Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,132
- Engineering & Applied Sciences 758
- History 701
- Development 539
- Management 492
- Computer Science 460
- Application software 453
- Computer networks 450
- Filosofía 375
- Universidad Pontificia de Salamanca (España) 370
- Data processing 365
- Lectura 365
- Examinations 364
- Security measures 337
- Computer security 330
- Crítica e interpretación 299
- Education 293
- Computer programs 291
- Cloud computing 284
- Certification 263
- Derecho 262
- Python (Computer program language) 262
- Electrical & Computer Engineering 257
- Database management 249
- Operating systems (Computers) 238
- Digital techniques 230
- Artificial intelligence 228
- Telecommunications 218
- Business & Economics 213
- Design 213
-
38721Publicado 2017“…He's the author of multiple O'Reilly titles, including his comprehensive series covering all aspects of the Arduino electronics prototyping platform…”
-
38722Publicado 2014“…And her coverage is comprehensive, from basic syntax to regular expression handling, files, references, objects, working with databases, and much more... plus appendices that contain a complete list of functions and definitions, command-line switches, special variables, and popular modules. …”
Libro electrónico -
38723Publicado 2017“…More than 40 percent of software developers use it as their primary source control tool, and that number continues to grow; the ability to work effectively with Git is rapidly approaching must-have status, and Professional Git is the comprehensive guide you need to get up to speed quickly…”
Libro electrónico -
38724Publicado 2012“…Once you have completed this training video for Getting Started with Office 2013, you will have a comprehensive overview of what major new features and functions are in store for you with the release of this popular business software. …”
-
38725Publicado 2010“…New and improved in this second edition: Coverage of architectural styles such as service-oriented architectures, multi-tier architectures, and data models Guidance for documentation in an Agile development environment Deeper treatment of documentation of rationale, reflecting best industrial practices Improved templates, reflecting years of use and feedback, and more documentation layout options A new, comprehensive example (available online), featuring documentation of a Web-based service-oriented system Reference guides for three important architecture documentation languages: UML, AADL, and SySML…”
Libro electrónico -
38726Publicado 2010“…Last, but not least, it shows how to build comprehensive models to support planning--and optimize every marketing decision you make: · Understand the full spectrum of marketing metrics: pros, cons, nuances, and application · Quantify the profitability of products, customers, channels, and marketing initiatives · Measure everything from “bounce rates” to the growth of your web communities · Understand your true return on marketing investment--and enhance it This award-winning book will show you how to apply the right metrics to all your marketing investments, get accurate answers, and use them to systematically improve ROI…”
Libro electrónico -
38727Publicado 2010“…The ETF Trend Following Playbook provides sound advice for traders as well as a comprehensive and up-to-date tour of all the ETF world has to offer.” …”
Libro electrónico -
38728“…His focus is working with enterprise customers to address their challenges with comprehensive end-to-end data center architectures. David Jansen, CCIE No. 5952, is a Technical Solutions Architect for Cisco’s U.S. …”
Libro electrónico -
38729Publicado 2010“…Whatever your role in the business, you’ll learn how to: • Launch a blog that truly represents the best of your business • Create a comprehensive, long-term blogging strategy • Staff your blogging initiative • Integrate blogs with other offline and online marketing programs • Use your blog to drive customers and prospects to the business • Push up-to-the-minute information to customers via RSS • Build a thriving online community—and learn from what it tells you • Manage comments (and decide whether to have them) • Utilize podcasts, vlogs, microblogging, and other new techniques • Gain business value from hot new Web 3.0 technologies, including widgets, mashups, personal agents, and the Semantic Web…”
Libro electrónico -
38730Publicado 2013“…Provides a framework for creating a comprehensive personal risk management strategy Contains numerous real-life anecdotes and case studies drawn from the author's case files Discusses insurance solutions for property, cars, jewelry, aircraft, watercraft, wine, cars, and more Read Wealth Exposed and find out what you need to know to protect your assets from risk and secure your peace of mind…”
Libro electrónico -
38731Publicado 2011“…Amélie fait preuve d'une profonde compréhension de l'utilisabilité. Elle pense et écrit merveilleusement bien - à la limite du poétique - à ce sujet." …”
Libro electrónico -
38732Publicado 2011“…In this quick, concise, e-guide, you’ll learn how to use PhotoGene to: View and edit metadata Color correct your images using the histogram and curves Rotate, straighten, crop, sharpen, and reduce noise Work creatively with text Create cool framing effects such as blurred or darkened edges Apply fun filter effects Export your images to Twitter, Facebook, Flickr, an FTP site, or email Use the Pro Upgrade to apply watermarks and control JPG compression…”
Libro electrónico -
38733por Callaghan, Brent“…Specific topics of interest include: NFS version 4, highlighting performance improvements, security features, and cross-platform interoperability for Internet operation RPC authentication and security Differences between NFS versions 2 and 3 Implementation issues for clients and servers Read-ahead and write-behind Caching policies The Lock Manager protocol Automounting NFS variants, including Spritely NFS, NQNFS, Trusted NFS, and NASD NFS NFS competitors: RFS, AFS, DCE/DFS, and CIFS The PCNFS protocol for implementing NFS on PC operating systems SPEC SFS benchmarks, WebNFS, and firewalls Comprehensive and current, NFS Illustrated is an essential resource for network professionals who want to use this widespread and evolving technology to its fullest…”
Publicado 2000
Libro electrónico -
38734por Autry, Chad Wheeler, 1970-“…Next, they provide comprehensive mitigation strategies based on logistics, resource recovery, resource protection, demand and supply shaping, and other techniques. …”
Publicado 2013
Libro electrónico -
38735Publicado 2015“…Establish secure authentication and session management processes Implement a robust access control design for multi-tenant web applications Defend against cross-site scripting, cross-site request forgery, and clickjacking Protect sensitive data while it is stored or in transit Prevent SQL injection and other injection attacks Ensure safe file I/O and upload Use effective logging, error handling, and intrusion detection methods Follow a comprehensive secure software development lifecycle "In this book, Jim Manico and August Detlefsen tackle security education from a technical perspective and bring their wealth of industry knowledge and experience to application designers. …”
Libro electrónico -
38736The handbook of program management how to facilitate project success with optimal program managementPublicado 2014“…Nowhere else will you find such comprehensive, authoritative information on creating successful program management outcomes. …”
Libro electrónico -
38737Publicado 2015“…An extensive list of scholarly works and international government standards is also provided in this detailed guide. Comprehensive coverage includes: Basic information assurance principles and concepts Information assurance management system Current practices, regulations, and plans Impact of organizational structure Asset management Risk management and mitigation Human resource assurance Advantages of certification, accreditation, and assurance Information assurance in system development and acquisition Physical and environmental security controls Information assurance awareness, training, and education Access control Information security monitoring tools and methods Information assurance measurements and metrics Incident handling and computer forensics Business continuity management Backup and restoration Cloud computing and outsourcing strategies Information assurance big data concerns…”
Libro electrónico -
38738Publicado 2014“…Please listen to John Eells of our Technical Strategy team present this one-hour comprehensive technical overview of z/OS V2.1. Audio Presentation (59MB) Corresponding charts…”
Libro electrónico -
38739Publicado 2011“…Accompanied by more than 1,000 examples and exercises, this comprehensive, classroom-tested text develops students’ understanding of the mathematical methodology behind the analysis of algorithms. …”
Libro electrónico -
38740Publicado 2012“…The Appendix includes comprehensive listings of AADL language elements, properties incorporated in the AADL standard, and a description of the book’s example system…”
Libro electrónico