Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 4,484
- Historia 3,818
- Moral cristiana 2,829
- Teología dogmática 2,423
- Sermones 2,362
- Derecho canónico 2,003
- Iglesia Católica 1,643
- Teología 1,465
- obras anteriores a 1800 1,258
- Obras anteriores a 1800 1,209
- Derecho 898
- Derecho Canónico 867
- Historia eclesiástica 841
- Crítica e interpretación 750
- Història 696
- Filosofía 691
- Tomás de Aquino 681
- Medicina 674
- Església Catòlica 660
- Liturgia 651
- Sermones españoles 613
- Patrística 612
- Derecho civil 593
- Bíblia 571
- Pleitos 561
- Comentarios 559
- Virgen María 526
- Ascetismo 525
- Obres anteriors al 1800 523
- Vida cristiana 510
-
4301VBScript, WMI and ADSI unleashed : using VBSscript, WMI, and ADSI to automate Windows administrationPublicado 2007Tabla de Contenidos: “…Alternative Methods -- Summary -- 19 Querying Complex WMI Information -- Understanding WMI Relationships -- Associating WMI Instances -- Writing the Query -- Testing the Query -- Writing the Query in VBScript -- Another Example -- Summary -- 20 Putting It All Together: Your First WMI/ADSI Script -- Designing the Script -- Writing Functions and Subroutines -- Writing the Main Script -- Testing the Script -- Summary -- 21 Testing and Debugging WMI and ADSI Queries -- Debugging Outside the Script -- Debugging WMI Queries -- Debugging ADSI Queries -- Summary -- Part IV: Advanced Scripting Techniques -- 22 Modular Script Programming -- Looking for Modules -- Introduction to Windows Script Components -- Scripting and XML -- Summary -- 23 Scripts Packaging and Protection -- Installing the Script Encoder -- Writing Encoded Scripts -- Running Encoded Scripts -- Encoding: The Downside -- Script Packaging -- Summary -- 24 Scripting Security -- Why Scripting Can Be Dangerous -- Security Improvements in Windows XP and Windows Server 2003 -- Digitally Signing Scripts -- Running Only Signed Scripts -- Ways to Implement Safe Scripting -- Summary -- 25 Introduction to HTML Applications -- Event-Driven Scripting -- How an HTA Is Built -- HTA Differences -- Steps for Writing an HTA -- Summary -- 26 Debugging Tips, Tools, and Techniques -- Types of Bugs -- Preventing Syntax Errors -- Debugging Logic Errors -- Summary -- Part V: Ready-to-Run Examples -- 27 Logon and Logoff Scripts -- NT and Active Directory Logon Scripts -- Active Directory-Specific Logon Scripts -- Active Directory Logoff Scripts -- Summary -- 28 Windows and Domain Administration Scripts -- Automating User Creation -- Finding Inactive Users -- Collecting System Information -- Templates -- Summary -- 29 Network Administration Scripts -- Shutting Down Remote Computers -- Listing Remote Shares…”
Libro electrónico -
4302Publicado 2010Tabla de Contenidos: “…Determining Data to Send to the Server -- Accessing Phone Status Information -- Uploading Data to a Remote Application Server -- Summary -- Q&A -- Workshop -- HOUR 17: Adding Social Features -- Enhancing Your Application with Social Features -- Adding Friend Support to Your Application -- Integrating with Social Networking Services -- Summary -- Q&A -- Workshop -- HOUR 18: Creating a Home Screen App Widget -- Designing an App Widget -- Handling App Widget User Events -- Working with Widget Background Operations -- Summary -- Q&A -- Workshop -- Part IV: Adding Polish to Your Android Application -- HOUR 19: Internationalizing Your Application -- General Internationalization Principles -- How Android Localization Works -- Android Internationalization