Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- General 1,407
- Ciencias sociales 593
- Historia 529
- Social Science 476
- Derecho 472
- Law 460
- Medicina 441
- Economía 414
- Science 398
- Ciencias 378
- Medical 352
- Psicología 348
- Psychology 344
- Biblia 332
- Filosofía 313
- Ciencias políticas 310
- Educación 270
- Political Science 263
- Business and Economics 244
- Naturaleza 234
- Tecnología 233
- Negocios y economía 229
- Education 228
- Nature 217
- Philosophy 211
- Technology 209
- Economics 199
- History 191
- Linux 165
- Mexico 152
-
26721por Foguet i Boreu, Francesc, 1971-“…"La diáspora de los republicanos catalanes hacia países de Europa o de América tras la derrota de 1939 cortó de raíz el proceso de modernización de la cultura y el teatro catalanes y los situó de súbito en el exilio, sin ninguna otra red efectiva a la que vincularse que la de los casals o centres ya existentes. …”
Publicado 2016
Libro -
26722Publicado 2013“…La obra esta dirigida a los bibliotecarios y a los usuarios de las bibliotecas academicas y especializadas, alumnos, docentes, investigadores, y otros especialistas de la informacion, que necesitan contar con datos actualizados que se encuentran en la red, que deben conocer como evaluarlos y como aprehenderlos, para utilizarlos en la ejecucion y presentacion de sus trabajos…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
26723Publicado 2014“…Es, por si el lector aún no lo había adivinado, un libro en red que no desea mantenerse en pie sin a la vez desorganizarse para conectar más y mejor con lo que sucede y hay ahí fuera. …”
Libro electrónico -
26724por Pedroso Filiberto, Eduardo A.“…Con la creación del Servicio de Cardiología Pediátrica en Camagüey (1983), y después, de la Red Cardiopediátrica Nacional (1986), comenzó la atención diferenciada a las niñas y niños cardiópatas. …”
Publicado 2008
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
26725Publicado 2011“…Hay un texto en la red con una metáfora poderosa, la Catedral y el Bazar, sobre las estrategias para desarrollar software: Top-Down [TD] y Bottom-Up (BU). …”
Electrónico -
26726Publicado 2019“…What you will learn Learn how to build malware classifiers to detect suspicious activities Apply ML to generate custom malware to pentest your security Use ML algorithms with complex datasets to implement cybersecurity concepts Create neural networks to identify fake videos and images Secure your organization from one of the most popular threats - insider threats Defend against zero-day threats by constructing an anomaly detection system Detect web vulnerabilities effectively by combining Metasploit and ML Understand how to train a model without exposing the training data Who this book is for This book is for cybersecurity professionals and security researchers who are looking to implement the latest machine learning techniques to boost computer security, and gain insights into securing an organization using red and blue team ML. This recipe-based book will also be useful for data scientists and machine learning developers who want to experiment with smart techniques in the cybersecurity domain. …”
Libro electrónico -
26727Publicado 2016“…Mit Geschichten zum Erfolg in Content Marketing, PR, Social Media, Employer Branding und Leadership Storytelling als Basis für modernes Content Marketing Wirkung und Erzählformate guter Geschichten Zahlreiche anschauliche Beispiele und praktische Checklisten zur Ideenfindung Storytelling ist für Marketingabteilungen das neue Fundament in der Kundenkommunikation über alte und neue Kanäle wie PR, Content Marketing und Social Media. Marken wie Red Bull, Apple, Coca-Cola, Dove oder airbnb sind heutzutage in aller Munde, wenn es um Brand Storytelling geht. …”
Libro electrónico -
26728“…What You’ll Learn: Understand the basics of the most popular open source tools—Vagrant, Packer, Terraform, and Ansible—and how to use them in the context of deploying and scaling a SharePoint farm Use Vagrant to build SharePoint development environments in less than an hour, and add automated testing Use Packer to create a “golden image” with preconfigured settings, and then use it as the base image in your Terraform configuration for both AWS and Azure farms Use Terraform to scale your SharePoint farm topology Use Red Hat’s Ansible Playbooks to perform configuration management on your farm Use Terraform to deploy immutable infrastructure environments using IaC (Infrastructure as Code) Use InSpec 2.0 to stay in compliance by testing your cloud infrastructure Use Ansible to apply Microsoft updates and patches This book is for IT pros and developers who are looking to expand their knowledge and take a modern approach by using open source technologies to work with Microsoft products. …”
Libro electrónico -
26729Publicado 2015“…Type more accurately: Add the autocorrect dictionary groups from Smile and how to create your own autocorrection options, so you'll spend less time fixing common typing mistakes or going red-faced when you spot an egregious error too late. …”
