Mostrando 2,281 - 2,300 Resultados de 2,961 Para Buscar '"Apple"', tiempo de consulta: 0.12s Limitar resultados
  1. 2281
    Publicado 2017
    Tabla de Contenidos: “…Chapter 6: Resist the Razzle Dazzle: How to Judge the Beauty Contest -- First, level the playing field -- Do you want an apple or an orange? -- When it comes to fees, the fruit basket becomes a huge challenge! …”
    Libro electrónico
  2. 2282
    por Ray, Chhanda
    Publicado 2009
    Tabla de Contenidos: “…Cover -- Distributed Database Systems -- Copyright -- Contents -- Preface -- Overview of Relational1 DBMS -- Concepts of Relational Databases -- Integrity Constraints -- Normalization -- Functional Dependencies -- Normal Forms -- Relational Algebra -- Selection Operation -- Projection Operation -- Union Operation -- Set Difference Operation -- Cartesian Product Operation -- Intersection Operation -- Join Operation -- Division Operation -- Relational Database Management System -- Chapter Summary -- Exercises -- Review of Database Systems -- Evolution of Distributed Database System -- Overview of Parallel Processing System -- Parallel Databases -- Benefits of Parallel Databases -- Parallel Database Architectures -- Parallel Database Design -- Data Partitioning -- Chapter Summary -- Exercises -- Distributed Database Concepts -- Fundamentals of Distributed Databases -- Features of a Distributed DBMS -- Advantages and Disadvantages of Distributed -- An Example of Distributed -- Homogeneous and Heterogeneous Distributed -- Functions of Distributed -- Components of a Distributed -- Date's 12 Objectives for Distributed Database Systems -- Chapter Summary -- Exercises -- Overview of Computer Networking -- Introduction to Networking -- Types of Computer Networks -- Communication Schemes -- Network Topologies -- The OSI Model -- Network Protocols -- TCP/IP -- SPX/IPX -- NetBIOS -- APPC -- DEC net -- Apple Talk -- WAP -- The Internet and the World-Wide Web -- Chapter Summary -- Exercises -- Distributed Database Design -- Distributed Database Design Concepts -- Alternative Approaches for Distributed Database Design -- Objectives of Data Distribution -- Alternative Strategies for Data Allocation -- Data Fragmentation -- Benefits of Data Fragmentation -- Correctness Rules for Data Fragmentation -- Different Types of Fragmentation -- The Allocation of Fragments…”
    Libro electrónico
  3. 2283
    Publicado 2014
    Tabla de Contenidos: “…What buildings are affected if something happens to Appl_9? -- What BusinessProcesses with an RTO of 0-2 hours would be affected by a fire at location Loc_100 -- Impact simulation in a Cost Calculation environment -- Modeling your product hierarchy as a graph -- Working with a product hierarchy graph -- Calculating the price based on a full sweep of the tree -- Calculating the price based on intermediate pricing -- Impact simulation on product hierarchy -- Questions and Answers -- Summary -- 8. …”
    Libro electrónico
  4. 2284
    Publicado 2024
    Tabla de Contenidos: “…Consuming XML SOAP Web Services -- Integrating with REST services -- Integrating with the cloud -- The Delphi Cloud API -- Moving the ToDo List app to Azure -- Using the AWS SDK for Delphi -- Summary -- Chapter 12: Building Mobile Backends -- Technical requirements -- Delphi and multi-tier architectures -- Working at a low level with WebBroker -- Generating a standalone project -- The Standalone WebBroker server -- Adding Apache support -- Adding a client application -- Building the web module -- Creating a new ToDo item -- Reading the data and other operations -- A client for the REST API -- Do-it-yourself with DataSnap -- Building the DataSnap server -- Implementing the DataSnap server functionality -- Building a DataSnap client -- Summary -- Chapter 13: Easy REST API Publishing with RAD Server -- Technical requirements -- RAD Server setup -- Building RAD Server resources -- The ToDo list in RAD Server -- Creating a client app for RAD Server -- Summary -- Chapter 14: App Deployment -- Technical requirements -- Deploying to app stores -- Apps artwork -- Apps orientation -- Publishing on the Apple iOS App Store -- Publishing your Android apps to the Google Play Store -- Monetizing with ads and in-app purchases -- Automate the development process -- App versioning -- Practical version control -- Sleeping well with unit testing -- Summary -- Chapter 15: The Road Ahead -- Review of what we have learned -- Trends in mobile development -- A single screen is not your limit -- Serverless backends and NoSQL databases -- The AI revolution -- Ideas for new and innovative apps for you to build -- Summary -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  5. 2285
