Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 109
- Byron, George Gordon Byron 88
- History 66
- Economics 58
- Literatura 49
- Poesía inglesa 39
- Historia y crítica 38
- Hormigón 34
- Engineering & Applied Sciences 33
- Economic conditions 32
- Education 32
- Crítica e interpretación 31
- Development 31
- Política y gobierno 30
- Hormigón armado 28
- Filosofía 26
- Computer Science 24
- Computer networks 24
- Economic policy 23
- Novela inglesa 23
- Management 22
- Environment 21
- Literatura inglesa 21
- Security measures 19
- Construcción 18
- Política 18
- Social aspects 18
- Application software 17
- Computer programs 17
- Law and legislation 17
-
3141Publicado 2016“…The results of a scenario analysis that excluded alemtuzumab (the dominant strategy), showed that three treatment alternatives (interferon beta-1b (Extavia), peg-interferon beta-1a and natalizumab) could be cost-effective depending on the willingness-to-pay (WTP) per QALY. Assuming a WTP below NOK 1,000,000, interferon beta-1b (Extavia) was 40% likely to be the most cost-effective treatment, followed by peg-interferon beta-1a (30% likely).6. …”
Libro electrónico -
3142por James, Lawrence, 1943-“…Thus he overlooked the frequently expressed American view that the Empire was a hangover from a bygone era of colonisation, and reflected poorly on Britain's ability to conduct herself as a political power in the current world order. …”
Publicado 2013
Libro -
3143por Davara Rodríguez, Miguel Ángel 1946-“…Asimismo, a lo largo de la obra, además de hacer un “barrido” por todo el Código Penal -haciendo hincapié en las novedades incorporadas en su última reforma e incluyendo una referencia a cuestiones de Compliance- analizando los delitos contemplados en él y cómo pueden ser cometidos haciendo uso de las TIC, se incorpora un análisis de los delitos informáticos que pueden tener lugar en/a través de Redes Sociales así como los que son consecuencia del llamado BYOT, pasando por el ransomware u otras cuestiones de ciberseguridad…”
Publicado 2017
Acceso al texto completo en Aranzadi
Libro -
3144Publicado 2015“…Learn how to: Compare Swift with Objective-C, JavaScript, Python, Ruby, and C Collect data with arrays and dictionaries, and store it with variables and constants Group commonly used code into functions for easy reuse Structure your code with enums, structs, and classes Use generics to get more done with less code Write closures to share small blocks of functionality Use optionals to write more robust, crash-resistant, and cleaner code Integrate existing Objective-C code into new Swift apps Program on the bit and byte levels with advanced operators Implement efficient design patterns with protocols and delegates Create animated 2D games with SpriteKit, and apps with UIKit…”
Libro electrónico -
3145Publicado 2016“…Offers coherent, consistent guidance for those tasked with securing the network within an organization and ensuring that it is appropriately tested Focuses on practical, real world implementation and testing Employs a vetted "security testing by example" style to demonstrate best practices and minimize false positive testing Gives practical advice for securing BYOD devices on the network, how to test and defend against internal threats, and how to continuously validate a firewall device, software, and configuration Provides analysis in addition to step by step methodologies…”
Libro electrónico -
3146Publicado 2013“…Jednak, jeśli mu się bliżej przyjrzeć, jak tego dokonał autor tej biografii, odnaleźć w nim można i wielką podróż, i wielką bitwę, i wielki romans. Z kart tej książki jawi się Chesterton jako postać naprawdę niezwykła, pełna życia, radości i miłości. …”
991005714299706719 -
3147Publicado 2004“…In this freshly updated edition, New York Times tech columnist J. D. Biersdorfer blows open the secret doors of this gleaming, chrome-and-white beauty. …”
Libro electrónico -
3148Publicado 2015“…Drawing on his deep experience, he shares actionable, up-to-date guidance on issues ranging from SSO and federated authentication to BYOD, virtualization, and cloud security. Perfect security is impossible. …”
Libro electrónico -
3149por Felder, Lynda“…Focusing on storytelling techniques that work best for digital media, this book describes the essential skills and tools in a Web author’s toolbox, including a thorough understanding of grammar and style, a critical eye for photography, and an ear for just the right sound byte for a podcast. This clearly written guide provides a fun and practical approach to Web writing that busy students and writers will be eager to learn and explore. …”
Publicado 2012
Libro electrónico -
3150Publicado 2013“…He offers insights critical to evaluating mobile technologies, supporting BYOD, and integrating mobile, cloud, social, and big data. …”
