Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,350
- Història 354
- Sordos 339
- Crítica e interpretación 333
- Educación 323
- Cajas de ahorros 284
- Borges, Jorge Luis 258
- Hongos 251
- Niños sordos 242
- Poesía española 227
- Biblia 187
- Teresa de Jesús 184
- Espiritualidad 169
- Església Catòlica 158
- Misticismo 148
- Materiales 147
- Economía 128
- Arte 127
- Didáctica-Matemáticas 120
- Pintura española 116
- Universidad Pontificia de Salamanca (España) 116
- Agricultura 115
- Biografías 114
- Oxidación, corrosión y electroquímica 112
- Filosofía 110
- Historia y crítica 109
- Iglesia Católica 108
- Empresas 104
- Exposicions 104
- Literatura española 104
-
34221Publicado 1974“…We see him as a student cutting lab classes to attend an afternoon concert of the Boston Symphony, as a young man growing a van Dyke beard to make himself look older for his first job as an engineer with General Electric, and as a new assistant professor at Kansas State, courting his schoolteacher-sweetheart in a horse and buggy. His contributions to the engineering profession are many. …”
Libro electrónico -
34222Publicado 2019“…“No one who met Booth Tarkington ever forgot him,” says his great-niece. So, she introduces the reader to this multifaceted individual: the young man-about-town, the prankster, the writer of humorous letters (who drew caricatures in the margins), the bereaved father, the inspiration of the affection of three women (simultaneously), and the lover and collector of art objects and portraits. …”
Libro electrónico -
34223por Marina, José Antonio, 1939-“…De ahí que los gobernantes que inspiran horror lleven a menudo el apelativo de "el Grande". …”
Publicado 2008
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Pública Episcopal del Seminario de Barcelona, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Universitat Ramon Llull, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca de la Universidad de Navarra, Biblioteca Diocesana de Salamanca, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Universidad Loyola - Universidad Loyola Granada)Libro -
34224Publicado 2024“…"Majestuosos navíos surcando la mar, tremendos duelos artilleros, abordajes despiadados o el horror de la mesa del cirujano eran escenas que, hasta ahora, solo podíamos recrear con la imaginación. …”
Libro -
34225Publicado 2015“…The obstructions include metrics-obsessed academia, circular and incestuous peer review, digitalization of research as stalking horse for text- and data-mining, and violation by global corporate fiat of Intellectual Property Rights and the Moral Rights of Authors. …”
Libro electrónico -
34226Publicado 2023“…The old SWOT (strengths, weaknesses, opportunities, threats) approaches are currently equivalent to riding down the freeway on a horse. We must drop the hubris that has led us to believe we can see years ahead and anticipate what's coming. …”
Libro electrónico -
34227por Landa Aizpuru, Jesús“…Erosión por cavitación y corrosión.<br />- Materiales y tratamientos térmicos. …”
Publicado 2016
Texto completo en Odilo
Otros -
34228por Torralba Roselló, Francesc 1967-“…Y no cabe duda de que el don recibido también puede ser objeto de corrosión, de disolución o de explotación. Comprender la propia existencia desde la lógica del don significa percatarse de que el fin esencial de vivir consiste en dar lo que uno es, en exteriorizarlo, pueso solo de ese modo se enriquece cualitativamente la realidad, se hace más bella, más plural, se continúa el proceso creativo del mundo. …”
Publicado 2012
Biblioteca del Instituto Superior de Teología de las Islas Canarias (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Biblioteca Universitat Ramon Llull, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca Central de Capuchinos de España, Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
34229por Gay, Peter, 1923-“…Le vemos trabajar en la época de la decadencia del liberalismo, entre los horrores de la guerra, las dificultades de la paz, la subida al poder de Hitler y la caída de Austria. …”
Publicado 1989
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de Pastoral Madrid, Biblioteca de la Universidad de Navarra, Universidad Loyola - Universidad Loyola Granada, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
34230Publicado 2017“…Next, you'll get to know about Lists, the work horse data type for most functional languages. We show what structu..…”
Libro electrónico -
34231por Seethaler, Sherry, 1970-“…• Is one “horsepower” really equal to the power of one horse? • Why can’t you sneeze with your eyes open? …”
Publicado 2010
Libro electrónico -
34232Publicado 2016“…Approaches to exposure, composition, and color as they relate to pet photography Light, including shooting with both natural and artificial light Shooting on location, including outdoors and in pet owners’ homes How to direct and pose both animals and their owners to elicit engaged and authentic responses Photographing different kinds of animals, with entire chapters devoted to dogs, cats, and horses How to “give back” with non-profit pet photography (creating images for shelters, adoption, foster care, special events) — TABLE OF CONTENTS Discovering the Opportunities, Challenges, and Rewards Bringing Your Gear and Your Bag of Tricks Expos..…”
Libro electrónico -
34233por Whitaker, Andrew“…The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. …”
Publicado 2005
Libro electrónico -
34234por Deal, Richard A.“…Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. …”
Publicado 2005
Libro electrónico -
34235Publicado 2007“…Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. …”
Libro electrónico -
34236por Kovsky, Steven D.“…Choosing the right game console - You might not know it, we are amid a hardware slugfest between Nintendo, Sony and the dark horse, Microsoft. It's likely to be a battle as bloody as any depicted on the game consoles themselves. …”
Publicado 2002
Libro electrónico -
34237Publicado 2020Tabla de Contenidos: “…Cabezos Bernal, p. 661; Las cicatrices urbanas de los bombardeos de Madrid / Luis de Sobrón Martínez i Enrique Bordes Cabrera, p. 665; El dibujo de la arquitectura en el paisaje / Juan Manuel Báez Mezquita, p. 669; La rappresentazione della Via Latina e della Via Apia Antica neii'evoluzione cartografica dell' Agro Romano / Simona Rinaldi, p. 673; Conocimiento del territorio a través del dibujo en el Frente de Aragón durante la Guerra Civil Española / Santiago Elía García, Ana Ruiz Varona, p. 677; Farsi di/segno La Calzada de Béjar narrazione grafica di un borgo / Claudio Javier Patané Aráoz, David Marcos González, José Martínez Rubio, Juan José Fernández Martín, Jesús San José Alonso, Francisco M. …”
Libro -
34238por Rickels, Laurence A. 1954- Verfasser“…The Nazi elevation of youth to superego in the Heimat of the Teen Age neutralized adolescent innovation by forgoing the Hamletian stage of metabolization of the death wish. …”
Publicado 2021
Libro electrónico -
34239Publicado 2024“…L’intreccio di creatività e avversità di cui parla la motivazione dell’Oscar al film sembra dipingere il tradizionale stereotipo dell’italiano che se la cava in qualche modo, si arrangia e alla fine o sparisce nel gorgo luciferino della miseria o, baciato dalla fortuna, conquista il successo. …”
Libro -
34240Publicado 2013“…Poetas, pintores, escultores, na Antiguidade, familiarizados com mitos antigos de deuses e de homens, que cristalizavam experiências, interrogações, respostas quanto à existência do homem no tempo e no mundo, neles se inspiraram, em contínua criação-recriação para neles verterem a sua própria experiência temporal, com todos os desassossegos e inquietações, com todo o espanto, horror ou encantamento pela excepcionalidade da acção humana, que rasga ou ilumina fronteiras de finitude. …”
Libro electrónico