Mostrando 3,861 - 3,880 Resultados de 5,492 Para Buscar '"suite"', tiempo de consulta: 0.10s Limitar resultados
  1. 3861
    por Al-Dbiyat, Mohamed
    Publicado 2018
    “…Une partie des articles (céramique, monnaies, monuments religieux) éclaire d’un nouveau jour la définition du territoire régional, durant l’Antiquité et par la suite. Des questions de topographie historique sont aussi abordées grâce à la publication de nouvelles inscriptions. …”
    Electrónico
  2. 3862
    por Bock, Fabienne
    Publicado 2018
    “…L’émergence d’un nouveau visage de l’État dans les pays européens engagés dans la guerre a fait l’objet d’une deuxième publication, qui complète ainsi la première par le regard neuf qu’elle offre sur le fonctionnement interne des administrations en temps de guerre. Faisant suite à ces deux ouvrages, ce troisième volume entend se centrer sur l’appel à la fiscalité qui a pris le relais de l’appel à l’épargne pour financer la guerre. …”
    Electrónico
  3. 3863
    Publicado 2018
    “…Learn to secure your IoT communication Who This Book Is For This book is for anyone who wants to get started with the AWS IoT Suite and implement it with practical use cases. …”
    Libro electrónico
  4. 3864
    Publicado 2021
    Tabla de Contenidos: “…Gracefully Declining a Recommendation (or a Request for One) -- Managing Recommendations -- Editing or removing recommendations you've made -- Handling new recommendations you've received -- Removing or requesting to revise a recommendation -- Chapter 10 Accessing LinkedIn with a Mobile Device -- Surveying the LinkedIn Mobile App -- Installing Any LinkedIn Mobile App -- Breaking Down the Sections of the LinkedIn Mobile App -- Connecting Your App Usage with Website Usage -- Chapter 11 Configuring Settings Like a Pro -- Using the Settings &amp -- Privacy Page as a Command Console -- Starting with Basic Account Changes -- Controlling Visibility and Privacy Settings -- Finalizing Your LinkedIn Communications Settings -- Chapter 12 Using LinkedIn with Your Internet Activities -- Exporting LinkedIn Connections to Your Email Application -- Creating your contacts export file in LinkedIn -- Exporting contacts to Office 365 -- Exporting contacts to Outlook (non-Office-Suite version) -- Exporting contacts to Gmail -- Exporting Your Profile and Badge -- Exporting your profile to a PDF file -- Creating a public profile badge for other websites -- Part 4 Finding Employees, Jobs, and Companies -- Chapter 13 Finding Employees -- Managing Your Job Listings -- Posting a job listing -- Advertising your job listing to your network -- Reviewing applicants -- Screening Candidates with LinkedIn -- Using Strategies to Find Active or Passive Job Seekers -- Chapter 14 Finding a Job -- Searching for an Open Position -- Tuning Up Your Profile and Network to Make a Good Impression -- Preparing Your Profile and Account Settings for Job Searches -- Checking your profile's visibility -- Optimizing your profile -- Involving LinkedIn in Job Search Strategies -- Leveraging connections -- Finding people with the same or similar job -- Taking advantage of your alma mater…”
    Libro electrónico
  5. 3865
    por Abdou, Moussa Malam
    Publicado 2018
    “…Initialement réunies dans la perspective d'un colloque à Haïti (annulé suite au séisme de 2010), les contributions publiées ici portent sur des études de cas à Haïti, mais aussi à Madagascar, au Maghreb ou au Vietnam, soit au total une soixantaine de communications et une série de documents récents issus des réflexions des experts. …”
    Electrónico
  6. 3866
    “…Power Query, part of the Microsoft Power BI suite, is a tool that automates the process of getting data into Excel and will save you hours of dull, repetitive, and error-prone work! …”
    Libro electrónico
  7. 3867
    Publicado 2023
