Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,622
- History and criticism 773
- History 700
- Política y gobierno 622
- Història 595
- Edificios, estructuras, etc 458
- Management 441
- TFC 437
- Música 416
- Development 396
- Arquitectura 381
- Application software 338
- Engineering & Applied Sciences 317
- Bancs 305
- Civilización y cultura 297
- Edificis, estructures, etc 279
- Database management 220
- Data processing 218
- Computer Science 216
- Operating systems (Computers) 210
- Crítica e interpretación 208
- Computer programs 196
- Filosofía 195
- Música sagrada 195
- Politics and government 194
- Bach, Johann Sebastian 193
- Relaciones 193
- Situación social 190
- Computer networks 180
- Photography 177
-
28981Publicado 2005Tabla de Contenidos: “…/ San Bernardo: historia y poesía en Moreto y Bances Candamo (con Hoz y Mota) / Hagiographie et autobiographie spirituelle: la carmélite déchaussée Ana de San Agustín (1555-1624) / Rojas Zorrilla ante la comedia de santos: Santa Isabel, reina de Portugal / Los santos venerados en Sevilla en el siglo XV y principios del XVI / Un hagiógrafo hebraísta, fray José de Sigüenza y su Vida de San Jerónimo, Doctor de la Santa Iglesia (Madrid, 1595) / De reyes y de santos. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
28982Publicado 2023Tabla de Contenidos: “…(pp. 837-850)--BREVES NOTAS SOBRE LA PROTECCIÓN DEL DERECHO AL HONOR DEL MENOR DE EDAD EN EL ÁMBITO DE LAS REDES SOCIALES(pp. 851-864)--REFLEXIONES CONTROVERTIDAS EN EL SISTEMA DE LA ADOPCIÓN DE MENORES(pp. 865-894)--PERSPECTIVA Y PROSPECTIVA DE LA PATRIA POTESTAD (ART. 154 DEL CC): EL EJERCICIO DE LA PATRIA POTESTAD POR LOS PROGENITORES CON DISCAPACIDAD PSÍQUICA(pp. 895-926)----CUESTIONES REGISTRALES DE LA GESTACIÓN POR SUSTITUCIÓN(pp. 927-940)--CUESTIONES REGISTRALES DE LA GESTACIÓN POR SUSTITUCIÓN(pp. 927-940)----CUESTIONES REGISTRALES DE LA GESTACIÓN POR SUSTITUCIÓN(pp. 927-940)--CUESTIONES REGISTRALES DE LA GESTACIÓN POR SUSTITUCIÓN(pp. 927-940)--EL INTERÉS SUPERIOR DEL MENOR EN EL ORDEN DE LOS APELLIDOS(pp. 973-987)--Back Matter(pp. 988-988)…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
28983Publicado 2023Tabla de Contenidos: “…(pp. 244-245)----Para las Damas: Desde Burdeos: Excursión marítima(pp. 246-247)----Para las Damas: Camino de París: Como dos mujercitas(pp. 248-249)----Para las Damas: Desde París: Muñequitas de carne(pp. 250-251)----Para las Damas: Desde París: La moda de invierno(pp. 252-253)----Para las Damas: Invierno parisino(pp. 254-255)--Back Matter(pp. 256-256)…”
Libro electrónico -
28984Publicado 2016Tabla de Contenidos: “…-- Being Strategic about Innovation -- Innovation Models -- Traditional/Sustaining Innovation -- Disruptive Innovation -- Disruptive Innovation as Part of a Competitive Revectoring Strategy: Nokia -- Disruptive Innovation as Part of a Survival Strategy: BlackBerry and HTC -- Disruptive Innovation as Part of a Long-Term Strategy and Vision: Facebook, Safaricom, and Tata Motors -- How Do You Discover a Disruptive Innovation? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
28985Publicado 2024Tabla de Contenidos: “…Creating a new .NET MAUI Blazor project -- Generating a .NET MAUI Blazor project with the dotnet command line -- Creating a .NET MAUI Blazor Hybrid App using Visual Studio on Windows -- Running the new project -- The startup code of the .NET MAUI Blazor Hybrid App -- Migrating to a .NET MAUI Blazor Hybrid App -- Understanding Razor syntax -- Code blocks in Razor -- Implicit Razor expressions -- Explicit Razor expressions -- Expression encoding -- Directives -- Directive attributes -- Creating a Razor component -- Redesigning the login page using a Razor component -- The Model-View-ViewModel (MVVM) pattern in Blazor -- Dependency injection in Blazor -- CSS isolation -- Summary -- Further reading -- Chapter 9: Understanding Blazor Routing and Layout -- Technical requirements -- Understanding client-side routing -- Setting up BlazorWebView -- Setting up the Router component -- Defining routes -- Passing data using route parameters -- Navigating with NavigationManager -- Using Blazor layout components -- Applying a layout to a component -- Nesting layouts -- Implementing navigation elements -- Implementing a list view -- Adding a new item and navigating back -- Summary -- Chapter 10: Implementing Razor Components -- Technical requirements -- Understanding Razor components -- Inheritance -- Creating a Razor class library -- Using static assets in the Razor class library -- Creating reusable Razor components -- Creating a base modal dialog component -- Data binding -- Component parameters -- Nested components -- Child content rendering -- Two-way data binding -- Binding with component parameters -- Communicating with cascading values and parameters -- Understanding the Razor component lifecycle -- SetParametersAsync -- OnInitialized and OnInitializedAsync -- OnParametersSet and OnParametersSetAsync -- ShouldRender -- OnAfterRender and OnAfterRenderAsync…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
28986Publicado 2019Tabla de Contenidos: “….) -- FIGURA 30: PUBLICIDAD POLÍTICA, BACKING MURAL, (...) -- FIGURA 31: DETERMINANTES PREPOLÍTICOS DEL SISTEMA (...) -- FIGURA 32: JAMES MARSHALL HENDRIX: SOLDADO VICIOSO, (...) -- FIGURA 33: MARADONIANOS -- FIGURA 34: PROPUESTAS DE USUARIOS PARA COMPLETAR LA -- FIGURA 35: TIPOS DE PODER -- FIGURA 36: CADENA DE RELACIONES DE PODER -- FIGURA 37: PÓSTER CONMEMORATIVO UNIÓN. …”
Libro electrónico -
28987por AA., VVTabla de Contenidos: “…. -- DISCURSO -- PARA LAS DAMAS -- RETORIALES -- SECCIÓN DE POLIDA -- SOCIALES Y PERSONALES -- VAYA, VAYA CON -- AVISO -- TOMO II -- NÚMERO 1, 15 DE NOVIEMBRE DE 1918 -- LO QUE QUIERE DECIR SAN-EV-ANK -- EN EL PAÍS SIN NOMBRE -- LAS FAMOSAS LIBERTADES AMERICANAS -- ACTUALIDADES -- EL PRINCIPIO DE LIMITACIÓN -- BACH-BEETHOVEN-BRAHMS -- MI BASTÓN Y MI CAPA -- BIBLIOGRAFÍA. …”
Publicado 2018
Libro electrónico -
28988Publicado 2018Tabla de Contenidos: “…Steps for adding an administrator -- Steps for removing an administrator -- VPCs and subnets management -- Steps for creating a VPC and subnets -- Steps for deleting a VPC -- Security groups management -- Steps for creating a security group -- Steps for deleting a security group -- Environment management in AWS -- Steps for creating an environment -- Steps for deleting an environment -- User permissions management -- VM migration to Amazon EC2 with AWS Connector for vCenter -- The VM import authorization process -- Virtual machine migration process -- Backing up the instance -- Migrated EC2 instance export process -- Troubleshooting migration -- Validation of the certificates -- VMware Cross-Cloud Model with IBM Cloud -- Prerequisites -- Components/services used in this architecture -- VMware Cloud services architecture on SoftLayer -- Physical infrastructure -- Physical operational model -- Logical operational model -- Cluster (compute, storage, and network) architecture -- Compute clusters -- Management cluster -- Edge cluster -- Storage cluster -- Physical network provided by SoftLayer -- Simplicity -- Scalability -- High bandwidth -- Fault-tolerant transport -- Physical storage -- vSAN -- Network File System (NFS) -- Storage virtualization -- VMware SDS is vSAN -- Virtual Machine Disks (VMDK) -- Virtual infrastructure -- Compute virtualization -- Provisioning -- Resource scheduling -- Availability -- Performance -- Network virtualization -- Network virtualization components -- Distributed virtual switches -- Network I/O control details -- Network virtualization services -- Infrastructure management -- Compute management -- Storage management -- Network management -- Common services -- Identity and access services -- DNS -- NTP services -- Simple Mail Transfer Protocol (SMTP) services -- Certificate Authority (CA) services…”
