Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
761por Lowe, Scott, 1970-Tabla de Contenidos: “…Network with vNetwork Distributed SwitchesUnderstand Advanced Networking; Chapter 7: Configuring and Managing Storage; Become Familiar with Storage Concepts; Implement Storage; Chapter 8: High Availability and Business Continuity; Minimize Planned Downtime; Protect Against Host Failure; Guard Against VM Failure; Chapter 9: Managing Virtual Machines; Create Virtual Machines; Modify Virtual Machines; Manage Virtual Machine Hardware Versions; Perform Other Virtual Machine Management Tasks; Chapter 10: Importing and Exporting Virtual Machines; Understand the Migration Process…”
Publicado 2010
Libro electrónico -
762Publicado 2015Tabla de Contenidos: “…Understanding Brian's Success Chapter 4: Applying Strategic Leadership; Gaining Strategic Insight; Identifying the Right Approach; Driving Strategic Change; Identifying the Right Approach; Todd Connor and the Bunker; Chapter 5: Garnering Buy-in, Commitment, and Advocacy; Winning the Hearts of Your Followers; The YMCA of the USA; Engaging the Minds of Your Followers; The United States Coast Guard; Leveraging the Hands of Your Followers; The Heartland Angels; Chapter 6: Developing Strategic Leadership; Competencies of the Strategic Leader…”
Libro electrónico -
763Publicado 2014Tabla de Contenidos: “…Cover; Copyright; Credits; Foreword; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction; Concurrent programming; A brief overview of traditional concurrency; Modern concurrency paradigms; The advantages of Scala; Preliminaries; Execution of a Scala program; A Scala primer; Summary; Exercises; Chapter 2: Concurrency on the JVM and the Java Memory Model; Processes and Threads; Creating and starting threads; Atomic execution; Reordering; Monitors and synchronization; Deadlocks; Guarded blocks…”
Libro electrónico -
764por Douglass, Bruce PowelTabla de Contenidos: “…; Chapter 4 Design Patterns for Embedding Concurrency and ResourceManagement; 4.1 Basic Concurrency Concepts; 4.2 Cyclic Executive Pattern; 4.3 Static Priority Pattern; 4.4 Critical Region Pattern; 4.5 Guarded Call Pattern; 4.6 Queuing Pattern; 4.7 Rendezvous Pattern; 4.8 Simultaneous Locking Pattern; 4.9 Ordered Locking; 4.10 So, What Have We Learned?…”
Publicado 2010
Libro electrónico -
765por Kusnetzky, DanTabla de Contenidos: “…Security for Virtual Environments: Guarding the Treasure; What Is Security for Virtual Environments?…”
Publicado 2011
Libro electrónico -
766por Shamsudeen, Riyaj. author, Hussain, Syed Jaffar. author, Yu, Kai. author, Farooq, Tariq. authorTabla de Contenidos:
Publicado 2013Libro electrónico -
767por Goldstein, Sam, 1952-Tabla de Contenidos: “…The Assessment Process: Conditions and Comorbidities; Introduction to ADHD in Adulthood: Presentation and Risks; Current ADHD Diagnostic Criteria, The DSM-IV; Practice Parameters for the Assessment of Adult ADHD; Making the Diagnosis of ADHD in Adults; Guarding Against Overdiagnosing ADHD in Adults and the Issue of Comorbidity; References; Chapter 5. …”
Publicado 2002
Libro electrónico -
768Publicado 1994Tabla de Contenidos: “…; The Corporate Age; Memories of an Old Guard; Notes; Bankrupt; References; Reply to Dr.Northrup's ""Bankrupt"" Letter; The Changing Provision for the Child in Need of Care: A Nottinghamshire, England, Case Study; National Overview; Nottinghamshire; Reports on Residential Care; Closures; Area Community Homes; Specialist Fostering; Costs…”
Libro electrónico -
769Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Foreword -- Prologue -- Chapter 1 Roots -- Life Without Papa -- From Kesur to Canada -- Papa Returns -- Reflections -- Chapter 2 Changing of the Guard -- A Whole New World -- Bewildered in Barbados -- Serene in Salinas -- Confused in Canada -- Reflections -- Chapter 3 Return of the Native -- The Ratlam "Suar" System -- Objects of Curiosity -- Hard Landing -- School of Horrors -- Innocence Lost -- Home Base Indore -- Reflections -- Chapter 4 Return to Kesur -- The Darker Side of Kesur -- Trickle-Down Tyranny -- Reflections -- Chapter 5 No Time to Dream -- My Luck Runs Out -- Grim Survivor -- Political Awakening -- Bombay Bound -- Back to the Future -- Reflections -- Chapter 6 New York, New York -- Marketing Mecca - or Mayhem? …”
Libro electrónico -
