Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 953
- Management 817
- Computer networks 801
- Control de calidad 753
- Computer Science 715
- History 702
- Security measures 662
- Historia 614
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
49541Publicado 2015“…For instance, kinases mediate phosphorylation events, which activate or inactivate their substrates, while GTPases modulate activity of their effector proteins via direct interaction in a GDP/GTP dependent manner. ATPases also control cellular processes through their involvement in cellular energy production and/or in transmembrane transport. …”
Libro electrónico -
49542Publicado 2015“…On this historical background, it may appear surprising that the recent years have seen an increasing interest in re-connecting psychoanalysis and neuroscience in various ways: By studying psychodynamic consequences of brain lesions in neurological patients, by investigating how psychoanalytic therapy affects brain structure and function, or even by operationalizing psychoanalytic concepts in well-controlled experiments and exploring their neural correlates. …”
Libro electrónico -
49543Publicado 2016“…Within this volume we plan to cover from basic research including channel structure, regulation, pharmacology and trafficking; to different biological functions in the physiology (behavior, plasticity, neurogenesis, blood flow control, neuron-glia crosstalk, cell migration and differentiation) as well as in the pathophysiology (neuroinflammation, mutation-related diseases, glial dysfunction and neurodegeneration) of the nervous system. …”
Libro electrónico -
49544por Antoniazzi, Jean-Luc“…Simultanément frontière et zone de contact de population, de techniques, de sensibilités différentes, le littoral du golfe est en voie de profonde transformation aux XVIIe et XVIIIe siècles : les trafics se densifient, de nouvelles techniques de pêche jettent l’émoi sur toute la côte, des villes sont fondées (Sète, Port-Vendres), le contrôle du territoire par l’État progresse pour faire face aux épidémies avec le concours des populations locales…”
Publicado 2018
Electrónico -
49545por Barthélemy, Dominique“…À de nombreuses reprises, ils se sont retrouvés sur des interrogations communes qui touchaient aux aspects les plus pragmatiques de ces mondes, où les enjeux de pouvoir, le contrôle de la terre et de la société, la transmission de son rang et de son importance continuaient à puiser leur origine et leurs méthodes dans un passé magnifié. …”
Publicado 2015
Electrónico -
49546Publicado 2021“…Keenly attuned to manufacturing as a way to support the laboratory financially and control his most iconic products, Edison created a new cluster of factories. …”
Electrónico -
49547por Anzules, Dimitri“…Divers acteurs de l’accompagnement socio-éducatif font le choix de favoriser l’épanouissement des enfants, des jeunes et des familles, de valoriser leurs potentiels et de viser la participation sociale plutôt que la stigmatisation et le contrôle. L’ouvrage Au risque de la prévention, porté par le réseau « Socialisation des mineurs », réunit des contributions d’enseignants et chercheurs en travail social, de responsables politiques et de professionnels des domaines socio-éducatifs. …”
Publicado 2017
Electrónico -
49548Publicado 2022“…La mostra ha estat formada per 214 participants (57 mares i les seves parelles amb fills diagnosticats amb una cardiopatia congènita i 50 mares i les seves parelles amb fills coma grup control). Les parelles han estat avaluades en 4 fases diferents (F1-etapa prenatal, F2-2 a 6m post intervenció quirúrgica, F3-1 any y F4-als 2 anys de vida del fill/a) i se’ls administrat els qüestionaris BSI-18, la DAS i el FACES-III. …”
Accés lliure
Tesis -
49549Publicado 2018“… · Accelerate the digital transformation of your business by adopting an intent-based network architecture that is open, extensible, and programmable · Integrate virtualization, automation, analytics, and cloud services to streamline operations and create new business opportunities · Dive deep into hardware, software, and protocol innovations that lay the programmable infrastructure foundation for DNA · Virtualize advanced network functions for fast, easy, and flexible deployments · Translate business intent into device configurations and simplify, scale, and automate network operations using controllers · Use analytics to tune performance, plan capacity, prevent threats, and simplify troubleshooting · Learn how Software-Defined Access improves network flexibility, security, mobility, visibility, and performance · Use DNA Assurance to track the health of clients, network devices, and applications to reveal hundreds of actionable insights · See how DNA Applic..…”
Libro electrónico -