Libro electrónico -
28989Publicado 2018Tabla de Contenidos: “…. -- There's more... -- See also -- Using batch processing -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 3: Building Powerful Services with JSON and RESTful Features -- Building server-side events with JAX-RS -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Improving service's capabilities with JAX-RS and CDI -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Easing data and objects representation with JSON-B -- Getting ready -- How to do it... -- How it works... -- See also -- Parsing, generating, transforming, and querying on JSON objects using JSON-P -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 4: Web- and Client-Server Communication -- Using servlets for request and response management -- Getting ready -- How to do it... -- The load on startup servlet -- A servlet with init params -- The asynchronous servlet -- How it works... -- The load on startup servlet -- A servlet with init params -- Asynchronous servlet -- See also -- Building UI with template's features using JSF -- Getting ready -- How to do it... -- How it works... -- See also -- Improving the response performance with Server Push -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 5: Security of Enterprise Architecture -- Introduction -- Domain protection with authentication -- Getting ready -- How to do it -- How it works... -- See also…”
Libro electrónico -
28990Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Bypassing Network Access Control -- Technical requirements -- Bypassing MAC filtering - considerations for the physical assessor -- Configuring a Kali wireless access point to bypass MAC filtering -- Design weaknesses - exploiting weak authentication mechanisms -- Capturing captive portal authentication conversations in the clear -- Layer-2 attacks against the network -- Bypassing validation checks -- Confirming the Organizationally Unique Identifier -- Passive Operating system Fingerprinter -- Spoofing the HTTP User-Agent -- Breaking out of jail - masquerading the stack -- Following the rules spoils the fun - suppressing normal TCP replies -- Fabricating the handshake with Scapy and Python -- Summary -- Questions -- Further reading -- Chapter 2: Sniffing and Spoofing -- Technical requirements -- Advanced Wireshark - going beyond simple captures -- Passive wireless analysis -- Targeting WLANs with the Aircrack-ng suite -- WLAN analysis with Wireshark -- Active network analysis with Wireshark -- Advanced Ettercap - the man-in-the-middle Swiss Army Knife -- Bridged sniffing and the malicious access point -- Ettercap filters - fine-tuning your analysis -- Killing connections with Ettercap filters -- Getting better - spoofing with BetterCAP -- ICMP redirection with BetterCAP -- Summary -- Questions -- Further reading -- Chapter 3: Windows Passwords on the Network -- Technical requirements -- Understanding Windows passwords -- A crash course on hash algorithms -- Password hashing methods in Windows -- If it ends with 1404EE, then it's easy for me - understanding LM hash flaws -- Authenticating over the network-a different game altogether -- Capturing Windows passwords on the network…”
Libro electrónico -
28991Publicado 2018Tabla de Contenidos: “…. -- Accessing the database management interface -- Setting or changing the master password -- Creating a new database -- Duplicating a database -- Removing a database -- Backing up a database -- Restoring a database backup -- How it works... -- There's more... -- Storing the instance configuration in a file -- How to do it... -- How it works... -- Activating the Odoo developer tools -- How to do it... -- How it works... -- Updating Odoo from source -- Getting ready -- How to do it... -- How it works... -- Chapter 2: Managing Odoo Server Instances -- Introduction -- Configuring the addons path -- Getting ready -- How to