Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
7981Publicado 2016Tabla de Contenidos: “…""Why you need a laptop""""Why you don't need a laptop""; ""Laptop Shopping""; ""Things to ignore when buying a laptop""; ""Things to heed when buying a laptop""; ""Software for Your Laptop""; ""The operating system""; ""Other software""; ""Laptop Hardware Buying Decisions""; ""Important laptop hardware guts""; ""Communications options""; ""The green laptop""; ""Service, Support, and Warranty""; ""The Final Step: Buying Your Laptop""; ""Part II Say Hello to Your Laptop""; ""Chapter 3 From Laptop Box to Lap""; ""Laptop Box 101""; ""Removing the laptop from the box""…”
Libro electrónico -
7982Publicado 2022“…In the third volume, we find projects focused on human rights: those of people with disabilities, the right to a safe and transparent society, and legal matters concerning international families Nel primo volume della collana Unimi Connect – Universo Terza Missione sono inclusi 14 progetti che riguardano il campo dell’inclusione sociale, della sostenibilità e dei diritti. …”
Libro electrónico -
7983Publicado 2014Tabla de Contenidos: “…Front Cover; Contents; Acknowledgments; About the Author; Introduction; Chapter 1: Prevention and Personal Accountability; Chapter 2: System Says ...; Chapter 3: Care Ethics; Chapter 4: From the Exhibit Hall to Your Body; Chapter 5: Trading Hotel Rooms for Sick Beds; Chapter 6: Insured or Imagined?…”
Libro electrónico -
7984por Drymonitis, Alexandros“…Dive into the world of computer music and physical computing and stay ahead of the melodic curve. This book is aimed at adventurous musicians who want to learn about music programming with Arduino, sensors, and Pure Data, and how to make new interfaces and instruments with that knowledge. …”
Publicado 2024
Libro electrónico -
7985Publicado 2007“…After reading this book--even if you've been using CS3 for a while--don't be surprised to hear yourself say, 'I didn't know CS3 did that!' In addition to learning the new features in no time flat, a welcome side effect of learning from Ben is that you can expect to become a better, faster and more efficient Photoshop user…”
Libro electrónico -
7986Publicado 2006“…Coverage includes Architectural overview: how SQL Server 2005’s features work together and what it means to you Security management, policies, and permissions: gaining tighter control over your data SQL Server Management Studio: Microsoft’s new, unified tool suite for authoring, management, and operations Availability enhancements: online restoration, improved replication, shorter maintenance/recovery windows, and more Scalability improvements, including a practical explanation of SQL Server 2005’s complex table partitioning feature Data access enhancements, from ADO.NET 2.0 to XML SQL Server 2005’s built-in .NET CLR: how to use it, when to use it, and when to stay with T-SQL Business Intelligence Development Studio: leveraging major improvements in reporting and analytics Visual Studio integration: improving efficiency throughout the coding and debugging process Simple code examples demonstrating SQL Server 2005’s most significant new features…”
Libro electrónico -
7987por Bishop, Matt“…Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. …”
Publicado 2005
Libro electrónico -
7988Publicado 2005“…You can't stop it; it has already happened; it is here to stay. And we are moving into a new global stage. …”
Libro electrónico -
7989por Stringer, Hank“…Maximize these new technologies to grow Talent Force, tap into new sources of competitive intelligence and stay ahead of the pack. Foreword xi Acknowledgments xiii About the Authors xv Preface xvii Introduction xix Chapter 1 : The Quality Talent Imperative 1 Chapter 2 : Talent Market Demands 11 Chapter 3 : Building a Competitive Talent Organization 35 Chapter 4 : The Cultural Obsession of Work 59 Chapter 5 : Building a Talent Community 77 Chapter 6 : Tangible Talent Measurement 93 Chapter 7 : Talent Goes on Offense 115 Chapter 8 : Relationship Recruiting (Still) Rules 133 Chapter 9 : Talent Forces of Tomorrow 151 Index 163…”
Publicado 2006
Libro electrónico -
