Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- TFM 2,694
- Gestió de projectes 1,302
- Empreses 1,057
- Universidad Pontificia de Salamanca (España) 987
- Direcció i administració 882
- Planificació estratègica 792
- Development 785
- TFMP 721
- Application software 720
- Engineering & Applied Sciences 583
- Planificació 566
- Management 423
- Computer programs 420
- Computer Science 404
- Computer networks 359
- Examinations 350
- Data processing 338
- Python (Computer program language) 328
- Computer programming 304
- Arquitectura 298
- Edificis 297
- Sistemes d'informació per a la gestió 294
- Design 281
- History 277
- Indústria i comerç 274
- Comerç electrònic 273
- Cloud computing 269
- Certification 266
- Photography 262
- Operating systems (Computers) 259
-
7421por Špetič, AlešTabla de Contenidos: “…Solution 2: Create a student master table; 2.15.3. Discussion; 2.16. Finding Complements of Sets with Different Universes; 2.16.2. …”
Publicado 2002
Libro electrónico -
7422por Buchanan, WilliamTabla de Contenidos: “…AGP; 11.1 Introduction; 11.2 PCI and AGP; 11.3 Bus transactions; 11.4 Pin description; 11.5 AGP master configuration; 11.6 Bus commands; 11.7 Addressing modes and bus operations; 11.8 Register description; 11.9 Exercises; 11.10 Notes from the author; Chapter 12. …”
Publicado 2000
Libro electrónico -
7423por Gibbs, G. BentonTabla de Contenidos: “…Installing AIX on the JS20 -- 7.1 Minimal NIM installation -- 7.2 Adding resources -- 7.3 Adding machine information -- 7.4 Preparing the NIM master -- 7.5 Preparing the client -- Chapter 8. System management scenarios -- 8.1 IBM Director -- 8.1.1 Setting up an IBM Director Server -- 8.1.2 Installing an IBM Director Agent -- 8.1.3 Using Director to manage JS20s -- 8.2 IBM Cluster Systems Management -- 8.2.1 Setting up a CSM management node -- 8.2.2 Installing and managing BladeCenter JS20s using CSM -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover…”
Publicado 2005
Libro electrónico -
7424por Bolton, W. 1933-Tabla de Contenidos: “…6.3.2 Iteration statements6.3.3 Structured text programs; Problems; 7 Internal relays; 7.1 Internal relays; 7.2 Ladder programs; 7.2.1 Programs with multiple input conditions; 7.2.2 Latching programs; 7.3 Battery-backed relays; 7.4 One-shot operation; 7.5 Set and reset; 7.5.1 Program examples; 7.6 Master control relay; 7.6.1 Examples of programs; Problems; 8 Jump and call; 8.1 Jump; 8.1.1 Jumps within jumps; 8.2 Subroutines; Problems; 9 Timers; 9.1 Types of timers; 9.2 Programming timers; 9.2.1 Sequencing; 9.2.2 Cascaded timers; 9.2.3 On-off cycle timer; 9.3 Off-delay timers; 9.4 Pulse timers…”
Publicado 2006
Libro electrónico -
7425por Liu, CricketTabla de Contenidos: “…SOA Values; 4.8.4. Multiple Master Servers; 4.9. Adding More Zones; 4.10. What&s Next?…”
Publicado 2006
Libro electrónico -
7426por Lashin, AhmedTabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Preface -- Table of Contents -- Chapter 1: Report Authoring Basic Concepts -- Introduction -- Summary filters and detail filters -- Sorting grouped values -- Aggregation and rollup aggregation -- Implementing if-then-else in filters -- Formatting data - dates, numbers, and percentages -- Creating sections -- Hiding columns in crosstabs -- Prompts - display value versus use value -- Chapter 2 : Advanced Report Authoring -- Introduction -- Adding cascaded prompts -- Creating a nested report - defining the master detail relationship -- Writing back to the database -- Adding conditional formatting -- Formatting negative values -- Playing with conditional styles -- Using conditional blocks - many reports in one -- Defining drill-through from crosstab intersection -- Overriding crosstab intersection drill-through definitions -- Chapter 3 : Using JavaScript Files - Tips and Tricks -- Introduction -- Defining dynamic default