Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
4761por Aguilar, Jose“…Celles-ci témoignent des avancées dans ce domaine, mais aussi du développement d’une ingénierie didactique solidement argumentée, attentive aux démarches d’élaboration et de validation des dispositifs proposés. Au-delà de certaines convergences, les contributions font apparaitre des manières diversifiées d’envisager l’ « oral » comme objet de l’enseignement : des pratiques communicatives larges, multimodales, à des conduites langagières « transversales » telles la justification ou l’argumentation, d’un oral au service de l’écrit à des approches spécifiquement centrées sur des genres oraux tels le débat ou le documentaire, en production ou en compréhension. …”
Publicado 2020
Electrónico -
4762Publicado 2017“…This book explores key dimensions of XD: Close collaboration among interdisciplinary teams, rapid iteration and ongoing user validation. We cover the processes, methodologies, tools, techniques and best-practices practitioner..…”
Libro electrónico -
4763Publicado 2018“…What you will learn Understand file system hierarchy and essential command-line skills Use Vi editor, I/O redirections and how to work with common text manipulating tools Create, delete, modify user accounts and manage passwords and their aging policy Manage file ownership, permissions, and ACL Execute process management and monitoring on the command line Validate and manage network configuration using nmcli Manage remote logins using SSH and file transfer using SCP and Rsync Understand system logging, how to control system services with systemd and systemctl, and manage firewalId Who this book is for Any individual who wants to learn how to use Linux as server or desktop in his environment. …”
Libro electrónico -
4764Publicado 2021“…You'll also find two complete practice exams that simulate the real CISSP exam, along with answers.By the end of this book, you'll be ready to take and pass the (ISC)2 CISSP exam and achieve the Certified Information Systems Security Professional certification putting you in the position to build a career as a security engineer, security manager, or chief information security officer (CISO)What you will learn* Understand key principles of security, risk management, and asset security* Become well-versed with topics focused on the security architecture and engineering domain* Test your knowledge of IAM and communication using practice questions* Study the concepts of security assessment, testing, and operations* Find out which security controls are applied in software development security* Find out how you can advance your career by acquiring this gold-standard certificationWho this book is forThis book is for existing and aspiring security professionals, security engineers, security managers, and security experts who want to validate their skills and enhance their careers by passing the CISSP 2021 exam. …”
Libro electrónico -
4765Publicado 2021“…Then, you'll see XML And JSON schema validation and WireMock. Finally, you'll look at various miscellaneous operations. …”
Video -
4766Publicado 2016“…What You Will Learn Understand the basic building blocks of vRealize Automation before embarking on the journey of installation Familiarize yourself with the requirements and steps that need to be performed during the first phase of the distributed installation Carry out a functional validation of the first phase of installation before completing the installation Build a blueprint for vSphere endpoint, an essential step for a successful deployment of a service catalog Create, configure, and deploy tenants, endpoints, blueprints, and the service catalog Get to grips with the failover process for all components in vRealize Automation Learn to configure the NSX loadbalancer for vRealize Orchestrator for high availability Leverage ASD to develop XaaS (Anything as a Service) in vRealize Automation to deliver valuable competence In Detail With the growing interest in Software Defined Data Centers (SDDC), vRealize Automation offers data center users an organized service catalog and governance for administrators. …”
Libro electrónico -
4767Publicado 2016“…We then explain the main concepts of Xtext, such as validation, code generation, and customizations of runtime and UI aspects. …”
Libro electrónico -
4768Publicado 2016“…We will learn how to effectively use PyMC3, a Python library for probabilistic programming, to perform Bayesian parameter estimation, to check models and validate them. This book begins presenting the key concepts of the Bayesian framework and the main advantages of this approach from a practical point of view. …”
Libro electrónico -
4769Publicado 2016“…What You Will Learn Extract, clean, and transform data Validate the quality of the data and variables in datasets Learn exploratory data analysis Build regression models Implement popular data-mining algorithms Visualize results using popular graphs Publish the results as a dashboard through Interactive Web Application frameworks In Detail Explore the world of Business Intelligence through the eyes of an analyst working in a successful and growing company. …”
Libro electrónico -
4770Publicado 2016“…We will cover the verifier and Windows Performance Toolkit for image validation scenarios. Furtherm..…”
Libro electrónico -
