Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4481Publicado 2017Tabla de Contenidos: “…-- The First Step Is to Transform -- Start at the Culture Level -- Remove the Negativity -- Sooner or Later -- Lead from Where You Are -- Implement the No Complaining Rule -- Michael Phelps's Positive Leadership -- Don't Be Negative about Negativity -- Chapter 7: Positive Leaders Create United and Connected Teams -- Connection Is the Difference -- Team Beats Talent When Talent Isn't a Team -- Dabo Swinney's Safe Seat -- Collaborate and Facilitate -- Don't Let Your Reptile Eat Your Positive Dog…”
Libro electrónico -
4482Publicado 2022Tabla de Contenidos: “…Preface Introduction PART I Special Populations 1. Geriatrics: Safe Medication Use in Older Adults 2. Pediatrics Pharmacotherapy 3. …”
Libro electrónico -
4483por Beattie-Hood, BenTabla de Contenidos: “…-- Utility Types -- Record< -- Keys, Type> -- -- Pick< -- Type, Keys> -- -- Omit< -- Type, Keys> -- -- Partial< -- Type> -- -- Required< -- Type> -- -- Readonly< -- Type> -- -- Exclude< -- Type, Keys> -- -- Extract< -- Type, Keys> -- -- Parameters< -- FunctionType> -- -- ConstructorParameters< -- ClassType> -- -- ReturnType< -- FunctionType> -- -- Conditional Types -- extends Keyword -- infer Keyword -- Extracting Inferred Types -- Distributive and Nondistributive Conditional Types -- Conditional Types via Property Accessors -- Mapped Types -- Changing the Type of Fields -- Adding and Removing Fields -- Renaming Fields -- Recursive Types -- Recursion Within an Object Type -- Recursion over a Tuple Type -- Template Literals -- Summary -- Chapter 6: Advanced Usage -- Introduction -- Expect and IsEqual -- Compute -- JsonOf -- Flatten -- UrlParameters -- UrlParameters with Optional Params -- Further Reading -- Summary -- Chapter 7: Performance -- Introduction -- Reducing Inline Types -- Reducing Inferred Types -- Inline Caching Using Conditional Types -- Reduce Intersections -- Reduce Union Types -- Partition Using Packages and Projects -- Partitioning Using Packages -- Partitioning Using Projects -- Other Performance Tweaks -- Debugging Performance Issues -- Using the @typescript/analyze-trace NPM Package -- Using a Trace Viewer Within Your Browser -- Summary -- Chapter 8: Build -- Introduction -- Compiler Options -- Recommended tsconfig.json Settings -- Targeting Modern Browsers -- Prevent Optional Errors -- Display Complete Errors -- Enable Widest Range of Safe Interoperability -- Project Structure and Build Output -- Other Options -- Linting -- Installing ESLint -- Ideal Ruleset -- Additional Strict Errors -- Additional Strict Warnings -- Removed Rules…”
Publicado 2023
Libro electrónico -
4484
-
4485por Watson, DavidTabla de Contenidos: “…Clean Room; 2.4.6. Fire Safes; 2.4.7. Secure Off-Site Storage; 2.5. Layout of the Forensic Laboratory; 2.5.1. …”
Publicado 2013
Libro electrónico -
4486Publicado 2018Tabla de Contenidos: “…-- (V)-Verify Progress -- (E)-Enhance Yourself, Mentally and Physically, with Safe Biohacking -- This Guidebook Can Help You Strive -- Chapter 2: Are You Passionate Enough? …”
Libro electrónico -
4487Publicado 2015Tabla de Contenidos: “…March 11, about 15:37: IC isolation valves closed with fail-safe function…”
Libro electrónico -
4488Publicado 2019Tabla de Contenidos: “…Navigate difficult situations: How stay-at-home parents can transition back to work: get your career back on track after taking time off / by Dorie Clark -- How to react to a biased performance review: and prevent them in the future / by Paola Cecchi Dimeglio -- Responding to an offensive comment at work: whether it's simply inappropriate or even sexist / by Amy Gallo -- What to do if you've been sexually harassed: understanding your legal options / by Joanna L. …”
