Mostrando 24,821 - 24,840 Resultados de 26,976 Para Buscar 'RSHA~', tiempo de consulta: 0.88s Limitar resultados
  1. 24821
  2. 24822
    por Carrion, Ambrosi, 1888-1973
    Publicado 1916
    Accés lliure a la descripció del fons
    Manuscrito
  3. 24823
    por Sylveira, Joao da, 1592-1687
    Publicado 1681
    991005586559706719
  4. 24824
    Publicado 1986
    Tabla de Contenidos: “…Formal proof of verification conditionseparator#3; Discussion; Chapter 6: PROOF CHECKING THE RSA PUBLIC KEY ENCRYPTION ALGORITHM; Publisher Summary; 1 Introduction; 2 A Sketch of the Theorem-Prover; 3 Correctness of CRYPT; 4 Fermat's Theorem; 5 Invertibility of CRYPT; 6 Sample Input to the Theorem-Prover; 7 Conclusion; III: Transformational Approaches; Chapter 7: Introduction to Transformational Approaches; Chapter 8: An Experimental Program Transformation and Synthesis System…”
    Libro electrónico
  5. 24825
    Publicado 2023
    “…"Pensar que podem assolir la igualtat entre gèneres fent servir el que s'ha anomenat "llenguatge inclusiu" és una idea polèmica. …”
    Libro
  6. 24826
    por Devine, Tom
    Publicado 2011
    Tabla de Contenidos: “…Professional AssociationsConsiderations before Working with Advocacy Partners; Questions to Ask before Taking on an Advocacy Partner; Whistleblowing on the Web; WikiLeaks and Similar Sites; Whistleblowers and Their Lawyers; Considerations before Selecting a Lawyer; Pointers for Choosing a Lawyer; Pointers for Working with Your Lawyer; Terminating the Attorney-Client Relationship; CHAPTER 6 Whistleblowing and the Law; SOX and Federal Whistleblower Statutes: A Mirage of Protection; Your Rights on Paper; SOX on Paper; Your Rights in Reality; What Went Wrong: OSHA; What Went Wrong: ARB…”
    Libro electrónico
  7. 24827
    Publicado 2014
    Tabla de Contenidos: “…2.4 Balancing Security Measures with Business Operations2.5 Summary; 2.6 Safety and Security Principles Checklist; References; 3 - Security Plan Development and Risk Assessment; 3.1 Safety and Security Plans and Procedures; 3.2 Risk Assessment; 3.3 Quantifying Safety and Security Initiatives; 3.4 Summary of Security Plan Development and Risk Assessment; 3.5 Security Plan Development and Risk Assessment Checklist; References; 4 - Safety and Security Program Administration; 4.1 OSHA Employer Safety Requirements; 4.2 Considerations and Staffing for Security Guard Forces…”
    Libro electrónico
  8. 24828
    por Maddison, Angus
    Publicado 2007
    Tabla de Contenidos: “…69 -- The driving forces that explain the acceleration in western growth since 1820 73 -- Changes in the structure of demand and employment 74 -- The european transformation of the Americas, 1500--1820 88 -- Endnotes 105 -- References 108 -- 3The interaction between Asia and the West, 1500--2003 111 -- European--Asian interaction from 1500 to 1820 112 -- The impact of Asian trade on Europe, 1500--1820 115 -- The impact of Europe on Asia, 1500--1820 116 -- Endnotes 178 -- References 179 -- 4The impact of Islam and Europe on African development: 1--2003AD 183 -- Introduction 183 -- The European impact on North Africa before the seventh century 185 -- The Islamic conquest and its implications 188 -- Egypt as Islamic state 192 -- The Maghreb and the initiation of Trans-Saharan trade in gold and slaves 206 -- The changing character of Moroccan dynasties and their interaction with Europe and Black Africa 209 -- Black Africa and the impact of Islam 214 -- The European encounter with Africa 217 -- Africa from 1820 to 1960 227 -- Post-colonial Africa, 1960 onwards 231 -- Appendix 237 -- Endnotes 239 -- References 240 -- Advances in macro-measurement since 1665 -- 5political arithmeticians and historical demographers: the pioneers of macro-measurement 249 -- William Petty (1623--87) 250 -- John Graunt: the first demographer (1620--74) 256 -- Gregory King (1648--1712) and Charles Davenant (1656--1714) 258 -- Patrick Colquhoun (1745--1820) 282 -- French political arithmetic, 1695--1707 284 -- Macro-measurement in the nineteenth and first half of the twentieth century 287 -- Bibliography 288 -- 6Modern macro-measurement: how far have we come? …”
    Enlace del recurso
    Libro electrónico
  9. 24829
    por Riba Romeva, Carles
    Publicado 2015
    Tabla de Contenidos: “…África; África; Argelia; Congo (Kinshasa); Egipto; Etiopía; Nigeria; Sudáfrica; An2.7. Asia y Oceanía; Asia y Oceanía; Australia; Bangladesh; China; Corea del Sur; Filipinas; India; Indonesia; Japón; Malasia; Myanmar; Pakistán; Tailandia; Taiwán; Vietnam…”
    Libro electrónico
  10. 24830
    Tabla de Contenidos: “…CO2 emissions with electricity and heat allocated to consuming sectors in 2010Total primary energy supply; GDP using exchange rates; Population; CO2 emissions / TPES; CO2 emissions / GDP; CO2 emissions / population; Per capita emissions by sector in 2010; Per capita emissions with electricity and heat allocated to consuming sectors in 2010; Electricity output; CO2 emissions per kWh; GLOBAL AND REGIONAL TOTALS; World; OECD Total; OECD Americas; OECD Asia Oceania; OECD Europe; European Union - 27; Africa; Middle East; Non-OECD Europe and Eurasia; Non-OECD Americas; Asia (excluding China)…”
    Libro electrónico
  11. 24831
    Publicado 2013
    Tabla de Contenidos: “…Export capacity investment outlook; Summary; Investment in export mining capacity; Investment in export infrastructure capacity; Regional analysis; Australia; Colombia; South Africa; Mozambique; Russia; Indonesia; Canada; United States; References; Annex; Glossary; Regional and country groupings; Africa; China; Europe and Mediterranean; Latin America; Non-OECD Europe/Eurasia; North Africa; OECD; OECD Americas; OECD Asia Oceania; OECD Europe; Other developing Asia…”
    Libro electrónico
  12. 24832
    por Hein, Carola
    Publicado 2017
    Tabla de Contenidos: “…Kukina -- From urbanism to planning process : convergences of Latin American countries / Maria Cristina da Silva Leme, Vera Lucia Motta Rezende -- Southeast Asia : colonial discourses / Abidin Kusno -- Postcolonial Southeast Asia / Abidin Kusno -- Idioms of Japanese planning historiography / Carola Hein -- The uses of planning history in China / Daniel B. …”
    Libro electrónico
  13. 24833
    Publicado 2017
