Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,038
- Engineering & Applied Sciences 1,008
- Application software 843
- Management 811
- Computer Science 672
- Computer programs 535
- Computer networks 497
- Design 475
- Web site development 469
- History 445
- Web sites 432
- Data processing 422
- Examinations 383
- Business & Economics 381
- Photography 372
- Computer programming 368
- Leadership 349
- Historia 347
- Programming 345
- Database management 325
- Digital techniques 322
- Operating systems (Computers) 319
- Certification 318
- Security measures 312
- Artificial intelligence 310
- Java (Computer program language) 307
- Computer security 301
- Python (Computer program language) 300
- Computer software 297
- Electrical & Computer Engineering 287
-
29021por Marcos Álvarez, Miriam ( 1991-)“…The secondary aim was to know the adverse effects of both interventions. The search of the literature was carried out from February to September 2017. …”
Publicado 2017
Electrónico -
29022Publicado 2017“…Learning a concept isn't always enough to do the job effectively. 'Knowing' is different from 'applying' yet few practical resources exist for new and aspiring fraud examiners —until now. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
29023Publicado 2014“…A new frontier emerges in the field “pharmacology of gap junctions” with the aim to control growth, differentiation, or electrical coupling via targeting gap junction channels pharmacologically.As we know today disturbances in gap junction synthesis, assembly and cellular distribution may account for various organic disorders from most different medical fields, such as the Charcot-Marie-Tooth neuropathy, epilepsy, Chagas-disease, Naxos-syndrome, congenital cardiac malformations, arrhythmias, cancer and as a very common disease in industrial countries atherosclerosis. …”
Libro electrónico -
29024Publicado 2014“…However, accumulating evidences derived from studies of experimental models have identified that NFTs themselves may not be neurotoxic. Now, many of tau researchers are seeking a “toxic” form of tau protein. …”
Libro electrónico -
29025por Guy, Jean-Michel“…Nevertheless, the existence of several very widely-shared transnational references demonstrates that interculturality, which presupposes a know- ledge of other peoples, is not...…”
Publicado 2014
Electrónico -
29026Publicado 2018“…The average person can name more bird species than they think, but do we really know what a bird “species” is? This open access book takes up several fascinating aspects of bird life to elucidate this basic concept in biology. …”
Libro electrónico -
29027por Funk, Tom. author“…Advanced Social Media Marketing: How to Lead, Launch, and Manage a Successful Social Media Program is for the manager who already knows something about social media and wants to roll up his or her sleeves and get down to business. …”
Publicado 2013
Libro electrónico -
29028por Arouimi, Michel“…Envois & Dédicaces constitue une réflexion sur le don du livre, qu’il se manifeste par un ex-dono, un envoi manuscrit ou une dédicace imprimée. …”
Publicado 2020
Electrónico -
29029Publicado 2022Tabla de Contenidos: “…Cover -- Title page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Section 1: The Fundamentals of Incident Response -- Chapter 1: Threat Landscape and Cybersecurity Incidents -- Knowing the threat landscape -- Is COVID-19 also a cyber-pandemic? …”
Libro electrónico -
29030Publicado 2019“…This course is designed to teach you everything you need to know to build modern applications using React. You’ll learn to build a Trello-inspired project that will enable you to take advantage of React's features: Scaffolding projects using the Create React app React file and folder structures and what they do What components are and how to use them Writing JSX Class-based and function components Managing state Looping through data Using props to pass data and methods to components You won't stop there! …”
-
29031Publicado 2017“…Apply key pattern-oriented software architecture techniques to develop reusable concurrent software using Java object-oriented design and functional programming language features and class libraries. Know where to find additional sources of information on how to successfully apply pattern-oriented software architecture techniques to concurrent software in Java. …”
-
29032Publicado 2018“…Discover how to make the best use of decorator and generator functions Enhance speed and improve concurrency by conjuring tricks from the PyPy project Who This Book Is For Whether you've been working with Python for a few years or you're a seasoned programmer, you'll have a lot of new tricks to walk away with. What You Will Learn Know the differences between .py and .pyc files Explore the different ways to install and upgrade Python packages Understand the working of the PyPI module that enhances built-in decorators See how coroutines are different from generators and how they can simulate multithreading Grasp how the decimal module improves floating point numbers and their operations Standardize sub interpreters to improve concurrency Discover Python's built-in docstring analyzer In Detail This book covers the unexplored secrets of Python, delve into its depths, and uncover its mysteries. …”
Libro electrónico -
29033Publicado 2019“…Use structural, behavioral, and concurrent patterns in Delphi to skillfully develop applications Key Features Delve into the core patterns and components of Delphi to enhance your application's design Learn how to select the right patterns to improve your program's efficiency and productivity Discover how parallel programming and memory management can optimize your code Book Description Delphi is a cross-platform Integrated Development Environment (IDE) that supports rapid application development for most operating systems, including Microsoft Windows, iOS, and now Linux with RAD Studio 10.2. If you know how to use the features of Delphi, you can easily create scalable applications in no time. …”
