Mostrando 65,741 - 65,760 Resultados de 69,254 Para Buscar 'Réquista~', tiempo de consulta: 2.08s Limitar resultados
  1. 65741
    Publicado 2012
    Tabla de Contenidos: “…Órganos Unipersonales: El Equipo Directivo; 2.3.2. Requisitos de acceso a la dirección; 2.4. EL CONSEJO ESCOLAR: LA CONQUISTA DE UN ÓRGANO COLEGIADO; 2.4.1. …”
    Libro electrónico
  2. 65742
    por Ruiz Rodríguez, Ignacio
    Publicado 2022
    Tabla de Contenidos: “…EL PLEITO POR LA POSESIÓN DE LOS BIENES -- LA ETERNA LUCHA POR LOS BIENES -- CAPÍTULO VI: UNA LUZ AL FINAL DEL LARGO TÚNEL DE LOS MALOS TRATOS: LA INTERVENCIÓN DEL NUNCIO PAPAL, INNOCENZO MASSIMO -- INTRODUCCIÓN -- LA PETICIÓN PRESENTADA ANTE INNOCENZO MASSIMO -- CAPÍTULO VII: EL RECURSO ANTE LA CORTE DE JUSTICIA DE LA UNIVERSIDAD DE ALCALÁ -- INTRODUCCIÓN -- LA JURISDICCIÓN DE LA UNIVERSIDAD DE ALCALÁ DE HENARES -- BULAS PAPALES Y CONCESIONES REGIAS PARA LA COMPLUTENSE -- FUERO Y AFORADOS UNIVERSITARIOS -- LOS REQUISITOS PARA LA OBTENCIÓN DEL FUERO ACADÉMICO ALCALAÍNO -- LA AUDIENCIA ESCOLÁSTICA COMPLUTENSE Y EL PLEITO POR ELCONOCIMIENTO -- CAPÍTULO VIII: EL PROCESO DE FRANCISCA DE PEDRAZA ANTE LA AUDIENCIA ESCOLÁSTICA DE LA UNIVERSIDAD DE ALCALÁ DE HENARES -- INTRODUCCIÓN -- FRANCISCA ANTE EL RECTOR AYALA O EL ENCUENTRO DE DOS SERES QUE HICIERON HISTORIA -- CAPÍTULO IX: UNA ISLA DIMINUTA, EN UN INMENSO OCÉANO DE VIOLENCIA: LA SENTENCIA DEL RECTOR AYALA -- INTRODUCCIÓN -- EL NUEVO RECURSO -- LOS HIJOS DE FRANCISCA DE PEDRAZA -- A LA ESPERA DE LAS ALEGACIONES DE JERÓNIMO DE JARAS -- UN NUEVO RECTOR AL FRENTE DE LA UNIVERSIDAD DE ALCALÁ DE HENARES Y DE SU AUDIENCIA ESCOLÁSTICA -- A MODO DE EPÍLOGO -- ANEXOS -- FUENTES Y BIBLIOGRAFÍA…”
    Libro electrónico
  3. 65743
    por Acedo Penco, Ángel
    Publicado 2013
    Tabla de Contenidos: “…Significado y momento del nacimiento.; 2.2. Requisitos.; 2.3. Efectos civiles.; 2.4. Partos múltiples.; 2.5. …”
    Libro electrónico
  4. 65744
    por Pujol Capilla, Purificacion
    Publicado 2004
    Tabla de Contenidos: “….- Estructura de la regulación de la figura en el derecho civil de Cataluña; 1. Requisitos esenciales…”
    Libro electrónico
  5. 65745
    por Martinez Martinez, Maria
    Publicado 2004
    Tabla de Contenidos: “…EL SANEAMIENTO POR EVICCIÓN EN LA COMPRAVENTA EN EL CÓDIGO CIVIL ESPAÑOL; 1.1. Revisión de los requisitos; a) Privación al comprador de todo o parte de la cosa comprada; 1. …”
    Libro electrónico
  6. 65746
    por Delgado Garcia, Ana Maria, aut
    Publicado 2008
    Tabla de Contenidos: “…Régimen fiscal especial de la Ley 49/2002; a) Requisitos para disfrutar del régimen especial; b) Las rentas exentas; c) La cuantificación del tributo; d) Obligaciones formales; 1.1.1.2. …”
    Libro electrónico
  7. 65747
    por Acedo Penco, Ángel
    Publicado 2014
    Tabla de Contenidos: “…PERFILES JURISPRUDENCIALES; 3.2. REQUISITOS BÁSICOS; 3.3. MODALIDADES TÍPICAS DE DESIGNACIÓN; 3.3.1. …”
    Libro electrónico
  8. 65748
    por OECD
    Publicado 2018
    Tabla de Contenidos: “…Fortalecer o investimento e melhorar a infraestrutura -- Um investimento maior é um requisito chave para o crescimento sólido -- Por que os investimentos têm sido tão fracos? …”
    Libro electrónico
  9. 65749
    por Algarra Prats, Esther
    Publicado 2012
    Tabla de Contenidos: “…Objeto y causa del contrato; 6. Requisitos de forma. Especial referencia al contrato de juego on-line; 7. …”
    Libro electrónico
  10. 65750
    Publicado 2018
