Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 16,540
- Biblia 6,706
- Filosofía 4,716
- Universidad Pontificia de Salamanca (España) 4,581
- Crítica e interpretación 4,079
- Derecho 3,747
- RELIGION 3,643
- Educación 3,564
- Història 3,432
- Iglesia Católica 3,123
- Ciencias sociales 2,926
- Moral cristiana 2,558
- Teología dogmática 2,461
- Teología 2,379
- Psicología 2,358
- Sermones 2,216
- Management 2,201
- Development 2,161
- Derecho canónico 2,131
- History 1,989
- Derecho civil 1,961
- Education 1,951
- Documentales 1,893
- Universidad Pontificia de Salamanca, Facultad de Educación 1,877
- Engineering & Applied Sciences 1,850
- Medicina 1,763
- Tecnología 1,715
- Philosophy 1,704
- Application software 1,700
- Economía 1,626
-
641201Publicado 2023Tabla de Contenidos: “…4.7.1.2 Issues in Security -- 4.7.1.3 Governance and Regulation on the Internet of Drones Adaption -- 4.7.2 Research Gap and Future Direction on IoMD -- 4.8 Conclusions -- References -- 5. CoVacciDrone: An Algorithmic-Drone-Based COVID-19 Vaccine Distribution Strategy -- 5.1 Introduction -- 5.2 Dividing Sections into COVID Divisions with Voronoi Diagrams -- 5.3 Cost Optimization with Dynamic Connectivity -- 5.4 Dynamic Connectivity with Euler Tour Trees -- 5.5 Dynamic Connectivity with Cut-sets -- 5.6 Results and Observation -- References -- 6. …”
Libro electrónico -
641202
-
641203
-
641204Tabla de Contenidos: “…4.2.1 Components of Tivoli Software Distribution -- 4.2.2 Software distribution process overview -- 4.3 Data Moving -- 4.3.1 Using the Data Moving Service -- 4.4 Enterprise Data Warehouse integration -- Chapter 5. Deployment Services -- 5.1 Activity Planner -- 5.1.1 Activity Planner components -- 5.1.2 Roles required for the Activity Planner -- 5.1.3 Types of activities -- 5.1.4 Activity Plan Editor -- 5.1.5 Activity Plan Monitor -- 5.1.6 Activity Planner commands -- 5.2 Change Manager -- 5.2.1 Change Manager components -- 5.2.2 Sample Change Manager scenario -- 5.3 Enterprise Directory integration -- 5.3.1 Exchanging data with a directory server -- 5.3.2 Manipulating DirectoryContext objects -- 5.3.3 Directory query libraries and query directories -- 5.4 Resource Manager and pervasive devices -- 5.4.1 Choosing where to install the Resource Manager components -- 5.4.2 Web Gateway installation -- 5.4.3 Web objects -- 5.4.4 Registering the resource types -- 5.4.5 Associating endpoints with the resource gateway -- 5.4.6 Enrolling pervasive devices -- 5.4.7 Installing and configuring devices for resource manager -- 5.4.8 Installing the device agent for Windows CE devices -- 5.4.9 The user ID of palm devices -- 5.4.10 Inventory scans on pervasive devices -- 5.5 Pristine Manager -- 5.5.1 Pristine Manager architecture and new components -- 5.5.2 Supported platforms for pristine installation -- 5.5.3 Key terms -- 5.5.4 Pristine Manager concepts -- 5.5.5 Prerequisites -- 5.5.6 Installing pristine machines -- 5.5.7 Customizing Pristine Manager -- 5.5.8 Adding an Operating System Element to a reference model -- 5.5.9 Pristine Manager commands -- 5.5.10 IBM Tivoli Enterprise Console notification -- Chapter 6. …”
Libro electrónico -
641205
-
641206Publicado 2019“…Herbert Tröndle, im Alter von 98 Jahren. Tröndle gehörte wegen seiner schriftstellerischen Tätigkeit, nicht zuletzt als Kommentator des StGB, als gefragter Gutachter vor dem Deutschen Bundestag und dem Bundesverfassungsgericht, aufgrund einer wirkmächtigen akademischen Lehrtätigkeit sowie durch die Kraft seiner Persönlichkeit zu den führenden deutschen Strafrechtswissenschaftlern des XX. …”
Libro -
