Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Malalts terminals 240
- Cura 112
- Operating systems (Computers) 112
- Mort 101
- Linux 70
- Engineering & Applied Sciences 61
- Computer networks 60
- Historia 54
- Computer Science 52
- Development 49
- Aspectes religiosos 48
- Enfermos terminales 48
- Cuidados paliativos 46
- Application software 45
- Computer programming 45
- Aspectes psicològics 44
- Terminal care 43
- Tractament pal·liatiu 41
- Management 39
- Security measures 37
- TFC 36
- Examinations 35
- Cloud computing 32
- Computer security 31
- Python (Computer program language) 31
- Programming 30
- Certification 29
- Església Catòlica 27
- Mac OS 27
- History 26
-
1361Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Programming with Data -- Understanding data wrangling -- Getting and reading data -- Cleaning data -- Shaping and structuring data -- Storing data -- The tools for data wrangling -- Python -- R -- Summary -- Chapter 2: Introduction to Programming in Python -- External resources -- Logistical overview -- Installation requirements -- Using other learning resources -- Python 2 versus Python 3 -- Running programs in python -- Using text editors to write and manage programs -- Writing the hello world program -- Using the terminal to run programs -- Running the Hello World program -- What if it didn't work? …”
Libro electrónico -
1362Publicado 2023Tabla de Contenidos: “…. -- ... und ein paar Aufgaben -- Kapitel 9: Ein Blick hinter die IDE -- C++, das Herz des Arduinos -- Den Hintergrund der IDE betrachten -- Was ist ein Terminal? -- Im Terminal navigieren -- Ein Programm auf den Arduino übertragen -- Den Code kompilieren -- Linken -- Upload -- AVR-Programmieren -- Quellcode vom Arduino auf AVR anpassen -- Boolesche Algebra -- Zusammenfassung -- Ein paar Fragen ... -- ... und ein paar Aufgaben -- Kapitel 10: Git - Schatztruhe für deinen Code -- Unser Beispielsketch -- Versionskontrolle mit Git -- Der Unterschied zwischen Commits und Änderungen -- Weiter geht es mit unserem Repository -- Teilen deines Codes im Internet -- Deinen Code dokumentieren -- Zusammenfassung -- Ein paar Fragen ... -- ... und ein paar Aufgaben -- Kapitel 11:1 Quellcode anderer Entwickler lesen -- Die Dokumentation -- Der mysteriöse Quellcode -- Zusammenfassung -- Ein paar Fragen ... -- ... und eine Aufgabe -- Kapitel 12: Vergiss mein nicht - Nutzung des EEPROM -- Allgemeines zum EEPROM -- Was könnte man mit dem EEPROM programmieren? …”
Libro electrónico -
1363por Minoli, Daniel, 1952-Tabla de Contenidos: “…A.8.2 UAC ProcessingA.8.3 UAS Processing; A.9 Modifying an Existing Session; A.9.1 UAC Behavior; A.9.2 UAS Behavior; A.10 Terminating a Session; A.10.1 Terminating a Session with a BYE Request; A.11 Proxy Behavior; A.11.1 Overview; A.11.2 Stateful Proxy; A.11.3 Summary of Proxy Route Processing; A.12 Transactions; A.12.1 Client Transaction; A.12.2 Server Transaction; A.13 Transport; A.13.1 Clients; A.13.2 Servers; A.13.3 Framing; A.13.4 Error Handling; A.14 Additional Details; 4 Basic "Presence" Concepts; 4.1 Introduction; 4.2 Abstract Model for a Presence and Instant Messaging…”
Publicado 2006
Libro electrónico -
1364por Montagnino, Marian, authorTabla de Contenidos: “…-- Designing for a machine -- Designing for a human -- Increasing information density with ASCII art -- Displaying information with tables -- Clarifying with emojis -- Using color with intention -- Spinners and progress bars -- Disabling colors -- Being consistent across CLIs -- Naming -- Positional versus flag arguments -- Flag naming -- Usage -- Summary -- Questions -- Further reading -- Answers -- Chapter 9: The Empathic Side of Development -- Technical requirements -- Rewriting errors to be human-readable -- Guidelines for writing error messages -- Decorating errors -- Customizing errors -- Writing better error messages -- Providing debug and traceback information -- Logging data -- Initiating a logger -- Implementing a logger -- Trying out verbose mode to view stack traces -- Effortless bug submission -- Help, documentation, and support -- Generating help text -- Generating man pages -- Embedding empathy into your documentation -- Summary -- Questions -- Further reading -- Answers -- Chapter 10: Interactivity with Prompts and Terminal Dashboards -- Technical requirements -- Guiding users with prompts -- Designing a useful terminal dashboard -- Learning about Termdash -- Implementing a terminal dashboard -- Creating the terminal layer -- Creating the infrastructure layer -- Creating the container layer -- Creating the widgets layer -- Summary -- Questions -- Answers -- Further reading -- Part 4: Building and Distributing for Different Platforms -- Chapter 11: Custom Builds and Testing CLI Commands -- Technical requirements -- What are build tags and how can you use them? …”
