Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4461Publicado 2017Tabla de Contenidos: “…Chapter 25 Maritime operations and emergency preparedness in the Arctic –competence standards for search and rescue operations contingencies in polar waters -- Chapter 26 Risk reduction as a result of implementation of the functional based IMO Polar Code in the Arctic cruise industry -- Chapter 27 Safety of industrial development and transportation routes in the Arctic (SITRA) -collaboration project for research and education of future High North experts -- Chapter 28 Safe Snow and Ice Construction to Arctic Conditions -- Chapter 29 The components of psychological safety of oil and gas shift workers in the Arctic -- Part VI Circumpolar, inclusive and reciprocal Arctic. …”
Libro electrónico -
4462por McGee, Glenn, 1967-Tabla de Contenidos: “…bio ethics for beginners: 60 CASES AND CAUTIONS FROM THE MORAL FRONTIER OF HEALTHCARE; Contents; Preface; Acknowledgements; Caution 1: Tip-Toe When Walking on the Bleeding Edge; Case 1 The Dangers of Creating Life in the Lab; Case 2 Design: More Intelligent Every Day; Case 3 "Shroom" Science: Safe and Effective?; Case 4 A Robot Code of Ethics; Case 5 No More Periods, Period; Case 6 Search Me, Shape Me, Any Way You Want Me; Case 7 A Bloody Mess; Case 8 Stem Cells: The Goo of Life and the Debate of the Century; Caution 2: Everybody Lies; Case 9 Lies, Damn Lies . . . and Scientific Misconduct…”
Publicado 2012
Libro electrónico -
4463por Bolton, W. 1933-Tabla de Contenidos: “…Program Development -- 13.2. Safe Systems -- 13.3. Commissioning -- 13.4. Fault Finding -- 13.5. …”
Publicado 2009
Libro electrónico -
4464Publicado 2021Tabla de Contenidos: “…-- Chapter 5: Inputs, Transition Criteria, Outputs -- Daily Standup Day 8: Did you say something? -- Chapter 6: Stakeholder Approval -- Daily Standup Day 9: Oops. …”
Libro electrónico -
4465por Naboulsi, ZainTabla de Contenidos: “…01.09Change Your Visual Studio Color SchemeSeeing What You Like; Getting the Goods; Changing Your Colors; Resetting the Colors; 01.10Reset All Your Development Settings; 01.11Customize Your Toolbars in Visual Studio 2010: Toolbars Tab; Custom Toolbars; 01.12Customize Your Toolbars in Visual Studio 2010: Commands Tab; Rearrange; Controls; Buttons; Modify Selection; 01.13Visual Studio Logging; 01.14Visual Studio Safe Mode; 01.15The ResetSettings Switch; Two Different Machines; Same Machine; Chapter 2. …”
Publicado 2011
Libro electrónico -
4466Publicado 2016Tabla de Contenidos: “…Introduction -- 1 Walmart: How Big Data Is Used To Drive Supermarket Performance -- 2 CERN: Unravelling the Secrets of the Universe with Big Data -- 3 Netflix: How Netflix Used Big Data to Give Us the Programmes We Want -- 4 Rolls-Royce: How Big Data Is Used To Drive Success In Manufacturing -- 5 Shell: How Big Oil Uses Big Data -- 6 Apixio: How Big Data Is Transforming Healthcare -- 7 Lotus F1 Team: How Big Data Is Essential To The Success Of Motorsport Teams -- 8 Pendleton & Son Butchers: Big Data for Small Business -- 9 US Olympic Women's Cycling Team: How Big Data Analytics Is Used To Optimize Athletes' Performance -- 10 ZSL: Big Data In The Zoo And To Protect Animals -- 11 Facebook: How Facebook Use Big Data to Understand Customers -- 12 John Deere: How Big Data Can Be Applied On Farms -- 13 Royal Bank of Scotland: Using Big Data to Make Customer Service More Personal -- 14 LinkedIn: How Big Data Is Used To Fuel Social Media Success -- 15 Microsoft: Bringing Big Data To The Masses -- 16 Acxiom: Fuelling Marketing With Big Data -- 17 US Immigration and Customs: How Big Data Is Used To Keep Passengers Safe and Prevent Terrorism -- 18 Nest: Bringing the Internet of Things into The Home -- 19 GE: How Big Data Is Fuelling the Industrial Internet -- 20 Etsy: How Big Data Is Used In A Crafty Way -- 21 Narrative Science: How Big Data Is Used To Tell Stories -- 22 BBC: How Big Data Is Used In The Media -- 23 Milton Keynes: How Big Data Is Used To Create Smarter Cities -- 24 Palantir: How Big Data Is Used To Help The CIA And To Detect Bombs In Afghanistan -- 25 Airbnb: How Big Data Is Used To Disrupt the Hospitality Industry -- 26 Sprint: Profiling Audiences Using Mobile Network Data -- 27 Dickey's Barbecue Pit: How Big Data Is Used to Gain Performance Insights Into One Of America's Most Successful Restaurant Chains -- 28 Caesars: Big Data At The Casino -- 29 Fitbit: Big Data In The Personal Fitness Arena -- 30 Ralph Lauren: Big Data In The Fashion Industry -- 31 Zynga: Big Data In The Gaming Industry -- 32 Autodesk: How Big Data Is Transforming The Software Industry -- 33 Walt Disney Parks and Resorts: How Big Data Is Transforming Our Family Holidays -- 34 Experian: Using Big Data To Make Lending Decisions And To Crack Down On Identity Fraud -- 35 Transport for London: How Big Data Is Used To Improve And Manage Public Transport In London -- 36 The US Government: Using Big Data To Run A Country -- 37 IBM Watson: Teaching Computers To Understand And Learn -- 38 Google: How Big Data Is At The Heart Of Google's Business Model -- 39 Terra Seismic: Using Big Data To Predict Earthquakes -- 40 Apple: How Big Data Is At The Centre Of Their Business -- 41 Twitter: How Twitter And IBM Deliver Customer Insights From Big Data -- 42 Uber: How Big Data Is At The Centre Of Uber's Transportation Business -- 43 Electronic Arts: Big Data In Video Gaming -- 44 Kaggle: Crowdsourcing Your Data Scientist -- 45 Amazon: How Predictive Analytics Are Used To Get A 360-Degree View Of Consumers -- Final Thoughts -- About the Author -- Acknowledgements -- Index…”
Libro electrónico -
4467Publicado 2005Tabla de Contenidos: “…3.4 Security: digital rights management (DRM) security technologies make streaming and digital media safe and sound…”
Libro electrónico -
4468
-
4469por Hale-Evans, RonTabla de Contenidos: “…Seek partners within your speciesBroaden your taste; Make sure your partners are healthy; Practice safe sex; Gain experience; Insist on satisfying sex; Respect people&s boundaries; Have lots of kids; How It Works; In Real Life; Memetic orgies; Old friends; Memetic marriage; End Notes; 27. …”
Publicado 2006
Libro electrónico -
4470Publicado 2007Tabla de Contenidos: “…Putting a Border around a GraphicPlacing a Graphic in SeaMonkey Composer; Placing a Graphic in HTML; Part IV: Polishing (and Publishing) Your Site; Chapter 13: Adding Links to Your Web Page; Linking Basics; Linking to a Web Page; Creating a Mailto Link; Chapter 14: Designing a Good-Looking Page; Three Key Principles of Design; Avoiding Common Design Mistakes; Breaking the Rules Safely; Using Tables and Frames; Chapter 15: Creating a Full Web Site; Creating Your Web Pages; Creating Navigation; Getting the Word Out; Chapter 16: Publishing Your Web Pages; Getting Web Server Space…”
Libro electrónico -
