Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 669
- Development 666
- Management 647
- Application software 594
- Computer Science 452
- Computer networks 403
- Leadership 365
- Computer programs 360
- Photography 332
- Design 325
- Examinations 312
- Business & Economics 308
- Security measures 288
- Data processing 282
- Digital techniques 280
- Operating systems (Computers) 276
- Computer security 274
- Computer programming 268
- Web site development 265
- Web sites 265
- Programming 262
- Certification 258
- Computer software 242
- Database management 227
- Python (Computer program language) 213
- Electronic data processing personnel 208
- Java (Computer program language) 204
- Cloud computing 196
- Success in business 194
- Computer graphics 182
-
5501por Heron, John, 1928-Tabla de Contenidos: “…Validity and Beyond -- Validity in quantitative research -- Validity in qualitative inquiry -- Participative reality -- Truth as the congruent articulation of reality -- The primacy of the practical -- Practice as consummation -- Grounding and consummation -- More on the congruence theory of truth -- Beyond pragmatism -- Autonomous forms of validity -- The validation of practice -- Executive criteria -- Technical criteria -- Psychosocial criteria -- Intentionality criteria -- Value criteria -- The validation of propositions -- Participative knowing -- Agreements about findings -- Reality-making social contracts -- 10. …”
Publicado 1996
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
5502Publicado 2018Tabla de Contenidos: “…-- Architecture design patterns for Resiliency -- Retry pattern with transient failures -- Load balancing -- Data replication -- Circuit Breaker pattern -- Throttling pattern -- Queue-Based Load Leveling pattern -- Compensating Transaction pattern -- Summary -- Chapter 9: Identity and Security -- Security in the cloud -- Azure network security -- SSO and MFA -- Azure MFA setup -- Federation and the Federated Identity Pattern -- Gatekeeper pattern -- Valet Key pattern -- Summary -- Other Books You May Enjoy -- Leave a review - let other readers know what you think -- Index…”
Libro electrónico -
5503Publicado 2021Tabla de Contenidos: “…Delays -- Finite-State Machine -- Working with Loops -- Communicating Digitally -- Communicating with Analog Components -- Serial Communication -- SerialEvent -- Using Arduino Libraries -- TinyGPS++ -- Putting Together the Arduino Language Basics -- Summary -- Chapter 3: Modeling with Fusion 360 -- Installing and Setting Up Fusion 360 -- Download Fusion 360 -- Installation Procedures for Fusion 360 -- Getting to Know Fusion 360 -- Fusion 360's User Interface -- Fusion 360 Sketch Tools -- Fusion 360 3D Tools -- Fusion 360 Tools -- Importing Files -- Your First 3D Model in Fusion 360 -- Creating a Sketch -- Using the Extrude Function -- Parametric Modeling in Fusion 360 -- Summary -- Chapter 4: 3D Printing -- What Is 3D Printing -- Types of 3D Printers -- Tools of the Trade -- Parts of a 3D Printer -- What Is a Slicer -- Different Slicing Programs -- Simplify3D -- The Main Screen -- Common Settings -- Troubleshooting -- Over/Under Extrusion -- Ghosting -- Parts Do Not Stay on Build Plate -- Our First Print -- Summary -- Exercise -- Chapter 5: PCB Design -- What Is a PCB -- PCB Design Software -- Eagle -- Eagle's Main Windows -- Loading a Library -- Creating a Schematic -- Laying Out a PCB…”
Libro electrónico -
5504Publicado 2022Tabla de Contenidos: “…-- Respecting Demographic Data -- Notes -- Chapter 5 Analyze the Data -- Seeing It So Clear Now -- Using the Data to Know What You Have -- The How: Analyzing Data to Identify Recruitment Issues -- The How: Analyzing Data to Identify Retention Issues -- Assume Competence -- Notes -- Chapter 6 Plan your Program -- The World's Park -- Plan Only after You Analyze the Data -- Getting Started on Your Plan -- 4-2-50 Program -- How to Measure ROI in Your DE& -- I Program -- The How: CAPE DE& -- I Plan Template -- How to Complete the CAPE DE& -- I Template -- Note -- Chapter 7 Execute on the Plan -- Audio Must Match Video -- E Is for Execute -- The How: A CAPE Path to Execute -- Part II Practical Lessons Learned in DE& -- I Programs -- Chapter 8 DE& -- I Programs Should Look Like the Company…”
Libro electrónico -
5505Publicado 2016Tabla de Contenidos: “…Intro -- Title Page -- Copyright -- The ATD Workshop Series -- Contents -- FOREWORD BY TONY BINGHAM -- PREFACE -- INTRODUCTION: HOW TO USE THIS BOOK -- Why Is Developing Your Emotional Intelligence Important? -- What Do I Need to Know About Training? -- How Much Time Will Preparation Take? …”
Libro electrónico -
5506Publicado 2016Tabla de Contenidos: “…-- Time for action - knowing individual sensors' capabilities -- What just happened? …”
Libro electrónico -
