Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,820
- Development 1,804
- Management 1,550
- Application software 1,412
- Computer Science 1,234
- Science: general issues 946
- History 919
- Computer programs 794
- Computer networks 793
- Data processing 792
- Business & Economics 765
- Economics 758
- Design 692
- Python (Computer program language) 666
- Leadership 665
- Computer programming 658
- Operating systems (Computers) 626
- Photography 589
- Web site development 589
- Artificial intelligence 580
- Programming 579
- Web sites 575
- Computer security 559
- Computer software 556
- Historia 553
- Java (Computer program language) 545
- Security measures 524
- Cloud computing 521
- Digital techniques 521
- Education 514
-
44461Publicado 2017“…Therefore, it is critical to search for more effective drugs to treat amebiasis, giardiasis, and cryptosporidiosis. …”
Libro electrónico -
44462por Donnat, Olivier“…The French are divided on the issue of cultural inequalities in our country: more than half of them consider the situation to be acute and almost as many consider that inequalities have increased overall over the last 30 years...…”
Publicado 2015
Electrónico -
44463Publicado 2016“…Because the names we give to cells are often associated with a functional connotation, this is much more than simple semantics. The "name" we give to a population fundamentally changes the perception of its biology and can impact on research design and interpretation. …”
Libro electrónico -
44464Publicado 2016“…This research topic is proposed to explore the role of cytokines, and more in particular chemokines, in the modulation of neuronal activity as a fundamental step for the correct brain wiring, function and susceptibility to environment. …”
Libro electrónico -
44465por Armstrong, Denise E.“…Chris Spence, Director, Toronto District School Board, Canada The few books currently available on the role of the assistant principal tend to be thin little survival guides aimed at practitioners working in the sink or swim environment of a new appointment. All the more reason to celebrate the publication of this substantial new book that skillfully addresses the craft knowledge and phenomenology of the transition from teaching to school administration roles, and does so in a scholarly manner –integrating relevant theory and research within an inspired and memorable conceptual framework of epicycles. …”
Publicado 2009
Libro electrónico -
44466por Darvas, György. author“…Weyl’s popular book on symmetry more than fifty years ago. It is relevant to almost all fields of science where symmetry appears as a phenomenon or is applied as a method, and where the concept is present in contemporary sciences, humanities and arts. …”
Publicado 2007
Libro electrónico -
44467Publicado 2009“…In Education Across Borders: Politics, Policy, and Legislative Action more than twenty leading research scholars, educators, and administrators explore critical issues affecting cross-border education in Asia, Europe, Africa, and the Americas. …”
Libro electrónico -
44468Publicado 2020“…Elara Bertho and Marie Rodet have demonstrated through this publication that Essay on Local History is essential reading for anyone wishing to understand both the history of Guinea and more especially Yves Person’s modus operandi…”
Libro electrónico -
44469por Bakan, Danny, author“…Being technologically connected, being online, represents a reality still greater and more complex than Marshall McLuhan predicted ; it represents a reality that seems to neglect or even obliterate the unconnected. …”
Publicado 2010
Libro electrónico -
44470Publicado 2016“…Exchange of ideas among scientists with different perspectives on these issues will allow researchers to identify and highlight the way in which different internal and external factors interact to make communication in different modalities more or less successful across the lifespan. Such exchange is the forerunner of broader dissemination of results which ultimately, may make it possible to take measures to reduce adverse conditions, thus facilitating communication. …”
Libro electrónico -
44471Publicado 2016“…However, English is a highly irregular orthography and doubts have been raised on the appropriateness of automatically extending interpretations based on English to other more regular orthographies. By contrast, important information can be gotten from systematic comparisons across languages. …”
Libro electrónico -
44472Publicado 2002“…Knowing how Louis XI funded his action also explains his successes and failures more clearly. Here, the history of finance and institutions joins mainstream history. …”
Libro electrónico -
