Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Malalts terminals 240
- Cura 112
- Operating systems (Computers) 112
- Mort 101
- Linux 70
- Engineering & Applied Sciences 61
- Computer networks 60
- Historia 53
- Computer Science 52
- Development 49
- Aspectes religiosos 48
- Enfermos terminales 48
- Cuidados paliativos 46
- Application software 45
- Computer programming 45
- Aspectes psicològics 44
- Terminal care 43
- Tractament pal·liatiu 41
- Management 39
- Security measures 37
- TFC 36
- Examinations 35
- Cloud computing 32
- Computer security 31
- Python (Computer program language) 31
- Programming 30
- Certification 29
- Església Catòlica 27
- Mac OS 27
- History 26
-
1841Publicado 2022Tabla de Contenidos: “…Model for accessing IoT terminals -- 2.5. Access controller for IoT terminals based on reinforcement learning -- 2.5.1. …”
Libro electrónico -
1842Publicado 2024Tabla de Contenidos: “…(evaluate) -- A quick definition of POSIX -- Basic command-line skills -- Unix filesystem basics -- Absolute vs. relative file paths -- Absolute vs. relative pathname review -- Opening a terminal -- Looking around - command-line navigation -- pwd - print working directory -- ls - list -- Moving around -- cd - change directory -- find - find files -- Reading files -- less - page through a file -- Making changes -- touch - create an empty file, or update modification time for an existing one -- mkdir - create a directory -- rmdir - remove empty directories -- rm - remove files and directories -- mv - move or rename files and directories -- Getting help -- Shell autocompletion -- Conclusion -- Chapter 2: Working with Processes -- Process basics -- What is a Linux process made of? …”
Libro electrónico -
1843por Camarillo, GonzaloTabla de Contenidos: “…5.9 Changes due to Next Generation Networks (NGN) -- 5.10 Interworking -- 5.11 Combinational Services -- 5.12 Basic Sessions not Requiring Resource Reservation -- 5.13 Globally Routable User-Agent URI (GRUU) in IMS -- 5.14 IMS Communication Services Identification (ICSI) -- 5.15 IMS Application Reference Identifier (IARI) -- 5.16 NAT Traversal in the IMS -- 6 AAA on the Internet -- 6.1 Authentication, Authorization, and Accounting -- 6.2 AAA Framework on the Internet -- 6.3 The Diameter Protocol -- 7 AAA in the IMS -- 7.1 Authentication and Authorization in the IMS -- 7.2 he Cx and Dx Interfaces -- 7.3 The Sh Interface -- 7.4 Accounting -- 8 Policy and Charging Control in the IMS -- 8.1 PCC Architecture -- 8.2 Charging Architecture -- 8.3 Offline Charging Architecture -- 8.4 Online Charging Architecture -- 9 Quality of Service on the Internet -- 9.1 Integrated Services -- 9.2 Differentiated Services -- 10 Quality of Service in the IMS -- 10.1 Policy Control and QoS -- 10.2 Instructions to Perform Resource Reservations -- 10.3 Reservations by the Terminals -- 10.4 QoS in the Network -- 11 Security on the Internet -- 11.1 HTTP Digest Access Authentication -- 11.2 Certificates -- 11.3 TLS -- 11.4 S/MIME -- 11.5 Authenticated Identity Body -- 11.6 IPsec -- 11.7 Privacy -- 11.8 Encrypting Media Streams -- 12 Security in the IMS -- 12.1 Access Security -- 12.2 Network Security -- 13 Emergency Calls on the Internet -- 13.1 Introduction -- 13.2 Location Acquisition -- 13.3 Identifying Emergency Calls -- 13.4 Locating the closest PSAP -- 14 Emergency Calls in the IMS -- 14.1 Architecture for Supporting Emergency Calls in IMS -- 14.2 Establishing an Emergency Call in IMS -- 14.3 IMS Registration for Emergency Calls -- 14.4 Call back from PSAP to user -- 14.5 Anonymous calls -- 14.6 Emergency Calls in Fixed Broadband Accesses -- Part III The Media Plane in the IMS -- 15 Media Encoding -- 15.1 Speech Encoding -- 15.2 Video Encoding -- 15.3 Text Encoding -- 15.4 Mandatory Codecs in the IMS…”
