Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,593
- History 1,521
- Development 893
- Engineering & Applied Sciences 704
- Application software 691
- Management 612
- Filosofía 514
- Crítica e interpretación 497
- Computer Science 466
- Computer networks 358
- Philosophy 339
- Computer programming 330
- Cloud computing 325
- Història 316
- Design 311
- Education 305
- Computer software 303
- Feminism 297
- Politics and government 296
- Business & Economics 294
- Data processing 291
- Lenin, Vladimir Il'ich 289
- Computer programs 284
- Python (Computer program language) 278
- Política y gobierno 269
- History and criticism 267
- Programming 250
- Social aspects 250
- Web sites 248
- Java (Computer program language) 247
-
42341Publicado 2017“…About This Video Mastery of C programming including advanced as well as complex parts Mastery of Visual Studio on Windows for C/C++ programmers Source Code Examples Tons of hands-on practice Help and support with Q&A Test your understanding with end-of-section quizzes Over 50 projects and solutions in C using Visual Studio In Detail In this course, we'll explore the C programming language from the ground up. We'll begin with a brief section on computer basics followed by a Hello world program in C and a walk-through to understand its elements and to dissect it. …”
-
42342Publicado 2015“…Harvard Business Review recently called data science “The Sexiest Job of the 21st Century.” It’s not just sexy: For millions of managers, analysts, and students who need to solve real business problems, it’s indispensable. …”
Libro electrónico -
42343Publicado 2020“…Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book Description The era of cyber warfare is now upon us. …”
Libro electrónico -
42344Publicado 2015“…Quickly start a new Django project and establish a strong foundation for a growing site Define how your data is organized and create a SQLite database to manage it Quickly produce HTML with Django templates Create dynamic webpages with Django’s URL patterns and views, including function views, class-based views, and generic views Enable efficient, reliable data input with Django Forms and custom form validations Understand the Model-View-Controller (MVC) architecture, compare it to Model-Template-Views, and gain a holistic understanding of Django’s structure Write as little code as possible, simplify code reuse, and mitigate software decay by adhering to the Don’t Repeat Yourself paradigm. …”
Libro electrónico -
42345Publicado 2015“…Skill Level Intermediate What You Will Learn How to begin designing your web apps as microservices How to use Docker to containerize your microservices How to leverage modern Docker orchestration tools to aid in both developing and deploying your applications How to use Google's container orchestration platform Kubernetes A strong understanding of the modern dev..…”
-
42346Publicado 2015“…Part of the Cisco Press Foundation Learning Series, it teaches advanced skills for designing, deploying, configuring, and troubleshooting Cisco Collaboration and Unified Communications applications, devices, and networks. …”
Libro electrónico -
42347Publicado 2018“…In addition, it provides a rich set of software-defined storage features, including IBM Real-time CompressionTM, data reductions, dynamic tiering, thin provisioning, snapshots, cloning, replication, data copy services, and IBM HyperSwap® for high availability. …”
Libro electrónico -
42348Publicado 2014“…Leverage the architectural and management innovations built into Cisco® Application Centric Infrastructure (ACI) Understand the policy driven data center model Use policies to meet the network performance and design requirements of modern data center and cloud environments Quickly map hardware and software capabilities to application deployments using graphical tools—or programmatically, via the Cisco APIC API Increase application velocity: reduce the time needed to move applications into production Define workload connectivity instead of (or along with) subnets, VLAN stitching, and ACLs Use Python scripts and REST to automate policy changes, parsing, customization, and self-service Design policy-driven data centers that support hypervisors Integrate OpenStack via the Cisco ACI APIC OpenStack driver architecture Master all facets of building and operating multipurpose cloud architectures with ACI Configure ACI fabric topology as an infrastructure or tenant administrator Insert Layer 4–Layer 7 functions using service graphs Leverage centralized telemetry to optimize performan..…”
Libro electrónico -
42349Publicado 2020“…Tamara Lackey has been photographing children and families for years, and in The Posing Playbook for Photographing Kids , she teaches you her strategies and techniques for successfully posing and photographing children. The book begins with a discussion of “organic posing,” an approach to directing the subject that focuses on making small adjustments that build up to a successful shot. …”
Libro electrónico -
42350Publicado 2007“…As new projects come to their end and others begin, it seems important to make a point regarding the health of the river and to evaluate what it represents for its diverse users, civil society or for the economy of Mali. …”
Libro electrónico -
42351Publicado 2023“…Master the art of mathematical modeling through practical examples, use cases, and machine learning techniques Key Features Gain a profound understanding of various mathematical models that can be integrated with machine learning Learn how to implement optimization algorithms to tune machine learning models Build optimal solutions for practical use cases Purchase of the print or Kindle book includes a free PDF eBook Book Description Mathematical modeling is the art of transforming a business problem into a well-defined mathematical formulation. Its emphasis on interpretability is particularly crucial when deploying a model to support high-stake decisions in sensitive sectors like pharmaceuticals and healthcare. …”
Libro electrónico -
42352Publicado 2005“…Networking technology series…”
Libro electrónico -
42353Publicado 2008“…Category: Graphics/Web Design Covers: Adobe Creative Suite 3 Design Premium Edition–Adobe Bridge CS3, Photoshop CS3, Illustrator CS3, InDesign CS3, Flash CS3 Professional, Dreamweaver CS3, Acrobat 8 Professional User Level: Beginning—Intermediate…”
Libro electrónico -
42354Publicado 2007“…Whether it’s adding effective transitions to your slides or making the presentation technically sound and mobile, you’ll be given the tools at every stage of the creative process in order to learn How to Wow! We begin with the important essentials of typography, layout, and design, and move on to creating tables, charts, graphs, and custom templates. …”
Libro electrónico -
42355Publicado 2003“…Designed to optimize your study time, this book helps you assess your knowledge of the material at the beginning of each chapter with customized quizzes for each topic. …”
Libro electrónico -
42356Publicado 2007Tabla de Contenidos: “…Introduction: escaping the hamster wheel of pain -- Defining security metrics -- Diagnosing problems and measuring technical security -- Measuring program effectiveness -- Analysis techniques -- Visualization -- Automating metrics calculations -- Designing security scorecards…”
Libro electrónico -
42357Publicado 2005“…Each book in the series is designed to bring you up-to-speed quickly. …”
Libro electrónico -
42358por Hucaby, Dave“…Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning Define security policies that identify and act on various types of traffic with th..…”
Publicado 2008
Libro electrónico -
42359por Palnitkar, Samir“…Among its many features, this edition— Describes state-of-the-art verification methodologies Provides full coverage of gate, dataflow (RTL), behavioral and switch modeling Introduces you to the Programming Language Interface (PLI) Describes logic synthesis methodologies Explains timing and delay simulation Discusses user-defined primitives Offers many practical modeling tips Includes over 300 illustrations, examples, and exercises, and a Verilog resource list.Learning objectives and summaries are provided for each chapter. …”
Publicado 2003
Libro electrónico -
42360por Hussain, Iftekhar“…Networking technology series Fault-tolerant IP and MPLS networks…”
Publicado 2004
Libro electrónico