Mostrando 36,481 - 36,500 Resultados de 44,314 Para Buscar '".do"', tiempo de consulta: 0.25s Limitar resultados
  1. 36481
  2. 36482
    Publicado 2000
    Tabla de Contenidos: “…Essays by Virgilio Elizondo. 10. I Forgive But I Do Not Forget (1986). 11. Unmasking the Idols (1992). 12. …”
    Libro
  3. 36483
    Publicado 2005
    Tabla de Contenidos: “…9.3.3 Downloading a small file using the readAll() method -- 9.4 Distributed Program Call -- 9.5 Coding consideration for servlets and JSPs -- 9.5.1 Do not store large objects in HttpSessions -- 9.5.2 Releasing HttpSessions when finished -- 9.5.3 Do not create HttpSessions in JSPs by default -- 9.5.4 Do not use SingleThreadModel -- 9.5.5 Using the HttpServlet init() method -- 9.5.6 Using the HttpServlet destroy() method -- 9.5.7 Minimizing or eliminating the use of System.out.println() -- 9.5.8 Don't use Beans.instantiate() to create new bean instances -- 9.5.9 Using and reusing data sources for JDBC connections -- 9.5.10 Releasing JDBC resources when done -- 9.5.11 Page generation using strings -- 9.5.12 Consideration with static content -- 9.5.13 JSP include directive versus Action -- 9.5.14 Minimizing the useBean scope -- 9.6 Coding considerations for EJBs -- 9.6.1 Accessing entity beans from session beans -- 9.6.2 JNDI names -- 9.6.3 Reusing EJB home interfaces -- 9.6.4 Using info beans to reduce remote calls -- 9.6.5 Releasing resources in EJBs -- 9.6.6 Using local interfaces when possible -- 9.6.7 Removing stateful session beans when finished -- 9.6.8 Transactions -- 9.6.9 Using CMPs instead of BMPs -- 9.6.10 Message-driven beans -- 9.6.11 Using home methods -- 9.6.12 Using the setEntityContext() method -- 9.6.13 Don't use entity beans as simple data wrappers -- 9.6.14 Minimizing the use of stateful session beans -- 9.6.15 Using Data Class Access Beans -- 9.7 Profiling your application -- 9.7.1 Method speed -- 9.7.2 Finding memory leaks -- 9.8 Using a response time watcher -- Chapter 10. …”
    Libro electrónico
  4. 36484
    por Laura Chica
    Publicado 2014
    Texto completo en Odilo
    Otros
  5. 36485
  6. 36486
    Tabla de Contenidos: “…LA ADMINISTRACIÓN Y SU TRANSFORMACIÓN DIGITAL : EL ESTA DO DE LA CUESTIÓN (...) -- 4. BALANCE DE LA SITUACIÓN EN LAS ADMINISTRACI ONES PÚBLICAS DIGITALES : LOS (...) -- CONCLUSIONES -- REFERENCIAS BIBLIOGRÁFICAS…”
    Libro electrónico
  7. 36487
    por Heller, Franziska
    Publicado 2020
    Tabla de Contenidos: “…Intro -- Inhalt -- Dank -- KAPITEL 1 Einleitung -- 1.1 „Why do they keep updating the historic movies that are part of our soul?" …”
    Libro electrónico
  8. 36488
    Publicado 2020
    Tabla de Contenidos: “…-- 21.3 Basic approach to thematic analysis -- 21.4 More sophisticated version of thematic analysis -- 21.5 Conclusion -- Key points -- Activity -- 22 Grounded theory -- Overview -- 22.1 Introduction -- 22.2 Development of grounded theory -- 22.3 Data in grounded theory -- 22.4 How to do grounded theory analysis -- 22.5 Computer grounded theory analysis -- 22.6 Evaluation of grounded theory -- 22.7 Conclusion -- Key points -- Activity -- 23 Discourse analysis -- Overview -- 23.1 Introduction -- 23.2 Basic discourse analysis theory -- 23.3 The agenda of discourse analysis -- 23.4 Doing discourse analysis -- 23.5 Conclusion -- Key points -- Activities -- 24 Conversation analysis -- Overview -- 24.1 Introduction -- 24.2 Precepts of conversation analysis -- 24.3 Stages in conversation analysis -- 24.4 Conclusion -- Key points -- Activities -- 25 Interpretative phenomenological analysis -- Overview -- 25.1 Introduction -- 25.2 Philosophical foundations of interpretative phenomenological analysis -- 25.3 Stages in interpretative phenomenological analysis -- 25.4 Conclusion -- Key points -- Activities -- 26 Evaluating qualitative research -- Overview -- 26.1 Introduction -- 26.2 Criteria for novices -- 26.3 Evaluating qualitative research -- 26.4 Validity -- 26.5 Conclusion -- Key points -- Activities -- 27 Improving your qualitative write-up -- Overview -- 27.1 Introduction -- 27.2 Poorly written qualitative report -- 27.3 Critical evaluation -- 27.4 Conclusion -- Key points -- Activities -- Part 5 Research for projects, dissertations and theses -- 28 Developing ideas for research -- Overview -- 28.1 Introduction -- 28.2 Why not a replication study? …”
