Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
5601
-
5602por Gismera García, María JesúsMaterias: “…High performance liquid chromatography…”
Publicado 2009
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
5603
-
5604
-
5605por Jochim, AnnamiraMaterias: “…Bild; Bewegung; Performance; Video; Tanz; Bildwissenschaft; Medienkunst; Image; Dance; Visual Studies; Media Art…”
Publicado 2015
Electrónico -
5606
-
5607
-
5608por Niven, Paul R.Tabla de Contenidos: “…Introduction to the balanced scorecard -- Adapting the balanced scorecard to fit the public and nonprofit sectors -- Before you begin -- Training and communication planning for balanced scorecard success -- Mission, values, and vision -- Strategy : the core of every balanced scorecard -- Strategy maps -- Performance measures, targets, and initiatives -- Creating alignment by cascading the balanced scorecard -- Linking resource allocation to the balanced scorecard -- Reporting results -- The City of Charlotte : a balanced scorecard success story -- Sustaining balanced scorecard success…”
Publicado 2008
Libro electrónico -
5609
-
5610Publicado 2010Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Libro
-
5611por Committee on the Review of the Use of Scientific Criteria and Performance Standards for Safe Food.Tabla de Contenidos: “…FrontMatter -- Preface -- Contents -- Acronyms -- Executive Summary -- 1 Historical Perspective on the Use of Food Safety Criteria and Performance Standards -- 2 The Science of Public Health Surveillance -- 3 Food Safety Tools -- 4 Scientific Criteria and Performance Standards to Control Hazards in Meat and Poultry Products -- 5 Scientific Criteria and Performance Standards to Control Hazards in Seafood -- 6 Scientific Criteria and Performance Standards to Control Hazards in Produce and Related Products -- 7 Scientific Criteria and Performance Standards to Control Hazards in Dairy Products -- 8 Overall Findings and Recommendations -- APPENDIXES -- Appendix A Current and Proposed Definitions of Key Food Safety Terms -- Appendix B Sanitation Performance Standards -- Appendix C Food and Drug Administration and Environmental Protection Agency Guidance Levels for Seafood -- Appendix D Food Defect Action Levels in Produce -- Appendix E International Microbiological Criteria -- Appendix F International Microbiological Criteria for Dairy Products -- Appendix G U.S. …”
Publicado 2003
Libro electrónico -
5612por Association for Computing Machinery“…Co-Design for High Performance Computing 2015…”
Publicado 2015
Libro electrónico -
5613
-
5614Publicado 2015Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
5615
-
5616
-
5617
-
5618Publicado 2024Tabla de Contenidos: “…Registering absolute routes -- Registering relative routes -- Passing data to pages -- Improving our app -- Understanding the improved design -- Registering absolute routes and relative routes -- Model and services -- Implementation of IUserService -- Improving the login process -- Login view model -- Login UI -- Summary -- Chapter 6: Software Design with Dependency Injection -- Technical requirements -- A brief overview of design principles -- Exploring types of design principles -- Don't Repeat Yourself (DRY) -- Keep It Simple, Stupid (KISS) -- You Aren't Gonna Need It (YAGNI) -- SOLID design principles -- Using design principles -- Implementing DI -- Lifetime management -- Configuring DI in .NET MAUI -- Constructor injection -- Method injection -- Property injection -- Replacing the mock data store -- Initializing the database -- Performing CRUD operations -- Adding an item -- Editing or deleting an item -- Summary -- Further reading -- Chapter 7: Using Platform-Specific Features -- Technical requirements -- Implementing platform-specific code -- Conditional compilation -- Interfaces, partial class, and methods -- .NET MAUI/Xamarin plugins -- The evolution of .NET MAUI/Xamarin plugins -- The introduction of Plugin.Fingerprint -- Supporting fingerprint functionality using Plugin.Fingerprint -- Fingerprint settings -- Login using a fingerprint -- Customizing controls -- Overview of handlers -- Using HybridWebView -- Implementing MarkdownView -- Summary -- Further reading -- Part 2: Implementing .NET MAUI Blazor -- Chapter 8: Introducing Blazor Hybrid App Development -- Technical requirements -- What is Blazor? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
5619por Astolfi, Roberto“…This performance is assessed using both ex-post and real-time analyses. …”
Publicado 2016
Capítulo de libro electrónico -
5620Publicado 2017Tabla de Contenidos: “…Training a classification model on the Kaggle/StumbleUpon evergreen classification dataset -- Using classification models -- Generating predictions for the Kaggle/StumbleUpon evergreen classification dataset -- Evaluating the performance of classification models -- Accuracy and prediction error -- Precision and recall -- ROC curve and AUC -- Improving model performance and tuning parameters -- Feature standardization -- Additional features -- Using the correct form of data -- Tuning model parameters -- Linear models -- Iterations -- Step size -- Regularization -- Decision trees -- Tuning tree depth and impurity -- The naà ̄ve Bayes model -- Cross-validation -- Summary -- Chapter 7: Web Application Vulnerability Assessment -- Introduction -- Running vulnerable web applications in Docker -- Getting ready -- How to do it... -- How it works... -- Using W3af for vulnerability assessment -- Getting ready -- How to do it... -- How it works... -- Using Nikto for web server assessment -- Getting ready -- How to do it... -- How it works... -- Using Skipfish for vulnerability assessment -- Getting ready -- -- How it works... -- Using Burp Proxy to intercept HTTP traffic -- Getting ready -- How to do it... -- How it works... -- Using Burp Intruder for customized attack automation -- Getting ready -- How to do it... -- How it works... -- Using Burp Sequencer to test the session randomness -- Getting ready -- How to do it... -- How it works... -- Chapter 8: Web Application Exploitation -- Introduction -- Using Burp for active/passive scanning -- Getting ready -- How to do it... -- How it works... -- Using sqlmap to find SQL Injection on the login page -- Getting ready -- How to do it... -- How it works... -- Exploiting SQL Injection on URL parameters using SQL Injection -- Getting ready -- How to do it... -- How it works... -- Getting ready -- How to do it…”
Libro electrónico