Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,290
- Development 2,182
- Management 1,787
- Application software 1,775
- History 1,459
- Engineering & Applied Sciences 1,245
- Història 1,096
- Computer networks 974
- Science: general issues 931
- Data processing 848
- Películas cinematográficas 830
- Computer programs 809
- Computer Science 792
- Cloud computing 775
- Business & Economics 761
- Biblia 758
- Leadership 750
- Design 739
- Filosofía 735
- Documentales 733
- Universidad Pontificia de Salamanca (España) 727
- Security measures 725
- Computer security 714
- Social aspects 686
- Computer software 683
- Python (Computer program language) 658
- Information technology 653
- Web site development 646
- Artificial intelligence 641
- Computer programming 619
-
111741Publicado 2013“…Une vieille question, si nationale. « Et d’abord, l’école n’est pour rien dans la création de la nation française », affirme d’emblée Antoine Prost. …”
Electrónico -
111742Publicado 2018“…The analisys of the results indicate that the automated procedure produces orthoimages with a positional accuracy of about two pixels or better, even if several gross errors are present among the automatically extracted ground control points V knjigi je opisan popolnoma samodejen postopek geometričnih popravkov optičnih satelitskih posnetkov, ki deluje brez posredovanja operaterja med obdelavo. …”
Libro electrónico -
111743Publicado 1999“…Le système de santé que l'État québécois avait mis en place à la fin des années 1960 n'est plus ce qu'il était. Et l'on ne sait trop à quoi il ressemblera au XXIe siècle quand s'achèvera sa réforme. …”
Libro electrónico -
111744Publicado 2023Tabla de Contenidos: “…Classifications -- Components -- Credits -- Dimensions -- File -- Geo-location -- Rendering -- Statistics -- Text -- Units -- Preferences -- Accessibility -- Applications -- Compatibility -- Drawing -- Files -- General -- Graphics (Formerly OpenGL) -- Shortcuts -- Template -- Workspace -- Summary -- Chapter 11: Working with Components -- Using the Components Panel -- Creating Components -- Creating New Components -- Nested Components -- Component Statistics -- Updating and Editing Components -- Component Instances -- Instance Options -- Dynamic and Live Components -- Dynamic Components -- Live Components -- Summary -- Chapter 12: Import, Export, 3D Warehouse, and Extensions -- Import Options -- Importing 3D Files -- 2D Files -- Image Files -- Export Options -- Exporting 3D Files -- Exporting 2D Files -- Image Files -- Section Slices -- Animations -- Send to LayOut -- 3D Warehouse -- Extensions -- Extension Warehouse -- Extension Manager -- Overlays -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
111745Publicado 2013“…Companies face a variety of risks resulting from cost reduction strategies, rationalization measures, global sourcing, and outsourcing activities. …”
Libro electrónico -
111746por World Health Organization“…Children and young adolescents aged under 15 years represent about 11% of all people with TB globally. This means 1.1 million children and young adolescents aged under 15 years fall ill with TB every year, and more than 225 000 of them lose their lives. …”
Publicado 2022
Libro electrónico -
111747Publicado 2024“…This course is perfect for those looking to enhance their skills in Blender for professional or personal projects. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. …”
Video -
111748Publicado 2024“…No prior experience is needed, making it perfect for beginners ready to dive into the world of 3D modeling and scene creation. About the Author 3D Tudor By Neil Bettison: Neil Bettison is a professional 3D artist with nine years of modelling experience, including assets, characters, and environments. …”
Video -
111749Publicado 2024“…What you will learn Conduct breach scans and enumerations Analyze HTTPS traffic for vulnerabilities Utilize Burp Suite for web app security testing Execute horizontal and vertical privilege escalations Escape restricted shells for full system access Implement advanced server and client protection strategies Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and ethical hackers looking to deepen their understanding of hacking techniques and security defenses. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. …”
Video -
111750Publicado 2024“…Familiarity with basic security concepts and experience with web technologies are recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. …”
Video -
111751Publicado 2022“…At this time changes in social tolerance allowed ancestors of our own species to further reach out beyond their local group and care about distant allies, making human communities resilient to environmental changes. …”
Libro electrónico -
111752Publicado 2024“…As you delve deeper, you'll learn about the fundamental concepts of a CRM system, its purpose, and the pivotal role of an administrator in the Salesforce lifecycle. …”
Libro electrónico -
111753Publicado 2007Materias: “…Cost effectiveness…”
Libro electrónico -
111754Publicado 2023“…This course is ideal for developers that want to build better foundational problem-solving skills and pass job interviews. About The Author Brad Traversy: Brad Traversy has been programming for around 12 years and teaching for almost 5 years. …”
Video -
111755Publicado 2023“…This book is focused on African countries since there is a reason to be optimistic about the prospects for growth and entrepreneurship. …”
Libro electrónico -
111756Publicado 2024“…What you will learn Explore best practices for participating in bug bounty programs and discover how rewards work Get to know the key steps in security testing, such as information gathering Use the right tools and resources for effective bug bounty participation Grasp strategies for ongoing skill development and ethical bug hunting Discover how to carefully evaluate bug bounty programs to choose the right one Understand basic security concepts and techniques for effective bug hunting Uncover complex vulnerabilities with advanced techniques such as privilege escalation Who this book is for This book is for anyone interested in learning about bug bounties, from cybersecurity and ethical hacking enthusiasts to students and pentesters. …”
Libro electrónico -
111757por Ahouga, Younès, author“…L’étude de cet imaginaire permet de comprendre la transformation de l’OIM et son rôle dans la constitution d’une nouvelle gouvernance migratoire suite à l’adoption en 2018 du Pacte mondial pour les migrations…”
Publicado 2024
Libro electrónico -
111758por Organization for Economic Cooperation and Development“…Atteindre l'objectif climatique de zeÌro eÌmission nette de carbone d'ici 2050 neÌcessitera une action politique audacieuse, exigeant une trajectoire claire du prix du carbone et des ajustements des politiques d'urbanisation et de transport…”
Publicado 2022
Libro electrónico -
111759por Panel on Measuring Medical Care Risk in Conjunction with the New Supplemental Income Poverty MeasureMaterias: “…Medical care, Cost of Risk assessment United States…”
Publicado 2012
Libro electrónico -
111760Publicado 2023“…Use the reference repository for MLFlow examples and projects: Example MLFlow Projects Learning objectives Install and configure MLflow Use the tracking UI and APIs Log metrics, parameters, tags, and artifacts Create reproducible ML projects Version, stage, and deploy models with registries Deploy models to Azure ML, SageMaker, etc Lesson 1: Introduction to MLflow Lesson Outline Overview of MLflow components Installation and configuration Tracking experiments with UI, Python, R APIs Logging metrics, params, tags, artifacts Lesson 2: MLflow Projects Lesson Outline Motivation for reproducible ML projects Creating project directories Running projects locally or on Git Customizing execution environments Lesson 3: MLflow Models Lesson Outline Packaging models and dependencies Model versioning with registries Staging and promoting model stages Deploying models to services About your instructor Alfredo Deza has over a decade of experience as a Software Engineer doing DevOps, automation, and scalable system architecture. …”
Video