Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Teresa de Jesús 1,839
- Historia 1,177
- Semana Santa 1,090
- Història 942
- María 937
- Teresa del Niño Jesús 615
- Goigs 613
- Mara 602
- Biografia 555
- Biografías 553
- Culto 508
- Liturgia 426
- Biografa 405
- Setmana Santa 370
- Clara de Asís 364
- Crítica e interpretación 361
- Meditaciones 336
- Església Catòlica 335
- Sants 324
- Espiritualidad 312
- Semana Santa- 311
- Safety measures 296
- Litúrgia 293
- Edith Stein 281
- Santos 279
- Misticismo 275
- Teología 273
- Teresa de Jesús, Santa 267
- Santes 257
- Teresa 203
-
37821Publicado 2022“…These multiple simulation environments will also allow you to further build public trust in the safety of artificial intelligence within drones and small UAS. …”
Libro electrónico -
37822por Li, Wei. author, Yuan, Xin'an. author, Zhao, Jianming. author, Yin, Xiaokang. author, Li, Xiao. author“…Nondestructive testing (NDT) emerges as a pivotal method for detecting and assessing defects, offering support for safety pre-warning and maintenance decisions in industrial structures. …”
Publicado 2025
Libro electrónico -
37823por Fosalba, Eugenia“…La combinación de ambas facetas ilumina los rincones oscuros de la razón de ser de buena parte de sus composiciones…”
Publicado 2024
Libro electrónico -
37824por Soper, Mark Edward“…View, organize, fix, and share photos with Live Photo Gallery Share your life with Live Messenger and Live Spaces social networking Take total control over email with Hotmail and Live Mail Get organized with Live Mail Calendar Back up and share files online with Skydrive Create great movies with Movie Maker Protect yourself and your kids online with Windows Live Toolbar and Family Safety Stay connected from smartphones with Windows Live’s new sync tools Use free Windows Live services even if you’re not running Windows Learn Fast, Learn Easy! …”
Publicado 2010
Libro electrónico -
37825por Baichtal, John“…First, he guides you gently up the learning curve, teaching you all you need to know about Arduino boards, basic electronics, safety, tools, soldering, and a whole lot more. Then, you walk step-by-step through projects that reveal Arduino’s incredible potential for sensing and controlling the environment–projects that inspire you to create, invent, and build the future! …”
Publicado 2013
Libro electrónico -
37826Publicado 2022Tabla de Contenidos: “…Summary -- Build your resilience -- Step 3 Sharpen your focus -- Self-talk: you are what you think -- 'The little voice' -- Technical, tactical and emotional self-talk -- Positive, negative or neutral and curious self-talk -- Mantras -- Internal or external focus -- Narrow or broad: switching focus -- Getting in the zone or flow -- Self-regulation -- Distractions -- Secondary errors -- Being in the present -- Attention to detail -- Focus on what you can control -- Visual and physical cues -- Body language -- Use of time -- Chunking and race plans -- The Tan -- Adopting and adapting a plan -- Routines and clarity -- Summary -- Build your focus -- Step 4 Champion your leadership -- Diamonds: leadership by example -- Influence -- The what and the how of leadership -- Leading self -- Leading culture -- Leading others -- Leading situations -- Leading structure and systems -- Leadership growth -- Formal and informal leadership -- Leadership density -- Leadership groups -- Captain class -- Leadership qualities -- Contributor -- Sport integrity -- Team and others focus -- Communication -- Determination -- Composure -- Positive performer -- Self-belief -- Summary -- Build your leadership -- Step 5 Foster your culture -- Culture in practice -- Thinking, decisions and behaviour -- High-performance environments -- Individual athlete and coach influence on culture -- Cultural consistency -- Psychological safety -- Learn and grow -- Emotional intelligence -- Relationships and communication -- Mastery climate -- The New Zealand All Blacks -- Building culture -- Terminology and engagement -- Clear values and behaviours described -- Support people and performance -- Leaders live, model and drive culture -- Coaching, celebrating and accountability -- Display and share -- Integrate into processes -- Monitoring and evolving culture with data and measurement…”
Libro electrónico -
37827por Huawei Technologies Co., Ltd. authorTabla de Contenidos: “…Chapter 1. General Operation Safety of Network System -- Chapter 2. Cabling Engineering -- Chapter 3. …”
Publicado 2023
Libro electrónico -
37828Publicado 2021“…One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). …”
Libro -
37829Publicado 1997“…Topics include: User safety--browser vulnerabilities (with an emphasis on Netscape Navigator and Microsoft Internet Explorer), privacy concerns, issues with Java, JavaScript, ActiveX, and plug-ins. …”
Libro electrónico -
37830Publicado 2004“…Coverage includes: Introductory material for developers getting started with Swing, including sections on basic components such as text fields, labels, and buttons, as well as on using images The latest advice from the Swing team about thread safety Advanced Swing material, including changing key bindings, manipulating the focus, using data models, and adding painting code that uses the powerful Java 2DTM API How-to discussions on using individual components and containers, including advanced components such as tables, trees, and text editors Over 150 complete, working code examples For the novice or experienced Java developer looking to create robust, powerful, and visually stunning GUIs, The JFC Swing Tutorial, Second Edition, is an indispensable tutorial and reference…”
Libro electrónico -
