Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 546
- Novela española 266
- Literatura 248
- Poesía española 197
- Sistema nerviós 162
- Premios Nobel 125
- Premios y recompensas 122
- Història 118
- Gremios 115
- Sanfermines (fiesta) 112
- Crítica e interpretación 111
- Arquitectura 108
- History 108
- Programas 106
- Fiestas- 104
- Malalties 100
- Premios 98
- Teatro español 85
- Formigó 79
- Research & information: general 71
- Formigó armat 69
- Filosofía 68
- Neurologia 66
- Derecho 61
- Gestió de projectes 60
- Premios literarios 58
- Biblia 56
- TFM 56
- Publicidad 52
- Nervios periféricos 51
-
12381Publicado 2019Tabla de Contenidos: “…Keratinocytes -- Other Cells of the Epidermis -- Thick and Thin Skin -- 5.3. The Dermis -- Papillary Layer -- Reticular Layer -- Skin Markings -- 5.4. …”
Libro electrónico -
12382Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
12383
Colección -
12384por Henao Robledo, FernandoTabla de Contenidos: “…Rotulado de sustancias químicas -- Riesgos para la salud -- Riesgo por inflamabilidad -- Riesgo por reactividad -- Riesgo especial -- Capítulo VIII. Límites máximos permisibles y almacenamiento -- 8.1. Límites máximos permisibles -- TLV-STEL (límite máximo permisible de corta duración) -- TLV-C (Límite máximo permisible techo) -- 8.2. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
12385Publicado 2007Tabla de Contenidos: “…7.1.3 Sequences -- 7 .1.4 Permutations -- 7.2 Induction -- 7.2.1 The Sum of Odd Numbers -- 7 .2.2 Subset Counting Revisited -- 7 .2.3 More Induction Proofs -- 7 .2.4 Counting Regions -- 7.3 Counting Subsets -- 7.3.1 The Number of Ordered Subsets -- 7 .3.2 The Number of Subsets of a Given Size -- 7 .3.3 The Binomial Theorem -- 7 .3.4 Distributing Presents -- 7 .3.5 Anagrams -- 7 .3.6 Distribution of Money -- 7.4 Pascal's Triangle -- 7 .4.1 Identities in the Pascal Triangle -- 7.4.2 A Bird's- Eye View at the Pascal Triangle -- 7.5 Combinatorial Probability -- 7.5.1 Events and Probabilities -- 7 .5.2 Independent Repetition of an Experiment -- 7 .5.3 The Law of Large Numbers -- 7.6 Fibonacci Numbers -- 7.6.1 Fibonacci's Exercise -- 7 .6.2 Lots of Identities -- 7 .6.3 A Formula for the Fibonacci Numbers -- 7.7 Integers, Divisors, and Primes -- 7. 7.1 Divisibility of Integers -- 7.7.2 Primes and Their History -- 7.7.3 Factorization into Primes -- 7.7.4 Fermat's "Little" Theorem -- 7.7.5 The Euclidean Algorithm -- 7. 7.6 Primality Test -- Chapter 8: Combinatorics -- 8.1 The Pigeonhole Principle -- 8.2 Strong Pigeonholes -- 8.2.1 Pigeonhole Principle Examples: Weighing Balls -- 8.3 Dilworth's Theorem -- 8.4 Problems -- 8.5 Sets of the Same Size: Bijections -- 8.6 Finite Sets -- 8.7 Inclusion-Exclusion -- 8.8 lnfinite Sets -- 8.9 Schroder-Bcrnstein Theorem -- 8.10 Countable Sets -- 8.11 The Continuum -- 8.12 Diagonal Argwnents -- 8.12.1 A Paradox -- 8.13 Set Theory Revisited -- 8.13.1 Bijections, Injections, Surjections -- 8.13.2 Finite Cardinality -- 8.14 Functions and Permutations -- 8.14.1 Surjection, Injection, Bijection -- 8.14.2 Permutation -- Chapter 9: Automata -- 9.1 Introduction -- 9.1.1 Abstraction -- 9.2 Decision Problems vs Functions -- 9.2.1 Strings -- 9.2.2 Operations on Strings -- 9.2.3 Operations on Sets…”
Libro electrónico -
12386Publicado 2017Tabla de Contenidos: “…3.3.2 Composition and Mechanical Behavior of Spongy Bone -- 3.4 Teeth -- 3.4.1 Tooth Anatomy and Evolution -- 3.4.2 Plaque, Organic Acids, Alter pH and Demineralize Tooth Surfaces -- 3.4.3 Dentin Exposure Through the Gum-line: Periodontal Disease -- 3.4.4 Tooth Statics and Dynamics: The Origins of Orthodontia -- 3.4.5 Endodonics: Resolving the Dying Internal Structure of a Tooth -- 3.4.6 Sealants as a Preventive Procedure to Fight Tooth Decay -- 3.4.7 Oral Surgery, Bone Implants, and Fracture Fixation -- 3.5 Conclusions -- 3.6 Problems -- References -- 4 Connective and Soft Tissues -- 4.1 Introduction -- 4.2 Protein Structure and Composition in the Circulatory System -- 4.3 Protein Structure of Valvular Tissue and Leaflets -- 4.3.1 Valve and Leaflet Defects -- 4.3.2 Aneurysms and Fistulae -- 4.3.3 Aortic Dissection -- 4.4 Dermal Tissues, Including Hair and Nerves -- 4.4.1 The Skin -- 4.4.2 The Subcutaneous or Adipose Tissues -- 4.4.3 The Dermis -- 4.4.4 The Stratum Corneum and Epidermis -- 4.4.5 Skin Care as a Business -- 4.5 Hair -- 4.5.1 Hair Morphology -- 4.5.2 Features and Attributes of Hair -- 4.5.3 Hair as a Business -- 4.6 Nails -- 4.7 Muscle Tissues -- 4.8 Looking Ahead -- 4.9 Conclusions -- 4.10 Problems -- References -- 5 Property Assessments of Tissues -- 5.1 Introduction -- 5.2 Mechanical Properties -- 5.2.1 Uniaxial Extension and Compression -- 5.3 How Much Does the Humerus Bone Length Shrink Upon Loading With the Bar? …”
