Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 954
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
46761Publicado 2009“…To what extent do clip aesthetics challenge traditional notions of, for example, textuality, episodic and serial narrative, documentary forms and also the very basic requirements of teaching and research? …”
Sumario
Libro -
46762Publicado 2017“…Littérature qui pose la question du scandale, entendu ici comme le fait d'envoyer à la mort des millions de fils. La notion de scandale permet de prendre en compte l'évolution de notre regard sur les faits. …”
Libro -
46763Publicado 2024“…En six chapitres l'auteur présente la philosophie de Thomas d'Aquin à travers les notions et les thèses fondamentales de sa pensée qui concernent la nature, l'homme, et son agir, l'être et Dieu. …”
Libro -
46764Publicado 2019“…Un itinerario composito e plurale, attraversato da snodi e momenti, opportunità e rischi: dal declino della parabola fascista alla guerra fredda, dalla costruzione europea alla scelta atlantica, dai movimenti sociali alle sfide globali del nostro tempo, dal crollo dei partiti alle tensioni che scuotono la democrazia in Occidente. …”
Libro -
46765por Hinrichs, William H.“…The author explores the rivalries between apocryphal and authorized sequelists that forged modern notions of authorship and authorial property. The book also defines the sequel's forms and functions, filling a major gap in literary theory in general and Peninsular literary studies in particular. …”
Publicado 2011
Libro -
46766por Sapienza, Leonardo“…Negli anni del suo Pontificato (1963-1978) la barca della Chiesa, ora “la barca di Paolo”, ha dovuto navigare contro vento e in un mare agitato da contrasti e contestazioni. …”
Publicado 2018
Libro -
46767por Francisco, Papa, 1936-“…Parla di un artista che gli è molto caro, l’argentino Alejandro Marmo, che realizza opere d’arte con materiale di scarto, e così facendo lancia un messaggio forte contro la cultura dello scarto diffusa nella nostra società. …”
Publicado 2015
Libro -
46768Publicado 2023“…"Au XVIIIe siècle, des tensions se cristallisent autour des notions d'éloquence et de rhétorique : si la première se trouve valorisée au nom de la sensibilité et des idéaux des Lumières, la seconde est en butte aux critiques et considérée comme dépassée, notamment dans sa dimension scolaire. …”
Libro -
46769Publicado 2023“…Spanning from the iconoclasm that followed the fall of the regime on July 25, 1943 to the present day, and moving from mural paintings and mosaics to buildings, decorative arts, monuments, and sculpture, the essays explore Italy’s transition from Fascism to the Republic and the dynamics of postwar de-Fascisization, revealing ruptures and continuities throughout the twentieth century. Applying the notion of “difficult heritage” to the Italian context, the volume addresses issues of restoration, display, and critical preservation of artifacts in public and institutional spaces, drawing comparisons with practices in other countries including Germany and the United States --…”
Libro -
46770Publicado 2021“…Os achados que Rejane nos apresenta são valiosos não apenas para a linha "Controle penal e políticas públicas", do nosso programa de pós-graduação, mas também para repensar as práticas do sistema de justiça. …”
Acceso restringido con credenciales UPSA
Libro electrónico -
46771por Arcila Gallego, Paula Alexandra“…Evolution of the foreland synorogenic basins based on the cronostratigraphic, geochemical and litofacies analysis provide recognition of different stages: (1) Initial foreland basin in the early Miocene. (2) Stage of wedge-top basin for the middle Miocene. (3) Establishment of local volcanic arc in the upper Miocene and (4) Stage of piggy-back basin between upper Miocene and Pliocene. The control factors are the normal propagation of the Malargüe fold and thrust belt toward the foreland with a hybrid structural style with basement structures transferring shortening to the sedimentary cover and the tectonic setting associated with a compressive regime during the shallowing of the subduction zone…”
Publicado 2010
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Tesis -
46772por Ruiz-Rico Ruiz, Catalina“…Ante la impresión generalizada de una democracia aparentemente floral, con excesivos fallos sistémicos y multiorgánicos, se plantea necesariamente un revisionismo constitucional y el desarrollo de controles jurídicos para neutralizar los abusos y extralimitaciones desde los poderes públicos. …”
Publicado 2014
Texto completo en Odilo
Otros -
46773por Alcalá Díaz, M? Angeles“…Las normas legales anteriores a 2011 al mismo tiempo que insistían en la información al cliente y la transparencia del mercado, suprimieron los controles públicos tanto en la contratación de estos productos financieros como en su publicidad, con el objetivo de agilizar y dinamizar el mercado de hipotecas. …”
Publicado 2013
Acceso al texto completo en Aranzadi
Libro -
46774Publicado 2018“…La segunda parte del libro aborda los desafíos y cuestiones de actualidad del Derecho de defensa de la competencia o antitrust: los sujetos responsables de las infracciones antitrust, el comercio electrónico y las restricciones verticales, las adquisiciones minoritarias que no confieren control ante las normas de control de concentraciones, las distorsiones de la competencia causadas por medidas nacionales sobre fiscalidad directa de las empresas, etc. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
46775Publicado 2021“…Os achados que Rejane nos apresenta são valiosos não apenas para a linha “Controle penal e políticas públicas”, do nosso programa de pós-graduação, mas também para repensar as práticas do sistema de justiça. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
46776por Aragón, Argán“…¿Cuáles son los efectos de los controles fronterizos? Este libro propone una respuesta a partir de historias de la migración entroamericana hacia Estados Unidos que transita por uno de los sistemas fronterizos más sofisticados,...…”
Publicado 2016
Electrónico -
46777Publicado 2013“…Applications to demand predictions, inventory control policy and modeling credit ratings data are discussed. …”
Libro electrónico -
46778por Félix, Joël, 1960-“…La nomination, à la fin de l’année 1763, d’un magistrat du parlement de Paris au contrôle général des finances eut les caractères d’une petite révolution. …”
Publicado 1999
Electrónico -
46779Publicado 2019“…You'll then cover important .NET Core features such as API controllers, attribute routing, and model binding to help you build a sturdy backend. …”
Libro electrónico -
46780Publicado 2014“…Major sections are as follows: Part 1: Understanding Network Security Lesson 1: Understanding Enterprise Security Concepts Lesson 2: Identifying Infrastructure Devices Lesson 3: Understanding Security Devices and Systems Lesson 4: Explaining Network Design Components Lesson 5: Exploring Secure Network Administration Lesson 6: Wireless Networking Security Lesson 7: Part 1 Summary Part 2: Understanding Threats and Vulnerabilities Lesson 8: Recognizing Malware Types Lesson 9: Exploring Prevalent Attack Methods Lesson 10: Understanding Threat Management Lesson 11: Deploying Threat Discovery Tools Lesson 12: Part 2 Summary Part 3: Understanding Compliance and Operational Security Lesson 13: Understanding Risk Related Concepts Lesson 14: Examining the Importance for Security Awareness Lesson 15: Exploring Incident Response and Forensics Lesson 16: Implementing Physical Security and Environmental Controls Lesson 17: Part 3 Summary Part 4: Understanding Application, Data, and Host Security Lesson 18: Examining Application Attack Types Lesson 19: Explaining Application Security Controls and Techniques Lesson 20: Summarizing Mobile Security Concepts Lesson 21: Establishing Host Security Lesson 22: Understanding Data Sec..…”