Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,665
- Bible 1,923
- Bíblia 1,428
- Historia 1,177
- RELIGION 1,042
- Development 808
- Application software 802
- Engineering & Applied Sciences 770
- Management 648
- Crítica e interpretación 551
- Computer Science 516
- Història 512
- History 456
- Computer networks 447
- Mss 430
- Data processing 412
- Cloud computing 375
- Criticism, interpretation, etc 374
- Computer programs 371
- Operating systems (Computers) 348
- Programming 343
- Comentarios 304
- Security measures 276
- Artificial intelligence 272
- Business & Economics 271
- Crítica, interpretación, etc 266
- Database management 262
- Testigos de Jehová 262
- iOS (Electronic resource) 261
- Crítica, interpretació, etc 249
-
52681Publicado 2015“…Quickly start a new Django project and establish a strong foundation for a growing site Define how your data is organized and create a SQLite database to manage it Quickly produce HTML with Django templates Create dynamic webpages with Django’s URL patterns and views, including function views, class-based views, and generic views Enable efficient, reliable data input with Django Forms and custom form validations Understand the Model-View-Controller (MVC) architecture, compare it to Model-Template-Views, and gain a holistic understanding of Django’s structure Write as little code as possible, simplify code reuse, and mitigate software decay by adhering to the Don’t Repeat Yourself paradigm. …”
Libro electrónico -
52682Publicado 2023“…Business Intelligence Career Master Plan explores key skills like stacks, coursework, certifications, and interview advice, enabling you to make informed decisions about your BI journey. …”
Libro electrónico -
52683Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credit -- Dedicated -- Contributors -- Table of Contents -- Preface -- Part 1: Persistence in Cloud Computing - Storing and Managing Data in Modern Software Architecture -- Chapter 1: The History of Data Storage - From the Caves to the Cloud -- Why do databases exist? …”
Libro electrónico -
52684Publicado 2024“…Following the defense in depth principle, the book shifts focus to network security and introduces different types of constructs that enable micro-segmentation, as they are implemented in a software-defined network. …”
Libro electrónico -
52685Publicado 2003“…Hands-on practice for the CCNP Troubleshooting exam with TCP/IP, LAN, and WAN trouble tickets based on Cisco Internetwork Troubleshooting (CIT) topics With this book, you can: Set up and follow along with real-world lab scenarios aligned to each exam topic, with or without the actual equipment Establish a baseline and document your physical and logical network Identify troubleshooting targets using ping, trace, show, clear, debug, and other troubleshooting tools and utilities Diagnose and troubleshoot actual problems by following along with author-provided Catalyst(r) OS and Cisco IOS(r) Software command input, output, and logging Use instructor-developed problem-isolation methods to resolve Trouble Tickets "Sniff" the wire to spot network issues Analyze local and remote access problems in Ethernet networks, including issues with cabling, speed and duplex, utilization and collisions, bandwidth, CSMA/CD, one-way link, auto negotiation, addressing, encapsulation, and more Apply a layered troubleshooting methodology to real-life routing and switching environments Designed for aspiring CCNP and CCIE(r) professionals, this indispensable lab guide builds on Cisco(r) Internetwork Troubleshooting (CIT) topics that prepare you for the CCNP Troubleshooting exam. …”
Libro electrónico -
52686Publicado 2007“…Also, I love how the authors discuss the underlying architecture, enabling me to get a really deep understanding of the technology to efficiently design and build my own projects.” …”
Libro electrónico -
52687Publicado 2006“…This book helps you implement host IPS appropriately, giving your organization better protection from the various threats that are impacting your business while at the same time enabling you to comply with various legal requirements put forth in such legislati..…”
Libro electrónico -
52688Publicado 2008“…The authors cover the technologies new to Windows 2008, such as IPv6, Network Access Protection (NAP), Network Policy Server (NPS), Terminal Services Remote Programs, Windows Deployment Services (WDS), Hyper-V virtualization, and more! …”
Libro electrónico -
52689por Lee, Kok-Keong“…The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAs More companies are building networks with the intention of using them to conduct business. …”
