Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,400
- Application software 1,242
- History 1,188
- Historia 743
- Management 741
- Artificial intelligence 628
- Python (Computer program language) 606
- Computer programs 597
- Data processing 580
- Cloud computing 535
- Social aspects 530
- Machine learning 514
- Computer networks 493
- Engineering & Applied Sciences 476
- Security measures 403
- Design 393
- Computer programming 364
- Computer security 360
- Computer software 360
- Programming 358
- Operating systems (Computers) 354
- Philosophy 347
- Web site development 341
- Computer Science 337
- Information technology 331
- History and criticism 327
- Education 325
- Filosofía 324
- Technological innovations 313
- Data mining 312
-
26721Publicado 2018“…The second lesson covers Reactive Data Access using Spring Data and Spring Data MongoDB. It explores reactive streams types and shows how they lend themselves to the asynchronous, non-blocking style of data access. …”
-
26722Publicado 2017“…By the end of this book, you will be fixing latency issues and optimizing performance problems, but you will also know how this affects the complexity and maintenance of your application. Finally, we will explore a few highly advanced techniques for furt..…”
Libro electrónico -
26723Publicado 2020“…Dapr provides an event-driven runtime that supports the essential features you need to build microservices, including service invocation, state management, and publish/subscribe messaging. You'll explore all of those in addition to various other advanced features with this practical guide to learning Dapr. …”
Libro electrónico -
26724Publicado 2020“…In addition to this, you'll explore how to work with containers with Docker and Kubernetes, and how to containerize a development environment using VS Code. …”
Libro electrónico -
26725por Jones, Bradley“…Coverage includes: Understanding C program components and structure Mastering essential C syntax and program control Using core language features, including numeric arrays, pointers, characters, strings, structures, and variable scope Interacting with the screen, printer, and keyboard Using functions and exploring the C Function Library Working with memory and the compiler Contents at a Glance PART I: FUNDAMENTALS OF C 1 Getting Started with C 2 The Components of a C Program 3 Storing Information: Variables and Constants 4 The Pieces of a C Program: Statements, Expressions, and Operators 5 Packaging Code in Functions 6 Basic Program Control 7 Fundamentals of Reading and Writing Information PART II: PUTTING C TO WORK 8 Using Numeric Arrays 9 Understanding Pointers 10 Working with Characters and Strings 11 Implementing Structures, Unions, and TypeDefs 12 Understanding Variable Scope 13 Advanced Program Control 14 Working with the Screen, Printer, and Keyboard PART III: ADVANCED C 15 Pointers to Pointers and Arrays of Pointers 16 Pointers to Functions and Linked Lists 17 Using Disk Files 18 Manipulating Strings 19 Getting More from Functions 20 Exploring the C Function Library 21 Working with Memory 22 Advanced Compiler Use PART IV: APPENDIXES A ASCII Chart B C/C++ Reserved Words C Common C Functions D Ans..…”
Publicado 2013
Libro electrónico -
26726Publicado 2014“…It provides actionable advice while exploring topics like visualizing service delivery and predicting improvement, making the work of government employees more meaningful, amplification and coordination of focused citizen engagement, and the enormous potential of Big Data in big cities"--…”
Libro electrónico -
26727Publicado 2014“…Technologies to Enable Autonomous Detection for BioWatch is the summary of a workshop hosted jointly by the Institute of Medicine and the National Research Council in June 2013 to explore alternative cost-effective systems that would meet the requirements for a BioWatch Generation 3.0 autonomous detection system, or autonomous detector, for aerosolized agents . …”
Libro electrónico -
26728Publicado 2022“…What you will learn Find out how to build or migrate to an effective modern intranet Explore how SharePoint works with other Microsoft 365 tools Discover best practices for extending SharePoint Understand the ways to implement effective metadata Plan for successful adoption and change management Explore best practices for site and data architecture Who this book is for This book is for any IT professional looking for an all-encompassing view of the collaboration tools in Microsoft 365 to plan for successful SharePoint adoption. …”
Libro electrónico -
26729por Ramanujan, Madhu“…Later chapters will demonstrate how to perform data migration from a legacy system and the order in which the objects are to be migrated. You'll also explore CPQ billing and its advantages with the help of different use cases before learning about Industries CPQ and how it is different from standard Salesforce CPQ. …”
Publicado 2022
Libro electrónico -
26730Publicado 2022“…You'll be able to plan a threat intelligence program by understanding and collecting the requirements, setting up the team, and exploring the intelligence frameworks. You'll also learn how and from where to collect intelligence data for your program, considering your organization level. …”
Libro electrónico -
26731Publicado 2016“…This would be the "barbecue effect," which invites stopping advocating for density and upgrading to suburban styles. This book explores this controversy by examining the cases of Geneva and Zurich, to answer some questions: Does the barbecue effect really exist? …”
Libro electrónico -
26732Publicado 2023“…You'll get to grips with data types, constructor principles, and existing functionalities, and focus on the limitations of regional parameters and time zones, which help in expanding business to other parts of the world. You'll also explore SQL injection threats, temporal database architecture, using Flashback Technology to reconstruct valid database images from the past, time zone management, and UTC synchronization across regions. …”
Libro electrónico -
26733Publicado 2023“…Find security flaws in any architecture effectively through emulation and fuzzing with QEMU and AFL Purchase of the print or Kindle book includes a free PDF eBook Key Features Understand the vulnerability landscape and useful tools such as QEMU and AFL Explore use cases to find vulnerabilities and execute unknown firmware Create your own firmware emulation and fuzzing environment to discover vulnerabilities Book Description Emulation and fuzzing are among the many techniques that can be used to improve cybersecurity; however, utilizing these efficiently can be tricky. …”
Libro electrónico -
26734por Sakinmaz, Serkan“…The book begins by showing you how to install Python and create an AWS account, before helping you explore AWS Lambda, EC2, Elastic Beanstalk, and S3 for Python programming. …”
Publicado 2023
Libro electrónico -
26735Publicado 2023“…By leveraging the author's expertise, you'll explore different challenges that can lead to project failure or cost/time overruns, along with customized solutions to maneuver past those issues for a successful outcome. …”
Libro electrónico -
26736Publicado 2023“…If you're already familiar with gRPC, this book will help you to explore the different concepts and tools in depth…”
Libro electrónico -
26737Publicado 2023“…First, you'll follow a standard educational programming approach, progressing to a 'Hello World' application. Next, you'll explore the fundamental routing techniques, data loading management, and user submission, all through real-world scenarios commonly encountered in day-to-day development, before discovering various adapters employed by SvelteKit to seamlessly integrate with diverse environments. …”
Libro electrónico -
26738Publicado 2024“…Explore the C++ STL with practical guidance on vectors, algorithms, and custom types for intermediate developers, enriched by real-world examples. …”
Libro electrónico -
26739“…Publishing over the next few years, this groundbreaking work draws on rare access to documents from the Soviet archives, allowing for the presentation of a sweeping history of Jewish life in the Soviet Union from 1917 through the early 1990s.Volume 3 explores how the Soviet Union’s changing relations with Nazi Germany between the signing of a nonaggression pact in August 1939 and the Soviet victory over German forces in World War II affected the lives of some five million Jews who lived under Soviet rule at the beginning of that period. …”
Libro electrónico -
26740A CISO Guide to Cyber Resilience A How-To Guide for Every CISO to Build a Resilient Security ProgramPublicado 2024“…Toward the end, you'll explore advanced concepts such as zero-trust, managed detection and response, security baselines, data and asset classification, and the integration of artificial intelligence and cybersecurity. …”
Libro electrónico