Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
901por Doar, MatthewTabla de Contenidos: “…; Naming Branches and Tags; Merge Madness; Security; Access Wars; Filenames to Avoid; Backups and SCM; Backing up CVS; SCM Tools; CVS; Making your life with CVS easier; Subversion; Arch; Perforce; BitKeeper; ClearCase; Visual SourceSafe; Comparison of SCM Tools; Wider Uses of SCM; Checklist; Building Software; How Software Gets Built…”
Publicado 2005
Libro electrónico -
902por Henderson, CalTabla de Contenidos: “…Source-Control ProductsThe Revision Control System (RCS); The Concurrent Versions System (CVS); Subversion (SVN); Perforce; Visual Source Safe (VSS); And the rest...; Summary; What to Put in Source Control; Documentation; Software configurations; Build tools; What Not to Put in Source Control; One-Step Build; Editing Live; Creating a Work Environment; Development; Staging; Production; The Release Process; Build Tools; Release Management; What Not to Automate; Database schema changes; Software and hardware configuration changes; Issue Tracking; The Minimal Feature Set; Issue-Tracking Software…”
Publicado 2006
Libro electrónico -
903por Boyce, JimTabla de Contenidos: “…Protection Against Web BeaconsAttachment and Virus Security; Macro Viruses; Digital Signatures; Message Encryption; Security Labels; Understanding Outlook Service Options; Options for Starting Outlook; Safe Mode Startup; Starting Outlook Automatically; Adding Outlook to the Quick Launch Bar; Changing the Outlook Shortcut; Use RUNAS to Change User Context; Startup Switches; Choosing a Startup View; Creating Shortcuts to Start New Outlook Items; 2. …”
Publicado 2009
Libro electrónico -
904por Gourley, DavidTabla de Contenidos: “…For More InformationHTTP Messages; The Flow of Messages; Messages Commute Inbound to the Origin Server; Messages Flow Downstream; The Parts of a Message; Message Syntax; Start Lines; Request line; Response line; Methods; Status codes; Reason phrases; Version numbers; Headers; Header classifications; Header continuation lines; Entity Bodies; Version 0.9 Messages; Methods; Safe Methods; GET; HEAD; PUT; POST; TRACE; OPTIONS; DELETE; Extension Methods; Status Codes; 100-199: Informational Status Codes; Clients and 100 Continue; Servers and 100 Continue; Proxies and 100 Continue…”
Publicado 2002
Libro electrónico -
905por Harrington, Richard, 1972-Tabla de Contenidos: “…Standard Definition Broadcast-Safe Concerns…”
Publicado 2007
Libro electrónico -
906por Beale, JayTabla de Contenidos: “…Factors that Can Affect Scanner OutputPlugin Selection; The Role of Dependencies; Safe Checks; no404.nasl; Ping the Remote Host; Portscanner Settings; Proxies, Firewalls, and TCP Wrappers; Valid Credentials; KB Reuse and Differential Scanning; And Many More...; Scanning Web Servers and Web Sites; Web Servers and Load Balancing; Bugs in the Plugins; Additional Reading; Configuration Files; NASL; The Nessus KB; The Nessus Logs; Forums and Mailing Lists; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6: Vulnerability Types; Introduction; Critical Vulnerabilities…”
Publicado 2008
Libro electrónico -
907
-
908por McConnell, SteveTabla de Contenidos: “…Estimate InfluencesDiseconomies of Scale; When You Can Safely Ignore Diseconomies of Scale; Importance of Diseconomy of Scale in Software Estimation; 5.2. …”
Publicado 2009
Libro electrónico -
909por Thompson, RoyTabla de Contenidos: “…Chapter Six - Working Practices and General GuidelinesCommunicating with Talent; Shooting a Big Close-Up or Extreme Close-Up; Ensure an Eye Light; Safe Action Line and Domestic Cutoff; Follow Action with Loose Pan and Tilt Tripod Head; Shooting Overlapping Action for the Edit; Continuity of Action; Matching Speed of Action; Overlapping Too Much Action; Shooting Ratio; Storyboards and Shot Lists; Always Have Something in Focus; Frame for Correct ""Look Room"" on Shots That Will Edit Together; Shoot Matching Camera Angles When Covering Dialogue…”
Publicado 2009
Libro electrónico -
910Publicado 2009Tabla de Contenidos: “…Statistical Analysis with Excel for Dummies; About the Author; Dedication; Author's Acknowledgments; Contents at a Glance; Table of Contents; Introduction; About This Book; What You Can Safely Skip; Foolish Assumptions; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Part I: Statistics and Excel: A Marriage Made in Heaven; Chapter 1: Evaluating Data in the Real World; The Statistical (And Related) Notions You Just Have to Know; Inferential Statistics: Testing Hypotheses; What's New in Excel?…”
Libro electrónico -
911Publicado 2008Tabla de Contenidos: “…SummarySolutions Fast Track; Frequently Asked Questions; Chapter 4: Malware Detection and the Mac; Introduction; Safe Out of the Box?; Anti-malware Technology; More About EICAR; Classic Anti-malware Detection Techniques; Signature Scanning; Heuristics Revealed; Anti-malware Products; Anti-malware Before OS X; Disinfectant; Anti-malware and OS X; avast!…”
Libro electrónico -
912por McFedries, PaulTabla de Contenidos: “…Getting the Most Out of the RegistryTaking a Tour of the Registry; Understanding Registry Settings; Getting to Know the Registry's Root Keys; HKEY_CURRENT_USER (HKCU); HKEY_USERS (HKU); HKEY_CURRENT_CONFIG (HKCC); Understanding Hives and Registry Files; Keeping the Registry Safe; Saving the Current Registry State with System Restore; Protecting Keys by Exporting Them to Disk; Importing a .reg File; Working with Registry Keys and Settings; Editing a DWORD Value; Editing a Binary Value; Editing a .reg File; Creating a .reg File; Renaming a Key or Setting; Creating a New Key or Setting…”
Publicado 2009
Libro electrónico -
913Publicado 2014Tabla de Contenidos: “…Windows Explorer Integration with Team Foundation ServerAccess to Team Foundation Server via Other Third-Party Integrations; What's New in Team Foundation Server 2013; Version Control; Web Access; Agile Portfolio Management; Release Management; The Cloud; Adopting Team Foundation Server; Summary; Chapter 3 Using Centralized Team Foundation Version Control; Team Foundation Version Control and Visual SourceSafe (VSS) 2005; Setting Up Version Control; Using Source Control Explorer; Setting Up Your Workspace; Getting Existing Code; Sharing Projects in Version Control; Check-In Pending Changes…”
Libro electrónico -
914por Dasnois, BenjaminTabla de Contenidos: “…Explicitly typed variablesStatic typing; Values with several types; Defining a type; Inheritance; Multi-inheritance; Implementing an interface; Representing a blog article; Time for action - representing different types of articles; Function's type; Expressing a function's type; Functions using functions; Dynamic functions; Anonymous objects; Duck typing; Creating a function to apply another one; Time for action - applying a function on every item; Type inference; Assigning a value; Assigning the value of the variable to another one; Passing the variable as a parameter; Casting; Safe casting…”
Publicado 2011
Libro electrónico -
915por Spotted Eagle, DouglasTabla de Contenidos: “…Chromakey CompositingChapter 6 Titling Tools and Text Techniques; Basic Titles; Play It Safe; Roll the Credits; The Star Wars look; Create a Lower-Third Graphic in Vegas Movie Studio; Add a Fade-In to the Lower-Third Graphic; Creating a Different Type of Lower-Third; Add a ""Bug""; Chapter 7 Sound Off!…”
Publicado 2005
Libro electrónico -
916por Gratton, Dean A.Tabla de Contenidos: “…Personal-area; Generations of Wireless Technology; Wireless Convergence; Manufacturers' Refocus of Consumer Perception and Usage Models; Summary; Chapter 4: Can we Confidently Rely on Wireless Communication?; How Safe is Your House?; Encryption Principles; It's All About Adopting a Common Sense Approach to Wireless Security; Enabling Intelligent Connectivity; Coexistence and Interoperation; Summary; Chapter 5: Realizing a True Wireless Life-style Vision; Defining Quantitative Needs for Technology…”
Publicado 2006
Libro electrónico -
917por Thurrott, Paul AlanTabla de Contenidos: “…Finding and Acquiring Games for Windows 8Finding and Acquiring Desktop Games; Xbox LIVE and Windows 8; Summary; Chapter 11: Storage, Backup, and Recovery; Storage Basics: NTFS Today, ReFS Tomorrow; Storage Spaces; File History; Using the Windows 8 Recovery Tools; Accessing System Image Backup and Recovery Functionality with Windows Backup; What's Missing: Cloud Backup; Summary; Chapter 12: Accounts and Security; User Accounts; Security and Windows 8: Keeping Your PC Safe; Summary; Chapter 13: Networking and Connectivity; What Was Old Is New Again…”
Publicado 2012
Libro electrónico -
918por Cummings, ChipTabla de Contenidos: “…Surviving EvictionsKeeping Your Property Safe; Paying Taxes; Rapid Liquidation; Creating Long-Term Wealth Using Installments; Property: 3-unit multi-family house with detached garage; Zero Risk Liquidation Results; Rinse and Repeat; Chapter 8: Advanced Strategies; Using Traditional Funding; Tapping into Private Money; Corporate Investing; Locating Investment Capital; Investing Using Retirement Accounts; Tax Strategies; Unique Types of Property Deals; Chapter 9: Tracking Your Investments; Setting Up a Simple System; Accruals and Yield Information; Maintaining Contacts and Lien Lists…”
Publicado 2013
Libro electrónico -
919por Hart, ColinTabla de Contenidos: “…Graphics, Titles and Rostrum Cameras; Graphics; Title Safe; Captions; Mattes; Choosing a Graphics Designer; The Process; A Few Design Principles; Creating Your Own Graphics; Opening Titles; Animation; Rostrum Camera; Illustrations…”
Publicado 1999
Libro electrónico -
920por Gousset, MickeyTabla de Contenidos: “…Windows Explorer Integration with Team Foundation ServerAccess to Team Foundation Server via other Third-Party Integrations; What's New in Team Foundation Server 2012; Version Control; Web Access; Team Explorer; Teams; Work Item Tracking; The Cloud; Adopting Team Foundation Server; Summary; Chapter 3: Team Foundation Version Control; Team Foundation Version Control and Visual SourceSafe (VSS) 2005; Setting Up Version Control; Using the Source Control Explorer; Setting Up Your Workspace; Getting Existing Code; Sharing Projects in Version Control; Check-In Pending Changes; Checking In an Item…”
Publicado 2012
Libro electrónico