Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 4,484
- Historia 3,818
- Moral cristiana 2,829
- Teología dogmática 2,423
- Sermones 2,362
- Derecho canónico 2,003
- Iglesia Católica 1,643
- Teología 1,465
- obras anteriores a 1800 1,258
- Obras anteriores a 1800 1,209
- Derecho 898
- Derecho Canónico 867
- Historia eclesiástica 841
- Crítica e interpretación 750
- Història 696
- Filosofía 691
- Tomás de Aquino 681
- Medicina 674
- Església Catòlica 660
- Liturgia 651
- Sermones españoles 613
- Patrística 612
- Derecho civil 593
- Bíblia 571
- Pleitos 561
- Comentarios 559
- Virgen María 526
- Ascetismo 525
- Obres anteriors al 1800 523
- Vida cristiana 510
-
4281Publicado 2014Tabla de Contenidos: “…; Key advantages of cloud application development; Introducing Heroku; Walking down the memory lane; An overview of Heroku's architecture; Process management; Logging; HTTP routing; Heroku interfaces; The Heroku feature set; Let's play Heroku; Getting ready for the ride - the prerequisites; Signing up; Installing the Heroku toolbelt; Logging in and generating a new SSH key…”
Libro electrónico -
4282por Jeschke, EgbertTabla de Contenidos: “…Separating First and Last NamesSwitching the First and Last Names; Resolving the IBAN; Calculating the Frequency of a Character in a String; Removing All Spaces; Correcting the Position of Signs; Displaying the File and Worksheet Name; Concatenating the Content of Cells; Breaking Lines in Concatenated Text; Visualizing Data; Using Logical Functions; Calculating Profitability; Using Search and Reference Functions; Searching Through a Cross Table; Using Information Functions; Using Statistical Fu,nctions; Overview; Statistical Functions in Practice; Using Database Functions…”
Publicado 2012
Libro electrónico -
4283por McLaughlin, BrettTabla de Contenidos: “…Some Things Never ChangeListing All Your Users; Deleting a User; Talking Back To Your Users; Standardizing on Messaging; Integrating Utilities, Views, and Messages; Part Four:Security and the Real World; Chapter 11:Authentication and Authorization; Start with Basic Authentication; Abstracting What's the Same; Passwords Don't Belong in PHP Scripts; Passwords Create Security, But Should Be Secure; Chapter 12:Cookies, Sign-ins, and Ditching Crummy Pop-ups; Going Beyond Basic Authentication; Logging In with Cookies; Adding Context-Specific Menus; Chapter 13:Authorization and Sessions…”
Publicado 2011
Libro electrónico -
4284por Six, JeffTabla de Contenidos: “…Introduction to the Android ArchitectureThe Linux Security Model; The Resulting Android Security Model; Application Signing, Attribution, and Attestation; Process Design; Android Filesystem Isolation; Android Preferences and Database Isolation; Moving up the Layers to System API and Component Permissions; Chapter 3. …”
Publicado 2012
Libro electrónico -
4285por Runde, James A.Tabla de Contenidos: “…How to Monetize Client RelationshipsHow to Better Persuade Others; Chapter XII: How to Prepare for the Client Meeting; The Four Rs; Change of Mindset; Have a Strong Opening and Strong Close; How to Ask for the Order; Dealing with Rejection; Chapter XIII: Differentiating Yourself with Clients; Differentiating Yourself through Likability and Trust; Differentiating Yourself through Insight; Using the Apple Five Steps of Service; Chapter XIV: Assessing the Client Situation; Know Your Client's Vital Signs; How to Know if You Are Making Progress with a Client…”
Publicado 2016
Libro electrónico -
