Mostrando 43,701 - 43,720 Resultados de 47,545 Para Buscar '"No limits"', tiempo de consulta: 0.14s Limitar resultados
  1. 43701
    “…Au cours de ces trois dernières années, les multiples crises mondiales et l'impératif de plus en plus urgent de limiter le changement climatique ont mis les modèles actuels de coopération pour le développement à rude épreuve, sans doute la plus rude depuis des décennies. …”
    Libro electrónico
  2. 43702
    Publicado 2024
    “…Power real-time activities like text-based chats, secure peer-to-peer file transfers, collaborative brainstorming sessions - even multiplayer gaming. And you're not limited to two connected users: an entire chapter of the book is devoted to engineering multipeer WebRTC apps that let groups of people communicate in real time. …”
    Libro electrónico
  3. 43703
    por Graff, Séverine
    Publicado 2018
    “…Peut-on se réclamer du « cinéma » tout en prétendant rendre compte d'une « vérité » ? Quelles sont les limites éthiques du dévoilement d'un individu face à une caméra ? …”
    Electrónico
  4. 43704
    Publicado 2014
    “…Las personas ejercen su derecho poniendo actos jurídicos en el tiempo establecido y dentro de los límites de su competencia o potestad. La potestad eclesiástica comprende tres funciones, legislativa, ejecutiva y judicial, y puede ser ordinaria y delegada. …”
    Libro
  5. 43705
    Publicado 2004
    “…Pogue highlights the newest features and improvements, covers the capabilities and limitations of each program, and delivers, in one volume, countless goodies you won't find anywhere else: undocumented tips, tricks, and secrets for getting the very best performance out of each and all of these life-changing new applications. iLife '04: The Missing Manual : it's your guide to livin the iLife!…”
    Libro electrónico
  6. 43706
    Publicado 2017
    “…Understand UE4’s components and development environment Master UE4’s pipeline from source data to delivered application Recognize and adapt to the differences between UE4 and traditional visualization and rendering techniques Achieve staggering realism with UE4’s Physically Based Rendering (PBR) Materials, Lighting, and Post-Processing pipelines Create production-ready Materials with the interactive real-time Material Editor Quickly set up projects, import massive datasets, and populate worlds with accurate visualization data Develop bright, warm lighting for architectural visualizations Create pre-rendered animations with Sequencer Use Blueprints Visual Scripting to create complex interactions without writing a single line of code Work with (and around) UE4’s limitations and leveraging its advantages to achieve your vision All UE4 project files and 3ds Max source files, plus additional resources and links, are available at the book's companion website…”
    Libro electrónico
  7. 43707
    Publicado 2017
    “…Understand the operational architecture of the Cisco Firepower NGFW, NGIPS, and AMP technologies Deploy FTD on ASA platform and Firepower appliance running FXOS Configure and troubleshoot Firepower Management Center (FMC) Plan and deploy FMC and FTD on VMware virtual appliance Design and implement the Firepower management network on FMC and FTD Understand and apply Firepower licenses, and register FTD with FMC Deploy FTD in Routed, Transparent, Inline, Inline Tap, and Passive Modes Manage traffic flow with detect-only, block, trust, and bypass operations Implement rate limiting and analyze quality of service (QoS) Blacklist suspicious IP addresses via Security Intelligence Block DNS queries to the malicious domains Filter URLs based on category, risk, and reputation Discover a network and implement application visibility and control (AVC) Control file transfers and block malicious files using advanced malware protection (AMP) Halt cyber attacks using Snort-based intrusion rule Masquerade an internal host..…”
    Libro electrónico
  8. 43708
    Publicado 2017
    “…What You Will Learn Installing the NAV system in different environments Implementing the system with the correct setup Maintaining the system to get the best possible performance Tuning up the Dynamics NAV to get better outcomes The Version Control strategy for Dynamics NAV developers Integrating other software and features to remove limitations Understanding your own system better Being able to solve customers' problems with ?…”
    Libro electrónico
  9. 43709
    Publicado 2008
    “…Coverage includes The limitations of current approaches to authentication and identity management Detailed information on advanced Web services The Identity Metasystem, the laws of identity, and the ideal authentication system Windows CardSpace: What it is, how it works, and how developers and managers can use it in their organizations CardSpace technology: user experience, Information Cards, private desktops, and integration with .NET 3.5 and Windows Vista CardSpace implementation: from HTML integration through federation, Web services integration, and beyond Adding personal card support to a website: a detailed, scenario-based explanation Choosing or becoming an identity provider: opportunities, business impacts, operational issues, and pitfalls to avoid Using CardSpace to leverage trust relationships and overcome phishing Whether you’re a developer, security specialist, or business decision-maker, this book will answer your most crucial questions about identity management, so you can protect everything that matters: your people, your assets, your partners, and your customers. …”
