Search Results - ( cofactors OR (( (fffaltossrss OR (acto OR also)) OR ( have OR altosr )) OR factossries ))*

  1. 241
  2. 242

    Mexican design of a tokamak experimental facility by M., Salvador, Muñoz, O.A., Martínez, J., Morones, R., Chavez, R. M., Arredondo, V. M., Nieto, A., Velasco, J. C., Tapia, A. E., Garza, A. V., Gonzalez, J. A., Ramírez, V.

    “…This present design aims to generate, innovate, understand and develop scientific and technological fusion knowledge, also to form researchers in fusion confinement area. …”
    Get full text
    Article
  3. 243
  4. 244

    Los salarios del sector formal e informal en México: análisis de ganancias y pérdidas por formalización by Moreno Treviño, Jorge Omar

    Published 2007
    “…In general for Mexico from 2000 to 2003 both men and women with higher levels of education have net gains from switching to the formal sector, while workers with lower levels of education have a negative impact on their expected wages from formalizing. …”
    Get full text
    Article
  5. 245

    Scanning transmission electron microscopy methods for the analysis of nanoparticles by Ponce, Arturo, Mejía Rosales, Sergio, Yacamán, Miguel José

    Published 2012
    “…Another advantage of its use in the analysis of biological samples is its contrast for thick stained sections, since HAADF images of samples with thickness of 100–120 nm have notoriously better contrast than those obtained by other techniques. …”
    Get full text
    Sección de libro.
  6. 246
  7. 247
  8. 248
  9. 249
  10. 250

    Soluciones administrativas y técnicas para proteger los recursos computacionales de personal interno-insiders (Administrative and technical solutions to protect computational re... by Pérez, M.T., Palomo González, Miguel Ángel

    Published 2007
    “…Nowadays the organizations know that the computational security in logical, physical, environment security of hardware, software, process of business, data bases, telecommunications, butt in other, are essential not solely for the continuity of the daily operations of the businesses, but also to obtain strategic advantages. If the organization does not worry to place policies of computational security, that does not have control computational security, that does not invest in protection tools, does not update itself in the new problems of internal attacks and that a culture in computational security does not foment, among other aspects, more likely this in a high risk of which some computational resource can be affected by internal personnel and in consequence part or all the Business can let operate. …”
    Get full text
    Article
  11. 251
  12. 252
  13. 253
  14. 254

    La conformación de las brigadas médicas del Cuerpo de Ejército del Noreste, 1913-1914. by Hernández Zamora, José Manuel

    Published 2022
    “…El 18 de febrero de 1913, fue hecho prisionero el presidente en funciones Francisco I. Madero, acto que representó una larga jornada de desconcierto en el país. …”
    Get full text
    Article
  15. 255
  16. 256
  17. 257
  18. 258
  19. 259
  20. 260

    Aportación de los hábitos comunicativos al desarrollo de la sofisticación política entre los jóvenes by Muñiz, Carlos

    Published 2012
    “…In fact, media consumption, and also interpersonal communication, can have an important contribution to democratic development of countries, through the education of citizens in the political arena, especially among those younger. …”
    Get full text
    Article

Search Tools: