Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 839
- Filosofía 497
- Universidad Pontificia de Salamanca (España) 408
- History 320
- Crítica e interpretación 292
- Biblia 234
- Derecho 226
- Philosophy 175
- Història 174
- Universidad Pontificia de Salamanca, Facultad de Educación 166
- Verdad 166
- Business & Economics 165
- Literatura 164
- Trusts 152
- Management 134
- Política y gobierno 132
- Iglesia Católica 131
- RELIGION 130
- Trusts industriales 119
- Leadership 117
- Documentales 114
- Poesía española 108
- Educación 101
- Novela española 92
- Frutas 89
- History and criticism 86
- Technology 85
- Economics, finance, business & management 82
- Social aspects 82
- Derecho administrativo 80
-
16641por Tooley, Michael H.Tabla de Contenidos: “…2.8 Review questions3 Torsion and shafts; 3.1 Review of shear stress and strain; 3.2 Engineers' theory of torsion; 3.3 Polar second moment of area; 3.4 Power transmitted by a shaft; 3.5 Composite shafts; 3.6 Chapter summary; 3.7 Review questions; 4 Pressure vessels; 4.1 Thin-walled pressure vessels; 4.2 Thick-walled pressure vessels; 4.3 Pressure vessel applications; 4.4 Chapter summary; 4.5 Review questions; 5 Concentrically loaded columns and struts; 5.1 Slenderness ratio, radius of gyration and effective length; 5.2 Euler's theory and the Rankine-Gordon relationship; 5.3 Chapter summary…”
Publicado 2012
Libro electrónico -
16642Publicado 2024Tabla de Contenidos: “…Medusa's Combat and Andromeda's Rescue -- 3.3. Indra(/Br̥haspati), Trita Āptya and Θraētaona, Son of Āθβiia -- 3.4. …”
Libro electrónico -
16643por Milano, AdrianoTabla de Contenidos: “…La unión conlos Aldao -- CAPÍTULO2 -- Trato, comercio y compañía.Las primeras asociaciones de Francisco AntonioCandiotihasta el año 1800 -- El capital relacional de Candioti en Santa Fe -- Los Larramendi -- Los Lacoizqueta y los Diez de Andino -- Candioti en el grupo de hacendados y comerciantes. …”
Publicado 2022
Libro electrónico -
16644Publicado 2008Tabla de Contenidos: “…Ávila Seoane: La justicia real en el trato cotidiano bajo los Reyes Católicos — S. Caballero Escamilla: El caso del Santo Niño de la Guardia y sus efectos sobre la convivencia entre culturas en la ciudad de Ávila — P. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad de Navarra)Libro -
16645por Carrillo Urrego, AbelardoTabla de Contenidos: “….) -- 3.2.1 EL CUIDADO DE LAS NIÑAS Y LOS NIÑOS -- 3.2.2 TRATO DIFERENCIADO HACIALAS HIJAS Y LOS HIJOS POR PARTE DE LOS (...) -- 3.2.3 EDUCACIÓN Y DISCIPLINAMIENTO DE LAS HIJAS Y LOS HIJOS POR PARTE DE (...) -- 3.2.4 LA PERCEPCIÓN DE LAS CAUSAS Y LOS MOTIVOS DE LOS CASTIGOS -- 3.2.5 RELACIÓN ENTRE PADRES E HIJAS E HIJOS Y MANIFESTACIONES DE CERCANÍA (...) -- 3.2.6 FACTORES Y/O AGENTES MODERADORES O INTENSIFICADORES DE LOS CASTIGOS (...) -- 3.3 EL PAPEL DEL ORIGEN RURAL O URBANO EN LAS RELACIONES ENTRE PADRES, (...) -- 3.3.1 EL CUIDADO DE LAS HIJ AS Y LOS HIJOS -- 3.3.2 TRATO DIFERENCIADO HACIA LAS Y LOS HIJ OS POR PARTE DE LOS PADRES U (...) -- 3.3.3 DISCIPLINAMIENTO DE LAS HIJAS Y LOS HIJOS -- 3.3.4 LA PERCEPCIÓN DE LAS CAUSAS Y LOS MOTIVOS DE LOS CASTIGOS -- 3.4 VALORACIONES DE LAS PRÁCTICAS DISCIPLINARIAS QUE LOS PADRES LES (...)…”
Publicado 2020
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
16646Publicado 2018Tabla de Contenidos: “…Regular expressions -- Wrapping up with Ruby basics -- Developing custom modules -- Building a module in a nutshell -- The architecture of the Metasploit framework -- Understanding the file structure -- The libraries layout -- Understanding the existing modules -- The format of a Metasploit module -- Disassembling the existing HTTP server scanner module -- Libraries and the function -- Writing out a custom FTP scanner module -- Libraries and functions -- Using msftidy -- Writing out a custom SSH-authentication with a brute force attack -- Rephrasing the equation -- Writing a drive-disabler post-exploitation module -- Writing a credential harvester post-exploitation module -- Breakthrough Meterpreter scripting -- Essentials of Meterpreter scripting -- Setting up