Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 718
- History 691
- Society & social sciences 408
- United States 396
- Management 359
- Research 327
- Social aspects 327
- Humanities 319
- Law, Politics & Government 315
- Engineering & Applied Sciences 275
- Filosofía 269
- Prevention 264
- Català 261
- Development 244
- Leadership 238
- Politics and government 233
- Religion 228
- Government policy 217
- Església Catòlica 213
- Philosophy 209
- Ús terapèutic 206
- Computer Science 202
- Law and legislation 196
- Ús 189
- Medical care 186
- Política y gobierno 186
- Law - Non-U.S 181
- Finance 180
- Psychological aspects 177
- Technological innovations 177
-
24341Publicado 2025Libro electrónico
-
24342por Cumming, GeoffTabla de Contenidos: “…Two Models for Meta-Analysis: Fixed Effect and Random Effects -- Quiz 9.1 -- Moderator Analysis -- What Meta-Analysis Can Give Us -- The Problem of Publication Bias -- Quiz 9.2 -- Cohen's d for Meta-Analysis -- Steps in a Large Meta-Analysis -- Meta-Analysis Can Change the World -- Meta-Analytic Thinking -- Quiz 9.3 -- Reporting Your Work -- Take-Home Messages -- End-of-Chapter Exercises -- Answers to Quizzes -- Answers to In-Chapter Exercises -- 10. …”
Publicado 2024
Libro electrónico -
24343
-
24344por Valcàrcel, Josep Antoni, 1720-1792Accés lliure via BiPaDi
Publicado 1765
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
991005268679706719 -
24345
-
24346Publicado 2017Libro electrónico
-
24347Publicado 2017Tabla de Contenidos: “…-- Developing the Ideas -- Chapter 15: What 360s Can Tell Us about Leaders and Potential Leaders -- How Can We Better Assess High Potentials or Emerging Leaders? …”
Libro electrónico -
24348Publicado 2017“…We all communicate, but few of us do it well. From tough presentations to everyday transactions, there is no scenario that cannot be improved with better communication skills. …”
Libro electrónico -
24349Publicado 2022“…Step Change provides a proven formula for change, both personal and organisational, which allows us to know where we are on the Change Wheel andwhat to expect from each step, including what it looks and feels like at each step. …”
Libro electrónico -
24350Publicado 2023Tabla de Contenidos: “…Evaluating the integral -- Case 3: Distinct quadratic factors -- Setting up partial fractions -- Solving for unknowns A, B, and C -- Evaluating the integral -- Case 4: Repeated quadratic factors -- Setting up partial fractions -- Solving for unknowns A, B, C, and D -- Evaluating the integral -- Beyond the Four Cases: Knowing How to Set Up Any Partial Fraction -- Integrating Improper Rationals -- Distinguishing proper and improper rational expressions -- Trying out an example -- Part 5 Applications of Integrals -- Chapter 12 Forging into New Areas: Solving Area Problems -- Breaking Us in Two -- Improper Integrals -- Getting horizontal -- Going vertical -- Handling asymptotic limits of integration -- Piecing together discontinuous integrands -- Finding the Unsigned Area of Shaded Regions on the xy-Graph -- Finding unsigned area when a region is separated horizontally -- Crossing the line to find unsigned area -- Calculating the area under more than one function -- Measuring a single shaded region between two functions -- Finding the area of two or more shaded regions between two functions -- The Mean Value Theorem for Integrals -- Calculating Arc Length -- Chapter 13 Pump Up the Volume: Using Calculus to Solve 3-D Problems -- Slicing Your Way to Success -- Finding the volume of a solid with congruent cross sections -- Finding the volume of a solid with similar cross sections -- Measuring the volume of a pyramid -- Measuring the volume of a weird solid -- Turning a Problem on Its Side -- Two Revolutionary Problems -- Solidifying your understanding of solids of revolution -- Skimming the surface of revolution -- Finding the Space Between -- Playing the Shell Game -- Peeling and measuring a can of soup -- Using the shell method without inverses -- Knowing When and How to Solve 3-D Problems -- Chapter 14 What's So Different about Differential Equations?…”
Libro electrónico -
24351por El-Ali, LeenaTabla de Contenidos: “…The Pushback of Alleged hadith on Women's Clothing: The Modesty-Redefined and Faux-fitna Combo -- Colour Is Good -- Chapter 17: Segregation: There Is No Restriction on Men and Women Mingling -- Extending the "Elite" Rules Applicable Only to the Prophet's Wives to all Women, While Re-interpreting Them -- Historical Evidence of Men and Women Mingling Naturally -- Chapter 18: Witnesses: A Woman's Testimony Is Worth the Same as a Man's, Except in Two Cases Where It May Count for More or Less -- Qur'anic Verses on Giving Testimony -- Part IV: AT A GLANCE: Some Inconvenient Truths -- Clothes Should be Beautiful, Practical and Cover People's Private Parts -- There Is No Mention of Women Needing to "Stay at Home" or Apart -- A Woman's Testimony Is Equal to a Man's -- Part V: Carnal Matters -- Introduction -- Chapter 19: Sexual Misconduct: What the Qur'an Tells Us about Pre-Marital vs Extra-Marital Sex -- Qur'anic Verses on Sex Outside Marriage -- The Pushback of Jurists on "Light" Penalties for Sexual Misconduct: But Some Verses in the Qur'an Cancel Out Others! …”
Publicado 2022
Libro electrónico -
24352Publicado 2022“…Written by the co-founder of UXReactor, the fastest growing specialized UX firm in the US, this book dozens of practical UX tools."--…”
Libro electrónico -
