Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
2621por Mueller, John PaulTabla de Contenidos: “…Working with greedy algorithms ; Relying on dynamic programming ; Using randomized algorithms ; Performing local serach ; Employing linear programming ; Considering heuristics -- The part of tens. …”
Publicado 2017
Libro electrónico -
2622por McLean, DanielTabla de Contenidos: “…; Chapter 4: The Abandoned Service; Chapter 5: Don't Confuse me with the Details; Chapter 6: Voices in the Night; Chapter 7: When Capacity isn't Enough; Chapter 8: Coffee Talk; Chapter 9: Just Sit There and Take It; Chapter 10: Once More Unto the Breach, My Friend?; Chapter 11: Reprimand by Remote Control; Chapter 12: Success Feels Good; Chapter 13: No Plan Survives Contact with Reality…”
Publicado 2014
Libro electrónico -
2623por Laszlo, Ervin, 1932-
Publicado 1994Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
2624“…Hackles bristle discreetly, lips curl ever-so politely, and every breach of good taste is carefully recorded, as social aspirant Lily Bart launches a desperate bid for a place on the city's elite social register…”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
2625
-
2626por Jütting, Johannes“…In developing countries, courts, regulations and formal conventions are often observed in the breach or fail to function. By default, informal institutions – tradition, culture, family structures and general social norms – play a crucial role. …”
Publicado 2006
Capítulo de libro electrónico -
2627por Draetta, Ugo
Publicado 1996Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
2628Publicado 2004Tabla de Contenidos: “…Weinrib -- Unrequested benefits in German law / Thomas Krebs -- Tracing and unjust enrichment / Robert Chambers -- Disgorgement for breach of contract and corrective justice: an analysis in outline / Peter Benson -- Characterisation of unjust enrichment in the conflict of laws / Stephen G.A. …”
Libro -
2629por Erskine, SamuelTabla de Contenidos: “…Chapter 3: Configuring Service Level Agreements (SLAs)Introduction; Creating Priority Queues; Configuring business hours and non-working days; Creating SLA metrics; Creating Service Level Objectives; Creating Incident Management SLAs; Creating Service Request SLAs; Viewing SLA warning and breaches; Creating notifications for SLA warning and breaches; Creating repeated notifications before SLA breaches with escalation; Chapter 4: Building the Configuration Management Database (CMDB); Introduction; Adding configuration items manually; Importing active directory configuration items…”
Publicado 2012
Libro electrónico -
2630
-
2631
-
2632
-
2633Publicado 1986Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Universidad de Deusto, Biblioteca de la Universidad de Navarra)Libro
-
2634
-
2635
-
2636
-
2637Publicado 2022Tabla de Contenidos: “…The business of licensing -- Ownership and assignment of intellectual property -- The nature of an intellectual property license -- Implied licenses and unwritten transactions -- Confidentiality and pre-license negotiations -- License grant and scope -- Exclusive licenses -- Financial terms -- Development, allocation, and management of IP -- Representations, warranties, and indemnification -- Litigation-related clauses : enforcement, settlement, and dispute resolution -- Term, termination, and breach -- Other licensing terms: the "Boilerplate" -- Academic technology transfer -- Trademark and franchise licensing -- Music licensing -- Consumer and online licensing -- Software, data, and the cloud -- Public licenses : open source, creative commons and IP pledges -- Technical standards : fair, reasonable, and non-discriminatory (frand) licensing -- Bankruptcy and insolvency issues -- Estoppel and no challenge clauses -- First sale and exhaustion -- Intellectual propery misuse -- Antitrust and competition issues -- Intellectual property pools and aggregation…”
Libro electrónico -
2638por Sennewald, Charles A., 1931-Tabla de Contenidos: “…Giant Stores -- A summarization of cases based on the theory of liability, false arrest/false imprisonment -- And/or excessive use of force -- A summarization of cases predicated on negligence as the theory of liability -- A summarization of cases based on inadequate security and/or breach of duty as the -- Theory of liability -- A summarization of lawsuits that were rejected or failed for unusual reasons -- Epilogue -- A fair warning avoid victimization…”
Publicado 2014
Libro electrónico -
2639Publicado 2014Tabla de Contenidos: “…; Chapter 3: Compliance and Compliance Programmes; Chapter 4: Consequences of a Breach; Chapter 5: How do you Comply with the Requirements of the Standard?…”
Libro electrónico -
2640por Barnard, Marina, 1960-Tabla de Contenidos: “…; Chapter 2:Family Journeys of Discovery,Adaptation and Expulsion: Cyclesof Response to Drugs in the Family; Chapter 3:Distorted Rolesand Strained Relationships; Chapter 4:Practitioner Responsesto Mothers and Fathers, Brothersand Sisters of Problem Drug Users; Chapter 5:Parenting in the Midstof a Drug Problem; Chapter 6:Children Growing Up with Parentswho have Drug Problems; Chapter 7:Stepping into the Breach:When the Extended Family Takeson the Care of Children…”
Publicado 2007
Libro electrónico