persistent access -- API calls and mixins -- Fabricating custom Meterpreter scripts -- Working with RailGun -- Interactive Ruby shell basics -- Understanding RailGun and its scripting -- Manipulating Windows API calls -- Fabricating sophisticated RailGun scripts -- Summary and exercises -- Chapter 3: The Exploit Formulation Process -- The absolute basics of exploitation -- The basics -- The architecture -- System organization basics -- Registers -- Exploiting stack-based buffer overflows with Metasploit -- Crashing the vulnerable application -- Building the exploit base -- Calculating the offset -- Using the pattern_create tool -- Using the pattern_offset tool -- Finding the JMP ESP address -- Using the Immunity Debugger to find executable modules -- Using msfpescan -- Stuffing the space -- Relevance of NOPs -- Determining bad characters -- Determining space limitations -- Writing the Metasploit exploit module -- Exploiting SEH-based buffer overflows with Metasploit -- Building the exploit base -- Calculating the offset -- Using the pattern_create tool -- Using the pattern_offset tool…”
Libro electrónico -
16647por Dave, Parag H.Tabla de Contenidos: “…A Simple Design Procedure for Loops Based on Proof-Rules -- Example 1: Linear Search -- Example 2: Linear Search without Assurance -- Example 3: Searching a 2-D Array -- Example: Selection Sort -- Example: Partition -- Summary -- Key Terms -- Exercises -- Web Resources -- Design Using Recursion -- Objectives -- Introduction -- Execution Trace -- Regular Expressions -- An Interesting Recursive Function -- Another Look at Iteration and Recursion -- Summary -- Key Terms -- Exercises -- Web Resources -- Abstract Algorithms-1-Divide-and-Conquer -- Objectives -- Introduction -- A Multiplication Algorithm -- Analysis of the Multiplication Algorithm -- Application to Graphics Algorithms -- Introduction to Triangulation -- Convex Hulls -- Where D & C Fails -- Characteristics of Problems for which D & C is Unsuitable -- Timing Analysis -- Summary -- Key Terms -- Exercises -- Web Resources -- Abstract Algorithms 2-Greedy Methods -- Objectives -- Introduction -- Example-Knapsack Problem -- Job Sequencing with Deadlines -- Example-Minimum Spanning Trees -- Prim's Algorithm -- Kruskal's Algorithm -- 1st Version-Kruskal.c -- Union-Find Data-Structure -- Tree-Based Disjoint sets and the Quick-Union Algorithm -- Implementing Quick-Union with an Array -- Complexity Analysis of Quick-Union -- Using Union-find in Kruskal Algorithm -- Matroids -- Correctness of Kruskal's Algorithm -- Example [Shortest Path] -- Dijkstra's Shortest Path Algorithm -- Summary -- Key Terms -- Exercises -- Web Resources -- Abstract Algorithms 3-Dynamic Programming -- Objectives -- Introduction -- Example-Multistage Graphs -- Example-Traveling Salesman -- Example-Matrix Multiplication -- Brute Force Solution-Try all Possible Parenthesisations -- Dynamic Programming -- Example-Longest Common Sub-sequence -- Brute Force Method -- Dynamic Programming -- Example-Optimal Polygon Triangulation…”
Publicado 1900
Libro electrónico -
16648Publicado 2024Tabla de Contenidos: “…Exploiting Windows services and applications -- Server-side exploits -- Client-side exploits -- Exploring the Windows Registry -- Windows Registry exploitation -- Exploiting the Windows logs -- Summary -- Lab -- Brute force password crack -- Rainbow table crack -- Assessment -- Answers -- Chapter 6: Hacking the Linux Operating System -- Exploiting the Linux operating system -- Exploring the Linux filesystem -- Exploiting the filesystem -- Linux hidden files -- Important files -- Exploiting Linux networking -- Exploiting Linux authentication -- Cracking passwords -- Linux updates and patching -- The Linux logging system -- Exploiting the Linux kernel -- Checking your kernel version -- Exploiting the kernel -- Lab -- Summary -- Assessment -- Answers -- Chapter 7: Ethical Hacking of Web Servers -- Web servers' architecture, configuration, and vulnerabilities -- Adding processing logic -- Threats, vulnerabilities, and exploits to web services -- Web