Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,308
- Historia 1,220
- Development 1,058
- Engineering & Applied Sciences 946
- Història 917
- Application software 868
- Management 860
- Computer Science 622
- Computer networks 462
- Leadership 443
- Data processing 438
- Computer programs 405
- Design 398
- Cloud computing 367
- Examinations 363
- Business & Economics 362
- Social aspects 358
- Security measures 351
- Education 344
- Bíblia 342
- Web site development 335
- Web sites 333
- Computer security 321
- Python (Computer program language) 321
- Politics and government 318
- Filosofía 314
- Photography 310
- Computer software 303
- Programming 297
- Crítica e interpretación 295
-
50081Publicado 2008“…--Alan Colmes, Syndicated radio talk show host and co-host of Hannity and Colmes on Fox News Channel Scams are everywhere...now discover exactly how to protect yourself! …”
Libro electrónico -
50082por Collier, MarshaTabla de Contenidos: “…Power up to PowerSeller status -- Hit your sales targets -- Build better listings -- Become a model seller -- Manage your business…”
Publicado 2008
Libro electrónico -
50083por Hartung, Adam, 1957-“…Maintaining ”The Phoenix Principle” for long-term success Practicing Disruption until it comes naturally…”
Publicado 2008
Libro electrónico -
50084por Levinson, William A., 1957-“…The first section then adds a proactive improvement cycle that sets out to look for trouble by isolating processes for analytical purposes and then measuring (and balancing) inputs with outputs to force all wastes to become visible. It is in fact technically impossible for any waste of material or energy to hide from what chemical engineers call a material and energy balance. …”
Publicado 2013
Libro electrónico -
50085por Douglas, David“…This engaging and thought-provoking book, written by computer industry luminaries David Douglas and Greg Papadopoulos, focuses on two topics that are becoming vitally important in the day-to-day work of engineers: eco engineering and intellectual property (IP). …”
Publicado 2009
Libro electrónico -
50086Publicado 2013“…Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. …”
Libro electrónico -
50087Publicado 2014“…Or, is it possible that they will become epicenters of progress in the United States? …”
Libro electrónico -
50088Publicado 2012“…This book is designed for SharePoint users who want to become tech-savvy in configuring SharePoint’s out-of-the-box functionality. …”
Libro electrónico -
50089Publicado 2010“…This book provides a great opportunity for others to learn from Kaiser Permanente's pioneering efforts." —Janet M. …”
Libro electrónico -
50090Publicado 2020“…Cultural practices of exploring, revitalizing, interpreting and developing cultural heritage have become an important driving force in alleviating the social, cultural, environmental and economic challenges of today's world and in initiating sustainable progress in local communities. …”
Libro electrónico -
50091Publicado 2017“…As an academic field, the intellectual ambition of Curriculum Studies is to increasingly become aware of the normative, political and knowledge/power dynamics of education under constant negotiation with all its intended and unintended consequences."…”
Libro electrónico -
50092Publicado 2020“…Until a recent "boom," Shimao Toshio, writer of short fiction, critic, and essayist, was not widely known, even in Japan. …”
Libro electrónico -
50093Publicado 2022“…Internet powerhouses such as Netflix, Yahoo, and eBay have deployed Spark at a massive scale. It has quickly become the largest open-source community in big data. …”
Video -
50094Publicado 2022“…You'll start with a crash course in Python, SQL, and data science to develop and tune sophisticated models from scratch to automate processes and make predictions in the biotechnology and life sciences domain. …”
Libro electrónico -
50095Publicado 2014“…Software architecture is a fast-moving, multidisciplinary subject where entire suites of "best practices" become obsolete practically overnight. No single path or curriculum exists, and different types of architecture—application, integration, enterprise—require different subject emphasis. …”
