Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Música 34
- Música orquestal 30
- Música de cámara 26
- Música para piano 24
- Música instrumental 16
- Conciertos 10
- Grabaciones sonoras 10
- Development 9
- Management 9
- Música vocal 9
- Quintetos de cuerda (Violines (2), viola, violonchelos (2)) 9
- música orquestal 9
- Historia 8
- Technology 8
- Tecnología 8
- Computer software 7
- Música sagrada 7
- Sinfonías 7
- Teología 7
- Ciencias 6
- Cloud computing 6
- Conciertos (Piano) 6
- Iglesia católica 6
- Música para órgano 6
- Oratoria sagrada 6
- Science 6
- Software engineering 6
- Tomás de Aquino 6
- música para piano 6
- Biblia 4
-
361
-
362por Bizet, Georges ; Grieg, Edvard 1838-1875 ; 1843-1907, Bizet, Georges 1838-1875 cmp, Grieg, Edvard 1843-1907 cmpTabla de Contenidos: “…Prelude to Act. I (1:23) ; 2. Aragonaise (2:19) ; 3. Intermezzo (2:34) ; 4. …”
Publicado 1979
CDROM -
363
-
364por Voronezh Art CollegeTabla de Contenidos: “…Io tacero, ma nel silenzio mio (2:58) ; Tu m'uccidi, o crudele (4:04) ; Già piansi nel dolore (3:19) ; Deh, come invan sospiro (3:19) ; Tu piangi, o figlio mio (3:14) / C. …”
Publicado 1991
CDROM -
365por Gy, Pierre-Marie, 1922-2004
Publicado 1990Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
366
-
367
-
368
-
369
-
370
-
371
-
372Publicado 2023Tabla de Contenidos: “…About the Editor vii -- Editorial for the Special Issue on "Software Engineering and Data Science" 1 -- A Bayesian Analysis of the Inversion of the SARS-COV-2 Case Rate in the Countries of the 2020 European Football Championship 3 -- How Schools Affected the COVID-19 Pandemic in Italy: Data Analysis for Lombardy Region, Campania Region, and Emilia Region 19 -- Multi-Attribute Decision Making for Energy-Efficient Public Transport Network Selection in Smart Cities 31 -- Exploring the Benefits of Combining DevOps and Agile 61 -- Fast Library Recommendation in Software Dependency Graphs with Symmetric Partially Absorbing Random Walks 75 -- Ontology-Based Feature Selection: A Survey 95.…”
Libro electrónico -
373Publicado 1982Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Diocesana Bilbao, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Universidad de Deusto, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca de la Universidad de Navarra)Libro
-
374
-
375
-
376Tabla de Contenidos: “…Chapter 1: Privileges -- Chapter 2: Shared Credentials -- Chapter 3: Password Hacking -- Chapter 4: Privilege Escalation -- Chapter 5: Insider Threats -- Chapter 6: Insider Threats -- Chapter 7: Threat Hunting -- Chapter 8: Data Centric Audit and Protection -- Chapter 9: Privileged Monitoring -- Chapter 10: Privilege Access Management -- Chapter 11: PAM Architecture -- Chapter 12: Break Glass -- Chapter 13: Industrial Control Systems (ICS) -- Chapter 14: Internet of Things (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware -- Chapter 18: Secured DevOps (SDevOps) -- Chapter 19: Regulatory Compliance -- Chapter 20: Sample PAM Use Cases -- Chapter 21: Deployment Considerations -- Chapter 22: Privileged Account Management Implementation -- Chapter 23: Key Takeaways -- Chapter 24: Conclusion -- …”
Libro electrónico -
377por Haber, Morey J. authorTabla de Contenidos: “…Chapter 1: Privileged Attack Vectors -- Chapter 2: Privileges -- Chapter 3: Credentials -- Chapter 4: Attack Vectors -- Chapter 5: Passwordless Authentication -- Chapter 6: Privilege Escalation -- Chapter 7: Insider and External Threats -- Chapter 8: Threat Hunting -- Chapter 9: Unstructured Data -- Chapter 10: Privileged Monitoring -- Chapter 11: Privileged Access Management -- Chapter 12: PAM Architecture -- Chapter 13: Break Glass -- Chapter 14: Industrial Control Systems (ICS) and Internet of Things (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware and Privileges -- Chapter 18: Remote Access -- Chapter 19: Secured DevOps (SecDevOps) -- Chapter 20: Regulatory Compliance -- Chapter 21: Just in Time -- Chapter 22: Zero Trust -- Chapter 23: Sample Privileged Access Management Use Cases -- Chapter 24: Deployment Considerations -- Chapter 25: Privileged Account Management Implementation -- Chapter 26: Machine Learning -- Chapter 27: Conclusion -- …”
Publicado 2020
Libro electrónico -
378Publicado 2022Tabla de Contenidos: “…Reflectie en aanbevelingen.21 -- 3.3.1. Zet in op breed gedragen beroepsbeelden.22 -- 3.3.2. Werk toe naar een professionele cultuur.22 -- 3.3.3. …”
Libro electrónico -
379
-
380Publicado 2021Tabla de Contenidos: “…-- 3.1.1 DevOps in data engineering -- 3.2 Introducing Azure DevOps -- 3.2.1 Using the az azure-devops extension -- 3.3 Deploying infrastructure -- 3.3.1 Exporting an Azure Resource Manager template -- 3.3.2 Creating Azure DevOps service connections -- 3.3.3 Deploying Azure Resource Manager templates -- 3.3.4 Understanding Azure Pipelines -- 3.4 Deploying analytics -- 3.4.1 Using Azure DevOps marketplace extensions -- 3.4.2 Storing everything in Git -- deploying everything automatically -- Summary -- 4 Orchestration…”
Libro electrónico