Mostrando 13,481 - 13,500 Resultados de 13,581 Para Buscar '"convent"', tiempo de consulta: 0.19s Limitar resultados
  1. 13481
    Publicado 2013
    “…Stephen Jaeger, Eileen Joy, Anna Klosowska, Nicola Masciandaro, Peggy McCracken, Paul Strohm, David Wallace, and Paul Zumthor, among others, have blended the conventions of academic writing with those of fiction, drama, memoir, comedy, polemic, and lyricism, and/or have developed what some would describe as elegant, and arresting (and in some cases, deliciously difficult), prose styles. …”
    Libro electrónico
  2. 13482
    por Bright, Charles D., 1921-2014
    Publicado 1978
    “…Air Force and other government markets; the mechanics of government procurement—bidding, pricing, buying; difficulties in the commercial airliner business; the ordering of technology and the prevailing “design or die” philosophy; and different systems of production through the years.Special attention is given to major problems such as the industry’s need for diversification and the skyrocketing costs that threaten to make aerospace products uneconomical. The conventional economic concerns of entry into and exit from the industry are treated in depth. …”
    Libro electrónico
  3. 13483
    por Bérard-Azzouz, Odile
    Publicado 2020
    “…Peut-être celle contenue dans la lettre adressée le 13 février 1794, à la Convention, par le député Boissy d’Anglas : « Conservez les monuments des arts, des sciences et de la Raison, ils attestent à la fois et perpétuent les richesses de l’esprit humain ; ils fixent au milieu de vous et naturalisent sur votre territoire le résultat des plus belles conquêtes du génie et des plus profondes méditations de l’étude »…”
    Electrónico
  4. 13484
    Publicado 2018
    “…You will learn from industry standard patterns and practices, and shift from a conventional approach to a modern and efficient software testing approach in C# and JavaScript. …”
    Libro electrónico
  5. 13485
    “…La Russie a également signé des conventions sur l’investissement et sur la double imposition avec des pays de l’OCDE ou des pays tiers. …”
    Libro electrónico
  6. 13486
    Publicado 2013
    “…In them he expanded his corrosive social criticism, sparing no one: gods and heroes, religion and religions, philosophy and its various sects, conventional morality, society and its most revered pillars, men and their vanity, irrational superstitions and the use that is made of them by the cunning ... …”
    Libro electrónico
  7. 13487
    Publicado 2017
    “…What You Will Learn Develop extendable plugins with the use of WordPress features in core modules Develop pluggable modules to extend the core features of WordPress as independent modules Manage permissions for a wide range of content types in web applications based on different user types Follow WordPress coding standards to develop reusable and maintainable code Build and customize themes beyond conventional web layouts Explore the power of core database tables and understand the limitations when designing database tables for large applications Integrate open source modules into WordPress applications to keep up with the latest open source technologies Customize the WordPress admin section and themes to create the look and feel of a typical web application In Detail WordPress is one of the most rapidly expanding markets on the Web. …”
    Libro electrónico
  8. 13488
    por Sinha, Sanjib. author
    Publicado 2018
    “…You will then dive into classic and modern encryption techniques where you will learn the conventional cryptosystem. In the final chapter you will acquire the skill of exploiting remote Windows and Linux systems and you will learn how to own a target completely. …”
    Libro electrónico
  9. 13489
    Publicado 2020
    “…What you will learn Use the Angular CLI to scaffold, build, and deploy a new Angular application Build components, the basic building blocks of an Angular application Discover techniques to make Angular components interact with each other Understand the different types of templates supported by Angular Create HTTP data services to access APIs and provide data to components Enhance your application's UX with Angular Material Apply best practices and coding conventions to your large-scale web development projects Who this book is for The Angular TypeScript book is for JavaScript and full-stack developers who want to enter the world of frontend development with Angular or migrate to the Angular framework to build professional web applications. …”
    Libro electrónico
  10. 13490
    Publicado 2015
    “…Data visualization has become increasingly challenging using conventional approaches as datasets become larger and larger, especially with the Big Data evolution. …”
    Libro electrónico
  11. 13491
    Publicado 2015
    “…If you buy all that, then it follows that the more generations you bring aboard, the tougher it is to collaborate productively. But the conventional wisdom is 100% wrong. It isn’t so complicated–or difficult. …”
    Libro electrónico
  12. 13492
    Publicado 2015
    “…The book covers most aspects of builds required for conventional JVM-based projects, and when necessary, points you towards the right resources…”
    Libro electrónico
  13. 13493
    Publicado 2013
