Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer programs 80
- Engineering & Applied Sciences 60
- Application software 50
- Development 49
- Computer Science 44
- Operating systems (Computers) 38
- Computer security 37
- Microsoft Excel (Computer file) 36
- Business 34
- Data processing 34
- Security measures 34
- Design 31
- JavaScript (Computer program language) 31
- Programming 31
- Electronic spreadsheets 30
- Computer graphics 29
- Digital techniques 28
- Photography 28
- Computer networks 26
- Computer programming 26
- Java (Computer program language) 24
- Web site development 24
- Web sites 21
- Database management 20
- Image processing 19
- Computer software 18
- Mac OS 18
- Microsoft Windows (Computer file) 18
- Python (Computer program language) 18
- Macintosh (Computer) 17
-
841Publicado 2002“…Their experiences range from living in hiding to physical and sexual abuse. Child Survivors of the Holocaust preserves and integrates the personal narratives and the therapist's perspective in an amazing chronicle. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
842por Schaathun, Hans Georg“…Steganography is the art of communicating a secret message, hiding the very existence of a secret message. This is typically done by hiding the message within a non-sensitive document. …”
Publicado 2012
Libro electrónico -
843por Herbold, Robert J.“…-Harvey Schachter, The Globe and Mail Quit hiding from tough decisions and learn to confront them head-on Why do managers at all levels sacrifice corporate success by shying away from making the tough decisions? …”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
844Publicado 2016“…With forced marriage, the sensationalized hides the mundane, and oversimplified popular discourses miss the range of experiences. …”
Libro electrónico -
845Publicado 2017“…The label ""human error"" is prejudicial and hides much more than it reveals about how a system functions or malfunctions. …”
Libro electrónico -
846por Metula, Erez“…This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. …”
Publicado 2010
Libro electrónico -
847Publicado 2012“…While accommodating playfulness and even a bit of audacity, both psychoanalysis and poetry deeply respect formality of structure, nuance of affect, and the multifaceted resonance of the spoken word.Twinship of the analytic and poetic discourse is also evident in the parallels between a fumbling pause in free associations and an aching line break in a poem, a telling parapraxis and an inspired metaphor, an acknowledgment of the repressed via its negation and the irony of simultaneous hiding and revealing in verse, and so on.To put it bluntly, psychoanalysis is two-person poetry and poetry one-p…”
Libro electrónico -
848Publicado 2007“…Enabling technologies include watermarking, data hiding, steganography and steganalysis, joint signal processing and encryption, perceptual hashing, identification, biometrics, fingerprinting, and digital forensics."…”
Revista digital -
849por Shimonski, Robert“…Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. …”
Publicado 2012
Libro electrónico -
850Publicado 2022Tabla de Contenidos: “…5 Building a Memory game using Unity's 2D functionality -- 5.1 Setting up everything for 2D graphics -- 5.1.1 Preparing the project -- 5.1.2 Displaying 2D images (aka sprites) -- 5.1.3 Switching the camera to 2D mode -- 5.2 Building a card object and making it react to clicks -- 5.2.1 Building the object out of sprites -- 5.2.2 Mouse input code -- 5.2.3 Revealing the card on a click -- 5.3 Displaying the various card images -- 5.3.1 Loading images programmatically -- 5.3.2 Setting the image from an invisible SceneController -- 5.3.3 Instantiating a grid of cards -- 5.3.4 Shuffling the cards -- 5.4 Making and scoring matches -- 5.4.1 Storing and comparing revealed cards -- 5.4.2 Hiding mismatched cards -- 5.4.3 Text display for the score -- 5.5 Restart button -- 5.5.1 Programming a UIButton component by using SendMessage -- 5.5.2 Calling LoadScene from SceneController -- Summary -- 6 Creating a basic 2D platformer -- 6.1 Setting up the graphics -- 6.1.1 Placing the scenery -- 6.1.2 Importing sprite sheets -- 6.2 Moving the player left and right -- 6.2.1 Writing keyboard controls -- 6.2.2 Colliding with the block -- 6.3 Playing the sprite's animation -- 6.3.1 Explaining the Mecanim animation system -- 6.3.2 Triggering animations from code -- 6.4 Adding the ability to jump -- 6.4.1 Falling from gravity -- 6.4.2 Applying an upward impulse -- 6.4.3 Detecting the ground -- 6.5 Additional features for a platform game -- 6.5.1 Unusual floors: Slopes and one-way platforms -- 6.5.2 Implementing moving platforms -- 6.5.3 Camera control -- Summary -- 7 Putting a GUI onto a game -- 7.1 Before you start writing code . . . -- 7.1.1 Immediate mode GUI or advanced 2D interface? …”