4771Publicado 2017“…Maximize the power of Windows Forensics to perform highly effective forensic investigations About This Book Prepare and perform investigations using powerful tools for Windows, Collect and validate evidence from suspects and computers and uncover clues that are otherwise difficult Packed with powerful recipes to perform highly effective field investigations Who This Book Is For If you are a forensic analyst or incident response professional who wants to perform computer forensics investigations for the Windows platform and expand your took kit, then this book is for you. …”
Libro electrónico -
4772Publicado 2020“…"Get to grips with the fundamentals of cloud security and prepare for the AWS Security Specialty exam with the help of this comprehensive certification guide Key Features Learn the fundamentals of security with this fast-paced guide Develop modern cloud security skills to build effective security solutions Answer practice questions and take mock tests to pass the exam with confidence Book Description AWS Certified Security – Specialty is a certification exam to validate your expertise in advanced cloud security. …”
Libro electrónico -
4773Publicado 2020“…What you will learn Understand the characteristics of a machine learning algorithm Implement algorithms from supervised, semi-supervised, unsupervised, and RL domains Learn how regression works in time-series analysis and risk prediction Create, model, and train complex probabilistic models Cluster high-dimensional data and evaluate model accuracy Discover how artificial neural networks work – train, optimize, and validate them Work with autoencoders, Hebbian networks, and GANs Who this book is for This book is for data science professionals who want to delve into complex ML algorithms to understand how various machine learning models can be built. …”
Libro electrónico -
4774por Weinmeister, Philip. author“…By adopting Practical Salesforce.com Development Without Code as your guide, you will learn how to deliver business solutions within Salesforce.com by combining analysis, creativity, and logic with some of its core elements, including validation rules, workflow rules, and formula fields. …”
Publicado 2015
Libro electrónico -
4775Publicado 2015“…Course Requirements Understanding of programming and development Experience with Java programming Familiarity with Eclipse Table of Contents Part I (of III) Introduction Lesson 1: Java Security Concepts Lesson 2: Input Validation and Data Sanitization (IDS) Lesson 3: Declarations and Initialization (DCL): Lesson 4: Expressions (EXP) Lesson 5: Numeric Types and Operations (NUM) Lesson 6: Characters and Strings (STR) Summary Part I..…”
-
4776Publicado 2015“…What You Will Learn Familiarize and set up the Breeze and Spark libraries and use data structures Import data from a host of possible sources and create dataframes from CSV Clean, validate and transform data using Scala to pre-process numerical and string data Integrate quintessential machine learning algorithms using Scala stack Bundle and scale up Spark jobs by deploying them into a variety of cluster managers Run streaming and graph analytics in Spark to visualize data, enabling exploratory analysis In Detail This book will introduce you to the most popular Scala tools, libraries, and frameworks through practical recipes around loading, manipulating, and preparing your data. …”
Libro electrónico -
4777Publicado 2015“…Major topics include Cloud Characteristics and Models Cloud Deployment Cloud Workloads Cloud Networking Cloud Storage Skill Level Beginning What You Will Learn CCNA Cloud certification will help the candidate gain foundational understanding of Cisco Cloud deployment Combines conceptual knowledge with hands-on skills Enables organizations to improve business flexibility and reduce technology infrastructure spending through Cisco Cloud deployments, by utilizing industry-recognized certifications to validate professionals Transition into and become a recognized Cloud professional Take advantage of a broad range of self-study, instructor-led assessment and lifelong learning products that provide new and extended knowledge of emerging Cloud solutions Who Should Take This Course Primary Audience: Cloud administrators, designers, architects, and network engineers, including working engineers in Enterprise and service provider companies who want to incorporate cloud concepts and technologies into their curriculum. …”
-
4778por Ibáñez Martínez, Núria“…En conclusió podem dir que el CERFB format per 25 ítems posseeix les propietats psicomètriques adients, sent un instrument vàlid i fiable per tal d'avaluar el model bidimensional de la teoria de les Relacions familiars Bàsiques. …”
Publicado 2016
Accés lliure
Tesis -
4779Publicado 2017“…This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. …”
Libro electrónico -
4780Publicado 2008“…Topics covered include • Recognizing the “smells” of Web code that should be refactored • Transforming old HTML into well-formed, valid XHTML, one step at a time • Modernizing existing layouts with CSS • Updating old Web applications: replacing POST with GET, replacing old contact forms, and refactoring JavaScript • Systematically refactoring content and links • Restructuring sites without changing the URLs your users rely upon This book will be an indispensable resource for Web designers, developers, project managers, and anyone who maintains or updates existing sites. …”
Libro electrónico