Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Derecho canónico 69
- Historia 64
- Iglesia Católica 48
- Operating systems (Computers) 47
- Development 40
- Teología dogmática 38
- Liturgia 35
- Sermones 35
- Iglesia católica 34
- Processament de la parla 33
- Església Catòlica 31
- Moral cristiana 31
- Engineering & Applied Sciences 30
- Application software 29
- Catecismos 24
- Computer Science 23
- Derecho Canónico 23
- Digital techniques 23
- Database management 22
- Teología 22
- Casos, Estudios de 21
- Història 21
- Biblia 20
- Computer programs 20
- Linux 20
- Computer programming 19
- Derecho romano 19
- Programming 19
- obras anteriores a 1800 19
- Novela española 18
-
3241Publicado 1992“…Signal Processing in C also: * Provides a wealth of practical, real-world algorithms * Includes complete coverage of DSP fundamentals such as discrete-time frequency, waveforms, the Nyquist Frequency, aliasing, band pass sampling, and more * Illuminates theoretical concepts through gradual, step-by-step development of actual C code * Shows you how to design programs utilizing the most popular signal filtering methods, including Fourier, Fast Fourier, FIR and IIR filters…”
Libro electrónico -
3242Publicado 2024“…Building on the proven, high-value content of previous editions, world-class C# expert Mark Michaelis illuminates key enhancements in C# 12.0, including any-type aliases, inline arrays, default lambda expression parameters, and expanded support for primary constructors. …”
Libro electrónico -
3243Publicado 2012“…Symptoms of Antisocial Personality Disorder may include: failure to conform to social norms with respect to lawful behaviors as indicated by repeatedly performing acts that are grounds for arrest; deceitfulness, as indicated by repeatedly lying, use of aliases, or conning others for personal profit or pleasure; impulsivity or failure to plan ahead; irritability and aggressiveness, as indicated by repeated physical fights or assaults; reckless disregard for safety of self or others; consistent irresponsibility, as indicated by repeated failure to sustain consistent work behavior or honor financial obligations; and lack of remorse, as indicated by being indifferent to or rationalizing having hurt, mistreated, or stolen from another…”
Vídeo online -
3244Publicado 2012“…Symptoms of Antisocial Personality Disorder may include: failure to conform to social norms with respect to lawful behaviors as indicated by repeatedly performing acts that are grounds for arrest; deceitfulness, as indicated by repeatedly lying, use of aliases, or conning others for personal profit or pleasure; impulsivity or failure to plan ahead; irritability and aggressiveness, as indicated by repeated physical fights or assaults; reckless disregard for safety of self or others; consistent irresponsibility, as indicated by repeated failure to sustain consistent work behavior or honor financial obligations; and lack of remorse, as indicated by being indifferent to or rationalizing having hurt, mistreated, or stolen from another…”
Vídeo online -
3245Publicado 2015“…This video tutorial also covers wildcards, and how to customize aliases, your path, and your prompt. Finally, you will learn about vi, including how to navigate in vi, make changes, and save. …”
-
3246
-
3247Publicado 2018“…It starts by showing you how to set up different forms of NAT entries and firewall rules and use aliases and scheduling in firewall rules. Moving on, you will learn how to implement a captive portal set up in different ways (no authentication, user manager authentication, and RADIUS authentication), as well as NTP and SNMP configuration. …”
Libro electrónico -
3248Publicado 2003Tabla de Contenidos: “…Resolving and loading data -- 9.1 Overview -- 9.2 Generating a DTD and schema -- 9.2.1 Extending the commerce database schema -- 9.2.2 The DTDgen tool -- 9.2.3 DTDgen tool connection configuration -- 9.2.4 DTDgen tool source table specification -- 9.2.5 Running the DTDgen tool -- 9.3 Resolving reference numbers -- 9.3.1 Creating and using aliases -- 9.3.2 Methods of resolving reference numbers -- 9.3.3 The ID Resolver tool -- 9.3.4 ID Resolver tool connection configuration -- 9.3.5 Using a properties file to modify resolution technique -- 9.3.6 Optimizing the resolution process…”
Libro electrónico -
3249Publicado 2004Tabla de Contenidos: “…Post-migration steps -- 7.1 Setting up aliases -- 7.2 Migrating custom code -- 7.2.1 Access control -- 7.2.2 Command parameter validation -- 7.2.3 User registration -- 7.2.4 Logon command -- 7.2.5 Calculation usage framework -- 7.2.6 Configuration and code changes for migrated EJBs -- 7.2.7 J2EE Connector Architecture -- 7.2.8 Pricing -- 7.2.9 Product Advisor -- 7.2.10 Rule server administration commands -- 7.2.11 JSP and property file changes -- Part 3 Production environment -- Chapter 8. …”
Libro electrónico -
