Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 954
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
46541Publicado 2024“…The course covers critical aspects of S3, including implementing security measures like encryption and access controls, and integrating S3 with other AWS services like EC2 and Lambda for enhanced functionality. …”
Video -
46542Publicado 2009“…Methods We searched systematically for systematic reviews, randomised controlled trials and cohort studies in international databases. …”
Libro electrónico -
46543Left ventricular assist device (LVAD) as destination therapy for patients with endstage heartfailurePublicado 2013“…In 2008, there was one randomized controlled trial (RCT) comparing first-generation LVAD with optimal medical treatment. …”
Libro electrónico -
46544Publicado 2012“…We included 23 randomised controlled studies from literature searches finished in June 2012. …”
Libro electrónico -
46545Publicado 2014“…We have included twelve randomised controlled trials with a total of more than 2000 participants where the studies reported sick leave as an outcome. …”
Libro electrónico -
46546Publicado 2016“…Then we searched for randomised controlled trials published later than the search date for the Cochrane review, but we found no relevant trials. …”
Libro electrónico -
46547Publicado 2023“…You'll also find: explanations of the processes, controls, and programs that make up the zero trust doctrine; descriptions of the five pillars of implementing zero trust with third-party vendors; and numerous examples, use-cases, and stories that highlight the real-world utility of zero trust…”
Grabación no musical -
46548Publicado 2024“…Next, you'll delve in the foundational concepts of web applications, focusing on the HTTP protocol and the Model View Controller (MVC) design pattern. Through practical examples, you'll learn to create a Rails application from scratch, understanding the View layer and how Rails components work together. …”
Vídeo online -
46549Publicado 2019“…This course curriculum is as follows: Azure Fundamentals Analyze Resource Utilization and Consumption Create and Configure Storage Accounts Create and Configure Virtual Machines Azure Virtual Networking Managing and Securing Identities Governance and RBAC Controls Create and Deploy Apps Serverless Computing Design and Develop Apps that Run in Containers Server Migrations Automation Lectures will educate you on the fundamental terms and principles of the Azure platform and demos will enable you with a hands-on experience using scenarios to empower you in the real world. …”
Vídeo online -
46550Publicado 2021“…You'll also look at Spring's Model-View-Controller (MVC) framework as well as ways to save your data using the JdbcTemplate, JPA support, and Spring Data framework. …”
Video -
46551Publicado 2023“…You'll also look at Spring's Model-View-Controller (MVC) framework as well as ways to save your data using the JdbcTemplate, JPA support, and Spring Data framework. …”
Video -
46552por Santesmases Mestre, Miguel
Publicado 2005Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
46553por Kawamura, Yuniya, 1963-“…Its distinctive categorization of haute couture, demi-couture, and prt--porter reflects a highly structured and tightly controlled system that non-western designers have had difficulty penetrating. …”
Publicado 2006
Libro -
46554por Schwartz, Seth“…How well integrated were Jews in the Mediterranean society controlled by ancient Rome? The Torah's laws seem to constitute a rejection of the reciprocity-based social dependency and emphasis on honor that were customary in the ancient Mediterranean world. …”
Publicado 2010
Libro -
46555Publicado 2021“…It discusses the benefits of cooperating with partners and relying on shared resources, while controlling relational risks. It presents key relational processes including organizational intelligence, open culture, knowledge sharing routines, motivation, co-creation, and communication. …”
Libro -
46556Publicado 2023“…Neuroscience has already made all of the above possible today, and neurotechnology will soon become the "universal controller" for all of our interactions with technology. …”
Libro -
46557por American Society of Heating, Refrigerating and Air-Conditioning Engineers“…The standard has a separate method for determining acceptable thermal conditions in occupant-controlled naturally conditioned spaces. Given the widespread and easy accessibility of computing power and third-party implementations of the analytical method, it is expected that more users will favor the comprehensive analytical methods over the graphical method. …”
Publicado 2017
Libro -
46558por España.
Publicado 1969Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
46559Publicado 2023“…Almost a thousand years later, all of Europe was controlled by Christian rulers, and the religion, ingrained within culture and society, exercised a monolithic hold over its population. …”
Libro -
46560por Julián Ferreiro, Josué Yeray“…Se presta especial atención a la interacción con el usuario, viendo en fondo los elementos de la interface "Metro" y otros controles, que nos permitirán ofrecer aplicaciones funcionales y altamente atractivas…”
Publicado 2011
Libro