    Libro electrónico
  9. 36489
    Publicado 2019
    Tabla de Contenidos: “…-- Definition of Economics -- Two Big Economic Questions -- What, How, and For Whom? -- Do Choices Made in the Pursuit of Self-Interest also Promote the Social Interest? …”
    Libro electrónico
  10. 36490
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: DevSecOps Drivers and Challenges -- Security compliance -- ISO 27001 -- Cloud Security Alliance (CSA) -- Federal Information Processing Standards (FIPS) -- Center for Internet Security (CIS) and OpenSCAP - securing your infrastructure -- National Checklist Program (NCP) repository -- OpenSCAP tools -- Legal and security compliance -- New technology (third-party, cloud, containers, and virtualization) -- Virtualization -- Dockers -- Infrastructure as Code (IaC) -- Cloud services hacks/abuse -- Case study - products on sale -- What do hackers do? -- Rapid release -- Summary -- Questions -- Further reading -- Chapter 2: Security Goals and Metrics -- Organization goal -- Strategy and metrics -- Policy and compliance -- Education and guidance -- Development goal/metrics -- Threat assessment -- Threat assessment for GDPR -- Deliverables and development team self-assessment -- Security requirements -- QA goal/metrics -- Design review -- Implementation review -- Third-party components -- IDE-plugin code review -- Static code review -- Target code review -- Security testing -- Operation goal/metrics -- Issue management -- Environment Hardening -- Secure configuration baseline -- Constant monitoring mechanism -- Operational enablement -- Code signing for application deployment -- Application communication ports matrix -- Application configurations -- Summary -- Questions -- Further reading -- Chapter 3: Security Assurance Program and Organization -- Security assurance program -- SDL (Security Development Lifecycle) -- OWASP SAMM -- Security guidelines and processes -- Security growth with business -- Stage 1 - basic security control -- Stage 2 - building a security testing team -- Stage 3 - SDL activities…”
    Libro electrónico
  11. 36491
    Publicado 2018
    Tabla de Contenidos: “…The switch statement (a GAWK-specific feature) -- Looping statement -- The while loop -- do...while loop statement -- The for loop statement -- For each loop statement -- Statements affecting flow control -- Break usage -- Usage of continue -- Exit usage -- Next usage -- Summary -- Chapter 8: AWK Functions -- Built-in functions -- Arithmetic functions -- The sin (expr) function -- The cos (expr) function -- The atan2 (x, y) function -- The int (expr) function -- The exp (expr) function -- The log (expr) function -- The sqrt (expr) function -- The rand() function -- The srand ([expr]) function -- Summary table of built-in arithmetic functions -- String functions -- The index (str, sub) function -- The length ( string ) function -- The split (str, arr, regex) function -- The substr (str, start, [ length ]) function -- The sub (regex, replacement, string) function -- The gsub (regex, replacement, string) function -- The gensub (regex, replacement, occurrence, [ string ]) function -- The match (string, regex) function -- The tolower (string) function -- The toupper (string) function -- The sprintf (format, expression) function -- The strtonum (string) function -- Summary table of built-in string functions -- Input/output functions -- The close (filename [to/from]) function -- The fflush ([ filename ]) function -- The system (command) function -- The getline command -- Simple getline -- Getline into a variable -- Getline from a file -- Using getline to get a variable from a file -- Using getline to output into a pipe -- Using getline to change the output into a variable from a pipe -- Using getline to change the output into a variable from a coprocess -- The nextfile() function -- The time function -- The systime() function -- The mktime (datespec) function -- The strftime (format, timestamp) function -- Bit-manipulating functions…”
