Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,394
- Crítica e interpretación 1,018
- Història 1,002
- Biblia 877
- Filosofía 763
- History 678
- Peirce, Charles S. 367
- Clara de Asís 362
- Novela inglesa 339
- Computer programs 326
- Historia y crítica 325
- Política y gobierno 323
- Iglesia Católica 311
- Management 305
- Bíblia 298
- Teología 280
- Taxation 268
- Literatura 261
- Església Catòlica 259
- Law and legislation 252
- Business & Economics 247
- Biografia 238
- Data processing 235
- Darwin, Charles 234
- Política 233
- Development 216
- Novela norteamericana 214
- Derecho 209
- Economía 205
- Engineering & Applied Sciences 201
-
56041por Organisation de coopération et de développement économiques.“…La « responsabilité élargie des producteurs » (REP) est une stratégie en vertu de laquelle les producteurs acceptent d’assumer une responsabilité importante - d’ordre financier et/ou matériel - en ce qui concerne le traitement des déchets d’emballage. La prise en charge de cette responsabilité pourrait inciter à prévenir la production de déchets à la source, promouvoir la conception de produits dans le souci du respect de l’environnement, et contribuer à atteindre les objectifs publics de recyclage et de gestion des matériaux. …”
Publicado 2001
Libro electrónico -
56042por Columeau, Philippe“…Au sud du département de l’Ardèche, et à l’entrée du défilé de Donzère, dominant le Rhône, la cité épiscopale de Viviers est un site merveilleux qui a conservé, en même temps que bien des souvenirs de son histoire, un charme indéniable. Les études et les fouilles archéologiques entreprises sur ce site depuis plus de dix ans ont à juste titre attiré l’attention des spécialistes ou plus simplement des amateurs du passé sur une ville du plus haut intérêt. …”
Publicado 2015
Electrónico -
56043Publicado 2016“…. • Install and configure SQL SSRS for optimal System Center reporting and easier troubleshooting • Understand the data stored in the ConfigMgr site database • Efficiently retrieve ConfigMgr data by writing SQL queries in SQL Server Management Studio • Learn best practices for developing and designing System Center reports • Create report templates, customize content with report parameters, and embed charts • Customize logos, color palettes, and other report elements for your own organization • Construct advanced drillthroughs to provide deeper understanding • Strengthen report security by integrating ConfigMgr role-based administration into SQL queries • Leverage reporting to measure KPIs and gain a better understanding of your environment • Tailor your reports to the needs of end-users or management • Foreword by Wally Mead, Principal Program Manager, Cireson The only book entirely dedicated to Configuration Manager reporting, this guide complements Meyler's System Center 2012 Configuration Manager Unleashed , offering far more in-depth coverage of reporting than the single chapter in that book. …”
Libro electrónico -
56044Publicado 2016“…It further teaches various graphical techniques for presenting data for analysis using maps, graphs, and advanced charts. Although MicroStrategy has rich functionality, the book will show how to customize it in order to meet your busine..…”
Libro electrónico -
56045Publicado 2016“…You will learn how to perform various tasks such as creating multiple records from a single page, visualizing data as charts, using JavaScript to enhance client-side functionality, building a public website, and making data available to a mobile device. …”
Libro electrónico -
56046Publicado 2016“…Internally as well the dogfish approach has evolved and is not traditional org chart driven top down leadership. Calagione shared the challenges of evolving from a founder-driven entrepreneurial company where he was the sole creative and strategic director into a more collaborative collective where he is now one of many creative and strategic voices in the company. …”
Libro electrónico -
56047Publicado 2018“…This book features a collection of recipes and building blocks with tips and techniques for working with CMake, CTest, CPack, and CDash. CMake Cookbook includes real-world examples in the form of recipes that cover different ways to structure, configure, build, and test small- to large-scale code projects. …”
Libro electrónico -
56048Publicado 2019Tabla de Contenidos: “…. -- Classification in caret and ROC curves -- Getting ready -- How to do it... -- How it works... -- Gradient boosting and class imbalance -- Getting ready -- How to do it... -- How it works... -- Lasso, ridge, and elasticnet in caret -- Getting ready -- How to do it... -- How it works... -- Logic regression -- Getting ready -- How to do it... -- How it works... -- Chapter 10: Bayesian Networks and Hidden Markov Models -- Introduction -- A discrete Bayesian network via bnlearn -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Conditional independence tests -- Getting ready -- How to do it... -- How it works... -- There's more... -- Continuous and hybrid Bayesian networks via bnlearn -- Getting ready -- How to do it... -- How it works... -- See also -- Interactive visualization of BNs with the bnviewer package -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
56049Publicado 2018“…What you will learn Conduct the initial stages of a penetration test and understand its scope Perform reconnaissance and enumeration of target networks Obtain and crack passwords Use Kali Linux NetHunter to conduct wireless penetration testing Create proper penetration testing reports Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing Carry out wireless auditing assessments and penetration testing Understand how a social engineering attack such as phishing works Who this book is for This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linu..…”
