Mostrando 4,761 - 4,780 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.47s Limitar resultados
  1. 4761
    por Aguilar, Jose
    Publicado 2020
    “…Celles-ci témoignent des avancées dans ce domaine, mais aussi du développement d’une ingénierie didactique solidement argumentée, attentive aux démarches d’élaboration et de validation des dispositifs proposés. Au-delà de certaines convergences, les contributions font apparaitre des manières diversifiées d’envisager l’ « oral » comme objet de l’enseignement : des pratiques communicatives larges, multimodales, à des conduites langagières « transversales » telles la justification ou l’argumentation, d’un oral au service de l’écrit à des approches spécifiquement centrées sur des genres oraux tels le débat ou le documentaire, en production ou en compréhension. …”
    Electrónico
  2. 4762
    Publicado 2017
    “…This book explores key dimensions of XD: Close collaboration among interdisciplinary teams, rapid iteration and ongoing user validation. We cover the processes, methodologies, tools, techniques and best-practices practitioner..…”
    Libro electrónico
  3. 4763
    Publicado 2018
    “…What you will learn Understand file system hierarchy and essential command-line skills Use Vi editor, I/O redirections and how to work with common text manipulating tools Create, delete, modify user accounts and manage passwords and their aging policy Manage file ownership, permissions, and ACL Execute process management and monitoring on the command line Validate and manage network configuration using nmcli Manage remote logins using SSH and file transfer using SCP and Rsync Understand system logging, how to control system services with systemd and systemctl, and manage firewalId Who this book is for Any individual who wants to learn how to use Linux as server or desktop in his environment. …”
    Libro electrónico
  4. 4764
    Publicado 2021
    “…You'll also find two complete practice exams that simulate the real CISSP exam, along with answers.By the end of this book, you'll be ready to take and pass the (ISC)2 CISSP exam and achieve the Certified Information Systems Security Professional certification putting you in the position to build a career as a security engineer, security manager, or chief information security officer (CISO)What you will learn* Understand key principles of security, risk management, and asset security* Become well-versed with topics focused on the security architecture and engineering domain* Test your knowledge of IAM and communication using practice questions* Study the concepts of security assessment, testing, and operations* Find out which security controls are applied in software development security* Find out how you can advance your career by acquiring this gold-standard certificationWho this book is forThis book is for existing and aspiring security professionals, security engineers, security managers, and security experts who want to validate their skills and enhance their careers by passing the CISSP 2021 exam. …”
    Libro electrónico
  5. 4765
    Publicado 2021
    “…Then, you'll see XML And JSON schema validation and WireMock. Finally, you'll look at various miscellaneous operations. …”
    Video
  6. 4766
    Publicado 2016
    “…What You Will Learn Understand the basic building blocks of vRealize Automation before embarking on the journey of installation Familiarize yourself with the requirements and steps that need to be performed during the first phase of the distributed installation Carry out a functional validation of the first phase of installation before completing the installation Build a blueprint for vSphere endpoint, an essential step for a successful deployment of a service catalog Create, configure, and deploy tenants, endpoints, blueprints, and the service catalog Get to grips with the failover process for all components in vRealize Automation Learn to configure the NSX loadbalancer for vRealize Orchestrator for high availability Leverage ASD to develop XaaS (Anything as a Service) in vRealize Automation to deliver valuable competence In Detail With the growing interest in Software Defined Data Centers (SDDC), vRealize Automation offers data center users an organized service catalog and governance for administrators. …”
    Libro electrónico
  7. 4767
    Publicado 2016
    “…We then explain the main concepts of Xtext, such as validation, code generation, and customizations of runtime and UI aspects. …”
    Libro electrónico
  8. 4768
    Publicado 2016
    “…We will learn how to effectively use PyMC3, a Python library for probabilistic programming, to perform Bayesian parameter estimation, to check models and validate them. This book begins presenting the key concepts of the Bayesian framework and the main advantages of this approach from a practical point of view. …”
    Libro electrónico
  9. 4769
    Publicado 2016
    “…What You Will Learn Extract, clean, and transform data Validate the quality of the data and variables in datasets Learn exploratory data analysis Build regression models Implement popular data-mining algorithms Visualize results using popular graphs Publish the results as a dashboard through Interactive Web Application frameworks In Detail Explore the world of Business Intelligence through the eyes of an analyst working in a successful and growing company. …”
    Libro electrónico
  10. 4770
    Publicado 2016
    “…We will cover the verifier and Windows Performance Toolkit for image validation scenarios. Furtherm..…”
    Libro electrónico
  11. 4771
    Publicado 2017
