Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,038
- Engineering & Applied Sciences 1,008
- Application software 843
- Management 811
- Computer Science 672
- Computer programs 535
- Computer networks 497
- Design 475
- Web site development 469
- History 445
- Web sites 432
- Data processing 422
- Examinations 383
- Business & Economics 381
- Photography 372
- Computer programming 368
- Leadership 349
- Historia 347
- Programming 345
- Database management 325
- Digital techniques 322
- Operating systems (Computers) 319
- Certification 318
- Security measures 312
- Artificial intelligence 310
- Java (Computer program language) 307
- Computer security 301
- Python (Computer program language) 300
- Computer software 297
- Electrical & Computer Engineering 287
-
28501Publicado 2018“…This video course is a one-stop solution for developers and architects, teaching them to understand the challenges faced in building cloud-native applications, using Java EE 8 and some additional well know open-source components and APIs. In combination, these APIs enable you to easily build hyperscale, elastic, loosely coupled, reliable, observable and secure microservices. …”
-
28502Publicado 2018“…In this course, you will start by knowing the benefits of Selenium WebDriver for testing. …”
-
28503por Xu, Jun. author“…What You’ll Learn: Understand the fundamental factors of data storage system performance Master an essential analytical skill using block trace via various applications Distinguish how the IO pattern differs in the block level from the file level Know how the sequential HDFS request becomes “fragmented” in final storage devices Perform trace analysis tasks with a tool based on the MATLAB and Python platforms…”
Publicado 2018
Libro electrónico -
28504por Ayala, Luis. author“…The building control system (BCS) will act "squirrelly" and you will know—it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. …”
Publicado 2016
Libro electrónico -
28505“…Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You’ll Learn: Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and auditing strategies to mitigate the threats and risk Understand a 12-step privileged access management Implementation plan Consider deployment and scope, including risk, auditing, regulations, and oversight solutions…”
Libro electrónico -
28506por Del Sole, Alessandro. author“…Author Del Sole begins by providing a succinct “need to know” overview of the service with descriptions. …”
Publicado 2018
Libro electrónico -
28507Publicado 2017“…Is what is being offered now an end point, or just the beginning of an evolution of how cloud is instantiated and used? …”
Libro electrónico -
28508por Mahadevan, Malathi. author“…Enjoy reading interviews with more than two dozen data professionals to see a picture of what it’s like to work in the industry managing and analyzing data, helping you to know what it takes to move from your current expertise into one of the fastest growing areas of technology today. …”
Publicado 2018
Libro electrónico -
28509Applied data visualization with R and ggplot2 Create useful, elaborate, and visually appealing plotsPublicado 2018“…It is assumed that you know basics of the R language and its commands and objects…”
Libro electrónico -
28510Publicado 2019“…Co-authored by LISP co-creator Dino Farinacci and Victor Moreno–co-developer of the Cisco LISP implementation–it will help you identify the opportunities and benefits of deploying LISP in any data center, campus and branch access, WAN edge, or service provider core network. …”
Libro electrónico -
28511Publicado 2019“…In this course, you will learn everything you need to know about HTML and HTML5. It's packed full of challenges and exercises to get you writing HTML quickly. …”
-
28512Publicado 2019“…For decades researchers and programmers have used SAS to analyze, summarize, and report clinical trial data. Now Chris Holland and Jack Shostak have updated their popular Implementing CDISC Using SAS , the first comprehensive book on applying clinical research data and metadata to the Clinical Data Interchange Standards Consortium (CDISC) standards. …”
Libro electrónico -
28513Publicado 2018“…From the point of view of a working photographer, Derrick provides everything you need to know to get the most out of the imaging tools built into Mac OS X and iCloud. …”
Libro electrónico -
28514Publicado 2012“…Then, you’ll explore practical scalability and interoperability issues through many examples. By the end, you’ll know how to make Rabbit run like a well-oiled machine in a 24 x 7 x 365 environment. …”
Libro electrónico -
28515Publicado 2016Tabla de Contenidos: “…Experiences from Other Professions -- 2.2 What Does an Internal Auditor Need to Know? -- 2.3 An Internal Auditing CBOK -- CBOK Requirements: Importance of Internal Controls -- CBOK Requirements: Planning and Performing Internal Audits -- CBOK Requirements: Organizing and Managing Internal Audit Activities -- CBOK Requirements: Impact of Information Technology on Internal Auditing -- CBOK Requirements: Internal Audit and Enterprise Governance -- CBOK Requirements: Internal Auditor Professional Certifications -- CBOK Requirements: Internal Auditing Professional Convergence -- 2.4 Another Attempt: The IIA Research Foundation's CBOK -- 2.5 Essential Internal Audit Knowledge Areas -- Notes -- PART TWO: IMPORTANCE OF INTERNAL CONTROLS -- Chapter 3: The COSO Internal Control Framework -- 3.1 Understanding Internal Controls -- 3.2 Revised COSO Framework Business and Operating Environment Changes -- 3.3 The Revised COSO Internal Control Framework -- 3.4 COSO Internal Control Principles -- 3.5 COSO Internal Control Components: The Control Environment -- 3.6 COSO Internal Control Components: Risk Assessment -- Risk Identification and Analysis -- Risk Response Strategies -- 3.7 COSO Internal Control Components: Internal Control Activities -- Business Process Control Activities -- Types of Transaction Control Activities -- 3.8 COSO Internal Control Components: Information and Communication -- Importance of Using Relevant Information…”
Libro electrónico -
28516Publicado 2011“…You've got the programming chops, you're up on the latest tech, you're sitting at your workstation... now what? New Programmer's Survival Manual gives your career the jolt it needs to get going: essential industry skills to help you apply your raw programming talent and make a name for yourself. …”
Libro electrónico -
28517Publicado 2014“…Praktische Tipps und Tricks zu Fragen des Equipments und zahlreiche Aufnahmetipps in Form von Praxis- sowie Kreativ-Know-hows runden diesen umfangreichen Ratgeber ab. …”
Libro electrónico -
28518Publicado 2012“…Rethink Everything You Know About Leadership Strengths "A must-read for anyone wanting to positively stand out in an organization or for leaders wanting to raise the overall performance of the organization." -- Cindy Brinkley, Vice President, Global Human Resources, General Motors "Zenger Folkman's findings related to companion behaviors is exciting. …”
Libro electrónico -
28519por Topley, Kim. author, Olsson, Fredrik. author, Nutting, Jack. author, Mark, David. author, LaMarche, Jeff. authorTabla de Contenidos: “…Contents at a Glance; Contents; About the Authors; About the Technical Reviewer; Chapter 1: Welcome to the Swift Jungle; What This Book Is; What You Need; Developer Options; What You Need to Know; What's Different About Coding for iOS?; Only One Active Application; Only One Window; Limited Access; Limited Response Time; Limited Screen Size; Limited System Resources; Some New Stuff; A Different Approach; What's in This Book; What's New in This Update?…”
Publicado 2014
Libro electrónico -
28520Publicado 2015“…What you need to know about your customers Now more than ever, every interaction you have with customers is critical. …”
Libro electrónico