    Libro electrónico
  10. 43710
    Publicado 2021
    “…Many programmers have limited effectiveness because they don't have a deep understanding of how their computer actually works under the hood. …”
    Libro electrónico
  11. 43711
    por Barnbaum, Bruce
    Publicado 2020
    “…This book expands on the ideas that are central to Bruce's method of teaching photography, which he has used in workshops for the past 50 years.Included in the book are in-depth discussions on the following topics: Defining your own unique rhythm and approach as a photographer How to translate the scene in front of you to the final photograph The differences and similarities between how an amateur and a professional approach photography The differences between realism and abstraction, and the possibilities and limitations of each Learning to expand your own seeing and creativity through classes, workshops, and associating with other photographers Why the rules of composition should be ignored How to follow your passion When to listen to the critics and when to ignore themThe book is richly illustrated with well over 100 photographs taken by Bruce as well as other photographers.Seeing and creativity are difficult to teach, but not impossible. …”
    Libro electrónico
  12. 43712
    Publicado 2016
    “…Picture Perfect Lighting covers all of this in depth. Don’t limit yourself to using only one kind of light, and don’t depend on Photoshop actions and plug-ins to create the “wow” factor in your images. …”
    Libro electrónico
  13. 43713
    por Gleeson, Patrick. author
    Publicado 2017
    “…While there has been much attention devoted to understanding these failings, leading to the development of entire­ management methodologies aimed at reducing the failure rate, such new processes have had, at best, limited success in delivering better results. Based on a decade spent exploring the world of software, Patrick Gleeson argues that the underlying reason for the high failure rate of software projects is that software development, being a deeply arcane and idiosyncratic process, tends to be thoroughly and disastrously misunderstood by managers and leaders. …”
    Libro electrónico
  14. 43714
    “…Des efforts supplémentaires seraient en outre nécessaires pour réduire les pertes et le gaspillage alimentaires et limiter la surconsommation de calories et de protéines. …”
    Libro electrónico
  15. 43715
    “…L’industrie spatiale proprement dite constitue un domaine d’activité relativement limité par rapport aux autres industries manufacturières, mais son dynamisme technologique et son importance stratégique lui confèrent un rôle de plus en plus crucial dans la société moderne. …”
    Libro electrónico
  16. 43716
    “…Les essais au champ visent à (1) quantifier la teneur en résidu(s) à laquelle s’attendre après un traitement conforme aux bonnes pratiques agricoles en vigueur ou proposées; (2) déterminer, le cas échéant, le taux de dissipation du ou des résidus de produits phytosanitaires dans les cultures considérées; (3) déterminer des paramètres telles que la « valeur médiane des résidus en essais contrôlés » ou la « valeur de résidu la plus élevée », afin d’évaluer les risques alimentaires; enfin, (4) en déduire les limites maximales de résidus (LMR). La présente ligne directrice pour les essais au champ de plantes cultivées exige un échantillon provenant de parcelles traitées à chaque intervalle d’échantillonnage pour les cultures qui font l’objet de huit essais ou plus. …”
    Libro electrónico
  17. 43717
    “…L'inflation a dépassé la limite supérieure de la fourchette retenue comme objectif par la banque centrale, sur fond de demande vigoureuse et de tensions sur le marché du travail. …”
    Libro electrónico
  18. 43718
    Publicado 2007
    “…Network Admission Control (NAC) uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources, thereby limiting damage from emerging security threats. NAC allows network access only to compliant and trusted endpoint devices (PCs, servers, and PDAs, for example) and can restrict the access of and even remediate noncompliant devices. …”
    Libro electrónico
  19. 43719
    Publicado 2007
    “…You’ll learn how to: • Recognize dangerous limitations in conventional endpoint security strategies • Identify the best products, tools, and processes to secure your specific devices and infrastructure • Configure new endpoints securely and reconfigure existing endpoints to optimize security • Rapidly identify and remediate compromised endpoint devices • Systematically defend against new endpoint-focused malware and viruses • Improve security at the point of integration between endpoints and your network Whether you’re a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you’ve been searching for: a comprehensive endpoint security strategy that works. …”
    Libro electrónico
  20. 43720
    por Lee, Kok-Keong
    Publicado 2005
    “…With Building Resilient IP Networks , you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. …”
    Libro electrónico