Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 69
- Development 50
- Computer networks 44
- Management 38
- Application software 36
- Educació primària 28
- Ciencias empresariales 27
- Llibres de text 26
- Llibres del mestre 26
- Engineering & Applied Sciences 25
- Finance 25
- History 25
- Història 25
- Economics 24
- Business & Economics 23
- Certification 20
- Examinations 20
- Economic conditions 19
- Computer security 18
- Electronic data processing personnel 17
- Security measures 17
- Computer programs 16
- Universidad Pontificia de Salamanca (España) 16
- Electronic data processing 15
- Francisco Gárate 15
- Llibres d'exercicis 15
- Material didàctic 15
- Computer Science 14
- Information technology 14
- Law and legislation 14
-
1621Publicado 2020Tabla de Contenidos: “…Compiler as assistant -- 3.1. Documenting guarantees with type annotations -- 3.1.1. Adding optional type annotations -- 3.1.2. …”
Libro electrónico -
1622
-
1623por Iglesia Católica
Publicado 1975Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca de la Conferencia Episcopal Española, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto, Biblioteca Diocesana Bilbao, Biblioteca Diocesana de Salamanca, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Biblioteca de Pastoral Madrid)Libro -
1624Publicado 2019Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
1625Publicado 2017Tabla de Contenidos: “…Prerequisites for the installation of Stream Analytics tools -- Development of a Stream Analytics job using Visual Studio -- Defining a Stream Analytics query for Vehicle Telemetry job analysis using Stream Analytics tools -- Query to define Vehicle Telemetry (Connected Car) engine health status and pollution index over cities -- Testing Stream Analytics queries locally or in the cloud -- Stream Analytics job configuration parameter settings in Visual Studio -- Implementation of an Azure Stream Analytics job using the Azure portal -- Provisioning for an Azure Stream Analytics job using the Azure Resource Manager template -- Azure ARM Template - Infrastructure as code -- Getting started with provisioning Azure Stream Analytics job using the ARM template -- Deployment and validation of the Stream Analytics ARM template to Azure Resource Group -- Configuration of the Azure Streaming job with different input data sources and output data sinks -- Data input types-data stream and reference data -- Data Stream inputs -- Reference data -- Job topology output data sinks of Stream Analytics -- Summary -- Chapter 5: Building Using Stream Analytics Query Language -- Built-in functions -- Scalar functions -- Aggregate and analytic functions -- Array functions -- Other functions -- Data types and formats -- Complex types -- Query language elements -- Windowing -- Tumbling windows -- Hopping windows -- Sliding windows -- Time management and event delivery guarantees -- Summary -- Chapter 6: How to achieve Seamless Scalability with Automation -- Understanding parts of a Stream Analytics job definition (input, output, reference data, and job) -- Deployment of Azure Stream Analytics using ARM template -- Configuring input -- Configuring output -- Building the sample test code -- How to scale queries using Streaming units and partitions -- Application and Arrival Time…”
Libro electrónico -
1626Publicado 2022Tabla de Contenidos: “…. -- Introduction -- Background -- The Front-Runner Models and Solidaristic Wage Policy -- Low-wage Guarantees Through Collective Bargaining -- Food Industry - Augmented Minimum-Wage Rise -- Retail - Prioritizing Those With a Stable Connection to the Industry -- Construction - Emergence of Low Wages in an Industry With No Tradition of Low-Wage Challenges -- Cleaning and Hospitality - Industries With Little Regulatory Capacity Through Collective Institutions -- Discussion -- Wages and the Problem of Low Wages Are the Responsibility of the Social Partners -- Instruments Need to Be Developed in a Changing Labour Market -- The Challenges - Can the Social Partners Also Ensure an Acceptable Wage Floor in the Future? …”
Libro electrónico -
