Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,820
- Development 1,804
- Management 1,550
- Application software 1,412
- Computer Science 1,234
- Science: general issues 946
- History 919
- Computer programs 794
- Computer networks 793
- Data processing 792
- Business & Economics 765
- Economics 758
- Design 692
- Python (Computer program language) 666
- Leadership 665
- Computer programming 658
- Operating systems (Computers) 626
- Photography 589
- Web site development 589
- Artificial intelligence 580
- Programming 579
- Web sites 575
- Computer security 559
- Computer software 556
- Historia 552
- Java (Computer program language) 545
- Security measures 524
- Cloud computing 521
- Digital techniques 521
- Education 514
-
37961Publicado 2016“…It can be used for server-side web application development, real-time applications, microservices, and much more. This book gives you an excellent starting point, bringing you straight to the heart of developing web applications with Node.js. …”
Libro electrónico -
37962Publicado 2016“…Next, we work through the tasks that you perform on a daily basis such as working with strings, generics, and lots more. Gradually, we move on to more advanced topics such as the concept of object-oriented programming, asynchronous programming, reactive extensions, and code contracts. …”
Libro electrónico -
37963Publicado 2017“…This book will showcase more than twenty working Deep Neural Networks coded in Python using Keras. …”
Libro electrónico -
37964Publicado 2016“…What You Will Learn A step-by-step methodology to identify and penetrate secured environments Get to know the process to test network services across enterprise architecture when defences are in place Grasp different web application testing methods and how to identify web application protections that are deployed Understand a variety of concepts to exploit software Gain proven post-exploitation techniques to exfiltrate data from the target Get to grips with various stealth techniques to remain undetected and defeat the latest defences Be the first to find out the latest methods to bypass firewalls Follow proven approaches to record and save the data from tests for analysis In Detail The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. …”
Libro electrónico -
37965Publicado 2015“…The authors address topics covering scalability, elasticity, reliability, resiliency, recovery, data management, storage, virtualization, monitoring, provisioning, administration, and much more. Readers will further find detailed coverage of cloud security, from networking and storage safeguards to identity systems, trust assurance, and auditing. …”
Libro electrónico -
37966Publicado 2015“…About the Instructor Dan Hotka is a training specialist and an Oracle ACE director who has more than 37 years in the computer industry and mor..…”
-
37967Publicado 2023“…"You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. ... Read the book, laugh at the right places, and put your learning to work. …”
Libro electrónico -
37968Publicado 2023“…Each topic is presented with a blend of practical explanations, theory, and best practices. Power BI is more than just the Power BI Desktop or the Power BI Service. …”
Libro electrónico -
37969Publicado 2017“…This has resulted in numerous design challenges, security concerns, mobile agents, network-centric operations, cognitive capabilities, and much more. This book is distinct as it touches significantly upon all communication technologies on the anvil for the near future, apart from its coverage of routing in past networks. …”
Libro electrónico -
37970Publicado 2019“…Our new Sustainability chairs are also helping us take steps towards making the CHI event more sustainable…”
Libro electrónico -
37971por Barnett, Ryan C.“…He addresses issues related to IT processes and your underlying OS; Apache downloading, installation, and configuration; application hardening; monitoring, and more. He also presents a chapter-length case study using actual Web attack logs and data captured “in the wild.” …”
Publicado 2005
Libro electrónico -
37972por Evan, William M.“…They reveal the hidden patterns and commonalities beneath more than 30 of the worst technological tragedies of recent history—and identify powerful preventive measu..…”
Publicado 2002
Libro electrónico -
37973Publicado 2003“…Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. …”
Libro electrónico -
37974Publicado 2017“…By the end of the book, you will have gained more clarity on the implementation of microservices using Spring Framework and will be able to use them in internet-scale deployments through real-world examples. …”
Libro electrónico -
37975Publicado 2017“…What You Will Learn Learn about machine learning landscapes along with the historical development and progress of deep learning Learn about deep machine intelligence and GPU computing with the latest TensorFlow 1.x Access public datasets and utilize them using TensorFlow to load, process, and transform data Use TensorFlow on real-world datasets, including images, text, and more Learn how to evaluate the performance of your deep learning models Using deep learning for scalable object detection and mobile computing Train machines quickly to learn from data by exploring reinforcement learning techniques Explore active areas of deep learning research and applications In Detail Deep learning is the step that comes after machine learning, and has more advanced implementations. …”
Libro electrónico -
37976Publicado 2017“…You will get to know how to communicate with users and other services, as well as getting to grips with generics, scoping, and more advanced conditions. You will also discover how to extend the compilation unit in Rust. …”
Libro electrónico -
37977Publicado 2017“…Some readers will likely be interested in RxJava to make programs more resilient, concurrent, and scalable. Others may be checking out reactive programming just to see what it is all about, and to judge whether it can solve any problems they may have. …”
Libro electrónico -
37978por Douglass, Bruce Powel“…This accessible book examines requirements analysis, the definition of object structure and behavior, architectural and mechanistic design, and more detailed designs that enco..…”
Publicado 2004
Libro electrónico -
37979por Sullivan, Dan, 1962-“…--Jill Dyché, Partner, Baseline Consulting Group Increasingly, corporations are turning to portals to foster more integrated, Web-based user experiences for employees, customers, and vendors. …”
Publicado 2003
Libro electrónico -
37980Publicado 2021“…Starting with object-oriented programming (OOP) in PHP and related language features, you'll work through modern programming techniques such as inheritance, understand how it contrasts with composition, and finally look at more advanced language features. You'll learn about the MVC pattern by developing your own MVC system and advance to understanding what a DI container does by building a toy DI container. …”
Libro electrónico