Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 27
- Novela norteamericana 18
- History 17
- RELIGION 13
- Literatura infantil 12
- Teatro español 10
- Computer security 9
- Documentales 9
- Literatura 9
- Animales 8
- Bible 8
- Cuentos 8
- Development 8
- Social aspects 8
- Video games 8
- Dragones 7
- Dungeons and dragons (Joc) 7
- Història 7
- Jocs de rols 6
- Novela inglesa 6
- Películas cinematográficas 6
- Política y gobierno 6
- Pro Juárez, Miguel Agustín 6
- Programming 6
- Biblia 5
- Crítica e interpretación 5
- Design 5
- Dragones en la literatura 5
- Educación preescolar 5
- En la literatura 5
-
841Publicado 2017Tabla de Contenidos: “…-- AI to Leverage Humans -- Collaboration at Work -- Your Role as Manager -- Working with Data Scientists -- Taking the Right Steps -- Expressing the Value of Marketing -- Know Your Place -- AI for Best Practices -- Notes -- Chapter 10: Mentoring the Machine -- How to Train a Dragon -- What Problem Are You Trying to Solve? -- What Makes a Good Hypothesis? …”
Libro electrónico -
842por Coronado Schwindt, GiselaTabla de Contenidos: “…Borges: reescrituras; El dragón: un símbolo de la literatura fantástica. A propósito de El libro de los seres imaginarios de J. …”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
843Publicado 2006Tabla de Contenidos: “…PEQUEÑA TEORÍA DEL ENCANTAMIENTO3. DRAGONES, MONSTRUOS Y MAGOS; 4. EL D.N.I. DE DON QUIJOTE; 5. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
844por Tamayo Hernádez, YamiletTabla de Contenidos: “….- Constelación de Casiopea; 4.2.2.- Constelación del Dragón; 4.2.3.- Constelación de la Osa Mayor; 4.2.4.- Constelaciones de primavera; Constelación del Cangrejo (Cáncer); Constelación del León; La Virgen (Virgo); Constelación el Boyero; 4.2.5.- Constelaciones de verano; El triángulo de verano…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
845por Melling, BarbaraTabla de Contenidos: “…AÑO NUEVO CHINO; FAROL CHINO; MARIONETAS DE PALO CHINAS; MARIONETA DE DRAGÓN CHINO; 17. LOS TRES CERDITOS; CASAS DE PAJA, PALILLOS Y LADRILLOS; MÁSCARA DE CERDITO; MARIONETAS DE DEDOS DEL CERDITO Y EL LOBO; 18. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
846Publicado 2018Tabla de Contenidos: “…Anonymize Resumes 30 Look Harder Part B: Minding the Gap 32 Stacking the Loop and Mining for Diamonds 35 Set Explicit Diversity Goals, Then Mirror Your Interview Loop to Match 37 Pay Big Bonuses for Employee Referrals of Candidates from Underrepresented Backgrounds 40 Mining for Diamonds and "Custom Grooming" 41 Straight Talk: Lisa Maki 47 Chapter 3 Solution 2: In It to Win It: Supporting Women's Development 49 Reverse Mentoring 49 Increasing Female Visibility 54 Straight Talk: Eugenia Harvey 63 Straight Talk: Maria Hess 64 Chapter 4 Solution 3: Listen Louder 65 Dragon Slayers and Deliberators 66 Star Shooters and Stratosphere Blasters 68 Identical Pitches Yield Biased Results 70 How Men Can Change the Way They Listen 72 Straight Talk: Karen Cooper 80 Straight Talk: Susannah Malarkey 81 Chapter 5 Solution 4: Creating a Family-Forward Culture 83 One: No Meetings before 9:00 a.m. 86 Two: Men Should Take Just as Much Parental Leave as Women 89 Three: Shut Down Email at Night 92 Four: Create Family-Friendly Spaces, Not Bro-Friendly Spaces 96 Straight Talk: Christina Watt 105 Straight Talk: Dr. …”
Libro electrónico -
847Publicado 2016Tabla de Contenidos: “…Efficient RPG UI overlays -- The adventurer's overlay -- A context-sensitive overlay -- Modern floating UI approach -- Balancing the need -- Bring on the GUI -- Laying out the HUD -- Displaying the correct buttons -- Going further -- Summary -- Chapter 10: The Battle Begins -- Designing an interesting battle system -- Leveling up -- Balancing -- Preparing to attack a single enemy -- Beefing up the enemy AI -- The enemy profile/controller -- Updating the Dragon prefab -- Setting up the enemy profile in the code -- Selecting an attack -- Adding a visual effect to attack selection -- Selecting a target -- The selection circle prefab -- Adding selection logic to the EnemyController class -- Attack! …”