1627por Pathak, R. P.Tabla de Contenidos: “…Process of instruction and methods of teaching -- Aims of education and organization of curriculum -- Discipline and interest -- Influence of Dewey on Modern Education -- Epistemology of Pragmatism -- The Metaphysics of Pragmatism -- The world is all foreground -- The world is characterized throughout by process and change -- The world is precarious -- The world is incomplete and indeterminate -- The world is pluralistic -- The world has ends within its own process -- Man is one with the world -- Man is not the active cause of the world -- The world does not guarantee progress -- The Axiology of Pragmatism -- Pragmatism and Education -- Aim of education -- Pragmatism and problems of education -- Pragmatism and the educative process -- Pragmatism and methods of teaching -- Education as a Social Institution -- The Pupil -- The Objective of Education -- The Educative Process -- Progressive education -- Summary -- Key Words -- Notes and References -- Additional Readings -- Chapter 7: Realism in Education -- Definitions of Realism -- Differences between realism and naturalism -- Differences between realism and pragmatism -- Concept of Realism -- Historical Perspective of Realism -- The pupil -- The curriculum -- Methods of teaching -- The teacher -- Assessment of realism -- Realism in Education -- Aims of education -- Effect of realism upon education -- Realism of Aristotle -- Realism in Jainism -- Summary -- Key Words -- Additional Readings -- Chapter 8: Existential/Logical Position of Education -- Meaning of Logical Positivism -- Concepts of Existentialism -- Historical Development of Logical Positivism -- Sources of logical positivism -- Meaning of education in existentialism -- Methods of teaching in existentialism -- Logical Positivism and the Way We Think -- Metaphysics of Logical Positivism -- Logical Positivism and the Philosophy of Education…”
Publicado 2011
Libro electrónico -
1628Publicado 2007Tabla de Contenidos: “…-- Basic hypotheses, material and methods of the project -- The importance of seeking to create meaning without guaranteeing that it will lead to a shared meaning -- The psychobiological founded source of musicality of the human being -- Interaction and shared experience -- The esthetical perspective -- Using something else than training as a starting point or laissez faire -- Lasse, an example -- Acknowledgment -- Notes -- References -- To sing and dance together -- Communicative musicality is part of us, the way we converse by moving -- Innate rhythms and expressions of relating -- Moving to move others -- An exact science of musical movement -- Being moved by song -- Coda: A strategy for finding the variables of human sympathy in movement -- Acknowledgements -- References -- On circular re-enactment of care and abuse, and on other-centred moments in psychotherapy -- When toddlers afford proto-care, even altruism -- Basis for circular re-enactment -- Empirical support: Abused toddlers are more likely to become abusive than other toddlers, and many adult abusers have been childhood victims of abuse…”
Libro electrónico -
1629Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1 - Serverless Essentials -- Chapter 1: Serverless Computing and Function as a Service -- Evolution of computing in the cloud -- Benefits of cloud computing -- CAPEX versus OPEX -- Virtualization, software-defined networking, and containers -- Types of cloud computing -- Cloud service delivery models - IaaS, PaaS, and SaaS -- Serverless and FaaS -- FaaS and BaaS -- Microservice architecture -- Containers, orchestration, and microservices -- Event-driven architecture -- Events -- Structure and components of an EDA -- Benefits of EDA -- Use cases -- Disadvantages -- Brokers -- FaaS in detail - self-hosted FaaS -- Cloud FaaS versus self-hosted FaaS -- API gateways and the rise of serverless API services -- The case for serverless -- Summary -- Chapter 2: Backend as a Service and Powerful Serverless Platforms -- BaaS -- Messaging systems -- Message queues -- Pub-sub -- Message brokers and clusters -- Messaging protocols -- Push versus pull -- Guarantees in messaging -- Dead-letter queues -- Cloud messaging -- Object stores -- Design and features -- Workflow automation -- Cloud workflows -- NoSQL platforms -- Cloud NoSQL platforms -- Edge computing -- PoP -- CDNs -- Serverless at the edge -- IoT clouds -- Stream processing -- Future of serverless -- Trends in serverless -- Summary -- Part 2 - Platforms and Solutions in Action -- Chapter 3: Serverless Solutions in AWS -- Technical requirements -- Useful AWS concepts to know and refresh yourself on -- CloudFormation primer -- Advanced constructs in the CloudFormation template language -- Lambda - FaaS in AWS -- How Lambda works -- Important concepts -- Important configurations -- Lambda programming model -- Edge computing -- API Gateway -- HTTP API -- WebSocket API -- REST API -- Private REST API…”
