Resultados de búsqueda - ( (actores OR tutoriales) OR ( (also OR fautores) OR ((factr OR facto) OR actos) ))*
Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- México 19
- 18
- Mexico 13
- Nuevo León 9
- política 9
- redes sociales 9
- comunicación política 8
- educación 8
- political communication 8
- Educación Superior 7
- Violencia 7
- comunicación 7
- communication 6
- democracia 6
- espacio público 6
- identidad 6
- migración 6
- shrimp 6
- television 6
- televisión 6
- violence 6
- violencia 6
- Artificial Intelligence 5
- COVID-19 5
- Competitividad 5
- Democracy 5
- Educación 5
- Globalización 5
- Higher Education 5
- Inteligencia Artificial 5
-
1721
Círculos de diálogo: Sentipensar en colectivo para la investigación social
Publicado 2026Enlace del recurso
Artículo -
1722
-
1723
La Capacitación como Estrategia de Crecimiento de las Pymes en México
Publicado 2018Enlace del recurso
Artículo -
1724
-
1725
Análisis de redes de co-ocurrencia sobre la intención de voto en Monterrey, México
Publicado 2025Enlace del recurso
Artículo -
1726
El arte como actividad práxica en el pensamiento de Severo Iglesias
Publicado 2023Enlace del recurso
Artículo -
1727
-
1728
-
1729
-
1730
-
1731
-
1732
The hasukjip: situation in 2020 in the Republic of Korea and abroad
Publicado 2024Enlace del recurso
Artículo -
1733
-
1734
-
1735
Soluciones administrativas y técnicas para proteger los recursos computacionales de personal interno-insiders (Administrative and technical solutions to protect computational re...
Publicado 2007“…Nowadays the organizations know that the computational security in logical, physical, environment security of hardware, software, process of business, data bases, telecommunications, butt in other, are essential not solely for the continuity of the daily operations of the businesses, but also to obtain strategic advantages. If the organization does not worry to place policies of computational security, that does not have control computational security, that does not invest in protection tools, does not update itself in the new problems of internal attacks and that a culture in computational security does not foment, among other aspects, more likely this in a high risk of which some computational resource can be affected by internal personnel and in consequence part or all the Business can let operate. …”
Enlace del recurso
Artículo -
1736
Globalización: Las tecnologías de la información como reto actual de los negocios (Globalization: Technology information as a business challenge)
Publicado 2014“…Aguilar (2002) says that globalization, as God, is omnipresent and omniscient somehow, since it would seem to explain everything that happens in the world, also over powerfully, because of its defenders say, nothing can be opposed to the force of globalization and the contrary it is a new way of life for humanity as a whole is imposed everywhere with the forcefulness of destiny. …”
Enlace del recurso
Artículo -
1737
MECSI: Modelo para evaluar la calidad del servicio interno (MECSI: Evaluation model for internal service quality)
Publicado 2014“…It offers recommendations for application and key questions that can help the user apply it effectively at every step. It also describes a pilot implementation to clarify and demonstrate its effectiveness. …”
Enlace del recurso
Artículo -
1738
Aporte de nutrientes vía pluviolavado en especies de matorral en el Noreste de México.
Publicado 2018“…The concentrations of micronutrients (Zn, Fe, Mn and Cu) and macronutrients (Ca, Mg and K) were analyzed in a total of 41 events registered in the period from September 2016 to September 2017, as well as the nutrient concentrations that have been incorporated or removed in the canopy have been analyzed. Recording also the hydrogen potential (pH) and the electrical conductivity (EC) by the event occurred. …”
Enlace del recurso
Tesis -
1739
Adecuación de los sistemas de gestión de calidad ISO 9001 para la entrega eficiente de la información a los Organismos Evaluadores de la Calidad Educativa en Universidades Públicas...
Publicado 2018“…Likewise, a questionnaire was conducted with closed and mixed questions, preceded by the letter of invitation, which mentions the objective of the survey, the questions, the subject surveyed and the general data of the process to subsequently make a validity of the instrument through the Cronbach's alpha, multiple regression analyzes were also carried out. The results of the investigation indicate that the model is represented by 48.3%. …”
Enlace del recurso
Tesis -
1740
Evaluacion de la respuesta inmune de macrofagos murinos J774A.1 contra Encephalitozoon cuniculi
Publicado 2017“…Significant differences were found (P≤0.05) in the production of nitric oxide between 3 and 72 h in the treatments of activation and infection. Also, significant differences were found (P≤0.05) in the cell viability between 3 and 72 h in the infection treatment. …”
Enlace del recurso
Tesis