Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 582
- Historia 492
- Development 379
- Management 335
- Application software 296
- Filosofía 294
- Matemáticas 262
- Electrónica 250
- Economics 246
- Computer programs 241
- Engineering & Applied Sciences 228
- Artificial intelligence 223
- Data processing 221
- Philosophy 214
- Computer networks 183
- Cloud computing 177
- Social aspects 177
- Materiales 172
- Mecánica 169
- Business & Economics 159
- Computer Science 154
- Crítica e interpretación 154
- Business 150
- Derecho 149
- Politics and government 149
- Law and legislation 148
- Technological innovations 147
- Education 140
- Lengua inglesa 139
- Database management 138
-
44441Publicado 2017“…Move beyond the limitations of programming standards and license agreements and get back to animating with a new edition of the bestselling How to Cheat in Adobe Flash, the real world guide to developing dynamic and fun Flash content. …”
Libro electrónico -
44442Publicado 2018“…Deep Reinforcement Learning Hands-On is a comprehensive guide to the very latest DL tools and their limitations. You will evaluate methods including Cross-entropy and policy gradients, before applying them to real-world environments. …”
Libro electrónico -
44443Publicado 2017“…About This Book Perform essential database tasks such as benchmarking the database and optimizing the server’s memory usage Learn ways to improve query performance and optimize the PostgreSQL server Explore a wide range of high availability and replication mechanisms to build robust, highly available, scalable, and fault-tolerant PostgreSQL databases Who This Book Is For If you are a developer or administrator with limited PostgreSQL knowledge and want to develop your skills with this great open source database, then this book is ideal for you. …”
Libro electrónico -
44444Publicado 2017“…Installing: Download and store the installer where it won't be deleted, with special tips for people who want to install on multiple Macs or who have bandwidth limitations. And, although running the installer will be easy for many people, you'll find full steps for what to click and when. …”
Libro electrónico -
44445por Monnox, Alan“…—Martin Westacott, Director and Senior Consultant, Solstice Software Limited, U.K. "If you ever needed to put some polish to your J2EE development understanding or would like to move into the role of Senior J2EE Developer, then this is the book for you. …”
Publicado 2005
Libro electrónico -
44446Publicado 2023“…What You Will Learn Create Oracle databases on Linux and Windows platforms Perform fundamental DBA tasks on Oracle databases Manage Oracle database files and database storage structures Implement backup and recovery plans Apply patches and upgrade databases Deploy Oracle Restart configuration Audience This course is designed for IT graduates and individuals who aspire to become professional Oracle Database Administrators (DBAs). Whether you have limited knowledge or no experience in Oracle databases, this course is tailored to guide you from beginner to proficient level. …”
Video -
44447Publicado 2023“…It’s also a must-read for tech-savvy entrepreneurs looking to build a competitive edge for their products and go beyond the limitations of traditional machine learning…”
Libro electrónico -
44448Publicado 2017“…Apply core security techniques including 2FA and strong passwords Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods Use the security-focused Tails distribution as a quick path to a hardened workstation Compartmentalize workstation tasks into VMs with varying levels of trust Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can't be used Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream Set up standalone Tor services and hidden Tor services and relays Secure Apache and Nginx web servers, and take full advantage of HTTPS Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC Systematically protect databases via network access control,..…”
Libro electrónico -
44449Publicado 2018“…However, security has always been a major concern. With limited resources available in the Linux security domain, this book will be an invaluable guide in helping you get your Linux systems properly secured. …”
Libro electrónico -
44450por Organisation de coopération et de développement économiques.“…Il est recommandé que la substance d’essai soit administrée dans la nourriture ou dans la boisson. Un essai limite peut être effectué si aucun effet n’est attendu à une dose de 1000 mg/kg poids corporel/j. …”
Publicado 2019
Libro electrónico -
44451por Organisation de coopération et de développement économiques.“…La dégradation est suivie en analysant l'oxygène sur une période de 28 jours, mais si la valeur du témoin pour la demande biologique en oxygène reste en dessous d’une limite de 30 %, l'essai pourra être prolongé. Vingt-quatre bouteilles au moins sont utilisées (8 pour la substance d'essai, 8 pour le composé de référence et 8 pour l’eau de mer avec des nutriments). …”
Publicado 1992
Libro electrónico -
44452Publicado 2023“…With the help of practical examples and use cases, you'll not only gain a thorough understanding of a command's syntax but also grasp its functional breadth and limitations. The book also explores commands frequently used by system administrators to check network card statistics and firewall rules. …”
Libro electrónico -
44453Publicado 2023“…He learned to code about seven years ago. He had limited access to training resources back then. Whilst he learned to code, he also realized the need to change the way that people learn to code. …”
Video -
44454por Augen, Jeffrey“…Drawing on more than a decade of never-before-published research, Augen provides new analytical techniques that every experienced options trader can use to study historical price changes, mitigate risk, limit market exposure, and structure mathematically sound high-return options positions. …”
Publicado 2008
Libro electrónico -
44455Publicado 2004“…Office solutions can overcome traditional limitations by using XML and Smart Documents. BONUS XML SKILLS SECTION! …”
Libro electrónico -
44456Publicado 2007“…Wilson’s work consistently pushes the limits, showing what can and cannot be done, and the tradeoffs involved.” …”
Libro electrónico -
44457Publicado 2003“…To build code that repels attack, readers need to be vigilant through each stage of the entire code lifecycle: Architecture: during this stage, applying security principles such as "least privilege" will help limit even the impact of successful attempts to subvert software. …”
Libro electrónico -
44458por Sayles, Leonard R.“…(Al) Rosen, Forensic Accountant, Rosen & Associates Limited Billions of dollars continue to be lost by companies a..…”
Publicado 2006
Libro electrónico -
44459Publicado 2008“…But Marcial’s track record isn’t limited to just one or two picks. In fact, recent analysis reveals that he’s beaten the indexes for a full decade . …”
Libro electrónico -
44460Publicado 2006“…Her Access skills are not limited to writing and programming. Alison has also been teaching Access and speaking at conferences for more than 12 years. …”
Libro electrónico