values for prompts -- Changing the title of the value prompt -- Validating textbox prompts -- Showing/hiding prompt controls at runtime -- Selecting and submitting values automatically -- Manipulating the Date Time control -- Creating a variable width bar chart using JavaScript -- Chapter 4 : The Report Page - Tips and Tricks -- Introduction -- Showing images dynamically (traffic light report) -- Handling the missing image issue -- Dynamic links to an external website (a Google Maps example) -- Alternating drill links -- Showing tooltips on reports -- Merged cells in Excel output -- Worksheet name in Excel output -- Conditional column titles -- Chapter 5 : Working with XML -- Introduction -- Changing drill targets quickly -- Copying and pasting drill links -- Removing references to old packages or items…”
Publicado 2013
Libro electrónico -
7427Publicado 2015Tabla de Contenidos: “…Front Cover -- Business Intelligence Guidebook -- Copyright -- Contents -- Foreword -- How to Use This Book -- CHAPTER SUMMARIES -- Acknowledgments -- PART I - CONCEPTS AND CONTEXT -- CHAPTER 1 - THE BUSINESS DEMAND FOR DATA, INFORMATION, AND ANALYTICS -- JUST ONE WORD: DATA -- WELCOME TO THE DATA DELUGE -- TAMING THE ANALYTICS DELUGE -- TOO MUCH DATA, TOO LITTLE INFORMATION -- DATA CAPTURE VERSUS INFORMATION ANALYSIS -- THE FIVE CS OF DATA -- COMMON TERMINOLOGY FROM OUR PERSPECTIVE -- REFERENCES -- PART II - BUSINESS AND TECHNICAL NEEDS -- CHAPTER 2 - JUSTIFYING BI: BUILDING THE BUSINESS AND TECHNICAL CASE -- WHY JUSTIFICATION IS NEEDED -- BUILDING THE BUSINESS CASE -- BUILDING THE TECHNICAL CASE -- ASSESSING READINESS -- CREATING A BI ROAD MAP -- DEVELOPING SCOPE, PRELIMINARY PLAN, AND BUDGET -- OBTAINING APPROVAL -- COMMON JUSTIFICATION PITFALLS -- CHAPTER 3 - DEFINING REQUIREMENTS-BUSINESS, DATA AND QUALITY -- THE PURPOSE OF DEFINING REQUIREMENTS -- GOALS -- DELIVERABLES -- ROLES -- DEFINING REQUIREMENTS WORKFLOW -- INTERVIEWING -- DOCUMENTING REQUIREMENTS -- PART III - ARCHITECTURALFRAMEWORK -- CHAPTER 4 - ARCHITECTURE FRAMEWORK -- THE NEED FOR ARCHITECTURAL BLUEPRINTS -- ARCHITECTURAL FRAMEWORK -- INFORMATION ARCHITECTURE -- DATA ARCHITECTURE -- TECHNICAL ARCHITECTURE -- PRODUCT ARCHITECTURE -- METADATA -- SECURITY AND PRIVACY -- AVOIDING ACCIDENTS WITH ARCHITECTURAL PLANNING -- DO NOT OBSESS OVER THE ARCHITECTURE -- CHAPTER 5 - INFORMATION ARCHITECTURE -- THE PURPOSE OF AN INFORMATION ARCHITECTURE -- DATA INTEGRATION FRAMEWORK -- DIF INFORMATION ARCHITECTURE -- OPERATIONAL BI VERSUS ANALYTICAL BI -- MASTER DATA MANAGEMENT -- CHAPTER 6 - DATA ARCHITECTURE -- THE PURPOSE OF A DATA ARCHITECTURE -- HISTORY -- DATA ARCHITECTURAL CHOICES -- DATA INTEGRATION WORKFLOW -- DATA WORKFLOW-RISE OF EDW AGAIN -- OPERATIONAL DATA STORE -- REFERENCES…”
Libro electrónico -
7428Publicado 2002Tabla de Contenidos: “…Roitblat -- Chimpanzee Ai and her son Ayumu: an episode of education by master-apprenticeship / Tetsuro Matsuzawa -- The evolution and ontogeny of ordinal numerical ability / Elizabeth M. …”
Libro electrónico -
7429por McFedries, PaulTabla de Contenidos: “…Cover -- Contents -- Introduction -- What's in the Book -- This Book's Special Features -- I: MASTERING EXCEL RANGES AND FORMULAS -- 1 Getting the Most Out of Ranges -- Advanced Range-Selection Techniques -- Data Entry in a Range -- Filling a Range -- Using the Fill Handle -- Creating a Series -- Advanced Range Copying -- Copying Selected Cell Attributes -- Clearing a Range -- Applying Conditional Formatting to a Range -- 2 Using Range Names -- Defining a Range Name -- Working with Range Names -- 3 Building Basic Formulas -- Understanding Formula Basics -- Understanding Operator Precedence -- Controlling Worksheet Calculation -- Copying and Moving Formulas -- Displaying Worksheet Formulas -- Converting a Formula to a Value -- Working with Range Names in Formulas -- Working with Links in Formulas -- Formatting Numbers, Dates, and Times -- 4 Creating Advanced Formulas -- Working with Arrays -- Understanding Array Formulas -- Using Array Constants -- Using Iteration and Circular References -- Consolidating Multisheet Data -- Applying Data-Validation Rules to Cells -- Using Dialog Box Controls on a Worksheet -- 5 Troubleshooting Formulas -- Understanding Excel's Error Values -- Fixing Other Formula Errors -- Handling Formula Errors with IFERROR( ) -- Using the Formula Error Checker -- Auditing a Worksheet -- II: HARNESSING THE POWER OF FUNCTIONS -- 6 Understanding Functions -- About Excel's Functions -- The Structure of a Function -- Typing a Function into a Formula -- Using the Insert Function Feature -- Loading the Analysis ToolPak -- 7 Working with Text Functions -- Excel's Text Functions -- Working with Characters and Codes -- Converting Text -- Formatting Text -- Manipulating Text -- Removing Unwanted Characters from a String -- Extracting a Substring -- Searching for Substrings -- Case Study: Generating Account Numbers…”
Publicado 2011
Libro electrónico -
7430Publicado 2017Tabla de Contenidos: “…-- Arithmetic Operators -- Comparison Operators -- Date Time Functions -- String Functions -- Regular Expression Functions -- Functions for transformation -- Mastering transformation with User-Defined Functions -- Some considerations when using UDFs -- UDF format -- Summary -- Further Reading -- Chapter 4: BigQuery SQL Basic -- The BigQuery interface -- Error checking -- Querying in BigQuery -- Types of queries -- Querying public data -- Basic SQL syntax -- Commenting in BigQuery SQL…”
Libro electrónico -
7431Publicado 2017Tabla de Contenidos: “…-- 9: Mobilize Hearts and Minds Forward -- Leave the Abstract and Make an Impression -- End the Suspense: Make the Unknown Future Known -- How to Mobilize Hearts and Minds Forward -- What Does Your Team Anticipate? -- To Execute Masterfully, Use These Classes Of Mobilizing Questions -- Achieve Something Bigger -- 10: Is Your Team Ready to Do Big Things? …”
Libro electrónico -
7432Publicado 2010Tabla de Contenidos: “…Binding Data to a Control -- Summary -- Chapter 11: Bringing It All Together -- Adding Reusable Assets with Component Screens -- Adding Annotations to Our Project -- Creating Documentation -- Summary -- Part III: Understanding SketchFlow -- Chapter 12: The SketchFlow Interface -- The Workspace -- The Tools Panel -- The Projects Panel -- The Assets Panel -- The States Panel -- Objects in the Objects and Timeline Panel -- Timelines in the Objects and Timeline Panel -- SketchFlow Animation Panel -- Artboard Panel -- SketchFlow Map -- The Results Panel -- The Properties Panel -- The Resources Panel -- The Data Panel -- The Feedback Panel -- Application Menus -- Summary -- Chapter 13: Assets, Styles, and Components -- SketchFlow Style Assets -- Working with Styles -- Understanding Styles, Templates, and Resources -- Working with Components -- Summary -- Chapter 14: SketchFlow Animation and States -- Animation Models in SketchFlow and Expression Blend -- SketchFlow Animation -- States -- Keyframe Animation and Storyboards -- Summary -- Chapter 15: SketchFlow Behaviors -- How Behaviors Work -- Triggers and Actions -- Behavior -- Adding Behaviors and Setting Properties -- Summary -- Chapter 16: Data -- Understanding Data and Binding -- The Data Panel -- Creating Data Resources for SketchFlow Projects -- Working with Data in SketchFlow -- Summary -- Chapter 17: Annotating Your Work, Getting Feedback, and Creating Documentation -- Adding Annotations to Your Project -- Getting Feedback with the SketchFlow Player -- Navigation in the SketchFlow Player -- Importing Feedback into Your Project -- Creating Documentation -- Summary -- Part IV: Applied Knowledge -- Chapter 18: Project Brief and Sketches -- Project Brief -- Loyal Customer Survey -- Sketching Ideas -- Refinement and Master Sketches -- Summary -- Chapter 19: Navigation Via Component Screens…”
