Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
41201Publicado 2018Tabla de Contenidos: “…Especial referencia a la infracualificación tecnológica como elemento de género / Juan José Fernández Domínguez -- Las nuevas relaciones laborales en las empresas digitales y el control empresarial / Susana Rodríguez Escanciano -- Los derechos de conciliación en la nueva empresa digital / Emma Rodríguez Rodríguez -- Riesgos laborales en la industria y el trabajo 4.0 / Beatriz Agra Viforcos -- El empleo verde y la industria 4.0: hacia una transición justa / Henar Álvarez Cuesta -- A proteção de dados pessoais dos trabalhadores em Portugal / Teresa Coelho Moreira -- La evolución de la subordinación del trabajador durante la cuarta revolución industrial / Alicia Villalba Sánchez -- La industria 4.0 y el gran reto de la formación profesional permanente: valoración desde la perspectiva española / Lourdes Mella Méndez…”
Libro -
41202Publicado 2014Tabla de Contenidos: “…Diabetes mellitus de tipo 1 y trastornos de la conducta alimentaria Comorbilidad con abuso de sustancias y trastornos del control de los impulsos. Trastornos de la conducta alimentaria en deportistas. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra)Libro -
41203Publicado 2021Tabla de Contenidos: “…Efectos de solicitudes reiteradas y cuestiones de derecho concursal / Carmen Bana cloche Palao -- La modificación del procedimiento de derivación de responsabilidad tributaria por la Ley de Medidas de prevención y lucha contra el fraude fiscal / Carmen Ruiz Hidalgo -- La iniciación del procedimiento sancionador en materia tributaria / Irene Rovira Ferrer -- Suspensión de la ejecución del acto impugnado en vía económico-administrativa / Juan Ignacio Gorospe Oviedo -- El control de Sociedades Inactivas / Irune Suberbiola Garbizu -- ¿Dónde está la moneda virtual? …”
Libro -
41204Publicado 2018Tabla de Contenidos:Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
41205por Caro Sánchez-Lafuente, AntonioTabla de Contenidos: “…Aplicación de las respectivas técnicas y procedimientos de ejecución y control para la obtención de fondos, salsas, mantequillas compuestas y otras preparaciones básicas -- 7. …”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
41206Publicado 2018Tabla de Contenidos: “…. -- Chapter 2: Core Infrastructure Tasks -- Introduction -- Configuring a combination Domain Controller, DNS server, and DHCP server -- Getting ready -- How to do it... -- How it works... -- See also -- Adding a second Domain Controller -- Getting ready -- How to do it... -- How it works... -- Organizing your computers with Organizational Units -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
41207Publicado 2018Tabla de Contenidos: “…Setting the figure resolution -- Jupyter support -- Interactive navigation toolbar -- Configuring Matplotlib -- Configuring within Python code -- Reverting to default settings -- Global setting via configuration rc file -- Finding the rc configuration file -- Editing the rc configuration file -- Summary -- Chapter 3: Decorating Graphs with Plot Styles and Types -- Controlling the colors -- Default color cycle -- Single-lettered abbreviations for basic colors -- Standard HTML color names -- RGB or RGBA color code -- Hexadecimal color code -- Depth of grayscale -- Colormaps -- Creating custom colormaps -- Line and marker styles -- Marker styles -- Choosing the shape of markers -- Using custom characters as markers -- Adjusting marker sizes and colors -- Fine-tuning marker styles with keyword arguments -- Line styles -- Color -- Line thickness -- Dash patterns -- Designing a custom dash style -- Cap styles -- Spines -- More native Matplotlib plot types -- Choosing the right plot -- Histogram -- Bar plot -- Setting bar plot properties -- Drawing bar plots with error bars using multivariate data -- Mean-and-error plots -- Pie chart -- Polar chart -- Controlling radial and angular grids -- Text and annotations -- Adding text annotations -- Font -- Mathematical notations -- Mathtext -- LaTeX support -- External text renderer -- Arrows -- Using style sheets -- Applying a style sheet -- Creating own style sheet -- Resetting to default styles -- Aesthetics and readability considerations in styling -- Suitable font styles -- Effective use of colors -- Keeping it simple -- Summary -- Chapter 4: Advanced Matplotlib -- Drawing Subplots -- Initiating a figure with plt.figure() -- Initiating subplots as axes with plt.subplot() -- Adding subplots with plt.figure.add_subplot() -- Initiating an array of subplots with plt.subplots() -- Shared axes…”