server authentication -- Basic authentication -- OAuth -- Some real-world web servers and ways to combat attacks -- IIS hardening tasks -- Apache web server hardening tasks -- Types of web server/website attacks -- Website defacement -- DoS/DDoS attack -- HTTP response-splitting attack -- Cross-Site Request Forgery -- Deep linking -- Directory traversal attack -- Man-in-the-Middle/sniffing attack -- Cookie tampering -- Cookie-based session attacks -- Session hijacking -- DNS -- Lab -- Summary -- Assessment -- Answer -- Chapter 8: Hacking Databases -- Finding databases on the network -- Discovering databases on the network -- Mitigating database discovery -- Exploring databases and database structures -- Database threats and vulnerabilities -- Network-based database attacks -- Database engine faults and bugs -- Brute-force attacks on weak or default passwords -- Misconfigurations -- Remote code execution…”
Libro electrónico -
16649Publicado 2022Tabla de Contenidos: “…Supervised learning -- Unsupervised learning -- Reinforcement learning -- Chapter 10 Employing Machine Learning in AI -- Taking Many Different Roads to Learning -- Discovering five main approaches to AI learning -- Delving into the three most promising AI learning approaches -- Awaiting the next breakthrough -- Exploring the Truth in Probabilities -- Determining what probabilities can do -- Considering prior knowledge -- Envisioning the world as a graph -- Growing Trees that Can Classify -- Predicting outcomes by splitting data -- Making decisions based on trees -- Pruning overgrown trees -- Chapter 11 Improving AI with Deep Learning -- Shaping Neural Networks Similar to the Human Brain -- Introducing the neuron -- Starting with the miraculous perceptron -- Mimicking the Learning Brain -- Considering simple neural networks -- Figuring out the secret is in the weights -- Understanding the role of backpropagation -- Introducing Deep Learning -- Explaining the differences between deep learning and other forms of neural networks -- Finding even smarter solutions -- Detecting Edges and Shapes from Images -- Starting with character recognition -- Explaining how convolutions work -- Advancing using image challenges -- Learning to Imitate Art and Life -- Memorizing sequences that matter -- Discovering the magic of AI conversations -- Going for the state of the pretrained art -- Making one AI compete against another AI -- Pondering reinforcement learning -- Part 4 Working with AI in Hardware Applications -- Chapter 12 Developing Robots -- Defining Robot Roles -- Overcoming the sci-fi view of robots -- Being humanoid can be hard -- Working with robots -- Assembling a Basic Robot -- Considering the components -- Sensing the world -- Controlling a robot -- Chapter 13 Flying with Drones -- Acknowledging the State of the Art -- Flying unmanned to missions…”
Libro electrónico -
16650Nonprofit kit forNonprofit Kit For DummiesPublicado 2022Tabla de Contenidos: “…-- Conducting Your Evaluation -- Analyzing Results and Putting Them to Work -- Interpreting results -- Using your evaluation to strengthen your work -- Telling the truth -- Sharing the evaluation results with your stakeholders -- Chapter 10 You Can Count on Me! …”
Libro electrónico -
16651Publicado 2015Tabla de Contenidos: “…-- Making Decisions with Logic -- Beginning with bits -- Processing data with gates -- Simplifying gates with truth tables -- Creating logical components -- Using ICs -- Identifying ICs with part numbers -- Packaging is everything -- Probing IC pinouts -- Relying on IC datasheets -- Using Your Logic -- Seeing the light at the end of the NAND gate -- Turning three NAND gates into an OR gate -- Hanging Out with Some Popular ICs -- Operational amplifiers -- IC time machine: the 555 timer -- Counting on the 4017 decade counter -- Microcontrollers -- Other popular ICs -- Chapter 12 Acquiring Additional Parts -- Making Connections -- Choosing wires wisely -- Plugging in to connectors -- Powering Up -- Turning on the juice with batteries -- Getting power from the sun -- Using wall power to