Mostrando 13,161 - 13,180 Resultados de 14,051 Para Buscar '"Knowing"', tiempo de consulta: 0.09s Limitar resultados
  1. 13161
    por Honthaner, Eve Light, 1950-
    Publicado 2005
    “…This book will allow you to proceed with your eyes wide open, knowing exactly what to expect. Hollywood Drive explores the realities of the industry: various career options, effective job search strategies, how to write an effective cover letter and resume, what to expect on your first job, the significance of networking and building solid industry relationships, how a project is sold, and how a reel production office and set operate. …”
    Libro
  2. 13162
    Publicado 2019
    “…This Shadow War is already the greatest threat to America's national security, even though most Americans know little or nothing about it. With on-the-ground reporting from Ukraine to the South China Sea, from a sub under the Arctic to unprecedented access to America's Space Command, Sciutto draws on his deep knowledge, high-level contacts, and personal experience as a journalist and diplomat to paint the most comprehensive and vivid picture of a nation targeted by a new and disturbing brand of warfare. …”
    Libro
  3. 13163
    Publicado 2022
    “…When you discover that data is missing---whether due to a disk error, theft, or a simple mistake---you need to know the exact steps needed to recover it and get back to work as soon as possible…”
    Libro electrónico
  4. 13164
    Publicado 2021
    “…In many fair allocation settings, it is unlikely that every agent knows all other agents. For example, consider a scenario where the agents represent employees of a large corporation. …”
    Libro electrónico
  5. 13165
    “…Expected that with this study, once analyzed the aim main, it is given to know the importance of nursing and forget some myths that still remain today on this profession…”
    Electrónico
  6. 13166
    “…The secondary aim was to know the adverse effects of both interventions. The search of the literature was carried out from February to September 2017. …”
    Electrónico
  7. 13167
    Publicado 2017
    “…Learning a concept isn't always enough to do the job effectively. 'Knowing' is different from 'applying' yet few practical resources exist for new and aspiring fraud examiners —until now. …”
    Libro electrónico
  8. 13168
    Publicado 2014
    “…A new frontier emerges in the field “pharmacology of gap junctions” with the aim to control growth, differentiation, or electrical coupling via targeting gap junction channels pharmacologically.As we know today disturbances in gap junction synthesis, assembly and cellular distribution may account for various organic disorders from most different medical fields, such as the Charcot-Marie-Tooth neuropathy, epilepsy, Chagas-disease, Naxos-syndrome, congenital cardiac malformations, arrhythmias, cancer and as a very common disease in industrial countries atherosclerosis. …”
    Libro electrónico
  9. 13169
    Publicado 2014
    “…Inhibition of either tau phosphorylation or aggregation has been investigated for the prevention of tauopathies, however, it will make an irrelevant result if we don’t know an exact target of neurotoxicity. It is a time to have a consensus of definition, terminology and methodology for the identification of “tau oligomers”…”
    Libro electrónico
  10. 13170
    por Guy, Jean-Michel
    Publicado 2014
    “…Nevertheless, the existence of several very widely-shared transnational references demonstrates that interculturality, which presupposes a know- ledge of other peoples, is not...…”
    Electrónico
  11. 13171
    por Funk, Tom. author
    Publicado 2013
    “…Advanced Social Media Marketing: How to Lead, Launch, and Manage a Successful Social Media Program is for the manager who already knows something about social media and wants to roll up his or her sleeves and get down to business. …”
    Libro electrónico
  12. 13172
    Publicado 2017
    “…Apply key pattern-oriented software architecture techniques to develop reusable concurrent software using Java object-oriented design and functional programming language features and class libraries. Know where to find additional sources of information on how to successfully apply pattern-oriented software architecture techniques to concurrent software in Java. …”
    Video
  13. 13173
    Publicado 2018
    “…Discover how to make the best use of decorator and generator functions Enhance speed and improve concurrency by conjuring tricks from the PyPy project Who This Book Is For Whether you've been working with Python for a few years or you're a seasoned programmer, you'll have a lot of new tricks to walk away with. What You Will Learn Know the differences between .py and .pyc files Explore the different ways to install and upgrade Python packages Understand the working of the PyPI module that enhances built-in decorators See how coroutines are different from generators and how they can simulate multithreading Grasp how the decimal module improves floating point numbers and their operations Standardize sub interpreters to improve concurrency Discover Python's built-in docstring analyzer In Detail This book covers the unexplored secrets of Python, delve into its depths, and uncover its mysteries. …”
    Libro electrónico
  14. 13174
    Publicado 2016
    “…Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today’s most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you’re attacked · Learn how cyberterrorism and information warfare are evolving…”
    Libro electrónico
  15. 13175
    Publicado 2018
    “…By the end of the book, you will have a deep understanding of WPF and will know how to build resilient applications. Style and approach This book takes a recipe-based approach to teaching you how to create fault-tolerant WPF applications…”
    Libro electrónico
  16. 13176
    Publicado 2019
    “…What you will learn Use existing data to interact with the canvas via zoom/pan/selection Create vector data and a GeoPackage and build a simple project around it Style data, both vector and raster data, using the Layer Styling Panel Design, label, save, and export maps using the data you have created Analyze spatial queries using the Processing toolbox Expand QGIS with the help of plugins, model builder, and the command line Who this book is for If you know the basic functions and processes of GIS, and want to learn to use QGIS to analyze geospatial data and create rich mapping applications, then this is the book for you…”
    Libro electrónico
  17. 13177
    Publicado 2021
    “…With real-life examples and hands-on development steps, you will be more confident in working with Kubernetes. You will: Know the Kubernetes extension patterns and available extension points Be familiar with the philosophy behind Kubernetes extensions and how they should be integrated into the clusters Design Kubernetes extensions and make Kubernetes work for you Develop, deploy, and operate plugins for Kubernetes ranging from the CLI tool to custom resources, schedulers, infrastructure, and more Study real-life use cases for extending Kubernetes with code examples…”
    Libro electrónico
  18. 13178
    Publicado 2018
    “…Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer Understand the realities of cybercrime and today’s attacks Build a digital forensics lab to test tools and methods, and gain expertise Take the right actions as soon as you discover a breach Determine the full scope of an investigation and the role you’ll play Properly collect, document, and preserve evidence and data Collect and analyze data from PCs, Macs, IoT devices, and other endpoints Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence Analyze iOS and Android devices, and understand encryption-related obstacles to investigation Investigate and trace email, and identify fraud or abuse Use social media to investigate individuals or online identities Gather, extract, and analyze breach data with Cisco tools and techniques Walk through common breaches and responses from start to finish Choose the right tool for each task, and explore alternatives that might also be helpful The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. …”
    Libro electrónico
  19. 13179
    Publicado 2018
    “…Applied Data Science with Python and Jupyter is a step-by-step guide ideal for beginners who know a little Python and are looking for a quick, fast-paced introduction to these concepts. …”
    Libro electrónico
  20. 13180
    Publicado 2019
    “…You will be taught how to navigate through a website, using a breadth-first and then a depth-first search, as well as find and follow links. You will get to know about the ways to track history in order to avoid loops and to protect your web scraper using proxies. …”
    Libro electrónico