Libro electrónico -
12387Publicado 2008Tabla de Contenidos: “…David Chipperfield Architects, b720 Arquitectes (Fermín Vázquez)…”
Libro -
12388por D'Addio, Anna Christina“…This report tries to explain observed changes in fertility rates across OECD countries, with an emphasis on socio-economic considerations. …”
Publicado 2005
Capítulo de libro electrónico -
12389por Ohyama, Takuji“…Farmers can use convenient chemical nitrogen fertilizers to obtain high crop yields. However, the inappropriate use of nitrogen fertilizers causes environmental problems such as nitrate leaching, contamination in groundwater, and the emission of N2O gas. …”
Publicado 2021
Libro electrónico -
12390por Organisation for Economic Co-operation and Development StaffTabla de Contenidos: “…Les prix et la production de la viande porcine -- Graphique 21. Fermeté relative des prix mondiaux des produits laitiers -- Graphique 22. …”
Publicado 1999
Libro electrónico -
12391Publicado 2020Tabla de Contenidos: “…Frontmatter -- Contents -- Introduction -- 1. Making Fertility Precarious: Egg Freezing and the Politicization of Reproductive Aging -- 2. …”
Libro electrónico -
12392por Fontaine, Jean-Marc“…Given the very low consumption of fertilizers in sub-Saharan Africa — a consumption level which is currently the lowest for all world regions — its agricultural development calls imperatively for an increase in the use of fertilizers. …”
Publicado 1991
Capítulo de libro electrónico -
12393por Sleebos, Joëlle“…Fertility rates have declined in most OECD countries to levels that are well below those needed to secure generation replacement. …”
Publicado 2003
Capítulo de libro electrónico -
12394por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Foreword -- How perceptions, norms, and attitudes can affect family formation in Norway -- Overview: Facing a future with demographic change in Norway -- Norway's comprehensive model of family policies -- Executive summary -- The work/family balance in Norway -- Family formation in Norway -- The economic and social impact of low fertility in Norway…”
Publicado 2023
Libro electrónico -
12395Publicado 2022“…In this regard, all terrestrial animals perform internal fertilization, whereas aquatic animals perform different reproductive strategies such as internal fertilization without mating, external fertilization, viviparous, oviparous, and parthenogenesis. …”
Libro electrónico -
12396por Gonand, Frédéric“…However, uncertainty about future longevity gains and fertility rates account for a large range of results for dependency ratios by 2050. …”
Publicado 2005
Capítulo de libro electrónico -
12397por Dubos, Bernard“…This guide designs fertilization schemes for oil palm plantations. It explains in clear language how to develop a fertilization scheme tailored to individual plantations taking the specific characteristics of each site into account. …”
Publicado 2020
Libro electrónico -
12398Publicado 2018“…Spermatozoa, the haploid male gametes, are highly specialized cells capable to fertilize eggs in order to produce diploid zygote. …”
Libro electrónico -
12399Publicado 2020“…This Special Issue hosts a collection of original research articles, focusing on the following topics: (1) The germinative and post-germinative behavior of Brassica napus seeds when severe S limitation is applied to the parent plants; (2) the independence of S-deficiency from the mRNA degradation initiation enzyme PARN in Arabidopsis; (3) the glucosinolate distribution in the aerial parts of sel1-10, a disruption mutant of the sulfate transporter SULTR1;2, in mature Arabidopsis thaliana plants; (4) the accumulation of S-methylcysteine as its γ-glutamyl dipeptide in Phaseolus vulgaris; and (5) the role of ferric iron chelation-strategy components in the leaves and roots of maize, have provided new insights into the effect of S availability on plant functionality. …”
Libro electrónico -
12400por Zorrila de San Martin, JosephTabla de Contenidos: “…Nos el doctor don Fermin Josef Texerizo de Texada, Dean, i el doctor don Josef de Uz Lopez i Pardo, maestrescuela, dignidades y Canónigos de esta Sta. …”
Publicado 1731
Colección