Mostrando 50,341 - 50,360 Resultados de 51,519 Para Buscar 'ZCom~', tiempo de consulta: 1.03s Limitar resultados
  1. 50341
    por Bahar, Heymi
    Publicado 2013
    “…Frequently, renewable fuels for transport also benefit from exemptions, or reductions in, fuel-excise taxes, and in a few countries from production bounties. …”
    Capítulo de libro electrónico
  2. 50342
    Publicado 2017
    “…"Lessons in innovation from key FinTech trends and successes Creating Strategic Value through Financial Technology explores the growing Financial Technology (FinTech) industry to provide insight on how traditional financial institutions and FinTech companies can boost innovation and enhance valuation in a complex regulatory environment. …”
    Libro electrónico
  3. 50343
    Publicado 2023
    “…The course is an excellent fit for individuals aiming to become professional game developers. About the Author David Nixon: David Nixon is a professional software developer with a degree in computer science from Florida Atlantic University. …”
    Video
  4. 50344
    Publicado 2019
    “…ACM Conferences…”
    Libro electrónico
  5. 50345
    Publicado 2009
    “…ACM Conferences…”
    Libro electrónico
  6. 50346
    Publicado 2007
    “…Written by leading Ubuntu community members, this is the only book that you need to become a savvy Ubuntu user. Covers the latest version of Ubuntu--Ubuntu 6.06LTS Covers every standard desktop application from word processing, spreadsheets, Web browsing, e-mail, instant messaging, music, video, and, of course, games, all the way to software development, databases, and other server applications Includes real-world troubleshooting advice contributed by Ubuntu users from around the world Learn about the extended Ubuntu community, which includes translators; software developers; teachers; people who love to hand out CDs and help friends try free software; artists; people who write documentation, tips, and guides; accountants; and even a lawyer or two. …”
    Libro electrónico
  7. 50347
    Publicado 2005
    “…A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues Operate and maintain a secure MPLS core with industry best practices Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS) Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. …”
    Libro electrónico
  8. 50348
    Publicado 2003
    “…Taking a practical, applied approach to building security into networks, the book shows you how to build secure network architectures from the ground up. Security aspects of routing protocols, Layer 2 threats, and switch security features are all analyzed. …”
    Libro electrónico
  9. 50349
    por Fleisher, Craig S.
    Publicado 2007
    Tabla de Contenidos: “…Acknowledgments -- About the authors -- Preface -- Business and competitive analysis: definition, context, and benefits -- Performing the analysis process -- Avoiding analytical pitfalls -- Communicating analysis results -- Applying the FAROUT method -- Industry analysis (the nine forces) -- Competitive positioning analysis -- Business model analysis -- SERVO analysis -- Supply chain management (SCM) analysis -- Benchmarking analysis -- Mckinsey 7S analysis -- Shadowing -- Product line analysis -- Win/loss analysis -- Strategic relationship analysis -- Corporate reputation analysis -- Critical success factors analysis -- Country risk analysis -- Driving forces analysis -- Event and timeline analysis -- Technology forecasting -- War gaming -- Indications and warning analysis -- Historiographical analysis -- Interpretation of statistical analysis -- Competitor cash flow analysis -- Analysis of competing hypotheses -- Linchpin analysis…”
    Libro electrónico
  10. 50350
    por Bai, Ying, 1956-
    Publicado 2003
    “…Computer applications and their implementations become more complex and specialized by the day. Often, the best way to meet a particular challenge is to apply two or more programming languages to the task. …”
    Libro electrónico
  11. 50351
    Publicado 2019
    “…You'll then learn about security by building a security solution from serverless components. Next, you'll gain an understanding of observability and ways to leverage application insights to bring you performance benefits. …”
    Libro electrónico
  12. 50352
    Publicado 2013
    “…The Heart of Leadership is a road map for every person who desires to make a difference in the lives of others and become a leader people want to follow. ¿Qué es lo que hace que un líder sea verdaderamente excepcional? …”
    Libro electrónico
  13. 50353
    Publicado 2019
    Tabla de Contenidos: “…Mastering Microsoft Dynamics 365 Customer Engagement: An advanced guide to developing and customizing CRM solutions to improve your business applications…”
    Libro electrónico
  14. 50354
    Publicado 2017
    “…We emphasize important concepts, such as the bias-variance trade-off and over-fitting, which are pervasive in predictive modeling Who This Book Is For If you work with data and want to become an expert in predictive analysis and modeling, then this Learning Path will serve you well. …”
    Libro electrónico
  15. 50355
    Publicado 2015
    “…This IBM® Redbooks® publication helps you to become familiar with the technical changes that were introduced into the Operations areas with IBM z/OS® V2R2. …”
    Libro electrónico
  16. 50356
    Publicado 2017
    “…What You Will Learn Learn about machine learning landscapes along with the historical development and progress of deep learning Learn about deep machine intelligence and GPU computing with the latest TensorFlow 1.x Access public datasets and utilize them using TensorFlow to load, process, and transform data Use TensorFlow on real-world datasets, including images, text, and more Learn how to evaluate the performance of your deep learning models Using deep learning for scalable object detection and mobile computing Train machines quickly to learn from data by exploring reinforcement learning techniques Explore active areas of deep learning research and applications In Detail Deep learning is the step that comes after machine learning, and has more advanced implementations. …”
    Libro electrónico
  17. 50357
    Publicado 2017
    “…In an age of digital disconnect, having the right relationships is more important than ever before with more and more of us reporting we feel disconnected from social media. Networking is no longer about collecting business cards and meeting thousands of people online or offline; it's about knowing the right people, and nurturing those relationships. …”
    Libro electrónico
  18. 50358
    Publicado 2008
    “…Coverage includes The limitations of current approaches to authentication and identity management Detailed information on advanced Web services The Identity Metasystem, the laws of identity, and the ideal authentication system Windows CardSpace: What it is, how it works, and how developers and managers can use it in their organizations CardSpace technology: user experience, Information Cards, private desktops, and integration with .NET 3.5 and Windows Vista CardSpace implementation: from HTML integration through federation, Web services integration, and beyond Adding personal card support to a website: a detailed, scenario-based explanation Choosing or becoming an identity provider: opportunities, business impacts, operational issues, and pitfalls to avoid Using CardSpace to leverage trust relationships and overcome phishing Whether you’re a developer, security specialist, or business decision-maker, this book will answer your most crucial questions about identity management, so you can protect everything that matters: your people, your assets, your partners, and your customers. …”
    Libro electrónico
  19. 50359
    Publicado 1999
    “…The result is an approach that codifies the idea that many web content providers have long suspected: yesterday's online content is fast becoming tomorrow's network-based applications. In this book you'll learn how to: Base groupware on standard Internet technologies (mail servers, news servers, and web servers) Use simple server- and client-side scripts to automate creation, presentation, transmission, and search of electronic documents Create a base of documents that contain semi-structured data representing much of the intellectual capital of an enterprise Deploy these solutions in a way that scales from groups of a few collaborators to communities of thousands of users If you've ever been disappointed watching a commercial groupware system used as little more than an expensive email client, or if you've ever wondered how to transform simple email, news, or web clients from document viewers into collaboration tools, then Practical Internet Groupware is for you…”
    Libro electrónico
  20. 50360
    Publicado 2009
    “…–Shauna Kelly , Director, Thendara Green “This book illustrates techniques that will result in well-designed, robust, and maintainable Excel-based applications. The authors’ advice comes from decades of solid experience of designing and building applications. …”
    Libro electrónico