Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4661por Pekárek, HendrikTabla de Contenidos: “…Beispiele für die midraschische Auslegung im Strafrecht -- a) Beispiel 9: Mechilta zur Auslegung der Strafbarkeit des Diebstahls -- b) Beispiel 10: Sifre zur Auslegung der Strafbarkeit des Mordes -- 3. …”
Publicado 2021
Libro electrónico -
4662Publicado 2024Tabla de Contenidos: “…-- Models of Implementing Coaching Programs: Direction, Source, and Duration-Focused -- Example 2: Top-Down Model -- Example 3: A Combined External-Internal Model -- Example 4: A Quick-Fix Model -- Approaches to Implementing Coaching Programs: Piecemeal Versus Holistic/Systemic Approach -- Piecemeal Approach -- Holistic/Systemic Approach: Process-Oriented Systemic Approach -- Example 6: Process-Oriented Systemic Approach to Implementing Coaching -- Summary of Models and Approaches and Programs -- Key Takeaways -- Coaching and Developmental Questions -- Recommended Reading and Supporting Resources -- 11 Essential Coaching Competencies and Considerations -- Introduction -- Defining Key Terms -- Generative Learning Support -- Partnership and Empowerment -- Transformative Goal Setting Through Effective Problem Identification -- Building Safe Learning Environments -- Contracting -- Considerations for the Internal Coach: Confidentiality and Bias -- Creating Opportunities for Thinking and Reflection -- Mental Models -- Values -- Powerful Inquiry -- Deep Listening -- Working with Emotions -- Key Takeaways -- Coaching and Developmental Questions -- Recommended Supporting Resources -- 12 Performance Coaching and Conversations -- Introduction -- Defining Key Terms -- Performance Coaching Is an Individual Commitment -- Performance Conversation Is Not Performance Evaluation -- Performance Standards and Indicators -- Job Performance Standard -- Criteria -- Key Performance Indicator -- Best Industry Practices -- Process of Delivering Performance Coaching -- Build Rapport -- Find the Need -- Foresee Conclusion -- Set the Mindset…”
Libro electrónico -
4663Publicado 2017Tabla de Contenidos: “…-- Nesting and Scope -- Nesting Blocks of Code -- Constant and Variable Scope -- What You Learned -- 5 Keeping Your Programs Safe with Optionals -- What Is an Optional? -- Creating Optionals -- Unwrapping Optionals -- A Special Kind of Operator: ?? …”
Libro electrónico -
4664por Room, StewartTabla de Contenidos: “…-- General principles for transfers -- Transfers on the basis of an adequacy decision -- Elements considered in assessing adequacy -- Adequacy decisions issued -- UK adequacy -- Partial adequacy decisions -- Ongoing monitoring of adequacy decisions -- Transfers subject to appropriate safeguards -- Standard contractual clauses -- Derogations for specific situations -- Relying on the derogations in practice -- Compelling legitimate interests -- Litigation on international data transfers -- Schrems I - Safe Harbor decision declared invalid -- Schrems II - Privacy Shield declared invalid and SCCs declared valid subject to certain conditions -- Navigating international data transfers -- EDPB's six-step recommendations -- Supplementary measures -- A practical approach to international transfers -- Getting to know your 'special characteristics' -- Understanding the 'zone of precedent'…”
Publicado 2021
Libro electrónico -
4665por DuBois, Paul, 1956-Tabla de Contenidos: “…13 Access Control and Security -- 13.1 Internal Security: Preventing Unauthorized Filesystem Access -- 13.2 External Security: Preventing Unauthorized Network Access -- 13.3 Setting Up Secure Connections -- 14 Database Maintenance, Backups, and Replication -- 14.1 Principles of Preventive Maintenance -- 14.2 Performing Database Maintenance with the Server Running -- 14.3 General Preventative Maintenance -- 14.4 Making Database Backups -- 14.5 Copying Databases to Another Server -- 14.6 Checking and Repairing Database Tables -- 14.7 Using Backups for Data Recovery -- 14.8 Setting Up Replication Servers -- IV: Appendixes -- A: Obtaining and Installing Software -- A.1 Obtaining the sampdb Sample Database Distribution -- A.2 Obtaining MySQL and Related Software -- A.3 Choosing a Version of MySQL -- A.4 Installing MySQL on Unix -- A.5 Installing MySQL on Windows -- B: Data Type Reference -- B.1 Numeric Types -- B.2 String Types -- B.3 Date and Time Types -- B.4 Spatial