Libro electrónico -
41208Publicado 2018Tabla de Contenidos: “…Access token manipulation -- Exploiting accessibility features -- Application shimming -- Bypassing user account control -- DLL injection -- DLL search order hijacking -- Dylib hijacking -- Exploration of vulnerabilities -- Launch daemon -- Hands-on example of privilege escalation on a Windows 8 target -- Conclusion and lessons learned -- References -- Summary -- Chapter 9: Security Policy -- Reviewing your security policy -- Educating the end user -- Social media security guidelines for users -- Security awareness training -- Policy enforcement -- Application whitelisting -- Hardening -- Monitoring for compliance -- References -- Summary -- Chapter 10: Network Segmentation -- Defense in depth approach -- Infrastructure and services -- Documents in transit -- Endpoints -- Physical network segmentation -- Discovering your network -- Securing remote access to the network -- Site-to-site VPN -- Virtual network segmentation -- Hybrid cloud network security -- References -- Summary -- Chapter 11: Active Sensors -- Detection capabilities -- Indicators of compromise -- Intrusion detection systems -- Intrusion prevention system -- Rule-based detection -- Anomaly-based detection -- Behavior analytics on-premises -- Device placement -- Behavior analytics in a hybrid cloud -- Azure Security Center -- References -- Summary -- Chapter 12: Threat Intelligence -- Introduction to threat intelligence -- Open source tools for threat intelligence -- Microsoft threat intelligence -- Azure Security Center -- Leveraging threat intelligence to investigate suspicious activity -- References -- Summary -- Chapter 13: Investigating an Incident -- Scoping the issue -- Key artifacts -- Investigating a compromised system on-premises -- Investigating a compromised system in a hybrid cloud -- Search and you shall find it -- Lessons learned -- References -- Summary…”
Libro electrónico -
41209Publicado 2016Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: A First Step in Go -- The Go programming language -- Playing with Go -- No IDE required -- Installing Go -- Source code examples -- Your first Go program -- Go in a nutshell -- Functions -- Packages -- The workspace -- Strongly typed -- Composite types -- The named type -- Methods and objects -- Interfaces -- Concurrency and channels -- Memory management and safety -- Fast compilation -- Testing and code coverage -- Documentation -- An extensive library -- The Go Toolchain -- Summary -- Chapter 2: Go Language Essentials -- The Go source file -- Optional semicolon -- Multiple lines -- Go identifiers -- The blank identifier -- Muting package imports -- Muting unwanted function results -- Built-in identifiers -- Types -- Values -- Functions -- Go variables -- Variable declaration -- The zero-value -- Initialized declaration -- Omitting variable types -- Short variable declaration -- Restrictions for short variable declaration -- Variable scope and visibility -- Variable declaration block -- Go constants -- Constant literals -- Typed constants -- Untyped constants -- Assigning untyped constants -- Constant declaration block -- Constant enumeration -- Overriding the default enumeration type -- Using iota in expressions -- Skipping enumerated values -- Go operators -- Arithmetic operators -- The increment and decrement operators -- Go assignment operators -- Bitwise operators -- Logical Operators -- Comparison operators -- Operator precedence -- Summary -- Chapter 3: Go Control Flow -- The if statement -- The if statement initialization -- Switch statements -- Using expression switches -- The fallthrough cases -- Expressionless switches -- Switch initializer -- Type switches -- The for statements -- For condition…”
Libro electrónico -
