Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,069
- Development 719
- Engineering & Applied Sciences 658
- Application software 600
- Management 559
- Computer Science 446
- Computer networks 435
- Security measures 361
- Data processing 331
- Python (Computer program language) 314
- Computer programs 312
- Computer security 312
- Social aspects 305
- Computer programming 270
- Politics and government 262
- Design 261
- Historia 260
- History and criticism 260
- Computer software 257
- Cloud computing 256
- Database management 248
- Operating systems (Computers) 240
- Web sites 221
- Java (Computer program language) 214
- Philosophy 212
- Web site development 207
- Programming 204
- Electrical & Computer Engineering 202
- Examinations 198
- Microsoft .NET Framework 188
-
19261Publicado 2016“…Next find out how to take advantage of managing common identities with the Microsoft Identity Manager 2016 and build cloud identities with the Azure AD Connect utility. …”
Libro electrónico -
19262por Wandschneider, Marc“…Build Node.js solutions that leverage current JavaScript skills Master Node.js nonblocking IO and async programming Handle more requests and increase an application’s flexibility Use and write modules Perform common JSON/web server tasks Use browsers to generate pages on the fly via Ajax calls and template libraries Simplify development with the Express framework Create database back-ends using popular NoSQL and relational databases Deploy and run Node.js apps on Unix/macOS or Windows servers Deploy apps to Heroku and Microsoft Azure Support virtual hosts and SSL/HTTPS security Test Node.js programs that mix synchronous, async, and RESTful server API functionality…”
Publicado 2017
Libro electrónico -
19263Publicado 2017“…IBM PowerVC includes the following features and benefits: Virtual image capture, deployment, and management Policy-based virtual machine (VM) placement to improve use Management of real-time optimization and VM resilience to increase productivity VM Mobility with placement policies to reduce the burden on IT staff in a simple-to-install and easy-to-use graphical user interface (GUI) Role-based security policies to ensure a secure environment for common tasks The ability to enable an administrator to enable Dynamic Resource Optimization on a schedule IBM Cloud PowerVC Manager includes all of the IBM PowerVC Standard Edition features and adds: A Self-service portal that allows the provisioning of new VMs without direct system administrator intervention. …”
Libro electrónico -
19264Publicado 2016“…Begin by examining the building blocks used by Docker to implement fundamental containing networking before learning how to consume built-in networking constructs as well as custom networks you create on your own. Next, explore common third-party networking plugins, including detailed information on how these plugins inter-operate with the Docker engine. …”
Libro electrónico -
19265Publicado 2017“…Build high-performance concurrent systems from simple, low-level concurrency primitives Express asynchrony in concurrent computations with futures and promises Seamlessly accelerate sequential programs by using data-parallel collections Design safe, scalable, and easy-to-comprehend in-memory transactional data models Transparently create distributed applications that scale across multiple machines Integrate different concurrency frameworks together in large applications Develop and implement scalable and easy-to-understand concurrent applications in Scala 2.12 In Detail Scala is a modern, multiparadigm programming language designed to express common programming patterns in a concise, elegant, and type-safe way. …”
Libro electrónico -
19266Publicado 2016“…And, you’ll become familiar with the pre-employment testing and assessments increasingly common today. What are you waiting for? Your personal coaching session awaits…”
Libro electrónico -
19267Publicado 2018“…What You Will Learn Create a safe and isolated lab environment for malware analysis Extract the metadata associated with malware Determine malware's interaction with the system Perform code analysis using IDA Pro and x64dbg Reverse-engineer various malware functionalities Reverse engineer and decode common encoding/encryption algorithms Perform different code injection and hooking techniques Investigate and hunt malware using memory forensics In Detail Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. …”
Libro electrónico -
19268Publicado 2018“…By the end of this book, you will be well-versed in using deep neural networks to solve common problems in big data analysis. What you will learn Use ensemble algorithms to obtain accurate predictions Apply dimensionality reduction techniques to combine features and build better models Choose the optimal hyperparameters using cross-validation Implement different techniques to solve current challenges in the predictive analytics domain Understand various elements of deep neural network (DNN) models Implement neural networks to solve both classification and regression problems Who this book is for Mastering Predictive Analytics with scikit-learn and TensorFlow is for data analysts, software engineers, and machine learning developers who are interested in implementing advanced predictive analytics using Python. …”
Libro electrónico -
19269Publicado 2017“…In this book you will learn all the important Machine Learning algorithms that are commonly used in the field of data science. These algorithms can be used for supervised as well as unsupervised learning, reinforcement learning, and semi-supervised learning. …”
