Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,647
- Management 1,153
- Development 835
- Engineering & Applied Sciences 820
- Application software 680
- History 651
- Leadership 595
- Computer Science 566
- Business & Economics 476
- Computer networks 456
- Computer programs 450
- Education 403
- Social aspects 398
- Design 396
- Data processing 381
- Filosofía 351
- Música 343
- Security measures 342
- Computer security 327
- Success in business 326
- Operating systems (Computers) 317
- Business 316
- Web sites 315
- Computer programming 311
- Information technology 307
- Computer software 304
- Programming 301
- Web site development 297
- Python (Computer program language) 293
- Psychological aspects 279
-
36481por Hoornaert, Eduardo, 1930-
Publicado 1986Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Biblioteca Universidad de Deusto, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca de Pastoral Madrid, Biblioteca Diocesana de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Seminario Diocesano de Vitoria-Gasteiz, Universidad Loyola - Universidad Loyola Granada)Libro -
36482Publicado 2000Tabla de Contenidos: “…Essays by Virgilio Elizondo. 10. I Forgive But I Do Not Forget (1986). 11. Unmasking the Idols (1992). 12. …”
Libro -
36483Publicado 2005Tabla de Contenidos: “…9.3.3 Downloading a small file using the readAll() method -- 9.4 Distributed Program Call -- 9.5 Coding consideration for servlets and JSPs -- 9.5.1 Do not store large objects in HttpSessions -- 9.5.2 Releasing HttpSessions when finished -- 9.5.3 Do not create HttpSessions in JSPs by default -- 9.5.4 Do not use SingleThreadModel -- 9.5.5 Using the HttpServlet init() method -- 9.5.6 Using the HttpServlet destroy() method -- 9.5.7 Minimizing or eliminating the use of System.out.println() -- 9.5.8 Don't use Beans.instantiate() to create new bean instances -- 9.5.9 Using and reusing data sources for JDBC connections -- 9.5.10 Releasing JDBC resources when done -- 9.5.11 Page generation using strings -- 9.5.12 Consideration with static content -- 9.5.13 JSP include directive versus Action -- 9.5.14 Minimizing the useBean scope -- 9.6 Coding considerations for EJBs -- 9.6.1 Accessing entity beans from session beans -- 9.6.2 JNDI names -- 9.6.3 Reusing EJB home interfaces -- 9.6.4 Using info beans to reduce remote calls -- 9.6.5 Releasing resources in EJBs -- 9.6.6 Using local interfaces when possible -- 9.6.7 Removing stateful session beans when finished -- 9.6.8 Transactions -- 9.6.9 Using CMPs instead of BMPs -- 9.6.10 Message-driven beans -- 9.6.11 Using home methods -- 9.6.12 Using the setEntityContext() method -- 9.6.13 Don't use entity beans as simple data wrappers -- 9.6.14 Minimizing the use of stateful session beans -- 9.6.15 Using Data Class Access Beans -- 9.7 Profiling your application -- 9.7.1 Method speed -- 9.7.2 Finding memory leaks -- 9.8 Using a response time watcher -- Chapter 10. …”
Libro electrónico -
36484
-
36485
-
36486por Castillo Ramos-Bossini, Susana E.Tabla de Contenidos: “…LA ADMINISTRACIÓN Y SU TRANSFORMACIÓN DIGITAL : EL ESTA DO DE LA CUESTIÓN (...) -- 4. BALANCE DE LA SITUACIÓN EN LAS ADMINISTRACI ONES PÚBLICAS DIGITALES : LOS (...) -- CONCLUSIONES -- REFERENCIAS BIBLIOGRÁFICAS…”
Publicado 2022
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
36487por Heller, FranziskaTabla de Contenidos: “…Intro -- Inhalt -- Dank -- KAPITEL 1 Einleitung -- 1.1 „Why do they keep updating the historic movies that are part of our soul?" …”
Publicado 2020
Libro electrónico -