770por Institute of Medicine (U.S.).Tabla de Contenidos: “…Authorizations, Missions, and Appropriations -- Allocations to Health Research and Service Programs -- NOTES -- 4 Co-Administration of Research and Services -- OVERVIEW -- RESEARCH AND SERVICES MISSIONS OF THE PHS -- THE RESEARCH-SERVICES CONTINUUM -- CO-ADMINISTRATION OF RESEARCH AND SERVICE PROGRAMS -- PLANNING, PRIORITY SETTING, AND BUDGETING -- At the Department and PHS Level -- Within PHS Agencies -- EFFECTIVENESS OF DEMONSTRATION AND INFORMATION DISSEMINATION PROGRAMS -- ORGANIZATIONAL CAPACITY AND PROGRAM PLACEMENT -- FINAL THOUGHTS -- NOTES -- ADDITIONAL BIBLIOGRAPHY -- 5 Duplication, Replication, and Complementarity -- INTRODUCTION -- DEFINITIONS -- REPLICATION, DUPLICATION, AND COMPLEMENTARITY IN THE CASE STUDIES -- Alzheimer's Disease Case Study -- Schizophrenia and Parkinson's Disease: Dopamine Research -- Substance-Abusing Pregnant Women -- GUARDING AGAINST DUPLICATION -- NOTES -- Appendix B Nomenclature for Research and Service Activities -- NOTES -- Appendix C Task Forces and Liaison Committee -- TASK FORCE ON ALZHEIMER'S DISEASE CASE STUDY -- TASK FORCE ON DOPAMINE CASE STUDY -- TASK FORCE ON SUBSTANCE-ABUSING PREGNANT WOMEN CASE STUDY -- TASK FORCE ON THE HISTORY OF RESEARCH -- TASK FORCE ON METHODOLOGY -- TASK FORCE ON SCIENTIFIC METHODOLOGY -- PUBLIC HEALTH SERVICE LIAISON COMMITTEE -- Appendix D Interview List…”
Publicado 1991
Libro electrónico -
771Publicado 2017Tabla de Contenidos: “…Extending Vue with our own plugin -- Creating a plugin -- Plugin options -- Fetch method -- Reusing code with mixins -- Fetching remote data -- Loading management -- Error management -- Support tickets -- User authentication -- Storing the user in a centralized state -- Another plugin -- Login forms -- Smart form -- Form input component -- Customizing v-model -- Login component -- Style children of scoped elements -- Improving our fetch plugin -- Sign up operation -- Login operation -- User menu -- Logout method -- Private routes with navigation guards -- Route meta properties -- Router navigation guards -- Redirecting to the wanted route -- Initializing user authentication -- Guest routes -- Displaying and adding tickets -- Tickets list -- Session expiration -- Nested routes -- Fixing our navigation guard -- Sending a form -- Form textarea -- Binding attributes -- User actions -- Backup user input -- Advanced routing features -- Dynamic routes with parameters -- Dynamic remote data -- The dynamic route -- Not found page -- Transitions -- Scrolling behavior -- Summary -- Chapter 6: Project 4 - Geolocated Blog -- Google Auth and state management -- Project setup -- Creating the app -- Some routing -- State management with Vuex -- Why do I need this? …”
Libro electrónico -
772Publicado 2023Tabla de Contenidos: “…Monitoring PIM -- Planning and configuring entitlement management -- Planning and configuring access reviews -- Summary -- Questions -- Further reading -- Chapter 5: Azure AD Identity Protection -- Understanding Identity Protection -- Protecting users with risk and registration policies -- Configuring user risk and sign-in risk policies -- Configuring MFA registration policies -- Configuring alert options -- Users at risk detected alerts -- Weekly digest -- Managing and resolving risk events -- Examining users at risk -- Examining risky sign-ins -- Examining risk detections -- Risky workload identities (preview) -- Risk-based Conditional Access policies -- Summary -- Questions -- Further reading -- Part 2: Implementing and Managing Threat Protection -- Chapter 6: Configuring a Microsoft Defender for Identity Solution -- Identifying the organizational need for MDI -- Understanding suspicious activity -- Exploring advanced attacks and malicious activities -- Understanding the MDI architecture -- Setting up MDI -- Prerequisites for MDI -- Installing and configuring MDI -- Additional configuration options -- Managing and monitoring MDI -- Entity tags -- Excluded entities -- Monitoring MDI -- Summary -- Questions -- Further reading -- Chapter 7: Configuring Device Threat Protection with Microsoft Defender for Endpoint and Intune -- Planning and implementing MDE -- Onboarding devices -- Managing and monitoring MDE -- Vulnerability management -- Partners and APIs -- Evaluation & -- tutorials -- Configuration management -- Implementing Microsoft Defender Application Guard, Application Control, and exploit protection -- Configuring Microsoft Defender Application Guard -- Configuring Microsoft Defender Application Control -- Configuring Microsoft Defender Exploit Guard -- Encrypting your Windows devices using BitLocker…”
Libro electrónico -
773por McLucas, John L.“…After naval service in World War II, he began a long affiliation with the Air Force as a civilian engineer and Air National Guard officer. He continued this affiliation as president of both a pioneering high-tech company and the Air Force-sponsored MITRE Corporation. …”
Publicado 2006
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
774Publicado 2013“…No matter how the professional intersects with families affected by alienation, be it through individual treatment, reunification therapy, a school setting, or support groups, he or she needs to consider how to make proper assessments, how to guard against bias, and when and how to involve the court system, among other c…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
775por Neddenriep, Kurt“…A comprehensive guide to personal finance, this book is informed by the author's expertise in the financial industry and framed within the lessons, clear thinking and organization he learned over the course of a parallel 23-year career in the Army National Guard of Nevada. The book will tell the stories of those who serve our country and how their v…”
Publicado 2014
Libro electrónico -
776por Heiser, Deborah“…When we engage in lateral mentoring, we can let our guard down. A friend or colleague is someone you can be vulnerable with, whether they work in your department, another department, or are a friend outside of work. …”
Publicado 2024
Libro electrónico -
777por Smaini, Lydi, 1974-Tabla de Contenidos: “…ADC dynamic range 1.2.6 Digital compensation of RF Analog Front-End imperfections 1.3 OFDM modulation 1.3.1 OFDM as a Multicarrier modulation 1.3.2 Fourier Transform and Orthogonal Subcarriers 1.3.3 Channel estimation and equalization in frequency domain 1.3.4 Pilot-tones 1.3.5 Guard interval 1.3.6 Windowed OFDM 1.3.7 Adaptive Transmission 1.3.8 OFDMA for Multiple Access 1.3.9 Scalable OFDMA 1.3.10 OFDM digital baseband architecture 1.3.11 OFDM-based standards 1.4 SNR, EVM, and Eb/N0 definitions and relationship 1.4.1 Bit error rate 1.4.2 SNR vs. …”
Publicado 2012
Libro electrónico -
778Publicado 2013Tabla de Contenidos: “…36 Training Initiatives for Evidence-Based Psychotherapies -- 37 Unique Challenges Faced by the National Guard and Reserve -- PART IV: CLINICAL THEORY, RESEARCH, AND PRACTICE -- 38 Prevalence of Mental Health Problems among Military Populations -- 39 Challenges and Threats of Combat Deployment -- 40 Postdeployment Adjustment -- 41 Combat and Operational Stress Control -- 42 Trauma and Posttraumatic Stress Disorder -- 43 Anxiety Disorders and Depression in Military Personnel -- 44 Serious Mental Illness in the Military Setting -- 45 Substance Use in the US Active Duty Military -- 46 Substance Use Disorders among Military Personnel -- 47 Traumatic Brain Injury -- 48 Aggression and Violence -- 49 Sleep Loss and Performance -- 50 Sleep Disorders -- 51 Grief, Loss, and War -- 52 Early Interventions with Military Personnel -- 53 The Psychosocial Aspects and Nature of Killing -- 54 Military Sexual Trauma -- 55 Prescription Opioid Abuse in the Military -- 56 Psychosocial Rehabilitation of Physically and Psychologically Wounded -- 57 Working with Military Children -- 58 Impact of Psychiatric Disorders and Psychotropic Medications on Retention and Deployment -- 59 Technology Applications in Delivering Mental Health Services -- 60 What We Have Learned from Former Prisoners of War -- 61 Clinical Research in the Military -- 62 Measuring Resilience and Growth -- 63 Transitioning through the Deployment Cycle -- 64 Aging Veterans -- 65 Spiritual Resiliency in the Military Setting -- 66 Posttraumatic Growth -- 67 Ways to Bolster Resilience across the Deployment Cycle -- PART V: RESOURCES -- 68 Common Military Abbreviations -- 69 Comparative Military Ranks -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Y -- Z.…”
Libro electrónico -
779por Kobayashi, NobukoTabla de Contenidos: “…Yasuko Gotoh, Former Career Bureaucrat at the Ministry of Land, Infrastructure, Transport and Tourism (MLIT) -- Yasuko Gotoh Breaks Ground for Women Career Bureaucrats -- Traumatic Start: The Ministry of Transport -- Turning Point: Japan Coast Guard -- Boomerang: New York to Yamagata -- Private Sector: JR Kyushu -- "I Just Want to Be Useful" -- Japanese Businesswomen Need More Than a Place at the Table -- Employers Should Encourage Risk-Taking to Beat Impostor Syndrome -- References -- Acknowledgments -- Index -- EULA…”
Publicado 2023
Libro electrónico -
780Publicado 2000“…The work, in an enigmatic composition, contains many allusions and also refers to a personal crisis he was undergoing during the period Studio with Mimosa", Pierre Bonnard, 1939-1946 (Pompidou Centre, Paris) Square, criss-crossed with numerous slanting lines (the frame of the skylight, the guard-rail in the foreground), and filled with dazzling colours (ultramarine, emerald, orange, pink, and the bright yellow of the mimosa), "Studio with Mimosa" is one of Bonnard's last great paintings (he died in 1947). …”
Ver más información
DVD