Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 834
- Història 572
- Cascading style sheets 263
- Design 237
- Web sites 234
- Casas, Bartolomé de las 180
- HTML (Document markup language) 156
- Biografia 145
- Arquitectura 141
- History 138
- Web site development 126
- Engineering & Applied Sciences 120
- Crítica e interpretación 116
- Derecho civil 114
- Biblia 106
- Església Catòlica 102
- Casals, Pau 98
- Música 92
- Religión 82
- Bíblia 80
- Filosofía 74
- Borbón, Casa de 73
- Teatro español 73
- Crítica i interpretació 68
- Rita de Casia 66
- Development 65
- Electrical & Computer Engineering 65
- Telecommunications 63
- Espiritualidad 59
- JavaScript (Computer program language) 58
-
15041
-
15042
-
15043Publicado 2015Tabla de Contenidos: “…Teórico conceptual y de referencia -- Hipótesis de trabajo en la investigación -- Aspectos metodológicos de la investigación -- Tipología de estudios (exploratorio, descriptivo, explicativo e histórico, predictivo casual y evaluativo) -- Conclusiones -- Método de investigación -- Técnica y procedimientos para la captación de información -- Uso y trato de la información -- Índice de contenido -- Bibliografía -- Cronograma -- Presupuesto -- Guía de apoyo para elaborar el trabajo de investigación -- Análisis de los resultados -- Interpretación de los resultados -- Publicación y difusión de los resultados -- El carácter científi co de la investigación -- Ejemplo de un proyecto de un protocolo de tesis -- Capítulo IV. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
15044por Orós Cabello, Juan CarlosTabla de Contenidos: “…EL EVENTO onchange -- EL EVENTO onsubmit -- LOS EVENTOS onfocus Y onblur -- LOS EVENTOS onkeydown, onkeyup Y onkeypress -- EL EVENTO onselect -- LOS EVENTOS onkeydown, onkeyup Y onkeypress -- LOS EVENTOS onmousedown, onmousemove Y onmouseup -- LOS EVENTOS onmove Y onresize -- EL EVENTO onerror -- 10 EXPRESIONES REGULARES -- CREACIÓN DE PATRONES -- El OBJETO RegExp( ) -- El Método exec( ) -- El Método test( ) -- El Método replace( ) -- El Método search( ) -- El Método split( ) -- 11 FORMULARIOS AVANZADOS -- JERARQUÍA DE LOS FORMULARIOS -- INTERCAMBIO ENTRE FORMULARIOS -- VALIDACIÓN DE FORMULARIOS -- Verificar tipo de datos -- Verificar e-mail -- Verificación de fechas -- UTILIDADES PARA FORMULARIOS -- Evitar reenvío de formularios -- Situar el cursor en el primer campo -- Aceptar términos o condiciones -- 12 LAS COOKIES -- QUÉ SON LAS COOKIES -- COOKIES Y JAVASCRIPT -- La función setcookie( ) -- La función getcookie( ) -- La función deletecookie( ) -- EL CARRITO DE LA COMPRA -- El catálogo -- La hoja de pedido -- 13 INTEGRACIÓN JAVASCRIPT & -- FLASH -- VALIDACIÓN XHTML -- ABRIR UN POPUP DESDE FLASH -- INTERCAMBIO DE VARIABLES -- ABRIR VENTANAS ALERT DESDE FLASH -- CONTROLAR UNA PELÍCULA CON FLASH -- 14 INTRODUCCIÓN A JQUERY -- PRIMEROS PASOS -- Mini Galería con jQuery -- Iconos para enlaces -- 15 INTRODUCCIÓN A LAS HOJAS DE ESTILO -- PARA QUÉ SIRVEN LAS HOJAS DE ESTILO -- NIVELES DE LAS CSS -- PROS Y CONTRAS DE LAS HOJAS DE ESTILO -- 16 CASCADING STYLE SHEETS (CSS) -- PRIMEROS PASOS -- LA REGLA @import -- ESTILOS DE ETIQUETA -- HERENCIA -- DEFINICIÓN DE ESTILOS MEDIANTE CLASES -- DEFINICIÓN DE ESTILOS CON ID -- LAS ETIQUETAS DIV Y SPAN -- COMENTARIOS -- UNIDADES DE MEDIDA Y COLOR -- Tipos de valores -- 17 PROPIEDADES DE LAS HOJAS DE ESTILO -- PROPIEDADES DE LAS FUENTES -- font-family -- font-style -- font-variant…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
