Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,349
- Biblia 612
- Història 434
- Filosofía 406
- Teología 343
- Església Catòlica 272
- -Historia 264
- Bíblia 252
- Crítica e interpretación 243
- Iglesia Católica 203
- Teologia moral 197
- Teología dogmática 195
- Obres anteriors al 1800 188
- Sermones 181
- Derecho canónico 176
- Data processing 169
- Management 162
- Computer networks 160
- Teologia dogmàtica 157
- Patrística 153
- Dret canònic 141
- Derecho civil 139
- Derecho 138
- Teologia 137
- Moral cristiana 134
- Colecciones 131
- Historia- 130
- Development 129
- Tratados y manuales 127
- Comentaris 126
-
36501Publicado 2013Tabla de Contenidos: “…(b) Negative Outcomes of a Culture Operating without Integrity -- (c) Appropriately Handling an Integrity Failure -- (d) Integrity and the WAM‐Pro -- NOTES -- UNIT THREE Timekeeping -- CHAPTER FIVE Workforce Management Devices and Functionality -- 5.1 TIMECARD FUNCTIONALITY -- (a) Time Record Views -- (b) Timecard Edits and Entries -- (c) Timecard Reports -- (d) Advanced Timecard Functionality -- (e) Pay Rules -- (f) Timecard Functionality beyond Straight Timekeeping -- 5.2 ACCRUAL RULES -- 5.3 AUTOMATED WORKFLOW AND EMPLOYEE SELF‐SERVICE -- (a) Benefits of Workforce Management Automated Workflows and Employee Self‐Service Tools -- (b) Functionality of Automated Workflow System -- (c) Considerations When Planning an Automated Workflow Process -- 5.4 DATA COLLECTION: WHO, WHERE, AND WHEN -- (a) After Hours: Moving beyond Timekeeping -- (b) Data Collection Technologies -- (c) Fixed-Location Data Collection -- (d) Mobile Data Collection -- (e) Push and Poll: Integrating Data into Time Management Systems -- (f) The Future -- 5.5 BIOMETRICS: FEATURES AND FUNCTIONALITY -- (a) Common Challenges of Biometric Systems -- (b) Common Benefits of Biometric Systems -- (c) Common Pitfalls of Biometric Systems -- 5.6 MOBILE RESOURCE MANAGEMENT: FEATURES AND FUNCTIONALITY -- (a) Benefits of Using Mobile Resource Management -- (b) Challenges and Issues When Using Mobile Resource Management -- (c) Big Picture for the Employee and the Employer -- NOTES -- CHAPTER SIX Federal Regulation -- 6.1 FAIR LABOR STANDARDS ACT -- (a) Overtime Requirements and Regular Rate of Pay -- (b) Payments Covering More than One Workweek -- 6.2 DEFINING THE LEGAL WORKWEEK -- (a) Public Sector Employee Workweek -- (b) Healthcare Industry -- (c) Agricultural Employees -- (d) Transportation Workers -- 6.3 CHANGING THE WORKWEEK -- (a) Nonemployees or Independent Contractors…”
Libro electrónico -
36502
-
36503
-
36504
-
36505Publicado 2011Tabla de Contenidos: “…Semillas oleaginosas y sus productos -- Situación del mercado -- Puntos principales de la proyección -- Gráfica 5.1. Los precios de las semillas oleaginosas y sus productos permanecerán por arriba de los niveles históricos -- Gráfica 5.2. …”
Libro electrónico -
36506
-
36507por Jordan, TedTabla de Contenidos: “…Exercise 3-2: Redirection Hands-on Project -- Chapter Review -- Questions -- Answers -- Chapter 4 Managing Linux Users and Groups -- Understanding Linux Users and Groups -- Linux User Accounts -- Displaying User and Group IDs -- Creating and Managing User Accounts from the Command Line -- Provisioning New Users with useradd -- Exercise 4-1: Managing User Accounts from the Command Line -- Provisioning New Workgroups with groupadd -- Exercise 4-2: Managing Groups from the Command Line -- Chapter Review -- Questions -- Answers -- Chapter 5 Managing Linux Files and Directories -- Understanding the Filesystem Hierarchy Standard -- Navigating the Linux Filesystem -- Viewing Directory Contents with ls -- Exercise 5-1: Navigating the Filesystem -- Managing Linux Files -- Files, Filenames, and Inodes -- Creating and Validating Files with touch and