5507Publicado 2018Tabla de Contenidos: “…-- I've timed it, and I know it takes 5 seconds for the page to load -- Machine specification -- Server specification -- JavaScript engine performance -- Networks -- So, what do we do? …”
Libro electrónico -
5508Publicado 2021Tabla de Contenidos: “…Be Aware of Power Dynamics -- Use the Developmental Coaching Model -- Trust Challenges -- Trust Challenge #1: Not Wanting to Upset a Harmonious Relationship -- Considerations and Approaches for Trust Challenge #1 -- Trust Challenge #2: The Coachee is Highly Resistant -- Considerations and Approaches for Trust Challenge #2 -- Trust Challenge #3: You Know "The Answer" -- Considerations and Approaches for Trust Challenge #3 -- Trust Challenge #4: Remote Coaching -- Considerations and Approaches for Trust Challenge #4 -- Trust Challenge #5: You are Completely Stuck! …”
Libro electrónico -
5509por Brown, JasonTabla de Contenidos: “…Building trust into the network -- Virtual private networking and remote access -- Getting to know the "zero trust" concept -- Understanding firewall functionality -- Web application firewalls -- DNS firewalls -- Distributed denial of service -- Summary -- References -- Chapter 10: Computer and Server Security -- The history of operating systems -- Exploring server hardening steps -- Operating system patching -- Least privilege -- Removing unneeded services -- Host-based security -- Picking the right password -- MFA -- Secure software configurations -- Changing system defaults -- Remote management -- Zero trust -- Dangers of TOFU -- The IoT -- Understanding encryption -- Digital signatures -- Protecting the private key -- Summary -- References -- Chapter 11: Securing Software Development through DevSecOps -- Why introduce cybersecurity early? …”
Publicado 2023
Libro electrónico -
5510Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and credits -- Contributors -- Table of Contents -- Preface -- Part 1: Working with Motion Graphics -- Chapter 1: Getting to Know the User Interface and Workflow -- Technical requirements -- Customizing the user interface -- Saving an After Effects project -- Importing media files -- Creating compositions and keyframes -- Working with the Timeline panel and layer properties -- Trimming composition duration -- Working with text and animations -- Rendering the composition -- Optimizing After Effects' performance -- Summary -- Chapter 2: Applying Effects and Presets to Create Animated Graphics -- Technical requirements -- Importing footage -- Previewing presets -- Applying presets -- Precomposing -- Modifying the preset -- Summary -- Chapter 3: Deep-Dive into Text Animations -- Technical requirements -- Opening the project and creating the text layer -- Styling text using the Character and Paragraph panels -- Working with text animation -- Saving animation as a preset -- Using multiple text animators -- Offset animation -- Working with the Wiggly Selector -- Animating text on a path -- Adding motion blur -- Summary -- Chapter 4: Animating Shape Layers -- Technical requirements -- Creating shape layers -- Exploring shape tools -- Creating a funnel shape -- Working with Bezier paths -- Creating the bottom section of the funnel -- Creating text layers -- Animating shape and text layers -- Creating an info chart -- Creating a bar graph line -- Using Null for vertex points of Shape layers -- Animating the info chart -- Merging the compositions -- Creating a transition between compositions -- Summary -- Chapter 5: Adding Motion to Photoshop and Illustrator Graphics -- Technical requirements -- Creating a master composition -- Importing Illustrator and Photoshop files -- Importing Illustrator files…”
Libro electrónico -
5511Publicado 2023Tabla de Contenidos: “…-- Debugging -- Profiling -- Fuzzing -- Symbolic execution -- Taint tracking -- Summary -- Further reading -- Part 3: Further Learning -- Chapter 8: Crafting Quality Every Day -- Code versioning -- Graph structure -- Local VCSs -- Centralized VCSs -- Distributed VCSs -- Branching strategies -- Best practices -- Code formatting and style -- Indentation -- Braces and whitespaces -- Line length and wrapping -- Comments and documentation -- Naming conventions -- Automated tools -- Code reviews -- Email pass-arounds -- Code review automation tools -- In-person (or remote) teamwork reviews -- Pair programming -- Advantages -- Disadvantages -- Styles of pair programming -- Time management -- Documentation -- Requirements -- Architecture documentation -- Technical documentation -- Good practices for documentation -- A hard dose of reality -- The importance of knowing what you're doing -- Summary -- Further reading -- Chapter 9: Beyond Code - Mastering Software Architecture -- What is an architecture? …”
