Mostrando 12,981 - 13,000 Resultados de 13,297 Para Buscar '"The Mechanic"', tiempo de consulta: 0.10s Limitar resultados
  1. 12981
    por Arnoult, Audrey
    Publicado 2016
    “…Within this process of reflection, the three essential stages of compiling, analysing and interpreting corpora are separate, even though, in practice, they are interwoven in circulatory mechanisms. What are the theoretical, and also often practical criteria which determine the compilation of a research corpus? …”
    Electrónico
  2. 12982
    Publicado 2020
    “…Understand networking fundamentals concepts, including network components, network topology architectures, physical interfaces and cabling types, TCP and UDP, wireless principals, switching concepts, and virtualization fundamentals Master IPv4 addressing and subnetting and configure IPv6 Configure and verify VLANs, interswitch connectivity, and Layer 2 discovery protocols Describe Rapid PVST+ Spanning Tree Protocol Compare Cisco Wireless Architectures and AP Modes Enable security technologies including device access control, site-to-site and remote access VPNs, ACLs, Layer 2 security features, and wireless security protocols Configure and verify IPv4 and IPv6 static routing and single area OSPF Understand DHCP, DNS, and other networking services like SNMP, syslog, SSH, and TFTP/FTP Configure and verify inside source NAT and NTP Understand how automation affects network management, controller-based and software-defined architectures, and Cisco DNA Center-enabled device management Understand network programmability concepts, including characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding); configuration management mechanisms such as Puppet, Chef, and Ansible; and learn to Interpret JSON encoded data…”
    Libro electrónico
  3. 12983
    Publicado 2020
    “…His research interests include spreading open source analytics, analyzing social media manipulation with mechanism design, simpler interfaces to cloud computing, investigating climate change, and knowledge flows. …”
    Libro electrónico
  4. 12984
    Publicado 2018
    “…About This Book Intelligence processes and procedures for response mechanisms Master F3EAD to drive processes based on intelligence Threat modeling and intelligent frameworks Case studies and how to go about building intelligent teams Who This Book Is For This book targets incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts; experience in, or knowledge of, security operations, incident responses or investigations is desirable so you can make the most of the subjects presented. …”
    Libro electrónico
  5. 12985
    Publicado 2018
    “…What You Will Learn How Rust supports the use of basic functional programming principles Use functional programming to handle concurrency with elegance Read and interpret complex type signatures for types and functions Implement powerful abstractions using meta programming in Rust Create quality code formulaically using Rust's functional design patterns Master Rust's complex ownership mechanisms particularly for mutability In Detail Functional programming allows developers to divide programs into smaller, reusable components that ease the creation, testing, and maintenance of software as a whole. …”
    Libro electrónico
  6. 12986
    Publicado 2020
    “…Through applying detailed dynamic modelling, a thorough understanding of the thermal conversion mechanism(s) can be achieved, based on which advanced control strategies can be designed to improve the performance of the thermal energy system, both in economic and environmental terms. …”
    Libro electrónico
  7. 12987
    Publicado 2022
    “…The audiobook will help professionals responsible for mechanical, process, and reliability engineering domains. …”
    Grabación no musical
  8. 12988
    Publicado 2019
    “…Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report. …”
    Libro electrónico
  9. 12989
    Publicado 2019
    “…Finally, you will discover various steps that are taken to identify the target, discover weaknesses in the authentication mechanism, and finally break the authentication implementation to gain access to the administrative console of the application. …”
    Libro electrónico
  10. 12990
    Publicado 2015
    “…Coverage Includes How reactive architecture replaces complexity with simplicity throughout the core, middle, and edges The characteristics of actors and actor systems, and how Akka makes them more powerful Building systems that perform at scale on one or many computing nodes Establishing channel mechanisms, and choosing appropriate channels for each application and integration challenge Constructing messages to clearly convey a sender’s intent in communicating with a receiver Implementing a Process Manager for your Domain-Driven Designs Decoupling a message’s source and destination, and integrating appropriate business logic into its router Understanding the transformations a message may experience in applications and integrations Implementing persistent actors using Event Sourcing and reactive views using CQRS Find unique online training on Domain-Driven Design, Scala, Akka, and other software craftsmanship topics using the for{comprehension} website at forcomprehension.com…”
    Libro electrónico
  11. 12991
    Publicado 2015
    “…Coverage includes an explanation of the mechanics of a search, and how to tie your website, paid ads, online reputation, social media, content, images, and video into a winning SEO strategy that pushes you to the front of the line.The Page One Domination strategy incorporates all the ways in which you can beef up your Internet presence and online reputation. …”
    Libro electrónico
  12. 12992
    por Li, Wei'an
    Publicado 2008
    “…Professor Li's book offers a candid and timely assessment of the quality of the governance mechanisms they employ including the factors that influence their quality and how they relate to subsequent corporate performance. …”
    Libro electrónico
  13. 12993
    Publicado 2017
