Mostrando 7,981 - 8,000 Resultados de 9,064 Para Buscar 'Syfy~', tiempo de consulta: 0.63s Limitar resultados
  1. 7981
    Publicado 2016
    Tabla de Contenidos: “…""Why you need a laptop""""Why you don't need a laptop""; ""Laptop Shopping""; ""Things to ignore when buying a laptop""; ""Things to heed when buying a laptop""; ""Software for Your Laptop""; ""The operating system""; ""Other software""; ""Laptop Hardware Buying Decisions""; ""Important laptop hardware guts""; ""Communications options""; ""The green laptop""; ""Service, Support, and Warranty""; ""The Final Step: Buying Your Laptop""; ""Part II Say Hello to Your Laptop""; ""Chapter 3 From Laptop Box to Lap""; ""Laptop Box 101""; ""Removing the laptop from the box""…”
    Libro electrónico
  2. 7982
    Publicado 2022
    “…In the third volume, we find projects focused on human rights: those of people with disabilities, the right to a safe and transparent society, and legal matters concerning international families Nel primo volume della collana Unimi Connect – Universo Terza Missione sono inclusi 14 progetti che riguardano il campo dell’inclusione sociale, della sostenibilità e dei diritti. …”
    Libro electrónico
  3. 7983
    Publicado 2014
    Tabla de Contenidos: “…Front Cover; Contents; Acknowledgments; About the Author; Introduction; Chapter 1: Prevention and Personal Accountability; Chapter 2: System Says ...; Chapter 3: Care Ethics; Chapter 4: From the Exhibit Hall to Your Body; Chapter 5: Trading Hotel Rooms for Sick Beds; Chapter 6: Insured or Imagined?…”
    Libro electrónico
  4. 7984
    por Drymonitis, Alexandros
    Publicado 2024
    “…Dive into the world of computer music and physical computing and stay ahead of the melodic curve. This book is aimed at adventurous musicians who want to learn about music programming with Arduino, sensors, and Pure Data, and how to make new interfaces and instruments with that knowledge. …”
    Libro electrónico
  5. 7985
    Publicado 2007
    “…After reading this book--even if you've been using CS3 for a while--don't be surprised to hear yourself say, 'I didn't know CS3 did that!' In addition to learning the new features in no time flat, a welcome side effect of learning from Ben is that you can expect to become a better, faster and more efficient Photoshop user…”
    Libro electrónico
  6. 7986
    Publicado 2006
    “…Coverage includes Architectural overview: how SQL Server 2005’s features work together and what it means to you Security management, policies, and permissions: gaining tighter control over your data SQL Server Management Studio: Microsoft’s new, unified tool suite for authoring, management, and operations Availability enhancements: online restoration, improved replication, shorter maintenance/recovery windows, and more Scalability improvements, including a practical explanation of SQL Server 2005’s complex table partitioning feature Data access enhancements, from ADO.NET 2.0 to XML SQL Server 2005’s built-in .NET CLR: how to use it, when to use it, and when to stay with T-SQL Business Intelligence Development Studio: leveraging major improvements in reporting and analytics Visual Studio integration: improving efficiency throughout the coding and debugging process Simple code examples demonstrating SQL Server 2005’s most significant new features…”
    Libro electrónico
  7. 7987
    por Bishop, Matt
    Publicado 2005
    “…Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. …”
    Libro electrónico
  8. 7988
    Publicado 2005
    “…You can't stop it; it has already happened; it is here to stay. And we are moving into a new global stage. …”
    Libro electrónico
  9. 7989
    por Stringer, Hank
    Publicado 2006
    “…Maximize these new technologies to grow Talent Force, tap into new sources of competitive intelligence and stay ahead of the pack. Foreword xi Acknowledgments xiii About the Authors xv Preface xvii Introduction xix Chapter 1 : The Quality Talent Imperative 1 Chapter 2 : Talent Market Demands 11 Chapter 3 : Building a Competitive Talent Organization 35 Chapter 4 : The Cultural Obsession of Work 59 Chapter 5 : Building a Talent Community 77 Chapter 6 : Tangible Talent Measurement 93 Chapter 7 : Talent Goes on Offense 115 Chapter 8 : Relationship Recruiting (Still) Rules 133 Chapter 9 : Talent Forces of Tomorrow 151 Index 163…”
    Libro electrónico
  10. 7990
    por Metsker, Steven John
    Publicado 2006
