Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Malalts terminals 240
- Cura 112
- Operating systems (Computers) 112
- Mort 101
- Linux 70
- Engineering & Applied Sciences 61
- Computer networks 60
- Historia 54
- Computer Science 52
- Development 49
- Aspectes religiosos 48
- Enfermos terminales 48
- Cuidados paliativos 46
- Application software 45
- Computer programming 45
- Aspectes psicològics 44
- Terminal care 43
- Tractament pal·liatiu 41
- Management 39
- Security measures 37
- TFC 36
- Examinations 35
- Cloud computing 32
- Computer security 31
- Python (Computer program language) 31
- Programming 30
- Certification 29
- Església Catòlica 27
- Mac OS 27
- History 26
-
1681por Zaldívar Pérez, DionisioTabla de Contenidos: “…. -- 7.3 DECÁLOGO DE DERECHOS DEL PACIENTE TERMINAL. -- 7.4 EL MÉDICO Y LA MUERTE. -- RESUMEN DE LA UNIDAD VII -- ACTIVIDADES DE LA UNIDAD VII -- EJERCICIOS DE AUTOEVALUACIÓN DE LA UNIDAD VII -- BIBLIOGRAFÍA DE LA UNIDAD VII -- RESPUESTA A LOS EJERCICIOS DE AUTOEVALUACIÓN -- BIBLIOGRAFÍA GENERAL…”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1682Publicado 2019Tabla de Contenidos: “…-- PART I: LEARNING THE SHELL -- 1 WHAT IS THE SHELL? -- Terminal Emulators -- Making Your First Keystrokes -- Try Some Simple Commands -- Ending a Terminal Session -- Summing Up -- 2 NAVIGATION -- Understanding the File System Tree -- The Current Working Directory -- Listing the Contents of a Directory -- Changing the Current Working Directory -- Summing Up -- 3 EXPLORING THE SYSTEM -- More Fun with ls -- Determining a File's Type with file -- Viewing File Contents with less -- Taking a Guided Tour -- Symbolic Links -- Hard Links -- Summing Up -- 4 MANIPULATING FILES AND DIRECTORIES -- Wildcards -- mkdir-Create Directories -- cp-Copy Files and Directories -- mv-Move and Rename Files -- rm-Remove Files and Directories -- ln-Create Links -- Building a Playground -- Summing Up -- 5 WORKING WITH COMMANDS -- What Exactly Are Commands? …”
Libro electrónico -
1683Publicado 2017Tabla de Contenidos: “…-- Anonymous inner classes -- Lambda expressions -- Functional interface -- Syntax of Lambda expressions -- Lexical scoping -- Method reference -- Understanding closures -- Streams -- Generating streams -- Intermediate operations -- Working with intermediate operations -- Terminal operations -- Working with terminal operations -- String collectors -- Collection collectors -- Map collectors -- Groupings -- Partitioning -- Matching -- Finding elements -- Summary -- Chapter 3: Let Us Spark -- Getting started with Spark -- Spark REPL also known as CLI -- Some basic exercises using Spark shell -- Checking Spark version -- Creating and filtering RDD -- Word count on RDD -- Finding the sum of all even numbers in an RDD of integers -- Counting the number of words in a file -- Spark components -- Spark Driver Web UI -- Jobs -- Stages -- Storage -- Environment -- Executors -- SQL -- Streaming -- Spark job configuration and submission -- Spark REST APIs -- Summary…”
Libro electrónico -
1684Publicado 2024Tabla de Contenidos: “…Deploying and configuring the Ansible AWX Operator -- Setting up our playbook -- Running our playbooks -- Terminating the Kubernetes cluster -- Playbook considerations -- Ansible AWX's advantages and disadvantages -- Summary -- Further reading -- Chapter 17: Next Steps with Ansible -- Technical requirements -- Integrating with third-party services -- Slack -- Other integrations -- Summary of third-party services -- The Ansible playbook debugger -- Debugging the task -- Summary of the Ansible debugger -- Some real-world examples -- Automating a complex deployment -- Combining Ansible and other tools -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
