Mostrando 36,321 - 36,340 Resultados de 36,417 Para Buscar 'Saketa~', tiempo de consulta: 1.09s Limitar resultados
  1. 36321
    Publicado 2018
    “…Uzyskaj porady związane z konfigurowaniem środowiska programistycznego R Poznaj ogólne koncepcje programowania i techniki kodowania w R Zapoznaj się z elementami składowymi wydajnego przepływu pracy w R Naucz się, jak wydajnie odczytywać i zapisywać dane w R Zagłęb się w stolarce danych – kluczowej umiejętności czyszczenia surowych danych Zoptymalizuj swój kod przy użyciu profilowania, standardowych trików oraz innych metod Określ swoje możliwości sprzętowe w zakresie obsługi obliczeń R Zmaksymalizuj korzyści płynące z programowania zespołowego Przyspiesz swoją przemianę z hakera R w programistę R Colin Gillespie jest starszym wykładowcą na Uniwersytecie w Newcastle w Wielkiej Brytanii. …”
    Libro electrónico
  2. 36322
    Publicado 2020
    “…Discover customization and productivity tips with this quick guide for iPhone usersKey FeaturesLearn everything about your iPhone quickly to use it as an effective tool for communication, entertainment, and workCustomize your phone’s look and sound and modify the iOS’s privacy settingsKeep your apps tidy and organized using the App LibraryBook DescriptionThe iPhone is the most popular smartphone available on the market, renowned for its sophisticated design, immersive UI, and user safety. And even if you’ve bought an iPhone for its impressive specifications, you may still be unaware of many of its features, which you’ll discover with the help of this book! …”
    Libro electrónico
  3. 36323
    Publicado 2010
    “…From the moment I learned it I have not only played that way, I have led that way." --Ed Reed, All Pro Safety, Baltimore Ravens What’s your vision? What’s your passion? …”
    Libro electrónico
  4. 36324
    Publicado 2011
    “…The CompTIA authorized study guide helps you master all the topics on the A+ exam, including Essential concepts and troubleshooting principles BIOS and CMOS Memory types and characteristics I/O ports and multimedia devices Video cards and displays Motherboards, CPUs, and adapter cards Laptop components Networking Security Windows 7, XP, and 2000 Power supplies and system cooling Printers Safety and environmental concerns Test your knowledge, build your confidence, and succeed! …”
    Libro electrónico
  5. 36325
    Publicado 2012
    “…Part 4: Windows 7, Section 5: Control Panel-User Accounts and Family Safety This lesson covers user..…”
    Video
  6. 36326
    Publicado 2013
    “…You’ll find up-to-the-minute strategies for calculating how much debt is safe, and assessing and paying off the right debts first... and if you’re too far in debt, Weston will gently and non-judgmentally guide you back into your “safety zone.” Finally, in There Are No Dumb Questions About Money, Weston offers up-to-date, common sense answ..…”
    Libro electrónico
  7. 36327
    Publicado 2022
    “…The main objective of this edited book is to cover the impact that the new advanced society has on several platforms such as smart manufacturing systems, where artificial intelligence can be integrated with existing systems to make them smart, new business models and strategies, where anything and everything is possible through the internet and cloud, smart food chain systems, where food products can be delivered to any corner of the world at any time and in any situation, smart transport systems in which robots and self-driven cars are taking the lead, advances in security systems to assure people of their privacy and safety, and smart healthcare systems, where biochips can be incorporated into the human body to predict deadly diseases at early stages. …”
    Libro electrónico
  8. 36328
    Publicado 2023
    “…Additionally, you will also see how Rust works behind the scenes: memory safety and data races, events and error handling, scoping, threading, and more. …”
    Video
  9. 36329
    Publicado 2023
    “…What You Will Learn Understand the difference between HTTP and HTTPS Learn to secure your home router Recognize malware and anti-malware products and solutions Understand two-factor authentication Examine social media ethics comprehensively Establish a recovery email for account safety Audience This course is designed for students who are interested in learning how to safeguard themselves against hackers and malware. …”
    Video
  10. 36330
    Publicado 2021
    “…They demonstrate the importance of strong public health systems and safety nets. They show how providers surged capacity and adapted care pathways for both COVID-19 and non-COVID-19 patients. …”
    Libro electrónico
  11. 36331
    Publicado 2024
    “…The course unfolds with a comprehensive introduction to cybersecurity, spanning essential topics like online safety, ethics, and current events. Delving deeper, participants explore core principles, including the CIA Triad, threats, and vulnerabilities. …”
    Video
  12. 36332
    Publicado 2004
    “…When new technologies are introduced into clinical practice, the question of clinical effectiveness and the safety of the technology need to be adressed, to ensure that patients are given efficient and safe treatment. …”
    Libro electrónico
  13. 36333
    por Khanna, Abhirup
    Publicado 2024
    “…Moreover, AI helps in predicting the efficacy and safety of molecules and gives researchers a much broader chemical pallet for the selection of the best molecules for drug testing and delivery. …”
    Libro electrónico
  14. 36334
    Publicado 2024
    “…Based on the classic NIST pillars, the book provides a blueprint for maturing enterprise AI security, discussing the role of AI security in safety and ethics as part of Trustworthy AI. By the end of this book, you'll be able to develop, deploy, and secure AI systems effectively. …”
    Libro electrónico
  15. 36335
    Publicado 2022
    “…Upon completion, you will have acquired vast knowledge about cyber security and how to implement it in your daily work and lives for better cyber safety. What You Will Learn Use a proxy server and set up and use a virtual private network Learn to use Tor to access the dark web anonymously Set up a firewall and learn to use a rootkit scanner Encrypt emails and track emails sent and check for being tracked Learn to back up and encrypt your hard drive Completely harden the Windows 10 operating system Audience This course is suitable for non-professionals and students with a basic understanding of cyber security. …”
    Video
  16. 36336
    Publicado 2020
    “…This book concentrates on seven pillars of seriously good software: speed, memory usage, reliability, readability, thread safety, generality, and elegance. The Java-based examples demonstrate techniques that apply to any OO language. about the book Seriously Good Software is a handbook for any professional developer serious about improving application quality. …”
    Grabación no musical
  17. 36337
    Publicado 2022
    “…About the Author Teiva Harsanyi is a senior software engineer at Docker with experience in various domains, including safety-critical industries like air traffic management. …”
    Grabación no musical
  18. 36338
    Publicado 2024
    “…Bridging the gap between ""strategy"" and ""implementation"" Learn and implement Product Management tools Prioritize your time and pick your battles (backlog) Collect and analyze customer and market feedback Prioritize and effectively communicate needs to technical teams Manage Technology Roadmaps effectively Guarantee successful product lifecycle management while mitigating product safety risks This course is for you because... You're a product manager with 1-4 years of experience who needs to deliver a product from initiation to decline and expansion. …”
    Vídeo online
  19. 36339
    Publicado 2020
    “…A lo largo de los distintos trabajos, sus autores han expuesto diversas facetas del conflicto poliédrico que fueron las Comunidades, en cuya gestación y desarrollo intervinieron múltiples factores. …”
    Libro
  20. 36340
    Publicado 2022
    “…En ellas se tratan temas como la soledad, el amor no correspondido, la muerte, la tristeza, la oscuridad, la desolación, la agonía, las lágrimas o la inocencia perdida; en todas ellas, su carácter melancólico es el sello principal de identidad. Su faceta menos conocida fue la de espía al servicio de la corte de Cristián IV de Dinamarca, en unos momentos llenos de tensiones políticas en toda Europa." -- Contracubierta…”
    Libro