Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- CD-ROM 601
- Historia 410
- Música 390
- Engineering & Applied Sciences 339
- Inglés (Lengua) 291
- Computer Science 245
- Grabaciones sonoras 234
- Development 209
- Estudio y enseñanza 185
- Examinations 171
- Música sagrada 163
- Society & social sciences 160
- Certification 143
- Música orquestal 142
- Operating systems (Computers) 141
- Application software 138
- Estudio y enseñanza (Primaria) 125
- Empresas 124
- Ejercicios 121
- Lengua inglesa 121
- Computer software 120
- Electronic data processing personnel 119
- Música vocal 118
- Llibres de text 112
- Ensenyament 105
- Inglés comercial 105
- Cloud computing 103
- Computer networks 101
- Música instrumental 98
- Arte 97
-
12401
-
12402
-
12403
-
12404
-
12405
-
12406
-
12407
-
12408
-
12409
-
12410
-
12411
-
12412
-
12413Publicado 2009“…Serving as a concise, focused study aid to help you prepare for the leading non-vendor-specific networking certification exam, this book features more review questions and study review features than any other guide, with over 120 review questions, two bonus exams, and electronic Flashcard, as well as a searchable Glossary of Terms database on CD-ROM. Fully updated for the first revision of the CompTIA Network+ exam since 2005, the book is organized by exam objectives and broken into six parts corresponding to the six domain areas of the Network+ exam: technologies, media and topologies, device…”
Libro electrónico -
12414Publicado 2021Tabla de Contenidos: “…List of Command-Line Tools -- alias -- awk -- aws -- bash -- bat -- bc -- body -- cat -- cd -- chmod -- cols -- column -- cowsay -- cp -- csv2vw -- csvcut -- csvgrep -- csvjoin -- csvlook -- csvquote -- csvsort -- csvsql -- csvstack -- csvstat -- curl -- cut -- display -- dseq -- echo -- env -- export -- fc -- find -- fold -- for -- fx -- git -- grep -- gron -- head -- header -- history -- hostname -- in2csv -- jq -- json2csv -- l -- less -- ls -- make -- man -- mkdir -- mv -- nano -- nl -- parallel -- paste -- pbc -- pip -- pup -- pwd -- python -- R -- rev -- rm -- rush -- sample -- scp -- sed -- seq -- servewd -- shuf -- skll -- sort -- split -- sponge -- sql2csv -- ssh -- sudo -- tail -- tapkee -- tar -- tee -- telnet -- tldr -- tr -- tree -- trim -- ts -- type -- uniq -- unpack -- unrar -- unzip -- vw -- wc -- which -- xml2json -- xmlstarlet -- xsv -- zcat -- zsh -- Index -- About the Author -- Colophon…”
Libro electrónico -
12415Publicado 2023Tabla de Contenidos: “…Creating a custom role for Azure Machine Learning -- Authenticating with application identities -- Creating a service principal -- Working with managed identities -- Enhancing access security -- Conditional Access -- PIM -- Azure Key Vault -- Summary -- Chapter 7: Managing and Securing Your Azure Machine Learning Workspace -- Technical requirements -- Exploring network security -- Creating a VNet -- Securing the workspace -- Securing associated resources -- Validating connectivity -- Working with Azure Machine Learning compute -- Securing compute instances -- Securing compute clusters -- Managing container registries and containers -- Securing images with Azure Container Registry -- Working with ML endpoints -- Summary -- Chapter 8: Managing and Securing the MLOps Life Cycle -- Technical requirements -- Working with MLOps in Azure Machine Learning -- Leveraging IaC -- Combining IaC with Azure Machine Learning -- Implementing CI/CD -- Working with Azure DevOps -- Exploring event-driven workflows in Azure -- Exploring Event Grid -- Working with events in Azure Machine Learning -- Discovering event handlers in Azure -- Summary -- Chapter 9: Logging, Monitoring, and Threat Detection -- Technical requirements -- Enabling logging and configuring data retention for Azure services -- Working with Azure Monitor -- Enabling diagnostic settings -- Working with alerts -- Working with Application Insights -- Visualizing the data -- Securing resources with Microsoft Defender -- Improving our security posture -- Exploring threat management with Sentinel -- Summary -- Part 4: Best Practices for Enterprise Security in Azure Machine Learning -- Chapter 10: Setting a Security Baseline for Your Azure Machine Learning Workloads -- Setting a baseline for Azure Machine Learning -- Discovering services for added security -- Exploring an example solution architecture…”
Libro electrónico -
12416por Kaushik, Avinash“…Discover how to move beyond clickstream analysis, why qualitative data should be your focus, and more insights and techniques that will help you develop a customer-centric mindset without sacrificing your company's bottom line. Note: CD-ROM/DVD and other supplementary materials are…”
Publicado 2007
Libro electrónico -
12417por Team, Microsoft IIS“…Get critical details and guidance on security enhancements, the new IIS 6.0 architecture, migration strategies, performance tuning, logging, and troubleshooting-along with timesaving tools, IIS 6.0 product documentation, and a searchable eBook on CD. You get all the resourc…”
Publicado 2009
Libro electrónico -
12418por Bunzel, Tom“…You'll learn how to format text and apply styles in Word, work with Excel formulas and functions, add animation to PowerPoint slides, create an Access database, manage contacts with Outlook, collaborate with OneNote and Live Meeting, and create publications with Publisher. A bonus CD-ROM includes demo software, add-ins, sample files, and additional chapters…”
Publicado 2007
Libro electrónico -
12419por Walkenbach, John“…You'll learn to modify data within the chart, deal with missing data, format your chart, use trend lines, construct "impossible" charts, create charts from pivot tables, dress them up with graphics, and more. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file…”
Publicado 2007
Libro electrónico -
12420por Kennedy, Michael“…It also introduces readers to the idea of programming in Python, the language ESRI has chosen for applications. A bundled CD contains the data for working out all the exercises in the book…”
Publicado 2013
Libro electrónico