    Publicado 2018
    Tabla de Contenidos: “…Walkthrough 196 Chapter 57: Profile: Kate Arnold of Netflix 197 Transformation Techniques 199 Chapter 58: Discovery Sprint Technique 200 Breakout: Discovery Coaches 202 Chapter 59: Pilot Team Technique 203 Chapter 60: Weaning an Organization Off Roadmaps 204 Process @ Scale 205 Chapter 61: Managing Stakeholders 206 Breakout: Devolving from Good to Bad 209 Chapter 62: Communicating Product Learnings 211 Chapter 63: Profile: Camille Hearst of Apple 212 PART 5: Summary: The Right Culture 214 Chapter 64: Good Product Team/Bad Product Team 215 Chapter 65: Top Reasons for Loss of Innovation 218 Chapter 66: Top Reasons for Loss of Velocity 220 Chapter 67: Establishing a Strong Product Culture 222 Acknowledgments 224 About the Author 226 Learning More 227.…”
    Libro electrónico
  6. 2286
    Publicado 2018
    Tabla de Contenidos: “…Docker breakout -- Poisoned images -- Database passwords and data theft -- Docker bench security -- Docker vulnerability static analysis with Clair -- Building a penetration testing laboratory -- Summary -- Chapter 6: Exploiting Git and Continuous Integration Servers -- Software development methodologies -- Continuous integration -- Types of tests -- Continuous integration versus continuous delivery -- DevOps -- Continuous integration with GitHub and Jenkins -- Installing Jenkins -- Continuous integration attacks -- Continuous integration server penetration testing -- Rotten Apple project for testing continuous integration or continuous delivery system security -- Continuous security with Zed Attack Proxy -- Summary -- Chapter 7: Metasploit and PowerShell for Post-Exploitation -- Dissecting Metasploit Framework -- Metasploit architecture -- Modules -- Exploits -- Payloads -- Auxiliaries -- Encoders -- NOPs -- Posts -- Starting Metasploit -- Bypassing antivirus with the Veil-Framework -- Writing your own Metasploit module -- Metasploit Persistence scripts -- Weaponized PowerShell with Metasploit -- Interactive PowerShell -- PowerSploit -- Nishang - PowerShell for penetration testing -- Defending against PowerShell attacks -- Summary -- Chapter 8: VLAN Exploitation -- Switching in networking -- LAN switching -- MAC attack -- Media Access Control Security -- DHCP attacks -- DHCP starvation -- Rogue DHCP server -- ARP attacks -- VLAN attacks -- Types of VLANs -- VLAN configuration -- VLAN hopping attacks -- Switch spoofing -- VLAN double tagging -- Private VLAN attacks -- Spanning Tree Protocol attacks -- Attacking STP -- Summary -- Chapter 9: VoIP Exploitation -- VoIP fundamentals -- H.323 -- Skinny Call Control Protocol -- RTP/RTCP -- Secure Real-time Transport Protocol -- H.248 and Media Gateway Control Protocol -- Session Initiation Protocol…”
    Libro electrónico
  7. 2287
    Publicado 2017
    Tabla de Contenidos: “…Don (White or African Star-apple) -- Garcinia kola Heckel and Related Species (Bitter Cola) -- Semi-Arid Lowlands of West Africa -- Adansonia digitata Linn. …”
    Libro electrónico
  8. 2288
    Publicado 2023
    Tabla de Contenidos: “…PowerPoint -- OneNote -- Collaborating in OneDrive -- Working with PDF Documents -- Part 3 The Chromebook Recreational Vehicle -- Chapter 12 Managing Your Music -- Getting Started with YouTube Music -- Creating a Standard Account -- Upgrading to a Premium Account -- Accessing Music in YouTube Music -- YouTube Music Library -- Playing Music on YouTube Music -- YouTube Music Radio -- Searching for an artist's station -- Uploading music -- Creating playlists -- Sharing playlists -- Playing music on external devices -- Enjoying Streaming Music with Pandora -- Streaming with Spotify -- Amping Up Amazon Music -- Rocking with Apple Music -- High-End Listening with Tidal -- Chapter 13 Having Fun with Photos -- Navigating the Chromebook Camera -- Taking a Picture -- Using the camera timer -- Scanning documents and QR codes -- Transferring Photos Taken with a Smartphone to Your Chromebook -- Transferring Photos from Other Devices to Your Chromebook -- Viewing Photos on Your Chromebook -- Viewing Photos on a Television -- Deleting Photos -- Deleting photos stored locally on a Chromebook -- Deleting photos from Google Photos -- Editing Photos -- Sharing Photos -- Chapter 14 Playing Video on the Chromebook -- Creating a Video with Your Chromebook -- Watching Videos on a Chromebook -- Navigating the Chromebook Video Player -- Skipping around a video -- Activating full screen mode -- Adjusting the volume -- Using Other Video Players on a Chromebook -- Playing Videos from an Android Phone or iPhone on a Chromebook -- Transferring a Video from a Dashcam or Another Device to a Chromebook -- Getting Started with Google TV -- Navigating Google TV -- Purchasing movies and TV shows -- Playing movies and TV shows -- Casting to a smart TV -- Exploring YouTube -- Navigating YouTube -- Playing and pausing video -- Activating full screen mode -- Adjusting the volume…”