1685Publicado 2021Tabla de Contenidos: “…-- Companion Download Files -- How to Contact the Publisher -- How to Contact the Author -- Chapter 1 Mastering the Terminal Window -- Kali Linux File System -- Terminal Window Basic Commands -- Tmux Terminal Window -- Starting Tmux -- Tmux Key Bindings -- Tmux Session Management -- Navigating Inside Tmux -- Tmux Commands Reference -- Managing Users and Groups in Kali -- Users Commands -- Groups Commands -- Managing Passwords in Kali -- Files and Folders Management in Kali Linux -- Displaying Files and Folders -- Permissions -- Manipulating Files in Kali -- Searching for Files -- Files Compression -- Manipulating Directories in Kali -- Mounting a Directory -- Managing Text Files in Kali Linux -- Vim vs. …”
Libro electrónico -
1686por Aichinger, Michael, 1979-Tabla de Contenidos: “…Intro -- A Workout in Computational Finance -- Contents -- Acknowledgements -- About the Authors -- 1 Introduction and Reading Guide -- 2 Binomial Trees -- 2.1 Equities and Basic Options -- 2.2 The One Period Model -- 2.3 The Multiperiod Binomial Model -- 2.4 Black-Scholes and Trees -- 2.5 Strengths and Weaknesses of Binomial Trees -- 2.5.1 Ease of Implementation -- 2.5.2 Oscillations -- 2.5.3 Non-recombining Trees -- 2.5.4 Exotic Options and Trees -- 2.5.5 Greeks and Binomial Trees -- 2.5.6 Grid Adaptivity and Trees -- 2.6 Conclusion -- 3 Finite Differences and the Black-Scholes PDE -- 3.1 A Continuous Time Model for Equity Prices -- 3.2 Black-Scholes Model: From the SDE to the PDE -- 3.3 Finite Differences -- 3.4 Time Discretization -- 3.5 Stability Considerations -- 3.6 Finite Differences and the Heat Equation -- 3.6.1 Numerical Results -- 3.7 Appendix: Error Analysis -- 4 Mean Reversion and Trinomial Trees -- 4.1 Some Fixed Income Terms -- 4.1.1 Interest Rates and Compounding -- 4.1.2 Libor Rates and Vanilla Interest Rate Swaps -- 4.2 Black76 for Caps and Swaptions -- 4.3 One-Factor Short Rate Models -- 4.3.1 Prominent Short Rate Models -- 4.4 The Hull-White Model in More Detail -- 4.5 Trinomial Trees -- 5 Upwinding Techniques for Short Rate Models -- 5.1 Derivation of a PDE for Short Rate Models -- 5.2 Upwind Schemes -- 5.2.1 Model Equation -- 5.3 A Puttable Fixed Rate Bond under the Hull-White One Factor Model -- 5.3.1 Bond Details -- 5.3.2 Model Details -- 5.3.3 Numerical Method -- 5.3.4 An Algorithm in Pseudocode -- 5.3.5 Results -- 6 Boundary, Terminal and Interface Conditions and their Influence -- 6.1 Terminal Conditions for Equity Options -- 6.2 Terminal Conditions for Fixed Income Instruments -- 6.3 Callability and Bermudan Options -- 6.4 Dividends -- 6.5 Snowballs and TARNs -- 6.6 Boundary Conditions…”
Publicado 2013
Libro electrónico -
1687Publicado 2023Tabla de Contenidos: “…Mutual exclusion -- 13.7. Work sharing and termination detection -- Rendezvous barriers -- 13.8. …”
Libro electrónico -
1688por Rubiano Pinilla, Elkin“…The years 2005 and 2016 correspond to two experiences of transitory justice: the Law of Justice and Peace and the Final Agreement for the Termination of the Conflict and the Construction of a Stable and Lasting Peace. …”
Publicado 2022
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
