Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 45
- History 25
- Kennedy, John F. 19
- Novela francesa 16
- Assassination 14
- Política y gobierno 13
- Asesinato 12
- Història 12
- Assassins 11
- Politics and government 10
- Novela norteamericana 8
- Crítica e interpretación 7
- Documentales 7
- Magnicidio 6
- asesinato 6
- Asesinatos políticos 5
- Assassinat 5
- Foreign relations 5
- Narrativa per a joves 5
- Political aspects 5
- Filosofía 4
- Historia y crítica 4
- Holocausto judío (1939-1945) 4
- Juan Pablo 4
- Judíos 4
- Literatura 4
- Social aspects 4
- Terrorismo 4
- United States 4
- 2a Guerra Mundial, 1939-1945 3
-
381por Hagestad, William T., IITabla de Contenidos: “…Information Warfare: A new form of people's warIdeas Guide Action; Information War Depends on the Integrity of the Information System; Chapter 6: Chinese CyberWarfare Doctrines; Chinese Cyberwarfare Doctrinal Development; Importance of Information Warfare; Goals of Chinese Information Warfare; Integrated Network Electronic Warfare (INEW); The 'Three Warfares' concept; The PRC's concept of 21st century warfare; Secrecy and Deception in PLA Military Strategy; Asymmetric Warfighting; Assassin's Mace Programs; Major General Dai Qingmin's Cyberwar; Conclusions…”
Publicado 2012
Libro electrónico -
382por Murphy, Brenda, 1950-Tabla de Contenidos: “…Two Streetcars in Evolutionary PerspectiveStreetcar in a Changing American Culture; Dynamic Processing in 1947 and 1951; Conclusion; A Broken Romance: Tennessee Williams and America's Mid-Century Theatre Culture; "Stupidity is no longer profitable": Williams and his Critics, 1937-1948; "A radical departure": Williams and his Critics, 1951-1958; "A butterfly to a cannon": Williams and his Critics, 1959 and Beyond; "Assassins, before, now, and after": Conclusion; "A Vast Traumatic Eye": Culture Absorbed and Refigured in Tennessee Williams's Transitional Plays…”
Publicado 2014
Libro electrónico -
383Publicado 2016Tabla de Contenidos: “…Installing and configuring OpenStackReferences; Summary; Chapter 8: Configuration Management; Introducing configuration management; Open source configuration management tools; Chef; SaltStack (Salt); Ansible; Puppet; Installing and configuring Puppet; References; Summary; Chapter 9: Some Additional Tricks and Tools; SSH for remote connection; Securing SSH and the root login configuration; SSH key-based authentication; Installing and configuring SpamAssassin ; Setting up the Clamav antivirus; Configuring Mytop for a MySQL database; Setting up Samba and NFS for file sharing…”
Libro electrónico -
384por Adelstein, TomTabla de Contenidos: “…Providing Domain Name ServicesAdding a Relational Database: MySQL; Configuring Mail Securely with Postfix, POP3, and IMAP; Putting Apache to Work; Adding FTP Services with ProFTPD; Summarizing Your Web Statistics with Webalizer; Synchronizing the System Clock; Installing Perl Modules Needed by SpamAssassin; What's Next; The Domain Name System; DNS Basics; Advantages of Localized DNS Administration; Getting into the BIND; Components of BIND; Setting Up a DNS Server; Using a chroot Environment for Security; Configuring an Authoritative DNS Server; Your Responsibility in DNS…”
Publicado 2007
Libro electrónico -
385por Parks, DaveTabla de Contenidos: “…Title Page; Copyright Page; Dedication Page; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; CHAPTER 1 Overview Health Care Reform Past and Future; Quick History of Health Care Insurance; World War II Spurs Insurance Growth; Assassination Turns Nation to Medicare; America's Breathtaking Rise of Medical Care Costs; Political Primer on Health Care Reform; Health Care Enters the 2008 Presidential Campaign; Washington Battles over Health Care Reform; Obama Targets Insurers Despite Their Support; Health Care Reform Summary, Schedule…”
Publicado 2011
Libro electrónico -
386Publicado 2015Tabla de Contenidos: “…Metric System: Key Customer MetricsAnalyze This: Using Correlation Analysis; Sheer Perfection: Using Customer Experience to Mold the "Perfect Customer"; That'll Cost You: The High Price of Poor Customer Experience; Chapter 3: Identifying Customer Experience Killers; Three Universal Actions That Kill Customer Experience; The know-nothing ninja; The shuffling assassin; The ownership killer; Battling an Inside-Out Perspective; "They're All Crooks!" …”
Libro electrónico -
387Publicado 2021Tabla de Contenidos: “…EL VINO DE LOS TRAPEROS -- CVI. LE VIN DE L'ASSASSIN - CVI. EL VINO DEL ASESINO -- CVII. LE VIN DU SOLITAIRE - CVII. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
388Publicado 2016Tabla de Contenidos: “…Mario Lentano, Parlare di Cicerone sotto il governo del suo assassino. Una lettura della controversia VII, 2 di Seneca e la politica Augustea della memoria ; Gianluca Ventrella, Da esercizio retorico a realtà vivente : la declamazione contro i tiranni nella polemica anti-domizianea di Dione di Prusa (Or. 6) ; Pascale Fleury, Évanescence de la déclamation dans le corpus frontonien ; Estelle Oudot, La déclamation chez Ælius Aristide : un lieu possible pour une nouvelle histoire d'Athènes?…”
Electrónico -
389Publicado 2017Tabla de Contenidos: “…How to Build Robust AI for Your Game / section II Architecture -- chapter 8 Modular AI / chapter 9 Overcoming Pitfalls in Behavior Tree Design / chapter 10 From Behavior to Animation -- A Reactive AI Architecture for Networked First-Person Shooter Games / chapter 11 A Character Decision-Making System for FINAL FANTASY XV by Combining Behavior Trees and State Machines / chapter 12 A Reusable, Light-Weight Finite-State Machine / chapter 13 Choosing Effective Utility-Based Considerations / chapter 14 Combining Scripted Behavior with Game Tree Search for Stronger, More Robust Game AI / section III Movement and Pathfinding -- chapter 15 Steering against Complex Vehicles in Assassins Creed Syndicate / chapter 16 Predictive Animation Control Using Simulations and Fitted Models / chapter 17 Fast Cars, Big City -- The AI of Driver San Francisco / chapter 18 A Unified Theory of Locomotion / chapter 19 RVO and ORCA -- How They Really Work / chapter 20 Optimization for Smooth Paths / chapter 21 3D Flight Navigation Using Sparse Voxel Octrees / chapter 22 Faster A* with Goal Bounding / chapter 23 Faster Dijkstra Search on Uniform Cost Grids / section IV Tactics and Strategy -- chapter 24 Being Where It Counts -- Telling Paragon Bots Where to Go / chapter 25 Combat Outcome Prediction for Real-Time Strategy Games / chapter 26 Guide to Effective Auto-Generated Spatial Queries / chapter 27 The Role of Time in Spatio-Temporal Reasoning -- Three Examples from Tower Defense / chapter 28 Pitfalls and Solutions When Using Monte Carlo Tree Search for Strategy and Tactical Games / chapter 29 Petri Nets and AI Arbitration / chapter 30 Hierarchical Portfolio Search in Prismata / section V Character Behavior -- chapter 31 Behavior Decision System -- Dragon Age Inquisitions Utility Scoring Architecture / chapter 32 Paragon Bots -- A Bag of Tricks / chapter 33 Using Your Combat AI Accuracy to Balance Difficulty / chapter 34 1000 NPCs at 60 FPS / chapter 35 Ambient Interactions -- Improving Believability by Leveraging Rule-Based AI / chapter 36 Stochastic Grammars -- Not Just for Words! …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
