Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 669
- Development 666
- Management 647
- Application software 594
- Computer Science 452
- Computer networks 403
- Leadership 365
- Computer programs 360
- Photography 332
- Design 325
- Examinations 312
- Business & Economics 308
- Security measures 288
- Data processing 282
- Digital techniques 280
- Operating systems (Computers) 276
- Computer security 274
- Computer programming 268
- Web site development 265
- Web sites 265
- Programming 262
- Certification 258
- Computer software 242
- Database management 227
- Python (Computer program language) 213
- Electronic data processing personnel 208
- Java (Computer program language) 204
- Cloud computing 196
- Success in business 194
- Computer graphics 182
-
5761Publicado 2018“…In Detail AWS EC2 is the fundamental core component that every AWS professional should know about. Most people just know the basics of EC2. …”
-
5762Publicado 2017Tabla de Contenidos: “…-- Calculating the Income Replacement Rates -- Historic Cost of Retirement: PRICE Is a Moving Target -- A Focus on Income, Not Cost -- PRICE-Aware: Applying PRICE to Consider DC Assets and Target-Date Strategies -- Evaluating Glide Paths -- Tracking DC Account Balance Growth Relative to PRICE -- Summary: The Importance of Knowing Your PRICE -- In Closing -- Questions for Plan Fiduciaries -- Note -- Chapter 3 Plan Investment Structure -- Tiers and Blends: Investment Choices for DC Participants…”
Libro electrónico -
5763Publicado 2018Tabla de Contenidos: “…-- Summary -- Chapter 2: Knowing Your Library -- Working with numbers -- The binary notation -- The octal notation -- The Number.isInteger(number) method -- The Number.isNaN(value) method -- isNaN versus Number.isNaN -- The Number.isFinite(number) method…”
Libro electrónico -
5764Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Advanced Infrastructure Penetration Testing -- Information security overview -- Confidentiality -- Integrity -- Availability -- Least privilege and need to know -- Defense in depth -- Risk analysis -- Information Assurance -- Information security management program -- Hacking concepts and phases -- Types of hackers -- Hacking phases -- Reconnaissance -- Passive reconnaissance -- Active reconnaissance -- Scanning -- Port scanning -- Network scanning -- Vulnerability scanning -- Gaining access -- Maintaining access -- Clearing tracks -- Penetration testing overview -- Penetration testing types -- White box pentesting -- Black box pentesting -- Gray box pentesting -- The penetration testing teams -- Red teaming -- Blue teaming -- Purple teaming -- Pentesting standards and guidance -- Policies -- Standards -- Procedures -- Guidance -- Open Source Security Testing Methodology Manual -- Information Systems Security Assessment Framework -- Penetration Testing Execution Standard -- Payment Card Industry Data Security Standard -- Penetration testing steps -- Pre-engagement -- The objectives and scope -- A get out of jail free card -- Emergency contact information -- Payment information -- Non-disclosure agreement -- Intelligence gathering -- Public intelligence -- Social engineering attacks -- Physical analysis -- Information system and network analysis -- Human intelligence -- Signal intelligence -- Open source intelligence -- Imagery intelligence -- Geospatial intelligence -- Threat modeling -- Business asset analysis -- Business process analysis -- Threat agents analysis -- Threat capability analysis -- Motivation modeling -- Vulnerability analysis -- Vulnerability assessment with Nexpose -- Installing Nexpose…”
Libro electrónico -
5765Publicado 2018Tabla de Contenidos: “…. -- Chapter 3: Server-Side Exploitation -- Introduction -- Getting to know MSFconsole -- MSFconsole commands -- Exploiting a Linux server -- Getting ready -- How to do it... -- How it works... -- What about the payload? …”
Libro electrónico -
5766Publicado 2018Tabla de Contenidos: “…-- Performance properties -- Performance testing - best practices -- Knowing your code and hot spots -- Profilers -- Instrumentation profilers -- Sampling profilers -- Summary -- Chapter 4: Data Structures -- Properties of computer memory -- STL containers -- Sequence containers -- Vector and array -- Deque -- List and forward_list -- The basic_string -- Associative containers -- Ordered sets and maps -- Unordered sets and maps -- Hash and equals -- Hash policy -- Container adaptors -- Priority queues -- Parallel arrays -- Summary -- Chapter 5: A Deeper Look at Iterators -- The iterator concept -- Iterator categories -- Pointer-mimicking syntax -- Iterators as generators -- Iterator traits -- Implementing a function using iterator categories…”
