Mostrando 31,421 - 31,440 Resultados de 33,580 Para Buscar 'COPCON~', tiempo de consulta: 1.10s Limitar resultados
  1. 31421
    por Farley, Dave
    Publicado 2010
    “…Coverage includes Automating all facets of building, integrating, testing, and deploying software Implementing deployment pipelines at team and organizational levels Improving collaboration between developers, testers, and operations Developing features incrementally on large and distributed teams Implementing an effective configuration management strategy Automating acceptance testing, from analysis to implementation Testing capacity and other non-functional requirements Implementing continuous deployment and zero-downtime releases Managing infrastructure, data, components and dependencies Navigating risk management, compliance, and auditing Whether you’re a developer, systems administrator, tester, or manager, this book will help your organization move from idea to release faster than ever—so you can deliver value to your business rapidly and reliably…”
    Libro electrónico
  2. 31422
    por Stanton, Anne A.
    Publicado 2012
    “…Step-by-step instructions walk you through common tasks. Quizzes and exercises at the end of each chapter test your knowledge. …”
    Libro electrónico
  3. 31423
    por Seibel, Peter
    Publicado 2009
    “…Peter Deutsch: Author of Ghostscript, implementer of Smalltalk-80 at Xerox PARC and Lisp 1.5 on PDP-1 Brendan Eich: Inventor of JavaScript, CTO of the Mozilla Corporation Brad Fitzpatrick: Writer of LiveJournal, OpenID, memcached, and Perlbal Dan Ingalls: Smalltalk implementor and designer Simon Peyton Jones: Coinventor of Haskell and lead designer of Glasgow Haskell Compiler Donald Knuth: Author of The Art of Computer Programming and creator of TeX Peter Norvig: Director of Research at Google and author of the standard text on AI Guy Steele: Coinventor of Scheme and part of the Common Lisp Gang of Five, currently working on Fortress Ken Thompson: Inventor of UNIX Jamie Zawinski: Author of XEmacs and early Netscape/Mozilla hacker…”
    Libro electrónico
  4. 31424
    Publicado 2015
    “…This video course starts by explaining the three primary components of responsive design: fluid layouts, media queries and responsive images. …”
    Video
  5. 31425
    por Savage, Sam L.
    Publicado 2012
    “…In The Flaw of Averages , Sam Savageknown for his creative exposition of difficult subjects describes common avoidable mistakes in assessing risk in the face of uncertainty. …”
    Libro electrónico
  6. 31426
    Publicado 2018
    “…Key Features Gives you a quick walk-through over the Amazon Elastic Container Services (ECS) Provides an in depth knowledge of the components that Amazon Fargate has to offer. Learn the practical aspects of Docker application development with a managed service Book Description Amazon Fargate is new launch type for the Amazon Elastic Container Service (ECS). …”
    Libro electrónico
  7. 31427
    por McFarland, Scholle
    Publicado 2019
    “…You’ll also discover lots of helpful tips on using Catalina, including how to: Sync iOS and iPadOS devices using the Finder (now that iTunes is gone) Keep your Mac safe from malware, keyloggers, and thieves with new privacy and security features Take advantage of Safari features, including easier-to-access Picture in Picture, open tabs in search results, and additional site-by-site preferences Use the new Find My app to find your Apple devices and your friends Keep track of tasks (alone or with other people) in the revamped Reminders app Search for, edit, and share notes in new ways with the updated Notes app Use your iPad as an external display for your Mac Troubleshoot common problems Plus, version 1.1 now features four new chapters, covering: The little things in Catalina (a tour of the best small-but-interesting changes) The iTunes replacements (the new Music, Podcasts, and Apple TV apps) How to control your Mac with your voice in ways that go far beyond Siri Using Screen Time to keep tabs on your kids’ online lives, monitoring and limiting access to categories of apps across all their Apple devices…”
    Libro electrónico
  8. 31428
    Publicado 2020
    “…Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. …”
    Libro electrónico
  9. 31429
    Publicado 2019
    “…What you will learn Explore how polymorphism is implemented in Clojure Discover what design principles to use when creating and implementing abstractions Explore different ways to implement protocols in Clojure Implement various design principles while working with the JVM Write and compare plain functions and multimethods for transforming data Analyze functions and abstractions for their performance and flexibility Learn about common "gotchas" to avoid errors when writing code Who this book is for Clojure Polymorphism is useful for all programmers who want to leverage Clojure's polymorphic tools to build efficient applications. …”