390por Institut français de recherche en AfriqueTabla de Contenidos: “…-- INTRODUCTION -- Objective -- Rationale -- CONCEPTUAL DISCOURSES -- Terror -- On Terrorism -- Political Terrorism -- Criminal Terrorism -- Repressive Terrorism -- Revolutionary Terrorism -- Sub-revolutionary Terrorism -- State Terrorism -- Violence and Political Violence -- Terrorism and Liberation Activities: The Politics Of Nomenclature -- Spectrum of Political Conflict -- THE NATURE OF TERRORISM -- Anatomy of Terrorism -- Manifestations of Terrorism -- Some Cases of Terrorism -- The Entebbe Affair -- The Beirut and Rome Operations -- Political Terrorism in Cotonou -- Action aguinst Geneva Peace Conference -- Terrorism against OAU Heads -- Hijacking of a British Airliner -- The Black Septembist Munich Terrorism -- Terrorism by drug barons in Bogota -- Assassination of Prime Minister Rabin -- United States Embassy Bombings -- West Jerusalem Bombing -- World Trade Center Destruction -- Bombing of London City -- Algeria -- IMPLICATIONS OF TERRORISM FOR NATIONAL SECURITY -- Uses/Goals and consequences of terrorism -- Courter terrorism measures -- TERRORISM: AN OVERVIEW OF THE NIGERIAN EXPERIENCE -- TERRORISM AS AN EMERGING THREAT TO GOOD GOVERNANCE, SUSTAINABLE DEVELOPMENT, DEMOCRACY, PROSPERITY AND NATIONAL SURVIVAL: THE CASE OF THE UNITED STATES -- THE MANAGEMENT OF TERRORISM IN CORPORATE ORGANIZATIONS -- Preventive Measures -- Measures For Avoidance of Terrorist Attacks -- Measures For Handling Terrorist Attacks -- Situation Control -- Strategy Review -- CONCLUSION -- APPENDIX I -- APPENDIX II -- THE WORKING OF A BOMB AND PREVENTIVE MEASURES -- Terror as a political weapon: reflections on the bomb explosions in Abacha's Nigeria -- Introduction -- Définition of Terrorism -- The Political Antecedents and Dimensions of the Bomb Attacks -- Who were the Terrorists? …”
Publicado 2005
Libro electrónico -
391Publicado 2020“…It offers an in-depth analysis of historical writing, society and politics in the pan-European period of crisis and change called the Age of Nationalism Marie de Médicis (1575-1642), reine de France, est restée dans les mémoires comme une souveraine incapable, obsédée par le pouvoir et soupçonnée d'avoir assassiné son mari. Ses actions culturelles et politiques ont souvent été réduites à une parenthèse féminine et italienne entre le règne d'Henri IV et le ministériat de Richelieu. …”
Libro electrónico -
392Publicado 2006Tabla de Contenidos: “…Adler -- Classified federal records and the end of the Cold War : the experience of the Assassination Records Review Board / William L. Joyce -- "Just a car" : the Kennedy car, the Lincoln chair, and the study of objects / Judith E. …”
Libro -
393Publicado 2018Tabla de Contenidos: “…jvm.options -- logback.xml -- Managing a deployment pipeline -- Orchestration tools -- Configuration management tools -- Recommended approach -- Local repository for downloadable files -- Summary -- Chapter 5: Performance Tuning -- Cassandra-Stress -- The Cassandra-Stress YAML file -- name -- size -- population -- cluster -- Cassandra-Stress results -- Write performance -- Commitlog mount point -- Scaling out -- Scaling out a data center -- Read performance -- Compaction strategy selection -- Optimizing read throughput for time-series models -- Optimizing tables for read-heavy models -- Cache settings -- Appropriate uses for row-caching -- Compression -- Chunk size -- The bloom filter configuration -- Read performance issues -- Other performance considerations -- JVM configuration -- Cassandra anti-patterns -- Building a queue -- Query flexibility -- Querying an entire table -- Incorrect use of BATCH -- Network -- Summary -- Chapter 6: Managing a Cluster -- Revisiting nodetool -- A warning about using nodetool -- Scaling up -- Adding nodes to a cluster -- Cleaning up the original nodes -- Adding a new data