Mostrando 37,341 - 37,360 Resultados de 45,231 Para Buscar '".do"', tiempo de consulta: 0.22s Limitar resultados
  1. 37341
    Publicado 2021
    “…Every Sunday, Christians all over the world recite the Nicene Creed as a confession of faith. While most do not know the details of the controversy that led to its composition, they are aware that the Council of Nicaea was a critical moment in the history of Christianity. …”
    Libro
  2. 37342
  3. 37343
    Publicado 2022
    “…Is the F.C.C. doing its job? Can political ads be made less toxic? …”
    Libro
  4. 37344
    Publicado 1995
    “…How is moral consensus possible and how do small groups help create or distort consensus processes? …”
    Libro
  5. 37345
  6. 37346
    Publicado 2000
    Tabla de Contenidos: “…Essays by Virgilio Elizondo. 10. I Forgive But I Do Not Forget (1986). 11. Unmasking the Idols (1992). 12. …”
    Libro
  7. 37347
  8. 37348
  9. 37349
  10. 37350
  11. 37351
    Publicado 2005
    Tabla de Contenidos: “…9.3.3 Downloading a small file using the readAll() method -- 9.4 Distributed Program Call -- 9.5 Coding consideration for servlets and JSPs -- 9.5.1 Do not store large objects in HttpSessions -- 9.5.2 Releasing HttpSessions when finished -- 9.5.3 Do not create HttpSessions in JSPs by default -- 9.5.4 Do not use SingleThreadModel -- 9.5.5 Using the HttpServlet init() method -- 9.5.6 Using the HttpServlet destroy() method -- 9.5.7 Minimizing or eliminating the use of System.out.println() -- 9.5.8 Don't use Beans.instantiate() to create new bean instances -- 9.5.9 Using and reusing data sources for JDBC connections -- 9.5.10 Releasing JDBC resources when done -- 9.5.11 Page generation using strings -- 9.5.12 Consideration with static content -- 9.5.13 JSP include directive versus Action -- 9.5.14 Minimizing the useBean scope -- 9.6 Coding considerations for EJBs -- 9.6.1 Accessing entity beans from session beans -- 9.6.2 JNDI names -- 9.6.3 Reusing EJB home interfaces -- 9.6.4 Using info beans to reduce remote calls -- 9.6.5 Releasing resources in EJBs -- 9.6.6 Using local interfaces when possible -- 9.6.7 Removing stateful session beans when finished -- 9.6.8 Transactions -- 9.6.9 Using CMPs instead of BMPs -- 9.6.10 Message-driven beans -- 9.6.11 Using home methods -- 9.6.12 Using the setEntityContext() method -- 9.6.13 Don't use entity beans as simple data wrappers -- 9.6.14 Minimizing the use of stateful session beans -- 9.6.15 Using Data Class Access Beans -- 9.7 Profiling your application -- 9.7.1 Method speed -- 9.7.2 Finding memory leaks -- 9.8 Using a response time watcher -- Chapter 10. …”
    Libro electrónico
  12. 37352
    por Laura Chica
    Publicado 2014
    Texto completo en Odilo
    Otros
  13. 37353
  14. 37354
    Tabla de Contenidos: “…LA ADMINISTRACIÓN Y SU TRANSFORMACIÓN DIGITAL : EL ESTA DO DE LA CUESTIÓN (...) -- 4. BALANCE DE LA SITUACIÓN EN LAS ADMINISTRACI ONES PÚBLICAS DIGITALES : LOS (...) -- CONCLUSIONES -- REFERENCIAS BIBLIOGRÁFICAS…”
    Libro electrónico
  15. 37355
    por Heller, Franziska
    Publicado 2020
    Tabla de Contenidos: “…Intro -- Inhalt -- Dank -- KAPITEL 1 Einleitung -- 1.1 „Why do they keep updating the historic movies that are part of our soul?" …”
    Libro electrónico
  16. 37356
    Publicado 2020
    Tabla de Contenidos: “…-- 21.3 Basic approach to thematic analysis -- 21.4 More sophisticated version of thematic analysis -- 21.5 Conclusion -- Key points -- Activity -- 22 Grounded theory -- Overview -- 22.1 Introduction -- 22.2 Development of grounded theory -- 22.3 Data in grounded theory -- 22.4 How to do grounded theory analysis -- 22.5 Computer grounded theory analysis -- 22.6 Evaluation of grounded theory -- 22.7 Conclusion -- Key points -- Activity -- 23 Discourse analysis -- Overview -- 23.1 Introduction -- 23.2 Basic discourse analysis theory -- 23.3 The agenda of discourse analysis -- 23.4 Doing discourse analysis -- 23.5 Conclusion -- Key points -- Activities -- 24 Conversation analysis -- Overview -- 24.1 Introduction -- 24.2 Precepts of conversation analysis -- 24.3 Stages in conversation analysis -- 24.4 Conclusion -- Key points -- Activities -- 25 Interpretative phenomenological analysis -- Overview -- 25.1 Introduction -- 25.2 Philosophical foundations of interpretative phenomenological analysis -- 25.3 Stages in interpretative phenomenological analysis -- 25.4 Conclusion -- Key points -- Activities -- 26 Evaluating qualitative research -- Overview -- 26.1 Introduction -- 26.2 Criteria for novices -- 26.3 Evaluating qualitative research -- 26.4 Validity -- 26.5 Conclusion -- Key points -- Activities -- 27 Improving your qualitative write-up -- Overview -- 27.1 Introduction -- 27.2 Poorly written qualitative report -- 27.3 Critical evaluation -- 27.4 Conclusion -- Key points -- Activities -- Part 5 Research for projects, dissertations and theses -- 28 Developing ideas for research -- Overview -- 28.1 Introduction -- 28.2 Why not a replication study? …”
    Libro electrónico
  17. 37357
    Publicado 2019
    Tabla de Contenidos: “…-- Definition of Economics -- Two Big Economic Questions -- What, How, and For Whom? -- Do Choices Made in the Pursuit of Self-Interest also Promote the Social Interest? …”
    Libro electrónico
  18. 37358
