Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
5181por Narayn, HariTabla de Contenidos: “…Chapter 1: Get Stared with SharePoint Online -- Chapter 2: Business Analysis and Solution Design -- Chapter 3: JSON Formatting -- Chapter 4: Power Apps -- Chapter 5: Power Automate -- Chapter 6: SharePoint Framework (SPFx) -- Chapter 7: Modern Search -- Chapter 8: Teams and Power Virtual Agents…”
Publicado 2023
Libro electrónico -
5182por Moreno Claros, Luis Fernando (trad.)“…Una extraordinaria oportunidad de volver a conversar con uno de los mayores fil��sofos de todos los tiempos. Repantingado en su sof�� schopenhaueriano, blando y c��lido asiento en la caverna plat��nica, el gran fil��sofo del dolor y la piedad universales refer��a a sus interlocutores con pasi��n epic��rea cu��nto hab��a tenido que sufrir en este mundo miserable y cruel, lo mal que lo hab��an tratado sus editores y lo p��simamente que se port�� con ��l la ralea acad��mica. …”
Publicado 2016
Biblioteca de Pastoral Madrid (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra)Libro -
5183por Davis, Lynn E. 1943-“…Finding ways to safely store and ultimately dispose of nuclear waste remains a matter of considerable debate. …”
Publicado 2012
Libro electrónico -
5184por Cohen, Daniel“…Aid through loans may often prove superior, provided that it maintains debt sustainability. A new scheme for soft loans is suggested, with higher interest rates and cancellation provisions if bad shocks occur, to minimise moral hazard and strengthen debt sustainability…”
Publicado 2007
Capítulo de libro electrónico -
5185por O’Donnell + Tuomey Architects,“…This recently completed primary school illustrates how architecture can contribute to creating a safe and warm environment in a difficult area and can meet the particular needs of the student community. …”
Publicado 2007
Capítulo de libro electrónico -
5186por Gasston, Peter“…His plain-English explanations and practical examples emphasize the techniques, principles, and practices that you'll need to easily transcend individual browser quirks and stay relevant as these technologies are updated…”
Publicado 2013
Libro electrónico -
5187por Morris, Richard A.“…It addresses "hard" financial issues such as investing and estate planning and "soft" emotional issues such as values, family, and communication"--Provided by publisher…”
Publicado 2010
Libro electrónico -
5188Publicado 2012“…In this webcast, Mike Halsey, the author of Troubleshooting Windows 7 Inside Out, walks you through the process of keeping your children and your family safe online from viruses, criminals and inappropriate content with simple to use free tools…”
-
5189Publicado 2019“…Path Planning (PP) is one of the prerequisites in ensuring safe navigation and manoeuvrability control for driverless vehicles. …”
Libro electrónico -
5190Publicado 2022Tabla de Contenidos: “…Automatic Noise Reduction in Ultrasonic Computed Tomography Image for Adult Bone Fracture Detection 24 -- 9. Soft Tissue Image Reconstruction Using Diffuse Optical Tomography 118 -- 10. …”
Libro electrónico -
5191Publicado 2009“…Se trata de una película poética que muestra la belleza del bosque tropical indonesio, al tiempo que pone de manifiesto la implacable destrucción que sufre…”
DVD -