stat -- Soft and Hard Links -- Creating New Directories with mkdir -- Determining the File Type -- Viewing File Contents -- Deleting Files -- Copying and Moving Files -- Exercise 5-2: Managing Files and Directories -- Finding Files in the Linux Filesystem -- Using find to Search for Files -- Using xargs to Run Commands from Standard Input -- Using locate to Find Files -- Understanding Commands and Precedence -- Creating Aliases -- Creating and Using Functions -- Using Builtin Commands -- Using External Commands -- Exercise 5-3: Finding Files -- Finding Content Within Files -- Using grep to Search Within Files -- Using egrep to Search Within Files -- Exercise 5-4: Using grep -- Chapter Review -- Questions -- Answers -- Chapter 6 Managing Ownership and Permissions -- Managing File Ownership -- Viewing Default File Permissions and Ownership -- Managing Ownership from the Command Line -- Exercise 6-1: Managing Ownership -- Managing File and Directory Permissions -- How Permissions Work…”
Publicado 2023
Libro electrónico -
36508Publicado 2019Tabla de Contenidos: “…Chapter 4 Transfer Matrix Method for Nonlinear and Multidimensional Multibody Systems -- 4.1 Introduction -- 4.2 Incremental Transfer Matrix Method for Nonlinear Systems -- 4.3 Finite Element Transfer Matrix Method for Two-dimensional Systems -- 4.4 Finite Element Riccati Transfer Matrix Method for Two-dimensional Nonlinear Systems -- 4.5 Fourier Series Transfer Matrix Method for Two-dimensional Systems -- 4.6 Finite Difference Transfer Matrix Method for Two-dimensional Systems -- 4.7 Transfer Matrix Method for Two-dimensional Systems -- Part II Transfer Matrix Method for Multibody Systems -- Chapter 5 Transfer Matrix Method for Multi-rigid-body Systems -- 5.1 Introduction -- 5.2 State Vectors, Transfer Equations and Transfer Matrices -- 5.3 Overall Transfer Equation and Overall Transfer Matrix -- 5.4 Transfer Matrix of a Planar Rigid Body -- 5.5 Transfer Matrix of a Spatial Rigid Body -- 5.6 Transfer Matrix of a Planar Hinge -- 5.7 Transfer Matrix of a Spatial Hinge -- 5.8 Transfer Matrix of an Acceleration Hinge -- 5.9 Algorithm of the Transfer Matrix Method for Multibody Systems -- 5.10 Numerical Examples of Multibody System Dynamics -- Chapter 6 Transfer Matrix Method for Multi-flexible-body Systems -- 6.1 Introduction -- 6.2 State Vector, Transfer Equation and Transfer Matrix -- 6.3 Overall Transfer Equation and Overall Transfer Matrix -- 6.4 Transfer Matrix of a Planar Beam -- 6.5 Transfer Matrix of a Spatial Beam -- 6.6 Numerical Examples of Multi-flexible-body System Dynamics -- Part III Discrete Time Transfer Matrix Method for Multibody Systems -- Chapter 7 Discrete Time Transfer Matrix Method for Multibody Systems -- 7.1 Introduction -- 7.2 State Vector, Transfer Equation and Transfer Matrix -- 7.3 Step-by-step Time Integration Method and Linearization -- 7.4 Transfer Matrix of a Planar Rigid Body…”
Libro electrónico -
36509Publicado 2016Tabla de Contenidos: “…-- 4.4 Einmaleins der Problemlösung -- 4.5 Die Früchte unserer Arbeit -- 4.6 Weitere Informationsquellen zu diesem Thema -- Kapitel 5: Das Spiel besteht aus Elementen -- 5.1 Woraus sind kleine Spiele gemacht? -- 5.2 Die vier Grundelemente -- 5.3 Haut und Skelett -- Kapitel 6: Die Elemente stützen ein Thema -- 6.1 Bloß Spiele -- 6.2 Verbindliche Themen…”
Libro electrónico -
36510
-
36511
-
36512por Fernandez del Barco y la Vega, AlonsoTabla de Contenidos: “…Párrafos en latín. A-V2, X1. Port. con orla xil. Inicial grabada. …”
Publicado 1733
Colección -
