Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,665
- Bible 1,923
- Bíblia 1,428
- Historia 1,177
- RELIGION 1,042
- Development 808
- Application software 802
- Engineering & Applied Sciences 770
- Management 648
- Crítica e interpretación 551
- Computer Science 516
- Història 512
- History 456
- Computer networks 447
- Mss 430
- Data processing 412
- Cloud computing 375
- Criticism, interpretation, etc 374
- Computer programs 371
- Operating systems (Computers) 348
- Programming 343
- Comentarios 304
- Security measures 276
- Artificial intelligence 272
- Business & Economics 271
- Crítica, interpretación, etc 266
- Database management 262
- Testigos de Jehová 262
- iOS (Electronic resource) 261
- Crítica, interpretació, etc 249
-
52381por Kaza, Ramesh“…A guide to successful deployment of the Cisco IP Telephony solution Real-world case studies from the Cisco design consulting engineers who developed the PDIOO process provide practical advice on all stages of successful IPT deployment Concise understanding of the PDIOO phases enables architects and engineers to successfully deploy the Cisco IPT solution Division of the process into PDIOO phases provides a logical and defined guide for network engineers and architects as they proceed through each of the phases in deploying the Cisco IPT solution Includes detailed questionnaires for each phase of deployment in the PDIOO cycle—a great aid in understanding customer networks and requirements Network infrastructure design, call processing infrastructure design and applications, and voice-mail system design are covered in depth Cisco® IP Telephony (IPT) solutions are being deployed at an accelerated rate, and network architects and engineers need to understand the various phases involved in successful deployment: planning, design, implementation, operation, and optimization (PDIOO). …”
Publicado 2004
Libro electrónico -
52382por Fleishman, Glenn“…What are the steps for connecting an Apple TV to a network?…”
Publicado 2007
Libro electrónico -
52383por Edney, Jon“…"This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN." …”
Publicado 2004
Libro electrónico -
52384Publicado 2010“…Discover how to • Get your next job in software development • Master the nontechnical skills crucial to your success • “Work the org” to move up rapidly • Successfully manage your time, projects, and life • Avoid “killer” mistakes that could destroy your career • Move up to “medium-shot,” “big-shot,” and finally, “visionary” • Launch your own winning software company Exclusive interviews with Steve Wozniak , Inventor, Apple computer John Schwarz , CEO, Business Objects James Gosling , Inventor, Java programming language Marissa Mayer , Google VP, Search Products and User Experience Jon Bentley , Author, Programming Pearls Marc Benioff , CEO and founder, Salesforce.com Grady Booch , IBM Fellow and co-founder Rational Software Bjarne Stroustrup , Inventor, C++ programming language David Vaskevitch , Microsoft CTO Linus Torvalds , Creator, Linux operating system kernel Richard Stallman , Founder, Free software movement Peter Norvig , Google’s Director of Research Mark Russinovich , Microsoft Fellow and Windows Architect Tom Malloy , Adobe Chief Software Architect Diane Greene , Co-founder and past CEO of VMware Robert Kahn , Co-inventor, the Internet Ray Tomlinson , Inventor, email…”
Libro electrónico -
52385Publicado 2009“…Coverage includes • Viewing virtualization from the attacker’s perspective, and understanding the new security problems it can introduce • Discovering which security threats the vmkernel does (and doesn’t) address • Learning how VMsafe enables third-party security tools to access the vmkernel API • Understanding the security implications of VMI, paravirtualization, and VMware Tools • Securing virtualized storage: authentication, disk encryption, virtual storage networks, isolation, and more • Protecting clustered virtual environments that use VMware High Availability, Dynamic Resource Scheduling, Fault Tolerance, vMotion, and Storage vMotion • Securing the deployment and management of virtual machines across the network • Mitigating risks associated with backup, performance management, and other day-to-day operations • Using multiple security zones and other advanced virtual network techniques • Securing Virtual Desktop Infrastructure (VDI) • Auditing virtual infrastructure, and conducting forensic investigations after a possible breach informit.com/ph www.Astroarch.com…”
Libro electrónico -
52386por Kasian-Lew, Dionne“…In The Social Executive, readers are given evidence-based, data-driven strategies for mastering social media, and using it to enable business success. This book's easy, straightforward, practical style ensures that you will gain a solid working platform in the shortest amount of time possible. …”
Publicado 2014
Libro electrónico -
