Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,324
- Història 1,069
- Derecho penal 773
- Orígenes 614
- Origen 593
- Development 574
- Derechos humanos 520
- Tribunal Europeo de Derechos Humanos 513
- Application software 459
- Management 435
- History 430
- Universidad Pontificia de Salamanca (España) 405
- Criminal law 396
- Procedimiento penal 396
- Europa 383
- Law and legislation 368
- España 360
- Filosofía 338
- Engineering & Applied Sciences 337
- Derecho 310
- Hombre 302
- Data processing 301
- Cristianismo 279
- Crítica e interpretación 275
- Computer networks 269
- Computer Science 266
- Criminología 265
- Computer crimes 263
- Biblia 259
- Security measures 258
-
50641Publicado 2022“…In the last part of the course, you will learn to create Lambda for event-driven architecture, schedule your Lambda function: Cron in the cloud, and understand about CloudWatch live dashboards and widgets. …”
Video -
50642Publicado 2017“…The marketing guru of Caesars/Harrah's shows how you can double-down and win with a proven data-driven approach Walking through Caesars in Las Vegas may seem like a dream-the lights are not too bright, the temperature is perfect, and everything is within your reach. …”
Grabación no musical -
50643Publicado 2018“…Since Bitcoin appeared in 2009, the digital currency has been hailed as an Internet marvel and decried as the preferred transaction vehicle for all manner of criminals. It has left nearly everyone without a computer science degree confused: Just how do you "mine" money from ones and zeros? …”
Grabación no musical -
50644por Jakob, Silke“…Die Beiträge beleuchten Herausforderungen und Probleme, aber auch Lösungsansätze.; Times of crisis are difficult times. They hold challenges for individuals and society, but they do not have to have exclusively negative consequences. …”
Publicado 2022
Libro electrónico -
50645Publicado 2022“…In the book, you'll get up and running quickly whether you're brand new to computers or just transitioning from an older Mac or a PC. With the graphics-driven approach used successfully by tens of thousands of readers of the Teach Yourself VISUALLY series, you see exactly what each step of instruction should look like on your own screen and can follow--step-by-step--through the installation process, file management, email, and messaging, and much more. …”
Libro electrónico -
50646por Oberman, Michelle“…Meyer don't write for news magazines or prime-time investigative television shows, but the stories they tell hold the same fascination. …”
Publicado 2008
Libro electrónico -
50647Publicado 2023“…Es un ecosistema en ebullición y evolución constante, que tiene una amplia repercusión en todas las audiencias, pero especialmente en los millennials a través de una nueva manera de contar historias, reales o de ficción. …”
Libro electrónico -
50648Publicado 2022“…This book is a research-driven contribution to the occupational health and safety (OHS) space, with ONIHL as a focus case study, and it provides contemporary, contextually relevant, and responsive evidence related to ONIHL and HCPs in LMICs with a very specific focus. in the South African context. …”
Libro electrónico -
50649Publicado 2009“…This research/analysis focuses on an empirical analysis of the practical criminal law and the success of suspended sentence. …”
Libro electrónico -
50650Publicado 2020“…Techniques and Methods for Big Data driven research for Social Sciences and Social Impact: - Opinion Mining on Social Media; - Sentiment Analysis of User Preferences; - Sustainable Urban Communities; - Gender Based Check-In Behavior by Using Social Media Big Data; - Web Data-Mining Techniques; - Semantic Network Analysis of Legacy News Media Perception. …”
Libro electrónico -
50651Publicado 2020“…Researchers of PBL are developing a growing interest in qualitative research with a process-driven orientation to examining learning interactions. …”
Libro electrónico -
50652Publicado 2023“…Esta obra es el resultado de un esfuerzo colectivo de académicos que buscan entender la alimentación humana desde sus orígenes hasta el presente…”
Libro electrónico -
50653Publicado 2022“…A partir de más de 15.000 artículos publicados durante el primer año de pandemia en América Latina y España, el libro propone un estudio cuantitativo y cualitativo por campos epistémicos: i. geopolítico (por países, con especial atención a los del Sur y, por tanto, al replanteamiento de las relaciones Norte-Sur, paralelo al reenfoque de las relaciones Oriente-Occidente); ii. de género (cómo afecta a la mujer, cuerpos feminizados y colectivo LGTBIQ); iii. biopolítico (las principales ideas que han generado los discursos nacionales/transnacionales sobre las regulaciones sociales de nuestras formas de vida y de muerte durante la expansión de esta enfermedad); iv. filosófico-cultural, haciendo balance de los diferentes enfoques desde los que se ha abordado la pandemia de Covid-19, considerando cómo se han modulado en ellos las ideas de humanismo, cultura, arte, sociabilidad, ficción, afectos y otros conceptos del campo de la bioética…”
