Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 630
- Application software 529
- Management 398
- Cloud computing 322
- Computer networks 319
- Python (Computer program language) 291
- Engineering & Applied Sciences 262
- Security measures 242
- Examinations 241
- Data processing 240
- Artificial intelligence 223
- Computer programs 219
- Computer security 217
- Machine learning 206
- Business & Economics 186
- Computer programming 183
- Computer software 173
- Certification 171
- Computer Science 169
- Economics 155
- Data mining 152
- Information technology 150
- Programming 150
- Database management 149
- Design 149
- Java (Computer program language) 143
- Web site development 142
- Electronic data processing personnel 138
- Operating systems (Computers) 133
- History 127
-
6481Publicado 2022“…Philosophers of language have focused primarily on highly idealized linguistic contexts in which cooperative agents are working toward the shared goal of gaining information about the world. This approach abstracts away from important issues like power, ideology, social position, and diversity of goals which are crucial to explaining linguistic phenomena both at the semantic and pragmatic levels. …”
Libro electrónico -
6482Publicado 2006“…The knowledge and experience gained over many years of research and trial-and-error has been hard won. …”
Libro electrónico -
6483por Hay, David C., 1947-“…In addition, he guides you through the process of defining an architecture—from gaining a full understanding of what business people need to the creation of a complete enterprise architecture. …”
Publicado 2003
Libro electrónico -
6484Publicado 2010“…Drive Even More Value from Virtualization: Write VMware® Applications that Automate Virtual Infrastructure Management Companies running VMware have already achieved enormous gains through virtualization. The next wave of benefits will come when they reduce the time and effort required to run and manage VMware platforms. …”
Libro electrónico -
6485Publicado 2015“…Also illustrated are use cases that show real-world solutions for tiering, flash-only, and preferred-read, and also examples of the benefits gained by integrating the FlashSystem storage into business environments. …”
Libro electrónico -
6486Publicado 2022“…New and emerging analytics tools and technologies can be configured to optimize business value, change how an organization gains insights, and significantly improve the decision-making process across the enterprise. …”
Libro electrónico -
6487Publicado 2023“…Be Intentional About Risk- Use cost-benefit analysis to make sure short-term gains don't put others-or your reputation-at risk; 2. …”
Libro electrónico -
6488Publicado 2021“…In recent years, the Mediterranean diet (MD) has gained popularity as one such dietary pattern, demonstrated to deliver many benefits according to a variety of different studies (cohort, RCT, etc.), adding to its legacy. …”
Libro electrónico -
6489Publicado 2001“…These applets automate the processing and management of digital video, imaging, print, and web-based material. AppleScript is also gaining a foothold in scientific programming, as technical organizations adopt G4 CPU-based systems for advanced computing and scientific analysis. …”
Libro electrónico -
6490Publicado 2008“…No academic theory here: Make More, Worry Less brings together 18 riveting stories from people who’ve achieved both of these goals, gaining surprising wealth and real peace of mind along the way. …”
Libro electrónico -
6491Publicado 2003“…Official self-study test preparation guide for the CCIE Security written exam Review all CCIE Security written exam topics, including: Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and SNMP Cisco IOS(r) Software specifics, including password security, password recovery, and standard and extended access lists Encryption technologies and security protocols, including TACACS+, RADIUS, and Kerberos Windows and UNIX operating system security issues Cisco security applications, including Cisco PIX(r) Firewall, VPN, IDS, and Cisco Policy Manager Basic security methods and the evolution of new secure networks including packet filtering, proxies, and NAT/PAT Network security policies, vulnerabilities, and protection techniques With increased reliance on networking resources to provide productivity gains and corporate revenue contributions, the need for network security has never been higher. …”
Libro electrónico -
6492por Castelli, Matthew“…Whether you are looking to take your first step into a career in networking or are interested in just gaining a conversational knowledge of the technology, this book is for you!…”
Publicado 2005
Libro electrónico -
6493por Box, Don, 1962-“…Box and Sells explain the inner workings of the CLR—the rationale behind its design, the problems it solves, and the role of type in CLR programming—and show readers how to build better applications using the .NET Framework while gaining a more complete understanding of how the CLR works. …”
Publicado 2003
Libro electrónico -
6494por Ahmed, Khawar Zaman“…The Java 2 Platform Enterprise Edition (J2EE TM ) offers great promise for dramatically improving the way that enterprise applications are built, and organizations that have adopted the J2EE are gaining a competitive advantage. The industry-standard Unified Modeling Language (UML) has helped countless organizations achieve software success through visual modeling. …”
Publicado 2002
Libro electrónico -
6495por Falkner, Jayson“…Readers can then test-drive the knowledge gained by constructing a book-support Web site. Among the topics covered in-depth are: Exception handling JavaBeans and the new JSP Expression Language (JSP EL) The JavaServer Pages Standard Tag Library (JSTL) and coding custom tag libraries Filters Error handling Session and state management Security Design patterns, including Struts Internationalization Multiclient support Database connectivity The actual book-support site (www.jspbook.com) features frequently asked questions, working code examples, and references. …”
Publicado 2004
Libro electrónico -
6496Publicado 2013“…The largest database tuning performance gains can often be obtained from tuning application code, and applications that use SQL to retrieve data are the best candidates for tuning. …”
Libro electrónico -
6497Publicado 2012“…The author shares in-depth knowledge that would otherwise only be gained through many years of deployment and troubleshooting. …”
Libro electrónico -
6498por Knoernschild, Kirk“…Over the past several years, module frameworks have been gaining traction on the Java platform, and upcoming versions of Java will include a module system that allows you to leverage the power of modularity to build more resilient and flexible software systems. …”
Publicado 2012
Libro electrónico -
6499Publicado 2013“…More than 70 percent of businesses today have websites; search engine optimization is a vital factor in growing a business by gaining new customers while increasing business from existing customers This two-color book is the only guide to search engine optimization that is presented in a visual format Presents search engine marketing principles including keyword generation, on-site optimization involving website structure, internal linking, URL structure, content creation, off-site optimization, social media optimization and more Author is a popular keynote speaker and panelist at interactive marketing and technology conferences Search Engine Optimization: Your visual blueprint for effective Internet marketing, Third Edition helps visual learners master and maximize SEO techniques…”
Libro electrónico -
6500Publicado 2021“…Since the first decades of the sixteenth century, however, an overwhelming foreign book production is increasingly present on bolognese market: important printers like Vincenzo Valgrisi and Gabriele Giolito establish branches in the city, while in the law book sector the Lyonese publishing industry of Giunti is gaining momentum. The situation changes again in the second half of the century, when the market is remodeled following the conditioning by the ecclesiastical authorities and it extends to social strata previously excluded from cultural consumption. …”
Libro electrónico