Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer programs 80
- Engineering & Applied Sciences 60
- Application software 50
- Development 49
- Computer Science 44
- Operating systems (Computers) 38
- Computer security 37
- Microsoft Excel (Computer file) 36
- Business 34
- Data processing 34
- Security measures 34
- Design 31
- JavaScript (Computer program language) 31
- Programming 31
- Electronic spreadsheets 30
- Computer graphics 29
- Digital techniques 28
- Photography 28
- Computer networks 26
- Computer programming 26
- Java (Computer program language) 24
- Web site development 24
- Web sites 21
- Database management 20
- Image processing 19
- Computer software 18
- Mac OS 18
- Microsoft Windows (Computer file) 18
- Python (Computer program language) 18
- Macintosh (Computer) 17
-
161Publicado 2020“…This narrow debate has distracted from our understanding of many of the harms which video games can, in some cases, cause, perpetuate or hide. Drawing upon the emerging deviant leisure perspective, this book seeks to re-orientate the debate on video games and their associated potential harms. …”
Libro electrónico -
162Publicado 2019“…Cryptography occurs all across software fields: it protects all HTTPS traffic between browsers, encrypts phone storage against prying eyes, and can even hide files inside other files through a technique called steganography. …”
-
163Publicado 2014“…Brian will then teach you about the most commonly used tools, showing you how to hide objects, compare models, and move objects. This video tutorial will teach you how to conduct a clash test, add tasks to the TimeLiner, and create and render animations. …”
-
164Publicado 2015“…Throughout the course, Sam demonstrates his Eight Key Principles for doing microservices well: Model Around Your Business Domain: Domain-driven design can help you find stable, reusable boundaries Build a Culture of Automation: More moving parts means automation is key Hide Implementation Details: One of the pitfalls that distributed systems can often fall into is tightly coupling their services together Embrace Decentralization: To achieve autonomy, push power out of the center, organizationally and architecturally Deploy Independently: Perhaps the most important characteristic microservices need Focus on Consumers First: As the creator of an API, make your service easy to consume Isolate Failure: Microservice architecture doesn’t automatically make your systems more stable Make Them Highly Observable: With many moving parts, understanding what is happening in your system can be challenging About the presenter: Sam Newman is the author of Building Microservices: Designing Fine-Grained Systems (O’Reilly Media, 2015). …”
-
165Publicado 2014“…You will start by learning how to work from scratch, then jump into learning about automation, including how to sort columns, create a custom message, and hide objects. John will teach you about table occurrences, calculations, and correspondence. …”
-
166Publicado 2016“…It doesn't require that one learn a new set of abstractions to hide the differences between operating systems. That makes its surface area smaller; there's less you need to know before you get started. …”
Libro electrónico -
167por Mojica, Jose“…The importance of a book like COM+ Programming with Visual Basic lies in the fact that the Visual Basic programming environment is designed to hide as many low-level system details as possible. …”
Publicado 2001
Libro electrónico -
168por Prata, Stephen“…It shows how to handle input and output, make programs perform repetitive tasks, manipulate data, hide information, use functions, and build flexible, easily modifiable programs…”
Publicado 1998
Libro electrónico -
169Publicado 2020“…However, the benefits of cancer treatments may hide some risks. In fact, possible side effects can be developed during the treatment itself or later from months to years after the completion of therapy, persisting during the whole life. …”
Libro electrónico -
170Publicado 2018“…DOM Manipulation: Selectors, traversing the DOM, show/hide, creating and removing elements, event listeners OOP: ES5 prototypes, inheritance, ES2015 classes and sub-classes, constructors. …”
-
171por Cairo, Alberto, 1974-“…By transforming numbers into graphical shapes, we allow readers to understand the stories those numbers hide. In this practical introduction to understanding and using information graphics, you’ll learn how to use data visualizations as tools to see beyond lists of numbers and variables and achieve new insights into the complex world around us. …”
Publicado 2013
Libro electrónico -
