Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 691
- Application software 556
- Management 480
- Engineering & Applied Sciences 453
- History 380
- Computer networks 299
- Computer programs 291
- Computer Science 278
- Data processing 255
- Design 238
- Photography 235
- Cloud computing 234
- Python (Computer program language) 234
- Leadership 233
- Digital techniques 217
- Programming 212
- Computer programming 202
- Taxation 196
- Security measures 193
- Computer software 192
- Computer security 188
- Web site development 187
- Examinations 186
- Historia 184
- Database management 180
- Artificial intelligence 178
- Business & Economics 177
- Operating systems (Computers) 175
- Web sites 166
- Machine learning 149
-
14081por Topsakal, Ilyas“…Until the conflict of interest during the first World War, Russia and Turkey experienced the difficulties of a large multinational poly-confessional state in different ways, overflowing with ideas of constitutional reforms and democratic transformations. Following the end of First World War, the collapse of the Ottoman Empire and the change of state formation, i.e. the republic, once again pushed Soviet government and Turkey into a dialogue and consolidation efforts in the region: the Turkish War of Independence under the leadership of Mustafa Kemal Ataturk and the straits questions, diplomatic friction with the West at the Lausanne Conference and the support of diplomats from Ankara by the Soviet delegation. …”
Publicado 2021
Libro electrónico -
14082Publicado 2019“…What you'll learn--and how you can apply it How to define an inspiring mission statement, vision, and strategy for your team Follow the "understand, identify, and execute loop" to build great products Work backward from the customer problem and capture it all in a press release Pick an effective goal metric to rally your team around Drive amazing execution with your team through great communication and decision making This video course is for you because... …”
Video -
14083Publicado 2009“…The Masonic lodges were a specific form of a associations of the 17th and 18th centuries with a similar organizational structure, but on a broader social basis. They followed a system of successive steps (grades) with an ethical and moral programme of forming the human character with the aim of the introduction into a so-called Masonic secret. …”
Libro electrónico -
14084Publicado 2009“…Thus, terrorism is most of all the product of a powerful idea, which motivates and stimulates activists, giving them the strong conviction needed to follow through their "project". It's the idea that not only is it possible to wage resistance against an alleged illegitimate, corrupt authority; it is also possible to inspire others to participate in an avant-garde armed struggle "Terrorismus. 9/11 im Kontext" versteht sich als Anthologie, eine Zusammenstellung verschiedener Schwerpunkte, um so mehr Verständnis für die Komplexität von Terrorismus in Abgrenzung von eindimensional-verkürzter Darstellung in Medien und Politik zu eröffnen. …”
Libro electrónico -
14085por Winter, Susanne“…Using fairy tales and commedia dell ́arte as basic constituents for his "Fiabe teatrali", Gozzi responds to a theatre that emphasizes the reflection of everyday life and follows the concept of utility. The combination of elements are distanced from reality in a way that resembles an ars combinatoria, based on a structure of contrasts that underlines its artificial character. …”
Publicado 2007
Libro electrónico -
14086Publicado 2022“…The study is composed of a partly standardized questionnaire survey (n= 80) followed by qualitive interviews with teachers as experts (n = 10). …”
Libro electrónico -
14087Publicado 2024“…In its recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as "a blogger, InfoSec specialist, super hero...and all around good guy." …”
Video -
14088Publicado 2019“…You're a developer using Kubernetes to configure, manage, and rollout applications, and you want to obtain CKAD certification You want to understand the basics of Kubernetes by solving hands-on problems You want to become a Certified Kubernetes Application Developer Prerequisites: You should have experience working with containers, in particular Docker You should possess beginner-level understanding of Kubernetes concepts and the resources API You should have familiarity with a Unix environment and Bash commands as well as with command-line-based text editors (optimally vim) and the YAML format Recommended preparation: Attendees will need access to a Kubernetes cluster, either local or remote; the recommended setup is to install minikube and kubectl CKAD candidate handbook (PDF) Introduction to Kubernetes (free edx video course) Recommended follow-up: Introduction to Kubernetes (live online training) Kubernetes Patterns (book) Common misunderstandings: Learners might understand the basic Kubernetes ideas and concepts but aren't able to apply them in practice Format, time management, and shell environment of the CKAD exam which leads to candidates failing when taking the test Ability to troubleshoot and debug Kubernetes setups by using appropriate kubectl commands under pressure…”