4471por Young, RickTabla de Contenidos: “…Aplicando transiçõesAlterando durações de transição; Transições globais; Transições alfa; Aplicando filtros; Combinando; Métodos de criação de faixas múltiplas; A guia Motion; Usando a guia Motion; Image + Wireframe; Title Safe; Trabalhando com multicamadas; Keyframing de imagens; Dissolves em camadas múltiplas; Keyframing de filtros; Copiando e colando atributos; Rotulação; Master Templates; Áudio; Definindo níveis de áudio corretos; Obtendo o máximo do áudio; Convertendo clipes em Stereo Pairs; Ajustando níveis de áudio; Aumentando níveis de áudio com o filtro Audio Gain…”
Publicado 2011
Libro electrónico -
4472por Hart-Davis, GuyTabla de Contenidos: “…Return to a Web Page You Visited RecentlyCustomize the Top Sites Screen for Quick Browsing; Bookmark a Page You Want to Revisit; Keep a Reading List of Web Pages; Search for Websites; Download a File from the Internet; Secure Safari for Safe Browsing; Chapter 6: Sending and Receiving Email; Open and Close Apple Mail; Add Your Email Accounts to Mail; Send an Email Message; Receive and Read Your Email Messages; Reply to a Message; Forward a Message to Someone Else; Send a File via Email; Receive a File via Email; Read Email Messages Quickly in Conversations…”
Publicado 2012
Libro electrónico -
4473Publicado 2019Tabla de Contenidos: “…Housing Boom and Bust: The Homeowner's Society Creates the People's Panic -- "Safe as Houses" -- The Music Stops -- The Boombustology of the U.S. …”
Libro electrónico -
4474Publicado 2023Tabla de Contenidos: “…-- Networking in the cloud - to isolate and protect -- Allowing or disabling traffic by defining the right routes -- Filtering traffic with security rules (stateful and stateless) -- Connecting multiple networks in a safe way -- Summary -- Further reading -- Part 2: Platform Services -- Chapter 6: Databases - To SQL or Not to SQL for So Many Records... -- Purpose-built databases: using the right tool for the right job -- Relational databases -- Non-relational databases -- Summary -- Further reading -- Chapter 7: Identity and Access Management - Who Am I and What Can I Do? …”
Libro electrónico -
4475Publicado 2023Tabla de Contenidos: “…-- The birth of an idea -- Rise and fall -- Chapter 9 From Crisis to Crisis-Israeli Cyber Grows Up -- Safe browsing: Island & -- Co. -- The massive switch to networks -- Is the bubble about to burst? …”
Libro electrónico -
4476Publicado 2016Tabla de Contenidos: “…-- Writing Android malwares -- Writing a simple reverse shell Trojan using socket programming -- Registering permissions -- Writing a simple SMS stealer -- The user interface -- Registering permissions -- Code on the server -- A note on infecting legitimate apps -- Malware analysis -- Static analysis -- Disassembling Android apps using Apktool -- Decompiling Android apps using dex2jar and JD-GUI -- Dynamic analysis -- Analyzing HTTP/HTTPS traffic using Burp -- Analysing network traffic using tcpdump and Wireshark -- Tools for automated analysis -- How to be safe from Android malwares? -- Summary -- Chapter 10: Attacks on Android Devices -- MitM attacks -- Dangers with apps that provide network level access -- Using existing exploits -- Malware -- Bypassing screen locks -- Bypassing pattern lock using adb -- Removing the gesture.key file -- Cracking SHA1 hashes from the gesture.key file -- Bypassing password/PIN using adb…”
Libro electrónico -
