Mostrando 45,161 - 45,180 Resultados de 52,366 Para Buscar 'ZCom~', tiempo de consulta: 0.87s Limitar resultados
  1. 45161
    Publicado 2015
    “…Whatever your experience or industry, you can become a more confident, skilled project manager— and fast! …”
    Video
  2. 45162
    Publicado 2007
    “…–Rich Bowen, coauthor, Apache Administrators Handbook, Apache Cookbook, and The Definitive Guide to Apache mod_rewrite "A first-rate guide to getting the most out of Apache as a modular application platform–sure to become a must-read for any Apache programmer, from beginner to experienced professional. …”
    Libro electrónico
  3. 45163
    Publicado 2016
    Tabla de Contenidos: “…Culture Across Ages and Stages The GM Salute Chapter 11 Take "Yes But" Off the Table Resetting the Negative Chapter 12 The Folly of Internal Customers Learning to Love People You Don't Even Like Stop Talking about Internal Customers, Start Talking about Winning Connect the Dots to Actual Human Beings Correlate Non-Performance to Customer Impact Chapter 13 Name Your Noble Sales Purpose A Word about We Chapter 14 How to Keep Purpose From Being Hijacked Tag Lines Come and Go Beyond the Value Proposition Customers and Employees Are Not Your Masters Customer-Centricity Versus Customer-Impact Commercial Versus Philanthropic Culture Follows Purpose, Not the Reverse Training is Not Enough Cynics and Naysayers Chapter 15 Why Your Backstory Matters Say What You Need to Say Chapter 16 Give Yourself Space to say NO Doing the Right Thing Makes You Money. …”
    Libro electrónico
  4. 45164
    Publicado 2022
    “…This book will help you Set up your Rails development environment Record version changes with Git and create a secure remote repository at GitHub Deploy your applications early and often with Heroku Go beyond generated code to truly understand how to build Rails applications from scratch Learn testing and test-driven development (TDD) Effectively use the model-view-controller (MVC) pattern Structure applications using the REST architecture Build static pages and transform them into dynamic ones Master the Ruby programming skills all Rails developers need Create high-quality site layouts and data models Implement registration and authentication systems, including validation and secure passwords Update, display, and delete users Upload and display images using Active Storage and Amazon S3 Implement account activation and password reset, including sending email with Rails Integrate JavaScript with Rails using Importmap Add social features and microblogging, including an introduction to Hotwire and Turbo Register your book for convenient access to downloads, updates, and/or corrections as they become available. …”
    Libro electrónico
  5. 45165
    Publicado 2014
    “…It also tells the remarkable story of how two women from very different backgrounds rose to become leaders in Lenovo's journey to the top. …”
    Grabación no musical
  6. 45166
    Publicado 2013
    “…A BOLD NEW VISION FOR THE FUTURE OF BUSINESS, FROM THE BESTSELLING AUTHOR OF THE DREAM SOCIETY THIS IS A BOOK ABOUT THE FUTURE. …”
    Grabación de sonido
  7. 45167
    Publicado 2014
    “…Truly honest instruction from the Lombardi of business development coaches." -- James H. …”
    Grabación de sonido
  8. 45168
    Publicado 2014
    “…It also tells the remarkable story of how two women from very different backgrounds rose to become leaders in Lenovo's journey to the top. …”
    Grabación de sonido
  9. 45169
    Publicado 2011
    “…., author of Million Dollar Consulting and The Consulting Bible “I believe strongly that you cannot become a leader in an organization that operates in contrast to your personal values. …”
    Grabación de sonido
  10. 45170
    Publicado 2024
    “…His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT…”
    Video
  11. 45171
    Publicado 2020
    “…Traditional explanations for why extreme sports have become so popular are varied. For some, the popularity is explained as the desire to rebel against a society that is becoming too risk averse, for others it is about the spectacle and the merchandise that is associated with organised activities and athletes. …”
    Libro electrónico
  12. 45172
    Publicado 2023
    “…Become a security automation expert and build solutions that save time while making your organization more secure Key Features What's inside An exploration of the SOAR platform's full features to streamline your security operations Lots of automation techniques to improve your investigative ability Actionable advice on how to leverage the capabilities of SOAR technologies such as incident management and automation to improve security posture Book Description What your journey will look like With the help of this expert-led book, you'll become well versed with SOAR, acquire new skills, and make your organization's security posture more robust. …”
    Libro electrónico
  13. 45173
    Publicado 2024
