Mostrando 8,141 - 8,160 Resultados de 8,824 Para Buscar 'Lipnik~', tiempo de consulta: 1.19s Limitar resultados
  1. 8141
    Publicado 2017
    “…Best practices and proven strategies from Google, Netflix, LinkedIn, and other top employers provide real-world models for effective management, and new research on first-wave versus second-wave Millennials helps you parse the difference between your new hires and more experienced workers. …”
    Libro electrónico
  2. 8142
    Publicado 2011
    “…Includes an accompanying website containing code samples and links to the relevant standards documents (<a href="http://www.wiley.com/go/willcock_ttcn-3_2e">www.wiley.com/go/willcock_ttcn-3_2e</a>) This book is an ideal reference for test engineers, software developers, and standards professionals. …”
    Libro electrónico
  3. 8143
    por Cleere, Eileen
    Publicado 2014
    “…Drawing from an array of texts that inform her research agenda--including canonical and non-canonical fiction, scientific studies, art history, and home decoration manuals--Cleere links these seemingly disparate works to demonstrate how they are connected at the level of discourse and ideologies of harmony"-- "Eileen Cleere argues in this interdisciplinary study that mid-century discoveries about hygiene and cleanliness not only influenced public health, civic planning, and medical practice but also powerfully reshaped the aesthetic values of the British middle class. …”
    Libro electrónico
  4. 8144
    “…These activities reproduce real-life contexts by using a suitable use case scenario (storytelling), encouraging learners to link theory with practice; self-assessed assignments enabling learners to apply their attained knowledge and acquired competences on EDL. …”
    Libro electrónico
  5. 8145
    Publicado 2019
    “…Start from scratch and learn both topics simultaneously by writing 20+ hacking programs About This Video Write a remote keylogger that can register all keystrokes and send them by email Interact with files using Python (read, write, and modify them) Convert Python programs to binary executables that work on Windows, OS X, and Linux Convert evil files into Trojans that work and function just like any other file type such as an image or a PDF Write a program that can discover hidden paths in a website Send requests to websites and analyze responses Write a program that can map a website and discover all links, subdomains, files, and directories Run dictionary attacks and guess login information on login pages Write a program that can discover weaknesses in websites In Detail This course is highly practical but doesn't neglect the theory, so we start by covering some basics for ethical hacking and Python programming, installing the required software, and then starting to program straightaway. …”
    Video
  6. 8146
    Publicado 2018
    “…Uncover and communicate the value that IT creates for the Enterprise business Initiate and sustain a cultural shift across the IT Organization Create a Service-based view of IT assets, resources, and budgets Transform the customer experience by leveraging IT Services as a layer of abstraction Design IT Services that support outcomes for the Lines of Business Develop a Taxonomy that creates strategic levers for steering the IT organization Measure IT Service Performance in terms familiar to business leaders Link IT Service Performance to business outcomes Demonstrate the total costs of IT Service Delivery in easy to understand models Empower Service Owners to act as General Managers accountable for the value a Service delivers Exchange information with and bolster Enterprise Architecture and IT Technical Operations functions n Establish a foundation for Fast IT, the mandatory future for Enterprise IT Organizations…”
    Libro electrónico
  7. 8147
    Publicado 2008
    “…Your Complete Certification Solution In this book you’ll learn how to: Understand the foundations of network communication as described in the OSI and TCP/IP models Accurately design and troubleshoot networks using IP subnetting skills Understand the operational components and models of Cisco® routers and switches Perform basic navigation and configurations using Cisco IOS® Software and Cisco Secure Device Manager Apply techniques to secure networks Implement and troubleshoot Distance Vector (RIPv2) routing protocols Implement and troubleshoot NAT, DHCP, and DNS operation on a router Implement and secure wireless LANs (WLANs) Implement and verify basic WAN links CD Features New Simulation Questions! The CD features innovative testing software powered by MeasureUp, an electronic copy of the book, and 75 minutes of video instruction that highlight five scenarios to help prepare for simlet questions on the new exams. …”
    Libro electrónico
  8. 8148
    por Fu, Henry
    Publicado 2003
    “…Specific topics covered include: Creating an InfoCube and loading the data Checking the accuracy of data with BW Monitor and the Persistent Staging Area (PSA) Creating queries to generate reports using Business Explorer (BEx) Managing user authorization with the Profile Generator Advanced InfoCube design techniques Aggregates and multicubes Working with the Operational Data Store (ODS) Installing business content and creating an R/3 source system in BW Loading data from SAP R/3 into SAP BW Data maintenance Performance tuning, including parallel query option and data packet sizing Object transport Although the focus is on the core SAP BW technology, this book also discusses other relevant technologies, including Basis, ABAP (Advanced Business Application Programming), ALE (Application Link Enabling), and ASAP (Accelerated SAP) for BW. …”