Libro electrónico -
5512por Cox, KerryTabla de Contenidos: “…Initial configuration of the snort.conf file; 4. Know Your Enemy; 4.1.2. Professionals; 4.1.3. Disgruntled Current and Former Employees and Contractors; 4.1.4. …”
Publicado 2004
Libro electrónico -
5513Publicado 2017Tabla de Contenidos: “…-- Introduction to web components -- HTML templates -- HTML imports -- Building the Weather Widget -- Working of the Weather Widget -- Retrieving the geolocation -- Creating the weather custom element -- Testing the custom element -- Attaching a shadow DOM -- Working with the custom element -- Adding dependency modules -- Retrieving and displaying weather information -- Adding the current time to the widget -- Responding to changes in element attributes -- Using setters and getters -- Fixing browser compatibility -- Essential things to know -- Summary -- Chapter 6: Building a Blog with React -- Why use a framework? …”
Libro electrónico -
5514Publicado 2017Tabla de Contenidos: “…-- Half-Day Workshop: Trainer Turned Facilitator -- One-Day Workshop: Getting to Success -- Two-Day Workshop: Behind the Curtain -- What Do I Need to Know About Training? -- How Much Time Will Preparation Take? …”
Libro electrónico -
5515Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Preface -- Chapter 1: Hacking Yourself -- How to get the most out of this book -- General interview advice -- Common interview questions -- Some additional tips for your interview -- A definition of cybersecurity -- The HACK method -- How -- Analyze -- Collect -- Know -- Personal branding and soft skills -- Personal branding -- Soft skills -- Negotiation 101 -- Managing stress -- Summary -- Chapter 2: Cybersecurity Engineer -- What is a Cybersecurity Engineer? …”
Libro electrónico -
5516Publicado 2024Tabla de Contenidos: “…Chapter 9 Commitment #9: Recognize Contributions -- Expect the Best -- Show Them You Believe -- Be Clear about the Goals and the Rules -- Provide and Seek Feedback -- Personalize Recognition -- Get to Know People -- Be Creative about Incentives -- Just Say "Thank You" -- Reflect and Act: Recognize Contributions -- Reflect -- Act -- Chapter 10 Commitment #10: Celebrate the Values and Victories -- Create a Spirit of Community -- Celebrate Accomplishments in Public -- Provide Social Support -- Have Fun Together -- Be Personally Involved -- Show You Care -- Spread the Stories -- Make Celebrations Part of Organizational Life -- Reflect and Act: Celebrate the Values and Victories -- Reflect -- Act -- Epilogue: Continue Your Leadership Development -- Your Leadership Makes a Difference -- You Are the Most Important Leader in the Room -- Leadership Is Learned -- Learning Starts by Looking Inside -- Three Ways to Learn to Lead -- Leadership and Hubris: No Guarantees -- Leadership Is in the Moment -- Reflect and Act: Continue Your Leadership Development -- Reflect -- Act -- Appendix: How You Behave Matters -- Making Sense of Your Student LPI Feedback -- The Five Practices Make a Difference -- You Make a Difference -- Notes -- Acknowledgments -- About the Authors -- Index -- EULA…”
Libro electrónico -
5517por Getz, KenTabla de Contenidos: “…; How Do I Place Code in a Form or Report&s Module?; How Do I Know What to Do with Code Examples?; How Do I Use Data Access Objects (DAO) in New Databases?…”
Publicado 2004
Libro electrónico -
5518por Pugh, David G. 1944-Tabla de Contenidos: “…-- Challenges for Readers -- Chapter 3: Getting Your Message Across: Technical Proposals for Every Reader -- The Competitive Advantage: Reader-Friendly Proposals That Sell -- Compete by Communicating -- Know Your Audience -- Overcome Differences -- Designing the Proposal -- Two Messages, One Proposal -- Double-Exposure Techniques -- Challenges for Readers -- Chapter 4: Selling the Benefits: Customer-Oriented Proposals -- Why Steak Without Sizzle Is Not Enough -- Customer-Oriented Proposals -- Who Are the Buyers? …”
Publicado 2005
Libro electrónico -
5519por Oakley, AndyTabla de Contenidos: “…Introducing MSH; 1.2. Get to Know Verb-Noun Syntax and Cmdlets; 1.2.2. What Just Happened?…”
Publicado 2006
Libro electrónico -
5520por Litovski, IvanTabla de Contenidos: “…3.2.7 Views: Virtual Tables3.2.8 The System Catalog; 3.3 The Integrity Component; 3.3.1 Primary Keys; 3.3.2 Foreign Keys; 3.3.3 Constraints; 3.3.4 Null Values; 3.4 Normalization; 3.4.1 Normal Forms; 3.4.2 First Normal Form; 3.4.3 Functional Dependencies; 3.4.4 Second Normal Form; 3.4.5 Third Normal Form; 3.5 The Manipulative Component; 3.5.1 Relational Algebra and Calculus; 3.5.2 The Relational Query Language; 3.5.3 The Advent of SQL; 3.6 The Meaning of Relational; 3.7 Summary; 4 Everything You Ever Wanted to Know about SQL but Were Afraid to Ask; 4.1 The Relational Model…”
Publicado 2010
Libro electrónico