Publicado 2005
Libro electrónico -
52690Publicado 2008“…Using a straightforward, step-by-step approach, each lesson in this book builds on the previous ones, enabling you to learn the essentials of Photoshop, Illustrator, InDesign, Flash, Dreamweaver, Acrobat, and Bridge from the ground up. …”
Libro electrónico -
52691por Johnson, Michael K.“…Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples…”
Publicado 2005
Libro electrónico -
52692Publicado 2003“…Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. …”
Libro electrónico -
52693Publicado 2008“…Adopting the techniques and strategies outlined in this book enables you to prevent day-zero attacks, improve your overall security posture, build strong policies, and deploy intelligent, self-defending networks. …”
Libro electrónico -
52694“…This easy-to-use family of threat mitigation appliances enables you to centralize, detect, mitigate, and report on priority threats by leveraging the network and security devices already deployed in a network, even if the devices are from multiple vendors. …”
Libro electrónico -
52695por Jepson, Brian, 1967-“…This concise book will ease you into the Unix innards of Mac OS X Panther, covering such topics as: A quick overview of the Terminal application, including Terminal alternatives like iTerm and GLterm Understanding Open Directory (LDAP) and NetInfo Issues related to using the GNU C Compiler (GCC) Library linking and porting Unix software An overview of Mac OS X Panther's filesystem and startup processes Creating and installing packages using Fink and Darwin Ports Building the Darwin kernel Using the Apple® X11 distribution for running X Windows® applications on top of Mac OS X The book wraps up with a quick manpage-style reference to the "Missing Manual Pages" --commands that come with Mac OS X Panther, although there are no manpages. …”
Publicado 2004
Libro electrónico -
52696por Logan, Syd“…Coverage includes Policies and procedures used by Netscape, enabling them to ship Web browsers to millions of users on Windows, Mac OS, and Linux Delivering functionality and interfaces that are consistent on all platforms Understanding key similarities and differences among leading platform-specific GUI APIs, including Win32/.NET, Cocoa, and Gtk+ Determining when and when not to use native IDEs and how to limit their impact on portability Leveraging standards-based APIs, including POSIX and STL Avoiding hidden portability pitfalls associated with floating point, char types, data serialization, and types in C++ Utilizing platform abstraction libraries such as the Netscape Portable Runtime (NSPR) Establishing an effective cross-platform bug reporting and tracking system Creating builds for multiple platforms and detecting build failures across platforms when they occur Understanding the native runtime environment and its impact on installation Utilizing wxWidgets to create multi-platform GUI applications from a single code base Thoroughly testing application portability Understanding cross-platform GUI toolkit design with Trixul…”
Publicado 2008
Libro electrónico -
52697por Anderson, Don, 1953-“…It is a high-speed, low latency, point-to-point, packetized link that enables chips to transfer data at peak rates of up to 12.8 Gigabytes per second, far greater than existing bus technologies. …”
Publicado 2003
Libro electrónico -
52698Publicado 2005“…Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks Understand the service-level requirements of voice, video, and data applications Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation Learn about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations Learn how to protect voice, video, and data traffic using various QoS mechanisms Evaluate design recommendations for protecting voice, video, and multiple classes of data while mitigating DoS/worm attacks for the following network infrastructure architectures: campus LAN, private WAN, MPLS VPN, and IPSec VPN Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. …”
Libro electrónico -
52699por Beauchemin, Bob“…—David Chappell, Principal of Chappell & Associates Microsoft's ADO.NET enables Windows-based applications to access many types of databases from a variety of different vendors. …”
Publicado 2002
Libro electrónico -
52700por Clark, Tom, 1947 August 12-“…The new Fibre Channel, IP, and virtualization initiatives covered in this work will enable customers to implement comprehensive shared storage solutions that reduce management overhead and cost." …”
Publicado 2003
Libro electrónico