37831Publicado 2008“…RYAN O’DONNELL, Cofounder and CEO, BullEx Digital Safety Your own business: Take the leap, make it happen, and make it succeed! …”
Libro electrónico -
37832Publicado 2017“…El lector podrá encontrar información esencial del estado de la cuestión de la educación multidisciplinar contemporánea ilustrado desde diferentes facetas de la educación para la igualdad de género: sociales, lingüísticas, literarias, artístico-ambientales, tecnológicas y científicas…”
Libro electrónico -
37833Publicado 2021“…Processing and storage can cause changes and interactions in food components that have effects on nutritional value, organoleptic characteristics or even food safety. This book includes 19 research works showing important and interesting advances, as well as new approaches, in this research topic. …”
Libro electrónico -
37834Publicado 2010“…Covers all exam objectives, including how to: Work with CPUs, RAM, motherboards, power supplies, and other PC components Install, partition, and format hard drives Install, upgrade, and troubleshoot WIndows 2000, Windows XP, and Windows Vista Troubleshoot PCs and implement security measures Install video and multimedia cards Work with portable PCs, PDAs, smartphones, and wireless technologies Manage printers and connect to networks and the Internet Understand safety and environmental issues Establish good communication skills and adhere to privacy policies The CD-ROM features: Practice exams for 701 & 702 600+ chapter review questions New video introduction to CompTIA A+ One-hour video training segment Mike's favorite PC tools and utilities Searchable e-book Mike Meyers , CompTIA A+, CompTIA Network+, MCP, is the industry's leading authority on CompTIA A+ certification and training. …”
Libro electrónico -
37835por McNavage, Terry“…Then in the last two chapters, you'll leave the safety of Firebug and hand-code an uber cool JavaScript application in your preferred text editor. …”
Publicado 2010
Libro electrónico -
37836Publicado 2011“…Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authentication technologies See how real-world session attacks leak sensitive data and how to fortify your applications Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments Safety deploy XML, social networking, cloud computing, and Web 2.0 services Defend against RIA, Ajax, UGC, and browser-based, client-side exploits Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures…”
Libro electrónico -
37837Publicado 2018Tabla de Contenidos: “…11 The Realization of Nanotechnology -- 11.1 Nanospeci cation -- 11.2 Standardization of Nanotechnology -- 11.3 Nanometrology -- 11.4 The Nanometrology Instrument Industry -- References -- Further Reading -- 12 The Business Environment -- 12.1 The Universality of Nanotechnology -- 12.2 The Radical Nature of Nanotechnology -- 12.3 Intellectual Needs -- 12.4 Company-University Collaboration -- 12.5 Clusters -- 12.6 Assessing Demand for Nanotechnology -- 12.6.1 Modeling -- 12.6.2 Judging Innovation Value -- 12.6.3 Anticipating Bene t -- 12.7 Technical and Commercial Readiness (Availability) Levels -- 12.8 Predicting Development Timescales -- 12.9 Patents -- 12.10 Generic Business Models -- 12.11 Why Nanotechnology Companies Often Fail -- References -- Further Reading -- 13 The Fiscal Environment of Nanotechnology -- 13.1 Sources of Funds -- 13.2 Private Investment -- 13.3 Government Funding -- 13.4 Endogenous Funding -- 13.5 Geographical Differences Between Nanotechnology Funding -- References -- Further Reading -- 14 The Safety of Nanofacture and Nanomaterials -- 14.1 Public Perception of the Safety of Nanoproducts -- 14.2 Evaluating Risk -- 14.3 Evaluating the Toxicity of Nanomaterials -- 14.4 Characteristic Features of Nano-Objects -- 14.5 Exposure -- 14.5.1 Occupational Exposure (During Nanofacture) -- 14.5.2 Public Exposure (During Use) -- 14.6 Penetrability and clearance -- 14.7 Hazard -- 14.8 Variability of Individual Response -- 14.9 Risks to Vital Ecosystems -- 14.10 "Natural" Exposure to Nanoparticles -- 14.11 A Rational Basis for Safety Measures -- 14.12 Bow Tie Diagrams -- References -- Further Reading -- 15 Regulation -- References -- Further Reading -- 16 Some Successful and Unsuccessful Nanotechnology Companies -- 16.1 NanoMagnetics -- 16.2 MesoPhotonics -- 16.3 Enact Pharma -- 16.4 Oxonica -- 16.5 NanoCo -- 16.6 Hyperion -- 16.7 CDT…”
Libro electrónico -
37838Publicado 2021“…The authors of The Phoenix Encounter Method don’t advise safety. In fact, their method of leadership thinking requires you to imagine burning your business to the ground—throwing yourself into a firestorm change—and turning the upheaval to your organization’s advantage. …”
Libro electrónico -
37839Publicado 2013“…And Arc Attack member Craig Newswanger shows us how to build the awesome Six-Pack Tesla Coil, made with a beer-bottle capacitor, that’ll throw 15” electrical arcs. Other fun, and 100% safety-approved projects include: How to make a phonograph out of Lego bricks A light-up hoodie from Electroluminescent (EL) wire An impressive "high-gain" home media projection screen using little more than latex house paint and sandblasting glass All this, along with the latest developments in maker tech--hardware, software and tools for 3D printing, Arduino, Raspberry Pi, robotics--and much, much more…”
Libro electrónico -
37840Publicado 2018Tabla de Contenidos: “…; Case study: hindsight and shooting down an airliner; Safety reporting and honest disclosure; Case study: a nurse's error became a crime; The criminalization of human error; Case study: industry responses to criminalization; What is the right thing to do?…”
Libro electrónico