Libro electrónico -
26730Publicado 2015“…You will also discover how to easily integrate applications with other AWS services like EMR, S3, CloudSearch, RedShift etc. A couple of chapters talk in detail about how to use DynamoDB as a backend database and hosting it on AWS ElasticBean. …”
Libro electrónico -
26731Publicado 2015“…Sander has been teaching Red Hat, SUSE, and LPI Linux classes since 1994. …”
-
26732Publicado 2024“…What you will learn Explore the core elements of APIs and their collaborative role in API development Understand the OWASP API Security Top 10, dissecting the root causes of API vulnerabilities Obtain insights into high-profile API security breaches with practical examples and in-depth analysis Use API attacking techniques adversaries use to attack APIs to enhance your defensive strategies Employ shield-right security approaches such as API gateways and firewalls Defend against common API vulnerabilities across several frameworks and languages, such as .NET, Python, and Java Who this book is for This book is for application security engineers, blue teamers, and security professionals looking forward to building an application security program targeting API security. For red teamers and pentesters, it provides insights into exploiting API vulnerabilities. …”
Libro electrónico -
26733Publicado 2024“…A Linux enthusiast, he's skilled in Red Hat and Ubuntu, and has a long-standing connection with macOS and Apple products since the mid-90s. …”
Video -
26734Publicado 2023“…By the end of this book, you’ll have enhanced your ability to find and exploit web vulnerabilities.What you will learnUnderstand the mindset, methodologies, and toolset needed to carry out web attacksDiscover how SAML and SSO work and study their vulnerabilitiesGet to grips with WordPress and learn how to exploit SQL injectionFind out how IoT devices work and exploit command injectionFamiliarize yourself with ElectronJS applications and transform an XSS to an RCEDiscover how to audit Solidity’s Ethereum smart contractsGet the hang of decompiling, debugging, and instrumenting web applicationsWho this book is forThis book is for anyone whose job role involves ensuring their organization's security – penetration testers and red teamers who want to deepen their knowledge of the current security challenges for web applications, developers and DevOps professionals who want to get into the mindset of an attacker; and security managers and CISOs looking to truly understand the impact and risk of web, IoT, and smart contracts. …”
Libro electrónico -
26735Publicado 2008“…SERIES EDITOR CHRISTOPHER NEGUS is the bestselling author of the Red Hat Linux Bible series, Linux Toys series, and this se..…”
Libro electrónico -
26736Publicado 2010“…—Jeffrey Gitomer, bestselling author of The Little Red Book of Selling “If you are serious about building trusting relationships and launching your business and life to new heights, then invest in yourself and buy this book.” …”
Libro electrónico -
26737Publicado 2018“…Whether you have a “MY MENU” camera model (the X-Pro2, X-T2, X-T20, X-E3, and X100F) or one of the “RED/BLUE” camera models (the X-Pro1, X-T1, X-T10, X100 models prior to the “F” model, the X-E1, X-E2, X-E2S, X70, and the X-A series, as well as the X10, X20, and X30), you’re certain to learn the ins and outs of your Fuji camera in order to improve your photography…”
Libro electrónico -
26738Publicado 2023“…What you will learn Understand and adopt the Microsoft infrastructure kill chain methodology Attack Windows services, such as Active Directory, Exchange, WSUS, SCCM, AD CS, and SQL Server Disappear from the defender's eyesight by tampering with defensive capabilities Upskill yourself in offensive OpSec to stay under the radar Find out how to detect adversary activities in your Windows environment Get to grips with the steps needed to remediate misconfigurations Prepare yourself for real-life scenarios by getting hands-on experience with exercises Who this book is for This book is for pentesters and red teamers, security and IT engineers, as well as blue teamers and incident responders interested in Windows infrastructure security. …”
Libro electrónico -
26739Publicado 2022“…Not having this book will be your 101st mistake. - Anupam Sengupta, Red Hat Learn good habits by identifying bad ones. …”
Grabación no musical -
26740Publicado 2022“…. - Apoorv Gupta, Facebook Finally, a much-needed introduction to streaming systems--a must-read for anyone interested in this technology. - Anupam Sengupta, Red Hat Tackles complex topics in a very approachable manner. - Marc Roulleau, GIRO A superb resource for helping you grasp the fundamentals of open-source streaming systems. - Simon Verhoeven, Cronos Explains all the main streaming concepts in a friendly way. …”
Grabación no musical