Mostrando 26,361 - 26,380 Resultados de 33,382 Para Buscar 'JAXA~', tiempo de consulta: 0.83s Limitar resultados
  1. 26361
    Publicado 2021
    Tabla de Contenidos: “…-- Categorizing Operations into Reads, Writes, or Both -- The Three Steps of the Copy-On-Write Discipline -- Converting a Write to a Read With Copy-On-Write -- Complete Diff from Mutating to Copy-On-Write -- These Copy-On-Write Operations are Generalizable -- JavaScript Arrays at a Glance -- What to do if an Operation is a Read and a Write -- Splitting a Function that does a Read and Write -- Returning Two Values from One Function -- Reads to Immutable Data Structures are Calculations -- Applications Have State That Changes Over Time -- Immutable Data Structures are Fast Enough -- Copy-On-Write Operations on Objects -- JavaScript Objects at a Glance -- Converting Nested Writes to Reads -- What Gets Copied? …”
    Libro electrónico
  2. 26362
  3. 26363
  4. 26364
    991006394519706719
  5. 26365
  6. 26366
    por Pérez Gómez, Augusto
    Publicado 2011
    Tabla de Contenidos: “…Sofía: buscando la paz después de las tormentasLos fracasos; Germán:la fealdad está en el ojo de quien se mira; Sandra: la intolerable autodecepción; Eduardo: el placer del dolor; Los conflictos con los consultantes; Constanza: ser objeto o ser sujeto; Juana y Andrés: ¿dónde están los límites?; Las frustraciones; Irma: pobre otra vez, ¡jamás!…”
    Libro electrónico
  7. 26367
    por Rabasa, Angel
    Publicado 2001
    Tabla de Contenidos: “…PREFACE; FIGURES; TABLES; SUMMARY; ACKNOWLEDGMENTS; ACRONYMS; Chapter One INTRODUCTION: THE REGIONAL CONTEXT; GEOPOLITICAL IMPORTANCE OF SOUTHEAST ASIA; EVOLUTION OF THE SOUTHEAST ASIAN SECURITY ENVIRONMENT; Chapter Two INDONESIA'S FRAGILE DEMOCRATIC EXPERIMENT; THE POLITICAL DIMENSION: FROM SUHARTO TO WAHID; THE ECONOMIC DIMENSION; Chapter Three THE EAST TIMOR CRISIS AND ITS CONSEQUENCES; Chapter Four THE CHALLENGE OF SEPARATISM AND ETHNIC AND RELIGIOUS CONFLICT; ACEH: THE EYE OF THE STORM; PROSPECTS FOR PEACE IN ACEH; SEPARATISM IN IRIAN JAYA (PAPUA)…”
    Libro electrónico
  8. 26368
    Publicado 2017
    Tabla de Contenidos: “…Land, Kathryn Libal, and Jillian Chambers -- The unmaking of citizens : shifting borders of belonging / Kristy A. Belton and Jamie Chai Yun Liew -- Zero humanity : the reality of current U.S. immigration policy toward Central American refugee children and their families / Jacqueline Bhabha -- Australia's extraterritorial border control policies / Azadeh Dastyari and Asher Hirschadeh Dastyari and Asher Hirsch -- Protection through revisionism? …”
    Libro electrónico
  9. 26369
    Publicado 2019
    Tabla de Contenidos: “…I won't go back" : national time, trauma and legacies of symphysiotomy in Ireland / Máiréad Enright -- Time-spaces of adjudication in the U.S. subprime mortgage crisis / Philip Ashton -- On "delay" and "duration" : law's temporal orders in historical child sexual abuse cases / Sinead Ring -- "Give us his name" : time, law, and language in a settler colony / Genevieve Renard Painter -- Traditional medicines, law, and the (dis)ordering of temporalities / Emilie Cloatre -- Making land liquid : on time and title registration / Sarah Keenan -- Regulating the 'half-timer' in colonial India : factory legislation, its anomalies and resistance / Maya John -- Regulating time : new perspectives on law, regulation and temporalities / LJB Hayes -- Standards in the shadows for everyone to see : the supranational regulation of time and the concern over temporal pluralism / Kevin Birth -- Energy governance, risk, and temporality : the construction of energy time through law and regulation / Antti Silvast, Mikko Jalas and Jenny Rinkinen -- Doing times, doing truths : the legal case file as a folded object / Irene van Oorschot -- Topological time, law and subjectivity : a description in five folds / Sameena Mulla…”
