Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,400
- Application software 1,242
- History 1,188
- Historia 743
- Management 741
- Artificial intelligence 628
- Python (Computer program language) 606
- Computer programs 597
- Data processing 580
- Cloud computing 535
- Social aspects 530
- Machine learning 514
- Computer networks 493
- Engineering & Applied Sciences 476
- Security measures 403
- Design 393
- Computer programming 364
- Computer security 360
- Computer software 360
- Programming 358
- Operating systems (Computers) 354
- Philosophy 347
- Web site development 341
- Computer Science 337
- Information technology 331
- History and criticism 327
- Education 325
- Filosofía 324
- Technological innovations 313
- Data mining 312
-
4201por Forstag, Erin HammersTabla de Contenidos: “…Intro -- FrontMatter -- Reviewers -- Contents -- 1 Introduction and Framing of the Issues -- 2 Exploring What Matters Most in Working with Older Adults -- 3 Supply and Demand: Is the Workforce Prepared to Meet the Needs of Older Adults? …”
Publicado 2024
Libro electrónico -
4202por McAdams, Dan P.Tabla de Contenidos: “…Generating New Beginnings. Exploring Your Myth. Epilogue: Beyond Story. Appendix 1: Agency and Communion. …”
Publicado 1993
Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
4203por Acheson, D. J.Tabla de Contenidos: “…Appendix B: Ten programs for exploring dynamics. Solutions to the exercises. Index…”
Publicado 1997
Libro -
4204por McKenney, Susan E.Tabla de Contenidos: “…CORE PROCESSES -- 4. Analysis and exploration -- 5. Design and construction -- 6. Evaluation and reflection -- 7. …”
Publicado 2019
Libro -
4205Publicado 2008Tabla de Contenidos: “…Components of the risk governance framework / Ortwin Renn -- The risk handling chain / Ortwin Renn -- Wider governance issues / Ortwin Renn -- A historical perspective on tolerability of risk / Jim McQuaid -- Tolerability of risk : the regulator's story / Tony Bandle -- Applying the HSE's risk decision model : reducing risks, protecting people / Jean-Marie Le Guen -- What makes tolerability of risk work? : exploring the limitations of its applicability to other risk fields / Robyn Fairman…”
Sumario
Libro -
4206por McKenney, Susan E.Tabla de Contenidos: “…Toward a generic model for educational design research Part II: Core Processes 4. Analysis and exploration 5. Design and construction 6. Evaluation and reflection 7. …”
Publicado 2012
Libro -
4207por Spencer, F. ScottTabla de Contenidos: “…Getting into focus : reading with feminist lenses -- Those riotous--yet righteous--foremothers of Jesus : exploring Matthew's comic genealogy -- Shall we dance? …”
Publicado 2004
Sumario
Libro -
4208por Ji, Meng, 1982-Tabla de Contenidos: “…Use of figurative/archaic idioms in the two translations -- 6. Quantitative exploration of stylistic variation in Liu's translation -- 7. …”
Publicado 2010
Libro -
4209por Karelis, CharlesTabla de Contenidos: “…Using indifference curves to identify utility-maximizing allocations -- A new way to rationalize the conduct that prolongs and worsens poverty -- Appendix. Further exploration through graphical analysis -- Responses to challenges and questions -- Appendix. …”
Publicado 2007
Sumario
Libro -
4210Publicado 2016Tabla de Contenidos: “…Lord of the flies : The sound of the shell ; Fire on the mountain ; Huts on the beach ; Painted faces and long hair ; Beast from water ; Beast from air ; Shadows and tall trees ; Gift for the darkness ; A view to a death ; The shell and the glasses ; Castle Rock ; Cry of the hunters -- On reading and teaching "Lord of the flies" / Jennifer Buehler ; Suggestions for further exploration / Jennifer Buehler ; Introduction to the 1962 edition / E.M. …”
Libro -
4211por Highsmith, James A., 1945-Tabla de Contenidos: “…Get the Right People -- Phase: Envision -- Practice: Product Vision Box and Elevator Test Statement -- Objective -- Discussion -- Practice: Product Architecture -- Objective -- Discussion -- Guiding Principles -- Practice: Project Data Sheet -- Objective -- Discussion -- Tradeoff Matrix -- Exploration Factor -- Practice: Get the Right People -- Objective -- Discussion -- Practice: Participant Identification -- Objective -- Discussion -- Practice: Customer Team-Developer Team Interface -- Objective -- Discussion -- Practice: Process and Practice Tailoring -- Objective -- Discussion -- Self-Organization Strategy -- Process Framework Tailoring -- Practice Selection and Tailoring -- Early Planning -- Envision Summary -- Chapter 6: The Speculate Phase -- Scope Evolution -- Phase: Speculate -- Practice: Product Feature List -- Objective -- Discussion -- Practice: Feature Cards -- Objective -- Discussion -- Practice: Performance Requirements Cards -- Objective -- Discussion -- Practice: Release, Milestone, and Iteration Plan -- Objective -- Discussion -- Iteration 0 -- Iterations 1-N -- Next Iteration Plan -- First Feasible Deployment -- Estimating -- Scope Evolution -- Risk Analysis and Mitigation -- Speculate Summary -- Chapter 7: The Explore Phase -- Individual Performance -- Phase: Explore -- Practice: Workload Management -- Objective -- Discussion -- Practice: Low-Cost Change -- Objective -- Discussion -- Technical Debt -- Simple Design -- Frequent Integration -- Ruthless Testing -- Opportunistic Refactoring -- Practice: Coaching and Team Development -- Objective -- Discussion -- Focusing the Team on Delivering Results -- Molding a Group of Individuals into a Team -- Developing Each Individual's Capabilities -- Providing the Team with Required Resources and Removing Roadblocks -- Coaching the Customers -- Orchestrating Team Rhythm…”
Publicado 2004
Libro electrónico -
4212Publicado 2023Tabla de Contenidos: “…Creating a new App Service resource in the portal -- Creating a new Azure App Service using the Azure CLI -- Creating a new App Service using PowerShell -- Creating and configuring web app settings in Azure App Service -- Managing settings in Azure -- Deploying an application on Azure App Service -- Scaling apps in Azure App Service -- Scaling App Service manually -- Scaling based on a schedule -- Monitoring autoscaling activity -- Exploring Azure App Service deployment slots -- Summary -- Further reading -- Part 3 - PaaS versus CaaS to Deploy Containers in Azure -- Chapter 8: Building a Containerized App Using Docker and Azure Container Registry -- Describing the development process for Docker-based applications -- The development environment for Docker-based applications -- Docker containers versus Docker images -- The containerized application life cycle in Docker -- Exploring Azure Container Registry -- Exploring Azure Container Instances -- Exploring the elements of a Dockerfile -- Exercise 1 - deploying Docker containers on an Azure VM -- Exercise 2 - deploying Docker containers on Azure Container Registry -- Creating an Azure Container Registry with the Azure portal -- Creating an ACR with the Azure CLI -- Pushing your image to ACR using the Docker CLI -- Deploying the application to a container registry using Visual Studio 2022 -- Deploying the application to a container registry using Visual Studio Code -- Summary -- Further reading -- Chapter 9: Understanding Container Orchestration -- Container orchestration versus Docker -- Docker Swarm - a definition -- Kubernetes - a definition -- Kubernetes cluster architecture -- Exploring Azure Kubernetes Service and Azure Container Apps -- Azure Kubernetes Service -- Azure Container Apps -- Orchestrating microservices and multi-container applications -- Summary -- Further reading…”
Libro electrónico -
4213Publicado 2023Tabla de Contenidos: “…-- Understanding the Geometry Node editor -- Exploring the standard Geometry Nodes blocks -- The different node connections and how to use them -- Exploring different shapes -- Exploring different node connection colors -- Multi-connection inputs -- Exercise - accessing the Geometry Node system -- Summary -- Chapter 2 - Understanding the Functionality of Basic Nodes -- What are basic nodes? …”
Libro electrónico -
4214por Schrenk, MichaelTabla de Contenidos: “…-- Submit Bid -- Evaluate Results -- Testing Your Own Webbots and Snipers -- Further Exploration -- Final Thoughts…”
Publicado 2007
Libro electrónico -
4215Publicado 2021Tabla de Contenidos: “…Learning about The Citadel and Project Natick -- Getting started with Power BI -- Setting up Power BI and exploring the World Happiness Report -- Creating your first dashboard -- Customizing and filtering the chart -- Summary -- Chapter 3: Warming Up Your Data Visualization Engines -- Getting started with data visualization -- Scatter plot -- Column chart -- Bar chart -- Stacked bar chart -- Line chart -- Pie chart -- Radar chart -- Waterfall chart -- Why analyzing BIM data is important -- Exploring Microsoft Power BI charts -- Downloading and importing the dataset -- Formatting the other values…”
Libro electrónico -
4216Publicado 2015Tabla de Contenidos:Libro electrónico
-
4217por Singh, AbhinavTabla de Contenidos: “…Penetration testing on a Windows XP SP2 machineBinding a shell to the target for remote access; Penetration testing on the Windows 2003 Server; Windows 7/Server 2008 R2 SMB client infinite loop; Exploiting a Linux (Ubuntu) machine; Understanding the Windows DLL injection flaws; Chapter 4: Client-side Exploitation and Antivirus Bypass; Introduction; Internet Explorer unsafe scripting misconfiguration vulnerability; Internet Explorer CSS recursive call memory corruption; Microsoft Word RTF stack buffer overflow; Adobe Reader util.printf() buffer overflow…”
Publicado 2012
Libro electrónico -
4218por DeVoe, JivaTabla de Contenidos: “…Chapter 4: Understanding Objective-C Memory ManagementUsing Reference Counting; Using Garbage Collection; Exploring Key Garbage Collector Patterns; Understanding What Memory Management Model to Use for Your Projects; Summary; Part II: Exploring Deeper Features; Chapter 5: Working with Blocks; Understanding Blocks; Understanding Important Block Scoping; Using Blocks with Threads; Working with Common Block Design Patterns; Applying Blocks to an Embarrassingly Parallel Task; Summary; Chapter 6: Using Key Value Coding and Key Value Observing; Accessing Object Properties Using Key Value Coding…”
Publicado 2011
Libro electrónico -
4219
-
4220Publicado 2018Tabla de Contenidos: “…-- Summary -- Chapter 2: Networking -- Creating an ECS cluster and service -- Configuring a Container definition -- Configuring a Task definition -- Configuring a service -- Configuring and creating a cluster -- Running additional tasks -- Accessing the service -- Deleting a cluster -- Summary -- Chapter 3: Using CloudWatch Logs -- Overview of CloudWatch Logs and aws log driver -- Creating an ECS service for MySQL database -- Configuring a Container definition -- Configuring logging -- Configuring a Task definition -- Configuring a service -- Configuring a cluster -- Creating an ECS service -- Exploring Task logs -- Exploring CloudWatch Logs -- Exploring CloudWatch metrics -- Summary -- Chapter 4: Using Auto Scaling -- Creating an ECS service for a Hello world application -- Types of auto scaling -- Target tracking scaling policies -- Step scaling policies -- Configuring an auto scaling policy -- Defining the range of tasks -- Adding an auto scaling policy -- Adding a step scaling policy -- Creating a CloudWatch alarm -- Configuring a scaling action -- Demonstrating the use of auto scaling -- Exploring CloudWatch metrics and Logs -- Updating auto scaling policy -- Summary -- Chapter 5: Using IAM -- Creating an IAM user -- Adding a custom policy for Elastic Load Balancing -- Logging in as the IAM user -- Summary -- Chapter 6: Using an Application Load Balancer -- Creating an application load balancer -- Creating a task definition -- Creating a service -- Configuring an application load balancer…”
Libro electrónico