641207Publicado 2008Materias:Red de bibliotecas Iglesia Navarra (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso, Red de Bibliotecas de la Archidiócesis de Granada, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca de la Conferencia Episcopal Española, Biblioteca Universidad de Deusto, Biblioteca Central de Capuchinos de España, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Bibliotecas de la Diócesis de Teruel y Albarracín, Universidad Loyola - Universidad Loyola Granada, Biblioteca IEBA Jerusalén, Biblioteca del Seminario Diocesano de Jaén)Libro
-
641208por Medrano, Manuel JoséTabla de Contenidos: “…Domingo de Guzman. 2. primera parte progresos de sus fundaciones y vidas de los ilustres hijos que la ennoblecieron, desde la muerte de su glorioso Patriarcha, hasta el año de MCCC : tomo segundo, desde el año de MCCXXI hasta el fin del siglo XIII. 3. segunda parte ... : tomo primero, trata de los sucesos, fundaciones y vidas de los santos y heroes ilustres que pertenecen a los primeros cinquenta años. 4. segunda parte, progressos de sus fundaciones y vidas de los illustres hijos que la ennoblecieron ... : tomo segundo ... 5. tercera parte ..., contiene los varios ... accidentes del siglo XV de la Iglesia y III de dicha religión ...: tomo primero, trata de los sucesos, fundaciones y vidas de los santos ... que pertenecen a los primeros L años…”
Publicado 1725
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Accés lliure via BiPaDi
Libro -
641209por Erner, GuillaumeTabla de Contenidos: “…MÁS LAS REDES QUE LAS INFLUENCIAS; 2. ¿QUIÉNES SON LOS INFLUENCIADORES?; CAPÍTULO V LAS TENDENCIAS: UN PROCESO SIN (...)…”
Publicado 2010
Libro electrónico -
641210Publicado 2005Tabla de Contenidos: “…Introducción; 5.1. De la ideología comunicacional; 5.2. De los criterios de gestión; 6. …”
Libro electrónico -
641211por Rodríguez Becerra, ManuelTabla de Contenidos: “…VARIACIÓN DE NIVELES DE AGUA (...) -- FIGURA 5. CORTE TRANSVERSAL TÍPICO EN UN (...) -- FIGURA 6. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
641212por Vázquez Allegue, JaimeTabla de Contenidos: “…Versiones de la Biblia -- 5.1. Versiones antiguas -- 5.2. Versiones modernas -- 5.3. …”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
641213por Chaparro Amaya, AdolfoTabla de Contenidos: “…Rebis. "La danza hermética en un mundo cibernético" -- Diquis Tiquis (Costa Rica). …”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
641214por Lewandowska, JuliaTabla de Contenidos: “…La palabra no olvida de donde vino»: las interpelaciones autorales -- 1.1.1. La autoría en la Alta Edad Moderna: un acercamiento teórico histórico -- 1.1.2. …”
Publicado 2019
Libro electrónico -
641215Tabla de Contenidos: “…Business Continuity Plan Validation & Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors…”
Libro electrónico -
641216por Joshua GoldsteinTabla de Contenidos: “…-- Chapter 2 Realist Theories -- Realism -- Power -- Defining Power -- Estimating Power -- Elements of Power -- The International System -- Anarchy and Sovereignty -- Balance of Power -- Great Powers and Middle Powers -- Power Distribution -- Hegemony -- The Great Power System, 1500-2000 -- Alliances -- Purposes of Alliances -- NATO -- Public Opinion and International Relations Public Opinion and ICAN -- Seeking the Collective Good NATO in Afghanistan -- Other Alliances -- Regional Alignments -- Strategy -- Statecraft -- Policy Perspectives Prime Minister of India, Narendra Modi -- Rationality in International Relations -- The Prisoner's Dilemma -- Chapter Review -- Let's Debate the Issue Can the United States and China Coexist Peacefully? …”
Publicado 2021
Libro electrónico -