41210Publicado 2023Tabla de Contenidos: “…5.4 PHY Performance: Simulation Results -- 5.4.1 Sync Field Detection Rate -- 5.4.2 Sync Field Classification Error Rate -- 5.4.3 Sync Field Timing Error -- 5.4.4 Packet Error Rate -- 5.4.5 Effects of Transmit Diversity -- 5.5 Link Budget Comparison -- 5.5.1 Comparison to the 6 Mb/s OFDM PHY -- 5.5.2 Comparison to the 1 Mb/s Non-OFDM PHY -- 5.6 Conclusions -- References -- Chapter 6 Wake-up Radio Medium Access Control -- 6.1 Introduction -- 6.2 Network Discovery -- 6.2.1 General -- 6.2.2 WUR Discovery -- 6.3 Connectivity and Synchronization -- 6.3.1 General -- 6.3.2 WUR Beacon Frame Generation -- 6.3.3 WUR Beacon Frame Processing -- 6.4 Power Management -- 6.4.1 General -- 6.4.1.1 MR Power Management -- 6.4.1.2 WUR Power Management -- 6.4.2 WUR Modes -- 6.4.2.1 WUR Mode Setup -- 6.4.2.2 WUR Mode Update -- 6.4.2.3 WUR Mode Suspend and Resume -- 6.4.2.4 WUR Mode Teardown -- 6.4.3 Duty Cycle Operation -- 6.4.3.1 WUR Duty Cycle Period -- 6.4.3.2 WUR Duty Cycle Service Period -- 6.4.3.3 WUR Duty Cycle Start Time -- 6.4.4 WUR Wake Up Operation -- 6.4.4.1 Individual DL BU Delivery Context -- 6.4.4.2 Group Addressed DL BU Delivery Context -- 6.4.4.3 Critical BSS Update Delivery Context -- 6.4.5 Use of WUR Short Wake-up Frames -- 6.4.6 Keep Alive Frames -- 6.5 Frequency Division Multiple Access -- 6.6 Protected Wake-up Frames -- 6.7 Conclusion -- Chapter 7 Medium Access Control Frame Design -- 7.1 Introduction -- 7.2 Information Elements -- 7.2.1 General -- 7.2.2 Elements Supporting MR Functionalities -- 7.2.2.1 DSSS Parameter Set Element -- 7.2.2.2 EDCA Parameter Set Element -- 7.2.2.3 Channel Switch Announcement Element -- 7.2.2.4 Extended Channel Switch Announcement Element -- 7.2.2.5 HT Operation Element -- 7.2.2.6 VHT Operation Element -- 7.2.2.7 Wide Bandwidth Channel Switch Element -- 7.2.2.8 Channel Switch Wrapper Element…”
Libro electrónico -
41211Publicado 2017Tabla de Contenidos: “…Chapter 8: Decision Making -- How to begin -- Creational patterns -- Builder -- Dependency injection -- Singleton -- Structural patterns -- Adapter -- Facade -- Behavioral pattern -- Command -- Observer -- Model View Controller -- Model View Presenter -- Model View View-Model -- Summing up MVP and MVC -- Refactoring your app -- What are the advantages of refactoring? …”
Libro electrónico -
41212Publicado 2017Tabla de Contenidos: “…-- What Lumen provides -- What Lumen has in common with Laravel -- How Lumen is different from Laravel -- What exactly Lumen provides -- A Good Structure -- Separate configurations -- Router -- Middle-wares -- Service Container and Dependency Injection -- HTTP responses -- Validation -- Eloquent ORM -- Database migration and seeding -- Unit testing -- Installing Lumen -- Configuration -- Setting up the database -- Writing migrations -- Writing RESTful web service endpoints -- Writing the first controller -- Lumen routes -- REST resource -- Eloquent ORM (model layer) -- Creating models -- Eloquent relationships -- Controller Implementation -- What we are missing? …”
Libro electrónico -
41213Publicado 2017Tabla de Contenidos: “…. -- Working with navigation controller and navigation bar -- Getting ready -- How to do it... -- How it works... -- There's more... -- Push and pop -- Hiding navigation bar -- Navigation bar color -- Working with stack views -- How to do it…”
Libro electrónico -
41214por Ballew, JoliTabla de Contenidos: “…-- The final word -- Starting Windows 8.1 -- Exploring the Start screen -- Accessing Apps view -- Understanding tiles -- Using charms -- Overview of the desktop -- Using the Start button -- Overview of File Explorer -- Booting to the Apps view -- Booting to the desktop -- Switching from a local to a Microsoft Live account -- Understanding input options -- Overview of touchscreen gestures -- Swiping edges -- Zooming in and out of the display -- Snapping apps -- Using a touchscreen keyboard -- Displaying charms -- Using keystroke shortcuts -- Right-clicking and the long tap -- Finding recently viewed apps -- Exploring the Settings charm -- Controlling volume -- Adjusting brightness -- Changing the time and date -- Managing power -- Displaying a touch keyboard -- Connecting to a network -- Customizing the Start screen -- Modifying tiles on the Start screen --…”
Publicado 2013
Libro electrónico -
41215Publicado 2023Tabla de Contenidos: “…Evolutionary Decision Culture -- Implementing Change and Taking Back Control -- Paying Off Cultural and Strategic Debt -- Playing Better Poker Means Folding Bad Hands -- Fixing the Culture to Reward Data-Driven Decision-Making Behaviors -- A Changing Incentivization Structure -- What's Next?…”
Libro electrónico -