    Tabla de Contenidos: “…-Iran metaphorical wars / Esmaeel Efandiary -- Soft power mobilization in the middle east and africa (overview) / Aziz Douai -- When soft power success and "attractiveness" cannot be sustained : Zimbabwe and South Africa as case studies of the limits of soft power / Eric Louw -- Nigeria, public diplomacy and soft power / Tokunbo Ojo -- Public diplomacy and soft power in Algeria's foreign policy / Laeed Zaghlami -- Central and South Asia : an overview of soft power prospective / Dalbir Ahlawat -- Indigenizing soft power in Russia / Yelena Osipova -- Bollywood enabling India as a soft power : a critical overview of pros and cons of post-critical assumptions / CSHN Murthy -- Seduced by Bhutan's philosophy of happiness / Bunty Avieson & Kinley Tshering -- India and China : soft power in an Asian context / Kishan S Rana -- An overview of soft power in East and South East Asia / Damien Spry -- The pivot shift of Japan's public diplomacy / Yasushi Watanabe -- The Korean wave as soft power public diplomacy / Hun Shik Kim -- Vietnamese cultural diplomacy : an emerging strategy / Gary D. …”
    Libro
  14. 24834
    Publicado 2018
    Tabla de Contenidos: “…Kukina -- From urbanism to planning process : convergences of Latin American countries / Maria Cristina da Silva Leme, Vera Lucia Motta Rezende -- Southeast Asia : colonial discourses / Abidin Kusno -- Postcolonial Southeast Asia / Abidin Kusno -- Idioms of Japanese planning historiography / Carola Hein -- The uses of planning history in China / Daniel B. …”
    Libro
  15. 24835
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- How to Use This Book -- Chapter 1: Working with Data -- Conversion Between Data Types -- Safe Number Conversion -- Conversion from Number to String and Back -- Boolean Conversions -- String to Data and Back -- Dates, Timestamps, and ISO 8601 Format -- Extracting Data from Dictionaries and Arrays -- Complex Data Types -- Extracting Data from Dictionary -- Extracting Data from Array -- Summary -- Chapter 2: Working with JSON and Other Popular Formats -- How Devices Exchange Data -- What Are Serialization and Deserialization -- Working with JSON -- Parsing JSON to Dictionary or Array -- Generating JSON from Dictionary or Array -- Working with XML -- Parsing XML -- Generating XML -- Working with YAML -- URL-Encoded Strings -- Serialization and Deserialization -- Serializing an Object -- Deserializing an Object -- Coding Keys -- Using @propertyWrapper -- Unit Conversion -- Distance and Length Units -- Area Units -- Volume Units -- Weight Units -- Summary -- Chapter 3: Working with Strings -- Analyzing String Content -- First, Last, and Other Names -- Email Address -- Password -- Phone Number -- Gender -- Date of Birth -- Credit Card Information -- Base64 and Hex Encoding -- Base64 Encoding -- Hex Encoding -- MD5, SHA, and Other Hashes -- MD5 Hash -- SHA Hashes -- Hashable Protocol and Swift Hashes -- Salt -- Integer Indexing -- Localization -- NSLocalizedString Macro -- Files with Translations -- LocalizedStringKey Struct -- Syntactic Sugar -- Summary -- Chapter 4: UIKit and Storyboards -- Navigation Between App Screens -- Screens, Windows, and Views -- Navigation in iOS Apps -- Scenes -- Going Back -- Replacing Root View -- Modifying UINavigationController Stack -- Removing Elements from the Navigation Stack…”
    Libro electrónico
  16. 24836
    por Gurbanov, Yunis
    Publicado 2024
    Tabla de Contenidos: “…Geopolitics in the Caspian Region -- 3.1 China's policy in Central Asia -- 3.1.1 China's policy in the South Caucasus -- 3.2 EU's Central Asia policy -- 3.2.1 EU in the South Caucasus -- 3.3 US policy towards Central Asia -- 3.3.1 US policy in the South Caucasus…”
    Libro electrónico
  17. 24837
    por Perera Gómez, Eduardo
    Publicado 2020
