Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 24
- Vascos 24
- Nacionalismo 15
- Engineering & Applied Sciences 11
- aspectos sociales 11
- Computer Science 9
- Geografía 9
- descripciones y viajes 9
- Emigración e inmigración vasca 8
- Mecánica 8
- Novela norteamericana 8
- Science 8
- Antropología cultural y social 7
- Naturaleza 7
- Descripción 6
- Documentales 6
- Política 6
- Andalucía 5
- Botánica 5
- Euskera 5
- Història 5
- Identidad colectiva 5
- Literatura vasca 5
- Películas cinematográficas 5
- Protección 5
- Sierra Nevada 5
- Social Science 5
- Botanica 4
- Botany 4
- Capuchinos- 4
-
701por Mestre Forés, Eva (coords.)Tabla de Contenidos: “…. -- FIGURA 48. IMAGEN DE LA GRAN NEVADA DE CASTELLÓ, EL DÍA DE SAN ANTONIO (17 DE ENERO) DE 1946. …”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
702por Jodidio, PhilipTabla de Contenidos: “…(Comprehensive Office Building, Zhujiajiao Administration Center, Quingpu, Shangai, China, 2004-06), p. 334 ; PAULO MENDES DA ROCHA (Our Lady of the Conception Chapel, Recife, Pernambuco, Brazil, 2004-06), p. 340 ; CORINNA MENN (Conn Viewinf Platform, Flims, Switzerland, 2005-06), p. 346 ; MERKX + GIROD ARCHITECTEN (Selexyz Dominicanen Bookstore, Maastricht, The Netherlands, 2005-07), p. 352 ; JOSÉ RAFAEL MONEO (Prado Museum Extension, Madrid, Spain, 2001-07), p. 358 ; MORPHOSIS (Hypo Alpe-Adria Bank Headquarters, Udine, Italy, 2004-06), p. 364 ; MVRDV (GYRE Building, Shibuya-ku, Tokyo, Japan, 2006-07), p. 372 ; MANFREDI NICOLETTI (New Arezzo Hall of Justice, Arezzo, Italy, 2001-07), p. 378 ; VALERIO OLGIATI (Atelier Bardill, Scharans, Switzerland, 2006-07), p. 382 ; STUDIO PEI – ZHU (Digital Beijing, Control Center for the 2008 Olympics, Beijing, China, 2005-08), p. 386 ; RENZO PIANO (The New York Times Building, New York, New York, USA, 2005-07), p. 394 ; PTW ARCHITECTS (The Watercube, National Swimming Center, Beijing, China, 2003-08), p. 404 ; STUDIO ARNE QUINZE (Uchronia Message out of the Future, Burning Man Festival, Black Rock City, Black Rock Desert, Nevada, USA, 2006), p. 412 ; RCR ARQUITECTES (The Edge, Bussines Bay, Dubai, United Arab Emirates, 2008-), p. 418 ; ROJKIND ARQUITECTOS (Nestlé Chocolate Museum (Phase I), Toluca, Mexico City, Mexico, 2007), p. 424 ; MARC ROLINET (Chapel of the Deaconesses of Reuilly, Versailles, France, 2004-07), p. 430 ; HANS-JORG RUCH (Chesa Madalena, Zuoz, Switzerland, 2001-02), p. 438 ; SANAA/SEJIMA + NISHIZAWA (De Kunstlinie, Theater and Cultural Center, Almere, The Netherlands, 2004-07 / New Museum of Contemporary Art, New York, New York, USA, 2005-07), p. 442 ; THOMAS SCHÜTTE (Model for a Hotel, Fourth Plinth, Trafalgar Square, London, UK, 2007-08), p. 456 ; SCOPE CLEAVER (Princeton University Gallery of the Arts, Princeton University (120, 204, 24), “Second Life”, 2007), p. 460 ; ÁLVARO SIZA VIEIRA (Adega Mayor Winery, Argamassas Estate – Campo Maior, Portugal, 2005-06 / Iberê Camargo Foundation, Porto Alegre, Rio Grande do Sul, Brazil, 1998-2008), p. 466 ; SNØHETTA (Oslo Opera House, Oslo, Norway, 2003-08), p. 484 ; TONKIN LIU (Singing Ringing Tree, Crown Point, Burnley, UK, 2005-06), p. 492 ; BERNARD TSCHUMI (Zénith Concert Hall, Limoges, France, 2005-07), p. 496 ; UNSTUDIO (Hotel Castell, Zuoz, Switzerland, 2001-04 / Theater Agora, Lelystad, The Netherlands, 2004-07), p. 502 ; URBANIS (Dafen Art Museum, Dafen Village, Shenzhen, China, 2006-08), p. 516 ; PEKKA VAPAAVUORI (KUMUU, Main Building of the Art Museum of Estonia, Tallinn, Estonia, 2003-06), p. 524 ; VARIOUS ARCHITECTS (Make It Right/Pink Project, New Orleans, Louisiana, USA, 2007-), p. 530 ; WANDEL HOEFER LORCH (Ohel Jakob Synagogue, Jewish Center in Munich, St.…”
Publicado 2001
Libro -
703Publicado 2006“…Cuando, tras la guerra, regresa a su patria, las dificultades para adaptarse de nuevo a la sociedad lo empujan a emprender un largo viaje en busca de la verdad y la paz espiritual que lo llevará desde los sórdidos barrios de París hasta las nevadas cumbres del Himalaya. Adaptación de la célebre novela de Somerset Maugham…”
