Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,716
- Application software 1,430
- Engineering & Applied Sciences 1,425
- Management 1,220
- Computer Science 958
- Computer programs 908
- Computer networks 883
- Data processing 880
- Computer software 661
- Security measures 654
- Design 634
- Computer security 607
- Artificial intelligence 591
- Cloud computing 591
- Web sites 554
- Operating systems (Computers) 548
- Python (Computer program language) 545
- Web site development 514
- Database management 496
- Examinations 492
- Programming 490
- Computer programming 485
- Computer graphics 463
- Digital techniques 448
- Photography 436
- Java (Computer program language) 412
- Business & Economics 395
- Electrical & Computer Engineering 395
- Information technology 388
- Certification 372
-
25701por Holzner, Steven, 1957-“…Andrew Madden, Department of Computer Science, University of Wales "I found this book's strengths to be: its exhaustive specification reference for the conscientious developer; access to the official specs, which is key; the wide variety of choices provided for all aspects of XML; several alternatives provided for each editor, browser, parser, stylesheet transform engine, and programming language; and working examples that show the power of the tools used."--Jaime Ryan, Software Developer/Documentation Manager, Blue Titan Software…”
Publicado 2003
-
25702Publicado 2013“…Readers will also find comprehensive coverage of all new features, including the new workflow between After Effects CC and CINEMA 4D, coverage on the 3D Camera Tracker, and examples of the Refine Edge tool for high-quality matting results. Included with the book are HD media files and After Effects project files used for many of the techniques in the book, as well as demos of plug-ins that you can use to experiment with in your own effects. …”
Libro electrónico -
25703Publicado 2015“…Part 6 describes the IBM z/OS® storage management software and tools. The appendixes provide information about the High Performance Storage System (HPSS) and recently withdrawn IBM storage products. …”
Libro electrónico -
25704por Kasian-Lew, Dionne“…It gives the tips and tools to adapt to new online environments, and the confidence to use them to build credibility, authority deeper and new business relationships. …”
Publicado 2014
Libro electrónico -
25705Publicado 2015“…To transition from an object-oriented approach to a functional one, it is useful to have IDE support. IDE tools to refacto..…”
Libro electrónico -
25706Publicado 2022“…Also, we will use Swagger and Swagger UI tools from the OpenAPI community to create a rich API document. …”
Video -
25707Publicado 2022“…Finally, you'll be able to use Sequelize as the database driver for building your application from scratch.By the end of this Node.js book, you'll be able to configure, build, store, retrieve, validate, and associate your data from a database to a Node.js application.What You Will Learn:Configure and optimize Sequelize for your applicationValidate your database and hydrate it with dataAdd life cycle events (or hooks) to your application for business logicOrganize and ensure the integrity of your data even on preexisting databasesScaffold a database using built-in Sequelize features and toolsDiscover industry-based best practices, tips, and techniques to simplify your application developmentWho this book is for:This book is for beginner- to intermediate-level Node.js developers looking to upgrade their skills and use Sequelize as their ORM of choice. …”
Libro electrónico -
25708Publicado 2023“…In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. …”
Libro electrónico -
25709Publicado 2021“…After you’ve become familiar with the techniques, you’ll find out how to integrate with external tools, such as GitHub, Slack, and Microsoft Teams, all without writing a single line of code. …”
Libro electrónico -
25710Publicado 2020“…By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.What you will learnExplore ways to create your own architectures and analyze those from othersUnderstand strategies for creating architectures for environments and applicationsDiscover approaches to documentation using repeatable approaches and toolsDelve into communication techniques for designs, goals, and requirementsFocus on implementation strategies for designs that help reduce riskBecome well-versed with methods to apply architectural discipline to your organizationWho this book is forIf you are involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization, then this security book is for you. …”