    Libro electrónico
  10. 31430
    por Johnson, Bruce
    Publicado 2019
    “…This up-to-date guide covers all of the essential components of the software, including the editing features of the workspace, advanced functionality such as code refactoring and key binding, and integration with Grunt, Gulp, NPM, and other external tools. …”
    Libro electrónico
  11. 31431
    Publicado 2020
    “…These modalities encompass most of the common image acquisition methods currently used by researchers in academia and industry. …”
    Libro electrónico
  12. 31432
    Publicado 2020
    “…We will build reusable and dynamic components that we will later enhance with more advanced features. …”
    Video
  13. 31433
    Publicado 2020
    “…Avoid performance pitfalls early in the development lifecycle with a catalog of common problems and their solutions. Leverage GenStage to build a data pipeline that improves scalability. …”
    Libro electrónico
  14. 31434
    Publicado 2020
    “…Understand how Scrum Teams work, collaborate, and promote transparency Explore common problems that lead less experienced Scrum Teams to give up Find your Scrum Teams best approach to solving complex adaptive problems Integrate DevOps practices with Scrum to improve effectiveness Productively and professionally resolve conflicts that arise from close collaboration Help your organization learn how to improve its results by better supporting its Scrum Teams This guide is for anyone who works with Scrum Teams or wants to become more effective as a Scrum Team member or leader. …”
    Libro electrónico
  15. 31435
    por Cicala, Gus. author
    Publicado 2020
    “…What You'll Learn Understand key components to the Microsoft Project 2019 solution Reinforce learning via hands-on exercises with step-by-step illustrations Build a plan and work breakdown structure, and manage resources and assignments Utilize enterprise project management for creating a project, monitoring, controlling, and tracking Export and communicate project information to an external audience This book is for project managers with limited time and resources who need to maximize their efficiency with Microsoft Project. …”
    Libro electrónico
  16. 31436
    Publicado 2019
    “…and glean important insights from the 12 most common career missteps even the most streetwise emerging leaders have made—so instead of getting derailed, you’ll make the “leaderly move” every time. …”
    Libro electrónico
  17. 31437
    Publicado 2019
    “…DWORSKY, PhD, is a retired Vice President of the Technical Staff and Director of Motorola’s Components Research Laboratory in Schaumburg, Illinois, USA. …”
    Libro electrónico
  18. 31438
    Publicado 2017
    “…Becoming a professional full stack web developer requires a solid understanding of the software tools most commonly used to create websites and mobile apps: JavaScript, jQuery, HTML, CSS, PHP, and MySQL. …”
    Video
  19. 31439
    Publicado 2020
    “…Three of Microsoft’s leading security operations experts show how to: • Use Azure Sentinel to respond to today’s fast-evolving cybersecurity environment, and leverage the benefits of its cloud-native architecture • Review threat intelligence essentials: attacker motivations, potential targets, and tactics, techniques, and procedures • Explore Azure Sentinel components, architecture, design considerations, and initial configuration • Ingest alert log data from services and endpoints you need to monitor • Build and validate rules to analyze ingested data and create cases for investigation • Prevent alert fatigue by projecting how many incidents each rule will generate • Help Security Operation Centers (SOCs) seamlessly manage each incident’s lifecycle • Move towards proactive threat hunting: identify sophisticated threat behaviors and disrupt cyber kill chains before you’re exploited • Do more with data: use programmable Jupyter notebooks and their libraries for machine learning, visualization, and data analysis • Use Playbooks to perform Security Orchestration, Automation and Response (SOAR) • Save resources by automating responses to low-level events • Create visualizations to spot trends, identify or clarify relationships, and speed decisions • Integrate with partners and other third-parties, including Fortinet, AWS, and Palo Alto…”
    Libro electrónico
  20. 31440
    Publicado 2016
    “…Large, full-color, close-up photos with callouts to iPhone photos that show you exactly what to do. Common-sense help when you run into iPhone problems or limitations. …”
    Libro electrónico