Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Xarxes socials en línia 280
- Revistes 236
- History 232
- Engineering & Applied Sciences 184
- Development 140
- Management 135
- Economics 133
- Historia 124
- Research & information: general 105
- Design 100
- Electrical & Computer Engineering 100
- Web sites 96
- Education 94
- Història 93
- Social aspects 88
- Telecommunications 88
- Medicine 83
- Application software 81
- Business & Economics 78
- Computer Science 78
- Computer networks 78
- Economic aspects 75
- Data processing 66
- Web site development 66
- Technology: general issues 65
- Lípidos 64
- Internet marketing 59
- Philosophy 57
- Politics and government 57
- Biology, life sciences 56
-
8141Publicado 2017“…Best practices and proven strategies from Google, Netflix, LinkedIn, and other top employers provide real-world models for effective management, and new research on first-wave versus second-wave Millennials helps you parse the difference between your new hires and more experienced workers. …”
Libro electrónico -
8142Publicado 2011“…Includes an accompanying website containing code samples and links to the relevant standards documents (<a href="http://www.wiley.com/go/willcock_ttcn-3_2e">www.wiley.com/go/willcock_ttcn-3_2e</a>) This book is an ideal reference for test engineers, software developers, and standards professionals. …”
Libro electrónico -
8143por Cleere, Eileen“…Drawing from an array of texts that inform her research agenda--including canonical and non-canonical fiction, scientific studies, art history, and home decoration manuals--Cleere links these seemingly disparate works to demonstrate how they are connected at the level of discourse and ideologies of harmony"-- "Eileen Cleere argues in this interdisciplinary study that mid-century discoveries about hygiene and cleanliness not only influenced public health, civic planning, and medical practice but also powerfully reshaped the aesthetic values of the British middle class. …”
Publicado 2014
Libro electrónico -
8144por Mougiakou, Sofia. author, Vinatsella, Dimitra. author, Sampson, Demetrios. author, Papamitsiou, Zacharoula. author, Giannakos, Michail. author, Ifenthaler, Dirk. author“…These activities reproduce real-life contexts by using a suitable use case scenario (storytelling), encouraging learners to link theory with practice; self-assessed assignments enabling learners to apply their attained knowledge and acquired competences on EDL. …”
Publicado 2023
Libro electrónico -
8145Publicado 2019“…Start from scratch and learn both topics simultaneously by writing 20+ hacking programs About This Video Write a remote keylogger that can register all keystrokes and send them by email Interact with files using Python (read, write, and modify them) Convert Python programs to binary executables that work on Windows, OS X, and Linux Convert evil files into Trojans that work and function just like any other file type such as an image or a PDF Write a program that can discover hidden paths in a website Send requests to websites and analyze responses Write a program that can map a website and discover all links, subdomains, files, and directories Run dictionary attacks and guess login information on login pages Write a program that can discover weaknesses in websites In Detail This course is highly practical but doesn't neglect the theory, so we start by covering some basics for ethical hacking and Python programming, installing the required software, and then starting to program straightaway. …”
-
8146Publicado 2018“…Uncover and communicate the value that IT creates for the Enterprise business Initiate and sustain a cultural shift across the IT Organization Create a Service-based view of IT assets, resources, and budgets Transform the customer experience by leveraging IT Services as a layer of abstraction Design IT Services that support outcomes for the Lines of Business Develop a Taxonomy that creates strategic levers for steering the IT organization Measure IT Service Performance in terms familiar to business leaders Link IT Service Performance to business outcomes Demonstrate the total costs of IT Service Delivery in easy to understand models Empower Service Owners to act as General Managers accountable for the value a Service delivers Exchange information with and bolster Enterprise Architecture and IT Technical Operations functions n Establish a foundation for Fast IT, the mandatory future for Enterprise IT Organizations…”
Libro electrónico -
8147Publicado 2008“…Your Complete Certification Solution In this book you’ll learn how to: Understand the foundations of network communication as described in the OSI and TCP/IP models Accurately design and troubleshoot networks using IP subnetting skills Understand the operational components and models of Cisco® routers and switches Perform basic navigation and configurations using Cisco IOS® Software and Cisco Secure Device Manager Apply techniques to secure networks Implement and troubleshoot Distance Vector (RIPv2) routing protocols Implement and troubleshoot NAT, DHCP, and DNS operation on a router Implement and secure wireless LANs (WLANs) Implement and verify basic WAN links CD Features New Simulation Questions! The CD features innovative testing software powered by MeasureUp, an electronic copy of the book, and 75 minutes of video instruction that highlight five scenarios to help prepare for simlet questions on the new exams. …”
Libro electrónico -