Publicado 2008
Libro electrónico -
1844por Roldan, Maria C.Tabla de Contenidos: “…Time for action - avoiding errors while converting the estimated time from string to integer -- The error handling functionality -- Time for action - configuring the error handling to see the description of the errors -- Personalizing the error handling -- Summary -- Chapter 3: Manipulating Real-world Data -- Reading data from files -- Time for action - reading results of football matches from files -- Input files -- Input steps -- Reading several files at once -- Time for action - reading all your files at a time using a single text file input step -- Time for action - reading all your files at a time using a single text file input step and regular expressions -- Regular expressions -- Troubleshooting reading files -- Sending data to files -- Time for action - sending the results of matches to a plain file -- Output files -- Output steps -- Getting system information -- Time for action - reading and writing matches files with flexibility -- The Get System Info step -- Running transformations from a terminal window -- Time for action - running the matches transformation from a terminal window -- XML files -- Time for action - getting data from an XML file with information about countries -- What is XML? …”
Publicado 2013
Libro electrónico -
1845Publicado 2020Tabla de Contenidos: “…Die Navigation in der OneNote-App -- Private und geschäftliche Notizbücher in der OneNote-App verwenden -- Ein Notizbuch in der OneNote-App öffnen -- Zuletzt verwendete Notizen aus verschiedenen Notizbüchern öffnen -- Ein neues Notizbuch mit der OneNote-App anlegen -- Eine neue Tag-Kategorie in der OneNote-App erstellen -- Notizbuchabschnitte löschen, umbenennen oder die Abschnittsfarbe ändern -- Einen Notizbuchabschnitt mit einem Kennwort schützen -- Ein Kennwort für einen Notizbuchabschnitt entfernen -- Die Suche in der OneNote-App nutzen -- Ein Microsoft-Konto von der OneNote-App abmelden -- Ein OneNote-Notizbuch löschen -- OneNote mobil -- Zusammenfassung -- Kapitel 7 - Outlook im Web -- Ausgangssituation -- Der Einsatz von Outlook im Web -- E-Mail -- Die Benutzeroberfläche von E-Mail -- Signatur anlegen -- Eine E-Mail-Nachricht verfassen und senden -- E-Mails beantworten oder weiterleiten -- E-Mail als Entwurf für später speichern -- Eine E-Mail-Nachricht mit einem hohen Prioritätsstatus senden -- Eine E-Mail-Nachricht als vertraulich kennzeichnen -- E-Mail-Anhänge öffnen, herunterladen oder in OneDrive for Business speichern -- E-Mails filtern und sortieren -- Abwesenheiten festlegen -- Eine E-Mail-Weiterleitung einrichten -- Kalender -- Den Kalender öffnen -- Zeitzone und Datumsformat festlegen oder ändern -- Die Benutzeroberfläche des Kalenders -- Der linke Navigationsbereich -- Die Schaltflächen-Symbolleiste -- Die Symbolleiste -- Kalenderwochen einblenden -- Terminplanung mit dem Kalender -- Frei/Gebucht-Informationen und Kalenderfreigabe -- Einen Termin oder ein Ereignis erstellen -- Einen Termin oder Ereignis ändern oder löschen -- Eine Besprechung planen -- Eine Besprechungsanfrage annehmen oder ablehnen -- Eine Besprechungsanfrage ändern -- Besprechungsanfragen mit dem Smartphone erstellen…”
Libro electrónico -
