Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Teatro español 2,723
- Historia 2,279
- Història 930
- History 796
- Biblia 595
- Comedia española 595
- Filosofía 570
- Management 569
- Development 507
- Engineering & Applied Sciences 490
- Economic conditions 474
- Crítica e interpretación 458
- Congressos 442
- Óperas 442
- Politics and government 395
- Application software 390
- Computer networks 365
- Iglesia Católica 360
- Economic policy 331
- Business & Economics 328
- Computer Science 316
- Education 310
- Derecho 300
- Security measures 295
- Economics 290
- Research & information: general 290
- Zarzuelas 283
- Research 282
- Zarzuela española 282
- Technology: general issues 274
-
68781Publicado 1990“…El tema central de este libro es el análisis de las correspondencias que existen entre la concepción de los actos rituales, la imagen del cuerpo y la visión del mundo de los otomíes que habitan en el sur de la Huasteca. …”
Libro electrónico -
68782por Agostini, Marielle“….), sociétal (le retour des marcheurs/ou autres modes de parcours de mobilité douce ; l’activation des circuits d’un nouvel imaginaire appuyé sur les traditions et les vecteurs de l’idéel...). …”
Publicado 2019
Electrónico -
68783Publicado 2019“…On the one hand, growing numbers of young people show a deep and pervasive desire for a more active role in their Islamic faith. On the other, even as they seek a more self-conscious and scripture-based profession of faith, many educated youth aspire to personal relationships similar to those seen among youth elsewhere—a greater measure of informality, openness, and intimacy than was typical for their parents’ and grandparents’ generations. …”
Libro electrónico -
68784por Steinberg, Shirley R.“…Almost a decade in, Empire remains the 21st Century’s dominant mode of cultural production, and North America remains at the apex of the colonial imperative. …”
Publicado 2009
Libro electrónico -
68785por Webster-Wright, Ann“…It focuses on what practitioners can do to act together for themselves. It applies the notion of being professional to the core of practice: learning from what one does.’ …”
Publicado 2010
Libro electrónico -
68786Publicado 2016“…It is currently assumed that such improvements are due to neural activation associated with action simulation. However the neuroscience of mental practice efficacy is still poorly understood. …”
Libro electrónico -
68787Publicado 2016“…Furthermore, the important issue of transnational joint performance of exercising state authority as well as aspects of cross-border economic activities of local authorities are discussed Grenzüberschreitende Zusammenarbeit auf kommunaler Ebene ist bereits seit Langem gelebte Praxis. …”
Libro electrónico -
68788Publicado 2019“…The energetic propaganda activity carried out in the first two decades by the Diário de Notícias special delegate, António Ferro, allowed the Portuguese people, and hopefully the world, to idealise about the fairy tale homeland that was believed to be under (re)construction. …”
Libro electrónico -
68789por Santana, Pedro“…La Coordinación operativa del grupo, lo mismo que las actas y relatorías de todas las sesiones que realizamos desde septiembre de 1987 y hasta agosto de 1988, estuvo a cargo de Clara Rocío Rodríguez, asistente de investigación en el convenio FORO-IFEA. …”
Publicado 2015
Electrónico -
68790
-
68791por Chivallon, Christine“…Il s’agit de renverser la perspective sur cette population rurale et de ne plus la considérer comme restée sous la domination de la grande plantation héritée de la période esclavagiste et subissant son histoire, mais comme pleinement active dans la prise en charge de ses orientations collectives. …”
Publicado 2022
Electrónico -
68792por Calame, Claude“…This dossier of Mètis explores the paradoxical aspect of these ancient conceptions that link the body’s health to literary activities and presuppose a physiology of reading and writing. …”
Publicado 2017
Electrónico -
68793Publicado 2022“…By the end of the course, you will gain the requisite knowledge and confidence to pass the SC-200: Microsoft Security Operations Analyst Exam. …”
Video -
68794Publicado 2016“…Security professionals can often be ignorant of the impact that implementing security policies in a vacuum can have on the end users’ core business activities. These end users are, in turn, often unaware of the risk they are exposing the organization to. …”
Libro electrónico -
68795Publicado 2018“…This book provides comprehensive guidance for work at the enterprise Portfolio, Large Solution, Program, and Team levels, including the various roles, activities, and artifacts that constitute the Framework. …”
Libro electrónico -
68796Publicado 2018Tabla de Contenidos: “…Update .NET Core CLI -- Changes in ASP.NET Core Identity -- Exploring .NET Core CLI and New Project Templates -- Understanding .NET Standard -- Versioning of .NET Standard -- New improvements in .NET Standard 2.0 -- More APIs in .NET Standard 2.0 -- Compatibility mode -- Creating a .NET Standard library -- What comes with ASP.NET Core 2.0 -- ASP.NET Core Razor Pages -- Automatic Page and View compilation on publishing -- Razor support for C# 7.1 -- Simplified configuration for Application Insights -- Pooling connections in Entity Framework Core 2.0 -- New features in C# 7.0 -- Tuples -- Patterns -- Constant pattern -- Type pattern -- Var pattern -- Reference returns -- Expression bodied member extended -- Creating Local Functions -- Out variables -- Async Main -- Writing quality code -- Summary -- Understanding .NET Core Internals and Measuring Performance -- .NET Core internals -- CoreFX -- CoreCLR -- Understanding MSIL, CLI, CTS, and CLS -- How the CLR works -- From compilation to execution - Under the hood -- Garbage collection -- Generations in GC -- .NET Native and JIT compilation -- Utilizing multiple cores of the CPU for high performance -- How releasing builds increases performance -- Benchmarking .NET Core 2.0 applications -- Exploring BenchmarkDotNet -- How it works -- Setting parameters -- Memory diagnostics using BenchmarkDotnet -- Adding configurations -- Summary…”
Libro electrónico -
68797Publicado 2019“…This provides some freedom to operate in the environment. However, if this activity is performed without correct planning and the correct architecture choice, it leads to server sprawl where your environment houses more servers than it should based on its current and predicted requirements. …”
Libro electrónico -
68798Publicado 2018“…Discover modern, next-generation sequencing libraries from Python ecosystem to analyze large amounts of biological data Key Features Perform complex bioinformatics analysis using the most important Python libraries and applications Implement next-generation sequencing, metagenomics, automating analysis, population genetics, and more Explore various statistical and machine learning techniques for bioinformatics data analysis Book Description Bioinformatics is an active research field that uses a range of simple-to-advanced computations to extract valuable information from biological data. …”
Libro electrónico -
68799Publicado 2018“…Enhance your Kotlin programming skills by building 3 real-world applications About This Book Build three full-fledged, engaging applications from scratch and learn to deploy them Enhance your app development and programming activities with Kotlin's powerful and intuitive tools and utilities. …”
Libro electrónico -
68800Publicado 2018“…Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer Understand the realities of cybercrime and today’s attacks Build a digital forensics lab to test tools and methods, and gain expertise Take the right actions as soon as you discover a breach Determine the full scope of an investigation and the role you’ll play Properly collect, document, and preserve evidence and data Collect and analyze data from PCs, Macs, IoT devices, and other endpoints Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence Analyze iOS and Android devices, and understand encryption-related obstacles to investigation Investigate and trace email, and identify fraud or abuse Use social media to investigate individuals or online identities Gather, extract, and analyze breach data with Cisco tools and techniques Walk through common breaches and responses from start to finish Choose the right tool for each task, and explore alternatives that might also be helpful The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. …”
Libro electrónico