Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Taxation 224
- Law and legislation 187
- History 108
- Transparency in government 71
- Economic conditions 63
- Engineering & Applied Sciences 56
- Education 55
- Economics 53
- Finance 51
- Historia 50
- Computer programming 49
- Programming languages (Electronic computers) 47
- Computer networks 45
- Management 44
- Archaeology 41
- Research 40
- Security measures 40
- Computer security 38
- Derecho Comunitario 37
- Programming Languages, Compilers, Interpreters 37
- Social aspects 36
- Development 35
- International cooperation 32
- Application software 31
- History and criticism 31
- TFC 31
- Economic aspects 30
- Python (Computer program language) 29
- Artificial intelligence 28
- Computer Science 28
-
3601Augmented reality game development create your own augmented reality games from scratch with Unity 5Publicado 2017“…What You Will Learn Build a location-based augmented reality game called Foodie Go Animate a player's avatar on a map Use the mobile device's camera as a game background Implement database persistence with SQLLite4Unity3D to carry inventory items across game sessions Create basic UI elements for the game, inventory, menu, and settings Perform location and content searches against the Google Places API Enhance the game's mood by adding visual shader effects Extend the game by adding multiplayer networking and other enhancements In Detail The heyday of location-based augmented reality games is upon us. …”
Libro electrónico -
3602Publicado 2017“…Joe provides steps for carrying out this essential task in Carbon Copy Cloner or SuperDuper. …”
Libro electrónico -
3603Publicado 2017“…Next, you will find out how to scan your networks to ensure performance and quality, and how to carry out wireless pen testing on your network to avoid cyber attacks. …”
Libro electrónico -
3604por Clark, Kennedy“…Part III examines the critical issue of trunk connections, the links used to carry multiple VLANs through campus networks. Entire chapters are dedicated to LANE and MPOA. …”
Publicado 1999
Libro electrónico -
3605Publicado 2022“…. - MITM attack: In this section, you will learn how to perform man-in-the-middle attacks and what post-modules can be carried out on the target OS. Modules such as playing music on the target OS, stealing credentials, and many more. …”
Video -
3606Publicado 2022“…What you will learn Implement Log Analytics and enable Microsoft Sentinel and data ingestion from multiple sources Get to grips with coding using the Kusto Query Language (KQL) Discover how to carry out threat hunting activities in Microsoft Sentinel Connect Microsoft Sentinel to ServiceNow for automated ticketing Find out how to detect threats and create automated responses for immediate resolution Use triggers and actions with Microsoft Sentinel playbooks to perform automations Who this book is for If you are an IT professional with prior experience in other Microsoft security products and Azure and are now looking to expand your knowledge to incorporate Microsoft Sentinel, then this book is for you. …”
Libro electrónico -
3607Publicado 2022“…This book is an adaptation of a research presented at the Micaela Bastidas National University of Apurímac, this study was carried out with the purpose of specifying the influence of "I learn at home" on the completion of their training in the area of communication of children of five years of the Public Educational Institutions of the Initial Level of Tamburco (Peru) - 2020. …”
Libro electrónico -
3608por Kerébel, Hervé“…Although there is still much work to be done in Corseul. the excavation carried out thus far at Monterfil II has shown...…”
Publicado 2021
Electrónico -
3609por Abel, Véronique“…Recent archaeological operations have greatly increased om knowledge of the original Marseilles town centre and of neighbourhoods gradually incorporated into the city The excavations presented here carried out in 1992-1993 close to the Vieux Port and Canebière districts, have revealed abundant hitherto unknown information relating to shoreline occupation layers (dating from the 4th cent or,- HC to the setting up of salt-works m the early Middle Ages) as well as to developments on the town’s periphery beyond the Plan fourmiguier fortifications In a previously rural area the suburb of Sainte-Catherine began to take shape, composed of several city blocks developed in conjunction with such construction protects as the Saint-Sépulcre hospital. …”
Publicado 2021
Electrónico -
3610Publicado 2007“…Access all CCNP BCMSN commands—use as a quick offline resource for research and solutions Logical “how-to” topic groupings provide one-stop research Great for review before taking the CCNP BCMSN certification exam Compact size makes it easy to carry with you, wherever you go “Create your own journal” section with blank, lined pages allows you to personalize the book for your needs This book is part of the Cisco Press® Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco® certification exams. …”
Libro electrónico -
3611Publicado 2008“…Access all CCNA commands–use as a quick, offline resource for research and solutions Logical how-to topic groupings provide one-stop research Great for review before CCNA certification exams Compact size makes it easy to carry with you, wherever you go “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs “What Do You Want to Do?” …”
Libro electrónico -
3612Publicado 2007“…Access all CCNP BSCI commands—use as a quick, offline resource for research and solutions Logical “how-to” topic groupings provide one-stop research Great for review before taking the CCNP BSCI certification exam Compact size makes it easy to carry with you, wherever you go “Create your own journal” section with blank, lined pages allows you to personalize the book for your needs Introduction Chapter 1 Network Design Requirements Chapter 2 EIGRP Chapter 3 OSPF Chapter 4 Integrated IS-IS Chapter 5 Manipulating Routing Updates Chapter 6 BGP Chapter 7 Multicast Chapter 8 IPv6 Appendix Create Your Own Journal Here This book is part of the Cisco Press® Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco® certification exams. …”
Libro electrónico -
3613Publicado 2008“…Access all CCNP ONT commands–use as a quick, offline resource for research and solutions Logical “how-to” topic groupings provide one-stop research Great for review before taking the CCNP ONT certification exam Compact size makes it easy to carry with you, wherever you go “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs This book is part of the Cisco Press® Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco certification exams. …”
Libro electrónico -
3614Publicado 2008“…If it were required reading for all political reporters, they might do a lot more reporting and carry a lot less water in the process.” —John Steele Gordon..…”
Libro electrónico -
3615por Baca, Steve“…Understanding performance tuning, optimization and troubleshooting. Carrying out a cluster configuration, troubleshoot, and management of a vSphere Cluster. …”
Publicado 2014
Libro electrónico -
3616por Vachon, Bob“…Access all CCNA Security commands: use as a quick, offline resource for research and solutions Logical how-to topic groupings provide one-stop research Great for review before CCNA Security certification exams Compact size makes it easy to carry with you, wherever you go ';Create Your Own Journal' section with blank, lined pages allows you to personalize the book for your needs ';What Do You Want to Do?' …”
Publicado 2012
Libro electrónico -
3617Publicado 2010“…Business strategy typically has been planned by corporate chiefs in annual meetings, and then dictated to managers to carry out. The New How turns that notion on its head. …”
Libro electrónico -
3618Publicado 2020“…What you will learn Set up the environment for Metasploit Understand how to gather sensitive information and exploit vulnerabilities Get up to speed with client-side attacks and web application scanning using Metasploit Leverage the latest features of Metasploit 5.0 to evade anti-virus Delve into cyber attack management using Armitage Understand exploit development and explore real-world case studies Who this book is for If you are a penetration tester, ethical hacker, or security consultant who wants to quickly get started with using the Metasploit Framework to carry out elementary penetration testing in highly secured environments, then this Metasploit book is for you. …”
Libro electrónico -
3619Publicado 2018“…You will learn to build complex queries, extensive filters and how are they compiled in your system to bring relevance in your search tools. You will learn to carry out Solr scoring, elements affecting the document score and how you can optimize or tune the score for the application at hand. …”
Libro electrónico -
3620Publicado 2011“…Finally, the meta data carried along must include information that enables reflection and other advanced techniques to work correctly. …”