1846Tabla de Contenidos: “…Step 2: Configure Policies for the Client Group(s) -- Step 3: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination) -- Step 4: Configure Router AAA and Add VPN Client Users -- Step 5: Create VPN Client Policy for Security Association Negotiation -- Step 6: Configure the Crypto Map (IKE Phase 2) -- Step 7: Apply the Crypto Map to the Interface -- Step 8: Verify the VPN Service -- Configuring IPsec Site-to-Site VPNs Using CLI -- Step 1: Configure the ISAKMP Policy (IKE Phase 1) -- Step 2: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination) -- Step 3: Configure the Crypto ACL (Interesting Traffic, Secure Data Transfer) -- Step 4: Configure the Crypto Map (IKE Phase 2) -- Step 5: Apply the Crypto Map to the Interface (IKE Phase 2) -- Step 6: Configure the Firewall Interface ACL -- Step 7: Verify the VPN Service -- Configuring GRE Tunnels over IPsec -- Step 1: Create the GRE Tunnel -- Step 2: Specify the IPsec VPN Authentication Method -- Step 3: Specify the IPsec VPN IKE Proposals -- Step 4: Specify the IPsec VPN Transform Sets -- Step 5a: Specify Static Routing for the GRE over IPsec Tunnel -- Step 5b: Specify Routing with OSPF for the GRE over IPsec Tunnel -- Step 6: Enable the Crypto Programming at the Interfaces -- Appendix: Create Your Own Journal Here…”
Libro electrónico -
1847Publicado 2012Tabla de Contenidos: “…-- Going Connection Shopping -- Objective 8.03 Using Remote Access -- Dial-up to the Internet -- Private Dial-Up -- Dedicated Connection -- DSL and Cable -- Cable Issues -- Remote Terminal -- VoIP -- RTP -- SIP and H.323 -- Skype -- Streaming Media with RSTP -- Checkpoint -- Review Questions -- Review Answers -- Chapter 9: Network Security -- Objective 9.01 Common Threats -- System Crash/Hardware Failure -- Administrative Access Control -- Malware -- Virus -- Worm -- Macro Virus -- Trojan -- Rootkit -- Adware/Spyware -- Dealing with Malware -- Antimalware Programs -- Social Engineering -- Phishing -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Leeching -- Cracking Wireless Encryption -- Rogue Access Points -- Evil Twin -- Objective 9.02 Securing User Accounts -- Authentication -- Authentication Principles -- Authentication Protocols -- Authorization -- Logon and Access Security -- Implementing Share-Level Security -- Implementing User-Level Security -- Using Passwords -- Objective 9.03 Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Objective 9.04 Securing Remote Connections -- IPsec -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs -- SSL VPNs -- Checkpoint -- Review Questions -- Review Answers -- Chapter 10: The Complete Network -- Objective 10.01 Designing and Implementing a SOHO Network -- Define the Network Needs -- Network Design -- Compatibility Issues…”
Libro electrónico -
1848Publicado 2022Tabla de Contenidos: “…UDP -- Exam essentials -- 2.2 Compare and contrast common networking hardware -- Routers -- Switches -- Access points -- Patch panel -- Firewall -- Power over Ethernet (PoE) -- Hub -- Cable modem -- Digital subscriber line (DSL) -- Optical network terminal (ONT) -- Network interface card (NIC) -- Software-defined networking (SDN) -- Exam essentials -- 2.3 Compare and contrast protocols for wireless networking -- Frequencies -- Channels -- Bluetooth -- 802.11 -- Long-range fixed wireless -- NFC -- Radio-frequency identification (RFID)…”
Libro electrónico -
