Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 3,441
- Development 2,745
- History 2,709
- Application software 2,127
- Management 1,940
- Engineering & Applied Sciences 1,776
- Gestió de projectes 1,510
- Computer networks 1,289
- Data processing 1,177
- Security measures 1,169
- Computer Science 1,146
- Filosofía 1,108
- Computer security 1,090
- Prevention 1,063
- TFM 1,037
- Computer programs 1,006
- Business & Economics 925
- Artificial intelligence 903
- Computer software 902
- Cloud computing 896
- Education 875
- Design 873
- Història 872
- Universidad Pontificia de Salamanca (España) 860
- Social aspects 807
- Crítica e interpretación 796
- Python (Computer program language) 795
- Project management 784
- Web site development 771
- Computer programming 756
-
125881Publicado 2014“…Les conditions d’accès aux différentes formes des Écritures juives ont également été diverses : les testimonia, les manuscrits annotés et les formes alternatives du texte biblique citées dans des commentaires bibliques ont joué un rôle non négligeable dans l’évolution de l’exégèse et de la théologie des chrétiens de l’Antiquité. Le présent volume dresse l’état de la question et illustre les débats en cours sur la transmission et la réception des Écritures juives dans l’Antiquité. …”
991004495379706719 -
125882por Duran i Tort, Carola“…Digamos que en este libro ha reunido las fotos y solapas que le han parecido más presentables. El resultado es un libro de lectura también compulsiva…”
Publicado 1999
Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
125883Publicado 2007“…Essential C# 2.0 is a clear, concise guide to C#–including the features new to C# 2.0. The book clearly presents material for beginn..…”
Libro electrónico -
125884por Skoudis, Ed“…Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." …”
Publicado 2004
Libro electrónico -
125885Publicado 2006“…He has pioneered the idea of dynamic alignmentwhich is so powerfully presented in this ground-breaking book. If proof were needed that successful companies compete through their supply chain capability, then this fascinating book provides it." …”
Libro electrónico -
125886Publicado 2005“…New commercialsupport services, smaller licensing fees, increased collaboration,and a friendlier platform to sell products and services are just afew of the reasons open source is so attractive to IT departments.Some of the open source projects that are in current, widespreaduse in businesses large and small include Linux, FreeBSD, Apache,MySQL, PostgreSQL, JBOSS, and Perl. …”
Libro electrónico -
125887por Hall, Marty, 1962-“…Within each of these strategies, it shows you how to use form-based or BASIC authentication and how to protect your network traffic with SSL. Part IV covers two features introduced with servlets 2.3: filters and life-cycle events. …”
Publicado 2002
Libro electrónico -
125888Publicado 2001“…Drawing from years of in-the-trenches experience, Herb Sutter provides tested techniques and practical solutions for programmers designing modern software systems with C++, from small projects to enterprise applications. Built around forty programming puzzles, More Exceptional C++ helps you understand the rules and issues critical to successful software design and development in C++. …”
Libro electrónico -
125889Publicado 2021“…Finally, you'll be able to get remote access to target systems and networks using the tools you develop and modify as per your own requirements.By the end of this ethical hacking book, you'll have developed the skills needed for building cybersecurity tools and learned how to secure your systems by thinking like a hacker.What You Will Learn:Understand the core concepts of ethical hackingDevelop custom hacking tools from scratch to be used for ethical hacking purposesDiscover ways to test the cybersecurity of an organization by bypassing protection schemesDevelop attack vectors used in real cybersecurity testsTest the system security of an organization or subject by identifying and exploiting its weaknessesGain and maintain remote access to target systemsFind ways to stay undetected on target systems and local networksWho this book is for:If you want to learn ethical hacking by developing your own tools instead of just using the prebuilt tools, this book is for you. …”
Libro electrónico -
125890por Maraia, Vincent“…Moreira, author of Software Configuration Management Implementation Roadmap and columnist at CM Crossroads "Software configuration management professionals will find this book presents practical ideas for managing code throughout the software development and deployment lifecycles. …”
Publicado 2005
Libro electrónico -
125891Publicado 2007“…Whether you are preparing for CCVP certification or simply want to gain a better understanding of VoIP, you will benefit from the foundation information presented in this book. Cisco Voice over IP is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press®. …”
Libro electrónico -
125892Publicado 2007“…Agile coach and test automation expert Gerard Meszaros describes 68 proven patterns for making tests easier to write, understand, and maintain. …”
Libro electrónico -
125893por Barrett, Diane“…Master and implement general security best practices Systematically identify threats and risks to your systems Harden systems by eliminating nonessential services Secure your communications, networks, and infrastructure Systematically identify and protect against online vulnerabilities Implement effective access control and authentication Create security baselines and audit your security infrastructure Understand cryptographic principles, and effectively deploy cryptographic solutions Organize security from both a technical and organizational standpoint Manage every facet of security, including education and documentation Understand the laws related to IT security, and the basics of forensic investigations Kirk Hausman (CISSP, CISA, CRISC, Security+) has worked as an ISO, consultant, trainer, and IT director. …”
Publicado 2012
Libro electrónico -
125894por Ostermueller, Erik. author“…Following these examples helps you learn to: Assess the performance health of four main problems areas in a Java system: The P.A.t.h. Checklist presents each area with its own set of plug-it-in-now tools Pinpoint the code at fault for CPU and other bottlenecks without a Java profiler Find memory leaks in just minutes using heapSpank, the author's open-source leak detector utility that is freely available from heapSpank.org The repeatable method provided in this book is an antidote to lackluster average response times that are multi-second throughout the industry. …”
Publicado 2017
Libro electrónico -
125895Publicado 2019“…The book finishes with guidance on getting started with Docker in your own projects. You'll walk through some real-world case studies for Docker implementations, from small-scale on-premises apps to very large-scale apps running on Azure. …”
Libro electrónico -
125896Publicado 2017“…Packed with hundreds of high-quality, realistic examples, it presents Linux from the ground up: the clearest explanations and most useful information about everything from filesystems to shells, editors to utilities, and programming tools to regular expressions. …”
Libro electrónico -
125897Publicado 2017“…Coverage includes Explore R, RStudio, and R packages Use R for math: variable types, vectors, calling functions, and more Exploit data structures, including data.frames, matrices, and lists Read many different types of data Create attractive, intuitive statistical graphics Write user-defined functions Control program flow with if, ifelse, and complex checks Improve program efficiency with group manipulations Combine and reshape multiple datasets Manipulate strings using R's facilities and regular expressions Create normal, binomial, and Poisson probability distributions Build linear, generalized linear, and nonlinear models Program basic statistics: mean, standard deviation, and t-tests Train machine learning models Assess the quality of models and variable selection Prevent overfitting and perform variable selection, using the Elastic Net and Bayesian methods Analyze univariate and multivariate time series data Group data via K-means and hierarchical clustering Prepare reports, slideshows, and web pages with knitr Display interactive data with..…”
Libro electrónico -
125898Publicado 2017“…Next, you'll see how macros can simplify code generation, and how to compose bigger projects with modules and crates. Finally, you'll discover how we can write safe concurrent code in Rust and interface with C programs, get a view of the Rust ecosystem,..…”
Libro electrónico -
125899Publicado 2017“…Throughout, Graziani presents command syntax for Cisco IOS, Windows, Linux, and Mac OS, as well as many examples, diagrams, configuration tips, and updated links to white papers and official RFCs for even deeper understanding. …”
Libro electrónico -
125900Publicado 2018“…This book is for you if you want to be a project manager or get involv..…”
Libro electrónico