Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 34,086
- Crítica e interpretación 10,716
- Biblia 10,567
- Filosofía 8,839
- Història 8,257
- Iglesia Católica 4,608
- Historia y crítica 4,211
- Teología 3,992
- Capuchinos 3,379
- Moral cristiana 3,288
- Política 3,127
- Teología dogmática 3,124
- Església Catòlica 3,058
- Derecho 2,922
- Política y gobierno 2,920
- Bíblia 2,732
- historia 2,663
- Sermones 2,532
- Economía 2,336
- Misiones- 2,290
- Educación 2,188
- Derecho canónico 2,159
- Arquitectura 1,995
- Jesucristo 1,982
- Biografia 1,859
- Arte 1,828
- Espiritualidad 1,702
- Cristianismo 1,681
- Religión 1,586
- Crítica i interpretació 1,584
-
693321por Fernández Chento, Francisco Javier“…Mi reconocimiento entrañable a Francisco Javier Fernández Chento, autor material de la elaboración de este Cacionero, y protagonista él mismo de esa marcha joven hacia un nuevo estilo de vida cristiana que quiere ser el movimiento FEYDA. P. Felix Villafranca Calvillo, CM. Director de FEYDA…”
Publicado 1990
Red de bibliotecas Iglesia Navarra (Otras Fuentes: Bibliotecas de la Diócesis de Teruel y Albarracín)Libro -
693322Publicado 2024“…What You Will Learn Authenticate with the ChatGPT and OpenAI APIs and learn how to engineer and send prompts Test your prompts in the ChatGPT Playground How to use multiple artificial intelligence models Harness the power the temperature, top_p, and other parameters that can ONLY be accessed by developers to create more unique and engaging responses from ChatGPT Create intelligent bots for Slack or Discord servers Incorporate context into prompts for better responses and apply advanced features of the APIs. …”
Libro electrónico -
693323Publicado 2015“…Javier Vitoria, José Ignacio González Faus, Mercedes Navarro, José Antunes da Silva, Maria Clara Bingemer y Bárbara P. Bucker. Varios autores destacan la importancia misionera del Pacto: Stephen Bevans, Mary-Noelle Ethel Ezeh, Virginia Saldanha y Paul Han. …”
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de Pastoral Madrid, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Universidad Loyola - Universidad Loyola Granada, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Central de Capuchinos de España)Libro -
693324por Fumaroli, Marc, 1932-“…Seule la beauté a rendu et peut rendre l'homme à lui-même et le monde humain habitable en les invitant participer de la nature et de la grâce et à se libérer du vampirisme d'images-mirages, d'images-idoles, qui ne laissent sur leur passage, comme un vol de sauterelles, qu'un désert globalisé et privé de feuillage--P. [4] of cover…”
Publicado 2009
Libro -
693325Publicado 2020“…Im Anhang sind ergänzende Materialien beigegeben, die den aktuellen Forschungsstand dokumentieren und somit der Leserschaft bei der Benützung des Bandes als Hintergrundinformation hilfreich sein mögen, darunter die aktuelle Transkription der Scythica Vindobonensia alias Dexippus Vindobonensis, jenes Textes also, der den Kerngegenstand der Tagung darstellte.00Den Rahmen der Tagung bildete das FWF-Projekt P 28112- G25 ?Scythica Vindobonensia? (2015?2019), das auf eine ausführlich kommentierte Gesamtedition des Textes in Form einer Monographie von Gunther Martin und Jana Grusková abzielt. …”
Otros -
693326Publicado 2019“…El trabajo realizado ha contado con la ayuda de los proyectos DEMOC2017 (Generalitat de Catalunya) y DER2015-68706-P (Gobierno de España)." (Thomson Reuters)…”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Datos de acceso al recurso electrónico
Acceso a la plataforma Legalteca, busque el título una vez dentro.
