Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Història 659
- Obres anteriors al 1800 484
- Taxation 430
- Sermons castellans 419
- Bíblia 401
- Església Catòlica 347
- Crítica bíblica 309
- Law and legislation 283
- Sermons 277
- Development 254
- Teologia moral 244
- Engineering & Applied Sciences 225
- Application software 194
- Teologia dogmàtica 189
- Biografia 177
- Comentaris 167
- Derechos humanos 167
- Computer Science 158
- History 158
- Web site development 157
- Mare de Déu 150
- Teologia 150
- Web sites 145
- Design 137
- Historia 133
- Management 132
- Oracions fúnebres 129
- Computer programs 125
- Dret canònic 124
- Fonts 123
-
13481Publicado 2013“…Stephen Jaeger, Eileen Joy, Anna Klosowska, Nicola Masciandaro, Peggy McCracken, Paul Strohm, David Wallace, and Paul Zumthor, among others, have blended the conventions of academic writing with those of fiction, drama, memoir, comedy, polemic, and lyricism, and/or have developed what some would describe as elegant, and arresting (and in some cases, deliciously difficult), prose styles. …”
Libro electrónico -
13482por Bright, Charles D., 1921-2014“…Air Force and other government markets; the mechanics of government procurement—bidding, pricing, buying; difficulties in the commercial airliner business; the ordering of technology and the prevailing “design or die” philosophy; and different systems of production through the years.Special attention is given to major problems such as the industry’s need for diversification and the skyrocketing costs that threaten to make aerospace products uneconomical. The conventional economic concerns of entry into and exit from the industry are treated in depth. …”
Publicado 1978
Libro electrónico -
13483por Bérard-Azzouz, Odile“…Peut-être celle contenue dans la lettre adressée le 13 février 1794, à la Convention, par le député Boissy d’Anglas : « Conservez les monuments des arts, des sciences et de la Raison, ils attestent à la fois et perpétuent les richesses de l’esprit humain ; ils fixent au milieu de vous et naturalisent sur votre territoire le résultat des plus belles conquêtes du génie et des plus profondes méditations de l’étude »…”
Publicado 2020
Electrónico -
13484Publicado 2018“…You will learn from industry standard patterns and practices, and shift from a conventional approach to a modern and efficient software testing approach in C# and JavaScript. …”
Libro electrónico -
13485por Organisation de coopération et de développement économiques.“…La Russie a également signé des conventions sur l’investissement et sur la double imposition avec des pays de l’OCDE ou des pays tiers. …”
Publicado 2004
Libro electrónico -
13486Publicado 2013“…In them he expanded his corrosive social criticism, sparing no one: gods and heroes, religion and religions, philosophy and its various sects, conventional morality, society and its most revered pillars, men and their vanity, irrational superstitions and the use that is made of them by the cunning ... …”
Libro electrónico -
13487Publicado 2017“…What You Will Learn Develop extendable plugins with the use of WordPress features in core modules Develop pluggable modules to extend the core features of WordPress as independent modules Manage permissions for a wide range of content types in web applications based on different user types Follow WordPress coding standards to develop reusable and maintainable code Build and customize themes beyond conventional web layouts Explore the power of core database tables and understand the limitations when designing database tables for large applications Integrate open source modules into WordPress applications to keep up with the latest open source technologies Customize the WordPress admin section and themes to create the look and feel of a typical web application In Detail WordPress is one of the most rapidly expanding markets on the Web. …”
Libro electrónico -
13488por Sinha, Sanjib. author“…You will then dive into classic and modern encryption techniques where you will learn the conventional cryptosystem. In the final chapter you will acquire the skill of exploiting remote Windows and Linux systems and you will learn how to own a target completely. …”
Publicado 2018
Libro electrónico -
13489Publicado 2020“…What you will learn Use the Angular CLI to scaffold, build, and deploy a new Angular application Build components, the basic building blocks of an Angular application Discover techniques to make Angular components interact with each other Understand the different types of templates supported by Angular Create HTTP data services to access APIs and provide data to components Enhance your application's UX with Angular Material Apply best practices and coding conventions to your large-scale web development projects Who this book is for The Angular TypeScript book is for JavaScript and full-stack developers who want to enter the world of frontend development with Angular or migrate to the Angular framework to build professional web applications. …”
Libro electrónico -
13490Publicado 2015“…Data visualization has become increasingly challenging using conventional approaches as datasets become larger and larger, especially with the Big Data evolution. …”
Libro electrónico -
13491Publicado 2015“…If you buy all that, then it follows that the more generations you bring aboard, the tougher it is to collaborate productively. But the conventional wisdom is 100% wrong. It isn’t so complicated–or difficult. …”
Libro electrónico -