Strategies -- Using Localization Utilities -- Summary -- Q&A -- Workshop -- HOUR 20: Developing for Different Devices -- Configuration Management for Android -- Summary -- Q&A -- Workshop -- HOUR 21: Diving Deeper into Android -- Exploring More Core Android Features -- Designing Advanced User Interfaces -- Working with Multimedia -- Working with 2D and 3D Graphics -- Personalizing Android Devices -- Managing and Sharing Data -- Accessing Underlying Device Hardware -- Summary -- Q&A -- Workshop -- HOUR 22: Testing Android Applications -- Testing Best Practices -- Maximizing Test Coverage -- Summary -- Q&A -- Workshop -- Part V: Publishing Your Application -- HOUR 23: Getting Ready to Publish -- Understanding the Release Process -- Preparing the Release Candidate Build -- Testing the Application Release Candidate -- Packaging and Signing an Application -- Testing the Signed Application Package -- Summary -- Q&A -- Workshop -- HOUR 24: Publishing on the Android Market -- Selling on the Android Market -- Exploring Other Android Publishing Options -- Summary -- Q&A -- Workshop -- Part VI: Appendixes…”
Libro electrónico -
4303Publicado 2023Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Etsy -- Chapter 1 Handmade for Each Other: Falling in Love with Etsy -- Creative Crusade: Understanding Etsy's Purpose and Business Model -- Introducing the World of Etsy -- Registering with Etsy -- Navigating the Etsy home page -- Understanding Your Account and Shop Manager -- Discovering what's for sale on Etsy -- Ensuring your safety on Etsy -- Storefront and Center: Setting Up Your Shop -- Sell's Angels: Surveying the Etsy Selling Process -- Takin' Care of Business: Handling Business Matters -- Community Collage: Engaging in the Etsy Community -- Appy Dance: Introducing the Etsy Apps -- Chapter 2 Basic Training: Etsy Account Basics -- Avoiding Trouble: Reviewing Etsy's House Rules and Terms of Use -- Sign Me Up! Becoming a Registered User -- It's a Sign: Signing In to Etsy -- Home Sweet Home: Navigating Etsy's Home Page -- It's All You: Exploring the Your Account Menu -- Account Trackula: Managing Your Etsy Account -- High Profile: Setting Up Your Public Profile -- Chapter 3 Buy, Buy, Buy: Finding and Buying Items on Etsy -- Gimme One Reason: Why to Buy on Etsy -- Needle in a haystack: Finding the perfect item -- Using Etsy's Search tool -- Browsing Etsy -- Perusing personalized picks -- Viewing Editors' Picks -- What's Up? …”
Libro electrónico -
4304Publicado 2024Tabla de Contenidos: “…Accessing AWS Accounts Using Identity Federation with SAML 2.0 and Microsoft AD -- Using Web Identity Federation for Application Authentication -- Application Authentication and Authorization with Amazon Cognito -- Amazon Cognito User Pools -- Access Backend Resources with a User Pool -- Amazon Cognito Identity Pools -- How AWS STS Generates Temporary Tokens -- Amazon Cognito and the Todo List Application -- Overview of the AWS IAM Identity Center -- Exercise 2.1 - Creating an IAM User and an IAM Group within your Development Account -- Technical Requirements -- Project Task 2.1 - Creating an Amazon Cognito User Pool for the Todo List Application -- Step 1 - Configure Sign-In Experience -- Step 2 - Configure Security Requirements -- Step 3 - Configure Sign-Up Experience -- Step 4 - Configure Message Delivery -- Step 5 - Integrate Your App -- Step 6 - Review and Create -- Step 7 - Testing the Cognito User Pool -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 