Libro electrónico -
5767Publicado 2018Tabla de Contenidos: “…The and (num1, num2) function -- The or (num1, num2) function -- The xor (num1, num2) function -- The lshift (val, count) function -- The rshift (val, count) function -- The compl (num) function -- User-defined functions -- Function definition and syntax -- Calling user-defined functions -- Controlling variable scope -- Return statement -- Making indirect function calls -- Summary -- Chapter 9: GNU's Implementation of AWK - GAWK (GNU AWK) -- Things you don't know about GAWK -- Reading non-decimal input -- GAWK's built-in command line debugger -- What is debugging? …”
Libro electrónico -
5768Publicado 2018Tabla de Contenidos: “…Private subnet -- Bastion subnet -- Bastion host -- Security groups -- Infrastructure as Code -- Setting up CloudFormation -- Centralized logging -- Setting up CloudWatch -- Summary -- Chapter 8: Designing a Big Data Application -- Introducing big data applications -- AWS components used in big data applications -- Analyzing streaming data with Amazon Kinesis -- Best practices for serverless big data applications -- Best practices for using Amazon EMR -- Understanding common EMR use cases -- Lowering EMR costs -- Using Amazon EC2 Spot and Auto Scaling -- Best practices for distributed machine learning and predictive analytics -- Using Amazon SageMaker for machine learning -- Understanding Amazon SageMaker algorithms and features -- Security overview for big data applications -- Securing the EMR cluster -- Encryption -- Authentication -- Authorization -- Securing serverless applications -- Understanding serverless application authentication and authorization -- Configuring and using EMR-Spark clusters -- Summary -- Chapter 9: Implementing a Big Data Application -- Setting up an Amazon Kinesis Stream -- Creating an AWS Lambda function -- Using Amazon Kinesis Firehose -- Using AWS Glue and Amazon Athena -- Using Amazon SageMaker -- Summary -- Chapter 10: Deploying a Big Data System -- Using CloudFormation templates -- Creating a data lake using a CloudFormation template -- Authoring and deploying serverless applications -- Understanding AWS SAM -- Understanding the SAM template -- Introducing SAM Local -- Developing serverless applications using AWS Cloud9 -- Automating serverless application deployments -- Using AWS Serverless Application Repository -- Summary -- Other Books You May Enjoy -- Leave a review - let other readers know what you think -- Index…”
Libro electrónico -
5769Publicado 2021Tabla de Contenidos: “…A simplified explanation of the Android lifecycle -- Lifecycle phases - what we need to know -- Lifecycle phases - what we need to do -- Using the activity lifecycle to start and stop the thread -- Coding the run method -- Running the game -- Summary -- Chapter 10: Coding the Bat and Ball -- The Ball class -- Communicating with the game engine -- Representing rectangles and squares with RectF -- Coding the variables -- Coding the Ball constructor -- Coding the RectF getter method -- Coding the Ball update method -- Coding the Ball helper methods -- Coding a realistic-ish bounce -- Using the Ball class -- The Bat class -- Coding the Bat variables -- Coding the Bat constructor -- Coding the Bat helper methods -- Coding the Bat's update method -- Using the Bat class -- Coding the Bat input handling -- Running the game -- Summary -- Chapter 11: Collisions, Sound Effects, and Supporting Different Versions of Android -- Handling collisions -- Collision detection options -- Optimizing the detection methods -- Best options for Pong -- The RectF intersects method -- Handling different versions of Android -- Detecting the current Android version -- The SoundPool class -- Initializing SoundPool the new way -- Generating sound effects -- Adding sound to the Pong game -- Adding the sound variables -- Initializing the SoundPool -- Coding the collision detection and playing sounds -- The bat and the ball -- The four walls -- Playing the game -- Summary -- Chapter 12: Handling Lots of Data with Arrays -- Planning the project -- Starting the project -- Refactoring MainActivity to BulletHellActivity -- Locking the game to full-screen and landscape orientation -- Amending the code to use the full screen and the best Android class -- Creating the classes -- Reusing the Pong engine -- Coding the BulletHellActivity class -- Coding the BulletHellGame class…”
