Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Derecho 1,370
- Law and legislation 856
- Historia 831
- Law 820
- Procedimiento legal 527
- Legislació 506
- History 496
- Legal status, laws, etc 455
- Legislación 452
- Estudio y enseñanza (Primaria) 436
- Medicina legal 423
- Taxation 344
- Derecho civil 339
- legislación 325
- Aspectes legals 306
- Derecho y legislación 300
- Filosofía 299
- Dret i legislació 296
- Derecho penal 287
- Dret 282
- Situació legal, lleis, etc 268
- Psicología 232
- Politics and government 212
- Psicología legal 208
- Situació legal 207
- Psychology 206
- Estudio y enseñanza (Secundaria) 204
- Derecho administrativo 194
- Derecho mercantil 181
- Derecho constitucional 180
-
58461Publicado 2019Tabla de Contenidos: “…14.1 Introduction 347 -- 14.2 Data-Driven Intelligent Transportation Systems 348 -- 14.3 Mission-Critical Computing Requirements of Smart Transportation Applications 351 -- 14.4 Fog Computing for Smart Transportation Applications 354 -- 14.5 Case Study: Intelligent Traffic Lights Management (ITLM) System 359 -- 14.6 Fog Orchestration Challenges and Future Directions 362 -- 14.7 Future Research Directions 364 -- 14.8 Conclusions 369 -- References 370 -- 15 Testing Perspectives of Fog-Based IoT Applications 373 / Priyanka Chawla and Rohit Chawla -- 15.1 Introduction 373 -- 15.2 Background 374 -- 15.3 Testing Perspectives 376 -- 15.4 Future Research Directions 393 -- 15.5 Conclusions 405 -- References 406 -- 16 Legal Aspects of Operating IoT Applications in the Fog 411 / G. …”
Libro electrónico -
58462Publicado 2017Tabla de Contenidos: “…-- 2.2 Elemente viraler Methoden -- 2.3 Gutscheinkonzepte -- Kapitel 3: Guerilla-Marketing -- 3.1 Das Wesen des Guerilla-Marketings -- 3.2 Virtuelle Identitäten und Fallstricke -- 3.3 Die Erfolgskontrolle ist nicht einfach -- Kapitel 4: Newsletter -- 4.1 Die »Ja-ich-will«-Schwelle sicher überwinden -- 4.2 Ohne Konzept keine Leser -- 4.3 Erfolgskontrolle: Verschicken kann jeder - aber wer wird auch gelesen? -- 4.4 Wie kommt man legal an Abonnenten? -- Kapitel 5: Affiliate Marketing -- 5.1 Die Vergütungsmodelle -- 5.2 Die Netzwerke und Plattformen für Affiliate Marketing -- 5.3 Licht und Schatten -- Kapitel 6: Kundenbindung durch Weblogs und RSS-Feeds -- 6.1 Was ist ein Weblog? …”
Libro electrónico -
58463Publicado 2010Tabla de Contenidos: “…Cover -- Contents -- About the Authors -- Preface -- Unit I: Thinking Conceptually about Politics -- Chapter 1: Liberty -- 1.1 Meaning and Nature of Liberty -- 1.2 Negative Liberty -- 1.3 Positive Liberty -- 1.4 Conclusion -- Suggested Questions -- Bibliography -- Chapter 2: Equality -- 2.1 Meaning and Significance of Equality -- 2.2 Foundational Equality -- 2.2.1 Fundamental Equality of Persons -- 2.2.2 Equality of Opportunity -- 2.2.3 Equality of Condition -- 2.2.4 Equality of Outcome -- 2.3 Distributional Equality -- 2.3.1 Equality of Welfare -- 2.3.2 Equality of Resources -- 2.4 Equality of Capability -- 2.5 Conclusion -- Suggested Questions -- Bibliography -- Chapter 3: Justice -- 3.1 The Concept -- 3.2 Core Elements of Justice -- 3.2.1 Non-Arbitrariness -- 3.2.2 Consistency -- 3.2.3 Relevance -- 3.2.4 Proportion -- 3.2.5 Procedure -- 3.3 Justice as an Ethical Principle -- 3.3.1 Distributive Justice -- 3.3.1.1 Justice as Equality (Egalitarianism) -- 3.3.1.2 Justice Based on Contribution (Capitalist Justice) -- 3.3.1.3 Justice Based on Needs and Abilities (Socialism) -- 3.3.1.4 Justice as Freedom (Libertarianism) -- 3.3.1.5 Justice as Fairness -- 3.3.2 Retributive Justice -- 3.3.3 Compensatory Justice -- 3.4 Rawls' Theory of Justice as Fairness -- 3.4.1 Rawls' Method -- 3.4.2 Rawls' Principles of Justice -- 3.4.2.1 Principle of Equal Liberty -- 3.4.2.2 The Difference Principle -- 3.4.3 The Principle of Fair Equality of Opportunity -- 3.4.4 Critical Evaluation of Rawls' Theory -- 3.5 Distributive Justice and Business -- 3.6 Conclusion -- Suggested Questions -- Bibliography -- Chapter 4: Rights -- 4.1 Meaning and Nature of Rights -- 4.2 Basis Of Rights -- 4.2.1 Legal Rights -- 4.2.2 Moral Rights -- 4.2.3 Negative and Positive Rights -- 4.2.4 Contractual Rights -- 4.2.5 Natural Rights and Human Rights -- 4.3 Human Rights and the Corporate World…”
