Mostrando 26,361 - 26,380 Resultados de 27,041 Para Buscar 'RTL9~', tiempo de consulta: 0.92s Limitar resultados
  1. 26361
    Publicado 2023
    “…Moreover, you'll gain a thorough understanding of user stories, their role in Agile development, and how to use them to plan and manage products effectively. …”
    Libro electrónico
  2. 26362
    Publicado 2023
    “…The purpose of this open access edited collection is to discuss the role and importance of stakeholder engagement in a sustainable circular economy from multiple theoretical and practical perspectives. …”
    Libro electrónico
  3. 26363
    Publicado 2024
    Tabla de Contenidos: “…Chapter 3: Integrating Application Protocols -- Technical requirements -- Installing Mosquitto -- Installing Client for URL (cURL) -- Application protocols and they fit into the picture -- The different types of application protocols -- An exercise to create a pub/sub MQTT broker -- Requirements for application protocols -- Reliability -- Power usage -- Security -- Integrating application protocols into the design -- A simple integration into the smart thermostat network -- A cloud scenario -- Multiple clients -- Practical - creating an MQTT pub and sub communication between an ESP32 and a Raspberry Pi -- Setting up Mosquitto as the broker on Raspberry Pi -- Subscribing and publishing from MQTTX -- Summary -- Further reading -- Chapter 4: Examining Communication and Connectivity Technologies -- Technical requirements -- The role of short- and long-range protocols within IoT -- Design factors -- Long-range communication protocols -- Allocating resources -- Infrastructure protocols -- Mesh networking, RFID, and Bluetooth -- RFID -- Mesh networking -- Bluetooth -- Examining edge cases for protocol selection and operation -- Understanding the fundamental rules of architecting for different areas -- A look at a water utility IoT network -- Practice forming more networks -- Practical scenario - working with multiple communication protocols with ESP32 -- Making the connections -- Summary -- Further reading -- Part 2: Developing and Optimizing IoT Systems for Smart Environments -- Chapter 5: Realizing Wireless Sensor Networks within Smart Spaces -- Technical requirements -- Choosing between different sensor technologies -- Classes of sensor networks -- Routing for WSNs -- Design considerations -- Architecting the hardware and software -- Managing APIs -- How they integrate within the system -- Types of APIs -- Evaluating WSNs -- Metrics…”
    Libro electrónico
  4. 26364
    Publicado 2022
    “…Experience in an IT technical role or CompTIA Security+ certification or equivalent is assumed…”
    Libro electrónico
  5. 26365
    Publicado 2022
    “…In the past, data owners relied upon operational assurance to control access to workloads and data. …”
    Libro electrónico
  6. 26366
    Publicado 2024
    “…The course kicks off with an engaging introduction to Blender and its pivotal role in asset management, laying the groundwork for aspiring 3D artists to navigate the complexities of digital modeling. …”
    Video
  7. 26367
    Publicado 2024
    “…Through this journey, participants will grasp the vital role of COBIT in the IT world and prepare for what lies beyond the COBIT certification. …”
    Video
  8. 26368
    Publicado 2024
    Tabla de Contenidos: “…Intro -- Title page -- Copyright and credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Mastering std::vector -- Chapter 1: The Basics of std::vector -- Technical requirements -- The significance of std::vector -- A basic comparison of C-style arrays and std::vector -- Comparison of C-style arrays and std::vector for memory management -- Declaring and initializing std::vector -- Declaring a vector -- Initializing a vector -- Accessing elements -- Random access -- Accessing the first and last elements -- Vector size -- Adding and removing elements -- Adding elements -- Removing elements -- Capacity -- Prefer using empty() when possible -- Clearing all elements -- Summary -- Chapter 2: Mastering Iterators with std::vector -- Technical requirements -- Types of iterators in the STL -- Input iterators -- Output iterators -- Forward iterators -- Reverse iterators -- Bidirectional iterators -- Random access iterators -- Basic iteration techniques with std::vector -- Iterating over std::vector -- Basic iteration using iterators -- Using constant iterators -- Benefits of iteration -- Using std::begin and std::end -- Understanding iterator requirements -- Range-based for loops -- Overview of range-based for loops -- When to use range-based for loops -- Modifying elements during iteration -- Creating a custom iterator -- The appeal of custom iterators -- Core requirements -- Iterator categories and their specialties -- A custom iterator example -- Custom iterator challenges and use cases -- Illustrative use cases of custom iterators -- Summary -- Chapter 3: Mastering Memory and Allocators with std::vector -- Technical requirements -- Understanding capacity versus size -- Revisiting the basics -- What exactly is capacity? …”
    Libro electrónico
  9. 26369
    Publicado 2024
    Tabla de Contenidos: “…-- Why is encapsulating fields important for the SOLID principles? -- What is the role of delegates in OOP in the context of C#? -- How are constructors used for object initialization and how do they differ from static constructors? …”
    Libro electrónico
  10. 26370
    “…Les pratiques de légitimation et de représentation du pouvoir dans et sur la ville, parmi lesquelles le jeu subtil de la renommée joue un rôle prépondérant, contribuent aussi à mieux cerner l'image d'eux-mêmes forgée par les puissants, mais aussi acceptée, non sans difficultés, par l'ensemble de la société urbaine…”