supply higher DC current or voltage (not recommended) -- Using Your Sensors -- Seeing the light -- Capturing sound with microphones -- Feeling the heat -- More energizing input transducers -- Experiencing the Outcome of Electronics -- Speaking of speakers -- Sounding off with buzzers -- Creating good vibrations with DC motors -- Part III Getting Serious about Electronics -- Chapter 13 Preparing Your Lab and Ensuring Your Safety -- Picking a Place to Practice Electronics -- The top ingredients for a great lab -- Workbench basics -- Acquiring Tools and Supplies -- Amassing a multimeter -- Stockpiling soldering equipment -- Hoarding hand tools -- Collecting cloths and cleansers -- Loading up on lubricants -- Stocking up on sticky stuff -- Other tools and supplies -- Stocking Up on Parts and Components -- Solderless breadboards -- Circuit‐building starter kit…”
Libro electrónico -
16652por Schilling, MartinTabla de Contenidos: “…Organizational chart and roles -- Practice 49: Defining the roles & -- responsibilities for a marketing function -- Practice 50: Scaling the right marketing roles at the right time -- Marketing basics -- Practice 51: Establishing a single source of truth for key marketing and growth KPIs -- Practice 52: Bridging the gap between marketing quants and creative brains -- Practice 53: Equipping your teams with the right marketing and growth tools -- Practice 54: Finding your product-channel fit quickly and maintaining it -- Organic and viral marketing -- Practice 55: Leveraging the power of organic conversions to drive down customer acquisition costs -- Practice 56: Getting your PR machine up with trust -- Paid online marketing -- Practice 57: Harnessing the six key hacks for buying online ads efficiently -- Offline marketing -- Practice 58: Leveraging the power of offline marketing in the digital age -- Monetization -- Practice 59: Nailing your monetization strategy to drive revenue -- Growth hacking -- Practice 60: Establishing cross-functional growth hacking teams for activation, retention and monetization -- 8 B2B Sales Excellence: Creating brand advocates & -- pipelines full of sales opportunities -- OKRs -- Practice 61: Establishing the right sales OKRs -- Organizational chart and roles -- Practice 62: Defining the roles & -- responsibilities for a sales function -- Practice 63: Scaling the right sales roles at the right time -- Sales playing field -- Practice 64: Exploiting the right niches -- Sales basics -- Practice 65: Creating a commission plan that fits your growth stage -- Practice 66: Enabling your sales teams with the right sales tech stack -- Practice 67: Attracting and hiring a world-class sales team -- Practice 68: Training and coaching a "challenger" sales team -- Practice 69: Getting your basic sales pitch in place…”
Publicado 2022
Libro electrónico -
16653por Gurfinkel, ArieTabla de Contenidos: “…3.3 Neural Controller Approximation -- 4 Experiments -- 5 Related Work -- 6 Conclusion -- References -- Cyberphysical and Hybrid Systems -- Using Four-Valued Signal Temporal Logic for Incremental Verification of Hybrid Systems -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 Preliminaries and Problem Statement -- 2.1 Intervals -- 2.2 Truth Values -- 2.3 Signals -- 2.4 Reachability Analysis of Hybrid Systems -- 2.5 Signal Temporal Logic with Boolean Semantics -- 2.6 Problem Statement -- 3 Basic Idea and Solution Concept -- 4 Four-Valued Signal Temporal Logic -- 4.1 Computing Boolean Satisfaction Signals -- 4.2 Computing Three-Valued Satisfaction Signals -- 4.3 Computing Four-Valued Satisfaction Signals -- 5 Incremental Verification of Hybrid Systems -- 5.1 Incremental Verification Algorithm -- 5.2 Refinement via Branching the Reachability Analysis -- 6 Evaluation -- 6.1 Bouncing Ball -- 6.2 Autonomous Driving -- 6.3 Genetic Oscillator -- 7 Conclusion -- References -- Optimization-Based Model Checking and Trace Synthesis for Complex STL Specifications -- 1 Introduction -- 2 Preliminaries -- 2.1 Signal Temporal Logic -- 2.2 Finite Variability -- 3 Problem Formulation -- 4 Variable-Interval