15045Publicado 2010Tabla de Contenidos: “…García Moreno ; La Campaña del Estrecho y la Batalla del Salado: el final de la intervención norteafricana en la Reconquista / Daniel Jesús García Riol ; Ecos de la toma de Granada en Italia: de nuevo sobre las cartas a Milán y Luca / Raúl González Arévalo - Vol.2 - Los cuidados sanitarios en los hospitales sevillanos: los aportes de la enfermería (siglos XIII-XVI) / María Estela González de Fauve ; Constantina en el siglo XIII / Manuel González Jiménez ; Desastres naturales en la Gobernación de Orihuela durante la Edad Media / José Ramón Hinojosa Montalvo ; Las mozárabes de Toledo y sus iglesias / Ricardo Izquierdo Benito ; Tiempo y persona en la Edad Media / Miguel Angel Ladero Quesada ; Solidaridad interconfesional en tiempo de guerra: la cautividad y redención de Fátima de Almonacid, mudéjar aragonesa, en 1363 / Mario Lafuente Gómez ; La "Memoria de Palos" de Juan de Porras (c. 1500-1501) / José Enrique López de Coca Castañer ; El Pontificado de Plasencia (siglos XII-XIII): aportación al estudio de la Historia Eclesiástica de Extremadura / Gloria Lora Serrano ; Formas de señorialización en el territorio abulense en la Edad Media / Carmelo de Luis López ; De Murgi a El Ejido / María Desamparados Martínez San Pedro ; Cofradías de oficio y actividades suntuarias: el arte de la platería y sus orfebres en la Murcia medieval (ss. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
15046por Lee, Tony T., 1960-Tabla de Contenidos: “…7.7.1 Classical IP over ATM -- 7.7.2 Next Hop Resolution Protocol -- 7.7.3 IP Switch and Cell Switch Router -- 7.7.4 ARIS and Tag Switching -- 7.7.5 Multiprotocol Label Switching -- Appendix 7.A ATM Cell Format -- 7.A.1 ATM Layer -- 7.A.2 Adaptation Layer -- Problems -- 8 Network Traffic Control and Bandwidth Allocation -- 8.1 Fluid-Flow Model: Deterministic Discussion -- 8.2 Fluid-Flow On-Off Source Model: Stochastic Treatment -- 8.3 Traffic Shaping and Policing -- 8.4 Open-Loop Flow Control and Scheduling -- 8.4.1 First-Come-First-Serve Scheduling -- 8.4.2 Fixed-Capacity Assignment -- 8.4.3 Round-Robin Scheduling -- 8.4.4 Weighted Fair Queueing -- 8.4.5 Delay Bound in Weighted Fair Queueing with Leaky-Bucket Access Control -- 8.5 Closed-Loop Flow Control -- Problems -- 9 Packet Switching and Information Transmission -- 9.1 Duality of Switching and Transmission -- 9.2 Parallel Characteristics of Contention and Noise -- 9.2.1 Pseudo Signal-to-Noise Ratio of Packet Switch -- 9.2.2 Clos Network with Random Routing as a Noisy Channel -- 9.3 Clos Network with Deflection Routing -- 9.3.1 Cascaded Clos Network -- 9.3.2 Analysis of Deflection Clos Network -- 9.4 Route Assignments and Error-Correcting Codes -- 9.4.1 Complete Matching in Bipartite Graphs -- 9.4.2 Graphical Codes -- 9.4.3 Route Assignments of Benes Network -- 9.5 Clos Network as Noiseless Channel-Path Switching -- 9.5.1 Capacity Allocation -- 9.5.2 Capacity Matrix Decomposition -- 9.6 Scheduling and Source Coding -- 9.6.1 Smoothness of Scheduling -- 9.6.2 Comparison of Scheduling Algorithms -- 9.6.3 Two-Dimensional Scheduling -- 9.7 Conclusion -- Bibliography…”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
15047Publicado 2017Tabla de Contenidos: “…Control System and Automation -- Contouring-Error Reduction by Combination of Tracking-Error Compensation and Cross- Coupled Control / The Multi-parameter Detection System of Industrial Controller / Mechatronical Dual-Redundancy Steering Gear System in Vehicle / The Vector Control System Design of PMSM Based on DSP Motor Controller / Research on Improvement of Direct Torque Control System for Permanent Magnet Synchronous Motor / Cascade ADRC Based Robust Flight Control with System Potential Uncertainties / A Digital Trigger of Thyristor Rectifier for High Voltage Formed Aluminum Foil Based on DSP / Tcp Congestion Control Strategy Based on Multi-Level Priority Queue / Power Control of Wireless Power Supply System Based on Fuzzy PID Control / Load Scheduling Based on Game Theory with Coupled Constraints / Session 9. …”
