Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,954
- Publicaciones periódicas 1,946
- Educación 1,465
- Teología 1,214
- Education 1,119
- Psicología 1,091
- Periodicals 1,069
- Derecho 1,066
- Economía 1,005
- Filosofía 1,003
- Revistes 893
- Ciencias sociales 878
- Social sciences 762
- Medicina 688
- Humanidades 655
- Información general 575
- Psychology 572
- Agricultura 552
- Literatura 536
- Science 533
- Agriculture 494
- Psicología industrial 475
- Technology 473
- Tecnología 470
- Arquitectura 459
- Ciencia 459
- Psychology, Industrial 451
- Work 444
- Història 439
- Articulos Publicaciones periodicas 431
-
65421Publicado 2013Tabla de Contenidos: “…Ejemplo de campo: la historieta realista argentinaEl habitus; El sentido práctico como lógica de funcionamiento del habitus; La distinción, el gusto y los estilos de vida; Ajustes y desajustes de los habitus y de las prácticas sociales: el efecto Don Quijote; Cambio social estructural y luchas simbólicas; Breves datos biográficos; Bibliografía ; Capítulo ii ; Anthony Giddens: teoria social general y sociología ; A. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
65422por Salamanca Aguado, EstherTabla de Contenidos: “…La evaluación del impacto ambiental como requisito previo a la aprobación de un plan de trabajo1.1.3. …”
Publicado 2003
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
65423
-
65424
-
65425por Lacalle Noriega, MaríaTabla de Contenidos: “…La escuela moderna del Derecho natural; 2. CONCEPCIÓN REALISTA CLÁSICA DE LA LEY NATURAL; 2.1. La naturaleza de las cosas; 2.2. …”
Publicado 2013
Libro electrónico -
65426Publicado 2018Tabla de Contenidos: “…. -- See also -- Making requests to APIs -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 10: Using Experimental Nightly Features -- Introduction -- Iterating over an inclusive range -- How to do it... -- How it works... -- See also -- Returning abstract types -- How to do it... -- How it works... -- There's more... -- See also -- Composing functions -- How to do it... -- How it works... -- See also -- Filtering strings efficiently -- How to do it... -- How it works... -- See also -- Stepping through an iterator in regular intervals -- How to do it... -- How it works... -- See also -- Benchmarking your code -- How to do it... -- How it works... -- There's more... -- See also -- Using generators -- How to do it... -- How it works... -- See also -- Other Books You May Enjoy -- Index…”
Libro electrónico -
65427por Danisi, CarmeloTabla de Contenidos: “…2.2.1 Semi-structured Interviews -- 2.2.2 Focus Groups -- 2.2.3 Observations in Courts -- 2.2.4 Online Surveys -- 2.2.5 Documentary Analysis -- 2.2.6 Freedom of Information Requests -- 2.3 Ethical Implications: Doing Research with SOGI Refugees -- References -- Chapter 3: A Theoretical Framework: A Human Rights Reading of SOGI Asylum Based on Feminist and Queer Studies -- 3.1 Introduction -- 3.2 A Human Rights Approach to SOGI Asylum: What Role for Rights? …”
Publicado 2021
Libro electrónico -
65428Publicado 2016Tabla de Contenidos: “…Chapter 2: Setting Up and Managing Code RepositoriesIntroduction; Creating a Git repository in an existing TFVC Team Project; Enabling code analysis check-in policy; Performing a baseless merge between sibling branches in TFVC; Reparenting a branch in TFVC; Unlocking files checked out by someone else; Unshelving a shelveset created in one branch to another branch; Ignoring file types from check-in using .tfignore and .gitignore; Conducting code reviews in TFS; Setting up policies for branches in Git; Conducting Pull requests in TFS; Analyzing code churn with TFS analysis services cube…”
Libro electrónico -
65429Publicado 2016Tabla de Contenidos: “…-- What If a Direct Repeatedly Says No to Delegation Requests? -- When They Say No, Honor It, Initially -- After Two Demurrals, Examine Your Assumptions -- 14: How to Start Delegating -- Afterword -- Index -- End User License Agreement…”
Libro electrónico -
65430por Clarke, JohnTabla de Contenidos: “…Identifying Cell Server Software Processes""; ""3-5. Tracing Oracle I/O Requests on Exadata Compute Nodes""; ""3-6. Validating That Your Oracle RAC Interconnect Is Using InfiniBand""; ""3-7. …”
Publicado 2013
Libro electrónico -
65431por Kalin, MartinTabla de Contenidos: “…-- Verbs and Opaque Nouns -- Review of HTTP Requests and Responses -- HTTP as an API -- Two HTTP Clients in Java -- A First RESTful Example -- How the Predictions Web Service Works -- A Client Against the Predictions Web Service -- Why Use Servlets for RESTful Web Services? …”
Publicado 2013
Libro electrónico -