    Tabla de Contenidos: “…LOS CASOS DE ALEMANIA Y HUNGRÍA -- ALEMANIA -- HUNGRÍA -- IMPACTO DE LA REVOLUCIÓN RUSA EN ASIA, ÁFRICA Y AMÉRICA -- EL MOVIMIENTO DE LIBERACIÓN NACIONAL EN CHINA (1918-1939) -- EL MOVIMIENTO DE LIBERACIÓN NACIONAL EN AMÉRICA LATINA Y EL CARIBE EN LA ETAPA -- EL ESTALINISMO: EL IDEARIO LENINISTA DESVIRTUADO -- BALANCE DEL ESTALINISMO EN SU PRIMERA ETAPA (1927-1939) -- RESUMEN DE LA UNIDAD -- ACTIVIDADES DE LA UNIDAD -- EJERCICIOS DE AUTOEVALUACIÓN DE LA UNIDAD -- BIBLIOGRAFÍA RECOMENDADA PARA LA UNIDAD -- UNIDAD III. …”
    Libro electrónico
  18. 24838
    por Foltz, Kevin
    Publicado 2020
    Tabla de Contenidos: “…3.3.4 Secure Data Acquisition -- 3.3.5 Integrity at the Source -- 3.4 Temporal Data -- 3.5 Credential Data -- 3.6 Distributed Stores -- 4 Access and Privilege -- 4.1 Access Control -- 4.2 Authorization and Access in General -- 4.3 Access Control List -- 4.3.1 Group Requirements -- 4.3.2 Role Requirements -- 4.3.3 ACRs and ACLs -- 4.3.4 Discretionary Access Control and Mandatory Access Control -- 4.4 Complex Access Control Schemas -- 4.5 Privilege -- 4.6 Concept of Least Privilege -- 4.6.1 Least Privilege Case Study -- 5 Cryptography -- 5.1 Introduction -- 5.2 Cryptographic Keys and Key Management -- 5.2.1 Asymmetric Key Pairs -- 5.2.1.1 RSA Key Generation -- 5.3 Symmetric Keys -- 5.3.1 TLS Mutual Authentication Key Production -- 5.3.2 Other Key Production -- 5.4 Store Keys -- 5.5 Delete Keys -- 5.6 Encryption -- 5.7 Symmetric versus Asymmetric Encryption Algorithms -- 5.7.1 Asymmetric Encryption -- 5.7.2 RSA Asymmetric Encryption -- 5.7.3 Combination of Symmetric and Asymmetric Encryption -- 5.7.4 Symmetric Encryption -- 5.7.4.1 Stream Ciphers -- 5.7.4.2 Block Ciphers -- 5.7.5 AES/Rijndael Encryption -- 5.7.5.1 Description of the AES Cipher -- 5.7.6 Data Encryption Standard -- 5.7.6.1 Triple DES -- 5.7.6.2 Description of the Triple DES Cipher -- 5.8 Decryption -- 5.8.1 Asymmetric Decryption -- 5.8.2 Symmetric Decryption -- 5.9 Hash Function -- 5.9.1 Hash Function Algorithms -- 5.9.2 Hashing with Cryptographic Hash Function -- 5.9.2.1 MD-5 -- 5.9.2.2 SHA-3-Defined SHA-512 -- 5.10 Signatures -- 5.10.1 XML Signature -- 5.10.2 S/MIME Signature -- 5.10.3 E-Content Signature -- 5.11 A Note on Cryptographic Key Lengths -- 5.11.1 Encryption Key Discovery -- 5.11.2 The High-Performance Dilemma -- 5.11.3 Parallel Decomposition of Key Discovery -- 5.12 Internet Protocol Security -- 5.13 Other Cryptographic Services -- 5.14 The Java Cryptography Extension…”
    Libro electrónico
  19. 24839
    Publicado 1979
    Tabla de Contenidos: “…Dossier 2 : La Iglesia frente al mundo romano ; Los cristianos y las religiones de Asia. Dossier 3 : Un siglo excepcional: Constantino ; La Iglesia y el Estado] -- Tomo III . …”
    Colección
  20. 24840
    Publicado 2013
    Tabla de Contenidos: “…Dymski -- The political economy of global imbalances and the global financial crisis / Kang-Kook Lee -- East Asia's integration and structural shift :the shift from newly industrializing economies to potentially bigger market economies under the global economy / Hitoshi Hirakawa -- Financialization, structural change, and employment in the U.S. and Japan / James Heintz -- Overconsumption, household debt, and dollar-privilege : the causes of the US subprime crisis / Aki Aneha…”
    Enlace del recurso
    Libro electrónico