Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer programs 80
- Engineering & Applied Sciences 60
- Application software 50
- Development 49
- Computer Science 44
- Operating systems (Computers) 38
- Computer security 37
- Microsoft Excel (Computer file) 36
- Business 34
- Data processing 34
- Security measures 34
- Design 31
- JavaScript (Computer program language) 31
- Programming 31
- Electronic spreadsheets 30
- Computer graphics 29
- Digital techniques 28
- Photography 28
- Computer networks 26
- Computer programming 26
- Java (Computer program language) 24
- Web site development 24
- Web sites 21
- Database management 20
- Image processing 19
- Computer software 18
- Mac OS 18
- Microsoft Windows (Computer file) 18
- Python (Computer program language) 18
- Macintosh (Computer) 17
-
121por Clark, Rosemary, 1952-Tabla de Contenidos: “…Games of hide-and-seek : eluding the critical eye -- Games of make-believe : playing with historical discourses -- Sexualising the sacred : Vatican II as a 'novela rosa' in La oscura historia de la prima Montse -- Catalonia and paradise gardens : eroticising Edens -- Dark angels and bright devils : games with ambiguous icons…”
Publicado 2003
Libro -
122por Kula, DanielTabla de Contenidos: “…Families of materials (Wood / Paper, card-board / Leather, hide / Metal / Glass, ceramics / Plastics / Composites / Textiles / Stone / Concrete / Light) - 02. …”
Publicado 2008
Libro -
123por King, Peter, 1960-Tabla de Contenidos: “…Cover; Contents; Preface: Retracing Our Steps; Acknowledgements: Standing Together; 1 Closed; 2 In and Around Dwelling; 3 From Machines to Mine; 4 The Confinement of Sense; 5 Hiding in the World; 6 Open; Coda: Out and back; Bibliography; Films; Index…”
Publicado 2008
Libro electrónico -
124por Anderson, Christopher, 1966-“…From passes complete ratios to average transfer fees, the game has now been blitzed with statistics, but mostly they only confuse and hide the real story. 'The Numbers Game' uncovers the figures and percentages that really matter, as Chris Anderson and David Sally explain why preventing a goal is more important than scoring one, why taking too many shots may kill you, and why it is better to improve your worst player than buy a superstar…”
Publicado 2013
Libro -
125Publicado 2012Tabla de Contenidos: “…-- pt. 2. Abandonment : hide and seek until you find yourself -- pt. 3. Can psychotherapy penetrate beyond skin colour? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
126Publicado 2011Tabla de Contenidos:Libro electrónico
-
127Tabla de Contenidos: “…"The rose of Dixie" -- The third ingredient -- The hiding of Black Bill -- Schools and schools -- Thimble, thimble -- Supply and demand -- Buried treasure -- To him who waits -- He also serves -- The moment of victory -- The head-hunter -- No story -- The higher pragmatism -- Best-seller -- Rus in urbe -- A poor rule…”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
128Publicado 1996Tabla de Contenidos: “…Public Personae and Value -- 6. Hiding Behind Economic Values -- 7. Diverse Values in the Body and in Health -- 8. …”
Libro -
129por Supertramp (Grupo musical)Tabla de Contenidos: “…School -- Ain't nobody but me -- The logical song -- Bloody well right -- Breakfast in America -- You started laughing -- Hide in your shell -- From now on -- Dreamer -- Rudy -- A soapbox opera -- Asylum -- Take the long way home -- Fool's overture -- Two of us -- Crime of the century…”
Publicado 1980
Disco musical -
130por Focal Press StaffTabla de Contenidos: “…Montage essentials : layers -- 3. Hiding and showing -- 4. Image adjustments -- 5. Light and shade -- 6. …”
Publicado 2010
Libro electrónico -
131Publicado 2001Tabla de Contenidos: “…Introduction to computer forensics -- Tracking an offender -- The basics of hard drives and storage media -- Encryption and forensics -- Data hiding -- Hostile code -- Your electronic toolkit -- Investigating Windows computers -- Introduction to Unix for forensic examiners -- Compromising a Unix host -- Investigating a Unix host -- Introduction to the criminal justice system…”
Libro electrónico -
132por Medeiros de Freitas, DanielTabla de Contenidos: “…The confusing religious landscape in Brazil -- Flattening power structure (We have been being preached to) -- Conquer or hide -- Profane space does not exist -- Religious infrastructure -- Temple, street, home, and nature -- Interlude. …”
Publicado 2023
Libro electrónico -
133Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deploymentpor Cheruvu, Sunil. author, Kumar, Anil. author, Smith, Ned. author, Wheeler, David M. authorTabla de Contenidos: “…Chapter 1: Conceptualizing the Internet of Things -- Chapter 2: IoT Frameworks and Complexity Hiding -- Chapter 3: Base Platform Security Hardware Building Blocks -- Chapter 4: IoT Software Security Building Blocks -- Chapter 5: Connectivity Technologies for IoT -- Chapter 6: IoT Vertical Applications and Associated Security Requirements…”
Publicado 2020
Libro electrónico -
134por West, Clare“…There is one house, however, that does not hide from the wind. It stands out from the hill and challenges the wind to do its worst. …”
Publicado 2000
Libro -
135por Harmes, RossTabla de Contenidos: “…Object-Oriented JavaScript -- Expressive JavaScript -- Interfaces -- Encapsulation and Information Hiding -- Inheritance -- The Singleton Pattern -- Chaining -- Design Patterns -- The Factory Pattern -- The Bridge Pattern -- The Composite Pattern -- The Facade Pattern -- The Adapter Pattern -- The Decorator Pattern -- The Flyweight Pattern -- The Proxy Pattern -- The Observer Pattern -- The Command Pattern -- The Chain of Responsibility Pattern…”
Publicado 2008
Libro electrónico -
136por McConnell, SteveTabla de Contenidos: “…Design Building Blocks: Heuristics; Form Consistent Abstractions; Encapsulate Implementation Details; Inherit-When Inheritance Simplifies the Design; Hide Secrets (Information Hiding); An Example of Information Hiding; Two Categories of Secrets; Barriers to Information Hiding; Value of Information Hiding…”
Publicado 2004
Libro electrónico -
137Publicado 2014Tabla de Contenidos: “…Forage for Information -- 4. Code Up -- 5. Hide and Seek -- Literacies That Support Participatory Politics -- Mind the Risks -- Concluding Thoughts -- Notes -- References -- Series…”
Libro electrónico -
138por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Main Processes 11 -2.1 Curing: Hide and skin storage 12 -2.2 Beamhouse operations 13 -2.3 Tanyard operations 13 -2.4 Post-tanning operations 14 -2.5 Finishing 15 3. …”
Publicado 2014
Libro electrónico -
139por Garcia Bachmann, Mercedes L.Tabla de Contenidos: “…An overview of female labor in the Hebrew Bible -- The challenge of studying working women -- Standing on the shoulders of our predecessors -- Society's conditions affecting women's lives in ancient Israel -- Female slaves and dependents, literal and ideological, in Israel -- Hide and seek: miscellaneous women -- Female workers related to the royal household -- Prostitutes or "sex workers" -- Reassessing the social location of female in DtrH…”
Publicado 2013
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
140Publicado 2017“…She reports consciously attempting to hide her episodes of binging…”
Vídeo online