Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 582
- Historia 492
- Development 379
- Management 335
- Application software 296
- Filosofía 294
- Matemáticas 262
- Electrónica 250
- Economics 246
- Computer programs 241
- Engineering & Applied Sciences 228
- Artificial intelligence 223
- Data processing 221
- Philosophy 214
- Computer networks 183
- Cloud computing 177
- Social aspects 177
- Materiales 172
- Mecánica 169
- Business & Economics 159
- Computer Science 154
- Crítica e interpretación 154
- Business 150
- Derecho 149
- Politics and government 149
- Law and legislation 148
- Technological innovations 147
- Education 140
- Lengua inglesa 139
- Database management 138
-
43701por Organisation for Economic Co-operation and Development“…Au cours de ces trois dernières années, les multiples crises mondiales et l'impératif de plus en plus urgent de limiter le changement climatique ont mis les modèles actuels de coopération pour le développement à rude épreuve, sans doute la plus rude depuis des décennies. …”
Publicado 2023
Libro electrónico -
43702Publicado 2024“…Power real-time activities like text-based chats, secure peer-to-peer file transfers, collaborative brainstorming sessions - even multiplayer gaming. And you're not limited to two connected users: an entire chapter of the book is devoted to engineering multipeer WebRTC apps that let groups of people communicate in real time. …”
Libro electrónico -
43703por Graff, Séverine“…Peut-on se réclamer du « cinéma » tout en prétendant rendre compte d'une « vérité » ? Quelles sont les limites éthiques du dévoilement d'un individu face à une caméra ? …”
Publicado 2018
Electrónico -
43704Publicado 2014“…Las personas ejercen su derecho poniendo actos jurídicos en el tiempo establecido y dentro de los límites de su competencia o potestad. La potestad eclesiástica comprende tres funciones, legislativa, ejecutiva y judicial, y puede ser ordinaria y delegada. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
43705Publicado 2004“…Pogue highlights the newest features and improvements, covers the capabilities and limitations of each program, and delivers, in one volume, countless goodies you won't find anywhere else: undocumented tips, tricks, and secrets for getting the very best performance out of each and all of these life-changing new applications. iLife '04: The Missing Manual : it's your guide to livin the iLife!…”
Libro electrónico -
43706Publicado 2017“…Understand UE4’s components and development environment Master UE4’s pipeline from source data to delivered application Recognize and adapt to the differences between UE4 and traditional visualization and rendering techniques Achieve staggering realism with UE4’s Physically Based Rendering (PBR) Materials, Lighting, and Post-Processing pipelines Create production-ready Materials with the interactive real-time Material Editor Quickly set up projects, import massive datasets, and populate worlds with accurate visualization data Develop bright, warm lighting for architectural visualizations Create pre-rendered animations with Sequencer Use Blueprints Visual Scripting to create complex interactions without writing a single line of code Work with (and around) UE4’s limitations and leveraging its advantages to achieve your vision All UE4 project files and 3ds Max source files, plus additional resources and links, are available at the book's companion website…”
Libro electrónico -
43707Publicado 2017“…Understand the operational architecture of the Cisco Firepower NGFW, NGIPS, and AMP technologies Deploy FTD on ASA platform and Firepower appliance running FXOS Configure and troubleshoot Firepower Management Center (FMC) Plan and deploy FMC and FTD on VMware virtual appliance Design and implement the Firepower management network on FMC and FTD Understand and apply Firepower licenses, and register FTD with FMC Deploy FTD in Routed, Transparent, Inline, Inline Tap, and Passive Modes Manage traffic flow with detect-only, block, trust, and bypass operations Implement rate limiting and analyze quality of service (QoS) Blacklist suspicious IP addresses via Security Intelligence Block DNS queries to the malicious domains Filter URLs based on category, risk, and reputation Discover a network and implement application visibility and control (AVC) Control file transfers and block malicious files using advanced malware protection (AMP) Halt cyber attacks using Snort-based intrusion rule Masquerade an internal host..…”
Libro electrónico -
43708Publicado 2017“…What You Will Learn Installing the NAV system in different environments Implementing the system with the correct setup Maintaining the system to get the best possible performance Tuning up the Dynamics NAV to get better outcomes The Version Control strategy for Dynamics NAV developers Integrating other software and features to remove limitations Understanding your own system better Being able to solve customers' problems with ?…”
Libro electrónico -
43709Publicado 2008“…Coverage includes The limitations of current approaches to authentication and identity management Detailed information on advanced Web services The Identity Metasystem, the laws of identity, and the ideal authentication system Windows CardSpace: What it is, how it works, and how developers and managers can use it in their organizations CardSpace technology: user experience, Information Cards, private desktops, and integration with .NET 3.5 and Windows Vista CardSpace implementation: from HTML integration through federation, Web services integration, and beyond Adding personal card support to a website: a detailed, scenario-based explanation Choosing or becoming an identity provider: opportunities, business impacts, operational issues, and pitfalls to avoid Using CardSpace to leverage trust relationships and overcome phishing Whether you’re a developer, security specialist, or business decision-maker, this book will answer your most crucial questions about identity management, so you can protect everything that matters: your people, your assets, your partners, and your customers. …”
