Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,986
- Engineering & Applied Sciences 2,183
- Development 1,900
- Application software 1,666
- Crítica e interpretación 1,662
- Filosofía 1,560
- Computer Science 1,523
- Història 1,449
- Colecciones 1,377
- Management 1,232
- History 1,193
- Documentos 1,187
- Biblia 1,076
- Traducción al francés 1,059
- Coleccion 1,050
- Parlamento britanico 1,047
- Data processing 909
- Computer networks 832
- Computer programs 818
- Design 798
- Operating systems (Computers) 777
- Bíblia 755
- Web site development 696
- Web sites 688
- Computer software 640
- Patrística 632
- Derechos humanos 624
- Derecho 607
- Cloud computing 596
- Economic conditions 595
-
154841por Subramanian, Vasan. authorTabla de Contenidos: “…Chapter 1: Why MERN -- Chapter 2: Intro to React and Hello World -- Chapter 3: React Components -- Chapter 4: Data from Server -- Chapter 5: Using MongoDB to save the data -- Chapter 6: Build and Bundle using Webpack -- Chapter 7: Dynamic Components and Interactivity -- Chapter 8: Routing using React Router -- Chapter 9: Forms and Component Lifecycle -- Chapter 10: Using React Bootstrap -- Chapter 11: Redux -- Chapter 12: Session handling -- Chapter 13: Server side rendering -- Chapter 14: Concluding remarks and mern-cli…”
Publicado 2017
Libro electrónico -
154842Publicado 2016“…He currently serves as VP for Incubator at the Apache Foundation, as a champion and mentor for a large number of projects, and as committer and PMC member of the Apache ZooKeeper and Drill projects. …”
Libro electrónico -
154843Publicado 2017“…Prior to this role he served as a software architect and engineer at HP, where he helped build the core frameworks and platform that support the organization’s internal application teams. …”
Libro electrónico -
154844Publicado 2019“…This course uses Node.js 12.0.0, while not the latest version available, it provides relevant and informative content for legacy users of Node.js…”
-
154845Publicado 2018“…Use the in-demand Linux skills you learn in this course to get promoted or start a new career as a Linux professional About This Video Learn Linux in 5 Days doesn't make any assumptions about your background or knowledge of Linux. …”
-
154846Publicado 2018“…You’ll examine: A reference architecture for a production-ready data lake An overview of the data lake technology stack and deployment options Key data lake attributes, including ingestion, storage, processing, and access Why implementing management and governance is crucial for the success of your data lake How to curate data lakes through data governance, acquisition, organization, preparation, and provisioning Methods for providing secure self-service access for users across the enterprise How to build a future-proof data lake tech stack that includes storage, processing, data management, and reference architecture Emerging trends that will shape the future of data lakes…”
Libro electrónico -
154847por Maskrey, Molly K. author“…What you will learn: iOS career options for the new developer Working with Source Code and Version Control How to work with iOS accessory devices Understanding development methodologies such as Agile/Scrum User Experience Development and UI Tools Unit, UI, and Beta Testing Publishing your work Who this book is for: Developers who need to find specific solutions to common problems in developing apps for iOS and watchOS…”
Publicado 2016
Libro electrónico -
154848por Eason, Kit. authorTabla de Contenidos: “…Chapter 1: The Sense of Style -- Chapter 2: Designing Functions Using Types -- Chapter 3: Missing Data -- Chapter 4: Working Effectively with Collections Functions -- Chapter 5: Immutability and Mutation -- Chapter 6: Pattern Matching -- Chapter 7: Record Types -- Chapter 8: Classes -- Chapter 9: Programming With Functions -- Chapter 10: Asynchronous and Parallel Programming -- Chapter 11: Railway Oriented Programming -- Chapter 12: Performance -- Chapter 13: Layout and Naming -- Chapter 14: Summary…”
Publicado 2018
Libro electrónico -
154849por Haunts, Stephen. author“…This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution. …”
Publicado 2019
Libro electrónico -
154850Publicado 2019“…What you will learn Work with various tools to create interactive data visualization and analysis Query, report, and analyze with SAP Business Objects Web Intelligence Create a report in SAP Crystal Reports for Enterprise Visualize and manipulate data using an SAP Lumira Storyboard Deep dive into the workings of the SAP predictive analytics tool Deploy and configure SAP BO Intelligence platform 4.2 Who this book is for This book is for Business Intelligence professionals and existing SAP ecosystem users who want to perform effective Business Intelligence using SAP BusinessObjects…”
Libro electrónico -
154851Publicado 2019“…This book provides the guidance you need in a user-friendly format. Get up to date on the latest changes to GAAP affecting not-for-profit organizations Reference authoritative standards for measurement, presentation and disclosure Consult flowcharts, diagrams and charts to find answers at a glance Double-check disclosures against a checklist of GAAP requirements Accounting standards are constantly changing, and the special requirements targeting not-for-profits add an additional challenge to full compliance. …”