    Libro electrónico
  9. 2289
    Publicado 2015
    Tabla de Contenidos: “…-- Early encryption -- Algorithms -- Algorithms: it's no secret -- Key space -- Some common types of encryption -- Encrypting file system -- Bitlocker -- Apple Filevault -- Truecrypt -- Breaking passwords -- Password attacks -- Brute force attacks -- Password reset -- Dictionary attack -- Additional resources -- Encryption -- Steganography -- Data destruction -- Drive wiping -- More advanced -- Defragmentation as anti-forensic technique -- Summary -- References -- Chapter 7 - Legal -- Information in This Chapter: -- Introduction -- The fourth amendment -- Criminal law-searches without a warrant -- Reasonable expectation of privacy -- Private searches -- E-mail -- The Electronic Communications Privacy Act -- Exceptions to the search warrant requirement -- More advanced -- Consent forms -- Alert! …”
    Libro electrónico
  10. 2290
    por Duncan, Andy
    Publicado 2002
    “… Objective-C is an exciting and dynamic approach to C-based object-oriented programming; it's the approach adopted by Apple as the foundation for programming under Mac OS X, a Unix-based operating system gaining wide acceptance among programmers and other technologists. …”
    Libro electrónico
  11. 2291
    Tabla de Contenidos: “…¿Cómo llamar a la radio que se ve?. ¿Reinventa Apple la radio musical?. El futuro era un rap. Ocho apellidos universitarios... de ocio y entretenimiento audiovisual. …”
    Clic aquí para acceso. Acceso abierto
    Libro electrónico
  12. 2292
    Publicado 2017
    Tabla de Contenidos: “…-Recognizing Your Power, Increasing It, and Using It Appropriately -- The Ultimate Escalation: Betting Your Job -- Into Every Life Some Rain Must Fall: Rotten Apples and Hardball -- The Calculated Confrontation -- Be Careful of Assuming Malevolence -- Conclusions -- Appendix A: Extended Case Examples and Supplementary Material Available on the Web -- Appendix B: Additional Resources -- Index -- End User License Agreement…”
    Libro electrónico
  13. 2293
    Publicado 2009
    Tabla de Contenidos: “…Cover -- CONTENTS -- CHAPTER 1 GETTING STARTED -- Mac OS X's Desktop -- Touring the Desktop -- Using the Dock -- Moving and Resizing Windows -- Minimizing and Maximizing Windows -- Managing Multiple Windows -- Using Custom Spaces -- Using Contextual Menus -- Restarting or Shutting Down the Mac -- Setting Basic System Preferences -- Using Universal Access -- Setting Up Voice Over -- CHAPTER 2 WORKING WITH DISKS, FOLDERS, AND FILES -- Using Single-Window Mode -- Using Multi-window Mode -- Using the Toolbar -- Customizing the Toolbar -- Using Different Folder Views -- Choosing Files in Cover Flow View -- Using the Go Menu -- Selecting Files -- Moving and Copying Files and Folders -- Making a Stack -- Viewing Stacked Files -- Making a New Folder -- Renaming Folders and Files -- Viewing File Information -- Previewing a File -- Opening a File -- Choosing a Program to Open a File -- Handling Files with Automator -- Recording Tasks -- Finding Files with Spotlight -- Creating a Smart Folder -- Creating a Burn Folder -- Accessing Your Favorite Files and Places -- Deleting a File -- Setting Up a Backup Drive -- Restoring Backed Up Files -- Using Your iDisk -- CHAPTER 3 INSTALLING AND USING APPLICATIONS -- Mac OS X's Programs -- Installing Programs -- Finding and Starting Up Programs -- Saving Files -- Writing with TextEdit -- Using the Font Panel -- Watching DVDs -- Playing Music and Video with Front Row -- Using the Apple Remote -- Switching Programs with the Dock -- Hiding Programs -- Running Windows on Your Mac -- CHAPTER 4 SETTING SYSTEM PREFERENCES -- The System Preferences Window -- Setting System Preferences -- Changing Your Alert Sound -- Changing Display Settings -- Changing the Mouse Speed -- Changing Keyboard Settings -- Setting Energy Saver Options -- Setting The Time and Date -- Adjusting the System Volume -- Setting Trackpad Preferences…”
    Libro electrónico
  14. 2294
    Publicado 2010