Libro electrónico -
50654por OECD“…"Fishing expeditions" are not authorised, but all foreseeably relevant information must be provided, including bank information and information held by fiduciaries, regardless of the existence of a domestic tax interest or the application of a dual criminality standard. All members of the Global Forum, as well as jurisdictions identified by the Global Forum as relevant to its work, are being reviewed. …”
Publicado 2016
Libro electrónico -
50655por OECD“…"Fishing expeditions" are not authorised, but all foreseeably relevant information must be provided, including bank information and information held by fiduciaries, regardless of the existence of a domestic tax interest or the application of a dual criminality standard. All members of the Global Forum, as well as jurisdictions identified by the Global Forum as relevant to its work, are being reviewed. …”
Publicado 2016
Libro electrónico -
50656por OECD“…"Fishing expeditions" are not authorised, but all foreseeably relevant information must be provided, including bank information and information held by fiduciaries, regardless of the existence of a domestic tax interest or the application of a dual criminality standard. All members of the Global Forum, as well as jurisdictions identified by the Global Forum as relevant to its work, are being reviewed. …”
Publicado 2015
Libro electrónico -
50657por OECD“…"Fishing expeditions" are not authorised, but all foreseeably relevant information must be provided, including bank information and information held by fiduciaries, regardless of the existence of a domestic tax interest or the application of a dual criminality standard. All members of the Global Forum, as well as jurisdictions identified by the Global Forum as relevant to its work, are being reviewed. …”
Publicado 2013
Libro electrónico -
50658Publicado 2024Tabla de Contenidos: “…16 Extensions of Smooth Small Distortions: Picking Motions -- Lemma 16.1 -- Lemma 16.2 -- 17 Extensions of Smooth Small Distortions: Unity Partitions -- 18 Extensions of Smooth Small Distortions: Function Extension -- Lemma 18.1 -- Lemma 18.2 -- 19 Equidistribution: Extremal Newtonian-like Configurations, Group Invariant Discrepancy, Finite Fields, Combinatorial Designs, Linear Independent Vectors, Matroids and the Maximum Distance Separable Conjecture -- 19.1 s-extremal Configurations and Newtonian s-energy -- 19.2 [−1, 1] -- 19.2.1 Critical Transition -- 19.2.2 Distribution of s-extremal Configurations -- 19.2.3 Equally Spaced Points for Interpolation -- 19.3 The n-dimensional Sphere, Sn Embedded in Rn +1 -- 19.3.1 Critical Transition -- 19.4 Torus -- 19.5 Separation Radius and Mesh Norm for s-extremal Configurations -- 19.5.1 Separation Radius of s> -- n-extremal Configurations on a Set Yn -- 19.5.2 Separation Radius of s< -- n − 1-extremal Configurations on Sn -- 19.5.3 Mesh Norm of s-extremal Configurations on a Set Yn -- 19.6 Discrepancy of Measures, Group Invariance -- 19.7 Finite Field Algorithm -- 19.7.1 Examples -- 19.7.2 Spherical ̂t-designs -- 19.7.3 Extension to Finite Fields of Odd Prime Powers -- 19.8 Combinatorial Designs, Linearly Independent Vectors, MDS Conjecture -- 19.8.1 The Case q=2 -- 19.8.2 The General Case -- 19.8.3 The Maximum Distance Separable Conjecture -- 20 Covering of SU(2) and Quantum Lattices -- 20.1 Structure of SU(2) -- 20.2 Universal Sets -- 20.3 Covering Exponent -- 20.4 An Efficient Universal Set in PSU(2) -- 21 The Unlabeled Correspondence Configuration Problem and Optimal Transport -- 21.1 Unlabeled Correspondence Configuration Problem -- 21.1.1 Non-reconstructible Configurations -- 21.1.2 Example -- 21.1.3 Partition Into Polygons -- 21.1.4 Considering Areas of Triangles-10-step Algorithm…”
Libro electrónico -
50659Publicado 2023“…By the end of this book, you'll have become a pro at using automation testing to build better Power Apps, reduce app release times, and increase the quality of your applications. …”
Libro electrónico -
50660Publicado 2023“…This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security.It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval.The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. …”
Libro electrónico