-
50096Publicado 2018Tabla de Contenidos: “…Intro -- TABLE OF CONTENTS -- WHY YOU SHOULD READ THIS BOOK -- HOW TO HAVE HARD CONVERSATIONS, CREATE ACCOUNTABILITY, AND INSPIRE ACTION ON YOUR MOST IMPORTANT WORK -- NOTE -- ELEMENT ONE: BUILD YOUR CONFIDENCE -- PART ONE: KNOW WHO YOU ARE -- CHAPTER 1: BE YOURSELF -- CHAPTER 2: FIND YOUR GROUND -- CHAPTER 3: STAY CURIOUS ABOUT YOURSELF -- CHAPTER 4: ACCESS SELF-COMPASSION -- CHAPTER 5: EMBRACE YOUR SHADOW -- CHAPTER 6: IT'S NOT ALL ABOUT ACHIEVEMENT -- PART TWO: BECOME WHO YOU WANT TO BE -- CHAPTER 7: FIND CLARITY -- CHAPTER 8: BECOME MORE OF WHO YOU ARE -- CHAPTER 9: STAY FOCUSED -- CHAPTER 10: BE STRATEGIC AND INTENTIONAL -- CHAPTER 11: DON'T LOSE YOURSELF IN PURSUIT OF BECOMING YOURSELF -- CHAPTER 12: HOW WILL YOU MEASURE SUCCESS? …”
Libro electrónico -
50097Publicado 2019“…Starting with the basics of AWS Lambda, this book takes you through combining Lambda with other services from AWS, such as Amazon API Gateway, Amazon DynamoDB, and Amazon Step Functions. …”
Libro electrónico -
50098Publicado 2018“…A 13-point manifesto for a new financial services marketing model Anthony Thomson knows a thing or two about new and disruptive financial services, having co-founded and chaired first the ground-breaking Metro Bank and then the purely digital, app-based Atom Bank. …”
Libro electrónico -
50099Publicado 2018Tabla de Contenidos: “…Basic post-exploitation commands -- The help menu -- The background command -- Reading from a channel -- File operation commands -- Desktop commands -- Screenshots and camera enumeration -- Advanced post-exploitation with Metasploit -- Obtaining system privileges -- Changing access, modification, and creation time with timestomp -- Additional post-exploitation modules -- Gathering wireless SSIDs with Metasploit -- Gathering Wi-Fi passwords with Metasploit -- Getting the applications list -- Gathering Skype passwords -- Gathering USB history -- Searching files with Metasploit -- Wiping logs from the target with the clearev command -- Advanced extended features of Metasploit -- Using pushm and popm commands -- Speeding up development using the reload, edit, and reload_all commands -- Making use of resource scripts -- Using AutoRunScript in Metasploit -- Using the multiscript module in AutoRunScript option -- Privilege escalation using Metasploit -- Finding passwords in clear text using mimikatz -- Sniffing traffic with Metasploit -- Host file injection with Metasploit -- Phishing Windows login passwords -- Summary and exercises -- Chapter 9: Evasion with Metasploit -- Evading Meterpreter using C wrappers and custom encoders -- Writing a custom Meterpreter encoder/decoder in C -- Evading intrusion detection systems with Metasploit -- Using random cases for fun and profit -- Using fake relatives to fool IDS systems -- Bypassing Windows firewall blocked ports -- Using the reverse Meterpreter on all ports -- Summary and exercises -- Chapter 10: Metasploit for Secret Agents -- Maintaining anonymity in Meterpreter sessions -- Maintaining access using vulnerabilities in common software -- DLL search order hijacking -- Using code caves for hiding backdoors -- Harvesting files from target systems -- Using venom for obfuscation…”
Libro electrónico -
50100Publicado 2017“…What You Will Learn Build dynamic workflows for scientific computing Leverage open source libraries to extract patterns from time series Write your own classification, clustering, or evolutionary algorithm Perform relative performance tuning and evaluation of Spark Master probabilistic models for sequential data Experiment with advanced techniques such as regularization and kernelization Dive into neural networks and some deep learning architecture Apply some basic multiarm-bandit algorithms Solve big data problems with Scala parallel collections, Akka actors, and Apache Spark clusters Apply key learning strategies to a technical analysis of financial markets In Detail The discovery of information through data clustering and classification is becoming a key differentiator for competitive organizations. …”
Libro electrónico