8148por Fu, Henry“…Specific topics covered include: Creating an InfoCube and loading the data Checking the accuracy of data with BW Monitor and the Persistent Staging Area (PSA) Creating queries to generate reports using Business Explorer (BEx) Managing user authorization with the Profile Generator Advanced InfoCube design techniques Aggregates and multicubes Working with the Operational Data Store (ODS) Installing business content and creating an R/3 source system in BW Loading data from SAP R/3 into SAP BW Data maintenance Performance tuning, including parallel query option and data packet sizing Object transport Although the focus is on the core SAP BW technology, this book also discusses other relevant technologies, including Basis, ABAP (Advanced Business Application Programming), ALE (Application Link Enabling), and ASAP (Accelerated SAP) for BW. …”
Publicado 2003
Libro electrónico -
8149Publicado 2004“…Enter model-driven architecture (MDA), a standard framework from the Object Management Group (OMG) that allows developers to link object models together to build complete systems. …”
Libro electrónico -
8150por Reilly, David“…The companion Web site, http://www.davidreilly.com/jnpbook, offers downloadable source code, a list of FAQs about Java networking, and useful links to networking resources. 0201710374B03012002…”
Publicado 2002
Libro electrónico -
8151Publicado 2008“…Coverage includes How to design software in a more natural, evolutionary, and professional way How to use the “open-closed” principle to mitigate risks and eliminate waste How and when to test your design throughout the development process How to translate design principles into practices that actually lead to better code How to determine how much design is enough How refactoring can help you reduce over-design and manage change more effectively The book’s companion Web site, www.netobjectives.com/resources, provides updates, links to related materials, and support for discussions of the book’s content…”
Libro electrónico -
8152Publicado 2011“…Each section fully covers one module, and links to valuable additional resources, making this book an ideal tutorial and reference. …”
Libro electrónico -
8153por Hennessy, John L.“…This fully updated edition is comprised of six chapters that follow a consistent framework: explanation of the ideas in each chapter; a crosscutting issues section, which presents how the concepts covered in one chapter connect with those given in other chapters; a putting it all together section that links these concepts by discussing how they are applied in real machine; and detailed examples of misunderstandings and architectural traps commonly encountered by developers and architects. …”
Publicado 2012
Libro electrónico -
8154Publicado 2008“…Coverage includes: Shaders in depth: creating shader objects, compiling shaders, checking for compile errors, attaching shader objects to program objects, and linking final program objects The OpenGL ES Shading Language: variables, types, constructors, structures, arrays, attributes, uniforms, varyings, precision qualifiers, and invariance Inputting geometry into the graphics pipeline, and assembling geometry into primitives Vertex shaders, their special variables, and their use in per-vertex lighting, skinning, and other applications Using fragment shaders—including examples of multitexturing, fog, alpha test, and user clip planes Fragment operations: scissor test, stencil test, depth test, multisampling, blending, and dithering Advanced rendering: per-pixel lighting with normal maps, environment mapping, particle systems, image post-processing, and projective texturing Real-world programming challenges: platform diversity, C++ portability, OpenKODE, and platform-specific shader binaries…”
Libro electrónico -
8155Publicado 2009“…How can I maximize the benefits of using Time Machine? What's a hard link, and how does it relate to Time Machine? What are the important gotchas relating to Time Machine? …”
Libro electrónico -
8156Publicado 2011“…The missing link to determining a company’s real value Most people at the M&A table know how to carry out financial and legal due diligence. …”
Libro electrónico -
8157Publicado 2012“…Neuroscientists have made absolutely stunning discoveries about the brain: discoveries that are intimately linked to everything from your health and happiness to the age-old debate on free will. …”
Libro electrónico -
8158Publicado 2013“…Kay begins by reviewing methodologies for developing signal processing algorithms, including mathematical modeling, computer simulation, and performance evaluation. He links concepts to practice by presenting useful analytical results and implementations for design, evaluation, and testing. …”
Libro electrónico -
8159por Champniss, GuyTabla de Contenidos: “…Broadcast off, dialogue on : invitation to form bonding, bridging and linking capital (apply online)…”
Publicado 2011
Libro electrónico -
8160Publicado 2012“…With this book, you will find out how to Identify hidden signs of insider IT sabotage, theft of sensitive information, and fraud Recognize insider threats throughout the software development life cycle Use advanced threat controls to resist attacks by both technical and nontechnical insiders Increase the effectiveness of existing technical security tools by enhancing rules, configurations, and associated business processes Prepare for unusual insider attacks, including attacks linked to organized crime or the Internet underground By implementing this book’s security practices, you will be incorporating protection mechanisms designed to resist the vast majority of malicious insider attacks…”
Libro electrónico