Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,658
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 357
- Música 348
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
45121Publicado 2015“…Relatedly, and possibly of greatest practical importance, no studies have assessed whether the use of QMs improves health outcomes for patients with SMI nor do stakeholders agree on preferred outcomes. Accordingly, critical issues for the field to address include (1) determining the level of evidence (or strength of evidence) necessary to support implementation of QMs, given the complexities of studying the topic and the likely limited research funding; (2) developing the evidence base that assesses the link between QM use and outcomes; (3) considering when to invest the time and resources on measuring outcomes of care to evaluate the impact of QMs, and when process measures (proxies of the outcomes) are a reasonable and more feasible alternative; (4) determining the resource needs for QM implementation; and (5) developing validated and reliable QM tools that can be implemented feasibly in real-world practice…”
Libro electrónico -
45122Publicado 2024“…As you work through this book, you'll gain not only the skills to successfully interview, but also to do the actual work of great system design. What's Inside Insights on scaling, transactions, logging, and more Practice questions for core system design concepts How to demonstrate your engineering maturity Great questions to ask your interviewer About the Reader For software engineers, software architects, and engineering managers looking to advance their careers. …”
Grabación no musical -
45123Publicado 2023“…Written by 17 Googlers, it lays out everything you can do with Anthos, from Kubernetes deployments to AI models and edge computing. …”
Video -
45124Publicado 2023“…. - Rob Pacheco, Forward Financing I just passed CKA. Do you need a better recommendation? - David Moravec, Y Soft An absolute marvel. …”
Grabación no musical -
45125Publicado 2023“…His research projects have been funded by DARPA and the DoD. Di Zhuang is a security engineer at Snap Inc. …”
Video -
45126Publicado 2023“…. - Rob Pacheco, Forward Financing I just passed CKA. Do you need a better recommendation? - David Moravec, Y Soft An absolute marvel. …”
Video -
45127Publicado 2023“…Written by 17 Googlers, it lays out everything you can do with Anthos, from Kubernetes deployments to AI models and edge computing. …”
Grabación no musical -
45128Publicado 2023“…Rather, this and other troubling changes has much more to do with the "supply" of groups within the political elite. …”
Libro -
45129Publicado 2012“…The work tries to discuss those performance theories that emphasize the liveness, and doing so, pushed the photography into the background. …”
Enlace del recurso
Electrónico -
45130Publicado 2012“…What quality expectations in this respect do they bring with them to the multicultural classroom? …”
Enlace del recurso
Electrónico -
45131Publicado 2015“…Many individuals on the spectrum have been perceived as "non-verbal" because they do not speak. Yet, they can communicate through other means. …”
Libro electrónico -
45132Publicado 2016“…Torbett et al. deal with the complexities of the new field of applying proteomics to understanding blood-brain barrier properties as do Huntley at al. with respect to applying modern high throughput gene expression methods (Huntley et al.). …”
Libro electrónico -
45133Publicado 2015“…We believe the image confers on us a kind of immortality: just as the artist believes her works collected by a major museum will do the same, we believe the network will forever host the archive we build everyday. …”
Libro electrónico -
45134Publicado 2018“…As a consequence there is debate that conceptual theories of executive function do not always correspond well to the clinical picture (Manchester, Priestley & Jackson, 2004). …”
Libro electrónico -
45135Publicado 2022“…You will learn to use DAX to gain powerful insights into your data by generating complex and challenging business intelligence calculations including, but not limited to: Calculations to control the filtering of information to gain better insight into the data that matters to you Calculations across dates such as comparing data for the same period last year or the previous period Finding rolling averages and rolling totals Comparing data against targets and KPIs or against average and maximum values Using basket analysis, such as “of customers who bought product X who also bought product Y” Using “what if” analysis and scenarios Finding “like for like” sales Dynamically showing TopN/BottomN percent of customers or products by sales Finding new and returning customers or sales regions in each month or each year This book is for Excel users and non-technical users of varying levels of ability or anyone who wants to learn DAX for Power BI but lacks the confidence to do so. Alison Box is Director of Burningsuit Ltd, and an IT trainer and consultant with over 30 years of experience delivering computer applications training to all skill levels, from basic users to advanced technical experts. …”
Libro electrónico -
45136Publicado 2021“…Topics include * Information security, cybersecurity, and ethical hacking overview * Reconnaissance techniques * Network and perimeter hacking * Web application hacking * Wireless, mobile, IoT, and OT hacking * Cloud computing and cryptography Skill level: Intermediate Learn How To * Perform vulnerability assessments: Vulnerability analysis, hacking concepts, and malware * Perform reconnaissance: Actively and passively gather information about targets through online information gathering, scanning, and enumeration * Attack the network: Using information gathered in the reconnaissance phase, exploit vulnerabilities using sniffing, social engineering, DoS, and session hijacking; exploit vulnerabilities in wireless networks to gain access * Attack the app: Exploit vulnerabilities in web servers and web applications, databases, and iOS/Android applications * Attack the cloud and edge: Investigate edge IoT and cloud architectures and attack vectors * Understand cryptography: Explore symmetric and asymmetric key cryptography methods and algorithms Who Should Take This Course: * Anyone interested in passing the EC Council Certified Ethical Hacker (CEH) exam * Anyone interested in becoming a cybersecurity professional * Anyone interested in ethical hacking (penetration testing) Course Requirements: Anyone interested in earning a Certified Ethical Hacker (CEH) certification must attend training through EC-Council or show that they have two years of information security experience. …”
Video -
45137Publicado 2021“…As Gilles Deleuze has argued in 1988, "[u]ntangling these lines within a social apparatus [dispositif] is, in each case, like drawing up a map, doing cartography, surveying unknown landscapes, and this is what he [Foucault] calls 'working on the ground.'" …”
Libro electrónico -
45138Publicado 2016“…A step-by- step guide to hiring, training, and managing the team follows this introduction and will leave the reader not only with an understanding of what needs to be done but with direct examples of how they can do it"--…”
Libro electrónico -
45139Publicado 2023“…In the end, you'll have a working restful API that you can extend to do your bidding and a solid understanding of how it works. - Walt Stoneburner, Bogart Associates of Northern Virginia…”
Libro electrónico -
45140Publicado 2024“…Who Should Take This Course: The target audience for this course consists of people that have used Linux for a while and who want to know what it really is doing. The typical primary audience consists of system administrators. …”
Video