Libro electrónico -
19270Publicado 2018“…Key Features Resolve common challenges and problems faced in the Blockchain domain Study architecture, concepts, terminologies, and Dapps Make smart choices using Blockchain for personal and business investments Book Description Blockchain Quick Reference takes you through the electrifying world of blockchain technology and is designed for those who want to polish their existing knowledge regarding the various pillars of the blockchain ecosystem. …”
Libro electrónico -
19271Publicado 2020“…What you will learn Understand investigative processes, the rules of evidence, and ethical guidelines Recognize and document different types of computer hardware Understand the boot process covering BIOS, UEFI, and the boot sequence Validate forensic hardware and software Discover the locations of common Windows artifacts Document your findings using technically correct terminology Who this book is for If you're an IT beginner, student, or an investigator in the public or private sector this book is for you.This book will also help professionals and investigators who are new to incident response and digital forensics and interested in making a career in the cybersecurity domain…”
Libro electrónico -
19272Publicado 2015“…What You Will Learn Build a comprehensive library of QlikView components to speed up your developments Define a practical roadmap that will help you build business-driven dashboards Explore the most effective and engaging ways to present data Apply the best practices in the field of data visualization Avoid common pitfalls when creating bar, line and pie charts Create robust visualizations such as heat maps, histograms and scatter plots In Detail QlikView is one of the most powerful analytical tools in the market. …”
Libro electrónico -
19273Publicado 2014“…The chapters of this book provide a specific reference architecture for many of the architectural domains that are each important for a large enterprise to establish common strategy, efficiency, and balance. The majority of the most important architectural domain topics, such as integration, process optimization, master data management, mobile access, Enterprise Content Management, business intelligence, DevOps, security, systems monitoring, and so on, are covered in the book. …”
Libro electrónico -
19274Publicado 2015“…What You Will Learn Understand how to manage a set of APIs Discover the differences and similarities between API Management and SOA Governance, and where and how these two disciplines converge into Application Services Governance (ASG) Grasp information about ASG and how to define an ASG governance framework Understand the challenges for organizations looking to expose APIs to the external world. Identify common scenarios and how to solve them Define an Oracle API management deployment topology Install and configure Oracle API Catalog (OAC), Oracle API Manager (OAPIM), and Oracle API Gateway (OAG) Learn about API subscriptions and API community management with the OAPIM portal Implement Oracle API Manager (OAPIM) including creation, publishing, management and deprecation of APIs In Detail Oracle SOA Governance is a comprehensive, service-orientated governance solution that is designed to make the transition to SOA easier. …”
Libro electrónico -
19275Publicado 2014“…Starting with the Strategic/Executive dashboard, we’ll design a few of the most common dashboard elements and assemble our first complete dashboard. …”
-
19276Publicado 2016“…Covers iOS 9 for all models of iPad Air, iPad mini, iPad Pro, iPad 3rd/4th generation, and iPad 2 Step-by-step instructions for the tasks you care about most Large, full-color, close-up photos show you exactly what to do Common-sense help whenever you run into problems Tips and notes to help you do even more Written for seniors, the full-color, step-by-step tasks–in legible print–walk you through getting and keeping your iPad working just the way you want. …”
Libro electrónico -
19277Publicado 2014“…By learning from the common mistakes of others, you can avoid making those mistakes yourself—and possibly skip a few rungs on the corporate ladder. …”
Libro electrónico -
19278Publicado 2015“…The book starts by explaining the building blocks of the Python programming language, especially ctypes in-depth, along with how to automate typical tasks in file system analysis, common correlation tasks to discover anomalies, as well as templates for investigations. …”
Libro electrónico -
19279Publicado 2014“…Covers iPhone 6, iPhone 6 Plus, iPhone 5s, iPhone 5c, and older iPhone models Offers five full-color books of content that add up to nearly 600 pages of material—big bang for your buck Provides steps for setting up your iPhone and synching with iCloud Includes complementary online video course material Walks through troubleshooting and fixing common iPhone problems Whether this is your first iPhone or an upgrade to the latest version, iPhone All-in-One For Dummies helps you unlock all of its incredible capabilities…”
Libro electrónico -
19280Publicado 2015“…The chapters of this book provide a specific reference architecture for many of the architectural domains that are each important for a large enterprise to establish common strategy, efficiency, and balance. The majority of the most important architectural domain topics, such as integration, process optimization, master data management, mobile access, Enterprise Content Management, business intelligence, DevOps, security, systems monitoring, and so on, are covered in the book. …”
Libro electrónico