Mostrando 65,901 - 65,920 Resultados de 66,727 Para Buscar '"Mánager"', tiempo de consulta: 0.19s Limitar resultados
  1. 65901
    Publicado 2022
    “…With the help of our Local chairs (Cristian Consonni and Mihnea Tufis,) and Streaming & Broadcasting chairs (Walter Anelli, Lesly Miculicich, Lorena Recalde, and Mete Sertkan) this new format was developed in a manageable way to offer a rich attendance to both online and onsite participants. …”
    Libro electrónico
  2. 65902
    Publicado 2022
    “…With the help of our Local chairs (Cristian Consonni and Mihnea Tufis,) and Streaming & Broadcasting chairs (Walter Anelli, Lesly Miculicich, Lorena Recalde, and Mete Sertkan) this new format was developed in a manageable way to offer a rich attendance to both online and onsite participants. …”
    Libro electrónico
  3. 65903
    por Egan, Mark
    Publicado 2010
    “…." – Eric Benhamou, chairman of the board of directors, 3Com Corporation, palmOne, and PalmSource, Inc "This book is not about cyber security; it's about managing one's company and the role that cyber security plays in that scenario. …”
    Libro electrónico
  4. 65904
    Publicado 2008
    “…Whether you’re a CIO, IT manager, or security specialist, this book will open your eyes to new ways of thinking about--and overcoming--your most pressing security challenges. …”
    Libro electrónico
  5. 65905
    Publicado 2005
    “…A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues Operate and maintain a secure MPLS core with industry best practices Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS) Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. …”
    Libro electrónico
  6. 65906
    Publicado 2007
    “…This book will help you Automate low-level details and eliminate unnecessary complexity in server-side development Discover JSF best practices, ranging from effective UI design and style sheets to internationalization Use JSF with Tiles to build consistent, reusable user interfaces Leverage external services such as databases, LDAP directories, authentication/authorization, and Web services Use JBoss Seam to greatly simplify development of database-backed applications Implement custom components, converters, and validators Master the JSF 1.2 tag libararies, and extend JSF with additional tag libraries Preface Acknowledgments Chapter 1: Getting Started Chapter 2: Managed Beans Chapter 3: Navigation Chapter 4: Standard JSF Tags Chapter 5: Data Tables Chapter 6: Conversion and Validation Chapter 7: Event Handling Chapter 8: Subviews and Tiles Chapter 9: Custom Components, Converters, and Validators Chapter 10: External Services Chapter 11: Ajax Chapter 12: Open Source Chapter 13: How Do I . . . …”
    Libro electrónico
  7. 65907
    Publicado 2013
    “…He has spent most of his career in the electronics industry in positions of engineering, marketing, general management, and as CEO of several companies. He has owned UltraCAD Design Inc. since 1992. …”
    Video
  8. 65908
    por Gress, Mark L., Johnson, Lee, 1972-
    Publicado 2010
    “…Efficiently install, configure, and troubleshoot Cisco Wireless LAN Controllers Move autonomous wireless network solutions to LWAPP/CAPWAP Integrate LWAPP/CAPWAP solutions into existing wired networks Understand the next-generation WLC architecture Use Hybrid REAP and Home AP solutions to centrally configure and control branch/remote access points without deploying controllers in every location Use Mobility Groups to provide system-wide mobility easily and cost-effectively Use Cisco WLC troubleshooting tools, and resolve client-related problems Maximize quality in wireless voice applications Build efficient wireless mesh networks Use RRM to manage RF in real-time, optimizing efficiency and performance Reference the comprehensive WLC and AP debugging guide Part of the CCIE Professional Development Series, this is the first book to offer authoritative training for the new CCIE Wireless Exam. …”
    Libro electrónico
  9. 65909
    Publicado 2019
    “…In FMR , you’ll learn: The Single Most Important Discipline in Military Recruiting How to Get Out of a Recruiting Slump The 30-Day Rule and Law of Replacement Powerful Time and Territory Management Strategies that Put You in Control of Your Day The 7 Step Telephone Prospecting Framework The 4 Step Email and Direct Messaging Framework The 5 C’s of Social Recruiting The 7 Step Text Message Prospecting Framework How to Leverage a Balanced Prospecting Methodology to Keep the Funnel Full of Qualified Applicants Powerful Human Influence Frameworks that Reduce Resistance and Objections The 3 Step Prospecting Objection Turn-Around Framework Mission Drive and the 5 Disciplines of Ultra-High Performing Military Recruiters In his signature right-to-the-point style that has made him the go-to trainer to a who’s who of the world’s most prestigious organizations, Jeb Blount pulls no punches. …”
    Libro electrónico
  10. 65910
    Publicado 2017
    “…Part I: Game Design and Paper Prototyping The Layered Tetrad framework: a synthesis of 50 years of game design theory Proven practices for brainstorming and refining game designs through the iterative process of design Methods and tools to manage game projects and small teams Processes to make playtesting and feedback easier Part II: Digital Prototyping with Unity and C# Chapters that guide you through learning C# the right way Instruction that takes you from no prior programming knowledge through object-oriented programming Deep exploration of Unity, today’s most popular game engine on both macOS and Windows Methods for understanding and debugging code issues you encounter Part III: Game Prototype Examples and Tutorials In-depth tutorials for seven different game prototypes, including a simple action game, a space shooter, a solitaire card game, a word game, and a top-down adventure Instructions to compile these games for PC, web, or any of the dozens of other release platforms supported by Unity Improved structure and layout that makes the steps of each tutorial easier to follow A completely new Dungeon Delver prototype not present in the first edition…”