Libro electrónico -
3151Publicado 2010“…Because ZFS is a 128-bit file system, its theoretical limits are truly mind-boggling–2128 bytes of storage and 264 for everything else, including file systems, snapshots, directory entries, devices, and more. …”
Libro electrónico -
3152Publicado 2013“…14 types of hostile mobs Get friendly mobs on your side and build automated farms Brew potions to cure ills, gain superpowers, and throw at enemies Transform your shelter into a palace (or a secret underwater base) Create new worlds and master the fine art of terraforming Learn the secrets of redstone devices, and build incredible rail systems Play safely through The Nether and The End Discover mods that will blow your mind Run your own LAN games, adventures, and worlds Provides complete coverage of the PC and Mac versions Tips for using Minecraft on Xbox, iOS and Android Bonus downloadable crafting guide available from the publisher's web site…”
Libro electrónico -
3153Publicado 2023“…He went from floundering junior to sought-after senior and on to architect and CTO. Byron helped found and lead as many as 10 simultaneous projects. …”
Video -
3154Publicado 2012“…Para añadir interactividad a sus películas, se presentan las bases de la programación en ActionScript 3, a fin de crear botones interactivos. Para finalizar, descubrirá cómo publicar sus películas para su difusión en la pantalla de un ordenador, en un smartphone o en una tableta. …”
Acceso con credenciales UPSA.
Libro electrónico -
3155Publicado 2011“…Para añadir interactividad a sus películas, aprenderá las bases de la programación en ActionScript 3 a fin de crear botones interactivos. Para finalizar, descubrirá cómo publicar los archivos en función de los diferentes medios elegidos para la distribución de las películas. …”
Acceso con credenciales UPSA.
Libro electrónico -
3156por Guiheux, Gilles“…Cet ouvrage est consacré aux hommes et aux femmes qui se trouvent derrière ces produits et ces façades de verre et de béton. L’auteur y écrit l’histoire des capitaines de l’industrie privée taiwanaise et de leurs familles. …”
Publicado 2021
Electrónico -
3157Publicado 2016“…What You Will Learn Create displays of content that are automatically updated when you add new content Show maps and rotating image carousels on your site Combine content to create composite displays using the same data in different ways Use fields from more than one content type to create powerful views of multi-table data Modify the field data being displayed, combining it in different ways or changing the HTML that might be normally generated Add headers and footers above and below a views display Make the output of your view look exactly like the designer specifies Change the order in which a list of content is displayed, limit the content shown to only certain content types or values Filter content using values passed to the view in the URL, making a single view work different ways In Detail Learn how to build complex displays of content - all without programming. …”
Libro electrónico -
3158por Soper, Mark Edward“…To discover some of the most useful features included in Windows 8, see the suggestions below. Start Screen with Live Tiles Windows 8’s new Start screen puts you just a click away from your favorite media, web browsing, games, messaging, and more. …”
Publicado 2012
Libro electrónico -
3159“…Regulation A+ allows certain companies to avoid the SEC periodic reporting regimen (Form 10-K, Form 10-Q, Form 8-K, and proxy statements), provided that the number of shareholders is kept below revised thresholds. Regulation A+ exempts certain companies from many onerous and costly compliance requirements, including Sarbanes-Oxley. …”
Libro electrónico -
3160Publicado 2017“…What You Will Learn Understand the benefits of scripting and automation and get started using Powershell with Office 365 Explore various PowerShell packages and permissions required to manage Office 365 through PowerShell Create, manage, and remove Office 365 accounts and licenses using PowerShell and the Azure AD Learn about using powershell on other platforms and how to use Office 365 APIs through remoting Work with Exchange Online and SharePoint Online using PowerShell Automate your tasks and build easy-to-read reports using PowerShell In Detail While most common administrative tasks are available via the Office 365 admin center, many IT professionals are unaware of the real power that is available to them below the surface. This book aims to educate readers on how learning PowerShell for Office 365 can simplify repetitive and complex administrative tasks, and enable greater control than is available on the surface. …”
Libro electrónico