Publicado 2023
Libro electrónico -
1365
-
1366
-
1367Publicado 2006Tabla de Contenidos: “…Métro station (Paris, France) / Arte Charpentier & Abbès Tahir. Bus terminal (Hoofddorp, Netherlands) / NIO Architecten. …”
Libro -
1368por Grotstein, James S.Tabla de Contenidos: “…"; Title Page; Copyright; Dedication; Contents; ACKNOWLEDGEMENTS; PREFACE; ABOUT THE AUTHOR; PART I Psychoanalytic technique; 1 The consultative interview: initial session; 2 The analysis begins: establishing the frame; 3 Recommendations on technique: Freud, Klein, Bion, Meltzer; 4 How to listen and what to interpret; 5 Termination; 6 The psychoanalytic treatment of psychotic and borderline states and other primitive mental disorders; 7 Basic assumptions of Kleinian/Bionian technique: a recapitulation; PART II Case presentations…”
Publicado 2009
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1369Publicado 2003Tabla de Contenidos: “…On the Criteria for the Termination of an Analysis (1950); 17. The Rôle and Future of Psycho-Therapy within Psychiatry (1950); 18. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1370por Jaraíz, JoséTabla de Contenidos: “…JUNYA ISHIGAMICONCURSO TERMINAL DE FERRYS DE YOKOHAMA (1994); MUSEO MERCEDES BENZ (2002); CENTRO RÓLEX; Situación urbana; EVOLUCIÓN DE LOS PARQUES CONTINUOS; 5. …”
Publicado 2013
Libro electrónico -
1371por Groote, Jan FrisoTabla de Contenidos: “…Game Theory -- A Game for Linear-time - Branching-time Spectroscopy -- On Satisficing in Quantitative Games -- Quasipolynomial Computation of Nested Fixpoints -- SMT Verification -- A Flexible Proof Format for SAT Solver-Elaborator Communication -- Generating Extended Resolution Proofs with a BDD-Based SAT Solver -- Bounded Model Checking for Hyperproperties -- Counterexample-Guided Prophecy for Model Checking Modulo the Theory of Arrays -- SAT Solving with GPU Accelerated Inprocessing -- FOREST: An Interactive Multi-tree Synthesizer for Regular Expressions -- Probabilities -- Finding Provably Optimal Markov Chains -- Inductive Synthesis for Probabilistic Programs Reaches New Horizons -- Analysis of Markov Jump Processes under Terminal Constraints -- Multi-objective Optimization of Long-run Average and Total Rewards -- Inferring Expected Runtimes of Probabilistic Integer Programs Using Expected Sizes -- Probabilistic and Systematic Coverage of Consecutive Test-Method Pairs for Detecting Order-Dependent Flaky Tests -- Timed Systems -- Timed Automata Relaxation for Reachability -- Iterative Bounded Synthesis for Efficient Cycle Detection in Parametric Timed Automata -- Algebraic Quantitative Semantics for Efficient Online Temporal Monitoring -- Neural Networks -- Synthesizing Context-free Grammars from Recurrent Neural Networks -- Automated and Formal Synthesis of Neural Barrier Certificates for Dynamical Models -- Improving Neural Network Verification through Spurious Region Guided Refinement -- Analysis of Network Communication Resilient Capacity-Aware Routing -- Network Traffic Classification by Program Synthesis. …”
Publicado 2021
Libro electrónico -
1372por Cather, HarryTabla de Contenidos: “…Human resource management; 2.1 The manpower plan - recruitment and termination; 2.2 Making the most of people - work design, training and development; 2.3 Rewarding employees - pay and benefits; Chapter 3. …”
Publicado 2001
Libro electrónico -
1373Publicado 2014Tabla de Contenidos: “…Digital Alternatives -- Benefits of Physical Travel -- Negatives of Physical Travel -- Cost -- Time -- The Green Argument -- Well-Being -- Safety and Security -- Travel Security Plans -- Corporate Travel Policy -- Travel Risk Assessment -- Travel Security Education -- Digital Travel Alternatives -- E-mail and Asynchronous Communication -- Teleconferencing -- Web Conferencing and Virtual Meetings -- Mixed Reality -- 2 Planning, Logistics, and Security -- Purchasing Online and Security -- Organizing the Plan and Logistics -- Warnings -- Luggage and Security -- Wearables and Security -- 3 Predeparture and Departure -- Passports, Visas, Online, Oh My -- Packing and Security -- Preparing Devices for Secured Travel -- Securing the Office When You Travel -- TSA Security -- Security Beyond the Airports -- Terminal Security -- Social Media, Travel, and Security -- During the Flight Security -- Travel Stress and Security -- Airport and Travel Game Apps -- 4 Arrival and Duration -- Arrivals, Customs, Border Crossings -- Destination Transportation and Security -- Hotels and Security -- Wi-Fi and Public Computers -- Duration and Data Security -- Duration and Apps -- Duration and Health -- Duration and Staying Legal -- Anti-Bribery and Anti-Corruption -- Social Media and Government Censorship -- The Traveler Tracked -- Virtual Kidnapping -- Security Apps for Women Travelers -- 5 Return to Home Base -- Getting to the Airport on Time -- Customs and Border Controls -- Arrive Back in Home Country -- Back to the Office -- Follow-Up -- The Future of Travel Security: Online and Off…”
Libro electrónico -
1374Publicado 2016Tabla de Contenidos: “…Getting Started; Machine Setup; Text Editors; The Terminal; Environment; Go; Your First Program; How to Read a Go Program; Exercises; Chapter 2. …”
Libro electrónico -
1375Publicado 2002Tabla de Contenidos: “…K-Project -- Closing comments -- Chapter 8: The Rise and Fall of Black Velvet Flag -- References -- Chapter 9: The recombinant history apparatus presents Terminal Time -- Conclusion -- References -- Chapter 10: Experiments with the theatrical Greek chorus as a model for interactions with computational narrative systems -- Acknowledgments -- Notes -- References -- Chapter 11: Assumptions underlying the Erasmatron storytelling system -- Conclusions -- Chapter 12: Story grammars -- References -- Part III: Agents and Narrative -- Chapter 13: Virtual Babyz -- Conclusion -- Acknowledgments -- References -- Chapter 14: Web guide agents -- Conclusions -- Acknowledgments -- References -- Chapter 15: Agneta & -- Frida -- Acknowledgements -- Notes -- References -- Chapter 16: Schizophrenia and narrative in artificial agents -- Conclusion -- References -- Part IV: Analyzing the Stories We Tell -- Chapter 17: Writing and representation -- Acknowledgements -- Author's notes -- References -- Chapter 18: Stories and social networks -- Conclusions -- Acknowledgments -- References -- Author index -- Subject index -- Series ADVANCES IN CONSCIOUSNESS RESEARCH…”
Libro electrónico -
1376por Larrauri Torroella, RamónTabla de Contenidos: “…La educación media técnica terminal -- 4. La formación de docentes -- D. La educación superior -- E. …”
Publicado 2006
Libro electrónico -
1377Publicado 2021Tabla de Contenidos: “…-- Scope and structure of the Code Chapter 1: Data protection requirements 5.1 Terms and conditions of the Cloud services agreement 5.2 Processing personal data lawfully 5.3 Sub-processing 5.4 International transfers of customer's personal data 5.5 Right to audit 5.6 Liability 5.7 Cooperation with the customer 5.8 Records of processing 5.9 Data protection point of contact 5.10 Rights of the data subject 5.11 Cooperation with supervisory authorities 5.12 Confidentiality of the processing 5.13 Assistance with personal data breaches 5.14 Termination of the Cloud services agreement Chapter 2: Security requirements 6.1 General security requirements Chapter 3: Detailed security objectives Objective 1 Management direction for information security Objective 2Organisation of information security Objective 3 Human resources security Objective 4 Asset management Objective 5 Access controls Objective 6 Encryption Objective 7 Physical and environmental security Objective 8 Operational security Objective 9 Communications security Objective 10 System development and maintenance Objective 11 Suppliers Objective 12 Information security incident management Objective 13 Information security in business continuity Chapter 4: Transparency Chapter 5: Assessment and certification Initial assessment Ongoing assessment and monitoring Chapter 6: Conclusion Further reading…”
