Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,950
- Publicaciones periódicas 1,945
- Educación 1,464
- Teología 1,211
- Education 1,119
- Psicología 1,091
- Periodicals 1,069
- Derecho 1,066
- Economía 1,005
- Filosofía 1,001
- Revistes 893
- Ciencias sociales 878
- Social sciences 762
- Medicina 683
- Humanidades 654
- Información general 575
- Psychology 572
- Agricultura 552
- Literatura 536
- Science 533
- Agriculture 494
- Psicología industrial 475
- Technology 473
- Tecnología 470
- Arquitectura 459
- Ciencia 458
- Psychology, Industrial 451
- Work 444
- Història 441
- Articulos Publicaciones periodicas 431
-
66381por Le Corbusier, 1887-1965“…Puerta de hielo es una selección de artículos, escritos entre 1920-1925, que Le Corbusier publicó en la revista vanguardista L'Esprit Nouveau…”
Publicado 2005
Libro -
66382Publicado 2022“…Analizados los presupuestos de la responsabilidad, estudiaremos los requisitos para que la empresa pueda ser eximida de dicha responsabilidad o, lo que es lo mismo, los requisitos que deben de cumplir los programas de cumplimiento normativo para que produzcan efectos eximentes de la responsabilidad penal de la empresa. …”
Datos de acceso al recurso electrónico
Acceso a la plataforma Legalteca, busque el título una vez dentro.
Libro -
66383Publicado 2012Tabla de Contenidos: “…Function of integrated control of all local with management of requests 4.1.11. Function of total Interlock 4.2. Ventilation and air conditioning 4.2.1. …”
Libro electrónico -
66384Publicado 2022Tabla de Contenidos: “…-- 6.2 Error-Detection and-Correction Techniques -- 6.2.1 Parity Checks -- 6.2.2 Checksumming Methods -- 6.2.3 Cyclic Redundancy Check (CRC) -- 6.3 Multiple Access Links and Protocols -- 6.3.1 Channel Partitioning Protocols -- 6.3.2 Random Access Protocols -- 6.3.3 Taking-Turns Protocols -- 6.3.4 DOCSIS: The Link-Layer Protocol for Cable Internet Access -- 6.4 Switched Local Area Networks -- 6.4.1 Link-Layer Addressing and ARP -- 6.4.2 Ethernet -- 6.4.3 Link-Layer Switches -- 6.4.4 Virtual Local Area Networks (VLANs) -- 6.5 Link Virtualization: A Network as a Link Layer -- 6.5.1 Multiprotocol Label Switching (MPLS) -- 6.6 Data Center Networking -- 6.6.1 Data Center Architectures -- 6.6.2 Trends in Data Center Networking -- 6.7 Retrospective: A Day in the Life of a Web Page Request -- 6.7.1 Getting Started: DHCP, UDP, IP, and Ethernet -- 6.7.2 Still Getting Started: DNS and ARP -- 6.7.3 Still Getting Started: Intra-Domain Routing to the DNS Server -- 6.7.4 Web Client-Server Interaction: TCP and HTTP -- 6.8 Summary -- Homework Problems and Questions -- Wireshark Labs: 802.11 Ethernet -- Interview: Albert Greenberg -- Chapter 7: Wireless and Mobile Networks -- 7.1 Introduction -- 7.2 Wireless Links and Network Characteristics -- 7.2.1 CDMA -- 7.3 WiFi: 802.11 Wireless LANs -- 7.3.1 The 802.11 Wireless LAN Architecture -- 7.3.2 The 802.11 MAC Protocol…”
Libro electrónico -
66385por Agutter, ClaireTabla de Contenidos: “…Process guide: Event management -- 6.1 Process purpose -- 6.2 SIAM considerations -- 6.3 Generic process information -- 6.3.1 Activities -- 6.3.2 Example roles -- 6.3.3 Example metrics -- 6.3.4 Example inputs and outputs -- 6.3.5 Event management outputs can include -- 7. Process guide: Request management -- 7.1 Process purpose -- 7.2 SIAM considerations -- 7.3 Generic process information -- 7.3.1 Activities -- 7.3.2 Example roles -- 7.3.3 Example metrics -- 7.3.4 Example inputs and outputs -- 8. …”
