Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,213
- Usos y costumbres 2,908
- Bible 1,923
- Bíblia 1,278
- Historia 1,198
- RELIGION 1,015
- Crítica e interpretación 421
- Criticism, interpretation, etc 373
- History 272
- Història 269
- Crítica, interpretación, etc 257
- Comentarios 229
- Engineering & Applied Sciences 228
- Crítica, interpretació, etc 211
- crítica e interpretación 205
- Descripción y viajes 194
- Religion 184
- Business & Economics 176
- Doble imposición 172
- Theology 155
- Computer Science 147
- Application software 146
- Transportation 143
- Computer networks 142
- Development 141
- Operating systems (Computers) 127
- Web sites 126
- Design 121
- Historia y crítica 120
- Transport 116
-
28481Publicado 2022Tabla de Contenidos: “…1984-1990. The boy in the bubble ; Graceland ; I know what I know ; Gumboots ; Diamonds on the soles of her shoes ; You can call me Al ; Under African skies ; Homeless ; Crazy love, vol. …”
Libro -
28482Publicado 2019Tabla de Contenidos: “…Front Cover -- ARM-Based microcontroller projects using MBED -- Copyright -- Contents -- About the Author -- Preface -- Acknowledgments -- Chapter 1: Introduction -- 1.1. …”
Libro electrónico -
28483Publicado 2022Tabla de Contenidos: “…More Payloads -- Ransomware as a Service -- Typical Ransomware Process and Components -- Infiltrate -- After Initial Execution -- Dial-Home -- Auto-Update -- Check for Location -- Initial Automatic Payloads -- Waiting -- Hacker Checks C& -- C -- More Tools Used -- Reconnaissance -- Readying Encryption -- Data Exfiltration -- Encryption -- Extortion Demand -- Negotiations -- Provide Decryption Keys -- Ransomware Goes Conglomerate -- Ransomware Industry Components -- Summary -- Chapter 2 Preventing Ransomware -- Nineteen Minutes to Takeover -- Good General Computer Defense Strategy -- Understanding How Ransomware Attacks -- The Nine Exploit Methods All Hackers and Malware Use -- Top Root-Cause Exploit Methods of All Hackers and Malware -- Top Root-Cause Exploit Methods of Ransomware -- Preventing Ransomware -- Primary Defenses -- Everything Else -- Use Application Control -- Antivirus Prevention -- Secure Configurations -- Privileged Account Management -- Security Boundary Segmentation -- Data Protection -- Block USB Keys -- Implement a Foreign Russian Language -- Beyond Self-Defense -- Geopolitical Solutions -- International Cooperation and Law Enforcement -- Coordinated Technical Defense -- Disrupt Money Supply…”
Libro electrónico -
28484Publicado 2013Tabla de Contenidos: “…-- What Applications Might Have Been Used in Creating the Data? -- Should You Request to Go Beyond the Scope of the Investigation?…”
Libro electrónico -
28485por Verham, DominiekTabla de Contenidos: “…-- Types of cyberattacks -- Phishing attack -- Ransomware -- Distributed denial of service -- Man in the middle attacks -- SQL injections -- Cross-site scripting -- Zero-day exploits -- Social engineering attacks -- Recovering from a cyberattack -- A cyber incident response plan -- Virtual desktops to the rescue -- Summary -- Part 3: Security Controls for W365 and AVD -- Chapter 4: Securing User Sessions -- CA and MFA -- Security defaults -- Per-user MFA -- CA policy -- Configuring RDP device and resource redirections for Windows 365 -- Device and resource redirections with Intune -- Device and resource redirections with group policy -- Configuring RDP properties for Azure Virtual Desktop -- Drive and storage redirection -- Clipboard redirection -- COM port redirection -- Printer redirection -- Smartcard redirection -- USB device redirection -- RDP session limit timeouts -- Summary…”
