Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,793
- Management 1,667
- Engineering & Applied Sciences 1,605
- Application software 1,579
- History 1,194
- Computer networks 1,119
- Computer Science 1,052
- Data processing 993
- Computer programs 871
- Security measures 859
- Design 763
- Examinations 749
- Computer security 733
- Cloud computing 720
- Database management 715
- Operating systems (Computers) 661
- Programming 641
- Python (Computer program language) 637
- Java (Computer program language) 633
- Web site development 624
- Research 602
- Computer software 582
- Web sites 582
- Certification 578
- Education 575
- Information technology 573
- Computer programming 566
- Artificial intelligence 555
- Photography 546
- Digital techniques 530
-
45101Publicado 2015“…This video tutorial also covers views, text formats and visual editors, media, and how to use taxonomy. …”
-
45102Publicado 2014“…This video tutorial also covers corridor modeling, grading in Civil 3D, pipe networks, quantity takeoffs, creating sheets, and much more. …”
-
45103Publicado 2014“…Dave Seff starts with coverage of how 3D printers work and then shows how to create a 3D model (beginner and advanced lessons), slice (prepare for printing), and then print a 3D model. Seff also covers troubleshooting problems when they arise. About the Instructor Dave Seff is, professionally, a UNIX/Linux engineer. …”
-
45104por Soper, Edward Mark“…Using clear pictures, handy “symptom tables,” and easy-to-use flowcharts, Mark Edward Soper walks you step-by-step through identifying, solving, and preventinghundreds of today’s most aggravating tech problems. Soper covers all your major platforms: iPhones, iPads, Android devices, Windows systems, and more. …”
Publicado 2014
Libro electrónico -
45105Publicado 2015“…CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide covers all exam topics, including: Computer forensics investigation process Setting up a computer forensics lab First responder procedures Search and seizure laws Collecting and transporting digital evidence Understanding hard disks and file systems Recovering deleted files and partitions Windows forensics Forensics investigations using the AccessData Forensic Toolkit (FTK) and Guidance Software's EnCase Forensic Network, wireless, and mobile forensics Investigating web attacks Preparing investigative reports Becoming an expert witness Electronic content includes: 300 practice exam questions Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain…”
Libro electrónico -
45106Publicado 2015“…Plus, you'll discover different types of trading styles and make a concrete strategy and game plan before you act on anything. Covers currency trading conventions and tools Provides an insider's look at key characteristics of successful currency traders Explains why it's important to be organized and prepared Offers guidance on trading pitfalls to avoid and risk management rules to live by Whether you're just getting started out in the foreign exchange market or an experienced trader looking to diversify your portfolio, Currency Trading For Dummies sets you up for trading success…”
Libro electrónico -
45107Publicado 2013“…Some of the other topics that Matt covers in this tutorial video include; working with solids and surfaces, master model techniques, using plate cams, gear mates, universal joint mates and other advanced mates. …”
-
45108Publicado 2022“…Tree-Based Machine Learning Methods in SAS Viya covers everything from using a single tree to more advanced bagging and boosting ensemble methods. …”
Libro electrónico -
45109por Walker, Matt“…Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition. Covers all exam topics, including: Ethical hacking fundamentals Reconnaissance and footprinting Scanning and enumeration Sniffing and evasion Attacking a system Hacking web servers and applications Wireless network hacking Mobile, IoT, and OT Security in cloud computing Trojans and other attacks, including malware analysis Cryptography Social engineering and physical security Penetration testing Online test engine provides full-length practice exams and customizable quizzes by chapter or exam domain…”
Publicado 2022
Libro electrónico -
45110Publicado 2022“…Filled with detailed how-to steps and full-color illustrations, David Busch's Sony Alpha a7 IV Guide to Digital Photography covers every feature of this camera in depth, from taking your first photos through advanced details of setup, exposure, lens selection, lighting, and more, and relates each feature to specific photographic techniques and situations. …”
Libro electrónico -
45111Publicado 2023“…Building on an empirically situated approach, the chapters in this volume break new ground by covering a range of themes, from cultural diplomacy and nation branding to media materiality and information infrastructures. …”
Libro electrónico -
45112Publicado 2019“…Get off to a steady start in game development with this course that covers all the essential concepts, tools, and functions that you'll need to build fully functional games with C# and the Unity game engine. …”
-
45113Publicado 2015“…Filled with detailed how-to steps and full-color illustrations, David Busch's Sony a77 II Guide to Digital Photography covers all the camera's features in depth, from taking your first photos through advanced details of setup, exposure, lens selection, lighting, and more, and relates each feature to specific photographic techniques and situations. …”
Libro electrónico -
45114Publicado 2019“…This IBM® RedpaperTM publication is a comprehensive guide that covers the IBM Power System H924 (9223-42H), and IBM Power System H922 (9223-22H) servers that support memory-intensive workloads such as SAP HANA, and deliver superior price/performance for mission-critical applications in IBM AIX®, IBM i, and Linux operating systems. …”
Libro electrónico -
45115Publicado 2020“…You’ll learn by working with real data and genomics algorithms from the field. This book covers: Essential genomics and computing technology background Basic cloud computing operations Getting started with GATK, plus three major GATK Best Practices pipelines Automating analysis with scripted workflows using WDL and Cromwell Scaling up workflow execution in the cloud, including parallelization and cost optimization Interactive analysis in the cloud using Jupyter notebooks Secure collaboration and computational reproducibility using Terra…”
Libro electrónico -
45116Publicado 2016“…This video tutorial also covers release management and feedback loops. Finally, you will learn advanced techniques, such as feature toggles, deployment slots, and traffic manager. …”
-
45117Publicado 2016“…Description Part I of this LiveLessons course covers Lean and Kanban principles and patterns to provide learners a solid understanding for where Lean came from and an overview of its various principles. …”
-
45118Publicado 2006“…Concentrating primarily on certain fundamental building blocks it covers: the theory and mathematical properties of barter and monetary relations the distinction between barter and monetary relations and money and non-money commodities the concept of exchange as an equation, and the notion of the exchange relation as a relation of equality. …”
Libro electrónico -
45119Publicado 2024“…Complete with an online practice test, this book comprehensively covers every competency and domain tested by the new exam, including security principles, business continuity, disaster recovery, incident response, access control concepts, network security, and security operations. …”
Grabación no musical -
45120Publicado 1997“…The discussion of internals helps you program more efficiently and embed Perl within C or C within Perl. Major topics covered include: Practical use of packages and classes (object-oriented programming) Complex data structures Persistence (e.g., using a database) Networking Graphical interfaces, using the Tk toolkit Interaction with C language functions Embedding and extending the Perl interpreter In addition, the book patiently explains all sorts of language details you've always wanted to know more about, such as the use of references, trapping errors through the eval operator, non-blocking I/O, when closures are helpful, and using ties to trigger actions when data is accessed. …”
Libro electrónico