Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Misales 1,630
- Derecho civil 1,582
- Derecho penal 1,396
- Historia 1,388
- Derecho administrativo 1,038
- Liturgia 1,005
- Filosofía 928
- Engineering & Applied Sciences 912
- Església Catòlica 906
- Development 864
- Teología dogmática 804
- Application software 791
- Derecho 759
- Tratados y manuales 749
- Litúrgia 735
- Derecho mercantil 710
- Psicología 710
- Derecho constitucional 690
- Mental illness 687
- Teología 687
- Economía 657
- Operating systems (Computers) 646
- Moral cristiana 626
- Computer Science 612
- Enfermedades mentales 610
- Universidad Pontificia de Salamanca (España) 583
- Computer programs 548
- Mental health 546
- Derecho canónico 536
- Personas con discapacidad mental 535
-
133821Publicado 2023Tabla de Contenidos: “…El caso del cacahuate y del pastel(pp. 183-208)--Transferencias tecnológicas y continuidades estructurales en una economía orgánica preindustrial Chihuahua a finales del siglo XIX(pp. 209-269)--El desconocido caso de la resina de pino. …”
Libro electrónico -
133822por Medina Precioso, Juan Ramón“…Surgieron tres escuelas principales: la que lo identificaba con una ignorancia salvable, con una ignorancia insalvable o con un componente objetivo de la realidad. …”
Publicado 2014
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
133823Publicado 2021“…Va más allá de la ficción y se convierte en un alegato valiente que cuestiona un sistema judicial que aún no ha evolucionado con los tiempos actuales. Todo un manual de defensa procesal." Germán González Bernet, El Mundo. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull, Universidad Loyola - Universidad Loyola Granada)Acceso restringido con credenciales UPSA
Libro electrónico -
133824Publicado 2017“…The mechanism of “Study Card” allows to seamlessly populate metadata aligned with the ontology, avoiding fastidious manual entrance and the automatic control of the conformity of imported data with a predefined study protocol. …”
Libro electrónico -
133825Publicado 2014“…We hope this work may allow reconstructing the prison law culture during the period covering from the Restoration to the Second Republic (paramount period, barely approached by the law and social historiography) and de-constructing some tales firmly grounded, particularly that relating the practice of prison reforms with the installation of progressive governments (First and Second Republic) and, on the contrary, deterioration of the prison population with the arrival of conservative administrations to the power during the reign of Alfonso XIII and Primo de Rivera’s Military…”
Libro electrónico -
133826Publicado 2013“…L‘analyse est complétée par un carnet de statistiques qui montre de façon impressionnante comment augmente d‘année en année le contenu du lexique mental bilingue et comment évolue la relation entre le vocabulaire appris et le vocabulaire utilisé, de même que la relation entre le vocabulaire utilisé de manière correcte et celui utilisé de manière fautive. …”
Libro electrónico -
133827Publicado 2012“…Au sommaire Afficher les composants graphiques Installation de jQuery Mobile Afficher les fenêtres Afficher des listes Afficher des boutons Afficher des données sous forme de table Afficher les éléments de formulaires Afficher les barres d'outils Manipuler les éléments avec JavaScript Conventions de jQuery Mobile Créer un composant jQuery Mobile Manipuler les fenêtres Manipuler les listes Manipuler les boutons Manipuler les données sous forme de tables Manipuler les champs de saisie Manipuler les listes de sélection Manipuler les cases à cocher Manipuler les boutons radio Manipuler les interrupteurs Manipuler les sliders Manipuler les menus en accordéon Manipuler les barres d'outils Bases de données côté clients GPS et Google Maps Etudes de cas : développer une application de messagerie Cinématique de l'application Etape n°1 : se connecter Etape n°2 : afficher les membres connectés Etape n°3 : envoyer des messages Etape n°4 : recevoir des messages Application complète…”
Libro electrónico -
133828“…The authors, both Google Developer Experts in Google Cloud Platform, systematically introduce various Cloud Platform products one at a time and discuss their strengths and scenarios where they are a suitable fit. But rather than a manual-like "tell all" approach, the emphasis is on how to Get Things Done so that you get up to speed with Google Cloud Platform as quickly as possible. …”
Libro electrónico -
133829Publicado 2023“…We will look at how much easier it is to load a dataset using Pandas versus trying to do it manually. Then we will look at some data frame operations useful in machine learning, such as filtering by column, filtering by row, and the apply function. …”
Video -
133830Publicado 2024“…Next, we will cover core components, including memory, processes, and the intricacies of command execution. Finally, we will explore Linux's evolution into a container-based platform. …”
Video -
133831Publicado 2024“…Les troballes inicials indiquen que l'efecte de la durada en l'efectivitat del cupó no és lineal i està moderat per l'enquadrament, desafiant les expectatives tradicionals i suggerint un enfocament matís per a l'estratègia de cupons. …”
Accés lliure
Tesis -
133832Publicado 2024“…Learn why you're asked to give permission for apps to access folders and personal data on your Mac Moderate access to your audio, video, screen actions, and other hardware inputs and outputs Get to know the increasing layers of system security deployed over the past few years Prepare against a failure or error that might lock you out of your device Share files and folders securely over a network and through cloud services Upgrade your iCloud data protection to use end-to-end encryption Control other low-level security options to reduce the risk of someone gaining physical access to your Mac--or override them to install system extensions Understand FileVault encryption and protection for Mac, and avoid getting locked out Investigate the security of a virtual private network (VPN) to see whether you should use one Learn how the Secure Enclave in Macs with a T2 chip or M-series Apple silicon affords hardware-level protections Dig into ransomware, the biggest potential threat to Mac users (though rare in practice) Discover recent security and privacy technologies, such as Lockdown Mode and passkeys…”
Libro electrónico -
133833“…Perciò, sulla scia di Agostino e di Kant, e sulla scorta delle persistenti incertezze della scienza, crediamo che il tempo abbia una natura soggettiva e che questo vero e proprio schema mentale al limite sia stato influenzato – per quanto riguarda il modo di percepirlo o misurarlo, ma non nella sua essenza – dall’evoluzione biologica e socio-culturale dell’uomo…”
Artículo -
133834Publicado 2011“…Chapter 1: Introducing Visio 2010 Tell Me More Media 1.1 —About the Author and Why He Loves Visio Show Me Media 1.2 —Creating a Simple Visio Flowchart Show Me Media 1.3 —Panning and Zooming a Diagram Using the Status Bar and Pan & Zoom Window Show Me Media 1.4 —A Whirlwind Tour of Visio Shape Handles Chapter 2: Working Around the Diagram Show Me Media 2.1 —Quickly Sketching with Blank Drawings Show Me Media 2.2 —Understanding External Stencils, Local Masters, and the Document Stencil Show Me Media 2.3 —Adding and Manipulating New Pages Show Me Media 2.4 —Adding Background Pages Manually Tell Me More Media 2.5 —Making PowerPoint-Style Presentations with Visio Chapter 3: Organizing and Annotating Diagrams Show Me Media 3.1 —Organizing Shapes with Containers Show Me Media 3.2 —Creating Grouped Shapes Tell Me More Media 3.3 —When to Use Groups Show Me Media 3.4 —Adding Callouts to Shapes Show Me Media 3.5 —Cool Tricks with Legacy Callout Shapes Chapter 4: Connecting Shapes Show Me Media 4.1 —Basic Connecting in Visio 2010 Show Me Media 4.2 —Grand Tour of Connection Options Tell Me More Media 4.3 —Connector Begins and Ends: Structure vs. …”
-
133835por Hervas García, Marcos“…Aquesta tecnologia s'utilitza com a sistema de transmissió de les dades dels sensors instal·lats en la Antarctic Station Juan Carlos I (ASJI) per la comunitat científica desplaçada a l'illa i Cambrils (Espanya), establint un ràdioenllaç unidireccional de 12.760 km. …”
Publicado 2016
Accés lliure
Tesis -
133836Publicado 2023“…What You Will Learn Understand Flutter, Dart, and the concept behind widgets Connect your Flutter app to backend servers by sending HTTP requests Learn to use native device features like the camera Learn to add beautiful animations and page transitions Learn to upload images and send manual/automated push notifications Learn how to add Google Maps to the app Audience This course is suitable for both beginner and experienced developers who want to learn mobile app development using a single language for both iOS and Android platforms. …”
Video -
133837Publicado 2016“…Alan es coautor de IT Governance: An International Guide to Data Security and ISO27001/ISO27002, el manual elegido por la Open University para el curso de posgrado en seguridad de la información. …”
Libro electrónico -
133838Publicado 2011“…Based on extensive research into how world-class companies measure and manage their sales forces, Cracking the Sales Management Code is the first operating manual for sales management. In it you will discover: The five critical processes that drive sales performance How to choose the right processes for your own team The three levels of sales metrics you must collect Which metrics you can "manage" and which ones you can't How to prioritize conflicting sales objectives How to align seller activities with business results How to use CRM to improve the impact of coaching As Neil Rackham writes in the foreword: "There's an acute shortage of good books on the specifics of sales management. …”
Grabación no musical -
133839Publicado 2022“…About the Technology With Spring Boot, it's a snap to create standalone Spring applications that require minimal manual setup. Spring Boot directly embeds a server like Tomcat or Jetty into your project and preconfigures core Spring settings, third-party libraries, security, and other key elements. …”
Grabación no musical -
133840Publicado 2022“…About the Technology With Spring Boot, it's a snap to create standalone Spring applications that require minimal manual setup. Spring Boot directly embeds a server like Tomcat or Jetty into your project and preconfigures core Spring settings, third-party libraries, security, and other key elements. …”
Video