Publicado 2024
Libro electrónico -
28486Publicado 2023Tabla de Contenidos: “…-- 8.1 Definition und Erklärung -- 8.2 Funktionsprinzip -- 8.3 Provisionsmodelle -- 8.4 Amazon Partnerprogramm -- 8.4.1 Anmeldung zum Amazon Partnerprogramm -- 8.4.2 Amazon Partnerprogramm Interface -- 8.4.3 Nutzung des Amazon SiteStripe -- 8.5 Awin-Partnerprogramm -- 8.6 Checkliste -- Kapitel 9: Nischenthemen wählen und analysieren -- 9.1 Monetarisierung von Themen -- 9.1.1 Systematik und Vorgehensweise -- 9.1.2 Beispiel -- 9.2 Suche nach Nischenthemen -- 9.2.1 Anregungen für ein Produkt finden -- 9.2.2 Persönliches Interesse am Produkt -- 9.3 Checkliste -- Teil III: Website aufbauen und Nutzung analysieren - Schritt für Schritt -- Kapitel 10: Aufbau der Website mit einem Content-Management-System -- 10.1 Funktionsweise und Nutzen eines Content-Management-Systems -- 10.2 Grundgerüst der Webseiten: HTML, CSS, PHP -- 10.2.1 HTML -- 10.2.2 CSS -- 10.2.3 PHP -- 10.3 Anforderungen für die Erstellung -- 10.3.1 Der richtige Webhosting-Tarif -- 10.3.2 Einrichtung eines Webhostings -- 10.3.3 Wahl der Domain -- 10.4 Checkliste -- Kapitel 11: Nutzung von WordPress zum Aufbau der Website -- 11.1 Installation -- 11.1.1 Manuelle Installation -- 11.1.2 One-Click-Installation des Hosters -- 11.2 WordPress-Aufbau (Backend) -- 11.2.1 Dashboard -- 11.2.2 Beiträge -- 11.2.3 Seiten -- 11.2.4 Medien -- 11.2.5 Kommentare -- 11.2.6 Designs -- 11.2.7 Plugins -- 11.2.8 Benutzer -- 11.2.9 Einstellungen -- 11.3 Hilfreiche allgemeine Plugins -- 11.4 Seitenerstellung mit dem Gutenberg-Editor (Standard-Pagebuilder) -- 11.5 Seitenerstellung mit dem Elementor-Pagebuilder -- 11.6 SSL-Zertifikat -- 11.7 Checkliste -- Kapitel 12: Rechtliche Grundlagen zum Betrieb von Websites -- 12.1 Impressumspflicht -- 12.2 Datenschutzpflichten -- 12.3 Urheberrecht…”
Libro electrónico -
28487por Bruni, PaoloTabla de Contenidos: “…Readiness for new workloads -- 6.1 Background for new workload creation -- 6.2 Development of new business transaction applications -- 6.2.1 Prioritizing for new applications -- 6.2.2 Security for new applications -- 6.2.3 Ability to accommodate growth -- 6.2.4 Rapid development of high performance applications -- 6.3 Enhancement of existing applications -- 6.3.1 Using utilities instead of developing programs -- 6.4 Purchasing new software packages -- 6.4.1 Usability, availability, and scalability -- 6.4.2 Performance…”
Publicado 2005
Libro electrónico -
28488Publicado 2010Tabla de Contenidos: “…14 Level the Playing Field with a Free App -- Build a Paid App-Standalone -- Build a Free App, Build a Following -- Build a Paid App and a Free App at the Same Time -- In-App Purchases -- Free Apps with Ads -- From Paid to Free -- 15 The App Pricing Roller Coaster -- Raising Your Price -- Lowering Your Price -- Temporary Price Drops -- Value-Add Sales -- 16 App Promotions and Cross-Selling -- Promotional Marketing for iPhone/iPad Apps -- Cross-Selling and Up-Selling -- Up-Selling -- 17 Using iPhone/iPad Analytics -- Analytics Components -- Track Your App's Sales -- Track Your App's Location -- Track Your App's Usage -- Track Specific App Events -- Measure App Interface Patterns -- Top Analytics Vendors -- Flurry/Pinch Media -- Mobclix -- Analytics and Privacy -- Managing a User's Privacy Expectations -- 18 Why Have a Marketing Plan? …”
Libro electrónico -