    Tabla de Contenidos: “…Triggers and gating -- Feature flags -- Enabling GitHub Actions for CI/CD implementation -- GitHub Actions for continuous integration -- GitHub Actions for continuous deployment -- Choosing an Integration Test Suite Methodology -- Summary -- Questions -- Further reading -- Chapter 9: Fault Injection and Chaos Testing -- Technical requirements -- Fault tolerance and fault injection -- Anticipating and tolerating faults -- Using your faults against you -- Chaos testing -- The order of chaos engineering -- Implementing fault injection and chaos tests -- Starting with Chaos Mesh -- Using Azure Chaos Studio -- Summary -- Questions -- Further reading -- Part 3: Testing and Deploying Microservices -- Chapter 10: Modern Design Patterns for Scalability -- Technical requirements -- Mechanisms for autoscaling -- Compute and CPU load -- Disk and I/O load -- Request and network load -- Memory-intensive operations -- Implementing autoscaling for Kubernetes services -- Native Kubernetes options -- Cloud platform options -- Third-party plugins -- Implementing autoscaling for Azure App Service -- Common platform options -- Adjustments for Web Apps -- Adjustments for API Apps -- Summary -- Questions -- Further reading -- Chapter 11: Minimizing Data Loss -- Technical requirements -- Preventing data loss -- Data consistency paradigms -- ACID paradigm/immediate consistency -- BASE paradigm / eventual consistency -- The Saga pattern -- Command query responsibility segregation (CQRS) -- Identifying acceptable data loss -- Acceptable and unacceptable data loss -- Methods of data loss -- Delivery guarantees -- At-most-once delivery -- At-least-once delivery -- Effectively-once delivery -- Data loss implications -- Summary -- Questions -- Further reading -- Chapter 12: Service and Application Resiliency -- Technical requirements -- Resiliency through cloud-native patterns…”
    Libro electrónico
  8. 3868
    Publicado 2024
    “…Equally crucial, it involves collaboration with internal teams and C-Suite stakeholders, and adeptly managing external entities like vendors and service providers. …”
    Libro electrónico
  9. 3869
    por Langworth, Ian
    Publicado 2005
    “…A very early release of Perl 1.0 included a comprehensive test suite, and it's only impr…”
    Libro electrónico
  10. 3870
    Publicado 2018
    Tabla de Contenidos: “…Importance of web application security testing -- Application profiling -- Common web application security testing tools -- Authentication -- Credentials over a secure channel -- Authentication error messages -- Password policy -- Method for submitting credentials -- OWASP mapping -- Authorization -- OWASP mapping -- Session management -- Cookie checks -- Cross-Site Request Forgery -- OWASP mapping -- Input validation -- OWASP mapping -- Security misconfiguration -- OWASP mapping -- Business logic flaws -- Testing for business logic flaws -- Auditing and logging -- OWASP mapping -- Cryptography -- OWASP mapping -- Testing tools -- OWASP ZAP -- Burp Suite -- Summary -- Chapter 8: Privilege Escalation -- What is privilege escalation? …”
    Libro electrónico
  11. 3871
    por Holdsworth, B.
    Publicado 2002
    “…*A highly accessible, comprehensive and fully up to date digital systems text*A well known and respected text now revamped for current courses*Part of the Newnes suite of texts for HND/1st year modules…”
    Libro electrónico
  12. 3872
    por McFedries, Paul
    Publicado 2013
    “…A friendly, visual approach to learning the basics of Excel 2013 As the world's leading spreadsheet program, Excel is a spreadsheet and data analysis tool that is part of the Microsoft Office suite. The new Excel 2013 includes new features and functionalities that require users of older versions to re-learn the application. …”
    Libro electrónico
  13. 3873
    por Wickham, Hadley
    Publicado 2023
    “…With this fully updated edition, developers and data scientists will learn how to bundle reusable R functions, sample data, and documentation together by applying the package development philosophy used by the team that maintains the "tidyverse" suite of packages. In the process, you'll learn how to automate common development tasks using a set of R packages, including devtools, usethis, testthat, and roxygen2. …”
    Libro electrónico
  14. 3874
    por Bluttman, Ken
    Publicado 2005
    “… As part of the Microsoft Office suite, Access has become the industry's leading desktop database management program for organizing, accessing, and sharing information. …”
    Libro electrónico
  15. 3875
    Publicado 2003
    “…This book is for database designers and database administrators using Visio, which is the database component of Microsoft's Visual Studio .NET for Enterprise Architects suite, also included in MSDN subscriptions. This is the only guide to this product that tells DBAs how to get their job done. …”
    Libro electrónico
  16. 3876
    por McFedries, Paul