    Tabla de Contenidos: “…Chapter 15: A Functional Approach to Web Services -- The HTTP request-response model -- Injecting state through cookies -- Considering a server with a functional design -- Looking more deeply into the functional view -- Nesting the services -- The WSGI standard -- Throwing exceptions during WSGI processing -- Pragmatic WSGI applications -- Defining web services as functions -- Creating the WSGI application -- Getting raw data -- Applying a filter -- Serializing the results -- Serializing data into JSON or CSV formats -- Serializing data into XML -- Serializing data into HTML -- Tracking usage -- Summary -- Chapter 16: Optimizations and Improvements -- Memoization and caching -- Specializing memoization -- Tail recursion optimizations -- Optimizing storage -- Optimizing accuracy -- Reducing accuracy based on audience requirements -- Case study-making a chi-squared decision -- Filtering and reducing the raw data with a Counter object -- Reading summarized data -- Computing sums with a Counter object -- Computing probabilities from Counter objects -- Computing expected values and displaying a contingency table -- Computing the chi-squared value -- Computing the chi-squared threshold -- Computing the incomplete gamma function -- Computing the complete gamma function -- Computing the odds of a distribution being random -- Functional programming design patterns -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  11. 65751
    Publicado 2018
    Tabla de Contenidos: “…-- Understanding the technical requirements -- Building the Microservice -- Step 1 - install Node.js and MongoDB -- Step 2 - create the skeleton of the Media Catalogue Microservice -- Step 3 - define the structure of the Media Catalogue Microservice -- Step 4 - configure the Media Catalogue Microservice -- Step 5 - define the data entity -- Step 6 - code the interaction with the database -- Step 7 - define the controller function -- Step 8 - route the incoming request to the new controller function -- Step 9 - test the microservice -- Step 10 - package and deploy the microservice -- Step 11 - updating the API endpoint and re-test using Dredd -- Summary -- Chapter 5: Platform Setup and Gateway Configuration -- Platform architecture -- The concept of logical and physical gateways -- Avoiding network latency for global deployments -- Deployment for the use case -- How many nodes -- How many logical gateways -- How much storage? …”
    Libro electrónico
  12. 65752
    Publicado 2017
    Tabla de Contenidos: “…Chapter 4: Enterprise Integration Patterns -- Need for integration patterns -- Integration scenarios in enterprises -- Information portal -- Data replication -- Shared business function -- Service-oriented architecture -- Distributed business process management -- The business-to-business integration -- Main challenges in enterprise integration -- File transfer -- Shared database -- Remote procedure invocation -- Messaging -- Getting started with messaging patterns -- Pipe and filter pattern -- Message router pattern -- Message translator pattern -- Message endpoint pattern -- Point-to-point channel pattern -- Publish-subscribe channel pattern -- Datatype channel pattern -- Message bus patterns -- Command message patterns -- Event message patterns -- Request-reply pattern -- Content-based router pattern -- Message filter pattern -- Resequencer pattern -- Polling consumer pattern -- Channel adapter -- Mobile integration pattern -- Request-response pattern -- Defining a push notification pattern -- API management pattern -- Summary -- Chapter 5: Domain-Driven Design (DDD) Principles and Patterns -- Principles, characteristics, and practices of DDD -- Principles -- Focusing on the core domain -- Collaborate and learn -- Model the domain -- Evolve -- Talk in ubiquitous language -- Characteristics -- Best practices -- DDD patterns -- Strategic patterns -- Ubiquitous language -- Domain, subdomain, and core domain -- Bounded contexts -- Integrating bounded contexts -- Autonomous bounded context -- The shared-nothing architecture -- Single responsibility codes -- Multiple bounded contexts (within a solution) -- Adoption of SOA principles -- Integrating with legacy systems -- The bubble context -- The anti-corruption layer -- Expose as a service -- Distributed bounded context integration strategies -- Database integration -- Flat file integration…”
    Libro electrónico
  13. 65753
    Publicado 2018
