Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Benet 1,073
- History 727
- Management 710
- Historia 682
- Development 662
- Application software 512
- Leadership 481
- Engineering & Applied Sciences 439
- Computer Science 299
- Computer networks 297
- Social aspects 289
- Data processing 279
- Business & Economics 257
- Security measures 257
- Computer security 242
- Information technology 240
- Computer programs 232
- Cloud computing 227
- Computer software 223
- Python (Computer program language) 213
- Success in business 210
- Artificial intelligence 209
- Computer programming 195
- Design 194
- Història 194
- Filosofía 193
- Technological innovations 191
- Database management 190
- Peces 186
- Examinations 182
-
24941por Bémont, Colette“…The volume is a collective work by over forty different archaeologists Defined by a research team pi me CNRS, the work include two complementary sets of contribution: a series of 45 notices, each on dedicated to a particular workshop (some of the workshops have been extensively dug, others have only been prospected); a series of 15 reports, some address problems of general methodology and regional history, others are concerned with the relations with the workshops in Switzerland and the Rhine Valley. …”
Publicado 2021
Electrónico -
24942Publicado 2023“…Heiman Wertheim, head of the clinical microbiology department at Radboud UMC: "Kanj has become a role model and inspiration for female and male physicians and infectious disease trainees in the Middle East and beyond." …”
Libro electrónico -
24943Publicado 2023“…After reading the introductions and setting up your environment, you'll be able to dive into whichever chapter you want, although the topics gradually become more advanced as the book progresses. By the end of this book, you'll have gained the skills, knowledge, and practice required to find flaws in any firmware by emulating and fuzzing it with QEMU and several fuzzing engines. …”
Libro electrónico -
24944Publicado 2023“…However, when studying the social and public role of the church and clergy, it soon becomes quite clear how pervasive this phenomenon was. …”
Libro electrónico -
24945Publicado 2021“…Academic foundation anniversaries thus become central occurrences for attributing social relevance to universities, colleges and their members. …”
Libro electrónico -
24946Publicado 2011“…Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. …”
Libro electrónico -
24947Publicado 2023“…Learn how to transform, store, evolve, refactor, model, and create graph projections using the Python programming language Purchase of the print or Kindle book includes a free PDF eBook Key Features Transform relational data models into graph data model while learning key applications along the way Discover common challenges in graph modeling and analysis, and learn how to overcome them Practice real-world use cases of community detection, knowledge graph, and recommendation network Book DescriptionGraphs have become increasingly integral to powering the products and services we use in our daily lives, driving social media, online shopping recommendations, and even fraud detection. …”
Libro electrónico -
24948Publicado 2023“…Discover quick and easy ways to make charts, diagrams, illustrations, and UX/UI mockups with end-to-end guidance using hands-on tutorials, tips, and tricks Key Features Get up to speed with vector illustration in no time Explore hotkey charts and tips, with best practices developed over ten years of using Inkscape Learn the fundamentals of vector illustration and efficiently leverage Inkscape's powerful toolset Book Description With the power and versatility of the Inkscape software, making charts, diagrams, illustrations, and UI mockups with infinite resolution becomes enjoyable. If you're looking to get up to speed with vector illustration in no time, this comprehensive guide has got your back! …”
Libro electrónico -
24949Publicado 2023“…What You Will Learn Evolve from monolithic to the microservices architecture Implement effective microservices decomposition strategies Utilize communication patterns and API gateways Manage data and distributed transactions in microservices Enhance resilience and observability for microservices Audience This course is ideal for individuals seeking to become proficient in software architecture, explicitly focusing on understanding microservices architecture through real-world cases. …”
Video -
24950Publicado 2023“…Whether you're selecting your first JavaScript framework or seeking to stand out among job applicants by adding the latest technology to your resume, this book is your ultimate guide to becoming a SvelteKit master. A solid understanding of HTML, CSS, JavaScript, and Svelte is a must…”
Libro electrónico -
24951Publicado 2023“…An expert's guide to unleash your productivity potential for work and personal projects with Trello automation, advanced features, integrations, and Power-Ups Purchase of the print or Kindle book includes a free PDF eBook Key Features Uncover the secrets of Trello's core features, automation, and integrations to become a Trello power user Master Trello with practical advice, real-world examples, and workflows to improve task management Get in-depth knowledge of Trello to get it up and running within minutes and scale it for future needs Book Description Managing large projects and teams can be an immense challenge, but having an efficient project management system can make all the difference. …”
Libro electrónico -
24952Publicado 2024“…Setting up new projects becomes second nature as participants explore the Blender Asset Manager, learning to store files efficiently and manage resources with precision. …”
Video -
24953Publicado 2024Tabla de Contenidos: “…-- Docker versus Kubernetes -- Types of containers and their use cases -- Detecting and analyzing compromised containers -- About the Kubernetes orchestration platform -- Acquiring forensic data and container logs for analysis -- Summary -- Further reading -- Chapter 12: Analyzing Compromised Cloud Productivity Suites -- Business email compromise explained -- BEC attack phases -- Common types of BECs -- Initial scoping and response -- Remediation steps -- Microsoft 365 incident response -- Tooling -- Analysis -- Google Workspace incident response -- Tooling -- Analysis -- Summary -- Further reading -- Index -- Other Books You May Enjoy…”
Libro electrónico -
24954Publicado 2020“…In an age where it has become urgent to reinterpret both Shia and Sunni legacies within the context of radicalised Islam, the book argues for a Foucaultian recognition of the 'Orient Other' - as nothing more than 'An Other Self'…”
Libro electrónico -
24955Publicado 2021“…These include current and former faculty and students (ranging from academics such as Christopher Hood, Anne Phillips and Tony Travers, to graduates who have subsequently become politicians-such as Anneliese Dodds, former UK Shadow Chancellor of the Exchequer, and Kennedy Stewart and Michael Fougere, both mayors in Canada), as well as others with strong links to the Department, such as Meghnad (Baron) Desai, and Professors Tim Besley and Nick Barr. …”
Libro electrónico -
24956Publicado 2021“…The successful deployment of AI solutions in manufacturing environments hinges on their security, safety and reliability which becomes more challenging in settings where multiple AI systems (e.g., industrial robots, robotic cells, Deep Neural Networks (DNNs)) interact as atomic systems and with humans. …”
Libro electrónico -
24957Publicado 2023“…Upon completion of the course, you will be able to independently handle data cleansing and manipulation, working in databases, apps, and macros, and acquire skills needed to pass Alteryx's certification as well as on-job skills needed to become data analytic experts. What You Will Learn Learn data cleansing, manipulation, binning, and grouping Understand how to use RegEx (regular expressions) and parse XML Work with In-Database and blend, select, and summarize data Learn about apps and macros, understand app errors and conditions Customize apps and macros and use iterative and batch macros Learn about machine learning and the Alteryx Intelligence Suite Audience This advanced course is designed for individuals with beginner- to intermediate-level knowledge of Alteryx who are looking to build upon those skills. …”
Video -
24958Publicado 2023“…AI models like ChatGPT and DALL-E 2 are becoming increasingly sophisticated, enabling us to generate high-quality text and images at an unprecedented speed and scale. …”
Video -
24959Publicado 2023“…He looks forward to helping aspiring students on their journey to explore penetration testing, ethical hacking, and information security to become the person they would want to be, in an arguably short period of time!…”
Video -
24960Publicado 2023“…This free online textbook is an open educational resource with CC-BY 4.0 licensing that has been developed for prelicensure nursing students. …”
Libro electrónico