Libro electrónico -
5770Publicado 2022Tabla de Contenidos: “…-- Declaring Modules -- Declaring Module Dependence -- An Example of Module Dependence -- Troubleshooting -- Empty Package Error -- Module Not Found Error -- Package Does Not Exist Error -- Module Resolution Exception -- Implicit Dependence -- Optional Dependence -- Opening Modules and Packages -- Open Modules -- Opening Packages -- Splitting Packages Across Modules -- Restrictions in Module Declarations -- Types of Modules -- Normal Modules -- Open Modules -- Automatic Modules -- Unnamed Modules -- Aggregator Modules -- Knowing About Modules at Runtime -- Migration Path to Modules…”
Libro electrónico -
5771Android smartphones for seniorsAndroid Smartphones For Seniors For DummiesPublicado 2022Tabla de Contenidos: “…Place Owner Information On the Lock Screen -- Add Emergency Info -- Designating Emergency or ICE contacts -- Providing medical information -- Chapter 5 Personalizing Your Handset -- Hardware Buttons and What They Do -- Power buttons -- Volume buttons -- Find and Sort Your Apps -- Move App Shortcuts to the Home Screen -- Group Apps into Folders -- Deal with Preinstalled Applications (or Bloatware) -- Get the News (and Other Media) You Can Use -- Customize the Home Screen with Widgets -- Chapter 6 Android Typing Tricks with Google's Gboard -- Make the Keyboard Decision -- Selecting a keyboard to use -- Noting keyboard features -- Exploring keyboards you have (or can have) -- Check Out Keyboard Contenders -- Gboard, the official Google keyboard -- Samsung Keyboard -- Microsoft SwiftKey keyboard -- Speak Words with Voice Typing -- Spell-Check as You Type -- Extended Keyboard and Special Characters -- Learn the Emoji Language -- Delete, Copy, and Paste Text -- Print Messages, Documents, and Web Pages -- Chapter 7 Handling Notifications and Google Assistant -- Meet the Android Notifications Window Shade -- Recognizing notification types and settings -- Disabling notifications (or not) -- Controlling notifications via settings -- Having fun with notifications, or not -- Taming Google Discover news feed -- Manage Your Phone with the Window Shade Quick Settings -- The first-up Quick Settings -- The full cast of Quick Settings -- Get the 411 from Google Assistant -- Knowing what you can do with Google Assistant -- Installing or deactivating Google Assistant -- Part 3 Let's Start Communicating -- Chapter 8 Chatting via Voice or Video -- Make a Voice Call -- Making international calls from your phone -- Calling internationally with no contract -- Check Voicemail -- Get Voicemail Transcriptions -- Reply to an Incoming Call by Sending a Text -- Set a New Ringtone…”
Libro electrónico -
5772Publicado 2022Tabla de Contenidos: “…Risk Assessment and Management -- A. Know Where You're Vulnerable -- B. Identify the Threats You Face, Both Internally and Externally -- C. …”
Libro electrónico -
5773Publicado 2022Tabla de Contenidos: “…Using the Calibration panel -- Working with Filmstrips -- Working with Profiles -- Looking at the Adobe Camera Raw profiles -- Managing profiles -- Creating a Favorites list -- Opening Non-Raw Images in the Camera Raw Editor -- Changing Image Defaults -- Working with XML Files and Preferences -- Changing program defaults -- Using Save Options -- Using sidecar files -- Chapter 8 Making and Modifying Selections -- Defining Selections -- Creating Rectangular and Elliptical Selections -- Perfecting squares and circles with Shift and Alt (Option on the Mac) -- Applying Marquee options -- Making Freeform Selections with the Lasso Tools -- Selecting with the Lasso tool -- Getting straight with the Polygonal Lasso tool -- Snapping with the Magnetic Lasso tool -- Working Wizardry with the Magic Wand -- Talking about Tolerance -- Wielding the Wand to select -- Modifying Your Selections -- Adding to, subtracting from, and intersecting a selection -- Avoiding key collisions -- Painting with the Selection Brush -- Painting with the Quick