5192Publicado 2014Tabla de Contenidos: “…4.4.4 File-System Performance -- 4.4.5 Defragmenting Disks -- 4.5 EXAMPLE FILE SYSTEMS -- 4.5.1 The MS-DOS File System -- 4.5.2 The UNIX V7 File System -- 4.5.3 CD-ROM File Systems -- 4.6 RESEARCH ON FILE SYSTEMS -- 4.7 SUMMARY -- 5 INPUT/OUTPUT -- 5.1 PRINCIPLES OF I/O HARDWARE -- 5.1.1 I/O Devices -- 5.1.2 Device Controllers -- 5.1.3 Memory-Mapped I/O -- 5.1.4 Direct Memory Access -- 5.1.5 Interrupts Revisited -- 5.2 PRINCIPLES OF I/O SOFTWARE -- 5.2.1 Goals of the I/O Software -- 5.2.2 Programmed I/O -- 5.2.3 Interrupt-Driven I/O -- 5.2.4 I/O Using DMA -- 5.3 I/O SOFTWARE LAYERS -- 5.3.1 Interrupt Handlers -- 5.3.2 Device Drivers -- 5.3.3 Device-Independent I/O Software -- 5.3.4 User-Space I/O Software -- 5.4 DISKS -- 5.4.1 Disk Hardware -- 5.4.2 Disk Formatting -- 5.4.3 Disk Arm Scheduling Algorithms -- 5.4.4 Error Handling -- 5.4.5 Stable Storage -- 5.5 CLOCKS -- 5.5.1 Clock Hardware -- 5.5.2 Clock Software -- 5.5.3 Soft Timers -- 5.6 USER INTERFACES: KEYBOARD, MOUSE, MONITOR -- 5.6.1 Input Software -- 5.6.2 Output Software -- 5.7 THIN CLIENTS -- 5.8 POWER MANAGEMENT -- 5.8.1 Hardware Issues -- 5.8.2 Operating System Issues -- 5.8.3 Application Program Issues -- 5.9 RESEARCH ON INPUT/OUTPUT -- 5.10 SUMMARY -- 6 DEADLOCKS -- 6.1 RESOURCES -- 6.1.1 Preemptable and Nonpreemptable Resources -- 6.1.2 Resource Acquisition -- 6.2 INTRODUCTION TO DEADLOCKS -- 6.2.1 Conditions for Resource Deadlocks -- 6.2.2 Deadlock Modeling -- 6.3 THE OSTRICH ALGORITHM -- 6.4 DEADLOCK DETECTION AND RECOVERY -- 6.4.1 Deadlock Detection with One Resource of Each Type -- 6.4.2 Deadlock Detection with Multiple Resources of Each Type -- 6.4.3 Recovery from Deadlock -- 6.5 DEADLOCK AVOIDANCE -- 6.5.1 Resource Trajectories -- 6.5.2 Safe and Unsafe States -- 6.5.3 The Banker's Algorithm for a Single Resource -- 6.5.4 The Banker's Algorithm for Multiple Resources…”
Libro electrónico -
5193Publicado 2018Tabla de Contenidos: “…Cover -- Title -- Copyright -- Contents -- Preface -- Acknowledgements -- Chapter 1 Electrical and electronic principles -- 1.1 Safe working practices -- 1.1.1 Introduction -- 1.1.2 Risk assessment and reduction -- 1.2 Basic electrical principles -- 1.2.1 Introduction -- 1.2.2 Electron flow and conventional flow -- 1.2.3 Effects of current flow -- 1.2.4 Fundamental quantities -- 1.2.5 Describing electrical circuits -- 1.2.6 Conductors, insulators and semiconductors -- 1.2.7 Factors affecting the resistance of a conductor -- 1.2.8 Resistors and circuit networks -- 1.2.9 Magnetism and electromagnetism -- 1.2.10 Electromagnetic induction -- 1.2.11 Mutual induction -- 1.2.12 Definitions and laws -- 1.3 Electronic components and circuits -- 1.3.1 Introduction -- 1.3.2 Components -- 1.3.3 Integrated circuits -- 1.3.4 Amplifiers -- 1.3.5 Bridge circuits -- 1.3.6 Schmitt trigger -- 1.3.7 Timers -- 1.3.8 Filters -- 1.3.9 Darlington pair -- 1.3.10 Stepper motor driver -- 1.3.11 Digital-to-analogue conversion -- 1.3.12 Analogue-to-digital conversion -- 1.4 Digital electronics -- 1.4.1 Introduction to digital circuits -- 1.4.2 Logic gates -- 1.4.3 Combinational logic -- 1.4.4 Sequential logic -- 1.4.5 Timers and counters -- 1.4.6 Memory circuits -- 1.4.7 Clock or astable circuits -- 1.5 Microprocessor systems -- 1.5.1 Introduction -- 1.5.2 Ports -- 1.5.3 Central processing unit (CPU) -- 1.5.4 Memory -- 1.5.5 Buses -- 1.5.6 Fetch-execute sequence -- 1.5.7 A typical microprocessor -- 1.5.8 Microcontrollers -- 1.5.9 Testing microcontroller systems -- 1.5.10 Programming -- 1.6 Measurement -- 1.6.1 What is measurement? …”
Libro electrónico -
