Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,217
- Història 1,082
- Política y gobierno 820
- History 507
- Asia 353
- Descripción y viajes 273
- Asma 258
- -Historia 248
- Relaciones 223
- Crítica e interpretación 221
- Politics and government 217
- Usos y costumbres 203
- Economic conditions 179
- Descripción 176
- Civilización romana 173
- Historia y crítica 169
- Política exterior 167
- Civilización 151
- Situación social 146
- Geografía 135
- Religión 132
- Emperadores 129
- Política 128
- Obras anteriores a 1800 127
- Descripcions i viatges 124
- Relaciones exteriores 122
- Foreign relations 121
- Història antiga 113
- Comunismo 108
- Restos arqueológicos 108
-
23201Publicado 1997Tabla de Contenidos: “…v. 9: Europa -- v. 10: Europa-Oceanía -- v. 11: América-África -- v. 12: Asia…”
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro -
23202Publicado 2020Tabla de Contenidos: “…What are theological libraries -- Theological librarianship as a career path -- Christian theological libraries in Africa -- Theological libraries in Australia and New Zealand -- Theological libraries in Central and Western Europe -- Theological libraries in Eastern Europe and Central Asia -- Theological libraries in Latin America -- Theological libraries in North America -- Christian theological libraries in North Asia -- Christian theological libraries in South Asia…”
Acceso abierto
Libro -
23203por Granger, Ernest, 1876-Tabla de Contenidos: “…Tomo I: Europa y Asia. Tomo II: Asia (conclusión) h, África, Australasia y Oceanía, América Sajona. …”
Publicado 1928
Libro -
23204por Peaslee, Amos Jenkins, 1887-1969Tabla de Contenidos: “…v. 1. Africa -- 2,1. Asia, Australia and Oceania: Afghanistan-Laos-- 2,2. …”
Publicado 1965
Libro -
23205por Garber, Peter R.“…A situation that requires an internal investigation can range from something that can be handles internally, before it has a chance to escalate, to something serious enough to warrant involvement of a governmental or regulatory agency such as the Equal Opportunity Commission, the Department of Labor, or OSHA. In some cases criminal activity could be involved, which would require law enforcement involvement. …”
Publicado 2010
Libro electrónico -
23206Publicado 2011Tabla de Contenidos: “…""APPENDIXES""""Appendix A: OSHA Laboratory Standard""; ""Appendix B: Statement of Task""; ""Appendix C: Committee Member Biographies""; ""Index""…”
Libro electrónico -
23207Publicado 2013Tabla de Contenidos: “…Part 1: Global Education -- Part 2: Antecedents of Asia’s Competitiveness -- Part 3: Emerging Trends in Banking, Finance and Accounting -- Part 4: Psychological Issues in Asia -- Part 5: Emerging Retail and Service Industries -- Part 6: Entrepreneurship, Creativity and Innovation -- Part 7: Systems Thinking and Systems Practices -- Part 8: Tourism initiatives, relationships and issues in Asia-pacific -- Part 9: General Topics…”
Libro electrónico -
23208Publicado 2021Tabla de Contenidos: “…A History of 20th-Century Safety Metrics -- Birth of a Recordkeeping Standard -- OSHA Changes the Formula -- The Abuse of the System -- 3. …”
Libro electrónico -
23209
-
23210Publicado 2015Tabla de Contenidos:Libro electrónico
-
23211Publicado 2017Tabla de Contenidos: “…Point doubling -- Discrete logarithm problem -- How to generate public and private key pairs -- Private key -- Generate public key -- How to encrypt and decrypt using RSA with OpenSSL -- Encryption -- Decrypt -- ECC using OpenSSL -- ECC private and public key pair -- Private key -- Private key generation -- Cryptographic primitives -- Hash functions -- Compression of arbitrary messages into fixed length digest -- Easy to compute -- Pre-image resistance -- Second pre-image resistance -- Collision resistance -- Message Digest (MD) -- Secure Hash Algorithms (SHAs) -- Design of Secure Hash Algorithms (SHA) -- SHA-256 -- Design of SHA3 (Keccak) -- OpenSSL example of hash functions -- Message Authentication codes (MACs) -- MACs using block ciphers -- HMACs (hash-based MACs) -- Merkle trees -- Patricia trees -- Distributed hash tables (DHTs) -- Digital signatures -- Sign then encrypt -- Encrypt then sign -- Elliptic Curve Digital signature algorithm (ECDSA) -- How to generate a digital signature -- ECDSA using OpenSSL -- Homomorphic encryption -- Signcryption -- Zero knowledge proofs -- Blind signatures -- Encoding schemes -- Financial markets and trading -- Trading -- Exchanges -- Orders and order properties -- Order management and routing systems -- Components of a trade -- General attributes -- Economic -- Sales -- Counterparty -- Trade life cycle -- Order anticipators -- Market manipulation -- Summary -- Chapter 4: Bitcoin -- Bitcoin -- Bitcoin definition -- Keys and addresses -- Public keys in bitcoin -- Private keys in bitcoin -- Bitcoin currency units -- Base58Check encoding -- Vanity addresses -- Transactions -- The transaction life cycle -- The transaction structure -- The script language -- Commonly used Opcodes -- Types of transaction -- Coinbase transactions -- What is UTXO? …”
Libro electrónico -
23212por Silveira, LuísTabla de Contenidos: “…Ásia Prózima e Ásia Extrema. - 4. v. Brasil e notas adicionals…”
Publicado 1955
Libro -
23213Publicado 2018Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
23214por Aguiar, Ygor Quadros de. author, Wrobel, Frédéric. author, Autran, Jean-Luc. author, García Alía, Rubén. authorTabla de Contenidos: “…Radiation environments and their effects on electronics -- Introduction to Single-Event Effects -- Single-event effects prediction methodologies -- Radiation Hardness Assurance (RHA) methodologies -- Radiation hardening techniques -- Analysis of RHBD techniques at layout level -- Analysis of RHBD techniques at circuit level -- Hardness improvement based on signal probability -- Conclusions/Future Perspectives…”
Publicado 2025
Libro electrónico -
23215Publicado 2015“…Cuando la embajada de los Estados Unidos en Teherán es ocupada por seguidores del Ayatolá Jomeini para pedir la extradición del Sha de Persia, la CIA y el gobierno canadiense organizaron una operación para rescatar a seis diplomáticos estadounidenses que se habían refugiado en la casa del embajador de Canadá…”
Disco de vídeo -
23216
-
23217Publicado 1900Manuscrito
-
23218
-
23219
-
23220