    “…In doing so, he explodes the conventional wisdom and identifies the distinct principles practiced by individuals who may or may not be any smarter than the rest of the population but seem to understand instinctively how money is made. …”
    Libro electrónico
  14. 13494
    Publicado 2023
    “…Master the linear algebra and other mathematical skills you'll need Explore key physics ideas, such as quantum states and uncertainty Review data structures, algorithms, and computing complexity Work with probability and set theory in quantum computing Familiarize yourself with basic quantum theory and formulae Understand quantum entanglement and quantum key distribution Discover how quantum computers are architected and built Explore several leading quantum algorithms Compare quantum and conventional asymmetric algorithms See how quantum computing might break traditional cryptography Discover several approaches to quantum-resistant cryptography Start coding with Q#, Microsoft's quantum programming language Simulate quantum gates and algorithms with QASM If you prefer a multimodal approach to learning, check out the Quantum Computing Fundamentals book by Chuck Easttom!…”
    Video
  15. 13495
    por Anchisi, Annick
    Publicado 2018
    “…Les analyses sociologiques proposées questionnent la pluralité et la variabilité des processus en jeu dans les interactions du soin et soulignent les règles institutionnelles et leurs incidences sur les organisations domestiques de santé. Les conventions mobilisées font l'objet de renégociations permanentes dont les désordres apparents occultent la recherche des compromis pour prendre en compte l'altérité des références et des normes propres aux différents participants du soin. …”
    Electrónico
  16. 13496
    Publicado 2007
    “…Topics covered include Writing better tests--and writing them faster The four phases of automated tests: fixture setup, exercising the system under test, result verification, and fixture teardown Improving test coverage by isolating software from its environment using Test Stubs and Mock Objects Designing software for greater testability Using test "smells" (including code smells, behavior smells, and project smells) to spot problems and know when and how to eliminate them Refactoring tests for greater simplicity, robustness, and execution speed This book will benefit developers, managers, and testers working with any agile or conventional development process, whether doing test-driven development or writing the tests last. …”
    Libro electrónico
  17. 13497
    Publicado 2010
    “…., and Executive Producer of “MarketViews.tv” Today, many risk-averse investors simply can’t meet their income needs with conventional bank CDs, money market funds, or bonds. …”
    Libro electrónico
  18. 13498
    Publicado 2008
    “…The Appels’ approach is remarkably simple and requires only one hour of your time every 3 months, but don’t let that fool you : it draws on state-of-the-art strategies currently being used that really work. www.systemsandforecasts.com www.appelasset.com www.signalert.com If you know what to do, active investing can yield far better returns than “buy-and-hold” investing. But conventional approaches to active investing can be highly complex and time-consuming. …”
    Libro electrónico
  19. 13499
    por Cooper, Chris
    Publicado 2004
    “…PA-RISC architecture: register set, virtual memory, key instructions, and procedure calling conventions HP-UX kernel organization: hardware-dependent and independent data structures Process and thread management: proc tables, memory management, scheduling, and the complete process/thread lifecycle System-wide memory resources: allocation and mapping to physical memory HP-UX paging and swapping Files and filesystems: traditional UNIX filesystems, HFS, VFS, and dynamic buffer cache I/O and device management: addressing, DMA, interrupts, device files, I/O configuration, device driver assignments, and I/O request pathways Logical Volume Management (LVM): abstracting physical disks from the disk I/O system HP-UX multiprocessing: challenges, data structures, and interfaces Kernel communication services: semaphores, message queues, shared memory, signals, and the kernel "callout" system Signaling in complex threaded environments System initialization, from vmunix to init: running HP-UX on diverse platforms Whether you administer HP-UX, tune it, troubleshoot it, or write kernel modules for it, you'll find HP-UX 11i Internals indispensable. …”
    Libro electrónico
  20. 13500
    Publicado 2007
    “…Coverage includes: Why conventional bug-catching often misses security problems How static analysis can help programmers get security right The critical attributes and algorithms that make or break a static analysis tool 36 techniques for making static analysis more effective on your code More than 70 types of serious security vulnerabilities, with specific solutions Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more Techniques for handling untrusted input Eliminating buffer overflows: tactical and strategic approaches Avoiding errors specific to Web applications, Web services, and Ajax Security-aware logging, debugging, and error/exception handling Creating, maintaining, and sharing secrets and confidential information Detailed tutorials that walk you through the static analysis process “We designed Java so that it could be analyzed statically. …”
    Libro electrónico