Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,308
- Historia 1,237
- Development 1,058
- Engineering & Applied Sciences 946
- Història 915
- Application software 868
- Management 860
- Computer Science 622
- Computer networks 462
- Leadership 443
- Data processing 438
- Computer programs 405
- Design 398
- Cloud computing 367
- Examinations 363
- Business & Economics 362
- Social aspects 358
- Security measures 351
- Crítica e interpretación 350
- Education 344
- Bíblia 342
- Web site development 335
- Web sites 333
- Filosofía 323
- Computer security 321
- Python (Computer program language) 321
- Politics and government 318
- Photography 310
- Computer software 303
- Programming 297
-
45361Publicado 2006“…Throughout, users will find plenty of the tips and visual references that have become the hallmark of Peachpit's popular Visual QuickPro Guides. …”
Libro electrónico -
45362Publicado 2011“…Kirkpatrick applies technical analysis to key economic indicators and shows how to use them to identify market shifts, avoid loss, and become a more profitable long-term investor. Drawing on many years of publicly available data, Kirkpatrick demonstrates how to uncover powerful buy and sell signals and shows how to incorporate corporate, industry, monetary, sentiment, and market data into reliable timing indicators that can help you recognize impending stock and bond market dangers—and get out of the way. …”
Libro electrónico -
45363Publicado 2018“…Understanding which tribe you belong to could make the difference in growing your business '" or help you better advise businesses to achieve their goals.Small Business Exposed will bridge the gap between the frontiers of small business research and the popular business book market. As such, it will become an essential text not only for the small businessperson, but also enter the libraries of advisors, accountants, bankers and anyone else with a vested interest in the business economy."…”
Libro electrónico -
45364por Pudney, Eric“…But scepticism towards witchcraft can become a veneer of rationality concealing other beliefs that pass without sceptical examination. …”
Publicado 2019
Electrónico -
45365por Copeman, Jacob“…According to public health orthodoxy, blood for transfusion is safer when derived from voluntary, nonremunerated donors. As developing nations phase out compensated blood collection efforts to comply with this current policy, many struggle to keep their blood stores up. …”
Publicado 2009
Libro electrónico -
45366por Buckner, Elizabeth, author“…Drawing on policy documents, media narratives, interviews, and personal experiences, Elizabeth Buckner explores how apolitical external reform models become contested and modified by local actors in ways that are simultaneously complicated, surprising, and even inspiring. …”
Publicado 2021
Libro electrónico -
45367Publicado 2022“…As industrial and production systems are future-proofed, becoming smart and interconnected through use of new manufacturing and product technologies, work is advancing on improving product needs, volume, timing, resource efficiency, and cost, optimally using supply chains. …”
Libro electrónico -
45368Publicado 2022“…Since the invention of the laser, a source of highly coherent optical radiation, optical measurements have become the perfect tool for highly precise and accurate measurements. …”
Libro electrónico -
45369por Anantharaman, Nalini“…Dans les années 1920, une théorie mathématique (la diagonalisation des matrices) et une question physique (la détermination du spectre des atomes), nées indépendamment, se sont rejointes pour donner naissance à la mécanique quantique et à la branche des mathématiques appelée « théorie spectrale ». …”
Publicado 2023
Electrónico -
45370Publicado 2023“…IBM Spectrum Fusion HCI and IBM Spectrum Fusion have become IBM Storage Fusion HCI System and IBM Storage Fusion. …”
Libro electrónico -
45371Publicado 2020“…REST APIs are great, but when you have to make individual requests to 10, 20, 30, or more of them to render a page or screen, they can become a bit cumbersome for your frontend developers. …”
Libro electrónico -
45372por Organisation for Economic Co-operation and Development.“…The phenomenon of social exclusion has become one of the outstanding problems on the eve of the 21st century. …”
Publicado 2000
Libro electrónico -
45373Publicado 2020“…In a very specific way, politics as well as power have become affective. Affect gets mobilized, fomented, unleashed. …”
Libro electrónico -
45374Publicado 1996“….; For Some Educators Who Continue To Be Attached To Notions Of "an educational service" and professional collegiality in the provision of such a service, inter-institutional collaboration becomes seen as something to be valued independently of the instrumental benefits which it provides. …”
Libro electrónico -
45375Publicado 2018“…Venetian playwright and pioneer of modern theatre Carlo Goldoni (1707-1793) led a 'double life' as a librettist, authoring nearly as many libretti as comedies- libretti which, born from the same mind and the same hand that brought forth his famous, and famously controversial, overhaul of the practices of comic theatre, could not but push the limits of the standing tradition to open a new chapter in opera history. …”
Libro electrónico -
45376Publicado 2023“…Bits and Pieces: Screening Animal Life and Death gathers pivotal and more mundane moments, dispersed across a predominantly Western history of moving images, in which animals materialize in movies and TV shows, from iconic scenes of cattle slaughter in early Soviet montage to quandaries over hunting trophies in recent home-renovation reality TV series, to animals in Black horror films. …”
Libro electrónico -
45377Publicado 2023“…Has the articulation between religious and class affiliations become so discreet or, on the contrary, so obvious that it now flies under our radars? …”
Libro electrónico -
45378Publicado 2024“…Meetings, ceremonies, and rituals can become unsustainable when teams are scattered across the globe. …”
Libro electrónico -
45379por Berner, DominikTabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Preface -- Part 1 -- The Basics -- Chapter 1: Kickstarting CMake -- Technical requirements -- CMake in a nutshell -- Installing CMake -- Building CMake from source -- Building your first project -- A minimal CMakeLists.txt file -- Understanding the CMake build process -- Source folders and build folders -- Single-configuration and multi-configuration generators -- Writing CMake files -- The CMake language -- a 10,000-foot overview -- Different toolchains and build types -- Build types…”
Publicado 2024
Libro electrónico -
45380Publicado 2024Tabla de Contenidos: “…Reverse engineering a transmitter of field devices -- Bypassing a key switch -- Putting it all together -- Lab exercise - ReeR MOSAIC M1S safety PLC security assessment -- Summary -- Further reading -- Chapter 5: Securing Safety Instrumented Systems -- Security design and engineering -- The secure-by-design principle -- Managing the ICS cybersecurity lifecycle -- Technology and product selection -- CSMSs -- SIS - The need for integral security -- Operational policies and procedures -- GOM -- Operation and cybersecurity maintenance -- Hazard -- Criticality -- Reliability -- Summary -- Further reading -- Part 3: Risk Management and Compliance -- Chapter 6: Cybersecurity Risk Management of SISs -- Importance of cyber risk assessment -- Risk assessment objectives -- SIS risk assessment principles -- Consequence-based risk assessment -- Cybersecurity risk assessment methodologies -- Conducting risk assessments in SISs -- IEC 62443-3-2 -- BowTie -- NAMUR -- The continuous nature of risk assessment -- Summary -- Further reading -- Chapter 7: Security Standards and Certification -- The evolution of standards and legislation -- Industry-relevant certifications -- Identifying key stakeholders and the broader ecosystem -- Resources and initiatives -- Summary -- Further reading -- Chapter 8: The Future of ICS and SIS: Innovations and Challenges -- The current state of ICS cybersecurity innovation -- Emerging technologies including opportunities and challenges -- Artificial Intelligence -- Quantum computing -- Cloud computing -- Autonomous operations -- Zero Trust -- Self-healing systems -- Summary -- Further reading -- Index -- Other Books You May Enjoy…”
Libro electrónico