Mostrando 13,601 - 13,620 Resultados de 14,149 Para Buscar '"The Following"', tiempo de consulta: 0.10s Limitar resultados
  1. 13601
    por Paetz, Paul. author
    Publicado 2014
    “…Beginning with a quick review of the theory and key elements of the patterns of disruptive innovations and how to identify ideas with disruptive potential, Disruption by Design guides you through the design, build, and go-to-market phases that successful disruptors follow. Using many examples of disruptive companies and products, this book takes the popular theory of disruptive innovation and drives it down to the level of practical application. …”
    Libro electrónico
  2. 13602
    Publicado 2014
    “…Topics include: Core messaging concepts, including guaranteed delivery and the difference between point-to-point and publish-and-subscribe messaging New JMS 2.0 features, including shared subscriptions, asynchronous send, delivery delay, and delivery count Standard, extended, and application message header properties Techniques for request/reply messaging—when you require a response from the receiver Publish-and-subscribe messaging, including the various types of subscribers and guidelines for using them Uses and limitations of message selectors, which specify conditions for receiving messages How the three message acknowledgement modes work and when to use each Once you complete this video course, you’ll be ready for the follow-up: Enterprise Messaging Using JMS: Advanced Topics and Spring JMS. …”
    Video
  3. 13603
    por Ganesan, Ramnath. author
    Publicado 2015
    “…Among other things, it covers the following topics in great depth: How to design and implement an efficient, scalable supply chain management process from the ground up—or improve the one you have. …”
    Libro electrónico
  4. 13604
    Publicado 2015
    “…What You Will Learn Extract data from web pages with simple Python programming Build a threaded crawler to process web pages in parallel Follow links to crawl a website Download cache to reduce bandwidth Use multiple threads and processes to scrape faster Learn how to parse JavaScript-dependent websites Interact with forms and sessions Solve CAPTCHAs on protected web pages Discover how to track the state of a crawl In Detail The Internet contains the most useful set of data ever assembled, largely publicly accessible for free. …”
    Libro electrónico
  5. 13605
    Publicado 2015
    “…After you download this ebook, you can follow its Ebook Extras link to download an earlier edition (look in the Blog) about Mail in Mavericks/iOS 7 or Yosemite/iOS 8. …”
    Libro electrónico
  6. 13606
    Publicado 2016
    “…Style and approach This comprehensive guide takes a step-by-step approach and is explained in a conversational and easy-to-follow style. Each topic is explained sequentially in the process of performing a successful penetration test. …”
    Libro electrónico
  7. 13607
    Publicado 2014
    “…VMware Certified Instructor (VCI) Bill Ferguson shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material follows the exam blueprint and is presented in a concise manner, focusing on increasing your understanding and retaining exam topics. …”
    Libro electrónico
  8. 13608
    Publicado 2017
    “…Next ,you'll design and plan a virtualization infrastructure to drive planning and performance analysis. Following this , you will be proceeding with workflow and installation of components. …”
    Libro electrónico
  9. 13609
    Publicado 2015
    “…Coverage includes the following: Module 1: Fundamentals of Network Security Module 2: Virtual Private Networks (VPNs) Module 3: Content and Endpoint Security Module 4: Cisco Firewall Technologies and Intrusion Prevention System Technologies Module 5: Secure Routing and Switching Module 6: Secure Access Skill Level Beginner to Intermediate What You Will Learn Every objective in the CCNA Security exam Module 1: Fundamentals of Network Security Module 2: Virtual Private Networks (VPNs) Module 3: Content and Endpoint Security Module 4: Cisco Firewall Technologies and Intrusion Prevention System Technologies Module 5: Secure Routing and Switching Module 6: Secure Access Who Should Take This Course Network and security professionals preparing for the CCNA Security certification. …”
    Video
  10. 13610
    Publicado 2016
    “…The 34 video lessons are broken down into four modules, and cover the following topics: Hardware Networking Mobile Devices Troubleshooting Skill Level Beginner What You Will Learn All of the objectives in the CompTIA A+ 220-901 exam How to build a computer, perform networking tasks, configure laptops and mobile devices, and perform troubleshooting tasks Real-world skills Who Should Take This Course The target audience for CompTIA A+ 220-901 Complete Video Course are people looking to pass the CompTIA exam as well as those interested in entering the IT field, current Computer Technicians, Help Desk Technicians, and LAN Support Specialists. …”
