Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,213
- Usos y costumbres 2,908
- Bible 1,923
- Bíblia 1,278
- Historia 1,198
- RELIGION 1,015
- Crítica e interpretación 421
- Criticism, interpretation, etc 373
- History 272
- Història 269
- Crítica, interpretación, etc 257
- Comentarios 229
- Engineering & Applied Sciences 228
- Crítica, interpretació, etc 211
- crítica e interpretación 205
- Descripción y viajes 194
- Religion 184
- Business & Economics 176
- Doble imposición 172
- Theology 155
- Computer Science 147
- Application software 146
- Transportation 143
- Computer networks 142
- Development 141
- Operating systems (Computers) 127
- Web sites 126
- Design 121
- Historia y crítica 120
- Transport 116
-
27401Publicado 2009Tabla de Contenidos: “…""Cover""; ""Table of Contents""; ""Title Page""; ""Introduction""; ""Part I: Building the Background""; ""Chapter 1 : Defining Data Loss""; ""Chapter 2: Examining Your Data Environment""; ""Chapter 3 : Governance, Risk, and Compliance""; ""Chapter 4 : Data Loss and You""; ""Chapter 5 : Calculating the Value of Your Data""; ""Chapter 6: The Price of Your Data to Others""; ""Part II: Starting with the Endpoint""; ""Chapter 7: IT Security""; ""Chapter 8 : Protecting the Endpoint""; ""Chapter 9 : USB Devices and Removable Media""; ""Chapter 10 : Mobile Phones and PDAs""…”
Libro electrónico -
27402Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started -- Programming language -- Data types -- Value types -- Structs -- Enumerations -- Reference types -- Strings -- Object -- Dynamic -- Classes -- Interfaces -- Delegates -- Installation and configuration of the IDE -- Creating the project -- Input and output -- Reading from input -- Writing to output -- Launching and debugging -- Summary -- Chapter 2: Arrays and Lists -- Arrays -- Single-dimensional arrays -- Example - month names -- Multi-dimensional arrays -- Example - multiplication table -- Example - game map -- Jagged arrays -- Example - yearly transport plan -- Sorting algorithms -- Selection sort -- Insertion sort -- Bubble sort -- Quicksort -- Simple lists -- Array list -- Generic list -- Example - average value -- Example - list of people -- Sorted lists -- Example - address book -- Linked lists -- Example - book reader -- Circular-linked lists -- Implementation -- Example - spin the wheel -- Summary -- Chapter 3: Stacks and Queues -- Stacks -- Example - reversing words -- Example - Tower of Hanoi -- Queues -- Example - call center with a single consultant -- Example - call center with many consultants -- Priority queues -- Example - call center with priority support -- Summary -- Chapter 4: Dictionaries and Sets -- Hash tables -- Example - phone book -- Dictionaries -- Example - product location -- Example - user details -- Sorted dictionaries -- Example - definitions -- Hash sets -- Example - coupons -- Example - swimming pools -- Sorted" sets -- Example - removing duplicates -- Summary -- Chapter 5: Variants of Trees -- Basic trees -- Implementation -- Node -- Tree -- Example - hierarchy of identifiers -- Example - company structure -- Binary trees -- Implementation -- Node -- Tree…”
Libro electrónico -
27403Publicado 2023Tabla de Contenidos: “…Armenian dispute poem on wine / Sergio La Porta -- "My city which is of Bronze" the city of Bronze encroaching on the Alexander Romance / Alex MacFarlane -- Between Gusan and Ašuł Yohannēs Xlat'ec'i and the Porous borders negotiated by the Medieval Armenian bard / S. …”
Libro electrónico -
27404por Spurgeon, Charles E.Tabla de Contenidos: “…Ethernet: The Definitive Guide; Scalability; Reliability; Widely Available Management Tools; Design for Reliability; Organization of This Book; Part II; Part III; Part IV; Part V; Online References; How to Use This Book; Conventions Used in This Book; How to Contact Us; Acknowledgments; I. …”
Publicado 2009
Libro electrónico -
27405Publicado 2021Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- List of Contributors -- Acknowledgments -- 1 Introduction -- 2 Overview -- Revolution # 1 - Television Enters the Scene -- Revolution # 2 - We Go Digital and Files Replace Physical Media -- Revolution # 3 - Multiplatform Distribution -- Revolution # 4 - Things Get Cloudy -- 3 Production -- Cameras -- The Types of Cameras and Their Uses -- The Basics of Digital Cameras -- The Implications of Camera Imaging Sensor Choice on System Requirements -- The Various Forms of Color Coding & -- Color Spaces -- What Does Gamma and Log Processing Mean? …”
Libro electrónico -
