Mostrando 125,881 - 125,900 Resultados de 127,182 Para Buscar 'Prowent~', tiempo de consulta: 1.61s Limitar resultados
  1. 125881
    Publicado 2014
    “…Les conditions d’accès aux différentes formes des Écritures juives ont également été diverses : les testimonia, les manuscrits annotés et les formes alternatives du texte biblique citées dans des commentaires bibliques ont joué un rôle non négligeable dans l’évolution de l’exégèse et de la théologie des chrétiens de l’Antiquité. Le présent volume dresse l’état de la question et illustre les débats en cours sur la transmission et la réception des Écritures juives dans l’Antiquité. …”
    991004495379706719
  2. 125882
    por Duran i Tort, Carola
    Publicado 1999
    “…Digamos que en este libro ha reunido las fotos y solapas que le han parecido más presentables. El resultado es un libro de lectura también compulsiva…”
    Libro
  3. 125883
    Publicado 2007
    “…Essential C# 2.0 is a clear, concise guide to C#–including the features new to C# 2.0. The book clearly presents material for beginn..…”
    Libro electrónico
  4. 125884
    por Skoudis, Ed
    Publicado 2004
    “…Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." …”
    Libro electrónico
  5. 125885
    Publicado 2006
    “…He has pioneered the idea of dynamic alignmentwhich is so powerfully presented in this ground-breaking book. If proof were needed that successful companies compete through their supply chain capability, then this fascinating book provides it." …”
    Libro electrónico
  6. 125886
    Publicado 2005
    “…New commercialsupport services, smaller licensing fees, increased collaboration,and a friendlier platform to sell products and services are just afew of the reasons open source is so attractive to IT departments.Some of the open source projects that are in current, widespreaduse in businesses large and small include Linux, FreeBSD, Apache,MySQL, PostgreSQL, JBOSS, and Perl. …”
    Libro electrónico
  7. 125887
    por Hall, Marty, 1962-
    Publicado 2002
    “…Within each of these strategies, it shows you how to use form-based or BASIC authentication and how to protect your network traffic with SSL. Part IV covers two features introduced with servlets 2.3: filters and life-cycle events. …”
    Libro electrónico
  8. 125888
    Publicado 2001
    “…Drawing from years of in-the-trenches experience, Herb Sutter provides tested techniques and practical solutions for programmers designing modern software systems with C++, from small projects to enterprise applications. Built around forty programming puzzles, More Exceptional C++ helps you understand the rules and issues critical to successful software design and development in C++. …”
    Libro electrónico
  9. 125889
    Publicado 2021
    “…Finally, you'll be able to get remote access to target systems and networks using the tools you develop and modify as per your own requirements.By the end of this ethical hacking book, you'll have developed the skills needed for building cybersecurity tools and learned how to secure your systems by thinking like a hacker.What You Will Learn:Understand the core concepts of ethical hackingDevelop custom hacking tools from scratch to be used for ethical hacking purposesDiscover ways to test the cybersecurity of an organization by bypassing protection schemesDevelop attack vectors used in real cybersecurity testsTest the system security of an organization or subject by identifying and exploiting its weaknessesGain and maintain remote access to target systemsFind ways to stay undetected on target systems and local networksWho this book is for:If you want to learn ethical hacking by developing your own tools instead of just using the prebuilt tools, this book is for you. …”
    Libro electrónico
  10. 125890
    por Maraia, Vincent
    Publicado 2005
    “…Moreira, author of Software Configuration Management Implementation Roadmap and columnist at CM Crossroads "Software configuration management professionals will find this book presents practical ideas for managing code throughout the software development and deployment lifecycles. …”
    Libro electrónico
  11. 125891
    Publicado 2007
    “…Whether you are preparing for CCVP certification or simply want to gain a better understanding of VoIP, you will benefit from the foundation information presented in this book. Cisco Voice over IP is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press®. …”
    Libro electrónico
  12. 125892
    Publicado 2007
    “…Agile coach and test automation expert Gerard Meszaros describes 68 proven patterns for making tests easier to write, understand, and maintain. …”
    Libro electrónico
  13. 125893
    por Barrett, Diane
    Publicado 2012
    “…Master and implement general security best practices Systematically identify threats and risks to your systems Harden systems by eliminating nonessential services Secure your communications, networks, and infrastructure Systematically identify and protect against online vulnerabilities Implement effective access control and authentication Create security baselines and audit your security infrastructure Understand cryptographic principles, and effectively deploy cryptographic solutions Organize security from both a technical and organizational standpoint Manage every facet of security, including education and documentation Understand the laws related to IT security, and the basics of forensic investigations Kirk Hausman (CISSP, CISA, CRISC, Security+) has worked as an ISO, consultant, trainer, and IT director. …”
    Libro electrónico
  14. 125894
    por Ostermueller, Erik. author
    Publicado 2017
    “…Following these examples helps you learn to: Assess the performance health of four main problems areas in a Java system: The P.A.t.h. Checklist presents each area with its own set of plug-it-in-now tools Pinpoint the code at fault for CPU and other bottlenecks without a Java profiler Find memory leaks in just minutes using heapSpank, the author's open-source leak detector utility that is freely available from heapSpank.org The repeatable method provided in this book is an antidote to lackluster average response times that are multi-second throughout the industry. …”
    Libro electrónico
  15. 125895
    Publicado 2019
    “…The book finishes with guidance on getting started with Docker in your own projects. You'll walk through some real-world case studies for Docker implementations, from small-scale on-premises apps to very large-scale apps running on Azure. …”
    Libro electrónico
  16. 125896
    Publicado 2017
    “…Packed with hundreds of high-quality, realistic examples, it presents Linux from the ground up: the clearest explanations and most useful information about everything from filesystems to shells, editors to utilities, and programming tools to regular expressions. …”
    Libro electrónico
  17. 125897
    Publicado 2017
    “…Coverage includes Explore R, RStudio, and R packages Use R for math: variable types, vectors, calling functions, and more Exploit data structures, including data.frames, matrices, and lists Read many different types of data Create attractive, intuitive statistical graphics Write user-defined functions Control program flow with if, ifelse, and complex checks Improve program efficiency with group manipulations Combine and reshape multiple datasets Manipulate strings using R's facilities and regular expressions Create normal, binomial, and Poisson probability distributions Build linear, generalized linear, and nonlinear models Program basic statistics: mean, standard deviation, and t-tests Train machine learning models Assess the quality of models and variable selection Prevent overfitting and perform variable selection, using the Elastic Net and Bayesian methods Analyze univariate and multivariate time series data Group data via K-means and hierarchical clustering Prepare reports, slideshows, and web pages with knitr Display interactive data with..…”
    Libro electrónico
  18. 125898
    Publicado 2017
    “…Next, you'll see how macros can simplify code generation, and how to compose bigger projects with modules and crates. Finally, you'll discover how we can write safe concurrent code in Rust and interface with C programs, get a view of the Rust ecosystem,..…”
    Libro electrónico
  19. 125899
    Publicado 2017
    “…Throughout, Graziani presents command syntax for Cisco IOS, Windows, Linux, and Mac OS, as well as many examples, diagrams, configuration tips, and updated links to white papers and official RFCs for even deeper understanding. …”
    Libro electrónico
  20. 125900
    Publicado 2018
    “…This book is for you if you want to be a project manager or get involv..…”
    Libro electrónico