    Video
  11. 13611
    Publicado 2016
    “…This book provides recipes to create a virtual datacenter design using the features of vSphere 6.x by guiding you through the process of identifying the design factors and applying them to the logical and physical design process. You'll follow steps that walk you through the design process from beginning to end, right from the discovery process to creating the conceptual design; calculating the resource requirem..…”
    Libro electrónico
  12. 13612
    Publicado 2015
    “…The 10 video lessons cover the following topics: Lesson 1: Introduction to Programmable Fabric Lesson 2: Introducing VXLAN/EVPN Lesson 3: Programmable Fabric Forwarding Lesson 4: The Underlay Lesson 5: Unicast Forwarding Lesson 6: Multitenancy Lesson 7: Multicast Forwarding Lesson 8: External Connectivity Lesson 9: Layer 4-7 Services Integration Lesson 10: Introduction to Programmable Fabric Management, Operations, and Provisioning About the Instructors David Jansen, CCIE No. 5952 (Routing/Switching), is a Distinguished Systems Engineer (DSE) for Cisco specializing in Data Center architectures. …”
    Video
  13. 13613
    Publicado 2016
    “…Next you'll get to grips with advanced techniques used to analyze usage data and automate billing operations. Following on from that, you will gain knowledge of how you can extend your on-premise solution to the cloud and move data in a pipeline. …”
    Libro electrónico
  14. 13614
    Publicado 2016
    “…Style and approach The book follows a step by step approach on how to develop microservices using Spring Framework, Spring Boot, and a set of Spring Cloud components that will help you scale your applications. …”
    Libro electrónico
  15. 13615
    Publicado 2015
    “…Over 60 recipes to help you build, configure, and orchestrate RHEL 7 Server to make your everyday administration experience seamless About This Book Create fully unattended installations and deploy configurations without breaking a sweat Discover and kick-start the newest RHEL 7 configuration and management tools through an easy-to-follow, practical approach for a lazy system management Be guided by an experienced RHEL expert who is a certified Linux engineer with a passion for open source and open standards Who This Book Is For Red Hat Enterprise Linux Server Cookbook is for RHEL 7 system administrators and DevOps in need of a practical reference guide to troubleshoot common issues and quickly perform tasks. …”
    Libro electrónico
  16. 13616
    Publicado 2015
    “…Style and approach Each chapter of the book is an easy-to-follow guide..…”
    Libro electrónico
  17. 13617
    Publicado 2015
    “…Build your own sophisticated modular home security system using the popular Raspberry Pi board About This Book This book guides you through building a complete home security system with Raspberry Pi and helps you remotely access it from a mobile device over the Internet It covers the fundamentals of interfacing sensors and cameras with the Raspberry Pi so that you can connect it to the outside world It follows a modular approach so that you can choose the modules and features you want for your customized home security system Who This Book Is For This book is for anyone who is interested in building a modular home security system from scratch using a Raspberry Pi board, basic electronics, sensors, and simple scripts. …”
    Libro electrónico
  18. 13618
    Publicado 2015
    “…Learn to create efficient analytical reports with ease using this highly practical, easy-to-follow guide Learn to apply Python for business intelligence tasks - preparing, exploring, analyzing, visualizing and reporting - in order to make more informed business decisions using data at hand Learn to explore and analyze business data, and build business intelligence dashboards with the help of various insightful recipes Who This Book Is For This book is intended for data analysts, managers, and executives with a basic knowledge of Python, who now want to use Python for their BI tasks. …”
    Libro electrónico
  19. 13619
    Publicado 2015
    “…Next, you'll study the major problems that our server faces, including scalability and high availability, and try to get the solutions for both of these issues by using the RabbitMQ mechanisms. Following on from this, you'll get to design and develop your own plugins using the Erlang language and RabbitMQ's internal API. …”
    Libro electrónico
  20. 13620
    Publicado 2016
    “…This book will also appeal to iOS developers who would like to secure their applications, as well as security professionals. It is easy to follow for anyone without experience of iOS pentesting. …”
    Libro electrónico