Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,665
- Bible 1,923
- Bíblia 1,428
- Historia 1,177
- RELIGION 1,042
- Development 808
- Application software 802
- Engineering & Applied Sciences 770
- Management 648
- Crítica e interpretación 551
- Computer Science 516
- Història 512
- History 456
- Computer networks 447
- Mss 430
- Data processing 412
- Cloud computing 375
- Criticism, interpretation, etc 374
- Computer programs 371
- Operating systems (Computers) 348
- Programming 343
- Comentarios 304
- Security measures 276
- Artificial intelligence 272
- Business & Economics 271
- Crítica, interpretación, etc 266
- Database management 262
- Testigos de Jehová 262
- iOS (Electronic resource) 261
- Crítica, interpretació, etc 249
-
51721por Locane, Jorge J., author“…To answer this question, this book asks another one: How is it produced, that is, what are the material conditions, processes, and actors, which enable Latin-American Literature to circulate internationally and become (Latin-American) World Literature? …”
Publicado 2019
Libro electrónico -
51722Publicado 2017“…But participatory decision making is balancing on the borders of inclusion, structure, precision and accuracy. To simply enable more participation will not yield enhanced democracy, and there is a clear need for more elaborated elicitation and decision analytical tools. …”
Libro electrónico -
51723por Boltanski, Arianne“…On connaît le British architectural Books and writers (1556-1785) paru à Cambridge en 1990 à l’initiative de Eileen Harris, qui catalogue la production imprimée en Grande-Bretagne ainsi que leurs éditeurs et, plus ciblé, l’ouvrage collectif paru en 1988 sur les Traités d’architecture de la Renaissance sous la direction de Jean Guillaume. …”
Publicado 2017
Electrónico -
51724Publicado 2017“…Kill Boxes addresses the legacy of US-sponsored torture, indefinite detention, and drone warfare by deciphering the shocks of recognition that humanistic and artistic responses to violence bring to consciousness if readers and viewers have eyes to face them.Beginning with an analysis of the ways in which the hooded man from Abu Ghraib became iconic, subsequent chapters take up less culturally visible scenes of massive violations of human rights to bring us face to face with these shocks and the forms of recognition that they enable and disavow. We are addressed in the photo of the hooded man, all the more so as he was brutally prevented, in our name, from returning the camera's and thus our gaze. …”
Libro electrónico -
51725Publicado 2016“…This book proposes a new institution -- the 'People's Forum' -- to enable democratic governments to effectively address long-running issues like global warming and inequality. …”
Libro electrónico -
51726Publicado 2022Tabla de Contenidos: “…Commitment - Calculator -- On-Demand Instances -- Reserved Instance -- Payment Option -- AWS Calculator -- On-Demand Instance Cost -- Reserved Instance Cost -- Security on AWS -- Tools -- Tools for Access and Identity Provisioning and Protection -- Tools for Data Protection -- Monitoring and Logging Tools -- Security Event Response Mechanism -- Amazon Virtual Private Cloud Security (VPC) -- Subnet and Routing Tables -- Network Access Control List -- Security Groups (SGs) -- Virtual Private Gateway -- Internet Gateway -- Backup and Restore in AWS -- SAP HANA DB Backup/Recovery via AWS Backint Agent -- EC2 Instance and EBS Volume Backup to S3 -- Snapshot Backup from AWS Console -- EC2 Image Backup -- AWS Backup -- Backup Configuration Steps from AWS Console -- Restore Snapshot from AWS Console -- Disaster Recovery via AWS -- Passive DR Architecture - RPO Is More Than Zero and RTO Is Higher -- Steps to Configure the Passive DR -- Steps to Invoke Passive DR -- Semi-active DR Solution [RPO Is Near to Zero and RTO Is Medium] -- Steps to Configure the Semi-active DR -- Steps to Invoke DR -- Active-Active DR Solution [RPO Near to Zero and RTO Is Very Less] -- Steps to Configure the Active DR -- Steps to Invoke DR -- SAP HANA HSR Setup Guide -- Summary -- Cloud Foundation Design and Implementation…”
Libro electrónico -
51727por Le Ny, Françoise“…The author’s inventory of 142 identified tile factories in France has enabled her to provide new information on kiln technology, to establish a typology and to propose a possible chronological sequence. …”
Publicado 2021
Electrónico -
