Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 1,153
- Historia 939
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 648
- Leadership 594
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Design 396
- Social aspects 396
- Data processing 381
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 300
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 278
- Derecho Laboral y Seguridad Social 275
- Finance 273
-
36941Publicado 2016“…Torbett et al. deal with the complexities of the new field of applying proteomics to understanding blood-brain barrier properties as do Huntley at al. with respect to applying modern high throughput gene expression methods (Huntley et al.). …”
Libro electrónico -
36942Publicado 2015“…We believe the image confers on us a kind of immortality: just as the artist believes her works collected by a major museum will do the same, we believe the network will forever host the archive we build everyday. …”
Libro electrónico -
36943Publicado 2018“…As a consequence there is debate that conceptual theories of executive function do not always correspond well to the clinical picture (Manchester, Priestley & Jackson, 2004). …”
Libro electrónico -
36944Publicado 2022“…You will learn to use DAX to gain powerful insights into your data by generating complex and challenging business intelligence calculations including, but not limited to: Calculations to control the filtering of information to gain better insight into the data that matters to you Calculations across dates such as comparing data for the same period last year or the previous period Finding rolling averages and rolling totals Comparing data against targets and KPIs or against average and maximum values Using basket analysis, such as “of customers who bought product X who also bought product Y” Using “what if” analysis and scenarios Finding “like for like” sales Dynamically showing TopN/BottomN percent of customers or products by sales Finding new and returning customers or sales regions in each month or each year This book is for Excel users and non-technical users of varying levels of ability or anyone who wants to learn DAX for Power BI but lacks the confidence to do so. Alison Box is Director of Burningsuit Ltd, and an IT trainer and consultant with over 30 years of experience delivering computer applications training to all skill levels, from basic users to advanced technical experts. …”
Libro electrónico -
36945Publicado 2021“…Topics include * Information security, cybersecurity, and ethical hacking overview * Reconnaissance techniques * Network and perimeter hacking * Web application hacking * Wireless, mobile, IoT, and OT hacking * Cloud computing and cryptography Skill level: Intermediate Learn How To * Perform vulnerability assessments: Vulnerability analysis, hacking concepts, and malware * Perform reconnaissance: Actively and passively gather information about targets through online information gathering, scanning, and enumeration * Attack the network: Using information gathered in the reconnaissance phase, exploit vulnerabilities using sniffing, social engineering, DoS, and session hijacking; exploit vulnerabilities in wireless networks to gain access * Attack the app: Exploit vulnerabilities in web servers and web applications, databases, and iOS/Android applications * Attack the cloud and edge: Investigate edge IoT and cloud architectures and attack vectors * Understand cryptography: Explore symmetric and asymmetric key cryptography methods and algorithms Who Should Take This Course: * Anyone interested in passing the EC Council Certified Ethical Hacker (CEH) exam * Anyone interested in becoming a cybersecurity professional * Anyone interested in ethical hacking (penetration testing) Course Requirements: Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have two years of information security experience. …”
Video -
36946Publicado 2021“…As Gilles Deleuze has argued in 1988, "[u]ntangling these lines within a social apparatus [dispositif] is, in each case, like drawing up a map, doing cartography, surveying unknown landscapes, and this is what he [Foucault] calls 'working on the ground.'" …”
Libro electrónico -
36947Publicado 2016“…A step-by- step guide to hiring, training, and managing the team follows this introduction and will leave the reader not only with an understanding of what needs to be done but with direct examples of how they can do it"--…”
Libro electrónico -
36948Publicado 2023“…In the end, you'll have a working restful API that you can extend to do your bidding and a solid understanding of how it works. - Walt Stoneburner, Bogart Associates of Northern Virginia…”
Libro electrónico -
36949Publicado 2024“…Who Should Take This Course: The target audience for this course consists of people that have used Linux for a while and who want to know what it really is doing. The typical primary audience consists of system administrators. …”
Video -
36950Publicado 2024“…About the Technology Why do eight out of ten tech startups fail? Is it inevitable? …”
Vídeo online -
36951Publicado 2023“…He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. …”
Video -
36952Publicado 2024“…He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. …”
Video -
36953Publicado 2024“…He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA…”
Video -
36954Publicado 2024“…He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA…”
Video -
36955Publicado 2024“…He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA…”
Video -
36956Publicado 1986“…- how will technological innovation effect the way large-scale group activity is organized in the future?-,what methods do we have to understand/study these phenomena?Perhaps as a result of your participation in this conference, the critical issues of CSCW will be better understood.Welcome to CSCW '86. …”
Libro electrónico -
36957Publicado 2022“…Skill Level Beginner to Intermediate What You Will Learn Learn how to design an app (what to do before writing a single line of code) Learn how to break down the app development into smaller tasks Understand how GitHub is used for maintaining complex apps Gain an understanding of SDLC (software development lifecycle) Understand how to use React to build real-world projects Learn how to structure the codebase in React projects Develop several projects with JS + React (apps, games and utilities) Learn how to publish apps to the cloud within minutes Who Should Take This Course Aspiring Front-End engineers, Full-Stack engineers and Web Developers Prerequisites: Basic understanding of JavaScript + React and general web development concepts Course Requirements Prerequisites: General understanding of Front-End Development About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. …”
Video -
36958por Odom, Wendell“…CCNP ROUTE 642-902 Official Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. ';Do I Know This Already?' quizzes open each chapter and allow you to decide how much time you need to spend on each section. …”
Publicado 2010
Libro electrónico -
36959Publicado 2013“…Technology is advancing at an exponential pace, and it's changing the way the world does business. You can keep doing things the way you've done them. Or you can Transform. …”
Grabación no musical -
36960Publicado 2014“…If you are launching a technology startup, reading this book is the thing you should do first." -- Mark Roberti, founder and editor in chief of RFID Journal "I wish I had read Bernd's book when we founded The Echo Nest. …”
Grabación no musical