Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
1961Publicado 2020“…Is your business playing it safe-or taking the right risks?Risk is a regular part of business, but knowing which risks to take and when to step back is often unclear. …”
Grabación musical -
1962Publicado 2023“…, which hosts nine contributions that critically dive in the normative, administrative, and judicial obstacles and potential standing of the legal framework and implementation setting of the Global Compact for Safe, Orderly, and Regular Migration (GCM) and the Global Compact for Refugees (GCR). …”
Libro electrónico -
1963Publicado 2018“…These compounds are generally thought to be safe in food at normal consumption levels (e.g., polyphenols in plant foods). …”
Libro electrónico -
1964Publicado 2024“…It emphasizes the importance of security from the outset, detailing steps for hardening your Linux server against threats and ensuring safe remote access via SSH. The journey continues with configuring system logging, monitoring performance, and navigating networking fundamentals to advanced techniques, providing a holistic view of server management. …”
Video -
1965Publicado 2022“…As healthcare systems continue to evolve, it is clear that providing safe, high-quality care to patients is an extremely complex process. …”
Libro electrónico -
1966Publicado 2022“…In order to conduct a safe and economically justified operation, modern construction materials are being used more and more often in mining to support excavations, both under static and dynamic loads. …”
Libro electrónico -
1967Publicado 2023“…This reprint aims to present research on Socio-Economic Functions Across Sustainable Farming Systems, specifically on environmental conservation agriculture/climate-smart agriculture, which boosts nature-positive production, raises the welfare of producers; agricultural biotechnology, which contributes to economic and environmental sustainability; community-based extension and marketing of farm produce, which ensures the livelihood of producers and access to safe and nutritious food; and building a society resilient to all kinds of crises and hazards/disasters.This reprint reveals: 1. …”
Libro electrónico -
1968Publicado 2014“…This e-book answers various important questions such as detection of ricin in food or soil, making of humanized antibody against the toxin, novel approaches for the creation of a safe vaccine to protect first responders, exploitation of toxin`s ability to bind and penetrate cells for medical benefits, aftereffects of administering antibody against ricin to a first responder and their exposure to the toxin, neutralization of different ricin from different castor plant cultivars. …”
Libro electrónico -
1969por Organization for Economic Cooperation and Development“…Knowledge of basic nuclear physics data is essential for the modelling and safe operation of all types of nuclear facilities. …”
Publicado 2023
Libro electrónico -
1970Publicado 2023“…DEIJ work diverges from traditional metrics-driven DEI work and requires a new approach to effectively dismantle power structures.This thought-provoking, solutions-oriented book offers strategic advice on how to adopt a justice mindset, anticipate and address resistance, shift power dynamics, and create a psychologically safe organizational culture. Individual chapters provide pragmatic how-to guides to implementing justice-centered practices in recruitment and hiring, data collection and analysis, learning and development, marketing and advertising, procurement, philanthropy, and more.DEIJ pioneer Mary-Frances Winters and her coauthors address some of the most significant aspects of adding a justice focus to diversity work, showing how to create a workplace culture where equity is not a checklist of performative actions but a lived reality…”
Libro electrónico -
1971por European Observatory on Health Systems and Policies“…Drivers that increase the backlog include: Supply-side factors, such as: low numbers of health workers (even pre-COVID); lower productivity due to staff exhaustion; the extra cost of providing treatment safely; and weakened incentives for some a area. Demand-side factors include: new technologies; the ageing of the population and the rise of chronic conditions (including long COVID). 4. …”
Publicado 2022
Libro electrónico -
1972Publicado 2021“…Everyone gets the chance to practice their craft with a real software architecture problem in a safe and social environment, and the finalists and winners earn well-deserved bragging rights (not to mention an intriguing line on their řsum̌). …”
Video -
1973Publicado 2024“…Learners will also explore the basics of how malware works and how to set up a safe environment to analyze malware in a lab. This course is meant to be an introduction to simple tools and techniques for those new to cyber security. …”
Video -
1974Publicado 2022“…In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. …”
Video -
1975Publicado 2023“…Maintaining software quality through testing is important for software delivery to occur frequently and safely. But testing is a broad concept that can be applied in a variety of methods across organizations. …”
Video -
1976Publicado 2023“…Everyone gets the chance to practice their craft with a real software architecture problem in a safe and social environment, and the finalists and winners earn well-deserved bragging rights (not to mention an intriguing line on their résumé). …”
Video -
1977Publicado 2018“…The Kubernetes container orchestration system safely manages the structure and flow of a distributed application, organizing containers and services for maximum efficiency. …”
Grabación no musical -
1978Publicado 2012“…The chapters describe ways to make city cycling feasible, convenient, and safe for commutes to work and school, shopping trips, visits, and other daily transportation needs. …”
Libro -
1979Publicado 2020“…Suppose you're offered an opportunity to experience something that is unlike anything you have ever encountered, but that's all you know--aside from the fact that the experience is physically safe and morally acceptable. How do you decide whether to take up the offer? …”
Libro -
1980Publicado 2018“…Discover unique features and powerful capabilities of Scala Programming as you build projects in a wide range of domains Key Features Develop a range of Scala projects from web applications to big data analysis Leverage full power of modern web programming using Play Framework Build real-time data pipelines in Scala with a Bitcoin transaction analysis app Book Description Scala is a type-safe JVM language that incorporates object-oriented and functional programming (OOP and FP) aspects. …”
Libro electrónico