Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,424
- Application software 1,230
- Engineering & Applied Sciences 1,159
- Management 831
- Computer Science 775
- Computer networks 679
- Data processing 568
- Computer programs 543
- Security measures 512
- Historia 499
- Cloud computing 487
- Web site development 466
- Design 463
- Computer security 438
- Computer software 433
- Python (Computer program language) 429
- History 420
- Java (Computer program language) 420
- Database management 412
- Computer programming 402
- Colón, Cristóbal 398
- Programming 391
- Web sites 380
- Electrical & Computer Engineering 356
- Operating systems (Computers) 353
- Examinations 333
- Artificial intelligence 322
- Telecommunications 311
- Microsoft .NET Framework 300
- Machine learning 285
-
31281Publicado 2017“…Steer your organization away from burnout while boosting all-around performance The Happy, Healthy Nonprofit presents realistic strategies for leaders looking to optimize organizational achievement while avoiding the common nonprofit burnout. With a uniquely holistic approach to nonprofit leadership strategy, this book functions as a handbook to help leaders examine their existing organization, identify trouble spots, and resolve issues with attention to all aspects of operations and culture. …”
Libro electrónico -
31282Publicado 2017“…In Cisco Intelligent WAN (IWAN), leading Cisco experts cover all key IWAN technologies and components, addressing issues ranging from visibility and provisioning to troubleshooting and optimization. …”
Libro electrónico -
31283Publicado 2018“…Beyond beneficial practices for all X series shooters, Rico also covers advanced concepts, such as the capabilities of Fujifilm's ISOless sensors with Dual Conversion Gain, and offers solutions for common issues, such as inaccurate focus or RAW conversion artifacts. …”
Libro electrónico -
31284por Jecan, Alexandru. author“…With Java 9 Modularity Revealed you will learn to make your projects more reliable and scalable than ever using the most important feature in Java 9—The Java Platform Module System, known more commonly as Pro ject Jigsaw. You will learn how to avoid one of the major pain points of Java programming, that of conflicting class names from different modules, or packages. …”
Publicado 2017
Libro electrónico -
31285Publicado 2018“…Inside you'll find: Clear directions for making simple projects and doing activities that teach science, mathematics and engineering Projects rooted in day to day life and experience in a small, developing nation in the Asian tropics Full-color photographs throughout Explicit connections to standard STEAM concepts, K-12 Activities doable with less than $5 worth of common materials This book is perfect for parents, teachers, and students with an interest in hands-on, tinkering-based science and mathematics education, whether in traditional schools or in home-schooling situations. …”
Libro electrónico -
31286Publicado 2017“…Identify the patterns where you can effectively use blocks and re-implement common standard library methods using them. Trace through how Symbol#to_proc works and find out the different ways of calling procs. …”
Libro electrónico -
31287Publicado 2018“…Detect anomalous events and implement centralized alerting infrastructure Dig into the native Windows tools that enable robust security measures Understand the details of Powershell, Applocker, LogParser, and other tools Adopt effective incident response processes for various common scenarios Fully applicable to a range of Windows versions—back to Windows Vista and Windows Server 2008—this book is designed for real-world implementation. …”
Libro electrónico -
31288Publicado 2018“…This video course is a one-stop solution for developers and architects, teaching them to understand the challenges faced in building cloud-native applications, using Java EE 8 and some additional well know open-source components and APIs. In combination, these APIs enable you to easily build hyperscale, elastic, loosely coupled, reliable, observable and secure microservices. …”
-
31289Publicado 2019“…., global descriptors, keypoint detectors, local feature descriptors, and algorithms) that are commonly used for the detection, registration, recognition, classification, and retrieval of 3D objects. …”
Libro electrónico -
31290Publicado 2019“…Fully updated for Ruby 2.5, this guide shows how to: Decide what belongs in a single class Avoid entangling objects that should be kept separate Define flexible interfaces among objects Reduce programming overhead costs with duck typing Successfully apply inheritance Build objects via composition Design cost-effective tests Solve common problems associated with poorly designed object-oriented code Whatever your previous object-oriented experience, this concise guide will help you achieve the superior outcomes you’re looking for…”
Libro electrónico -
31291Publicado 2019“…By the end of the course, you’ll understand common security vulnerabilities and be able to prevent them with Spring Security, with an empirical approach to securing your web applications. …”
