Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,394
- Crítica e interpretación 1,018
- Història 1,001
- Biblia 883
- Filosofía 765
- History 678
- Peirce, Charles S. 367
- Clara de Asís 364
- Novela inglesa 339
- Computer programs 326
- Historia y crítica 325
- Política y gobierno 323
- Iglesia Católica 309
- Management 305
- Bíblia 298
- Teología 291
- Taxation 268
- Literatura 267
- Església Catòlica 259
- Darwin, Charles 252
- Law and legislation 252
- Business & Economics 247
- Biografia 238
- Política 236
- Data processing 235
- Development 216
- Novela norteamericana 214
- Derecho 209
- Economía 207
- Engineering & Applied Sciences 201
-
54321Publicado 2023“…When what you do is inextricably tied to who you are for so much of your life, it can be daunting to think of who you'll be if you slow down-or stop working entirely. You've charted your own career journey, made difficult choices, led teams through times of turmoil, celebrated big wins, and moved on from devastating losses. …”
Grabación no musical -
54322Publicado 1998“…–Charles Long If you think you're a really good programmer... read [Knuth's] Art of Computer Programming... …”
Libro electrónico -
54323por Organisation for Economic Co-operation and Development.“…The biometer flask is closed with a stopper through which an Ascarite filter is inserted. The unit is charged by injecting 10 ml of alkali solution into the side tube. …”
Publicado 1981
Libro electrónico -
54324Publicado 2021“…The 2019 local elections were marked by mobilization, protest, and high turnout, due to the focus on politically charged issues such as the toll roads, climate change, and municipal amalgamation. …”
Libro electrónico -
54325por Gross, John“…Interprété par des acteurs de légende (Charles Macklin, Edmund Kean, Henry Irving, John Gielgud, Laurence Olivier...), Shylock a inspiré Hazlitt, Heine, Proust ou Henry James, non sans les troubler. …”
Publicado 2019
Electrónico -
54326por Nielson, Seth James“…What You Will Learn Authentication technologies, including secure password storage and how hackers “crack” password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats…”
Publicado 2023
Libro electrónico -
54327por Harder, Jennifer“…You will: Use Illustrator’s Graphing Tools to create and modify basic charts or graphs Work with popular 2D effects to enhance your design in Illustrator Create 3D Shapes using Materials and Symbols and modify your 3D Graphs Explore basic Image Trace and Perspective options in Illustrator…”
Publicado 2023
Libro electrónico -
54328por Hermant, Héloïse“…Durant la minorité de Charles II, des polémiques opposent Juan José de Austria, fils naturel de Philippe IV, aux favoris successifs de la reine-mère qui exerce la régence. …”
Publicado 2020
Libro electrónico -
54329por Lacoste, Marie-Pierre“…Il recense l’ensemble des intendants de la vice-royauté de la Nouvelle-Espagne entre 1764 et 1821 quel que soit leur mode de nomination, qu’ils soient entrés ou non en charge. Il est le seul à étudier les intendants de cette aire géographique dans toute son intégralité territoriale (Nouvelle-Espagne, Guatemala, Louisiane, Cuba, Porto Rico, Philippines). …”
Publicado 2021
Libro electrónico -
54330Publicado 2010“…Ese carácter autogenésico se debe a las captaciones de la «razón poética», que abarcan la rebeldía humana, la ebriedad ritual, los vislumbres del misterio y la disposición a transmitir el secreto y, por tanto, la voz y la palabra encarnada, unidas a la música, que, nos dice, es «la que vence al silencio antes que el logos». Cuando Clara Janés conoce a María Zambrano, ha reflexionado mucho sobre estas cuestiones y se siente afianzada e impulsada a profundizar. …”
Libro -
54331por Kao, Wayne“…The authors walk through programming a macro and explain how to format shapes, diagrams, charts, text, tables with gradient and picture fills and different kinds of lines (e.g. a beveled compound line with a diamond arrowhead). …”
Publicado 2008
Libro electrónico -
54332Publicado 2006“…This book describes the key components of BIRT architecture, applications, and engines, including installing, deploying, and troubleshooting the Reporting and Charting engines in an Enterprise Java application-server environment.For developers who wish to incorporate custom business logic in their reports or access data from Java objects, the book describes BIRT's extensive scripting capabilities in JavaScript and Java. …”
Libro electrónico -
54333por Gulutzan, Peter“…SQL Performance Tuning is a handbook of practical solutions for busy database professionals charged with managing an organization's critically important data. …”
Publicado 2003
Libro electrónico -
54334Publicado 1997“…—Charles Long If you think you're a really good programmer... read [Knuth's] Art of Computer Programming... …”
Libro electrónico -
54335Publicado 1997“…With a foreword by Larry Wall, the creator of Perl, this smooth, carefully paced book is the "official" guide for both formal (classroom) and informal learning. …”
Libro electrónico -
54336por Retana, Alvaro, 1968-“…Specific topics covered include: The foundations of EIGRP, including the Diffusing Update Algorithm (DUAL) A comparison of EIGRP to other interior gateway routing protocols Configuring summarization Standard and extended access distribution lists Hierarchy and redundancy in network topology Path selection Multiple EIGRP autonomous systems Isolating misbehaving routers Solving problems with neighbor relationships Stuck in Active (SIA) routes Serving as both a complete reference and a practical handbook, EIGRP for IP is an essential resource for network professionals charged with maintaining an efficient, smoothly functioning network…”
Publicado 2000
Libro electrónico -
54337por Radkay, Michael, 1967-“…In The RDS Forex System, former pit trader Michael Radkay provides forex traders with a unique system for identifying support and resistance zones in the foreign currency market and developing profitable trading strategies around those zones.The system uses market volatility, momentum, and chart patterns to calculate support and resistance zones. …”
Publicado 2012
Libro electrónico -
54338Publicado 2012“…Key topics covered include Installing and deploying BIRT Deploying a BIRT report to an application server Understanding BIRT architecture Scripting in a BIRT report design Integrating BIRT functionality into applications Working with the BIRT extension framework This revised and expanded third edition features the following new content Updated architectural diagrams Expanded scripting examples Debugging event handlers Developing an advanced report item with data binding Developing a data extraction extension Developing a charting extension Readers may also be interested in this book’s companion volume. …”
Libro electrónico -
54339Publicado 2015“…The book includes case history segments for Toyota, Acer, eBay, ABB, Cisco, Blackberry, Tata, Samsung, Volvo, Charles Schwab, McDonald, Scania, Starbucks, Google, Disney, NUMMI and others. …”
Libro electrónico -
54340Publicado 1997“…–Charles Long If you think you're a really good programmer... read [Knuth's] Art of Computer Programming... …”
Libro electrónico