641217Publicado 2022Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Supplier Diversity -- Chapter 1 Understanding the Growing Demand for Supplier Diversity -- Breaking Down What Supplier Diversity Is and Isn't -- What it is -- What it's not -- Investigating Whether Supplier Diversity Is Still Necessary -- Looking at reasons supplier diversity is still necessary -- Considering what supplier diversity needs to do to stay relevant -- Examining External Drivers Redefining Supplier Diversity -- Growth of minority entrepreneurship -- Demographic shifts: The changing face of the majority -- Social activism/economic inclusion -- Accountability to secondary stakeholders -- Recognizing Why Organizations Are Recommitting to Supplier Diversity -- Complex business challenges/ strategic advantage -- Increased focus on collaboration in the supply chain -- Compliance with the law -- Accountability to primary stakeholders -- Corporate social responsibility/stewardship -- Chapter 2 Understanding the Foundation of Supplier Diversity -- Looking at Where It All Began -- Executive Order 10925 (1961): Established Committee on Equal Opportunity Employment -- Executive Order 11246 (1965): Established Requirements for Non-discriminatory Practices -- Executive Orders 11458 (1969) and 11625 (1971): Economic Entrepreneurial b Equality -- Public Law 95-507 (1978) -- Examining the Evolution of Supplier Diversity -- Compliance with federal law (1969-1990) -- The right thing to do (1990s-early 2000s) -- Making the business case (2000s-present) -- Pondering the Future of Supplier Diversity -- Business and program globalization -- Strategic advantage -- Economic imperative…”
Libro electrónico -
641218
-
641219Publicado 2018Tabla de Contenidos: “…Designing application solutions using Azure Functions -- Durable Functions -- Workflow-driven applications using Logic Apps -- Designing application solutions using Logic Apps -- Designing for serverless computing using Azure Container Instances -- Creating containers -- Container orchestrations -- Azure Service Fabric -- Life cycle management -- API Management -- API Gateway -- API Management portal -- Developer portal -- Cloud-native deployments versus migrating assets -- Summary -- Questions -- Further reading -- Chapter 5: Robust Networking Implementations -- Technical requirements -- Azure Virtual Network -- IP addresses -- Public IP address -- Private IP address -- Creating a public IP address -- DNS -- Creating a VNet with two subnets -- Azure Load Balancer -- Probes -- Azure Traffic Manager -- Azure Application Gateway -- External connectivity for Azure Virtual Networks -- Azure VPN -- Site-to-site VPN -- VNet-to-VNet VPN -- Point-to-site VPN -- ExpressRoute -- Network security strategies -- DMZ -- Network Security Groups -- Creating a NSG -- User Defined Routes -- Creating User Defined Routes -- Virtual network service tunneling -- Web Application Firewall -- Summary -- Questions -- Further reading -- Chapter 6: Connecting Hybrid Applications -- Azure Relay service -- Hybrid connections -- WCF Relays -- Azure Data Management Gateway for Data Factory -- Azure On-premises Data Gateway -- Azure App Service Hybrid Connections -- Azure App Service Virtual Network Integration -- Azure AD Application Proxy -- Joining VMs to domains -- Enabling Azure AD Domain Services -- Adding the VM to the managed domain -- Summary -- Questions -- Further reading -- Chapter 7: Using Storage Solutions -- Technical requirements -- Azure Storage and replication types -- Storage account types -- General-purpose v1 (GPv1) -- Blob storage -- General-purpose v2 (GPv2)…”
Libro electrónico -
641220Publicado 2018Tabla de Contenidos: “…-- Case studies of social engineering -- CEO fraud -- Financial phishing -- Social media phishing -- Ransomware phishing -- Bitcoin phishing -- Social engineering case study - Keepnet labs phishing simulation -- Analysis of top ten industries -- Examination of total emails sent within one year -- Evaluation of social engineering attacks of the top five companies with the largest number of users -- Tips -- Summary -- Chapter 11: Ask the Experts - Part 1 -- Troy Hunt -- Jonathan C. …”
Libro electrónico