 31: MANAGE TIME EFFICIENTLY; CHAPTER 32: HOW TO READ; CHAPTER 33: HOW TO WRITE; CHAPTER 34: HOW TO LISTEN; CHAPTER 35: HOW TO TALK; CHAPTER 36: THE ART OF A GOOD MEETING; CHAPTER 37: THE USE AND ABUSE OF POWERPOINT; CHAPTER 38: PREPARING SPREADSHEETS; MANAGE YOUR CAREER; CHAPTER 39: MANAGE YOUR CAREER; CHAPTER 40: THE MANAGEMENT JOURNEY; CHAPTER 41: WHAT IT TAKES TO GET AHEAD…”
Publicado 2011
Libro electrónico -
756por Baker, MarkTabla de Contenidos: “…Test Circuit Design Considerations; 9.1 Printed Circuit Board Physics; 9.2 Resistor Physics; 9.3 Capacitor Physics; 9.4 Circuit Board Insulators and Guard Rings; 9.5 Test Circuit Ground; 9.6 Power Distribution; 9.7 Transmission Lines; 9.8 Transmission Line Matching; Chapter Review Questions; Glossary…”
Publicado 2003
Libro electrónico -
757por Stevens, ChrisTabla de Contenidos: “…A GOLDEN AGEAN ESCAPE FROM CORPORATE TYRANNY; INVASION OF THE BODY SNATCHERS; SUMMARY; CHAPTER 12: LIFE IN THE TRENCHES; AN EXPENSIVE GAME; TRUST-FUND FANTASIES; FEEDING TIME; A WICKED GAME; A SPECIAL TIME IN HISTORY; THE PATENT THREAT; SUMMARY; CHAPTER 13: THE FUTURE OF THE APP; THE CHANGING OF THE GUARD; WHAT MAKES A KILLER APP?; SUMMARY; Index…”
Publicado 2011
Libro electrónico -
758Publicado 2020Tabla de Contenidos: “…Kaya & Matthew Whiting -- The Kurdish insurgency / David Romano -- The perennial Kurdish question and failed peace processes / Cengiz Çandar -- Terrorism, counter-insurgency and societal relations / Gareth Jenkins -- The village guard system : counter-insurgency and local collaboration / Evren Balta -- The 15 July 2016 failed coup and the security sector / Yaprak Gürsoy -- State, society and rights -- Human rights / Zehra F. …”
Libro -
759por Angel, Jacqueline LoweTabla de Contenidos: “…-- Contemporary studies of money -- Gifts as assistance -- Contextualizing gift giving -- Simply love -- Fellowship for funds -- Giving, not receiving -- The family life cycle and inheritance -- Money memories: narratives of the meaning of giving and receiving -- History lessons -- The silent generation -- Baby boomers -- Expanding obligations equal shrinking inheritances -- Drawing down assets -- Deciding too late or not at all -- Family disagreements -- Background on the interviews -- Early beginnings of family dynamics and money -- Money as a gift -- Money with strings attached -- How money matters -- The costs of wealth -- A guarded secret -- The value of gifts -- Contemporary values and beliefs regarding intergenerational transfers -- It isn't just money -- Family values and ideologies -- Leaving a legacy -- Transferring assets -- Inter vivos exchanges -- Children helping parents -- Choosing inheritance -- Challenges to family ideologies -- To give or not to give, that is the question -- Leaving a legacy: personal security, family obligations, and the state -- The effects of public policy on family gift giving -- How estate taxes vary -- Estate taxes and exemptions -- Estate planning for the family -- Private long-term care insurance -- Estate recovery and related long-term care financing issues -- Inter vivos transfers and inheritance -- The impact of gift giving on the family: what helps? …”
Publicado 2008
Libro electrónico -
760Publicado 2014Tabla de Contenidos: “…Weapon Availability Competition over a Resource; Ungoverned Spaces; State/Institutional Weakness; Patronage/Corruption; Lessons for Mexico; Chapter Three: The Balkans (1991-2010); Conflict and Violence in the Balkans; The Role of the Serb Volunteer Guard ("Arkan's Tigers"); Explaining the Outbreak of Violence; Illicit Economy, Crime, and Violence; Smuggling and Trafficking; State Failure and Weak Governance; What Was Done to Improve the Situation?…”
Libro electrónico