Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,308
- Historia 1,237
- Development 1,058
- Engineering & Applied Sciences 946
- Història 915
- Application software 868
- Management 860
- Computer Science 622
- Computer networks 462
- Leadership 443
- Data processing 438
- Computer programs 405
- Design 398
- Cloud computing 367
- Examinations 363
- Business & Economics 362
- Social aspects 358
- Security measures 351
- Crítica e interpretación 350
- Education 344
- Bíblia 342
- Web site development 335
- Web sites 333
- Filosofía 323
- Computer security 321
- Python (Computer program language) 321
- Politics and government 318
- Photography 310
- Computer software 303
- Programming 297
-
45081por Morales, Tomás, 1908-1994
Publicado 2016Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca de la Conferencia Episcopal Española)Libro -
45082Publicado 2018“…Estas pasiones fabulosas -como la de san Policronio- contaminaron los libros litúrgicos oficiales, com el 'Martirologio Romano', introduciendo en ellos datos nada contrastados sobre los mártires. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca Pública Episcopal del Seminario de Barcelona, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca de la Conferencia Episcopal Española, Bibliotecas de la Diócesis de Teruel y Albarracín, Universidad Loyola - Universidad Loyola Granada, Biblioteca Diocesana Bilbao)Libro -
45083Publicado 2017“…However, aesthetic concepts of art have become common in Japan since the late 19th century. …”
Libro electrónico -
45084por Northrop, Jane Megan“…With compelling case studies and a multi-disciplinary approach, <EM>Reflecting on Cosmetic Surgery</EM> demonstrates that shame constitutes a framework through which we formulate appearance norms and learn the art of becoming socially embodied. Shame concerns the self, but manifests in response to perceived social phenomena. …”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
45085Publicado 2014“…In addition to the well-characterized role of DC in the induction of immunity to pathogens, a role for these cells as critical regulators of anti-tumor immune responses has more recently become apparent. These findings have generated interest in understanding how tumor/DC interactions impact the quality of anti-tumor immune responses, and they have contributed to increased enthusiasm for a variety of DC-based cancer immunotherapies. …”
Libro electrónico -
45086Publicado 2015“…Digital Light brings together high profile figures in diverse but increasingly convergent fields, from academy award-winner and co-founder of Pixar, Alvy Ray Smith to feminist philosopher Cathryn Vasseleu…”
Libro electrónico -
45087Publicado 2017“…Also profiled in this Guide are many exotic plant species which, although their current distribution in the region may still be relatively localized, nevertheless have the potential to become considerably more widespread and problematic. …”
Libro electrónico -
45088Publicado 2016“…As a result, in mammals, IDO1 has become pivotal in fetomaternal tolerance, at a time when regulatory T cells emerged to meet the same need, namely protecting the fetus. …”
Libro electrónico -
45089Publicado 2017“…Salt tolerance will become an important trait driven by increased competition for land and the need to exploit marginal lands…”
Libro electrónico -
45090Publicado 2017“…The goal of this tutorial is to help you become a professional developer by unleashing the full potential of iOS 11 to build applications. …”
-
45091Publicado 2020“…By the end of this penetration testing book, you'll have become well-versed in a variety of ethical hacking techniques for securing your AWS environment against modern cyber threats.What you will learnSet up your AWS account and get well-versed in various pentesting servicesDelve into a variety of cloud pentesting tools and methodologiesDiscover how to exploit vulnerabilities in both AWS and applicationsUnderstand the legality of pentesting and learn how to stay in scopeExplore cloud pentesting best practices, tips, and tricksBecome competent at using tools such as Kali Linux, Metasploit, and NmapGet to grips with post-exploitation procedures and find out how to write pentesting reportsWho this book is forIf you are a network engineer, system administrator, or system operator looking to secure your AWS environment against external cyberattacks, then this book is for you. …”
