Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,416
- Application software 1,183
- Management 1,058
- Engineering & Applied Sciences 914
- History 852
- Computer Science 614
- Computer networks 595
- Python (Computer program language) 572
- Computer programs 570
- Historia 568
- Data processing 551
- Cloud computing 538
- Leadership 538
- Design 477
- Security measures 452
- Computer software 435
- Programming 424
- Web site development 415
- Computer security 414
- Operating systems (Computers) 406
- Business & Economics 393
- Machine learning 393
- Web sites 379
- Database management 367
- Artificial intelligence 365
- Computer programming 363
- Java (Computer program language) 340
- Social aspects 340
- Information technology 325
- Examinations 319
-
4761por Gascuel, Didier“…Who never dreamed of traveling the world and being in the thick of it? …”
Publicado 2020
Libro electrónico -
4762por Criswell, Corey“…If you want to be an effective leader--at any level--you should pay attention to vision. Leaders who communicate a strong vision are seen by their bosses and coworkers as more effective in several important areas than those who do not. …”
Publicado 2010
Libro electrónico -
4763Publicado 2009“…Written by a team of authors who are deeply involved with the Revit community, Mastering Revit Structure 2010 explains the tools and functionality in the context of professional, real-world tasks and workflows. …”
Libro electrónico -
4764Publicado 2013“…Great personalized training at a fraction of the cost...for everyone who doesn't have time to read a book! These video lessons will ensure that you can harness the power of Access for development faster and more easily than ever before! …”
-
4765Publicado 2013“…Great personalized training at a fraction of the cost...for everyone who doesn't have time to read a book! These video lessons will ensure that you can harness the power of PowerPoint faster and more easily than ever before! …”
-
4766Security Administrator Street Smarts A Real World Guide to CompTIA Security+TM Skills, Third EditionPublicado 2011“…Targets security administrators who confront a wide assortment of challenging tasks and those seeking a career in security administration who are hampered by a lack of actual experience Walks you through a variety of common tasks, demonstrating step by step how to perform them and how to circumvent roadblocks you may encounter Features tasks that are arranged according to four phases of the security administrator's role: designing a secure network, creating and implementing standard security policies, identifying insecure systems in an existing environment, and training both onsite and remote users Ideal hands-on for those preparing for CompTIA's Security+ exam (SY0-301) This comprehensive workbook provides the next best thing to intensive on-the-job training for security professionals…”
Libro electrónico -
4767Publicado 2009“…Youll become your own personal talent manager - after-all, who better to manage your talents than you!…”
Libro electrónico -
4768por Marks, Andrea S.“…Writing can be a challenge, especially for artists and designers who tend to be more visual than verbal. Writing for Visual Thinkers: A Guide for Artists and Designers is designed to help people who think in pictures—a segment of learners that by some estimates includes almost 30 percent of the population—gain skills and confidence in their writing abilities. …”
Publicado 2011
Libro electrónico -
4769Publicado 2010“…A guide for all designers who want to earn their place as their clients' trusted advisor and who aspire to create pla…”
Libro electrónico -
4770Publicado 2013“…Skill Level Intermediate What You Will Learn Basic BGP concepts and autonomous systems BGP attributes and the decision process BGP configuration scaling, policy scaling, and topology scaling Who Should Take This Course Working engineers in the Enterprise space who want to expand their knowledge of the Service Provider space CCIP and CCIE candidates seeking a first exposure to BGP IT managers in need of a quick understanding of BGP concepts to better manage their engineering teams Engineers familiar with BGP on other operating systems who wish to learn BGP configuration with IOS Course Requirements Understanding of routing concepts Understanding of IP IGPs Understanding of IPv4 addresses A basic understanding of Cisco IOS usage (although not entirely necessary) About the Author: Jeff Doyle , CCIE #1919, is Principal Architect at FishNet Security. …”
-
4771Publicado 2010“…Take your hobby to the next level and turn your blog into real income Anyone who blogs knows that it is a fun, creative way for sharing thoughts and opinions. …”
Libro electrónico -
4772Publicado 2009“…Here's the basic primer on how to grow the "right people who are already on the bus" in your organization. …”
Libro electrónico -
4773por Reynolds, Garr“…In this new edition, Garr gives his readers new, fresh examples to draw inspiration from, with a whole new chapter for those who present on more technical and educational topics based on techniques used by many presenters who give high-level talks at TED and other powerhouse events. …”
Publicado 2012
Libro electrónico -
4774Publicado 2017“…Explore various neural networks with the help of this comprehensive guide Rich in concepts, advanced guide on deep learning that will give you background to innovate in your environment Who This Book Is For If you are a data scientist who performs machine learning on a regular basis, are familiar with deep neural networks, and now want to gain expertise in working with convoluted neural networks, then this book is for you. …”
Libro electrónico -
4775Publicado 2017“…Troubleshoot your problems effectively with your Dynamics 365 partner Learn about architecture, deployment choices, integration, configuration and data migration, development, testing, reporting and BI, support, upgrading, and more. Who This Book Is For This book is for technology leaders, project managers solution architects, and consultants who are planning to implement, are in the process of implementing, or are currently upgrading to Dynamics 365 for Operations. …”
Libro electrónico -
4776Publicado 2017“…Learn how to utilize the powerful AWS services from within your application Who This Book Is For This book is for developers who want to begin building secure, resilient, robust, and scalable Go applications that are cloud native. …”
Libro electrónico -
4777Publicado 2017“…A Guide to managing servers and automation About This Book Breeze through Puppet's key features and performance improvements to bring real advantages to your IT infrastructure Discover Puppet best practices to help you avoid common mistakes and pitfalls Examples to help you get to grips with Puppet and succeed with everyday IT automation Who This Book Is For This book targets experienced IT professionals and new Puppet uses, who will learn all they need to know to go from installation to advanced automation. …”
Libro electrónico -
4778Publicado 2017“…About This Book Use jMeter to create and run tests to improve the performance of your webpages and applications Learn to build a test plan for your websites and analyze the results Unleash the power of various features and changes introduced in Apache jMeter 3.0 Who This Book Is For This book is for software professionals who want to understand and improve the performance of their applications with Apache jMeter. …”
Libro electrónico -
4779Publicado 2018“…In 2016, Google’s Site Reliability Engineering book ignited an industry discussion on what it means to run production services today—and why reliability considerations are fundamental to service design. Now, Google engineers who worked on that bestseller introduce The Site Reliability Workbook , a hands-on companion that uses concrete examples to show you how to put SRE principles and practices to work in your environment. …”
Libro electrónico -
4780Publicado 2017“…About This Book Employ advanced pentesting techniques with Kali Linux to build highly-secured systems Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs Who This Book Is For Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title. …”
Libro electrónico