Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,677
- Engineering & Applied Sciences 1,509
- Management 1,477
- Application software 1,386
- Computer Science 982
- Computer programs 863
- Computer networks 844
- Data processing 743
- Examinations 702
- Cloud computing 642
- Leadership 602
- Business & Economics 594
- Python (Computer program language) 585
- Certification 545
- Computer software 543
- Database management 538
- Artificial intelligence 530
- Computer security 529
- Security measures 528
- Design 523
- Operating systems (Computers) 521
- Web site development 480
- Computer programming 479
- Information technology 475
- Electrical & Computer Engineering 474
- Business 452
- Electronic data processing personnel 441
- Web sites 440
- Machine learning 438
- Programming 438
-
21781Publicado 2010“…Featuring full coverage of new version 2 features, this book helps readers use developer-oriented upgrades like 'Areas' to break a large project into smaller pieces and explore the new data handling tools. …”
Libro electrónico -
21782por Kermanikian, Ara, 1963-“…Shows you how sculpt and paint a model in Mudbox; breaks down the complexities and gets you started right away with interesting projects. Helps you set up workflows to cut the time you spend on the technology, freeing you to focus on the creative aspects. …”
Publicado 2010
Libro electrónico -
21783Publicado 2016“…Then, you’ll learn how to set up your background and talent, work with lighting and scopes, explore virtual sets, use helpful iPad apps, and composite the footage. 1 Keying and Matte Extraction Overview 2 Green and Blue Screen Materials 3 Proper Lighting and Camera Setup 4 Planning the Shoot 5 Professional and DIY Lighting Setups 6 Software Options 7 Working with Virtual Sets 8 Compositing Footage 9 Fixing Problem Green Screen Shots 10 Designing the Corporate Green Screen Studio 11 Lighting and Measuring Tools on Portable Devices…”
-
21784Publicado 2011“…Since 1995, Handbook for Writing Proposals has helped thousands of professionals develop winning proposals. …”
Libro electrónico -
21785Publicado 2011“…If your web application's success depends on how quickly and easily users can make transactions, then PayPal is a solution you can't afford to overlook. This book helps you determine which PayPal option is best for your situation, and provides step-by-step instructions for implementing the payment method you choose—whether you're accepting money via the Web or mobile devices for products and services, donations, or anything else. …”
Libro electrónico -
21786Publicado 2011“…With an iterative evolution of a fictitious company, which is called ITSO Enterprise, we demonstrate several scenarios about how we can implement an IBM Smart SOA approach that helps ITSO Enterprise to achieve its business goals to be a global interconnected enterprise, one step at a time. …”
Libro electrónico -
21787Publicado 2010“…Annotated examples of correct markup and style show you how to use all of these technologies to build impressive Web pages. Helpful appendixes cover the syntax of character entities, fonts, colors, and URLs. …”
Libro electrónico -
21788Publicado 2011“…Better practices that today's CFOs can employ to bring value and efficiency to the teams that report to them Helping corporate accountants from the CFOs to the management accountant implement better practices that will make a difference to their finance team's performance, Winning CFOs shows corporate accountants how to create permanent improvements in their organization's processes.Provides better practice solutions the author has learned from more than 4,000 finance teams worldwideA to Z guidance on how to be an effective CFOIncludes templates, checklists and impleme…”
Libro electrónico -
21789por Vliet, Jurg van“…Programming Amazon EC2 not only helps you get started…”
Publicado 2011
Libro electrónico -
21790Publicado 2011“…Takes you step-by-step through the process of developing OS X and iOS applications using Xcode 4 Examines the benefits of Xcode 4, Apple's updated, free, object oriented programming environment Helps you tame the complex Xcode environment so you can develop amazing apps This book gets you up to speed on all the remarkable new features and redesigned user interface of Xcode 4 so you can get started creating phenomenal apps today…”
Libro electrónico -
21791por Chermack, Thomas J.“…Scenario planning helps organization leaders, executives and decision-makers envision and develop strategies for multiple possible futures instead of just one. …”
Publicado 2011
Libro electrónico -
21792por Novák, István“…Complete coverage of all key .NET 4 and Visual Studio 2010 languages and technologies .NET 4 is Microsoft's latest version of their core programming platform, and Visual Studio 2010 is the toolset that helps write .NET 4 applications. This comprehensive resource offers one-stop shopping for all you need to know to get productive with .NET 4. …”
Publicado 2010
Libro electrónico -
21793por Tetz, Edward“…A helpful guide on all things Cisco Do you wish that the complex topics of routers, switches, and networking could be presented in a simple, understandable presentation? …”
Publicado 2011
Libro electrónico -
21794por Carlberg, Conrad George“…Using real-world examples, Carlberg helps you choose the right technique for each problem and get the most out of Excel’s statistical features, including its new consistency functions. …”
Publicado 2011
Libro electrónico -
21795por Habeeb, Mocky“…Mocky tours the SimpleDB platform and APIs, explains their essential characteristics and tradeoffs, and helps you determine whether your applications are appropriate for SimpleDB. …”
Publicado 2010
Libro electrónico -
21796Publicado 2010“…This practical, how-to guide shows you how you can get serious about using your blog and implement advertising, sponsorship, partnerships, and affiliate marketing options to turn your hobby into extra income, or even a full-time career. Helpful examples and featured articles with topic experts and bloggers who have built successful business demonstrate how to promote your business or b…”
Libro electrónico -
21797por Marmel, Elaine E.“…You'll explore Excel with helpful step-by-step instructions that show you, rather than tell you, how to navigate Excel, work with PivotTables and PivotCharts, use macros to streamline work, and collaborate with other users in one document.This two-color guide features screen shots with specific, numbered instructions so you can learn the ac…”
Publicado 2010
Libro electrónico -
21798por Wolfinger, Mark D.“…Wolfinger shows how to use simple “collars” to gain more protection at lower cost and helps you use options-based “stock replacement” strategies to lock in stock profits (while objectively considering the tax implications). …”
Publicado 2012
Libro electrónico -
21799Publicado 2018“…This book starts with setting up Docker in different environment, and helps you learn how to work with Docker images. Then, you will take a deep dive into network and data management for containers. …”
Libro electrónico -
21800Publicado 2017“…About This Book Employ advanced pentesting techniques with Kali Linux to build highly-secured systems Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs Who This Book Is For Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title. What You Will Learn Select and configure the most effective tools from Kali Linux to test network security Employ stealth to avoid detection in the network being tested Recognize when stealth attacks are being used against your network Exploit networks and data systems using wired and wireless networks as well as web services Identify and download valuable data from target systems Maintain access to compromised systems Use social engineering to compromise the weakest part of the network—the end users In Detail This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers. …”
Libro electrónico