Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Development 355
- History 349
- Application software 303
- Engineering & Applied Sciences 237
- Computer Science 177
- Filosofía 152
- Computer programs 138
- Management 129
- Crítica e interpretación 124
- Computer networks 113
- Computer security 113
- Web site development 109
- Java (Computer program language) 107
- Security measures 102
- Computer programming 97
- Cloud computing 94
- Computer software 94
- Microsoft .NET Framework 94
- Historia y crítica 93
- Internet programming 80
- Programming 76
- Biblia 75
- Software engineering 71
- Cristianismo 70
- Artificial intelligence 69
- Job hunting 68
- History and criticism 66
- Design 65
- Business & Economics 63
-
9561Publicado 2022“…On the other hand, it was provided that until the National Congress enacted the substantive codes, the provinces were empowered to maintain their civil and criminal legislation (art. 108 CN). …”
Libro electrónico -
9562Publicado 2018“…Food science nanotechnology is an area of rising attention that unties new possibilities for the food industry. Due to the rapid population growth there is a need to produce food and beverages in a more efficient, safe and sustainable way. …”
Libro electrónico -
9563por Thornburgh, Ralph H.“…Finally, preview the future of Fibre Channel: faster fiber rates, hunt groups, multicast groups, classes of service, and beyond. …”
Publicado 1999
Libro electrónico -
9564Publicado 2019“…Based on the idea of affective logic, Elin Lundquist follows the on-site monitoring of the bird hunting that takes place annually in Malta. Mattias Frihammar uses observations at a wilderness gallery with taxidermied animals to reflect on local identity. …”
Electrónico -
9565por Organisation for Economic Co-operation and Development.“…Luxembourg delivers its aid entirely in grant form, and largely untied. The sharp rise in the volume of aid makes it important to control and improve the quality of projects and programmes by means of more stringent selection procedures, closer monitoring of projects and systematic [ex-ante] and [ex-post] evaluations. …”
Publicado 1999
Libro electrónico -
9566por Fenton, Nicole“…Learn from real-world examples and interviews with people who put these ideas into action every day: Kristina Halvorson of Brain Traffic, Tiffani Jones Brown of Pinterest, Randy J. Hunt of Etsy, Gabrielle Blair of Design Mom, Mandy Brown of Editorially, Sarah Richards of GOV.UK, and more. …”
Publicado 2014
Libro electrónico -
9567por Russell, Steve, 1963-“…No other event in Operation Iraqi Freedom caught the attention of the world like the hunt for and capture of Saddam Hussein. Square in the middle of the search, living in Saddam’s hometown of Tikrit, were Lt. …”
Publicado 2011
Libro -
9568por Jules Verne“…Samuel Fergusson, accompanied by his manservant Joe and his friend professional hunter Richard "Dick" Kennedy, sets out to travel across the African continent - still not fully explored - with the help of a balloon filled with hydrogen. …”
Publicado 2014
Texto completo en Odilo
Otros -
9569Deep learning Artificial neural networks with Tensorflow Artificial neural networks with Tensorflow.Publicado 2023“…He is a skilled instructor who has taught at universities including Columbia, NYU, Hunter College, and The New School. He has web programming expertise, with experience in technologies such as Python, Ruby/Rails, PHP, and Angular, and has provided his services to multiple businesses…”
Video -
9570Publicado 2023“…He is a skilled instructor who has taught at universities including Columbia, NYU, Hunter College, and The New School. He has web programming expertise, with experience in technologies such as Python, Ruby/Rails, PHP, and Angular, and has provided his services to multiple businesses…”
Video -
9571Publicado 2023“…Available as a managed service in Azure and Azure Stack, the open-source functions runtime also works on multiple destinations, including Kubernetes, Azure IoT Edge, on-premises, and even in other clouds. …”
Video -
9572Publicado 2023“…What you will learn Find out how DevSecOps unifies security and DevOps, bridging a significant cybersecurity gap Discover how CI/CD pipelines can incorporate security checks for automatic vulnerability detection Understand why threat modeling is indispensable for early vulnerability identification and action Explore chaos engineering tests to monitor how systems perform in chaotic security scenarios Find out how SAST pre-checks code and how DAST finds live-app vulnerabilities during runtime Perform real-time monitoring via observability and its criticality for security management Who this book is for This book is for DevSecOps engineers and application security engineers. …”
Libro electrónico -