Libro electrónico -
1630Publicado 2024Tabla de Contenidos: “…-- Choosing Go -- Concurrency and goroutines -- Concurrency -- Goroutines -- CSP-inspired model -- Share by communication -- Interacting with the OS -- Tooling -- go build -- go test -- go run -- go vet -- go fmt -- Cross-platform development with Go -- Summary -- Chapter 2: Refreshing Concurrency and Parallelism -- Technical requirements -- Understanding goroutines -- WaitGroup -- Changing shared state -- Managing data races -- Atomic operations -- Mutexes -- Making sense of channels -- How to use channels -- An unbuffered channel -- Buffered channels -- The guarantee of delivery -- Latency -- State and signaling -- State -- Signaling -- Choosing your synchronization mechanism -- Summary -- Part 2: Interation with the OS -- Chapter 3: Understanding System Calls -- Technical requirements -- Introduction to system calls -- The catalog of services and identification -- Information exchange -- The syscall package -- A closer look at the os and x/sys packages -- x/sys package - low-level system calls -- Operating system functionality -- Portability -- Everyday system calls -- Tracing system calls -- Tracing specific system calls -- Developing and testing a CLI program -- Standard streams -- File descriptors -- Creating a CLI application -- Redirections and standard streams -- Making it testable -- Summary -- Chapter 4: File and Directory Operations -- Technical requirements -- Identifying unsafe file and directory permissions -- Files and permissions -- Scanning directories in Go -- Understanding file paths -- Using the path/filepath package -- Traversing directories -- Symbolic links and unlinking files -- Symbolic links - the shortcut of the file world -- Unlinking files - the great escape act…”
Libro electrónico -
1631por OECDTabla de Contenidos: “…The foreign influence activities covered by the scheme should take into account not only influence on decision-making processes, but also on public debate -- 3.2.4. In order to guarantee fundamental freedoms and fluid state-to-state relations, France's scheme on the transparency of foreign influence activities may include a list of legitimate exemptions -- 3.3. …”
Publicado 2024
Libro electrónico -
1632Publicado 2024Tabla de Contenidos: “…Most common vulnerabilities and threats in CI -- Inadequately secured industrial control systems (ICS) -- Common vulnerabilities in industrial control systems (ICS) -- Ransomware targeting CI -- Supply chain attacks on CI components -- Legacy systems and lack of security updates -- Physical security breaches -- Internet of Things (IoT) vulnerabilities -- Summary -- References -- Part 2: Dissecting Cyberattacks on CI -- Chapter 4: The Most Common Attacks Against CI -- DDoS attack -- Volumetric attacks -- Reflection and amplification attacks -- Resource depletion attacks -- Protocol-based attacks -- Application layer attacks -- Ransomware attack -- Infection -- Encryption -- Ransom note -- Ransom payment -- Data recovery -- No guarantee of data recovery -- Supply chain attack -- Scope of attack -- Attack vector -- Stealth and persistence -- Data exfiltration -- Software supply chain attacks -- Hardware supply chain attacks -- Impersonation and trust exploitation -- Mitigation challenges -- Notable examples -- APT -- Phishing -- The anatomy of a phishing attack -- Impersonation and trust exploitation -- Pretexting and urgency -- Mimicking authority figures -- Deception and lure -- Malicious links and attachments -- Why do phishing tactics persist? …”
Libro electrónico -
1633Publicado 2021Tabla de Contenidos: “…Easier Parallelization of Algorithms Since C++17 -- Sorting and Output of a Container -- More Convenience with Ranges -- Non-Owning Ranges with Views -- Comparing Two Sequences -- Take Advantage of Boost -- More Libraries That You Should Know About -- Proper Exception and Error Handling -- Prevention Is Better Than Aftercare -- No Exception Safety -- Basic Exception Safety -- Strong Exception Safety -- The No-Throw Guarantee -- An Exception Is an Exception, Literally! …”
Libro electrónico -