Publicado 2021
Libro electrónico -
66386por Al-Turjman, FadiTabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- About the Author -- List of Contributors -- Chapter 1 Cloud Computing and Business Intelligence in IoT-Enabled Smart and Healthy Cities -- 1.1 Introduction -- 1.1.1 Comparison to Other Surveys -- 1.1.2 Scope of the Paper and Its Contribution -- 1.2 Cloud Computing -- 1.2.1 Cloud Computing Characteristics -- 1.2.2 Cloud Computing Models -- 1.2.2.1 Infrastructure as a Service (IaaS) -- 1.2.2.2 Platform as a Service (PaaS) -- 1.2.2.3 Software as a Service (SaaS) -- 1.2.3 Cloud Deployment Model -- 1.2.3.1 Public Cloud -- 1.2.3.2 Private Cloud -- 1.2.3.3 Hybrid Cloud -- 1.2.3.4 Community Cloud -- 1.2.4 Restrictions and Opportunities of Cloud Computing -- 1.2.5 Cloud Computing Qualities -- 1.2.5.1 Storage over the Internet -- 1.2.5.2 Service over Internet -- 1.2.5.3 Application Used over Internet -- 1.2.5.4 Energy Efficiencies -- 1.3 Cloud Computing (CC) and Business Intelligence (BI) -- 1.3.1 Business Intelligence -- 1.3.2 Cloud-Based BI Model -- 1.3.3 Cloud Computing Role in Business Intelligence -- 1.3.4 Benefits and Difficulties of Cloud Computing in BI -- 1.3.5 Incorporating BI Software into the Cloud -- 1.4 Procedures in BI and the Cloud -- 1.4.1 Collection of Data -- 1.4.2 Effectiveness and Authenticity -- 1.4.3 Preparation of Data and Data Analysis -- 1.4.4 Data Surveys -- 1.5 Information Technology in the Cloud and BI -- 1.5.1 BI On-Request -- 1.5.2 Cloud Speed Up Development -- 1.5.3 Business Intelligence Prospects -- 1.6 Artificial Intelligence (AI) in Business Intelligence (BI) -- 1.6.1 Supervised Learning -- 1.6.2 Unsupervised Learning -- 1.6.3 Reinforcement Learning (Semi-Supervised) -- 1.7 The Application Of Cloud IoT in Battling COVID-19 -- 1.7.1 Main Application Area of Cloud IoT in the COVID-19 Pandemic -- 1.8 Security in BI…”
Publicado 2021
Libro electrónico -
66387Publicado 2003Tabla de Contenidos: “…Programming model -- 4.1 Overview -- 4.2 WebSphere Commerce Server framework -- 4.2.1 Servlet engine -- 4.2.2 Protocol Listeners -- 4.2.3 Adapter manager -- 4.2.4 Adapters -- 4.2.5 Web controller -- 4.2.6 Commands -- 4.2.7 Entity beans -- 4.2.8 Data beans -- 4.2.9 Data Bean Manager -- 4.2.10 JavaServer Page (JSP) templates -- 4.2.11 WebSphere Commerce < -- instance> -- .xml configuration file -- 4.3 Application flow of an HTTP request -- 4.4 Design patterns -- 4.4.1 Model-view-controller design pattern -- 4.4.2 Command design pattern -- 4.4.3 Display design pattern -- 4.5 Persistent object model -- 4.6 Access control -- 4.7 Customizing application assets -- 4.7.1 Asset types to customize and development tooling -- 4.7.2 Matching skills to customization needs -- 4.8 For more information -- Chapter 5. …”
Libro electrónico -