3: Understanding Object Storage with Amazon S3, Hybrid Storage, and Static Website Hosting -- An Introduction to Storage Options -- Block Storage -- File Storage -- Object Storage -- An Introduction to Object Storage with Amazon S3 -- Amazon S3 Buckets -- Amazon S3 Objects -- An Amazon S3 Object's Key -- Amazon S3 Region Choice -- Read-after-Write Consistency -- Eventual Consistency -- Managing Data Storage Costs with Amazon S3 Storage Classes -- The Amazon S3 Standard Storage Class -- Amazon S3-IA Storage -- Amazon S3 One Zone-IA -- Amazon S3 Intelligent-Tiering -- Amazon S3 Express One Zone -- Amazon S3 Glacier -- Protecting Data from Accidental Deletion in Amazon S3 -- Encryption Options for Amazon S3 -- Using Amazon S3 Versioning with S3 Lifecycle Management -- Implementing Data Protection with Resource-Based Policies -- Securing Access with Pre-Signed URLs…”
Libro electrónico -
4305por Souza, GuillemTabla de Contenidos: “…Ho trobem a la pàgina 94 del tema 7; Signes de Traumatisme Craneoencefàlic. Ho trobem a la pàgina 82 del tema 6; Comprovem la respiració amb la tècnica VES (veure, escoltar isentir).; Maniobra de frontmentó.Ho trobem a la pàgina 14 del tema 1.…”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
4306Publicado 2017“…Les textes, réunis dans cette anthologie, et signés des grands écrivains du temps (Rousseau, Montesquieu, Voltaire, Kant, Hume ou encore Staël), comme d’oubliés de l’histoire, présentent, avec quelques excursus chronologiques (de Sully à Hugo) les réflexions de penseurs d’un dix-huitième siècle aux bornes chronologiques étendues - l’émergence et la chute de l’Empire engendrent des bouleversements nombreux -, sur l’Europe, son histoire, sa diversité, mais aussi sur ce qu’ont en commun les nations qui composent, dans leur variété, un ensemble géographique. …”
Libro electrónico -
4307por Roulière-Lambert, Marie-Jeanne“…L’enjeu du thème spécialisé était s’éclaircir la difficile question du passage de l’âge du Bronze à l’âge du Fer. Comment cerner les signes du changement, l’expliquer, en saisir le moment ? …”
Publicado 2020
Electrónico -
4308por Organization for Economic Cooperation and DevelopmentTabla de Contenidos: “…Intro -- Table des matières -- Signes conventionnels et abréviations -- Tableaux par pays -- Australie -- Tableau 1.a. …”
Publicado 2013
Libro electrónico -
4309Publicado 2004Tabla de Contenidos: “…Security considerations with IMS Version 9 -- 6.1 Overview of security enhancements -- 6.2 Resource access security (RAS) -- 6.2.1 RAS and APSB security -- 6.2.2 RAS migration examples -- 6.3 AOI security -- 6.3.1 SAF support for type 1 AOI (CMD) -- 6.3.2 SAF support for type 2 AOI (ICMD) -- 6.3.3 SAF support for time controlled operations (TCO) -- 6.3.4 Resource authorization -- 6.4 MSC link security -- 6.4.1 IMS Version 9 MSC security considerations -- 6.5 /LOCK, /UNLOCK and /SET commands -- 6.6 Signon verification security -- 6.6.1 Sign on for static terminals -- 6.6.2 Security level (SECLVL) -- 6.6.3 SMU terminal (TERMNL) security -- 6.6.4 SMU )( SIGN and STERM statements -- 6.6.5 IMS Version 9 sign on security for static terminals -- 6.6.6 New keywords on the OPTIONS statement -- 6.6.7 Static terminal sign on security migration considerations -- 6.7 LTERM-based terminal security -- 6.7.1 Migration considerations for LTERM-based terminal security -- 6.7.2 IMS commands -- 6.7.3 IMS transactions -- 6.7.4 Migration considerations for LTERM-based security -- 6.8 Additional migration considerations -- 6.8.1 Performance considerations -- 6.8.2 AOI considerations -- 6.8.3 User exit interface changes -- 6.8.4 SMU to RACF migration check list -- Chapter 7. …”
