Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 954
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
48341Publicado 2015“…Expert guidance showing you how to: Choose, organize, and configure the tools you need to build Node.js solutions in Visual Studio Apply JavaScript coding practices that help you avoid problems in Node.js Work with callback functions and the Node.js asynchronous programming model Set up a Node.js project and use what you know about MVVM and MVC patterns Control the entire Node.js request/response life cycle Establish site structure, routes, and access to static resources Manage data through caching, forms, IO techniques, and file uploads Integrate data from Microsoft SQL Server and other databases Use Passport to integrate simple, flexible authentication…”
Libro electrónico -
48342Publicado 2015“…The IBM DS8870 is the most advanced model in the IBM DS8000 series and is equipped with IBM POWER7+TM based controllers. Various configuration options are available that scale from dual 2-core systems up to dual 16-core systems with up to 1 TB of cache. …”
Libro electrónico -
48343Publicado 2014“…Follow a request-driven nine-step process to identify and address performance problems in web applications Use performance-related database tools, including data dictionary views, logging, tracing, PL/SQL Hierarchical Profiler, PL/Scope, and RUNSTATS Instrument code to pinpoint performance issues using call stack APIs, error stack APIs, and timing markers Embed PL/SQL in SQL and manage user-defined functions Embed SQL in PL/SQL using a set-based approach to handle large volumes of data Properly write and deploy data manipulation language triggers to avoid performance problems Work with advanced datatypes, including LOBs and XML Use caching techniques to avoid redundant operations Effectively use dynamic SQL to reduce the amount of code needed and streamline system management Manage version control and ensure that performance fixes are successfully deployed Code examples in the book are available for download…”
Libro electrónico -
48344por Zandstra, Matt. author“…In addition to discussing the latest developments in build, test, and continuous integration, this section keeps pace with best practice in version control by focusing on Git, increasingly the developer's system of choice. …”
Publicado 2013
Libro electrónico -
48345Publicado 2014“…It includes experiences from IBM clients and staff and covers the following topics: Architectural design techniques (sizing your environment, single versus multiple installations, physical versus virtual servers, deployment in a large, existing storage infrastructure) Database and server considerations (database backup and restoration methods and scripts, using IBM Data Studio Client for database administration, database placement and relocation, repository sizing and tuning, moving and migrating the server) Alerting, monitoring and reporting (monitoring thresholds and alerts, performance management and analysis of reports, real-time performance monitoring for IBM SAN Volume Controller) Security considerations (Tivoli Storage Productivity Center internal user IDs, user authentication configuration methods, how and why to set up and change passwords, configuring, querying, and testing LDAP and Microsoft Active Directory) Heath checks (server heath and logs, health and recoverability of IBM DB2® databases, using the Database Maintenance tool) Data management techniques (how to spot unusual growth incidents, scripted actions for Tivoli Storage manager and hierarchical storage management) This book is for storage administrators who are responsible for the performance and growth of the IT storage infrastructure…”
Libro electrónico -
48346Publicado 2016“…The book includes everything you need to get started, from launching the software and basic dictating to controlling your desktop by voice, and tips for improving accuracy. …”
Libro electrónico -
48347Publicado 2016“…LEVERAGE THE CLOUD’S SIMPLICITY WITHOUT LOSING CONTROL OR SECURITY Use standards and governance to maximize cloud benefits with minimal risk HARNESS THE PRECIOUS ASSET YOU MUST ALWAYS KEEP CLOSE: DATA Build data-centric operations to deliver the right knowledge, right now, wherever it’s needed…”
Libro electrónico -
48348Publicado 2014“…Stop getting frustrated with administrative issues and start taking control. Professional Microsoft SQL Server 2014 is your roadmap to mastering the update and creating solutions that work…”
Libro electrónico -
48349por Merkow, Mark S.“…Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. …”
Publicado 2019
Libro electrónico -
48350Publicado 2023“…Other topics includes explaining how a centralized policy can control the WAN topology, the forwarding of traffic between edge routers, and insert security services. …”
Video -
48351Publicado 2023“…In China. And, who controlled the bank and guided it during this extraordinary recovery? …”
Libro electrónico -
48352por Ahrend, Rudiger“…In contrast, tax systems that favour debt finance over equity finance have undermined stability by increasing the share of debt, including external debt, in corporate financing. Targeted capital controls on inflows from credit operations have reduced the impact of financial contagion, not least by shifting the structure of external liabilities. …”
Publicado 2012
Capítulo de libro electrónico -
48353Publicado 2021“…However, CPS and autonomy challenge these design methodologies, as more freedom is left to both the environment and the control policies that can be adapted and evolved over time through learning. …”
Libro electrónico -
48354Publicado 2021“…We also thank the CODASPY publicity chairs, workshop chair and general chair, as well as the ACM Special Interest Group on Security, Audit and Control (SIGSAC), for supporting IWSPA '21. Special thanks are also due to Rakesh Verma, former IWSPA chair, for his guidance during the entire process of organizing IWSPA '21…”
Libro electrónico -
48355por Thornburgh, Ralph H.“…Coverage includes: Why Fibre Channel has become the enterprise storage technology of choice Fibre Channel's architecture and six functional levels Fibre Channel Arbitrated Loop (FC-AL) -- an exceptionally effective storage system topology Peripheral devices, logical units, and volume set addressing Essential addressing techniques for integrating Fibre Channel with HP-UX Fibre Channel for Mass Storage introduces Hewlett-Packard's state-of-the-art Fibre Channel product family, beginning with Tachyon(r), the industry's first Fibre Channel controller fully integrated on a single chip. Learn about Hewlett-Packard's Fibre Channel adapters for K-Class, T-Class, D-Class, and V-Class Enterprise Servers and parallel clusters; hubs, disk arrays, SCSI multiplexers, and more. …”
Publicado 1999
Libro electrónico -
48356Publicado 2010“…Coverage includes: Data types and operators Control statements Classes and objects Constructors, destructors, and methods Interfaces, arrays, enumerations, and structures Method and operator overloading Inheritance and virtual methods Reflection and runtime type ID Exception handling Delegates, properties, events, and indexers Attributes Multithreading and the Task Parallel Library Generics LINQ and PLINQ Lambda expressions Anonymous types Extension methods Named and optional arguments Implicitly typed variables I/O, networking, and collections The preprocessor and much, much more…”
Libro electrónico -
48357por Doyle, Jeff (Computer scientist)“…Coverage includes Understanding message types, encapsulation, architecture, LSAs, and LSPs Optimizing addressing, neighbor discovery, adjacencies, and router designation Improving scalability: controlling the scope of flooding, link state database size, SPF calculation efficiency, and much more Designing and operating large-scale networks for maximum security and reliability Hardening networks to thwart attacks against routing protocols Comparing OSPF and IS-IS extensibility Utilizing extensions for MPLS-based traffic engineering, IPv6, and multi-topology routing Troubleshooting OSPF and IS-IS log entries, debug output, and LS databases Doyle's thorough explanations, end-of-chapter review questions, and many wide-ranging examples for both Cisco's IOS and Juniper's JUNOS also make this book an exceptional resource for anyone pursuing a CCIE or JNCIE certification. © Copyright Pearson Education. …”
Publicado 2006
Libro electrónico -
48358Publicado 2012“…101 Spy Gadgets for the Evil Genius, Second Edition: Contains step-by-step instructions and helpful illustrations Provides tips for customizing the projects Covers the underlying principles behind the projects Removes the frustration factor--all required parts are listed Build these and other devious devices: Spy camera Infrared light converter Night vision viewer Phone number decoder Phone spammer jammer Telephone voice changer GPS tracking device Laser spy device Remote control hijacker Camera flash taser Portable alarm system Camera trigger hack Repeating camera timer Sound- and motion-activated cameras Camera zoom extender "-- "This fully updated bestseller will further entice electronic hobbyists to build high-tech devices and counteract some of the spy gadgets available on the market"--…”
Libro electrónico -
48359Publicado 2004“…A intenção é pôr em evidência aspectos relevantes da experiência histórica dos países quanto a ações individuais e coletivas relacionadas à manutenção e à restauração da saúde, bem como ao cuidado, ao controle e à cura das doenças. A preferência pelo local e pelo específico não visa à mitificação das práticas culturais, pois, nas abordagens aqui desenvolvidas, os eventos históricos alcançam significado num quadro de referência mais amplo. …”
Libro electrónico -
48360Publicado 2022“…As a result, the best security any organization can achieve is to establish controls and procedures in conjunction with services that are licensed in the cloud. …”
Libro electrónico