Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,820
- Development 1,804
- Management 1,550
- Application software 1,412
- Computer Science 1,234
- Science: general issues 946
- History 919
- Computer programs 794
- Computer networks 793
- Data processing 792
- Business & Economics 765
- Economics 758
- Design 692
- Python (Computer program language) 666
- Leadership 665
- Computer programming 658
- Operating systems (Computers) 626
- Photography 589
- Web site development 589
- Artificial intelligence 580
- Programming 579
- Web sites 575
- Computer security 559
- Computer software 556
- Historia 553
- Java (Computer program language) 545
- Security measures 524
- Cloud computing 521
- Digital techniques 521
- Education 514
-
43621Publicado 2016“…Understand the Visual Studio 2015 IDE, .NET Framework 4.6 and the new .NET Core 5, and the anatomy of a VB 2015 application Debug VB applications and implement error handling and exceptions Keep your code clean and well-organized with VB 2015’s new refactoring tools Master modern VB object development: namespaces, modules, structures, enums, inheritance, interfaces, generics, delegates, events, collections, iterators, and more Share Visual Basic code with Portable Class Libraries and Shared Projects Access data with LINQ and ADO.NET Entity Framework Manipulate XML documents with LINQ and XML Literals Build and deploy applications to run in the Microsoft Azure cloud Develop universal Windows apps that run on any Windows 10 device Use advanced .NET 4.6 platform capabilities, including async and parallel programming, multithreading, assemblies, reflection, and coding attributes Leverage new compiler APIs to write custom domain-specific live code analysis rules Test code with unit tests and TDD Deploy apps efficiently with InstallShield for Visual Studio and ClickOnce…”
Libro electrónico -
43622Publicado 2015“…This book reveals the inner workings of transformational strategies developed by leaders who gradually become more successful by advancing winning combinations of attitudes, values, habits, an..…”
Libro electrónico -
43623por Orzach, Yoram“…Your learning journey will get more exciting as you perform eavesdropping, learn data analysis, and use behavior analysis for network forensics. …”
Publicado 2022
Libro electrónico -
43624Publicado 2019“…After you have the fundamentals working, you can go on to building more complex elements. You’ll learn how to load 3D models and add impactful lighting to the scene. …”
-
43625Publicado 2017“…If you want to become a professional software developer then search no more, you have found the right course!…”
-
43626Publicado 2019“…An award-winning digital entrepreneur with more than 20 years of professional experience working with the Internet and digital technology, he is on a mission to help further the global growth of blockchain technology to drive positive change. …”
-
43627Publicado 2018“…This publication is intended for anyone who wants to understand more about IBM Linear Tape System products and their implementation. …”
Libro electrónico -
43628Publicado 2020“…He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. …”
Libro electrónico -
43629Publicado 2015“…And as you gain experience, you’ll learn advanced techniques for enhancing site functionality and performance, strengthening security, promoting code reuse, and much more. Detailed information on how to... Quickly start a new Django project and establish a strong foundation for a growing site Define how your data is organized and create a SQLite database to manage it Quickly produce HTML with Django templates Create dynamic webpages with Django’s URL patterns and views, including function views, class-based views, and generic views Enable efficient, reliable data input with Django Forms and custom form validations Understand the Model-View-Controller (MVC) architecture, compare it to Model-Template-Views, and gain a holistic understanding of Django’s structure Write as little code as possible, simplify code reuse, and mitigate software decay by adhering to the Don’t Repeat Yourself paradigm. …”
Libro electrónico -
43630Publicado 2015“…About the Instructor Charles Crawford III has more than ten years of software experience and five years of experience in software education. …”
-
43631Publicado 2015“…This enterprise represents the culmination of more than 25 years of experience in human resources, training, consulting, management, and coaching in businesses, not-for-profit organizations, and governmental entities. …”
-
43632Publicado 2007“…The Niger river is truly the main source of life for Western Africa, more specifically for the Republic of Mali. In the country, management of the river is a key topic, as one can find at the same time remarkable traditional production systems associated with the floods which supply hundreds thousands of people – but also great projects which promise modern installations, hydroelectrical and hydroagricultural systems. …”
Libro electrónico -
43633Publicado 2023“…What you will learn Gain insights into data integration in Java services and the inner workings of frameworks Apply data design patterns to create a more readable and maintainable design system Understand the impact of design patterns on program performance Explore the role of cloud-native technologies in modern application persistence Optimize database schema designs and leverage indexing strategies for improved performance Implement proven strategies to handle data storage, retrieval, and management efficiently Who this book is for If you're a developer, engineer, or software architect working in the field of software development, particularly with a focus on Java solutions, this book is for you…”
