Mostrando 50,081 - 50,100 Resultados de 51,519 Para Buscar 'ZCom~', tiempo de consulta: 0.92s Limitar resultados
  1. 50081
    Publicado 2008
    “…--Alan Colmes, Syndicated radio talk show host and co-host of Hannity and Colmes on Fox News Channel Scams are everywhere...now discover exactly how to protect yourself! …”
    Libro electrónico
  2. 50082
    por Collier, Marsha
    Publicado 2008
    Tabla de Contenidos: “…Power up to PowerSeller status -- Hit your sales targets -- Build better listings -- Become a model seller -- Manage your business…”
    Libro electrónico
  3. 50083
    por Hartung, Adam, 1957-
    Publicado 2008
    “…Maintaining ”The Phoenix Principle” for long-term success Practicing Disruption until it comes naturally…”
    Libro electrónico
  4. 50084
    por Levinson, William A., 1957-
    Publicado 2013
    “…The first section then adds a proactive improvement cycle that sets out to look for trouble by isolating processes for analytical purposes and then measuring (and balancing) inputs with outputs to force all wastes to become visible. It is in fact technically impossible for any waste of material or energy to hide from what chemical engineers call a material and energy balance. …”
    Libro electrónico
  5. 50085
    por Douglas, David
    Publicado 2009
    “…This engaging and thought-provoking book, written by computer industry luminaries David Douglas and Greg Papadopoulos, focuses on two topics that are becoming vitally important in the day-to-day work of engineers: eco engineering and intellectual property (IP). …”
    Libro electrónico
  6. 50086
    Publicado 2013
    “…Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. …”
    Libro electrónico
  7. 50087
    Publicado 2014
    “…Or, is it possible that they will become epicenters of progress in the United States? …”
    Libro electrónico
  8. 50088
    Publicado 2012
    “…This book is designed for SharePoint users who want to become tech-savvy in configuring SharePoint’s out-of-the-box functionality. …”
    Libro electrónico
  9. 50089
    Publicado 2010
    “…This book provides a great opportunity for others to learn from Kaiser Permanente's pioneering efforts." —Janet M. …”
    Libro electrónico
  10. 50090
    Publicado 2020
    “…Cultural practices of exploring, revitalizing, interpreting and developing cultural heritage have become an important driving force in alleviating the social, cultural, environmental and economic challenges of today's world and in initiating sustainable progress in local communities. …”
    Libro electrónico
  11. 50091
    Publicado 2017
    “…As an academic field, the intellectual ambition of Curriculum Studies is to increasingly become aware of the normative, political and knowledge/power dynamics of education under constant negotiation with all its intended and unintended consequences."…”
    Libro electrónico
  12. 50092
    Publicado 2020
    “…Until a recent "boom," Shimao Toshio, writer of short fiction, critic, and essayist, was not widely known, even in Japan. …”
    Libro electrónico
  13. 50093
    Publicado 2022
    “…Internet powerhouses such as Netflix, Yahoo, and eBay have deployed Spark at a massive scale. It has quickly become the largest open-source community in big data. …”
    Video
  14. 50094
    Publicado 2022
    “…You'll start with a crash course in Python, SQL, and data science to develop and tune sophisticated models from scratch to automate processes and make predictions in the biotechnology and life sciences domain. …”
    Libro electrónico
  15. 50095
    Publicado 2014
    “…Software architecture is a fast-moving, multidisciplinary subject where entire suites of "best practices" become obsolete practically overnight. No single path or curriculum exists, and different types of architecture—application, integration, enterprise—require different subject emphasis. …”
    Video
  16. 50096
    Publicado 2018