    Libro electrónico
  10. 26370
    por Hauerwas, Stanley, 1940-
    Publicado 2011
    Tabla de Contenidos: “…Richard Niebuhr -- The virtues of Alistair MacIntyre -- The virtues of the Summa Theologiae / with Sheryl Overmyer -- "A recall to Christian life": what is social about the Catholic social teaching / with Jana Bennett -- Methodist theological ethics / with D. …”
    Libro
  11. 26371
    Publicado 2019
    Tabla de Contenidos: “…Ryder -- Intelligence and human rights / Stefanie Schmahl -- National security and EU law constraints on intelligence activities / Satish Sule -- The problem of oversight / Iain Cameron -- Effective remedies against intelligence actions / Jana Gajdošová -- Intelligence and civil society / Carly Nyst, Eric King -- Intelligence law in Germany / Jan-Hendrik Dietrich -- Intelligence law in France / Florent Le Divelec -- Intelligence law and oversight in the UK / Ian Leigh…”
    Libro
  12. 26372
    Tabla de Contenidos: “…Contiene: Preludios vascos: Bat-batian = Improvisación ; Izketan = Diálogo ; Oyanian = En el bosque ; Eresia = Canción triste ; Aur-dantza = Danza infantil ; Oñazez = Dolor ; Aitonaren ele-zaarrak = Cuento del abuelo ; Artzai gaztearen oiua = Canción del pastor joven ; Seask'aldean eresiz = Canción de cuna ; Bordako atalarrian = A la puerta del caserio ; Mutillen karrika-eresiak = Ronda de mozos ; ilargitan, emazte-gayanerontz = Cantando a la luz de la luna ; Urruti-jaya = Romería lejana ; Irulea = La hilandera ; Malkoak = Lágrimas ; Eztei-taldea = Cortejo de Bodas ; Errotazuriko urretxindorra = El ruiseñor de Errotazuri ; Zubero-errialde = Paisaje suletino ; Sagar dantza = Baile de las manzanas ; Esku-dantza = Danza de manos ; Zozo-dantza = Danza del mirlo ; Beste lanak = Otras obras: Andante para una sonata vasca (alla classica) (1913) ; Errimiña-nostalgie (1927) ; Prière plaintive à Notre Dame de Socorri (1928) ; Menuet basque (1930) ; Vora 'l ter (sérénade enfantine) (1936) ; Tiento y canción (1946) ; Homenaje a Juan Crisóstomo Arriaga (1954)…”
    Grabación musical
  13. 26373
    Publicado 2022
    Tabla de Contenidos: “…: social media and moral complexities confronting sports journalists / by Tom Bradshaw -- Digital and data-driven sports journalism: new challenges and perspectives / by Jana Wiske and Thomas Horky -- (Un)bunch of amateurs: locating the fifth estate in the sports blogosphere / by Simon McEnnis -- Part II. …”
    Libro
  14. 26374
    Publicado 2004
    Tabla de Contenidos: “…Migrating the development environment -- 6.1 Current development environment -- 6.2 Development environment migrated -- 6.3 Migrating the development instance -- 6.3.1 Overview of the WCIM tool -- 6.3.2 Running the tool -- 6.4 Migrating the development database -- 6.4.1 Migrating unencrypted data -- 6.4.2 Migrating encrypted data -- 6.4.3 Summary -- 6.5 Migrating custom EJBs -- 6.5.1 Overview of the migration process -- 6.5.2 Exporting the EJB project from VisualAge for Java V3.5.3 -- 6.5.3 Importing the EJB projects into VisualAge for Java V4.0 -- 6.5.4 Regenerating the deployed code for the EJBs -- 6.5.5 Exporting EJBs as EJB 1.1 JAR files -- 6.5.6 Importing EJBs into WebSphere Studio Application Developer -- Chapter 7. …”
    Libro electrónico
  15. 26375
    por Moore, Bill
    Publicado 2003
    Tabla de Contenidos: “…-- 2.3 Architecture and components -- 2.3.1 Web container -- 2.4 Key technologies -- 2.4.1 Java 2 Platform, Enterprise Edition -- 2.4.2 Java Database Connectivity -- 2.4.3 XML -- 2.4.4 Jakarta -- Chapter 3. …”
    Libro electrónico
  16. 26376
    Tabla de Contenidos: “…Os níveis de escolaridade aumentaram, mas as taxas de retorno para quem conclui o ensino superior continuam elevadas -- Figura 2.3. …”
    Libro electrónico
  17. 26377
    Publicado 2017