    Libro electrónico
  11. 26371
    Publicado 2017
    “…Ce volume qui rassemble les communications de la cinquième session du cycle propose d'aborder frontalement la question des rapports entretenus entre le droit et l'opposition catholique à la romanité ecclésiale en évoquant les grandes figures de la tradition du catholicisme antiromain qui ont fait au droit une grande place dans leur argumentation, en relevant le rôle des canonistes catholiques qui ont pu faire parfois le choix de s'opposer aux prétentions romaines et en étudiant les grands thèmes où se mêlent étroitement arguments juridico-canoniques et hostilité catholique aux revendications du Saint-Siège - ainsi du conciliarisme, des compétences de l'autorité civile en matières ecclésiastiques, de l'infaillibilité pontificale ou encore du mariage et des empêchements dirimants…”
    Libro electrónico
  12. 26372
    Publicado 2000
    “…Ils examinent aussi le rôle que jouent sur cette scène nouvelle les partis, les groupes d'intérêts et les régions. …”
    Libro electrónico
  13. 26373
    Publicado 2023
    “…Bijdragende auteurs: Yves Segers (KU Leuven / CAG vzw), Joris Relaes (ILVO), Kurt Sannen (KU Leuven), Charlotte Prové (Ugent), Maarten Crivits (ILVO/UGent), Luc Vankrunkelsven (Wervel), Karolien Burvenich (Wervel), Bavo Verwimp (de Kijfelaar), Sarah Garré (ILVO), Dominique Huits (INAGRO), Tessa Avermaete (KU Leuven), Johan Nelissen (ACV pulse), Laurens De Meyer (KU Leuven), Fairouz Gazdallah (Solidagro), Suzy Serneels (Broederlijk Delen), Tom Ysewijn ( OWW), Myriam Dumortier (INBO / UGent), Hanne Flachet (FIAN), Ingrid Pauwels (Voedsel Anders), Esmeralda Borgo (Bioforum en freelance journalist), Frederik Gerits (UGent / ILVO), Lies Messely (ILVO), Bert Reubens (ILVO), Stephanie Schelfhout (UGent), Kris Verheyen (UGent) E-boek verkrijgbaar in Open Access. …”
    Libro electrónico
  14. 26374
    Publicado 2023
    “…By the end of the course, you will have a solid understanding of the role of AI in content creation and the ethical considerations that come with using these tools. …”
    Video
  15. 26375
    Publicado 2024
    “…Specifically curated for roles overseeing collaboration solutions in Microsoft 365, this book offers comprehensive coverage of modern SharePoint Online capabilities and extensibility options…”
    Libro electrónico
  16. 26376
    Publicado 2024
    “…This book is designed for software developers and web developers seeking to excel in these roles, offering concise explanations and applied example use-cases…”
    Libro electrónico
  17. 26377
    Publicado 2023
    “…The book begins with an overview of AI in business and its impact on the workforce. It then explores the role of AI in marketing, advertising, and tourism. …”
    Libro electrónico
  18. 26378
    “…They also explore the relations between Jews and their non-Jewish neighbors, the role of the Soviet state in shaping how Jews understood and responded to their changing life conditions, and the ways in which different social groups within the Soviet Jewish population—residents of the newly-annexed territories, the urban elite, small-town Jews, older generations with pre-Soviet memories, and younger people brought up entirely under Soviet rule—behaved. …”
    Libro electrónico
  19. 26379
    Publicado 2024
    Tabla de Contenidos: “…Keeping up with the open source OSINT landscape -- Blogs and websites -- Conferences and workshops -- Evaluating new tools -- Engaging with the OSINT community -- Summary -- Chapter 6: The Eyes and Ears of Threat Intelligence - How OSINT Helps Mitigate Cyber Risks -- Introduction to threat intelligence and OSINT -- Cyber threats and OSINT -- Phishing -- Social engineering -- Malware and ransomware -- APTs -- Combining OSINT with internal security -- Cyber threat intelligence platforms and OSINT integration -- Some big names in the game -- Incorporating OSINT data into threat intelligence workflows -- Sharing OSINT-derived intelligence with other platforms and teams -- Building an OSINT-driven cyber threat intelligence program -- What are intelligence requirements? -- The role of OSINT -- Case study: OSINT in a real-world cybersecurity incident -- Summary -- Chapter 7: Protecting Your Identity and Organization from Cyber Threats -- Understanding the role of OSINT in protecting your identity and organization -- The advantages of proactive OSINT research for cybersecurity -- Personal digital hygiene and OSINT -- Identifying and mitigating risks from your online presence -- Enhancing your privacy and security -- Assessing and strengthening organizational security with OSINT -- Identifying potential vulnerabilities -- Identifying and responding to cyber threats such as ransomware -- Detecting phishing and social engineering attempts -- It's Exotic Lily story time -- The Cobalt Dickens group and their tricky spear-phishing attacks -- Investigating cyber incidents and breaches -- Uncovering the source, scope, and impact of cyber incidents -- Building a resilient cyber defense with OSINT -- Collaborating with the cybersecurity community -- Adapting to the evolving threat landscape -- Updating your OSINT-driven cybersecurity strategy as needed…”
    Libro electrónico
  20. 26380
    Publicado 2024
    “…You'll gain a deep understanding of the modern data stack and its architecture, as well as the pivotal role of open-source technologies in shaping the data landscape. …”
    Libro electrónico