5194Publicado 2017Tabla de Contenidos: “…8.3.1.1.7 Bahadori and Vuthaluru (2009) -- 8.3.1.2 Equation of States -- 8.3.1.2.1 The Cubic-Plus-Association Equation of State -- 8.3.1.2.2 Peng-Robinson Equation of State -- 8.3.1.2.3 Perturbed Chain-Statistical Associating Fluid Theory -- 8.3.1.2.3.1 Mathematical Formulation of PC-SAFT -- 8.3.1.2.3.1.1 Hard-chain Reference Fluid -- 8.3.1.2.3.1.2 Dispersion Interactions -- 8.3.1.2.3.1.3 Association Interactions -- 8.3.1.3 Iterative Method (K-value Method) -- 8.4 HYDRATE DEPOSITION -- 8.5 HYDRATE INHIBITIONS -- 8.5.1 Calculating the Amount of Hydrate Inhibitors -- 8.5.1.1 The Hammerschmidt Method -- 8.5.1.2 The Nielsen-Bucklin Method -- 8.5.1.3 McCain Method -- 8.5.1.4 Østergaard et al. (2005) -- 8.5.2 Calculating Inhibitor Loss in Hydrocarbon Phase -- 8.5.3 Inhibitor Injection Rates -- Problems -- REFERENCES -- Nine - Characterization of Shale Gas -- 9.1 INTRODUCTION -- 9.2 SHALE GAS RESERVOIR CHARACTERISTICS -- 9.3 BASIC SCIENCE BEHIND CONFINEMENT -- 9.3.1 Impact of Confinement on Critical Properties -- 9.3.2 Diffusion Effect Due to Confinement -- 9.3.3 Capillary Pressure -- 9.3.4 Adsorption Phenomenon in Shale Reservoirs -- 9.4 EFFECT OF CONFINEMENT ON PHASE ENVELOPE -- Problems -- REFERENCES -- Ten - Characterization of Shale Oil -- 10.1 INTRODUCTION -- 10.2 TYPES OF FLUIDS IN SHALE RESERVOIRS AND GENESIS OF LIQUID IN SHALE PORES -- 10.3 SHALE PORE STRUCTURE AND HETEROGENEITY -- 10.4 SHALE OIL EXTRACTION -- 10.4.1 History -- 10.4.2 Processing Principles -- 10.4.3 Extraction Technologies -- 10.5 INCLUDING CONFINEMENT IN THERMODYNAMICS -- 10.5.1 Classical Thermodynamics -- 10.5.1.1 Equation of State -- 10.5.1.2 Condition of Equilibrium -- 10.5.1.3 Vapor-Liquid Equilibrium/Flash Computation -- 10.5.2 Modification of Flash to Incorporate Capillary Pressure in Tight Pores -- 10.5.3 Stability Test Using Gibbs Free Energy Approach…”
Libro electrónico -
5195Publicado 2019Tabla de Contenidos: “…Design Order of Precedence -- 7.4.14. Fail-Safe Design Concept -- 7.4.15. Series or Parallel Architecture -- 7.4.16. …”
Libro electrónico -
5196por Bos, Robert“…"Manual Sobre os Direitos Humanos à Água Potável e Saneamento para Profissionais is the Portuguese translation of Manual on the Human Rights to Safe Drinking Water and Sanitation for Practitioners. …”
Publicado 2017
Libro electrónico -
5197Publicado 2022“…What you will learn Write JavaScript code that uses cryptography running within a Node.js environment for the server-side or in frontend applications for web browsers Use modern, safe hashing functions for calculating digests and key derivation, including SHA-2 and Argon2 Practice encrypting messages and files with a symmetric key using AES and ChaCha20-Poly1305 Use asymmetric and hybrid encryption, leveraging RSA and Elliptic Curve Cryptography with ECDH and ECIES Calculate and verify digital signatures using RSA and ECDSA/EdDSA Manage passwords and encryption keys safely Who this book is for This cryptography book is an introductory guide for software developers who don't necessarily have a background in cryptography but are interested in learning how to integrate it in their solutions, correctly and safely. …”
Libro electrónico -
5198por Foa, Edna B.“…Clients are exposed to safe but anxiety-provoking situations as a way of overcoming their trauma-related fears. …”
Publicado 2009
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
5199Publicado 2017“…She describes difficulty staying asleep, going to sleep, and early waking with complaints that during the day she is tired and sluggish. …”
Vídeo online -
5200Publicado 2021“…Automated vehicles heavily rely on accurate self-localization to operate safely and efficiently in dynamic road traffic scenarios. …”
Libro electrónico