center -- Adjusting the cassandra-rackdc.properties file -- A warning about SimpleStrategy -- Streaming data -- Scaling down -- Removing nodes from a cluster -- Removing a live node -- Removing a dead node -- Other removenode options -- When removenode doesn't work (nodetool assassinate) -- Assassinating a node on an older version -- Removing a data center -- Backing up and restoring data -- Taking snapshots -- Enabling incremental backups -- Recovering from snapshots -- Maintenance -- Replacing a node -- Repair -- A warning about incremental repairs -- Cassandra Reaper -- Forcing read repairs at consistency - ALL -- Clearing snapshots and incremental backups -- Snapshots -- Incremental backups -- Compaction…”
Libro electrónico -
394por Persse, James R., 1957-Tabla de Contenidos: “…The Drill Sergeant; 3.10.6. The Assassin; 3.10.7. The Element of Change; 3.11. Helpful Change Agent Skills; 3.11.2. …”
Publicado 2006
Libro electrónico -
395Publicado 2015Tabla de Contenidos: “…2.6.1 Hybrid between Video and Digital Cinema2.6.2 Use in Independent Productions; 2.6.3 Use in Special Cases; 2.6.4 Pros and Cons; 2.6.5 Technicolor Cinestyle; 2.6.6 Magic Lantern; 2.6.7 Documentary Short: Baby Faced Assassin; Part 3 Best Practices for Production; 3.1 The Digital Loader and the Digital Imaging Technician (DIT); 3.1.1 Origins of the DIT; 3.1.2 Digital Loader; 3.1.3 Digital Imaging Technician; 3.1.4 Data Management Tools; 3.2 Data Management in Practice; 3.2.1 Checksum Verification; 3.2.2 Shot Verification (against Script Supervisor Report); 3.2.3 Back-Up to Redundant Drives…”
Libro electrónico -
396por Antenhofer, ChristinaTabla de Contenidos: “…-- Perpetuierung tradierter Geschlechtervorstellungen - Eine Fragestellung -- Alte Gebäude in neuem (Erziehungs‐)Gewand -- Arbeit und Freiräume machen Geschlechter -- Die wohnende Frau, der arbeitende Mann -- Räumliche und geschlechtsspezifische Aspekte der Anstaltsrichtlinien -- Schlussüberlegungen -- Die Okkupation des Raumes -- Sophie Taeuber‐Arp for Greatness -- Performance und Performativität -- Raum -- Fazit -- Performanz -- Die Maske des Ahnen -- 1 Einleitung -- 2 Imago, cera, eikōn: Maske aus Wachs und Abbild des Ahnen -- 3 Die anwesenden Abwesenden -- 3.1 Imagines maiorum und die pompa funebris -- 3.2 Die Masken im Atrium -- 3.3 Die Maske des Ahnen - ein wertvolles Gut -- 4 Fazit: Sozialisation junger »ehrgeiziger« Römer -- 5 Abkürzungen antiker Quellen -- Live Like a Viking -- Einleitung: »When you leave here, you'll leave as Vikings« -- Historische Authentizität in den Historical Game Studies -- Ein Gefühl von Geschichte: Authentizität als Marketingtechnik -- LikeAViking: Assassin's Creeds Versprechen vom Geschichtstourismus -- Narrative und spielmechanische Techniken von Genderkonstruktionen entlang des Gegensatzes Wikinger:innen und Christentum -- Fazit -- Autor:innen -- Personenregister…”
Publicado 2024
Libro electrónico -
397Publicado 2020Libro electrónico
-
398Publicado 2005Tabla de Contenidos: “…Hagiografía y alusión en la poesía lírica devota de la contrarreforma / La hagiografía en las relaciones de milagros publicadas en el siglo XVII / Las adaptaciones de las vidas de santo en la poesía de José Pérez de Montoro / La vida de santa Rosalía: de la ópera sacra italiana a la comedia de santos española / Imagen y hagiografía en el Madrid del siglo xvn: La difusión del culto al Padre Simón de Rojas / Pros y contras de la influencia gongorina en el Triunfo parténico (1683) de Sigüenza y Gongo / Le silence éloquent d'une sainte: la Farce de sainte Barbe de Diego Sánchez de Badajoz / Tipología de los sermones a San Justo y San Pastor / La vida, el martirio, la invención, las grandezas y las translaciones de los gloriosos niños mártires