Types -- C: Operator and Function Reference -- C.1 Operators -- C.2 Functions -- D: System, Status, and User Variable Reference -- D.1 System Variables -- D.2 Session-Only System Variables -- D.3 Status Variables -- D.4 User-Defined Variables -- E: SQL Syntax Reference -- E.1 SQL Statement Syntax (Non-Compound Statements) -- E.2 Compound Statement Syntax -- E.3 Comment Syntax -- F: MySQL Program Reference -- F.1 Displaying a Program's Help Message -- F.2 Specifying Program Options -- F.3 myisamchk -- F.4 myisampack -- F.5 mysql -- F.6 mysql.server -- F.7 mysql_config -- F.8 mysql_install_db -- F.9 mysqladmin -- F.10 mysqlbinlog -- F.11 mysqlcheck -- F.12 mysqld -- F.13 mysqld_multi -- F.14 mysqld_safe -- F.15 mysqldump -- F.16 mysqlhotcopy -- F.17 mysqlimport -- F.18 mysqlshow -- F.19 perror -- G: C API Reference -- G.1 Compiling and Linking -- G.2 C API Data Types -- G.3 C API Functions…”
Publicado 2009
Libro electrónico -
4666Publicado 2012Tabla de Contenidos: “…-- AC and DC Controllers -- The Effects of Temperature Changes -- Protecting Your Batteries: Proper Charging and Equalization -- Building a Charge Controller from Scratch -- How to Connect or Unhook a Controller -- Voltage Clamp -- Disconnects -- Breaker Panels -- The Wire -- Grounding -- Surge Arrestors -- Utility Interconnection Equipment -- System Meters -- Backup Generator -- Summary -- 11 Installation, Maintenance, and Troubleshooting -- Installing a Tower -- Safety First -- Installing a Small Wind System -- The Foundation and Anchors -- Lifting the Tower (and Turbine) -- Safe Climbing -- Making the Connections -- Maintenance -- Tower and Turbine Maintenance Checklist -- Troubleshooting -- Troubleshooting for a Small Wind System -- Summary -- 12 Future Developments in Wind Power -- Architectural Wind: Can Buildings Improve Wind Conditions? …”
Libro electrónico -
4667por Spiers, Mary V.Tabla de Contenidos: “…-- Characteristics of Healthy Sexuality -- ACTIVE SEX -- Dominance and Submission -- Internal Focus -- Sexual Assertiveness -- CONSENSUAL SEX -- Childhood Sexual Abuse (CSA) -- Rape -- Sexual Revictimization -- SEX THAT IS WANTED AND LIKED -- Engaging in Disliked Sexual Activities -- SAFE SEX -- INTEGRATING RELATIONSHIP AND INDIVIDUAL SEXUAL GOALS -- REFERENCES -- Chapter 13 Premenstrual Dysphoric Disorder -- INTRODUCTION -- DIAGNOSIS OF PREMENSTRUAL DYSPHORIC DISORDER -- Physical Disorders as Differential Diagnoses -- Psychiatric Disorders as Differential Diagnoses -- Prospective Symptom Assessment and Rating Scales -- PREVALENCE AND DEMOGRAPHIC CORRELATES -- IMPACT -- POTENTIAL ETIOLOGIC FACTORS -- Biological Factors -- Psychosocial Factors -- MANAGEMENT OF PREMENSTRUAL DYSPHORIC DISORDER -- Psychoeducation -- Healthy Lifestyle and Dietary Supplementation -- Relaxation Skills and Structured Psychotherapies -- Herbal, Complementary, and Other Treatments -- Pharmacotherapy -- Manipulation of Menstruation -- CASE FOLLOW-UPS -- Krista P. -- Andrea F. -- FUTURE DIRECTIONS -- SUMMARY -- REFERENCES -- Chapter 14 The Stress of Infertility -- TOPIC INTRODUCTION AND SIGNIFICANCE -- CRITICAL REVIEW -- Lifestyle Factors That Impact Infertility and Its Treatment…”
Publicado 2013
Libro electrónico -
4668por CohenMiller, AnnaTabla de Contenidos: “…Composite Narrative: Teacher/Administration Experience -- Composite Narrative: Work-Life Balance Experience -- Composite Narrative: (Im)mobility Experience -- Related to Microaggressive Communication -- Related to Stress Processes -- Related to Gender Stereotypes -- Conclusions -- Recommendations Addressing Gender Inequality -- First Recommendation: Raise Awareness in the Academic Community -- Second Recommendation: Raise Societal Awareness -- Third Recommendation: Decommodification of HE Practices -- References -- 8 Gender, Precarity and Marginality in Higher Education Spaces in India -- Introduction -- Conceptual Framework -- Setting the Stage -- University as a Contested Space -- Situating Contingent Faculty in Context -- Gender and Intersectionality -- Methodology -- Findings -- Identity and Voice -- Pay Disparity and Unsteady Finances -- Gendered/Differential Treatment -- Patriarchal Societal System -- Safe Space and Dissent -- Time Graph -- Discussion, Recommendations and Conclusion -- Reimagining Institutional Space -- Notes -- References -- 9 Centering Voices of Motherscholars