Video -
14089Publicado 2022“…You're a data infrastructure team lead or manager who is interested in implementing stream processing offerings in your organization You're a business executives or technology leader who is looking to add value and transform current ETL based data warehousing to near real-time Recommended follow-up: Unified Flink Source at Pinterest: Streaming Data Processing (article) Detecting Image Similarity in (Near) Real-time Using Apache Flink (article) Pinterest Visual Signals Infrastructure: Evolution from Lambda to Kappa Architecture (article) Real-time experiment analytics at Pinterest using Apache Flink (article)…”
Video -
14090Publicado 2021“…It is well known, for example, that the mortality among the Indians of the Greater Antilles was shockingly high; but disease and a harsh work regimen affected Africans brought to the islands, and many Europeans became sick on arriving there as well. The following chapter traces the establishment of an apparatus of government after the Colón family passed from the scene, the relationship among different officials and governmental entities, conflict and corruption in the political arena, and the impact of law and reform. …”
Libro -
14091
-
14092Publicado 2017“…"AgricultureS et enjeux de société" is the first volume of the "Le trèfle à quatre feuilles" collection. It will be followed by three other books on complementary themes such as Food, Environment and Health. …”
Libro electrónico -
14093Publicado 2022“…This book allows us to follow the footsteps of a momentous - albeit often overlooked - suffragist, who blazed the trail we now walk' Nicola Sturgeon, First Minister of Scotland…”
Libro electrónico -
14094Publicado 2023“…Additional information about Omar's current projects can be found at omarsantos.io, and you can follow Omar on Twitter @santosomar. Skill Level: Beginner Learn How To: Pass the ISC2 Certification in Cybersecurity exam Understand the security concepts of Information Assurance Understand the Risk Management Process Understand Security Controls and Data Security Understand Governance Processes Understand Computer Networking Course requirement: None Who Should Take This Course: Anyone contemplating starting a career in cyber security Anyone who would like to better understand cyber security concepts Anyone interested in gaining their first cybersecurity certification About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. …”
Video -
14095Publicado 2014“…In contrast to the conditions under the Imperium Romanum, where the emperor enforced nation-wide regulations, the „politics of sports“ followed different rules in the small-scaled world of the classical Greek poleis. …”
Libro electrónico -
14096Publicado 2018“…This includes technology by and in support of individuals with diverse motor, cognitive, and sensory abilities. Following on from last year, we included a track within technical papers for short papers, which are for more succinct research contributions. …”
Libro electrónico -
14097Publicado 1997“…This early work was followed by model curricula developed by ACM and DPMA. …”
Libro electrónico -
14098Publicado 2015“…In 1902 the Daily News gave him a weekly opinion column, followed in 1905 by a weekly column in The Illustrated London News, for which he continued to write for the next thirty years. …”
991005421619706719 -
14099Publicado 2021“…Topics include: CompTIA Cybersecurity Analyst (CySA+) CS0-002 Objectives Threat and Vulnerability Management Software and Systems Security Security Operations and Monitoring Incident Response Compliance and Assessment Malware and Incident Response Skill Level: Intermediate Learn How To: Prepare for every objective on the CompTIA Cybersecurity Analyst CySA+ exam Leverage intelligence and threat detection techniques Analyze and interpret data Identify and address vulnerabilities Suggest preventative measures Effectively respond to and recover from incidents Real-world cyber security configuration and detection skills How to perform data analysis and interpret results to identify vulnerabilities, threats, and risks Who Should Take This Course: Anyone preparing for the CompTIA Cybersecurity Analyst CySA+ examination Anyone interested in learning cyber security fundamentals Course Requirements: Although there is no required prerequisite, CySA+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus. …”
Video -
14100Publicado 2022“…The materials are arranged in the following way: the text is introduced by a graphic and synthetic presentation of the historical context in Berlin and Naples and the documentation of the twelve case studies. …”
Libro electrónico