Libro electrónico -
25711Publicado 2019“…This paper does not replace the latest marketing materials and configuration tools. It is intended as an extra source of information that, together with existing sources, can be used to enhance your knowledge of IBM server solutions…”
Libro electrónico -
25712Publicado 2019“…As you progress, you’ll also explore Git, which is a useful tool that allows you to create multiple versions of your code. …”
-
25713“…Based on her findings, Gibson also speculates on the future direction for political campaigns as they increasingly rely on digital tools and artificial intelligence for direction and decision-making during elections…”
Libro electrónico -
25714Publicado 2023“…It is the adoption of value chain optimizations, customer experience enhancing tools, and advanced operations management into existing business models. …”
Libro electrónico -
25715Publicado 2024“…Throughout the book, you'll make Go sizzle following simple recipes and tweaking them to fit your own apps. Using tools like strong typing and concurrency primitives, build a Go codebase that stays maintainable at scale. …”
Libro electrónico -
25716por Lam, William K. C., 1962-“…Coverage includes Simulation-based versus formal verification: advantages, disadvantages, and tradeoffs Coding for verification: functional and timing correctness, syntactical and structure checks, simulation performance, and more Simulator architectures and operations, including event-driven, cycle-based, hybrid, and hardware-based simulators Testbench organization, design, and tools: creating a fast, efficient test environment Test scenarios and assertion: planning, test cases, test generators, commercial and Verilog assertions, and more Ensuring complete coverage, including code, parameters, functions, items, and cross-coverage The verification cycle: failure capture, scope reduction, bug tracking, simulation data dumping, isolation of underlying causes, revision control, regression, release mechanisms, and tape-out criteria An accessible introduction to the mathematics and algorithms of formal verification, from Boolean functions to state-machine equivalence and graph algorithms Decision diagrams, equivalence checki..…”
Publicado 2005
Libro electrónico -
25717por Alvarez, Santiago, 1969-“…This book discusses MPLS Traffic Engineering (MPLS TE) as a tool to complement MPLS QoS and enhance the performance characteristics of the network. …”
Publicado 2006
Libro electrónico -
25718Publicado 2007“…. • Take advantage of the numerous pivot table recipes • Create powerful summary reports in seconds • Build ad-hoc query tools with ease • Enhance your Executive Reporting • Filter reports to top 10 customers or products • Add dynamic charts to reports • Quickly summarize daily data by month, quarter, or year Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 Pivot Table Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 2 Creating a Basic Pivot Table . . . . . . . . . . . . . . . . . . . . . . . . . .21 3 Customizing a Pivot Table . . . . . . . . . . . . . . . . . . . . . . . . . . . .45 4 Controlling the Way You View Your Pivot Data . . . . . . . . . . . .83 5 Performing Calculations Within Your Pivot Tables . . . . . . . . 117 6 Using Pivot Charts and Other Visualizations . . . . . . . . . . . . .141 7 Analyzing Disparate Data Sources with Pivot Tables . . . . . . 167 8 Sharing Pivot Tables with Others . . . . . . . . . . . . . . . . . . . . . .189 9 Working with and Analyzing OLAP Data . . . . . . . . . . . . . . . . 201 10 Enhancing Your Pivot Table Reports with Macros . . . . . . . . .215 11 Using VBA to Create Pivot Tables . . . . . . . . . . . . . . . . . . . . . 231 12 Common Pivot Table Issues and Questions . . . . . . . . . . . . . .291 A Finding Pivot Table Commands on the Ribbon . . . . . . . . . . . .315…”
Libro electrónico -
25719por Carroll, Brandon“…Full of detailed overviews, diagrams, and step-by-step instructions for enabling essential access control solutions, Cisco Access Control Security is a practical tool that can help enforce assigned access policies and simplify user management. …”
Publicado 2004
Libro electrónico -
25720por McGrath, Sean“…If you know XML, one book has all the techniques, code, and tools you'll need to process it: XML Processing with Python . …”
Publicado 2000
Libro electrónico