Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 17,089
- Biblia 7,021
- Filosofía 4,822
- Universidad Pontificia de Salamanca (España) 4,581
- Crítica e interpretación 4,502
- Derecho 3,897
- RELIGION 3,643
- Educación 3,596
- Història 3,419
- Iglesia Católica 3,150
- Ciencias sociales 2,926
- Teología 2,833
- Teología dogmática 2,624
- Moral cristiana 2,534
- Derecho canónico 2,502
- Psicología 2,360
- Sermones 2,242
- Derecho civil 2,224
- Management 2,201
- Medicina 2,195
- Development 2,161
- History 1,988
- Education 1,951
- Documentales 1,893
- Universidad Pontificia de Salamanca, Facultad de Educación 1,877
- Engineering & Applied Sciences 1,850
- Tecnología 1,715
- Philosophy 1,704
- Application software 1,700
- Economía 1,629
-
665961Publicado 2022Tabla de Contenidos: “…Table of Contents New C++20 Features General STL Features STL Containers Compatible Iterators Lambda Expressions STL Algorithms Strings, Streams, and Formatting Utility Classes Concurrency and Parallelism Using the File System A Few More Ideas…”
Libro electrónico -
665962Publicado 2022“…You will look at the top 25 AWS services such as EC2, VPC, Lambda, Route 53, Glacier, CloudFront, RDS, DynamoDB, IAM, API Gateway, CloudWatch, Trusted Adviser, EFS, SNS, Lightsail, Certificate Manager, KMS, S3, CloudTrail, Systems Manager, Inspector, Secrets Manager, CloudFormation, Elastic Beanstalk, and Cost Explorer services. …”
Video -
665963Publicado 2017“…Understand how pattern-oriented software architecture techniques can and cannot help to alleviate this complexity. …”
-
665964Publicado 2016Tabla de Contenidos: “…Direct Numerical Integration -- 3.5.2. Prony Identification Method -- 3.5.3. Time-Domain Identification -- 3.5.4. …”
Libro electrónico -
665965Publicado 2018“…This discussion includes p-i-n photodetectors; avalanche photodetectors (APD); optically preamplified detectors; integrated detectors, including detectors for silicon photonics; and detectors for phase-modulated signals, including coherent detectors. …”
Libro electrónico -
665966Publicado 2017“…This book is the first to tackle in detail those enterprise-wide capabilities expected by Board, CEO and Internal Audit, of the diverse executive management functions that need to team up with the Information Security function in order to provide integrated solutions. …”
Libro electrónico -
665967Publicado 2018“…Recent case studies highlight common mistakes made—and propagated—by otherwise intelligent people, so you can identify and eliminate these practices within your own organization. …”
Libro electrónico -
665968Publicado 2016“…Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today’s most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you’re attacked · Learn how cyberterrorism and information warfare are evolving…”
Libro electrónico -
665969Publicado 2018“…The book will then focus on how you can ingest messages and events required to trigger smart contracts with Service Bus and Event Hubs. …”
Libro electrónico -
665970Publicado 2018“…You will explore algorithms such as machine learning algorithms, predictive analytical models, and finally deep learning algorithms. You will learn to run the most powerful visualization packages available in R so as to ensure that you can easily derive insights from your data. …”
Libro electrónico -
665971Publicado 2018Tabla de Contenidos: “…. -- Detecting SSH versions with the SSH Version Scanner -- Getting ready -- How to do it... -- FTP scanning -- Getting ready -- How to do it... -- SMTP enumeration -- Getting ready -- How to do it... -- SNMP enumeration -- Getting ready -- How to do it... -- HTTP scanning -- Getting ready -- How to do it... -- WinRM scanning and brute forcing -- Getting ready -- How to do it... -- Integrating with Nessus -- Getting ready -- How to do it... -- Integrating with NeXpose -- Getting ready -- How to do it... -- Integrating with OpenVAS -- How to do it... -- Chapter 3: Server-Side Exploitation -- Introduction -- Getting to know MSFconsole -- MSFconsole commands -- Exploiting a Linux server -- Getting ready -- How to do it... -- How it works... -- What about the payload? …”
Libro electrónico -
665972Publicado 2018“…By the end of the book, you will have a working knowledge of probabilistic modeling and you will be able to design and implement Bayesian models for your own data science problems. After reading the book you will be better prepared to delve into more advanced material or specialized statistical modeling if you need to. …”
Libro electrónico -
665973Publicado 2019“…Throughout this book, we will be using the GeoPackage format, and we will also discuss how QGIS can support many different types of data. Finally, you will learn where to get help and how to become engaged with the GIS community. …”
Libro electrónico -
665974Publicado 2021Tabla de Contenidos: “…Ch1: Basic concepts of Monitoring -- Ch 2: Collection of Events, Logs and Metrics -- Ch 3: Architecture of a Modern Monitoring System -- Ch 4: Prometheus -- Ch 5: TICK Platform -- Ch 6: Elastic Stack – Elastic Search -- Ch 7: Analyze and Investigate -- Ch 8: Type of Time Series Graphs -- Ch 9: Type of Summary Graphs -- Ch 10: Graphana -- Ch 11: Alerting and Notifications…”
Libro electrónico -
665975Publicado 2018“…Basic knowledge of PHP, JavaScript, HTML and CSS is required to get most out of this book…”
Libro electrónico -
665976Publicado 2018“…You will also learn how you can use Group Policy to secure your Active Directory environment, and also understand how Group Policy preferences are different than policies, with the help of real-world examples. …”
Libro electrónico -
665977Publicado 2019“…If you're advanced, you can get a deeper understanding of all the tools and technique described in the book…”
Libro electrónico -
665978Publicado 2018“…What you will learn Understand the purpose of design patterns and their impact on application lifecycle Build applications that can handle large amounts of data-intensive operations Uncover advanced concurrency techniques and discover how to handle a large number of requests in production Optimize frontends to improve the client-side experience of your application Effective testing and performance profiling techniques to detect issues in applications early in the development cycle Build applications with a focus on security Implement large applications as microservices to improve scalability Who this book is for If you're a developer who wants to build enterprise-grade applications, this book is for you. …”
Libro electrónico -
665979Publicado 2022Tabla de Contenidos: “…First Microservice -- Chapter 5. Microservice Messaging -- Chapter 6. Decentralizing Data -- Chapter 7. …”
Libro electrónico -
665980Publicado 2022“…You will be shown how each graph can be created, modified, and customized in Stata throughout the course's journey. …”
Video