    Libro electrónico
  12. 36492
    Publicado 2021
    Tabla de Contenidos: “…Looking up the new mapping via /proc/iomem -- MMIO - performing the actual I/O -- Performing 1- to 8-byte reads and writes on MMIO memory regions -- Performing repeating I/O on MMIO memory regions -- Setting and copying on MMIO memory regions -- Understanding and using port-mapped I/O -- PMIO - performing the actual I/O -- A PIO example - the i8042 -- Looking up the port(s) via /proc/ioports -- Port I/O - a few remaining points to note -- Summary -- Questions -- Further reading -- Chapter 4: Handling Hardware Interrupts -- Technical requirements -- Hardware interrupts and how the kernel handles them -- Allocating the hardware IRQ -- Allocating your interrupt handler with request_irq() -- Freeing the IRQ line -- Setting interrupt flags -- Understanding level- and edge-triggered interrupts - a brief note -- Code view 1 - the IXGB network driver -- Implementing the interrupt handler routine -- Interrupt context guidelines - what to do and what not to do -- Don't block - spotting possibly blocking code paths -- Interrupt masking - the defaults and controlling it -- Keep it fast -- Writing the interrupt handler routine itself -- Code view 2 - the i8042 driver's interrupt handler -- Code view 3 - the IXGB network driver's interrupt handler -- IRQ allocation - the modern way - the managed interrupt facility -- Working with the threaded interrupts model -- Employing the threaded interrupt model - the API -- Employing the managed threaded interrupt model - the recommended way -- Code view 4 - the STM32 F7 microcontroller's threaded interrupt handler -- Internally implementing the threaded interrupt -- Why use threaded interrupts? …”
    Libro electrónico
  13. 36493
    Publicado 2022
    Tabla de Contenidos: “…-- Elasticity in Microservices -- Distributed State -- How to Handle Distributed State with Asynchronous microservices -- Independently Deployable -- Decentralization -- Decentralized Governance -- Decentralized Data -- Automation -- Containerization -- Design for Failure -- How Do You Design a Microservice for Failure and Stability? …”
    Libro electrónico
  14. 36494
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents at a Glance -- Contents -- Foreword -- Introduction -- Chapter 1 You Can't Go to the Office: Where Do You Go from Here? -- Disaster Strikes -- How Long Will the Crisis Last? …”
    Libro electrónico
  15. 36495
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Copyright Page -- Contents -- Acknowledgments -- Executive Summary -- The Strategic Playbook -- The Commercial Playbook -- The Operational Playbook -- The Financial Playbook -- The Governance Playbook -- The Organizational Playbook -- The Change Management Playbook -- Prototypical Order -- Part I The Strategic Playbook -- Chapter 1 The Investment Case: The Heart of the Merger and Acquisition Leader's Playbook -- What You Want -- What You Are Willing to Give Up -- Which Opportunities to Pursue -- The Path to Value Creation -- Core Focus -- Fundamental Investment Case Model for a Merger or Acquisition -- Tool 1.1 Investment Case -- Chapter 2 Focus: It Drives Everything Else -- Design-Focused -- Production Focused -- Delivery Focused -- Service Focused -- Chapter 3 Plans: Strategy Precedes Execution -- 365-Day Plan Elements -- Financial Reporting Systems -- Tool 3.1 Situation Analysis Checklist -- Tool 3.2 SWOT -- Tool 3.3 Business Planning -- Chapter 4 Innovation: A Fundamental Strategic Choice -- Innovation Tips -- Innovation Strategies -- Creativity -- Systems -- Tool 4.1 BRAVE Innovation -- Part II The Commercial Playbook -- Chapter 5 Organic Revenue Growth: So Valuable -- Marketing, Communications, and Customer Interface -- Sales Model and Organization -- Customer Profitability -- End Market Analysis and Go-to-Market Strategy -- Chapter 6 Customers: From Which All New Value Flows -- Purchasers -- Strategic Sales -- Chapter 7 Marketing and Sales: Which Every Organization Must Do -- Tool 7.1: Purchase and Sales Funnel Management -- Tool 7.2: Marketing Planning -- Why It's Crucial to Align Brand Positioning with the Essence of Your Organization -- Aligning Brand Positioning -- Aspirations -- Tool 7.3: Creative Brief -- Tool 7.4: Strategic Selling -- Part III The Operational Playbook…”
    Libro electrónico
  16. 36496
    Publicado 2017
    Tabla de Contenidos: “…-- Reading input -- Evaluating arbitrary input -- Overflow errors -- Serializing objects -- Security issues with web applications -- Server Side Template Injection -- Server-Side Template Injection - mitigation -- Denial of Service -- Cross-Site Scripting(XSS) -- Mitigation - DoS and XSS -- Strategies for security - Python -- Secure coding strategies -- Summary -- 7. …”
    Libro electrónico
  17. 36497
    Publicado 2018
    Tabla de Contenidos: “…Assertions -- Where to find information -- Troubleshooting guidelines -- Using console editors -- Where to inspect -- Using tests to debug -- Monitoring -- Summary -- Chapter 12: GUIs and Scripts -- First approach - scripting -- The imports -- Parsing arguments -- The business logic -- Second approach - a GUI application -- The imports -- The layout logic -- The business logic -- Fetching the web page -- Saving the images -- Alerting the user -- How can we improve the application? -- Where do we go from here? -- The turtle module -- wxPython, PyQt, and PyGTK -- The principle of least astonishment -- Threading considerations -- Summary -- Chapter 13: Data Science -- IPython and Jupyter Notebook -- Installing the required libraries -- Using Anaconda -- Starting a Notebook -- Dealing with data -- Setting up the Notebook -- Preparing the data -- Cleaning the data -- Creating the DataFrame -- Unpacking the campaign name -- Unpacking the user data -- Cleaning everything up -- Saving the DataFrame to a file -- Visualizing the results -- Where do we go from here? …”
    Libro electrónico
  18. 36498
    Publicado 2018
    Tabla de Contenidos: “…-- What are Oracle's competitors doing? -- What are the disruptive effects on individuals? …”
    Libro electrónico
  19. 36499
    por Freeman, Adam. author
    Publicado 2014
    Tabla de Contenidos: “…Cover -- Contents at a Glance -- Contents -- About the Author -- About the Technical Reviewer -- Part 1: Getting Ready -- Chapter 1: Getting Ready -- What Do You Need to Know ? -- What Is the Structure of This Book? …”
    Libro electrónico
  20. 36500
    Publicado 2016
    Tabla de Contenidos: “…-- Prerequisites -- Steps to perform dynamic hooking with Frida -- Logging based vulnerabilities -- WebView attacks -- Accessing sensitive local resources through file scheme -- Other WebView issues -- Summary -- Chapter 9: Android Malware -- What do Android malwares do? -- Writing Android malwares -- Writing a simple reverse shell Trojan using socket programming -- Registering permissions -- Writing a simple SMS stealer -- The user interface -- Registering permissions -- Code on the server -- A note on infecting legitimate apps -- Malware analysis -- Static analysis -- Disassembling Android apps using Apktool -- Decompiling Android apps using dex2jar and JD-GUI -- Dynamic analysis -- Analyzing HTTP/HTTPS traffic using Burp -- Analysing network traffic using tcpdump and Wireshark -- Tools for automated analysis -- How to be safe from Android malwares? …”
    Libro electrónico