Mostrando 5,881 - 5,900 Resultados de 1,780,662 Para Buscar '"s. I"', tiempo de consulta: 1.65s Limitar resultados
  1. 5881
    Publicado 2007
    Tabla de Contenidos: “…Background. The history ; The iPod family ; The iPhone -- Operation. Using the iPod ; Using the iTunes software ; Using the iTunes store -- Applications. …”
    Libro electrónico
  2. 5882
    Nāmah-i Anjuman-i Ḥasharah-i Shināsī Īrān
    نامه انجمن حشره شناسى ايران
    Publicado 1973
    Revista digital
  3. 5883
    “…Muṭāli̒āt-i jughrāfiyāyī-i manāṭiq-i khushk…”
    Revista digital
  4. 5884
    por Seelig, Tina Lynn
    Publicado 2009
    Libro
  5. 5885
    Publicado 1879
    Libro
  6. 5886
    Publicado 1956
    “…Die Urkunden Konrad I. Heinrich I. und Otto I.…”
    Conectar con la página web relacionada
    Conectar con la versión electrónica
    Libro
  7. 5887
    por Ghilès, Francis
    Publicado 2011
    Enlace del recurso
    Artículo digital
  8. 5888
  9. 5889
  10. 5890
    por Tedeschi, Alberto
    Publicado 1964
    Libro
  11. 5891
  12. 5892
    por Lewis, Agnes Smith, 1843-1926
    Publicado 1907
    Libro
  13. 5893
    Libro
  14. 5894
    por Lorenz, Ellen
    Publicado 2011
    Tesis
  15. 5895
    Capítulo
  16. 5896
    por Fierro Blanco, Antonio de
    Publicado 1933
    Libro
  17. 5897
    Publicado 2021
    Libro electrónico
  18. 5898
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication -- Contents At A Glance -- Contents -- Acknowledgments -- Introduction -- Exam Objective Map -- Part I Secure Software Concepts -- Chapter 1 Core Concepts -- Chapter 2 Security Design Principles -- Part II Secure Software Requirements -- Chapter 3 Define Software Security Requirements -- Chapter 4 Identify and Analyze Compliance Requirements -- Chapter 5 Misuse and Abuse Cases -- Part III Secure Software Architecture and Design -- Chapter 6 Secure Software Architecture -- Chapter 7 Secure Software Design -- Part IV Secure Software Implementation -- Chapter 8 Secure Coding Practices -- Chapter 9 Analyze Code for Security Risks -- Chapter 10 Implement Security Controls -- Part V Secure Software Testing -- Chapter 11 Security Test Cases -- Chapter 12 Security Testing Strategy and Plan -- Chapter 13 Software Testing and Acceptance -- Part VI Secure Software Lifecycle Management -- Chapter 14 Secure Configuration and Version Control -- Chapter 15 Software Risk Management -- Part VII Secure Software Deployment, Operations, Maintenance -- Chapter 16 Secure Software Deployment -- Chapter 17 Secure Software Operations and Maintenance -- Part VIII Secure Software Supply Chain -- Chapter 18 Software Supply Chain Risk Management -- Chapter 19 Supplier Security Requirements -- Part IX Appendix and Glossary -- Appendix About the Online Content -- System Requirements -- Your Total Seminars Training Hub Account -- Single User License Terms and Conditions -- TotalTester Online -- Technical Support -- Glossary -- Index…”
    Libro electrónico
  19. 5899
    Publicado 2014
    “…All-in-one…”
    Libro electrónico
  20. 5900
    Publicado 2016
    “…In just one hour a day, you’ll have all the skills you need to begin programming in C++. …”
    Libro electrónico