Mostrando 31,281 - 31,300 Resultados de 33,580 Para Buscar 'COPCON~', tiempo de consulta: 1.08s Limitar resultados
  1. 31281
    Publicado 2017
    “…Steer your organization away from burnout while boosting all-around performance The Happy, Healthy Nonprofit presents realistic strategies for leaders looking to optimize organizational achievement while avoiding the common nonprofit burnout. With a uniquely holistic approach to nonprofit leadership strategy, this book functions as a handbook to help leaders examine their existing organization, identify trouble spots, and resolve issues with attention to all aspects of operations and culture. …”
    Libro electrónico
  2. 31282
    Publicado 2017
    “…In Cisco Intelligent WAN (IWAN), leading Cisco experts cover all key IWAN technologies and components, addressing issues ranging from visibility and provisioning to troubleshooting and optimization. …”
    Libro electrónico
  3. 31283
    Publicado 2018
    “…Beyond beneficial practices for all X series shooters, Rico also covers advanced concepts, such as the capabilities of Fujifilm's ISOless sensors with Dual Conversion Gain, and offers solutions for common issues, such as inaccurate focus or RAW conversion artifacts. …”
    Libro electrónico
  4. 31284
    por Jecan, Alexandru. author
    Publicado 2017
    “…With Java 9 Modularity Revealed you will learn to make your projects more reliable and scalable than ever using the most important feature in Java 9—The Java Platform Module System, known more commonly as Pro ject Jigsaw. You will learn how to avoid one of the major pain points of Java programming, that of conflicting class names from different modules, or packages. …”
    Libro electrónico
  5. 31285
    Publicado 2018
    “…Inside you'll find: Clear directions for making simple projects and doing activities that teach science, mathematics and engineering Projects rooted in day to day life and experience in a small, developing nation in the Asian tropics Full-color photographs throughout Explicit connections to standard STEAM concepts, K-12 Activities doable with less than $5 worth of common materials This book is perfect for parents, teachers, and students with an interest in hands-on, tinkering-based science and mathematics education, whether in traditional schools or in home-schooling situations. …”
    Libro electrónico
  6. 31286
    Publicado 2017
    “…Identify the patterns where you can effectively use blocks and re-implement common standard library methods using them. Trace through how Symbol#to_proc works and find out the different ways of calling procs. …”
    Libro electrónico
  7. 31287
    Publicado 2018
    “…Detect anomalous events and implement centralized alerting infrastructure Dig into the native Windows tools that enable robust security measures Understand the details of Powershell, Applocker, LogParser, and other tools Adopt effective incident response processes for various common scenarios Fully applicable to a range of Windows versions—back to Windows Vista and Windows Server 2008—this book is designed for real-world implementation. …”
    Libro electrónico
  8. 31288
    Publicado 2018
    “…This video course is a one-stop solution for developers and architects, teaching them to understand the challenges faced in building cloud-native applications, using Java EE 8 and some additional well know open-source components and APIs. In combination, these APIs enable you to easily build hyperscale, elastic, loosely coupled, reliable, observable and secure microservices. …”
    Video
  9. 31289
    Publicado 2019
    “…., global descriptors, keypoint detectors, local feature descriptors, and algorithms) that are commonly used for the detection, registration, recognition, classification, and retrieval of 3D objects. …”
    Libro electrónico
  10. 31290
    Publicado 2019
    “…Fully updated for Ruby 2.5, this guide shows how to: Decide what belongs in a single class Avoid entangling objects that should be kept separate Define flexible interfaces among objects Reduce programming overhead costs with duck typing Successfully apply inheritance Build objects via composition Design cost-effective tests Solve common problems associated with poorly designed object-oriented code Whatever your previous object-oriented experience, this concise guide will help you achieve the superior outcomes you’re looking for…”
    Libro electrónico
  11. 31291
    Publicado 2019
    “…By the end of the course, you’ll understand common security vulnerabilities and be able to prevent them with Spring Security, with an empirical approach to securing your web applications. …”
    Video
  12. 31292
    Publicado 2018
    “…Effortlessly build applications on cloud services with serverless components. Manage and secure your applications using AWS tools In Detail This course will introduce you to serverless computing and then quickly dive into how to build serverless apps with Amazon Web Services (AWS). …”