Libro electrónico -
45092Publicado 2018Tabla de Contenidos: “…. -- See also -- Chapter 7: Deploying and Managing Applications on Major Java EE Servers -- Introduction -- Apache TomEE usage -- Getting ready -- How to do it... -- Deploying EAR, WAR, and JAR files -- Creating datasources and a connection pool -- Logging setup and rotate -- Starting and stopping -- Session clustering -- There's more... -- See also -- GlassFish usage -- Getting ready -- How to do it... -- Deploying EAR, WAR, and JAR files -- Creating datasources and a connection pool -- Logging setup and rotate -- Starting and stopping -- Session clustering -- There's more... -- See also -- WildFly usage -- Getting ready -- How to do it... -- Deploying EAR, WAR, and JAR files -- Creating datasources and a connection pool -- Logging setup and rotate -- Starting and stopping -- Session clustering -- There's more... -- See also -- Chapter 8: Building Lightweight Solutions Using Microservices -- Introduction…”
Libro electrónico -
45093Publicado 2019“…You'll start from the very beginning and learn the fundamentals and basic concepts of JavaScript. …”
-
45094Publicado 2019“…You'll also discover tips, shortcuts, and best practices that will help you save time and become a QuickBooks pro. By the end of this book, you'll have become well-versed with the features of QuickBooks and be able to set up your business and manage all bookkeeping tasks with ease. …”
Libro electrónico -
45095Publicado 2018Tabla de Contenidos: “…-- Integrating with Vue -- Summary -- Proxying -- How 'this' works within JavaScript -- How Vue handles 'this' -- Data properties -- Computed properties -- Watched properties -- Lifecycle hooks -- Vue.js and the Virtual DOM -- DOM -- Virtual DOM -- Summary -- Chapter 3: Writing Clean and Lean Code with Vue -- Proxying -- How 'this' works within JavaScript -- How Vue handles 'this' -- Data properties -- Computed properties -- Watched properties -- Lifecycle hooks -- Vue.js and the Virtual DOM -- DOM -- Virtual DOM -- Summary -- Chapter 4: Vue.js Directives -- Model -- Iteration with v-for -- Bindings -- Adding secondary properties -- Style bindings -- DOM events and v-on -- Key modifiers -- Event modifiers -- Conditionally showing DOM elements -- v-show -- v-if -- v-else -- v-else-if -- Filters -- Locally registered filters -- Globally registered filters -- Summary -- Chapter 5: Secured Communication with Vue.js Components -- Your first Vue component -- Registering components globally -- Scoped styles -- Registering a component locally -- Component communication -- Configuring property values -- Custom events -- Sending event values -- Event Bus -- Slots…”
Libro electrónico -
45096Publicado 2018Tabla de Contenidos: “…-- Hyperparameter optimization strategies -- Common strategies -- Using random search with scikit-learn -- Hyperband -- Summary -- Chapter 7: Training a CNN from Scratch -- Introducing convolutions -- How do convolutional layers work? …”
Libro electrónico -
45097Publicado 2018“…You'll also learn how to develop your own cryptocurrency from scratch in order to understand the business behind ICO. …”
Libro electrónico -
45098Publicado 2017“…Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack. …”
Libro electrónico -
45099Publicado 2020“…By the end of this book, you'll become proficient in writing reactive code in Java and Kotlin to build concurrent applications, including Android applications. …”
Libro electrónico -
45100Publicado 2021Tabla de Contenidos: “…-- Chapter 1: Tell You What You Want, Whatcha Really Really Want -- Chapter 2: Face Your Fake News Fears -- Chapter 3: Ghost Your Inner Good Girl -- Chapter 4: Become a Bad Listener -- Chapter 5: Feel Jealous to Find Genius -- Chapter 6: Dress Up Your Big Deal Dreams -- Chapter 7: Cape Up So You Don't Cop Out -- Chapter 8: Prep for the Paradox -- Chapter 9: Your Party, Your Playlist -- Final Thought: Your Volume is Up To You -- Acknowledgments -- Ready for the Big Leagues? …”
Libro electrónico