    “…What You Will Learn Compare microservices with monolithic applications and SOA Identify the appropriate service boundaries by mapping them to the relevant bounded contexts Define the service interface and implement the APIs using ASP.NET Web API Integrate the services via synchronous and asynchronous mechanisms Implement microservices security using Azure Active Directory, OpenID Connect, and OAuth 2.0 Understand the operations and scaling of microservices in .NET Core Understand the testing pyramid and implement consumer-driven contract using pact net core Understand what the key features of reactive microservices are and implement them using reactive extension In Detail Microservices is an architectural style that promotes the development of complex applications as a suite of small services based on business capabilities. …”
    Libro electrónico
  14. 12994
    por Pepelnjak, Ivan
    Publicado 2002
    “…The MPLS/VPN architecture and all its mechanisms are explained with configuration examples, suggested design and deployment guidelines, and extensive case studies. …”
    Libro electrónico
  15. 12995
    Publicado 2019
    “…What you will learn See how quantum computing works, delve into the math behind it, what makes it different, and why it is so powerful with this quantum computing textbook Discover the complex, mind-bending mechanics that underpin quantum systems Understand the necessary concepts behind classical and quantum computing Refresh and extend your grasp of essential mathematics, computing, and quantum theory Explore the main applications of quantum computing to the fields of scientific computing, AI, and elsewhere Examine a detailed overview of qubits, quantum circuits, and quantum algorithm Who this book is for Dancing with Qubits is a quantum computing textbook for those who want to deeply explore the inner workings of quantum computing." -- Publisher's description…”
    Libro electrónico
  16. 12996
    por Wilson, Matthew
    Publicado 2004
    “…Along the way, you'll learn how to: Overcome deficiencies in C++'s type system Enforce software design through constraints, contracts, and assertions Handle behavior ignored by the standard— including issues related to dynamic libraries, static objects, and threading Achieve binary compatibility between dynamically loading components Understand the costs and disadvantages of implicit conversions—and the alternatives Increase compatibility with diverse compilers, libraries, and operating environments Help your compiler detect more errors and work more effectively Understand the aspects of style that impact reliability Apply the Resource Acquisition Is Initialization mechanism to a wide variety of problem domains Manage the sometimes arcane relationship between arrays and pointers Use template programming to improve flexibility and robustness Extend C++: including fast string concatenation, a true NULL-pointer, flexible memory buffers, Properties, multidimensional arrays, and Ranges The CD-ROM contains a valuable variety of C++ compilers, libraries, test programs, tools, and utilities, as well as the author's related journal articles. …”
    Libro electrónico
  17. 12997
    por Engel, Joshua, 1970-
    Publicado 1999
    “…You will find detailed information on such topics as: The Java virtual machine verification algorithm How Java virtual machine security works, and what it can and can't do Using class loaders to incorporate code and dynamically generated code from the Internet, the Java Foundation Classes, database queries, and other languages The mechanics of compiling the Java programming language for the Java virtual machine Implementing other languages using the Java virtual machine, including Scheme, Prolog, Sather, Eiffel, and regular expressions Numerous examples illustrate techniques and concepts, and exercises with solutions help you gain practical experience. 02013097..…”
    Libro electrónico
  18. 12998
    Publicado 2022
    “…This book takes a task-oriented approach by showing common problems, potential solutions, brief explanations of how those solutions work, and the mechanisms used. Based on real-world examples, the recipes in this book will show you how to solve common problems with Raven Query Language and will highlight reasons why RavenDB is a great choice for fast prototyping solutions that can sustain increasing amounts of data as your application grows. …”
    Libro electrónico
  19. 12999
    por Lam, William K. C., 1962-
    Publicado 2005
    “…Coverage includes Simulation-based versus formal verification: advantages, disadvantages, and tradeoffs Coding for verification: functional and timing correctness, syntactical and structure checks, simulation performance, and more Simulator architectures and operations, including event-driven, cycle-based, hybrid, and hardware-based simulators Testbench organization, design, and tools: creating a fast, efficient test environment Test scenarios and assertion: planning, test cases, test generators, commercial and Verilog assertions, and more Ensuring complete coverage, including code, parameters, functions, items, and cross-coverage The verification cycle: failure capture, scope reduction, bug tracking, simulation data dumping, isolation of underlying causes, revision control, regression, release mechanisms, and tape-out criteria An accessible introduction to the mathematics and algorithms of formal verification, from Boolean functions to state-machine equivalence and graph algorithms Decision diagrams, equivalence checki..…”
    Libro electrónico
  20. 13000
    por Castaneda, H. David
    Publicado 2005
    “…A comprehensive guide to analyzing the business rationale for WLANs Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership Develop a robust execution plan to deploy and operate the WLAN Understand the high-level technical issues of deploying and managing your WLAN from a business decision-maker’s perspective Maximize the positive impact of supplementary and complementary services such as voice, video, and guest WLAN access Identify potential security threats and develop strategies to mitigate attacks Learn methodological and technical best practices from WLAN deployment case studies featuring real-world, enterprise-class businesses and institutions Gather information easily by referring to quick reference sheets and appendixes covering an antenna overview, a high-level sample project plan, checklists, and flowcharts Businesses today are increasingly adopting wireless LANs (WLANs) as a primary data transport mechanism. To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution. …”
    Libro electrónico