Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,290
- Development 2,182
- Management 1,787
- Application software 1,775
- History 1,459
- Engineering & Applied Sciences 1,245
- Història 1,096
- Computer networks 974
- Science: general issues 931
- Data processing 848
- Películas cinematográficas 830
- Computer programs 809
- Computer Science 792
- Cloud computing 775
- Business & Economics 761
- Biblia 758
- Leadership 750
- Design 739
- Filosofía 735
- Documentales 733
- Universidad Pontificia de Salamanca (España) 727
- Security measures 725
- Computer security 714
- Social aspects 686
- Computer software 683
- Python (Computer program language) 658
- Information technology 653
- Web site development 646
- Artificial intelligence 641
- Computer programming 619
-
111501por Alunni, Charles“…En ce début du troisième millénaire, la musique adresse une question aux autres arts comme aux sciences : comment ajuster les écritures musicale, mathématique, chorégraphique, biologique, etc., aux nouvelles matières sur lesquelles ces pensées embrayent ? …”
Publicado 2015
Electrónico -
111502Publicado 2004“…But what if this viewpoint arose from a conflict about how the elite should be educated? …”
Libro electrónico -
111503por Baubérot, Jean“…Ce résultat découle de la superposition de deux conflits ; en effet à cette « guerre » séculaire de deux France s’ajoute une très inattendue « guerre » des gauches, significativement oubliée, qui met aux prises Jaurès et Clemenceau. …”
Publicado 2021
Electrónico -
111504por Anheim, Étienne“…Les « corpus statutaires » définis comme « tout type de texte qui se présente comme une forme écrite et stabilisée du droit local, édictée par une autorité publique » y sont étudiés de leur confection à leur usage social dans un souci comparatiste entre deux aires géographiques et traditions historiographiques distinctes : l’Italie communale et le Midi de la France.Après l’analyse de leur formematérielle, du vocabulaire et des langues utilisées, l’ouvrage s’intéresse aux « acteurs » de la norme, à la rhétorique et à l’écriture puis replace la matière statutaire dans son paysage documentaire pour mesurer les circulations documentaires en analysant les points de contact entre les statuts et les autres documents produits par les autorités communales, par des institutions de la commune et par une autorité supérieure, avant d’étudier l’organisation interne des statuts, le plan adopté et les principaux thèmes abordés pour terminer sur l’usage des statuts dans les autres formes documentaires. …”
Publicado 2021
Electrónico -
111505por Strasser, Jean-Yves“…The practice of immortalising artistic and athletic careers in stone was most common during the period that spanned from the death of Caesar to the middle of the third century, when this type of engraving stopped almost entirely. …”
Publicado 2021
Electrónico -
111506por Smith, Colin, 1966-“…Featuring his award-winning and beautiful aerial photography throughout the book, Colin will teach you: • How to fly a drone, including practice flight patterns and controller tips that will help you master the basics • New rules of composition for aerial photography as they apply to drone and quadcopter imagery • How to create the best files for both still photos and video • Post-processing techniques--both basic workflow and advanced techniques--unique to aerial photography that you need to know, such as how to make videos look both dynamic and smooth You'll learn everything you need to know about drones and quadcopters in order to take your photography to new levels...literally! …”
Publicado 2022
Libro electrónico -
111507Publicado 2018“…Topics include Introduction to wireless technologies and protocols Wireless infrastructure attacks Wireless client attacks Building your lab and attack hardware Aircrack-ng Cracking WEP Hacking WPA Performing wireless reconnaissance Evil twins and rogue access points Bluetooth security assessment and monitoring NFC security assessment Wireless defenses Performing security assessments of IoT devices Mobile device security Hacking Android devices Hacking iOS devices About the Instructor Omar Santos is an active member of the cybersecurity community, where he leads several industry-wide initiatives and standards bodies. …”
-
111508Publicado 2020“…Salesforce administrators and existing Salesforce Lightning Platform developers looking to learn more about the declarative, non-programmatic app building capabilities of the Salesforce Lightning Platform will also find this book useful…”
Libro electrónico -