44473Publicado 2017“…Nursing with a Message explores the day-to-day processes involved in the coming together and moving apart of different organizations, disciplinary interests, knowledge domains, and spheres of public and private responsibilities involved in caring for those in need at the point of delivery of service. More specifically, it uses the public health nurses involved in New York City health demonstration projects as a case study of disciplinary tensions inherent in projects with multiple constituents and invested in multiple, and sometimes contradictory outcomes. …”
Libro electrónico -
44474Publicado 2021“…The aims of the book are to provide an insight into the subject of management and business cybernetics, using the principle of cybernetic synergy, to resolve intra-corporate issues and create more efficient business practices based on simple command-and-control processes. …”
Libro electrónico -
44475Publicado 2014“…Instruction throughout offers detailed explanations, demos, tips, and more. Major sections are as follows: Part 1: Understanding Network Security Lesson 1: Understanding Enterprise Security Concepts Lesson 2: Identifying Infrastructure Devices Lesson 3: Understanding Security Devices and Systems Lesson 4: Explaining Network Design Components Lesson 5: Exploring Secure Network Administration Lesson 6: Wireless Networking Security Lesson 7: Part 1 Summary Part 2: Understanding Threats and Vulnerabilities Lesson 8: Recognizing Malware Types Lesson 9: Exploring Prevalent Attack Methods Lesson 10: Understanding Threat Management Lesson 11: Deploying Threat Discovery Tools Lesson 12: Part 2 Summary Part 3: Understanding Compliance and Operational Security Lesson 13: Understanding Risk Related Concepts Lesson 14: Examining the Importance for Security Awareness Lesson 15: Exploring Incident Response and Forensics Lesson 16: Implementing Physical Security and Environmental Controls Lesson 17: Part 3 Summary Part 4: Understanding Application, Data, and Host Security Lesson 18: Examining Application Attack Types Lesson 19: Explaining Application Security Controls and Techniques Lesson 20: Summarizing Mobile Security Concepts Lesson 21: Establishing Host Security Lesson 22: Understanding Data Sec..…”
-
44476Publicado 2021“…You'll start by building simple standalone web applications and progress to developing more advanced hosted web applications with SQL Server backends. …”
Libro electrónico -
44477por Tuomanen, Brian“…Next, you'll explore some of the more well-known NVIDIA libraries, such as cuFFT and cuBLAS. …”
Publicado 2018
Libro electrónico -
44478Publicado 2016“…Skill Level Beginner What you Will Learn Android 6.0 (Marshmellow) Android Studio Supporting Various Screen Sizes/Resolutions Accessibility, Internationalization, Graphics Activities, Fragments, Intents, Preferences GUIs, Layouts, Menus, Resource Files, Lists, Adapters, Events, Touch/Gesture Processing Immersive Mode, Printing Framework, PrintHelper Web services, JSON Assets (Images, Audio), View Animation Threading, Collections, SQLite Database Social sharing via implicit intents and much, much more Who Should Take this Course Java Developers looking to learn Android Development skills Course Requirements A basic understanding of Java programming Table of Contents Before You Begin This lesson shows you how to install and configure Android Studio, Google’s Android Integrated Development Environments (IDE). …”
-
44479Publicado 2018“…Near the end, the book supplies security-related best practices to make bi-directional communication more secure. When you've finished this book, you'll be up-and-running with the AWS IoT Suite, and building IoT projects. …”
Libro electrónico -
44480Publicado 2021“…By the end of this book, you'll be able to bring a Connect call center online with all its major components and interfaces to significantly reduce personnel overhead and provide your customers with an enhanced user experience (UX).What you will learnBecome well-versed with the capabilities and benefits of Amazon ConnectDetermine cost-effective solutions by integrating Connect with AWSCreate, modify, and connect contact flows to improve efficiencyBuild a conversational interface with Amazon LexFind out how to transfer contact records out of Connect via KinesisGather user insights and improve business operations with Amazon QuickSightAnalyze customer-agent conversations with ML speech analytics capabilitiesDiscover ways to provide superior customer service at a lower costWho this book is forThis Amazon Connect book is for anyone looking to save costs and improve their customer experience through a more advanced call center using Amazon Connect and other AWS capabilities. …”
Libro electrónico