9573Publicado 2017“…Additionally, previous Visual Studio experience will be helpful but is not required, since detailed instructions will guide through the samples of the book.This book can also help people, who work in infrastructure engineering and operations, to monitor and diagnose problems during the runtime of ASP.NET Core 2.0 web applications. What You Will Learn Set up your development environment using Visual Studio 2017 and Visual Studio Code Create a fully automated continuous delivery pipeline using Visual Studio Team Services Get to know the basic and advanced concepts of ASP.NET Core 2.0 with detailed examples Build an MVC web application and use Entity Framework Core 2 to access data Add Web APIs to your web applications using RPC, REST, and HATEOAS Authenticate and authorize users with built-in ASP.NET Core 2.0 features Use Azure, Amazon Web Services, and Docker to deploy and monitor your applications In Detail The ability to develop web applications that are highly efficient but also easy to maintain has become imperative to many businesses. …”
Libro electrónico -
9574Publicado 2018“…To complete the program, we invited two outstanding keynote speakers: Hillery Hunter (IBM Research) and Fred Chong (University of Chicago). …”
Libro electrónico -
9575por Webber, Emily“…What you will learn Find the right use cases and datasets for pretraining and fine-tuning Prepare for large-scale training with custom accelerators and GPUs Configure environments on AWS and SageMaker to maximize performance Select hyperparameters based on your model and constraints Distribute your model and dataset using many types of parallelism Avoid pitfalls with job restarts, intermittent health checks, and more Evaluate your model with quantitative and qualitative insights Deploy your models with runtime improvements and monitoring pipelines Who this book is for If you're a machine learning researcher or enthusiast who wants to start a foundation modelling project, this book is for you. …”
Publicado 2023
Libro electrónico -
9576Publicado 2023“…What you will learn Understand the fundamentals and challenges of application security Master risk management strategies and security analysis techniques Conduct penetration testing and exploit vulnerabilities Implement runtime protection in applications Apply security standards, requirements, and maturity models Create a comprehensive roadmap for application security Audience The ideal target audience for the CompTIA PenTest+ course includes cybersecurity professionals, IT security analysts, vulnerability testers, network security professionals, and anyone aspiring to build a career in penetration testing or enhance their skills in identifying and mitigating network vulnerabilities. …”
Video -
9577Publicado 2002“…An extensive new chapter--designed especially for experienced PL/SQL developers--describes PL/SQL's runtime architecture and how to use knowledge of Oracle internals to get the best performance from PL/SQL. …”
Libro electrónico -
9578Publicado 2023“…What You Will Learn Implement behavioral design patterns using modern C++ features See how behavioral design patterns use compile and runtime polymorphism Look at the Strategy, Template Method, and Command design patterns Learn Memento, CoR (Chain of Responsibility), and State design patterns See Observer, Mediator, Visitor, Interpreter, and Iterator design patterns Explore the pros and cons of each design pattern Audience If you are a student who wants to get a basic understanding of design patterns; a software developer, project manager, or an architect who wants to understand and implement design patterns in their projects; or a C++ developer who wants to implement design patterns in C++, this course is for you. …”
Video -
9579Publicado 2023“…We will introduce load simulations, ramping up users, and running Gatling from the command line with runtime parameters. Throughout the course, we will tackle challenges, refine our skills, and learn to monitor test executions with Gatling test result reports. …”
Video -
9580Publicado 2023“…What you will learn Expand your knowledge of JavaScript frameworks within different runtimes and ecosystems Get to grips with the technical aspects of structuring framework abstractions in JavaScript Gain an understanding of common patterns across various existing frameworks Discover the usage of existing tooling such as TypeScript and GraphQL Configure performance tests for your project and track down bottlenecks in the code base Understand how JavaScript and the web evolve and what these systems will look like in the coming years Who this book is for If you're a JavaScript novice or an expert who wants to explore the world of JavaScript frameworks, this book is for you. …”
Libro electrónico