Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 30,425
- Biblia 10,089
- Història 9,222
- Filosofía 8,605
- History 7,146
- Crítica e interpretación 5,687
- Iglesia Católica 5,603
- Teología 4,707
- Església Catòlica 4,447
- Derecho 4,158
- Bíblia 3,563
- Teología dogmática 3,396
- Moral cristiana 3,305
- Engineering & Applied Sciences 3,168
- Derecho canónico 3,110
- Management 3,009
- Sermones 2,980
- Concilio Vaticano 2,975
- Economic conditions 2,587
- Development 2,497
- Educación 2,447
- Historia y crítica 2,444
- Música 2,419
- Política 2,409
- Economía 2,379
- Derecho civil 2,365
- Education 2,323
- Business & Economics 2,186
- Liturgia 2,183
- Política y gobierno 2,147
-
3261Publicado 2017Tabla de Contenidos: “…The evolution of HTTP -- HTTP/2 quick start -- How and why we hack the web -- Transition to HTTP/2 -- The HTTP/2 protocol -- HTTP/2 performance -- HTTP/2 implementations -- Debugging h2 -- What is next?…”
Libro electrónico -
3262Publicado 2016“…The DS2 Procedure: SAS Programming Methods at Work outlines the basic structure of a DS2 program and teaches you how each component can help you address problems. …”
Libro electrónico -
3263Publicado 2016“…Ionic Two cookbook…”
Libro electrónico -
3264por Khliupko, Viktor. authorTabla de Contenidos: “…1. Overview -- 2. Technology Stack -- 3. Resources / Tutorials / Guides -- 4. …”
Publicado 2017
Libro electrónico -
3265Publicado 2016Tabla de Contenidos: “…Cover -- Titel -- Impressum -- Referenzkarte -- Inhaltsverzeichnis -- Einleitung -- Kapitel 1: Datentypen und Optionals -- 1.1 Willkommen auf dem Spielplatz -- 1.2 Variablen und Konstanten -- 1.3 Zahlendatentypen konvertieren -- 1.4 Werte runden -- 1.5 Minimum und Maximum -- 1.6 Der Datentyp Bool -- 1.7 Optionals -- 1.8 Programmieren mit Optionals -- Kapitel 2: Zeichenketten des Typs String -- 2.1 String-Interpolation -- 2.2 Zeichenketten vergleichen -- 2.3 Textabschnitte finden und ersetzen -- 2.4 Zeichenketten in Zahlentypen konvertieren -- 2.5 Die Klasse NSNumber -- 2.6 Texte teilen -- 2.7 Subscripting mit Unicode -- 2.8 Anfang und Ende von Zeichenketten -- Kapitel 3: Arrays und Dictionaries -- 3.1 Arrays - Listen von Elementen -- 3.2 Arrays sortieren und filtern -- 3.3 Dictionaries, die schnellen Wörterbücher -- 3.4 Arrays aus Dictionaries -- Kapitel 4: Fallunterscheidungen und Schleifen -- 4.1 Die if-Struktur -- 4.2 Die switch-case-Struktur -- 4.3 Die for-Schleife -- 4.4 Schleifen und Arrays -- 4.5 Rückwärts durch die for-Schleife -- 4.6 Die while-Schleife -- 4.7 Schleifen mit Fallunterscheidungen -- 4.8 Werte als Diagramme anzeigen -- 4.9 Gültigkeitsbereiche -- Kapitel 5: Funktionen -- 5.1 Die erste Funktion -- 5.2 Benannte Parameter -- 5.3 Funktionen mit Rückgabewert -- 5.4 Tupel und anonyme Typen -- 5.5 Eine unbestimmte Anzahl von Parametern -- 5.6 Funktionen mit Standardwerten -- 5.7 Parameter sind unveränderlich -- 5.8 Aliasse -- Kapitel 6: Closures -- 6.1 Closures sind Funktionen -- 6.2 Closures als Parameter -- 6.3 Arrays sortieren mit Closures -- 6.4 Variablen einfangen -- 6.5 Asynchrone Closures mit Grand Central Dispatch -- 6.6 Parallele Verarbeitung -- 6.7 Asynchrone Aufrufe mittels Completion- Handler -- Kapitel 7: Klassen und Objekte -- 7.1 Das erste Projekt -- 7.2 Erste Schritte im Workspace-Fenster -- 7.3 Die Klasse Person…”
Libro electrónico -
3266Publicado 2016“…Quick and concise guide to Angular 2 components…”
Libro electrónico -
3267Publicado 2017“…Book of sides two…”
Libro electrónico -
3268Publicado 2016“…Learning Ansible two…”
Libro electrónico -