66388por Lovelace, MaryTabla de Contenidos: “…TotalStorage Productivity Center for Disk use -- 6.1 Performance Manager GUI -- 6.2 Exploiting Performance Manager -- 6.2.1 Performance Manager data collection -- 6.2.2 Using IBM Director Scheduler function -- 6.2.3 Reviewing Data collection task status -- 6.2.4 Managing Performance Manager Database -- 6.2.5 Performance Manager gauges -- 6.2.6 ESS thresholds -- 6.2.7 Data collection for SAN Volume Controller -- 6.2.8 SAN Volume Controller thresholds -- 6.3 Exploiting gauges -- 6.3.1 Before you begin -- 6.3.2 Creating gauges example -- 6.3.3 Zooming in on the specific time period -- 6.3.4 Modify gauge to view array level metrics -- 6.3.5 Modify gauge to review multiple metrics in same chart -- 6.4 Performance Manager command line interface -- 6.4.1 Performance Manager CLI commands -- 6.4.2 Sample command outputs -- 6.5 Volume Performance Advisor (VPA) -- 6.5.1 VPA introduction -- 6.5.2 The provisioning challenge -- 6.5.3 Workload characterization and workload profiles -- 6.5.4 Workload profile values -- 6.5.5 How the Volume Performance Advisor makes decisions -- 6.5.6 Enabling the Trace Logging for Director GUI Interface -- 6.6 Getting started -- 6.6.1 Workload profiles -- 6.6.2 Using VPA with predefined Workload profile -- 6.6.3 Launching VPA tool -- 6.6.4 ESS User Validation -- 6.6.5 Configuring VPA settings for the ESS diskspace request -- 6.6.6 Choosing Workload Profile -- 6.6.7 Choosing candidate locations -- 6.6.8 Verify settings for VPA -- 6.6.9 Approve recommendations -- 6.6.10 VPA loopback after Implement Recommendations selected -- 6.7 Creating and managing Workload Profiles -- 6.7.1 Choosing Workload Profiles…”
Publicado 2005
Libro electrónico -
66389Publicado 2003Tabla de Contenidos: “…11.2.4 Parallel processing without block level data sharing -- 11.2.5 Program modifications for parallel processing -- 11.3 Restricting a PCB to one partition -- 11.3.1 Processing a partition sequentially -- 11.3.2 Requesting segments outside of the partition -- 11.3.3 Secondary index and logical relationship considerations -- 11.4 Handling unavailable partitions -- 11.4.1 Database PCB status code priming -- 11.5 Processing secondary indexes as databases -- 11.5.1 Secondary indexes with /SX fields -- 11.5.2 Secondary indexes with symbolic pointers -- 11.6 Handling test environments -- 11.6.1 DBRC registration -- 11.6.2 Testing with non-HALDB databases -- 11.7 Copying databases to different environments -- 11.7.1 The partition ID -- 11.7.2 Using image copies -- 11.7.3 Using unloads -- 11.7.4 Copying part of the data -- 11.7.5 Copying partition definitions -- 11.7.6 Timestamp recoveries to a copy -- 11.7.7 Planned enhancement for copying partition definitions -- Part 4 Administration -- Chapter 12. …”
Libro electrónico -
66390Publicado 2003Tabla de Contenidos: “…Batch application design with DFSMStvs -- 6.1 Application classification -- 6.1.1 DFSMStvs intolerant applications -- 6.1.2 DFSMStvs tolerant applications -- 6.1.3 DFSMStvs exploiting applications -- 6.2 Simple and advanced application models -- 6.3 Designing efficient transactional applications -- 6.3.1 Exclusive control of resources -- 6.3.2 Minimizing contention -- 6.3.3 Transactional isolation -- 6.4 Programming interfaces -- 6.4.1 High-level language considerations -- 6.4.2 Enhancements to the application programming interfaces -- 6.4.3 VSAM macros -- 6.4.4 Opening in DFSMStvs mode -- 6.4.5 Using commit and backout -- 6.4.6 Checking VSAM return codes -- 6.5 How you can avoid reapplying updates -- 6.5.1 Repositioning input files -- 6.5.2 Repositioning output files -- 6.5.3 Generalized subroutines -- 6.6 Other