Libro electrónico -
848por Careaga Guzmán, Christian“…Sus observaciones y reflexiones sobre la evolución de los valores culturales de las sociedades de los EEUU, la Unión Europea y sobre el despertar industrial y comercial del Imperio del Centro, así como los deseos de homologación internacional del Gran Dragón se materializan ahora en esta reflexión académica. …”
Publicado 2015
Texto completo en Odilo
Otros -
849Publicado 1996Tabla de Contenidos: “…Tiempo -- Manhattan Rain / Carlos Angeles -- Jacaranda Trees / Carlos Angeles -- Crossing 14th St. and Avenue A / Luis Cabalquinto -- Sunday with the Smiths / Luis Cabalquinto -- Dragon / Rene J. Navarro -- An Imaginary Letter to My Twin Sons / Gemino H. …”
Libro -
850por Perez Salomon, OmarTabla de Contenidos: “…2.2- De la Telefonía2.3- Servicios telefónicos; 2.3.1- En La Habana; 2.3.2- Red Telefónica Oficial de la Habana; 2.3.3- Comienzos de las operaciones de la Cuban Telephone Company; 2.3.4- La primera central telefónica automática de La Habana; 2.3.5- Reorganización en la Cuban Telephone Company; 2.3.6- Enlace Telefónico Submarino Cuba - Estados Unidos; 2.3.7- Nace la ITT; 2.3.8- La Radiodifusión comercial por vía telefónica; 2.3.9- Edificio de Águila y Dragones; 2.3.10- Destalles sobre la construcción del nuevo edificio; 2.3.11- Sistema telefónico Cuba - España…”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
851Publicado 2018Tabla de Contenidos: “…BLANCA NIEVES Y LOS SIETE ENANOS -- FIGURA 1.26. DRAGONES DE EL SALADO -- FIGURA 1.27. MANO NEGATIVA EN ROJO SOBRE MAMUT NEGRO. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
852Publicado 2013“…A lo largo de los diversos capítulos de esta obra se contempla la situación política, económica y social del dragón asiático en el momento en que acaba de ascender al poder la quinta generación de líderes chinos. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
853por Knapp, Eric D.Tabla de Contenidos: “…Common Industrial Security Recommendations -- Identification of critical systems -- Network segmentation/isolation of systems -- Defense in depth -- Access control -- Advanced Industrial Security Recommendations -- Security Monitoring -- Policy whitelisting -- Application whitelisting -- Common Misperceptions About Industrial Network Security -- Assumptions made in this book -- Summary -- 3 - Industrial Cybersecurity History and Trends -- The convergence of OT and IT -- Importance of securing industrial networks -- The evolution of the cyber threat -- APTs and weaponized malware -- Industroyer -- Night dragon -- Stuxnet -- TRISIS -- Advanced persistent threats and cyber warfare -- Still to come -- Defending against modern cyber threats -- The insider -- Hacktivism, cybercrime, cyberterrorism, and cyberwar -- Summary -- 4 - Introduction to Industrial Control Systems and Operations -- System assets -- Programmable logic controller -- Ladder diagrams -- Sequential function charts -- Remote terminal unit -- Intelligent electronic device -- Human-machine interface -- Supervisory workstations -- Data historian -- Business information consoles and dashboards -- Other assets -- System operations -- Control loops -- Control processes -- Feedback loops -- Production information management -- Business information management -- Process management -- Safety instrumented systems -- The smart grid -- Network architectures -- Summary -- 5 - Industrial Network Design and Architecture -- Introduction to industrial networking -- Common topologies -- Network segmentation -- Higher layer segmentation -- Physical versus logical segmentation -- Microsegmentation -- Cryptographic microsegmentation -- Network services -- Wireless networks -- Remote access -- Performance considerations -- Latency and jitter -- Bandwidth and throughput…”
