Mostrando 44,321 - 44,340 Resultados de 44,518 Para Buscar 'SEBIN~', tiempo de consulta: 1.05s Limitar resultados
  1. 44321
    Publicado 2017
    “…The mobile disruption in China is more thorough than the developed world: immature industries such as retail and logistics will leapfrog straight from the early industrial age to the internet one. (b) The beginning of the multi-screen age and mobile Internet for China consumers. …”
    Libro electrónico
  2. 44322
    Publicado 2023
    “…Understanding Enums describes the syntax for defining and using enum types, also discusses some of the important standard enums in the Rust library. …”
    Video
  3. 44323
    Publicado 2010
    “…The textiles and tools show clearly, that there is a continuous development from the beginning of the Iron Age till Roman era. For the topic "work and identity" the crafts people - the textile producers - are in the focus as well as the organisation of the pro…”
    Libro electrónico
  4. 44324
    Publicado 2018
    “…Appealing to Friends and FamilyAsk, Dont StealBe Prepared Before You Roll: The Final DetailsBuilding the Shooting ScheduleCasting Professionals and Actors from Other RegionsCasting CrowdsConceding, Settling, Hanging Tough and WhittlingCopyright and the Public DomainCopyright, Trademark and Fair UseCreating Breakdown SheetsDefining the Producers RoleDeliverablesDifferent Kinds of ZeroesDistribution Strategies for the Short Film Example of Screenwriter Exhibit AFilling in the HeaderFinancing Your FilmFinding a worthy project;Fixing It in Post: Color Correction and Other AdjustmentsFringes, Per Diems and Other Budgeting TermsGovernment SupportHiring a Casting DirectorHow Many Sheets?…”
    Libro electrónico
  5. 44325
    Publicado 2022
    “…Sander van Vugt has carefully structured this 11-lesson course to focus on concepts, practices, and solutions used in cloud native environments. The course begins with an exploration of the cloud native certification program before moving onto a look at Cloud Native technologies and solutions. …”
    Video
  6. 44326
    por Topsakal, Ilyas
    Publicado 2021
    “…From this point of view, Russian-Turkish relations can be seen as are an intertwinement of a large number of sensitive issues and difficult compromise solutions. …”
    Libro electrónico
  7. 44327
    Publicado 1975
    “…His poetic themes were beginning to find expression in the landscape paintings of Robert Weir, Asher Durand, and Thomas Cole. …”
    Libro electrónico
  8. 44328
    Publicado 2011
    “…Whether you're a CEO, team leader, or entrepreneur, you need to discover who you are as a leader, what you believe, and how that defines you. It's not as apparent as you may think. …”
    Grabación no musical
  9. 44329
    Publicado 2009
    “…The “Common Law of the Prussian States” defined them as closed societies. Within the analyzed period 56 lodges (four field lodges included) constituated themeselves in 31 towns and on five landed properties of noble Masonic members. …”
    Libro electrónico
  10. 44330
    Publicado 2014
    “…This handbook is based on the project "Österreichische Kinder- und Jugendbuchautorinnen" (Austrian Women Writers of children's literature), which was defined as part of the project "biografiA. datenbank und lexikon österreichischer frauen" (database of austrian women, http://www.biografia.at), localised on the Institute for Science and Art in Vienna. …”
    Libro electrónico
  11. 44331
    Publicado 2022
    “…Finally, in the fourth chapter, a first experimentation on the city of Naples of the results of the research work is reported, defining the portions of the territory of the V and VIII municipalities where it is necessary to intervene with priority, as a first step in the development of an instrument to support decisions for public administrations Il cambiamento climatico rappresenta una delle principali minacce a cui il nostro pianeta è chiamato a dare risposte, sia in termini di mitigazione dei fenomeni che di adattamento agli impatti sull’ambiente costruito. …”
    Libro electrónico
  12. 44332
    Publicado 2022
    “…This course consists of all the major and popular topics and concepts that are relevant to Ansible. It begins with the basics of Ansible and how to get started. …”
    Video
  13. 44333
    Publicado 2008
    “…Broadwood und Erard definierten ein neues auf der Stoßzungenmechanik basierendes Klangideal, neben dem sich die Wiener Klaviere mit ihrer Prellzungenmechanik nur schwer behaupten konnten. …”
    Libro electrónico
  14. 44334
    Publicado 2024
    “…The course begins with an in-depth exploration of the General Data Protection Regulation (GDPR), laying the foundational principles that underpin data protection in the digital age. …”
    Video
  15. 44335
    por Foltz, Kevin
    Publicado 2020
    Tabla de Contenidos: “…3.3.4 Secure Data Acquisition -- 3.3.5 Integrity at the Source -- 3.4 Temporal Data -- 3.5 Credential Data -- 3.6 Distributed Stores -- 4 Access and Privilege -- 4.1 Access Control -- 4.2 Authorization and Access in General -- 4.3 Access Control List -- 4.3.1 Group Requirements -- 4.3.2 Role Requirements -- 4.3.3 ACRs and ACLs -- 4.3.4 Discretionary Access Control and Mandatory Access Control -- 4.4 Complex Access Control Schemas -- 4.5 Privilege -- 4.6 Concept of Least Privilege -- 4.6.1 Least Privilege Case Study -- 5 Cryptography -- 5.1 Introduction -- 5.2 Cryptographic Keys and Key Management -- 5.2.1 Asymmetric Key Pairs -- 5.2.1.1 RSA Key Generation -- 5.3 Symmetric Keys -- 5.3.1 TLS Mutual Authentication Key Production -- 5.3.2 Other Key Production -- 5.4 Store Keys -- 5.5 Delete Keys -- 5.6 Encryption -- 5.7 Symmetric versus Asymmetric Encryption Algorithms -- 5.7.1 Asymmetric Encryption -- 5.7.2 RSA Asymmetric Encryption -- 5.7.3 Combination of Symmetric and Asymmetric Encryption -- 5.7.4 Symmetric Encryption -- 5.7.4.1 Stream Ciphers -- 5.7.4.2 Block Ciphers -- 5.7.5 AES/Rijndael Encryption -- 5.7.5.1 Description of the AES Cipher -- 5.7.6 Data Encryption Standard -- 5.7.6.1 Triple DES -- 5.7.6.2 Description of the Triple DES Cipher -- 5.8 Decryption -- 5.8.1 Asymmetric Decryption -- 5.8.2 Symmetric Decryption -- 5.9 Hash Function -- 5.9.1 Hash Function Algorithms -- 5.9.2 Hashing with Cryptographic Hash Function -- 5.9.2.1 MD-5 -- 5.9.2.2 SHA-3-Defined SHA-512 -- 5.10 Signatures -- 5.10.1 XML Signature -- 5.10.2 S/MIME Signature -- 5.10.3 E-Content Signature -- 5.11 A Note on Cryptographic Key Lengths -- 5.11.1 Encryption Key Discovery -- 5.11.2 The High-Performance Dilemma -- 5.11.3 Parallel Decomposition of Key Discovery -- 5.12 Internet Protocol Security -- 5.13 Other Cryptographic Services -- 5.14 The Java Cryptography Extension…”
    Libro electrónico
  16. 44336
    Publicado 2023
    “…C# is a versatile and modern programming language that is commonly used for game development within the Unity engine. The course begins with installing and setting up Unity, followed by creating diverse and captivating 2D and 3D game projects using the powerful combination of Unity and C# scripting. …”
    Video
  17. 44337
    Publicado 2023
    “…Master fundamental concepts like directed acyclic graphs, operators, and task dependencies. Learn how to define workflows as code using Python and the rich Airflow API. …”
    Video
  18. 44338
    Publicado 2023
    “…This powerful multi-platform App UI framework saves time and money by eliminating tedious platform-specific rewrites. You just define your project in straightforward XAML markup and C#, and MAUI generates the native applications for iOS, Android, Windows, and macOS. …”
    Grabación no musical
  19. 44339
    Publicado 2023
    “…This powerful multi-platform App UI framework saves time and money by eliminating tedious platform-specific rewrites. You just define your project in straightforward XAML markup and C#, and MAUI generates the native applications for iOS, Android, Windows, and macOS. …”
    Video
  20. 44340
    Publicado 2024
    “…About the Book Platform Engineering on Kubernetes starts by clearly defining the elements of a great Kubernetes-based platform. …”
    Video