Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 21,783
- Història 9,630
- History 6,953
- Biblia 5,801
- Església Catòlica 4,468
- Filosofía 4,333
- Crítica e interpretación 4,158
- Iglesia Católica 3,873
- Economic conditions 3,756
- Management 3,373
- Bíblia 3,161
- Goigs 3,059
- Sermones 2,951
- Teología 2,867
- Development 2,866
- Economic policy 2,788
- Música 2,723
- Education 2,607
- Engineering & Applied Sciences 2,607
- Business & Economics 2,595
- Oración 2,541
- Derecho 2,498
- Teología dogmática 2,363
- Litúrgia 2,345
- Liturgia 2,293
- Moral cristiana 2,208
- Filosofia 2,167
- Teatro español 2,139
- Educación 2,103
- Application software 2,064
-
545181por Bouzid, Mohamed. author“…Webpack has become one of the most popular module bundlers in recent years; it’s widely used by developers, companies, and organizations of all sizes, and many web frameworks use it for the management of their assets. …”
Publicado 2020
Libro electrónico -
545182Publicado 2020“…In this mini-encyclopedia, third-generation programmer Matthew Parker introduces you to 27 successful patterns used in organizations that follow distinctive methodologies such as Scrum, Extreme Programming, SAFe (Scaled Agile Framework), and others. …”
Libro electrónico -
545183Publicado 2012“…W trakcie lektury poznasz najlepsze sposoby projektowania wydajnej sieci SOHO VoIP oraz wykorzystania adresów IPv6. Twoją szczególną ciekawość powinny wzbudzić rozdziały poświęcone bezpieczeństwu. …”
Libro electrónico -
545184
-
545185Publicado 2018Tabla de Contenidos: “…-- 5.1.1 Early symmetric cryptography -- 5.1.2 Diffie-Hellman and RSA -- 5.1.3 Public-key infrastructures -- 5.1.4 SSL and TLS -- 5.2 Understanding SSL/TLS -- 5.2.1 The certificate chain -- 5.2.2 The TLS handshake -- 5.2.3 Perfect forward secrecy -- 5.3 Getting applications to use HTTPS -- 5.3.1 Obtaining certificates from AWS -- 5.3.2 Obtaining certificates from Let's Encrypt -- 5.3.3 Enabling HTTPS on AWS ELB -- 5.4 Modernizing HTTPS -- 5.4.1 Testing TLS -- 5.4.2 Implementing Mozilla's Modern guidelines -- 5.4.3 HSTS: Strict Transport Security -- 5.4.4 HPKP: Public Key Pinning -- Summary -- Chapter 6: Security layer 4: securing the delivery pipeline -- 6.1 Access control to code-management infrastructure -- 6.1.1 Managing permissions in a GitHub organization…”
Libro electrónico -
545186Publicado 2016“…Since its inception, the development of resilience engineering as a concept and a field of practice has insisted on expanding the scope from a preoccupation with failure to include also the acceptable everyday functioning of a system or an organisation. The preoccupation with failures and adverse outcomes focuses on situations where something goes wrong and the tries to keep the number of such events and their (adverse) outcomes as low as possible. …”
Libro electrónico -
545187
-
545188Publicado 2020“…This report demonstrates the market opportunity for conversational AI and outlines the use cases that will enhance your customer service and drive value across your organization. IBM AI experts Vivian Lee, Brian Loveys, Aameek Singh, and Robert Yates show customer service executives and line-of-business professionals how enterprises are applying conversational AI and how they can integrate it into their business in three areas: customer-facing AI assistants, agent-supporting AI assistants, and internal employee-facing assistants. …”
Libro electrónico -
545189Publicado 2020“…SQL injection is a serious web security risk for many organizations used to gather sensitive information from websites. …”
-
545190
-
545191Publicado 2018Libro electrónico
-
545192Publicado 2020“…This report examines 10 organizations that have implemented continuous delivery in the real world. …”
Libro electrónico -
545193
-
545194Publicado 2020“…Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide presents you with an organized test-preparation routine using proven series elements and techniques. …”
Libro electrónico -
545195Publicado 2020Tabla de Contenidos: “…Chapter 1: General Security Concepts and Trends -- Chapter 2: Network Fundamentals Infrastructure Security -- Chapter 3: Wireless and Intrusion Detection System Network Security -- Chapter 4: Role of People in Security—Operational and Organizational Security -- Chapter 5: Risk Management -- Chapter 6: Change Management and Disaster Recovery -- Chapter 7: Physical Security -- Chapter 8: Forensics, Legal Issues, and Privacy -- Chapter 9: Attacks -- Chapter 10: Network Attacks -- Chapter 11: Baseline and Secure Software Development -- Chapter 12: Email, Instant Messaging, and Web Components -- Chapter 13: Authentication and Remote Access -- Chapter 14: Access Control and Privilege Management -- Chapter 15: Cryptography -- Chapter 16: Public Key Infrastructure -- Glossary…”
Libro electrónico -
545196Publicado 2019Tabla de Contenidos: “…Modules and program organization -- 4.1. Basics of module creation and use -- 4.2. …”
Libro electrónico -
545197
-
545198Publicado 2019“…The most successful organizations today use cloud native to develop innovative software products and services with speed and scalability not possible with the static waterfall development method. …”
Libro electrónico -
545199Publicado 2019“…Off loading to physical tape behind a TS7700 is utilized by hundreds of organizations around the world. Using the same hierarchical storage techniques, the TS7700 can also off load to object storage. …”
Libro electrónico -
545200Publicado 2019Libro electrónico