    Tabla de Contenidos: “…Identifying the Players -- Smart(er) VBA Document Deployment -- Email and Saved Passwords -- Keyloggers and Cookies -- Bringing It All Together -- Summary -- Exercises -- Chapter 6: Criminal Intelligence -- Payload Delivery Part VI: Deploying with HTA -- Malware Detection -- Privilege Escalation in Microsoft Windows -- Escalating Privileges with Local Exploits -- Exploiting Automated OS Installations -- Exploiting the Task Scheduler -- Exploiting Vulnerable Services -- Hijacking DLLs -- Mining the Windows Registry -- Command and Control Part VI: The Creeper Box -- Creeper Box Specification -- Introducing the Raspberry Pi and Its Components -- GPIO -- Choosing an OS -- Configuring Full-Disk Encryption -- A Word on Stealth -- Configuring Out-of-Band Command and Control Using 3G/4G -- Creating a Transparent Bridge -- Using a Pi as a Wireless AP to Provision Access by Remote Keyloggers -- The Attack -- Spoofing Caller ID and SMS Messages -- Summary -- Exercises -- Chapter 7: War Games -- Background and Mission Briefing -- Payload Delivery Part VII: USB Shotgun Attack -- USB Media -- A Little Social Engineering -- Command and Control Part VII: Advanced Autonomous Data Exfiltration -- What We Mean When We Talk About "Autonomy" -- Means of Egress -- The Attack -- Constructing a Payload to Attack a Classified Network -- Stealthy 3G/4G Software Install -- Attacking the Target and Deploying the Payload -- Efficient "Burst-Rate" Data Exfiltration -- Summary -- Exercises -- Chapter 8: Hack Journalists -- Briefing -- Advanced Concepts in Social Engineering -- Cold Reading -- C2 Part VIII: Experimental Concepts in Command and Control -- Scenario 1: C2 Server Guided Agent Management -- Scenario 2: Semi-Autonomous C2 Agent Management -- Payload Delivery Part VIII: Miscellaneous Rich Web Content -- Java Web Start -- Adobe AIR -- A Word on HTML5 -- The Attack…”
    Libro electrónico
  18. 26378
    Publicado 2010
    Tabla de Contenidos: “…Problems -- Multiple-choice questions -- Further reading -- Mobile Handheld Devices -- Characteristics of PDAs -- The ARM processor -- Network connectivity -- Palm handhelds -- The Palm OS operating system -- Memory management -- Communication and networking -- HP handhelds -- Windows CE -- Memory architecture -- Memory management -- Processes and threads -- Scheduling -- Real-time performance -- The Windows Mobile operating system -- Nokia handhelds -- Specifications of Nokia 9210 -- Features -- Symbian operating system -- Design -- Symbian structure -- Summary -- Problems -- Multiple-choice questions -- Further reading -- The Mobile Internet and Wireless Web -- The Web programming model -- The WAP programming model -- WAP protocol stack -- Information-mode -- WAP 2.0 -- WAP gateway -- Push operation -- Push message format -- Pull operation -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Logical Mobility II-Mobile Agents -- Mobile agents -- Characteristics of mobile agents -- Architecture -- Mobile code and agents -- Mobile agents and process migration -- Client/server and mobile agent architectures -- Requirements for mobile agent systems -- Portability -- Ubiquity -- Network communication -- Server security -- Agent security -- Resource accounting -- Mobile agent platforms -- Aglets -- Agent Tcl -- Agent Tcl applications -- PMADE -- Agent submitter -- Agent host -- Communication managers -- State managers -- Persistence manager -- Security manager -- Java and mobile agents -- Advantages of Java -- Shortcomings of Java -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Security Issuesin Mobile Computing -- Security threats to wireless networks -- IEEE 802.11 security through WEP -- WEP security features of 802.11 wireless LANs -- Authentication -- Confidentiality -- Integrity -- Bluetooth security…”
    Libro electrónico
  19. 26379
  20. 26380
    por Mariana, Juan de ( 1536-1624)
    Publicado 1780
    Libro