Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 816
- Application software 751
- Computer programs 441
- Engineering & Applied Sciences 367
- Operating systems (Computers) 349
- Cloud computing 330
- Programming 327
- Management 281
- Web site development 271
- Computer networks 262
- Design 244
- Python (Computer program language) 237
- Computer Science 234
- Web sites 226
- Data processing 211
- Computer software 197
- Database management 184
- Open source software 179
- Linux 178
- Computer programming 177
- Security measures 174
- Web applications 168
- Photography 161
- Java (Computer program language) 155
- Digital techniques 148
- Computer graphics 141
- JavaScript (Computer program language) 141
- Microsoft Windows (Computer file) 135
- Electrical & Computer Engineering 126
- Mobile computing 124
-
3701Publicado 2013“…Explains how to sign up for your account and set up your brand profileShows you how to us…”
Libro electrónico -
3702Publicado 2015Tabla de Contenidos:Libro electrónico
-
3703por Spannaus, Timothy W. 1946-Tabla de Contenidos: “…Chapter Fourteen: Planning the ShootProps; People; Equipment; Schedules; Chapter Fifteen: The Day of the Shoot; Set Up; Blocking and Walkthrough; Camera Rehearsal; The Actual Shoot; Ambient Sound; Tear Down; Chapter Sixteen: Your Assignment 3 Plan and Shoot; Plan; Shoot; Section IV: Post-Production; Chapter Seventeen: Video Editing; Essential Software; A Simple Event Shoot; A Planned Instructional Video; Cut-Ins and Cut-Aways; Intercutting; Green Screen; Chapter Eighteen: Audio Editing; Cleaning Up Camcorder Sound; Voice-Over Narration; Sound Effects; Music; Wild Sound…”
Publicado 2012
Libro electrónico -
3704por Treadway, Peter T.Tabla de Contenidos: “…; Keep the Current System But Set Up Rules; A New Gold Standard?; Alternative Private Moneys…”
Publicado 2013
Libro electrónico -
3705por Gollapudi, SunilaTabla de Contenidos: “…-- Multi-structured data -- Data analytics -- Data science -- Data science life cycle -- Phase 1 - state business problem -- Phase 2 - set up data -- Phase 3 - explore/transform data -- Phase 4 - model -- Phase 5 - publish insights -- Phase 6 - measure effectiveness -- References/Further reading -- Summary -- 2. …”
Publicado 2013
Libro electrónico -
3706por Buchner, AlexTabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; PacktLib.PacktPub.com; Table of Contents; Preface; Chapter 1: Moodle Installation; Moodle installation-an overview; Choosing the best setup; Moodle prerequisites; Hardware requirements; Software requirements; Installation in a LAMP environment; Downloading Moodle; Creating the Moodle database and the data directory; Using a hosted server; Using the command line; Creating the Moodle data directory; Running the installer script; Finalizing the installation; Setting up the cron process…”
Publicado 2011
Libro electrónico -
3707
-
3708Publicado 2010Tabla de Contenidos: “…Real World Round 1 -- Summary -- Chapter 20: Adding Animation -- Summary -- Chapter 21: Client Feedback -- Summary -- Chapter 22: Set Up for Behaviors -- Real World Round 2 -- Interaction Ground Work -- Summary -- Chapter 23: Refining States -- Summary -- Chapter 24: Refining Animation and Interactivity -- Customizing for Complex Interactivity -- DIY Refinements -- Summary -- Chapter 25: Incorporating Data -- Real World Round 3 -- Summary -- Chapter 26: Refining Data -- Tie It All Together -- Customizing the Color Swatch List -- Summary -- Chapter 27: Advancing Fidelity -- Real World Round 4 -- Generate Base Style and Template -- Template Modifications -- Summary -- Chapter 28: Advanced Fidelity with Templates and Styles -- Adding Visual States -- Updates to the Root UI -- Applying Hi-Fi Styles -- DIY It -- Summary -- Chapter 29: Post-Mortem -- Process -- Measurement -- Team -- General -- Final Thoughts -- Part V: Reference -- Appendix A: What Is .NET? …”