28489por Reddy, MartinTabla de Contenidos: “…An example functional API -- Advantages of functional APIs -- Disadvantages of functional APIs -- Data-driven APIs -- Advantages of data-driven APIs -- Disadvantages of data-driven APIs -- Supporting variant argument lists -- Case study: FMOD data-driven API -- Data-driven Web services -- Idempotency -- 6 - C++ usage -- Namespaces -- Constructors and assignment -- Defining constructors and assignment -- The explicit keyword -- Const correctness -- Method const correctness -- Parameter const correctness -- Return value const correctness -- Templates -- Template terminology -- Implicit instantiation API design -- Explicit instantiation API design -- Operator overloading -- Overloadable operators -- Free operators versus member operators -- Adding operators to a class -- Operator syntax -- Conversion operators -- Function parameters -- Pointer versus reference parameters -- Default arguments -- Avoid #define for constants -- Avoid using friends -- Exporting symbols -- Coding conventions -- 7 - C++ revisions -- Which C++ revision to use -- C++11 API features -- Move constructors and the Rule of Five -- Default and deleted functions -- Object construction -- Initializer list constructors -- Smart pointers -- Enum classes -- Override and final specifiers -- The noexcept specifier -- Inline namespaces -- Type aliases with using -- User-defined literals -- Alternate function style -- Tuples -- Constant expressions -- The nullptr keyword -- Variadic templates -- Migrating to C++11 -- C++14 API features -- The auto return type -- The deprecated attribute -- Variable templates -- Const expression improvements -- Binary literals and digit separators -- Migrating to C++14 -- C++17 API features -- Inline variables -- String views -- Optional -- Any -- Variant -- Nested namespaces -- Fold expressions -- Checking for header availability -- Byte type…”
Publicado 2024
Libro electrónico -
28490por Pérez Rodríguez, María DoloresTabla de Contenidos: “…BUSCAR, CONFIGURAR PÁGINA E IMPRIMIR -- OPCIONES: VÍNCULOS -- BORRAR ARCHIVOS TEMPORALES DE INTERNET -- BÚSQUEDA EN LA PÁGINA ACTUAL -- CONFIGURAR PÁGINA -- IMPRIMIR -- LO QUE HEMOS APRENDIDO -- TEST -- ACTIVIDADES -- TEMA 16 USO EFICAZ Y RACIONAL DE INTERNET. (...) -- PROPIEDADES DE LA PÁGINA -- GRADO DE SEGURIDAD EN INTERNET -- ACEPTAR COOKIES -- BLOQUEADOR DE ELEMENTOS EMERGENTES -- IR A UNA DE LAS PÁGINAS ANTERIORES/SIGUIENTES -- SELECCIONAR LA AYUDA: CONTENIDO -- USAR EL HISTORIAL -- BORRAR EL HISTORIAL -- BÚSQUEDA POR COINCIDENCIAS -- VER LAS SIGUIENTES ENTRADAS -- MODIFICAR UNA DIRECCIÓN -- VISITAR UNA DIRECCIÓN DE LA CARPETA HISTORIAL -- DESCARGA DE ARCHIVOS -- LO QUE HEMOS APRENDIDO -- TEST -- ACTIVIDADES -- TEMA 17. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
28491por OECDTabla de Contenidos: “…Difficultés communes et solutions proposées -- Hétérogénéité des cibles -- Encourager la participation -- Questions logistiques -- 3.3. …”
Publicado 2022
Libro electrónico -
28492Publicado 2023Tabla de Contenidos: “…Box 5.2 Elasticity and the incidence of tax -- Box 5.3 Adjusting to oil price shocks -- Box 5.4 Bubble, bubble, toil and trouble -- Summary -- Review questions -- Additional Part B case studies on the Economics for Business student website -- Websites relevant to Part B -- Part C BACKGROUND TO DEMAND -- 6 Demand and the consumer -- 6.1 Marginal utility theory -- 6.2 Demand under conditions of risk and uncertainty -- 6.3 The characteristics approach to analysing consumer demand -- Box 6.1 Calculating consumer surplus -- Box 6.2 The marginal utility revolution: Jevons, Menger, Walras -- Box 6.3 Adverse selection in the insurance market -- Box 6.4 Dealing with moral hazard and adverse selection -- Summary -- Review questions -- Web appendix in the case studies section of the Economics for Business student website -- 7 Behavioural economics of the consumer -- 7.1 How does behavioural economics differ from standard theory? …”
