Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,647
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 351
- Música 343
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
43961Publicado 2002“…Readers will benefit from the real-world, "this is how to do it" approach Cavaness takes to developing complex enterprise applications using Struts, and his focus on the 1.1 version of the Framework makes this the most up-to-date book available. …”
Libro electrónico -
43962por Lawson, Susan“…Coverage includes Understanding the DB2 product family, architecture, attachments, and the DB2 z/OS environment Securing enterprise-class DB2 installations and applications Using SQL to create and manage database objects, and manipulate and retrieve information Mastering key DBA tasks, including loading, reorganizing, quiescing, repairing, and recovering data; recovering and rebuilding indexes; and gathering statistics Implementing data sharing in Parallel Sysplex environments Learning the fundamentals of DB2 application development from the DBA's perspective Leveraging advanced DB2 functions, including stored procedures and other object-relational extensions Optimizing DB2 applications and the DB2 engine for maximum performance Whether you are administering DB2 UDB V8 in z/OS environments, planning to do so, or preparing for DB2 UDB V8 DBA certification, DB2 for z/OS Version 8 DBA Certification Guide will be your single most valuable resource…”
Publicado 2005
Libro electrónico -
43963Publicado 2005“…Iverson's coverage includes Downloading Commons project libraries and installing them into Eclipse Programmatically accessing resources via HTTP, FTP, NNTP, and other Internet protocols Using the Jakarta Commons suite of configurable object pools Managing database connectivity in Swing applications—and anywhere containers aren't doing it for you Using BeanUtils to generate forms and gain runtime access to information provided by JavaBeans-style objects Traversing complex object graphs with JXPath Using Jakarta Commons' advanced collections tools to establish richer object relationships Extending java.lang with better methods for manipulating core classes Implementing conversion routines, configurable logging, command-line help, and more Exploring the newest packages, including emerging "sandbox" packages Whether you're building code for front-end Web applications, client-side software, or back-end servers, learning Jakarta Commons will make you far more efficient. …”
Libro electrónico -
43964Publicado 2007“…Tactics and strategy: protecting Internet infrastructure from top to bottom Building more secure transport, messaging, identities, networks, platforms, and more Gaining safety without sacrificing the Internet’s unique power and value Making the Internet safer for honest people without sacrificing ubiquity, simplicity, or privacy Spam: draining the swamp, once and for all Why spam contributes to virtually every form of Internet crime–and what we can do about it Design for deployment: how to really make it happen Defining security objectives, architecture, strategy, and design–and evangelizing them How to Build a Safer, Better Internet You’ll find yourself deeply concerned, then fascinated, then hopeful as you read about • Building an Internet that resists online crime • Phishing, botnets, and spam: tactical, workable, immediate countermeasures • Establishing the “Accountable Web”: a strategic, long-term solution to Internet crime • Improving security without sacrificing what people love about the Internet The Internet is today’s Wild West: too much lawlessness, too little accountability. …”
Libro electrónico -
43965Publicado 2009“…Here are just a few things you’ll learn to do: •Build a RED package that fits your budget •Set up for sound recording and learn which audio tools to use •Achieve the optimal exposure using RED’s onboard tools and external gear •Edit your footage with step-by-step instructions for Avid, Final Cut Pro, and Premiere Pro •Work color correction into your HD, film, or Web projects •Prep your project for output and archive your footage •Learn from pros such as Rodney Charters, ASC (DP, 24 ), Simon Duggan, ACS (DP, Knowing ), Albert Hughes (Director, The Book of Eli ), and many others using RED •Stay up-to-date and download additional resources at the companion Web site at www.peachpit.com/red "If you want to dive in and starting using the RED, look no further. …”
Libro electrónico -
43966Publicado 2015“…What You Will Learn Interact with XBee boards using the XCTU program on Windows, OS X, or Linux Make your Arduino boards communicate wirelessly, using XBee modules in the advanced API mode Centrally collect and store measured sensor data, in the cloud or your own database Connect the coordinator Arduino to the Internet and send data to web services Control your environment automatically, based on sensor input from your network Interact with off-the-shelf ZigBee Home Automation devices Make your devices battery-powered and let them sleep to get months or even years of battery life In Detail Arduino has been established as the de facto standard microcontroller programming platform, being used for one-off do-it-yourself projects as well as prototypes for actual products. …”
Libro electrónico -
43967Publicado 2022“…This course is for people who want to do penetration testing against a specific Wi-Fi network…”
Video -
43968Publicado 2017“…Apply core security techniques including 2FA and strong passwords Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods Use the security-focused Tails distribution as a quick path to a hardened workstation Compartmentalize workstation tasks into VMs with varying levels of trust Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can't be used Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream Set up standalone Tor services and hidden Tor services and relays Secure Apache and Nginx web servers, and take full advantage of HTTPS Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC Systematically protect databases via network access control,..…”
Libro electrónico -
43969Publicado 2015“…You’ll learn how to build native watch apps that perform exceptionally well on their own and how to integrate your apps with iPhones to do even more. Coverage includes Writing high-performance, native watch apps that run independently of the iPhone Accessing hardware, including Digital Crown, microphone, and Taptic Engine Storyboarding apps and testing them on the Apple Watch Simulator Mastering Apple Watch’s multiple-screen navigation Building efficient interfaces with Apple Watch UI controls Creating and programming “complications”–apps that display data on the watch face, such as alarms, tachymeters, chronographs, and calendars Displaying information via labels, images, or tables Passing and returning data to Interface Controllers Integrating location services into Apple Watch apps Using Watch Connectivity Framework APIs to link watch and iOS apps Calling and consuming web services Persisting data on the watch Displaying short- and long-look notifications Implementing glances to help users gather information faster This guide will help you extend your existing iOS skills, build apps that solve a whole new set of problems, and reach millions of people in the fast-growing Apple Watch marketplace. …”
Libro electrónico -
43970Publicado 2016“…With IBM DB2 Analytics Accelerator 5.1 and SPSS Modeler 17.1, the possibility exists to do the complete predictive model creation including data transformation within DB2 Analytics Accelerator. …”
Libro electrónico -
43971por Moran, Matthew“…Let Matt help you to be one of them through his career philosophy “Do not accept mediocrity as a career objective–demand more of yourself.” …”
Publicado 2005
Libro electrónico -
43972por Perman, Stacy“…As Stacy Perman chronicles the derring-do of a band of Israeli intelligence operatives, she shows how the country's fight for survival has forced it to think and act with brash creativity— both on and off the battlefield." — JOSHUA HAMMER, JERUSALEM BUREAU CHIEF, NEWSWEEK, AND AUTHOR OF A SEASON IN BETHLEHEM: UNHOLY WAR IN A SACRED PLACE In Spies, Inc. former Time and Business 2.0 writer Stacy Perman reveals the spellbinding story of the Israeli military and 8200, the ultra-secret high-tech intelligence unit whose alumni helped create a number of the groundbreaking technologies behind today's information revolution. …”
Publicado 2005
Libro electrónico -
43973por Augustine, Sanjiv“…V.P. and Director Agile Software Development and Project Management Practice Fellow, Business Technology Council Cutter Consortium LLC, Arlington, MA "Here is an innovative approach to the management of agile projects, examining traditional project management practices that do not align well with new agile methodologies. …”
Publicado 2005
Libro electrónico -
43974Publicado 2006“…CCSP SNRS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already” quizzes open each chapter and allow you to decide how much time you need to spend on each section. …”
Libro electrónico -
43975Publicado 2007“…Lead network engineer and consultant David Hucaby shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your switching knowledge through the use of the consistent features in each chapter. “Do I Know This Already?” quizzes open each chapter and allow you to decide how much time you need to spend on each section. …”
CDROM -
43976por Carter, Earl“…CCSP IPS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already” quizzes open each chapter and allow you to decide how much time you need to spend on each section. …”
Publicado 2005
Libro electrónico -
43977Publicado 2008“…Few books show you how to do it better than this one.” – Dave Ulrich , Author of Leadership Brand , Professor of Business, University of Michigan and Partner, The RBL Group (www.rbl.net) “A significant barrier to any major change or innovation management process is in transparently defining the past and desired future state, then connecting the move from the former to latter in an inspirational way. …”
Libro electrónico -
43978Publicado 2007“…Save smarter, invest smarter, and spend smarter, starting today Reduce your financial risks--and eliminate your money anxieties For everyone interested in improving their personal finances...whether you’re saving for college, retirement, or anything else Worried about money? Join the club. Now, do something about it ! One of America’s best-selling personal finance authors offers real, practical solutions that work: steps you can take right now to start replacing money anxiety with financial fulfillment and happiness. …”
Libro electrónico -
43979por Shapiro, David, 1954-“…Only Jerry Seinfeld can make money doing nothing! Understand retirement investment risks—..…”
Publicado 2004
Libro electrónico -
43980Publicado 2008“…. • Learn why Six Sigma Pricing makes sense Why you should target pricing operations, and how to do it • Identify profit leaks from inefficient pricing operations Why “sloppy pricing” occurs, how to find it, and how to root it out • Illuminate your current pricing processes, so you can improve them Understand your market-facing and internally focused pricing processes pertaining to product launch and lifecycle price management, price increases due to escalation in costs of raw materials, promo..…”
Libro electrónico