Libro electrónico -
851Publicado 2018Tabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright Page -- Contents -- Foreword 25 -- Preface 27 -- Before You Begin 47 -- 1 Introduction to Computers, the Internet and Java 53 -- 1.1 Introduction 54 -- 1.2 Hardware and Software 56 -- 1.2.1 Moore's Law 56 -- 1.2.2 Computer Organization 57 -- 1.3 Data Hierarchy 59 -- 1.4 Machine Languages, Assembly Languages and High-Level Languages 61 -- 1.5 Introduction to Object Technology 62 -- 1.5.1 Automobile as an Object 63 -- 1.5.2 Methods and Classes 63 -- 1.5.3 Instantiation 63 -- 1.5.4 Reuse 63 -- 1.5.5 Messages and Methopd Calls 64 -- 1.5.6 Attributes and Instance Variables 64 -- 1.5.7 Encapsulation and Information Hiding 64 -- 1.5.8 Inheritance 64 -- 1.5.9 Interfaces 65 -- 1.5.10 Object-Oriented Analysis and Design (OOAD) 65 -- 1.5.11 The UML (Unified Modeling Language) 65 -- 1.6 Operating Systems 66 -- 1.6.1 Windows-A Proprietary Operating System 66 -- 1.6.2 Linux-An Open-Source Operating System 66 -- 1.6.3 Apple's macOS and Apple's iOS for iPhone®, iPad® 67 -- 1.6.4 Google's Android 67 -- 1.7 Programming Languages 68 -- 1.8 Java 70 -- 1.9 A Typical Java Development Environment 71 -- 1.10 Test-Driving a Java Application 74 -- 1.11 Internet and World Wide Web 78 -- 1.11.1 Internet: A Network of Networks 79 -- 1.11.2 World Wide Web: Making the Internet User-Friendly 79 -- 1.11.3 Web Services and Mashups 79 -- 1.11.4 Internet of Things 80 -- 1.12 Software Technologies 81 -- 1.13 Getting Your Questions Answered 83 -- 2 Introduction to Java Applications -- Input/Output and Operators 87 -- 2.1 Introduction 88 -- 2.2 Your First Program in Java: Printing a Line of Text 88 -- 2.2.1 Compiling the Application 92 -- 2.2.2 Executing the Application 93 -- 2.3 Modifying Your First Java Program 94 -- 2.4 Displaying Text with printf 96 -- 2.5 Another Application: Adding Integers 97 -- 2.5.1 import Declarations 98.…”
Libro electrónico -
852Publicado 2014“…Harness the power of Excel to discover what your numbers are hiding Excel Data Analysis For Dummies, 2nd Edition is the ultimate guide to getting the most out of your data. …”
Libro electrónico -
853Publicado 2013“…As a place of exclusive sociability and bohemian misery, a site of crime and murder and as a hiding place for illicit liaison, the hotel has embodied the dynamism of the metropolis since the eighteenth century. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
854
-
855por Frank, Ana“…The Diary of Anne Frank is a poignant firsthand account of a young Jewish girl, Anne Frank, hiding with her family in Nazi-occupied Amsterdam during World War II. …”
Publicado 2016
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
856Publicado 2019“…Steganography, the art of hiding tiny pieces of data in image, video, and audio, can also help in copyright protection, authentication, and access control. …”
Libro electrónico -
857Publicado 2018“…You'll study objects 1, including: object literals, prototypes, equality, constructors, JSON, DOM (event handling, the event object, debouncing, event propagation, event delegation, single threaded JavaScript, an so on).Then you'll move to advanced concepts such as execution context, hoisting, 'this', scope chain, closures(including updating outer variables, iterations, closures with event loops); objects 2 (encapsulation and information hiding includingusing closures to hide information, using IIFE to create private static properties and methods); objects 3 (inheritance and prototype chain, including class augmentation and object cloning); singleton and modular design patterns (including: name-spacing and on) and functions 2, including the 'arguments' property,function,prototype, call and so on…”
-
858Publicado 2015“…Solve the number one problem with today's young workforce-the soft skills gap The number one challenge with today's young talent is a problem hiding in plain sight: the ever-widening soft skills gap. …”
Libro electrónico -
859Publicado 2010“…Topics covered include signing up for a Windows Live ID, organizing your SkyDrive folders, working with SharePoint 2010, inviting your Facebook friends to your SkyDrive network, formatting your documents, downloading a snapshot of an Excel workbook, hiding a slide in PowerPoint, using tags to build a to-do list in OneNote, and much, much more!…”
-
860Publicado 2024“…Learn essential tips, such as hiding unnecessary information for a clean look and using formulas to calculate the percentage of completed tasks for the week. …”
Video