Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Música 229
- Música orquestal 194
- Development 189
- Engineering & Applied Sciences 188
- Historia 184
- Application software 176
- Computer programs 141
- Management 127
- Suites (Orquesta) 125
- Data processing 121
- History 110
- Computer Science 105
- Computer networks 94
- Business & Economics 91
- Security measures 85
- Web sites 85
- Computer graphics 81
- Operating systems (Computers) 78
- Design 77
- Computer software 76
- Business 75
- Cloud computing 74
- Música instrumental 74
- Database management 73
- Computer security 68
- Electrical & Computer Engineering 68
- Telecommunications 65
- Computer programming 63
- Economic conditions 61
- Suites (Piano) 54
-
3861por Al-Dbiyat, Mohamed“…Une partie des articles (céramique, monnaies, monuments religieux) éclaire d’un nouveau jour la définition du territoire régional, durant l’Antiquité et par la suite. Des questions de topographie historique sont aussi abordées grâce à la publication de nouvelles inscriptions. …”
Publicado 2018
Electrónico -
3862por Bock, Fabienne“…L’émergence d’un nouveau visage de l’État dans les pays européens engagés dans la guerre a fait l’objet d’une deuxième publication, qui complète ainsi la première par le regard neuf qu’elle offre sur le fonctionnement interne des administrations en temps de guerre. Faisant suite à ces deux ouvrages, ce troisième volume entend se centrer sur l’appel à la fiscalité qui a pris le relais de l’appel à l’épargne pour financer la guerre. …”
Publicado 2018
Electrónico -
3863Publicado 2018“…Learn to secure your IoT communication Who This Book Is For This book is for anyone who wants to get started with the AWS IoT Suite and implement it with practical use cases. …”
Libro electrónico -
3864Publicado 2021Tabla de Contenidos: “…Gracefully Declining a Recommendation (or a Request for One) -- Managing Recommendations -- Editing or removing recommendations you've made -- Handling new recommendations you've received -- Removing or requesting to revise a recommendation -- Chapter 10 Accessing LinkedIn with a Mobile Device -- Surveying the LinkedIn Mobile App -- Installing Any LinkedIn Mobile App -- Breaking Down the Sections of the LinkedIn Mobile App -- Connecting Your App Usage with Website Usage -- Chapter 11 Configuring Settings Like a Pro -- Using the Settings & -- Privacy Page as a Command Console -- Starting with Basic Account Changes -- Controlling Visibility and Privacy Settings -- Finalizing Your LinkedIn Communications Settings -- Chapter 12 Using LinkedIn with Your Internet Activities -- Exporting LinkedIn Connections to Your Email Application -- Creating your contacts export file in LinkedIn -- Exporting contacts to Office 365 -- Exporting contacts to Outlook (non-Office-Suite version) -- Exporting contacts to Gmail -- Exporting Your Profile and Badge -- Exporting your profile to a PDF file -- Creating a public profile badge for other websites -- Part 4 Finding Employees, Jobs, and Companies -- Chapter 13 Finding Employees -- Managing Your Job Listings -- Posting a job listing -- Advertising your job listing to your network -- Reviewing applicants -- Screening Candidates with LinkedIn -- Using Strategies to Find Active or Passive Job Seekers -- Chapter 14 Finding a Job -- Searching for an Open Position -- Tuning Up Your Profile and Network to Make a Good Impression -- Preparing Your Profile and Account Settings for Job Searches -- Checking your profile's visibility -- Optimizing your profile -- Involving LinkedIn in Job Search Strategies -- Leveraging connections -- Finding people with the same or similar job -- Taking advantage of your alma mater…”
Libro electrónico -
3865por Abdou, Moussa Malam“…Initialement réunies dans la perspective d'un colloque à Haïti (annulé suite au séisme de 2010), les contributions publiées ici portent sur des études de cas à Haïti, mais aussi à Madagascar, au Maghreb ou au Vietnam, soit au total une soixantaine de communications et une série de documents récents issus des réflexions des experts. …”
Publicado 2018
Electrónico -
3866“…Power Query, part of the Microsoft Power BI suite, is a tool that automates the process of getting data into Excel and will save you hours of dull, repetitive, and error-prone work! …”
Libro electrónico -
3867Publicado 2023Tabla de Contenidos: “…Triggers and gating -- Feature flags -- Enabling GitHub Actions for CI/CD implementation -- GitHub Actions for continuous integration -- GitHub Actions for continuous deployment -- Choosing an Integration Test Suite Methodology -- Summary -- Questions -- Further reading -- Chapter 9: Fault Injection and Chaos Testing -- Technical requirements -- Fault tolerance and fault injection -- Anticipating and tolerating faults -- Using your faults against you -- Chaos testing -- The order of chaos engineering -- Implementing fault injection and chaos tests -- Starting with Chaos Mesh -- Using Azure Chaos Studio -- Summary -- Questions -- Further reading -- Part 3: Testing and Deploying Microservices -- Chapter 10: Modern Design Patterns for Scalability -- Technical requirements -- Mechanisms for autoscaling -- Compute and CPU load -- Disk and I/O load -- Request and network load -- Memory-intensive operations -- Implementing autoscaling for Kubernetes services -- Native Kubernetes options -- Cloud platform options -- Third-party plugins -- Implementing autoscaling for Azure App Service -- Common platform options -- Adjustments for Web Apps -- Adjustments for API Apps -- Summary -- Questions -- Further reading -- Chapter 11: Minimizing Data Loss -- Technical requirements -- Preventing data loss -- Data consistency paradigms -- ACID paradigm/immediate consistency -- BASE paradigm / eventual consistency -- The Saga pattern -- Command query responsibility segregation (CQRS) -- Identifying acceptable data loss -- Acceptable and unacceptable data loss -- Methods of data loss -- Delivery guarantees -- At-most-once delivery -- At-least-once delivery -- Effectively-once delivery -- Data loss implications -- Summary -- Questions -- Further reading -- Chapter 12: Service and Application Resiliency -- Technical requirements -- Resiliency through cloud-native patterns…”
Libro electrónico -
3868Publicado 2024“…Equally crucial, it involves collaboration with internal teams and C-Suite stakeholders, and adeptly managing external entities like vendors and service providers. …”
Libro electrónico -
3869por Langworth, Ian“…A very early release of Perl 1.0 included a comprehensive test suite, and it's only impr…”
Publicado 2005
Libro electrónico -
3870Publicado 2018Tabla de Contenidos: “…Importance of web application security testing -- Application profiling -- Common web application security testing tools -- Authentication -- Credentials over a secure channel -- Authentication error messages -- Password policy -- Method for submitting credentials -- OWASP mapping -- Authorization -- OWASP mapping -- Session management -- Cookie checks -- Cross-Site Request Forgery -- OWASP mapping -- Input validation -- OWASP mapping -- Security misconfiguration -- OWASP mapping -- Business logic flaws -- Testing for business logic flaws -- Auditing and logging -- OWASP mapping -- Cryptography -- OWASP mapping -- Testing tools -- OWASP ZAP -- Burp Suite -- Summary -- Chapter 8: Privilege Escalation -- What is privilege escalation? …”
Libro electrónico -
3871por Holdsworth, B.“…*A highly accessible, comprehensive and fully up to date digital systems text*A well known and respected text now revamped for current courses*Part of the Newnes suite of texts for HND/1st year modules…”
Publicado 2002
Libro electrónico -
3872por McFedries, Paul“…A friendly, visual approach to learning the basics of Excel 2013 As the world's leading spreadsheet program, Excel is a spreadsheet and data analysis tool that is part of the Microsoft Office suite. The new Excel 2013 includes new features and functionalities that require users of older versions to re-learn the application. …”
Publicado 2013
Libro electrónico -
3873por Wickham, Hadley“…With this fully updated edition, developers and data scientists will learn how to bundle reusable R functions, sample data, and documentation together by applying the package development philosophy used by the team that maintains the "tidyverse" suite of packages. In the process, you'll learn how to automate common development tasks using a set of R packages, including devtools, usethis, testthat, and roxygen2. …”
Publicado 2023
Libro electrónico -
3874por Bluttman, Ken“… As part of the Microsoft Office suite, Access has become the industry's leading desktop database management program for organizing, accessing, and sharing information. …”
Publicado 2005
Libro electrónico -
3875Publicado 2003“…This book is for database designers and database administrators using Visio, which is the database component of Microsoft's Visual Studio .NET for Enterprise Architects suite, also included in MSDN subscriptions. This is the only guide to this product that tells DBAs how to get their job done. …”