111509Publicado 2015“…Coverage includes How games have evolved to meet the challenges of networked environments Using Internet communication protocols and standards in game development Working with Berkeley Socket, the most widely used networking construct in multiplayer gaming Formatting game data for efficient Internet transmission Synchronizing states so all players share the same world Organizing networking topologies for large-scale games Overcoming latency and jitter problems that cause delays or lost data Scaling games without compromising performance Combating security vulnerabilities and software cheats Leveraging the networking functionality of the popular Unreal 4 and Unity game engines Integrating gamer services such as matchmaking, achievements, and leaderboards Running game servers in the cloud About the Website C++ source code for all examples is available at github.com/MultiplayerBook . …”
Libro electrónico -
111510Publicado 2019“…Additionally, you will become a member of a community of Blockchain leaders. About the Instructor Joe Holbrook has been in the IT field since 1993 when he was exposed to several HPUX systems on board a US Navy flagship. …”
-
111511Publicado 2020“…Topics includeModule 1: Introduction to Ethical Hacking and How to Plan a Security Penetration TestModule 2: ReconnaissanceModule 3: Attacks and ExploitsModule 4: Tools and Reporting Skill Level Beginner/Intermediate Learn How To * Prepare for the CompTIA PenTest+ Exam* Plan and scope a security penetration test* Perform reconnaissance on a target* Gain access through vulnerable systems by knowing the various exploits* Restore environments after a pentest has successfully found vulnerabilities within the system* Record and log activities in a manner that is professional, clear, and advantageous to the client for system improvement Who Should Take This Course * Anyone interested in taking the CompTIA PenTest+ exam* Individuals seeking careers in the cybersecurity field Course Requirements None Lesson descriptions Module 1, "Introduction to Ethical Hacking and How to Plan a Security Penetration Test," introduces the concept of ethical hacking and how the cybersecurity industry goes about implementing field-tested security parameters using penetration testing. …”
-
111512Publicado 2018“…You will also explore how to program file input and output and learn about POSIX sockets. This book will help you get to grips with safely setting up a UDP and TCP server/client. …”
Libro electrónico -
111513Publicado 2018“…Last but not least, you'll learn about the power of storytelling through the creation of interactive dashboards in Tableau. …”
Libro electrónico -
111514Publicado 2019“…The associated code can be accessed at: https://github.com/alfredodeza/static and https://github.com/alfredodeza/pipeline-jobs About the Instructor Noah Gift is a lecturer at UC Davis Graduate School of Management MSBA program, the Graduate Data Science program, MSDS, at Northwestern, the Data Science program at UC Berkeley, and the USF Health Informatics program. …”
-
111515Publicado 2021“…Basic knowledge of React development is required to get the most out of this book…”
Libro electrónico -
111516Publicado 2021“…Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security. …”
Libro electrónico -
111517Publicado 2019“…Download the supplemental files for this LiveLesson from http://www.informit.com/store/building-ai-applications-on-google-cloud-platform-livelessons-9780135973509 . About the Instructor Noah Gift is a lecturer at the UC Davis Graduate School of Management, MSBA program, the Graduate Data Science program, MSDS, at Northwestern and the Graduate Information and Data Science Program at UC Berkeley. …”
-
111518Publicado 2015“…Many Java application examples are used throughout the course to showcase pattern-oriented design and programming techniques for concurrent software. About the Instructor Dr. Douglas C. Schmidt is the original developer of ACE and The ACE ORB (TAO). …”
-
111519Publicado 2021“…Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise.By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution.What You Will Learn:Understand the need for Zscaler in the modern enterpriseStudy the fundamental architecture of the Zscaler cloudGet to grips with the essential features of ZIA and ZPAFind out how to architect a Zscaler solutionDiscover best practices for deploying and implementing Zscaler solutionsWho this book is for:This book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. …”
Libro electrónico -
111520Publicado 2019“…Discover how cloud-native microservice architecture helps you to build dynamically scalable applications by using the most widely used and adopted runtime environments Key Features Build robust cloud-native applications using a variety of tools Understand how to configure both Amazon Web Services (AWS) and Docker clouds for high availability Explore common design patterns used in building and deploying microservices architecture. …”
Libro electrónico