1634Publicado 2021Tabla de Contenidos: “…The World Bank -- Background and Summary -- Introduction -- Focus on Smallholder Agricultural Development -- The International Development Association in the Context of Bank Instruments -- Lending and Administrative Budget Pressures -- The 1980s: Structural Adjustment and the Debt Crisis Legacy -- The 1990s: "The Lost Decade"-The Wapenhans Report and Debt Relief -- Rising Debt and Debt Relief for Heavily Indebted Countries -- The 2000s: Toward a Food and Financial Crisis -- The Bank's Gender Strategy and Implementation -- The World Bank's Work on Land Policy -- World Development Report 2008: Agriculture for Development -- Crisis Response -- The Bank's Assessment of Its Performance in Agriculture -- Going Forward -- The Bank Going Forward in a Changed Context -- Latest Readjustment for the World Bank -- Appendix A: Chronology of the World Bank -- Appendix B: Role of the International Finance Corporation -- Appendix C: Role of the Multilateral Investment Guarantee Agency -- Appendix D: Independent Evaluation Group and World Bank Project Performance Ratings -- 9. …”
Libro electrónico -
1635Publicado 2024Tabla de Contenidos: “…Understanding the major causes of fraud -- Common myths and misconceptions about financial fraud -- Myth 1-the impact of fraud is insignificant -- Myth 2-fraud is very hard to detect -- Myth 3-prosecution completely deters fraud -- Myth 4-preventing fraud is only important for big institutions -- Myth 5-large companies are the common targets of fraud -- Interpreting financial reports -- Horizontal or trend analysis -- Vertical analysis -- Competitor and industry analysis -- Cash flow analysis -- Learning how fraudulent transactions affect overall financial report integrity -- Fictitious revenues -- Improper capitalization of expenses -- Misrepresentation of liabilities and debt -- Detecting and preventing fraudulent transactions and anomalies -- Tone at the top -- Implementing strong internal controls -- Management review -- Ratio analysis -- Utilizing data analytics and machine learning in fraud detection -- Summary -- Further reading -- Part 3: Modern Strategies to Manage the Data Integrity of Finance Systems -- Chapter 8: Using Database Locking Techniques for Financial Transaction Integrity -- Technical requirements -- Getting started with SQL -- Installing PostgreSQL -- Creating a database -- Creating a table -- Inserting data into the table -- Learning how race conditions impact the transaction integrity of financial systems -- Reviewing how database locks prevent financial transaction integrity issues -- Guaranteeing transaction integrity with database locks -- Best practices when using database locks -- Summary -- Further reading -- Chapter 9: Using Managed Ledger Databases for Finance Data Integrity -- Technical requirements -- Introduction to ledger databases -- Creating an AWS account -- Creating an S3 bucket -- Creating the Amazon QLDB ledger -- Reviewing the internals of ledger databases -- Getting the digest -- Creating a table…”
Libro electrónico -
1636Publicado 2025Tabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright -- Contents -- About the Editors -- List of Contributors -- Section 1 Introduction to CR-IoV -- 1 Intelligent Transportation System in Cognitive Radio Internet of Vehicles -- 1.1 Introduction -- 1.2 Cognitive Radio in the IoV -- 1.2.1 Cognitive Radio -- 1.2.2 Cognitive Cycle -- 1.3 Applications of CR-based IoV in ITSs -- 1.3.1 Safety -- 1.3.2 Service-Oriented Applications -- 1.4 Application Requirements -- 1.4.1 Delay -- 1.4.2 Guaranteed Delivery -- 1.4.3 Bandwidth -- 1.5 Issues and Challenges -- 1.5.1 Unreliable Delivery -- 1.5.2 Dynamic Topology -- 1.5.3 Routing Overhead -- 1.5.4 Scalability -- 1.5.5 Energy -- 1.5.6 Spectral Efficiency -- 1.6 Conclusion -- References -- Section 2 Machine Learning in CR-IoV -- 2 Machine Learning Applications in CR-IoV -- 2.1 Introduction -- 2.2 Overview of ML Techniques -- 2.2.1 Categorization of ML Techniques -- 2.2.2 Supervised Learning -- 2.2.3 Distributed Training and Inference of ML Models -- 2.3 ML Challenges and Enablers in the CR-IoV -- 2.3.1 Definitions -- 2.3.2 The CR-IoV -- 2.3.3 ML in CR -- 2.3.4 ML in the IoV -- 2.3.5 Towards a ML-Enabled CR-IoV -- 2.4 ML Applications in the CR-IoV -- 2.4.1 Spectrum Sensing and Channel Allocation -- 2.4.2 Road Safety -- 2.4.3 Security Issues -- 2.5 Challenges, Issues, and Future Directions -- 2.5.1 Machine Learning-Related Challenges -- 2.5.2 State and Network Dynamics -- 2.5.3 Multi-Agent RL (MARL) in the CR-IoV -- 2.5.4 Distributed Learning and the CR-IoV -- 2.5.5 Scalability and Universality in the CR-IoV -- 2.6 Conclusion -- References -- Section 3 Protocol and Infrastructure -- 3 Machine Learning Techniques in Conjunction with Data Science Applications for CR-IoV -- 3.1 Introduction -- 3.2 The Communication of CR-IoV -- 3.3 Demand of Machine Learning and Data Science in CR-IoV…”