65432Publicado 2015Tabla de Contenidos: “…GIVE BACK MORE THAN YOU TAKEQuantity: Seven Killer Strategies to Reaching Critical Mass on Twitter; LOOK FOR PEOPLE YOU ALREADY KNOW; TWEET YOUR BLOG; PAY YOUR FOLLOWERS!; RESPOND TO REQUESTS; MOBILIZE YOUR SOCIAL NETWORK; PUT YOUR TWITTER NAME IN YOUR SIGNATURE; RUN A CONTEST; Klout and Page Rank; Chapter 6: The Art of the Tweet; Tweet Etiquette; DON'T SPAM; FOLLOW STYLE RULES; GIVE CREDIT FOR RETWEETS; STICK TO 140 CHARACTERS; FOLLOW PEOPLE WHO FOLLOW YOU; The Benefits of Following before Tweeting; How to Join a Conversation; How to Be Interesting on Twitter…”
Libro electrónico -
65433Publicado 2023Tabla de Contenidos: “…Decoupling and developing objects independently with the bridge pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Treating objects the same way using the composite pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Extending object functionality by using the decorator pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Simplifying communication with the facade pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Using conditions to select desired objects with the filter pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Sharing objects across an application with the flyweight pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Handling requests with the front-controller pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Identifying instances using the marker pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Exploring the concept of modules with the module pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Providing a placeholder for an object using the proxy pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Discovering multiple inheritance in Java with the twin pattern -- Motivation -- Sample code -- Conclusion -- Summary -- Questions -- Further reading -- Chapter 5: Behavioral Design Patterns -- Technical requirements -- Limiting expensive initialization using the caching pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Handling events using the chain of responsibility pattern -- Motivation -- Finding it in the JDK -- Sample code -- Conclusion -- Turning information into action with the command pattern -- Motivation -- Finding it in the JDK…”
Libro electrónico -
65434Publicado 2023Tabla de Contenidos: “…Part 3: Deep Dive into Key Metrics for API Products -- Chapter 10: Infrastructure Metrics -- Key success factors (KSFs) for APIs -- Infrastructure as the foundation for API analytics -- Performance metrics -- Uptime and availability -- Errors per minute -- Average and maximum latency -- 90th-percentile latency by customer -- Usage metrics -- Requests Per Minute (RPM) -- CPU usage -- Memory usage -- Error code distribution -- Concurrent connections -- Top endpoints -- Usage by segments -- Reliability metrics -- Mean Time to Failure (MTTF) -- MTTR -- MTBR -- The Rate of Occurrence of Failure (ROCOF) -- Probability of Failure on Demand (POFOD) -- Summary -- Chapter 11: API Product Metrics -- Defining product metrics -- Discovery -- Unique visitors -- Page views -- Sign-ups by channel -- Reading level or text complexity analysis -- Link validation -- Search keyword Analysis -- Engagement -- Average time on page -- Bounce rate -- Engagement with homegrown tools -- Customer engagement score (CES) -- Acquisition -- Daily user sign-ups - new users -- Time to first hello world (TTFHW) -- Software development kit and version adoption -- Activation -- Time to first transaction (TFT) -- Time to value (TTV) -- Cohort analysis -- DAU/MAU/WAU -- Retention -- Recurring daily, weekly, and monthly usage -- Customer retention -- API calls per business transaction -- Experience -- Unique API consumers -- Top customers by API usage -- Conversion rate -- Daily support tickets per active users -- CSAT -- Net Promoter Score (NPS) -- Summary -- Chapter 12: Business Metrics -- Defining business metrics -- Measuring revenue -- MRR -- Revenue versus forecast -- ARPA -- Average transaction value (ATV) -- Revenue by acquisition channel -- Adoption tracking -- SDK adoption -- Feature adoption -- Churn analysis -- Churn rate -- Cohort retention -- Optimizing for growth…”
Libro electrónico -
65435Publicado 2023Tabla de Contenidos: “…Programming in JavaScript using node-redis -- Redis OM for JavaScript -- Programming in Go using go-redis -- Storing information in Redis Stack using Go -- Programming in C#/.NET using NRedisStack -- Storing information in Redis Stack using C#/.NET -- Redis OM for C#/.NET -- Summary -- Part 2: Data Modeling -- Chapter 5: Redis Stack as a Document Store -- Technical requirements -- Storing and querying documents in Redis Stack -- The dialect and other configuration parameters -- The query language -- Simple terms -- Using field modifiers -- Intersection of results (AND) -- Union of results (OR) -- Exact query matches -- Stop words -- Negation and purely negative queries -- Prefix, infix, and suffix queries -- Wildcard matching -- Fuzzy matching -- Numeric filters -- Tag filters -- Geospatial filters -- Aggregation and transformation -- Cursor-based requests -- Faceted search using aggregations -- Updating an index in production -- Temporary indexes -- Additional commands -- Working with Hashes -- Highlighting and summarizing -- Synonyms support -- Spellchecking -- Auto-completion -- Phonetic matching -- Working with JSON -- The JSONPath syntax -- Indexing a JSON document -- Indexing arrays and objects -- Multi-value indexing -- Extracting partial data from JSON documents -- Redis Stack as a recommendation engine -- Recommendation using scores -- Redis Stack as a session store -- Redis data structures for session data -- Additional Redis data structures -- Modeling key-value pairs -- Modeling objects -- Modeling collections -- Session management for real-time applications -- Summary -- Chapter 6: Redis Stack as a Vector Database -- Technical requirements -- Vector embeddings for unstructured data modeling -- Storing the embeddings -- Hashes -- JSON -- Indexing the embeddings -- The algorithms - FLAT and HNSW -- Type -- Index dimension…”
Libro electrónico -
65436por Tang, Jeff. authorTabla de Contenidos: “…Touchtone DetectionSong Identification; Summary; Chapter 7: Networking, Bluetooth, and Social; Making HTTP Requests; HTTP GET; HTTP POST; HTTP File Uploading; Socket Programming; Glass Client vs. …”
Publicado 2014
Libro electrónico -
65437Publicado 2016Tabla de Contenidos: “…A Breakout Board for Beginners -- The Desktop Novena's Power Pass-Through Board -- Custom Battery Pack Problems -- Choosing a Hard Drive -- Finalizing Firmware -- Building a Community -- Closing Thoughts -- Chapter 8. chibitronics: creating circuit stickers -- Crafting with Circuits -- Developing a New Process -- Visiting the Factory -- Performing a Process Capability Test -- Delivering on a Promise -- Why On-Time Delivery Is Important -- Lessons Learned -- Not All Simple Requests Are Simple for Everyone -- Never Skip a Check Plot -- If a Component Can Be Placed Incorrectly, It Will Be -- Some Concepts Don't Translate into Chinese Well -- Eliminate Single Points of Failure -- Some Last-Minute Changes Are Worth It -- Chinese New Year Impacts the Supply Chain -- Shipping Is Expensive and Difficult -- You're Not Out of the Woods Until You Ship -- Closing Thoughts -- part 4: a hacker's perspective -- Chapter 9. hardware hacking -- Hacking the PIC18F1320 -- Decapping the IC -- Taking a Closer Look -- Erasing the Flash Memory -- Erasing the Security Bits -- Protecting the Other Data -- Hacking SD Cards -- How SD Cards Work -- Reverse Engineering the Card's Microcontroller -- Potential Security Issues -- A Resource for Hobbyists -- Hacking HDCP-Secured Links to Allow Custom Overlays -- Background and Context -- How NeTV Worked -- Hacking a Shanzhai Phone -- The System Architecture -- Reverse Engineering the Boot Structure -- Building a Beachhead -- Attaching a Debugger -- Booting an OS -- Building a New Toolchain -- Fernvale Results -- Closing Thoughts -- Chapter 10. biology and bioinformatics -- Comparing H1N1 to a Computer Virus -- DNA and RNA as Bits -- Organisms Have Unique Access Ports -- Hacking Swine Flu -- Adaptable Influenza -- A Silver Lining -- Reverse Engineering Superbugs -- The O104:H4 DNA Sequence -- Reversing Tools for Biology…”
Libro electrónico -
65438Publicado 2023Tabla de Contenidos: “…Differences between RESTful Web Services and JSON:API -- Authenticated requests -- Introduction to Next.js -- Next.js -- CORS -- Next for Drupal -- Summary -- Index -- About Packt -- Other Book You May Enjoy…”
Libro electrónico -
65439por Coar, Ken A. L.Tabla de Contenidos: “…3.1 Getting More Details in Your Log EntriesProblem; Solution; Discussion; See Also; 3.2 Getting More Detailed Errors; Problem; Solution; Discussion; See Also; 3.3 Logging POST Contents; Problem; Solution; Discussion; See Also; 3.4 Logging a Proxied Client's IP Address; Problem; Solution; Discussion; See Also; 3.5 Logging Client MAC Addresses; Problem; Solution; Discussion; See Also; 3.6 Logging Cookies; Problem; Solution; Discussion; See Also; 3.7 Not Logging Image Requests from Local Pages; Problem; Solution; Discussion; See Also; 3.8 Rotating Logfiles at a Particular Time; Problem…”
Publicado 2008
Libro electrónico -
65440por Barrett, Daniel J.Tabla de Contenidos: “…DiscussionSee Also; 2.3 Blocking All Network Traffic; Problem; Solution; Discussion; See Also; 2.4 Blocking Incoming Traffic; Problem; Solution; Discussion; See Also; 2.5 Blocking Outgoing Traffic; Problem; Solution; Discussion; See Also; 2.6 Blocking Incoming Service Requests; Problem; Solution; Discussion; See Also; 2.7 Blocking Access from a Remote Host; Problem; Solution; Discussion; See Also; 2.8 Blocking Access to a Remote Host; Problem; Solution; Discussion; See Also; 2.9 Blocking Outgoing Access to All Web Servers on a Network; Problem; Solution; Discussion; See Also…”
Publicado 2003
Libro electrónico