Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 768
- Management 727
- Engineering & Applied Sciences 715
- History 674
- Application software 584
- Computer Science 481
- Historia 379
- Data processing 351
- Computer networks 348
- Leadership 300
- Business & Economics 291
- Computer software 276
- Design 276
- Economics 276
- Database management 261
- Computer programs 255
- Artificial intelligence 254
- Information technology 253
- Security measures 253
- Education 250
- Computer programming 241
- Python (Computer program language) 233
- Social aspects 232
- Cloud computing 230
- Web site development 229
- Computer security 223
- Web sites 222
- Java (Computer program language) 221
- Medicine 214
- Business 200
-
21181por Mayer, Robert, 1939 July 27-“…It’s charisma...a non-threatening approach that in many ways builds on the principles laid out long ago in Dale Carnegie’s How to Win Friends & Influence People.” …”
Publicado 2005
Libro electrónico -
21182por Jantti, Jouko“…When migrating an IMS system from a single, non-sharing environment to one which invokes some or all of these services, or even when incorporating additional function into an existing IMSplex (for example, upgrading a data sharing system to also use shared queues), the migration process must be carefully planned. Many decisions must be made, compromises made, perhaps even some application or database changes made. …”
Publicado 2003
Libro electrónico -
21183por Palinski, John“…Also included are coverage of Oracle’s new analytic functions, a chapter on performance-tuning techniqes needed for complex SQL, and a detailed overview of Oracle’s PL/SQL language. In addition, many chapters provide practice questions designed to reinforce newly introduced concepts, as well as numerous examples of SQL techniques. …”
Publicado 2003
Libro electrónico -
21184Publicado 2022“…Shankar is the owner, founder, and one of the many instructors at Valaxy Technologies. While he has worked with various technologies in his career, he specializes in Cloud and DevOps. …”
Video -
21185Publicado 2017“…Drawing on research in economics, psychology, computer science, and many other fields, The Diversity Bonus also tells the stories of people and organizations that have tapped the power of diversity to solve complex problems. …”
Grabación no musical -
21186Publicado 2022“…Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and tools Key Features Understand modern human-operated cyber attacks, focusing on threat actor tactics, techniques, and procedures Collect and analyze ransomware-related cyber threat intelligence from various sources Use forensic methods and tools to reconstruct ransomware attacks and prevent them in the early stages Book Description Ransomware attacks have become the strongest and most persistent threat for many companies around the globe. Building an effective incident response plan to prevent a ransomware attack is crucial and may help you avoid heavy losses. …”
Libro electrónico -
21187Publicado 2013“…Finally, it is worth noting that the authors are very active both as academics and in sports. Many of them were or still are involved with professional sport. …”
Libro electrónico -
21188Publicado 2022“…Some of them are Service Registry and Discovery, Service Mesh, Apache Cassandra ETCD (coordinator managing Kubernetes clusters), Apache Kafka, Idempotent service design, retry logic, Sharding, and Consistent Hashing, Client-side Load Balancing, Distributed Tracing, Canary Deployment, Sidecar Pattern, Circuit Breaker, and many more. Finally, you will also see the principles of various distributed systems designs; for example, master-less versus with leaders, poll-based versus push-based, immediate versus eventual consistency. …”
Video -
21189Publicado 2023“…There are also twice as many online practice tests included. You'll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. …”
Libro electrónico -
21190Publicado 2021“…It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. …”
Libro electrónico -
21191Publicado 2020“…Reshaping curricula is a considerable challenge, implying complex decision-making processes and various administrative obstacles. Many departments and faculties are still dominated by traditional approaches and subject-related 'silo thinking', while the new industrial age requires fundamentally new mind-sets and visionary leadership. …”
Libro electrónico -
21192Publicado 2019“…Over the past two decades, the issue of sexual orientation and gender identity has become a topic of public debate in many African countries. In connection with the rise of anti-homosexual violence in the 2000s, social science research has tried to show that, suddenly homophobic, Africa, had long been a place of tolerance for sexual diversity, on condition that it remained private. …”
Libro electrónico -
21193Publicado 2022“…National governments saw military service as evidence that Indigenous peoples wished to assimilate, but wartime experiences confirmed many communities' commitment to their home cultures and opened new avenues for activism. …”
Libro electrónico -
21194Publicado 2024“…The later chapters cover tools developed using the Clang/LLVM, including clang-tidy for linting, refactoring tools, and IDE support, and feature many examples to illustrate the material. By the end of this book, you'll have a solid understanding of Clang, different Clang Tools, and how to use them to their fullest potential. …”
Libro electrónico -
21195Publicado 2023“…This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. …”
Libro electrónico -
21196Publicado 2010“…Participants in the studies were mainly adults (+35 years) and had a history of chronic, long term heroin addiction, and many had previously failed attempts in traditional treatment programs (without and with methadone substitution and maintenance). …”
Libro electrónico -
21197por Institute of Medicine (U.S.)“…Protecting the homeland is physically and mentally demanding and entails many inherent risks, necessitating a DHS workforce that is mission ready. …”
Publicado 2014
Libro electrónico -
21198por Scott, Robert A., 1935-“…Scott discusses why an impoverished people would commit so many social and personal resources to building something so physically stupendous and what this says about their ideas of the sacred, especially the vital role they ascribed to the divine as a protector against the dangers of everyday life. …”
Publicado 2003
Sumario
Libro -
21199por Cohen, Adam Seth“…Contrary to what Americans might like to believe, the Court does not protect equally the rights of the poor and disadvantaged, and, in fact, hasn't for decades. Many of the greatest successes of the Warren Court, such as school desegregation, labor unions, voting rights, and class action suits, have been abandoned in favor of rulings that protect privileged Americans who tend to be white, wealthy, and powerful. …”
Publicado 2020
Libro -
21200por Weintraub, Stanley, 1929-“…When angry superiors ordered them to recommence the shooting, many men aimed harmlessly high overhead. Sometimes the greatest beauty emerges from deep tragedy. …”
Publicado 2001
Libro