    Libro electrónico
  9. 8149
    Publicado 2004
    “…Enter model-driven architecture (MDA), a standard framework from the Object Management Group (OMG) that allows developers to link object models together to build complete systems. …”
    Libro electrónico
  10. 8150
    por Reilly, David
    Publicado 2002
    “…The companion Web site, http://www.davidreilly.com/jnpbook, offers downloadable source code, a list of FAQs about Java networking, and useful links to networking resources. 0201710374B03012002…”
    Libro electrónico
  11. 8151
    Publicado 2008
    “…Coverage includes How to design software in a more natural, evolutionary, and professional way How to use the “open-closed” principle to mitigate risks and eliminate waste How and when to test your design throughout the development process How to translate design principles into practices that actually lead to better code How to determine how much design is enough How refactoring can help you reduce over-design and manage change more effectively The book’s companion Web site, www.netobjectives.com/resources, provides updates, links to related materials, and support for discussions of the book’s content…”
    Libro electrónico
  12. 8152
    Publicado 2011
    “…Each section fully covers one module, and links to valuable additional resources, making this book an ideal tutorial and reference. …”
    Libro electrónico
  13. 8153
    por Hennessy, John L.
    Publicado 2012
    “…This fully updated edition is comprised of six chapters that follow a consistent framework: explanation of the ideas in each chapter; a crosscutting issues section, which presents how the concepts covered in one chapter connect with those given in other chapters; a putting it all together section that links these concepts by discussing how they are applied in real machine; and detailed examples of misunderstandings and architectural traps commonly encountered by developers and architects. …”
    Libro electrónico
  14. 8154
    Publicado 2008
    “…Coverage includes: Shaders in depth: creating shader objects, compiling shaders, checking for compile errors, attaching shader objects to program objects, and linking final program objects The OpenGL ES Shading Language: variables, types, constructors, structures, arrays, attributes, uniforms, varyings, precision qualifiers, and invariance Inputting geometry into the graphics pipeline, and assembling geometry into primitives Vertex shaders, their special variables, and their use in per-vertex lighting, skinning, and other applications Using fragment shaders—including examples of multitexturing, fog, alpha test, and user clip planes Fragment operations: scissor test, stencil test, depth test, multisampling, blending, and dithering Advanced rendering: per-pixel lighting with normal maps, environment mapping, particle systems, image post-processing, and projective texturing Real-world programming challenges: platform diversity, C++ portability, OpenKODE, and platform-specific shader binaries…”
    Libro electrónico
  15. 8155
    Publicado 2009
    “…How can I maximize the benefits of using Time Machine? What's a hard link, and how does it relate to Time Machine? What are the important gotchas relating to Time Machine? …”
    Libro electrónico
  16. 8156
    Publicado 2011
    “…The missing link to determining a company’s real value Most people at the M&A table know how to carry out financial and legal due diligence. …”
    Libro electrónico
  17. 8157
    Publicado 2012
    “…Neuroscientists have made absolutely stunning discoveries about the brain: discoveries that are intimately linked to everything from your health and happiness to the age-old debate on free will. …”
    Libro electrónico
  18. 8158
    Publicado 2013
    “…Kay begins by reviewing methodologies for developing signal processing algorithms, including mathematical modeling, computer simulation, and performance evaluation. He links concepts to practice by presenting useful analytical results and implementations for design, evaluation, and testing. …”
    Libro electrónico
  19. 8159
    por Champniss, Guy
    Publicado 2011
    Tabla de Contenidos: “…Broadcast off, dialogue on : invitation to form bonding, bridging and linking capital (apply online)…”
    Libro electrónico
  20. 8160
    Publicado 2012
    “…With this book, you will find out how to Identify hidden signs of insider IT sabotage, theft of sensitive information, and fraud Recognize insider threats throughout the software development life cycle Use advanced threat controls to resist attacks by both technical and nontechnical insiders Increase the effectiveness of existing technical security tools by enhancing rules, configurations, and associated business processes Prepare for unusual insider attacks, including attacks linked to organized crime or the Internet underground By implementing this book’s security practices, you will be incorporating protection mechanisms designed to resist the vast majority of malicious insider attacks…”
    Libro electrónico