Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer programs 80
- Engineering & Applied Sciences 60
- Application software 50
- Development 49
- Computer Science 44
- Operating systems (Computers) 38
- Computer security 37
- Microsoft Excel (Computer file) 36
- Business 34
- Data processing 34
- Security measures 34
- Design 31
- JavaScript (Computer program language) 31
- Programming 31
- Electronic spreadsheets 30
- Computer graphics 29
- Digital techniques 28
- Photography 28
- Computer networks 26
- Computer programming 26
- Java (Computer program language) 24
- Web site development 24
- Web sites 21
- Database management 20
- Image processing 19
- Computer software 18
- Mac OS 18
- Microsoft Windows (Computer file) 18
- Python (Computer program language) 18
- Macintosh (Computer) 17
-
941Publicado 2021“…A subsequent political economy analysis by the author points to the discursive power of giant fossil fuel and electricity companies keeping up a façade of Cap-and-Trade utopia and hiding the reality of free permit donations and administrative price control, concealing financial bills mostly paid by household electricity customers. …”
Libro electrónico -
942Publicado 2020“…During that time, Apple has also added numerous new watch product lines, vastly expanded the device's capabilities, and enabled developers to create entirely new apps and tools. The Apple Watch hides an enormous amount of technical complexity behind that unassuming touch screen, and with help from author Jeff Carlson, you'll unlock every last bit of its power. …”
Libro electrónico -
943por Shtern, Victor“…Learn how to make design decisions based on key criteria such as information hiding and pushing responsibilities from clients down to server classes. …”
Publicado 2000
Libro electrónico -
944Publicado 2022“…Since the device's introduction in 2015, Apple has developed numerous new watch product lines, vastly expanded the device's capabilities, and enabled developers to create entirely new apps and tools. The Apple Watch hides an enormous amount of technical complexity behind that unassuming touch screen, and with help from author Jeff Carlson, you'll unlock every last bit of its power. …”
Libro electrónico -
945Publicado 2005“…Techniques for optimizing large-scale IP routing operation and managing network growth Understand the goals of scalable network design, including tradeoffs between network scaling, convergence speed, and resiliency Learn basic techniques applicable to any network design, including hierarchy, addressing, summarization, and information hiding Examine the deployment and operation of EIGRP, OSPF, and IS-IS protocols on large-scale networks Understand when and how to use a BGP core in a large-scale network and how to use BGP to connect to external networks Apply high availability and fast convergence to achieve 99.999 percent, or “five 9s” network uptime Secure routing systems with the latest routing protocol security best practices Understand the various techniques used for carrying routing information through a VPN Optimal Routing Design provides the tools and techniques, learned through years of experience with network design and deployment, to build a large-scale or scalable IP-routed network. …”
Libro electrónico -
946Publicado 2021“…Understand global and local variables, class and instance attributes, and information-hiding techniques. Create functions with flexible interfaces. …”
Libro electrónico -
947por Hansteen, Peter N. M.“…But, perhaps more importantly, because we know you like to tinker, The Book of PF tackles a broad range of topics that will stimulate your mind and pad your resume, including how to: Create rule sets for all kinds of network traffic, whether it is crossing a simple home LAN, hiding behind NAT, traversing DMZs, or spanning bridges Use PF to create a wireless access point, and lock it down tight with authpf and special access restrictions Maximize availability by using redirection rules for load balancing and CARP for failover Use tables for proactive defense against would-be attackers and spammers Set up queues and traffic shaping with ALTQ, so your network stays responsive Master your logs with monitoring and visualization, because you can never be too paranoid The Book of PF is written for BSD enthusiasts and network admins at any level of expertise. …”
Publicado 2008
Libro electrónico -
948Publicado 2023“…Therefore, humility has nothing to do with being weak or hiding the light under the bushel. Instead, it is about clarity, taking a step back from one's ego and thus being able to serve the greater picture. …”
Libro electrónico -
949Publicado 2019“…A real company flaunts its humanity, instead of hiding it. It’s what the most successful, sustainable companies are doing today, and there’s no reason yours can’t be the same. …”
Libro electrónico -
950Publicado 2015“…Machine learning sits at the core of deep dive data analysis and visualization, which is increasingly in demand as companies discover the goldmine hiding in their existing data. For the tech professional involved in data science, Machine Learning: Hands-On for Developers and Technical Professionals provides the skills and techniques required to dig deeper…”
Libro electrónico -
951Publicado 2022“…Get started quickly with Scala 3 interpreter, syntax, tools, and current usage Master core language features: functions, arrays, maps, tuples, packages, imports, exception handling, and more Design and build better object-oriented code with Scala 3 Use Scala for real-world programming tasks: working with files, regular expressions, and processes Work with higher-order functions and the powerful Scala collections library Create concurrent programs with Scala futures Understand the Scala type system, including revamped enums, intersection and union types, and enhanced type inference Use contextual abstractions to easily extend class hierarchies, enrich existing classes, perform automatic conversions, and elegantly hide tedious details Apply advanced "power tools" such as annotations and given values Discover how to "program with types," analyzing and generating types at compile time Get a taste of what's now possible with Scala macros If you're a Java, Python, C++, or C# programmer who's new to Scala or functional programming--or even if you've already used earlier versions of Scala--this guide will help you write code that's more robust, more efficient, and more secure. …”
Libro electrónico -
952“…What You’ll Learn: Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs…”
Libro electrónico -
953Publicado 2017“…You'll learn just what makes them tick—they're definitely not the workers of yesteryear—and how to uncover the deeply inspirational talent they have hiding not far below the surface. Best practices and proven strategies from Google, Netflix, LinkedIn, and other top employers provide real-world models for effective management, and new research on first-wave versus second-wave Millennials helps you parse the difference between your new hires and more experienced workers. …”
Libro electrónico -
954Publicado 2011“…COVERAGE INCLUDES Understanding methods, messages, and the Objective-C messaging system Defining classes, creating object instances, and using class objects Using categories to extend classes without subclassing Simplifying development with Objective-C 2.0 declared properties Using protocols to emphasize behavior rather than class Working with common Foundation classes for strings, arrays, dictionaries, sets, and number objects Using Objective-C control structures, including Objective-C 2.0’s new fast enumeration construct Understanding application security and hiding the declaration of methods that should stay private Using the new blocks feature provided in Objective-C 2.0…”
Libro electrónico -
955Publicado 2022“…Angels’ nature was to hide in dark places to ride with abandon to sink in the spurs to gnash silver teeth to kick up tipped boots ruining every square dance. …”
Libro electrónico -
956Publicado 2005“…A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues Operate and maintain a secure MPLS core with industry best practices Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS) Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. …”
Libro electrónico -
957Publicado 2018“…Set up your writing environment and avoid distractions: Choose default fonts and colors, opt for Script Mode if you’re writing a script or screenplay, and simplify your workspace by hiding interface elements or by using Composition Mode or Apple’s Full Screen Mode. …”
Libro electrónico -
958“…Tableau can change the course of business, but the old adage of "garbage in, garbage out" is the hard truth that hides behind every Tableau sales pitch. That amazing sales demo does not work as well with bad data. …”
Libro electrónico -
959por Kolay, Swapan Kumar“…Such use is unfortunate, because it hides and mystifies the difference between the biologically given sex and culturally created gender. …”
Publicado 2019
Libro electrónico -
960Publicado 2023“…The eText features Hewitt's video tutorials that play inline, new Check Yourself from the text presented as a hide/reveal interactive feature, and multiple-choice quizzes at the end of each chapter. …”
Libro electrónico