Selection Tool -- Selecting with the Auto Selection Tool -- Selecting Your Subject -- Fine-Tuning with the Refine Selection Brush -- Working with the Cookie Cutter Tool -- Eliminating with the Eraser Tools -- The Eraser tool -- The Background Eraser tool -- The Magic Eraser tool -- Using the Select Menu -- Selecting all or nothing -- Reselecting a selection -- Inversing a selection -- Feathering a selection -- Refining the edges of a selection -- Using the Modify commands -- Applying the Grow and Similar commands -- Saving and loading selections -- Chapter 9 Working with Layers -- Getting to Know Layers -- Converting a background to a layer -- Anatomy of the Layers panel -- Using the Layer and Select menus -- Working with Different Layer Types -- Image layers -- Adjustment layers -- Fill layers -- Shape layers -- Type layers…”
Libro electrónico -
5774Publicado 2022Tabla de Contenidos: “…Book 1 Common Office Tasks -- Chapter 1 Office Nuts and Bolts -- Introducing Office 365 -- Office 365 applications -- Office 365 cloud services -- Finding out what software and Office version you have -- Managing your Microsoft account -- Finding Your Way Around the Office Interface -- The File tab and Backstage -- The Quick Access toolbar -- The Ribbon and its tabs -- Context-sensitive tabs -- The anatomy of a tab -- Mini-toolbars and shortcut menus -- Office 365 for keyboard lovers -- Saving Your Files -- Saving a file -- Saving a file for the first time -- Saving AutoRecovery information -- Navigating the Save As and Open Windows -- Opening and Closing Files -- Reading and Recording File Properties -- Locking a File with a Password -- Password-protecting a file -- Removing a password from a file -- Trusting (or not Trusting) Microsoft with Your "Content" -- Chapter 2 Wrestling with the Text -- Manipulating the Text -- Selecting text -- Moving and copying text -- Taking advantage of the Clipboard task pane -- Deleting text -- Speaking, not Typing, the Words -- Changing the Look of Text -- Choosing fonts for text -- Changing the font size of text -- Applying font styles to text -- Applying text effects to text -- Underlining text -- Changing the color of text -- Quick Ways to Handle Case, or Capitalization -- Entering Symbols and Foreign Characters -- Creating Hyperlinks -- Linking a hyperlink to a web page -- Creating a hyperlink to another place in your file -- Creating an email hyperlink -- Repairing and removing hyperlinks -- Chapter 3 Speed Techniques Worth Knowing About -- Undoing and Repeating Commands -- Undoing a mistake…”
Libro electrónico -
5775Publicado 2017Tabla de Contenidos: “…. -- Collecting data changes from the server log -- Collecting changes using triggers -- Collecting changes using triggers and saving them in another database -- Always knowing which user is logged in -- Getting ready -- How to do it... -- How it works... -- There's more... -- Not inheriting user attributes -- Integrating with LDAP -- Getting ready -- How to do it... -- How it works... -- There's more... -- Setting up the client to use LDAP -- Replacement for the User Name Map feature -- See also -- Connecting using SSL -- Getting ready -- How to do it... -- How it works... -- There's more... -- Getting the SSL key and certificate -- Setting up a client to use SSL -- Checking server authenticity -- Using SSL certificates to authenticate -- Getting ready -- How to do it…”
Libro electrónico -
5776Publicado 2018Tabla de Contenidos: “…-- How smart contracts work -- Examples of smart contracts -- Code example of a smart contract -- Summary -- Chapter 6: Understanding the Blockchain Data Flow -- Overview of the blockchain flow -- Basic flow of a transaction -- Architecture layers -- Architectural thoughts and considerations -- Submitting transactions -- Knowing the data structure -- Broadcasting and verifying data -- Combining TXs in a block structure -- Validating and verifying a block -- Summary -- Chapter 7: Public Versus Permissioned Blockchains and their Providers -- What types of blockchain currently exist? …”
Libro electrónico -