1849Publicado 2011Tabla de Contenidos: “…Primary Central Nervous System Lymphoma -- Molecular Biology of Acute Leukemias -- Management of Acute Leukemias -- Molecular Biology of Chronic Leukemias -- Chronic Myelogenous Leukemia -- Chronic Lymphocytic Leukemias -- Myelodysplastic Syndromes -- Plasma Cell Neoplasms -- Cancer of Unknown Primary Site -- Benign and Malignant Mesothelioma -- Peritoneal Surface Malignancy -- Intraocular Melanoma -- ALDS-Related Malignancies -- Transplantation-Related Malignancies -- Superior Vena Cava Syndrome -- Increased Intracranial Pressure -- Spinal Cord Compression -- Metabolic Emergencies -- Metastatic Cancer to the Brain -- Metastatic Cancer to the Lung -- Metastatic Cancer to the Liver -- Metastatic Cancer to the Bone -- Malignant Effusions of the Pleura and the Pericardium -- Malignant Ascites -- Paraneoplastic Syndromes -- Autologous Stem Cell Transplantation -- Allogeneic Stem Cell Transplantation -- Infections in the Cancer Patient -- Leukopenia and Thrombocytopenia -- Cancer-Associated Thrombosis -- Nausea and Vomiting -- Diarrhea and Constipation -- Oral Complications -- Pulmonary Toxicity -- Cardiac Toxicity -- Hair Loss -- Gonadal Dysfunction -- Fatigue -- Second Primary Cancers -- Neurocognitive Effects -- Cancer Survivorship -- Management of Cancer Pain -- Nutritional Support -- Sexual Problems -- Psychological Issues in Cancer -- Communicating News to the Cancer Patient -- Specialized Care of the Terminally Ill -- Community Resources -- Rehabilitation of the Cancer Patient -- Regulatory Issues -- Health Disparities in Cancer -- Cancer Information on the Internet -- Complementary, Alternative, and Integrative Therapies in Cancer Care…”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
1850por León Sanz, RafaelTabla de Contenidos: “…3.6.3 Instalación del Android SDK, el IDE Eclipse y el plugin ADT para Eclipse3.6.4 Instalación del bundle que agrupa las tres piezas; 3.6.5 Para instalar cada pieza por separado; 3.6.6 Creación de un AVD; 3.6.7 Ejecución en un terminal real; 3.6.8 Programa "Hola Mundo"; 3.6.9 Creación del proyecto; 3.6.10 Estructura de directorios y ficheros; 3.6.11 Ejecución de la aplicación; 4. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1851por Taleisnik, SamuelTabla de Contenidos: “…5.1.3.2.1 Proteínas adaptadoras con actividad enzimática asociada.5.1.3.2.2 Proteínas adaptadoras objetivo; 5.2 La vía Ras; 5.2.1 Las proteínas Ras; 5.2.1.1 Ciclo de activación; 5.2.1.2 Mecanismo de activación; 5.2.1.3 Efectores Ras,; 5.2.2 La proteína c-Raf; 5.3 La vía Ras/MAPK; 5.3.1 Activación de ERK por GPCRs; 5.3.2 Sustratos; 5.3.3 Isoformas de quinasas MAP; 5.3.3.1 Las quinasas JNK (c-Jun N-terminal kinases).; 5.3.3.2 La quinasa p38/HOG; 5.3.4 Convergencias y divergencias; 5.4 Factores de crecimiento y proteínas G; 5.5 Factores de crecimiento; 5.6 Receptores proteína tirosina fosfatasas…”
Publicado 2006
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
1852por Cesar, Nicolas, Di Pentima, Lucas, aut, Maglione, German, aut, Ballardini, Cesar, autTabla de Contenidos: “…AggregationWith Independent Works; B.8. Translation; B.9. Termination; B.10. Future Revisions of This Licence; Bibliografía; Indice alfabético; Índice de figuras; 2.1. …”
Publicado 2002
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1853Publicado 2007Tabla de Contenidos: “…Gestor de descarga FTP ""DOWNLOAD ACELERATOR PLUS""; 2.4.2. Protocolo de Terminal Virtual (TELNET); 2.4.2.1. Ejemplo de empleo. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1854Publicado 2021Tabla de Contenidos: “…LACTANCIA Y PLANOS TERMINALES EN PREESCOLARES, CHICLAYO, PERÚ BREASTFEEDING AND TERMINAL PLANS IN PRESCHOOLS, CHICLAYO, PERÚ -- 5. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
