Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
6721Publicado 2011“…Folic acid supplements have been considered as safe. A combined analysis from 2009 of two Norwegian randomized controlled clinical trials, with extended post-trial follow-up, demonstrated however, an increased incidence of cancer among patients taking folic acid for homocysteine reduction as secondary prevention of cardiovascular events. …”
Libro electrónico -
6722Publicado 2021“…In addition, the book walks readers through real-time challenges and presents a guide on how to build a safe infrastructure for IoT-based health care. It also helps researchers and practitioners understand the e-health care architecture through IoT and the state-of-the-art in IoT countermeasures. …”
Libro electrónico -
6723Publicado 2022“…In Joy Works, Alex Liu delivers an engaging blueprint for ensuring people feel safe and inspired at work. In the book, you'll find a step-by-step action plan for approaching joy at work using the three key drivers that determine employee happiness-people, praise, and purpose-and learn how to implement that plan for maximum results and maximum joy. …”
Grabación no musical -
6724Publicado 2023“…Keep sensitive user data safe and secure without sacrificing the performance and accuracy of your machine learning models. …”
Grabación no musical -
6725Publicado 2021“…Martin In Five Lines of Code you will learn: The signs of bad code Improving code safely, even when you don't understand it Balancing optimization and code generality Proper compiler practices The Extract method, Introducing Strategy pattern, and many other refactoring patterns Writing stable code that enables change-by-addition Writing code that needs no comments Real-world practices for great refactoring Improving existing code--refactoring--is one of the most common tasks you'll face as a programmer. …”
Video -
6726Delivery of electroconvulsive therapy in non-hospital settings a review of the safety and guidelinesPublicado 2014“…The mechanism of ECT is unknown however changes to the central nervous system resulting from this therapy have been documented and the procedure is considered to be safe and efficacious. A recent Canadian survey of 172 centers identified as conducting ECT indicates that among registered healthcare institutions that conduct this procedure, there exists some variability with regard to written policies and procedures for ECT, the administration of medications, and treatment, however there is generally some consistency with regard to obtaining informed consent and the post-discharge accompaniment of patients. …”
Libro electrónico -
6727Publicado 2023“…What you'll learn and how you can apply it Work with new perspectives in order to generate new ideas and reach better solutions Lead more effectively from the front, the side, and behind Listen in a more active and non-defensive way Build trusting, safe environments Facilitate and contribute to brainstorming Better move ideas into action Engage in conflict resolution Become more transparent and accountability This course is for you because... …”
Video -
6728Publicado 2021“…Martin In Five Lines of Code you will learn: The signs of bad code Improving code safely, even when you don't understand it Balancing optimization and code generality Proper compiler practices The Extract method, Introducing Strategy pattern, and many other refactoring patterns Writing stable code that enables change-by-addition Writing code that needs no comments Real-world practices for great refactoring Improving existing code--refactoring--is one of the most common tasks you'll face as a programmer. …”
Grabación no musical -
6729Publicado 2022“…Everyone gets the chance to practice their craft with a real software architecture problem in a safe and social environment, and the finalists and winners earn well-deserved bragging rights (not to mention an intriguing line on their řsum̌). …”
Video -
6730Publicado 2022“…In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. …”
Grabación no musical -
6731Publicado 2022“…Getting authentication and authorization done right in your website can help keep your users and their data safe from attacks. Added features such as Two and Multi Factor Authentication are relatively easy to plugin and this library can easily be extended to implement unique business rules to surround how users are treated. …”
Video -
6732Publicado 2021“…During nonincident times, organizations should be safely testing how services may fail (such as with game days), planning who responds when things break, and crafting playbooks for common actions and responses. …”
Video -
6733Publicado 2024“…This book introduces the world-transforming technology and the strategies you need to use generative AI safely and effectively. Introduction to Generative AI gives you the hows-and-whys of generative AI in accessible language. …”
Video -
6734Publicado 2023“…This book introduces cutting-edge AI tools and the practical techniques you need to use them safely and effectively. Introduction to Generative AI gives you the hows-and-whys of generative AI in accessible language. …”
Grabación no musical -
6735Publicado 2023“…Keep sensitive user data safe and secure without sacrificing the performance and accuracy of your machine learning models. …”
Video -
6736por Shapiro, Ian, 1959-“…He explains how the Bush Doctrine departs from the best traditions of American national-security policy and accepted international norms, and renders Americans and democratic values less safe. He debunks the belief that containment is obsolete. …”
Publicado 2007
Libro -
6737por Quiggin, John“…For decades, their advocates dominated mainstream economics, and their influence created a system where an unthinking faith in markets led many to view speculative investments as fundamentally safe. The crisis seemed to have killed off these ideas, but they still live on in the minds of many - members of the public, commentators, politicians, economists, and even those charged with cleaning up the mess. …”
Publicado 2012
Libro -
6738Publicado 2021“…Robots once primarily threatened blue-collar manufacturing jobs, but today's machines are being trained to do the work of lawyers, doctors, investment bankers, and other white-collar jobs previously considered safe from automation's reach. The world's biggest corporations are racing to automate jobs, and some experts predict that A.I could put millions of people out of work. …”
Libro -
6739Publicado 2014“…Just ten years ago, discussions of Latina/o media could be safely reduced to a handful of TV channels, dominated by Univision and Telemundo. …”
Libro -
6740Publicado 2000“…Salud mental: concepto crucial para quienes habitamos los variados ámbitos de la salud a través de un trabajo sostenido con la demanda de aquel que sufre. Que-hacer comprometido con el padecimiento del sujeto y la especificidad de los avatares actuales. …”
Libro