Libro electrónico -
3876por McFedries, Paul“…Including Word, Excel, PowerPoint, and Entourage, this office productivity suite has the tools you need for word processing, spreadsheets, presentations, and managing e-mail and contacts. …”
Publicado 2009
Libro electrónico -
3877por Hart-Davis, Guy“…Genuis tips and tricks to help you get the most from Apple's video applications Your Mac's iMovie and iDVD applications are a key part of the iLife '09 suite and Apple's cool digital lifestyle. iMovie '09 and iDVD Portable Genius is packed with tips and techniques to help you get all the benefits these applications have to offer. …”
Publicado 2009
Libro electrónico -
3878Publicado 2014Tabla de Contenidos: “…-- Kinds of Tests -- Unit and Component Testing with Arquillian in Hudson -- Hudson Automated Testing Tips -- Summary -- Chapter 6: Hudson as Part of Your Tool Suite -- IDE Integration -- Creating a New Hudson Job Directly from a NetBeans Project -- Eclipse Hudson Integration -- IntelliJ IDEA Hudson Integration -- JDeveloper Hudson Integration -- Hudson Issue Tracker Integration -- Atlassian JIRA Integration -- Bugzilla Integration -- Other Issue Trackers -- Browser and Desktop Integration -- Browser Integration -- Desktop Integration -- Mobile Integration -- Publishing Build Artifacts from Hudson -- Artifact Repository -- Deploy to Container -- FTP Publisher Plugin -- Summary -- Chapter 7: Distributed Building Using Hudson -- Master-Slave Mode -- Hudson Slaves -- Types of Slaves -- Adding a Slave Node to Hudson -- Adding an Unmanaged Slave via JNLP Launcher -- Adding an SSH-Based Managed Slave -- Distributing the Builds -- Managing Slaves -- Summary -- Chapter 8: Basic Plugin Development -- Writing a HelloWorld Plugin -- Creating the Plugin Project -- Creating a Service Hook -- Building the Plugin -- Testing the Plugin -- HPI Tool -- Creating a Skeleton Plugin Project -- Building and Running the Plugin Project -- Testing the Skeleton Plugin…”
Libro electrónico -
3879Publicado 2013Tabla de Contenidos: “…-- Preface xiii -- About the Author xxi -- Acknowledgments xxiii -- 1 Internetworking and Layered Models 1 -- 1.1 Networking Technology 2 -- 1.2 Connecting Devices 5 -- 1.3 The OSI Model 8 -- 1.4 TCP/IP Model 12 -- 2 TCP/IP Suite and Internet Stack Protocols 15 -- 2.1 Network Layer Protocols 15 -- 2.2 Transport Layer Protocols 41 -- 2.3 World Wide Web 47 -- 2.4 File Transfer 49 -- 2.5 E-Mail 50 -- 2.6 Network Management Service 52 -- 2.7 Converting IP Addresses 53 -- 2.8 Routing Protocols 54 -- 2.9 Remote System Programs 55 -- 2.10 Social Networking Services 56 -- 2.11 Smart IT Devices 57 -- 2.12 Network Security Threats 58 -- 2.13 Internet Security Threats 58 -- 2.14 Computer Security Threats 59 -- 3 Global Trend of Mobile Wireless Technology 63 -- 3.1 1G Cellular Technology 63 -- 3.2 2G Mobile Radio Technology 64 -- 3.3 2.5G Mobile Radio Technology 67 -- 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70 -- 3.5 3G UMTS Security-Related Encryption Algorithm 75 -- 4 Symmetric Block Ciphers 81 -- 4.1 Data Encryption Standard (DES) 81 -- 4.2 International Data Encryption Algorithm (IDEA) 99 -- 4.3 RC5 Algorithm 108 -- 4.4 RC6 Algorithm 123 -- 4.5 AES (Rijndael) Algorithm 135 -- 5 Hash Function, Message Digest, and Message Authentication Code 161 -- 5.1 DMDC Algorithm 161 -- 5.2 Advanced DMDC Algorithm 171 -- 5.3 MD5 Message-Digest Algorithm 176 -- 5.4 Secure Hash Algorithm (SHA-1) 188 -- 5.5 Hashed Message Authentication Codes (HMAC) 195 -- 6 Asymmetric Public-Key Cryptosystems 203 -- 6.1 Diffie / Hellman Exponential Key Exchange 203 -- 6.2 RSA Public-Key Cryptosystem 207 -- 6.3 ElGamal's Public-Key Cryptosystem 215 -- 6.4 Schnorr's Public-Key Cryptosystem 222 -- 6.5 Digital Signature Algorithm 227 -- 6.6 The Elliptic Curve Cryptosystem (ECC) 230 -- 7 Public-Key Infrastructure 249 -- 7.1 Internet Publications for Standards 250 -- 7.2 Digital Signing Techniques 251 -- 7.3 Functional Roles of PKI Entities 258 -- 7.4 Key Elements for PKI Operations 263 -- 7.5 X.509 Certificate Formats 271.…”
Libro electrónico -
3880por McDonough, Bart“…It’s no secret that cloud-based computing is the next big movement in IT, and Microsoft is right there in the market with Office 365—a cloud-based productivity suite which includes a hosted, cloud-focused version of SharePoint 2010. …”
Publicado 2012
Libro electrónico