During the COVID-19 Pandemic Shows Overwhelming Responsibilities, Ingrained Gender ... -- Introduction -- Academic Institutions and Mothers -- Who We Are: Positionality -- Methodology -- Study 1-Photovoice: Motherscholar During Quarantine (Anna's Study) -- Study 2-Institutional Policy Structure (Jessica's Study) -- Samples -- Impact of COVID-19 On the Careers of Motherscholars -- COVID-19 Impact On Research Productivity -- Time -- Boundaries (Work/Life Fit) -- Space -- What Mothers Need: Institutional Wishlist -- Seeing the Commonalities: Discussion -- Conclusion and Recommendations -- Limitations and Future Directions -- Note -- References -- 10 Decolonising "Those Who Are Not" in Polish Higher Education Institutions -- Introduction -- Those Who Are Not at Polish HEIs…”
Publicado 2022
Libro electrónico -
4669Publicado 2023Tabla de Contenidos: “…Three convergent paths between creative action and computational tools -- Technological innovation for circularity and sustainability through buildings’ life cycles: Policy, initiatives and stakeholders’ perspective -- Fair play: Why reliable data for low tech construction and non-conventional materials are needed -- Part 3: Environment -- Technological innovation for the next ecosystem transition: From a high tech -- To low tech intensity – High efficiency environment -- Technological imagination to stay within planetary boundaries -- Quality-based design for environmentally conscious architecture -- Digital transformation projects for the future digicircular society -- The regulatory apparatus at the service of sustainable planning of the built environment: The case of law 338/2000 -- From nature to architecture for low tech solutions: Biomimetic principles for climate-adaptive building envelope -- Soft technologies for the circular transition: Practical experimentation of the product “material passport” -- Imaging a carbon neutral university -- Life cycle assessment at the early stage of building design -- Design scenarios for a circular vision of post-disaster temporary settlements -- Towards climate neutrality: Progressing key actions for positive energy districts implementation -- Remanufacturing towards circularity in the construction sector: The role of digital technologies -- Territorial energy potential for energy community and climate mitigation actions: Experimentation on pilot cases in Rome -- Integrated design approach to build a safe and sustainable dual intended use center in Praslin island, Seychelles -- Part 4: Climate changes -- Climate change: New ways to inhabit the earth -- The climate report. …”
Libro electrónico -
4670Publicado 2024Tabla de Contenidos: “…Dealing with invalidation in multi-threaded scenarios -- Summary -- Chapter 5: Making a Case for std::vector -- Performance considerations -- Comparison with other containers -- The memory advantage -- The takeaway -- Practical use cases -- A resizable dynamic array at heart -- Data processing and analytics -- Graphics and game development -- Beyond just containers -- Versatility and efficiency -- A testament to versatility -- Efficiency isn't just about speed -- A safe default, but not the only option -- Summary -- Part 2: Understanding STL Data Structures -- Chapter 6: Advanced Sequence Container Usage -- Technical requirements -- std::array -- Purpose and suitability -- Ideal use cases -- Performance -- Memory management -- Thread safety -- Extensions and variants -- Sorting and searching complexity -- Interface and member functions -- Comparisons -- Interactions with algorithms -- Exceptions -- Customization -- Example -- Best practices -- std::vector -- Purpose and suitability -- Ideal use cases -- Performance -- Memory management -- Thread safety -- Extensions and variants -- Sorting and searching complexity -- Special interface and member functions -- Comparisons -- Interactions with algorithms -- Exceptions -- Customization -- Example -- Best practices -- std::deque -- Purpose and suitability -- Ideal use cases -- Performance -- Memory management -- Thread safety -- Extensions and variants -- Sorting and searching complexity -- Interface and member functions -- Comparisons -- Interactions with algorithms -- Exceptions -- Customization -- Example -- Best practices -- std::list -- Purpose and suitability -- Ideal use cases -- Performance -- Memory management -- Thread safety -- Extensions and variants -- Sorting and searching complexity -- Interface and member functions -- Comparisons -- Interactions with algorithms -- Exceptions…”