52387por Qin, MélonyTabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Cluster Architecture, Installation, and Configuration -- Chapter 1: Kubernetes Overview -- CKA exam overview -- What to expect in your CKA exam -- CKA exam tips and tricks -- Cluster architecture and components -- Kubernetes core concepts -- Containerized workloads -- Container images -- Container registry -- Container runtimes -- Kubernetes basic workflow -- Kubernetes plugin model -- Kubernetes API primitives -- Sharing a cluster with namespaces…”
Publicado 2022
Libro electrónico -
52388Publicado 2022Tabla de Contenidos: “…Table of Contents Introduction to Sequelize and ORM in Node.js Defining and Using Sequelize Models Validating Models Associating Models Adding Hooks and Lifecycle Events to Your Models Implementing Transactions with Sequelize Handling Customized, JSON, and Blob Data Types Logging and Monitoring Your Application Using and Creating Adapters Deploying a Sequelize Application…”
Libro electrónico -
52389Publicado 2023Tabla de Contenidos: “…Table of Contents Introduction to Data Ingestion Principals of Data Access – Accessing your Data Data Discovery – Understanding Our Data Before Ingesting It Reading CSV and JSON Files and Solving Problems Ingesting Data from Structured and Unstructured Databases Using PySpark with Defined and Non-Defined Schemas Ingesting Analytical Data Designing Monitored Data Workflows Putting Everything Together with Airflow Logging and Monitoring Your Data Ingest in Airflow Automating Your Data Ingestion Pipelines Using Data Observability for Debugging, Error Handling, and Preventing Downtime…”
Libro electrónico -
52390Publicado 2023“…This book offers step-by-step guidance on using various quantum algorithm frameworks within a Python environment, enabling you to tackle business challenges in finance. …”
Libro electrónico -
52391Publicado 2021“…No-code automation will enable you to increase productivity by automating these tasks. …”
Libro electrónico -
52392Publicado 2016“…IBM Spectrum ArchiveTM EE enables the use of the LTFS for the policy management of tape as a storage tier in a IBM Spectrum ScaleTM (formerly IBM General Parallel File System (IBM GPFSTM)) based environment and helps encourage the use of tape as a critical tier in the storage environment. …”
Libro electrónico -
52393Publicado 2017“…IBM Spectrum ArchiveTM EE enables the use of the LTFS for the policy management of tape as a storage tier in an IBM Spectrum ScaleTM based environment and helps encourage the use of tape as a critical tier in the storage environment. …”
Libro electrónico -
52394Publicado 2017“…A full index of the Regulation, enabling you to find relevant Articles quickly and easily…”
Libro electrónico -
52395Publicado 2015“…Whether you're moving to modern Swift from Objective-C, from older versions of the Swift language, or from the world of non-Apple languages, this guide will help you master both the "how" and "why" of effective Swift development. …”
Libro electrónico -
52396por Box, Alison“…After working through this book, you will have extended your knowledge of Power BI to an expert level, alleviating your existing frustrations and so enabling you to design Power BI reports where you are no longer limited by your lack of knowledge or experience…”
Publicado 2023
Libro electrónico -
52397Publicado 2018“…El británico Kim Philby (1912-1988) está considerado el agente doble más importante de la historia del siglo XX. …”
Libro -
52398por Weisman, Steve“…· The truth about recognizing today’s newest scams--online and off · The truth about safeguarding your money, health, and reputation · The truth about phishing, vishing, pharming, slamming, and more Scams have always been with us, and they always will be - except now, technology makes scammers' jobs even easier, enabling them to reach out from anywhere around the world, and take advantage of more people than ever before. …”
Publicado 2008
Libro electrónico -
52399Publicado 2006“…For enterprises, they enable right-sourcing of WAN services and yield generous operational cost savings. …”
Libro electrónico -
52400por Apte, Naresh“…Web services: what they are, and how they can solve business problems Enabling Internet-based services to find each other and interact programmatically, wherever they are—securely E-Speak service development, deployment, and discovery Comparative survey of competitive initiatives and technologies such as CORBA, J2EE, ebXML, UDDI, and .NET Key concepts: client and service interactions, vocabularies, contracts, service composition; the multicore environment; persistence, events, messages, and HP's "E-Services Village" service registry E-Speak's transformation into HP Web Services Platform—a standards-based, highly interoperable platform for Internet service delivery Web Services: A Java Developer's Guide Using E-Speak contains Java code examples throughout. …”
Publicado 2002
Libro electrónico