Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
4481por Horstmann, Cay S., 1959-“…Completely revised and up-to-date coverage of Generic programming, restrictions and limitations, type bounds, wilcard types, and generic reflection Swing GUI development, including input validation and other enhancements Exception handling and debugging, including chained exceptions, stack frames, assertions, and logging Streams and files, the new I/O API, memory-mapped files, file locking, and character set encoders/decoders Regular expressions using the powerful java.util.regex package Inner classes, reflection, and dynamic proxies Application packaging and the Preferences API The seventh edition of Core JavaTM 2, Volume I, covers the fundamentals of the Java 2 Platform, Standard Edition (J2SETM). …”
Publicado 2005
Libro electrónico -
4482Publicado 1998“…A detailed examination of interior routing protocols Learn the IP interior routing protocols with this approachable, practical presentation Explore configuration and troubleshooting of IP routing with Cisco routers through case studies Test and validate your understanding with practical, comprehensive review questions, configuration exercises, and troubleshooting exercises Further your CCIE preparation while mastering the essential TCP/IP protocols CCIE Professional Development: Routing TCP/IP, Volume I , takes readers from a basic understanding of routers and routing protocols through a detailed examination of each of the IP interior routing protocols: RIP, RIP2, IGRP, EIGRP, OSPF, and IS-IS. …”
Libro electrónico -
4483Publicado 2001“…A detailed examination of exterior routing protocols and advanced IP routing issues Routing TCP/IP, Volume II , enables you to: Master the operational components, configuration, and troubleshooting of BGP-4-the de facto interdomain routing protocol Understand the operation, configuration, and troubleshooting of NAT Learn how to deploy, configure, and troubleshoot IP multicast routing through an array of case studies and exercises Familiarize yourself with the design goals and current state of IPv6, the new generation of the IP protocol Implement router management through a diverse range of expert-tested methods Test and validate your knowledge with practical, comprehensive review questions, configuration exercises, and troubleshooting exercises Further your CCIE preparation while mastering advanced TCP/IP concepts The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order to manage network growth. …”
Libro electrónico -
4484Publicado 2017“…Understand what regression means and how to do linear regression Explore key machine learning concepts like cost function, F-test, and cross validation Learn about hypothesis testing and the frequently mentioned term "P value" Learn how to use — and enjoy free access to — the SherlockML data science platform Develop the skills required for the machine learning job market where demand outstrips supply Angie Ma, Gary Willis, and Alessandra Stagliano are data scientists with ASI Data Science, a London based AI/machine learning solutions firm. …”
-
4485Publicado 2023“…You'll work with practical usable templates, workflows, and tools validated and peer-reviewed by international experts in the fields of documentation, technical writing, developer relations, and UX design. …”
Libro electrónico -
4486Publicado 2008“…Adobe Dreamweaver CS3 On Demand FOR THOSE WHO WOULD RATHER BESHOWN HOW THAN TOLD HOW SEE HOW TO • Understand and use the latest Web technologies to create sites • Choose the right site structure and layout for sites • Create and use Web page templates to quick create pages • Create and maintain Cascading Style Sheets (CSS) • Add Flash elements to Web pages • Use JavaScript behaviors to implement page functionality • Use coding tools to develop consistent and reusable code • Manage collaboration with multiple developers • Manage local, remote, and testing sites • Transfer, synchronize, and validate sites • Browse, organize, and process files using Adobe Bridge and Version Cue • Test content on different target devices using Adobe Device Central Includes ACE Courseware Objectives! …”
Libro electrónico -
4487Publicado 2006“…Once that’s under control, you’ll learn things like the ins and outs of different font installation methods; how to use Font Book to manage, validate, and organize fonts; ways of dealing with legacy Mac OS 9 fonts; and how to make the most of character-rich Unicode fonts. …”
Libro electrónico -
4488por Odom, Wendell“…The official study guide helps you master all the topics on the QOS exam, including QoS concepts, tools, and architectures Modular QoS CLI (MQC), QoS Policy Manager (QPM), and AutoQoS Classification and marking Congestion management Traffic shaping and policing Congestion avoidance through drop policies Compression tools and link fragmentation and interleaving (LFI) tools for link efficiency LAN QoS QoS best practices The CCVP certification validates a robust set of skills in implementing, operating, configuring, and troubleshooting a converged IP network. …”
Publicado 2004
Libro electrónico -
4489Publicado 2014“…Download these videos or stream them through our HD player, and discover how small, cross-functional agile teams design and build software by validating assumptions throughout the process. Instructor Jeff Gothelf delivers practical takeaways that designers, product managers, and engineers can start using immediately: Identify assumptions about your users and their needs Determine your constraints, business goals, and potential paths to success Translate these assumptions into testable hypotheses Create experiments to test your hypotheses Learn how MVPs (minimally viable products) and experiments work together Put it all together in an agile rhythm Take a journey of discovery Interested in building a successful collaborative approach to designing and building delightful digital products and services? …”
-
4490Publicado 2019“…Configure NGINX and Apache, install free SSL/TLS certificates from Let's Encrypt, configure Cloudflare, and create CSR requests About This Video TLS certificate structure Cloudflare reverse proxy with free SSL certificates CSR (Certificate Signing Request), domain validation, and certificate installation In Detail This course is all about securing websites with SSL/TLS certificates. …”
-
4491Publicado 2020“…Achieving CCNA 200-301 certification will validate your knowledge of networking concepts, and this book will help you to do just that. …”
Libro electrónico -
4492Publicado 2018“…The "What", "Why" and "How" React basics (Base features, syntax and concepts) How to output lists and conditional content Styling of React components A deep dive into the internals of React and advanced component features How to access Http content from within React apps (AJAX) Redux, Redux, Redux ... from basics to advanced! Forms and form validation in React apps Authentication An introduction to unit testing An introduction to Next.js React app deployment instructions In Detail Learn React or dive deeper into it. …”
-
4493Publicado 2012“…Dans cet ouvrage, l'auteur étudie les environnements libres pouvant répondre à des contraintes temporelles plus ou moins fortes et propose des outils pour valider le comportement des tâches face à des charges logicielles ou interruptives importantes. …”
Libro electrónico -
4494Publicado 2020“…As consumer genomics has increasingly intersected with clinical applications, discussions have arisen around the need to demonstrate clinical and analytical validity and clinical utility due to the potential for misinterpretation by consumers. …”
Libro electrónico -
4495Publicado 2021“…They take you inside diagnostic X-ray tubes, illustrating their design, functions, metrics for validation, and interfaces. The detailed descriptions enable objective comparison and benchmarking.This detailed presentation of X-ray tube creation and functions enables you to understand how to optimize tube efficiency, particularly with consideration for economics and environmental care. …”
Libro electrónico -
4496Publicado 2025“…Focus on the expertise measured by these objectives: Develop Azure compute solutions Develop for Azure storage Implement Azure security Monitor, troubleshoot, and optimize Azure solutions Connect to and consume Azure services and third-party services This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you want to validate your ability to design and build diverse Microsoft Azure solutions both on-premises and in the cloud About the Exam Exam AZ-204 focuses on knowledge needed to implement IaaS and PaaS solutions; create Azure App Service web apps; implement Azure Functions; develop solutions using Cosmos DB and Blob Storage; create user authentication, authorization, and secure cloud solutions; integrate caching and content delivery within solutions; instrument solutions to support monitoring and logging; develop an App Service logic app; implement API Management; develop event-based and message-based solutions. …”
Libro electrónico -
4497Publicado 2014“…Traditionally, the diagnosis of dementia including Alzheimer's disease has been done through neurological assessment that combines scores from validated instruments like the mini-mental state examination (MMSE) tool and clinical neurology expertise. …”
Libro electrónico -