4286por Gannon-Leary, PatTabla de Contenidos: “…Aim 1: To identify the appropriate steps in handling customer complaintsAim 2: To develop a positive proactive response to customers' problems and complaints; Further reading; 8 Dealing with challenging situations; Aims; Background; Aim 1: To identify behaviours that create positive relationships with customers; Aim 2: To recognise signs of aggression in a person; Aim 3: To identify appropriate strategies for dealing with challenging situations; Further reading; 9 Life positions and the OK Corral: being more confident and assertive; Aims; Background…”
Publicado 2010
Libro electrónico -
4287Publicado 2011Tabla de Contenidos: “…; Why we envy; Leadership and envy; Signs of envy; How and why envy thrives in the workplace; Generational envy; Envy and the library workplace; Costs of workplace envy; Coping with envy; Coping with being envied; Managing envy as a leader; Conclusion; References; 11 Don't get stuck in a rut!…”
Libro electrónico -
4288Publicado 2014Tabla de Contenidos: “…; Things to consider when signing a publishing deal; Places to make a living with audio or music; Rights for new media, YouTube ads, streaming music, and satellite broadcasts; Index…”
Libro electrónico -
4289por Halsey, Mike. authorTabla de Contenidos: “…Configuring the Windows 8.1 Lock Screen""; ""Using a Pin or Picture Password on the Lock Screen""; ""Changing Your Login Method""; ""Mastering Touch in Windows 8.1""; ""Using the Onscreen Keyboard in Windows 8.1""; ""Privacy and Security for Personal and Business Data""; ""Summary""; ""Chapter 2: Finding Your Way Around Windows 8.1""; ""Using the Start Screen and Apps""; ""Switching Between and Shutting Down Running Apps""; ""Locking the Computer and Signing Out""; ""Controlling the Windows 8.1 Start Screen""; ""Controlling Apps and Live Tiles""…”
Publicado 2013
Libro electrónico -
4290por Morson, Sian. authorTabla de Contenidos: “…; ""Popover View""; ""Split View Screen""; ""Visual Context""; ""User Interaction""; ""Onscreen Targets""; ""Screen Resolution""; ""Universal Apps""; ""Icons""; ""App Icons""; ""Launch Image""; ""iPad-Specific Gestures""; ""Swipe""; ""Four-fingered vertical swipe""; ""Pinch""; ""Summary""; ""Chapter 5: Mobile Design Patterns""; ""Registration & Login/Sign-up Forms""; ""App Navigation""; ""Springboard or Home Screen Patterns""; ""List & Table View Patterns""; ""Tables""; ""Tabs""; ""Slide-Out Navigation""…”
Publicado 2014
Libro electrónico -
4291por World Health Organization.Tabla de Contenidos: “…2.8 Monitoring and evaluation3 Assessing donor suitability; 3.1 Donor selection process; 3.2 Donor deferral; 3.3 Donor records; 3.4 Confidential unit exclusion; 3.5 Adverse donor reactions and post-donation care; Part 2: Criteria for blood donor selection; 4 General donor assessment; 4.1 Age; 4.2 Donor appearance and inspection; 4.3 Minor illnesses; 4.4 Weight; 4.5 Vital signs; 4.6 Donor iron status; 4.7 Fluid intake and food; 4.8 Gender; 4.9 Occupation and leisure activities; 4.10 Special considerations for donor selection for apheresis donations…”
Publicado 2012
Libro electrónico -
4292Publicado 2013Tabla de Contenidos: “…The case of Juventus; 7 Hanging up the 'sold out' sign; The products; Matchgoers' experience through touch points; The six Ps marketing mix; Ticket sales scenarios; Concessions, advertising and other products; The sales action plan; 8 Sponsorship rights or bust; A tough terrain; The winning three-leaf clover; Solving the sudoku of commercial rights; Advertising spaces with a life of their own; 9 Selling Sponsorship FC; Sponsorship and other forms of commercialisation; Competition and ambush marketing…”
Libro electrónico -
4293por Jefford, Darren, 1978-Tabla de Contenidos: “…; Architecture Overview; Messages; Adapters; Pipelines; Subscriptions; MessageBox; Orchestrations; Enterprise Single Sign-On; Business Activity Monitoring; Rules Engine; Hosts; Summary…”
Publicado 2007
Libro electrónico -