application considerations -- 6.6.1 Read integrity options -- 6.6.2 Applications using non-shared resources -- 6.6.3 Deleting data sets -- 6.6.4 Checkpoint/restart -- 6.6.5 Hiperbatch -- 6.7 Accessing records -- 6.7.1 Maximum record size -- 6.7.2 Browsing -- 6.7.3 Skip-sequential processing -- 6.7.4 Updating records -- 6.7.5 Deleting records -- 6.7.6 Adding records -- 6.8 VSAM restrictions -- 6.8.1 Defer processing -- 6.8.2 Load mode -- 6.8.3 Positioning -- 6.8.4 Locking -- 6.8.5 Sharing -- 6.8.6 SHAREOPTIONS -- 6.8.7 DEFINE parameters -- 6.8.8 Alternate indices -- 6.8.9 GETIX and PUTIX interfaces -- 6.8.10 VSAM exits -- 6.8.11 Request environment -- 6.9 Lock handling -- 6.9.1 Record locking for recoverable data sets -- 6.9.2 Types of locks -- 6.9.3 Lock duration -- 6.9.4 Lock granularity and ownership -- 6.9.5 Intra-unit of recovery lock contention -- 6.10 Deadlocks -- 6.10.1 Deadlock detection -- 6.10.2 Deadlock and time-out…”
Libro electrónico -
66391Tabla de Contenidos: “…Reporting on your DFSMSrmm environment -- 8.1 Requesting DFSMSrmm resource information -- 8.1.1 Working with resource lists -- 8.1.2 Displaying information from DFSMSrmm -- 8.2 Reporting utilities -- 8.2.1 Security and audit reports -- 8.2.2 Inventory management reports -- 8.2.3 Inventory, movement, and scratch list reports -- 8.2.4 DFSMSrmm-supplied EXECs -- 8.3 DFSORT reporting -- 8.4 DFSMSrmm report generator -- 8.4.1 Setting up the report generator -- 8.4.2 The report type support -- 8.4.3 The reporting tool support -- 8.4.4 Report definition support -- 8.4.5 Using the report generator -- 8.4.6 Report generator messages -- 8.5 Sample reports -- Chapter 9. …”
Libro electrónico -
66392Publicado 2003Tabla de Contenidos: “…WebSphere Commerce Portal architecture -- 2.1 WebSphere Commerce Portal architecture -- 2.1.1 Commerce enabled portal integration approaches -- 2.1.2 XML-based commerce enabled portal solution outlook -- 2.1.3 WebSphere Commerce Portal runtime environment -- 2.1.4 WebSphere Commerce Portal component architecture -- 2.1.5 WebSphere Commerce Portal HTTP request flow -- 2.1.6 WebSphere Commerce Portal architecture of key features -- 2.2 WebSphere Commerce and WebSphere Portal architecture overview -- 2.2.1 WebSphere Commerce architecture -- 2.2.2 WebSphere Portal architecture -- 2.3 Mobile client access -- 2.3.1 Where to find more information -- 2.4 Authentication and single sign-on -- 2.5 Access control -- 2.6 Session management -- 2.7 Presentation services and page rendering -- Chapter 3. …”
Libro electrónico -
66393por Burns, BrendanTabla de Contenidos: “…3.1.2 Kubernetes mit dem Azure Kubernetes Service installieren -- 3.1.3 Kubernetes auf den Amazon Web Services installieren -- 3.1.4 Kubernetes mit minikube lokal installieren -- Tipp -- 3.2 Kubernetes in Docker ausführen -- 3.3 Kubernetes auf dem Raspberry Pi ausführen -- 3.4 Der Kubernetes-Client -- 3.4.1 Den Cluster-Status prüfen -- Tipp -- Tipp -- 3.4.2 Worker-Knoten in Kubernetes auflisten -- 3.5 Cluster-Komponenten -- 3.5.1 Kubernetes-Proxy -- 3.5.2 Kubernetes-DNS -- Tipp -- 3.5.3 Kubernetes-UI -- 3.6 Zusammenfassung -- 4 Häufige kubectl-Befehle -- 4.1 Namensräume -- 4.2 Kontexte -- 4.3 Objekte der Kubernetes-API anzeigen -- 4.4 Kubernetes-Objekte erstellen, aktualisieren und löschen -- Tipp -- 4.5 Objekte mit einem