3269Publicado 2019“…Algebra II Essentials For Dummies (9781119590873) was previously published as Algebra II Essentials For Dummies (9780470618400). …”
Libro electrónico -
3270Publicado 2019“…First two hours…”
Libro electrónico -
3271Publicado 2015“…This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics – roughly summarised as ‘what you have’, ‘what you are’ and ‘what you know’. …”
Libro electrónico -
3272por Keith, Mike. authorTabla de Contenidos: “…; ""The Java Persistence API""; ""History of the Specification""; ""EJB 3.0 and JPA 1.0""; ""JPA 2.0""; ""JPA 2.1""; ""JPA and You""…”
Publicado 2013
Libro electrónico -
3273
-
3274Publicado 2012“…Utilisable aussi bien sous Windows et Linux que sous Mac OS X, il a été complètement refondu dans sa version 2.6 pour offrir toute une panoplie d'outils dont la puissance et la souplesse permet d'allier rapidité et créativité, tout particulièrement dans la conception de formes libres. …”
Libro electrónico -
3275Publicado 2015Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Starting with Yii2; Requirements and tools; Installing Yii2 with Composer; Application structure; Application properties; Common application components; Handling application events; The MVC pattern in Yii2; Naming convention; Configuring the debug toolbar; Using the logger; Example - Hello world from scratch with the Yii basic template and bootstrap template; Summary; Chapter 2: Creating a Simple News Reader; Creating Controller and Action…”
Libro electrónico -
3276Publicado 2015Tabla de Contenidos: “…Background on digital signal processing; 2: Baseband Transmissions; 2.1. Introduction; 2.2. …”
Libro electrónico -
3277Publicado 2016“…Maximize the power of Magento 2 to create productive online stores…”
Libro electrónico -
3278Publicado 2016“…What You Will Learn Set up Kali Linux for pen testing Map and enumerate your Windows network Exploit several common Windows network vulnerabilities Attack and defeat password schemes on Windows Debug and reverse-engineer Windows programs Recover lost files, investigate successful hacks and discover hidden data in innocent-looking files Catch and hold admin rights on the network, and maintain backdoors on the network after your initial testing is done In Detail Microsoft Windows is one of the two most common OS and managing its security has spawned the discipline of IT security. …”
Libro electrónico -
3279Publicado 2015Tabla de Contenidos: “…Histograms of the orange datasetHistograms with the reference line at the median value in red; Lattice and Trellis plots; Scatterplots with individual observations; Scatterplots of the orange dataset with faceting; Faceting scatterplots with line and points; Scatterplots with grouping data; Boxplots of the orange dataset; Histograms of the orange dataset; Histograms with the reference line at the median value in red; ggplot2 and the grammar of graphics; Further reading; Summary; Chapter 2: Getting Started; General aspects; Introduction to aesthetic attributes; Introduction to faceting…”
Libro electrónico -
3280Publicado 2016Tabla de Contenidos: “…Cover; Copyright; Credits; Foreword; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Installing Magento 2 on Apache and NGINX; Introduction; Installing Apache; Installing NGINX; Installing PHP-FPM; Installing HHVM; Installing MySQL; Installing Magento 2; Installing Magento 2 on Hypernode; Managing Magento 2 on Docker; Chapter 2: Magento 2 System Tools; Introduction; Installing Magento 2 sample data via GUI; Installing Magento 2 sample data via the command line; Managing Magento 2 indexes via the command line…”
Libro electrónico