-
-
Aloqa. Kommunikatsiya texnologiyalari
-
Aloqa. Kommunikatsiya texnologiyalari
-
Adabiyot. Adabiyotshunoslik. Xalq og‘zaki ijodiyoti
-
Qishloq va o‘rmon xo‘jaligi
-
Aloqa. Kommunikatsiya texnologiyalari
-
-
Ommaviy kommunikatsiya. Jurnalistika. Ommaviy axborot vositalari
-
Jismoniy tarbiya va sport
-
Ommaviy kommunikatsiya. Jurnalistika. Ommaviy axborot vositalari
-
-
Aloqa. Kommunikatsiya texnologiyalari
-
Aloqa. Kommunikatsiya texnologiyalari
-
Qishloq va o‘rmon xo‘jaligi
-
Aloqa. Kommunikatsiya texnologiyalari
-
Aloqa. Kommunikatsiya texnologiyalari
-
IT Infrastructure
This book describes how IT systems have evolved from a relatively marginal role to perhaps the most essential pillar of modern infrastructure. Even in the 1950s, infrastructure was an element of roads, bridges, electricity, water supply, wastewater collection, and voice telecommunications. Today, we can hardly imagine living in a world without ubiquitous telecommunication and IT services. In this book, we explain how critical building blocks such as data centers, computer systems, storage systems, and IT security systems have evolved and how they provide the foundation to build a state-of-the-art resilient IT infrastructure.
-
Introduction to Responsible AI
In a world permeated by digital innovation, the rise of artificial intelligence (AI) stands as one of the most remarkable advancements of our era. AI, the simulated intelligence of machines capable of mimicking human cognitive processes, has ignited a transformative wave that spans across industries, from health care and finance to education and entertainment. As the boundaries of AI continue to expand, so too does its potential to reshape the very fabric of our society.
-
Identity Attack Vectors (Second Ed.)
What makes this an identity crisis is that the detections and recommendations needed to classify the risks are generally buried deep in the data across multiple IAM disciplines and are not easily available in a Security Information and Event Management (SIEM) or log aggregator. Without a clinical approach to the problem, the symptoms often go unnoticed unless a security professional is specifically threat-hunting for them. Therefore, what is needed is a diagnostic solution that understands identity-based risks and uses policy, rules, and artificial intelligence (AI) to translate the risks into plain English for teams to resolve.
-
Продающие тексты. Модель для сборки. Копирайтинг для всех.
Дмитрий Кот один из самых копирайтеров, бизнес-тренер, директор известных Агентства продающих текстов, автор бестселлера «Копирайтинг: как не съесть собаку. Создаем тексты, которые продают». Книга для всех, кто пишет продающие тексты. Чем она отличается от десятка других книг по копирайтингу? Она дополняет их. Помогает систематизировать приемы и подходы: предлагает систему вы понимаете, из каких блоков состоит текст и роль каждого из них; содержит готовые к внедрению формулы и шаблоны бери и делай; раскрывает секреты, повышающие эффективность текстов; допускает вариативность поведения на каждый блок текста даются несколько формул
-
Кузги буғдой навларидан юқори ҳосил олиш усуллари
Битирув малакавий ишида кузги буғдой навларининг туп сони ва тупланиш даражаси, экиш меъёрини кузги буғдой навларининг ўсишига таъсири ва бошқа маълумотлар берилган.
-
Getting Started with Enterprise Architecture
In this book, I provide both novice and experienced architects with a brief overview of Enterprise Architecture, explaining the origins of architecture, the most popular frameworks, and the architecture domains. The book then moves on to provide insight into the visualization of architecture by educating the reader on topics such as the architecture modeling language, essential architecture elements and concepts, and a place to store it all: the Architecture Repository.
-
Pro Git
A fully-updated guide to Git and its usage in the modern world. This book teaches readers how to master the world of distributed version workflow, use the distributed features of Git to the full, and extend Git to meet their every need.
-
Understanding The Simpsons Animating the Politics and Poetics of Participatory Culture
This book evolved from a research project submitted to the Department of American Studies at the University of Munich in 2013, an initial print version of which was released in Germany in 2016 with independent publisher Tectum.
-
Занятия плаванием при сколиозе у детей и подростков.
В книге даются методические рекомендации по проведению коррекйионных занятий плаванием с детьми и подростками.
-
Guerrilla Networks An Anarchaeology of 1970s Radical Media Ecologies
The research on which this book is based was originally conducted as part of a sabbatical from the University of Salford in 2011, during which time research was conducted in London, Paris, Rome, and Bologna, among other locations.
-
Linux basics for hacker
The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been taken in the preparation this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to anyloss or damage caused or alleged to be caused directly or indirectly by the information contained in it.
-
Machine Learning Model Serving Patterns and Best Practices
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author , nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.
-
50 Kubernetes Concepts Every DevOps Engineer Should Know
This book every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.
-
Боғ зараркунандаларининг энтомофаг турлари адабиётлар таҳлили
Битирув малакавий ишида боғ зараркунандаларининг энтомофаг турларини ўрганилганлик даражаси ва бошқа маълумотлар берилган.
-
Security and Microservice Architecture on AWS
This book is here to help you get your job done. In general, if example code is offered with this book, you may use it in your programs and documentation. You do not need to contact us for permission unless you’re reproducing a significant portion of the code. For example, writing a program that uses several chunks of code from this book does not require permission. Selling or distributing examples from O’Reilly books does require permission. Answering a question by citing this book and quoting example code does not require permission. Incorporating a significant amount of example code from this book into your product’s documentation does require permission.
-
Core Java, Volume I: Fundamentals
The book that you are reading right now is the first volume of the twelfth edition of Core Java. Each edition closely followed a release of the Java Development Kit, and each time, I rewrote the book to take advantage of the newest Java features. This edition has been updated to reflect the features of Java 17.