Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 6,016
- Engineering & Applied Sciences 2,191
- Development 2,038
- Application software 1,621
- Database management 1,556
- Computer Science 1,474
- Computer networks 1,467
- Information technology 1,313
- Business & Economics 1,220
- Leadership 1,198
- Cloud computing 1,134
- Data processing 1,091
- Computer programs 1,003
- Industrial management 976
- Security measures 972
- Business 898
- Computer security 839
- Examinations 831
- Operating systems (Computers) 790
- Computer software 788
- Project management 784
- Direcció i administració 773
- Marketing 737
- Personnel management 725
- Technological innovations 723
- Empreses 706
- Finance 700
- Electrical & Computer Engineering 646
- Certification 637
- Economics, finance, business & management 636
-
65341Publicado 2014“…Includes up-to-date coverage of Apple's iPad hardware and iOS software Covers managing classroom workflow challenges, including how to distribute, share, collaborate, and collect digital documents Written by one of the foremost authorities on iPad deployments in schools Provides clear information on what decisions you need to make to deploy and use the iPad effectively in the classroom If you're a school administrator, teacher, or educational IT specialist who is considering deploying the iPad in the classroom, this handy guide has everything to set you up for success…”
Libro electrónico -
65342Publicado 2017“…Compare and contrast networking models including OSI and TCP/IP Master subnetting in IPv4 u Understand important details of IPv6 Configure Layer 2 switches, including VLANs, trunks, STP, and Port Security Deploy EtherChannel and switch stacking Configure and verify Inter-VLAN routing Configure, verify, and troubleshoot static and dynamic routing using OSPF, EIGRP, and RIPv2 Describe basic QoS concepts Learn WAN topology and connectivity options and configure PPP, MLPPP, PPPoE, and GRE tunnel connectivity Configure and verify single-homed branch connectivity using eBGP IPv4 Configure and verify key infrastructure services including DNS, DHCP, NTP, HSRP, and NAT Configure Cisco device hardening and deploy access layer security, AAA, and ACLs Learn how to manage Cisco infrastructure Troubleshoot networks using key IOS tools Understand network programmability concepts…”
Libro electrónico -
65343Publicado 2023“…Written by leading researchers and practitioners of IoT technology for defense and national security, IoT for Defense and National Security also includes information on: Changes in warfare driven by IoT weapons, logistics, and systems IoT resource allocation (monitoring existing resources and reallocating them in response to adversarial actions) Principles of AI-enabled processing for Internet of Battlefield Things, including machine learning and inference Vulnerabilities in tactical IoT communications, networks, servers and architectures, and strategies for securing them Adapting rapidly expanding commercial IoT to power IoT for defense For application engineers from defense-related companies as well as managers, policy makers, and academics, IoT for Defense and National Security is a one-of-a-kind resource, providing expansive coverage of an important yet sensitive topic that is often shielded from the public due to classified or restricted distributions…”
Libro electrónico -
65344Publicado 2022“…It is also an invaluable resource for researchers, educators, journalists, entrepreneurs, and professionals working in media management, advertising, public relations, and business marketing…”
Libro electrónico -
65345Publicado 2023“…You will: Work with the basics of C++: types, operators, variables, constants, expressions, functions, classes, I/O, smart pointers, and more Set up the Visual Studio environment on Windows and GCC on Linux, where you can write your own code Declare and define functions, classes, and objects, and organize code into namespaces Discover object-oriented programming including encapsulation, inheritance, polymorphism, using the most advanced C++ features Manage the basics of lambdas, inheritance, polymorphism, smart pointers, templates, modules, contracts, concepts, and more…”
Libro electrónico -
65346por Organisation for Economic Co-operation and Development.“…The first, and most immediate, concerns the state of sub-national government finances in the wake of the crisis and its implications for managing public investment, in particular, during a period of austerity. …”
Publicado 2011
Libro electrónico -
65347Publicado 2013“…Subsequent chapters explore basic time series analysis and simple econometric models for business, finance, and economics as well as related topics including: Linear time series analysis, with coverage of exponential smoothing for forecasting and methods for model comparison Different approaches to calculating asset volatility and various volatility models High-frequency financial data and simple models for price changes, trading intensity, and realized volatility Quantitative methods for risk management, including value at risk and conditional value at risk Econometric and statistical methods for risk assessment based on extreme value theory and quantile regression Throughout the book, the visual nature of the topic is showcased through graphical representations in R, and two detailed case studies demonstrate the relevance of statistics in finance. …”