    Tabla de Contenidos: “…Uploading existing files -- Uploading files as a stream -- Uploading from data in memory -- Managing file upload -- Monitoring file upload -- Beyond monitoring and managing -- Downloading files -- Creating a reference -- Downloading into memory -- Downloading into a local file -- Downloading data through a URL -- Downloading images using FirebaseUI -- Beyond downloading files -- File metadata -- Retrieving File Metadata -- Update the metadata of the file -- Deleting files -- Handling common errors -- Security and rules -- The general syntax for storage security rules -- Securing user files -- Request and Resource Evaluation -- Storage and functions -- Firebase Storage in practice -- Summary -- Chapter 6: Not Just a Keeper, Firebase Hosting -- Firebase Hosting -- Deploying a website -- Connecting to custom domain -- Connecting Firebase cloud functions -- Customizing hosting behavior -- Custom 404/Not Found page -- Redirects -- Rewrites -- Headers -- Hosting priorities -- Reserved URLs -- Summary -- Chapter 7: Inspection and Evaluation - Firebase Test Lab -- Firebase Test Lab -- Test Lab for Android -- Choosing the testing method -- Robo testing -- Choosing device type and reviewing test results -- Test Lab with Firebase Console -- Test Lab with gcloud CLI -- Google Cloud SDK environment -- Choosing test configurations -- Scripting gcloud commands with Test Lab -- Test Lab with CI systems -- Creating a Jenkins project -- Test Lab with Android Studio -- Firebase Test Lab results -- Available devices in Test Lab -- Firebase Test Lab Game Loop testing -- Test Loop Manager -- Game loop in Test Lab -- Prelaunch reports -- Summary -- Chapter 8: A Smart Watchdog - Firebase Performance Monitoring -- Firebase Performance Monitoring -- Performance Monitoring for Android -- Automatic traces -- Custom trace and counters…”
    Libro electrónico
  14. 65754
    Publicado 2017
    Tabla de Contenidos: “…. -- See also -- Working with move requests and performing mailbox moves -- How to do it... -- How it works... -- There's more... -- Removing move requests -- Moving archive mailboxes -- Moving mailboxes in batches -- Moving mailboxes with corrupt items -- See also -- Email notification on mailbox moves -- How to do it... -- How it works…”
    Libro electrónico
  15. 65755
    Publicado 2021
    Tabla de Contenidos: “…Going beyond next -- The yield from expression -- Generator expressions -- Some performance considerations -- Don't overdo comprehensions and generators -- Name localization -- Generation behavior in built-ins -- One last example -- Summary -- Chapter 6: OOP, Decorators, and Iterators -- Decorators -- A decorator factory -- Object-oriented programming (OOP) -- The simplest Python class -- Class and object namespaces -- Attribute shadowing -- The self argument -- Initializing an instance -- OOP is about code reuse -- Inheritance and composition -- Accessing a base class -- Multiple inheritance -- Method resolution order -- Class and static methods -- Static methods -- Class methods -- Private methods and name mangling -- The property decorator -- The cached_property decorator -- Operator overloading -- Polymorphism - a brief overview -- Data classes -- Writing a custom iterator -- Summary -- Chapter 7: Exceptions and Context Managers -- Exceptions -- Raising exceptions -- Defining your own exceptions -- Tracebacks -- Handling exceptions -- Not only for errors -- Context managers -- Class-based context managers -- Generator-based context managers -- Summary -- Chapter 8: Files and Data Persistence -- Working with files and directories -- Opening files -- Using a context manager to open a file -- Reading and writing to a file -- Reading and writing in binary mode -- Protecting against overwriting an existing file -- Checking for file and directory existence -- Manipulating files and directories -- Manipulating pathnames -- Temporary files and directories -- Directory content -- File and directory compression -- Data interchange formats -- Working with JSON -- Custom encoding/decoding with JSON -- I/O, streams, and requests -- Using an in-memory stream -- Making HTTP requests -- Persisting data on disk -- Serializing data with pickle…”
    Libro electrónico
  16. 65756
    Publicado 2017
