Mostrando 642,461 - 642,480 Resultados de 645,079 Para Buscar 'C5N~', tiempo de consulta: 1.64s Limitar resultados
  1. 642461
    Publicado 2019
    “…The authors show just how much information you can glean with straightforward queries, aggregations, and visualizations, and they teach indispensable error analysis methods to avoid costly mistakes. …”
    Libro electrónico
  2. 642462
    Publicado 2018
    Tabla de Contenidos: “…A lethal weapon -- Composite -- Get together -- The Squad -- Varargs and secondary constructors -- Counting bullets -- Facade -- Keep it simple -- Flyweight -- Being conservative -- Saving memory -- Proxy -- A short detour into the RMI world -- A replacement -- Lazy delegation -- Summary -- Chapter 4: Getting Familiar with Behavioral Patterns -- Strategy -- Fruit arsenal -- Citizen function -- Switching sides -- Iterator -- One, two... many -- Running through the values -- State -- Fifty shades of State -- State of the Nation -- Command -- Undoing commands -- Chain of responsibility -- Interpreter -- We need to go deeper -- A language of your own -- Taking a break -- Call suffix -- Mediator -- Trouble in the Jungle -- The middleman -- Flavors -- Caveats -- Memento -- Remembrance -- Visitor -- Writing a crawler -- Template method -- Observer -- Animal Choir -- Summary -- Chapter 5: Functional Programming -- Why functional programming? …”
    Libro electrónico
  3. 642463
    Publicado 2017
    “…About This Book Build quirky and fun projects from scratch and become efficient with React Native Learn to build professional Android and iOS applications with your JavaScript skills Use Isomorphic principles to build mobile apps that offer a native user experience Who This Book Is For This book is for developers who want to use their JavaScript knowledge for mobile development. …”
    Libro electrónico
  4. 642464
    Publicado 2018
    “…Adopt new pedagogical techniques designed specifically for online learning environments Ensure strong course alignment and effective student learning for online classes Increase student retention, build necessary support structures, and train faculty more effectively Integrate research-based course design and cognitive psychology into graduate or undergraduate programs Distance is no barrier to a great education; what do stand in the way are inadequate online course design and implementation and deficient faculty training and support—all of which administrators can mitigate. Online Teaching at Its Best will help you ensure that your online classes measure up to the rigor and quality of excellence in teaching and assessment, build in the personal touch for developing a learning community and equip your students to succeed in the next challenge…”
    Libro electrónico
  5. 642465
    Publicado 2017
    “…If you are looking to apply techniques to your own projects, taking your first steps into microservice architecture, this book is for you. …”
    Libro electrónico
  6. 642466
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Exploring the Azure Cloud -- Fundamentals of cloud computing -- Virtualization -- Software-Defined Datacenter -- SOA -- Cloud services -- Cloud types -- Understanding the Azure Cloud -- A small history of the Azure Cloud -- Azure architecture -- Azure in your organization -- Azure and open source -- Summary -- Questions -- Further reading -- Chapter 2: Getting Started with the Azure Cloud -- Technical requirements -- Getting access to Azure -- Logging in using the Azure portal -- Getting command-line access to Azure -- Installing the Azure command-line interface -- Logging in with the Azure CLI -- PowerShell -- Logging in with PowerShell -- Azure Resource Manager -- Linux and Azure -- Linux distributions -- Microsoft-endorsed Linux distributions -- Deploying a Linux virtual machine -- Your first virtual machine -- Images -- Image sizing -- Virtual machine networking -- Virtual machine information -- Connecting to Linux -- Logging in to your Linux VM using password authentication -- Logging in to your Linux VM with an SSH private key -- Summary -- Questions -- Further reading -- Chapter 3: Basic Linux Administration -- The Linux shell -- Executing commands -- Command-line editing -- Working with history -- Auto-completion -- Globbing -- Redirections -- Working with variables -- Bash configuration files -- Getting help -- Using the man-pages -- Using info documents -- Other documentation -- Working with text files -- Reading text -- Searching in text files -- Editing text files -- Finding your way in the filesystem -- File hierarchy system -- Mounting filesystems -- Finding files on the filesystem -- Process management -- View processes -- Sending signals to a process -- Discretionary Access Control -- User management…”
    Libro electrónico
  7. 642467
    Publicado 2017
    “…Working with Odoo ten…”
    Libro electrónico
  8. 642468
    Publicado 2017
    “…The Apple-Certified Way to Learn This fully updated Apple-certified guide presents a real-world workflow from raw media to finished project to demonstrate the features of Final Cut Pro X 10.3 and the practical techniques you will use in editing projects. …”
    Libro electrónico
  9. 642469
    Publicado 2016
    Tabla de Contenidos: “…-- Report Builder and Designer Enhancements -- Modern Browser Rendering -- Parameter Layout Control -- Updated RDL Specification -- Mobile Reports -- KPIs -- Native Printing Control -- PowerPoint Rendering -- Integrated and Improved Web Portal -- New Charts and Visual Enhancements -- Standardized, Modern Browser Rendering -- Power BI Dashboard Pinning -- Summary -- Chapter 3: Reporting Services Installation and Architecture -- What's Changed in SQL Server 2016? …”
    Libro electrónico
  10. 642470
    por Aber, Robyn
    Publicado 2004