Libro electrónico -
3709Publicado 2014“… Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff. …”
Libro electrónico -
3710Publicado 2014“…This book teaches and shows you in practical hands-on terms how you can: Master the performance, reliability, stability, and code manageability of your JavaScript Understand and write efficient object-oriented and prototypal code, including full understanding of the ‘this’ keyword Boost the performance of your JavaScript code Architect large web applications using common design patterns Write high quality JavaScript code and avoid the pitfalls most likely to cause errors Manage code dependencies with AMD and RequireJS Develop for mobile, build games, and set up a real-time video chat using modern APIs such as Geolocation, Canvas and WebRTC Document your code as the professionals do Write command-line and web server applications in JavaScript with Node.js, Use build tools, such as Grunt and Gulp, to automate repetitive tasks and improve your development workflow Using real-world examples and applications that you'll build yourself, Pro JavaScript Development has unique, practical content that will make you a better JavaScript developer. …”
Libro electrónico -
3711Publicado 2007“…Corporations have finally realized the value of collaboration tools for knowledge sharing and Wiki is the open source technology for creating collaborative Web sites, as either a public site on the Internet or on a private intranet siteShows readers how to set up Wikis in a corporate setting or on a personal site so that users can retrieve information, post information, and edit the contentCovers everything from choosing a Wiki engine to administration and maintenanceDiscusses the advantages of using Wiki in a corporate environment, which companies such as Microsoft, Boeing…”
Libro electrónico -
3712por Landreth, Garry L.“…The author presents descriptions of play and the history of play therapy, child and therapist characteristics, play room set-up and materials, working with parents. Guidelines, transcripts, and case examples are provided for governing sensitive issues at every stage of the therapeutic process, from the first meeting to the end of the relationship. …”
Publicado 2012
Libro electrónico -
3713Publicado 2021Tabla de Contenidos: “…-- 1.7 Getting started -- Summary -- 2 Managing component state with the useState hook -- 2.1 Setting up the bookings manager app -- 2.1.1 Generating the app skeleton with create-react-app -- 2.1.2 Editing the four key files -- 2.1.3 Adding a database file for the application -- 2.1.4 Creating page components and a UserPicker.js file -- 2.2 Storing, using, and setting values with useState -- 2.2.1 Assigning new values to variables doesn't update the UI -- 2.2.2 Calling useState returns a value and an updater function -- 2.2.3 Calling the updater function replaces the previous state value -- 2.2.4 Passing a function to useState as the initial value -- 2.2.5 Using the previous state when setting the new state -- 2.3 Calling useState multiple times to work with multiple values -- 2.3.1 Using a drop-down list to set state -- 2.3.2 Using a check box to set state -- 2.4 Reviewing some function component concepts -- Summary…”
Libro electrónico -
3714Publicado 2005Tabla de Contenidos: “…WebSphere Data Interchange infrastructure and implementation -- 14.1 The system view of WebSphere Data Interchange -- 14.1.1 Development environment -- 14.1.2 Run-time environment -- 14.2 Step-by-step implementation -- 14.2.1 WebSphere Data Interchange Server installation and setup -- 14.2.2 Setting up the WebSphere Data Interchange database -- 14.2.3 Setting up WebSphere MQ objects -- 14.2.4 WebSphere Data Interchange Client installation and setup -- 14.2.5 Setting up a connection to the database -- 14.3 The component view of WebSphere Data Interchange -- 14.3.1 Mailbox profiles -- 14.3.2 Network profiles -- 14.3.3 WebSphere MQ-related artifacts -- 14.3.4 Service profiles -- 14.3.5 Trading Partner profiles -- 14.3.6 Rules -- 14.3.7 Final view of a running WebSphere Data Interchange system -- Chapter 15. …”
