Resultados de búsqueda - ( cofactor OR (( (fffactorss OR (acto OR also)) OR ( have OR altosr )) OR factosrias ))*

  1. 241
  2. 242

    Mexican design of a tokamak experimental facility por M., Salvador, Muñoz, O.A., Martínez, J., Morones, R., Chavez, R. M., Arredondo, V. M., Nieto, A., Velasco, J. C., Tapia, A. E., Garza, A. V., Gonzalez, J. A., Ramírez, V.

    “…This present design aims to generate, innovate, understand and develop scientific and technological fusion knowledge, also to form researchers in fusion confinement area. …”
    Enlace del recurso
    Artículo
  3. 243
  4. 244

    Los salarios del sector formal e informal en México: análisis de ganancias y pérdidas por formalización por Moreno Treviño, Jorge Omar

    Publicado 2007
    “…In general for Mexico from 2000 to 2003 both men and women with higher levels of education have net gains from switching to the formal sector, while workers with lower levels of education have a negative impact on their expected wages from formalizing. …”
    Enlace del recurso
    Artículo
  5. 245

    Scanning transmission electron microscopy methods for the analysis of nanoparticles por Ponce, Arturo, Mejía Rosales, Sergio, Yacamán, Miguel José

    Publicado 2012
    “…Another advantage of its use in the analysis of biological samples is its contrast for thick stained sections, since HAADF images of samples with thickness of 100–120 nm have notoriously better contrast than those obtained by other techniques. …”
    Enlace del recurso
    Sección de libro.
  6. 246
  7. 247
  8. 248
  9. 249
  10. 250

    Soluciones administrativas y técnicas para proteger los recursos computacionales de personal interno-insiders (Administrative and technical solutions to protect computational re... por Pérez, M.T., Palomo González, Miguel Ángel

    Publicado 2007
    “…Nowadays the organizations know that the computational security in logical, physical, environment security of hardware, software, process of business, data bases, telecommunications, butt in other, are essential not solely for the continuity of the daily operations of the businesses, but also to obtain strategic advantages. If the organization does not worry to place policies of computational security, that does not have control computational security, that does not invest in protection tools, does not update itself in the new problems of internal attacks and that a culture in computational security does not foment, among other aspects, more likely this in a high risk of which some computational resource can be affected by internal personnel and in consequence part or all the Business can let operate. …”
    Enlace del recurso
    Artículo
  11. 251
  12. 252
  13. 253
  14. 254

    La conformación de las brigadas médicas del Cuerpo de Ejército del Noreste, 1913-1914. por Hernández Zamora, José Manuel

    Publicado 2022
    “…El 18 de febrero de 1913, fue hecho prisionero el presidente en funciones Francisco I. Madero, acto que representó una larga jornada de desconcierto en el país. …”
    Enlace del recurso
    Artículo
  15. 255
  16. 256
  17. 257
  18. 258
  19. 259
  20. 260

    Aportación de los hábitos comunicativos al desarrollo de la sofisticación política entre los jóvenes por Muñiz, Carlos

    Publicado 2012
    “…In fact, media consumption, and also interpersonal communication, can have an important contribution to democratic development of countries, through the education of citizens in the political arena, especially among those younger. …”
    Enlace del recurso
    Artículo

Herramientas de búsqueda: