Mostrando 15,501 - 15,520 Resultados de 20,310 Para Buscar '"Community"', tiempo de consulta: 0.16s Limitar resultados
  1. 15501
    Publicado 2013
    Tabla de Contenidos: “…Vettraino -- A diverse community of viruses inhabiting Heterobasidion parviporum at a spruce-dominated forest plot in southern Finland / E.J. …”
    Libro electrónico
  2. 15502
    Publicado 2015
    Tabla de Contenidos: “…Liu -- Discussion and analysis about the integration of information technology in Community Correction work / X.X. Zhang and R. Gang -- A kind of visualization spatial clustering algorithm / G.Q. …”
    Libro electrónico
  3. 15503
    Publicado 2023
    Tabla de Contenidos: “…Setting Up Your Environment for Automated Tests -- Running the Tests -- Summary -- Chapter 10 Infrastructure Automation with Azure Pipelines -- Overview of Infrastructure Automation -- Types of Infrastructure as Code -- Imperative Infrastructure as Code -- Declarative Infrastructure as Code -- Benefits of Infrastructure as Code -- Infrastructure Automation Tools on Azure -- Azure Resource Manager Templates -- Azure Bicep -- How Azure Bicep Works -- Benefits of Azure Bicep -- Using Azure Bicep in Azure Pipelines -- Setting Up Azure Bicep on Your Computer -- Azure Bicep Templates Overview -- Azure Bicep Templates in Azure Pipelines -- Pipeline Authentication -- Deploying Azure Bicep Templates Using the Pipeline -- Summary -- Chapter 11 Exercise-Practice Using Azure DevOps Tools -- Introducing the Sample Application -- Create a Fork of the Project -- Clone Your Fork Locally -- Importing the Repository from GitHub to Azure Repos -- Using Azure Boards to Manage Work Items -- Committing Code That Adds New Features -- Building the Code in Azure Pipelines -- Deploying the Code -- Summary -- Chapter 12 Starting a Career in Azure DevOps -- Starting an Azure DevOps Career -- Getting Your First Job as an Azure DevOps Engineer -- Finding an Azure DevOps Community Near You -- Summary -- Chapter 13 Conclusion -- References -- Index -- EULA…”
    Libro electrónico
  4. 15504
    Publicado 2018
    Tabla de Contenidos: “…-- The ACID, BASE, and CAP properties -- ACID and SQL -- The BASE property of NoSQL -- The CAP theorem -- The need for NoSQL technologies -- Google Bigtable -- Amazon Dynamo -- NoSQL databases -- In-memory databases -- Columnar databases -- Document-oriented databases -- Key-value databases -- Graph databases -- Other NoSQL types and summary of other types of databases -- Analyzing Nobel Laureates data with MongoDB -- JSON format -- Installing and using MongoDB -- Tracking physician payments with real-world data -- Installing kdb+, R, and RStudio -- Installing kdb+ -- Installing R -- Installing RStudio -- The CMS Open Payments Portal -- Downloading the CMS Open Payments data -- Creating the Q application -- Loading the data -- The backend code -- Creating the frontend web portal -- R Shiny platform for developers -- Putting it all together - The CMS Open Payments application -- Applications -- Summary -- Chapter 6: Spark for Big Data Analytics -- The advent of Spark -- Limitations of Hadoop -- Overcoming the limitations of Hadoop -- Theoretical concepts in Spark -- Resilient distributed datasets -- Directed acyclic graphs -- SparkContext -- Spark DataFrames -- Actions and transformations -- Spark deployment options -- Spark APIs -- Core components in Spark -- Spark Core -- Spark SQL -- Spark Streaming -- GraphX -- MLlib -- The architecture of Spark -- Spark solutions -- Spark practicals -- Signing up for Databricks Community Edition…”
    Libro electrónico
  5. 15505
    por Biafore, Bonnie
    Publicado 2014
    Tabla de Contenidos: “…Banking Online Using Classic Mode -- Chapter 25: Configuring Preferences to Fit Your Company -- Preferences: The Basics -- Accounting -- Bills -- Calendar -- Checking -- Desktop View -- Finance Charge -- General -- Integrated Applications -- Items &amp -- Inventory -- Jobs &amp -- Estimates -- Multiple Currencies -- Payments -- Payroll &amp -- Employees -- Reminders -- Reports and Graphs -- Sales &amp -- Customers -- Sales Tax -- Search -- Send Forms -- Service Connection -- Spelling -- Tax: 1099 -- Time &amp -- Expenses -- Chapter 26: Integrating QuickBooks with Other Programs -- Mail Merge to a Word Document -- Synchronizing Contacts -- Working with Other Apps -- Exporting QuickBooks Data -- Importing Data from Other Programs -- Chapter 27: Customizing QuickBooks -- Customizing the Home Page -- Fast Access to Favorite Features -- Customizing the Company Snapshot -- Customizing Forms -- Chapter 28: Keeping Your QuickBooks Data Secure -- Setting Up the Administrator -- Creating QuickBooks Users -- Restricting Access to Features and Data -- Part Five: Appendixes -- Appendix A: Installing QuickBooks -- Before You Install -- Installing QuickBooks -- Registering QuickBooks -- Setting Up QuickBooks on a Network -- Where to Store Your Company Files -- Appendix B: Help, Support, and Other Resources -- QuickBooks Help -- Intuit Community -- Other Kinds of Help -- Other Help Resources -- QuickBooks Training -- Index…”
    Libro electrónico
  6. 15506
    Publicado 2021
    Tabla de Contenidos: “…Plant-Microbe Associations in Phytoremediation -- 7.1 Role of Plant-Microbe Association in Phytoremediation -- 7.1.1 Endophytic Bacteria -- 7.1.2 Rhizobacteria -- 7.2 Impact of PGPB Isolated from Contaminated Soil to Phytoremediation with Miscanthus -- 7.3 Influence of Rhizobacteria Isolated from Miscanthus Rhizosphere to Phytoremediation of Trace Elements Contaminated Soil -- 7.4 Changing of Soil Microbial Communities during Miscanthus Production at the Contaminated Military Land -- References -- 8. …”
    Libro electrónico
  7. 15507
    Publicado 2017
    Tabla de Contenidos: “…Intro -- Preface -- About the Editor -- About the Authors -- External Peer Reviewers -- Contents -- List of Figures -- List of Tables -- Chapter 9: Fish Resources of the Gulf of Mexico -- 9.1 Introduction -- 9.2 Overview of the Gulf of Mexico Ecosystem for Finfish -- 9.2.1 Key Environmental Variables Influencing Spatiotemporal Dynamics of Fish Populations -- 9.2.2 The Fish Community in the Gulf of Mexico -- 9.3 Population Dynamics of Key Finfish Species of Ecological, Commercial, and Recreational Importance -- 9.3.1 Snappers (Family Lutjanidae) -- 9.3.1.1 Key Life-History Processes and Ecology -- 9.3.1.2 Predators and Prey -- 9.3.1.3 Key Habitat Needs and Distribution -- 9.3.1.4 Fisheries -- 9.3.2 Menhaden: Gulf Menhaden (Brevoortia patronus), Finescale Menhaden (Brevoortia gunteri), and Yellowfin Menhaden (Brevoort... -- 9.3.2.1 Key Life-History Processes and Ecology -- 9.3.2.2 Predators and Prey -- 9.3.2.3 Key Habitat Needs and Distribution -- 9.3.2.4 Fisheries -- 9.3.3 Groupers (Family Serranidae, Subfamily Epinephelinae) -- 9.3.3.1 Key Life-History Processes and Ecology -- 9.3.3.2 Predators and Prey -- 9.3.3.3 Key Habitat Needs and Distribution -- 9.3.3.4 Fisheries -- 9.3.4 Atlantic Bluefin Tuna (Thunnus thynnus) -- 9.3.4.1 Key Life-History Processes and Ecology -- 9.3.4.2 Predators and Prey -- 9.3.4.3 Key Habitat Needs and Distribution -- 9.3.4.4 Fisheries -- 9.3.5 Atlantic Blue Marlin (Makaira nigricans) -- 9.3.5.1 Key Life-History Processes and Ecology -- 9.3.5.2 Predators and Prey -- 9.3.5.3 Key Habitat Needs and Distribution -- 9.3.5.4 Fisheries -- 9.3.6 Atlantic Swordfish (Xiphias gladius) -- 9.3.6.1 Key Life-History Processes and Ecology -- 9.3.6.2 Predators and Prey -- 9.3.6.3 Key Habitat Needs and Distribution -- 9.3.6.4 Fisheries -- 9.3.7 Atlantic Sailfish (Istiophorus albicans) -- 9.3.7.1 Key Life-History Processes and Ecology…”
    Libro electrónico
  8. 15508
    Publicado 2017
    Tabla de Contenidos: “…3.1.2 Es gilt deutsches Recht -- 3.1.3 Verhältnis zur Plattform / Investitionsschutz -- 3.1.4 Nutzungsbedingungen -- 3.2 Account-Name -- 3.2.1 Wahl des Account-Namens -- 3.2.2 ID-Grabbing -- 3.3 Impressum in Social Media -- 3.3.1 Impressumspflicht -- 3.3.2 Platzierung des Impressums -- 3.4 Gewinnspiele -- 3.4.1 Gewinnspiele und Glücksspiele -- 3.4.2 Rechtsrahmen von Gewinnspielen -- 3.4.3 Teilnahmebedingungen -- 3.4.4 Datenschutz -- 3.4.5 Besonderheiten bei Facebook -- 3.4.6 Besonderheiten in anderen sozialen Netzwerken -- 3.5 Schleichwerbung in Social Media -- 3.5.1 Falsche Fans -- 3.5.2 Gekaufte Bewertungen -- 3.5.3 Verkaufte Posts -- 3.5.4 Einsatz von Testimonials -- 3.6 Preisangaben in Social Media -- 3.7 User Generated Content in sozialen Netzwerken -- 3.7.1 Umgang mit User-Kommentaren -- 3.7.2 Urheberverletzungen durch Nutzer-Content -- 3.7.3 Community-Regeln -- 3.7.4 Besonderheiten bei Unternehmens-Blogs -- 3.8 Direktnachrichten -- 3.9 Werbeanzeigen auf Social-Media-Plattformen -- 3.10 Like-Button und Social-Plug-ins auf der Unternehmenswebsite -- 3.11 Social Media Guidelines -- 3.12 Betreuung von Social-Media-Kanälen durch Agenturen -- 3.13 Social Media Monitoring und CRM-Systeme -- 3.13.1 Datenschutzrechtliche Themen -- 3.13.2 Urheberrechtliche Probleme -- 3.13.3 Verbindung mit CRM-Tools -- 3.14 Verkauf von Blogs und Social-Media-Präsenzen -- 3.14.1 Verkauf eines Blogs -- 3.14.2 Übertragung von Profilen auf Facebook und Twitter -- Kapitel 4: Website-Inhalte und Content Marketing -- 4.1 Texte -- 4.2 Fotos -- 4.2.1 Urheberschutz an Fotos -- 4.2.2 Verwendung von Fotos auf der Unternehmenswebsite -- 4.2.3 Abgebildete Personen -- 4.2.4 Fotos von Firmenevents -- 4.3 Zeichnungen, Grafiken und Stadtpläne -- 4.4 Musik, Podcasts und Videos -- 4.5 Games -- 4.6 Links und Frames -- 4.6.1 Links - Verweisungen auf andere Seiten…”
    Libro electrónico
  9. 15509
    Publicado 2013
    “…A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE 802.16j, whose objectives are looking into increasing the capacity and coverage of the cellular networks. …”
    Libro electrónico
  10. 15510
    Tabla de Contenidos: “…WebSphere Studio Application Monitor installation rollout planning -- 4.1 Strategic or tactical -- 4.2 Planning the rollout -- 4.2.1 Identify an enterprise business sponsor and the stakeholders -- 4.2.2 Define ownership -- 4.2.3 Choose the project manager -- 4.2.4 Educate the user community and gain stakeholder support -- 4.2.5 Identify and document business needs for monitoring -- 4.2.6 Identify applications and JVMs to monitor -- 4.2.7 Define appropriate levels of access to the user groups -- 4.2.8 Define appropriate views to the user groups -- 4.2.9 Plan time frame to implement -- 4.3 Rollout -- 4.4 Establish a training plan -- 4.5 Identify reporting requirements -- 4.6 Identify implementation team -- 4.7 Identify initial deployment benefits -- 4.8 Installation -- 4.8.1 Before you start -- 4.8.2 Plan the installation -- 4.8.3 Install Application Monitor -- 4.8.4 Major tasks performed by the installer -- 4.8.5 Installation scripts -- 4.8.6 Common mistakes -- 4.8.7 Resolving installation issues -- 4.8.8 Installation log files -- 4.9 Platform-specific issues -- 4.9.1 Customized startup and shutdown instructions -- 4.9.2 Common error messages and solutions -- 4.10 Maintenance -- 4.10.1 Assign responsibilities -- 4.10.2 Training -- 4.11 Database maintenance -- 4.12 Monitoring -- 4.13 Upgrade maintenance strategy -- 4.13.1 Preproduction testing -- 4.13.2 Software upgrades -- 4.13.3 Updating a large number of servers (Data Collectors) -- Part 3 Managing Server installation -- Chapter 5. …”
    Libro electrónico
  11. 15511
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Section I Cyber Operations Introduction -- I.1 Phases of Cyber Operations -- I.1.1 1980s-2002 -- I.1.2 2003-2012 -- I.1.3 2013-present -- Chapter 1 Cyber Operations -- 1.1 Cyber Operations Introduction -- 1.1.1 Cyber - A 21st-Century Collection Channel -- 1.1.2 Hackers - Pre-Cyber Operations -- 1.1.3 Cyber and Counter-Terror/Insurgency -- 1.2 Early Internet and Cyber Operations -- 1.2.1 Maturing of Cyber Operations - ISIS and Russia -- 1.2.2 ISIS Cyber Operations -- 1.2.3 Russian Cyber Operations -- 1.3 Cyber Operations' Stage Descriptions -- 1.3.1 Stage I (late 1990s-~2010)(Community Development) -- 1.3.2 Stage II (~2010-~2015)(Tactical) -- 1.3.3 Stage III (~2015 to present)(Tactical and Strategic) -- 1.4 Cyber Operations Wrap-up -- Bibliography -- Chapter 2 ISIS and Web-Based Insurgency -- 2.1 Introduction -- 2.1.1 Terrorist Development of the Internet for Messaging -- 2.1.2 ISIS Adaptation of the Internet for Coordination, Command and Control (C2) -- 2.1.3 ISIS "Emergence" from Cyberspace to form a State -- 2.2 Cyber-Based Irregular Operations -- 2.2.1 Three-Phase Insurgency Model with Cyber - ISIS Example -- 2.2.2 ISIS Insurgency Phases -- 2.2.3 Counter-ISIS Operations in Cyber -- 2.3 ISIS and Web-Based Insurgency Wrap-up -- Bibliography -- Chapter 3 Cyber and Crime -- 3.1 Cyber and Crime -- 3.1.1 Cybercrime Definitions -- 3.1.2 Crimes Against Individuals -- 3.1.2.1 Cyber-Fraud Reporting -- 3.1.2.2 Spam -- 3.1.2.3 Phishing -- 3.1.3 Crimes Against Organizations -- 3.1.3.1 Telephony Phishing -- 3.1.3.2 Ransomware Introduction -- 3.1.3.3 Ransomware Tools Background -- 3.1.3.4 Ransomware as a Service -- 3.1.3.5 Cryptocurrency -- 3.1.4 Cyber Gangs - Membership Analogy to Organized Crime -- 3.1.5 Cybercrime Wrap-Up -- Bibliography -- Chapter 4 Nation-State Cyber Operations…”
    Libro electrónico
  12. 15512
    Publicado 2022
    “…With the evolution of COVID-19, the global research community has implemented many machine learning and deep learning-based approaches with incremental datasets. …”
    Libro electrónico
  13. 15513
    por Comunidades Europeas.
    Publicado 1992
    Libro
  14. 15514
    por Jodidio, Philip
    Publicado 2009
    Tabla de Contenidos: “…Broussard House (Biloxi, Mississippi, USA) / Gulf Coast Community Design Studio. Frontier Project, Rancho Cucamonga (California, USA) / HMC Architects. …”
    Libro
  15. 15515
    Publicado 2012
    Tabla de Contenidos: “…Intro -- Contents -- Contributors -- Preface -- Acknowledgments -- About the Authors -- Chapter One: Medication Management Services -- Medication Management Services Emerge: A Definition -- Approaches to Medication Management Services -- The Prescription-focused Approach -- The Patient-centered Approach -- Taking Responsibility for Medication Management Services -- The Need for Medication Management Services -- Changes in Medications and How They Are Used -- Increased Levels of Drug-related Morbidity and Mortality -- Attempts to Reduce Drug-related Morbidity and Mortality -- Solutions Offered at the Policy or System Levels -- Solutions Applied at the Institutional, Practice, or Professional Levels -- Solutions Delivered at the Patient-specific Level -- Patients Who Benefit Most From Medication Management Services -- What the Data Reveal -- The Business Demands -- Initiating This Service in Practice -- The Value of Medication Management Services -- The Clinical Value to the Patient -- The Economic Value to the Health Care System -- Structures for Delivering Medication Management Services -- The Ambulatory Care Setting -- Medication Management Services in the Medical Home and the Accountable Care Organization -- Medication Management Services in Community Pharmacy Settings -- Medication Management Services in the Inpatient Setting -- Medication Management Services in Long-term Care, Assisted Living, Mental Health and Rehabilitation Facilities -- Summary -- Chapter Two: Pharmaceutical Care as the Professional Practice for Patient-Centered Medication Management Services -- The Need for a Professional Practice -- Characteristics of All Professional Practices -- Components of a Professional Practice -- Pharmaceutical Care as a Professional Practice -- The Philosophy of Practice -- The Patient Care Process -- The Practice Management System…”
    Libro electrónico
  16. 15516
    Publicado 2019
    Tabla de Contenidos: “…Intro -- Holy Ground: Where Art and Text Meet: Studies in the Cultural History of India -- Copyright -- Table of Contents -- Part I Early Studies 1986-2000 -- 1 An Indian Image of Man: An Inquiry into a change of perspective in the Hindu world-view -- Introduction -- The Indian understanding of perfect man -- The 'Raw Material' -- The Sufis -- The Yogis -- The Sants -- The Bhaktas -- Epilogue -- 2 Die Indische Herausforderung: Hegels Beitrag zu einer europäischen kulturhistorischen Diskussion -- Einleitung -- Die Jahre 1820-1825 -- Neue Einsichten -- Die Jahre 1826-1831 -- Die Rezeption der Bhagavadgītā -- Von Humboldts Bhagavadgītā Vorträge und Hegels Kritik -- Schlussbetrachtung -- Schlussmoral -- 3 Ayodhyā: le nom et le lieu -- Ayodhyā conçue : le nom -- Ayodhyā retrouvée : le lieu -- Illiers-Combray -- 4 Ayodhyā: A Hindu Jerusalem: An investigation of 'Holy War' as a religious idea in the light of communal unrest in India -- Introduction -- Holy war as a religious idea -- Five conditions of 'holy war' -- The Hindu religion and the social reality of war -- The advent of Islam -- The segregation of the Hindu and Muslim communities -- The idea of the Rāma rājya -- The Kingdom of Avadh -- The emerging conflict around the Babri Masjid in Ayodhyā -- Ayodhyā: a Hindu Jerusalem -- The fight for the Rāmajanmabhūmi/Babri Masjid -- Epilogue -- 5 The Ramtek Inscriptions I -- Introduction -- The graffiti -- The two short Kevala-Narasiṃha Temple inscriptions -- Kevala-Narasiṃha Temple Ramtek Inscription No. 1 -- Kevala-Narasiṃha Temple Ramtek Inscription No. 2 -- The Ramtek Stone Inscription of the time of Rāmacandra -- Synopsis of the contents -- Editorial principles -- Edition -- Translation -- 6 The Ramtek Inscriptions II: The Vākāṭaka inscription in the Kevala-Narasiṃha Temple (Together with Harunaga Isaacson) -- Introduction -- Palaeography…”
    Libro electrónico
  17. 15517
    Publicado 2010
    Tabla de Contenidos: “…Objectual Practice and Learning in Professional Work -- 5.1 Professional Work and Learning -- 5.2 New Contexts for Professional Work -- 5.3 Object-related Learning -- 5.4 The Study -- 5.5 Dynamics of Objectual Practice in Computer Engineering -- 5.5.1 Interplay between Explorative and Confirmative Practice -- 5.5.2 Linking Practitioners with Wider Knowledge Communities -- 5.5.3 Mediating Participation along Multiple Timescales -- 5.5.4 Facilitating Reflexive Learning -- 5.6 Concluding Remarks -- 6. …”
    Libro electrónico
  18. 15518
    Publicado 2021
    Tabla de Contenidos: “…<br>1.6 Assignment -- Study TOD in your city <br><br><br><strong>Expanding the Urban Growth Boundary</strong><br>2.1 Introduction -- Lancaster development<br>2.1.1 The bid-rent model<br>2.1.2 Setup Lancaster data <br>2.2 Identifying areas inside & outside of the Urban Growth Area <br>2.2.1 Associate each inside/outside buffer with its respective town<br>2.2.2 Building density by town & by inside/outside the UGA <br>2.2.3 Visualize buildings inside & outside the UGA<br>2.3 Return to Lancaster's Bid Rent <br>2.4 Conclusion -- On boundaries <br>2.5 Assignment -- Boundaries in your community </p><p><strong>Intro to geospatial machine learning, Part 1 </strong><br>3.1 Machine learning as a Planning tool <br>3.1.1 Accuracy & generalizability <br>3.1.2 The machine learning process <br>3.1.3 The hedonic model <br>3.2 Data wrangling -- Home price & crime data <br>3.2.1 Feature Engineering -- Measuring exposure to crime <br>3.2.2 Exploratory analysis: Correlation<br>3.3 Introduction to Ordinary Least Squares Regression <br>3.3.1 Our first regression model<br>3.3.2 More feature engineering & colinearity <br>3.4 Cross-validation & return to goodness of fit<br>3.4.1 Accuracy -- Mean Absolute Error <br>3.4.2 Generalizability -- Cross-validation <br>3.5 Conclusion -- Our first model <br>3.6 Assignment -- Predict house prices </p><p><strong>Intro to geospatial machine learning, Part 2</strong><br>4.1 On the spatial process of home prices <br>4.1.1 Setup & Data Wrangling <br>4.2 Do prices & errors cluster? …”
    Libro electrónico
  19. 15519
    Publicado 2019
    Tabla de Contenidos: “…Default Deny -- TCP Wrappers -- Packet Filtering -- Blacklistd(8) -- Public-Key Encryption -- Global Security Settings -- Preparing for Intrusions with mtree(1) -- Monitoring System Security -- Package Security -- If You're Hacked -- 20 SMALL SYSTEM SERVICES -- Secure Shell -- Email -- Network Time -- Name Service Switching -- inetd -- DHCP -- Printing and Print Servers -- TFTP -- Scheduling Tasks -- 21 SYSTEM PERFORMANCE AND MONITORING -- Computer Resources -- Checking the Network -- General Bottleneck Analysis with vmstat(8) -- Disk I/O -- CPU, Memory, and I/O with top(1) -- Following Processes -- Paging and Swapping -- Performance Tuning -- Status Mail -- Logging with syslogd -- Log File Management -- FreeBSD and SNMP -- 22 JAILS -- Jail Basics -- Jail Host Server Setup -- Jail Setup -- Managing Jails -- More Jail Options -- Jailing Ancient FreeBSD -- Last Jail Notes -- 23 THE FRINGE OF FREEBSD -- Terminals -- Managing Cloudy FreeBSD -- Diskless FreeBSD -- Diskless Farm Configuration -- Finalizing Setup -- Storage Encryption -- 24 PROBLEM REPORTS AND PANICS -- Bug Reports -- System Panics -- Recognizing Panics -- Responding to a Panic -- AFTERWORD -- The FreeBSD Community -- Why Do We Do It? -- What Can You Do? -- If Nothing Else -- Getting Things Done -- BIBLIOGRAPHY -- References -- Books I've Written -- INDEX…”
    Libro electrónico
  20. 15520
    Publicado 2021
    Tabla de Contenidos: “…-- Initializing a Power Apps component framework project -- Exercise - creating a PCF project using Power Apps CLI -- Summary -- Test your knowledge -- Further reading -- Chapter 3: Community Tools and Resources -- Technical requirements -- PCF Builder -- Graphical user interface version -- Guided experience version -- PCF Generator -- Installing PCF Generator -- Initializing a PCF project using PCF Generator -- Using command-line arguments -- Benefits of using PCF Generator over Power Apps CLI for PCF -- Integrating PCF Generator in PCF Builder -- Exercise - Creating a PCF project using PCF Generator -- PCF Gallery -- Using a code component from PCF Gallery -- Submitting your own code component on PCF Gallery -- Summary -- Test your knowledge -- Further reading -- Chapter 4: Project Overview and the Component Life Cycle -- Technical requirements -- The types of project -- The component makeup -- The manifest file -- The component implementation -- The resource files…”
    Libro electrónico