3250por Allison, SteveTabla de Contenidos: “…The security investigation applications for EIS -- 8.1 The SWIPE application for CICS, IMS, and DB2 -- 8.1.1 How SWIPE for EIS works -- 8.1.2 SWIPE EIS application structure -- 8.1.3 Define security roles for SWIPE/EIS -- 8.1.4 Prepare WebSphere security to run the samples -- 8.1.5 Plan resource reference to connection factory bindings -- 8.2 Define J2CA connection factories and data sources -- 8.2.1 Suggested scenarios for security verification -- 8.2.2 Set up JAAS authentication aliases -- 8.2.3 Set up connection factories and data sources for SWIPE/EIS -- 8.3 Install SWIPE for CICS, IMS, and DB2 -- 8.4 Install the CICS components of SWIPECICS -- 8.5 Start SWIPE for CICS, IMS, and DB2 -- 8.6 Run SWIPE for CICS, IMS, and DB2 -- 8.7 Debug SWIPE for CICS, IMS, and DB2 -- 8.8 The SWIPE application for JMS -- 8.8.1 Invoke the JMS sample -- 8.8.2 SWIPE application for JMS contents -- 8.8.3 Security roles in the samples…”
Publicado 2005
Libro electrónico -
3251por Putte, Geert van deTabla de Contenidos: “…16.1.1 WebSphere Edge Server -- 16.1.2 Load balancer -- 16.2 Load balancing using Media Access Control (MAC) forwarding -- 16.2.1 How it works -- 16.2.2 Overall solution design -- 16.2.3 Load balancing deployment design -- 16.3 Install WebSphere Edge Server Network Dispatcher -- 16.4 Configure Network Dispatcher for load balancing -- 16.4.1 Start Network Dispatcher -- 16.4.2 Configure Network Dispatcher with the Dispatcher GUI -- 16.4.3 Configuring the cluster IP address on the network adapter -- 16.4.4 Aliasing the cluster address on the load-balancing servers -- 16.5 Validate the load balancing environment -- 16.6 IP session affinity -- 16.7 Access the components -- Chapter 17. …”
Publicado 2005
Libro electrónico -
3252Publicado 2012“…Symptoms of Antisocial Personality Disorder may include: failure to conform to social norms with respect to lawful behaviors as indicated by repeatedly performing acts that are grounds for arrest; deceitfulness, as indicated by repeatedly lying, use of aliases, or conning others for personal profit or pleasure; impulsivity or failure to plan ahead; irritability and aggressiveness, as indicated by repeated physical fights or assaults; reckless disregard for safety of self or others; consistent irresponsibility, as indicated by repeated failure to sustain consistent work behavior or honor financial obligations; and lack of remorse, as indicated by being indifferent to or rationalizing having hurt, mistreated, or stolen from another…”
Vídeo online -
3253Publicado 2012“…Symptoms of Antisocial Personality Disorder may include: failure to conform to social norms with respect to lawful behaviors as indicated by repeatedly performing acts that are grounds for arrest; deceitfulness, as indicated by repeatedly lying, use of aliases, or conning others for personal profit or pleasure; impulsivity or failure to plan ahead; irritability and aggressiveness, as indicated by repeated physical fights or assaults; reckless disregard for safety of self or others; consistent irresponsibility, as indicated by repeated failure to sustain consistent work behavior or honor financial obligations; and lack of remorse, as indicated by being indifferent to or rationalizing having hurt, mistreated, or stolen from another."…”
Vídeo online -
3254
-
3255por Hosmer, Chet. author“…What You’ll Learn: Leverage the internals of PowerShell for: digital investigation, incident response, and forensics Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities Create combined PowerShell and Python applications that provide: rapid response capabilities to cybersecurity events, assistance in the precipitous collection of critical evidence (from the desktop and enterprise), and the ability to analyze, reason about, and respond to events and evidence collected across the enterprise…”
Publicado 2019
Libro electrónico -
3256Publicado 2010“…(Cretácico Inferior alto; Aptiano-Albiano, con una posible extensión hasta el Cenomaniano basal); 4) Formación Hito XIX, unidad meta-sedimentaria epiclástica, sutilmente más areniscosa que la Formación Beauvoir, con participación de areniscas margosas, con inocerámidos, Aucellina spp. y belemnites (Cretácico Inferior alto, Albiano); y 5) rocas ígneas, constituidas por un cuerpo plutónico y diversos diques leucocráticos y básicos (uno de los diques básicos arrojó una edad isotópica de 104 ł 4 Ma, Albiano superior bajo), intruyen a las Pizarras del Lago Fagnano y a la Formación Beauvoir, respectivamente. …”
Acceso restringido con credenciales UPSA
Libro electrónico -
3257por Martinioni, Daniel Roberto“…(Cretácico Inferior alto; Aptiano-Albiano, con una posible extensión hasta el Cenomaniano basal); 4) Formación Hito XIX, unidad meta-sedimentaria epiclástica, sutilmente más areniscosa que la Formación Beauvoir, con participación de areniscas margosas, con inocerámidos, Aucellina spp. y belemnites (Cretácico Inferior alto, Albiano); y 5) rocas ígneas, constituidas por un cuerpo plutónico y diversos diques leucocráticos y básicos (uno de los diques básicos arrojó una edad isotópica de 104 ł 4 Ma, Albiano superior bajo), intruyen a las Pizarras del Lago Fagnano y a la Formación Beauvoir, respectivamente. …”
Publicado 2010
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
3258
-
3259
-
3260