Libro electrónico -
15048Publicado 2019Tabla de Contenidos: “…Building a laptop-controlled rover program -- Tracing a square path -- Installing and setting up QT5 -- Setting up QT5 -- Controlling LEDs with GUI buttons -- Creating a QT project -- Dealing with errors -- Controlling a rover using a laptop with QT5 -- Summary -- Questions -- Section 3: Face and Object Recognition Robot -- Chapter 6: Accessing the RPi Camera with OpenCV -- Technical requirements -- Installing OpenCV 4.0.0 on Raspberry Pi -- Uninstalling Wolfram and LibreOffice -- Updating your RPi -- Installing the cmake, image, video, and gtk packages -- Downloading and unzipping OpenCV 4.0 and its contribution repository -- Installing Python -- Compiling and installing OpenCV -- Linking OpenCV to Python -- Enabling and connecting the RPi camera to RPi -- Connecting the RPi camera to RPi -- Mounting the RPi camera on the robot -- Capturing images and video with the RPi camera -- Recording a video with the RPi camera -- Installing the v4l2 driver -- Reading an image using OpenCV -- Summary -- Questions -- Chapter 7: Building an Object-Following Robot with OpenCV -- Technical requirements -- Image processing with OpenCV -- Important functions in OpenCV -- Object recognition using OpenCV -- Capturing the image -- Finding the RGB pixel values -- The object detection program -- The OpenCV camera feed program -- Building an object-following robot -- Ball tracing using moments -- Programming logic -- The ball tracing program -- Setting up the object-following robot -- Object-following robot program -- Summary -- Questions -- Chapter 8: Face Detection and Tracking Using the Haar Classifier -- Technical requirements -- Face detection using the Haar cascade -- Basic working of the Viola-Jones algorithm -- Face-detection program -- Detecting the eyes and smile -- Detecting the eyes -- Eye detection using haarcascade_eye…”
Libro electrónico -
15049por Das, Layla b.Tabla de Contenidos: “…Questions -- Exercise -- 7 Memory and I/O Decoding -- 7.1 Memory Device Pins -- 7.2 Memory Address Decoding -- 7.3 Memory Banks -- 7.4 I/O Address Decoding -- Key Points of this Chapter -- Questions -- Exercise -- 8 The Interrupt Structure of 8086 -- 8.1 Interrupts of 8086 -- 8.2 Dedicated Interrupt Types -- 8.3 Software Interrupts -- 8.4 Hardware Interrupts -- 8.5 Priority of Interrupts -- 8.6 Interrupt Type Allocation for Current PCs -- 8.7 BIOS 10H Functions -- 8.8 Addressing Video Memory Directly -- 8.9 Keyboard Interfacing -- 8.10 Hooking an Interrupt -- Key Points of this Chapter -- Questions -- Exercise -- 9 Peripheral Interfacing - I -- 9.1 Trainer Kit -- 9.2 Programmable Peripheral Interface (PPI)-8255A -- 9.3 Modes of Operation -- 9.4 Mode 0 -- 9.5 Mode 1 -- 9.6 Mode 2 (Strobed Bidirectional Bus I/O) -- 9.7 Centronics Printer Interface -- 9.8 Interfacing an Analog to Digital Converter to the 8086 -- 9.9 Interfacing to a Digital to Analog Converter -- 9.10 Interfacing Liquid Crystal Displays to the 8086 -- 9.11 Interfacing a Stepper Motor to the 8086 -- 9.12 Hex Keyboard Interfacing -- 9.13 Interfacing Led Displays -- Key Points of this Chapter -- Questions -- Exercise -- 10 Peripheral Interfacing - II -- 10.1 The Programmable Interval