Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
1101Publicado 2015“…Get a 360-degree overview of the Oracle Exadata Database Machine Efficiently deploy RAC within the Oracle Exadata ecosystem Fully leverage Storage Cell’s extraordinary performance, via Offloading, Smart Scans, and Hybrid Columnar Compression Manage Exadata with OEM 12 c : perform setup, configuration, asset/target discovery, and day-to-day administration Tune Oracle Exadata for even better performance Perform Exadata Backup/Recovery/DR with RMAN and Data Guard Migrate to Oracle Exadata from other platforms Use Oracle Exadata with the ZFS Storage Appliance Consolidate within the Exadata Database Cloud…”
Libro electrónico -
1102Publicado 2014“…Within the incredible diversity of data and disciplines represented here, the Viking Age tends to be distinguished by differentiating it from earlier and later periods, while the geographical space is quite fluidly defined for this era, which was long before the construction of modern nations with their fenced and guarded borders. Most significantly, the contributions lay emphasis on contextualizing the Viking Age within the complexities of defining cultural identities in the past through traces of cultural, linguistic or genetic features. …”
Libro electrónico -
1103Publicado 2013“…A Step-by-Step Guide to Managing Expectations Guard Against Conflicting Messages Use Jargon with Care Identify Communication Preferences Listen Persuasively Help Customers Describe Their Needs Become an Information-Gathering Skeptic Understand Your Customers' Context Try the Solution On for Size Clarify Perceptions Set Uncertainty-Managing Service Standards When Appropriate, Just Say Whoa Build Win-Win Relationships Formulate an Action Plan…”
Libro electrónico -
1104Publicado 2019“…Two leading enterprise cloud and Windows Server experts show how to: Move from legacy IT models to an agile service structure Implement managed self-service, iteration-based software updates, immutable infrastructure, and other elements of a modern IT environment Plan and smoothly integrate on-premises, Azure, Azure Stack, and Hybrid Cloud components Fortify IT security now and in the future Safeguard identities via new models and tools, including Remote Credential Guard Protect the OS, on premises and in the cloud Optimize datacenter efficiency via enterprise-class virtualization and other advanced technologies Promote innovation via microservices, DevOps, and NanoServer containerization…”
Libro electrónico -
1105Publicado 2011“…Through the reports of the field guards and the port registers, we get into all the details of the island's daily life, with its stories of washerwomen and ship captains, sheep stolen from beaches and forests voluntarily set on fire. …”
Libro electrónico -
1106Publicado 2021“…The roots of Francoist political culture are found in the Falangist and Carlist militias, and Civil Guard units, that lent their support to the military rebellion. …”
Libro -
1107por Diaconis, Persi“…In this book they share a wealth of conjuring lore, including some closely guarded secrets of legendary magicians. Magical Mathematics covers the mathematics of juggling and shows how the I Ching connects to the history of probability and magic tricks both old and new. …”
Publicado 2011
Libro -
1108
-
1109
-
1110
-
1111
-
1112Publicado 2016“…¿Se le debe permitir a tu robot personal que te guarde la cola, o forzársele a testificar contra ti en un juicio? …”
Libro -
1113por Gonçalves, Andréa“…Lea, comprenda, reflexione con atención, disfrute de la lectura, guarde lo que le interese y entienda que realmente ¡no podemos controlarlo todo!…”
Publicado 2016
Texto completo en Odilo
Otros -
1114Publicado 2009“…In many countries, a whole generation of teachers are reaching retirement age, ‘changing the guard’ with a crop of new young recruits who are ever harder to attract. …”
Libro electrónico -
1115Publicado 2022“…A variety of topics can be found in the novels by the female writers, ranging from stories about female air guards who protect the Swedish border to female pacifists who find it necessary to kill for the sake of peace. …”
Libro electrónico -
1116por Firstenberg, Iris R. 1957-“…Learn why skills and talent are only two pieces of a bigger puzzle Discover how to better galvanize the team, and keep them motivated long-term Connect to a purpose that inspires enthusiastic engagement Conquer uncertainty, and develop a strategy for dealing with mistakes No one likes to be caught off guard, and the consequences can be severe at the organizational level. …”
Publicado 2014
Libro electrónico -
1117por Kelby, Scott“…You’ll learn some of the most closely guarded Photoshop CS4 special effects—the same ones you see on TV, in magazines, and on the Web. …”
Publicado 2009
Libro electrónico -
1118por Collberg, Christian“…Coverage includes Mastering techniques that both attackers and defenders use to analyze programs Using code obfuscation to make software harder to analyze and understand Fingerprinting software to identify its author and to trace software pirates Tamperproofing software using guards that detect and respond to illegal modifications of code and data Strengthening content protection through dynamic watermarking and dynamic obfuscation Detecting code theft via software similarity analysis and birthmarking algorithms Using hardware techniques to defend software and media against piracy and tampering Detecting software tampering in distributed system Understanding the theoretical limits of code obfuscation…”
Publicado 2009
Libro electrónico -
1119por Coffin, David“…Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. …”
Publicado 2011
Libro electrónico -
1120Publicado 2022“…Besides the exploitation, the themes of improving the quality of water, the safeguarding of ittic sector and the mandatory better organization of port areas are further developed. …”
Libro electrónico