    “…With this book as an educational resource on networking, you will be better prepared to invest in network technologies and shape your own success. This volume is in the Network Business Series offered by Cisco Press. …”
    Libro electrónico
  11. 642471
    por Rybaczyk, Peter
    Publicado 2004
    “…Part II delves into security, CRM, IP telephony, unified messaging, IP/TV, and wireless LAN solutions, which can save businesses critical time and money. …”
    Libro electrónico
  12. 642472
    Publicado 2008
    “…Unlike most other books about SOA that merely describe the standards, this book helps you get started immediately by walking you through sample code that illustrates how real life problems can be solved using the techniques and best practices described in standards. …”
    Libro electrónico
  13. 642473
    Publicado 2012
    “…Download these videos or view them through our HD player, and discover how the world of big data can—and will—affect your organization. Here are just a few of the sessions you’ll receive in this video package: Data Science: The Two Most Important Algorithms in Predictive Modeling Today—Jeremy Howard (Kaggle), Mike Bowles (Sole Proprietor) Architecting Virtualized Infrastructure for Big Data—Richard McDougall (VMware) Business & Industry: Data Jujitsu: The Art of Turning Data into Product—DJ Patil (Greylock Partners) Improving Productivity Using Real-Time Data—Jacomo Corbo (QuantumBlack) Visualization & Interface: Science of Visualization—Jock Mackinlay (Tableau Software) Roll Your Own Front End: A Survey of Creative Coding Frameworks—Michael Edgcumbe (Columbia University), Eric Mika (The Department of Objects) Hadoop & Big Data: I Didn't Know You Could Do All that with Hadoop—Jack Norris (MapR) Storm: distributed and fault-tolerant realtime computation—Nathan Marz (Twitter) Domain Data: Understanding Social Contagion—Marcel Salathé (Penn State University) Changing Data Standards from Wall Street to DC and Beyond—John Mulholland (Fannie Mae)…”
    Video
  14. 642474
    Publicado 2009
    “…Coverage includes • Viewing virtualization from the attacker’s perspective, and understanding the new security problems it can introduce • Discovering which security threats the vmkernel does (and doesn’t) address • Learning how VMsafe enables third-party security tools to access the vmkernel API • Understanding the security implications of VMI, paravirtualization, and VMware Tools • Securing virtualized storage: authentication, disk encryption, virtual storage networks, isolation, and more • Protecting clustered virtual environments that use VMware High Availability, Dynamic Resource Scheduling, Fault Tolerance, vMotion, and Storage vMotion • Securing the deployment and management of virtual machines across the network • Mitigating risks associated with backup, performance management, and other day-to-day operations • Using multiple security zones and other advanced virtual network techniques • Securing Virtual Desktop Infrastructure (VDI) • Auditing virtual infrastructure, and conducting forensic investigations after a possible breach informit.com/ph www.Astroarch.com…”
    Libro electrónico
  15. 642475
    Publicado 2015
    Materias: “…Final cut (Electronic resource)…”
    Libro electrónico
  16. 642476
    Publicado 2014
    “…Each subsequent lesson and exercises can be seen as building on previous topics, with more advanced topics towards the end of the guide. …”
    Libro electrónico
  17. 642477
    Publicado 2022
    “…What you will learn Understand the challenges and advantages of working with streaming data Develop real-time insights from streaming data Understand the implementation of streaming data with various use cases to boost your knowledge Develop a PCA alternative that can work on real-time data Explore best practices for handling streaming data that you absolutely need to remember Develop an API for real-time machine learning inference Who this book is for This book is for data scientists and machine learning engineers who have a background in machine learning, are practice and technology-oriented, and want to learn how to apply machine learning to streaming data through practical examples with modern technologies. …”
    Libro electrónico
  18. 642478
    por Qin, Mélony
    Publicado 2022
    Tabla de Contenidos: “…Configuring applications -- Manifest management with kustomize -- Common package management and templating with Helm -- Summary -- Mock CKA scenario-based practice test -- Scenario 1 -- Scenario 2 -- Scenario 3 -- Scenario 4 -- Scenario 5 -- FAQs -- Chapter 5: Demystifying Kubernetes Storage -- Technical requirements -- Stateful versus stateless workloads -- Kubernetes volumes -- Ephemeral storage -- Persistent storage -- Cracking stateful applications in Kubernetes -- Configuring an application with mounted storage -- Configuring an application with persistent storage -- Summary…”
    Libro electrónico
  19. 642479
    Publicado 2021
    “…For use of the SDG logos and design, please see the according Guidelines for the use of the SDG logo, color wheel, and 17 icons…”
    Libro electrónico
  20. 642480
    Publicado 2020
    “…As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.What you will learnExplore ways to create your own architectures and analyze those from othersUnderstand strategies for creating architectures for environments and applicationsDiscover approaches to documentation using repeatable approaches and toolsDelve into communication techniques for designs, goals, and requirementsFocus on implementation strategies for designs that help reduce riskBecome well-versed with methods to apply architectural discipline to your organizationWho this book is forIf you are involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization, then this security book is for you. …”
    Libro electrónico