Mostrando 37,361 - 37,380 Resultados de 45,231 Para Buscar '".do"', tiempo de consulta: 0.21s Limitar resultados
  1. 37361
    Publicado 2022
    Tabla de Contenidos: “…-- Elasticity in Microservices -- Distributed State -- How to Handle Distributed State with Asynchronous microservices -- Independently Deployable -- Decentralization -- Decentralized Governance -- Decentralized Data -- Automation -- Containerization -- Design for Failure -- How Do You Design a Microservice for Failure and Stability? …”
    Libro electrónico
  2. 37362
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents at a Glance -- Contents -- Foreword -- Introduction -- Chapter 1 You Can't Go to the Office: Where Do You Go from Here? -- Disaster Strikes -- How Long Will the Crisis Last? …”
    Libro electrónico
  3. 37363
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Copyright Page -- Contents -- Acknowledgments -- Executive Summary -- The Strategic Playbook -- The Commercial Playbook -- The Operational Playbook -- The Financial Playbook -- The Governance Playbook -- The Organizational Playbook -- The Change Management Playbook -- Prototypical Order -- Part I The Strategic Playbook -- Chapter 1 The Investment Case: The Heart of the Merger and Acquisition Leader's Playbook -- What You Want -- What You Are Willing to Give Up -- Which Opportunities to Pursue -- The Path to Value Creation -- Core Focus -- Fundamental Investment Case Model for a Merger or Acquisition -- Tool 1.1 Investment Case -- Chapter 2 Focus: It Drives Everything Else -- Design-Focused -- Production Focused -- Delivery Focused -- Service Focused -- Chapter 3 Plans: Strategy Precedes Execution -- 365-Day Plan Elements -- Financial Reporting Systems -- Tool 3.1 Situation Analysis Checklist -- Tool 3.2 SWOT -- Tool 3.3 Business Planning -- Chapter 4 Innovation: A Fundamental Strategic Choice -- Innovation Tips -- Innovation Strategies -- Creativity -- Systems -- Tool 4.1 BRAVE Innovation -- Part II The Commercial Playbook -- Chapter 5 Organic Revenue Growth: So Valuable -- Marketing, Communications, and Customer Interface -- Sales Model and Organization -- Customer Profitability -- End Market Analysis and Go-to-Market Strategy -- Chapter 6 Customers: From Which All New Value Flows -- Purchasers -- Strategic Sales -- Chapter 7 Marketing and Sales: Which Every Organization Must Do -- Tool 7.1: Purchase and Sales Funnel Management -- Tool 7.2: Marketing Planning -- Why It's Crucial to Align Brand Positioning with the Essence of Your Organization -- Aligning Brand Positioning -- Aspirations -- Tool 7.3: Creative Brief -- Tool 7.4: Strategic Selling -- Part III The Operational Playbook…”
    Libro electrónico
  4. 37364
    Publicado 2017
    Tabla de Contenidos: “…-- Reading input -- Evaluating arbitrary input -- Overflow errors -- Serializing objects -- Security issues with web applications -- Server Side Template Injection -- Server-Side Template Injection - mitigation -- Denial of Service -- Cross-Site Scripting(XSS) -- Mitigation - DoS and XSS -- Strategies for security - Python -- Secure coding strategies -- Summary -- 7. …”
    Libro electrónico
  5. 37365
    Publicado 2018
    Tabla de Contenidos: “…Assertions -- Where to find information -- Troubleshooting guidelines -- Using console editors -- Where to inspect -- Using tests to debug -- Monitoring -- Summary -- Chapter 12: GUIs and Scripts -- First approach - scripting -- The imports -- Parsing arguments -- The business logic -- Second approach - a GUI application -- The imports -- The layout logic -- The business logic -- Fetching the web page -- Saving the images -- Alerting the user -- How can we improve the application? -- Where do we go from here? -- The turtle module -- wxPython, PyQt, and PyGTK -- The principle of least astonishment -- Threading considerations -- Summary -- Chapter 13: Data Science -- IPython and Jupyter Notebook -- Installing the required libraries -- Using Anaconda -- Starting a Notebook -- Dealing with data -- Setting up the Notebook -- Preparing the data -- Cleaning the data -- Creating the DataFrame -- Unpacking the campaign name -- Unpacking the user data -- Cleaning everything up -- Saving the DataFrame to a file -- Visualizing the results -- Where do we go from here? …”
