Mostrando 29,281 - 29,300 Resultados de 30,513 Para Buscar 'Dynów~', tiempo de consulta: 1.08s Limitar resultados
  1. 29281
    Publicado 2016
    “…On the other hand, we also know that these diseases may not have a direct genetic component, thus, the study of sporadic type neurodegenerative diseases is much more complex. …”
    Libro electrónico
  2. 29282
    por Gil del Valle, Lizette
    Publicado 2003
    “…Al evaluar la influencia del incremento de la ingesta de micronutrientes dietarios en 40 individuos VIH+ sobre estos marcadores, durante un período de 3 meses, se apreciaron diferencias (p[ 0,05) en el incremento de la capacidad antioxidante evaluada como TAS, GSH, GPx y SOD, sin efectos sobre el daño oxidativo evaluado como MDA, OT y por ciento F ADN y sin modificaciones en los indicadores inmunológicos de progresión de la infección y el mantenimiento en un 56 por ciento de adecuación de la ingesta diaria recomendada en cuanto a micronutrientes. …”
    Libro electrónico
  3. 29283
    por Abbès, Makram
    Publicado 2015
    “…Et parce qu’il s’agit de continuer à travailler ensemble, cet ouvrage voudrait être, selon le mot de Machiavel dans la lettre de dédicace du Prince, un « piccolo dono », un « petit don » pour Jean-Claude Zancarini et pour quiconque le lira. …”
    Electrónico
  4. 29284
    Publicado 2017
    “…Given that most of the world’s speakers know and use more than one language, it is crucial to reach a more precise understanding of how bilingual and multilingual individuals encode spoken words in the mental lexicon, and why spoken word recognition is more difficult in a second language than in the native language. …”
    Libro electrónico
  5. 29285
    Publicado 2022
    “…You'll find out all you need to know about the services available within Azure and Microsoft 365 for building a defense-in-depth security posture, and finally become familiar with Microsoft's compliance monitoring capabilities. …”
    Libro electrónico
  6. 29286
    Publicado 2022
    “…What you will learn Understand what is required to conduct a threat hunt Know everything your team needs to concentrate on for a successful hunt Discover why intelligence must be included in a threat hunt Recognize the phases of planning in order to prioritize efforts Balance the considerations concerning toolset selection and employment Achieve a mature team without wasting your resources Who this book is for This book is for anyone interested in learning how to organize and execute effective cyber threat hunts, establishing extra defense capabilities within their company, and wanting to mature an organization's cybersecurity posture. …”
    Libro electrónico
  7. 29287
    Publicado 2022
    “…So, to implement bash shell scripts using REST APIs, you must know how to parse the response of REST API (that is, parse JSON data). …”
    Video
  8. 29288
    Publicado 2018
    “…Learn How To Build your own wireless hacking labs and know what type of hardware you can use to perform wireless hacking Use several open-source tools, such as Aircrack-ng Crack WEP and examine different attacks against WPA Perform wireless reconnaissance Perform evil twin at..…”
    Video
  9. 29289
    Publicado 2018
    “…By the end of this book, you will have a better understanding of cloud analytics as a concept as well as a practical know-how of its implementation Style and approach Comprehensive guide with a perfect blend of theory, examples, and implementation of real-world use-cases…”
    Libro electrónico
  10. 29290
    Publicado 2018
    “…One thing is to learn about concepts of agile, another completely different story is to know to successfully transform your organisation to move into agile ways of working, change its culture to agile. …”
    Video
  11. 29291
    Publicado 2018
    “…By the end of this book, you'll know everything you need to graduate fro..…”
    Libro electrónico
  12. 29292
    Publicado 2018
    “…What You Will Learn Containerize your traditional or microservice-based application Share or ship your application as an immutable container image Build a Docker swarm and a Kubernetes cluster in the cloud Run a highly distributed application using Docker Swarm or Kubernetes Update or rollback a distributed application with zero downtime Secure your applications via encapsulation, networks, and secrets Know your options when deploying your containerized app into the cloud In Detail Docker containers have revolutionized the software supply chain in small and big enterprises. …”
    Libro electrónico
  13. 29293
    Publicado 2018