36488Publicado 2020Tabla de Contenidos: “…-- 21.3 Basic approach to thematic analysis -- 21.4 More sophisticated version of thematic analysis -- 21.5 Conclusion -- Key points -- Activity -- 22 Grounded theory -- Overview -- 22.1 Introduction -- 22.2 Development of grounded theory -- 22.3 Data in grounded theory -- 22.4 How to do grounded theory analysis -- 22.5 Computer grounded theory analysis -- 22.6 Evaluation of grounded theory -- 22.7 Conclusion -- Key points -- Activity -- 23 Discourse analysis -- Overview -- 23.1 Introduction -- 23.2 Basic discourse analysis theory -- 23.3 The agenda of discourse analysis -- 23.4 Doing discourse analysis -- 23.5 Conclusion -- Key points -- Activities -- 24 Conversation analysis -- Overview -- 24.1 Introduction -- 24.2 Precepts of conversation analysis -- 24.3 Stages in conversation analysis -- 24.4 Conclusion -- Key points -- Activities -- 25 Interpretative phenomenological analysis -- Overview -- 25.1 Introduction -- 25.2 Philosophical foundations of interpretative phenomenological analysis -- 25.3 Stages in interpretative phenomenological analysis -- 25.4 Conclusion -- Key points -- Activities -- 26 Evaluating qualitative research -- Overview -- 26.1 Introduction -- 26.2 Criteria for novices -- 26.3 Evaluating qualitative research -- 26.4 Validity -- 26.5 Conclusion -- Key points -- Activities -- 27 Improving your qualitative write-up -- Overview -- 27.1 Introduction -- 27.2 Poorly written qualitative report -- 27.3 Critical evaluation -- 27.4 Conclusion -- Key points -- Activities -- Part 5 Research for projects, dissertations and theses -- 28 Developing ideas for research -- Overview -- 28.1 Introduction -- 28.2 Why not a replication study? …”
Libro electrónico -
36489Publicado 2019Tabla de Contenidos: “…-- Definition of Economics -- Two Big Economic Questions -- What, How, and For Whom? -- Do Choices Made in the Pursuit of Self-Interest also Promote the Social Interest? …”
Libro electrónico -
36490Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: DevSecOps Drivers and Challenges -- Security compliance -- ISO 27001 -- Cloud Security Alliance (CSA) -- Federal Information Processing Standards (FIPS) -- Center for Internet Security (CIS) and OpenSCAP - securing your infrastructure -- National Checklist Program (NCP) repository -- OpenSCAP tools -- Legal and security compliance -- New technology (third-party, cloud, containers, and virtualization) -- Virtualization -- Dockers -- Infrastructure as Code (IaC) -- Cloud services hacks/abuse -- Case study - products on sale -- What do hackers do? -- Rapid release -- Summary -- Questions -- Further reading -- Chapter 2: Security Goals and Metrics -- Organization goal -- Strategy and metrics -- Policy and compliance -- Education and guidance -- Development goal/metrics -- Threat assessment -- Threat assessment for GDPR -- Deliverables and development team self-assessment -- Security requirements -- QA goal/metrics -- Design review -- Implementation review -- Third-party components -- IDE-plugin code review -- Static code review -- Target code review -- Security testing -- Operation goal/metrics -- Issue management -- Environment Hardening -- Secure configuration baseline -- Constant monitoring mechanism -- Operational enablement -- Code signing for application deployment -- Application communication ports matrix -- Application configurations -- Summary -- Questions -- Further reading -- Chapter 3: Security Assurance Program and Organization -- Security assurance program -- SDL (Security Development Lifecycle) -- OWASP SAMM -- Security guidelines and processes -- Security growth with business -- Stage 1 - basic security control -- Stage 2 - building a security testing team -- Stage 3 - SDL activities…”
Libro electrónico -
36491Publicado 2018Tabla de Contenidos: “…The switch statement (a GAWK-specific feature) -- Looping statement -- The while loop -- do...while loop statement -- The for loop statement -- For each loop statement -- Statements affecting flow control -- Break usage -- Usage of continue -- Exit usage -- Next usage -- Summary -- Chapter 8: AWK Functions -- Built-in functions -- Arithmetic functions -- The sin (expr) function -- The cos (expr) function -- The atan2 (x, y) function -- The int (expr) function -- The exp (expr) function -- The log (expr) function -- The sqrt (expr) function -- The rand() function -- The srand ([expr]) function -- Summary table of built-in arithmetic functions -- String functions -- The index (str, sub) function -- The length ( string ) function -- The split (str, arr, regex) function -- The substr (str, start, [ length ]) function -- The sub (regex, replacement, string) function -- The gsub (regex, replacement, string) function -- The gensub (regex, replacement, occurrence, [ string ]) function -- The match (string, regex) function -- The tolower (string) function -- The toupper (string) function -- The sprintf (format, expression) function -- The strtonum (string) function -- Summary table of built-in string functions -- Input/output functions -- The close (filename [to/from]) function -- The fflush ([ filename ]) function -- The system (command) function -- The getline command -- Simple getline -- Getline into a variable -- Getline from a file -- Using getline to get a variable from a file -- Using getline to output into a pipe -- Using getline to change the output into a variable from a pipe -- Using getline to change the output into a variable from a coprocess -- The nextfile() function -- The time function -- The systime() function -- The mktime (datespec) function -- The strftime (format, timestamp) function -- Bit-manipulating functions…”
Libro electrónico -
36492Publicado 2021Tabla de Contenidos: “…Looking up the new mapping via /proc/iomem -- MMIO - performing the actual I/O -- Performing 1- to 8-byte reads and writes on MMIO memory regions -- Performing repeating I/O on MMIO memory regions -- Setting and copying on MMIO memory regions -- Understanding and using port-mapped I/O -- PMIO - performing the actual I/O -- A PIO example - the i8042 -- Looking up the port(s) via /proc/ioports -- Port I/O - a few remaining points to note -- Summary -- Questions -- Further reading -- Chapter 4: Handling Hardware Interrupts -- Technical requirements -- Hardware interrupts and how the kernel handles them -- Allocating the hardware IRQ -- Allocating your interrupt handler with request_irq() -- Freeing the IRQ line -- Setting interrupt flags -- Understanding level- and edge-triggered interrupts - a brief note -- Code view 1 - the IXGB network driver -- Implementing the interrupt handler routine -- Interrupt context guidelines - what to do and what not to do -- Don't block - spotting possibly blocking code paths -- Interrupt masking - the defaults and controlling it -- Keep it fast -- Writing the interrupt handler routine itself -- Code view 2 - the i8042 driver's interrupt handler -- Code view 3 - the IXGB network driver's interrupt handler -- IRQ allocation - the modern way - the managed interrupt facility -- Working with the threaded interrupts model -- Employing the threaded interrupt model - the API -- Employing the managed threaded interrupt model - the recommended way -- Code view 4 - the STM32 F7 microcontroller's threaded interrupt handler -- Internally implementing the threaded interrupt -- Why use threaded interrupts? …”
Libro electrónico -
36493Publicado 2022Tabla de Contenidos: “…-- Elasticity in Microservices -- Distributed State -- How to Handle Distributed State with Asynchronous microservices -- Independently Deployable -- Decentralization -- Decentralized Governance -- Decentralized Data -- Automation -- Containerization -- Design for Failure -- How Do You Design a Microservice for Failure and Stability? …”
Libro electrónico -
36494Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents at a Glance -- Contents -- Foreword -- Introduction -- Chapter 1 You Can't Go to the Office: Where Do You Go from Here? -- Disaster Strikes -- How Long Will the Crisis Last? …”
Libro electrónico -
36495Publicado 2022Tabla de Contenidos: “…Cover -- Copyright Page -- Contents -- Acknowledgments -- Executive Summary -- The Strategic Playbook -- The Commercial Playbook -- The Operational Playbook -- The Financial Playbook -- The Governance Playbook -- The Organizational Playbook -- The Change Management Playbook -- Prototypical Order -- Part I The Strategic Playbook -- Chapter 1 The Investment Case: The Heart of the Merger and Acquisition Leader's Playbook -- What You Want -- What You Are Willing to Give Up -- Which Opportunities to Pursue -- The Path to Value Creation -- Core Focus -- Fundamental Investment Case Model for a Merger or Acquisition -- Tool 1.1 Investment Case -- Chapter 2 Focus: It Drives Everything Else -- Design-Focused -- Production Focused -- Delivery Focused -- Service Focused -- Chapter 3 Plans: Strategy Precedes Execution -- 365-Day Plan Elements -- Financial Reporting Systems -- Tool 3.1 Situation Analysis Checklist -- Tool 3.2 SWOT -- Tool 3.3 Business Planning -- Chapter 4 Innovation: A Fundamental Strategic Choice -- Innovation Tips -- Innovation Strategies -- Creativity -- Systems -- Tool 4.1 BRAVE Innovation -- Part II The Commercial Playbook -- Chapter 5 Organic Revenue Growth: So Valuable -- Marketing, Communications, and Customer Interface -- Sales Model and Organization -- Customer Profitability -- End Market Analysis and Go-to-Market Strategy -- Chapter 6 Customers: From Which All New Value Flows -- Purchasers -- Strategic Sales -- Chapter 7 Marketing and Sales: Which Every Organization Must Do -- Tool 7.1: Purchase and Sales Funnel Management -- Tool 7.2: Marketing Planning -- Why It's Crucial to Align Brand Positioning with the Essence of Your Organization -- Aligning Brand Positioning -- Aspirations -- Tool 7.3: Creative Brief -- Tool 7.4: Strategic Selling -- Part III The Operational Playbook…”
Libro electrónico -
36496Publicado 2017Tabla de Contenidos: “…-- Reading input -- Evaluating arbitrary input -- Overflow errors -- Serializing objects -- Security issues with web applications -- Server Side Template Injection -- Server-Side Template Injection - mitigation -- Denial of Service -- Cross-Site Scripting(XSS) -- Mitigation - DoS and XSS -- Strategies for security - Python -- Secure coding strategies -- Summary -- 7. …”
Libro electrónico -
36497Publicado 2018Tabla de Contenidos: “…Assertions -- Where to find information -- Troubleshooting guidelines -- Using console editors -- Where to inspect -- Using tests to debug -- Monitoring -- Summary -- Chapter 12: GUIs and Scripts -- First approach - scripting -- The imports -- Parsing arguments -- The business logic -- Second approach - a GUI application -- The imports -- The layout logic -- The business logic -- Fetching the web page -- Saving the images -- Alerting the user -- How can we improve the application? -- Where do we go from here? -- The turtle module -- wxPython, PyQt, and PyGTK -- The principle of least astonishment -- Threading considerations -- Summary -- Chapter 13: Data Science -- IPython and Jupyter Notebook -- Installing the required libraries -- Using Anaconda -- Starting a Notebook -- Dealing with data -- Setting up the Notebook -- Preparing the data -- Cleaning the data -- Creating the DataFrame -- Unpacking the campaign name -- Unpacking the user data -- Cleaning everything up -- Saving the DataFrame to a file -- Visualizing the results -- Where do we go from here? …”
Libro electrónico -
36498Publicado 2018Tabla de Contenidos: “…-- What are Oracle's competitors doing? -- What are the disruptive effects on individuals? …”
Libro electrónico -
36499por Freeman, Adam. authorTabla de Contenidos: “…Cover -- Contents at a Glance -- Contents -- About the Author -- About the Technical Reviewer -- Part 1: Getting Ready -- Chapter 1: Getting Ready -- What Do You Need to Know ? -- What Is the Structure of This Book? …”
Publicado 2014
Libro electrónico -
36500Publicado 2016Tabla de Contenidos: “…-- Prerequisites -- Steps to perform dynamic hooking with Frida -- Logging based vulnerabilities -- WebView attacks -- Accessing sensitive local resources through file scheme -- Other WebView issues -- Summary -- Chapter 9: Android Malware -- What do Android malwares do? -- Writing Android malwares -- Writing a simple reverse shell Trojan using socket programming -- Registering permissions -- Writing a simple SMS stealer -- The user interface -- Registering permissions -- Code on the server -- A note on infecting legitimate apps -- Malware analysis -- Static analysis -- Disassembling Android apps using Apktool -- Decompiling Android apps using dex2jar and JD-GUI -- Dynamic analysis -- Analyzing HTTP/HTTPS traffic using Burp -- Analysing network traffic using tcpdump and Wireshark -- Tools for automated analysis -- How to be safe from Android malwares? …”
Libro electrónico