Libro electrónico -
28493Publicado 2018Tabla de Contenidos: “…Appendix F Extension: Effort Monitoring and Worker Termination -- References -- References for Appendices -- 4 Heterogeneous Agents in the Macroeconomy: Reduced-Heterogeneity Representations -- 1 Introduction -- 2 The Economic Problem and Notations -- 2.1 The Model -- 2.2 Equilibrium De nition and Intuition to Reduce the State Space -- 3 No-Trade Equilibria -- 3.1 No-Trade Equilibria with Transitory Shocks -- 3.1.1 Assumptions -- 3.2 Preserving Time-Varying Precautionary Saving in the Linear Model -- 3.3 No-Trade Equilibrium with Permanent Shocks -- 4 Small-Heterogeneity Models -- 4.1 Models Based on Assumptions About Labor Supply -- 4.1.1 Assumptions -- 4.1.2 Equilibrium Structure -- 4.1.3 The System -- 4.1.4 Algorithm: Finding the Value of L -- 4.1.5 Simulations -- 4.1.6 References and Limits -- 4.2 Models Based on Linearity in the Period Utility Function -- 4.2.1 Assumptions -- 4.2.2 Equilibrium Structure -- 4.2.3 Using Reduced Heterogeneity to Model Wealth Inequality over the Business Cycle -- 4.2.4 Other References and Remarks -- 4.3 Models Based on a "Family" Assumption -- 4.3.1 Assumptions -- 4.3.2 Equilibrium Structure -- 4.3.3 Algorithm and Simulations -- 4.3.4 Example of Quantitative Work -- 4.4 Assessment of Small-Heterogeneity Models -- 5 Truncated-History Models -- 5.1 Assumptions -- 5.2 Equilibrium Structure -- 5.3 Equations of the Model -- 5.4 Algorithm for the Steady State -- 5.5 Dynamics -- 5.6 Choosing the Preference Shifters ξeN -- 5.7 Numerical Example -- 6 Optimal Policies -- 7 Comparison with Other Approach Using Perturbation Methods -- 8 Heterogeneous Expectations -- 9 Concluding Remarks -- References -- Part 2 Finance -- 5 Heterogeneous Agent Models in Finance -- 1 Introduction -- 2 HAMs of Single Asset Market in Discrete-Time -- 2.1 Market Mood and Adaptive Behavior -- 2.2 Volatility Clustering: Calibration and Mechanisms…”
Libro electrónico -
28494
-
28495
-
28496por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Intro -- Table des matières -- Statistiques de base du Canada -- Évaluation et recommandations -- I. …”
Publicado 2003
Libro electrónico -
28497Publicado 2012Tabla de Contenidos: “…. -- Microcosmography : or, a piece of the world discovered, in essays and characters, 1628 / John Earle -- God no impostor nor deluder, 1629 / William Prynne -- The estate of a Christian laid forth in a sermon preached at Gray's Inn, late 1620s / Joseph Hall -- The Gospel treasury opened, ca. 1625-36 ; "Of milk for babes ; and of meat for strong men" ; "All power given to Jesus Christ, in heaven and earth" / John Everard -- The bruised reed and smoking flax, 1630 / Richard Sibbes -- The story books of Little Gidding : being the religious dialogues recited in the great room 1631-32 / The Little Gidding Source Books -- Divine fancies : digested into epigrams, meditations, and observations, 1632 / Francis Quarles -- Sermons preached at Brancepath, 1632-33 / John Cosin -- "Upon faithful window, ", ca. 1632-33 / Richard Corbett -- "On Fairford windows" ; "On the Bible" ; "Justification" ; On the same M.M.P.", ca. 1625-45 / William Stronde -- Jehovah-Jireh. …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
28498Publicado 2018Tabla de Contenidos: “…Giving and Receiving Feedback -- Giving Effective Feedback -- Receiving Feedback -- Summary -- Chapter 9 Effective Use of Color -- The Significance of Color in Data Visualization -- How Color Is Used to Tell Stories -- Using Color to Evoke Emotions -- Positive Results and Emotions -- Negative Results and Emotions -- Using Color to Create Associations -- Color Associations with Brands -- Color Associations with Topics -- Color Associations Across Multiple Charts -- Using Color to Highlight -- Best Practices for Using Color -- Less Is More -- Considerations for Color Blindness -- Using Background Colors -- Using Text as a Color Legend -- Summary -- Chapter 10 Choosing the Right Chart Type -- Area Charts -- Purpose -- Description -- Examples -- Alternatives -- Stacked Bar Charts -- Purpose -- Description -- Examples -- Alternatives -- Diverging Bar Charts -- Purpose -- Description -- Examples -- Alternatives -- Filled Maps -- Purpose -- Description -- Examples -- Alternatives -- Donut and Pie Charts -- Purpose -- Description -- Examples -- Alternatives -- Packed Bubble Charts -- Purpose -- Description -- Examples -- Alternatives -- Treemaps -- Purpose -- Description -- Examples -- Alternatives -- Slopegraphs -- Purpose -- Description -- Examples -- Alternatives -- Connected Scatterplots -- Purpose -- Description -- Examples -- Alternatives -- Circular Histograms -- Purpose -- Description -- Examples -- Alternatives -- Radial Bar Charts -- Purpose -- Description -- Examples -- Alternatives -- Resources -- Summary -- Chapter 11 Effective Use of Text -- Effective Titles and Subtitles -- Using Questions as Titles -- Making Definitive Statements -- Using Descriptive Titles -- Working with Quirky, Funny, and Poetic Titles -- Delivering on Your Promises -- What Is Your Key Message? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
28499Publicado 2017Tabla de Contenidos: “…FLOW PERFORMANCE CURVES -- CONDENSATE BACK-UP IN CONDENSERS-THE EFFECT OF SUB-COOLING -- DISTILLATION TRAY DOWNCOMER BACK-UP AND LIQUID FLOODING -- EFFECT OF FOAM ON LEVEL INDICATION IN DISTILLATION TOWERS -- SPLIT LIQUID LEVELS IN VERTICAL VAPOR LIQUID SEPARATORS -- OPTIMIZING EXCESS AIR IN A FIRED HEATER TO MINIMIZE FUEL CONSUMPTION -- DISTILLATION TRAY DUMPING OR WEEPING WITH VALVE CAP TRAY DECKS -- FIRED HEATER TUBE FAILURES -- LOW AIR FLOW IN A FIN FAN FORCED DRAFT AIR COOLER -- MEASURING AIR FLOW FOR AN AERIAL FIN FAN AERIAL COOLER -- MEASURING COOLING TOWER EFFICIENCY APPROACH TO WET BULB TEMPERATURE -- ADJUSTING HEATER STACK DAMPER FOR OPTIMUM ENERGY EFFICIENCY -- PREVENTING TRAY DUMPING BY USE OF BUBBLE CAP TRAYS -- DEMISTER FOULING IN VAPOR-LIQUID SEPERATOR VESSELS -- EFFECT OF TEMPERATURE ON LIQUID LEVEL INDICATION -- DRAW-OFF NOZZLE CAPACITY LIMITS -- ON-STREAM REPAIR OF TUBE LEAKS IN SURFACE CONDENSER -- WHEN ARE VORTEX BREAKERS REQUIRED? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
28500Publicado 2021Tabla de Contenidos: “…Access to Communications -- National Security and Privacy -- Foreign Intelligence Surveillance Act (FISA) of 1978 -- USA-PATRIOT Act -- The USA Freedom Act of 2015 -- The Cybersecurity Information Sharing Act of 2015 -- Civil Litigation and Privacy -- Compelled Disclosure of Media Information -- Electronic Discovery -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 Workplace Privacy -- Introduction to Workplace Privacy -- Workplace Privacy Concepts -- U.S. …”
Libro electrónico