Mostrando 28,501 - 28,520 Resultados de 30,513 Para Buscar 'Dynów~', tiempo de consulta: 1.10s Limitar resultados
  1. 28501
    Publicado 2018
    “…This video course is a one-stop solution for developers and architects, teaching them to understand the challenges faced in building cloud-native applications, using Java EE 8 and some additional well know open-source components and APIs. In combination, these APIs enable you to easily build hyperscale, elastic, loosely coupled, reliable, observable and secure microservices. …”
    Video
  2. 28502
    Publicado 2018
    “…In this course, you will start by knowing the benefits of Selenium WebDriver for testing. …”
    Video
  3. 28503
    por Xu, Jun. author
    Publicado 2018
    “…What You’ll Learn: Understand the fundamental factors of data storage system performance Master an essential analytical skill using block trace via various applications Distinguish how the IO pattern differs in the block level from the file level Know how the sequential HDFS request becomes “fragmented” in final storage devices Perform trace analysis tasks with a tool based on the MATLAB and Python platforms…”
    Libro electrónico
  4. 28504
    por Ayala, Luis. author
    Publicado 2016
    “…The building control system (BCS) will act "squirrelly" and you will know—it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. …”
    Libro electrónico
  5. 28505
    “…Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You’ll Learn: Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and auditing strategies to mitigate the threats and risk Understand a 12-step privileged access management Implementation plan Consider deployment and scope, including risk, auditing, regulations, and oversight solutions…”
    Libro electrónico
  6. 28506
    por Del Sole, Alessandro. author
    Publicado 2018
    “…Author Del Sole begins by providing a succinct “need to know” overview of the service with descriptions. …”
    Libro electrónico
  7. 28507
    Publicado 2017
    “…Is what is being offered now an end point, or just the beginning of an evolution of how cloud is instantiated and used? …”
    Libro electrónico
  8. 28508
    por Mahadevan, Malathi. author
    Publicado 2018
    “…Enjoy reading interviews with more than two dozen data professionals to see a picture of what it’s like to work in the industry managing and analyzing data, helping you to know what it takes to move from your current expertise into one of the fastest growing areas of technology today. …”
    Libro electrónico
  9. 28509
    Publicado 2018
    “…It is assumed that you know basics of the R language and its commands and objects…”
    Libro electrónico
  10. 28510
    Publicado 2019
    “…Co-authored by LISP co-creator Dino Farinacci and Victor Moreno–co-developer of the Cisco LISP implementation–it will help you identify the opportunities and benefits of deploying LISP in any data center, campus and branch access, WAN edge, or service provider core network. …”
    Libro electrónico
  11. 28511
    Publicado 2019
    “…In this course, you will learn everything you need to know about HTML and HTML5. It's packed full of challenges and exercises to get you writing HTML quickly. …”
    Video
  12. 28512
    Publicado 2019
    “…For decades researchers and programmers have used SAS to analyze, summarize, and report clinical trial data. Now Chris Holland and Jack Shostak have updated their popular Implementing CDISC Using SAS , the first comprehensive book on applying clinical research data and metadata to the Clinical Data Interchange Standards Consortium (CDISC) standards. …”
    Libro electrónico
  13. 28513
    Publicado 2018
    “…From the point of view of a working photographer, Derrick provides everything you need to know to get the most out of the imaging tools built into Mac OS X and iCloud. …”
    Libro electrónico
  14. 28514
    Publicado 2012
    “…Then, you’ll explore practical scalability and interoperability issues through many examples. By the end, you’ll know how to make Rabbit run like a well-oiled machine in a 24 x 7 x 365 environment. …”
    Libro electrónico
  15. 28515
    Publicado 2016
    Tabla de Contenidos: “…Experiences from Other Professions -- 2.2 What Does an Internal Auditor Need to Know? -- 2.3 An Internal Auditing CBOK -- CBOK Requirements: Importance of Internal Controls -- CBOK Requirements: Planning and Performing Internal Audits -- CBOK Requirements: Organizing and Managing Internal Audit Activities -- CBOK Requirements: Impact of Information Technology on Internal Auditing -- CBOK Requirements: Internal Audit and Enterprise Governance -- CBOK Requirements: Internal Auditor Professional Certifications -- CBOK Requirements: Internal Auditing Professional Convergence -- 2.4 Another Attempt: The IIA Research Foundation's CBOK -- 2.5 Essential Internal Audit Knowledge Areas -- Notes -- PART TWO: IMPORTANCE OF INTERNAL CONTROLS -- Chapter 3: The COSO Internal Control Framework -- 3.1 Understanding Internal Controls -- 3.2 Revised COSO Framework Business and Operating Environment Changes -- 3.3 The Revised COSO Internal Control Framework -- 3.4 COSO Internal Control Principles -- 3.5 COSO Internal Control Components: The Control Environment -- 3.6 COSO Internal Control Components: Risk Assessment -- Risk Identification and Analysis -- Risk Response Strategies -- 3.7 COSO Internal Control Components: Internal Control Activities -- Business Process Control Activities -- Types of Transaction Control Activities -- 3.8 COSO Internal Control Components: Information and Communication -- Importance of Using Relevant Information…”
    Libro electrónico
  16. 28516
    Publicado 2011
    “…You've got the programming chops, you're up on the latest tech, you're sitting at your workstation... now what? New Programmer's Survival Manual gives your career the jolt it needs to get going: essential industry skills to help you apply your raw programming talent and make a name for yourself. …”
    Libro electrónico
  17. 28517
    Publicado 2014
    “…Praktische Tipps und Tricks zu Fragen des Equipments und zahlreiche Aufnahmetipps in Form von Praxis- sowie Kreativ-Know-hows runden diesen umfangreichen Ratgeber ab. …”
    Libro electrónico
  18. 28518
    Publicado 2012
    “…Rethink Everything You Know About Leadership Strengths "A must-read for anyone wanting to positively stand out in an organization or for leaders wanting to raise the overall performance of the organization." -- Cindy Brinkley, Vice President, Global Human Resources, General Motors "Zenger Folkman's findings related to companion behaviors is exciting. …”
    Libro electrónico
  19. 28519
    Tabla de Contenidos: “…Contents at a Glance; Contents; About the Authors; About the Technical Reviewer; Chapter 1: Welcome to the Swift Jungle; What This Book Is; What You Need; Developer Options; What You Need to Know; What's Different About Coding for iOS?; Only One Active Application; Only One Window; Limited Access; Limited Response Time; Limited Screen Size; Limited System Resources; Some New Stuff; A Different Approach; What's in This Book; What's New in This Update?…”
    Libro electrónico
  20. 28520
    Publicado 2015
    “…What you need to know about your customers Now more than ever, every interaction you have with customers is critical. …”
    Libro electrónico