Libro electrónico -
4310Publicado 2015Tabla de Contenidos: “…Aportaciones al estudio de los libros de cuentas de los siglos XVIII y XIX<br />SYLVIE MOUYSSET Aux marges de l'écrit. L'empire des signes dans les livres de raison français (XVe-XIXe siècle)<br />IV. …”
Texto completo en Odilo
Otros -
4311Publicado 2000Tabla de Contenidos: “…PEIRCE: ABDUCCIÓN (...); TEN SIGNS, TWO CONTROVERSIA! VIEWS; MUSEMENT IN MATHEMATICAL MANIPULATION; THE DEVELOPMENT OF PEIRCE'S THREE TYPES (...); POÉTICA; EL ADJETIVO EN LA FANTASÍA LITERARIA; LOS ESPEJOS DE LA NATURALEZA ""THE MIRRORS (...); NATURALEZA Y CULTURA EN LA OBRA DE LOTMAN; HIPERNOVELA: CAOS Y ORDEN EN LA NATURALEZA (...)…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4312Mastering Xamarin.Forms build rich, maintainable multiplatform native mobile apps with Xamarin.FormsPublicado 2016Tabla de Contenidos: “…Creating an API with Microsoft Azure App ServicesBrowsing and adding data; Creating a base HTTP service; Creating an API Data Service; Updating the TripLog app ViewModels; Offline data caching; Adding the Akavache library; Maintaining an offline data cache; Summary; Chapter 7: Authentication; Adding identity and authentication to Azure Mobile Apps; Setting up permissions; Setting up an identity provider; Creating an authentication service; Adding a sign in page; Summary; Chapter 8: Testing; Unit testing; Testing ViewModels; Running unit tests in Xamarin Studio; Automated UI testing…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4313por Runyon, Randolph, 1947-Tabla de Contenidos: “…Introduction : marginal symmetry -- Of means and ends: I: 1 and I: 57 -- The less said: I: 1 and I: 56 -- Something to hide: I: 3 and I: 55 -- Frivolous and vain: I: 4 and I: 54 -- In or out: I: 5 and I: 53 -- Trouble back home: I: 6 and I: 52 -- Words, in effect: I: 7 and I: 51 -- Of idleness and horses: I: 8 and I: 50 -- Lying, after a fashion: I: 9 and I: 49 -- Excess baggage: I: 10 and I: 48 -- Enough already: I: 11 and I: 47 -- Anagrams: I: 12 and I: 46 -- A waiting game: I: 13 and I: 45 -- More than one port in a storm: I: 14 and I: 44 -- Custom and princely grandeur: I: 15 and I: 43 -- Judging Julian judging: I: 16 and I: 42 -- Glory, given and taken: I: 17 and I: 41 -- Empty signs: I: 18 and I: 40 -- Prolonging life: I: 19 and I: 39 -- Unmasking masks: I: 20 and I: 38 -- Powers of attraction: I: 21 and I: 37 -- Complementarities and buried allusions: I: 22 and I: 36 -- Here and there: I: 23 and I: 35 -- How to paint a dog: I: 24 and I: 34 -- Well-nourished daughters: I: 25 and I: 33 -- God's wrath and the weather: I: 26 and I: 32 -- Things to come: I: 27 and I: 31 -- Of immoderation: I: 28 and I: 30 -- Sorting out the pieces: II: 1 and II: 37 -- Slipping it in: II: 2 and II: 36 -- Suicide is painless: II: 3 and II: 35 -- Caesar the procrastinator: II: 4 and II: 34 -- Suffering innocence: II: 5 and II: 33 -- Parallel deaths: II: 6 and II: 32 -- Rewards and punishments: II: 7 and II: 31 -- Hidden monsters: II: 8 and II: 30 -- Only when you need it: II: 9 and II: 29 -- Act your age: II: 10 and II: 28 -- Doubly cruel: II: 11 and II: 27 -- Opposable thumbs: II: 12 and II: 26 -- Eyes wide shut: II: 13 and II: 25 -- Equivalent equivalents: II: 14 and II: 24 -- Civil war vs. civil war: II: 15 and II: 23 -- Spreading the news: II: 16 and II: 22 -- Spitting images: II: 17 and II: 21 -- Consubstantial consubstantiality: II: 18 and II: 20 -- Distant harmonies: III: 1 and III: 13 -- Distant theft: III: 2 and III: 12 -- Intercourse with the lame: III: 3 and III: 11 -- The little things: III: 4 and III: 10 -- Sexual vanity, vain sex: III: 5 and III: 9 -- Borrowed wealth: III: 5 and III: 8 -- Journey to the center of the book: I: 29, II: 19, and III: 7 -- Epilogue: the playful text…”
