Mostrando 21,181 - 21,200 Resultados de 22,085 Para Buscar '"maní"', tiempo de consulta: 0.11s Limitar resultados
  1. 21181
    por Mayer, Robert, 1939 July 27-
    Publicado 2005
    “…It’s charisma...a non-threatening approach that in many ways builds on the principles laid out long ago in Dale Carnegie’s How to Win Friends & Influence People.” …”
    Libro electrónico
  2. 21182
    por Jantti, Jouko
    Publicado 2003
    “…When migrating an IMS system from a single, non-sharing environment to one which invokes some or all of these services, or even when incorporating additional function into an existing IMSplex (for example, upgrading a data sharing system to also use shared queues), the migration process must be carefully planned. Many decisions must be made, compromises made, perhaps even some application or database changes made. …”
    Libro electrónico
  3. 21183
    por Palinski, John
    Publicado 2003
    “…Also included are coverage of Oracle’s new analytic functions, a chapter on performance-tuning techniqes needed for complex SQL, and a detailed overview of Oracle’s PL/SQL language. In addition, many chapters provide practice questions designed to reinforce newly introduced concepts, as well as numerous examples of SQL techniques. …”
    Libro electrónico
  4. 21184
    Publicado 2022
    “…Shankar is the owner, founder, and one of the many instructors at Valaxy Technologies. While he has worked with various technologies in his career, he specializes in Cloud and DevOps. …”
    Video
  5. 21185
    Publicado 2017
    “…Drawing on research in economics, psychology, computer science, and many other fields, The Diversity Bonus also tells the stories of people and organizations that have tapped the power of diversity to solve complex problems. …”
    Grabación no musical
  6. 21186
    Publicado 2022
    “…Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and tools Key Features Understand modern human-operated cyber attacks, focusing on threat actor tactics, techniques, and procedures Collect and analyze ransomware-related cyber threat intelligence from various sources Use forensic methods and tools to reconstruct ransomware attacks and prevent them in the early stages Book Description Ransomware attacks have become the strongest and most persistent threat for many companies around the globe. Building an effective incident response plan to prevent a ransomware attack is crucial and may help you avoid heavy losses. …”
    Libro electrónico
  7. 21187
    Publicado 2013
    “…Finally, it is worth noting that the authors are very active both as academics and in sports. Many of them were or still are involved with professional sport. …”
    Libro electrónico
  8. 21188
    Publicado 2022
    “…Some of them are Service Registry and Discovery, Service Mesh, Apache Cassandra ETCD (coordinator managing Kubernetes clusters), Apache Kafka, Idempotent service design, retry logic, Sharding, and Consistent Hashing, Client-side Load Balancing, Distributed Tracing, Canary Deployment, Sidecar Pattern, Circuit Breaker, and many more. Finally, you will also see the principles of various distributed systems designs; for example, master-less versus with leaders, poll-based versus push-based, immediate versus eventual consistency. …”
    Video
  9. 21189
    Publicado 2023
    “…There are also twice as many online practice tests included. You'll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. …”
    Libro electrónico
  10. 21190
    Publicado 2021
    “…It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. …”
    Libro electrónico
  11. 21191
    Publicado 2020
    “…Reshaping curricula is a considerable challenge, implying complex decision-making processes and various administrative obstacles. Many departments and faculties are still dominated by traditional approaches and subject-related 'silo thinking', while the new industrial age requires fundamentally new mind-sets and visionary leadership. …”
    Libro electrónico
  12. 21192
    Publicado 2019
    “…Over the past two decades, the issue of sexual orientation and gender identity has become a topic of public debate in many African countries. In connection with the rise of anti-homosexual violence in the 2000s, social science research has tried to show that, suddenly homophobic, Africa, had long been a place of tolerance for sexual diversity, on condition that it remained private. …”
    Libro electrónico
  13. 21193
    Publicado 2022
    “…National governments saw military service as evidence that Indigenous peoples wished to assimilate, but wartime experiences confirmed many communities' commitment to their home cultures and opened new avenues for activism. …”
    Libro electrónico
  14. 21194
    Publicado 2024
    “…The later chapters cover tools developed using the Clang/LLVM, including clang-tidy for linting, refactoring tools, and IDE support, and feature many examples to illustrate the material. By the end of this book, you'll have a solid understanding of Clang, different Clang Tools, and how to use them to their fullest potential. …”
    Libro electrónico
  15. 21195
    Publicado 2023
    “…This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. …”
    Libro electrónico
  16. 21196
    Publicado 2010
    “…Participants in the studies were mainly adults (+35 years) and had a history of chronic, long term heroin addiction, and many had previously failed attempts in traditional treatment programs (without and with methadone substitution and maintenance). …”
    Libro electrónico
  17. 21197
    por Institute of Medicine (U.S.)
    Publicado 2014
    “…Protecting the homeland is physically and mentally demanding and entails many inherent risks, necessitating a DHS workforce that is mission ready. …”
    Libro electrónico
  18. 21198
    por Scott, Robert A., 1935-
    Publicado 2003
    “…Scott discusses why an impoverished people would commit so many social and personal resources to building something so physically stupendous and what this says about their ideas of the sacred, especially the vital role they ascribed to the divine as a protector against the dangers of everyday life. …”
    Sumario
    Libro
  19. 21199
    por Cohen, Adam Seth
    Publicado 2020
    “…Contrary to what Americans might like to believe, the Court does not protect equally the rights of the poor and disadvantaged, and, in fact, hasn't for decades. Many of the greatest successes of the Warren Court, such as school desegregation, labor unions, voting rights, and class action suits, have been abandoned in favor of rulings that protect privileged Americans who tend to be white, wealthy, and powerful. …”
    Libro
  20. 21200
    por Weintraub, Stanley, 1929-
    Publicado 2001
    “…When angry superiors ordered them to recommence the shooting, many men aimed harmlessly high overhead. Sometimes the greatest beauty emerges from deep tragedy. …”
    Libro