    “…What You Will Learn Learn the basics and foundational concepts of Solidity and Ethereum Explore the Solidity language and its uniqueness in depth Create new accounts and submit transactions to blockchain Get to know the complete language in detail to write smart contracts Learn about major tools to develop and deploy smart contracts Write defensive code using exception handling and error checking Understand Truffle basics and the debugging process In Detail Solidity is a contract-oriented language whose syntax is highly influenced by JavaScript, and is designed to compile code for the Ethereum Virtual Machine. …”
    Libro electrónico
  14. 29294
    Publicado 2020
    “…Interactive Data Visualization with Python sharpens your data exploration skills, tells you everything there is to know about interactive data visualization in Python. …”
    Libro electrónico
  15. 29295
    por Statler, Stephen. author
    Publicado 2016
    Tabla de Contenidos: “…Chapter 11: Designing with Privacy in MindChapter 12: Orchestration: Making Beacons Behave More Intelligently; Chapter 13: Understanding Beacon Networks; Chapter 14: A Programmatic Advertising Primer; Chapter 15: Understanding the Integration of Mobile, Beacons, and Out-of-Home Media; Chapter 16: Alternative Technologies to Bluetooth Beacons; Chapter 17: Geofencing: Everything You Need to Know; Chapter 18: Barcodes, QR Codes, NFC, and RFID; Chapter 19: Augmenting Beacons with Cellular Network Technologies; Chapter 20: Where Beacons Are Making a Difference…”
    Libro electrónico
  16. 29296
    Publicado 2016
    “…Before SAFe, I would not know how to help my teams but now I have many tools to enable the teams. …”
    Libro electrónico
  17. 29297
    Publicado 2020
    “…Topics includeModule 1: Introduction to Ethical Hacking and How to Plan a Security Penetration TestModule 2: ReconnaissanceModule 3: Attacks and ExploitsModule 4: Tools and Reporting Skill Level Beginner/Intermediate Learn How To * Prepare for the CompTIA PenTest+ Exam* Plan and scope a security penetration test* Perform reconnaissance on a target* Gain access through vulnerable systems by knowing the various exploits* Restore environments after a pentest has successfully found vulnerabilities within the system* Record and log activities in a manner that is professional, clear, and advantageous to the client for system improvement Who Should Take This Course * Anyone interested in taking the CompTIA PenTest+ exam* Individuals seeking careers in the cybersecurity field Course Requirements None Lesson descriptions Module 1, "Introduction to Ethical Hacking and How to Plan a Security Penetration Test," introduces the concept of ethical hacking and how the cybersecurity industry goes about implementing field-tested security parameters using penetration testing. …”
    Video
  18. 29298
    Publicado 2018
    “…What you will learn Learn how to provision a production-ready Kubernetes cluster on AWS Deploy your own applications to Kubernetes with Helm Discover strategies for troubleshooting your cluster and know where to find help with issues Explore the best ways to monitor your cluster and the applications running on it Supercharge your cluster by integrating it with the tools provided by the AWS platform Architect your cluster for high availability Who this book is for If you're a cloud engineer, cloud solution provider, sysadmin, site reliability engineer, or developer with an interest in DevOps and are looking for an extensive guide to running Kubernetes in the AWS environment, this book is for you. …”
    Libro electrónico
  19. 29299
    Publicado 2021
    “…This book will help you to make the most of PowerShell's automation features, using different methods to parse data, manipulate regular expressions, and work with Windows Management Instrumentation (WMI).What you will learn* Optimize code with functions, switches, and looping structures* Test and debug your scripts as well as raising and catching errors* Work with objects and operators to test and manipulate data* Parse and manipulate different data types* Use jobs, runspaces, and runspace pools to run code asynchronously* Write .NET classes with ease within PowerShell* Create and implement regular expressions in PowerShell scripts* Make use of advanced techniques to define and restrict the behavior of parametersWho this book is forThis book is for system administrators who want to automate and speed up their processes using PowerShell and Windows PowerShell. Youll need to know the basics of operating systems, but beginners with no prior experience with PowerShell will have no trouble following along…”
    Libro electrónico
  20. 29300
    Publicado 2018
    “…You will learn to write multithreaded programs, network programs, database-driven programs, asyncio based programming and more. You will also get to know the modern best practices involved in writing GUI apps. …”
    Libro electrónico