Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 3,441
- Development 2,745
- History 2,708
- Application software 2,127
- Management 1,940
- Engineering & Applied Sciences 1,776
- Gestió de projectes 1,510
- Computer networks 1,289
- Data processing 1,177
- Security measures 1,169
- Computer Science 1,146
- Filosofía 1,111
- Computer security 1,090
- Prevention 1,063
- TFM 1,037
- Computer programs 1,006
- Business & Economics 925
- Artificial intelligence 903
- Computer software 902
- Cloud computing 896
- Education 875
- Design 873
- Universidad Pontificia de Salamanca (España) 860
- Història 859
- Social aspects 807
- Python (Computer program language) 795
- Crítica e interpretación 793
- Project management 784
- Web site development 771
- Computer programming 756
-
123321Publicado 2024“…This report reveals: The most common data security use cases and their potential challenges What to look for in a data security solution that's built for speed and scale Why increasingly decentralized data architectures require centralized, dynamic data security mechanisms How to implement the steps required to put common use cases into production Methods for assessing risks--and controls necessary to mitigate those risks How to facilitate cross-functional collaboration to put data security into practice in a scalable, efficient way You'll examine the most common data security use cases that global enterprises across every industry aim to achieve, including the specific steps needed for implementation as well as the potential obstacles these use cases present. Federico Castanedo is a data science and AI leader with extensive experience in academia, industry, and startups. …”
Libro electrónico -
123322por Fowler, Bradley“…Additionally, you will gain insight into creating a privacy compliance risk mitigation strategy that helps protect your organization even as security threats evolve. …”
Publicado 2023
Libro electrónico -
123323por Crossland, Michael“…Based on Michael Crossland's extensive work in children's and adults' low vision clinics, and his 20 years of research into vision impairment, the book blends individual stories, key research findings and the most recent scientific discoveries to present an informative yet optimistic overview of living with sight loss. …”
Publicado 2024
Libro electrónico -
123324por Aigner, Wolfgang. author, Miksch, Silvia. author, Schumann, Heidrun. author, Tominski, Christian. author“…Time is an exceptional dimension with high relevance in medicine, engineering, business, science, biography, history, planning, or project management. Understanding time-oriented data via visual representations enables us to learn from the past in order to predict, plan, and build the future. …”
Publicado 2023
Libro electrónico -
123325por Mitchell, Nathan“…It is beloved by popes, professors, protesters, commuters on their way to work, children learning their “first prayers,” and homeless persons seeking shelter and safety.Why has this particular devotional object been so ubiquitous and resilient, especially in the face of Catholicism’s reinvention in the Early Modern, or “Counter-Reformation,” Era? …”
Publicado 2009
Libro electrónico -
123326Publicado 2022“…The book is part of the multidisciplinary research project Languages of notarial mediation from the Middle Ages to the Modern Age (LIMEN) of the University of Milan. …”
Libro electrónico -
123327Publicado 2021“…In addition to the presentations of the 8 accepted papers, the workshop will feature three keynote speakers and an industry panel. 1. …”
Libro electrónico -
123328Publicado 2018“…This year's workshop builds on the foundation laid last year to become one of the premier forums for presentation of interdisciplinary research results and experience reports at the interface of control theory, information security, embedded and real-time systems and human factors applied to CPS. …”
Libro electrónico -
123329Publicado 2019“…., digital libraries, courseware, simulation and optimization, automated theorem-proving, computer-aided design, and automatic differentiation Application aspects: Applications that stretch the current limits of computer algebra algorithms or systems, use computer algebra in new areas or new ways, or apply it in situations with broad impact The conference presented a range of invited talks, tutorials, poster sessions, software demonstrations, and vendor exhibits, with its center-piece being peer-reviewed contributed research papers…”
Libro electrónico -
123330Publicado 2019“…Eternità e temporalità, storicità e trascendenza si incontrano e coesistono in ogni atto di Gesù. Il presente volume, nato in ambito accademico, intende proporre una trattazione sintetica e alcuni spunti di riflessione sugli aspetti essenziali di questi interessanti e complessi temi cristologici, e offrire un contributo all’ormai antico dialogo teologico su di essi…”
991009728936506719 -