    Video
  13. 31293
    Publicado 2019
    “…Patti combines the lessons learned from 25 years of professional experience with robust data from behavioral science research to debunk common myths, including the belief that a focus on legal compliance leads to a healthy workplace culture. …”
    Libro electrónico
  14. 31294
    por Xu, Jun. author
    Publicado 2018
    “…Among the various storage system performance analysis techniques, IO event trace analysis (block-level trace analysis particularly) is one of the most common approaches for system optimization and design. …”
    Libro electrónico
  15. 31295
    por Del Sole, Alessandro. author
    Publicado 2018
    “…From there you will be guided through two different kinds of applications that interact with the service in two different ways: the more common means of calling a REST service to get back JSON data, and via the .NET libraries that Microsoft has been building to simplify the job (this latter one with Xamarin). …”
    Libro electrónico
  16. 31296
    Publicado 2016
    “…Discusses the cyber criminals behind data breaches and the underground dark web forums they use to trade and sell stolen data Features never-before published techniques to qualify and discount a suspected breach or to verify and precisely scope a confirmed breach Helps identify your sensitive data, and the commonly overlooked data sets that, if stolen, can result in a material breach Defines breach response plan requirements and describes how to develop a plan tailored for effectiveness within your organization Explains strategies for proactively self-detecting a breach and simplifying a response Covers critical first-responder steps and breach management practices, including containing a breach and getting the scope right, the first time Shows how to leverage threat intelligence to improve breach response and management effectiveness Offers guidance on how to manage internal and external breach communications, restore trust, and resume business operations after a breach, including the critical steps after the breach to reduce breach-related litigation and regulatory fines Illustrates how to define your cyber-defensible position to improve data protection and demonstrate proper due diligence practices…”
    Libro electrónico
  17. 31297
    Publicado 2018
    “…Microsoft MVP Dino Esposito shows how to: Create new projects and understand their structure Set up and use the familiar MVC application model in ASP.NET Core Write controller class code to govern all stages of request processing Serve HTML from controllers, or directly via Razor Pages Master the Razor language for quickly defining the layout of HTML views Manage cross-cutting concerns such as global configuration data, error and exception handling, controller class design, and dependency injection Secure applications with user authentication and ASP.NET Core’s policy-based user authorization API Design for efficient data access, and choose the right option for reading and writing data Build ASP.NET Core Web APIs that return JSON, XML, or other data Use data binding to programmatically update visual components with fresh information Build device-friendly web views for iOS and Android Explore the radically new ASP.NET Core runtime environment and Dependency Injection (DI) infrastructure…”
    Libro electrónico
  18. 31298
    Publicado 2019
    “…Step-by-step instructions for the tasks you care about most Large, full-color, close-up photos show you exactly what to do Common-sense help whenever you run into problems using the Facebook app and website Tips and notes to help you connect with family and friends The full-color, step-by-step tasks–in legible print–walk you through sharing posts, photos, and videos on Facebook. …”
    Libro electrónico
  19. 31299
    Publicado 2019
    “… · Understand LISP’s core principles, history, motivation, and applications · Explore LISP’s technical architecture, components, mechanisms, and workflows · Use LISP to seamlessly deliver diverse network services and enable major advances in data center connectivity · Improve mobility, network segmentation, and policy management · Leverage software-defined WANs (SD-WANs) to efficiently move traffic from access to data center · Evolve access networks to provide pervasive, mega-scale, high-density modern connectivity · Integrate comprehensive security into the networking control and data plane, and learn how LISP infrastructure is protected against attacks · Enforce access control policies, connection integrity, confidentiality for data in flight, and end-point anonymity · Discover how LISP mobility mechanisms anticipate tomorrow’s application use cases…”
    Libro electrónico
  20. 31300
    Publicado 2019
    “…Step-by-step instructions carefully walk you through the most common web development tasks. Practical, hands-on examples show you how to apply what you learn. …”
    Libro electrónico