41216Publicado 2023Tabla de Contenidos: “…10.5 Summarize environmental impacts and local environmental controls -- 10.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts -- 10.7 Given a scenario, use proper communication techniques and professionalism -- 10.8 Identify the basics of scripting -- 10.9 Given a scenario, use remote access technologies -- Chapter 11: Mock Exam: Core 2 (220-1102) -- Solutions -- Index -- Other Books You May Enjoy -- Coupon Code for CompTIA A+ Exam Vouchers and Labs…”
Libro electrónico -
41217por Wagstaff, JoTabla de Contenidos: “…-- Three unconscious strategies for getting our needs met -- Leadership Circle framework -- Complying tendency: Moving toward -- Controlling tendency: Moving against -- When we are over-activated in our controlling tendency -- Protecting tendency: Moving away -- The root of all three tendencies -- Awareness. …”
Publicado 2024
Libro electrónico -
41218por Tuttle, StevenTabla de Contenidos: “…Restricting users -- 5.1 Restricted shells -- 5.1.1 Recommended reading -- 5.1.2 Configuring the system and creating a restricted shell user -- 5.2 User limits for a system resource -- 5.2.1 Architecture -- 5.2.2 Security -- 5.2.3 Resources -- 5.2.4 Administration -- 5.3 User login controls -- 5.3.1 Setting up login controls -- 5.3.2 Changing the welcome message on the login display -- 5.3.3 Changing the login display for the CDE -- 5.3.4 Securing unattended terminals -- 5.3.5 Enforcing automatic logoff -- 5.4 Preventing denial-of-service attacks -- Appendix A. …”
Publicado 2003
Libro electrónico -
41219Publicado 2010Tabla de Contenidos: “…7.4.4 Real-Time Analysers -- 7.4.5 Remote Sensing -- 7.5 Data Reduction and Processing -- 7.5.1 Vibration Amplitude Versus Frequency Analysis -- 7.5.2 Spectrum Averaging -- 7.5.3 Amplitude Versus Frequency Versus Time Analysis -- 7.5.4 Amplitude/Phase Versus rpm Analysis -- 7.5.5 Time Waveform Analysis -- 7.5.6 Lissajous Pattern (Orbit) Analysis -- 7.5.7 Mode-Shape Analysis -- 7.6 Diagnosis and Corrective Actions -- 7.6.1 Steady-State Operating Regime -- 7.6.2 Detection of Perturbation Forces and Corrective Actions -- 7.7 Modal Analysis -- 7.8 Vibration Control -- Conclusion -- Exercises -- Chapter 8: Finite Element Method -- 8.1 Introduction -- 8.2 Important Conditions to be Satisfied -- 8.3 Modelling -- 8.4 Shape Functions -- 8.5 Bar Element -- 8.6 Boundary Conditions -- 8.7 Torsion Element -- 8.8 Beam Element -- Matlab-Tool for Computation -- Introduction -- (I) Display Windows -- (II) Arithmetic Operations -- (III) Built-in Functions -- (IV) Matrix -- (V) Polynomials: -- (VI) System of Linear Equations -- Conclusion -- Exercises -- Chapter 9: Fundamentals of Experimental Modal Analysis -- 9.1 Introduction -- 9.2 Frequency-Response Function -- 9.2.1 Frequency-Response Function-Basic Principles -- Exercises -- Chapter 10: Miscellaneous Topics in Vibration Analysis and Introduction to Noise Analysis -- 10.1 Flow-Induced Vibrations -- 10.2 Acoustics and Analysis of Noise -- 10.2.1 Basics of Sound -- 10.2.2 Amplitude, Frequency, Wavelength, and Velocity -- 10.2.3 Sound Field Definitions -- 10.3 Non-Stationary (Unsteady) Vibrations -- 10.4 Rotor Dynamics and Hydrodynamic Bearings -- Exercises -- Appendix - A -- Appendix - B -- Appendix - C -- Appendix - D -- Index…”
Libro electrónico -
41220Publicado 2012Tabla de Contenidos: “…-- 47 Don't rent, buy -- 48 Understand what investing really means -- 49 Build a bit of capital then invest it wisely -- 50 Understand that property, in the long run, will not outpace shares -- 51 Master the art of selling -- 52 See yourself as others do -- 53 Don't believe you can always win -- 54 Don't pick stocks yourself if you don't know what you're doing -- 55 Understand how the stock market really works -- 56 Only buy shares (or anything) you can understand -- 57 Use your head -- 58 By all means, use the investment professionals (but don't be used by them) -- 59 If you are going to get financial advice, pay for it -- 60 Don't fiddle -- 61 Think long term -- 62 Have a set time of day to work on your wealth strategy -- 63 Pay attention to detail -- 64 Create new income streams -- 65 learn to play 'what if?' -- 66 Control spending impulses -- 67 Don't answer ads that promise get-rich-quick schemes - it won't be you who gets rich quick -- 68 There are no secrets -- 69 Don't just read this - do something -- Get even wealthier -- 70 Carry out a finance health check regularly -- 71 Get some money mentors -- 72 Play your hunches -- 73 Don't sit back…”
Libro electrónico