1689Publicado 2021Tabla de Contenidos: “…Onboarding, Transfers, and Termination Processes -- Vendor, Consultant, and Contractor Agreements and Controls -- Compliance Policy Requirements -- Privacy Policy Requirements -- Understand and Apply Risk Management Concepts -- Identify Threats and Vulnerabilities -- Risk Assessment -- Risk Response/Treatment -- Countermeasure Selection and Implementation -- Applicable Types of Controls -- Control Assessments -- Monitoring and Measurement -- Reporting -- Continuous Improvement -- Risk Frameworks -- Understand and Apply Threat Modeling Concepts and Methodologies -- Threat Modeling Concepts -- Threat Modeling Methodologies -- Apply Supply Chain Risk Management Concepts -- Risks Associated with Hardware, Software, and Services -- Third-Party Assessment and Monitoring -- Minimum Security Requirements -- Service-Level Requirements -- Frameworks -- Establish and Maintain a Security Awareness, Education, and Training Program -- Methods and Techniques to Present Awareness and Training -- Periodic Content Reviews -- Program Effectiveness Evaluation -- Summary -- Domain 2 Asset Security -- Identify and Classify Information and Assets -- Data Classification and Data Categorization -- Asset Classification -- Establish Information and Asset Handling Requirements -- Marking and Labeling -- Handling -- Storage -- Declassification -- Provision Resources Securely -- Information and Asset Ownership -- Asset Inventory -- Asset Management -- Manage Data Lifecycle -- Data Roles -- Data Collection -- Data Location -- Data Maintenance -- Data Retention -- Data Destruction -- Data Remanence -- Ensure Appropriate Asset Retention -- Determining Appropriate Records Retention -- Records Retention Best Practices -- Determine Data Security Controls and Compliance Requirements -- Data States -- Scoping and Tailoring -- Standards Selection -- Data Protection Methods -- Summary…”
Libro electrónico -
1690por Cusolito, Ana PaulaTabla de Contenidos: “…Figure 3.8 Barriers Faced by Firms in Entering Value Chains: Private Sector Views -- Figure 3.9 Support for Start-Ups and SMEs in Japan -- Figure 3.10 Travel Time to Major Cities -- Figure 3.11 Average Termination Charges and Outgoing Minutes, 2003-12 -- Figure 3.12 Supply Chain Bottlenecks Are the Primary Cause of Trade Costs -- Figure 3.13 Logistics Performance and Connectivity -- Figure 3.14 Firm-Level Logistics Expenditures as Percentage of Sales, 2011-12 -- Figure 3.15 Percentage Change in LPI Scores, by LPI Component and Income Group, 2007-14 -- Figure 3.16 Simple Average Tariffs, Selected Countries, 2014 -- Figure 3.17 Tariffs on the Gross Value and the Domestic Value Added of Exports, 2009 -- Figure 3.18 Average Level of Restrictiveness Imposed on Imports -- Figure 3.19 Barriers to Entrepreneurship, 2013 -- Figure 3.20 Average Size of Start-Ups and Old Firms across Industries and Countries -- Figure 3.21 Jordan: Performance of Technology-Enabled versus Traditional Exporters -- Figure 3.22 Broadband Connectivity, by Size of Firm, 2010 and 2013 -- Figure 3.23 Enterprises Engaged in Sales via E-Commerce by Employment Size, 2008 and 2012 -- Figure 4.1 Trade Facilitation Measures: Potential Cost Reduction in Goods Trade -- Tables -- Table O.1 Priority Areas for Trade and Investment Policy -- Table O.2 Priority Areas for Capacity Building -- Table O.3 Priority Areas for Expanding the Statistical Basis and Analytics -- Table 2.1 Percentage of Exporters, by Number of Employees and Foreign Ownership, Mining and Quarrying, Manufacturing, Electricity, Gas, Steam and Air Conditioning Supply, and Water Supply, Sewerage, Waste Management, and Remediation Activities (ISIC rev. 4 - sectors 5-39), 2011 -- Table 3.1 Global Business-to-Consumer E-Commerce Marketplace, by Region, 2012-17…”
Publicado 2016
Libro electrónico -
