Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4021por Higgins, JonathanTabla de Contenidos: “….; Chapter 2 From launch to transmission: satellite communication theory and SNG; Chapter 3 Boxes or wheels: types of systems; Chapter 4 Squeezing through the pipe: digital compression; Chapter 5 Twenty-first century transport: SNG over IP; Chapter 6 Have phone, will travel: Inmarsat services; Chapter 7 Across the spectrum: regulation and standards; Chapter 8 Fitting the pieces together: satellites, systems and operations; Chapter 9 Get there, be safe: safety and logistics…”
Publicado 2007
Libro electrónico -
4022Publicado 2014Tabla de Contenidos: “…; Australia; Pakistan; America; Chinese Soft Power; Chapter 9: China's Educational Sector: Preventing China From Cementing Its Superpower Status; Chapter 10: What the End of Cheap China Means for the Rest of the World; China: The World's New Hegemonic Power?…”
Libro electrónico -
4023Publicado 2013Tabla de Contenidos: “…; Legislation; Education and Training; Practice; Independent Practitioners?; Are Midwives Safe?; Chapter 4. Childbirth Today; Birth in Context; Birth Scenes; Birth as Liberation; Chapter 5. …”
Libro electrónico -
4024Publicado 2003Tabla de Contenidos: “…Assuring Safety in Long-Term Care: The Albatross of Historical Experience; Chapter 2. At Least Mom Will Be Safe There: The Role of Resident Safety in Nursing Home Quality; Chapter 3. …”
Libro electrónico -
4025por Adler-Tapia, RobbieTabla de Contenidos: “…THE FUTURE OF EMDR WITH CHILDRENAppendix I : Consent/Assent for Treatment Form; Appendix II: EMDR Client History/Treatment Planning Form; Appendix III: Child/Adolescent Symptom Monitoring Form; Appendix IV: Safe/Calm Place Protocol for Children Worksheet; Appendix V: Mapping Targets for EMDR Processing; Appendix VI: Graphing EMDR Targets or Symptoms; Appendix VII: Recent Event Protocol for Children; Appendix VIII: Scripts for Assessment, Desensitization, Installation, Body Scan, Closure, and Reevaluation; Appendix IX: Kids' List of Cognitions; Appendix X: EMDR Fidelity Questionnaire…”
Publicado 2008
Libro electrónico -
4026Al-Iʻrāb al-mufaṣṣal li-Kitāb Allāh al-murattalالإعراب المفصل لكتاب الله المرتل /por Ṣāliḥ, Bahjat ʻAbd al-WaḥīdTabla de Contenidos: “…Min sūrat al-Jāthiyah ilá nihāyat sūrat al-Ṣaff -- al-mujallad 12. Min sūrat al-Jumʻah ilá nihāyat sūrat al-Nās…”
Publicado 1998
Libro -
4027Publicado 1995Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
4028Publicado 2022Libro
-
4029
-
4030Publicado 2014Tabla de Contenidos: “…""Chapter 6: Build a Firm Foundation: Managing Project Knowledge Efficiently and Effectively""""Chapter 7: Find the Real Need: Understanding the Task ""; ""Chapter 8: Scout the Lay of the Land: Understanding the Broader Context of a Design Project ""; ""Chapter 9: Make It Safe and Legal: Meeting Broader Community Expectations ""; ""Chapter 10: Draw on Existing Knowledge: Taking Advantage of Prior Art ""; ""Chapter 11: Make Dependable Decisions: Using Information Wisely""; ""Chapter 12: Make It Real: Finding the Most Suitable Materials and Components""…”
Libro electrónico -
4031Publicado 2018Tabla de Contenidos: “…-- Enhancing safety performance: non-technical skills and a modicum of chronic unease, by Rhona Flin -- Situated practice and safety as objects of management, by Petter Almklov -- Stories and standards: the impact of professional social practices on safety decision making, by Jan Hayes -- Doing what is right or doing what is safe, by Linda Bellamy -- Industrial perspective on the seminar: the viewpoint of a mining expert, by Jonathan Molyneux -- Dealing with the inherent contradictions of Professional development. …”
Libro electrónico -
4032Publicado 2016Tabla de Contenidos: “…Oxy. 1231, fr. 16) / Loving, but not Loved: The New Kypris Song in the Context of Sappho’s Poetry / Reimagining the Fragments of Sappho through Translation / Notes on the First Stanza of Fragment 17 / Sappho Fragment 17: Wishing Charaxos a Safe Trip? / A Poetics of Sisterly Affect in the Brothers Song and in Other Songs of Sappho / Bibliography / Indexes…”
Libro electrónico -
4033por Glasner, PeterTabla de Contenidos: “…The UK stem cell bank: Creating safe stem cell lines and public support?; 4. Public biotechnology inquiries: From rationality to reflexivity; 5. …”
Publicado 2006
Libro electrónico -
4034Publicado 2019Tabla de Contenidos: “…-Agile Transformation: A Summary and Research Agenda -- 2nd International Workshop on Autonomous Teams -- Trends and updated Research Agenda for Autonomous agile teams: A Summary of the 2nd International Workshop at XP2019 -- Spotify Tailoring for Promoting Effectiveness in Cross-Functional Autonomous Squads -- Voices From the Teams - Impacts on Autonomy in Large-Scale Agile Software Development Settings -- Exploring the challenges of integrating data science roles in agile autonomous teams -- The Influence of Culture and Structure on Autonomous Teams in Established Companies -- Agile autonomous teams in complex organizations -- Earn Your Wings: A Novel Approach to Deployment Governance -- 7th International Workshop on Large-Scale Agile -- Future Trends in Agile at Scale: A Summary of the 7th International Workshop on Large-Scale Agile Development -- SAFe Adoptions in Finland: A Survey Research -- Comparing Scaling Agile Frameworks Based on Underlying Practices -- Finnish Large-Scale Agile Transformations: A Survey Study -- Changes Over Time in a Planned Inter-Team Coordination Routine -- Technical-, Social- and Process Debt in Large-Scale Agile: an exploratory case-study -- Doctoral Symposium -- Coordination in Large-Scale Agile Software Development -- Panels -- Security and Privacy -- Agile Manifesto – Impacts on Culture, Education, and Software Practices -- Business Agility -- Agile: The Next 20 Years…”