Label und Anmerkungen versehen -- 4.6 Debugging-Befehle -- Tipp -- 4.7 Autovervollständigen von Befehlen -- 4.8 Alternative Möglichkeiten zur Kommunikation mit Ihrem Cluster -- 4.9 Zusammenfassung -- 5 Pods -- Abb. 5-1 Ein Beispiel-Pod mit zwei Containern und einem gemeinsamen Dateisystem -- Tipp -- 5.1 Pods in Kubernetes -- 5.2 In Pods denken -- 5.3 Das Pod-Manifest -- Tipp -- 5.3.1 Einen Pod erstellen -- 5.3.2 Ein Pod-Manifest schreiben -- Listing 5-1 kuard-pod.yaml -- 5.4 Pods starten -- 5.4.1 Pods auflisten -- Tipp -- 5.4.2 Pod-Details -- 5.4.3 Einen Pod löschen -- 5.5 Auf Ihren Pod zugreifen -- 5.5.1 Port-Forwarding einsetzen -- 5.5.2 Mehr Informationen aus Logs erhalten -- Tipp -- 5.5.3 Befehle in Ihrem Container mit exec ausführen -- 5.5.4 Dateien von und auf Container kopieren -- 5.6 Health-Checks -- 5.6.1 Liveness-Probe -- Listing 5-2 kuard-pod-health.yaml -- Tipp -- 5.6.2 Readiness-Probe -- 5.6.3 Arten von Health-Checks -- 5.7 Ressourcen-Management -- 5.7.1 Ressourcen-Anforderungen: Minimal notwendige Ressourcen -- Listing 5-3 kuard-pod-resreq.yaml -- Tipp -- Details zu den Request-Grenzen -- Tipp…”
Publicado 2020
Libro electrónico -
66394por Henningsen, PeterTabla de Contenidos: “…-- 5.1.1 During application development -- 5.1.2 During application test -- 5.1.3 During application service -- 5.1.4 During application maintenance -- 5.1.5 Other uses -- 5.2 Some things to remember when using Application Monitor -- 5.3 Basic functionality -- 5.3.1 Analyzing an active job -- 5.3.2 Analyzing a specified job -- 5.3.3 Scheduling a deferred monitoring request -- 5.3.4 Analyzing historical data -- 5.3.5 Named sets: what they are and why they can help -- 5.4 Some available reports -- 5.4.1 Program reports -- 5.4.2 Delay Analysis reports -- 5.4.3 Data Set Analysis reports -- 5.4.4 CICS reports -- 5.4.5 DB2 reports -- 5.4.6 IMS reports -- 5.5 Things to remember when using Application Monitor -- Chapter 6. …”
Publicado 2004
Libro electrónico -
66395Publicado 2022Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- 1 Post Pandemic: The New Advanced Society -- 1.1 Introduction -- 1.1.1 Themes -- 1.1.1.1 Theme: Areas of Management -- 1.1.1.2 Theme: Financial Institutions Cyber Crime -- 1.1.1.3 Theme: Economic Notion -- 1.1.1.4 Theme: Human Depression -- 1.1.1.5 Theme: Migrant Labor -- 1.1.1.6 Theme: Digital Transformation (DT) of Educational Institutions -- 1.1.1.7 School and College Closures -- 1.2 Conclusions -- References -- 2 Distributed Ledger Technology in the Construction Industry Using Corda -- 2.1 Introduction -- 2.2 Prerequisites -- 2.2.1 DLT vs Blockchain -- 2.3 Key Points of Corda -- 2.3.1 Some Salient Features of Corda -- 2.3.2 States -- 2.3.3 Contract -- 2.3.3.1 Create and Assign Task (CAT) Contract -- 2.3.3.2 Request for Cash (RT) Contract -- 2.3.3.3 Transfer of Cash (TT) Contract -- 2.3.3.4 Updation of the Task (UOT) Contract -- 2.3.4 Flows -- 2.3.4.1 Flow Associated With CAT Contract -- 2.3.4.2 Flow Associated With RT Contract -- 2.3.4.3 Flow Associated With TT Contract -- 2.3.4.4 Flow Associated With UOT Contract -- 2.4 Implementation -- 2.4.1 System Overview -- 2.4.2 Working Flowchart -- 2.4.3 Experimental Demonstration -- 2.5 Future Work -- 2.6 Conclusion -- References -- 3 Identity and Access Management for Internet of Things Cloud -- 3.1 Introduction -- 3.2 Internet of Things (IoT) Security -- 3.2.1 IoT Security Overview -- 3.2.2 IoT Security Requirements -- 3.2.3 Securing the IoT Infrastructure -- 3.3 IoT Cloud -- 3.3.1 Cloudification of IoT -- 3.3.2 Commercial IoT Clouds -- 3.3.3 IAM of IoT Clouds -- 3.4 IoT Cloud Related Developments -- 3.5 Proposed Method for IoT Cloud IAM -- 3.5.1 Distributed Ledger Approach for IoT Security -- 3.5.2 Blockchain for IoT Security Solution…”