24353por OECDTabla de Contenidos: “…Issue 5: Success factors -- Issue 6: Contribution of the policy to inclusive entrepreneurship objectives -- Lessons for Denmark -- Recommendations for Denmark based on the US case -- United Kingdom - Energy Systems Catapult -- Overview -- Issue 1: How the Energy Launchpad works with start-ups and scale-ups -- Issue 2: Infrastructure, pilots and testing -- Issue 3: Ownership of IP -- Issue 4: Involving start-ups and scale-ups in regulation design -- Issue 5: Diversity -- Lessons for Denmark -- Recommendations for Denmark based on the United Kingdom case -- References -- Notes -- 5. …”
Publicado 2022
Libro electrónico -
24354Publicado 2023Tabla de Contenidos: “…Security in serverless architectures -- Security observability -- Compliance auditing -- Threat modeling and risk assessment -- Incident response -- Security training and culture -- Continuous learning and improvement - the DevSecOps mindset -- The role of automation in DevSecOps -- The importance of collaboration in DevSecOps -- The power of open source in DevSecOps -- Future trends - the evolution of DevSecOps -- Summary -- Quiz -- Further readings -- Part 3: Legal, Compliance, and Vendor Management -- Chapter 9: Legal and Compliance -- Overview -- Comprehending privacy in the cloud -- The importance of privacy in the cloud-native landscape -- The CCPA and its implications for cloud-native -- Other significant US privacy laws and their implications for cloud-native -- Audit processes, methodologies, and cloud-native adoption -- Importance of audit processes and methodologies in cloud-native adoption -- Common audit processes and methodologies -- Laws, regulations, and standards -- The CFAA and its implications for cloud-native software security -- The FTCA and its implications for cloud-native software security -- Overview of compliance standards and their implications for cloud-native software security -- Case studies - incidents related to standards and their implications for security engineers -- Summary -- Quiz -- Further readings -- Chapter 10: Cloud Native Vendor Management and Security Certifications -- Security policy framework -- Understanding cloud vendor risks -- Understanding security policy frameworks -- Implementing security policy frameworks with cloud vendors -- Effective security policy framework in a cloud environment -- Best practices for implementing a security policy framework with cloud vendors -- Government cloud standards and vendor certifications -- Industry cloud standards…”
Libro electrónico -
24355Publicado 2025Tabla de Contenidos: “…SECURING COMMUNICATIONS -- The Favored Operating System: Linux -- Step 1: Let Us Get Secure: Encrypting Files and Using Secure Shell -- Gnu Privacy Guard -- Encrypting and Decrypting Using GNU Privacy Guard -- Secure Shell Access to Servers -- Moving Files Securely -- Exercise for the Reader -- 4. …”
Libro electrónico -
24356Publicado 1990Libro electrónico
-
24357Publicado 2005Tabla de Contenidos: “…-- Prerequisites-What Do You Need Before You Start? -- About Us -- How to Use This Book -- Conventions Used in This Book -- Safari® Enabled -- Acknowledgments -- Chapter 1. …”
Libro electrónico -
24358Publicado 2001Tabla de Contenidos: “…Intro -- Table of Contents -- Preface -- The Audience for This Book -- Organization of the Material -- Level of Description -- Overview of the Book -- Background Information -- Conventions in This Book -- How to Contact Us -- Safari® Enabled -- Acknowledgments -- Introduction -- Linux Versus Other Unix-Like Kernels -- Hardware Dependency -- Linux Versions -- Basic Operating System Concepts -- Multiuser Systems -- Users and Groups -- Processes -- Kernel Architecture -- An Overview of the Unix Filesystem -- Files -- Hard and Soft Links -- File Types -- File Descriptor and Inode -- Access Rights and File Mode -- File-Handling System Calls -- Opening a file -- Accessing an opened file -- Closing a file -- Renaming and deleting a file -- An Overview of Unix Kernels -- The Process/Kernel Model -- Process Implementation -- Reentrant Kernels -- Process Address Space -- Synchronization and Critical Regions -- Kernel preemption disabling -- Interrupt disabling -- Semaphores -- Spin locks -- Avoiding deadlocks -- Signals and Interprocess Communication -- Process Management -- Zombie processes -- Process groups and login sessions -- Memory Management -- Virtual memory -- Random access memory usage -- Kernel Memory Allocator -- Process virtual address space handling -- Caching -- Device Drivers -- Memory Addressing -- Memory Addresses -- Segmentation in Hardware -- Segment Selectors and Segmentation Registers -- Segment Descriptors -- Fast Access to Segment Descriptors -- Segmentation Unit -- Segmentation in Linux -- The Linux GDT -- The Linux LDTs -- Paging in Hardware -- Regular Paging -- Extended Paging -- Hardware Protection Scheme -- An Example of Regular Paging -- The Physical Address Extension (PAE) Paging Mechanism -- Paging for 64-bit Architectures -- Hardware Cache -- Translation Lookaside Buffers (TLB) -- Paging in Linux…”
Libro electrónico -
24359Publicado 2001Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Preface -- Organization -- Code Examples -- Contacting Us -- Acknowledgments -- 1 Introduction to Software Security -- It's All about the Software -- Dealing with Widespread Security Failures -- Bugtraq -- CERT Advisories -- RISKS Digest -- Technical Trends Affecting Software Security -- The 'ilities -- What Is Security? …”
Libro electrónico -
24360por Knight, Gerald“… As one of the most widely used desktop applications ever created, Excel is familiar to just about everyone with a computer and a keyboard. Yet most of us don't know the full extent of what Excel can do, mostly because of its recent growth in power, versatility, and complexity. …”
Publicado 2006
Libro electrónico