Libro electrónico -
4671Publicado 2023Tabla de Contenidos: “…Secure coding practices versus safe coding techniques -- Synergies and differences in the testing phase -- Summary -- References -- Part 3: Executing the Process to Engineer a Secure Automotive Product -- Chapter 7: A Practical Threat Modeling Approach for Automotive Systems -- The fundamentals of performing an effective TARA -- Assets -- Damage scenarios -- Threat scenarios -- Attacker model and threat types -- Attack paths -- Risk assessment methods -- Risk treatment -- Common pitfalls when preparing a TARA -- Defining the appropriate TARA scope -- The practical approach -- Know your system -- Make your assumptions known -- Use case-driven analysis -- Prepare context and data flow diagrams -- Damages versus assets - where to start -- Identifying assets with the help of asset categories -- Building threat catalogs -- Creating attack paths using a system flow diagram -- Risk prioritization -- Defining cybersecurity goals -- Choosing security controls and operational environment (OE) requirements -- Tracking shared and accepted risks -- Review and signoff -- Case study using a digital video recorder (DVR) -- Assumptions -- Context diagram -- Identifying the assets -- Damage scenarios -- Cybersecurity requirements and controls -- Summary -- References -- Chapter 8: Vehicle-Level Security Controls -- Choosing cybersecurity controls -- Challenging areas -- Vehicle-level versus ECU-level controls -- Policy controls -- Secure manufacturing -- Challenges -- Secure off-board network communication -- Wi-Fi -- Bluetooth -- Cellular -- Host-based intrusion detection -- Network intrusion detection and prevention (NIDP) -- Domain separation and filtering -- Sensor authentication -- Secure software updates -- In-vehicle network protection -- CAN message authentication -- Ethernet -- Securing diagnostic abilities -- Security access control via UDS service 0x27…”
Libro electrónico -
4672Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: Common Apex Mistakes -- Null pointer exceptions -- Exceptions on object instances -- Exceptions when working with maps -- Safe navigation operator -- Retrieving configuration data in a bulkified way -- Hot and cold data -- Bulkification - querying within loops -- Bulkification - DML within loops -- Hardcoding -- Summary -- Chapter 2: Debugging Apex -- Technical requirements -- Debugging on Salesforce -- Prevention is better than cure -- Log levels -- SFDX and streaming logs -- Debugging using the Apex Replay Debugger -- Apex Interactive Debugger -- ISV Customer Debugger -- Which tool to use? …”
Libro electrónico -
4673
-
4674por AYFRE, Amadee
Publicado 1958Red de Bibliotecas de la Archidiócesis de Granada (Otras Fuentes: Biblioteca del Seminario Diocesano de Vitoria-Gasteiz)Libro -
4675Publicado 2020“…Sync with iTunes Stay safe while browsing Manage email and appointments Download and use apps Whether you’re a total newbie or upgrading from an older model, iPhone For Seniors For Dummies helps you can sit back, relax, and enjoy keeping up with the latest technology!…”
Libro electrónico -
4676Publicado 2020“…Build your professional network to get the guidance you need Find a mentor who understands your goals and your struggles Overcome negativity and stay motivated through difficult times Identify and develop the soft skills that you need to get ahead in tech Read this book to help bring to life your vision of a future in tech. …”
Libro electrónico -
4677Publicado 2022“…Even if you’re upgrading from a typewriter, we can help you choose the right laptop to buy, understand your operating system, use files and folders, download and install software, and stay safe online. It’s all the stuff you need to know to make your laptop work for you…”
Libro electrónico -
4678por Soper, Mark Edward“…Learn how to use Microsoft’s free Windows ® Live tools to stay connected, make the most of your media, and stay safe online. …”
Publicado 2010
Libro electrónico -
4679Publicado 2023“…And the best way to get started is as a team. Join Sam Newman and SafeStack founder and CEO Laura Bell for a special conversation on cybersecurity. …”
Video -
4680