Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- City planning 503
- History 350
- Historia 279
- Development 187
- Engineering & Applied Sciences 159
- Management 153
- Application software 141
- Architecture 135
- Social aspects 123
- Computer programming 118
- Computer Science 115
- History and criticism 95
- Economics 90
- Data processing 88
- Jazz 85
- Design 84
- Biblia 82
- Python (Computer program language) 82
- Programming 81
- Business & Economics 80
- Crítica e interpretación 79
- Law and legislation 76
- Photography 76
- RELIGION 75
- Java (Computer program language) 71
- Música 71
- Education 69
- Computer software 66
- Congressos 66
- Filosofía 66
-
11181Publicado 2009“…Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include: The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from: Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. …”
Libro electrónico -
11182Publicado 2013“…However, having big data means little if you can't leverage it with analytics. Now you can explore the large volumes of unstructured text data that your organization has collected with Text Mining and Analysis: Practical Methods, Examples, and Case Studies Using SAS. …”
Libro electrónico -
11183Publicado 2018“…He goes further to introduce many techniques little used by developers today. The book's associated web site contains a library of C++ source code and demonstration programs, and a complete commercial source code library of AI algorithms and techniques."…”
Libro electrónico -
11184por Goyvaerts, Jan“…Learn regular expressions basics through a detailed tutorial Use code listings to implement regular expressions with your language of choice Understand how regular expressions differ from language to language Handle common user input with recipes for validation and formatting Find and manipulate words, special characters, and lines of text Detect integers, floating-point numbers, and other numerical formats Parse source code and process log files Use regular expressions in URLs, paths, and IP addresses Manipulate HTML, XML, and data exchange formats Discover little-known regular expression tricks and techniques…”
Publicado 2012
Libro electrónico -
11185Publicado 2011“…This training course is designed for the beginner, and whether you have little or no experience at all with Revit Structure, you will quickly learn how to take advantage of the tools it puts at your fingertips. …”
-
11186Publicado 2021“…Importantly, failing to reach developmental potential contributes to global cycles of poverty, inequality, and social exclusion. There is little public understanding of the importance of a child’s first years and the critical developmental opportunity to reach optimal functioning. …”
Libro electrónico -
11187Publicado 2020“…At the same time, it has also led to subfield isolation and methodological a priori, with some researchers even claiming that theoretical linguistics has little to offer to cognitive science (see for instance Edelman & Christiansen 2003). …”
Libro electrónico -
11188Publicado 2022“…The latest land-based, ultra-supercritical steam boilers reach 25 MPa pressure and 620 °C temperatures, which increases plant efficiency and reduces fuel consumption. There is little chance that such a plant concept could be applied to ships. …”
Libro electrónico -
11189Publicado 2020“…Insbesondere die Kreuzzugspläne Philipps des Guten (1419-1467) erscheinen vor dieser Folie wie das letzte Aufblühen einer mittelalterlichen Kultur, die nicht recht zum klassischen Narrativ eines 'burgundischen Staates' passen will. …”
Libro electrónico -
11190Publicado 2011“…The IBM DB2 SSacSA feature is an enablement technology that immediately equips most Sybase ASE applications to run against DB2, usually with little to no up front conversion work required. This approach minimizes the costs and risks of a traditional migration. …”
Libro electrónico -
11191Publicado 2007“…Many corporations have no formal process of retaining these documents as records, which can increase storage costs. In addition, when litigation requests occur, companies can spend a huge amount of money and resources to locate records. …”
Libro electrónico -
11192por Leis, John, 1966-“…Existing books in this area tends to fall into one of two camps - either a highly mathematical treatment with few practical examples of the everyday uses of DSP, or else very verbose and descriptive treatments with little or no mathematical content to back up the topics. …”
Publicado 2011
Libro electrónico -
11193Publicado 2018“…Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as usual. Digital forensics is what follows - a scientific investigation into the causes of an incident with the aim of bringing the perpetrators to justice. …”
Libro electrónico -
11194Publicado 2018“…Fabricating For Dummies provides you with all the information you need to begin learning about metalworking, or fill any gaps in your existing knowledge in order to advance your career. Simply put, there's little out there for light reading on manufacturing. …”
Libro electrónico -
11195Publicado 2021“…This is great, especially if you are in control of your API, but what if you aren't? You do a little research and start seeing terminology like adapters, serializers, transforms, and snapshots, and quickly become overwhelmed. …”
Libro electrónico -
11196Publicado 2019“…Yaworski also shares advice on how to write effective vulnerability reports and develop relationships with bug bounty programs, as well as recommends hacking tools that can make the job a little easier…”
Libro electrónico -
11197Publicado 2015“…In this book, popular Fuji Rumors "X-Pert Corner" columnist Rico Pfirstinger teaches about the little-known capabilities of the X-T1, which he’s discovered through months of in-depth research and experimentation with the camera. …”
Libro electrónico -
11198Publicado 2018“…There is something for everyone.Topics included: - Basics and Fundamentals: Data types, let and const variables, functions, conditionals, loops, object literals, arrays, and so on. DOM Manipulation: Selectors, traversing the DOM, show/hide, creating and removing elements, event listeners OOP: ES5 prototypes, inheritance, ES2015 classes and sub-classes, constructors. …”
-
11199por Seibold, Chris“…The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn’t expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them to. …”
Publicado 2013
Libro electrónico -
11200por Cotton, Richard“…Learn how to perform data analysis with the R language and software environment, even if you have little or no programming experience. With the tutorials in this hands-on guide, you’ll learn how to use the essential R tools you need to know to analyze data, including data types and programming concepts. …”
Publicado 2013
Libro electrónico