Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 17,089
- Biblia 7,021
- Filosofía 4,822
- Universidad Pontificia de Salamanca (España) 4,581
- Crítica e interpretación 4,502
- Derecho 3,897
- RELIGION 3,643
- Educación 3,596
- Història 3,419
- Iglesia Católica 3,150
- Ciencias sociales 2,926
- Teología 2,833
- Teología dogmática 2,624
- Moral cristiana 2,534
- Derecho canónico 2,502
- Psicología 2,360
- Sermones 2,242
- Derecho civil 2,224
- Management 2,201
- Medicina 2,195
- Development 2,161
- History 1,988
- Education 1,951
- Documentales 1,893
- Universidad Pontificia de Salamanca, Facultad de Educación 1,877
- Engineering & Applied Sciences 1,850
- Tecnología 1,715
- Philosophy 1,704
- Application software 1,700
- Economía 1,629
-
664541Publicado 2022“…With a clear structure covering the key areas of the Evolution of Cybersecurity, Cybersecurity Basics, Cybersecurity Tools, Cybersecurity Regulation, Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk Management, Cybersecurity Risk Management Strategy, and Vendor Risk Management Strategy, the book provides a guide for professionals as well as a key text for students studying this field.The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how they can respond. …”
Libro electrónico -
664542Publicado 2024Tabla de Contenidos: “…Chapter 1 Introduction to “The Philosophy” -- Chapter 2 Team Dynamics -- Chapter 3 Remote Teams -- Chapter 4 Cloud Native Software Development -- Chapter 5: Not So Agile -- Chapter 6: Radical Process -- Chapter 7: Ethical AI -- Chapter 8: Positive Feedback -- Chapter 9: Open Source -- Chapter 10: Not so Agile -- Chapter 11: Infinite Possibilities -- Chapter 12: Radical Therapy for Organizations -- Chapter 13: Fostering Empathy and Resilience -- Chapter 14: An Example to Build On -- Chapter 15 Terms…”
Libro electrónico -
664543Publicado 2021Tabla de Contenidos: “…Developing a Posthuman Approach: A Framework and Instrument 5. Developing the Intrasubjective Mediating Framework / Richard S. …”
Libro electrónico -
664544Publicado 2018Tabla de Contenidos: “…About the Special Issue Editors -- Hai-Wen Li, Min Zhu, Craig Buckley and Torben R. Jensen Functional Materials Based on Metal Hydrides, Reprinted from: Inorganics 2018, 6, 91, doi: 10.3390/inorganics6030091 -- Julián Puszkiel, Sebastiano Garroni, Chiara Milanese, Fabiana Gennari, Thomas Klassen, Martin Dornheim and Claudio Pistidda Tetrahydroborates: Development and Potential as Hydrogen Storage Medium Reprinted from: Inorganics 2017, 5, 74, doi: 10.3390/inorganics5040074 -- Juan Luis Carrillo-Bucio, Juan Rogelio Tena-García and Karina Suárez-Alcántara Dehydrogenation of Surface-Oxidized Mixtures of 2LIBH + Al/Additives (TiF3 or CeO2), Reprinted from: Inorganics 2017, 5, 82, doi: 10.3390/inorganics5040082 -- Yuki Nakagawa, Shigehito Isobe, Takao Ohki and Naoyuki Hashimoto Unique Hydrogen Desorption Properties of LIAIH,/h-BN Composites, Reprinted from: Inorganics 2017, 5, 71, doi: 10.3390/inorganics5040071 -- Liuzhang Ouyang, Hao Zhong, Hai-Wen Li and Min Zhu A Recycling Hydrogen Supply System of NaBH, Based on a Facile Regeneration Process: A Review Reprinted from: Inorganics 2018, 6, 10, doi: 10.3390/inorganics6010010 -- Michael Heere, Seyed Hosein Payandeh Gharib Doust, Matteo Brighi, Christoph Frommen, Magnus H. …”
Libro electrónico -
664545por Billionnet, Alain , authorTabla de Contenidos: “…Frontmatter -- Introduction -- Contents -- Chapter 1 Basic Problem and Variants -- Chapter 2 Fragmentation -- Chapter 3 Connectivity -- Chapter 4 Compactness -- Chapter 5 Other Spatial Aspects -- Chapter 6 Biological Corridors -- Chapter 7 Species Survival Probabilities -- Chapter 8 Scenarios -- Chapter 9 Species Survival Probabilities' Scenarios -- Chapter 10 Phylogenetic Diversity -- Chapter 11 Specific and Genetic Diversity -- Chapter 12 Climate Change -- Appendix -- Index…”
Publicado 2021
Libro electrónico -
664546Publicado 2021“…The studies in this book range from evaluation methods for the perception of noise and outline forecast criteria that can be integrated with applications for acoustic mapping as well as the use of innovative techniques and materials for its abatement. …”
Libro electrónico -
664547Publicado 2019“…This book emphasises the power of metacognition at different levels of learning. It can be seen as a parallel intervention approach, with expanded knowledge on how to extend existing skills for young children, which is a pre-intervention. …”
Libro electrónico -
664548Publicado 2022Tabla de Contenidos: “…Leveraging Livestock Production Systems for Human Nutrition in Developing Countries 5. Importance of Monitoring the Peripartal Period to Increase Reproductive Performance in Dairy Cattle 6. …”
Libro electrónico -
