Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,647
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 351
- Música 343
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
43941Publicado 2018“…This is the perfect training solution to learn all of the advanced security topics that appear on the test and real security knowledge and skills to help you do your work as a security practitioner. Full of live trainer discussions, hands-on demos, lightboard elaborations, and deep-dive discussions, this course covers security in a way that is easy to access and even fun. …”
-
43942Publicado 2017“…Best-selling author and expert instructor Wendell Odom explores essential information about the exam, such as what to do if you get stuck on a question, what to expect in the testing facility, and how to manage your time. …”
-
43943Publicado 2023“…Too many organizations meet customer expectations by seeking to continuously synchronize the flow to market demand but forget to check that they are doing it profitably enough to ensure business continuity and prosperity. …”
Libro electrónico -
43944Publicado 2023“…Honorary supervisor Floris Rutjes, Professor in Organic Synthesis: "With courage and determination, she pursued her scientific vision for a very long time, and by doing so, she has ultimately made a significant contribution to the fight against viral diseases."…”
Libro electrónico -
43945Publicado 2023“…About The Author DevTechie LLC: DevTechie LLC offers courses where we learn by doing and find practical approaches to solve common problems. …”
Video -
43946Publicado 2024“…In addition, those who are still determining what they would like to do within cybersecurity can also benefit from this book by gaining an understanding of everything involved within a cybersecurity program. …”
Libro electrónico -
43947Publicado 2024“…He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA…”
Video -
43948Publicado 2020“…The second is titled "What kind of human-centric robotics do we need? Investigations from human-robot interactions in socially assistive scenarios", by Prof. …”
Libro electrónico -
43949Publicado 2001“…The activity is resource hungry, and it behoves us to do the best we can to present the best possible experience to our students.â¢Henderson et al. consider the issue of mathematics in the curriculum. …”
Libro electrónico -
43950Publicado 2021“…We are also continuing with events such as Women in IR and a panel on Diversity, Equity, and Inclusion (DEI). But we are doing more than just a panel discussion on DEI this year. …”
Libro electrónico -
43951Publicado 2004“…In Mapping Security, global security expert Tom Patterson shows how to meet these challenges by presenting security best practices, rules, and customs for virtually every country where you do business. Writing for executives, business managers, security professionals, and consultants, Patterson offers an exceptionally thorough and authoritativ..…”
Libro electrónico -
43952Publicado 2001“…When and how should you optimize your code? Why can (and do) fancy optimizations get us into trouble? And how can some of these answers change if you're writing multithread-safe code? …”
Libro electrónico -
43953Publicado 2007“…Topics covered include Writing better tests--and writing them faster The four phases of automated tests: fixture setup, exercising the system under test, result verification, and fixture teardown Improving test coverage by isolating software from its environment using Test Stubs and Mock Objects Designing software for greater testability Using test "smells" (including code smells, behavior smells, and project smells) to spot problems and know when and how to eliminate them Refactoring tests for greater simplicity, robustness, and execution speed This book will benefit developers, managers, and testers working with any agile or conventional development process, whether doing test-driven development or writing the tests last. …”
Libro electrónico -
43954Publicado 2010“…From the mind and heart of a winning and highly respected financial advisor, it’s a strong dose of ‘intellectual hard love’–a lot of things you may not want to hear or do–but absolutely need to– before investing a dime.” …”
Libro electrónico -
43955Publicado 2018“…You will learn why cloud architectures take the forms that they do, and this will help you become a skilled high-level cloud architect. …”
Libro electrónico -
43956Publicado 2019“…What you will learn Learn the red, green, refactor cycle of classic TDD and practice the best habits such as the rule of 3, triangulation, object calisthenics, and more Refactor using parallel change and improve legacy code with characterization tests, approval tests, and Golden Master Use code smells as feedback to improve your design Learn the double cycle of ATDD and the outside-in mindset using mocks and stubs correctly in your tests Understand how Coupling, Cohesion, Connascence, SOLID principles, and code smells are all related Improve the understanding of your business domain using BDD and other principles for "doing the right thing, not only the thing right" Who this book is for This book is designed for software developers looking to improve their technical practices. …”
Libro electrónico -
43957Publicado 2016“…This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. …”
Libro electrónico -
43958Publicado 2018“…Your own biology will not let you improve your life in any other way. What do you currently value? What are working to attain? …”
Libro electrónico -
43959por Carvey, Harlan A.“…—Jennifer Kolde, information security consultant, author, and instructor "Harlan Carvey's book is a one-of-a-kind approach to do-it-yourself Windows forensics. With detailed and illustrative examples coupled with Harlan's renowned Perl scripts, this book certainly is a great find." …”
Publicado 2005
Libro electrónico -
43960por Metsker, Steven John“…Steve Metsker's learn-by-doing approach helps you enhance your practical skills and build the confidence you need to use design patterns effectively in mission-critical applications. …”
Publicado 2002
Libro electrónico