Libro electrónico -
1637Publicado 2017Tabla de Contenidos: “…-- How mature is your organization? -- Helping to guarantee success -- Business alignment -- Information security is a business project not an IT project -- Organizational change management -- Key information security program plan elements -- Develop your information security program strategy -- Establish key initiatives -- Define roles and responsibilities -- Defining enforcement authority -- Pulling it all together -- Summary -- Chapter 6: Continuous Testing and Monitoring -- Types of technical testing -- SDLC considerations for testing -- Project initiation -- Requirements analysis -- System design -- System implementation -- System testing -- Operations and maintenance -- Disposition -- SDLC summary -- Continuous monitoring -- Information security assessment automation -- Effective reporting of information security status…”
Libro electrónico -
1638Publicado 2004Tabla de Contenidos: “…Products for near-realtime BI -- 4.1 Data warehousing - Base for BI -- 4.1.1 DB2 - the database of choice -- 4.2 WebSphere MQ for guaranteed data delivery -- 4.2.1 Queue clustering -- 4.2.2 DB2 MQ Listener -- 4.2.3 DB2 MQ functions -- 4.2.4 WebSphere business integration brokers -- 4.3 Information integration -- 4.3.1 DB2 Information Integrator -- 4.3.2 Data replication -- 4.3.3 Data federation -- 4.4 Data transformation -- 4.4.1 DB2 Warehouse Manager -- 4.4.2 Ascential Software -- 4.5 Workload management -- 4.5.1 DB2 Query Patroller for workload management -- 4.5.2 DB2 Governor for resource management -- Chapter 5. …”
Libro electrónico -
1639Publicado 2009Tabla de Contenidos: “…-- The Puzzle of the 'Head Count' -- Poverty Beyond the 'Poverty Line' -- Poverty as Capability Deprivation and Lack of Social Opportunity -- Poverty, Hunger and Food Insecurity -- Poverty and Unemployment -- State Planning and the Fight Against Poverty -- Public Distribution System -- Employment Guarantee Schemes -- Economic Growth, Inequality of Opportunity and Regional Disparity -- Exclusion and Social Conflict -- Suggested Readings -- Questions…”
Libro electrónico -
1640Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1 - Basic MongoDB - Design Goals and Architecture -- Chapter 1: MongoDB - A Database for the Modern Web -- Technical requirements -- The evolution of SQL and NoSQL -- The evolution of MongoDB -- MongoDB for SQL developers -- MongoDB for NoSQL developers -- MongoDB's key characteristics and use cases -- Key characteristics -- Use cases for MongoDB -- MongoDB criticism -- MongoDB configuration and best practices -- Operational best practices -- Schema design best practices -- Best practices for write durability -- Best practices for replication -- Best practices for sharding -- Best practices for security -- Best practices for AWS -- Reference documentation and further reading -- Summary -- Chapter 2: Schema Design and Data Modeling -- Technical requirements -- Relational schema design -- MongoDB schema design -- Data modeling -- Data types -- Modeling data for atomic operations -- Read isolation and consistency -- Modeling relationships -- One-to-one -- One-to-many and many-to-many -- Modeling data for keyword searches -- Modeling data for Internet of Things -- Connecting to MongoDB -- Connecting using Ruby -- Connecting using Python -- Connecting using PHP -- Summary -- Part 2 - Querying Effectively -- Chapter 3: MongoDB CRUD Operations -- Technical requirements -- CRUD using the shell -- Scripting for the mongo shell -- Administration -- MapReduce in the mongo shell -- Aggregation framework -- Securing the shell -- Authentication with MongoDB -- The new mongosh shell -- MongoDB Stable API -- Summary -- Chapter 4: Auditing -- Technical requirements -- Auditing and logging differences -- Audit setup in MongoDB Enterprise Edition -- Audit events and format -- Audit filters -- Audit guarantee -- Audit setup in MongoDB Atlas…”
Libro electrónico