Libro electrónico -
66396por Suresh, A.Tabla de Contenidos: “…7.1.2 Management of Conflict in Agile RM Framework -- 7.1.2.1 A Holistic View of Technology -- 7.1.3 Ratings and Context Information -- 7.1.4 Dynamic Traffic Steering -- 7.1.4.1 Reduced-Overhead Interference Mitigation -- 7.1.5 Reducing Overhead Interference Mitigation -- 7.1.5.1 RIM and 5G NR -- 7.1.5.2 Contributions and Differences -- 7.1.6 High-Level 5NR - RIM Framework -- 7.1.7 OS RIM-RS -- 7.1.7.1 OS RIM-RS -- 7.1.8 Radio-Access Network -- 7.1.9 Improve RAN Coverage -- 7.1.9.1 Improving RAN Coverage Can Take Many Forms -- 7.1.10 Related Work -- 7.1.11 Conclusion -- References -- Chapter 8 Interference Techniques Based on Deep Learning in Wireless Networks -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Suppression Techniques -- 8.3.1 Deep Learning Based Approach -- 8.3.2 Adjacent Channel Interference (ACI) -- 8.3.3 Co-Channel Interference -- 8.3.4 Self-Interference -- 8.3.5 Homogeneous Technology Interference -- 8.3.6 Heterogeneous Technology Interference -- 8.4 Classification of Interference Suppression Techniques -- 8.5 A Blind Approach of Interference Cancellation Using Neural Networks -- 8.6 Interference Estimation -- 8.6.1 Feature Extraction -- 8.6.2 Channel Usage Ratio -- 8.7 Machine Learning Model-Decision Tree -- 8.8 Lookup Table -- 8.9 Conclusion -- References -- Chapter 9 Implementing SDN Process-Based MRMC Wireless Networks -- 9.1 Multi-Radio Multi Channel Network in Wireless Network -- 9.1.1 The Concept of QoS inWN -- 9.2 QoS Challenges in MRMC Based Wireless Networks -- 9.2.1 Bandwidth Limitation -- 9.2.2 Removal of Redundancy -- 9.2.3 Energy and Delay Trade-Off -- 9.2.4 Buffer Size Limitation -- 9.3 Opportunistic Routing -- 9.4 The Need for Software-Defined Network in WSN for Enhancing QoS -- 9.4.1 QoS Management -- 9.5 ILP Problem Design -- 9.5.1 Network Model -- 9.5.2 Interference Model -- 9.5.3 VL Request Design…”
Publicado 2023
Libro electrónico -
66397Publicado 2005“…"La 1a edición castellana ha servido de referencia permanente (Madrid, Revista de Occidente, 1925) a la presente edición de Biblioteca Nueva" (p. 129)…”
Acceso restringido con credenciales, usuarios UPSA
Libro electrónico -
66398Publicado 2005“…"La 1a edición castellana ha servido de referencia permanente (Madrid, Revista de Occidente, 1925) a la presente edición de Biblioteca Nueva" (p. 129)…”
Acceso restringido con credenciales, usuarios UPSA
Libro electrónico -
66399Publicado 2017“…Revista digital gratuita en formato blog de temática archivística y/o documental y de carácter divulgativo, que nace de un proyecto voluntario y altruista. …”
Clic para acceder. Acceso abierto
Seriada digital -
66400Publicado 2009“…Este CD contiene la colección completa de números publicados de la revista Encuentro Islamo-Cristiano, editados por el Centro Darek-Nyumba entre 1972 y 2008.…”
CDROM