Libro electrónico -
58464Publicado 2020Tabla de Contenidos: “…; Challenges versus hindrances at work ; Practicing hardiness in the legal profession ; Putting your hardiness to work --…”
Libro electrónico -
58465por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…How migrants are filling employment gaps in long-term care -- Share of foreign-born workers -- Legal channels for recruitment and recruitment campaigns -- 4.3.2. …”
Publicado 2023
Libro electrónico -
58466Publicado 2020“…This edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation. …”
Libro electrónico -
58467Publicado 2023Tabla de Contenidos: “…Understanding BERT -- Describing how BERTopic works -- BERT - word embeddings -- UMAP - reduce the dimensionality of embeddings -- HDBSCAN - cluster documents -- c-TFIDF - create a topic representation -- Maximal Marginal Relevance -- Building a BERTopic model -- Loading the data - no text preprocessing -- Modeling -- Reviewing the results of BERTopic -- Getting the topic information -- Inspecting the keywords of a single topic -- Getting document information -- Getting representative documents -- Visualizing the BERTopic model -- Visualizing topics -- Visualizing the hierarchy of topics -- Visualizing the top words of topics -- Visualizing on a heatmap -- Predicting new documents -- Using the modular property of BERTopic -- Word embeddings -- Dimensionality reduction -- Clustering -- Comparing BERTopic with LDA -- Approach -- Word embeddings -- Text preprocessing -- Language understanding -- Topic clarity -- Determination of the number of topics -- Determination of word significance in a topic -- Summary -- Questions -- References -- Chapter 15: Real-World Use Cases -- Word2Vec for medical fraud detection -- Background -- Questions -- NLP solution -- Takeaways -- Background -- Questions -- NLP solution -- Takeaways -- Background -- Questions -- NLP solution -- Takeaways -- Comparing LDA/NMF/BERTopic on Twitter/X posts -- Background -- Questions -- NLP solution -- Takeaways -- Interpretable text classification from electronic health records -- Background -- Questions -- NLP solution -- Takeaways -- BERTopic for legal documents -- Background -- Questions -- NLP solution -- Takeaways -- Word2Vec for 10-K financial documents to the SEC -- Background -- Questions -- NLP solution -- Takeaways -- Summary -- References -- Assessments -- Chapter 1 - Introduction to NLP -- Chapter 2 - Text Representation -- Chapter 3 - Text Wrangling and Preprocessing…”
Libro electrónico -
58468por Lahiri, IsitaTabla de Contenidos: “…2.1 Converging Forces Favourably -- 2.2 Marketing Environment: Concept -- 2.3 Need of Environmental Analysis -- 2.4 Types of Environments -- 2.5 Micro Environment -- 2.6 Proximate Macro Environment -- 2.6.1 Suppliers -- 2.6.2 Intermediaries -- 2.6.3 Public -- 2.6.4 Competitor -- 2.7 General Macro Environment -- 2.7.1 Demographic Environment -- 2.7.2 Economic Environment -- 2.7.3 Technological Environment -- 2.7.4 Socio-Cultural Environment -- 2.7.5 Political Environment -- 2.7.6 Legal Environment -- 2.7.7 Ecological Environment -- 2.8 Techniques for Environmental Scanning -- Summary -- Key Words -- Students' Ready Reckoner -- Review Questions -- Chapter 3: Segmenting, Targeting and Positioning: Reaching Consumers Efficiently -- 3.1 Shelving Diversified Customers -- 3.2 Market Segmentation: Concept -- 3.3 Rationale for Segmentation -- 3.4 Level of Market Segmentation -- 3.4.1 Mass Marketing -- 3.4.2 Segment Marketing -- 3.4.3 Niche Marketing -- 3.4.4 Local Marketing -- 3.4.5 Individual Marketing -- 3.5 Factors Influencing Choice