    “…The course focuses on the pentesting methodology, guiding you through the stages of assessment from validating scope to reconnaissance, vulnerability scanning, and exploitation. …”
    Video
  14. 45174
    Publicado 2024
    “…Certifications: CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT Chris Ward: Chris has been a Technical Instructor for 20+ years with certifications in CompTIA, Microsoft, Cisco and more. …”
    Video
  15. 45175
    Publicado 2023
    Tabla de Contenidos: “…Chapter 10: Improving the Bottle Holder Design -- Technical requirements -- Making design changes -- Adding tolerances -- Removing material with the Shell tool -- Adding parts from McMaster-Carr -- Adding a nut and bolt from McMaster-Carr -- Using joints to place a McMaster-Carr part -- Fixing the hole size -- Bringing in a hex nut from McMaster-Carr -- Adding a slider joint for Holder 01 and Holder 2 -- Creating a part drawing -- Creating a BOM -- Creating a sheet for Holder 2 -- Adding dimensions -- Making an adjustment to the 3D model -- Summary -- Part 3: The Form Environment -- Chapter 11: The FORM Environment -- Technical requirements -- Overview of the FORM environment -- Working with form models -- Filling in a hole in the FORM environment -- The CREATE and MODIFY tools -- Selecting features on an object -- Filling holes -- The Edit Form tool -- Fixing a broken mesh body -- Surface tools -- Summary -- Chapter 12: Modeling a Scary Tealight Ghost -- Technical requirements -- Using surfaces to create the tealight -- Creating the ghost -- Rendering the ghost -- Changing the material -- Change the scene settings -- Render settings -- Summary -- Chapter 13: Using Form and Solid Modeling to Create a Cushioned Chair -- Technical requirements -- Creating a chair in the form environment -- Shape the chair with the Edit Form tool -- Adding a material to faces -- Creating the inner frame -- Head and arm support -- Improving the design -- Changing the selected sketch plane -- Summary -- Part 4: Working with 2D and 3D Scanned Images -- Chapter 14: Using a Scanned Image to Create a 3D Model -- Technical requirements -- Inserting a scanned image into Fusion 360 -- Calibrate the image to size -- Adding sketch lines and dimensions -- Creating a 3D model -- The sword model -- The guard and hilt -- The handle -- The finishing touches -- Summary…”
    Libro electrónico
  16. 45176
    Publicado 2023
    “…With the simple approach of this audiobook, you will become comfortable with the jargon associated with Kubernetes and its architecture. …”
    Grabación no musical
  17. 45177
    Publicado 2023
    “…In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. …”
    Libro electrónico
  18. 45178
    Publicado 2024
    Tabla de Contenidos: “…-- The basic components of API architecture and communication protocols -- Types of APIs and their benefits -- Common communication protocols and security considerations -- Summary -- Further reading -- Chapter 2: The Evolving API Threat Landscape and Security Considerations -- A historical perspective on API security risks -- The early days of APIs -- The rise of the web and web APIs -- The rise of REST and modern APIs -- The era of microservices, IoT, and cloud computing -- The modern API threat landscape -- Key considerations for API security in a growing ecosystem -- Emerging trends in API security -- Zero-trust architecture in API security -- Exploring blockchain for enhanced API security -- The rise of automated attacks and bots -- Quantum-resistant cryptography in API security -- Serverless architecture security in API security -- Behavioral analytics and user behavior profiling in API security -- Lesson from a real-life API data breach -- Uber data breach (2016) -- Equifax data breach (2017) -- MyFitnessPal data breach (2018) -- Facebook Cambridge Analytica scandal (2018) -- Summary -- Further reading -- Chapter 3: OWASP API Security Top 10 Explained -- OWASP and the API Security Top 10 - A timeline -- Exploring the API Security Top 10 -- OWASP API 1 - Broken Object Level Authorization -- OWASP API 2 - Broken Authentication…”
    Libro electrónico
  19. 45179
    por Gerosa, Alessandro
    Publicado 2024
    “…From this premise, the book advances multiple original contributions. …”
    Libro electrónico
  20. 45180
    por Negro, Frankie Costa
    Publicado 2022
    “…Become an expert in AWS Outposts and Hybrid architectures with in-depth explanations of the product and order processes while exploring the capabilities for creating next-generation edge solutions Key Features Learn AWS Outposts from the ground up guided by an AWS hybrid edge solutions architect Master hybrid edge concepts, use cases, and architectures and discover how AWS Outposts fits into this space Become the go-to professional for designing, deploying, operating, and maintaining AWS Outposts Book Description The hybrid edge specialty is often misunderstood because it began with an on-premises-focused view encompassing everything not running inside the traditional data center. …”
    Libro electrónico