Libro -
693327Publicado 2016“…Este libro es fruto del XXIX Seminario Interdisciplinar de Bioética organziado por la Cátedra de Bioética de la Universidad P. Comillas que congregó a más de cincuenta especialistas de bioética…”
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Universidad Loyola - Universidad Loyola Granada, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca del Seminario Diocesano de Jaén)Libro -
693328por Arboledas Brihuega, DavidTabla de Contenidos: “…18.5 EJERCICIOS PROPUESTOS -- LA MÁQUINA ENIGMA -- 19.1 PROCEDIMIENTOS DE ENIGMA -- 19.2 EL PROGRAMA -- 19.3 CÓMO FUNCIONA EL PROGRAMA -- 19.3.1 EL MÉTODO ISALPHA() -- 19.4 RESUMEN -- 19.5 EVALUACIÓN -- 19.6 EJERCICIOS PROPUESTOS -- SOLUCIONARIO A LOS EJERCICIOS PROPUESTOS -- ANEXO -- A.1 DYNAMIC BOXES ENCRYPTION SYSTEM -- A.2 EL CÓDIGO FUENTE DE AZRAEL -- A.2.1 EL MÓDULO S_BOX.PY -- A.2.2 EL MÓDULO P_BOX.PY -- A.3 EL RETO -- PREGUNTAS DEL CONCURSO -- BIBLIOGRAFÍA -- MATERIAL ADICIONAL -- ÍNDICE ALFABÉTICO…”
Publicado 2017
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
693329Publicado 2006Tabla de Contenidos: “…Conté "Ordenaciones densas de poca altura": Atelier 5 : Urbanización Halen, Berna ; Reinhard Gieselmann : Ludwig- Windhorst-Strasse : Karlsrue; J.P. Storgard, J. & A. Orum-Nielsen, H. Marcussen: Galgebakken, Herstederne ; Álvaro Siza : Quinta da Malagueira, Évora ; Darbourne, Darke : Marquess Road, Londres-Islington ; Gordon Benson, Alan Forsyth : Maiden Lane, Londres ; D. …”
Libro -
693330Publicado 2016Tabla de Contenidos: “…-- Loans/Subsidies from the Chinese Government-China Development Bank -- Chapter 10: China: Place => Partnerships -- How They Sell: Selling Direct versus via Partners -- Selling Direct -- Selling with Partners -- Partnerships and Alliances: Coopetition -- Partnerships -- Local Presence -- Partnering with Customers -- Market Access Exchange -- Alliances -- Challenges -- Chapter 11: China: Promotion => Customer Relationships and Culture -- Customer Relationships -- Customer Reference Accounts Are Key -- High-Touch Customer Relationship Model -- Attaining High Customer Satisfaction -- Invest in Customers -- Influence at All Levels -- Relationships with Greater Intentions (Ulterior Motives) -- Partnerships to Aid in Market Penetration -- Communications -- Marketing and Conferences -- Associations and Standards Bodies -- Brands -- Chapter 12: China: Politics => The 5th P-The Geopolitical Dimension -- Politics: The Geopolitical Dimension -- Nationalistic Philosophy-Venturing Out with Team China -- A Partnership Approach -- Countries with Resources -- Ethics and Boundaries: Unfair Trade Practices -- Security Concerns -- Why Do You All Hate Me?! …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
693331Publicado 2016Tabla de Contenidos: “…. -- 1.5.2 LISTAS DE FECHAS -- 1.5.3 P.-M. HOMBERT -- 1.5.3.1 EL MÉTODO DE HOMBERT. -- 1.5.3.2 NUEVAS FECHAS DE HOMBERT. -- 1.5.3.3. …”
Libro electrónico -
693332Publicado 2023Tabla de Contenidos: “…Authorization and authenticated key establishment -- Message authentication versus entity authentication -- Password-based authentication -- Brief history of password-based authentication -- Storing passwords -- Disadvantages of password-based authentication -- Challenge-response protocols -- Ensuring freshness -- Challenge-response using symmetric keys -- Challenge-response using (keyed) one-way functions -- Challenge-response using public-key cryptography -- Summary -- Chapter 6: Transport Layer Security at a Glance -- Birth of the World Wide Web -- Early web browsers -- From SSL to TLS -- TLS overview -- TLS terminology -- CIA triad in TLS -- TLS within the internet protocol stack -- TLS version 1.2 -- Subprotocols in TLS version 1.2 -- A typical TLS 1.2 connection -- Algorithm negotiation -- Key establishment -- Server authentication -- Client authentication -- Session resumption -- TLS version 1.3 -- Handshake protocol -- Error handling in the TLS 1.3 handshake -- Session resumption and PSKs -- Zero round-trip time mode -- Major differences between TLS versions 1.3 and 1.2 -- Summary -- Part 2: Shaking Hands -- Chapter 7: Public-Key Cryptography -- Preliminaries -- Groups -- Examples of groups -- The discrete logarithm problem -- The Diffie-Hellman key-exchange protocol -- Security of Diffie-Hellman key exchange -- Discrete logarithm problem -- The Diffie-Hellman problem -- Authenticity of public keys -- The ElGamal encryption scheme -- Finite fields -- Fields of order p -- Fields of order pk -- The RSA algorithm -- Euler's totient function -- Key pair generation -- The encryption function -- The decryption function -- Security of the RSA algorithm -- The factoring problem -- The RSA problem -- Authenticity of public keys -- Authenticated key agreement -- The Station-to-Station (STS) protocol -- Public-key cryptography in TLS 1.3.…”
Libro electrónico -