7990por Metsker, Steven John“…Coverage includes Using Adapter to provide consistent interfaces to clients Using Facade to simplify the use of reusable toolkits Understanding the role of Bridge in Java database connectivity The Observer pattern, Model-View-Controller, and GUI behavior Java Remote Method Invocation (RMI) and the Proxy pattern Streamlining designs using the Chain of Responsibility pattern Using patterns to go beyond Java's built-in constructor features Implementing Undo capabilities with Memento Using the State pattern to manage state more cleanly and simply Optimizing existing codebases with extension patterns Providing thread-safe iteration with the Iterator pattern Using Visitor to define new operations without changing hierarchy classes If you're a Java programmer wanting to save time while writing better code, this book's techniques, tips, and clear explanations and examples will help you harness the power of patterns to improve every program you write, design, or maintain. …”
Publicado 2006
Libro electrónico -
7991Publicado 2009“…Bhattacharyya also lays bare the core physical concepts that will drive the future of VLSI development, allowing readers to stay ahead of the curve, despite the relentless evolution of new models. . …”
Libro electrónico -
7992por Swindall, Clint, 1967-“…It will be imperative for leaders to focus on employee engagement in order to encourage good employees to stay when other opportunities arise, and to attract top talent when hiring resumes. …”
Publicado 2011
Libro electrónico -
7993por Jones, Capers“…This book will help you Move beyond functional quality to quantify non-functional and structural quality Prove that improved software quality translates into strongly positive ROI and greatly reduced TCO Drive better results from current investments in Quality Assurance and Testing Use quality improvement techniques to stay on schedule and on budget Avoid ';hazardous' metrics that lead to poor decisions…”
Publicado 2011
Libro electrónico -
7994por Miller, Michael, 1958-“…You’ll also learn how to: · Monitor 3G usage to avoid costly overages · Manage files stored on the web or your own flash drives · Play and edit online media · Browse and search the Web · Discover great new Chrome extensions and Apps for fun, family, and social networking · Safely share your Chromebook with other users · Work with free or low-cost web-based productivity tools · Configure Chromebook for more security, privacy, performance, and battery life · Save time with built-in shortcuts · Troubleshoot and recover from problems…”
Publicado 2012
Libro electrónico -
7995Publicado 2019“…What you will learn Install Elasticsearch and use it to safely store data and retrieve it when needed Work with a variety of analyzers and filters Discover techniques to improve search results in Elasticsearch Understand how to perform metric and bucket aggregations Implement best practices for moving clusters and applications to production Explore various techniques to secure your Elasticsearch clusters Who this book is for This book is for software developers, engineers, data architects, system administrators, and anyone who wants to get up and running with Elasticsearch 7. …”
Libro electrónico -
7996Publicado 2021“…If you experience the “Sunday night scaries,” count down the days to the weekend, or dread the thought of another day at work, maybe you can only see two options to escape your current misery: quit your job or stay and suffer. There is another option. In Own It. …”
Libro electrónico -
7997por Wolfe, Jennifer C. author“…No boardroom in any industry is safe from new market threats in this time of rapid technological growth. …”
Publicado 2020
Libro electrónico -
7998Publicado 2020“…. • Discover Janine’s 30 secret strategies for business success • Share in her colourful anecdotes and life experiences • Gain business, leadership, and management insights • Go behind the scenes for her roles on Shark Tank and Survivor Anyone pursuing success can learn from Janine’s ability to offer popular products with staying power and fans of Boost Juice, Shark Tank or Survivor will enjoy a behind the scenes look at these famous global franchises. …”
Libro electrónico -
7999Publicado 2019“…Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you’re new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive…”
Libro electrónico -
8000Publicado 2020“…As Burnison says, when a door closes, leaders cannot afford to stand there, staring at it. …”
Libro electrónico