    Tabla de Contenidos: “…Families, values, virtues -- My roots go deep in America -- Nothing is stronger than gentleness -- My mother's great example -- The real coaches and teachers -- Strong inside -- Life's game plan starts early -- Two sets of threes -- Pride or punishment -- The gift of a lifetime -- Living up to dad's creed -- Give it away to get it back -- Six of life's puzzlers -- Trusting others -- Politeness and courtesy -- What you are -- Nellie and I agreed to be agreeable -- Passion isn't love -- Love and marriage -- Marriage is not courtship -- When marriage weakens -- Team Wooden -- Family first -- Sports, books, and kids -- Parents, children, and goals -- Mentors -- You are more influential than you think -- Commend, don't criticize -- Parenting and coaching -- My favorite four-letter words : "kids" and "love" -- Character -- The fundamental goal -- Perfection -- Priorities -- Learn forever, die tomorrow -- Faults are fine -- Timeless traits -- Giving and receiving -- Are you looking for the right things? -- Apples -- Bringing out the best in people -- Indiana and basketball -- Five more puzzlers -- The family has changed -- The greatest joy -- Peer pressure -- Accepting our responsibility -- A lesson on emotion and language -- A reminder : be true to yourself -- Make fate your friend -- Five more puzzlers -- Young folks, old folks -- Six ways to bring out the best in people -- Losing Nellie : peace of mind…”
    Libro electrónico
  15. 2295
    Tabla de Contenidos: “…-- Breadth of Applicability -- Detection Limits -- Accuracy and Precision -- Speed and Cost -- Instrumentation -- Validation -- MONITORING -- Federal Activities -- State Activities -- Food Processing Industry Activities -- Private Laboratories -- QUALITY CONTROLS -- LIMITATIONS OF THE DATA -- Sources of Error -- Other Limitations -- PESTICIDES IN WATER -- Groundwater -- Surface Water -- The Importance of Water Data to Infants and Children -- PESTICIDES IN INFANT FORMULA -- Infant Formula Based on Cow's Milk -- Soy-Based Infant Formula -- Theoretical Maximum Residue Contributions -- PESTICIDES IN HUMAN MILK -- DDT and Metabolites -- Dieldrin -- Lindane -- Hexachlorobenzene -- Other Cyclodiene Pesticides -- Risks to Infants from Pesticides in Human Milk -- PESTICIDES IN FOODS -- The FDA Surveillance Data -- Number of FDA Samples -- Positive Detections -- Residue Levels -- Residue Distribution -- Effects of Processing -- Apple-Based Foods -- Infant Cereal -- CONCLUSIONS AND RECOMMENDATIONS -- Conclusions -- Recommendations -- REFERENCES -- 7 Estimating Exposures -- THE USED OF FOOD CONSUMPTION AND RESIDUE DATA FOR EXPOSURE ASSESSMENT -- Food Consumption Data -- Average Levels of Consumption -- Peak Levels of Consumption -- Residue Monitoring -- Combining Residue and Exposure Data -- LONG-TERM EXPOSURE TO BENOMYL -- The Compound -- The Consumption Data -- The Residue Data -- Estimation of Exposure -- The Manufacturer's Field Trials -- The Manufacturer's Market Basket Survey…”
    Libro electrónico
  16. 2296
    Publicado 2011
    “…Per què Apple és l'empresa tecnològica més poderosa d'avui en dia? …”
    Libro electrónico
  17. 2297
  18. 2298
    Publicado 2017
    Tabla de Contenidos: “…MOBILE OPERATING SYSTEMS -- Android Operating System -- Apple iOS -- Symbian Operating System -- Windows Phone Operating System -- 3. …”
    Libro electrónico
  19. 2299
    Publicado 2018
    Tabla de Contenidos: “…Installing UWP support in Visual Studio -- UWP build -- Setting up for Android devices -- Installing the Java Development Kit (JDK) -- Installing Android SDK -- Via Command Line Tools -- About your Android SDK root path location -- Installing USB device debugging and connection -- Configuring the Unity External Tools -- Configuring Unity Player Settings for Android -- Building for GearVR and Oculus Go -- Building for Google VR -- Google Daydream -- Google Cardboard -- Google VR Play Mode -- Setting up for iOS devices -- Have an Apple ID -- Install Xcode -- Configuring the Unity Player Settings for iOS -- Build And Run -- Summary -- Chapter 4: Gaze-Based Control -- Ethan, the walker -- Artificially intelligent Ethan -- The NavMesh bakery -- A random walker in the town -- The RandomPosition script -- Zombie-ize" Ethan! …”
    Libro electrónico
  20. 2300
    Publicado 2013
    Tabla de Contenidos: “…A review of courses -- 6. Vn sotelte: Apple pie across time -- 7. Room for dessert? -- References -- A note on the recipes -- The way to intercultural learning is through the stomach - Genre-based writing in the EFL classroom -- 1. …”
    Libro electrónico