Publicado 2013
Libro electrónico -
4314Tabla de Contenidos: “…Technology Export ControlReviewing and Signing Forms and Letter; Components of the H-1B Petition; Responding to a Request for Evidence (RFE) or Notice of Intent to Deny (NOID); Appeals and Motions to Reconsider; Notice of Intent to Revoke (NOIR); Employee Inputs to the H-1B Process; Résumé Drafting; Supporting Documentation; Request for Evidence; Visa Application at the US Embassy or Consulate; Entry into the United States; Labor Condition Application (LCA) Compliance; The Required Wage; The Prevailing Wage; Primary Sources for Determining the Prevailing Wage…”
Libro electrónico -
4315por Faccio, ElenaTabla de Contenidos: “…3.4 Maurice Merleau-Ponty's Irreducibility of the Body to an Object3.5 Overcoming Irreducibility of the Body to Object Through Phenomenology; 3.6 "Phenomenological Remains" and the "Intentionality of Consciousness"; 3.7 The Crisis of Western Sciences; 3.8 Ludwig Binswanger's Existential Analysis; Chapter 4: Body and Identity; 4.1 Individual Appearance, the Scene of Identity; 4.2 Bodies and Linguistic Signs; 4.3 The Semiotics of the Face; 4.4 The Meaning of Fashion and its Correlation to Linguistic Usage; 4.5 The Interaction Perspective; 4.5.1 Symbolic Interaction…”
Publicado 2013
Libro electrónico -
4316por Kerzner, HaroldTabla de Contenidos: “…; Life Cycle Phases; 2.5 Managing Distressed Projects; Root Causes of Failure; The Definition of Failure; Early Warning Signs of Trouble; Selecting the Recovery Project Manager (RPM); Recovery Life Cycle Phases; The Understanding Phase; The Audit Phase; The Tradeoff Phase; The Negotiation Phase; The Restart Phase; The Execution Phase; 3 Metrics; Chapter Overview:; Chapter Objectives:; Keywords:; 3.0 Introduction; 3.1 Project Management Metrics: The Early Years…”
Publicado 2013
Libro electrónico -
4317Publicado 2014Tabla de Contenidos: “…Project Files FormatProject Properties; Application; Compile (Visual Basic Only); Build (C# and F# Only); Build Events (C# and F# Only); Debug; References (Visual Basic Only); Resources; Services; Settings; Reference Paths (C# and F# Only); Signing; My Extensions (Visual Basic Only); Security; Publish; Code Analysis; Web Application Project Properties; Web; Silverlight Applications; Package/Publish Web; Package/Publish SQL; Web Site Projects; Summary; Chapter 7: IntelliSense and Bookmarks; IntelliSense Explained; General IntelliSense; IntelliSense and C++; Completing Words and Phrases…”
Libro electrónico -
4318Publicado 2015Tabla de Contenidos: “…Table of contents; Conventional signs and abbreviations; ISO currency abbreviations; International comparisons; Table 1. …”
Libro electrónico -
4319Publicado 2015Tabla de Contenidos: “…""Table of contents""; ""Conventional signs and abbreviations""; ""International comparisons""; ""Table 1. …”
Libro electrónico -
4320Publicado 2014Tabla de Contenidos: “…Foreword; Table of contents; Acronyms and conventional signs; Executive summary; The OECD/Korea Policy Centre; Chapter 1. …”
Libro electrónico