Publicado 2024
Libro electrónico -
854Publicado 2016Tabla de Contenidos: “…-- Writing Subroutines -- Try It Out 10-1 -- Subroutine Input and Output -- Try It Out 10-2 -- Nesting Subroutines -- Try It Out 10-3 -- Create a Dragon Game -- Step 1: Open the Startup File -- Step 2: Write the SetUp() Subroutine -- Step 3: Add a Bit of Chance -- Step 4: Let the Player Know What's Going On -- Step 5: Get the Player in the Game with GetChoice() -- Step 6: Process the Player's Choice -- Step 7: Add Motion with MoveKnight() -- Step 8: Shoot Arrows with ShootArrow() -- Step 9: Swing the Sword with StabDragon() -- Step 10: Breathe Fire -- Try It Out 10-4 -- Programming Challenges -- Chapter 11: Event-Driven Programming -- GraphicsWindow Events -- Create Patterns with the MouseDown Event -- Try It Out 11-1 -- Fire Missiles with the KeyDown Event -- Try It Out 11-2 -- Make a Typewriter Using the TextInput Event -- Try It Out 11-3 -- Draw Pictures with the MouseMove Event -- Try It Out 11-4 -- Useful Tips -- Create a Gold Rush Game -- Step 1: Open the Startup File…”
Libro electrónico -
855Publicado 2017Tabla de Contenidos: “…. -- 3:4 Netwatch for SMM -- 3:5 Packet-in-Packet Mitigation Bypass -- 3:6 An RDRAND Backdoor in Bochs -- 3:7 Kosher Firmware for the Nokia 2720 -- 3:8 Tetranglix Boot Sector -- 3:9 Defusing the Qualcomm Dragon -- 3:10 Tales of Python's Encoding -- 3:11 Angecryption -- Chapter 4: Tract de la Société Secrète -- 4:1 Let me tell you a story -- 4:2 Epistle on the Bountiful Seeds of 0Day -- 4:3 This OS is a Boot Sector -- 4:4 Prince of PoC -- 4:5 New Facedancer Framework -- 4:6 Power Glitching Tamagotchi -- 4:7 A Plausibly Deniable Cryptosystem -- 4:8 Hardening Pin Tumbler Locks -- 4:9 Intro to Chip Decapsulation -- 4:10 Forget Not the Humble Timing Attack -- 4:11 This Truecrypt is a PDF -- 4:12 How to Manually Attach a File to a PDF -- 4:13 Ode to ECB -- Chapter 5: Address to the Inhabitants of Earth…”
Libro electrónico -
856Publicado 2015Tabla de Contenidos: “…Security Monitoring -- Policy Whitelisting -- Application Whitelisting -- Common Misperceptions About Industrial Network Security -- Assumptions Made in This Book -- Summary -- Chapter 3 - Industrial Cyber Security History and Trends -- Information in this Chapter -- Importance of Securing Industrial Networks -- The Evolution of the Cyber Threat -- APTs and Weaponized Malware -- Night Dragon -- Stuxnet -- Advanced Persistent Threats and Cyber Warfare -- Still to Come -- Defending Against Modern Cyber Threats -- The Insider -- Hacktivism, Cyber Crime, Cyber Terrorism, and Cyber War -- Summary -- Chapter 4 - Introduction to Industrial Control Systems and Operations -- Information in this Chapter -- System Assets -- Programmable Logic Controller -- Ladder Diagrams -- Sequential Function Charts -- Remote Terminal Unit -- Intelligent Electronic Device -- Human-Machine Interface -- Supervisory Workstations -- Data Historian -- Business Information Consoles and Dashboards -- Other Assets -- System Operations -- Control Loops -- Control Processes -- Feedback Loops -- Production Information Management -- Business Information Management -- Process Management -- Safety Instrumented Systems -- The Smart Grid -- Network Architectures -- Summary -- Chapter 5 - Industrial Network Design and Architecture -- Information in this Chapter -- Introduction to Industrial Networking -- Common Topologies -- Network Segmentation -- Higher Layer Segmentation -- Physical vs. …”
Libro electrónico -