    Publicado 2009
    “…Including Word, Excel, PowerPoint, and Entourage, this office productivity suite has the tools you need for word processing, spreadsheets, presentations, and managing e-mail and contacts. …”
    Libro electrónico
  17. 3877
    por Hart-Davis, Guy
    Publicado 2009
    “…Genuis tips and tricks to help you get the most from Apple's video applications Your Mac's iMovie and iDVD applications are a key part of the iLife '09 suite and Apple's cool digital lifestyle. iMovie '09 and iDVD Portable Genius is packed with tips and techniques to help you get all the benefits these applications have to offer. …”
    Libro electrónico
  18. 3878
    Publicado 2014
    Tabla de Contenidos: “…-- Kinds of Tests -- Unit and Component Testing with Arquillian in Hudson -- Hudson Automated Testing Tips -- Summary -- Chapter 6: Hudson as Part of Your Tool Suite -- IDE Integration -- Creating a New Hudson Job Directly from a NetBeans Project -- Eclipse Hudson Integration -- IntelliJ IDEA Hudson Integration -- JDeveloper Hudson Integration -- Hudson Issue Tracker Integration -- Atlassian JIRA Integration -- Bugzilla Integration -- Other Issue Trackers -- Browser and Desktop Integration -- Browser Integration -- Desktop Integration -- Mobile Integration -- Publishing Build Artifacts from Hudson -- Artifact Repository -- Deploy to Container -- FTP Publisher Plugin -- Summary -- Chapter 7: Distributed Building Using Hudson -- Master-Slave Mode -- Hudson Slaves -- Types of Slaves -- Adding a Slave Node to Hudson -- Adding an Unmanaged Slave via JNLP Launcher -- Adding an SSH-Based Managed Slave -- Distributing the Builds -- Managing Slaves -- Summary -- Chapter 8: Basic Plugin Development -- Writing a HelloWorld Plugin -- Creating the Plugin Project -- Creating a Service Hook -- Building the Plugin -- Testing the Plugin -- HPI Tool -- Creating a Skeleton Plugin Project -- Building and Running the Plugin Project -- Testing the Skeleton Plugin…”
    Libro electrónico
  19. 3879
    Publicado 2013
    Tabla de Contenidos: “…-- Preface xiii -- About the Author xxi -- Acknowledgments xxiii -- 1 Internetworking and Layered Models 1 -- 1.1 Networking Technology 2 -- 1.2 Connecting Devices 5 -- 1.3 The OSI Model 8 -- 1.4 TCP/IP Model 12 -- 2 TCP/IP Suite and Internet Stack Protocols 15 -- 2.1 Network Layer Protocols 15 -- 2.2 Transport Layer Protocols 41 -- 2.3 World Wide Web 47 -- 2.4 File Transfer 49 -- 2.5 E-Mail 50 -- 2.6 Network Management Service 52 -- 2.7 Converting IP Addresses 53 -- 2.8 Routing Protocols 54 -- 2.9 Remote System Programs 55 -- 2.10 Social Networking Services 56 -- 2.11 Smart IT Devices 57 -- 2.12 Network Security Threats 58 -- 2.13 Internet Security Threats 58 -- 2.14 Computer Security Threats 59 -- 3 Global Trend of Mobile Wireless Technology 63 -- 3.1 1G Cellular Technology 63 -- 3.2 2G Mobile Radio Technology 64 -- 3.3 2.5G Mobile Radio Technology 67 -- 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70 -- 3.5 3G UMTS Security-Related Encryption Algorithm 75 -- 4 Symmetric Block Ciphers 81 -- 4.1 Data Encryption Standard (DES) 81 -- 4.2 International Data Encryption Algorithm (IDEA) 99 -- 4.3 RC5 Algorithm 108 -- 4.4 RC6 Algorithm 123 -- 4.5 AES (Rijndael) Algorithm 135 -- 5 Hash Function, Message Digest, and Message Authentication Code 161 -- 5.1 DMDC Algorithm 161 -- 5.2 Advanced DMDC Algorithm 171 -- 5.3 MD5 Message-Digest Algorithm 176 -- 5.4 Secure Hash Algorithm (SHA-1) 188 -- 5.5 Hashed Message Authentication Codes (HMAC) 195 -- 6 Asymmetric Public-Key Cryptosystems 203 -- 6.1 Diffie / Hellman Exponential Key Exchange 203 -- 6.2 RSA Public-Key Cryptosystem 207 -- 6.3 ElGamal's Public-Key Cryptosystem 215 -- 6.4 Schnorr's Public-Key Cryptosystem 222 -- 6.5 Digital Signature Algorithm 227 -- 6.6 The Elliptic Curve Cryptosystem (ECC) 230 -- 7 Public-Key Infrastructure 249 -- 7.1 Internet Publications for Standards 250 -- 7.2 Digital Signing Techniques 251 -- 7.3 Functional Roles of PKI Entities 258 -- 7.4 Key Elements for PKI Operations 263 -- 7.5 X.509 Certificate Formats 271.…”
    Libro electrónico
  20. 3880
    por McDonough, Bart
    Publicado 2012
    “…It’s no secret that cloud-based computing is the next big movement in IT, and Microsoft is right there in the market with Office 365—a cloud-based productivity suite which includes a hosted, cloud-focused version of SharePoint 2010. …”
    Libro electrónico