693333por Grant, RickfordTabla de Contenidos: “…Project 11: Setting Up Asian-Language Support -- Setting Up IBus to Automatically Start Up When You Log In -- Viewing Your System in Another Language -- 12: Penguins at Work - Getting Down to Business in Linux -- OpenOffice.org -- Word Processing Done Lightly with AbiWord -- Some Other Cool Productivity Apps -- 13: Brush-Wielding Penguins - Linux Does Art -- Project 13A: Importing Images from Digital Cameras -- Project 13B: Working with Digital Images in F-Spot Photo Manager -- Getting Arty with the GIMP -- Phatch Photo Batch Processor -- gpaint -- Inkscape -- Project 13C: Installing Picasa -- A Few Other Graphics Apps to Consider -- 14: Tux Rocks- Music a la Linux -- Audio File Formats -- Project 14A: Installing MP3 Support for Audio Apps -- Rhythmbox--Your Audio Player -- Project 14B: Listening to Streaming Media with Rhythmbox -- Creating Audio CDs -- Project 14C: Listening to RealMedia Streams with RealPlayer -- Other Cool Audio Apps -- 15: Pluggin' in the Penguin - Working with Your iPod, iPhone, and Other Digital Media Devices -- Knowing Your Limits -- Mounting or Ejecting Your iPod or iPhone -- (Not) Auto-updating Your iPod or iPhone -- Working with Android-Based Phones -- Working with Other Digital Media Players and Cell Phones -- Managing Your Audio Device's Audio Files with Rhythmbox -- Problems Writing to Your iPod -- Working with Photos on Your Digital Device -- Converting Audio File Formats -- Playing Locked AAC (M4P) Files -- Linux on Your iPod? -- Working with . . . …”
Publicado 2010
Libro electrónico -
693334Publicado 2018Tabla de Contenidos: “…-- Healthcare analytics improves medical care -- Better outcomes -- Lower costs -- Ensure quality -- Foundations of healthcare analytics -- Healthcare -- Mathematics -- Computer science -- History of healthcare analytics -- Examples of healthcare analytics -- Using visualizations to elucidate patient care -- Predicting future diagnostic and treatment events -- Measuring provider quality and performance -- Patient-facing treatments for disease -- Exploring the software -- Anaconda -- Anaconda navigator -- Jupyter notebook -- Spyder IDE -- SQLite -- Command-line tools -- Installing a text editor -- Summary -- References -- Chapter 2: Healthcare Foundations -- Healthcare delivery in the US -- Healthcare industry basics -- Healthcare financing -- Fee-for-service reimbursement -- Value-based care -- Healthcare policy -- Protecting patient privacy and patient rights -- Advancing the adoption of electronic medical records -- Promoting value-based care -- Advancing analytics in healthcare -- Patient data - the journey from patient to computer -- The history and physical (H& -- P) -- Metadata and chief complaint -- History of the present illness (HPI) -- Past medical history -- Medications -- Family history -- Social history -- Allergies -- Review of systems -- Physical examination -- Additional objective data (lab tests, imaging, and other diagnostic tests) -- Assessment and plan -- The progress (SOAP) clinical note -- Standardized clinical codesets -- International Classification of Disease (ICD)…”
Libro electrónico -
693335Publicado 2018Tabla de Contenidos: “…Empirical Evaluation -- 4. Dynamic DoP and Cluster Migration on Asymmetric Multicores -- 4.1. …”
Libro electrónico -
693336Publicado 2020Tabla de Contenidos: “…How to use EDGAR to pinpoint information -- Getting Data in a Format You Can Work With -- Assembling the tools you need -- Importing financial information into Excel -- Getting in tune with interactive data -- Paying Attention to the Non-Financial Information -- Monitoring news streams for investment banking ideas -- Quickly processing information with aggregators -- Doing research on the key players in a deal -- Chapter 7 Making Sense of Financial Statements -- Income Statements -- Locating the areas of interest to investment bankers -- Tweaking the statement with different assumptions -- Finding investment banking opportunities -- Balance Sheets -- Finding your way around the key parts -- Understanding a company's financial strength -- Locating pitfalls and opportunities -- Statement of Cash Flows -- Seeing why the cash flow statement is so important in deal making -- Understanding the key parts of the document -- Calculating free cash flow -- Proxy Statements -- Learning about the key players in a deal -- Identifying the management team's incentives -- Analyzing management pay packages -- Chapter 8 Perfecting the Financial Ratios for Investment Banking -- Valuation Multiples: Assessing How Much the Company Is Worth -- Investors' favorite valuation tool: P/E ratio -- Going old school with price-to-book -- Putting a price on profitability -- Liquidity Multiples: Checking Companies' Staying Power -- Deciphering debt to equity -- Getting up to speed with the quick ratio -- Interpreting interest coverage -- Profitability Ratios: Seeing How a Company's Bottom Line Measures Up -- Why gross margin isn't so gross after all -- Income from continuing operations: Looking at profit with a keen eye -- Keying into profits with net margin -- Efficiency Ratios: Knowing How Well the Company Is Using Investors' Money -- Finding out about return on assets…”
