Mostrando 224,721 - 224,740 Resultados de 225,481 Para Buscar '"C "', tiempo de consulta: 0.46s Limitar resultados
  1. 224721
    por Cristofolini, Paolo
    Publicado 2016
    “…À côté des nombreux travaux consacrés à l'herméneutique biblique chez Spinoza et chez Hobbes, ou à la question du théologico-politique et de la naissance des institutions politiques modernes, cet ouvrage veut montrer comment, à partir d'une interprétation nouvelle de l'ancien – l'Écriture sainte –, quelque chose d'inédit a été produit dans la pensée des institutions politiques, du droit, du corps politique et de la multitude. C'est paradoxalement en interprétant à nouveaux frais l'Écriture que la politique peut devenir, chez Hobbes, une création humaine ou, chez Spinoza, une œuvre humaine dont la rationalité peut être pensée à différents degrés ; ce qui revient à penser comment la modernité est aussi issue d'une politique de la Parole…”
    Electrónico
  2. 224722
    Publicado 2016
    “…This new edition has been updated to include: A UK/Euro focused appendix, enhancing the book’s accessibility to students and professionals of television production around the world An advanced discussion of the job of the Director and the Command Cue Language Fresh discussion of tapeless protocols in the control room, Media Object Server newsroom control software (iNews), editing systems, switcher embedded image store, and DPM (DVE) Brand new sections on UHDTV (4K), set design, lighting design, microphones, multiviewers, media asset management, clip-servers, and the use of 2D and 3D animation Expanded coverage of clip types used in ENG and video journalism (VO, VO/SOT, and PKG) An all new companion website (www.focalpress.com/cw/utterback) with pre-recorded lectures by the author, sample video clips, an expanded full color image archive, vocabulary flashcards, and more Note: the companion website is still under development, but in the meantime the author's filmed lectures are all freely available on Youtube: https://www.youtube.com/channel/UCRp_aSpO0y8cDqLjFGZ2s9A…”
    Libro electrónico
  3. 224723
    “…Let Expert Indexing in Oracle Database 12c be your guide to deep mastery of the most fundamental performance optimization structure in Oracle Database. …”
    Libro electrónico
  4. 224724
    Publicado 2015
    “…Set up your Swift development environment Master Swift’s fundamental data types and operators Make the most of arrays and dictionaries Control program flow, modify execution paths, and iterate code Perform complex actions with functions Work with higher-order functions and closures Harness the power of structs, enums, classes, and class inheritance Customize initializers of classes, structs, and enums Implement instance methods, type methods, and advanced type functionality Take full advantage of Swift’s advanced memory allocation Extend type functionality with protocols and extensions Leverage the power of generics, chaining, and other advanced features Interoperate with Objective-C code Interact with user interfaces Take advantage of Swift’s Standard Library features and functions Who Should Read this Book Beginner-intermediate level programmers Advanced programmers who are not yet familiar with Swift can benefit…”
    Libro electrónico
  5. 224725
    por Harter, Hélène
    Publicado 2020
    “…En analysant le rôle des ingénieurs municipaux, c'est en fait les réalités urbaines de la fin du XIXe siècle que nous cernons mieux…”
    Electrónico
  6. 224726
    por Allmen-Schmidt, Valérie Von
    Publicado 2016
    “…Le « héros voyageur » n'apparaît pas alors comme une catégorie homogène, et pourtant son appropriation par les sociétés, le pouvoir en place ou les créateurs, fait de lui un modèle qui fonctionne et nourrit l'imaginaire, depuis la période archaïque jusqu'à nos jours, comme le démontre la richesse des productions littéraires et visuelles : c'est ce processus qu'analysent les articles rassemblés dans ce volume…”
    Electrónico
  7. 224727
    Publicado 2023
    “…Reste à comprendre comment on a pu en arriver là.C'est ce que nous propose cette étude magistrale, en analysant quelques cas parmi les plus alarmants d'impostures mystiques du xxe et du xxie siècle. …”
    991009740329006719
  8. 224728
    Publicado 2018
    “…S'il défie la modernité, et s'il passe pour un traître à son pays et parfois même à sa classe sociale, c'est à la fois en sage et en fou, en excentrique et en réservé qu'il donne et rend tous les coups. …”
    991005301569706719
  9. 224729
    por Kotansky, Roy David, aut 1953-
    Publicado 2021
    “…Using the figure of the frog, C(h)arour, to symbolize the biblical plague but also the Egyptian concept of rebirth, the instruction was intended to strengthen group cohesion and especially to prepare the novices that were about to receive their baptism during the Easter celebration for a life devoted to the Koinonia and its principles. …”
    Artículo
  10. 224730
    Publicado 2018
    “…Prior exposure and understanding of C#, JavaScript, HTML, and CSS syntax is assumed…”
    Libro electrónico
  11. 224731
    Publicado 2017
    “…Transition from Objective-C and move code into Swift the right way. Boost API design using proper naming and labeling. …”
    Libro electrónico
  12. 224732
    Publicado 2017