Libro electrónico -
4035Publicado 2014Tabla de Contenidos: “…Mayes -- Collateral and monetary policy / Manmohan Singh -- The ecb and the political economy of collateral / Daniela Gabor -- The backstory of the risk-free asset : how government debt became "safe" / Nina Boy -- Central banking post-crisis : what compass for uncharted waters? …”
Libro electrónico -
4036Publicado 2006Tabla de Contenidos: “…Acknowledgments -- Katy GRAY BROWN: Introduction: Beyond Safe Ground -- Part One: Spiritual Dimensions -- Jerald RICHARDS: Spirituality, Religion, Violence, and Nonviolence -- Joseph KUNKEL: The Spiritual Side of Peacemaking -- William C. …”
Libro electrónico -
4037
-
4038por Institute, Project ManagementTabla de Contenidos: “…Title Page; Copyright Page; Table of Contents; Foreword; Part 1: Leadership; Learning the Hard Way; The Four P's; Go Team; Alter the Ego; Talking Points; Huddle Up; Ominous Silence; Manners Matter; The New Sponsor; Lessons Learned; Intangible Assets; A Safe Distance; Fake it Till you Make It; The Message is Clear; Steady the Course; A Wide World; Building a Dream Team; Breaking into Video Games; Agile Must-Haves; Three Questions; Game On; Meeting with a Mission; Make Time for Ethics; Why Project Ethics Matter; Part 2: Technical Project Management; Myth Busters; No Time to Delay…”
Publicado 2016
Libro electrónico -
4039por Ada-Europe International Conference on Reliable Software TechnologiesTabla de Contenidos: “…Real-Time Systems -- Hierarchical Scheduling with Ada 2005 -- A Comparison of Ada and Real-Time JavaTM for Safety-Critical Applications -- POSIX Trace Based Behavioural Reflection -- Static Analysis -- Static Detection of Access Anomalies in Ada95 -- One Million (LOC) and Counting: Static Analysis for Errors and Vulnerabilities in the Linux Kernel Source Code -- Bauhaus – A Tool Suite for Program Analysis and Reverse Engineering -- Verification -- SPARK Annotations Within Executable UML -- Runtime Verification of Java Programs for Scenario-Based Specifications -- Applications -- Secure Execution of Computations in Untrusted Hosts -- A Systematic Approach to Developing Safe Tele-operated Robots -- Towards Developing Multi-agent Systems in Ada -- Reliability -- A Software Reliability Model Based on a Geometric Sequence of Failure Rates -- Adaptive Random Testing Through Iterative Partitioning -- Run-Time Detection of Tasking Deadlocks in Real-Time Systems with the Ada 95 Annex of Real-Time Systems -- Compilers -- Abstract Interface Types in GNAT: Conversions, Discriminants, and C++ -- Using Mathematics to Improve Ada Compiled Code -- Distributed Systems -- Replication-Aware Transactions: How to Roll a Transaction over Failures -- The Arbitrated Real-Time Protocol (AR-TP): A Ravenscar Compliant Communication Protocol for High-Integrity Distributed Systems -- Interchangeable Scheduling Policies in Real-Time Middleware for Distribution…”
Publicado 2006
Libro electrónico -
4040por ECOOP (Conference)Tabla de Contenidos: “…Keynote 1 -- Code Roots -- Programming Environments and Tools -- Detecting Missing Method Calls in Object-Oriented Software -- Debugging Model-Transformation Failures Using Dynamic Tainting -- Automatically Extracting Class Diagrams from Spreadsheets -- Theoretical Foundations of Programming Languages -- Adding Dynamic Types to C -- Essential AOP: The A Calculus -- The Essence of JavaScript -- Formal Methods -- Verifying Executable Object-Oriented Specifications with Separation Logic -- Verifying Generics and Delegates -- Recency Types for Analyzing Scripting Languages -- Concurrency Models in Java -- Correct Refactoring of Concurrent Java Code -- Programming Coordinated Behavior in Java -- JCoBox: Generalizing Active Objects to Concurrent Components -- Special Session: Empirical Methods -- Doubts about the Positive Impact of Static Type Systems on Programming Tasks in Single Developer Projects - An Empirical Study -- Type Systems -- A Type System for Data-Centric Synchronization -- Type-Safe Eventful Sessions in Java -- Capabilities for Uniqueness and Borrowing -- Keynote 2 -- Secret Valley -- Language Design and Implementation -- Embedding Languages without Breaking Tools -- Modules as Objects in Newspeak -- Inline Caching Meets Quickening -- Concurrency Abstractions -- Self-Replicating Objects for Multicore Platforms -- Reasoning about the Implementation of Concurrency Abstractions on x86-TSO -- Concurrent Abstract Predicates -- Experiences -- The Use of Overloading in Java Programs -- Falling Back on Executable Specifications -- Contract-Based Data Structure Repair Using Alloy…”
Publicado 2010
Libro electrónico