Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 954
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
47221Publicado 2008“…Der Blick unter die Haube von Model, View und Controller vermittelt Ihnen solides Wissen über die zugrunde liegenden Techniken, so dass Sie die Architektur Ihrer Anwendung flexibel an Ihre Bedürfnisse anpassen können. …”
Libro electrónico -
47222Publicado 2010“…Moreover, the radio frequency (RF) transceiver nodes of such networks require the design of transmitter and receiver equipped with high performance building blocks including antennas, power and low noise amplifiers, mixers and voltage controlled oscillators. Nowadays, the researchers are facing several challenges to design such building blocks while complying with ultra low power consumption, small area and high performance constraints. …”
Libro electrónico -
47223Publicado 2009“…In den letzten Jahren wird in Deutschland und in den Niederlanden über kaum ein anderes Thema derart intensiv und kontrovers diskutiert wie über die Integration von Zuwanderern. …”
Libro electrónico -
47224por Topley, Kim“…It provides complete coverage of all aspects of the language, including Language syntax Tools you can use to develop, debug, and deploy JavaFX applications User interface classes Animation How to play audio and video How to use RESTful Web services and databases to retrieve the data for your application How to create custom components Transformations User interface basics, attributes, events,and controls JavaFX and networking JavaFX development with NetBeans and Eclipse Packaging and deployment Topley highlights critical topics that other books gloss over, presents detailed examples that stretch JavaFX to its limits, and shows you exactly how to build on the skills you already have. …”
Publicado 2010
Libro electrónico -
47225Publicado 2013“…You will cover drawing in Anime Studio Pro, creating and controlling bones, rigging, animation, and adding special effects. …”
-
47226Publicado 2011“…Maximize your performance on the exam by learning to: Deploy or upgrade domain controllers, domains, and forests for Windows Server 2008 R2 Manage user accounts and groups with Windows PowerShell Implement Group Policy; configure software and security settings Configure DNS settings and zones Manage authentication Plan and manage Active Directory replication Monitor and ensure availability of directory services PRACTICE TESTS Assess your skills with practice tests. …”
Libro electrónico -
47227Publicado 2014“…This video tutorial will also show you how to use interface controls, animate the main view, and add user preferences and interface methods. …”
-
47228Publicado 2018“…Leverage Docker to deploying software at scale Key Features Leverage practical examples to manage containers efficiently Integrate with orchestration tools such as Kubernetes for controlled deployments Learn to implement best practices on improving efficiency and security of containers Book Description Docker is an open source platform for building, shipping, managing, and securing containers. …”
Libro electrónico -
47229Publicado 2019“…. - Introduces penetration testing as an exploitative test technique to check whether a target system's security controls can be defeated; - Written by a wide range of industry experts from academics to practising penetration testers to information security managers, with support from CREST (accreditation and certification body for information security industry); - Covers insights from across the penetration testing process, from initial set up to reporting results and acting on them. --- "This is the first time I’ve encountered a book which manages to combine properly researched good practice for penetration testing with the real requirements of the business community...The authors really know their stuff and I found myself nodding and smiling many times in every chapter. …”
Libro electrónico -
47230Publicado 2017“…You will see firsthand how an ethical hacker performs initial reconnaissance of a victim, how to assess systems, network security controls, and security posture. With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies used to assess and compromise a network. …”
-
47231Publicado 2016“…You will learn how sensors and controllers embedded in everyday objects and connected to the Internet of Things (IoT) can monitor, track, and analyze your use of electricity, fuel, and water. …”
Libro electrónico -
47232por Jungck, Peder“…Such application requirements translate to requirements for a network programming language that leverages massively-parallel systems and ensures a high level of security, while representing networking protocols and transactions in the simplest way possible. packetC meets these requirements with an intuitive approach to coarse-grained parallelism, with strong-typing and controlled memory access for security and with new data types and operators that express the classic operations of the network-oriented world in familiar programming terms. …”
Publicado 2011
Libro electrónico -
47233Publicado 2009“…Designed to develop and enhance hands-on skills, each video guides you through essential tasks, including Creating, linking, and enforcing Group Policy Objects Managing Group Policy Objects through administrative templates and ADMX/ADML files Updating Group Policy Objects with background and foreground refreshes Configuring block inheritance Controlling Group Policy Objects with security filtering and item-level targeting Administering Group Policy with templates and containers Managing Group Policy Objects through delegation Troubleshooting with RSOP and GPRESULT System Requirements: Microsoft Windows XP, 2000, or Vista Apple OS 9 or later Linux operating systems that have a web browser with Flash 7 or later plug-in Speakers or headphones Color display with a minimum 1024x768 resolution 1 GHz or faster CPU recommended DVD drive Category: Microsoft Certification Covers: Group Policy…”
-
47234Publicado 2014“…John Pepper, Former CEO & Chairman P&G; Former Chairman Walt Disney From motivating a team and developing star talent to controlling budgets and fostering innovation, The Financial Times Guide to Management is your authoritative guide to becoming an effective manager. …”
Libro electrónico -
47235Publicado 2014“…Focusing on Blender 2.71 and above, 3D-professional Oliver Villar explains all the basics, including Blender’s interface, controls, and how to manipulate objects. Once you’ve mastered the fundamentals, you’ll follow a realistic 3D workflow through a complete project. …”
Libro electrónico -
47236Publicado 2011“…Un manuel d'apprentissage pour les étudiants : licence et master des cycles universitaires généraux, BTS, IUT, licences et masters spécialisées (gestion, management, sciences comptables, contrôle de gestion, audit), candidats aux examens comptables (DCG, DSCG, DEC). …”
Libro electrónico -
47237Publicado 2012“…In addition to learning the key elements of the Illustrator interface, this completely revised CS6 edition covers the new tracing engine with improved shape and color recognition, a new pattern toolset with on-artboard controls and one-click tiling, a completely overhauled performance engine and modernized user interface for working more efficiently and intuitively, and more. …”
Libro electrónico -
47238Publicado 2014“…Phil Jenni had been in an abusive relationship with Ed for far too long. He controlled Jenni's life, distorted her self-image, and tried to physically harm her throughout their long affair. …”
Grabación no musical -
47239Publicado 2003“…Phil Jenni had been in an abusive relationship with Ed for far too long. He controlled Jenni’s life, distorted her self-image, and tried to physically harm her throughout their long affair. …”
Grabación de sonido -
47240