Libro electrónico -
43634Publicado 2006“…Numerous deployment examples help you understand the more advanced topics. You can use the configuration snapshots in this book as skeletal configurations for your production network. …”
Libro electrónico -
43635por Hucaby, Dave“…The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Control access and manage activity on the Cisco IOS firewall Configure a Cisco firewall to act as an IDS sensor Every organization has data, facilities, and workflow processes that are critical to their success. As more organizations make greater use of the Internet, defending against network attacks becomes crucial for businesses. …”
Publicado 2004
Libro electrónico -
43636Publicado 2007“…Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You’ll learn how to: • Recognize dangerous limitations in conventional endpoint security strategies • Identify the best products, tools, and processes to secure your specific devices and infrastructure • Configure new endpoints securely and reconfigure existing endpoints to optimize security • Rapidly identify and remediate compromised endpoint devices • Systematically defend against new endpoint-focused malware and viruses • Improve security at the point of integration between endpoints and your network Whether you’re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you’ve been searching for: a comprehensive endpoint security strategy that works. …”
Libro electrónico -
43637Publicado 2007“…Digitally sign your PowerShell scripts Introduction Part I Introduction to PowerShell 1 Introduction to Shells and PowerShell 2 PowerShell Basics 3 PowerShell: A More In-Depth Look 4 Code Signing 5 PowerShell Scripting Best Practices Part II Translating Your Existing Knowledge into PowerShell 6 PowerShell and the File System 7 PowerShell and the Registry 8 PowerShell and WMI 9 PowerShell and Active Directory Part III Using PowerShell to Meet Your Automation Needs 10 Using PowerShell in the Real-World Index…”
Libro electrónico -
43638por Barnes, Joshua“…Whether you’re an executive, software professional, or consultant, this book will help you continuously improve the maturity of your development processes–and reap the benefits: better quality, faster delivery, and more business value. After reading this book you will be able to · Get past the myths of software process improvement to focus on what’s truly practical · Identify and evaluate your best candidate process solutions · Objectively project the ROI achievable with IBM R UP and IBM Rational solutions · Develop funding models, business cases, and executive support · Recruit, staff, organize, and motivate your implementation team · Plan for effective integration, process alignment, and change management · Choose the right pilots, learn the right lessons, and develop effective adoption models · Move quickly to successful program-level implementation · Set maturity level goals for process and tool utilization · Map “End States” for both quantity and quality · Plan for training and mentoring–and understand the distinct role of each · Keep the momentum going after your implementation is complete Link to www.upmentors.com, where you can download actual sample implementation documents–not just templates! …”
Publicado 2007
Libro electrónico -
43639Publicado 2007“…You’ll learn how to: • Replace nonstop crisis response with a systematic approach to security improvement • Understand the differences between “good” and “bad” metrics • Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk • Quantify the effectiveness of security acquisition, implementation, and other program activities • Organize, aggregate, and analyze your data to bring out key insights • Use visualization to understand and communicate security issues more clearly • Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources • Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you’re an engineer or consultant responsible for security and reporting to management–or an executive who needs better information for decision-making– Security Metrics is the resource you have been searching for. …”
Libro electrónico -
43640por Beck, Kent“…Specific topics include: Planning and the four key variables: cost, quality, time, and scope Deciding how many features to incorporate into a release Estimating scope, time, and effort for user stories Prioritizing user stories Balancing the business value and technical risk of user stories Rebuilding the release plan based on customer and programmer input Choosing the iteration length Tracking an iteration What to do when you're not going to make the date Dealing with bugs Making changes to the team Outsourcing Working with business contracts In addition, this book alerts you to the red flags that signal serious problems: customers who won't make decisions, growing defect reports, failing daily builds, and more. An entire chapter is devoted to war stories from the trenches that illustrate the real-world problems many programmers encounter and the solutions they've devised. ..…”
Publicado 2001
Libro electrónico