Libro -
4489por Ruscha, Edward, 1937-Tabla de Contenidos: “…"Pronounce His Name Rew-shay" / Guy Cross. "Panoramic Art at Library Elusive but Impressive" / Steven Rosen. …”
Publicado 2004
Libro -
4490Publicado 1928Tabla de Contenidos: “….-- v.10 : Regne de Dieu-Sadduceens -- v.11 : Safa-tique-Sarepta -- v.12 : Satan (et démons)-Songe -- v.13: Fasc.72-75 : (Sophonie-Tanis); Targum -- v.14 : Fasc.77-78: Tarsis-Tell Hariri -- v.14 : Fasc.79: Témoin-Temple…”
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Central de Capuchinos de España, Biblioteca Universitat Ramon Llull, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Universidad Loyola - Universidad Loyola Granada, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad de Navarra)Libro -
4491por AA., VVTabla de Contenidos: “….) -- La Sociedad Argentina de Microbiología General (SAMIGE) -- La Sociedad Argentina de Fisiología Vegetal (SAFV) -- La Sociedad Argentina de Virología (SAV) -- La Sociedad Argentina de Protozoología (SAP) -- PUBLICACIONES CIENTÍFICAS ARGENTINAS Y DIVULGACIÓN DE LA CIENCIA -- CONCLUSIONES Y RECOMENDACIONES -- Recomendaciones específicas para el área -- ABREVIATURAS…”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4492Publicado 2018Tabla de Contenidos: “…Trull -- What is social engineering? -- Staying safe from social engineering attacks -- People -- Process -- Technology -- Developing an effective cyber strategy -- Resources -- Business drivers -- Data -- Controls -- Threats -- Marcus Murray and Hasain Alshakarti -- Sample scenario - the workstation-data collection job -- Step 1 - preparing the attack -- Step 2 - staging the attack -- Step 3 - selecting the target -- Step 4 - launching the attack -- Step 5 - result -- Key points from this example -- Physical exposure -- The physical attack -- Emre Tinaztepe -- Malvertising -- Prevention -- Rogue/fake applications -- Prevention -- Documents with malicious payloads -- Prevention -- Public Wi-Fi hotspots -- Prevention -- Phishing/spear phishing -- Milad Aslaner -- Information is everywhere -- User activities -- Understanding reconnaissance -- Practical examples of reconnaissance -- Real-world examples -- Chapter 12: Ask the Experts - Part 2.…”
Libro electrónico -
4493Publicado 2018Tabla de Contenidos: “…. -- There's more... -- Safe type-casting -- How to do it... -- How it works... -- Other Books You May Enjoy -- Index…”
Libro electrónico -
4494Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Keep It Real - Firebase Realtime Database -- Firebase Realtime Database -- Setting up a development environment -- Prerequisites -- Configuring Firebase in Android projects -- Reading and writing to Realtime Database -- Database reference -- Writing into Realtime Database -- Reading from Realtime Database -- Structuring the data with objects -- Reading the objects from Firebase -- Reading value changes -- Parsing the DataSnapshot object -- Updating data -- Writing HashMaps to Realtime Database -- Realtime Database and lists -- Deleting data -- Offline capabilities -- Realtime Database rules -- Default security rules -- Database rules and types -- Customizing database rules -- Data security -- Custom variables -- Default variables -- RuleDataSnapshot and its methods -- Creating an Android application using Realtime Database -- User interface design -- Logic -- Summary -- Chapter 2: Safe and Sound - Firebase Authentication -- Firebase Authentication -- Setting up Firebase Authentication -- FirebaseUI Auth authentication -- Firebase SDK Authentication -- FirebaseUI Email Authentication -- Configuring for Email Authentication -- Enabling Email/Password Authentication in Console -- Initializing Firebase Authentication -- Finalizing the project -- Firebase SDK Email Authentication -- Sign up new users -- Sign in existing users -- Managing users -- Provider-specific user profile details -- Profile updating -- Sending a verification Email -- Forgot password -- Deleting a user -- Managing users through console -- Smart Lock -- FirebaseUI social networking site authentication -- Google Sign-in -- SHA-1 fingerprint -- Code for Google provider -- Facebook Login -- Facebook App ID and App secret -- Project configuration…”
