Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,280
- Història 1,071
- Derecho penal 766
- Orígenes 614
- Origen 593
- Development 574
- Derechos humanos 520
- Tribunal Europeo de Derechos Humanos 513
- Application software 459
- Management 435
- History 431
- Universidad Pontificia de Salamanca (España) 405
- Criminal law 396
- Procedimiento penal 395
- Europa 383
- Law and legislation 368
- España 357
- Engineering & Applied Sciences 337
- Filosofía 330
- Derecho 309
- Hombre 302
- Data processing 301
- Cristianismo 277
- Computer networks 269
- Crítica e interpretación 268
- Computer Science 266
- Criminología 265
- Computer crimes 263
- Security measures 258
- Biblia 252
-
52861Publicado 2023Tabla de Contenidos: “…Chapter 6: Change Management: It's Not Just about the Systems, It's about the People -- Understanding the hard truths -- Change management and mental models - stakeholders -- Change management and mental models - individual contributors and users -- Taking baby steps to finish strong -- Designing a solid rollout plan -- Evangelizing the benefits -- Understanding who else the change will affect -- Summary -- Part 3: Research -- Chapter 7: Design Thinking: Understanding the Core Problem-Solving Tool in a UX Practice -- Exploring the core processes of design thinking -- Setting the scenario -- The team facilitator -- The primary interviewer -- Attributes of successful interviews -- The role of the core team members during iteration -- A real-world example of design thinking -- Mastering the fundamentals of discovery session facilitation -- Tone matters -- Time-keeping for focus -- Summary -- Chapter 8: Interviews and Personas - Best Practices for Quick and Efficient User Understanding -- Getting comfortable with an interview protocol -- Dissecting the stakeholder interview and persona -- The stakeholder interview -- The stakeholder persona -- Grasping the user interviews and personas -- The user interviews -- The user personas -- The importance of interviewing one person at a time -- Sometimes things don't work out as planned -- Summary -- Chapter 9: Surveys - A High-Level, Broad-Stroke Tool for Quick Direction -- Defining your audience -- Knockout questions -- Writing and rewriting the questions -- Writing opening-level questions -- Refining and rewriting the questions -- Gathering and synthesizing the resulting data -- If statistical significance is required -- Summary -- Chapter 10: UX Metrics - The Story of Operational Measurement -- Quick review of quantitative and qualitative metrics…”
Libro electrónico -
52862Publicado 2023Tabla de Contenidos: “…Networking components - VPCs, subnets, load balancers, and ingress controllers -- Storage services - block storage, object storage, and databases -- Falco - real-time monitoring for cloud workloads -- Summary -- Quiz -- Further readings -- Chapter 7: Cloud Security Operations -- Technical requirements -- Novel techniques in sourcing data points -- Centralized logging with the EFK stack -- Creating alerting and webhooks within different platforms -- Creating alerting rules in Prometheus -- Configuring webhook notifications for different platforms (e.g., Slack) -- Automating incident response with custom scripts and tools -- Automated security lapse findings -- Security Orchestration, Automation, and Response (SOAR) platforms -- SOAR platforms on the market -- Integrating security tools and automating workflows -- Integrating security tools -- Automating workflows -- Building and maintaining a security automation playbook -- Elements of a security automation playbook -- Building a security automation playbook -- Maintaining a security automation playbook -- Summary -- Quiz -- Further readings -- Chapter 8: DevSecOps Practices for Cloud Native -- Technical requirements -- Infrastructure as Code -- The importance of DevSecOps -- DevSecOps in practice -- Continuous integration and continuous deployment (CI/CD) in DevSecOps -- Infrastructure as Code (IaC) and Policy as Code in DevSecOps -- Security tools in DevSecOps -- Security implications of IaC -- Checkov - a comprehensive overview -- Policy as Code -- Why Policy as Code? …”
Libro electrónico -
52863Publicado 2024“…Enhance your writing with AI by mastering prompt engineering techniques and become an expert in developing and utilizing LLM prompts across applications Key Features Master prompt engineering techniques to harness AI's writing potential Discover diverse LLM applications for content creation and beyond Learn through practical examples, use cases, and hands-on guidance Purchase of the print or Kindle book includes a free PDF eBook Book Description Unlocking the Secrets of Prompt Engineering is your key to mastering the art of AI-driven writing. This book propels you into the world of large language models (LLMs), empowering you to create and apply prompts effectively for diverse applications, from revolutionizing content creation and chatbots to coding assistance. …”
Libro electrónico -
52864Publicado 2024“…It progresses to more advanced topics, including hypothesis testing, outliers, and the intricacies of dependent versus independent variables, ensuring you grasp the statistical tools necessary for data-driven decision-making. Moving ahead, you'll explore the mathematical frameworks crucial for machine learning algorithms. …”
Libro electrónico -
52865Publicado 2018“…Familias que viven la fe es un libro dirigido en primer lugar a los padres interesados en ayudar a sus hijos a crecer en la fe y a cultivar una experiencia espiritual, pero que no saben muy bien cómo hacerlo y buscan nuevas ideas y lenguajes frescos. …”
Libro -
52866Publicado 2007“…You won’t just learn syntax and features: you’ll build a complete, robust, data-driven application. You’ll put Visual Basic 2005 to work in solving real business problems, overcoming the practical challenges of building production systems, and you will learn to see Visual Basic 2005 projects as they were intended–as complete, cohesive solutions. …”
Libro electrónico -
52867por Shanley, Tom“…Essential topics covered include: Goals of single-task and multi-task operating systems The 386 processor—the baseline ancestor of the IA32 processor family The 486 processor, including a cache primer The Pentium processor The P6 roadmap, P6 processor core, and P6 FSB The Pentium Pro processor, including the Microcode Update feature The Pentium II and the Pentium II Xeon and Celeron processors The Pentium III and the Pentium III Xeon and Celeron processors The Pentium 4 processor family The Pentium M processor Processor identification, System Management Mode, and the IO and Local APICs An “at-a-glance” table of contents allows readers to quickly find topics ranging from 386 Demand Mode Paging to Pentium 4 CPU Arbitration. …”
Publicado 2004
Libro electrónico -
52868Publicado 2007“…For each class of security threat, Home Network Security Simplified provides a tutorial–including tricks and tools that hackers use, a primer on network security design fundamentals, and step-by-step instructions on implementing security solutions. …”
Libro electrónico -
52869Publicado 2007“…Table of Contents: Chapter 1: The VPN Technology Promise: Secure Access from Anywhere to Anything Chapter 2: Making the Business Case for Building or Buying a VPN Chapter 3: VPN Technology Primer and Comparisons of VPN Technology Options Chapter 4: Cisco Case Study: Deploying VPN Services for WAN Connectivity and Disaster Recovery Chapter 5: Case Study: Managed VPN Services for Teleworkers Using IPsec Technology Appendix A: Decision Maker Checklist: VPN Planning, Design, Implementation, and Operation Stages Appendix B: Decision Maker Checklist: VPN Vendor Selection About the author: Kunjal Trivedi , CCIE No. 3460, initially joined Cisco in 1999 as a consulting engineer but soon moved into security consulting. …”
Libro electrónico -
52870por Weber, Joe, 1972-“…BEA WebLogic Workshop Kick Start provides everything you need to get started with WebLogic Workshop, including a quick Java primer and appendixes covering the essentials of XML, SOAP and WSDL. …”
Publicado 2003
Libro electrónico -
52871por Diamond, Scott B.“…Scott spends some of his free time answering questions at the premier site for Access support: http://www.utteraccess.com. …”
Publicado 2008
Libro electrónico -
52872Publicado 2008“…Praise for Microsoft Office Project for Mere Mortals® “This book stands out of the ordinary, as it is the first one on Microsoft Office Project I know to be completely driven by project management methods.” –Jan De Messemaeker, M.S., Microsoft Project Most Valuable Professional “Patti Jansen’s practice sessions are a great way to become familiar with Microsoft Project and the step-by-step instructions make it easy . ” –Kimberly Amaris, PMP Patti Jansen, PMP, is a Senior Project Manager at QuantumPM, a leading project management consultancy that works closely with Microsoft. …”
Libro electrónico -
52873Publicado 2007“….” – Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language “'Secure Programming with Static Analysis' is a great primer on static analysis for security-minded developers and security practitioners. …”
Libro electrónico -
52874Publicado 2004“…“The author has hit on something here; particularly the fact that it is high time we quit thinking that treating everyone the same is somehow fair. …”
Libro electrónico -
52875Publicado 2007“…Use CAML, SharePoint’s XML-based language for defining content, manipulating searches, and more Work with the SharePoint Object Model Build reusable packages for easy deployment to SharePoint server farms Program SharePoint webs, sites, document libraries, and files Leverage SharePoint 2007’s improved lists and new list events Manipulate and query meetings and Meeting Workspaces Integrate external business data into SharePoint applications Construct business workflows for enterprise content management and other applications Program ASP.NET-based SharePoint Web Parts, from the basics to state-of-the-art techniques Create Web Parts that can provide and consume data through connections Use SharePoint 2007’s built-in Web services for managing document and Meeting Workspaces, imaging, and lists Centralize spreadsheet storage and management with Excel Services Manage user profiles and enhance application security Debug and deploy SharePoint 2007 applications Work with Records Repositories and metadata Introduction 1 1 Collaborative Application Markup Language (CAML) Primer 5 Part I Programming with the SharePoint Object Model 2 Introduction to the SharePoint Object Model 15 3 Programming with Features and Solutions 25 4 Working with Sites and Webs 35 5 Managing SharePoint Lists 47 6 Advanced List Management 59 7 Handling List Events 69 8 Working with Document Libraries and Files 83 9 Working with Meetings..…”
Libro electrónico -
52876Publicado 2007“…“In this updated and expanded edition of her excellent telecommunications primer, Lili explains in just the right detail everything you need to know to become fluent in this most important and fascinating industry. …”
Libro electrónico -
52877por Cini, Joanne“…Joanne has used her extensive business world experiences to put together a very informative primer for those involved in today's workforce. A necessary read.…”
Publicado 2004
Libro electrónico -
52878Publicado 2007“…PacketCable Implementation is the first complete primer on PacketCable network design, provisioning, configuration, management, and security. …”
Libro electrónico -
52879Publicado 2004“…An excellent companion to our popular sendmail , Third Edition, the sendmail 8.13 Companion provides a timely way to document the improvements in V8.13 in parallel with its release. …”
Libro electrónico -
52880por Jacobson, Ivar“…“No system has ever been designed from scratch perfectly; every system is composed of features layered in top of features that accumulate over time. Conventional design techniques do not handle this well, and over time the integrity of most systems degrades as a result. …”
Publicado 2004
Libro electrónico