27406por Pereyra, IreneTabla de Contenidos: “…Cover -- Title -- Contents -- Preface -- Consider -- 01 The user comes first. -- 02 Work on UX and UI simultaneously. -- 03 UI makes or breaks usability. -- 04 Always surpass expectations. -- 05 Design is not neutral. -- 06 Words matter. -- 07 Visual metaphors communicate fastest. -- 08 Attractive products are more usable. -- 09 People remember the unusual. -- 10 First and last items are remembered most. -- 11 Less is more. -- 12 Less is a bore. -- 13 Provide feedback quickly or else. -- 14 Friction isn't always bad. -- 15 First impressions matter. -- 16 UX design isn't timeless. -- 17 Nothing last forever. -- Empathize -- 18 Accessibility first. -- 19 Allow for differences in digital literacy. -- 20 Take extra care of seniors. -- 21 Children are not small adults. -- 22 Design for learnability. -- 23 Don't just design for novices. -- 24 Make the choice easy. -- 25 Diverse teams create better solutions. -- 26 Context matters more than screen size. -- 27 Design for clumsy handling. -- 28 Match the real world. -- 29 Know when to break with convention. -- 30 Persuade, don't coerce. -- 31 Design for passive attention. -- 32 Know the purpose. -- 33 Only interrupt when necessary. -- 34 Make notifications valuable. -- 35 Minimize form input. -- 36 Little time, little design. -- 37 Rules are meant to be broken. -- Define -- 38 Choose the right client. -- 39 Be a good detective. -- 40 Gather requirements. -- 41 Define the problem statement. -- 42 Find shortcuts. -- 43 Done is better than perfect. -- 44 Underpromise and overdeliver. -- 45 Introduce complexity only when necessary. -- 46 Some complexity cannot be reduced. -- 47 Imagine the user journey. -- 48 Create a user flow. -- 49 Remove barriers and obstacles. -- 50 What isn't there matters. -- 51 Pointing devices inform functionality. -- Research -- 52 Design cannot be fully objective…”
Publicado 2023
Libro electrónico -
27407Publicado 2005“…Collé Ardo viu en un petit poble de l'Àfrica. Fa set anys, no va permetre que la seva filla fos sotmesa a l'ablació, una pràctica que li sembla una barbàrie. …”
-
27408por Alfonso de MadrigalVenda en línia de reproduccions digitals
Publicado 1506
Accés lliure
991005121989706719 -
27409
-
27410por Benet XIV, papa, 1675-1758Accés lliure a V.1-V.3 (T.1-T.11)
Publicado 1767
Accés lliure a V.4.T13
Accés lliure a V.4.T12
Accés lliure a V.4.T15
Accés lliure a V.4.T14
991004989409706719 -
27411Publicado 2011Tabla de Contenidos: “…Cover -- Accounts Demystified -- Contents -- About the author -- Preface -- Acknowledgements -- Prologue -- Introduction -- Part 1: The basics of accounting -- The balance sheet and the fundamental principle -- Assets, liabilities and balance sheets -- Sarah's 'personal' balance sheet -- The balance sheet of a company -- The balance sheet chart -- Summary -- Creating a balance sheet -- Procedure for creating a balance sheet -- SBL's balance sheet -- The different forms of balance sheet -- Basic concepts of accounting -- Summary -- The profit & loss account and cash flow statement -- The profit & loss account -- The cash flow statement -- 'Definitive' vs 'descriptive' statements -- Summary -- Creating the profit & loss account and cash flow statement -- Creating the profit & loss account -- Creating the cash flow statement -- Summary -- Book-keeping jargon -- Basic terminology -- The debit and credit convention -- Part 2: Interpretation of accounts -- Wingate's annual report -- Accounting rules -- The reports -- Assets -- Liabilities -- Shareholders' equity -- Terminology -- The P&L and cash flow statement -- The notes to the accounts -- Summary -- Further features of company accounts -- Investments -- Associates and subsidiaries -- Accounting for associates -- Accounting for subsidiaries -- Funding -- Debt -- Equity -- Revaluation reserves -- Statement of recognised gains and losses -- Note of historical cost profits and losses -- Intangible fixed assets -- Pensions -- Leases -- Corporation tax -- Exchange gains and losses -- Fully diluted earnings per share -- Summary -- Part 3: Analysing company accounts -- Financial analysis - introduction -- The ultimate goal -- The two components of a company -- The general approach to financial analysis -- Wingate's highlights -- Summary -- Analysis of the enterprise -- Return on capital employed (ROCE)…”
Libro electrónico -
27412por Monk, SimonTabla de Contenidos: “…Preface; What You Will Need; How to Use this Book; Conventions Used in This Book; Using Code Examples; Safari® Books Online; How to Contact Us; Acknowledgments; Chapter 1. …”