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: DevSecOps Drivers and Challenges -- Security compliance -- ISO 27001 -- Cloud Security Alliance (CSA) -- Federal Information Processing Standards (FIPS) -- Center for Internet Security (CIS) and OpenSCAP - securing your infrastructure -- National Checklist Program (NCP) repository -- OpenSCAP tools -- Legal and security compliance -- New technology (third-party, cloud, containers, and virtualization) -- Virtualization -- Dockers -- Infrastructure as Code (IaC) -- Cloud services hacks/abuse -- Case study - products on sale -- What do hackers do? -- Rapid release -- Summary -- Questions -- Further reading -- Chapter 2: Security Goals and Metrics -- Organization goal -- Strategy and metrics -- Policy and compliance -- Education and guidance -- Development goal/metrics -- Threat assessment -- Threat assessment for GDPR -- Deliverables and development team self-assessment -- Security requirements -- QA goal/metrics -- Design review -- Implementation review -- Third-party components -- IDE-plugin code review -- Static code review -- Target code review -- Security testing -- Operation goal/metrics -- Issue management -- Environment Hardening -- Secure configuration baseline -- Constant monitoring mechanism -- Operational enablement -- Code signing for application deployment -- Application communication ports matrix -- Application configurations -- Summary -- Questions -- Further reading -- Chapter 3: Security Assurance Program and Organization -- Security assurance program -- SDL (Security Development Lifecycle) -- OWASP SAMM -- Security guidelines and processes -- Security growth with business -- Stage 1 - basic security control -- Stage 2 - building a security testing team -- Stage 3 - SDL activities…”
    Libro electrónico
  19. 37359
    Publicado 2018
    Tabla de Contenidos: “…The switch statement (a GAWK-specific feature) -- Looping statement -- The while loop -- do...while loop statement -- The for loop statement -- For each loop statement -- Statements affecting flow control -- Break usage -- Usage of continue -- Exit usage -- Next usage -- Summary -- Chapter 8: AWK Functions -- Built-in functions -- Arithmetic functions -- The sin (expr) function -- The cos (expr) function -- The atan2 (x, y) function -- The int (expr) function -- The exp (expr) function -- The log (expr) function -- The sqrt (expr) function -- The rand() function -- The srand ([expr]) function -- Summary table of built-in arithmetic functions -- String functions -- The index (str, sub) function -- The length ( string ) function -- The split (str, arr, regex) function -- The substr (str, start, [ length ]) function -- The sub (regex, replacement, string) function -- The gsub (regex, replacement, string) function -- The gensub (regex, replacement, occurrence, [ string ]) function -- The match (string, regex) function -- The tolower (string) function -- The toupper (string) function -- The sprintf (format, expression) function -- The strtonum (string) function -- Summary table of built-in string functions -- Input/output functions -- The close (filename [to/from]) function -- The fflush ([ filename ]) function -- The system (command) function -- The getline command -- Simple getline -- Getline into a variable -- Getline from a file -- Using getline to get a variable from a file -- Using getline to output into a pipe -- Using getline to change the output into a variable from a pipe -- Using getline to change the output into a variable from a coprocess -- The nextfile() function -- The time function -- The systime() function -- The mktime (datespec) function -- The strftime (format, timestamp) function -- Bit-manipulating functions…”
    Libro electrónico
  20. 37360
    Publicado 2021
    Tabla de Contenidos: “…Looking up the new mapping via /proc/iomem -- MMIO - performing the actual I/O -- Performing 1- to 8-byte reads and writes on MMIO memory regions -- Performing repeating I/O on MMIO memory regions -- Setting and copying on MMIO memory regions -- Understanding and using port-mapped I/O -- PMIO - performing the actual I/O -- A PIO example - the i8042 -- Looking up the port(s) via /proc/ioports -- Port I/O - a few remaining points to note -- Summary -- Questions -- Further reading -- Chapter 4: Handling Hardware Interrupts -- Technical requirements -- Hardware interrupts and how the kernel handles them -- Allocating the hardware IRQ -- Allocating your interrupt handler with request_irq() -- Freeing the IRQ line -- Setting interrupt flags -- Understanding level- and edge-triggered interrupts - a brief note -- Code view 1 - the IXGB network driver -- Implementing the interrupt handler routine -- Interrupt context guidelines - what to do and what not to do -- Don't block - spotting possibly blocking code paths -- Interrupt masking - the defaults and controlling it -- Keep it fast -- Writing the interrupt handler routine itself -- Code view 2 - the i8042 driver's interrupt handler -- Code view 3 - the IXGB network driver's interrupt handler -- IRQ allocation - the modern way - the managed interrupt facility -- Working with the threaded interrupts model -- Employing the threaded interrupt model - the API -- Employing the managed threaded interrupt model - the recommended way -- Code view 4 - the STM32 F7 microcontroller's threaded interrupt handler -- Internally implementing the threaded interrupt -- Why use threaded interrupts? …”
    Libro electrónico