4294Publicado 2015Tabla de Contenidos: “…Treaties of Rome (1957)Framing Actions of the Six European Nations Signing the Treaties ; Framing the UK's Reaction; Framing the Commonwealth and New Zealand Responses; Conclusions; The EU in New Zealand and Singapore. …”
Libro electrónico -
4295Publicado 1997Tabla de Contenidos: “…Infant Personality Development: First Signs of the Self-Concept; III. The Transition Between Infancy and Childhood: Toddlers' Social Understanding; IV. …”
Libro electrónico -
4296por Davenport, Gloria M.Tabla de Contenidos: “…; Behavioral Characteristics; Labeling of Toxic Agers; Professional Assessments; Nonverbal Signs; Assessment Checklist; How Would I Know If I Am Toxic?…”
Publicado 2006
Libro electrónico -
4297Publicado 2015Tabla de Contenidos: “…Gimeno Blay -- Les murs disputés : les enjeux des écritures exposées à Lyon à l'époque moderne / Anne Béroujon -- Lo que aparece, lo que queda / Pedro Araya -- Espejos del alma : la evocación del ausente en la escritura epistolar áurea / Carmen Serrano Sánchez -- De la tipografía al manuscrito : culturas epistolares en la España del siglo XVIII / Antonio Castillo Gómez -- Cartas para todos : discursos, prácticas y representaciones de la escritura epistolar en la Época Contemporánea / Verónica Sierra Blas -- Palabras sin fronteras : testimonios populares contemporáneos entre escritura, oralidad e imagen / Fabio Caffarena -- Grandes marges : une approche sociopragmatique de textes manuscrits et de leurs graphismes / Rita Marquilhas –“Comensí a escriure en lo present libre per mamoriegar” : escrituras del recuerdo entre la Edad Media y el Renacimiento / María Luz Mandingorra Llavata -- Les pratiques d'écriture personnelle et le thème du soi : pour une étude comparée des discours scientifiques concernant les ego-documents de l'Europe d'Ancien Régime (XVIIe-XVIIIe siècle) / Antoine Odier -- Orden económico, orden moral : aportaciones al estudio de los libros de cuentas de los siglos XVIII y XIX / Carmen Rubalcaba Pérez -- Aux marges de l'écrit : l’empire des signes dans les livres de raison français (XVe-XIXe siècle) / Sylvie Mouysset -- El Quaderno di appunti de Anton Giulio Brignole Sale : notas de un animador cultural en la Génova del siglo XVII / Carla Bianchi -- Una biblioteca escrita : proyección intelectual del VII marqués del Carpio a través del primer inventario conocido de sus libros / Felipe Vidales del Castillo -- Les nobles Sanvitale de Parme et leurs écritures d'achat des livres à la fin du XVIIIe siècle / Alberta Pettoello -- Un emporio del género de cordel : Agustín Laborda y sus menudencias de imprenta (1743-1776) / Juan Gomis Coloma -- Los analfabetos y la cultura escrita (España, siglo XIX) / Jean-François Botrel…”
Libro -
4298Publicado 2020Tabla de Contenidos: “…Contents -- List of figures -- List of table -- Preface to the second edition -- Introduction -- PART ONE Fashion and fashion theories -- Introduction -- 1 Explaining it Away -- 2 The Empire of Fashion: Introduction -- 3 Adorned in Zeitgeist -- 4 Haute Couture and Haute Culture -- PART TWO What fashion is and is not -- Introduction -- 5 Fashion -- 6 Art -- 7 Antifashion: The Vicissitudes of Negation -- 8 Fashion -- 9 Extract from Fashion and Anti Fashion -- PART THREE Fashion and (the) image -- Introduction -- 10 Fashion Photography -- 11 Going Beyond 'The Fashion System': A Critique -- 12 'Doing Fashion Photographs' -- 13 Introduction: Aboud Sodano and Paul Smith -- PART FOUR Sustainable fashion -- Introduction -- 14 Consumers' Perceptions of 'Green': Why and How Consumers Use Eco-Fashion and Green Beauty Products -- 15 Fashion, Needs and Consumption -- 16 Fashion and Sustainability: Repairing the Clothes we Wear -- PART FIVE Fashion as communication -- Introduction -- 17 Social Life as a Sign System -- 18 The Analysis of the Rhetorical System -- 19 Do Clothes Speak? …”
