Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,290
- Development 2,182
- Management 1,787
- Application software 1,775
- History 1,459
- Engineering & Applied Sciences 1,245
- Història 1,096
- Computer networks 974
- Science: general issues 931
- Data processing 848
- Películas cinematográficas 830
- Computer programs 809
- Computer Science 792
- Cloud computing 775
- Business & Economics 761
- Biblia 758
- Leadership 750
- Design 739
- Filosofía 735
- Documentales 733
- Universidad Pontificia de Salamanca (España) 727
- Security measures 725
- Computer security 714
- Social aspects 686
- Computer software 683
- Python (Computer program language) 658
- Information technology 653
- Web site development 646
- Artificial intelligence 641
- Computer programming 619
-
111601por Seacord, Robert C.“…Moreover, this book encourages programmers to adopt security best practices and develop a security mindset that can help protect software from tomorrow's attacks, not just today's. …”
Publicado 2006
Libro electrónico -
111602por Hucaby, Dave“…Derived from the authors' notes about how to configure a variety of Cisco Catalyst features during the course of their preparation for the CCIE(r) exam, Cisco Field Manual: Catalyst Switch Configuration is an indispensable tool that helps you perform the most popular deployment tasks. …”
Publicado 2003
Libro electrónico -
111603por Smart, Julian“…With this book, you can, too. wxWidgets quickstart: event/input handling, window layouts, drawing, printing, dialogs, and more Working with window classes, from simple to advanced Memory management, debugging, error checking, internationalization, and other advanced topics Includes extensive code samples for Windows, Linux (GTK+), and Mac OS X About the CD-ROM The CD-ROM contains all of the source code from the book; wxWidgets distributions for Windows, Linux, Unix, Mac OS X, and other platforms; the wxWidgets reference guide; and development tools including the OpenWatcom C++ compiler, the poEdit translation helper, and the DialogBlocks user interface builder. © Copyright Pearson Education. …”
Publicado 2005
Libro electrónico -
111604Publicado 2013Tabla de Contenidos: “…Capitalism at the crossroads : next generation business strategies for a post-crisis world, 3rd ed. / The fortune at the bottom of the pyramid : eradicating poverty through profits, rev. and updated 5th anniversary ed…”
Libro electrónico -
111605Publicado 2021“…Providing such an experience is difficult and almost impossible when using linear models, and this is why modern businesses must adopt a platform-first approach to change how they invent, develop, and market solutions. …”
Libro electrónico -
111606Publicado 2021“…Starting with object-oriented programming (OOP) in PHP and related language features, you'll work through modern programming techniques such as inheritance, understand how it contrasts with composition, and finally look at more advanced language features. You'll learn about the MVC pattern by developing your own MVC system and advance to understanding what a DI container does by building a toy DI container. …”
Libro electrónico -
111607Publicado 2015“…Agility complements strategy; it cannot replace it. This book is about reversing course and repositioning strategy in its rightful place as the overarching management system. …”
Libro electrónico -
111608Publicado 2022“…Anyone who is willing to learn about security in Azure and to build secure Azure and hybrid infrastructure, to improve their security posture in Azure, hybrid and multi-cloud environments by leveraging all the features within Microsoft Defender for Cloud…”
Libro electrónico -
111609por Bronnikova, Olga“…Dans le sillage de la fin de l’URSS, l’Internet russe s’est d’abord développé librement, laissant l’initiative à de nombreux acteurs inventant des outils numériques ajustés à leurs usages. Cependant, depuis le début des années 2010, le tournant autoritaire au sommet de l’État russe a entraîné le déploiement d’un maillage d’emprises et de contraintes qui s’est resserré tant sur les acteurs que sur les infrastructures numériques du pays. …”
Publicado 2023
Electrónico -
111610por Barnbaum, Bruce“…These examples serve as stepping stones that will lead you to your own heightened ability to see and be creative.Creativity is a topic that is almost wholly ignored in formal education because most instructors think that it cannot be taught or learned. …”
Publicado 2020
Libro electrónico -
111611por Gleeson, Patrick. author“…Even the most potent modern management tools are ineffective when wielded blindly. …”
Publicado 2017
Libro electrónico -
111612Publicado 2019“…In addition to delving into the fundamental concepts, Barton and Henry address sample big data and machine learning use cases in different industries and present demos featuring the most common tools (such as Hadoop, TensorFlow, Matlab/Octave, R, and Python) in various fields used by data scientists and researchers. …”
-
111613Publicado 2019“…Topics include Module 1: Blockchain and Bitcoin Basic Concepts Module 2: Cryptocurrency and Smart Contracts Module 3: Business Opportunities in Blockchain Module 4: Blockchain and Your Business About the Instructor George Levy is a lecturer and senior instructor on blockchain, Bitcoin, and cryptocurrency at Blockchain Institute of Technology (BIT), a leading professional training and certification organization focused on blockchain technology and cryptocurrency. …”
-
111614Publicado 2018“…This publication is intended for anyone who wants to understand more about IBM Linear Tape System products and their implementation. …”
Libro electrónico -
111615Publicado 2020“…Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is for This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field…”
Libro electrónico -
111616Publicado 2016“…To promote the transfer of key skills to real-life settings, Fogler presents the following three styles of problems: Straightforward problems that reinforce the principles of chemical reaction engineering Living Example Problems (LEPs) that allow students to rapidly explore the issues and look for optimal solutions Open-ended problems that encourage students to practice creative problem-solving skills About the Web Site The companion Web site offers extensive enrichment opportunities and additional content, including Complete PowerPoint slides for lecture notes for chemical reaction engineering classes. …”
Libro electrónico -
111617Publicado 2020“…This third edition of Framework Design Guidelines adds guidelines related to changes that the .NET team adopted during transition from the world of client-server application to the world of the Cloud.” …”
Libro electrónico -
111618Publicado 2015“…Whether you are preparing for the CCNP Collaboration certification exams or you are just interested in learning about how to deploy and operate Cisco collaboration applications, you will find this book to be an invaluable resource. …”
Libro electrónico -
111619por Blazquez, Adèle“…Bien que souvent spontanément présente dans ces disciplines, une telle représentation les condamne de facto à démissionner devant l'État et à adopter des langages étrangers à leur épistémologie. …”
Publicado 2019
Electrónico -
111620Publicado 2023“…Discover various cloud services alongside modern software development practices and tools with the guidance of two industry leaders in DevOps Purchase of the print or Kindle book includes a free PDF eBook Key Features Modernize continuous delivery in the cloud with strategic goals and objectives Master continuous delivery with the right tools, applications, and use cases Perform multi-cluster and multi-cloud deployments efficiently Book Description Many organizations are embracing cloud technology to remain competitive, but implementing and adopting development processes while modernizing a cloud-based ecosystem can be challenging. …”
Libro electrónico