Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Application software 28
- Development 24
- Cloud computing 10
- Python (Computer program language) 10
- Computer security 8
- Security measures 8
- Amazon Web Services (Firm) 7
- Examinations 7
- Mobile computing 7
- Android (Electronic resource) 6
- Web site development 6
- iOS (Electronic resource) 6
- Computers 5
- JavaScript (Computer program language) 5
- Photography 5
- Tablet computers 5
- iPad (Computer) 5
- iPhone (Smartphone) 5
- Certification 4
- Computer networks 4
- Computer programming 4
- Computer programs 4
- Computer software 4
- Digital techniques 4
- Engineering & Applied Sciences 4
- Internet marketing 4
- Operating systems (Computers) 4
- Swift (Computer program language) 4
- Client/server computing 3
- Computer Applications 3
-
101Publicado 2017Libro electrónico
-
102Publicado 2019“…Using Maintenance Utilities: Find out which maintenance apps are most useful, which should be avoided, and what to watch out for when using third-party utilities. Daily, Weekly, Monthly, & Yearly Tasks: Performing quick and easy maintenance tasks on a regular schedule can prevent small problems from turning into major disasters. …”
Libro electrónico -
103
-
104por Freeman, Adam“…The book's authors Steve Sanderson and Adam Freeman have both watched the growth of ASP.NET MVC since its first release. …”
Publicado 2011
Libro electrónico -
105
-
106por Plummer, TimTabla de Contenidos: “…Converting to the site module -- Translating your module -- Adding a help file -- Template overrides -- Watch out when updating -- Alternative layouts -- Making your module responsive -- Summary -- 4. …”
Publicado 2013
Libro electrónico -
107Publicado 2016“…Finally, you will walk through the different tools and frameworks that will help expedite your daily development cycles. Watch how your application development grows by learning from the only guide that is solely orientated towards building a full, end-to-end, real-time application using the MEAN stack! …”
Libro electrónico -
108Publicado 2024Libro electrónico
-
109Publicado 2018Libro electrónico
-
110Publicado 2023Tabla de Contenidos: “…-- Industrialisation and mass society -- The beginning of consumer society -- The second moment: professionalisation, consolidation, and redemption -- The problem with patent medicine -- The search for respectability -- The third moment: hidden persuaders and Creative Revolutionaries -- The fear of advertising -- "Think Small" and the Creative Revolution -- The fourth moment: digital advertising, algorithms, and social media -- The first online advertising -- Algorithmic advertising -- Social media advertising -- The changing nature of advertising -- References -- Chapter 3: Analysing advertisements: Form, semiotics, and ideology -- Advertising contexts, codes, and conventions -- The importance of medium -- Analysing static advertisements -- Analysing video advertisements -- Analysing advertising in video games -- Semiotic analysis of advertising -- Denotative signs -- Connotative meanings -- Anchorage and meaning -- Mythology and ideology…”
Libro electrónico -
111
-
112Publicado 2023“…Chromebook For Dummies, Third Edition, is your easy-to-follow guide to the low-cost alternative to a traditional laptop. …”
Libro electrónico -
113Publicado 2017Libro electrónico
-
114Publicado 2014“…The problem today is the sheer number and size of images, responsive design elements, and the boom in third-party components. How can you help reverse this trend? …”
-
115Publicado 2014“…He describes different types of investment vehicles and advises you on how to be successful at picking companies, understanding their accounts, managing a sophisticated portfolio, measuring performance and risk and setting up an investment club. The third edition of this investing classic will give you everything you need to choose your shares with skill and confidence. …”
Libro electrónico -
116Publicado 2017Libro electrónico
-
117Publicado 2013Tabla de Contenidos: “…How to add startup apps -- Recording app problems -- Understanding app permissions -- The .NET Framework -- The parts of a Windows 8.1 app -- Types of Windows 8.1 apps -- XAML app file types -- HTML5 app file types -- Configuration settings -- File locations -- App manifests -- App compatibility settings -- Managing Windows 8.1 app packages -- How to run Dism -- How to list Windows 8.1 app packages -- How to remove Windows 8.1 app packages -- Monitoring app events -- Chapter 7: Using Windows 8.1 accessibility features -- Choosing accessible hardware -- Configuring accessibility options -- Visual accessibility -- Making everything bigger -- Increasing contrast -- Magnifying the screen -- Third-party screen magnification software -- Narrator -- Third-party text-to-speech software -- Making the pointer easier to find -- User input accessibility -- Using Windows 8.1 with only a keyboard -- Using Windows 8.1 with only a mouse -- Using Windows 8.1 with speech recognition -- Using Windows 8.1 with touch -- Dyslexia and reading accessibility -- Chapter 8: Obtaining help and support -- Obtaining professional support -- Help and support -- Determining who to contact for support -- Searching the Internet -- Asking for help -- Connecting with Remote Assistance -- Enabling Remote Assistance -- Creating a Remote Assistance invitation -- Using Remote Assistance -- Recording problems -- Part 2: File management -- Chapter 9: Organizing and protecting files -- The Windows 8.1 way of organizing files -- File system concepts -- File names -- Attributes -- Working with libraries -- Zipping folders -- Protecting files -- Using permissions -- Using encryption -- Advanced searching -- Freeing up disk space -- File organization tips -- Chapter 10: Backing up and restoring files -- Backup concepts -- Connecting a backup disk -- Backing up and recovering files…”
Libro electrónico -
118Publicado 2021Tabla de Contenidos: “…Security by cloud models -- Data security in the cloud -- Securing Kubernetes and APIs -- Cloud-native security -- Controlling access to the Kubernetes API -- Controlling access to kubelet -- Preventing containers from loading unwanted kernel modules -- Restricting access to etcd -- Avoiding the use of alpha or beta features in production -- Third-party integrations -- Hardening database services -- Testing your cloud security -- Azure Security Center -- Amazon CloudWatch -- AppDynamics -- Nessus vulnerability scanner -- InsightVM -- Intruder -- Summary -- Further reading -- Chapter 12: Mastering Web App Security -- Technical requirements -- Gathering intelligence about your site/web application -- Importance of public data gathering -- Open Source Intelligence -- Hosting information -- Checking data exposure with Google hacking (dorks) -- Leveraging DVWA -- Installing DVWA on Kali Linux -- Overviewing the most common attacks on web applications -- Exploring XSS attacks -- Using Burp Suite -- Burp Suite versions -- Setting up Burp Suite on Kali -- SQL injection attack on DVWA -- Fixing a common error -- Brute forcing web applications' passwords -- Analyzing the results -- Summary -- Further reading -- Section 3: Deep Dive into Defensive Security -- Chapter 13: Vulnerability Assessment Tools -- Technical requirements -- Dealing with vulnerabilities -- Who should be looking for vulnerabilities? …”
Libro electrónico -
119
-
120