    Tabla de Contenidos: “…Intro -- TABLE OF CONTENTS -- WHY YOU SHOULD READ THIS BOOK -- HOW TO HAVE HARD CONVERSATIONS, CREATE ACCOUNTABILITY, AND INSPIRE ACTION ON YOUR MOST IMPORTANT WORK -- NOTE -- ELEMENT ONE: BUILD YOUR CONFIDENCE -- PART ONE: KNOW WHO YOU ARE -- CHAPTER 1: BE YOURSELF -- CHAPTER 2: FIND YOUR GROUND -- CHAPTER 3: STAY CURIOUS ABOUT YOURSELF -- CHAPTER 4: ACCESS SELF-COMPASSION -- CHAPTER 5: EMBRACE YOUR SHADOW -- CHAPTER 6: IT'S NOT ALL ABOUT ACHIEVEMENT -- PART TWO: BECOME WHO YOU WANT TO BE -- CHAPTER 7: FIND CLARITY -- CHAPTER 8: BECOME MORE OF WHO YOU ARE -- CHAPTER 9: STAY FOCUSED -- CHAPTER 10: BE STRATEGIC AND INTENTIONAL -- CHAPTER 11: DON'T LOSE YOURSELF IN PURSUIT OF BECOMING YOURSELF -- CHAPTER 12: HOW WILL YOU MEASURE SUCCESS? …”
    Libro electrónico
  17. 50097
    Publicado 2019
    “…Starting with the basics of AWS Lambda, this book takes you through combining Lambda with other services from AWS, such as Amazon API Gateway, Amazon DynamoDB, and Amazon Step Functions. …”
    Libro electrónico
  18. 50098
    Publicado 2018
    “…A 13-point manifesto for a new financial services marketing model Anthony Thomson knows a thing or two about new and disruptive financial services, having co-founded and chaired first the ground-breaking Metro Bank and then the purely digital, app-based Atom Bank. …”
    Libro electrónico
  19. 50099
    Publicado 2018
    Tabla de Contenidos: “…Basic post-exploitation commands -- The help menu -- The background command -- Reading from a channel -- File operation commands -- Desktop commands -- Screenshots and camera enumeration -- Advanced post-exploitation with Metasploit -- Obtaining system privileges -- Changing access, modification, and creation time with timestomp -- Additional post-exploitation modules -- Gathering wireless SSIDs with Metasploit -- Gathering Wi-Fi passwords with Metasploit -- Getting the applications list -- Gathering Skype passwords -- Gathering USB history -- Searching files with Metasploit -- Wiping logs from the target with the clearev command -- Advanced extended features of Metasploit -- Using pushm and popm commands -- Speeding up development using the reload, edit, and reload_all commands -- Making use of resource scripts -- Using AutoRunScript in Metasploit -- Using the multiscript module in AutoRunScript option -- Privilege escalation using Metasploit -- Finding passwords in clear text using mimikatz -- Sniffing traffic with Metasploit -- Host file injection with Metasploit -- Phishing Windows login passwords -- Summary and exercises -- Chapter 9: Evasion with Metasploit -- Evading Meterpreter using C wrappers and custom encoders -- Writing a custom Meterpreter encoder/decoder in C -- Evading intrusion detection systems with Metasploit -- Using random cases for fun and profit -- Using fake relatives to fool IDS systems -- Bypassing Windows firewall blocked ports -- Using the reverse Meterpreter on all ports -- Summary and exercises -- Chapter 10: Metasploit for Secret Agents -- Maintaining anonymity in Meterpreter sessions -- Maintaining access using vulnerabilities in common software -- DLL search order hijacking -- Using code caves for hiding backdoors -- Harvesting files from target systems -- Using venom for obfuscation…”
    Libro electrónico
  20. 50100
    Publicado 2017
    “…What You Will Learn Build dynamic workflows for scientific computing Leverage open source libraries to extract patterns from time series Write your own classification, clustering, or evolutionary algorithm Perform relative performance tuning and evaluation of Spark Master probabilistic models for sequential data Experiment with advanced techniques such as regularization and kernelization Dive into neural networks and some deep learning architecture Apply some basic multiarm-bandit algorithms Solve big data problems with Scala parallel collections, Akka actors, and Apache Spark clusters Apply key learning strategies to a technical analysis of financial markets In Detail The discovery of information through data clustering and classification is becoming a key differentiator for competitive organizations. …”
    Libro electrónico