Libro electrónico -
4495Publicado 2023Tabla de Contenidos: “…Managing Roles in Microsoft 365 and Azure AD -- Planning for Role Assignments -- Managing Roles in the Microsoft 365 Admin Center -- Managing Role Groups for Microsoft Defender, Microsoft Purview, and Microsoft 365 Workloads -- Microsoft Defender -- Microsoft Purview -- Microsoft 365 Workloads -- Managing Administrative Units -- Creating Administrative Units -- Viewing and Updating Administrative Units -- Planning and Implementing Privileged Identity Management -- Creating a Role Assignment -- Reviewing Role Assignments -- Alerting -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 4: Implementing and Managing Identity Synchronization with Azure AD -- Preparing for Identity Synchronization by Using IdFix -- Configuring and Managing Directory Synchronization by Using Azure AD Connect -- Planning and Sizing -- Installing the Synchronization Service -- Configuring Azure AD Connect Filters -- Domain and Organizational Unit-Based Filtering -- Group-Based Filtering -- Attribute-Based Filtering -- Monitoring Synchronization by Using Azure AD Connect Health -- Azure AD Connect Health -- Azure AD Connect Health for Sync -- Azure AD Connect Health for Directory Services -- Azure AD Connect Health for Active Directory Federation Services -- Troubleshooting Azure AD Connect Synchronization -- Configuring and Managing Directory Synchronization by Using Azure AD Connect Cloud Sync -- Installing the Provisioning Agent -- Configuring the Provisioning Service -- Customizing the Provisioning Service -- Scoping Filters -- Attribute Mapping -- Troubleshooting Azure AD Connect Cloud Sync Synchronization -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 5: Implementing and Managing Authentication -- Implementing and Managing Authentication Methods -- Choosing an Authentication Mechanism -- Windows Hello for Business…”
Libro electrónico -
4496Publicado 2023Tabla de Contenidos: “…From ideas in practice to the term "Lean" -- The seven wastes -- Waste #1 - transport -- Waste #2 - inventory -- Waste #3 - motion -- Waste #4 - waiting -- Waste #5 - overprocessing -- Waste #6 - overproduction -- Waste #7 - defects -- (New) waste #8 - ability -- Removing waste in testing -- Flow -- Visualizing flow - an example -- Multitasking -- Measurement - lead time versus cycle time -- Efficiency and congestion -- Metric - touch time -- Batch size -- Queues and efficiency -- Arrival time pacing -- Limiting work in progress to create a pull system -- Release cadence -- One-piece flow and CD -- Summary -- Part 3: Practicing Politics -- Chapter 12: Case Studies and Experience Reports -- RCRCRC at scale -- The 1-day test plan -- RCRCRC in the enterprise -- A coverage dashboard -- Test coverage blinders -- Pair and tri-programming -- Discovering the expertise paradox -- Making expertise transparent -- The evolution of the test strategy -- The alternative to evolution - information hiding -- Professional pushback - dealing with bullies -- Power in the workplace -- One way to say it -- Boundaries in the enterprise -- Narcissistic communication -- Boundary enforcement - the power move -- If you choose to stay -- Summary -- Chapter 13: Testing Activities or a Testing Role? …”