Libro electrónico -
43710Publicado 2021“…Many programmers have limited effectiveness because they don't have a deep understanding of how their computer actually works under the hood. …”
Libro electrónico -
43711por Barnbaum, Bruce“…This book expands on the ideas that are central to Bruce's method of teaching photography, which he has used in workshops for the past 50 years.Included in the book are in-depth discussions on the following topics: Defining your own unique rhythm and approach as a photographer How to translate the scene in front of you to the final photograph The differences and similarities between how an amateur and a professional approach photography The differences between realism and abstraction, and the possibilities and limitations of each Learning to expand your own seeing and creativity through classes, workshops, and associating with other photographers Why the rules of composition should be ignored How to follow your passion When to listen to the critics and when to ignore themThe book is richly illustrated with well over 100 photographs taken by Bruce as well as other photographers.Seeing and creativity are difficult to teach, but not impossible. …”
Publicado 2020
Libro electrónico -
43712Publicado 2016“…Picture Perfect Lighting covers all of this in depth. Don’t limit yourself to using only one kind of light, and don’t depend on Photoshop actions and plug-ins to create the “wow” factor in your images. …”
Libro electrónico -
43713por Gleeson, Patrick. author“…While there has been much attention devoted to understanding these failings, leading to the development of entire management methodologies aimed at reducing the failure rate, such new processes have had, at best, limited success in delivering better results. Based on a decade spent exploring the world of software, Patrick Gleeson argues that the underlying reason for the high failure rate of software projects is that software development, being a deeply arcane and idiosyncratic process, tends to be thoroughly and disastrously misunderstood by managers and leaders. …”
Publicado 2017
Libro electrónico -
43714por Organization for Economic Co-operation and Development (OECD)“…Des efforts supplémentaires seraient en outre nécessaires pour réduire les pertes et le gaspillage alimentaires et limiter la surconsommation de calories et de protéines. …”
Publicado 2022
Libro electrónico -
43715por Organisation de coopération et de développement économiques.“…L’industrie spatiale proprement dite constitue un domaine d’activité relativement limité par rapport aux autres industries manufacturières, mais son dynamisme technologique et son importance stratégique lui confèrent un rôle de plus en plus crucial dans la société moderne. …”
Publicado 2007
Libro electrónico -
43716por Organisation de coopération et de développement économiques.“…Les essais au champ visent à (1) quantifier la teneur en résidu(s) à laquelle s’attendre après un traitement conforme aux bonnes pratiques agricoles en vigueur ou proposées; (2) déterminer, le cas échéant, le taux de dissipation du ou des résidus de produits phytosanitaires dans les cultures considérées; (3) déterminer des paramètres telles que la « valeur médiane des résidus en essais contrôlés » ou la « valeur de résidu la plus élevée », afin d’évaluer les risques alimentaires; enfin, (4) en déduire les limites maximales de résidus (LMR). La présente ligne directrice pour les essais au champ de plantes cultivées exige un échantillon provenant de parcelles traitées à chaque intervalle d’échantillonnage pour les cultures qui font l’objet de huit essais ou plus. …”
Publicado 2021
Libro electrónico -
43717por Organisation for Economic Co-operation and Development“…L'inflation a dépassé la limite supérieure de la fourchette retenue comme objectif par la banque centrale, sur fond de demande vigoureuse et de tensions sur le marché du travail. …”
Publicado 2023
Libro electrónico -
43718Publicado 2007“…Network Admission Control (NAC) uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources, thereby limiting damage from emerging security threats. NAC allows network access only to compliant and trusted endpoint devices (PCs, servers, and PDAs, for example) and can restrict the access of and even remediate noncompliant devices. …”
Libro electrónico -
43719Publicado 2007“…You’ll learn how to: • Recognize dangerous limitations in conventional endpoint security strategies • Identify the best products, tools, and processes to secure your specific devices and infrastructure • Configure new endpoints securely and reconfigure existing endpoints to optimize security • Rapidly identify and remediate compromised endpoint devices • Systematically defend against new endpoint-focused malware and viruses • Improve security at the point of integration between endpoints and your network Whether you’re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you’ve been searching for: a comprehensive endpoint security strategy that works. …”
Libro electrónico -
43720por Lee, Kok-Keong“…With Building Resilient IP Networks , you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. …”
Publicado 2005
Libro electrónico