Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 620
- History 449
- Development 330
- Application software 295
- Management 261
- Engineering & Applied Sciences 254
- Computer Science 184
- Law 154
- Social aspects 145
- Education 142
- Philosophy 142
- Calles 139
- Història 133
- RELIGION 133
- Economics 132
- Biblia 126
- History and criticism 126
- Data processing 124
- Leadership 122
- Computer programming 119
- Crítica e interpretación 119
- Economic conditions 118
- Filosofía 118
- Java (Computer program language) 112
- Poesía española 112
- Computer programs 110
- Study and teaching 109
- Business & Economics 106
- Operating systems (Computers) 105
- Politics and government 105
-
18361Publicado 2017“…What You Will Learn Integrate Tableau's analytics with the industry-standard, statistical prowess of R. Make R function calls in Tableau, and visualize R functions with Tableau using RServe. …”
Libro electrónico -
18362Publicado 2015“…However, because of the liberal dosage of quantitative easing already implemented, the United States, the United Kingdom, and Japan may face a treacherous path to normalcy in what Koo calls the QE Trap. He argues that it is necessary to understand balance sheet recession in order to resolve the Eurozone crisis, particularly the competitiveness problems. …”
Libro electrónico -
18363Publicado 2015“…What You Will Learn Familiarise yourself with the generation of Metasploit resource files Use the Metasploit Remote Procedure Call (MSFRPC) to automate exploit generation and execution Use Python's Scapy, network, socket, office, Nmap libraries, and custom modules Parse Microsoft Office spreadsheets and eXtensible Markup Language (XML) data files Write buffer overflows and reverse Metasploit modules to expand capabilities Exploit Remote File Inclusion (RFI) to gain administrative access to systems with Python and other scripting languages Crack an organization's Internet perimeter Chain exploits to gain deeper access to an organizatio..…”
Libro electrónico -
18364Publicado 2015“…This IBM Redbooks® publication describes the new table type that is introduced with DB2 Analytics Accelerator V4.1 PTF5 that enables more efficient data transformations. These tables are called accelerator-only tables, and can exist on an accelerator only. …”
Libro electrónico -
18365Publicado 2014“…O’Brien founded Typefi, the world’s leading automated publishing system, and in his spare time invented a new type of espresso machine called mypressi. He’s a perpetual innovator who remains astounded at the unparalleled creativity Minecraft can engender. …”
Libro electrónico -
18366Publicado 2015“…Bitcoin, built on a fundamentally new technology called ?The Blockchain,? offered the promise of a new financial system where transactions are sent directly between two parties without the need for central control. …”
Libro electrónico -
18367Publicado 2013“…Whether you're struggling with a difficult customer or arguing with your spouse, by understanding what leadership and negotiation expert Erica Ariel Fox calls your "inner negotiators," you'll learn to turn breakdowns into breakthroughs. …”
Libro electrónico -
18368Publicado 2015“…BJ earned his B.S. in Computer Science from Baldwin-Wallace College (now called Baldwin-Wallace University) in Berea, Ohio, the town where he grew up. …”
-
18369Publicado 2024“…You will gain familiarity with a whole set of Web APIs whose features bring WebRTC to life: requesting access to users' cameras and microphones; accessing and manipulating arbitrary user files, right in the browser; and web storage for persisting shared data over the life of a WebRTC call. Like any Web API, WebRTC doesn't enjoy a perfect implementation in any browser. …”
Libro electrónico -
18370Publicado 2004“…Thanks to the groundbreaking work of a few pioneers, namely Victor Basili and Barry Boehm (in strict alphabetical order), the discipline has now grown even if it seriously lack the absence of widely accepted corpus, which could simplify its systematic adoption in evaluating every single methodology that is proposed, as it already happens in other "soft" disciplines, such as education, psychology, etc.One of the new methods proposed have been the so-called Agile Methodologies. They look very reasonable, supporters claim the tremendous added value that Agile Methodologies produce. …”
Libro electrónico -
18371Publicado 2012“…Each section may have a different focus--a quantum, a star in a galaxy, a bee, or the seat of human intelligence, which some may call the soul--but the editors have done a great service to the reader by juxtaposing these subjects in a way that suggests how each one relates to other entities, including both its own kind and the wider global environment. …”
991005299789706719 -
18372Publicado 2017“…Over 80 practical and interesting recipes that explore the plethora of functionalities and opportunities available with Raspberry Pi Zero About This Book Deep dive into the components of the small yet powerful Raspberry Pi Zero Get into grips with integrating various hardware, programming, and networking concepts with the so-called “cheapest computer” Explore the functionalities of this $5 chip through practical recipes Who This Book Is For This book is for programmers and hobbyists who are eager to dive deep into the Raspberry Pi Zero. …”
Libro electrónico -
18373Publicado 2017“…What You Will Learn Test your application using advanced testing methodologies Develop an awareness of application structures, interface design, and tooling Create strategies for third-party packages, dependencies, and vendoring Get to know tricks on treating data such as collections Handle errors and cleanly pass them along to calling functions Wrap dependencies in interfaces for ease of portability and testing Explore reactive programming design patterns in Go In Detail Go (a.k.a. …”
Libro electrónico -
18374por Rieth, Éric“…The 14.30 metre carvel built "frame-first" boat was intended for river navigation and built to carry a cargo of up to ten tonnes. Using what could be called a naval archaeology approach, researchers have analysed the nver environment to reconstruct the natural landscape of the period. …”
Publicado 2021
Electrónico -
18375Publicado 2015“…The book is organized into three sections: composition, post-processing (what Matiash calls “Stylization and Editing”), and sharing. Each chapter tackles a concept, such as compositional rules (and when to break them), then Matiash shares “My Story,” with a specific example of that concept in action in his own work. …”
Libro electrónico -
18376Publicado 2015“…Shows how to integrate Cisco Unity Connection with Cisco Unified Communications Manager or other PBXs Covers configuring Cisco Unity Connection users, templates, service classes, distribution lists, security, LDAP, dial plans, and call management Walks through Unified Messaging single Inbox configuration Shows how to design, integrate, and configure feature-rich branch office messaging solutions with Cisco Unity Express Explains Cisco Unified IM and Presence components, design, integration, deployment, and feature configuration Covers Cisco Jabber and Cisco Jabber Mobile configuration Guides you through deploying Cisco Collaboration Systems Applications with Cisco Prime Collaboration Introduces Cisco TelePresence Management Suite (Cisco TMS) capabilities and scheduling options This book is in the Foundation Learning Guide Series. …”
Libro electrónico -
18377Publicado 2007“…WF programs are assembled out of resumable program statements called activities, which provide encapsulation of both domainspecific logic and control flow patterns reflective of real-world processes. …”
Libro electrónico -
18378por Johnson, Michael K.“…Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples…”
Publicado 2005
Libro electrónico -
18379Publicado 2008“…Bottom line, this book should be required reading for all who plan to call themselves security practitioners, and an invaluable part of every university's computer science curriculum." …”
Libro electrónico -
18380Publicado 2005“…To be in this book, every tip has got to be a "Killer Tip" (the kind of tip that makes you nod and smile, then call all your Mac buddies to tune them up with your new-found power). …”
Libro electrónico