1691por Soni, Rahul. authorTabla de Contenidos: “…Unparalleled PerformanceMultiple Protocol Support: HTTP(S), WebSocket, IMAP, POP3, SMTP; SSL Termination; HTTP Video Streaming Using MP4/FLV/HDS/HLS; Extended Monitoring and Logging; Graceful Restarting; Upgrades without Downtime Using Live Binaries; Enterprise Features of Nginx Plus; Support Available with Nginx Plus; Advantages of Nginx Plus; Advanced HTTP and TCP Load Balancing; Session Persistence; Content Caching Enhanced Capabilities; Application Health Checks; HTTP Live Streaming (HLS) and Video on Demand (VOD); Streaming; Progressive Download; Adaptive Streaming…”
Publicado 2016
Libro electrónico -
1692Publicado 2015Tabla de Contenidos: “…Introduction Pushbutton control; Battery, USB, wall and high voltage input sources; Battery charger; Three bucks, two LDOs and a boost/LED driver; Conclusion; 3 Simple circuit replaces and improves on power modules at less than half the price; Introduction; 100W isolated synchronous forward converter in an eighth brick footprint; This circuit is flexible; Conclusion; 4 Wide input range, high efficiency DDR termination power supply achieves fast transient response; Introduction; Overview of the LTC3717; Design example; Conclusion…”
Libro electrónico -
1693por Davison, AndrewTabla de Contenidos: “…No One Uses Java to Write Real GamesFreeware/Shareware Games; Sun Microsystems Isn't Interested in Supporting Java Gaming; An Animation Framework; Animation as a Threaded Canvas; Synchronization Concerns; Application and Game Termination; Why Use Volatile?; Why Sleep?; Double Buffering Drawing; Adding User Interaction; Converting to Active Rendering; FPS and Sleeping for Varying Times; Timer Resolution; Am I Done Yet? …”
Publicado 2005
Libro electrónico -
1694por Jacob, BruceTabla de Contenidos: “…DRAM System Signaling and Timing; 9.1 Signaling System; 9.2 Transmission Lines on PCBs; 9.3 Termination; 9.4 Signaling; 9.5 Timing Synchronization; 9.6 Selected DRAM Signaling and Timing Issues; 9.7 Summary; Chapter 10. …”
Publicado 2008
Libro electrónico -
1695por MacDonald, MatthewTabla de Contenidos: “…Server-Side and Client-Side ProgrammingThe .NET Framework; C#, VB, and the .NET Languages; Intermediate Language; The Common Language Runtime; The .NET Class Library; Visual Studio; The Last Word; CHAPTER 2 The C# Language; The .NET Languages; C# Language Basics; Case Sensitivity; Commenting; Statement Termination; Blocks; Variables and Data Types; Assignment and Initializers; Strings and Escaped Characters; Arrays; The ArrayList; Enumerations; Variable Operations; Advanced Math; Type Conversions; Object-Based Manipulation; The String Type; The DateTime and TimeSpan Types; The Array Type…”
Publicado 2012
Libro electrónico -
1696por Taulli, Tom, 1968-Tabla de Contenidos: “…Title Page; Copyright Page; Table of Contents; Foreword; About the Author; Introduction; Chapter 1: The Mission; Have Passion for What You Do; Be Committed to What You Do; Aim High; Think Big; Be Prepared to Fail; Put It All Together; Chapter 2: Legal Structure; Obtain Legal Services; Consider Incorporation; Determine How to Split Equity Before the Need Arises; Use Vested Founders' Stock; Termination and Change of Control; 83(b) election; Payment for Stock; File Your Patents; Think Creatively About Your Company Name, Register Your Trademark, and Secure Your URL…”
Publicado 2012
Libro electrónico -