of Bases for Segmentation -- 3.6 Bases for Segmenting Consumer Market -- 3.6.1 Geographical Variables -- 3.6.2 Demographic Variables -- 3.6.3 Psychographic Variables -- 3.6.4 Behavioural Variables -- 3.7 Bases for Segmenting Industrial Market -- 3.7.1 Demographic Variables -- 3.7.2 Operating Variables -- 3.7.3 Purchasing Variables -- 3.7.4 Situational Variables -- 3.7.5 Personal Characteristics -- 3.8 Patterns of Segmentation -- 3.9 Segmentation Procedure -- 3.10 Factors Determining Effective Segmentation -- 3.11 Market Targeting -- 3.11.1 Meaning of Market Targeting -- 3.11.2 Target Market -- 3.11.3 Strategies for Selecting Target Market -- 3.12 Positioning -- 3.12.1 Concept of Positioning -- 3.12.2 Steps in Positioning -- 3.12.3 Positioning Errors -- 3.12.4 Positioning Strategies -- 3.13 Market Share -- Summary -- Key Words…”
Publicado 2011
Libro electrónico -
58469Publicado 2024Tabla de Contenidos: “…2.9.3 Frameworks and other tools -- 2.10 Ransomware -- 2.10.1 Data loss and ransom -- 2.10.2 Business model - money is the target -- 2.10.3 How to protect yourself - Rule 3-2-1 -- 2.10.4 Geopolitical and legal problem - Corsairs of the twenty-first century ? …”
Libro electrónico -
58470Publicado 2024Tabla de Contenidos: “…2.5.1 Land Cover Classification -- 2.5.2 Vegetation Monitoring -- 2.5.3 Urban Land-Use Classification -- 2.5.4 HSI Remote Sensing -- 2.6 Challenges for Deep Learning Methods for RS Image Processing -- 2.6.1 High Spatial and Spectral Variability -- 2.6.2 Limited Annotated Data -- 2.6.3 Class Imbalance -- 2.6.4 Intra-Class Variability -- 2.6.5 Spectral Mixing and Shadow Effects -- 2.6.6 Sensor Noise and Atmospheric Interference -- 2.6.7 Computational Complexity -- 2.6.8 Adaptability and Generalization -- 2.7 Limitations -- 2.7.1 Dependence on Image Quality -- 2.7.2 Temporal Variability -- 2.7.3 Generalization and Transferability -- 2.7.4 Scalability -- 2.7.5 Interpretability -- 2.7.6 Labeling Challenges -- 2.7.7 Privacy Concerns -- 2.7.8 Legal and Policy Constraints -- 2.8 Conclusion -- 2.8.1 Future Work -- Funding -- References -- Chapter 3 Deep Learning Framework for Face Detection and Recognition for Dark Faces Using VGG19 with Variant of Histogram Equalization -- 3.1 Introduction -- 3.2 Literature Review -- 3.3 Material and Techniques -- 3.3.1 Convolutional Neural Network -- 3.3.2 Histogram Equalization -- 3.3.3 Data Set -- 3.3.4 Proposed Framework -- 3.4 Experiment and Results -- 3.4.1 Evaluation Parameter -- 3.4.2 Experimental Setup -- 3.4.3 Results and Analysis -- 3.5 Conclusion -- References -- Chapter 4 A 3D Method for Combining Geometric Verification and Volume Reconstruction in a Photo Tourism System -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 Method -- 4.3.1 Processing -- 4.3.2 Feature Extraction -- 4.3.3 Feature Matching -- 4.3.4 Geometric Verification -- 4.3.5 Volumetric Reconstruction -- 4.3.6 Triangulation -- 4.3.7 Bundle Adjustment -- 4.4 Experiments -- 4.4.1 Data Set Description -- 4.5 Results and Analysis -- 4.6 Conclusion -- Acknowledgments -- References…”
Libro electrónico -
58471por Cervantes Saavedra, Miguel de, 1547-1616
Publicado 1862Red de Bibliotecas de la Diócesis de Córdoba (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Pública Episcopal del Seminario de Barcelona, Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca Central de Capuchinos de España, Biblioteca Diocesana Bilbao, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Universidad de Deusto, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Universitat Ramon Llull)Libro -
58472Publicado 2016Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Universidad Loyola - Universidad Loyola Granada)Libro
-
58473Publicado 2017Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Diocesana de Salamanca, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro
-
58474por Abbagnano, Nicola