Libro electrónico -
29034Publicado 2020“…Covers the critical information you'll need to know to score higher on your CCNA exam! Understand networking fundamentals concepts, including network components, network topology architectures, physical interfaces and cabling types, TCP and UDP, wireless principals, switching concepts, and virtualization fundamentals Master IPv4 addressing and subnetting and configure IPv6 Configure and verify VLANs, interswitch connectivity, and Layer 2 discovery protocols Describe Rapid PVST+ Spanning Tree Protocol Compare Cisco Wireless Architectures and AP Modes Enable security technologies including device access control, site-to-site and remote access VPNs, ACLs, Layer 2 security features, and wireless security protocols Configure and verify IPv4 and IPv6 static routing and single area OSPF Understand DHCP, DNS, and other networking services like SNMP, syslog, SSH, and TFTP/FTP Configure and verify inside source NAT and NTP Understand how automation affects network management, controller-based and software-defined architectures, and Cisco DNA Center-enabled device management Understand network programmability concepts, including characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding); configuration management mechanisms such as Puppet, Chef, and Ansible; and learn to Interpret JSON encoded data…”
Libro electrónico -
29035Publicado 2020“…SAS for R Users enables entry-level data scientists to take advantage of the best aspects of both tools by providing a cross-functional framework for users who already know R but may need to work with SAS. Those with knowledge of both R and SAS are of far greater value to employers, particularly in corporate settings. …”
Libro electrónico -
29036Publicado 2016“…Learn how to · Identify and prioritize potential threats to your network · Use basic networking knowledge to improve security · Get inside the minds of hackers, so you can deter their attacks · Implement a proven layered approach to network security · Resist modern social engineering attacks · Defend against today’s most common Denial of Service (DoS) attacks · Halt viruses, spyware, worms, Trojans, and other malware · Prevent problems arising from malfeasance or ignorance · Choose the best encryption methods for your organization · Compare security technologies, including the latest security appliances · Implement security policies that will work in your environment · Scan your network for vulnerabilities · Evaluate potential security consultants · Master basic computer forensics and know what to do if you’re attacked · Learn how cyberterrorism and information warfare are evolving…”
Libro electrónico -
29037Publicado 2019“…What you will learn Use existing data to interact with the canvas via zoom/pan/selection Create vector data and a GeoPackage and build a simple project around it Style data, both vector and raster data, using the Layer Styling Panel Design, label, save, and export maps using the data you have created Analyze spatial queries using the Processing toolbox Expand QGIS with the help of plugins, model builder, and the command line Who this book is for If you know the basic functions and processes of GIS, and want to learn to use QGIS to analyze geospatial data and create rich mapping applications, then this is the book for you…”
Libro electrónico -
29038Publicado 2021“…With real-life examples and hands-on development steps, you will be more confident in working with Kubernetes. You will: Know the Kubernetes extension patterns and available extension points Be familiar with the philosophy behind Kubernetes extensions and how they should be integrated into the clusters Design Kubernetes extensions and make Kubernetes work for you Develop, deploy, and operate plugins for Kubernetes ranging from the CLI tool to custom resources, schedulers, infrastructure, and more Study real-life use cases for extending Kubernetes with code examples…”
Libro electrónico -
29039Publicado 2018“…Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer Understand the realities of cybercrime and today’s attacks Build a digital forensics lab to test tools and methods, and gain expertise Take the right actions as soon as you discover a breach Determine the full scope of an investigation and the role you’ll play Properly collect, document, and preserve evidence and data Collect and analyze data from PCs, Macs, IoT devices, and other endpoints Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence Analyze iOS and Android devices, and understand encryption-related obstacles to investigation Investigate and trace email, and identify fraud or abuse Use social media to investigate individuals or online identities Gather, extract, and analyze breach data with Cisco tools and techniques Walk through common breaches and responses from start to finish Choose the right tool for each task, and explore alternatives that might also be helpful The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. …”
Libro electrónico -
29040Publicado 2018“…Key Features Explore advanced filtering techniques for Group Policy Objects Interact with Group Policy through GPMC and PowerShell Practical guide covering the daily and advanced administration of group policy Book Description This book begins with a discussion of the core material any administrator needs to know in order to start working with Group Policy. …”
Libro electrónico