1697Publicado 2015Tabla de Contenidos: “…; The structure of a PL/pgSQL function; Accessing function arguments; Conditional expressions; Loops with counters; Statement termination; Looping through query results; PERFORM versus SELECT; Looping Through Arrays; Returning a record; Acting on the function's results; Summary; Chapter 4: Returning Structured Data; Sets and arrays; Returning sets; Returning a set of integers; Using a set returning function; Functions based on views; OUT parameters and records; OUT parameters; Returning records; Using RETURNS TABLE…”
Libro electrónico -
1698Publicado 2022Tabla de Contenidos: “…-- Summary -- Chapter 2: International Security Standards -- ISO 27001 and ISO 27002 -- Information Security Policies (Clause A.5) -- Organization of Information Security (Clause A.6) -- Human Resource Security (Clause A.7) -- Before Hiring -- Employees -- Termination and reassignment -- Asset Management (Clause A.8) -- Access Control (Clause A.9) -- Cryptography (Clause A.10) -- Physical and Environmental Security (Clause A.11) -- Operations Security (Clause A.12) -- Communications Security (Clause A.13) -- System Acquisition, Development, and Maintenance (Clause A.14) -- Supplier Relationships (Clause A.15) -- Incident Management (Clause A.16) -- Business Continuity Management (Clause A.17) -- Compliance (Clause A.18) -- ISO 27002 -- PCI DSS -- Goal 1: Build and Maintain a Secure Network -- Goal 2: Protect Cardholder Data -- Goal 3: Maintain a Vulnerability Management Program -- Goal 4: Implement Strong Access Control Measures -- Goal 5: Regularly Monitor and Test Networks -- Goal 6: Maintain a Policy That Addresses Information Security -- Prioritization -- SWIFT: Customer Security Controls Framework -- Summary -- Chapter 3: Information Security Frameworks -- NIST Frameworks -- NIST SP 800-53: Security and Privacy Controls for Federal Information Systems and Organizations -- NIST SP 800-37: Guide for Applying the Risk Management Framework to Federal Information Systems -- NIST Cybersecurity Framework -- COBIT 5 for Information Security -- COBIT 5 Process Goals Applied to Information Security -- Other Regulatory Frameworks -- CIS Controls…”
Libro electrónico -
1699
-
1700por Institute of Medicine (U.S.).Tabla de Contenidos: “…Military and the Herbicide Program in Vietnam -- MILITARY AND DEMOGRAPHIC CHARACTERISTICS OF VIETNAM VETERANS -- Estimates of the Number of Military Personnel Serving in Vietnam -- Federal Estimates -- Other Survey Estimates -- Military and Demographic Characteristics -- Studies of Women Veterans -- THE MILITARY USE OF HERBICIDES IN VIETNAM -- Operation Ranch Hand -- Herbicide Formulations -- Military Herbicides -- Level of Toxic Contaminants -- Termination of the Program -- Disposal of Surplus Herbicides -- Ground Spraying of Herbicides -- The HERBS and Services HERBS Tapes -- Geographical Distribution of Herbicide Sprays -- SUMMARY -- REFERENCES -- 4 Toxicology -- OVERVIEW -- Chemistry -- Exposure and Metabolism -- Carcinogenicity: TCDD -- Mechanism of Action -- Carcinogenicity: Herbicides -- Mechanism of Action -- Immunotoxicity: TCDD -- Mechanism of Action -- Immunotoxicity: Herbicides -- Reproductive and Developmental Toxicity: TCDD -- Mechanism of Action -- Reproductive and Developmental Toxicity: Herbicides -- Other Toxicity: TCDD -- Other Toxicity: Herbicides -- TOXICITY PROFILE OF TETRACHLORODIBENZO-P-DIOXIN -- Introduction -- Exposure and Pharmacokinetics -- Bioavailability Following Various Routes of Exposure -- Distribution -- Metabolism -- Excretion -- Mechanism of Action -- Introduction -- Ah Receptor -- Non-Ah-Mediated Toxicity -- Health Outcomes in Animal Studies -- Carcinogenicity -- Immunotoxicity -- Hepatotoxicity -- Reproductive and Developmental Toxicity -- Reproductive Toxicity -- Neurotoxicity -- Metabolic Toxicity…”
Publicado 1994
Libro electrónico