Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,204
- Biblia 1,956
- Derecho canónico 1,758
- Teología 1,588
- Teología dogmática 1,503
- Iglesia Católica 1,202
- Crítica e interpretación 1,025
- Padres de la Iglesia 920
- Moral cristiana 842
- Església Catòlica 790
- Filosofía 735
- Development 673
- Bíblia 623
- Application software 614
- Liturgia 608
- Patrística 550
- Història 545
- Teología moral 526
- Tomás de Aquino 489
- Teologia 485
- Engineering & Applied Sciences 484
- Pontificia Università Lateranense (Vaticano) 480
- Computer programs 409
- Litúrgia 397
- -Historia 385
- Derecho 373
- Design 369
- Obras anteriores a 1800 366
- History 352
- Obres anteriors al 1800 342
-
70981Publicado 2016“…The expectation now is that warehouses execute an increase in smaller transactions, handle and store more items, provide more product and service customization, process more returns, offer more value-added services, and receive and ship more international orders. …”
Libro electrónico -
70982Publicado 2017“…The final section of the book demonstrates ways to polish your applications, from adding practical animations and data validation to improving application performance. …”
Libro electrónico -
70983Publicado 2018“…Build smarter applications with AI capabilities using Microsoft Cognitive Services APIs without much hassle Key Features Explore the Cognitive Services APIs for building machine learning applications Build applications with computer vision, speech recognition, and language processing capabilities Learn to implement human-like cognitive intelligence for your applications Book Description Microsoft Cognitive Services is a set of APIs for adding intelligence to your application and leverage the power of AI to solve any business problem using the cognitive capabilities. …”
Libro electrónico -
70984Publicado 2019“…You’ll be able to boost your visualizations by learning techniques such as adding filters and quick filters, and using color schemas in dashboards. …”
-
70985Publicado 2019“…The course uses various GNS3 topologies with devices such as: Linux Docker containers Linux GNS3 QEMU virtual machines Traditional Linux virtual machines Network devices - you could use Cisco, Arista, Cumulus Linux or others Do you want to see something else added to the course? Just let me know. I like to get your feedback on ways I can improve the course and add more content that you think is relevant. …”
-
70986Publicado 2018“…The book begins by refreshing your knowledge of IBM Watson's basic data preparation capabilities, such as adding and exploring data to prepare it for being applied to models. …”
Libro electrónico -
70987Publicado 2019“…Course covers Explore how to write jQuery basics How to select elements and apply manipulations Learn about applying style and classes Adding effects to elements such as hide and show Make your web page come to life with animations and effects such as slide and fade Create interactions with your page using event listeners such as mouse events and keyboard events Use AJAX to connect to JSON data to easily populate content into your page jQuery is still the most popular JavaScript library available; in fact over 19 Million websites use it and it's used in almost 5,000 libraries. jQuery Knowledge should be part of any frontend developer's skill set and it's a natural choice for anyone familiar with CSS and JavaScript. jQuery provides web developers with an easy way to create interactions with web pages. …”
-
70988Publicado 2020“…As you advance, you'll understand how to overcome common challenges in AKS and secure your application with HTTPS and Azure AD (Active Directory). Finally, you'll explore serverless functions such as HTTP triggered Azure functions and queue triggered functions. …”
Libro electrónico -
70989por Seamark, Philip. author“…What You’ll Learn: Turbocharge your Power BI model by adding advanced DAX programming techniques Know when to use calculated measures versus calculated columns Generate new tables on the fly from existing data Optimize, monitor, and tune Power BI to improve performance of your models Discover new ideas, tricks, and time-saving techniques for better models This book is for business intelligence developers, business analysts, or any SQL user who wants to use Power BI as a reporting tool. …”
Publicado 2018
Libro electrónico -
70990Publicado 2018“…Basic understanding of Blockchain can be an added advantage. What You Will Learn Understand the cyberthreat landscape Learn about Ethereum and Hyperledger Blockchain Program Blockchain solutions Build Blockchain-based apps for 2FA, and DDoS protection Develop Blockchain-based PKI solutions and apps for storing DNS entries Challenges and the future of cybersecurity and Blockchain In Detail Blockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. …”
Libro electrónico -
70991Publicado 2014“…COVERAGE INCLUDES: • Overcoming common obstacles to collaboration between developers and IT security professionals • Helping programmers design, write, deploy, and operate more secure software • Helping network security engineers use application output more effectively • Organizing a software security team before you’ve even created requirements • Avoiding the unmanageable complexity and inherent flaws of layered security • Implementing positive software design practices and identifying security defects in existing designs • Teaming to improve code reviews, clarify attack scenarios associated with vulnerable code, and validate positive compliance • Moving beyond pentesting toward more comprehensive security testing • Integrating your new application with your existing security infrastructure • “Ruggedizing” DevOps by adding infosec to the relationship between development and operations • Protecting application security during maintenance…”
Libro electrónico -
70992por Perez, Darrin. author“…Once you've completed the game in this book, you'll be able to modify it as much as you like, adding new monsters and quests, and you'll have the skills to go on to create your second game all by yourself. …”
Publicado 2015
Libro electrónico -
70993Publicado 2015“…Product overview Distilling the author’s fifteen years’ experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant’s Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding, and business networking) Management practice (including the security function’s move from basement to boardroom, fitting security into the wider context of organizational resilience, security management leadership, adding value, and professional proficiency) Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions) Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law) Information and cybersecurity (including why information needs protection, intelligence and espionage, cybersecurity threats, and mitigation approaches such as the ISO 27001 standard for information security management) Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy, and firearms) Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability) Personal and organizational resilience (including workplace initiative..…”
Libro electrónico -
70994Publicado 2016“…See how to protect your Node.js applications at every point in the software development life cycle, from setting up the application environment to configuring the database and adding new functionality. You'll follow application security best practices and analyze common coding errors in applications as you work through the real-world scenarios in this book. …”
Libro electrónico -
70995Publicado 2023“…A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. …”
Libro electrónico -
70996Publicado 2023“…With the tools and techniques this book will give you, you'll create a wide variety of diagrams in minutes, share them with others, and revise and update them immediately on the basis of feedback. Adding diagrams to your professional vocabulary will enable you to work through your ideas quickly when working on your own code or discussing a proposal with colleagues. …”
Libro electrónico -
70997Publicado 2023“…Next, you will work with important HubSpot tools for SEO, social media, and ads. The audiobookbook will also show you how to use HubSpot for conversational marketing and create a marketing funnel using HubSpot's lead capture and engagement tools. …”
Grabación no musical -
70998Publicado 2015“…English translation of the marginalia, or marginal notes, that were added to the text of the Deshima Diaries from the 1670's onwards in order to provide the Dutch chief of Deshima with a quick reference to the notes of his predecessors. …”
Libro electrónico -
70999Publicado 2022“…The main study profile, which differentiates it from very few existing international studies on the subject, arises from the particular situation of the Latin countries (to which some other Latin American countries must be added) that adopted, starting from XIX century, the syllabic designation of notes, abandoning the alphabetic one. …”
Libro electrónico -
71000Publicado 2014“…Ciò conduce nella terza parte ad una presentazione sistematica del pensiero trinitario ispirata alla sintesi tomista, i cui elementi essenziali sono l’articolazione della successione ideale di processioni, relazioni e Persone, che culmina nello studio delle missioni, della “perichoresis” e dell’inabitazione trinitaria. …”
Libro