    “…Coverage includes Using Adapter to provide consistent interfaces to clients Using Facade to simplify the use of reusable toolkits Understanding the role of Bridge in Java database connectivity The Observer pattern, Model-View-Controller, and GUI behavior Java Remote Method Invocation (RMI) and the Proxy pattern Streamlining designs using the Chain of Responsibility pattern Using patterns to go beyond Java's built-in constructor features Implementing Undo capabilities with Memento Using the State pattern to manage state more cleanly and simply Optimizing existing codebases with extension patterns Providing thread-safe iteration with the Iterator pattern Using Visitor to define new operations without changing hierarchy classes If you're a Java programmer wanting to save time while writing better code, this book's techniques, tips, and clear explanations and examples will help you harness the power of patterns to improve every program you write, design, or maintain. …”
    Libro electrónico
  11. 7991
    Publicado 2009
    “…Bhattacharyya also lays bare the core physical concepts that will drive the future of VLSI development, allowing readers to stay ahead of the curve, despite the relentless evolution of new models. . …”
    Libro electrónico
  12. 7992
    por Swindall, Clint, 1967-
    Publicado 2011
    “…It will be imperative for leaders to focus on employee engagement in order to encourage good employees to stay when other opportunities arise, and to attract top talent when hiring resumes. …”
    Libro electrónico
  13. 7993
    por Jones, Capers
    Publicado 2011
    “…This book will help you Move beyond functional quality to quantify non-functional and structural quality Prove that improved software quality translates into strongly positive ROI and greatly reduced TCO Drive better results from current investments in Quality Assurance and Testing Use quality improvement techniques to stay on schedule and on budget Avoid ';hazardous' metrics that lead to poor decisions…”
    Libro electrónico
  14. 7994
    por Miller, Michael, 1958-
    Publicado 2012
    “…You’ll also learn how to: · Monitor 3G usage to avoid costly overages · Manage files stored on the web or your own flash drives · Play and edit online media · Browse and search the Web · Discover great new Chrome extensions and Apps for fun, family, and social networking · Safely share your Chromebook with other users · Work with free or low-cost web-based productivity tools · Configure Chromebook for more security, privacy, performance, and battery life · Save time with built-in shortcuts · Troubleshoot and recover from problems…”
    Libro electrónico
  15. 7995
    Publicado 2019
    “…What you will learn Install Elasticsearch and use it to safely store data and retrieve it when needed Work with a variety of analyzers and filters Discover techniques to improve search results in Elasticsearch Understand how to perform metric and bucket aggregations Implement best practices for moving clusters and applications to production Explore various techniques to secure your Elasticsearch clusters Who this book is for This book is for software developers, engineers, data architects, system administrators, and anyone who wants to get up and running with Elasticsearch 7. …”
    Libro electrónico
  16. 7996
    Publicado 2021
    “…If you experience the “Sunday night scaries,” count down the days to the weekend, or dread the thought of another day at work, maybe you can only see two options to escape your current misery: quit your job or stay and suffer. There is another option. In Own It. …”
    Libro electrónico
  17. 7997
    por Wolfe, Jennifer C. author
    Publicado 2020
    “…No boardroom in any industry is safe from new market threats in this time of rapid technological growth. …”
    Libro electrónico
  18. 7998
    Publicado 2020
    “…. • Discover Janine’s 30 secret strategies for business success • Share in her colourful anecdotes and life experiences • Gain business, leadership, and management insights • Go behind the scenes for her roles on Shark Tank and Survivor Anyone pursuing success can learn from Janine’s ability to offer popular products with staying power and fans of Boost Juice, Shark Tank or Survivor will enjoy a behind the scenes look at these famous global franchises. …”
    Libro electrónico
  19. 7999
    Publicado 2019
    “…Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you’re new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive…”
    Libro electrónico
  20. 8000
    Publicado 2020
    “…As Burnison says, when a door closes, leaders cannot afford to stand there, staring at it. …”
    Libro electrónico