DVD -
704por Ábalos, Rafael“…En el invierno de 1313, un joven llamado Grimpow encuentra el cadáver de un hombre en las nevadas montañas de úllpens. Aterrado por su siniestro hallazgo, Grimpow descubrirá que el misterioso caballero muerto es portador de un breve mensaje cifrado y de una extraña piedra que cambiarán su vida y su destino. …”
Publicado 2005
Libro -
705Publicado 2012“…Carley is a Magna Cum Laude graduate of the University of Nevada Las Vegas, where she earned dual bachelor’s degrees in Finance and Accounting. …”
-
706Publicado 2017Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
Libro electrónico -
707Publicado 2010“…She is a Magna Cum Laude graduate of the University of Nevada Las Vegas…”
-
708por Boardman, Marty. author“…In the post-real estate boom era, fixing and flipping is again a solid business--especially in the “sand” states—Arizona, California, Nevada, Texas, and Florida, among others. It’s also a good bet in states as diverse as North Carolina and Washington State. …”
Publicado 2013
Libro electrónico -
709por Verdoy, Alfredo“…Javier, en medio de las soledades y peligros de los monzones y tifones, del frío de las nevadas del Japón y de la soledad mortal del Peñón de Sancián, se sintió unido casi físicamente con sus hermanos jesuitas por medio de las cartas en las que, más allá de ofrecernos relatos y crónicas propias de aventureros, nos regala el aliento que el Espíritu de Dios le entrega casi a diario en la evangelización de un nuevo mundo. el contenido de sus cartas junto con las crónicas portuguesas y sesuíticas de su época, verdadera piedra angular de esta biografía, llega a ser un ejemplo más que cumplido del impacto que, en su sensibilidad y en su modo de evangelizar, produjeron la actualización del texto de los Ejercicios Espirituales de Ignacio de Loyola. …”
Publicado 2006
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Diocesana de Salamanca)Libro -
710Publicado 2012“…Coverage Includes Conceptualization and analysis: flow diagrams, batch processing, tracing, process conditions, and product design strategies Economic analysis: capital and manufacturing costs, financial calculations, and profitability analysis Synthesis and optimization: principles, PFD synthesis, simulation techniques, top-down and bottom-up optimization, pinch technology, and software-based control Advanced steady-state simulation: goals, models, solution strategies, and sensitivity and optimization studies Dynamic simulation: goals, development, solution methods, algorithms, and solvers Performance analysis: I/O models, tools, performance curves, reactor performance, troubleshooting, and “debottlenecking” Societal impact: ethics, professionalism, health, safety, environmental issues, and green engineering Interpersonal and communication skills: improving teamwork and group effectiveness This title draws on more than fifty years of innovative chemical engineering instruction at West Virginia University and the University of Nevada, Reno. It includes suggested curricula for single-semester and year-long design courses, case studies and practical design projects, current equipment cost data, and extensive preliminary design information that can be used as the starting point for more detailed analyses…”
Libro electrónico -
711Publicado 2013“…Walden habla de lagunas salvajes y hombres sabios, alces y shakespeares, esclavos huidos y trabajadores sonámbulos, las montañas de Nueva Inglaterra y el Bhagavad Gita, la belleza del fuego hogareño y la Gran Nevada, el silbido devastador del ferrocarril y el recóndito ulular del búho, la erudición de los indios Massasoit y la banalidad de los eruditos de Harvard, la belleza absoluta de la soledad y la importancia inconmensurable de la amistad, el bienestar que exhiben las marmotas y el malestar que aqueja a la mayoría de los seres humanos. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada)Libro