Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
2521Publicado 2022“…Wouldn't it be great to finally have all your photos organized, safe, accessible, findable, and shareable? With Declutter Your Photo Life by your side, you have just what you need to achieve photo bliss. …”
Libro electrónico -
2522Publicado 2019“…Skill Level Beginner to Intermediate What You Will Learn Develop, deploy, and manage Microservices via Kubernetes Develop, deploy, and manage Serverless applications via Kubernetes Use the Istio Service Mesh with Kubernetes Learn fast and safe deployment techniques: rolling updates, blue/green, canary, and dark launches Keep your applications Happy (Live) and Healthy (Ready) in Kubernetes Learn Microservices principles and core capabilities addressed by Kubernetes + Istio Service Mesh Learn about the current state of serverless architecture on Kubernetes Who Should Take This Course Software Developer Software Engineer Software Architect Course Requirements Prerequisites: Software developers who are already comfortable with Linux and the bash shell command line. …”
-
2523Publicado 2018“…You'll understand and fix common pitfalls, learn how to improve your productivity by using metaprogramming, and speed up your code by concurrently executing parts of it safely and easily. You will master the features of the language which will make you stand out and use them to really improve the efficiency of your algorithms The book begins with a gentle introduction to help you identify bottlenecks when programming in Rust. …”
Libro electrónico -
2524Publicado 2018“…This book will help you get to grips with safely setting up a UDP and TCP server/client. Finally, you will be guided through Unix time interfaces, multithreading, and error handling with C++ exceptions. …”
Libro electrónico -
2525Publicado 2016“…Implement goroutine, channels, and other concurrency primitives to write highly-concurrent and safe Go code Write tested and benchmarked code using Go’s built test tools Access OS resources by calling C libraries and interact with program environment at runtime In Detail The Go programming language has firmly established itself as a favorite for building complex and scalable system applications. …”
Libro electrónico -
2526Publicado 2017“…Immutable and persistent data structures are thread safe by definition and hence very appealing for writing robust concurrent programs. …”
Libro electrónico -
2527Publicado 2020“…The tasks include how to: Connect to the Internet, Bluetooth devices, Wi-Fi networks, and other iPhones and iPads; take advantage of AirDrop to instantly share with other iOS, iPadOS, and Mac users around you Use Siri to get information, write texts and emails, set reminders/appointments, and more–just by speaking to your iPhone Customize your iPhone with folders, wallpaper, ringtones, and much more Use iCloud, Google, and other cloud services to have consistent calendar, contact, and other information on all your devices Communicate via phone calls, FaceTime videoconferences, conference calls, text, email, and more Take advantage of the Messages app to instantly communicate with just about anyone, anywhere; send and receive photos and videos with a few simple taps Get the most out of Safari to browse the Web and Mail to manage all your email from one Inbox Use the Wallet app to manage boarding passes and loyalty cards; pay for purchases safely and securely with Apple Pay; and use other great iPhone apps Capture and edit photos and video; use great camera features such as telephoto zoom, portrait mode, burst photos, time-lapse and slow-motion video, and Live Photos View your photos in Memories and use them for wallpaper and for your contacts or share them via email, AirDrop, or texts; use iCloud to automatically save your photos Find, download, install, and use iPhone apps to help you travel, get information, keep in touch, have fun, and more…”
Libro electrónico -
2528Publicado 2019“…What you will learn Grasp monitoring fundamentals and implement them using Prometheus Discover how to extract metrics from common infrastructure services Find out how to take full advantage of PromQL Design a highly available, resilient, and scalable Prometheus stack Explore the power of Kubernetes Prometheus Operator Understand concepts such as federation and cross-shard aggregation Unlock seamless global views and long-term retention in cloud-native apps with Thanos Who this book is for If you're a software developer, cloud administrator, site reliability engineer, DevOps enthusiast or system admin looking to set up a fail-safe monitoring and alerting system for sustaining infrastructure security and performance, this book is for you. …”
Libro electrónico -
2529Publicado 2015“…It gives comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use, and functionality, giving tips on counterintelligence, safe practices, and debunking myths about online privacy. …”
Libro electrónico -
2530Publicado 2015“…This book helps companies integrate compelling sharing motivators and controls for consumers to feel motivated and safe about directly sharing their product and exp..…”
Libro electrónico -
2531Publicado 2014“…Building For Operations Steven Murawski, Nick Craver, and George Beech from Stack Exchange Examine how Stack Exchange manages network infrastructure by building everything with operations in mind. The Secret of Safe, Continuous Deployment: Perceptual Diffs Brett Slatkin (Google) Discover how Google made continuous development work—and why their team is happier and more productive. …”
-
2532Publicado 2014“…14 types of hostile mobs Get friendly mobs on your side and build automated farms Brew potions to cure ills, gain superpowers, and to throw at enemies Transform your shelter into a palace (or a secret underwater base) Create customized worlds with unique seeds Learn the secrets of redstone devices and build incredible rail systems Play safely through The Nether and The End Play with up to eight of your friends on PlayStation, or run in splitscreen mode Stephen O’Brien is an Australian-born writer and entrepreneur now residing in Sydney after too many years in Silicon Valley. …”
Libro electrónico -
2533Publicado 2015“…Embrace the new world of fiance by leveraging the power of crypto-currencies using Bitcoin and the Blockchain About This Book Set up your own wallet, buy and sell Bitcoin, and execute custom transactions on the Blockchain Leverage the power of Bitcoin to reduce transaction costs and eliminate fraud A practical step-by-step guide to break down the Bitcoin technology to ensure safe transactions Who This Book Is For If you are familiar with online banking and want to expand your finances into a resilient and transparent currency, this book is ideal for you. …”
Libro electrónico -
2534Publicado 2017“…It has some interesting concepts and features such as immutability, gradual typing, thread-safe concurrency primitives, and macro-based metaprogramming, which makes it a great choice to create modern, performant, and scalable applications. …”
Libro electrónico -
2535por Barnett, Ryan C.“…With this book, you will learn to Address the OS-related flaws most likely to compromise Web server security Perform security-related tasks needed to safely download, configure, and install Apache Lock down your Apache httpd.conf file and install essential Apache security modules Test security with the CIS Apache Benchmark Scoring Tool Use the WASC Web Security Threat Classification to identify and mitigate application threats Test Apache mitigation settings against the Buggy Bank Web application Analyze an Open Web Proxy Honeypot to gather crucial intelligence about attackers Master advanced techniques for detecting and preventing intrusions…”
Publicado 2005
Libro electrónico -
2536Publicado 2016“…What You'll Learn Review how people perceive risk and the effects it has on information security See why different perceptions of risk within an organization matters Understand and reconcile these differing risk views Gain insights into how to safely enable the use of new technologies Who This Book Is For The primary audience is CIOs and other IT leaders, CISOs and other information security leaders, IT auditors, and other leaders of corporate governance and risk functions. …”
Libro electrónico -
2537por Welch, Brent B.“…Brent Welch, Ken Jones, and Jeffrey Hobbs, three of the world1s leading Tcl/Tk experts, cover every facet of Tcl/Tk programming, including cross-platform scripting and GUI development, networking, enterprise application integration, and much more.Coverage includes: Systematic explanations and sample code for all Tcl/Tk 8.4 core commands Complete Tk GUI development guidance-- perfect for developers working with Perl, Python, or Ruby Insider's insights into Tcl 8.4's key enhancements: VFS layer, internationalized font/character set support, new widgets, and more Definitive coverage of TclHttpd web server--written by its creator New ways to leverage Tcl/Tk 8.4's major performance improvements Advanced coverage: threading, Safe Tcl, Tcl script library, regular expressions, and namespaces Whether you1re upgrading to Tcl/Tk 8.4, or building GUIs for applicationscreated with other languages, or just searching for a better cross-platformscripting solution, Practical Programming in Tcl and Tk, Fourth Edition delivers all you need to get results! …”
Publicado 2003
Libro electrónico -
2538por Seacord, Robert C.“…If you're responsible for creating secure C or C++ software--or for keeping it safe--no other book offers you this much detailed, expert assist..…”
Publicado 2006
Libro electrónico -
2539Publicado 2019“…By the end of this book, you'll be well-versed with electronic trading markets and have learned to implement, evaluate and safely operate algorithmic trading strategies in live markets. …”
Libro electrónico -
2540Publicado 2020“…By the end of this Rust book, you will have learned how to build fast and safe applications with Rust and have the real-world experience you need to advance in your career. …”
Libro electrónico