172Publicado 2010Tabla de Contenidos: “…Changing Borders -- Indenting Entries in a Cell -- Clearing Formatting -- Hiding and Unhiding Rows -- Hiding and Unhiding Columns -- Hiding and Unhiding a Worksheet -- Using Format As Table -- Copying Formatting -- Creating and Applying a Formatting Style -- Using Conditional Formatting -- CHAPTER 5 WORKING WITH FORMULAS AND FUNCTIONS -- Using AutoSum (SUM) -- Finding a Cell Average (AVERAGE) -- Finding the Largest Cell Amount (MAX) -- Finding the Smallest Cell Amount (MIN) -- Counting the Number of Cells (COUNT) -- Entering a Formula -- Editing a Formula or Function -- Copying a Formula -- Assigning Names to a Cell or Range -- Referencing Names in a Function -- Using Functions Across Worksheets -- Using Auto-Calculate -- Finding Functions -- Calculating a Loan Payment (PMT) -- Performing a Logical Test Function (IF) -- Conditionally Summing a Range (SUMIF) -- Finding the Future Value of an Investment (FV) -- Fixing the #### Error -- Fixing the #DIV/0! …”
Libro electrónico -
173Publicado 2017Tabla de Contenidos: “…Indonesian National Revolution Records in the National Archives of the Netherlands -- 5. Hiding the European Colonial Past: A Comparison of Archival Policies -- 6. …”
Libro electrónico -
174por Walkenbach, JohnTabla de Contenidos: “…About the Author; Table of Contents; INTRODUCTION; What You Should Know; What You Should Have; Conventions in This Book; Formula listings; Key names; The Ribbon; Functions, procedures, and named ranges; Mouse conventions; What the icons mean; How This Book Is Organized; How to Use This Book; About the Power Utility Pak Offer; Part I: Workbooks and Files; Tips and Where to Find Them; Tip 1: Changing the Look of Excel; Cosmetic changes; Hiding the Ribbon; Using options on the View tab; Hiding other elements; Hiding the status bar; Tip 2: Customizing the Quick Access Toolbar…”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
175Publicado 2019Tabla de Contenidos: “…-- The impact of technology -- Oops, we did it again -- Say that again -- What are we hiding? -- Acceptance -- Avoidance -- Importance -- Is it ever acceptable to use jargon? …”
Libro electrónico -
176por Muir, NancyTabla de Contenidos: “…; Using the Ribbon; Show or Hide Enhanced ScreenTips; Working with the Mini Toolbar; Customizing the Quick Access Toolbar; Remove or Rearrange Tools; Working with New Design Elements; Get a Cohesive Look with Themes; Work with SmartArt; 3. …”
Publicado 2009
Libro electrónico -
177Publicado 2020Tabla de Contenidos: “…How to Work Well on Teams -- Help Me Hide My Code -- The Genius Myth -- Hiding Considered Harmful -- Early Detection -- The Bus Factor -- Pace of Progress -- In Short, Don't Hide -- It's All About the Team -- The Three Pillars of Social Interaction -- Why Do These Pillars Matter? …”
Libro electrónico -
178por Reddy, MartinTabla de Contenidos: “…-- API examples -- Layers of APIs -- A real-life example -- Libraries, frameworks, and software development kits -- File formats and network protocols -- About this book -- 2 - Qualities -- Model the problem domain -- Provide a good abstraction -- Model the key objects -- Solve the core problems -- Hide implementation details -- Physical hiding: Declaration versus definition -- Logical hiding: Encapsulation -- Hide member variables -- Hide implementation methods -- Hide implementation classes -- Minimally complete -- Don't overpromise -- Don't repeat yourself -- Convenience APIs -- Add virtual functions judiciously -- Easy to use -- Discoverable -- Difficult to misuse -- Consistent -- Orthogonal -- Robust resource allocation -- Platform independent -- Loosely coupled -- Coupling by name only -- Reducing class coupling -- Intentional redundancy -- Manager classes -- Callbacks, observers, and notifications -- Callback functions -- Observers -- Notifications -- Stable, documented, and tested -- 3 - Patterns -- Pimpl idiom -- Using pimpl -- Copy semantics -- Pimpl and smart pointers -- Advantages of pimpl -- Disadvantages of pimpl -- Opaque pointers in C -- Singleton -- Implementing singletons in C++ -- Singletons and thread safety -- Singleton versus dependency injection…”
Publicado 2024
Libro electrónico -
179Publicado 2015Tabla de Contenidos: “…3D Printer AttacksROT13; Wickr; Pastebin; Women in Technology; Pirate Party; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; OPSEC; Pentesting Hardware; Anonymous Emailers; Terminal Cornucopia; Hacking in Popular Culture; System Auditing Tools; Uber; Online Identity Hiding; 2600 Meetings…”
Libro electrónico -
180Publicado 2015Tabla de Contenidos: “…""After the Import""""Dealing With Duplicates""; ""Visiting Your Photos Library""; "" Chapter 3: Viewing and Organizing Your Images""; ""Photos' Views""; ""Photos View""; ""Shared View""; ""Albums View""; ""Projects View""; ""Viewing, Opening, and Scrolling""; ""Resizing Thumbnails""; ""Opening Files""; ""Using Split View (Mac only)""; ""Scrolling Through Thumbnails""; ""Viewing Metadata""; ""Using Summarize View""; ""Selecting and Hiding Files""; ""Hiding Thumbnails""; ""The Wide World of Albums""; ""Creating an Album""; ""Adding files to an Album""; ""Viewing an Album""…”
Libro electrónico