Libro electrónico -
3715por International Business Machines Corporation, International Technical Support Organization StaffTabla de Contenidos: “…Local development: Local projects -- 9.1 Setting up the DB2 sample database -- 9.2 Creating a local project -- 9.3 Creating a local COBOL file -- 9.4 Building the executable -- 9.5 Setting up the CICS environment -- 9.6 Testing and debugging the application -- Part 3 XML enablement -- Chapter 10. …”
Publicado 2005
Libro electrónico -
3716Publicado 2020Tabla de Contenidos: “…-- 1.5 Executing a network penetration test -- 1.5.1 Phase 1: Information gathering -- 1.5.2 Phase 2: Focused penetration -- 1.5.3 Phase 3: Post-exploitation and privilege escalation -- 1.5.4 Phase 4: Documentation -- 1.6 Setting up your lab environment -- 1.6.1 The Capsulecorp Pentest project -- 1.7 Building your own virtual pentest platform -- 1.7.1 Begin with Linux -- 1.7.2 The Ubuntu project -- 1.7.3 Why not use a pentest distribution? …”
Libro electrónico -
3717por Cook, JimTabla de Contenidos: “…Backup Recovery and Media Services up and running -- 8.1 BRMS operations -- 8.1.1 Policies -- 8.1.2 Setting up BRMS in logical order -- 8.1.3 lnitializing BRMS -- 8.1.4 Media -- 8.1.5 Single backups using BRMS commands -- 8.1.6 Regular backups using control groups -- 8.1.7 Control groups and policies -- 8.1.8 Full versus incremental backups…”
Publicado 2003
Libro electrónico -
3718Tabla de Contenidos: “…6.3.1 Start the J2EE server to be monitored -- 6.3.2 Set up environment variables for the Application Monitor DC installer -- 6.3.3 Unpackage installation code -- 6.3.4 UNIX graphical user interface DC installation -- 6.3.5 Non-interactive (silent) DC installation -- Part 5 z/OS subsystem and Data Collector installations -- Chapter 7. …”
Libro electrónico -
3719Publicado 2003Tabla de Contenidos: “…6.4.2 Kerberos authentication process -- 6.5 Kerberos paths, directories, and files -- 6.6 Authentication services procedures -- 6.7 Kerberos passwords and master key -- 6.8 Kerberos principals -- 6.8.1 Add a Kerberos principal -- 6.8.2 Change the attributes of the Kerberos principal -- 6.8.3 Delete Kerberos principals -- 6.9 Server key -- 6.9.1 Change a server key -- 6.10 Using additional Kerberos servers -- 6.10.1 Set up and initialize a secondary Kerberos server -- 6.10.2 Managing the Kerberos secondary server database -- 6.11 SP services that utilize Kerberos -- 6.11.1 Hardware control subsystem -- 6.11.2 Remote execution commands -- 6.12 Sysctl is a PSSP Kerberos-based security system -- 6.12.1 Sysctl components and process -- 6.12.2 Terms and files related to the sysctl process -- 6.13 Related documentation -- 6.14 Sample questions -- 6.15 Exercises -- Chapter 7. …”
Libro electrónico -
3720por Chapple, MikeTabla de Contenidos: “…Controlling Database Contents Using ConstraintsEnforcing Database Integrity; Part III Retrieving Data from Databases; Chapter 7 Constructing Simple Database Queries; Retrieving Data with SELECT Statements; Organizing Query Results; Chapter 8 Joins and Other Advanced Queries; Joining Data from Multiple Tables; Taking SELECT to the Next Level; Using Database Views; Chapter 9 Turning Data into Information with SQL Server Reporting Services; Setting up SQL Server Reporting Services; Creating an SSRS Report with Report Builder; Working with Deployed (Published) Reports…”
Publicado 2008
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico