Mostrando 43,561 - 43,580 Resultados de 44,310 Para Buscar 'SEBIN~', tiempo de consulta: 0.99s Limitar resultados
  1. 43561
    Publicado 2024
    “…This book is an invaluable guide for 3D artists, modelers, and beginners to begin without prior knowledge of Blender or 3D modelling experience, although a basic familiarity with these topics will be beneficial…”
    Libro electrónico
  2. 43562
    por Ellis, Sean
    Publicado 2017
    “…So how did these companies grow from these humble beginnings into the powerhouses they are today? Contrary to popular belief, they didn't explode to massive worldwide popularity simply by building a great product then crossing their fingers and hoping it would catch on. …”
    Libro electrónico
  3. 43563
    Publicado 2024
    Tabla de Contenidos: “…-- Principle #2 - A data lake's immutable data is to remain explorable -- Principle #3 - A data lake's immutable data remains available for analytics -- Principle #4 - A data lake's sources are discoverable -- Principle #5 - A data lake's tooling should be consistent with the architecture -- Principle #6 - A data mesh defines data to be governed by domain-driven ownership -- Principle #7 - A data mesh defines the data and derives insights as a product -- Principle #8 - A data mesh defines data, information, and insights to be self-service -- Principle #9 - A data mesh implements a federated governance processing system -- Principle #10 - Metadata is associated with datasets and is relevant to the business -- Principle #11 - Dataset lineage and at-rest metadata is subject to life cycle governance -- Principle #12 - Datasets and metadata require cataloging and discovery services -- Principle #13 - Semantic metadata guarantees correct business understanding at all stages in the data journey -- Principle #14 - Data big rock architecture choices (time series, correction processing, security, privacy, and so on) are to be handled in the design early -- Principle #15 - Implement foundational capabilities in the architecture framework first -- Summary -- Chapter 5: Architecture Framework - Conceptual Architecture Best Practices -- Conceptual architecture overview -- Best practice organization…”
    Libro electrónico
  4. 43564
    Publicado 2023
    “…Some experience with handling PostgreSQL databases will help you to make the most out of this book, however, it is a useful resource even if you are just beginning your Postgres journey…”
    Libro electrónico
  5. 43565
    Publicado 2023
    “…The course begins with a comprehensive look at mobile and desktop operating systems, delving into Windows, macOS, and Linux, setting you up with a versatile foundation in OS management. …”
    Video
  6. 43566
    Publicado 2023
    “…This course begins with a comprehensive exploration of cloud service models and deployment strategies, equipping professionals with the knowledge to navigate complex cloud environments. …”
    Video
  7. 43567
    Publicado 2023
    “…The course begins by grounding you in the OSI and TCP/IP models, network topologies, and types, ensuring you understand the backbone of modern networking. …”
    Video
  8. 43568
    Publicado 2023
    “…The course begins by laying a solid foundation in project management principles, navigating through essential concepts such as the project life cycle, compliance, privacy, and ESG factors. …”
    Video
  9. 43569
    Publicado 2023
    “…The course begins with an exploration of server architecture, delving into components, racks, power management, and connectivity, establishing a solid foundation. …”
    Video
  10. 43570
    Publicado 2023
    “…The course explores key elements in designing and managing online communities using Salesforce Experience Cloud. We will begin by covering diverse topics from fundamental site creation and navigation to advanced concepts such as Salesforce CMS, content moderation, and gamification. …”
    Video
  11. 43571
    Publicado 2023
    “…Throughout this course, explore a myriad of topics to master Oracle RAC administration. Begin by comprehending its architecture and proceeding to installation techniques for different RAC types--administrator-managed, policy-managed, CDB, and RAC One node. …”
    Video
  12. 43572
    Publicado 2023
    “…This book will help you identify security risks and apply the best practices to protect your assets on multiple levels, from data and models to applications and infrastructure. This book begins by introducing what some common ML attacks are, how to identify your risks, and the industry standards and responsible AI principles you need to follow to gain an understanding of what you need to protect. …”
    Libro electrónico
  13. 43573
    Publicado 2023
    “…Azure Pipelines is one of the most popular services that you can utilize for CI/CD, and this book shows you how it works by taking you through the process of building and automating CI/CD systems using Azure Pipelines and YAML, simplifying integration with Azure resources and reducing human error. You'll begin by getting an overview of Azure Pipelines and why you should use it. …”
    Libro electrónico
  14. 43574
    Publicado 2023
    “…This book will get you up and running with Okta, an IAM service that can help you manage both employees and customers. The book begins by helping you understand how Okta can be used as an IAM platform, before teaching you about Universal Directory and how to integrate with other directories and apps, as well as set up groups and policies for Joiner, Mover, and Leaver flows. …”
    Libro electrónico
  15. 43575
    Publicado 2024
    “…Whether you're a beginner who wants to establish a solid foundation or an experienced developer looking to refine your skills, this guide offers invaluable insights, practical solutions, and real-world examples to enable you to excel at building scalable, elegant, and high-performing React applications…”
    Libro electrónico
  16. 43576
    Publicado 2024
    “…The course begins with fundamental cybersecurity concepts, paving the way for an extensive exploration of ethical hacking. …”
    Video
  17. 43577
    Publicado 2019
    “…It is our great pleasure to welcome you to the ninth edition of the ACM Conference on Data and Application Security and Privacy (CODASPY 2019), which follows the successful eight editions held in February/March 2011-2018. This conference series has been founded to foster novel and exciting research in this arena and to help generate new directions for further research and development. …”
    Libro electrónico
  18. 43578
    Publicado 1999
    “…. - Chapters in Esther are *Beginning with the End of Vashti: Esther 1:1-22, - *Remembering to Forget: Esther 2:1-4, - *New Family Dynamics: Esther 2:5-18, - *Coup: Esther 2:19-23, - *Politics of Anti-Judaism: Esther 3:1-15, - *Another Quarter: Esther 4:1-17, - *Face to Face: Esther 5:1-8, - *Fifty Cubits for Mordecai: Esther 5:9-14, - *Sleep Deserts: Esther 6:1-14, - *Coming Out Party: Esther 7:1- 10, - *Overwriting: Esther 8:1-17, - and *Aftermath: Esther 9:1 - 10:3…”
    991004815959706719
  19. 43579
    Publicado 1988
    “…In the beginning, the only function at the SIGGRAPH annual conference was the technical papers session. …”
    Libro electrónico
  20. 43580
    “…Las prácticas educativas que se presentan como ejemplificación para un modelo educativo basado en la adquisición de competencias deben ser tomadas solo como referentes, y describen procesos de planificación que representan diferentes modos de actuación del profesorado a lo largo de las diferentes etapas que componen la educación obligatoria en España. …”
    Libro