Libro electrónico -
7433Publicado 2022Tabla de Contenidos: “…Server software component (T1505) -- Escalating privileges -- Exploiting for privilege escalation (T1068) -- Creating or modifying system process (T1543) -- Process injection (T1055) -- Abuse elevation control mechanism (T1548) -- Bypassing defenses -- Exploiting for defense evasion (T1211) -- Deobfuscating/decoding files or information (T1140) -- File and directory permissions modification (T1222) -- Impairing defenses (T1562) -- Indicator removal on host (T1070) -- Signed binary proxy execution (T1218) -- Accessing credentials -- Brute force (T1110) -- OS credential dumping (T1003) -- Steal or forge Kerberos tickets (T1558) -- Moving laterally -- Exploiting remote services (T1210) -- Remote services (T1021) -- Using alternate authentication material (T1550) -- Collecting and exfiltrating data -- Data from local system (T1005) -- Data from network shared drives (T1039) -- Email collection (T1114) -- Archive collected data (T1560) -- Exfiltration over web service (T1567) -- Automated exfiltration (T1020) -- Ransomware deployment -- Inhibit system recovery (T1490) -- Data encrypted for impact (T1490) -- Summary -- Chapter 6: Collecting Ransomware-Related Cyber Threat Intelligence -- Threat research reports -- Community -- Threat actors -- Summary -- Section 3: Practical Incident Response -- Chapter 7: Digital Forensic Artifacts and Their Main Sources -- Volatile memory collection and analysis -- Non-volatile data collection -- Master file table -- Prefetch files -- LNK files -- Jump lists -- SRUM -- Web browsers -- Windows Registry -- Windows event logs -- Other log sources -- Summary -- Chapter 8: Investigating Initial Access Techniques -- Collecting data sources for an external remote service abuse investigation -- Investigating an RDP brute-force attack -- Collecting data sources for a phishing attack investigation…”
Libro electrónico -
7434Publicado 2023Tabla de Contenidos: “…Part Three: Growing creative-destructive alignment (2017-present) -- The new international competition in green technologies and domestic environmental problems -- The creative and destructive elements of the third Five-Year Plan for Green Growth (2019-2023) -- The Second Five-Year Master Plan for smart grids -- Smart cities: National pilot smart cities -- Hybridized industrial ecosystems -- Destructive ambitions in action: Korea's efforts to phase out coal -- Concluding remarks -- 7 Creative-Destruction in China's Strong and Smart Grid Initiatives: The Shift to Ultra-High Voltage -- The pattern -- The puzzle -- China's electrification strategy -- Part One: The developmental origins of China's `strong and smart' grid focus (1990s-2006) -- Part Two: Developmental-environmentalism and the emergent greening of China's electric power grid (2007-2015) -- The shift to a UHV grid -- Executing the UHV strategic shift -- Part Three: Growing creative-destructive alignment (2015-present) -- Creating a hybridized industrial ecosystem for the grid: The building of an electric power equipment industry in China -- The full flowering of creative-destructive alignment: Internationalization of State Grid Corporation of China and the Chinese power industry -- Concluding remarks -- 8 Drivers and Dynamics of Northeast Asia's Green Energy Shift: A Comparative Strategic Analysis -- East Asian approaches to the green energy transition -- Grid hypermodernization -- Greening of transport: The shift to electric vehicles -- Dramatic incursion by Northeast Asian economies: Leapfrogging strategy -- Developmental environmentalism in action -- Aspect One: Developmental environmentalism as mindset and ambition driving the green energy transition -- Aspect Two: Developmental environmentalism as legitimation strategy…”