Publicado 1996Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca Diocesana de Salamanca, Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Central de Capuchinos de España, Biblioteca Universitat Ramon Llull)Libro -
58475Publicado 2004Bibliotecas de la Diócesis de Teruel y Albarracín (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca Central de Capuchinos de España, Biblioteca de la Universidad de Navarra, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro
-
58476Red de Bibliotecas de la Archidiócesis de Granada (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca Universidad de Deusto, Biblioteca de la Conferencia Episcopal Española, Biblioteca Universitat Ramon Llull, Universidad Loyola - Universidad Loyola Granada, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad de Navarra, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de Pastoral Madrid, Biblioteca Diocesana de Salamanca, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Seminario Diocesano de Jaén)Libro
-
58477Publicado 2015Red de bibliotecas Iglesia Navarra (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad Pontificia de Salamanca, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca de la Universidad de Navarra, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca de la Conferencia Episcopal Española, Biblioteca Central de Capuchinos de España, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada, Biblioteca del Seminario Diocesano de Jaén)Libro
-
58478Publicado 2018Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de Pastoral Madrid, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Universitat Ramon Llull, Biblioteca Seminario Metropolitano de Oviedo, Biblioteca de la Universidad de Navarra, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca de la Conferencia Episcopal Española)Libro
-
58479por Vanderburg, Eric A.Tabla de Contenidos: “…Maintenance Automation -- Monitoring Techniques -- Collector Protocols and Methods -- Tagging -- Log Analysis -- Baselines -- Thresholds -- Trending -- Automated Event Responses -- Log Scrubbing -- Verification of Continuous Monitoring Activities -- Management Tools -- Chapter Review -- Questions -- Answers -- Chapter 11 Security in the Cloud -- Data Security -- Encryption -- Public Key Infrastructure -- Encryption Protocols -- Tunneling Protocols -- Ciphers -- Storage Security -- Protected Backups -- Network Security -- Segmentation -- Firewall -- DDoS Protection -- Packet Capture -- Network Flow -- IDS/IPS -- Packet Broker -- APIs -- Effects of Cloud Service Models on Security Implementation -- Endpoint Protection -- Host-Based Firewall -- Antivirus/Antimalware -- Endpoint Detection and Response -- Data Loss Prevention -- Exercise 11-1: Creating a DLP Policy for Office 365 -- NAC -- Hardening -- Application Whitelisting -- Impact of Security Tools to Systems and Services -- Access Control -- Identification -- Authentication -- Authorization -- Single Sign-On -- Federation -- Access Control Protocols -- Access Control Methodologies -- Multifactor Authentication -- Chapter Review -- Questions -- Answers -- Chapter 12 Security Best Practices -- Cloud Security Engineering -- Implementing Layered Security -- Protecting Against Availability Attacks -- Least Privilege -- Separation of Duties -- Security Automation -- Security Governance and Strategy -- Developing Company Security Policies -- Account Management Policies -- Documenting Security Procedures -- Assessment and Auditing -- Leveraging Established Industry Standards and Regulations -- Applying Platform-Specific Security Standards -- Data Classification -- Legal Holds -- Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365 -- Keeping Employees and Tools Up to Date…”
Publicado 2021
Libro electrónico -
58480Publicado 2023Tabla de Contenidos: “…Taobao Creates a Market -- C. Taobao's Private Legal System -- V. Taobao and the Evolution of Federalism, Chinese Style: Recentralization -- A. …”
Libro electrónico