Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 380
- Historia 299
- Història 295
- Església Catòlica 285
- Teología dogmática 283
- Ritus i cerimònies 268
- Derecho canónico 254
- Teología 225
- Moral cristiana 222
- Litúrgia 176
- Bíblia 139
- Tomás de Aquino 122
- Aspectes religiosos 114
- Crítica e interpretación 113
- Ritus i cerimònies fúnebres 103
- Filosofía 100
- Cristianisme 94
- Ritus d'iniciació 92
- obras anteriores a 1800 81
- Obras anteriores a 1800 79
- Iglesia Católica 76
- Patrística 74
- Derecho 73
- Matrimoni 72
- Brigades Internacionals 70
- Derecho civil 70
- History 66
- Teologia 66
- Photography 65
- Obres anteriors al 1800 64
-
10781
-
10782
-
10783
-
10784
-
10785
-
10786por Maynard, Harold B. 1902-1975
Publicado 1956Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
10787
-
10788por Longo, Luigi, 1900-1980
Publicado 1966Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
10789Publicado 2023Tabla de Contenidos: “…Chapter 6 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- 3 Securing a Business -- Chapter 1 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network -- Determine how backups are handled -- Be careful where you work remotely…”
Libro electrónico -
10790CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…USB-based authentication -- Chapter 9 Preventing Social Engineering Attacks -- Don't Trust Technology More than You Would People -- Types of Social Engineering Attacks -- Six Principles Social Engineers Exploit -- Don't Overshare on Social Media -- Your schedule and travel plans -- Financial information -- Personal information -- Information about your children -- Information about your pets -- Work information -- Possible cybersecurity issues -- Crimes and minor infractions -- Medical or legal advice -- Your location -- Your birthday -- Your "sins" -- Leaking Data by Sharing Information as Part of Viral Trends -- Identifying Fake Social Media Connections -- Photo -- Verification -- Friends or connections in common -- Relevant posts -- Number of connections -- Industry and location -- Similar people -- Duplicate contact -- Contact details -- Premium status -- LinkedIn endorsements -- Group activity -- Appropriate levels of relative usage -- Human activities -- Cliché names -- Poor contact information -- Skill sets -- Spelling -- Age of an account -- Suspicious career or life path -- Level or celebrity status -- Using Bogus Information -- Using Security Software -- General Cyberhygiene Can Help Prevent Social Engineering -- Part 4 Cybersecurity for Businesses, Organizations, and Government -- Chapter 10 Securing Your Small Business -- Making Sure Someone Is In Charge -- Watching Out for Employees -- Incentivize employees -- Avoid giving out the keys to the castle -- Give everyone separate credentials -- Restrict administrators -- Limit access to corporate accounts -- Implement employee policies -- Enforce social media policies -- Monitor employees -- Dealing with a Remote Workforce -- Use work devices and separate work networks -- Set up virtual private networks -- Create standardized communication protocols -- Use a known network…”
Libro electrónico -
10791Publicado 2023Tabla de Contenidos: “…Writing readable assertions with FluentAssertions -- Testing performance with Shouldly -- Generating test data with Bogus -- Mocking dependencies with Moq and NSubstitute -- Understanding the need for mocking libraries -- Creating mock objects with Moq -- Programming Moq return values -- Verifying Moq calls -- Mocking with NSubstitute -- Pinning tests with Snapper -- Experimenting with Scientist .NET -- Summary -- Questions -- Further reading -- Chapter 10: Defensive Coding Techniques -- Technical requirements -- Introducing the Cloudy Skies API -- Validating inputs -- Performing basic validation -- Using the nameof keyword -- Validation with guard clauses -- Guard clauses with the GuardClauses library -- Using CallerMemberInformation attributes -- Protecting against null -- Enabling nullability analysis in C# -- Using nullability operators -- Moving beyond classes -- Preferring immutable classes -- Using required and init-only properties -- Primary constructors -- Converting classes into record classes -- Cloning objects using with expressions -- Advanced type usage -- Exploring pattern matching -- Using generics to reduce duplication -- Introducing type aliases with the using directive -- Summary -- Questions -- Further reading -- Part 3: Advanced Refactoring with AI and Code Analysis -- Chapter 11: AI-Assisted Refactoring with GitHub Copilot -- Technical requirements -- Introducing GitHub Copilot -- Understanding GitHub's predictive model -- Starting the conversation with GitHub Copilot Chat -- Getting started with GitHub Copilot in Visual Studio -- Installing and activating GitHub Copilot -- Getting access to GitHub Copilot -- Generating suggestions with GitHub Copilot -- Interacting with GitHub Copilot Chat -- Refactoring with GitHub Copilot Chat -- GitHub Copilot Chat as a code reviewer -- Targeted refactoring with GitHub Copilot Chat…”
Libro electrónico -
10792por Neumann, Adrian J.Tabla de Contenidos: “…ACT Strategic (formerly known as Project Argus) -- 6.2.6. Cross-Sectoral Security Communications (CSSC)…”
Publicado 2024
Libro electrónico -
10793por Ryckman, Pamela“…It's about what happens when bright, extraordinary women-from captains of industry to aspiring entrepreneurs-come together to celebrate and unwind, debate and compare notes. …”
Publicado 2013
Libro electrónico -
10794Publicado 2019“…This monograph interprets Sermones book 1 as a collection of Horace's credentials for Maecenas and traces his efforts in getting accepted as an associate of the latter after his miscalculation in joining Brutus. Although Horace regularly reflects on his poetic orientation and standards of good poetry, his primary objective was his self-presentation. …”
Libro electrónico -
10795
-
10796
-
10797Publicado 2013“…"Four years ago, a bright young presidential candidate named Barack Obama campaigned on a theme of hope and change and made history. …”
Libro -
10798por Bucher, Chris“…A rigorous practical guide to photographic lighting techniques, complete with hands-on assignmentsOffering digital photographers a complete course in photographic lighting, this book covers everything from using flash systems and studio lights to working outdoors in bright or low-light conditions. Full-color examples show how the right lighting can enhance color, improve contrast, and open the door to new creative possibilities…”
Publicado 2007
Libro electrónico -
10799por Daly, Tim, 1964-“…Photoshop users:Ever feel like your printer is letting you down? Sick of seeing the bright, saturated tones of photos on your monitor turn into washed-out, drab prints? …”
Publicado 2009
Libro electrónico -
10800por Arjona, Javier, 1968-“…La historia de la Península Ibérica ha sido un continuo devenir de clanes, tribus, pueblos y culturas, de viajeros del pasado, que han conformado el ADN de aquella Iberia griega que los romanos transformaron en Hispania y sobre la que los visigodos establecieron la primera monarquía preludio de la futura España. …”
Publicado 2016
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro