Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,400
- Application software 1,242
- History 1,188
- Historia 743
- Management 741
- Artificial intelligence 628
- Python (Computer program language) 606
- Computer programs 597
- Data processing 580
- Cloud computing 535
- Social aspects 530
- Machine learning 514
- Computer networks 493
- Engineering & Applied Sciences 476
- Security measures 403
- Design 393
- Computer programming 364
- Computer security 360
- Computer software 360
- Programming 358
- Operating systems (Computers) 354
- Philosophy 347
- Web site development 341
- Computer Science 337
- Information technology 331
- History and criticism 327
- Education 325
- Filosofía 324
- Technological innovations 313
- Data mining 312
-
4341Publicado 2014Tabla de Contenidos: “…; Part I: Fast Track to Super Snaps; Chapter 1: Getting Up and Running; Preparing the Camera for Initial Use; Exploring Basic Camera Features; Taking a Few Final Setup Steps; Restoring Default Settings; Shooting Your First Pictures in Auto Mode; Chapter 2: Reviewing Five Essential Picture-Taking Options; Choosing an Exposure Mode; Setting the Release Mode; Checking Image Size and Image Quality; Adding Flash…”
Libro electrónico -
4342por Nielsen, PaulTabla de Contenidos: “…Modeling RealityVisible Entities; Identifying Multiple Entities; Relational Patterns; Normalization; Relational Algebra; Summary; Chapter 3: Exploring SQL Server 2005 Architecture; Data Access Architectures; SQL Server Services; Business Intelligence Services; SQL Server 2005 Editions; SQL Server Tools and Components; SQL Server 2005 Feature Pack; AdventureWorks; Exploring the Metadata; Summary; Chapter 4: Installing SQL Server 2005; Planning Your Installation; Hardware Recommendations; Performing the Installation; Upgrading from Previous Versions; Migrating to SQL Server…”
Publicado 2007
Libro electrónico -
4343Publicado 2024Tabla de Contenidos:Libro electrónico
-
4344Publicado 2024Tabla de Contenidos: “…Standard cover sizes -- Choosing the right book or magazine cover size -- Altering our prompt to generate a better book cover -- Presenting our finished book cover -- Summary -- Part 3: The Future of AI and Art -- Chapter 7: Exploring the Ethical Dimensions and the Future of Art -- Intellectual property rights and originality -- Who is the creator? …”
Libro electrónico -
4345por Brown, JasonTabla de Contenidos: “…Applying NIST NICE framework to your organization -- Exploring cybersecurity roles -- Cybersecurity analysts -- Cybersecurity engineers -- Cybersecurity architects -- Cybersecurity compliance specialists -- Head of security -- Exploring cybersecurity architectural frameworks -- SABSA -- TOGAF -- OSA -- Staffing - insourcing versus outsourcing -- Structuring the cybersecurity team -- Summary -- References -- Chapter 6: Risk Management -- Why do we need risk management? …”
Publicado 2023
Libro electrónico -
4346Publicado 2024Tabla de Contenidos: “…Architecture patterns -- Architecture -- AWS services -- Amazon CloudFront and Amazon Simple Storage Service (S3) -- Amazon DynamoDB -- Amazon Cognito, Amazon API Gateway, and Amazon Lambda -- Amazon Lex -- Coding the solution -- Cloning the project -- Solution deployment -- Frontend configuration and deployment -- Amazon Lex configuration and build -- Test and explore your application -- Clean up -- Future work -- Extend the actions performed by your chatbot -- Multilingual support -- Maintain user profiles for different sessions -- Summary -- Chapter 8: Building a Business Intelligence Application -- Technical requirements -- Scenario -- Requirements -- Architecture patterns -- Architecture -- AWS services -- Amazon Simple Storage Service (S3) -- AWS Glue -- Amazon Athena -- Amazon QuickSight -- Coding the solution -- Section 1 - Cloning the project -- Section 2 - Solution deployment -- Section 3 - Clickstream event generator -- Section 4 - The Glue ETL job -- Section 5 - Data exploration with Athena -- Section 6 - Data visualization with QuickSight -- Section 7 - Clean up -- Future work -- Automate the ETL pipeline -- Data life cycle management -- Summary -- Chapter 9: Exploring Future Work -- Technical requirements -- AWS services overview -- Containers -- Other API types -- Generative AI -- Other communication patterns -- AWS Pricing Calculator -- Pricing the solution from Chapter 2 -- Pricing the solution from Chapter 6 -- AWS re:Post -- AWS documentation, Solutions Library and Prescriptive Guidance -- AWS documentation -- AWS Solutions Library -- AWS Prescriptive Guidance -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
4347Publicado 2010Tabla de Contenidos: “…Using Alpha Transitions -- Exploring the Asset Movie -- Exploring the Background Matte Movie -- Lesson Review -- Lesson 14 Using Alternate Angles -- Setting Up the Project -- About Alternate Angles -- Creating Multi-Angle Tracks -- Creating Mixed-Angle Tracks -- Targeting Alternate Angle Streams -- Simulating Alternate Angle Streams -- About Alternate Angle Errors -- Exploring Final Cut Pro Cut Markers -- Lesson Review -- Working with HD -- Lesson 15 Working with High-Definition Video -- HD to SD Downconversions -- Creating Blu-ray Discs -- Lesson Review -- Appendixes -- Appendix A: Advanced Encoding -- Bit Budgeting -- Choosing MPEG-2 Encoder Settings -- Understanding Audio Encoding Formats -- Encoding AC-3 Files -- Appendix B: Bit Budget Calculator -- Glossary -- Media…”
Libro electrónico -
4348por VanderVelde, LeaTabla de Contenidos: “…Peter's Agency -- Winters deep -- 1836 : spring and the change of the guard -- Celestial explorers -- Call of the wood as a prelude to treaty -- 1837 : treaty made before her eyes -- Marriage : together alone -- Traveling the length of the river -- New baby in a new land -- Deteriorating community -- Battles and baptisms -- Taliaferro's last stand -- Leaving Minnesota and its new tribunals -- While the doctor was away : St. …”
Publicado 2009
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
4349por Nevills, Norman D., 1908-1949“…For twelve years, from 1938 until his death in a plane crash in 1949, he safely took, without a single life lost, friends, explorers, and customers down the Colorado, Green, San Juan, Salmon, and Snake Rivers in boats he designed. …”
Publicado 2005
Libro electrónico -
4350Publicado 2015“…Burma in particular has served as a "back door" to Yunnan, providing a sanctuary for political refugees and economic opportunities for trade explorers. Since the Chinese Communist takeover in 1949 and subsequent political upheavals in China, an unprecedented number of Yunnanese refugees have fled to Burma. …”
Libro electrónico -
4351Publicado 2024Tabla de Contenidos: “…Magnifying the Menu Display -- Adding Custom Folders -- Embedding Copyright Notices -- Chapter 12 Ten Features to Explore on a Rainy Day -- Trying Canon DPP 4 -- Adding Special Effects -- Using In-Camera Editing Tools -- Shooting a Time-Lapse Movie -- Adding Cleaning Instructions -- Trimming Movies -- Creating a Slide Show -- Shooting in Hybrid Auto Mode -- Viewing Photos and Movies on a TV -- Exploring an Obscure Printing Option -- Appendix Exploring Wireless Features -- Reviewing the Wireless Function Menus -- Connecting to a Computer via Wi-Fi -- Connecting to a Smartphone or Tablet -- Index -- EULA…”
Libro electrónico -
4352por Lee, ThomasTabla de Contenidos: “…. -- There's more... -- Exploring Installation Artifacts -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing VS Code -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing the Cascadia Code Font -- How to do it... -- How it works... -- There's more... -- Exploring PSReadLine -- How to do it... -- How it works... -- There's more... -- Chapter 2: Managing PowerShell 7 in the Enterprise -- Introduction -- The system used in the chapter -- Utilizing Windows PowerShell Compatibility -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing RSAT -- Getting ready -- How to do it... -- How it works... -- There's more... -- Exploring Package Management -- Getting ready -- How to do it... -- How it works... -- There's more... -- Exploring PowerShellGet and the PS Gallery -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating and Using a Local Package Repository -- Getting ready -- How to do it... -- How it works... -- There's more... -- Establishing a Script Signing Environment -- Getting ready -- How to do it... -- How it works... -- There's more... -- Working With Shortcuts and the PSShortCut Module -- Getting ready -- How to do it... -- How it works…”
Publicado 2023
Libro electrónico -
4353por Nomani, QamarTabla de Contenidos: “…Best practices for asset inventory management -- Other tools and techniques for asset management -- Summary -- Further reading -- Chapter 10: Reviewing CSPM Dashboards -- Reviewing general dashboard types -- Risk dashboards -- Compliance dashboards -- Inventory dashboards -- Identity dashboards -- Network security dashboards -- Vulnerability dashboards -- Alerts and incident dashboards -- Custom dashboards -- Exporting dashboards -- Best practices for effectively using CSPM dashboards -- Summary -- Further reading -- Chapter 11: Major Configuration Risks -- Workload misconfigurations overview -- Malware, misconfigurations, and vulnerabilities and their correlations -- The risks associated with malware and its vulnerabilities -- Identity misconfigurations -- Network security misconfigurations -- Lateral movement misconfigurations -- Data protection misconfigurations -- Suspicious and malicious activities -- Best practices and lessons learned -- Best practices to mitigate network security misconfigurations -- Lesson learned and its implementation -- Summary -- Further reading -- Chapter 12: Investigating Threats with Query Explorers and KQL -- Query explorer and attack paths overview -- Understanding the security explorer mechanism -- The importance of the security explorer in threat hunting -- Building queries with Cloud Security Explorer -- Exploring built-in query templates -- KQL basics -- KQL statement structure -- KQL practice environment -- Built-in KQL in the query explorer -- Custom queries in the query explorer -- Best practices for effective investigation -- Lessons learned from threat investigation -- Summary -- Further reading -- Chapter 13: Vulnerability and Patch Management -- Vulnerability and patch management overview -- Important terminologies -- Effective strategies to prioritize vulnerabilities…”
Publicado 2024
Libro electrónico -
4354Publicado 2012Tabla de Contenidos: “…HyperText Transfer Protocol and HyperText Transfer Protocol Secure -- Domain Name System -- Network File System -- File Transfer Protocols -- Tunneling Protocols -- Routing Protocols -- Telnet -- Secure Shell -- Internet Protocol Security -- Secure Sockets Layer and Transport Layer Security -- E-mail Protocols -- Network News Transfer Protocol -- Electronic Data Interchange -- Mapping Well-Known Ports to Protocols -- Comparing Internetwork Architectures -- Comparing Public and Private IP Addresses -- Using NAT -- Exploring Wireless Technologies -- Comparing WEP, WPA, and WPA2 -- Wireless Device Administrator Password -- Wireless Service Set Identifier -- MAC Filtering -- Bluetooth -- Radio-Frequency Identification -- GSM -- 3G -- WiMAX -- NFC -- Protecting Mobile Devices -- Questions -- Answers -- Chapter 4 Advanced Networking and Communications -- Understanding Telecommunications -- Internet Connections -- VoIP -- Securing Phones -- Understanding Firewalls -- Packet Filtering Firewall -- Stateful Inspection Firewall -- Application Firewall -- Defense Diversity -- Comparing Network-based and Host-based Firewalls -- Using Proxy Servers -- Exploring Remote Access Solutions -- Risks and Vulnerabilities -- Tunneling Protocols -- Authentication -- Access and Admission Control -- Questions -- Answers -- Chapter 5 Attacks -- Comparing Attackers -- Hackers and Crackers -- Insiders -- Script Kiddies -- Phreaks -- Exploring Attack Types -- DoS -- DDoS -- Botnets and Zombies -- Spam -- Sniffing Attack -- Ping Sweep -- Port Scan -- Salami -- Man-in-the-Middle -- Session Hijacking -- Replay -- Buffer Overflow Attacks -- Scareware and Ransomware -- Password Attacks -- Covert Channel -- Cramming -- Zero Day Exploits -- Advanced Persistent Threat -- Understanding Social Engineering -- Piggybacking -- Impersonation -- Dumpster Diving -- Shoulder Surfing -- Phishing…”
Libro electrónico -
4355Publicado 2002Tabla de Contenidos: “…-- Why do children tease? -- Exploring the teasing: Why is your child being teased? …”
Libro -
4356por Dueppen, Stephen A.Tabla de Contenidos: “…Decentralization and the evolution of egalitarian behaviors in sedentary societies -- Ancient villages in the Niger bend: context and methods for exploring the Voltaic region -- Ethnographic perspectives on western Burkina Faso: a survey -- Kirikongo: an introduction to the site, the setting, and the research design -- The West Africa environmental setting: Kirikongo in ecological context -- Stratigraphies and depositional episodes: the excavations -- Relative chronology: ceramics -- Community growth at Kirikongo: the spatial and temporal setting -- Early sedentary life in the Voltaic region: defining a "Voltaic tradition" -- Craft production at Kirikongo: the origins, development and reinterpretation of specialization -- Herding, farming, and ritual sacrifice: the economy from Kirikongo…”
Publicado 2012
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
4357Publicado 2008Tabla de Contenidos: “…Front Cover; Title Page; Copyright; Contents; Introduction; A practitioner researcher's view of academic life, emancipation, and transformation; Real bodies of knowledge; A transformational dialogue between the Fisherman and the gentle warrior; Refiguration in counselling and psychotherapy; And so the whirl owl flies: a Jungian approach to practitioner research; Exploring the meaning of hope and despair in the therapeutic relationship; Ethics and reflexivity in practitioner enquiry: three detectives and other stories; Epiphany…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4358Publicado 1989Tabla de Contenidos: “…Freud and Female Sexuality: The Consideration of Some Blind Spots in the Exploration of the ""Dark Continent""; 2. The Femininity of the Analyst in Professional Practice; 3. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4359Publicado 2009Tabla de Contenidos: “…-- Neighbors close to me -- The people Jesus is especially crazy about -- Extending my hands -- Relationships that reflect God's compassion -- God's love for variety -- God's call to cross the divide -- Exploring justice for all -- A radical righter of wrongs: am I one? …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
4360Publicado 2020Tabla de Contenidos: “…Beyond established boundaries: FBOs as developmental entrepreneurs / Jens Koehrsen and Andreas Heuser -- From missionaries to ecumenical co-workers: a case study from Mission 21 in Kalimantan, Indonesia / Claudia Hoffmann -- Mobilising evangelicals for development advocacy: politics and theology in the Micah challenge campaign for the millennium development goals / Dena Freeman -- World vision and 'Christian values' at the United Nations / Jeffrey Haynes -- Giving and development: ethno-religious identities and 'holistic development' in Guyana / Sinah Theres Kloss -- Contextualized development in post-genocide Rwanda: exploring the roles of Christian churches in development and reconciliation / Christine Schliesser…”
Libro electrónico