123331Publicado 2023“…From the serpent’s seduction of Eve to Mary Shelley's Frankenstein to Kate Millett’s lust, violence, and insanity to Meghan Markle’s havoc-ridden rise to royalty, Gress presents a history as intriguing as the characters who lived it. …”
Libro -
123332Publicado 2021“…Como dijo George Steiner, «todos los demás libros, ya sean historias, narraciones imaginarias, códigos legales, tratados morales, poemas líricos, diálogos dramáticos, meditaciones teológico-filosóficas, son como chispas, muchas veces desde luego lejanas, que un soplo incesante levanta de un fuego central».En el presente volumen se contempla ese fuego central y esas chispas. …”
991009671239606719 -
123333Publicado 2006“…Ce volume contient La Révélation divine (1983), Affrontements mystiques (1950) et Athéisme et sens de l'homme : une double requête de Gaudium et Spes (1968) ; trois articles ; une note historique par Eric de Moulins-Beaufort et une présentation par Mgr Olivier de Berranger. Traduction des textes de langues étrangères. …”
991005121889706719 -
123334por Dorfmann-Lazarev, Igor aut“…Whilst the Koran reproaches the Christians for the distortion of pure monotheism, which had been taught by God to humanity since Adam, the image of Adam had to present the church to external observers as a sanctuary of unique God…”
Publicado 2016
Artículo -
123335Formación y prevención la prevención de los abusos sexuales en los procesos formativos de la iglesiaPublicado 2019“…El Centro de Investigación y Formación Interdisciplinar para la Protección del Menor (CEPROME) de la Pontificia Universidad de la Ciudad de México –iniciado en 2016–, en cooperación con el Centre for Child Protection (CCP) de la Pontificia Universidad Gregoriana de Roma, ofrece una formación profunda para los agentes pastorales y hace una contribución inestimable a la labor de prevención. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca del Instituto Superior de Teología de las Islas Canarias, Universidad Loyola - Universidad Loyola Granada, Biblioteca de Pastoral Madrid)Libro -
123336por Maufer, Thomas“…Deploy, manage, and troubleshoot any wireless LAN ... home or business WLAN technology for non-experts: clear, accurate, easy Proven quick-start configurations for Windows®, and Linux®, and MacOS® No-hassle wireless security solutions Covers IEEE 802.11a, 802.11b, 802.11g, and 802.11i/WPA Contrasts IEEE 802.11 WLAN technology with IEEE 802.16 WMAN and IEEE 802.15 WPAN technology Expert knowledge and insight for deploying and managing any wireless LAN. …”
Publicado 2004
Libro electrónico -
123337por Perry, Randy C. 1956-“…Three methods of tolerance analysis are presented and the merits of each are discussed: Worst Case Analysis, Root Sum of Squares Analysis, and Six Sigma Tolerance Analysis. …”
Publicado 2006
Libro electrónico -
123338Publicado 2006“…But this isn't a book of theory and technical explanations, this is a step-by-step project-based book that will teach you exactly how to the pros use channels in their everyday work (Using channels is one of the secrets they use to get twice the work done in half the time). …”
Libro electrónico -
123339por Sauers, Robert“…From start to finish, the emphasis is on practical results—and on understanding the real-world cost/benefit tradeoffs that are central to every tuning project. Coverage includes: A comprehensive optimization methodology, direct from HP’s performance labs New optimization opportunities and techniques made possible by HP-UX 11i All-new chapters on network performance and Java performance Rules of thumb for more cost-effective performance management Instrumenting HP-UX 11i systems to accurately reflect reality Choosing the right performance metrics, and using them correctly Key performance tradeoffs in both uniprocessor and SMP environments Practical techniques for resolving CPU, memory, and disk bottlenecks How to make the most of HP-UX specific and generic UNIX performance tools Performance enhancements available through compiler optimization and application profiling Extensive examples from actual HP performance consulting assignments Whether you’re an HP-UX 11i sysadmin, netadmin, developer, capacity planner, or performance specialist, this is your complete guide to getting all the performance you paid for!…”
Publicado 2004
Libro electrónico -
123340por Steflik, Dick“…Advanced Java Networking, Second Edition gives you the newest techniques to use with: Servlets for dynamic Web content JavaBeans to create plug-and-play software components JMAPI for centralized management of Java objects If you are a manager considering networked Java applications, you will find everything you need to understand the scope and possibilities of the project. If you are a professional Java software developer or engineer, you can't afford to miss the essential resources in Advanced Java Networking, Second Edition. …”
Publicado 2000
Libro electrónico