Timer 8253/8254 -- 10.2 The Programmable Keyboard Display Interface - 8279 -- 10.3 The Programmable Interrupt Controller (PIC) 8259 -- 10.4 Cascade Mode -- Key Points of this Chapter -- Questions -- Exercise -- 11 Peripheral Interfacing - III -- 11.1 Serial Communication Principles -- 11.2 Simplex, Half Duplex and Full Duplex Communication -- 11.3 The Programmable Serial Communication Interface -- 11.4 Internal Reset on Power Up -- 11.5 Direct Memory Access -- 11.6 The DMA Controller - 8237 -- 11.7 DMA and IBM-PC -- 11.8 PCI Based Computers -- Key Points of this Chapter -- Questions -- Exercise…”
Publicado 2010
Libro electrónico -
15050por Braswell, ByronTabla de Contenidos: “…New components and widgets -- 1.1 Environment -- 1.1.1 Server hardware and software -- 1.1.2 HATS development environment -- 1.2 Applications -- 1.2.1 Creating the database and adding data -- 1.2.2 Review -- 1.3 Creating a HATS application -- 1.3.1 Building a basic application -- 1.4 Testing the HATS application -- 1.5 Generating a template -- 1.5.1 Creating a corporate template -- 1.6 Screen captures and drop-down lists -- 1.6.1 Capturing screens -- 1.7 Using tabbed folders -- 1.7.1 Adding a tabbed folder -- 1.7.2 Customizing the tabbed folder -- 1.8 Generating global rules -- 1.9 Using pop-up lists -- 1.10 Calendar -- 1.10.1 Capturing the screen -- 1.10.2 Capturing components -- 1.11 Using the text replacement option -- 1.12 Using graphics -- 1.13 Changing the cascading style sheet -- 1.13.1 Scope -- 1.13.2 Creating an example -- 1.13.3 Finding the tag that is used -- 1.14 Running the HATS project -- 1.15 Summary -- Chapter 2. …”
Publicado 2004
Libro electrónico -
15051Publicado 2022Tabla de Contenidos: “…Private Service Connect for Google APIs with Consumer HTTP(S) -- Private Google Access -- Private Google Access for On-Premises Hosts -- Private Service Connect for Published Services -- Private Service Access -- Serverless VPC Access -- Load Balancing -- Regional Load Balancing -- Global Load Balancing -- Additional Network Services -- Service Directory -- Cloud CDN -- Cloud DNS -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 Designing for Security and Legal Compliance -- Identity and Access Management and Related Access Control Services -- Identities and Groups -- Resources -- Permissions -- Roles -- Policies -- Cloud IAM Conditions -- IAM Best Practices -- Identity-Aware Proxy -- Workload Identity Federation -- Organization Constraints -- Data Security -- Encryption -- Key Management -- Cloud Storage Data Access -- Security Evaluation -- Penetration Testing -- Auditing -- Security Design Principles -- Separation of Duties -- Least Privilege -- Defense in Depth -- Major Regulations -- HIPAA/HITECH -- General Data Protection Regulation -- Sarbanes-Oxley Act -- Children's Online Privacy Protection Act -- ITIL Framework -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Designing for Reliability -- Improving Reliability with Cloud Operations Suite -- Monitoring with Cloud Monitoring -- Alerting with Cloud Monitoring -- Logging with Cloud Logging -- Open Source Observability Tools -- Release Management -- Continuous Delivery -- Continuous Integration -- Systems Reliability Engineering -- Overload -- Cascading Failures -- Testing for Reliability -- Incident Management and Post-Mortem Analysis -- Summary -- Exam Essentials -- Review Questions -- Chapter 9 Analyzing and Defining Technical Processes -- Software Development Lifecycle Plan -- Analysis -- Design -- Continuous Integration/Continuous Delivery…”
Libro electrónico -
