Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 6,016
- Engineering & Applied Sciences 2,191
- Development 2,038
- Application software 1,621
- Database management 1,556
- Computer Science 1,474
- Computer networks 1,467
- Information technology 1,313
- Business & Economics 1,220
- Leadership 1,198
- Cloud computing 1,134
- Data processing 1,091
- Computer programs 1,003
- Industrial management 976
- Security measures 972
- Business 898
- Computer security 839
- Examinations 831
- Operating systems (Computers) 790
- Computer software 788
- Project management 784
- Direcció i administració 773
- Marketing 737
- Personnel management 725
- Technological innovations 723
- Empreses 706
- Finance 700
- Electrical & Computer Engineering 646
- Certification 637
- Economics, finance, business & management 636
-
60681Publicado 2013“…Not only this, but in this cost-conscious environment of today, the costs of managing this growth are likely to be eating into the IT budget. …”
Libro electrónico -
60682Publicado 2014“…By the end of the video, you'll know how to set up FileVault 2 for your own use, build and deploy an institutional recovery key, and use the most commonly-used functions of Apple's fdesetup command line management tool. Rich Trouton has been a Macintosh system and server administrator for over fifteen years and has supported Macs in a number of different environments, including university, government, medical research and advertising. …”
-
60683por McCue, Claudia“…This book is considered the complete resource for understanding the print cycle, how ink works on paper, managing fonts, using color spaces, handling images, and preparing files for print or electronic output. …”
Publicado 2014
Libro electrónico -
60684Publicado 2013“…Organizations of all sizes are faced with the challenge of managing massive volumes of increasingly valuable data. …”
Libro electrónico -
60685Publicado 2012“…This deployment model offers clients a planned foundation for dynamic cloud infrastructure, provisioning, large-scale parallel HPC application development, cluster management, and grid applications. This IBM publication is targeted to IT specialists, IT architects, support personnel, and clients. …”
Libro electrónico -
60686Publicado 2013“…The objective is to solve customer's challenges and maximize systems' throughput, performance, and management. This publication examines the tools, utilities, documentation, and other resources available to help the IBM technical teams provide solutions and support for IBM HPC solutions in an IBM hardware environment. …”
Libro electrónico -
60687Publicado 2005“…Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. …”
Libro electrónico -
60688SQL Server query tuning and optimization optimize Microsoft SQL Server 2022 queries and applicationsPublicado 2022“…SQL Server is a relational database management system developed by Microsoft. As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications. …”
Libro electrónico -
60689Publicado 2022“…Perfect for marketing strategists, brand managers, and chief marketing officers, Get in the Game will also earn a place in the libraries of executives seeking to connect with the misunderstood yet largest segment in consumer entertainment…”
Grabación no musical -
60690por Marschlich, Sarah“…Using a multi-method research design, the author shows how corporate diplomacy is used in the host country, what role local media coverage and relationship management fulfill, and what effects corporate diplomacy has on corporate legitimacy in the host country community, i.e., UAE residents. …”
Publicado 2022
Libro electrónico -
60691Publicado 2021“…The book looks at the conditions for, significance of, and dilemmas in the control room's work, and further explores categorization practices, information processing, goal management, the relationship between the control room and the patrols, professionalization, and emergency preparedness work.The book’s analysis has implications not only for control rooms, but also for our understanding of the operational police work as a whole and for the conditions and significance of this work…”
Libro electrónico -
60692Publicado 2021“…So far, platform work has been an important laboratory for capital. Management techniques, like the use of algorithms, are being tested with a view to exporting across the global economy and it is argued that automation is undermining workers' agency. …”
Libro electrónico -
60693Publicado 2020“…Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection.The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. …”
Libro electrónico -
60694Publicado 2022“…Once your database is provisioned, you can use Oracle's cloud tools to design and manage database objects. This video shows you how to design your database using Oracle's graphical cloud database modeler. …”
Video -
60695Publicado 2018“…Product managers, developers, and top executives all face a common dilemma when deciding whether or not to move forward with a new product: how do we know if the marketplace wants it? …”
Video -
60696Publicado 2022“…Conversation Transformation gives you practical guidelines for managing the six most common (and aggravating) conversation killers: yes-buts, mind-reads, negative predictions, leading questions, complaining, and verbal attacks. …”
Grabación no musical -
60697Publicado 2022“…Asynchronous code helps you manage everything seamlessly while making sure that the data you are waiting for is used in your code ONLY after it has been completely fetched. …”
Video -
60698Publicado 2022“…From there, you'll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security. By the end of this book, you'll be armed with the skills necessary to effectively secure your small network with whatever resources you have available…”
Libro electrónico -
60699por Iglberger, Klaus“…C++ trainer and consultant Klaus Iglberger explains how you can manage dependencies and abstractions, improve changeability and extensibility of software entities, and apply and implement modern design patterns to help you take advantage of today's possibilities. …”
Publicado 2022
Libro electrónico -
60700Publicado 2019“…In Great Mondays, brand strategist Josh Levine introduces a proven formula for building and managing a workplace culture that maximizes employee engagement, performance, and retention for long-term business success. …”
Grabación no musical