Libro electrónico -
7435Publicado 2023Tabla de Contenidos: “…Understanding the Player scene -- Gauging the Asteroid scene -- Unraveling the quest system -- Breaking down the World scene -- Logging the player in to the server -- Authenticating players -- Syncing the World scenes -- Separating server and client responsibilities -- Shooting bullets on all instances -- Calculating an asteroid's damage -- Storing and retrieving data on the server -- Implementing the quest system's client side -- Implementing the quest system's server side -- Summary -- Part 3: Optimizing the Online Experience -- Chapter 10: Debugging and Profiling the Network -- Technical requirements -- Introducing Godot's Debugger -- Mastering the Stack Trace tab -- Debugging with the Errors tab -- Exploring the Profiler tab -- Exploring the Visual Profiler tab -- Exploring the Monitors tab -- Getting to know the Video RAM tab -- Grasping the Misc tab -- Understanding the Network Profiler -- Identifying the project's bottlenecks -- Using the Network Profiler -- Using the Monitors tab -- Summary -- Chapter 11: Optimizing Data Requests -- Technical requirements -- Understanding network resources -- Decreasing the requests count -- Reducing the weapon fire count -- Decreasing Asteroid's syncing count -- Compressing data with the ENetConnection class -- Summary -- Chapter 12: Implementing Lag Compensation -- Technical requirements -- Introducing lag issues -- Dealing with unreliable packets -- Common compensation techniques -- Implementing server-side motion -- Bridging the gaps with interpolation -- Playing ahead with prediction -- Gazing into the future with extrapolation -- Summary -- Chapter 13: Caching Data to Decrease Bandwidth -- Technical requirements -- Understanding caching -- Setting up the HTTPRequest node -- Understanding the HTTP protocol -- Setting up the scenes and database -- Implementing texture caching…”
Libro electrónico -
7436Publicado 2024Tabla de Contenidos: “…Understanding hidden sources -- Diving into the deep and dark web -- Let's make sure we understand the internet -- Harvesting more with theHarvester -- Shodan -- Automating OSINT collection and analysis -- Summary -- Chapter 4: Exploring the Unknown - How Discovery Tools Reveal Hidden Information -- Introduction to discovery tools -- Unlocking network secrets -- Domain and IP address analysis -- Understanding the DNA of WHOIS - Its definition and purpose -- Applicability - Not just domains but IP blocks too -- The online magnifying glasses - Popular WHOIS lookup platforms -- Finding the connections -- The darker side - When attackers use WHOIS -- DNS and IP analysis - Connecting domains to infrastructure -- Traceroute and network mapping - Navigating the vast cyber seas -- Website reconnaissance - Mastering the unseen layers -- Web page scraping and analysis -- Document and metadata analysis -- Identifying hidden information in documents and files -- Analyzing document contents for valuable clues -- OSINT data visualization -- Tools and techniques for visualizing OSINT data -- Best practices for using discovery tools -- Summary -- Chapter 5: From Recon-ng to Trace Labs - A Tour of the Best Open Source Intelligence Tools -- Recon-ng - A powerful OSINT framework -- Running modules and gathering information with Recon-ng -- Maltego - Visualizing OSINT data and connections -- Getting started with Maltego for OSINT investigations -- Discovering the infrastructure -- Shodan - The search engine for IoT -- Getting started with Shodan -- Using Shodan's API -- Trace Labs - A powerful OS designed just for OSINT -- Overview of the Aircrack-ng suite -- Airmon-ng -- Airodump-ng -- Aireplay-ng -- Aircrack-ng -- Airbase-ng -- Airgraph-ng -- Finding hidden networks -- Additional open source OSINT tools -- SpiderFoot -- Twint -- Some final thoughts on tools…”