4498Publicado 2023“…Lessons Covered Include: Domain 1: Threat Detection and Incident Response 1.0 Introduction 1.1 Designing and Implementing Incident Response Plans 1.2 Detecting Security Threats and Anomalies with AWS Services 1.3 Responding to Compromised Resources and Workloads 1.4 Automating Incident Response with AWS Lambda 1.5 Conducting Root Cause Analysis with Amazon Detective 1.6 Capturing Forensics Data from Compromised Resources 1.7 Querying Logs to Validate Security Events 1.8 Preserving Forensic Artifacts with S3 Object Lock 1.9 Preparing and Recovering Services After Incidents 1.10 Incident Response Case Study 1.11 Practice Exam - Threat Detection and Response 1.12 Threat Detection and Incident Response Summary Learning Objectives Understand best practices for incident response in the cloud Explore AWS services to detect security threats Learn how to respond to compromised resources Domain 2: Security Logging and Monitoring 2.0 Introduction 2.1 Designing and Implementing Monitoring and Alerting 2.2 Troubleshooting Security Monitoring and Alerting 2.3 Designing and Implementing Logging Solutions 2.4 Troubleshooting Logging Solutions 2.5 Designing Log Analysis Solutions 2.6 Configuring AWS CloudTrail for Logging 2.7 Analyzing Logs with Amazon Athena 2.8 Monitoring Case Study 2.9 Practice Exam - Logging and Monitoring 2.10 Optimizing Log Storage Lifecycles 2.11 Third Party Log Analysis Tools 2.12 Security Logging and Monitoring Summary Learning Objectives Understand how to set up monitoring and alerts for security Learn best practices for logging and log analysis Gain skills in troubleshooting logging and monitoring Domain 3: Infrastructure Security 3.0 Introduction 3.1 Designing and Implementing Edge Service Security 3.2 Designing and Implementing Network Security 3.3 Designing and Securing Compute Workloads 3.4 Troubleshooting Network Security 3.5 Securing EC2 Instances with SSM 3.6 Scanning Images for Vulnerabilities 3.7 Infrastructure Security Case Study 3.8 Practice Exam - Infrastructure Security 3.9 Integrating AWS Firewall Manager 3.10 Applying Security Best Practices to Lambdas 3.11 Hardening AMIs with EC2 Image Builder 3.12 Infrastructure Security Summary Learning Objectives Learn how to secure AWS network infrastructure Understand options for compute and workload security Gain skills in troubleshooting infrastructure issues Domain 4: Identity and Access Management 4.0 Introduction 4.1 Designing Authentication for AWS Resources 4.2 Designing Authorization for AWS Resources 4.3 Troubleshooting with IAM Access Analyzer 4.4 Enforcing Least Privilege Access 4.5 Separating Duties with IAM Roles 4.6 Identity and Access Management Case Study 4.7 Practice Exam - Identity and Access Management 4.8 Securing Root User Credentials 4.9 IAM Policy Simulator for Troubleshooting 4.10 Enabling Federated Access with SSO 4.11 Managing Credentials and Secrets 4.12 Identity and Access Management Summary Learning Objectives Master IAM best practices for authentication and authorization Understand how to apply least privilege and separation of duties Learn to troubleshoot IAM issues Domain 5: Data Protection 5.0 Introduction 5.1 Data in Transit Confidentiality and Integrity 5.2 Data at Rest Confidentiality and Integrity 5.3 Managing Data at Rest Lifecycles 5.4 Protecting Credentials, Secrets, and Keys 5.5 Encrypting Data with AWS KMS 5.6 Data Protection Case Study 5.7 Practice Exam - Data Protection 5.8 Enforcing Data Retention with Glacier 5.9 Preventing Data Deletion with S3 Object Lock 5.10 Rotating RDS Credentials 5.11 Encrypting Data in Transit with SSL/TLS 5.12 Data Protection Summary Learning Objectives Learn techniques to protect data in transit and at rest Understand how to manage data lifecycles Gain skills in managing credentials and secrets Domain 6: Management and Security Governance 6.0 Introduction 6.1 Strategies for Central Account Deployment 6.2 Secure and Consistent Cloud Deployment 6.3 Evaluating Compliance of AWS Resources 6.4 Identifying Security Gaps through Reviews and Cost 6.5 AWS Organizations SCP Best Practices 6.6 Governance Case Study 6.7 Practice Exam - Governance 6.8 Automating Security Deployments 6.9 Tagging Resources for Governance 6.10 AWS Config for Security Assessments 6.11 AWS Well Architected Tool 6.12 Governance and Security Management Summary Learning Objectives Understand best practices for governing accounts and resources Learn how to align security with organizational requirements Gain skills in compliance, auditing, and deployment Additional Popular Resources Assimilate OpenAI 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification AWS Solutions Architect Professional (SAP-C02) 2023 Assimilate Python From Zero…”
Video -
4499por Henry, Lionel, 1970-“…En ce qui concerne les militants vivants l'auteur a essayé, dans la mesure du possible, de faire valider les notices par les intéressés. Cet ouvrage devrait intéresser le chercheur, le journaliste, le curieux mais également le militant lui-même. …”
Publicado 2013
Libro -
4500Publicado 2019“…The international seminar held at the University of Kyushu in February 2016 intended to show the validity of Roman law for contemporary legal practitioners facing current challenges by looking at selected issues.0Das römische Recht hat die Tradition des Civil law geprägt, aber ohne Zweifel auch das Common law beeinflusst. …”
Libro