36513Publicado 2014Tabla de Contenidos: “…7.3.5 Sicherungen mit dem Oracle Enterprise Manager -- 7.3.6 Einen Media Manager verwenden -- 7.4 Die Fast Recovery Area -- 7.4.1 Dateien in die Fast Recovery Area legen -- 7.4.2 Die Fast Recovery Area verwalten -- 7.5 Restore und Recovery mit RMAN -- 7.5.1 Verlust eines Datafiles -- 7.5.2 Disaster Recovery -- 7.5.3 Verlust von Online Redo Log-Dateien -- 7.5.4 Block Media Recovery -- 7.5.5 Der Data Recovery Advisor -- 7.5.6 Switch zur Datafile-Kopie -- 7.5.7 Eine Tabelle mit RMAN zurückspeichern -- 7.6 Wiederherstellung mit Flashback-Operationen -- 7.6.1 Flashback Table -- 7.6.2 Flashback Drop -- 7.6.3 Flashback Transaction History -- 7.6.4 Flashback Database -- 7.7 Tablespace Point-in-Time Recovery -- Kapitel 8: Schnittstellen -- 8.1 Data Pump -- 8.1.1 Die Data Pump-Architektur -- 8.1.2 Data Pump-Export -- 8.1.3 Data Pump-Import -- 8.1.4 Data Pump über Datenbank-Link -- 8.1.5 Full Transportable Export/Import -- 8.1.6 Data Pump Performance und Monitoring -- 8.1.7 Data Pump für Migrationen einsetzen -- 8.1.8 Ein Dumpfile nach Excel konvertieren -- 8.1.9 Data Pump mit dem Oracle Enterprise Manager -- 8.2 SQL*Loader -- 8.2.1 Daten laden -- 8.2.2 Externe Tabellen laden -- 8.2.3 Daten entladen -- Kapitel 9: Job-Verwaltung -- 9.1 Die Architektur des Scheduler -- 9.2 Scheduler-Jobs verwalten -- 9.3 Privilegien -- 9.4 Job-Ketten -- 9.5 Automatisierte Wartungs-Tasks -- Kapitel 10: Oracle Net Services -- 10.1 Die Oracle Net-Architektur -- 10.2 Die Server-Konfiguration -- 10.3 Die Shared Server-Konfiguration -- 10.4 Oracle Net Performance -- Kapitel 11: Sicherheit und Überwachung -- 11.1 Grundlegende Features und Maßnahmen -- 11.1.1 Benutzer, Rollen und Profile -- 11.1.2 Einfache Maßnahmen zur Erhöhung der Sicherheit -- 11.2 Auditing -- 11.2.1 Out-of-the box Auditing -- 11.2.2 Object Auditing -- 11.2.3 Statement Auditing -- 11.2.4 Privilege Auditing…”
Libro electrónico -
36514Publicado 2018“…Lesson 1: OSPF in Context Learning objectives 1.1 Routing Protocol Types 1.2 The Distance Vector Approach 1.3 The Link State Approach 1.4 Link State Adjacencies and the Collection of Link State Data 1.5 Dijkstra's SPF - An Introduction 1.6 Dijkstra's SPF - Some Complexities Lesson 2: OSPF Concepts Learning objectives 2.1 The Communication Blocks of OSPF 2.2 Establishing Relationships between OSPF Devices 2.3 Introducing the Different Types of Link State Information Blocks 2.4 Starting to Build the OSPF Link State Database 2.5 Lesson 2 Lab Lesson 3: OSPF Hierarchy (How Areas Function) 3.0 Learning objectives 3.1 Introduction to OSPF Areas 3.2 OSPF Route Types and the Initial Building of the Routing Table 3.3 Multi-area Link State Information Blocks 3.4 Discussing the Different Types of OSPF Area 3.5 Moving OSPF Concepts to Reality 3.6 Lesson 3 Lab Lesson 4: OSPF Security Considerations 4.0 Learning objectives 4.1 Discussing the Different Security Threat Vectors and Motivations 4.2 Reviewing the Methods that Enable Secure OSPF Communication and Interaction 4.3 Lesson 4 Lab Lesson 5: Optimizing OSPF Operations 5.0 Learning objectives 5.1 Accelerating OSPF Convergence 5.2 Controlling OSPF LSA Generation and Propagation 5.3 Altering Shortest Path First Behavior 5.4 Reducing the Size of the LSDB 5.5 Reducing the Effects of Restarts on OSPF 5.6 Lesson 5 Lab Summary…”
-
36515
-
36516
-
36517
-
36518por Gerson, Jean, 1363-1429Accés lliure exemplar de la BPEB (Memòria Digital de Catalunya)
Publicado 1494
991006590479706719 -
36519
-
36520por Hilario de Poitiers, Santo, 315?-367
Publicado 1978Red de Bibliotecas de la Diócesis de Córdoba (Otras Fuentes: Biblioteca de la Conferencia Episcopal Española, Biblioteca de la Universidad de Navarra, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Universitat Ramon Llull, Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca Diocesana Bilbao, Red de bibliotecas Iglesia Navarra, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada, Biblioteca de Pastoral Madrid)Enlace con el listado completo de la colección
Libro