Libro electrónico -
7437por Carr, OliviaTabla de Contenidos: “…-- Your journey will look different -- Being comfortable on your journey -- Chapter 9 Mastering your mindset: Overcoming obstacles and unleashing your full potential -- So what is a growth mindset? …”
Publicado 2023
Libro electrónico -
7438Publicado 2023Tabla de Contenidos: “…4.4.4.1 Continuous Learning for Continuous Strategic Change -- 4.4.4.2 Strategic Kaizen as a Continuous Source of Training Needs -- 4.4.5 Put Learning into the Synchronous Profitable Operations -- 4.4.6 Deliverables and Completion Criteria: Chronological Targets and Annual Strategic Kaizen Master Plan -- 4.5 Conclusion -- References -- Chapter 5 Implementation and Management of Strategic Kaizen -- 5.1 Overview -- 5.1.1 The Stake: Annual Strategic Kaizen Execution, Control, and Reinforcement -- 5.1.2 The Main Purposes -- 5.1.2.1 Put the Annual Strategic Kaizen Plans Into Action -- 5.1.2.2 Maintaining Momentum -- 5.2 Sixth Process: Implementing Feasible Strategic Kaizen Projects -- 5.2.1 Applying Structured Meetings -- 5.2.1.1 Organizing Strategic Kaizen Meetings -- 5.2.1.2 The Mechanism for Early Warning of Problems -- 5.2.2 The Main Activities for Each Strategic Kaizen Project Implementation -- 5.2.3 Concurrent Control for Each Strategic Kaizen -- 5.2.4 Deliverables and Completion Criteria: The Intermediate and Final Status of Each Strategic Kaizen -- 5.3 Seventh Process: Follow-Up Management of Strategic Kaizen -- 5.3.1 Formal Assessment Process -- 5.3.2 Follow-Up of Each Strategic Kaizen Implementation -- 5.3.2.1 Standardization: A New Standard vs. …”
Libro electrónico -
7439Publicado 2016“…The Bruges-born poet-priest Guido Gezelle (1830–1899) is generally considered one of the masters of nineteenth-century European lyric poetry. …”
Libro electrónico -
7440El portafolio del profesorado en educación superior uso y experiencias en el contexto iberoamericanoPublicado 2021Tabla de Contenidos: “….) -- INTRODUCCIÓN -- DESCRIPCIÓN DEL CONTEXTO EDUCATIVO -- QUÉ ENTENDEMOS POR PORTAFOLIO DIGITAL DOCENTE -- EL PORTAFOLIO DIGITAL DOCENTE EN EL PROGRAMA DE MÁSTER -- LA TUTORIZACIÓN EN LÍNEA DEL PORTAFOLIO DIGITAL: ACOMPAÑAR AL DOCENTE EN (...) -- RETOS Y RECOMENDACIONES -- REFERENCIAS -- CAPÍTULO 4 REPENSANDO LA VALORACIÓN DEL TRABAJO ACADÉMICO DE EXCELENCIA: USOS Y (...) -- INTRODUCCIÓN -- MARCO CONCEPTUAL: PORTAFOLIO DE DOCENCIA Y PORTAFOLIO ACADÉMICO -- MARCO INSTITUCIONAL DE IMPLEMENTACIÓN: EL PORTAFOLIO COMO PROTOCOLO DE (...) -- ESTRATEGIA METODOLÓGICA DEL ESTUDIO -- MECANISMOS, CRITERIOS Y TENSIONES PARA VALORAR EL TRABAJO ACADÉMICO -- PERSPECTIVAS FUTURAS Y LECCIONES APRENDIDAS PARA EL USO Y LA APROPIACIÓN DEL (...) -- REFERENCIAS -- CAPÍTULO 5 EXPERIENCIAS EN LA IMPLEMENTACIÓN DEL PORTAFOLIO DOCENTE COMO (...) -- BREVE PRESENTACIÓN INSTITUCIONAL -- EL PORTAFOLIO COMO INSTRUMENTO DE EVALUACIÓN FORMATIVA Y SUMATIVA -- MOTIVACIÓN PARA LA IMPLEMENTACIÓN -- DESCRIPCIÓN Y REFLEXIÓN ACERCA DEL MODELO DE PORTAFOLIO IMPLEMENTADO -- RETOS CON RESPECTO A LA IMPLEMENTACIÓN DEL PORTAFOLIO -- PROCESO DE IMPLEMENTACIÓN Y GESTIÓN DEL CAMBIO -- PERSPECTIVAS FUTURAS Y RECOMENDACIONES -- CONCLUSIONES -- REFERENCIAS -- CAPÍTULO 6 EL PORTAFOLIO DOCENTE: UNA ESTRATEGIA DE REFLEXIÓN PARA LA (...) -- INTRODUCCIÓN -- CONCEPTUALIZACIÓN -- OBJETIVOS -- CARACTERIZACIÓN -- TIPOS DE PORTAFOLIOS -- FASES -- LA VINCULACIÓN ENTRE EL PORTAFOLIOS Y EL DESARROLLO DE LA COMPETENCIA DE (...) -- UNA EXPERIENCIA EN LA FORMACIÓN DE MAESTROS -- PERSPECTIVAS FUTURAS Y RECOMENDACIONES -- REFERENCIAS -- GUÍA PARA EL PROFESORADO QUE SE INICIA EN LA METODOLOGÍA DEL PORTAFOLIO DOCENTE -- PRESENTACIÓN -- DE ACTIVIDADES -- GUÍA -- REFERENCIAS -- CONCLUSIONES -- REFERENCIAS…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico