Mostrando 44,241 - 44,260 Resultados de 44,334 Para Buscar '".do"', tiempo de consulta: 0.17s Limitar resultados
  1. 44241
    Publicado 2015
    “…We believe the image confers on us a kind of immortality: just as the artist believes her works collected by a major museum will do the same, we believe the network will forever host the archive we build everyday. …”
    Libro electrónico
  2. 44242
    Publicado 2018
    “…As a consequence there is debate that conceptual theories of executive function do not always correspond well to the clinical picture (Manchester, Priestley & Jackson, 2004). …”
    Libro electrónico
  3. 44243
    Publicado 2022
    “…You will learn to use DAX to gain powerful insights into your data by generating complex and challenging business intelligence calculations including, but not limited to: Calculations to control the filtering of information to gain better insight into the data that matters to you Calculations across dates such as comparing data for the same period last year or the previous period Finding rolling averages and rolling totals Comparing data against targets and KPIs or against average and maximum values Using basket analysis, such as “of customers who bought product X who also bought product Y” Using “what if” analysis and scenarios Finding “like for like” sales Dynamically showing TopN/BottomN percent of customers or products by sales Finding new and returning customers or sales regions in each month or each year This book is for Excel users and non-technical users of varying levels of ability or anyone who wants to learn DAX for Power BI but lacks the confidence to do so. Alison Box is Director of Burningsuit Ltd, and an IT trainer and consultant with over 30 years of experience delivering computer applications training to all skill levels, from basic users to advanced technical experts. …”
    Libro electrónico
  4. 44244
    Publicado 2021
    “…Topics include * Information security, cybersecurity, and ethical hacking overview * Reconnaissance techniques * Network and perimeter hacking * Web application hacking * Wireless, mobile, IoT, and OT hacking * Cloud computing and cryptography Skill level: Intermediate Learn How To * Perform vulnerability assessments: Vulnerability analysis, hacking concepts, and malware * Perform reconnaissance: Actively and passively gather information about targets through online information gathering, scanning, and enumeration * Attack the network: Using information gathered in the reconnaissance phase, exploit vulnerabilities using sniffing, social engineering, DoS, and session hijacking; exploit vulnerabilities in wireless networks to gain access * Attack the app: Exploit vulnerabilities in web servers and web applications, databases, and iOS/Android applications * Attack the cloud and edge: Investigate edge IoT and cloud architectures and attack vectors * Understand cryptography: Explore symmetric and asymmetric key cryptography methods and algorithms Who Should Take This Course: * Anyone interested in passing the EC Council Certified Ethical Hacker (CEH) exam * Anyone interested in becoming a cybersecurity professional * Anyone interested in ethical hacking (penetration testing) Course Requirements: Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have two years of information security experience. …”
    Video
  5. 44245
    Publicado 2021
    “…As Gilles Deleuze has argued in 1988, "[u]ntangling these lines within a social apparatus [dispositif] is, in each case, like drawing up a map, doing cartography, surveying unknown landscapes, and this is what he [Foucault] calls 'working on the ground.'" …”
    Libro electrónico
  6. 44246
    Publicado 2016
    “…A step-by- step guide to hiring, training, and managing the team follows this introduction and will leave the reader not only with an understanding of what needs to be done but with direct examples of how they can do it"--…”
    Libro electrónico
  7. 44247
    Publicado 2023
    “…In the end, you'll have a working restful API that you can extend to do your bidding and a solid understanding of how it works. - Walt Stoneburner, Bogart Associates of Northern Virginia…”
    Libro electrónico
  8. 44248
    Publicado 2024
    “…Who Should Take This Course: The target audience for this course consists of people that have used Linux for a while and who want to know what it really is doing. The typical primary audience consists of system administrators. …”
    Video
  9. 44249
    Publicado 2024
    “…About the Technology Why do eight out of ten tech startups fail? Is it inevitable? …”
    Vídeo online
  10. 44250
    Publicado 2023
    “…He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. …”
    Video
  11. 44251
    Publicado 2024
    “…He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA. …”
    Video
  12. 44252
    Publicado 2024
    “…He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA…”
    Video
  13. 44253
    Publicado 2024
    “…He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA…”
    Video
  14. 44254
    Publicado 2024
    “…He provided Cisco, Microsoft Windows, CompTIA, and IT security training to military and DoD personnel. Now the Director of Content Development at ACI Learning, Ronnie's credentials include CCNP Enterprise Infrastructure, CCNA, CompTIA's A+, Network+, Security+, ISC2 CC, CNA Security, and PCNSA…”
    Video
  15. 44255
    Publicado 1986
    “…- how will technological innovation effect the way large-scale group activity is organized in the future?-,what methods do we have to understand/study these phenomena?Perhaps as a result of your participation in this conference, the critical issues of CSCW will be better understood.Welcome to CSCW '86. …”
    Libro electrónico
  16. 44256
    Publicado 2022
    “…Skill Level Beginner to Intermediate What You Will Learn Learn how to design an app (what to do before writing a single line of code) Learn how to break down the app development into smaller tasks Understand how GitHub is used for maintaining complex apps Gain an understanding of SDLC (software development lifecycle) Understand how to use React to build real-world projects Learn how to structure the codebase in React projects Develop several projects with JS + React (apps, games and utilities) Learn how to publish apps to the cloud within minutes Who Should Take This Course Aspiring Front-End engineers, Full-Stack engineers and Web Developers Prerequisites: Basic understanding of JavaScript + React and general web development concepts Course Requirements Prerequisites: General understanding of Front-End Development About Pearson Video Training Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. …”
    Video
  17. 44257
    por Odom, Wendell
    Publicado 2010
    “…CCNP ROUTE 642-902 Official Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. ';Do I Know This Already?' quizzes open each chapter and allow you to decide how much time you need to spend on each section. …”
    Libro electrónico
  18. 44258
    Publicado 2013
    “…Technology is advancing at an exponential pace, and it's changing the way the world does business. You can keep doing things the way you've done them. Or you can Transform. …”
    Grabación no musical
  19. 44259
    Publicado 2014
    “…If you are launching a technology startup, reading this book is the thing you should do first." -- Mark Roberti, founder and editor in chief of RFID Journal "I wish I had read Bernd's book when we founded The Echo Nest. …”
    Grabación no musical
  20. 44260
    por Unsal, Pinar
    Publicado 2022
    “…Although the chapters cover important topics in aviation psychology, they do not include every topic in the field. As such, this book marks just the beginning of future works from us on aviation psychology Havacılık kazalarının büyük oranda insan faktörlerine dayandırılmasıyla havacılık psikolojisi önem kazanmaya başlamıştır. …”
    Libro electrónico