Libro -
4299Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Chapter 1: Understanding Different Adobe Acrobat Versions and Services -- Adobe Acrobat Pro subscription -- Adobe Acrobat Standard subscription -- Adobe Acrobat Reader (free version) -- Recognizing an active Acrobat application -- Adobe Document Cloud -- Adobe Acrobat online services -- Adobe Acrobat Sign -- Digital signatures overview -- The mobile PDF experience - Adobe mobile apps -- PDFs on smartphones, tablets, and Chromebooks -- Collaboration in mobile apps -- Summary -- Chapter 2: Creating and Enhancing PDF Files from Scans -- Creating a PDF by using a scanner -- Scanning document pages -- Enhancing a scanned image through OCR -- Searching and using content in the enhanced PDF -- Optimizing a scanned document -- Summary -- Chapter 3: Converting Microsoft Office Files to Adobe PDF Using PDFMaker -- From authoring content to PDF output -- Understanding PDFMaker -- PDFMaker settings for desired PDF output -- Evaluating content prepared for PDF conversion -- Recognizing the formatting type in an MS Word document -- Testing and comparing converted PDF files -- Exporting to PDF using the PDFMaker function -- Exporting to PDF by using Adobe PDF Printer (Acrobat Distiller) -- Comparing PDF document conversion results -- Summary -- Chapter 4: Modifying and Editing PDF Files -- Adding and organizing pages and page numbering -- Pages navigation pane and options -- Adding and removing pages -- Moving pages and updating page numbering -- Adding, editing, and formatting text and images -- Adding new text on a page -- Adding a new image -- Replacing an image -- Creating and editing bookmarks and links -- Working with bookmarks -- Working with links -- Creating headers and footers -- Creating watermarks -- Introduction to accessibility tags…”
Libro electrónico -
4300Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- About the Author -- About the Technical Editor -- Credits -- Acknowledgments -- Contents at a glance -- Contents -- Foreword -- Introduction -- Coming Full Circle -- Advanced Persistent Threat (APT) -- Next Generation Technology -- "Hackers" -- Forget Everything You Think You Know About Penetration Testing -- How This Book Is Organized -- Chapter 1: Medical Records (In)security -- An Introduction to Simulating Advanced Persistent Threat -- Background and Mission Briefing -- Payload Delivery Part 1: Learning How to Use the VBA Macro -- How NOT to Stage a VBA Attack -- Examining the VBA Code -- Avoid Using Shellcode -- Automatic Code Execution -- Using a VBA/VBS Dual Stager -- Keep Code Generic Whenever Possible -- Code Obfuscation -- Enticing Users -- Command and Control Part 1: Basics and Essentials -- The Attack -- Bypassing Authentication -- Summary -- Exercises -- Chapter 2: Stealing Research -- Background and Mission Briefing -- Payload Delivery Part 2: Using the Java Applet for Payload Delivery -- Java Code Signing for Fun and Profit -- Writing a Java Applet Stager -- Create a Convincing Pretext -- Signing the Stager -- Notes on Payload Persistence -- Microsoft Windows -- Linux -- OSX -- Command and Control Part 2: Advanced Attack Management -- Adding Stealth and Multiple System Management -- Implementing a Command Structure -- Building a Management Interface -- The Attack -- Situational Awareness -- Using AD to Gather Intelligence -- Analyzing AD Output -- Attack Against Vulnerable Secondary System -- Credential Reuse Against Primary Target System -- Summary -- Exercises -- Chapter 3: Twenty-First Century Heist -- What Might Work? …”
Libro electrónico