51728Publicado 2020Tabla de Contenidos: “…Fundamentals of the q programming language -- Dictionaries and tables : the q fundamentals -- Functions -- Editors and other tools -- Debugging q code -- Splayed and partitioned tables -- Joins -- Parallelisation -- Data cleaning and filtering -- Parse trees -- A few use cases -- Basic overview of statistics -- Linear regression -- Time series econometrics -- Fourier transform -- Eigensystem and PCA -- Outlier detection -- Simulating asset prices -- Basic principles of machine learning -- Linear regression with regularisation -- Nearest neighbours -- Neural networks -- AdaBoost with stumps -- Trees -- Forests -- Unsupervised machine learning : the Apriori algorithm -- Processing information -- Towards AI : Monte Carlo tree search -- Econophysics : the agent-based computational models -- Epilogue: Art…”
Libro electrónico -
51729Publicado 2015Tabla de Contenidos: “…Intro -- Copyright -- Brief Table of Contents -- Table of Contents -- Foreword -- Preface -- Acknowledgments -- About this Book -- About the Author -- About the Cover Illustration -- Part 1. …”
Libro electrónico -
51730Publicado 2017“…Then you'll explore MongoDB Atlas, its benefits (e.g., how it enables fast time-to-market app deployments), and the tools it provides to view data, perform backups, alerts, and real-time performance metrics. …”
-
51731Publicado 2021“…By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection.What you will learn* Understand how log forwarding is configured on the firewall* Focus on effectively enabling remote access* Explore alternative ways for connecting users and remote networks* Protect against phishing with credential detection* Understand how to troubleshoot complex issues confidently* Strengthen the security posture of your firewallsWho this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. …”
Libro electrónico -
51732Publicado 2018“…By the end of the book, you will have gained extensive theoretical knowledge of concurrency and the ways in which concurrency is supported by the Python language What you will learn Explore the concepts of concurrency in programming Explore the core syntax and features that enable concurrency in Python Understand the correct way to implement concurrency Abstract methods to keep the data consistent in your program Analyze problems commonly faced in concurrent programming Use application scaffolding to design highly-scalable programs Who this book is for This book is for developers who wish to build high-performance applications and learn about signle-core, multicore programming or distributed concurrency. …”
Libro electrónico -
51733Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: About Performance -- What is performance? …”
Libro electrónico -
51734Publicado 2013“…Apache Hadoop is a freely available open source tool-set that enables big data analysis. This Hadoop Fundamentals LiveLessons tutorial demonstrates the core components of Hadoop including Hadoop Distriuted File Systems (HDFS) and MapReduce. …”
-
51735Publicado 2021Tabla de Contenidos: “…Loading Excel Sheets into Azure SQL Database Tables.-15. Delta Lake -- Part III. Real-Time Analytics in Azure -- 16. …”
Libro electrónico -
51736Publicado 2021“…Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applicationsKey FeaturesGet up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examplesConfigure, manage, and extend Keycloak for optimized securityLeverage Keycloak features to secure different application typesBook DescriptionImplementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. …”
Libro electrónico -
51737Publicado 2018“…This book is a collection of articles that provide an introduction to Ethereum, an open source platform that's based based on blockchain. It enables developers to build and deploy decentralized applications that can be relied on to work without fraud, censorship or interference from third parties. …”
Libro electrónico -
51738Publicado 2021“…We have deliberately arranged these sections in a sequence as each subsequent section builds upon the sections you have completed. This framework enables you to explore more independent concepts easily. …”
Video -
51739Publicado 2021“…The world of finance will fundamentally be changed over the coming decade. The book enables you to become part of the disruption-- not the target of the disruption"--…”
Libro electrónico -
51740Publicado 2021“…These advanced skills enable you to link user accounts, query and store data using a NoSQL database, and access real estate listings and stock prices via web APIs. …”
Libro electrónico