Libro electrónico -
1378por OECDTabla de Contenidos: “…Intro -- Foreword -- Acknowledgements -- Executive Summary -- 1 Introduction -- The threat of illicit trade -- Illicit trade in the MENA region -- References -- 2 Yemen -- Background to current conflict -- Illicit trade dynamics during the current conflict -- Background -- Weapons -- Illicit trade in fuel and oil -- Human Trafficking -- Narcotics -- Unregulated Financial Networks, illicit trade and illicit capital flows -- Heritage and antiquities -- Wildlife in Socotra -- Counterfeits -- Existing governance structure -- Resolution 2216/UNVIM -- IRG policy to combat Iranian fuel imports -- IRG and Saudi Led Coalition prohibited items lists: -- Yemeni waters -- Saudi Arabia -- Saudi-led Coalition / UAE -- Combined Maritime Forces (CMF) and Joint Task Force CTF-151 -- Ministry of Transport and Yemen Coast Guard -- Management of Yemeni seaports and hydrocarbon export terminals -- References -- 3 Libya -- Background to current conflict -- Illicit trade in Libya -- Weapons -- Narcotics -- Human trafficking -- Illicit Trade in cultural artefacts -- Quantitative picture - illicit trade in counterfeits in Libya -- 4 Syria -- Background to current conflict -- Illicit trade in Syria -- Weapons -- Narcotics -- Illicit trade in water rights -- Human trafficking -- Illicit trade in cultural artefacts -- Abuse of on-line environment -- Quantitative picture - illicit trade in counterfeits in Syria -- 5 Iraq -- Background to current conflict -- Illicit trade in Iraq -- Weapons -- Narcotics -- Illicit trade in human organs -- Heritage and antiquities -- Quantitative picture - illicit trade in counterfeits in Iraq -- 6 Concluding remarks -- Annex A.…”
Publicado 2022
Libro electrónico -
1379Publicado 1997Tabla de Contenidos: “…CHIMPANZEES IN RESEARCH -- Copyright -- PREFACE -- Contents -- CHIMPANZEES IN RESEARCH STRATEGIES FOR THEIR ETHICAL CARE, MANAGEMENT, AND USE -- EXECUTIVE SUMMARY -- 1 INTRODUCTION -- 2 RESEARCH NEEDS -- VALUE OF PAST STUDIES WITH CHIMPANZEES -- INFECTIOUS DISEASE -- XENOBIOTICS -- FUTURE NEEDS FOR CHIMPANZEES -- KNOWN INFECTIOUS AGENTS -- HEPATITIS -- RSV -- HIV -- MALARIA -- EMERGING INFECTIOUS AGENTS -- OTHER RESEARCH -- MAXIMIZING THE AVAILABILITY OF CHIMPANZEES -- TERMINAL STUDIES -- CONCLUSIONS AND RECOMMENDATIONS -- 3 LONG-TERM CARE -- HOUSING STANDARDS AND BEHAVIORAL WELL-BEING -- HOUSING MODELS -- PROVISIONS FOR BEHAVIORAL WELL-BEING -- SPECIAL CONSIDERATIONS -- EUTHANASIA -- RECOMMENDATIONS FOR THE PRACTICE OF EUTHANASIA ENDORSED BY THE COMMITTEE -- CHIMPANZEE POPULATION SUBGROUPS: DEFINITIONS AND RECOMMENDATIONS -- GROUP A: BREEDING POPULATION -- GROUP B: AVAILABLE FOR RESEARCH -- GROUP C: CURRENTLY IN RESEARCH PROTOCOLS -- GROUP D: NOT NEEDED FOR RESEARCH OR BREEDING -- OWNERSHIP TRANSFER -- CONCLUSIONS -- 4 DEMOGRAPHY, COST, AND GENETIC MATERIAL -- DEMOGRAPHY -- MODELS OF BREEDING COLONY SIZE -- COSTS -- PROJECTED BREEDING COLONY COSTS -- REDUCING COSTS THROUGH SIMPLIFYING FUNDING AND ENHANCING COORDINATION -- SANCTUARY CONSTRUCTION -- GENETIC MANAGEMENT -- FUTURE BREEDING -- CRYOPRESERVATION OF GAMETES OR EMBRYOS -- RECOMMENDATIONS -- 5 CENTRALIZATION OF RESEARCH CHIMPANZEE MANAGEMENT AND DEVELOPMENT OF A NATIONAL CHIMPANZEE RESOURCE -- OWNERSHIP -- FINANCIAL SUPPORT OF THE NATIONAL CHIMPANZEE RESOURCE (NCR) -- PRIVATELY OWNED CHIMPANZEES IN BIOMEDICAL RESEARCH -- CHIMPANZEE SANCTUARIES -- THE NATIONAL CHIMPANZEE MANAGEMENT PROGRAM ADVISORY COUNCIL -- CHARGE -- DUTIES -- MEMBERSHIP -- REFERENCES -- APPENDIX A MINORITY STATEMENT -- REFERENCES…”
Libro electrónico -
1380por DeLucia-Waack, Janice L.Tabla de Contenidos: “…Cover; Contents; Chapter 1 - Introduction; Chapter 2 - Planning for a Psychoeducational Group for Children and Adolescents; Chapter 3 - Pregroup Interviews and Group Sessions; Chapter 4 - Group Leadership Skills for Psychoeducational Groups; Chapter 5 - Initial Sessions; Chapter 6 - Middle Sessions; Chapter 7 - Termination Sessions; Chapter 8 - Using Activities Effectively in Group Sessions; Chapter 9 - Follow-Up After Group Ends; Chapter 10 - Assessment of Group Effectiveness; Chapter 11 - Considerations…”
Publicado 2006
Libro electrónico