Bibliothèque de cartes mémoires Saisir le code d'activation
Informatique
ITPM Head First PMP
ITPM Head First PMP
Informatique
Wichtige Kommandos für die PowerShell
Grundlegende Kommandos für die PowerShell
Informatique
SAT 5 & 6
PMI
Informatique
VMware VCP5-DCV
VMware Prüfungsfragen VCP5-DCV
Informatique
Informatik
Comptia N+
Informatique
ITPM Head First PMP 2
ITPM Head First PMP 2
Informatique
Veeam VMCE_V8
VEEAM Certified Engineer VMCE8
Informatique
Design Pattern
Zusammenfassung von Design Pattern in JAVA
Informatique
hslu_terp10
hslu_terp10
Informatique
ISPMA (International Software Produkt Manager)
Diese Lernkartei dient zum Aufbau und der Überprüfung des Wissens zur Erreichung des Foundation Zertifikat ISPMA.
Informatique
Certified in Cybersecurity
Braindump CC ISC2
Informatique
GIS III
Fragen zur Vorlesung GIS III an der ETH bei Prof. Raubal Basierend auf der Zusammenfassung von Roland Schenkel. Karten sind ohne Grafiken ohne Interoperabilität
Informatique
Foundation Level - CPRE FL
The Foundation Level addresses the advanced beginner in Requirements Engineering and provides the core knowledge of this topic.
Informatique
Qualitätsplanung
Im Rahmen dieser Kartei finden sich Fragen zum Thema Qualitätsplanung
Informatique
Privacy Engineering
Personal Exam Preparation for Modul Privacy Engineering at TU Berlin
Informatique
Buisness Informatics Theory
SATs for Introduction to Buisness Informatics. Distance learning UAS TW
Informatique
i3_all_t1
i3_all_t1
Informatique
IT Projekt Management
ZHAW Modul
Informatique
ITPR
Questions for the Business Informatics ITPR exam
Informatique
PMI - Project Integration Management
Flashcards to help remember the processes for PMI Project Integration Management
Informatique
PMI-ACP
PMI-ACP: My final knowledge lacks
Informatique
Cybersecurity Foundations
Cybersecurity Foundations HSR Vorlesung 1-5 PART 2: https://card2brain.ch/box/20200731_cysec_foundations_teil_2
Informatique
i3_all_t2
i3_all_t2
Informatique
HTML & JavaScript
Part 2
Informatique
Requirements Engineering
Techniques to gather customer needs/Requirements; system context, methods, Stakeholder analysis - Creating good requirements - Documentation in agile Settings - User Stories - Story Mapping - Definition of Acceptance Criteria
Informatique
Asymmetrische Verschlüsselung
Asymmetrische Verschlüsselung
Informatique
Hacking Basics
Wenger Thema 2
Informatique
Information Security
Main concepts of Information Security held at ETH Zurich as defined in the course script by Prof. Maurer
Informatique
ITI
ITI SATs
Informatique
ITPM
-
Informatique
Selected Topic Tool based SW-Engineering
Tools to support the Software Life Cycle in general - Branching, Merging, and others - Working With Source Control - Tasks, Impediments, Bugs - Manage the work - Working with tools to plan the work - Working with holistic tools