San Justo y Pastor de Ambrosio de Morales: una hagiografía en movimiento / Saint Pedro Arbués, l'inquisiteur assassiné / Los estilos de la relación de milagro: algunos ejemplos de escritura diferenciada de los milagros de la Virgen de Guadalupe de los siglos XV a XVII / La lectura del espejo sagrado: una hermenéutica del Flos sanctorum de Pedro de Ribadeneyra / L'Espagne chrétienne dans le miroir de l'hagiographie de la fin de l'Antiquité: martyrs et saints espagnols connus de Grégoire de Tours à la fin du VIe siècle / Elementos hagiográficos en la propaganda francófoba de 1635 / El concepto de santidad en la comedia áurea. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
399Publicado 2011Tabla de Contenidos: “…Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 17: CONFIGURING AND MONITORING A LAN -- Setting Up the Hardware -- Configuring the Systems -- NetworkManager: Configures Network Connections -- Setting Up Servers -- Introduction to Cacti -- More Information -- Chapter Summary -- Exercises -- Advanced Exercises -- PART V: USING CLIENTS AND SETTING UP SERVERS -- CHAPTER 18: OPENSSH: SECURE NETWORK COMMUNICATION -- Introduction to OpenSSH -- Running the ssh, scp, and sftp OpenSSH Clients -- Setting Up an OpenSSH Server (sshd) -- Troubleshooting -- Tunneling/Port Forwarding -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 19: FTP: TRANSFERRING FILES ACROSS A NETWORK -- Introduction to FTP -- Running the ftp and sftp FTP Clients -- Setting Up an FTP Server (vsftpd) -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 20: EXIM4: SETTING UP MAIL SERVERS, CLIENTS, AND MORE -- Introduction to exim4 -- Setting Up a Mail Server (exim4) -- Working with exim4 Messages -- Configuring an exim4 Mail Server -- SpamAssassin -- Additional Email Tools -- Authenticated Relaying -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 21: NIS AND LDAP -- Introduction to NIS -- Running an NIS Client -- Setting Up an NIS Server -- LDAP -- Setting Up an LDAP Server -- Other Tools for Working with LDAP -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 22: NFS: SHARING FILESYSTEMS -- Introduction to NFS -- Running an NFS Client -- Setting Up an NFS Server -- automount: Mounts Directory Hierarchies on Demand -- Chapter Summary -- Exercises -- Advanced Exercises -- CHAPTER 23: SAMBA: LINUX AND WINDOWS FILE AND PRINTER SHARING -- Introduction to Samba -- Setting Up a Samba Server -- Working with Linux Shares from Windows -- Working with Windows Shares from Linux -- Troubleshooting -- Chapter Summary -- Exercises…”
Libro electrónico -
400por Jonoska, Nataša, 1961-Tabla de Contenidos: “…2 Sociobiology -- 3 Prior DNA Nanorobots -- 3.1 Prior DNA Walkers -- 3.2 Prior Programmable DNA Nanorobots -- 3.3 Prior Autonomous DNA Walkers that Do Molecular Cargo-Sorting on a 2D Nanostructure -- 4 Design and Simulation of Social DNA Nanorobots -- 4.1 Social DNA Nanorobot Behaviors Designed and Simulated -- 4.2 Software for Stochastic Simulations of the Social DNA Nanorobots Behaviors -- 4.3 A Prior DNA Nanorobot that Autonomously Walks -- 4.4 Prior Demonstrated Technique for Hybridization Inhibition of Short Sequences Within the Hairpin Loops -- 4.5 A Novel DNA Nanorobot that Executes a Self-Avoiding Walk -- 4.6 Flocking: Novel DNA Nanorobots that Follow a Leader -- 4.7 Novel DNA Nanorobots that Vote by Assassination -- 5 Discussion -- 5.1 Further Development of Simulation Software for Social Nanorobots -- 5.2 Experimental Demonstrations of Social DNA Nanorobots -- 5.3 Further Social DNA Nanorobot Behaviors -- 5.4 Communication Between Distant Social Nanorobots -- References -- Models of Gellular Automata -- 1 Introduction: Why Cellular Automata? …”
Publicado 2023
Libro electrónico