-
31292Publicado 2018“…Effortlessly build applications on cloud services with serverless components. Manage and secure your applications using AWS tools In Detail This course will introduce you to serverless computing and then quickly dive into how to build serverless apps with Amazon Web Services (AWS). …”
-
31293Publicado 2019“…Patti combines the lessons learned from 25 years of professional experience with robust data from behavioral science research to debunk common myths, including the belief that a focus on legal compliance leads to a healthy workplace culture. …”
Libro electrónico -
31294por Xu, Jun. author“…Among the various storage system performance analysis techniques, IO event trace analysis (block-level trace analysis particularly) is one of the most common approaches for system optimization and design. …”
Publicado 2018
Libro electrónico -
31295por Del Sole, Alessandro. author“…From there you will be guided through two different kinds of applications that interact with the service in two different ways: the more common means of calling a REST service to get back JSON data, and via the .NET libraries that Microsoft has been building to simplify the job (this latter one with Xamarin). …”
Publicado 2018
Libro electrónico -
31296Publicado 2016“…Discusses the cyber criminals behind data breaches and the underground dark web forums they use to trade and sell stolen data Features never-before published techniques to qualify and discount a suspected breach or to verify and precisely scope a confirmed breach Helps identify your sensitive data, and the commonly overlooked data sets that, if stolen, can result in a material breach Defines breach response plan requirements and describes how to develop a plan tailored for effectiveness within your organization Explains strategies for proactively self-detecting a breach and simplifying a response Covers critical first-responder steps and breach management practices, including containing a breach and getting the scope right, the first time Shows how to leverage threat intelligence to improve breach response and management effectiveness Offers guidance on how to manage internal and external breach communications, restore trust, and resume business operations after a breach, including the critical steps after the breach to reduce breach-related litigation and regulatory fines Illustrates how to define your cyber-defensible position to improve data protection and demonstrate proper due diligence practices…”
Libro electrónico -
31297Publicado 2018“…Microsoft MVP Dino Esposito shows how to: Create new projects and understand their structure Set up and use the familiar MVC application model in ASP.NET Core Write controller class code to govern all stages of request processing Serve HTML from controllers, or directly via Razor Pages Master the Razor language for quickly defining the layout of HTML views Manage cross-cutting concerns such as global configuration data, error and exception handling, controller class design, and dependency injection Secure applications with user authentication and ASP.NET Core’s policy-based user authorization API Design for efficient data access, and choose the right option for reading and writing data Build ASP.NET Core Web APIs that return JSON, XML, or other data Use data binding to programmatically update visual components with fresh information Build device-friendly web views for iOS and Android Explore the radically new ASP.NET Core runtime environment and Dependency Injection (DI) infrastructure…”
Libro electrónico -
31298Publicado 2019“…Step-by-step instructions for the tasks you care about most Large, full-color, close-up photos show you exactly what to do Common-sense help whenever you run into problems using the Facebook app and website Tips and notes to help you connect with family and friends The full-color, step-by-step tasks–in legible print–walk you through sharing posts, photos, and videos on Facebook. …”
Libro electrónico -
31299Publicado 2019“… · Understand LISP’s core principles, history, motivation, and applications · Explore LISP’s technical architecture, components, mechanisms, and workflows · Use LISP to seamlessly deliver diverse network services and enable major advances in data center connectivity · Improve mobility, network segmentation, and policy management · Leverage software-defined WANs (SD-WANs) to efficiently move traffic from access to data center · Evolve access networks to provide pervasive, mega-scale, high-density modern connectivity · Integrate comprehensive security into the networking control and data plane, and learn how LISP infrastructure is protected against attacks · Enforce access control policies, connection integrity, confidentiality for data in flight, and end-point anonymity · Discover how LISP mobility mechanisms anticipate tomorrow’s application use cases…”
Libro electrónico -
31300Publicado 2019“…Step-by-step instructions carefully walk you through the most common web development tasks. Practical, hands-on examples show you how to apply what you learn. …”
Libro electrónico