Mostrando 302,881 - 302,900 Resultados de 304,420 Para Buscar '"C "', tiempo de consulta: 1.15s Limitar resultados
  1. 302881
    Publicado 2022
    “…About The Author Amit Diwan: Studyopedia was founded by Amit Diwan in 2018 after working for Tutorialspoint , IIT, IASRI, Sitepoint, DU, and C# Corner. Studyopedia sells courses on Udemy, Tutorialspoint, Geeksforgeeks, and Skillshare, providing video courses to master various technologies and programming languages, databases, frameworks, Python, data science, machine learning, Java, Android, C/C++, HTML5, Bootstrap, JavaScript, jQuery, PHP, CSS, WordPress, Drupal, Joomla, Magento, osCommerce, OpenCart, PrestaShop, and other disciplines. …”
    Video
  2. 302882
    Publicado 2022
    “…About The Author Amit Diwan: Studyopedia was founded by Amit Diwan in 2018 after working for Tutorialspoint , IIT, IASRI, Sitepoint, DU, and C# Corner. Studyopedia sells courses on Udemy, Tutorialspoint, Geeksforgeeks, and Skillshare, providing video courses to master various technologies and programming languages, databases, frameworks, Python, data science, machine learning, Java, Android, C/C++, HTML5, Bootstrap, JavaScript, jQuery, PHP, CSS, WordPress, Drupal, Joomla, Magento, osCommerce, OpenCart, PrestaShop, and other disciplines. …”
    Video
  3. 302883
    Publicado 2017
    “…., he has delivered Java, C#, Visual Basic, C++, C and Internet programming courses to industry clients, including Cisco, IBM, Sun Micro systems, Dell, Siemens, Lucent Technologies, Fidelity, NASA at the Kennedy Space Center, the National Severe Storm Laboratory, White Sands Missile Range, Rogue Wave Software, Boeing, SunGard Higher Education, Stratus, Cambridge Technology Partners, One Wave, Hyperion Software, Adra Systems, Entergy, CableData Systems, Nortel Networks, Puma, iRobot, Invensys and many more. …”
    Video
  4. 302884
    Publicado 2015
    “…Course Requirements The audience background, or prerequisite is a basic knowledge of Java, but if not, then knowledge on another object-oriented programming language in the syntactic traditions of C/C++. For example, a candidate with a good knowledge of C# should be able to benefit from this material, even if they do not have prior experience in Java. …”
    Video
  5. 302885
    Publicado 2017
    “…It is no longer necessary to learn C/C++ to develop resource intensive and low-level systems applications. …”
    Libro electrónico
  6. 302886
    Publicado 2015
    “…It is increasingly being adopted in Python for development. OpenCV has C++/C, Python, and Java interfaces with support for Windows, Linux, Mac, iOS, and Android. …”
    Libro electrónico
  7. 302887
    Publicado 2011
    “…Diann Sloan has R.N., B.S.N., M.S.N., F.N.C., as well as MS. Ed. and Ph.D. in Education degrees. …”
    CDROM
  8. 302888
    Publicado 2010
    “…For modern SoC design, practical applications are usually speed hungry. …”
    Libro electrónico
  9. 302889
    Publicado 2020
    “…Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland Barmak Meftah, President, ATamp;T Cybersecurity Cleve Adams, CEO, Site 1001 (AI and big data based smart building company) Ann Johnson, Corporate Vice President - Cybersecurity Solutions Group, Microsoft Barbara Humpton, CEO, Siemens USA Businesses and states depend on effective cybersecurity. …”
    Libro electrónico
  10. 302890
    Publicado 2019
    “…., he has delivered Java, C#, Visual Basic, C++, C and Internet programming courses to industry clients, including Cisco, IBM, Sun Micro systems, Dell, Siemens, Lucent Technologies, Fidelity, NASA at the Kennedy Space Center, the National Severe Storm Laboratory, White Sands Missile Range, Rogue Wave Software, Boeing, SunGard Higher Education, Stratus, Cambridge Technology Partners, One Wave, Hyperion Software, Adra Systems, Entergy, CableData Systems, Nortel Networks, Puma, iRobot, Invensys and many more. …”
    Video
  11. 302891
    Publicado 2016