Encoding of STL to MILP -- 4.1 -Stable Partitions -- 4.2 Variable-Interval MILP Encoding -- 5 System Models and Their MILP Encoding -- 5.1 HAs with Closed-Form Solutions -- 5.2 HAs with Double Integrator Dynamics -- 6 Implementation and Experiments -- References -- Inner-Approximate Reachability Computation via Zonotopic Boundary Analysis -- 1 Introduction -- 2 Preliminaries -- 2.1 Notation -- 2.2 Problem Statement -- 3 Methodology -- 3.1 Inner-Approximation Computation Framework -- 3.2 Extraction of Zonotopes' Boundaries -- 3.3 Zonotopal Tiling and Boundary Refinement -- 3.4 Contracting Computed Outer-Approximation -- 4 Experiments…”
Publicado 2024
Libro electrónico -
16654por Viscardi, StaciaTabla de Contenidos: “…-- Learn to look into your reflection -- Portrait of a leader -- Selfless, confident, and accountable -- Open to feedback -- Builds trust -- Leads with Theory Y -- Honest -- How to become a better ScrumMaster -- Empower yourself and others! …”
Publicado 2013
Libro electrónico -
16655Publicado 2024Tabla de Contenidos: “…-- How to manage data quality -- Accuracy -- Completeness -- Consistency -- Timeliness -- Validity -- Uniqueness -- Reliability -- Data quality management systems -- Completely decentralized -- Completely centralized -- The hybrid approach -- Build versus buy -- Popular data quality frameworks and tools -- Summary -- Chapter 10: Master Data Management -- Single source of truth -- What causes discrepancies in master data? …”
Libro electrónico -
16656Publicado 2023Tabla de Contenidos: “…References -- 15. The Post-Truth Era -- 15.1 Learning Outcomes -- 15.2 Introduction - Before and After COVID-19 -- 15.3 Technology - Big Data, Algorithms and Artificial Intelligence -- 15.4 Growth Areas in and Challenges for the PR Industry -- 15.5 Diversity and Inclusion -- 15.6 Careers and Internships -- References -- Index…”
Libro electrónico -
16657por Ortiz Anaya, HéctorTabla de Contenidos: “…. -- Costo de ventas -- Empresas comercializadoras -- Empresas manufactureras o productivas -- Materia prima (MP) -- Mano de obra directa (MOD) -- Costos indirectos de fabricación (CIF) -- Costo de la mercancía terminada (fabricación) -- Costo de producción -- Empresas de servicios -- Utilidad bruta -- Gastos operacionales -- Gastos de administración -- Gastos de ventas -- Utilidad operacional -- Gastos no operacionales -- Ingresos no operacionales -- Corrección monetaria -- Provisión para impuesto de renta -- Utilidad neta -- Terminos claves -- Resumen -- Preguntas para análisis y discusión -- Practica -- Casos -- 1. …”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
16658Publicado 2019“…Desde hace varias décadas varios mirmecólogos nacionales y foráneos han venido coleccionando, describiendo, estudiando y divulgando la rica mirmecofauna de Colombia y el Neotrópico. Fruto de este trabajo es esta propuesta de libro que se ha venido gestando desde hace unos tres años, con la actividad conjunta de tres editores (R. …”
Acceso restringido con credenciales UPSA
Libro electrónico -
16659por Ventura Ruperti“…Aspectos prácticos tan habituales como la gestión del poder, la comunicación, la confianza, el liderazgo, el conflicto, los recursos, entre muchos otros, se analizan y comentan desde una óptica práctica pero amplia y con toda la objetividad que permite una inevitable visión propia, fruto de un dilatado recorrido personal y profesional al frente de numerosos equipos humanos, en ámbitos muy distintos, de culturas diferentes y con objetivos dispares. …”
Publicado 2017
Texto completo en Odilo
Otros -
16660por Victoria Martín de la Torre“…Los hechos, datos y conversaciones aquí expuestos son fruto de un exhaustivo trabajo de investigación basado en las memorias de los Padres de Europa, los artículos de prensa de la época, los discursos públicos y los archivos históricos de las diferentes instituciones y, de forma particular, en una serie de entrevistas realizadas por la autora a personas que conocieron y trabajaron estrechamente con los protagonistas del libro…”
Publicado 2017
Texto completo en Odilo
Otros