Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,216
- Historia 640
- Management 562
- Development 453
- Economics 371
- Engineering & Applied Sciences 355
- Social aspects 344
- Business & Economics 322
- Education 293
- Economic conditions 268
- Computer networks 266
- Politics and government 259
- Filosofía 254
- Leadership 254
- Application software 243
- Computer Science 236
- Crítica e interpretación 232
- Economic policy 220
- History and criticism 218
- Philosophy 218
- Data processing 209
- Economic aspects 208
- Technological innovations 208
- Computer security 206
- Security measures 206
- Information technology 204
- Cloud computing 196
- Artificial intelligence 194
- Rilke, Rainer Maria 192
- Atles 188
-
26361Publicado 2023“…Moreover, you'll gain a thorough understanding of user stories, their role in Agile development, and how to use them to plan and manage products effectively. …”
Libro electrónico -
26362Publicado 2023“…The purpose of this open access edited collection is to discuss the role and importance of stakeholder engagement in a sustainable circular economy from multiple theoretical and practical perspectives. …”
Libro electrónico -
26363Publicado 2024Tabla de Contenidos: “…Chapter 3: Integrating Application Protocols -- Technical requirements -- Installing Mosquitto -- Installing Client for URL (cURL) -- Application protocols and they fit into the picture -- The different types of application protocols -- An exercise to create a pub/sub MQTT broker -- Requirements for application protocols -- Reliability -- Power usage -- Security -- Integrating application protocols into the design -- A simple integration into the smart thermostat network -- A cloud scenario -- Multiple clients -- Practical - creating an MQTT pub and sub communication between an ESP32 and a Raspberry Pi -- Setting up Mosquitto as the broker on Raspberry Pi -- Subscribing and publishing from MQTTX -- Summary -- Further reading -- Chapter 4: Examining Communication and Connectivity Technologies -- Technical requirements -- The role of short- and long-range protocols within IoT -- Design factors -- Long-range communication protocols -- Allocating resources -- Infrastructure protocols -- Mesh networking, RFID, and Bluetooth -- RFID -- Mesh networking -- Bluetooth -- Examining edge cases for protocol selection and operation -- Understanding the fundamental rules of architecting for different areas -- A look at a water utility IoT network -- Practice forming more networks -- Practical scenario - working with multiple communication protocols with ESP32 -- Making the connections -- Summary -- Further reading -- Part 2: Developing and Optimizing IoT Systems for Smart Environments -- Chapter 5: Realizing Wireless Sensor Networks within Smart Spaces -- Technical requirements -- Choosing between different sensor technologies -- Classes of sensor networks -- Routing for WSNs -- Design considerations -- Architecting the hardware and software -- Managing APIs -- How they integrate within the system -- Types of APIs -- Evaluating WSNs -- Metrics…”
Libro electrónico -
26364Publicado 2022“…Experience in an IT technical role or CompTIA Security+ certification or equivalent is assumed…”
Libro electrónico -
26365Publicado 2022“…In the past, data owners relied upon operational assurance to control access to workloads and data. …”
Libro electrónico -
26366Publicado 2024“…The course kicks off with an engaging introduction to Blender and its pivotal role in asset management, laying the groundwork for aspiring 3D artists to navigate the complexities of digital modeling. …”
Video -
26367Publicado 2024“…Through this journey, participants will grasp the vital role of COBIT in the IT world and prepare for what lies beyond the COBIT certification. …”
Video -
26368Publicado 2024Tabla de Contenidos: “…Intro -- Title page -- Copyright and credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Mastering std::vector -- Chapter 1: The Basics of std::vector -- Technical requirements -- The significance of std::vector -- A basic comparison of C-style arrays and std::vector -- Comparison of C-style arrays and std::vector for memory management -- Declaring and initializing std::vector -- Declaring a vector -- Initializing a vector -- Accessing elements -- Random access -- Accessing the first and last elements -- Vector size -- Adding and removing elements -- Adding elements -- Removing elements -- Capacity -- Prefer using empty() when possible -- Clearing all elements -- Summary -- Chapter 2: Mastering Iterators with std::vector -- Technical requirements -- Types of iterators in the STL -- Input iterators -- Output iterators -- Forward iterators -- Reverse iterators -- Bidirectional iterators -- Random access iterators -- Basic iteration techniques with std::vector -- Iterating over std::vector -- Basic iteration using iterators -- Using constant iterators -- Benefits of iteration -- Using std::begin and std::end -- Understanding iterator requirements -- Range-based for loops -- Overview of range-based for loops -- When to use range-based for loops -- Modifying elements during iteration -- Creating a custom iterator -- The appeal of custom iterators -- Core requirements -- Iterator categories and their specialties -- A custom iterator example -- Custom iterator challenges and use cases -- Illustrative use cases of custom iterators -- Summary -- Chapter 3: Mastering Memory and Allocators with std::vector -- Technical requirements -- Understanding capacity versus size -- Revisiting the basics -- What exactly is capacity? …”
Libro electrónico -
26369Publicado 2024Tabla de Contenidos: “…-- Why is encapsulating fields important for the SOLID principles? -- What is the role of delegates in OOP in the context of C#? -- How are constructors used for object initialization and how do they differ from static constructors? …”
Libro electrónico -
26370por Société des Historiens Médiévistes de l'Enseignement Supérieur Public“…Les pratiques de légitimation et de représentation du pouvoir dans et sur la ville, parmi lesquelles le jeu subtil de la renommée joue un rôle prépondérant, contribuent aussi à mieux cerner l'image d'eux-mêmes forgée par les puissants, mais aussi acceptée, non sans difficultés, par l'ensemble de la société urbaine…”
Publicado 1997
Libro electrónico -
26371Publicado 2017“…Ce volume qui rassemble les communications de la cinquième session du cycle propose d'aborder frontalement la question des rapports entretenus entre le droit et l'opposition catholique à la romanité ecclésiale en évoquant les grandes figures de la tradition du catholicisme antiromain qui ont fait au droit une grande place dans leur argumentation, en relevant le rôle des canonistes catholiques qui ont pu faire parfois le choix de s'opposer aux prétentions romaines et en étudiant les grands thèmes où se mêlent étroitement arguments juridico-canoniques et hostilité catholique aux revendications du Saint-Siège - ainsi du conciliarisme, des compétences de l'autorité civile en matières ecclésiastiques, de l'infaillibilité pontificale ou encore du mariage et des empêchements dirimants…”
Libro electrónico -
26372Publicado 2000“…Ils examinent aussi le rôle que jouent sur cette scène nouvelle les partis, les groupes d'intérêts et les régions. …”
Libro electrónico -
26373Publicado 2023“…Bijdragende auteurs: Yves Segers (KU Leuven / CAG vzw), Joris Relaes (ILVO), Kurt Sannen (KU Leuven), Charlotte Prové (Ugent), Maarten Crivits (ILVO/UGent), Luc Vankrunkelsven (Wervel), Karolien Burvenich (Wervel), Bavo Verwimp (de Kijfelaar), Sarah Garré (ILVO), Dominique Huits (INAGRO), Tessa Avermaete (KU Leuven), Johan Nelissen (ACV pulse), Laurens De Meyer (KU Leuven), Fairouz Gazdallah (Solidagro), Suzy Serneels (Broederlijk Delen), Tom Ysewijn ( OWW), Myriam Dumortier (INBO / UGent), Hanne Flachet (FIAN), Ingrid Pauwels (Voedsel Anders), Esmeralda Borgo (Bioforum en freelance journalist), Frederik Gerits (UGent / ILVO), Lies Messely (ILVO), Bert Reubens (ILVO), Stephanie Schelfhout (UGent), Kris Verheyen (UGent) E-boek verkrijgbaar in Open Access. …”
Libro electrónico -
26374Publicado 2023“…By the end of the course, you will have a solid understanding of the role of AI in content creation and the ethical considerations that come with using these tools. …”
Video -
26375Publicado 2024“…Specifically curated for roles overseeing collaboration solutions in Microsoft 365, this book offers comprehensive coverage of modern SharePoint Online capabilities and extensibility options…”
Libro electrónico -
26376Publicado 2024“…This book is designed for software developers and web developers seeking to excel in these roles, offering concise explanations and applied example use-cases…”
Libro electrónico -
26377Publicado 2023“…The book begins with an overview of AI in business and its impact on the workforce. It then explores the role of AI in marketing, advertising, and tourism. …”
Libro electrónico -
26378“…They also explore the relations between Jews and their non-Jewish neighbors, the role of the Soviet state in shaping how Jews understood and responded to their changing life conditions, and the ways in which different social groups within the Soviet Jewish population—residents of the newly-annexed territories, the urban elite, small-town Jews, older generations with pre-Soviet memories, and younger people brought up entirely under Soviet rule—behaved. …”
Libro electrónico -
26379Publicado 2024Tabla de Contenidos: “…Keeping up with the open source OSINT landscape -- Blogs and websites -- Conferences and workshops -- Evaluating new tools -- Engaging with the OSINT community -- Summary -- Chapter 6: The Eyes and Ears of Threat Intelligence - How OSINT Helps Mitigate Cyber Risks -- Introduction to threat intelligence and OSINT -- Cyber threats and OSINT -- Phishing -- Social engineering -- Malware and ransomware -- APTs -- Combining OSINT with internal security -- Cyber threat intelligence platforms and OSINT integration -- Some big names in the game -- Incorporating OSINT data into threat intelligence workflows -- Sharing OSINT-derived intelligence with other platforms and teams -- Building an OSINT-driven cyber threat intelligence program -- What are intelligence requirements? -- The role of OSINT -- Case study: OSINT in a real-world cybersecurity incident -- Summary -- Chapter 7: Protecting Your Identity and Organization from Cyber Threats -- Understanding the role of OSINT in protecting your identity and organization -- The advantages of proactive OSINT research for cybersecurity -- Personal digital hygiene and OSINT -- Identifying and mitigating risks from your online presence -- Enhancing your privacy and security -- Assessing and strengthening organizational security with OSINT -- Identifying potential vulnerabilities -- Identifying and responding to cyber threats such as ransomware -- Detecting phishing and social engineering attempts -- It's Exotic Lily story time -- The Cobalt Dickens group and their tricky spear-phishing attacks -- Investigating cyber incidents and breaches -- Uncovering the source, scope, and impact of cyber incidents -- Building a resilient cyber defense with OSINT -- Collaborating with the cybersecurity community -- Adapting to the evolving threat landscape -- Updating your OSINT-driven cybersecurity strategy as needed…”
Libro electrónico -
26380Publicado 2024“…You'll gain a deep understanding of the modern data stack and its architecture, as well as the pivotal role of open-source technologies in shaping the data landscape. …”
Libro electrónico