    “…Maximize the power of Windows Forensics to perform highly effective forensic investigations About This Book Prepare and perform investigations using powerful tools for Windows, Collect and validate evidence from suspects and computers and uncover clues that are otherwise difficult Packed with powerful recipes to perform highly effective field investigations Who This Book Is For If you are a forensic analyst or incident response professional who wants to perform computer forensics investigations for the Windows platform and expand your took kit, then this book is for you. …”
    Libro electrónico
  12. 4772
    Publicado 2020
    “…"Get to grips with the fundamentals of cloud security and prepare for the AWS Security Specialty exam with the help of this comprehensive certification guide Key Features Learn the fundamentals of security with this fast-paced guide Develop modern cloud security skills to build effective security solutions Answer practice questions and take mock tests to pass the exam with confidence Book Description AWS Certified Security – Specialty is a certification exam to validate your expertise in advanced cloud security. …”
    Libro electrónico
  13. 4773
    Publicado 2020
    “…What you will learn Understand the characteristics of a machine learning algorithm Implement algorithms from supervised, semi-supervised, unsupervised, and RL domains Learn how regression works in time-series analysis and risk prediction Create, model, and train complex probabilistic models Cluster high-dimensional data and evaluate model accuracy Discover how artificial neural networks work – train, optimize, and validate them Work with autoencoders, Hebbian networks, and GANs Who this book is for This book is for data science professionals who want to delve into complex ML algorithms to understand how various machine learning models can be built. …”
    Libro electrónico
  14. 4774
    por Weinmeister, Philip. author
    Publicado 2015
    “…By adopting Practical Salesforce.com Development Without Code as your guide, you will learn how to deliver business solutions within Salesforce.com by combining analysis, creativity, and logic with some of its core elements, including validation rules, workflow rules, and formula fields. …”
    Libro electrónico
  15. 4775
    Publicado 2015
    “…Course Requirements Understanding of programming and development Experience with Java programming Familiarity with Eclipse Table of Contents Part I (of III) Introduction Lesson 1: Java Security Concepts Lesson 2: Input Validation and Data Sanitization (IDS) Lesson 3: Declarations and Initialization (DCL): Lesson 4: Expressions (EXP) Lesson 5: Numeric Types and Operations (NUM) Lesson 6: Characters and Strings (STR) Summary Part I..…”
    Video
  16. 4776
    Publicado 2015
    “…What You Will Learn Familiarize and set up the Breeze and Spark libraries and use data structures Import data from a host of possible sources and create dataframes from CSV Clean, validate and transform data using Scala to pre-process numerical and string data Integrate quintessential machine learning algorithms using Scala stack Bundle and scale up Spark jobs by deploying them into a variety of cluster managers Run streaming and graph analytics in Spark to visualize data, enabling exploratory analysis In Detail This book will introduce you to the most popular Scala tools, libraries, and frameworks through practical recipes around loading, manipulating, and preparing your data. …”
    Libro electrónico
  17. 4777
    Publicado 2015
    “…Major topics include Cloud Characteristics and Models Cloud Deployment Cloud Workloads Cloud Networking Cloud Storage Skill Level Beginning What You Will Learn CCNA Cloud certification will help the candidate gain foundational understanding of Cisco Cloud deployment Combines conceptual knowledge with hands-on skills Enables organizations to improve business flexibility and reduce technology infrastructure spending through Cisco Cloud deployments, by utilizing industry-recognized certifications to validate professionals Transition into and become a recognized Cloud professional Take advantage of a broad range of self-study, instructor-led assessment and lifelong learning products that provide new and extended knowledge of emerging Cloud solutions Who Should Take This Course Primary Audience: Cloud administrators, designers, architects, and network engineers, including working engineers in Enterprise and service provider companies who want to incorporate cloud concepts and technologies into their curriculum. …”
    Video
  18. 4778
    por Ibáñez Martínez, Núria
    Publicado 2016
    “…En conclusió podem dir que el CERFB format per 25 ítems posseeix les propietats psicomètriques adients, sent un instrument vàlid i fiable per tal d'avaluar el model bidimensional de la teoria de les Relacions familiars Bàsiques. …”
    Accés lliure
    Tesis
  19. 4779
    Publicado 2017
    “…This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. …”
    Libro electrónico
  20. 4780
    Publicado 2008
    “…Topics covered include • Recognizing the “smells” of Web code that should be refactored • Transforming old HTML into well-formed, valid XHTML, one step at a time • Modernizing existing layouts with CSS • Updating old Web applications: replacing POST with GET, replacing old contact forms, and refactoring JavaScript • Systematically refactoring content and links • Restructuring sites without changing the URLs your users rely upon This book will be an indispensable resource for Web designers, developers, project managers, and anyone who maintains or updates existing sites. …”
    Libro electrónico