49550Publicado 2020“…Two of Microsoft's leading cloud security experts show how to: Implement a comprehensive new security paradigm designed specifically for cloud and hybrid environments Gain visibility and control to secure all key workloads Incorporate Azure Security Center into your security operations center, and integrate Azure AD Identity Protection Center and third-party solutions Adapt Azure Security Center's built-in policies and definitions for your organization Perform security assessments, and implement Azure Security Center recommendations fast with single-click remediation Use incident response features to detect, investigate, and address threats Create high-fidelity fusion alerts to focus attention on your most urgent security issues Implement application whitelisting and just-in-time VM access Assess IoT device security with the Azure IoT Hub managed service Monitor user behavior and access, and investigate compromised or misused credentials Integrate Microsoft's new Azure Sentinel Security Information and Event Management (SIEM) platform Customize and perform operating system security baseline assessments About This Book For cloud architects, designers, implementers, operations professionals, and security specialists working in Microsoft Azure cloud or hybrid environments For all IT professionals and decision-makers concerned with the security of Azure environments…”
Libro electrónico -
49551Publicado 2020“…Review the problems LISP solves, its current use cases, and powerful emerging applications Gain in-depth knowledge of LISP’s core architecture and components, including xTRs, PxTRs, MR/MS, ALT, and control plane message exchange Understand LISP software architecture on Cisco platforms Master LISP IPv4 unicast routing, LISP IPv6 routing, and the fundamentals of LISP multicast routing Implement LISP mobility in traditional data center fabrics, and LISP IP mobility in modern data center fabrics Plan for and deliver LISP network virtualization and support multitenancy Explore LISP in the Enterprise multihome Internet/WAN edge solutions Systematically secure LISP environments Troubleshoot LISP performance, reliability, and scalability…”
Libro electrónico -
49552Publicado 2021“…You will: Gain experience with lower-level game engine APIs and abstracting framework functionality Write application-level APIs: launching the game, loading resources, settings, processing input, and more Discover cross-platform APIs in the game engine projects written in both Java and C#/MonoGame Develop games with an SDK-based game engine and simplified tool chain focused on direct control of the game through code Master creating games by using the game engine to build a game from the ground up with only code and an IDE…”
Libro electrónico -
49553Publicado 2020“…You will also learn essential features such as version control, containerization, and identity and access management with the help of real-world use cases. …”
Libro electrónico -
49554Publicado 2018“…This book starts with the basics of why cloud security is important and how automation can be the most effective way of controlling cloud security. You will then delve deeper into the AWS cloud environment and its security services by dealing with security functions such as Identity and Access Management and will also learn how these services can be automated. …”
Libro electrónico -
49555Publicado 2017“…Also included is the handy camera “roadmap,” an easy-to-use visual guide to the a6500/ILCE-6500’s features and controls. Learn when to use every option and, more importantly, when not to use them, by following the author’s recommended settings for every menu entry. …”
Libro electrónico -
49556Publicado 2017“…Also included is the handy camera “roadmap,” an easy-to-use visual guide to the a6500/ILCE-6500’s features and controls. Learn when to use every option and, more importantly, when not to use them, by following the author’s recommended settings for every menu entry. …”
Libro electrónico -
49557Publicado 2015“…Also included is the handy Rebel T6s/T6i/760D/750D “roadmap,” an easy-to-use visual guide to the camera’s features and controls. Learn when to use each option and, more importantly, when not to use them, by following the author’s recommended settings for every menu entry. …”
Libro electrónico -
49558Publicado 2020“…Also included is the handy camera “roadmap,” an easy-to-use visual guide to the a6100/ILCE-6100’s features and controls. Learn when to use every option and, more importantly, when not to use them, by following the author’s recommended settings for every menu entry. …”
Libro electrónico -
49559Publicado 2017“…Also included is the handy camera “roadmap,” an easy-to-use visual guide to the Mark IV’s features and controls. Learn when to use every option and, more importantly, when not to use them, by following the author’s recommended settings for every menu entry. …”
Libro electrónico -
49560Publicado 2016“…The official book for Cisco Networking Academy’s new CCNP CIPTV1 course includes all new Learning@ Cisco CIPTV1 e-Learning course content: Covers CUCM architecture, deployment models, and tradeoffs Walks through bringing CUCM online, deploying endpoints, and setting up users Explains how to create a solid IP Phone foundation for advanced services Covers dial plan elements, design, and implementation Reviews key call routing elements Explains digit manipulation Shows how to control user access Discusses audio/video resources and videoconferencing Covers QoS tools and preferential call handling Explains external connections via Cisco IOS Voice Gateways and CUBE Streamlines review with clear summaries, assessment questions, and objectives…”
Libro electrónico