Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,912
- Biblia 3,292
- Història 2,476
- Església Catòlica 1,627
- Bíblia 1,431
- Moral cristiana 1,402
- Crítica e interpretación 1,325
- Filosofía 1,296
- Iglesia Católica 1,168
- Sermones 1,121
- Teología 1,117
- Teología dogmática 1,072
- Obres anteriors al 1800 1,053
- Derecho canónico 921
- Congressos 700
- Economía 637
- Derecho 601
- Litúrgia 597
- History 593
- Teologia moral 574
- Biografia 555
- Matemáticas 550
- Teologia 540
- Meditaciones 512
- Espiritualidad 499
- Filosofia 493
- Crítica i interpretació 483
- Medicina 468
- Materiales 464
- Dret canònic 453
-
169281
-
169282
-
169283
-
169284
-
169285
-
169286
-
169287Publicado 1750Red de Bibliotecas de la Archidiócesis de Granada (Otras Fuentes: Biblioteca Seminario Metropolitano de Oviedo, Bibliotecas de la Diócesis de Teruel y Albarracín)Libro
-
169288
-
169289Publicado 2022Tabla de Contenidos: “…Preface -- Acknowledgement -- 1 A Systematic Literature Review on Cyber Security Threats of Industrial Internet of Things 1 Ravi Gedam and Surendra Rahamatkar -- 1.1 Introduction -- 1.2 Background of Industrial Internet of Things -- 1.3 Literature Review -- 1.4 The Proposed Methodology -- 1.5 Experimental Requirements -- 1.6 Conclusion -- 2 Integration of Big Data Analytics Into Cyber-Physical Systems 19 Nandhini R.S. and Ramanathan -- 2.1 Introduction -- 2.2 Big Data Model for Cyber-Physical System -- 2.3 Big Data and Cyber-Physical System Integration -- 2.4 Storage and Communication of Big Data for Cyber-Physical System -- 2.5 Big Data Processing in Cyber-Physical System -- 2.6 Applications of Big Data for Cyber-Physical System -- 2.7 Security and Privacy -- 2.8 Conclusion -- 3 Machine Learning: A Key Towards Smart Cyber-Physical Systems 43 Rashmi Kapoor, Chandragiri Radhacharan and Sung-ho Hur -- 3.1 Introduction -- 3.2 Different Machine Learning Algorithms -- 3.3 ML Use-Case in MATLAB -- 3.4 ML Use-Case in Python -- 3.5 Conclusion -- 4 Precise Risk Assessment and Management 63 Ambika N. -- 4.1 Introduction -- 4.2 Need for Security -- 4.3 Different Kinds of Attacks -- 4.4 Literature Survey -- 4.5 Proposed Work -- 4.6 Conclusion -- 5 A Detailed Review on Security Issues in Layered Architectures and Distributed Denial Service of Attacks Over IoT Environment 85 Rajarajan Ganesarathinam, Muthukumaran Singaraveluand K.N. …”
Libro electrónico -
169290por Rodríguez Campomanes, Pedro, 1723-1803
Publicado 1747Biblioteca Universitat Ramon Llull (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada)Accés lliure
Libro -
169291
-
169292
-
169293por Kingsley-Hughes, Adrian“…Completely updated for Windows Vista and Windows Server 2003 R2, this book is packed with practical examples for today's programmer, Web developer, or system administratorCombines a comprehensive overview of the VBScript technology and associated technologies with sample code at every stage from beginner to advanced userDiscusses the general syntax, functions, keywords, style, error handling, and similar language-specific topics and then moves into an expanded reference section covering the object models in detailPresents advanced coverage on Active Directory Service Interf…”
Publicado 2007
Libro electrónico -
169294
-
169295
-
169296
-
169297
-
169298Publicado 2011“…Take your professional game to the next level—in 100 seconds o r less! People with inborn talent may be good at what they do—but only the mentally tough reach the highest plateaus in their field. …”
Libro electrónico -
169299
-
169300Publicado 2007Libro electrónico