    Tabla de Contenidos: “…The cryptocurrencies example -- A brief introduction to object-oriented programming -- The purpose of object-oriented programming -- Important concepts behind object-oriented languages -- Encapsulation -- Polymorphism -- Hierarchies -- Classes and constructors -- Public and private methods -- Interfaces, factories, and patterns in general -- Introducing three object models in R - S3, S4, and R6 -- The first source of confusion - various object models -- The second source of confusion - generic functions -- The S3 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- The S4 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- The R6 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- Active bindings -- Finalizers -- The architecture behind our cryptocurrencies system -- Starting simple with timestamps using S3 classes -- Implementing cryptocurrency assets using S4 classes -- Implementing our storage layer with R6 classes -- Communicating available behavior with a database interface -- Implementing a database-like storage system with CSV files -- Easily allowing new database integration with a factory -- Encapsulating multiple databases with a storage layer -- Retrieving live data for markets and wallets with R6 classes -- Creating a very simple requester to isolate API calls -- Developing our exchanges infrastructure -- Developing our wallets infrastructure -- Implementing our wallet requesters -- Finally introducing users with S3 classes -- Helping ourselves with a centralized settings file -- Saving our initial user data into the system -- Activating our system with two simple functions…”
    Libro electrónico
  17. 65757
    Publicado 2017
    Tabla de Contenidos: “…. -- Sending a Roslyn pull request to contribute to next version of C# compiler and VS IDE -- Getting Started -- How to do it... -- Chapter 9: Design and Implement a New C# Language Feature -- Introduction -- New language feature: Switch Operator (?…”
    Libro electrónico
  18. 65758
    Publicado 2018
    Tabla de Contenidos:
    Libro electrónico
  19. 65759
    Tabla de Contenidos:
    Libro electrónico
  20. 65760
    Publicado 1996
    Tabla de Contenidos: “…RADIATION IN MEDICINE -- Copyright -- Preface -- Acknowledgments -- Contents -- Summary -- BENEFITS OF IONIZING RADIATION -- THE REGULATORY FRAMEWORK -- The Current Situation -- The NRC Medical Use Program -- The Quality Management Rule -- The NRC Agreement State Program -- ALTERNATIVE REGULATORY SYSTEMS -- Seven Alternative Structures -- Assessment of the Alternatives -- The Preferred Choice: Alternative D, Federal Guidance -- FINDINGS AND CONCLUSIONS -- RECOMMENDATIONS -- A: Recommendations to Congress -- B: Recommendations to the Nuclear Regulatory Commission -- C: Recommendations to the Conference of Radiation Control Program Directors and to the States -- CONCLUDING OBSERVATIONS -- 1 Introduction -- ERRORS AND SUCCESSES, BENEFITS AND PROBLEMS OF RADIATION MEDICINE -- THE CURRENT REGULATORY SYSTEM -- The NRC Medical Use Program -- Regulation of Other Sources -- Evolution of Federal and State Regulatory Programs -- THE INSTITUTE OF MEDICINE STUDY -- The NRC Request to the IOM and the Committee Charge -- Elements of the Study -- Meetings -- Public Hearing -- Technical Panel -- Commissioned Papers -- Site Visits -- Professional Meetings -- Organization of the Report -- Scope and Limitations of the Report -- CHAPTER SUMMARY -- REFERENCES -- 2 Clinical Applications of Ionizing Radiation -- MEASURES OF PATIENT EXPOSURE TO IONIZING RADIATION -- DIAGNOSTIC APPLICATIONS OF IONIZING RADIATION -- External Sources: Radiology -- Types of Procedures -- Utilization Rates -- Radiation Doses -- Radiation Regulation and Control -- Internal Sources: Diagnostic Nuclear Medicine -- Types of Procedures -- Utilization Rates -- Radiation Doses -- Radiation Regulation and Control -- THERAPEUTIC APPLICATIONS OF IONIZING RADIATION -- External Sources: Radiation Oncology and Teletherapy -- General Approaches -- Clinical Uses in Illustrative Medical Conditions…”
    Libro electrónico