13492Publicado 2015“…The book covers most aspects of builds required for conventional JVM-based projects, and when necessary, points you towards the right resources…”
Libro electrónico -
13493Publicado 2013“…In doing so, he explodes the conventional wisdom and identifies the distinct principles practiced by individuals who may or may not be any smarter than the rest of the population but seem to understand instinctively how money is made. …”
Libro electrónico -
13494Publicado 2023“…Master the linear algebra and other mathematical skills you'll need Explore key physics ideas, such as quantum states and uncertainty Review data structures, algorithms, and computing complexity Work with probability and set theory in quantum computing Familiarize yourself with basic quantum theory and formulae Understand quantum entanglement and quantum key distribution Discover how quantum computers are architected and built Explore several leading quantum algorithms Compare quantum and conventional asymmetric algorithms See how quantum computing might break traditional cryptography Discover several approaches to quantum-resistant cryptography Start coding with Q#, Microsoft's quantum programming language Simulate quantum gates and algorithms with QASM If you prefer a multimodal approach to learning, check out the Quantum Computing Fundamentals book by Chuck Easttom!…”
Video -
13495por Anchisi, Annick“…Les analyses sociologiques proposées questionnent la pluralité et la variabilité des processus en jeu dans les interactions du soin et soulignent les règles institutionnelles et leurs incidences sur les organisations domestiques de santé. Les conventions mobilisées font l'objet de renégociations permanentes dont les désordres apparents occultent la recherche des compromis pour prendre en compte l'altérité des références et des normes propres aux différents participants du soin. …”
Publicado 2018
Electrónico -
13496Publicado 2007“…Topics covered include Writing better tests--and writing them faster The four phases of automated tests: fixture setup, exercising the system under test, result verification, and fixture teardown Improving test coverage by isolating software from its environment using Test Stubs and Mock Objects Designing software for greater testability Using test "smells" (including code smells, behavior smells, and project smells) to spot problems and know when and how to eliminate them Refactoring tests for greater simplicity, robustness, and execution speed This book will benefit developers, managers, and testers working with any agile or conventional development process, whether doing test-driven development or writing the tests last. …”
Libro electrónico -
13497Publicado 2010“…., and Executive Producer of “MarketViews.tv” Today, many risk-averse investors simply can’t meet their income needs with conventional bank CDs, money market funds, or bonds. …”
Libro electrónico -
13498Publicado 2008“…The Appels’ approach is remarkably simple and requires only one hour of your time every 3 months, but don’t let that fool you : it draws on state-of-the-art strategies currently being used that really work. www.systemsandforecasts.com www.appelasset.com www.signalert.com If you know what to do, active investing can yield far better returns than “buy-and-hold” investing. But conventional approaches to active investing can be highly complex and time-consuming. …”
Libro electrónico -
13499por Cooper, Chris“…PA-RISC architecture: register set, virtual memory, key instructions, and procedure calling conventions HP-UX kernel organization: hardware-dependent and independent data structures Process and thread management: proc tables, memory management, scheduling, and the complete process/thread lifecycle System-wide memory resources: allocation and mapping to physical memory HP-UX paging and swapping Files and filesystems: traditional UNIX filesystems, HFS, VFS, and dynamic buffer cache I/O and device management: addressing, DMA, interrupts, device files, I/O configuration, device driver assignments, and I/O request pathways Logical Volume Management (LVM): abstracting physical disks from the disk I/O system HP-UX multiprocessing: challenges, data structures, and interfaces Kernel communication services: semaphores, message queues, shared memory, signals, and the kernel "callout" system Signaling in complex threaded environments System initialization, from vmunix to init: running HP-UX on diverse platforms Whether you administer HP-UX, tune it, troubleshoot it, or write kernel modules for it, you'll find HP-UX 11i Internals indispensable. …”
Publicado 2004
Libro electrónico -
13500Publicado 2007“…Coverage includes: Why conventional bug-catching often misses security problems How static analysis can help programmers get security right The critical attributes and algorithms that make or break a static analysis tool 36 techniques for making static analysis more effective on your code More than 70 types of serious security vulnerabilities, with specific solutions Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more Techniques for handling untrusted input Eliminating buffer overflows: tactical and strategic approaches Avoiding errors specific to Web applications, Web services, and Ajax Security-aware logging, debugging, and error/exception handling Creating, maintaining, and sharing secrets and confidential information Detailed tutorials that walk you through the static analysis process “We designed Java so that it could be analyzed statically. …”
Libro electrónico