15052por Soni, MaulikTabla de Contenidos: “…Incentivizing the team -- Penalizing the team -- Automated tag inheritance, governance, and compliance -- Automated VM shutdown and startup -- Automated budget actions -- Third-party FinOps tools -- Apptio Cloudability -- CloudHealth by VMware -- Cast.ai -- Summary -- Chapter 10: Allocating Costs for Containers -- Technical requirements -- FinOps challenges for containerized workloads -- ACI cost allocation -- Introducing Kubecost -- AKS cost allocation -- Showback and chargeback shared AKS clusters -- Cost optimization recommendations for AKS clusters -- Manage underutilized nodes -- Resizing local disks -- Reserved instances -- Right-sizing your container requests -- Remedying abandoned workloads -- Right-size persistent volumes -- Summary -- Chapter 11: Metric-Driven Cost Optimization -- Technical requirements -- Core principles of MDCO -- MDCO and reservation reporting using Power BI -- Setting thresholds for purchasing reservations -- Automated reservation purchases based on MDCO triggers -- Summary -- Chapter 12: Developing Metrics for Unit Economics -- Technical requirements -- What is cloud unit economics? …”
Publicado 2023
Libro electrónico -
15053Publicado 2024Tabla de Contenidos: “…Network segmentation -- Access control -- Intrusion detection and prevention systems -- Virtual private networks (VPNs) -- Security audits and penetration testing -- Honeypots and deception technologies -- Zero trust architecture -- Security monitoring -- Security policy and frameworks -- NIST cybersecurity framework -- ISO/IEC 27001 and ISO/IEC 27002 -- NERC CIP -- The Department of Homeland Security (DHS) critical infrastructure security framework -- HITRUST CSF -- CIS Controls -- Summary -- References -- Chapter 7: Protecting Critical Infrastructure - Part 2 -- Systems security and endpoint protection -- Antivirus/antimalware protection -- Firewalls -- Host IDS/IPS -- EDR -- Application security -- Secure software development life cycle -- Code reviews and static analysis -- Authentication and authorization hardening -- Data encryption -- Session management -- Security patching and updates -- Penetration testing -- Logging and monitoring -- IR and data recovery -- Summary -- References -- Chapter 8: Protecting Critical Infrastructure - Part 3 -- IR -- IR history -- IR planning -- Security culture and awareness -- Interconnectivity of critical infrastructure -- Cascading effects of a cyberattack -- Responsibility to safeguard critical assets -- Insider threats -- Teamwork and information sharing -- Executive orders -- Executive Order 13010 - Critical Infrastructure Protection (1996) -- Executive Order 13231 - Critical Infrastructure Protection in the Information Age (2001) -- Homeland Security Presidential Directive 7 (HSPD-7) - Critical Infrastructure Identification, Prioritization, and Protection (2003) -- Executive Order 13636 - Improving Critical Infrastructure Cybersecurity (2013) -- Presidential Policy Directive 21 (PPD-21) - Critical Infrastructure Security and Resilience (2013)…”
Libro electrónico -
15054
-
15055
-
15056
Manuscrito -
15057Publicado 2001Tabla de Contenidos: “…Recuerdos de Grecia como cuna de la cultura / Antoni Bergnes de las Casas -- vol. 3. Sobre la importacia del pensamiento filosófico / Francesc Xavier Llorens i Barba -- vol. 4. …”
Libro -
15058
-
15059
-
15060Publicado 2016Tabla de Contenidos: “…His Name Was Will: Remembering Enslaved Individuals in Rutgers History / 4. 'I Hereby Bequeath . . . ": Excavating the Enslaved from the Wills of the Early Leaders of Queen's College / 5. …”
Libro electrónico