    Libro electrónico
  6. 37366
    Publicado 2018
    Tabla de Contenidos: “…-- What are Oracle's competitors doing? -- What are the disruptive effects on individuals? …”
    Libro electrónico
  7. 37367
    por Freeman, Adam. author
    Publicado 2014
    Tabla de Contenidos: “…Cover -- Contents at a Glance -- Contents -- About the Author -- About the Technical Reviewer -- Part 1: Getting Ready -- Chapter 1: Getting Ready -- What Do You Need to Know ? -- What Is the Structure of This Book? …”
    Libro electrónico
  8. 37368
    Publicado 2016
    Tabla de Contenidos: “…-- Prerequisites -- Steps to perform dynamic hooking with Frida -- Logging based vulnerabilities -- WebView attacks -- Accessing sensitive local resources through file scheme -- Other WebView issues -- Summary -- Chapter 9: Android Malware -- What do Android malwares do? -- Writing Android malwares -- Writing a simple reverse shell Trojan using socket programming -- Registering permissions -- Writing a simple SMS stealer -- The user interface -- Registering permissions -- Code on the server -- A note on infecting legitimate apps -- Malware analysis -- Static analysis -- Disassembling Android apps using Apktool -- Decompiling Android apps using dex2jar and JD-GUI -- Dynamic analysis -- Analyzing HTTP/HTTPS traffic using Burp -- Analysing network traffic using tcpdump and Wireshark -- Tools for automated analysis -- How to be safe from Android malwares? …”
    Libro electrónico
  9. 37369
    Publicado 2012
    Tabla de Contenidos: “…Cover -- About the Authors -- Contents -- Foreword -- Preface -- Eight Steps for PMI-ACP® Exam Preparation -- Tips and Tricks for PMI-ACP® Exam -- Chapter 1: Introduction to Project Management -- Introduction -- Project Management Body of Knowledge -- Process -- Project -- Definition -- The Temporary Nature of a Project -- The Unique Nature of a Project -- Outcome of a Project -- Progressive Elaboration: Integrating the Unique and the Temporary -- Projects Versus Operations -- Projects and Strategic Planning -- Environmental Factors that Mandate Projects in Organizations -- Project Management -- The Nine Knowledge Areas of Project Management as Applied to a Training Course -- Discussion Points -- Why do Project Managers Need Interpersonal Relationship Skills? …”
    Libro electrónico
  10. 37370
    Publicado 2023
    Tabla de Contenidos: “…Part 3 - Software Engineering for PLCs -- Chapter 8: Libraries - Write Once, Use Anywhere -- Technical requirements -- Investigating libraries -- Why do we need libraries? -- Libraries versus frameworks -- Distribution -- Third-party libraries -- Installing a library -- Guiding principles for library development -- Rule 1 - Keep it simple, stupid (KISS) -- Rule 2 - Abstraction and encapsulation -- Rule 3 - Patterns make for perfection -- Rule 4 - Documentation -- Building custom libraries -- Requirements -- Implementation -- Final project - part computation library -- Requirements -- Implementation -- Summary -- Questions -- Further reading -- Chapter 9: The SDLC - Navigating the SDLC to Create Great Code -- Technical requirements -- Understanding the SDLC -- Why care about the SDLC? …”
    Libro electrónico
  11. 37371
    Publicado 2017