    Libro electrónico
  11. 65911
    Publicado 2018
    “…What you will learn Explore the benefts of server-side rendering with Next.js Create and link JavaScript modules together by understanding code splitting and bundling Create website pages and wire them together through website navigation Extend your application with additional Webpack loaders and features, as well as custom Babel plugins and presets Use GraphQL and Apollo frameworks with Next.js to fetch data and receive push notifcations Design and implement core modules, such as logging and authentication, and then more complex solutions for access control and business rule management Write tests and use online CI tools such as Travis, GitLab, and more Build a Docker-based container for your app and deploy it to online services such as Heroku and Now.sh Who this book is for This book is for JavaScript developers who want to learn how to generate server-rendered applications…”
    Libro electrónico
  12. 65912
    Publicado 2017
    “…What You Will Learn Work with SVG geometric shapes Learn to manage map data and plot it with D3.js Add interactivity and points of interest to your maps Compress and manipulate geoJSON files with the use of topoJSON Learn how to write testable D3.js visualizations Build a globe with D3.js and Canvas and add interactivity to it. …”
    Libro electrónico
  13. 65913
    Publicado 2016
    “…The narrative follows the journey of how one manager discovered these critically important qualities. …”
    Libro electrónico
  14. 65914
    Publicado 2017
    “…We start by showing you how to set up and manage the Pi Zero and then move on to configuring the hardware, running it with Linux, and programming it with Python scripts. …”
    Libro electrónico
  15. 65915
    por Douglass, Bruce Powel
    Publicado 2004
    “…— Soma Chatterjee, Senior Product Manager, I-Logix The increasing complexity of embedded and real-time systems requires a more premeditated and sophisticated design approach for successful implementation. …”
    Libro electrónico
  16. 65916
    por Seacord, Robert C.
    Publicado 2006
    “…Coverage includes technical detail on how to Improve the overall security of any C/C++ application Thwart buffer overflows and stack-smashing attacks that exploit insecure string manipulation logic Avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions Eliminate integer-related problems: integer overflows, sign errors, and truncation errors Correctly use formatted output functions without introducing format-string vulnerabilities Avoid I/O vulnerabilities, including race conditions Secure Coding in C and C++ presents hundreds of examples of secure code, insecure code, and exploits, implemented for Windows and Linux. …”
    Libro electrónico
  17. 65917
    Publicado 2000
    “…Python syntax and style Development and Run-time Environments Objects and Python memory management Standard data types, methods, and operators Loops and conditionals Files and Input/Output Exceptions and error handling Functions, scope, arguments, and functional programming Importing modules and module attributes Object-oriented Programming with classes, methods, and instances Callable Objects Extending Python Coverage of the Python standard module library and client-server application development includes comprehensive introductions to the following topics in Python programming: Regular expressions TCP/IP and UDP/IP Network programming using sockets Operating system interface GUI development with Tk using Tkinter Multithreaded programming Interactive Web/CG..…”
    Libro electrónico
  18. 65918
    por Smart, Julian
    Publicado 2005
    “…With this book, you can, too. wxWidgets quickstart: event/input handling, window layouts, drawing, printing, dialogs, and more Working with window classes, from simple to advanced Memory management, debugging, error checking, internationalization, and other advanced topics Includes extensive code samples for Windows, Linux (GTK+), and Mac OS X About the CD-ROM The CD-ROM contains all of the source code from the book; wxWidgets distributions for Windows, Linux, Unix, Mac OS X, and other platforms; the wxWidgets reference guide; and development tools including the OpenWatcom C++ compiler, the poEdit translation helper, and the DialogBlocks user interface builder. © Copyright Pearson Education. …”
    Libro electrónico
  19. 65919
    Publicado 2015
    “…About the Instructor Scott Aurnou is the Vice-President of SOHO Solutions, a NY-based IT consulting and managed services firm, where he focuses on security and privacy-related issues. …”
    Video
  20. 65920
    por Bouche, Karl
    Publicado 2021
    “…Examination of the three Carolingian settlement sites, as well as a ford from the same period, reveals an organised, interactive approach to environmental management of the surrounding lands (land division, ditch Systems. tracks, development of a peatcovered valley floor), which were developed and systematically exploited from the 7th to 10th century. …”
    Electrónico