Libro electrónico -
4497Publicado 2013Tabla de Contenidos: “…Sheet-Metal Construction -- Design Philosophies -- Safe-Life Design -- Fail-Safe Design…”
Libro electrónico -
4498Publicado 2018Tabla de Contenidos: “…ANDROID SOFTWARE STACK [18] -- FIGURA 2. ARQUITECTURA DE SAFE CANDY -- FIGURA 3. MARCO DE TRABAJO PARA EL ANÁLISIS ESTÁTICO -- FIGURA 4. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4499por Ireland.Tabla de Contenidos: “…Dinneen, Molly Byrne -- The systematic approach to improving care for Frail Older Patients (SAFE) study: A protocol for co-designing a frail older person's pathway -- Éidín Ní Shé, Mary McCarthy, Deirdre O'Donnell, Orla Collins, Graham Hughes, Nigel Salter, Lisa Cogan, Coailfhionn O'Donoghue, Emmet McGrath, John O'Donovan, Andrew Patton, Eilish McAuliffe, Diarmuid O'Shea, Marie Therese Cooney -- Sexual transmission of Hepatitis C Virus infection in a heterosexual population: A systematic review -- Francesca Wuytack, Vittoria Lutje, Janus Christian Jakobsen, Karl Heinz Weiss, Paula Flanagan, Georgina Gethin, Louise Murphy, Siobhan Smyth, Declan Devane, Valerie Smith -- Assessment of the understanding of informed consent including participants' experiences, and generation of a supplemental consent decision aid for Gestational Diabetes Mellitus (GDM) research -- Shubham Atal, Fidelma Dunne -- A community-based parent-support programme to prevent child maltreatment: Protocol for a randomised controlled trial -- Mairead Furlong, Ann Stokes, Sinead McGilloway, Grainne Hickey, Yvonne Leckey, Tracey Bywater, Ciaran O'Neill, Chris Cardwell, Brian Taylor, Michael Donnelly, ENRICH Research Team -- Participants' perspectives and preferences on clinical trial result dissemination: The TRUST Thyroid Trial experience -- Emmy Racine, Caroline Hurley, Aoife Cheung, Carol Sinnott, Karen Matvienko-Sikar, Christine Baumgartner, Nicolas Rodondi, William H. …”
Publicado 2018
Revista digital -
4500Publicado 2022Tabla de Contenidos: “…Infrastructure as Code at Scale -- Evolving Business Requirements -- Evolving Security Requirements -- Evolving Provider Requirements -- The Way Ahead -- Chapter 3: Management of Infrastructure as Code -- The Emergence of Infrastructure Teams -- Preparing Infrastructure as Code -- Evaluation of Infrastructure -- Choosing the Right Security Mechanisms -- Structuring the Data -- Automating Workloads -- Uniform Governance -- Hybrid Strategies -- Blue-Green Deployment Strategy -- Process and Architecture -- Working Mechanism -- Preparing Deployments -- Adapting Simplicity -- Environment Replicability -- Configuration Management -- Process and Architecture -- The Way Ahead -- Chapter 4: Production Complexity Management -- Modern Application Infrastructures -- Managing Deployments Without Downtime -- Canary Deployment Strategy -- Process and Architecture -- Working Mechanism -- Adapting Simplicity -- Environment Replicability -- Rolling Release Deployment Strategy -- Process and Architecture -- Steps for Managing Production Complexity -- Harnessing the Power -- Fail-Safe Environment Management -- Monitoring Your Infrastructure -- Compartmentalizing Releases -- Adapting Serverless Architecture -- Feature Flagging -- The Impact of Deployment Strategies -- Caveats While Managing Complex Production Environments -- The Way Ahead -- Chapter 5: Business Solutions with Infrastructure as Code -- Managing Modern Infrastructures -- Enabling Business Possibilities -- Enabling Domain Sustainability -- Supporting Evolving Strategies -- Decision-Making for Businesses -- The Way Ahead -- Part 2: Hands-on Experience -- Chapter 6: Hands-on Infrastructure as Code with Hashicorp Terraform -- Introduction to Terraform -- Why Choose Terraform? …”
Libro electrónico