857Publicado 2017Tabla de Contenidos: “…Event-driven architecture and messaging -- Tactical patterns -- Patterns to model the domain -- Entities -- Value objects -- Domain services -- Modules -- Aggregates -- Factories -- Repositories -- Emerging patterns -- Domain events -- Event sourcing -- Other patterns -- Summary -- References and further reading materials -- Chapter 6: Enterprise Architecture Platforms and Tools -- Overview of enterprise architecture frameworks -- Getting started with TOGAF -- Architecture development method (ADM) -- Deliverables, artifacts, and building blocks -- Enterprise continuum -- Architecture repository -- Advantages of using TOGAF -- Limitations of TOGAF -- Zachman framework for enterprise architecture -- Advantages -- Restrictions -- Guidelines for choosing EAF -- Enterprise architecture platforms and tools -- Enterprise Architect from Sparx Systems -- Dragon1 -- ABACUS from avolution software -- Architecture of ABACUS -- Summary -- References -- Chapter 7: Service-Oriented Architecture (SOA) -- Web services and SOA -- Introduction to SOA -- Life cycle of SOA -- Primary characteristics of SOA -- Service interconnectivity with well-defined interfaces -- Standard interfaces and Service level agreements -- Event-driven and messaging -- Flexible -- Evolution -- Principles of SOA -- Standardized service contract -- Service interoperability -- Service abstraction -- Service autonomy -- Service composability -- Service discoverability -- Service loose coupling -- Service reusability -- Service statelessness -- SOA design patterns -- Service messaging -- Message screening -- Agnostic services -- Atomic service transaction -- Authentication broker -- Message origin authentication -- Service façade -- Multiple service contract -- Service callback -- Event-driven messaging -- Service refactoring -- Metadata centralization -- Principles and patterns cross reference…”
Libro electrónico -
858Publicado 2016Tabla de Contenidos: “…ATYPICAL ACCIDENT SCENARIOS -- 3. BLACK SWANS -- 4. DRAGON KINGS -- 5. SMALL THINGS -- 6. CONCLUSIONS -- REFERENCES -- ll - Dynamic Risk Analysis -- 2.1 - Hazard Identification -- 3 - Advanced Technique for Dynamic Hazard Identification -- 1. …”
Libro electrónico -
859por Papantuono, MatteoTabla de Contenidos: “…Las palabras son mágicas: utilizar el lenguaje analógico en las clases -- Dibujar dragones en las nubes -- El lenguaje analógico y los niños -- Evocar sensaciones -- Superar la resistencia y aumentar la colaboración -- Los profesores pueden utilizar el lenguaje analógico para... -- Orientaciones útiles para escoger la analogía correcta -- IV. …”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
860Publicado 2021Tabla de Contenidos: “…Writing Tests -- The Basics of Testing -- Reporting Test Failures -- Setting Up and Tearing Down -- Storing Sample Test Data -- Caching Test Results -- Testing Your Public API -- Use go-cmp to Compare Test Results -- Table Tests -- Checking Your Code Coverage -- Benchmarks -- Stubs in Go -- httptest -- Integration Tests and Build Tags -- Finding Concurrency Problems with the Race Checker -- Wrapping Up -- Chapter 14. Here There Be Dragons: Reflect, Unsafe, and Cgo -- Reflection Lets Us Work with Types at Runtime -- Types, Kinds, and Values -- Making New Values -- Use Reflection to Check If an Interface's Value Is nil -- Use Reflection to Write a Data Marshaler -- Build Functions with Reflection to Automate Repetitive Tasks -- You Can Build Structs with Reflection, but Don't -- Reflection Can't Make Methods -- Only Use Reflection If It's Worthwhile -- unsafe Is Unsafe -- Use unsafe to Convert External Binary Data -- unsafe Strings and Slices -- unsafe Tools -- Cgo Is for Integration, Not Performance -- Wrapping Up -- Chapter 15. …”
Libro electrónico