Libro electrónico -
65348Publicado 2021“…Despite the globally distributed TPC, we manage to discuss all papers with most reviewers live, hear all opinions, and reach a decision with consensus for virtually every paper…”
Libro electrónico -
65349Publicado 2009“…This year's conference includes thirty five research papers, policy/management papers and student research papers, three of which will be presented in a new Spanish session. …”
Libro electrónico -
65350Publicado 2019“…The resulting high-quality program includes several topics, ranging from infrastructure and networking to software design aspects, passing through resource management and scheduling all the way to the very important topics including security as well as newly appearing hot topics such as edge and fog computing and Internet of Things. …”
Libro electrónico -
65351Publicado 2021“…This in turn means addressing many core challenges and combining ideas and techniques from various research communities, such as recommender systems, data management, geographic information systems, social network analytics and text mining. …”
Libro electrónico -
65352por Owen, Harrison, 1935-“…Widely known for his Open Space Technology-a broadly used meeting management tool-Owen now pushes well beyond that surface appreciation and suggests deeper applications and implications, showing how what has been experienced in a typical "great meeting" with Open Space can actually be a 365-day-a-year reality. …”
Publicado 2000
Libro electrónico -
65353Publicado 2002“…At the heart of the book is a 200-plus-page reference section titled "Windows XP Applications and Tools," containing: Detailed information on most of the commands and utilities available with Windows XP, including Start Menu accessories, command prompt tools, hidden system administration utilities such as the Registry Editor, Microsoft Management Console, and TweakUI. A comprehensive "Where to Find It?" …”
Libro electrónico -
65354Publicado 2004“…Build powerful C++ GUI applications quickly and easily Design dialogs and main windows visually and in code Learn Qt's innovative typesafe signals and slots mechanism Use layouts to create forms that automatically size and scale Create custom signals, slots, events, and controls Program the ''Qt way'' with techniques for Qt 3.2 that'll work with Qt 4 Code applications with menus, toolbars, dialogs, and drag and drop Utilize 2D and 3D graphics, multithreading, and networking Write database and XML applications Internationalize to reach foreign markets Exploit platform-specific-features like ActiveX Already using Qt or just starting out? Evaluating Qt or managing it? Building open source applications--or commercial applications? …”
Libro electrónico -
65355Publicado 2017“…Use modules to simplify the development of well-performing complex systems Migrate applications to work with the modularized Java API and third-party modules Test code as you create it with the new JShell Read-Eval-Print Loop (REPL) Use lambda expressions to express actions more concisely Streamline and optimize data management with today's Streams API Leverage modern concurrent programming based on cooperating tasks Take advantage of a multitude of API improvements for working with collections, input/output, regular expressions, and processes Whether you're just getting started with modern Java or you're an experienced developer, this guide will help you write tomorrow's most robust, efficient, and secure Java code. …”
Libro electrónico -
65356Publicado 2017“…Go beyond code to master the practices that professional developers rely on: testing, debugging, publishing on the App Store, and managing your app over the long haul. As a bonus, you'll get a taste of cutting-edge iOS 10 features, such as the new Siri voice-command API. …”
Libro electrónico -
65357Publicado 2016“…What’s Inside Writing more effective code with functions, objects, and closures Learning to avoid JavaScript application pitfalls Using regular expressions to write succinct text-processing code Managing asynchronous code with promises Fully revised to cover concepts from ES6 and ES7 About the Reader You don’t have to be a ninja to read this book—just be willing to become one. …”
Libro electrónico -
65358por Hillegass, Aaron“…Updated for Xcode and Mac OS X 10.3, new chapters in this second edition include coverage of OpenGL, AppleScriptability, the undo manager, creating frameworks, and a brief introduction to using GNUstep on Linux…”
Publicado 2004
Libro electrónico -
65359por Kaeo, Merike“…You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. …”
Publicado 2004
Libro electrónico -
65360Publicado 2009“…Coverage includes Effectively evaluating, planning, and implementing large system projects Reducing resistance to process improvements Bringing greater agility to the way you manage products, portfolios, and projects Identifying the tasks that don’t create enough value to be worth your time Developing the forms of collaboration that are crucial to sustaining innovation Mitigating project risks more effectively–especially those associated with complexity and uncertainty Refocusing all decision-making on delivering value to the organization and the marketplace Making decisions at the right time to leverage the best information without stifling progress…”
Libro electrónico