1855por Freud, Sigmund ( 1856-1939)Tabla de Contenidos: “…Nuevas lecciones de psicoanálisis -- v. 9. (1934-1950): Moisés y la religión monoteísta. Análisis terminable e interminable. Escisión del "Yo" en el proceso de defensa. …”
Publicado 1948
Red de bibliotecas Iglesia Navarra (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca del Seminario Diocesano de Vitoria-Gasteiz, Universidad Loyola - Universidad Loyola Granada, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca Universidad de Deusto)Libro -
1856por Uffelen, Chris vanTabla de Contenidos: “…Foster + Partners -- 82 Herttoniemi transport terminal, Arq. B&M architects Ltd. -- 84 Metro station Heddernheim, Arq. …”
Publicado 2010
Libro -
1857por Yoeli, Michael, 1917-Tabla de Contenidos: “…4.8.2 Verifying Equivalences and Preorders Using CADP4.8.2.1 Verifying Equivalences Using CADP; 4.8.2.2 Verifying Preorders Using CADP; 4.8.3 Generating LTS of Choice Using CADP; 4.8.4 Generating LTS of Recursion Using CADP; 4.9 Full LOTOS-An Introduction; 4.9.1 The Full-LOTOS NOT-Gate Example; 4.9.1.1 The Full LOTOS NOT-File; 4.9.1.2 Applying CADP to Derive LTS for the NOT-Gate; 4.9.2 The Non-Terminating NOT-Gate; 4.9.3 The Max Specifications; 4.9.3.1 Max2 Specification; 4.9.3.2 Max3 Specification; 4.10 The Regular Mu-Calculus (RMC); 4.10.1 Introducing RMC by Examples; 4.11 Further Reading…”
Publicado 2008
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1858Publicado 2021Tabla de Contenidos: “…Solutions to Monorepo Issues -- Disassemble Your Monorepo -- Summary -- Chapter 7: Testing Is Caring -- Swift Packages and Testing -- The Importance of Testing -- The Package.swift File -- Our First XCTestCase -- @importable Import -- allTests Variable -- Adding More Test Methods -- Test Methods Start with "test" -- Arrange ➤ Act ➤ Assert -- Running Tests -- Straight from the Code Editor -- Running Tests from the Test Navigator -- Adding/Removing Tests from Our Scheme -- Running from Terminal -- Integration Tests -- Why Are Integration Tests Important? …”
Libro electrónico -
1859Publicado 2021Tabla de Contenidos: “…Chapter 7: HTTPS, Extracting Configuration, and Deno in the Browser -- Technical requirements -- Enabling CORS and HTTPS -- Enabling CORS -- Enabling HTTPS -- Extracting configuration and secrets -- Creating a configuration file -- Accessing secret values -- Running Deno code in the browser -- Summary -- Section 3: Testing and Deploying -- Chapter 8: Testing - Unit and Integration -- Technical requirements -- Writing your first test in Deno -- Defining a test -- A unit test for MuseumController -- Writing an integration test -- Testing the web server -- Creating integration tests for the application -- Testing the application together with the API client -- Benchmarking parts of the application -- Summary -- Chapter 9: Deploying a Deno Application -- Technical requirements -- Preparing the environment for the application -- Creating a Dockerfile for the Deno application -- Running a Terminal inside a container -- Building and running the application in Heroku -- Creating the application in Heroku -- Building and running the Docker image -- Configuring the application for deployment -- Getting the application port from the environment -- Summary -- Chapter 10: What's Next? …”
Libro electrónico -
1860por Robinson, AndrewTabla de Contenidos: “…; 1.3 Der Startvorgang; 1.3.1 Sprache, Ländereinstellungen und Tastaturbelegung anpassen; 1.4 Die grafische Benutzeroberfläche starten; 1.5 Terminal unter X starten; 1.6 Fehlerbehebung…”
Publicado 2014
Libro electrónico