Mostrando 38,121 - 38,140 Resultados de 40,112 Para Buscar 'COMpRE*', tiempo de consulta: 0.18s Limitar resultados
  1. 38121
    Publicado 2020
    “…Key features include 30 new actionable guidelines for all major areas of Python Detailed explanations and examples of statements, expressions, and built-in types Best practices for writing functions that clarify intention, promote reuse, and avoid bugs Better techniques and idioms for using comprehensions and generator functions Coverage of how to accurately express behaviors with classes and interfaces Guidance on how to avoid pitfalls with metaclasses and dynamic attributes More efficient and clear approaches to concurrency and parallelism Solutions for optimizing and hardening to maximize performance and quality Techniques and built-in modules that aid in debugging and testing Tools and best practices for collaborative development Effective Python will prepare growing programmers to make a big impact using Python…”
    Libro electrónico
  2. 38122
    Publicado 2016
    “….” — Peter Cooper, autor de Beginning Ruby “Este livro oferece um caminho divertido e acessível ao Ruby, sem se afastar da compreensão técnica que um desenvolvedor necessita para fazer trabalhos de verdade. …”
    Libro electrónico
  3. 38123
    Publicado 2020
    “…The book is also featured for being uniquely structured to classify and align engineering disciplines and computer aided technologies from the perspective of the design needs in whole product life cycles, utilizing a comprehensive Solidworks package (add-ins, toolbox, and library) to showcase the most critical functionalities of modern computer aided tools, and presenting real-world design projects and case studies so that readers can gain CAD and CAM problem-solving skills upon the CAD/CAM theory. …”
    Libro electrónico
  4. 38124
    Publicado 2019
    “…In addition, this resource features: Kalman filtering for linear, linearized, and nonlinear systems; modern unscented Kalman filters; as well as Bayesian particle filters Practical processor designs including comprehensive methods of performance analysis Provides a link between model development and practical applications in model-based signal processing Offers in-depth examination of the subspace approach that applies subspace algorithms to synthesized examples and actual applications Enables readers to bridge the gap from statistical signal processing to subspace identification Includes appendices, problem sets, case studies, examples, and notes for MATLAB Model-Based Processing: An Applied Subspace Identification Approach is essential reading for advanced undergraduate and graduate students of engineering and science as well as engineers working in industry and academia…”
    Libro electrónico
  5. 38125
    Publicado 2019
    “…By the end of the book, you will have built a comprehensive, end-to-end web application to show how TypeScript language features, design patterns, and industry best practices can be brought together in a real-world scenario. …”
    Libro electrónico
  6. 38126
    Publicado 2015
    “…Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. …”
    Libro electrónico
  7. 38127
    Publicado 2014
    “…The Bling Dynasty provides new research and a comprehensive look at the booming business of luxury and the Chinese wallet…”
    Libro electrónico
  8. 38128
    Publicado 2015
    “…Coverage Includes How reactive architecture replaces complexity with simplicity throughout the core, middle, and edges The characteristics of actors and actor systems, and how Akka makes them more powerful Building systems that perform at scale on one or many computing nodes Establishing channel mechanisms, and choosing appropriate channels for each application and integration challenge Constructing messages to clearly convey a sender’s intent in communicating with a receiver Implementing a Process Manager for your Domain-Driven Designs Decoupling a message’s source and destination, and integrating appropriate business logic into its router Understanding the transformations a message may experience in applications and integrations Implementing persistent actors using Event Sourcing and reactive views using CQRS Find unique online training on Domain-Driven Design, Scala, Akka, and other software craftsmanship topics using the for{comprehension} website at forcomprehension.com…”
    Libro electrónico
  9. 38129
    Publicado 2015