    “…Discover how to: • Determine when a tabular or multidimensional model is right for your project • Build a tabular model using SQL Server Data Tools in Microsoft Visual Studio 2015 • Integrate data from multiple sources into a single, coherent view of company information • Choose a data-modeling technique that meets your organization’s performance and usability requirements • Implement security by establishing administrative and data user roles • Define and implement partitioning strategies to reduce processing time • Use Tabular Model Scripting Language (TMSL) to execute and automate administrative tasks • Optimize your data model to reduce the memory footprint for VertiPaq • Choose between in-memory (VertiPaq) and pass-through (DirectQuery) engines for tabular models • Select the proper hardware and virtualization configurations • Deploy and manipulate tabular models from C# and PowerShell using AMO and TOM libraries Get code samples, including complete apps, at: https://aka.ms/tabular/downloads About This Book • For BI professionals who are new to SQL Server 2016 Analysis Services or already familiar with previous versions of the product, and who want the best reference for creating and maintaining tabular models. • Assumes basic familiarity with database design and business analytics concepts…”
    Libro electrónico
  13. 224733
    Publicado 2018
    “…In order to account for hardware security as a rapidly developing discipline, ASHES routinely offers four categories of submission: Full papers; Short papers;Systematization of Knowledge (SoK) papers, which structure or survey a certain subarea within hardware security; Wild and Crazy (WaC) papers, whose aim is to distribute a promising and potentially seminal research idea at an early stage to the community. …”
    Libro electrónico
  14. 224734
    Publicado 2014
    “…Coverage includes: How analytical and conventional decision making differ — and the challenging implications How to determine who your analytics deciders are, and ought to be Proven best practices for actually applying analytics to decision-making How to optimize your use of analytics as an analyst, manager, executive, or C-level officer Applied Business Analytics will be invaluable to wide audiences of professionals, decision-makers, and consultants involved in analytics, including Chief Analytics Officers, Chief Data Officers, Chief Scientists, Chief Marketing Officers, Chief Risk Officers, Chief Strategy Officers, VPs of Analytics and/or Big Data, data scientists, business strategists, and line of business executives. …”
    Libro electrónico
  15. 224735
    Publicado 2017
    “…Please note that an account with Box is not required to access these files: https://informausa.app.box.com/s/plwbtwndq4wab55a1p7xlcr7lypvz64c…”
    Libro electrónico
  16. 224736
    por Maurer, Paul J.
    Publicado 2024
    “…You'll also find: A complete system of cybersecurity ethics relevant to C-suite leaders and executives, front-line cybersecurity practitioners, and students preparing for careers in cybersecurity. …”
    Libro electrónico
  17. 224737
    por Rodriguez, Claudia Salzberg
    Publicado 2005
    “…Coverage includes Data structures x86 and PPC assembly language Viewing kernel internals Linux process model User and kernel space Interrupts and exceptions Memory allocation and tracking Tracing subsystem behavior I/O interactions Filesystems and file operations Scheduling and synchronization Kernel boot process Kernel build system Configuration options Device drivers And more... If you know C, this book teaches you all the skills and techniques you need to succeed with Linux kernel programming. …”
    Libro electrónico
  18. 224738
    Publicado 2008
    “…Then, to demonstrate how TPM can solve many of today’s most challenging security problems, they present four start-to-finish case studies, each with extensive C-based code examples. Coverage includes What services and capabilities are provided by TPMs TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments Using TPM to enhance the security of a PC’s boot sequence Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more Linking PKCS#11 and TSS stacks to support applications with middleware services What you need to know about TPM and privacy--including how to avoid privacy problems Moving from TSS 1.1 to the new TSS 1.2 standard TPM and TSS command references and a complete function library…”
    Libro electrónico
  19. 224739
    por Shalloway, Alan
    Publicado 2002
    “…With illustrative examples in C++ and Java, the book demystifies the "whys," "why nots," and "hows" of patterns and explains pattern implementation. …”
    Libro electrónico
  20. 224740
    por Howard, Michael, 1965-
    Publicado 2009
    “…Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilities Use of magic URLs, predictable cookies, and hidden form fields Buffer overruns Format string problems Integer overflows C++ catastrophes Insecure exception handling Command injection Failure to handle errors Information leakage Race conditions Poor usability Not updating easily Executing code with too much privilege Failure to protect stored data Insecure mobile code Use of weak password-based systems Weak random numbers Using cryptography incorrectly Failing to protect network traffic Improper use of PKI Trusting network name resolution…”
    Libro electrónico