5777Publicado 2019Tabla de Contenidos: “…Backing up photos and files (Windows) -- Switching to a Different View -- Viewing Photos in Memories (Slideshow) -- Searching for Photos -- Using Search -- Searching for untagged items -- Searching captions and notes -- Searching by history -- Searching metadata -- Searching similarities -- Grouping Files That Get in the Way -- Marking files as hidden -- Stackin' 'em up -- Creating versions -- Part 3 Selecting and Correcting Photos -- Chapter 8 Making and Modifying Selections -- Defining Selections -- Creating Rectangular and Elliptical Selections -- Perfecting squares and circles with Shift and Alt (Option on the Mac) -- Applying Marquee options -- Making Freeform Selections with the Lasso Tools -- Selecting with the Lasso tool -- Getting straight with the Polygonal Lasso tool -- Snapping with the Magnetic Lasso tool -- Working Wizardry with the Magic Wand -- Talking about Tolerance -- Wielding the Wand to select -- Modifying Your Selections -- Adding to, subtracting from, and intersecting a selection -- Avoiding key collisions -- Painting with the Selection Brush -- Painting with the Quick Selection Tool -- Selecting with the Auto Selection Tool -- Fine-Tuning with the Refine Selection Brush -- Working with the Cookie Cutter Tool -- Eliminating with the Eraser Tools -- The Eraser tool -- The Background Eraser tool -- The Magic Eraser tool -- Using the Select Menu -- Selecting all or nothing -- Reselecting a selection -- Inversing a selection -- Feathering a selection -- Refining the edges of a selection -- Using the Modify commands -- Applying the Grow and Similar commands -- Saving and loading selections -- Chapter 9 Working with Layers -- Getting to Know Layers -- Converting a background to a layer -- Anatomy of the Layers panel -- Using the Layer and Select menus -- Working with Different Layer Types -- Image layers -- Adjustment layers…”
Libro electrónico -
5778por Hochstein, LorinTabla de Contenidos: “…-- Easy-to-Read Syntax -- Nothing to Install on the Remote Hosts -- Push-Based -- Ansible Scales Down -- Built-in Modules -- Very Thin Layer of Abstraction -- Is Ansible Too Simple? -- What Do I Need to Know? -- What Isn't Covered -- Installing Ansible -- Setting Up a Server for Testing -- Using Vagrant to Set Up a Test Server -- Telling Ansible About Your Test Server -- Simplifying with the ansible.cfg File -- Moving Forward -- Chapter 2. …”
Publicado 2015
Libro electrónico -
5779Publicado 2015Tabla de Contenidos: “…-- Programmers Don't Need to Know Much Math -- Programming Is a Creative Activity -- About This Book -- Downloading and Installing Python -- Starting IDLE -- The Interactive Shell -- How to Find Help -- Asking Smart Programming Questions -- Summary -- I. …”
Libro electrónico -
5780Publicado 2023Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This All-in-One -- Book 1: Introducing R -- Book 2: Describing Data -- Book 3: Analyzing Data -- Book 4: Learning from Data -- Book 5: Harnessing R: Some Projects to Keep You Busy -- What You Can Safely Skip -- Foolish Assumptions -- Icons Used in This Book -- Beyond This Book -- Where to Go from Here -- 1 Introducing R -- Chapter 1 R: What It Does and How It Does It -- The Statistical (and Related) Ideas You Just Have to Know -- Samples and populations -- Variables: Dependent and independent -- Types of data -- A little probability -- Inferential statistics: Testing hypotheses -- Null and alternative hypotheses -- Two types of error -- Getting R -- Getting RStudio -- A Session with R -- The working directory -- Getting started -- R Functions -- User-Defined Functions -- Comments -- R Structures -- Vectors -- Numerical vectors -- Matrices -- Lists -- Data frames -- for Loops and if Statements -- Chapter 2 Working with Packages, Importing, and Exporting -- Installing Packages -- Examining Data -- Heads and tails -- Missing data -- Subsets -- R Formulas -- More Packages -- Exploring the tidyverse -- Importing and Exporting -- Spreadsheets -- CSV files -- Text files -- 2 Describing Data -- Chapter 1 Getting Graphic -- Finding Patterns -- Graphing a distribution -- Bar-hopping -- Slicing the pie -- The plot of scatter -- Of boxes and whiskers -- Doing the Basics: Base R Graphics, That Is -- Histograms -- Graph features -- Bar plots -- Pie graphs -- Dot charts -- Bar plots revisited -- Scatter plots -- A plot twist -- Scatter plot matrix -- Box plots -- Kicking It Up a Notch to ggplot2 -- Histograms -- Bar plots -- Dot charts -- Bar plots re-revisited -- Scatter plots -- About that plot twist . . . -- Scatter plot matrix -- Box plots -- Putting a Bow On It…”
Libro electrónico