Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,308
- Historia 1,219
- Development 1,058
- Engineering & Applied Sciences 946
- Història 917
- Application software 868
- Management 860
- Computer Science 622
- Computer networks 462
- Leadership 443
- Data processing 438
- Computer programs 405
- Design 398
- Cloud computing 367
- Examinations 363
- Business & Economics 362
- Social aspects 358
- Security measures 351
- Education 344
- Bíblia 342
- Web site development 335
- Web sites 333
- Computer security 321
- Python (Computer program language) 321
- Politics and government 318
- Filosofía 315
- Photography 310
- Computer software 303
- Programming 297
- Information technology 295
-
47981Publicado 2006“…Since its initial release in 2002, .NET has changed significantly, becoming the foundation for a new generation of Windows applications. …”
Libro electrónico -
47982Publicado 2013“…In this Adobe After Effects CC training course, expert author Jeff Sengstack teaches you how to get the most out your post-production effects and compositing with this powerful software from Adobe. Designed for the beginner, you will learn how to use After Effects CC from the ground up, no previous experience is necessary! …”
-
47983Publicado 2014“…It is essential to our prosperity and it will only become more so in this century. -- President Barack Obama March 11, 2010 This book is the product of hundreds and hundreds of hours of research, with material, both primary and secondary, reviewed, studied, and gleaned from numerous sources, including White House documentation, the US Congress, various other government agencies, many web searches for specific and general information, certain web blogs that are concerned with China's growing economic influence, and then the analysis of the accumulated information. …”
Libro electrónico -
47984por Passarelli, Dan, 1971-“…It skillfully shows how they can be used to facilitate trading strategies that seek to profit from volatility, time decay, or changes in interest rates. …”
Publicado 2012
Libro electrónico -
47985por Rizopoulos, Dimitris“…Preface Joint models for longitudinal and time-to-event data have become a valuable tool in the analysis of follow-up data. …”
Publicado 2012
Libro electrónico -
47986Publicado 2018Tabla de Contenidos: “…part PART I Developing, implementing and maintaining risk strategies -- chapter 1 Developments in risk security / chapter 2 The evolution of risk management thinking in organizations / chapter 3 Intuition and decision making for crisis situations / chapter 4 Business continuity management organizations: the models of implementation / chapter 5 Knowledge in high-reliability organizations: a review of interrelated perspectives / part Part II Natural and man-made disasters -- chapter 6 A retrospective account of the impacts of the 1960 Valdivia, Chile, earthquake and tsunami and the lack of business continuity planning / chapter 7 What lurks beneath: deep supply chain risks / chapter 8 Crisis leadership: a leader’s new normal / chapter 9 Internal investigations of white-collar crime / chapter 10 Collapse or recovery after white-collar crime / part Part III Infrastructure risks -- chapter 11 Business resiliency considerations: in the site selection and construction of a new facility / chapter 12 Megacities at risk / chapter 13 Self-organization and its role in building disaster resilience / chapter 14 Risk management in the bioeconomy / chapter 15 SMEs defending their businesses from flood risk: contributing to the theoretical discourse on resilience / part Part IV Systems security for business resiliency -- chapter 16 Security awareness in the software arena / chapter 17 Information security in an ever-changing threat landscape / chapter 18 Business continuity and e-business: towards an “always-on” e-business / chapter 19 Using location k-anonymity models for protecting location privacy / part Part V Risk in business sectors -- chapter 20 Accounting information systems: opportunity and risk Shoshana Altschuller and Shaya (Isaiah) Altschuller -- chapter 21 Transcending beyond finance for managing foreign exchange risk / chapter 22 Financial risk inherent in oil fracking / chapter 23 Cause-related marketing and disaster management: opportunities from tourism-related initiatives / chapter 24 Shared sorrow is half a sorrow: the role of social capital in building resilient supply chains / chapter 25 Risk management and auditing of technology incubators/science parks: innovation enabler to drive capacity of tech ventures / part Part VI Qualitative and quantitative risk modeling -- chapter 26 What’s in a name? …”
Libro electrónico -
47987Publicado 2016“…Understand the different types of power Discover new tools of influence and the art of power play Explore influence strategies with impact and integrity Become a power player and deliver results Influence is a science, and it's the key to your personal and professional success. …”
Libro electrónico -
47988por McDonough, James E. author“…Object-Oriented Design with ABAP presents a bridge from the familiar procedural style of ABAP to the unfamiliar object-oriented style, taking you by the hand and leading you through the difficulties associated with learning these concepts, covering not only the nuances of using object-oriented principles in ABAP software design but also revealing the reasons why these concepts have become embraced throughout the software development industry. …”
Publicado 2017
Libro electrónico -
47989por Liberty, Jesse“…This book is sure to become a key component of developers' .NET libraries…”
Publicado 2003
Libro electrónico -
47990por Kung, S. Y.“…A breakthrough approach to improving biometrics performance Constructing robust information processing systems for face and voice recognition Supporting high-performance data fusion in multimodal systems Algorithms, implementation techniques, and application examples Machine learning: driving significant improvements in biometric performance As they improve, biometric authentication systems are becoming increasingly indispensable for protecting life and property. …”
Publicado 2005
Libro electrónico -
47991Publicado 2005“…Get Find the Bug , and you'll become one. Long-time Microsoft programmer Adam Barr presents 50 programs, each with exactly one bug. …”
Libro electrónico -
47992por Fox, Tim“…Pro Oracle Application Express 4 is your key to mastering one of the most innovative products to come out of Oracle in years. Application Express, termed "APEX" for short, is fast becoming one of the easiest and most widely-used of tools for creating enterprise-level applications that run against an Oracle database. …”
Publicado 2011
Libro electrónico -
47993Publicado 2022Tabla de Contenidos: “…-- Discrete Distributions -- Bernoulli Distribution and Trials -- Geometric Distribution -- Binomial Distribution -- Distributions Application -- Continuous Distributions -- Differences from Discrete Distributions -- Exponential Distribution -- Normal Distribution -- Expected Value -- Variance and Standard Deviation -- Chapter Summary -- Chapter 4: Predicting House Sale Prices with Linear Regression -- Linear Regression -- Splines -- Regression Techniques -- Loss Function -- Finding an Optimal Solution -- Implementing Simple Linear Regression -- Multiple Linear Regression -- Deriving Linear Regression with Vectors -- Implementing Multiple Linear Regression -- Predicting House Sale Prices -- Chapter Summary -- Chapter 5: Hypothesis Testing -- What Is Hypothesis Testing? …”
Libro electrónico -
47994Publicado 2022“…It is an invaluable reference to keep by your side as you progress in your jQuery development. Start becoming a jQuery pro with jQuery Recipes today. You will: Understand the basics of jQuery and how this library works Learn how to traverse and manipulate the DOM to your own requirements Explore jQuery UI techniques including accordion, dialog, slider, date picker and autocomplete Work with popular plugins and CSS to customize and tailor your development…”
Libro electrónico -
47995por Nolan, Godfrey. author, Truxall, David. author, Sood, Raghav. author, Cinar, Onur. authorTabla de Contenidos: “…""Native I/O""""Caching Classes, Method and Field IDs""; ""Threading""; ""Never Cache the JNI Environment Interface Pointer""; ""Never Access Java Space from Detached Native Threads""; ""Troubleshooting""; ""Extended JNI Check""; ""Always Check for Java Exceptions""; ""Always Check JNI Return Values""; ""Always Add Log Lines While Developing""; ""Native Code Reuse Using Modules""; ""Benefit from Compiler Vectorization""; ""Summary""; ""Chapter 6: Security""; ""The State of Android Security""; ""Secure Coding Practices""; ""Industry Standard Lists""; ""PCI List""; ""OWASP""…”
Publicado 2014
Libro electrónico -
47996Publicado 2013“…With more than 600 million iOS devices sold, Apple’s booming mobile platform provides a immense and continuously growing app market for developers. …”
Libro electrónico -
47997Publicado 2014“…Whether you're looking to become certified, land a job, or increase your skills, you'll benefit from SAS Macro Programming Made Easy, Third Edition. …”
Libro electrónico -
47998por Van Hurkman, Alexis“…The color grading suite has become the lab, and these sorts of stylizations are now part of the colorist’s job description. …”
Publicado 2014
Libro electrónico -
47999Publicado 2016“…Leading Risk Managers on Risk Culture sheds light on today’s risk management landscape through a unique collection of interviews from risk leaders in both the banking and investment industries. …”
Libro electrónico -
48000Publicado 2015Tabla de Contenidos: “…Foreword to 2015 15th anniversary edition -- Introduction from the paperback edition -- Preface -- About the author -- Part 1: Landscape: -- Digital threats -- Attacks -- Adversaries -- Security needs -- Part 2: Technologies: -- Cryptography -- Cryptography in context -- Computer security -- Identification and authentication -- Networked-computer security -- Network security -- Network defenses -- Software reliability -- Secure hardware -- Certificates and credentials -- Security tricks -- Human factor -- Part 3: Strategies: -- Vulnerabilities and the vulnerability landscape -- Threat modeling and risk assessment -- Security policies and countermeasures -- Attack trees -- Product testing and verification -- Future of products -- Security processes -- Conclusion -- Afterword -- Resources -- Acknowledgments -- Index…”
Libro electrónico