Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 588
- Management 524
- Computer programs 472
- Application software 450
- Artificial intelligence 441
- Computer networks 313
- Engineering & Applied Sciences 279
- Data processing 274
- Computer software 256
- Cloud computing 255
- Security measures 222
- Computer security 219
- Information technology 219
- Leadership 218
- Web site development 202
- Design 195
- Business 194
- Historia 194
- Python (Computer program language) 193
- Machine learning 189
- Examinations 186
- Web sites 183
- Technological innovations 179
- Computer Science 161
- Data mining 160
- Business & Economics 152
- Electronic data processing 152
- Database management 150
- Matemáticas 149
- Historia- 147
-
14361
-
14362
-
14363
-
14364
-
14365
-
14366Publicado 2015Biblioteca de la Universidad de Navarra (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Libro
-
14367por GOSSELIN ARNOLD, Jeanne
Publicado 1983Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo (Otras Fuentes: Biblioteca Diocesana Bilbao, Red de bibliotecas Iglesia Navarra, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca del Seminario Diocesano de Jaén, Biblioteca Diocesana de Salamanca)Libro -
14368Publicado 1985Revista digital
-
14369
-
14370
-
14371
-
14372
-
14373
-
14374
-
14375
-
14376
-
14377por Green, Hardy“…As a consultant for Corporate Campaign, Inc., a firm hired by the strikers to advance their cause, Hardy Green offers the first insider’s account of this watershed strike. …”
Publicado 2018
Libro electrónico -
14378por Carr, Jeffrey“…Discover how Russian investment in social networks benefits the Kremlin Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa Explore the rise of anarchist groups such as Anonymous and LulzSec Look inside cyber warfare capabilities of nations including China and Israel Understand how the U.S. can legally engage in covert cyber operations Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers."…”
Publicado 2012
Libro electrónico -
14379Publicado 2016“…From one of Inc. magazine's "Coolest College Startups"—the revolutionary three-step method that will transform every presentation into an experience for the audience Rid the world of bad presentations with: Engaging Content + Memorable and Simple Design + Powerful Delivery Together, these create an unforgettable experience for the audience, The Big Fish Experience . …”
Libro electrónico -
14380Publicado 2015“…Work with refreshable beans, inline scripted beans, POGOs as Spring beans, and see how Groovy works with Spring Boot Learn about higher-order functions, immutable objects, and functional concepts including composition, method references, and memoize Add persistence capabilities based on both JPA and NoSQL databases Use Groovy traits for composition to simulate multiple inheritance Dive into RESTful web services, including Groovy clients, and RESTful services with JAX-RS Apply Unit Testing with JUnit and Spock Ken Kousen, President of Kousen IT, Inc., is a technical trainer, mentor, and consultant in all areas related to Java, specializing in Android, Spring, Hibernate/JPA, Groovy, and Grails. …”