664549por Bouvier, Charlène“…Support for the world of livestock farming can no longer be thought of solely in terms of development, it must also take into account the necessary transitions. …”
Publicado 2022
Libro electrónico -
664550Publicado 2010“…It has in fact been marked for centuries by a failure to recognise the needs of the youngsters and their own subjectivity, to the point of arriving at disturbing levels of violence and coercion. …”
Libro electrónico -
664551Publicado 2022“…But are executives themselves really the greedy, self-interested, fat cats of popular culture? Based on a thought experiment and survey of beliefs of over a thousand senior executives from around the world, Pepper and his colleagues found that business executives in fact tend not to justify their pay levels as if they were ethical egoists entitled to act entirely in their own self-interest. …”
Libro electrónico -
664552Publicado 2022“…This is a comprehensive description of a language spoken some 450 km offshore from the mainland of Papua New Guinea. …”
Libro electrónico -
664553Publicado 2018“…Encountering a short story about a lonely marine biologist in Antarctica, Temple Grandin remembers her past with an uncharacteristic emotional intensity, and she reminds the reader of the myriad ways in which people can relate to fiction. Why must there be a norm?…”
Libro electrónico -
664554Publicado 2018Tabla de Contenidos: “…Vertigo, 1920–1928 -- Chapter 5. Depression, 1928–1938 -- Chapter 6. Assertion, 1938–1946 -- Chapter 7. …”
Libro electrónico -
664555Publicado 2022“…The examples described in this volume suggest how intentional attention to health data sharing can enable unparalleled advances, securing a healthier and more equitable future for all…”
Libro electrónico -
664556por National Academy of Medicine (U.S.)“…Also underscored are actions that clinicians can take to improve their skills and effectiveness in the face of the growing need, including leadership engagement to ensure that communities have the resources and tools that clinicians require to fulfill their responsibilities…”
Publicado 2017
Libro electrónico -
664557Publicado 2009“…We identified one randomized controlled trial showing that osteopathy can potentially reduce the degree of postural asymmetry among infants, but the study did not reveal any changes in vegetative parameters following treatment. …”
Libro electrónico -
664558Publicado 2019Tabla de Contenidos: “…Front Cover -- Tilte Page -- Copyright Page -- Contents -- Preface -- 1 Digital Systems and Binary Numbers -- 1.1 Digital Systems -- 1.2 Binary Numbers -- 1.3 Number‐Base Conversions -- 1.4 Octal and Hexadecimal Numbers -- 1.5 Complements of Numbers -- 1.6 Signed Binary Numbers -- 1.7 Binary Codes -- 1.8 Binary Storage and Registers -- 1.9 Binary Logic -- 2 Boolean Algebra and Logic Gates -- 2.1 Introduction -- 2.2 Basic Definitions -- 2.3 Axiomatic Definition of Boolean Algebra -- 2.4 Basic Theorems and Properties of Boolean Algebra -- 2.5 Boolean Functions -- 2.6 Canonical and Standard Forms -- 2.7 Other Logic Operations -- 2.8 Digital Logic Gates -- 2.9 Integrated Circuits -- 3 Gate‐Level Minimization -- 3.1 Introduction -- 3.2 The Map Method -- 3.3 Four‐Variable K‐Map -- 3.4 Product‐of‐Sums Simplification -- 3.5 Don't‐Care Conditions -- 3.6 NAND and NOR Implementation -- 3.7 Other Two‐Level Implementations -- 3.8 Exclusive‐OR Function -- 3.9 Hardware Description Languages (HDLs) -- 3.10 Truth Tables in HDLs -- 4 Combinational Logic -- 4.1 Introduction -- 4.2 Combinational Circuits -- 4.3 Analysis of Combinational Circuits -- 4.4 Design Procedure -- 4.5 Binary Adder-Subtractor -- 4.6 Decimal Adder -- 4.7 Binary Multiplier -- 4.8 Magnitude Comparator -- 4.9 Decoders -- 4.10 Encoders -- 4.11 Multiplexers -- 4.12 HDL Models of Combinational Circuits -- 4.13 Behavioral Modeling -- 4.14 Writing a Simple Testbench -- 4.15 Logic Simulation -- 5 Synchronous Sequential Logic -- 5.1 Introduction -- 5.2 Sequential Circuits -- 5.3 Storage Elements: Latches -- 5.4 Storage Elements: Flip‐Flops -- 5.5 Analysis of Clocked Sequential Circuits -- 5.6 Synthesizable HDL Models of Sequential Circuits -- 5.7 State Reduction and Assignment -- 5.8 Design Procedure -- 6 Registers and Counters -- 6.1 Registers -- 6.2 Shift Registers -- 6.3 Ripple Counters…”
Libro electrónico -
664559por Sánchez, John PaulTabla de Contenidos: “…Midwest Region -- Chapter 5. LHS+ Medical Student History and Heritage of the U.S. …”
Publicado 2024
Libro electrónico -
664560Publicado 2023“…Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security.It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval.The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. …”
Libro electrónico