Mostrando 1,361 - 1,380 Resultados de 1,796 Para Buscar '"alias"', tiempo de consulta: 0.08s Limitar resultados
  1. 1361
    Publicado 2014
    “…You will also learn about PowerShell scripts and providers, such as the file system provider, alias provider, and environment provider. This video tutorial will also cover working with files and folders, system administration, and PowerShell version 5. …”
    Video
  2. 1362
    Publicado 2022
    “…But learning PowerShell can be intimidating; its not intuitive and alias use can make code difficult to read. In this video, Microsoft MVP Brien Posey helps you learn PowerShell with minimal effort. …”
    Video
  3. 1363
  4. 1364
  5. 1365
  6. 1366
  7. 1367
  8. 1368
    por Agüera Espejo Saavedra, Isabel
    Publicado 2010
    Tabla de Contenidos: “…Alumnos pasivos: historia de Merche y de CoraMerche; 6. Niños por sorteo; 7. Alias «Murillo; 8. Mi Julianillo; 9. Un alumno maltratado: Mario; 10. …”
    Libro electrónico
  9. 1369
    Publicado 2022
    Tabla de Contenidos: “…Some observations on the epsu case: A bad judgment for democracy and subsidiarity, alias a textbook example of not promoting the European social dialogue / Filip Dorssemont -- 4. …”
    Libro electrónico
  10. 1370
    por Flanagan, David
    Publicado 2008
    Tabla de Contenidos: “…Introduction -- A Tour of Ruby -- Try Ruby -- About This Book -- A Sudoku Solver in Ruby -- The Structure and Execution of Ruby Programs -- Lexical Structure -- Syntactic Structure -- File Structure -- Program Encoding -- Program Execution -- Datatypes and Objects -- Numbers -- Text -- Arrays -- Hashes -- Ranges -- Symbols -- True, False, and Nil -- Objects -- Expressions and Operators -- Literals and Keyword Literals -- Variable References -- Constant References -- Method Invocations -- Assignments -- Operators -- Statements and Control Structures -- Conditionals -- Loops -- Iterators and Enumerable Objects -- Blocks -- Altering Control Flow -- Exceptions and Exception Handling -- BEGIN and END -- Threads, Fibers, and Continuations -- Methods, Procs, Lambdas, and Closures -- Defining Simple Methods -- Method Names -- Methods and Parentheses -- Method Arguments -- Procs and Lambdas -- Closures -- Method Objects -- Functional Programming -- Classes and Modules -- Defining a Simple Class -- Method Visibility: Public, Protected, Private -- Subclassing and Inheritance -- Object Creation and Initialization -- Modules -- Loading and Requiring Modules -- Singleton Methods and the Eigenclass -- Method Lookup -- Constant Lookup -- Reflection and Metaprogramming -- Types, Classes, and Modules -- Evaluating Strings and Blocks -- Variables and Constants -- Methods -- Hooks -- Tracing -- ObjectSpace and GC -- Custom Control Structures -- Missing Methods and Missing Constants -- Dynamically Creating Methods -- Alias Chaining -- Domain-Specific Languages -- The Ruby Platform -- Strings -- Regular Expressions -- Numbers and Math -- Dates and Times -- Collections -- Files and Directories -- Input/Output -- Networking -- Threads and Concurrency -- The Ruby Environment -- Invoking the Ruby Interpreter -- The Top-Level Environment -- Practical Extraction and Reporting Shortcuts -- Calling the OS -- Security…”
    Libro electrónico
  11. 1371
    por Robbins, Arnold
    Publicado 2010
    Tabla de Contenidos: “…shell; :; .; [[ ]]; name (); alias; bg; bind; break; builtin; caller; case; cd; command; compgen; complete; compopt; continue; declare; dirs; disown; do; done; echo; enable; esac; eval; exec; exit; export; false; fc; fg; fi; for; for…”
    Libro electrónico
  12. 1372
    por Thou, Jacques Auguste de
    Publicado 1733
    Tabla de Contenidos: “…Scripta varii argumenti: alia ab ipso Jac. Aug. Thuano effecta ... (59 p.) -- X. …”
    Ver edición digitalizada de Google Books
    Libro
  13. 1373
    por Dwivedi, Himanshu
    Publicado 2008
    Tabla de Contenidos: “…EncryptionSIP Security Attacks; Username Enumeration; SIP Password Retrieval; Man-in-the-Middle Attack; Registration Hijacking; Spoofing SIP Proxy Servers and Registrars; Denial of Service via BYE Message; Denial of Service via REGISTER; Denial of Service via Un-register; Fuzzing SIP; Summary; 3: Signaling: H.323 Security; H.323 Security Basics; Enumeration; Authentication; Authorization; H.323 Security Attacks; Username Enumeration (H.323 ID); H.323 Password Retrieval; H.323 Replay Attack; H.323 Endpoint Spoofing (E.164 Alias); E.164 Alias Enumeration; E.164 Hopping Attacks…”
    Libro electrónico
  14. 1374
    Publicado 2009
    “…En la pequeña ciudad de Holly Sping, Mississippi, vive Jewel Mae Orcull, alias "Cookie", una viuda que envejece con la compañía de la joven hija de su sobrina Cora y de Willis, un empleado negro al que hospeda a cambio de que la cuide. …”
    Video
  15. 1375
  16. 1376
  17. 1377
  18. 1378
    Publicado 2006
    “…Learning ActionScript 2.0 for Macromedia Flash 8 also includes numerous hands-on examples on how to apply expressive and interactive features to your files using ActionScript code, such as file upload, filter effects, scripted animation, and anti-alias text using the FlashType font rendering engine. …”
    Libro electrónico
  19. 1379
    Publicado 2005
    “…With Maya 6 and this task-based guide, you can do that and a lot more on the way to creating ever more sophisticated 3D worlds with Alias' newly updated modeling and animation software. …”
    Libro electrónico
  20. 1380
    Publicado 2004
    “…Long before the Hollywood actress brought the Tomb Raider heroine to life, Alias' 3D modeling software Maya was used to create the lovely Lara; Ms. …”
    Libro electrónico