Libro electrónico -
154852Publicado 2020“…The Innovation Ultimatum helps leaders understand the key technologies poised to reshape business in the next decade and prepare their organizations for technology-enabled change. Using straightforward, jargon-free language, this important resource provides a set of strategic questions every leader will need to ask and answer in order to prepare for the impending changes to the business landscape. …”
Libro electrónico -
154853Publicado 2018“…Two of Microsoft's leading cloud security experts show how to: • Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management • Master a new security paradigm for a world without traditional perimeters • Gain visibility and control to secure compute, network, storage, and application workloads • Incorporate Azure Security Center into your security operations center • Integrate Azure Security Center with Azure AD Identity Protection Center and third-party solutions • Adapt Azure Security Center's built-in policies and definitions for your organization • Perform security assessments and implement Azure Security Center recommendations • Use incident response features to detect, investigate, and address threats • Create high-fidelity fusion alerts to focus attention on your most urgent security issues • Implement application whitelisting and just-in-time VM access • Monitor user behavior and access, and investigate compromised or misused credentials • Customize and perform operating system security baseline assessments • Leverage integrated threat intelligence to identify known bad actors…”
Libro electrónico -
154854Publicado 2014“…Examples of how to use high level tools include the Pig scripting language and the Hive 'SQL like' interface. …”
-
154855Publicado 2014“…Westcott guide readers through the skills and concepts candidates need to know for the exam, using hands-on methods to convey an in-depth understanding of wireless network administration. …”
Libro electrónico -
154856Publicado 2015“…For customers who are either considering or are in the early stages of implementing a solution incorporating Business Process Manager and Business Monitor, this document proves a useful reference. The book is useful both in terms of best practices during application development and deployment and as a reference for setup, tuning, and configuration information. …”
Libro electrónico -
154857Publicado 2014“…In addition, this tool supports comprehensive lifecycle management capabilities across different networks through a simple, seamless user experience. This IBM Redbooks® publication introduces the concepts, architecture, and basic implementation of Gen 5 and IBM Network Advisor. …”
Libro electrónico -
154858por Ray, John, 1971-“…Printed in full color–figures and code appear as they do in Xcode 4.3+ Master the MVC design pattern at the heart of iOS and OS X development Use Xcode project templates to get a head start on advanced application features Efficiently use the Xcode Code Editor and get fast, contextually-aware answers with the built-in help system Use iOS Storyboards to visually describe an application’s workflow Get started with Core Data to simplify data management and data-driven user interfaces Use frameworks and libraries to package functionality and promote time-saving code reuse Use Git and Subversion source control for managing distributed projects Prepare Unit tests and use the Xcode debugger to keep your projects error free Package your apps for the App Store Use the command-line Xcode tools for scripting and build automation…”
Publicado 2012
Libro electrónico -
154859Publicado 2014“…Minecraft consists of players using an avatar to create or destroy various types of blocks, form fantastic structures, create artwork, and much more, all in a three-dimensional environment and across various multiplayer servers in multiple game modes. …”
Libro electrónico -
154860Publicado 2014“…This Redbooks publication includes instructions about the following topics: How to create a CICS TS platform to manage and reflect the health of a set of CICS TS regions, and the services that they provide to applications How to quickly get value from CICS TS applications, by creating and deploying a CICS TS application for an existing user application How to protect your CICS TS platform from erroneous applications by using threshold policies How to deploy and run multiple versions of the same CICS TS application on the same CICS TS platform at the same time, enabling a safer migration from one application version to another, with no downtime How to measure application resource usage, enabling a comparison of the performance of different application versions, and chargeback based on application use This book describes how CICS TS cloud enablement uses existing operational facilities, including monitoring, events, transaction tracking, CICS TS bundles, and IBM CICSPlex® System Manager (CICSPlex SM), to integrate with existing deployment and management processes…”
Libro electrónico