4477Publicado 2010Tabla de Contenidos: “…Working with Bookmarks -- Downloading and Viewing Files -- Saving Web Pages -- Customizing Safari's Toolbar -- Quitting Safari -- 8 Keeping Your Address Book and Schedule -- Using the Address Book -- Using iCal -- 9 Emailing and Chatting Online -- Using Mac Mail -- Using iChat -- 10 Using TextEdit -- Working with Documents -- Navigating and Editing Text -- Setting Margins and Tabs -- Formatting Text -- Formatting Paragraphs -- Exploring Other Formatting Features -- Printing -- 11 Managing and Editing Your Photos -- Setting Up iPhoto -- Importing Photos and Movies -- Viewing Photos -- Viewing, Changing, and Adding Photo Information -- Viewing and Changing Information for Events -- Sorting Photos -- Exploring Methods to Organize Photos -- Searching for Photos -- Editing Photos -- Sharing Photos with Others -- 12 Using Widgets and Other Applications -- Using Widgets -- Using Preview -- Consulting the Dictionary -- Posting Stickies -- Using the Calculator -- 13 Keeping Your Mac Safe, Updated, and Backed Up -- Safely Surfing the Web -- Working with the Keychain -- Maintaining Your Mac Software -- Backing Up with Time Machine -- Part III: Having Fun and Getting Creative -- 14 Watching Movies, Listening to Music, and Playing Games -- Watching Movies and Videos -- Listening to Music with iTunes -- Listening to Music in Front Row -- Acquiring and Playing Podcasts -- Playing Games -- 15 Being Creative with Photos -- Making Self-Portraits in Photo Booth -- Creating and Exporting Slideshows -- Designing and Publishing a Photo Book -- Creating Other Keepsakes -- Using Comic Life -- 16 Making Your Own Movies -- Getting Started -- Adding Video to the Events Library -- Playing Clips in the Event Library -- Creating and Playing a New Movie Project -- Trimming and Splitting Clips -- Adding Transitions between Clips -- Adding Titles -- Sharing and Exporting Movies…”
Vídeo online -
4478Publicado 2011Tabla de Contenidos: “…El templo RyoanjiLos viajes de Zheng He; LA DINASTÍA DE LOS MOGOLES; Mausoleo de Humanyun; Fatehpur Sikri; Diwan-i-Khas; Vijayanagar; Bijapur; Ibrahim Rauza; Mausoleo del jeque Safi al-Din; Los chaybánidas de Bujará; LA CONQUISTA ESPAÑOLA DE AMÉRICA; El atrio; El Escorial; EL ALTO RENACIMIENTO ITALIANO; El Capitolio; La iglesia del Gesú; La villa Farnese; La iglesia de Il Redentore; Las villas de Palladio; La villa Rotonda; Los Uffizi; ÁMSTERDAM; Ayuntamiento de Ámsterdam; LA PLACE ROYALE; LA INGLATERRA ISABELINA; Hardwick Hall; Banqueting House; LAS NUEVAS IGLESIAS DEL KREMLIN…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
4479Publicado 2014Tabla de Contenidos: “….; ROMPIENDO LOS BINARIOS EN EL BANQUETE DE SAFO; GÉNERO Y PROSTITUCIÓN EN BRASIL: NARRATIVAS SOBRE SER PROSTITUTA EN ESPACIOS COMUNICACIONALES DE INTERNET; EL SIGNIFICADO SOCIAL QUE LOS JÓVENES UNIVERSITARIOS MEXICANOS TIENEN DEL CELULAR. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull)Enlace del recurso
Libro electrónico -
4480por Baker, Kenneth R., 1943-Tabla de Contenidos: “…6.7 Using Risk Solver6.8 Summary; References; Exercises; 7 Safe Scheduling; 7.1 Introduction; 7.2 Meeting Service-Level Targets; 7.3 Trading Off Tightness and Tardiness; 7.4 The Stochastic E/T Problem; 7.5 Setting Release Dates; 7.6 The Stochastic U-Problem: A Service-Level Approach; 7.7 The Stochastic U-Problem: An Economic Approach; 7.8 Summary; References; Exercises; 8 Extensions of the Basic Model; 8.1 Introduction; 8.2 Nonsimultaneous Arrivals; 8.2.1 Minimizing the Makespan; 8.2.2 Minimizing Maximum Tardiness; 8.2.3 Other Measures of Performance; 8.3 Related Jobs…”
Publicado 2009
Libro electrónico