Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
23161Publicado 2014“…Covers iOS 8 for all models of iPad Air and iPad mini, 3rd & 4th Generation iPads, and iPad 2 My iPad, Seventh Edition, helps you quickly get started with your new tablet, and use its features to look up information and perform day-to-day activities from anywhere, any time. …”
Libro electrónico -
23162Publicado 2014“…Covers iOS 8 for all models of iPad mini My iPad mini helps you quickly get started with your new tablet, and use its features to look up information and perform day-to-day activities from anywhere, any time. …”
Libro electrónico -
23163Publicado 2019“…Also, you will understand why CAs (Certificate Authorities) are needed and how the chain of trust is built. We will perform multiple practice activities: Buy a domain and configure DNS settings Use the Certbot ACME client to automatically obtain a free SSL certificate from Let's Encrypt With the help of OpenSSL, generate RSA keys and self-signed certificates Secure WordPress with Apache using SSL/TLS certificates Create a CSR (Certificate Signing Request) via OpenSSL and submit it to the CA server Configure Cloudflare for your domain and set up different SSL operation modes Install and configure NGINX web servers for SSL/TLS certificates Migrate from HTTP to HTTPS Redirect all traffic using HTTP 301 redirect from HTTP to HTTPS No prior knowledge of computer networks, encryption, or configuring web servers is required. …”
-
23164Publicado 2015“…Data events are collected in Cassandra and read out by Spark to perform the machine learning analytics. Once the model is trained in Spark, the model's parameters are written back to Cassandra. …”
-
23165Publicado 2019“…This course touches each important aspect of SEO, including all updates: Basic SEO vocabulary Important SEO industry terms Doing keyword research Implementing technical factors and page speed optimization Diving into website indexing and link building techniques Hands-on local SEO Protecting websites from negative SEO Learn to use 20+ different tools Performing SEO audit This course takes you to each topic in a connected way so you can relate to each topic and understand its importance. …”
-
23166Publicado 2018“…Deploy and scale your Kafka Streams application without a cluster! Perform aggregations, joins, and any operations you may think of using only a few lines of code! …”
-
23167Publicado 2016“…UX expert Jaime Levy has a proven formula for performing UX strategy based on four tenets. In this course (number two of her five part series), she explores the first of those tenets: Business strategy. …”
-
23168Publicado 2017“…About This Video Learn how to manage operations on your Elastic Stack, using X-Pack to monitor your cluster's health. Learn how to perform operational tasks like scaling up your cluster, and doing rolling restarts. …”
-
23169Publicado 2016“…Understand intrusion detection: Its meaning, its value, and how to implement it Master the workings of host-based and network-based intrusion detection systems Learn about network captures, cryptographic hashes, alerting, incident response, and more Gain awareness of anomaly based and signature based intrusion detection systems Learn to use open source intrusion detection systems like Snort, Suricata, and Bro Understand how to perform file integrity checks using Tripwire and Samhain Review multiple forms of built-into-the-OS IDS systems Ric Messier directs the Cybersecurity & Digital Forensics program at Champlain College in Burlington, VT. …”
-
23170Publicado 2016“…Simple event handlers that do things like make buttons and menu items perform actions, are commonly used by even novice C# programmers. …”
-
23171Publicado 2018“…Write clear, simple, readable, and reliable tests that perform complex test automation tasks. Learn how to use Selenium Grid and run tests in the cloud. …”
-
23172Publicado 2021“…One-stop solution for NLP practitioners, ML developers, and data scientists to build effective NLP systems that can perform real-world complicated tasksKey FeaturesApply deep learning algorithms and techniques such as BiLSTMS, CRFs, BPE and more using TensorFlow 2Explore applications like text generation, summarization, weakly supervised labelling and moreRead cutting edge material with seminal papers provided in the GitHub repository with full working codeBook DescriptionRecently, there have been tremendous advances in NLP, and we are now moving from research labs into practical applications. …”
Libro electrónico -
23173Publicado 2016“…Learners should have current versions of Lightroom and Photoshop; know how to open the programs and perform basic editing; and, if they intend to do image editing in conjunction with mobile apps, a smart device with the ability to connect to the Internet. …”
-
23174Publicado 2013“…Simple, quick video walkthroughs of the tasks you perform most often! Great personalized training at a fraction of the cost...for everyone who doesn't have time to read a book! …”
-
23175Publicado 2011“…This book delivers exactly what you’re looking for: step-by-step help and guidance with the tasks that users, authors, content managers, and site managers perform most often. Fully updated to reflect SharePoint 2010’s latest improvements, this book covers everything from lists and views to social networking, workflows, and security. …”
Libro electrónico -
23176Publicado 2011“…Coverage of each application is jam-packed with information and tips that not only explain HOW to perform a task, but WHY you need this procedure and WHEN it's best to use it…”
-
23177Publicado 2012“…Next, readers will explore working in Waveform View, performing such tasks as basic editing, signal processing, audio restoration, mastering, and creating and recording files. …”
Libro electrónico -
23178por Allan, Alasdair“…Authors Alasdair Allan and Kipp Bradford walk you through the entire process, from prototyping a simple sensor node to performing real-time analysis on data captured by a deployed multi-sensor network. …”
Publicado 2013
Libro electrónico -
23179Publicado 2011“…After giving you a feel for your surroundings, Sylvan explains how to use PhotoGene’s image-editing tools to perform basic adustments such as cropping, rotating, sharpening, and color correcting your images. …”
Libro electrónico -
23180“…Now in its third edition, this best-selling book continues to bring you some of the best thinking on how to apply Oracle Database to produce scalable applications that perform well and deliver correct results. Tom Kyte and Darl Kuhn share a simple philosophy: "you can treat Oracle as a black box and just stick data into it, or you can understand how it works and exploit it as a powerful computing environment." …”
Libro electrónico