do it... -- How it works... -- There's more... -- Updating the addon modules list -- Getting ready -- How to do it... -- How it works... -- Standardizing your instance directory layout -- How to do it... -- How it works... -- See also -- Installing and upgrading local addon modules -- Getting ready -- How to do it... -- From the web interface -- From the command line -- How it works... -- Addon installation -- Addon update -- There's more... -- Installing addon modules from GitHub -- Getting ready -- How to do it... -- How it works... -- There's more... -- Applying changes to addons -- Getting ready -- How to do it... -- How it works... -- See also…”
Libro electrónico -
28992Publicado 2021Tabla de Contenidos:Libro electrónico
-
28993Publicado 2021Tabla de Contenidos: “…. -- Processing streaming and batch data using Structured Streaming -- Getting ready -- How to do it... -- How it works... -- Understanding the various stages of transforming data -- Getting ready -- How to do it... -- How it works... -- Loading the transformed data into Azure Cosmos DB and a Synapse dedicated pool -- Getting ready -- How to do it... -- How it works... -- Creating a visualization and dashboard in a notebook for near-real-time analytics -- Getting ready -- How to do it... -- How it works... -- Creating a visualization in Power BI for near-real-time analytics -- Getting ready -- How to do it... -- How it works... -- Using Azure Data Factory (ADF) to orchestrate the E2E pipeline -- Getting ready -- How to do it... -- How it works... -- Chapter 8: Databricks SQL -- Technical requirements -- How to create a user in Databricks SQL -- Getting ready -- How to do it... -- How it works... -- Creating SQL endpoints -- Getting ready -- How to do it... -- How it works... -- Granting access to objects to the user -- Getting ready -- How to do it... -- How it works... -- Running SQL queries in Databricks SQL -- Getting ready -- How to do it... -- How it works... -- Using query parameters and filters -- Getting ready -- How to do it... -- How it works... -- Introduction to visualizations in Databricks SQL -- Getting ready -- How to do it... -- Creating dashboards in Databricks SQL -- Getting ready -- How to do it... -- How it works... -- Connecting Power BI to Databricks SQL -- Getting ready -- How to do it... -- Chapter 9: DevOps Integrations and Implementing CI/CD for Azure Databricks -- Technical requirements -- How to integrate Azure DevOps with an Azure Databricks notebook -- Getting ready -- How to do it...…”
Libro electrónico -
28994Publicado 2017Tabla de Contenidos: “…A The Mirage of Practical and Formal Differences -- B The Relativity of Protection Levels -- 1 Early Starting Point: Claims "against the World at Large" -- 2 United States: From Property to Policy and Back Again -- 3 Germany: The Eternal Dichotomy of Rights and Competition -- C The Heterogeneity of Policies: Vertical and Horizontal Competition -- 1 Two Types of Unfair Competition Cases and Regulatory Policies -- 2 Clarification: The Horizontality of Neminem Laedere -- D Summary -- II Antitrust and Unfair Competition Law -- III The Intellectual Property Dichotomy: Innovation vs. …”
Libro electrónico -
28995Publicado 2022Tabla de Contenidos: “…Deploy One or More Centralized Log File Monitors and Configure Logging Devices throughout the Organization to Send Data Back to the Centralized Log Monitor -- 4. Determine the Impact of Events Both Before and After they Occur -- 5. …”
Libro electrónico -
28996
-
28997por Parker, David J.Tabla de Contenidos: “…-- Examining the standard template -- Enhancing the masters -- Editing the Data Flow master -- Preparing for AutoConnect -- Editing the Data Store master -- Adding Shape Data -- Enhancing the graphics -- Displaying the ID value -- Improving the group shape -- Editing the Interface master -- Editing the Process master -- Adding Shape Data -- Enhancing the graphics -- Displaying the ID value -- Displaying the Category value -- Improving the group shape -- Setting the Subprocess master -- Enhancing the page -- Summary -- Chapter 10: A Worked Example for Data Flow Model Diagrams - Part 2 -- Writing the rule set -- Rule 1 - all processes must have at least one data flow in and one data flow out -- Rule 2 - all processes should modify the incoming data, producing new forms of the outgoing data -- Rule 3 - each data store must be involved with at least one data flow -- Rule 4 - each external entity must be involved with at least one data flow -- Rule 5 - a data flow must be attached to at least one process -- Rule 6 - data flows cannot go directly from one external entity to another external entity -- Rule 7 - do not allow a single page of a DFD to get too complex -- Rule 8 - each component should be labeled -- Rule 9 - each data flow should be labeled describing the data that flows through it -- Rule 10 - each component and subcomponent should be numbered -- Rule 11 - a data flow must be connected between two components -- Rule 12 - a flow must not cycle back to itself -- Summary…”
Publicado 2013
Libro electrónico -
28998Publicado 2014Tabla de Contenidos: “…. -- Block reader functions -- Pickle corpus view -- Concatenated corpus view -- See also -- Creating a MongoDB-backed corpus reader -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Corpus editing with file locking -- Getting ready -- How to do it... -- How it works... -- 4. …”
Libro electrónico -
28999por Russinovich, Mark E.Tabla de Contenidos: “…Page Files -- Stacks -- User Stacks -- Kernel Stacks -- DPC Stack -- Virtual Address Descriptors -- Process VADs -- Rotate VADs -- NUMA -- Section Objects -- Driver Verifier -- Page Frame Number Database -- Page List Dynamics -- Page Priority -- Modified Page Writer -- PFN Data Structures -- Physical Memory Limits -- Windows Client Memory Limits -- Working Sets -- Demand Paging -- Logical Prefetcher -- Placement Policy -- Working Set Management -- Balance Set Manager and Swapper -- System Working Set -- Memory Notification Events -- Proactive Memory Management (SuperFetch) -- Components -- Tracing and Logging -- Scenarios -- Page Priority and Rebalancing -- Robust Performance -- ReadyBoost -- ReadyDrive -- Conclusion -- Cache Manager -- Key Features of the Cache Manager -- Single, Centralized System Cache -- The Memory Manager -- Cache Coherency -- Virtual Block Caching -- Stream-Based Caching -- Recoverable File System Support -- Cache Virtual Memory Management -- Cache Size -- Cache Virtual Size -- Cache Working Set Size -- Cache Physical Size -- Cache Data Structures -- Systemwide Cache Data Structures -- Per-File Cache Data Structures -- File System Interfaces -- Copying to and from the Cache -- Caching with the Mapping and Pinning Interfaces -- Caching with the Direct Memory Access Interfaces -- Fast I/O -- Read Ahead and Write Behind -- Intelligent Read-Ahead -- Write-Back Caching and Lazy Writing -- Write Throttling -- System Threads -- Conclusion -- File Systems -- Windows File System Formats -- CDFS -- UDF -- FAT12, FAT16, and FAT32 -- exFAT -- NTFS -- File System Driver Architecture -- Local FSDs -- Remote FSDs -- File System Operation -- File System Filter Drivers -- Troubleshooting File System Problems -- Process Monitor Basic vs. …”
Publicado 2009
Libro electrónico -
29000Publicado 2017Tabla de Contenidos: “…. -- Executing code using the batch framework -- Calling a process from a form -- Using the data contract to make changes to the dialog -- Adding an interface to the SysOperation framework -- Getting ready -- How to do it... -- How it works... -- Chapter 5: Business Intelligence -- Introduction -- Creating aggregate dimensions -- Getting ready -- How to do it... -- How it works... -- See also -- Creating aggregate measures -- Getting ready -- How to do it... -- How it works…”
Libro electrónico