Libro electrónico -
693337Publicado 2010Tabla de Contenidos: “…Quiz -- Understanding BIOS, CMOS, and Firmware -- Configuring the System BIOS -- Accessing the BIOS Setup Program -- BIOS Settings Overview -- Main Menu -- Standard Features/Settings -- Advanced BIOS Settings/Features -- Integrated Peripherals -- Power Management -- PnP/PCI Configurations -- Hardware Monitor -- Processor and Memory Configuration -- Security Features -- Exiting the BIOS and Saving/Discarding Changes -- Power-On Self-Test and Error Reporting -- Beep Codes -- POST Error Messages -- POST Hex Codes -- BIOS Updates -- Flash BIOS Update -- BIOS Chip Replacement -- Chapter 5 Power Supplies and System Cooling -- Do I Know This Already?" …”
Libro electrónico -
693338Project managementProject Management For DummiesPublicado 2022Tabla de Contenidos: “…-- Knowing the Project Manager's Role -- Looking at the project manager's tasks -- Staving off excuses for not following a structured project management approach -- Avoiding shortcuts -- Staying aware of other potential challenges -- Aligning with the Four Values that Comprise the Code of Ethics -- The price of greatness is responsibility -- R-e-s-p-e-c-t, find out what it means to. . .your project -- Maintaining fairness -- Honesty is the best policy -- Relating This Chapter to the PMP Exam and PMBOK 7 -- Chapter 3 Beginning the Journey: The Genesis of a Project -- Gathering Ideas for Projects -- Looking at information sources for potential projects -- Proposing a project in a business case -- Developing the Project Charter -- Performing a cost-benefit analysis -- Conducting a feasibility study…”
Libro electrónico -
693339Publicado 2023Tabla de Contenidos: “…-- 2 Characteristics of Process Operations - And Scheduling Challenges -- Changeover Difficulty -- Starting Up after a Changeover -- Sanitation Cycles -- Shelf-Life Constraints -- Multi-Step Manufacturing -- Balancing Limited Resources -- Divergence vs Convergence -- Examples of "V" Type Process in Process Plants -- Product Differentiation Points -- Limited Extra Capacity -- Summary -- 3 Overview of Production Strategies -- 4 Scheduling Processes and Software -- Production Planning -- Scheduling -- Supporting Processes -- Scheduling Software -- Goal-Seeking Algorithms -- Repetitive Scheduling -- The Scheduling Process -- Software Selection -- 5 Example Process -- The Process -- Scheduling Information Flow: Communication between Systems -- The Products -- Product Differentiating Characteristics -- Cultural Challenges -- SECTION 2 SCHEDULING STRATEGIES -- 6 Repetitive Scheduling Strategies -- Product Wheels -- Product Wheel Design -- Synergy with Lean -- Benefits of Product Wheels -- Repetitive flexible Supply (RfS) -- Rhythm Wheels -- Fixed Sequence Variable Volume (FSVV) -- Summary -- 7 Dealing with Disruption -- The Nature of Disruption -- Ability to Deal with Disruption -- An Example: The Story of P& -- G Luvs Diapers -- SECTION 3 SCHEDULING PROCESSES, SYSTEMS, AND SOFTWARE -- 8 The Role of Forecasting -- Forecast Value Add -- Bias and Accuracy -- Coefficient of Variation -- Timing and Aggregation -- Different Forecast Goals…”
Libro electrónico -
693340Publicado 2023Tabla de Contenidos: “…-- Downgrade attack -- EventList -- Getting started with logging -- An overview of important PowerShell-related log files -- Increasing log size -- Summary -- Further reading -- Part 2: Digging Deeper - Identities, System Access, and Day-to-Day Security Tasks -- Chapter 5: PowerShell Is Powerful - System and API Access -- Technical requirements -- Getting familiar with the Windows Registry -- Working with the registry -- Security use cases -- User rights -- Configuring access user rights -- Mitigating risks through backup and restore privileges -- Delegation and impersonation -- Preventing event log tampering -- Preventing Mimikatz and credential theft -- System and domain access -- Time tampering -- Examining and configuring user rights -- Basics of the Windows API -- Exploring .NET Framework -- .NET Framework versus .NET Core -- Compile C# code using .NET Framework -- Using Add-Type to interact with .NET directly -- Loading a custom DLL from PowerShell -- Calling the Windows API using P/Invoke -- Understanding the Component Object Model (COM) and COM hijacking -- COM hijacking -- Common Information Model (CIM)/WMI -- Namespaces -- Providers -- Events subscriptions -- Monitor WMI/CIM event subscriptions -- Manipulating CIM instances -- Enumeration…”
Libro electrónico