Libro electrónico -
56050Publicado 2015“…What You Will Learn Briefly explore the history of Rockwell Automation and the evolution of the Logix platform Discover the complete range of ControlLogix and ComplactLogix controllers and form factors available today, and the key things you should consider when you are engineering a Rockwell Automation solution Explore the key platform changes introduced with Studio 5000 and Logix Designer version 24 and the latest firmware versions Get to grips with the modules available in the ControLogix, SoftLogix, and CompactLogix platforms Understand writing Ladder Logic (LL) routines, Sequential Function Chart (SFC) routines, and Structured Text routines (ST) Design Function Block Diagrams (FBD) and their easy integration with HMIs In Detail RSLogix 5000 and Studio 5000's Logix Designer are user-friendly interfaces used for programming the current generation of Rockwell Automation Controllers including ControlLogix, CompactLogix, and SoftLogix. …”
Libro electrónico -
56051Publicado 2015“…Those offers range from the most basic app model of "Give me your physical location, we'll find the best Thai restaurant near you, and give you an instant coupon" to a more complex model such as an Electric utility value proposition: "We'll give you discounts to charge your Prius during certain times to help us optimize our grid efficiency while allowing Toyota to monitor and optimize your battery to enable Toyota's R&D and customer experience enhancement." …”
Libro electrónico -
56052Publicado 2015“…What You Will Learn Familiarise yourself with the generation of Metasploit resource files Use the Metasploit Remote Procedure Call (MSFRPC) to automate exploit generation and execution Use Python's Scapy, network, socket, office, Nmap libraries, and custom modules Parse Microsoft Office spreadsheets and eXtensible Markup Language (XML) data files Write buffer overflows and reverse Metasploit modules to expand capabilities Exploit Remote File Inclusion (RFI) to gain administrative access to systems with Python and other scripting languages Crack an organization's Internet perimeter Chain exploits to gain deeper access to an organizatio..…”
Libro electrónico -
56053Publicado 2015“…What You Will Learn Efficiently collect data from a large variety of monitoring objects Organize your data in graphs, charts, maps, and slide shows Build intelligent triggers and alarms to monitor your network proactively Write your own custom probes and monitoring scripts to extend Zabbix Configure Zabbix and its database to be high available and fault-tolerant Automate repetitive procedures using Zabbix's API Integrate Zabbix with external systems Understand the protocol and how to interact with it by writing your own custom agent In Detail Nowadays monitoring systems play a crucial role in any IT environment. …”
Libro electrónico -
56054Publicado 2014“…This IBM® Redpaper Redbooks® publication introduces the IBM System z® New Application License Charges (zNALC) pricing structure and provides examples of zNALC workload scenarios. …”
Libro electrónico -
56055por Weinmeister, Philip. author“…Are you facing a challenging Salesforce.com problem--say, relating to automation, configuration, formulation, or reporting--that you can't quite crack? Or maybe you are hoping to infuse some creativity into your solution design strategy to solve problems faster or make solutions more efficient? …”
Publicado 2015
Libro electrónico -
56056Publicado 2016“…Organized by Faïza Drici, Marie Evina, and Romain David, with the support of Charles de Gaulle-Lille 3 University and the laboratoire de recherche Halma-Ipel UMR 8164 (Centre national de recherche scientifique - CNRS), this workshop was presided over by Vincent Rondot (present Director of the Egyptian Antiquities Department of the Louvre Museum and former Director of Section française de la direction des antiquités du Soudan - SFDAS). …”
Libro electrónico -
56057Publicado 2024“…He brings his wit and charm to the camera while helping bring out the best in the ITProTV subject matter experts…”
Video -
56058Publicado 2015“…A Dei Verbum, atenta a essa realidade, procurou dar claras orientações para os estudos da Bíblia que, nos últimos cinquenta anos, ganharam novo vigor e fizeram surgir novas metodologias bíblicas, capazes de valorizar não apenas o sentido literal, mas também de buscar e explicitar o sentido espiritual e o sentido moral, a fim de se alcançar o sentido pleno dos textos. …”
991006063859706719 -
56059Publicado 2016“…«Cuando leo las obras de Joseph Ratzinger/Benedicto XVI me resulta cada vez más claro que él ha hecho y hace “teología de rodillas”: de rodillas porque, antes incluso que ser un grandísimo teólogo y maestro de la fe, se ve que es un hombre que cree verdaderamente [...] él encarna ejemplarmente el corazón de toda la acción sacerdotal [...] ese profundo enraizamiento en Dios [...] él encarna esa constante relación con el Señor Jesús» (Papa Francisco). …”
991005240479706719 -
56060Publicado 2007“…The Ubuntu community is built on the premise that software should be available free of charge, and that people should have the freedom to customize and alter their software in whatever way they see fit. …”
Libro electrónico