    “…., he has delivered Java, C#, Visual Basic, C++, C and Internet programming courses to industry clients, including Cisco, IBM, Sun Micro systems, Dell, Siemens, Lucent Technologies, Fidelity, NASA at the Kennedy Space Center, the National Severe Storm Laboratory, White Sands Missile Range, Rogue Wave Software, Boeing, SunGard Higher Education, Stratus, Cambridge Technology Partners, One Wave, Hyperion Software, Adra Systems, Entergy, CableData Systems, Nortel Networks, Puma, iRobot, Invensys and many more. …”
    Video
  12. 302892
    Publicado 2021
    “…The book climaxes with two chapter-length explorations of Sedgwick's own late-life book-art practice: her panda Valentine alphabet cards (c. 1996) and her Last Days of Pompeii/Cavafy unique artist's book (c. 2007)…”
    Libro electrónico
  13. 302893
    Publicado 2007
    “…Install, configure, and maintain UNIX on your PC or workstation Work with files, directories, commands, and the UNIX shell Create and modify text files using powerful text editors Use UNIX desktops, including GNOME, CDE, and KDE, as an end user or system administrator Use and manage e-mail, TCP/IP networking, and Internet services Protect and maintain the security of your UNIX system and network Share devices, printers, and files between Windows and UNIX systems Use powerful UNIX tools, including awk, sed, and grep Develop your own shell, Python, and Perl scripts, and Java, C, and C++ programs under UNIX Set up Apache Web servers and develop browser-independent Web sites and applications…”
    Libro electrónico
  14. 302894
    Publicado 2016
    “…Students should have basic familiarity with C or C++. MasteringEngineering® not included. …”
    Libro electrónico
  15. 302895
    Publicado 2002
    “…McManus Joshua Meyrowitz C. Wright Mills Merrill Morris John C. Nerone W. …”
    Libro
  16. 302896
    Publicado 2005
    “…Munoz; M. Papageorgiou; C. Piazza; S.E. Shladover; D.M. Stipanovic; T.M. …”
    Libro
  17. 302897
    Publicado 2018
    Tabla de Contenidos: “…Attacks 102 -- 5.3 The Business Model Approach 103 -- 5.3.1 The 4C Typology of the ICT Business Model 104 -- 5.3.2 Business Models in the Context of Cyber Preparedness 105 -- 5.4 The Business Case of Cyber Security in the Era of 5G 106 -- 5.4.1 The Users and Issues of Cyber Security in 5G 108 -- 5.4.2 Scenarios for 5G Security Provisioning 109 -- 5.4.3 Delivering Cyber Security in 5G 110 -- 5.5 Business Model Options in 5G Cyber Security 112 -- 5.6 Acknowledgment 114 -- References 114 -- Part II 5G Network Security 117 -- 6 Physical Layer Security 119 /Simone Soderi, Lorenzo Mucchi, Matti Hämäläinen, Alessandro Piva, and Jari Iinatti -- 6.1 Introduction 119 -- 6.1.1 Physical Layer Security in 5G Networks 120 -- 6.1.2 Related Work 121 -- 6.1.3 Motivation 121 -- 6.2 WBPLSec System Model 123 -- 6.2.1 Transmitter 124 -- 6.2.2 Jamming Receiver 126 -- 6.2.3 Secrecy Metrics 126 -- 6.2.4 Secrecy Capacity of WBPLSec 128 -- 6.2.5 Secrecy Capacity of iJAM 129 -- 6.3 Outage Probability of Secrecy Capacity of a Jamming Receiver 131 -- 6.3.1 Simulation Scenario for Secrecy Capacity 134 -- 6.4 WBPLSec Applied to 5G networks 136 -- 6.5 Conclusions 138 -- References 139 -- 7 5G?]…”
    Libro electrónico
  18. 302898
  19. 302899
    Publicado 1751
    Tabla de Contenidos: “…Ruano (margen de las h . 165 r.-166 r.) . c) Notizias de la Puente Don Gonzalo (h . 169 r.…”
    Manuscrito
  20. 302900
    Publicado 2014
    “…Interactive Simulations: 2-1: Identifying Malware Types 2-2: Securing the BIOS 2-4: Filtering E-mails 3-3: Stopping Services in the Command Prompt 4-1: Securing Web Browsers 5-1: Creating a DMZ 5-3: Defending against the Web Shell 6-1a: Understanding Port Numbers, Part A 6-1b: Understanding Port Numbers, Part B 6-1c: Understanding Port Numbers, Part C 6-2a: Identifying Network Attacks, Part A 6-2b: Identifying Network Attacks, Part B 6-2c: Identifying Network Attacks, Par..…”
    Libro electrónico