    “…Get a 360-degree overview of the Oracle Exadata Database Machine Efficiently deploy RAC within the Oracle Exadata ecosystem Fully leverage Storage Cell’s extraordinary performance, via Offloading, Smart Scans, and Hybrid Columnar Compression Manage Exadata with OEM 12 c : perform setup, configuration, asset/target discovery, and day-to-day administration Tune Oracle Exadata for even better performance Perform Exadata Backup/Recovery/DR with RMAN and Data Guard Migrate to Oracle Exadata from other platforms Use Oracle Exadata with the ZFS Storage Appliance Consolidate within the Exadata Database Cloud…”
    Libro electrónico
  10. 38130
    Publicado 2012
    “…Il s'adresse : aux conseillers bancaires et autres opérationnels du monde bancaire ; aux étudiants en licence professionnelle banque ou en master banque ; aux particuliers et clients qui souhaitent mieux comprendre et, surtout, mieux utiliser les produits et services mis à leur disposition. …”
    Libro electrónico
  11. 38131
    Publicado 2014
    “…—Toby Baxendale, Entrepreneur "An engaging, clear, comprehensive course in economics." —Sam Bowman, Research Director, Adam Smith Institute "I am confident this book will become a favourite read among our current students and alumni." …”
    Libro electrónico
  12. 38132
    Publicado 2011
    “…Cette approche facilite la compréhension globale des enjeux. Une réflexion à dimension internationale Le manuel explique comment fonctionne le trust anglo-américain. …”
    Libro electrónico
  13. 38133
    Publicado 2014
    “…In preparing for the CWNA-106 exam, the ideal study guide should cover all of the exam topics in depth— CWNA: Certified Wireless Network Administrator Official Study Guide does just that, making it an excellent, comprehensive study guide…”
    Libro electrónico
  14. 38134
    Publicado 2014
    “…For students and practitioners of public administration, public policy, and nonprofit management, Applied Research Methods in Public and Nonprofit Organizations provides a comprehensive reference to this critical skillset…”
    Libro electrónico
  15. 38135
    por Schneier, Bruce
    Publicado 2015
    “…-Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." …”
    Libro electrónico
  16. 38136
    Publicado 2011
    “…Aux administrateurs de systèmes et de réseaux, mais aussi aux DSI et aux responsables de projets; À tous ceux qui doivent concevoir ou simplement comprendre une politique de sécurité informatique. Au sommaire Principes de sécurité du système d'information Premières notions de sécurité Les différents volets de la protection du SI Malveillance informatique Science de la sécurité du système d'information La clé de voûte : le chiffrement Sécurité du système d'exploitation et des programmes Sécurité du réseau Identités, annuaires, habilitations Politiques de sécurité du système d'information Une charte des utilisateurs Une charte de l'administrateur système et réseau Une politique de sécurité des systèmes d'information Avenir de la sécurité du système d'information Nouveaux protocoles, nouvelles menaces Tendances des pratiques de sécurisation des SI Sécurité informatique : dimension géostratégique…”
    Libro electrónico
  17. 38137
    Publicado 2014
    “…The book includes: An overview of all relevant phases: design, prepare, explore, model, communicate, and measure Coverage of the stages of the predictive analytics cycle across different industries and countries A chapter dedicated to each of the phases of the development of a predictive initiative A comprehensive overview of the entire analytic process lifecycle If you're an executive looking to understand the predictive analytics lifecycle, this is a must-read resource and reference guide"-- "Covers each phase of the development of a predictive analytics initiative. …”
    Libro electrónico
  18. 38138
    Publicado 2015
    “…This provides a simplified, but comprehensive, application development and testing environment. …”
    Libro electrónico
  19. 38139
    Publicado 2011
    “…Vous allez bientôt comprendre pourquoi vos achats déterminent nos choix futurs ! …”
    Libro electrónico
  20. 38140
    Publicado 2011
    “…Aux randonneurs et voyageurs qui veulent préparer et faire partager leurs parcours Aux photographes qui souhaitent présenter leurs images de façon dynamique, attractive et personnalisée A toute personne désireuse de comprendre et utiliser les formats de tracés GPS Au sommaire Les tracés GPS Capturez vos traces GPS Affichez vos traces GPS Gérez et utiliser vos traces GPS Géodécodez et géolocalisez vos photos numériques Géocodez vos photos numériques Géolocalisez vos photos numériques La cartographie numérique Les cartes GPS Les cartes libres de droits Créez vos propres cartes GPS Utilisez vos propres cartes avec votre système de navigation…”
    Libro electrónico