Publicado 2012
Libro electrónico -
27413Publicado 2022Tabla de Contenidos: “…Objective -- Strategy -- Example -- Case study 3 - CTI for Level 3 organizations -- Objective -- Strategy -- Example -- Installing the MISP platform (optional) -- Summary -- Section 2: Cyber Threat Analytical Modeling and Defensive Mechanisms -- Chapter 6: Cyber Threat Modeling and Adversary Analysis -- Technical requirements -- The strategic threat modeling process -- Identifying and decomposing assets -- Adversaries and threat analysis -- Attack surfaces and threat vectors -- Adversary analysis use case - Twisted Spider -- Identifying countermeasures -- System re-evaluation -- Threat modeling methodologies -- Threat modeling with STRIDE -- Threat modeling with NIST -- Threat modeling use case -- Equifax data breach summary -- Threat modeling for ABCompany -- Advanced threat modeling with SIEM -- User behavior logic -- Benefits of UBA -- UBA selection guide - how it works -- Adversary analysis techniques -- Adversary attack preparation -- Attack preparation countermeasures -- Adversary attack execution -- Attack execution mitigation procedures -- Summary -- Chapter 7: Threat Intelligence Data Sources -- Technical requirements -- Defining the right sources for threat intelligence -- Internal threat intelligence sources -- External threat intelligence sources -- Organization intelligence profile -- Threat feed evaluation -- Threat data quality assessment -- Open Source Intelligence Feeds (OSINT) -- Benefits of open source intelligence -- Open source intelligence portals -- OSINT platform data insights (OSINT framework) -- OSINT limitations and drawbacks -- Malware data for threat intelligence -- Benefits of malware data collection -- Malware components -- Malware data core parameters -- Other non-open source intelligence sources -- Benefits of paid intelligence -- Paid threat intelligence challenges -- Some paid intelligence portals…”
Libro electrónico -
27414por Cadenas Sanchez, XavierTabla de Contenidos:
Publicado 2006Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
27415Publicado 2019Tabla de Contenidos: “…ANÁLISIS DE CERCHAS ESTÁTIAMENTE DETERMINADAS -- INTRODUCCIÓN -- TIPOS DE CERCHAS -- MÉTODOS DE ANÁLISIS Y CONVENCIÓN DE SIGNOS -- ANÁLISIS DE CERCHAS SIMPLES PLANAS Y VIGAS EN -- CAPÍTULO 7. CABLES Y ARCOS -- INTRODUCCIÓN -- ANÁLISIS DE CABLES -- ANÁLISIS DE ARCOS -- CAPÍTULO 8. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
27416Publicado 2013Tabla de Contenidos: “…; ""Karen Sonik""; ""On the Theogonies of Hesiod and the Hurrians""; ""An Exploration of the Dual Natures of TeÅ¡Å¡ub and Kumarbi""; ""Dennis R.M. Campbell""; ""Creation in the Bible and the Ancient Near East""; ""W. …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
27417por Charpin, DominiqueTabla de Contenidos: “…-- Des traités mis par écrit -- Les procédures de mise par écrit -- Les caractéristiques externes des traités -- La vie postérieure des textes -- Forme et contenu des traités -- La structure générale des traités -- Les clauses -- La garantie divine -- Les dieux garants -- Les malédictions -- Les sanctions divines -- Les échanges de biens et de femmes -- Les échanges de biens -- Les mariages dynastiques -- Rites amorrites, Traités hittites, Adê néo-assyriens et alliances dans la Bible -- La comparaison avec les textes hittites -- La comparaison avec les textes néo-assyriens -- La comparaison avec les textes et pratiques d'époque amorrite -- Sources et études -- L'histoire des découvertes -- La conclusion des alliances : gestes et paroles -- Des traités mis par écrit -- Forme et contenu des traités -- La garantie divine -- Les échanges de biens et de femmes -- Rites amorrites, Traités hittites, Adê néo-assyriens et alliances dans la Bible -- Pour conclure -- Quelques repères chronologiques -- Index des textes cités -- Crédits iconographiques…”
Publicado 2019
Electrónico -
27418Tabla de Contenidos:Libro electrónico
-
27419Publicado 2014Tabla de Contenidos: “…: teaching writing in a violent world / Elizabeth Vander Lei -- A question of truth : reading the Bible, rhetoric, and Christian tradition / Beth Daniell -- The Jewish context of Paul's rhetoric / Bruce Herzberg -- Resistance to rhetoric in Christian tradition / Thomas Amorose…”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
27420por V. V. A. A.Tabla de Contenidos: “…1. Flight of the Bumble-bee (1:15) ; 2. None but the Lonely Heart (3:17) ; 3. …”
Publicado 1990
CDROM