Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,716
- Application software 1,430
- Engineering & Applied Sciences 1,425
- Management 1,220
- Computer Science 958
- Computer programs 908
- Computer networks 883
- Data processing 880
- Computer software 661
- Security measures 654
- Design 634
- Computer security 607
- Artificial intelligence 591
- Cloud computing 591
- Web sites 554
- Operating systems (Computers) 548
- Python (Computer program language) 545
- Web site development 514
- Database management 496
- Examinations 492
- Programming 490
- Computer programming 485
- Computer graphics 463
- Digital techniques 448
- Photography 436
- Java (Computer program language) 412
- Business & Economics 395
- Electrical & Computer Engineering 395
- Information technology 388
- Certification 372
-
2581Publicado 2013“…Police DNA databases : are they a truly effective tool in the fight against serious national and cross-border crime?…”
Libro -
2582Publicado 2013Materias:Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
2583
-
2584Publicado 2020Materias:Libro electrónico
-
2585Publicado 2022Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
2586
-
2587Publicado 2015“…This book presents concepts, methods, tools and solutions based on mathematical programming, which provides the quantitative support needed for integrated decision-making and ultimately for improving the allocation of overall corporate resources (e.g., materials, cash and personnel). …”
Libro electrónico -
2588
-
2589Publicado 2013“…The distinctive characteristic of the proposed POEMS model is its modular structure: it is composed of a collection of management tools that can be applied, individually (Integrated Management System, Life Cycle Assessment, product environmental labeling guidelines) or as combination of two or more elements, based on the specific requirements and objectives an organization aims to reach. …”
Libro electrónico -
2590Publicado 2022“…To compare these two semantic fields, his methodological approach operates on the principle of distributional semantics and applies, among others, tools and methods from the field of corpus linguistics…”
Libro electrónico -
2591Publicado 2020“…A DIY ‘Smart Home’ Guide: Tools for Automating Your Home Monitoring and Security Using Arduino, ESP8266 , and Android contains step-by-step plans for easy-to-build projects that work through your phone to control your home environment remotely. …”
Libro electrónico -
2592Publicado 2019“…Using a case study approach, this book will introduce you to Dynamics 365 Business Central and Visual Studio Code development tools to help you become a productive Business Central developer. …”
Libro electrónico -
2593por Thangaswamy, VivekTabla de Contenidos: “…Cover; Table of Contents; Preface; Chapter 1: Visual Studio Tools for Office (VSTO); What is Microsoft VSTO?; Why VSTO 3.0?…”
Publicado 2009
Libro electrónico -
2594Publicado 2018“…Dieses praxisorientierte Buch zeigt Ihnen wie.Mit konkreten Beispielen, einem Minimum an Theorie und zwei unmittelbar anwendbaren Python-Frameworks – Scikit-Learn und TensorFlow – verhilft Ihnen der Autor Aurélien Géron zu einem intuitiven Verständnis der Konzepte und Tools für das Entwickeln intelligenter Systeme. Sie lernen eine Vielzahl von Techniken kennen, beginnend mit einfacher linearer Regression bis hin zu Deep Neural Networks. …”
Libro electrónico -
2595
-
2596Publicado 2018“…Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-edge wireless penetration tools and features Book Description Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. …”
Libro electrónico -
2597Publicado 2015Tabla de Contenidos: “…; Docker; Launching a local environment; Cloning the environment; Running a virtual server; Halting the virtual server; Summary; Chapter 2 : Using the Built-in Tools; Docker stats; Running Docker stats; What just happened?…”
Libro electrónico -
2598Publicado 2015Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Operating System and Baseline Security; Microsoft Windows Server; Baseline and security; Security Configuration Wizard; Translating your policy into a technical policy; Creating a policy template; Policy review and validation; Policy implementation; Analyzing the result and troubleshooting; A backup or rollback plan; Summary; Chapter 2: Native MS Security Tools and Configuration; Microsoft SCM; Installing Microsoft SCM; Administering Microsoft SCM…”
Libro electrónico -
2599Publicado 2017“…Lifelogging Tools and Applications 2017…”
Libro electrónico -
2600