    Tabla de Contenidos: “…Why Google Plus Is Important for Your Business -- Check Out My LinkedIn Profile -- Tweet Your Thoughts to the World -- Social Networking and Personal Branding -- The CIA Joins Twitter -- The Sharing More Than Selling Rule -- Make 85 Percent Sharing and Engaging -- Make 10 Percent Original Content -- Make 5 Percent or Less a Promotion about What You Do -- Connecting with Fans -- How Amanda Palmer Raised a Million Dollars via Social Networking -- Which Social Networking Site Is Right for You? …”
    Libro electrónico
  12. 37372
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright -- Contents -- Preface -- Editor Biographies -- List of Contributors -- Chapter 1 Introduction to Social Engineering: The Human Element of Hacking -- 1.1 Introduction -- 1.1.1 Why Do We Need to Know about Social Engineering? -- 1.1.2 Open-Source Intelligence (OSINT) and Social Engineering -- 1.2 Impact of Social Engineering -- 1.2.1 Financial Losses -- 1.2.2 Loss of Productivity -- 1.2.3 Cyberattacks Cause Business Disruption -- 1.2.4 Loss of Reputation -- 1.3 Types of Social Engineering Attacks -- 1.3.1 Phishing Attacks -- 1.3.2 What Attributes Make Some People More Susceptible to Phishing Attacks than Others -- 1.3.3 Identification of a Social Engineering Attack -- 1.4 Use of AI in Social Engineering Attacks -- 1.4.1 Most Infamous Cases of Social Engineering -- 1.5 Conclusion -- Chapter 2 Social Engineering -- 2.1 Introduction -- 2.2 Related Work -- 2.3 Methodology -- 2.3.1 Reconnaissance -- 2.3.2 Planning -- 2.3.3 Building Trust -- 2.3.4 Exploitation -- 2.3.5 Exit/Escape -- 2.4 Discussion -- 2.5 Conclusion -- Chapter 3 Cybersecurity Risks, Vulnerabilities, and Countermeasures to Prevent Social Engineering Attacks -- 3.1 Introduction -- 3.2 Social Engineering and Its Role in Cyber-Theft -- 3.2.1 The Role of Social Engineering in Cyber-Theft -- 3.3 Vulnerabilities -- 3.3.1 Risks and Challenges -- 3.4 Current Cybersecurity Risks -- 3.4.1 Cybersecurity Challenges -- 3.4.2 Mitigating the Threat of Social Engineering -- 3.5 Conclusion -- Chapter 4 A Case Study on Packet Sniffers: Tools, Techniques, and Tactics -- 4.1 Introduction -- 4.2 Objective -- 4.3 Sniffing in a Wireless Network -- 4.4 Types of Sniffing Methods -- 4.4.1 Sniffing Can Be Done in Two Ways -- 4.5 Sniffing Uses -- 4.5.1 Ethical Uses -- 4.5.2 Unethical Uses -- 4.6 Sniffing Procedure -- 4.7 Use of Sniffer Tools -- 4.7.1 Ettercap Sniffer Tool…”
    Libro electrónico
  13. 37373
    Publicado 2009
    Tabla de Contenidos: “…5.7 The goto Statement -- 5.8 The switch Statement -- 5.9 Nested switch () Case -- 5.10 The switch () Case and Nested IFS -- Summary -- Exercises -- Chapter 6: Loop Control Statements -- 6.1 Introduction -- 6.2 The for Loop -- 6.3 Nested for Loops -- 6.4 The while Loop -- 6.5 The do-while -- 6.6 The do-while Statement with while Loop -- Summary -- Exercises -- Chapter 7: Arrays -- 7.1 Introduction -- 7.2 Array Initialization -- 7.3 Definition of Array -- 7.4 Characteristic of Array -- 7.5 One-dimensional Array -- 7.6 Predefined Streams -- 7.7 Two-dimensional Array -- 7.8 Three- or Multi-dimensional Arrays -- 7.9 The sscanf () and sprintf () Functions -- Summary -- Exercises -- Chapter 8: Working with Strings & Standard Functions -- 8.1 Introduction -- 8.2 Declaration and Initialization of String -- The Output will be SANJAY -- 8.3 Display of Strings with Different Formats -- Where, the text is 'PRABHAKAR' -- 8.4 String Standard Functions -- 8.5 Applications of Strings -- Summary -- Exercises -- Chapter 9: Pointers -- 9.1 Introduction -- 9.2 Features of Pointers -- 9.3 Pointer Declaration -- 9.4 Arithmetic Operations with Pointers -- 9.5 Pointers and Arrays -- 9.6 Pointers and Two-dimensional Arrays -- 9.7 Array of Pointers -- 9.8 Pointers to Pointers -- 9.9 Pointers and Strings -- 9.10 Void Pointers -- Summary -- Exercises -- Chapter 10: Functions -- 10.1 Introduction -- 10.2 Definition of a Function -- Why use Functions -- How a Function Works -- 10.3 Declaration of a Function -- 10.4 The Return Statement -- 10.5 Types of Functions -- 10.6 Call by Value and Reference -- 10.7 Function Returning More Values -- 10.8 Function as an Argument -- 10.9 Functions with Arrays and Pointers -- 10.10 Recursion -- Summary -- Exercises -- Chapter 11: Preprocessor Directives -- 11.1 Introduction -- 11.2 The #define Directive -- 11.3 Undefining a Macro -- Syntax…”
    Libro electrónico
  14. 37374
    Publicado 2012
    Tabla de Contenidos: “…Perfect Phrases for Discussing Interim Deliverables -- Perfect Phrases to Define Interim Deliverables -- Perfect Phrases to Define Where the Project Will Begin and End -- Perfect Phrases to Identify the Items That Are and Are Not a Part of the Project Scope -- Perfect Phrases for Creating the Project Work Breakdown Structure (WBS) -- Perfect Phrases for Discussing the Work Breakdown Structure (WBS) -- Perfect Phrases for Organizing the Team on Subprojects -- Perfect Phrases for Creating the Task List -- Perfect Phrases to Clarify What Major Tasks the Project Team Will Be Expected to Do -- Perfect Phrases to Clarify What Tasks the Project Team Will Not Do on the Project -- Perfect Phrases to Deal with Fuzzy Areas or Interfaces with Other Projects -- Perfect Phrases to Identify Who Is Going to Make the Product / Deliverable -- Perfect Phrases to Identify Who Is Going to Put the Product / Deliverable in Place -- Tools for Managing Project Progress -- Perfect Phrases for Selecting and Using a Project Scheduling Application -- CHAPTER 6 - Perfect Phrases to EstimateTime and Resources Neededto Do the Work -- Perfect Phrases for Addressing Effort and Cost Estimates -- Perfect Phrases to Describe Ranges of Time Acceptable for Delivering Project Results -- Perfect Phrases to Describe Ranges of Resources and Costs Needed to Complete Work -- Perfect Phrases to Identify the Type of Person to Add to the Project Team -- Perfect Phrases to Show How Assigned People Can Affect Completion Schedules -- CHAPTER 7 - Perfect Phrases to Lead theTeam's Project Planning -- Perfect Phrases to Describe the Initial Plan -- Perfect Phrases to Request People's Involvement in the Planning Process -- Perfect Phrases to Manage Team Member and Project Customer Expectations -- Perfect Phrases to Elicit Sponsor and Management Input into the Plan…”
    Libro electrónico
  15. 37375
    Publicado 2023
    Tabla de Contenidos: “…-- Players have limited budgets -- Using season passes for monetization -- Tips for creating a high-performing season pass -- Why do some games fail to monetize? -- Poor goal setting -- Content is not desirable -- Poor balancing (too easy or too hard) -- Monetization works but is inherently low performing -- Monetization tips and tricks -- Earn an opportunity to spend -- Player spending should build up your community, not divide it -- Disappointments and regrets cost dearly! …”
    Libro electrónico
  16. 37376
    por Gucer, Vasfi
    Publicado 2005
    Tabla de Contenidos: “…WebSphere Interchange Server Monitoring -- 8.1 OMEGAMON XE for WebSphere InterChange Server overview -- 8.1.1 What does OMEGAMON XE for WICS do? -- 8.1.2 How does OMEGAMON XE for WICS help you? …”
    Libro electrónico
  17. 37377
    por Sloan, Joseph D. 1950-
    Publicado 2001
    “…They range from very specialized tools that do one particular task, to generalized suites that do just about everything except replace bad Ethernet cables. …”
    Libro electrónico
  18. 37378
    por Viega, John
    Publicado 2002
    Tabla de Contenidos: “…Insecure Cryptography; 1.4. What SSL Doesn&t Do Well; 1.4.2. Non-Repudiation; 1.4.3. Protection Against Software Flaws…”
    Libro electrónico
  19. 37379
    por Brown, Patrick J.
    Publicado 2006
    Tabla de Contenidos: “…2.1.5 Bonds with Sinking Funds2.1.6 Step-Up or Graduated-Rate Bonds; 2.1.7 Annuities; 2.2 Floating-Rate Notes; 2.2.1 Undated or Perpetual Floating-Rate Notes; 2.3 Index-Linked Bonds; 2.4 Hybrid Bonds; 2.5 Other Instrument Types; 2.5.1 Treasury Bills; 2.5.2 Certificates of Deposit; 2.5.3 Commercial Paper; 2.5.4 Medium-Term Notes; 2.5.5 Preference Shares; 2.5.6 Permanent Interest Bearing Shares; 3 How Do You Price and Value a Bond?; 3.1 Compound Interest; 3.2 Discounting and Yield Considerations; 3.3 Accrued Interest; 3.4 How Bonds are Quoted; 3.5 Bond Pricing; 3.6 Yields and Related Measures…”
    Libro electrónico
  20. 37380
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Half Title -- Series -- Title -- Copyright -- Dedication -- Contents -- Acknowledgements -- Introduction -- Glossary of terms, acronyms, and abbreviations -- Glossary of recording attributes -- Part I Before recording -- 1 Acoustics and the recording venue -- 1.1 Brief introduction to room acoustics -- 1.2 What to be aware of when looking at a venue -- 1.3 What can you do to help with poor acoustics? -- 2 Studio techniques and working on location -- 2.1 Equipment -- 2.2 Practicalities at the recording venue -- 2.3 Rigging microphones and running cables -- 2.4 The control room -- 2.5 Studio communications: talkback, telephones, and cue lights -- 2.6 Optimising recording workflow -- 2.7 Running the session -- Part II Recording -- 3 Basic two-microphone stereo techniques -- 3.1 Co-incident microphone techniques -- 3.2 Spaced omnis -- 3.3 Spaced and angled cardioids -- 4 Solo instruments -- 4.1 Classical guitar and flamenco guitar -- 4.2 Harp -- 4.3 Violin -- 4.4 Cello -- 4.5 Woodwinds -- 4.6 Harpsichord -- 5 The piano -- 5.1 The nature of the sound of a piano -- 5.2 The physical layout of a grand piano -- 5.3 The piano lid -- 5.4 Recording aims -- 5.5 Recording a solo piano: the spaced pair -- 5.6 The Decca piano technique -- 5.7 Techniques for other scenarios -- 5.8 Practical issues when recording pianos -- 6 Voice: solo and accompanied -- 6.1 The singer in a recording session -- 6.2 The classical voice and microphone placement -- 6.3 Using two microphones on the voice -- 6.4 Microphone choice -- 6.5 Use of ambient pairs -- 6.6 Concert recording layout -- 6.7 Studio recording and reverse concert positions -- 6.8 Classical voice and lute/theorbo/guitar -- 6.9 Mixing and fader riding for a singer -- 7 Solo instruments and piano -- 7.1 Violin and piano in concert -- 7.2 Violin and piano: studio layout -- 7.3 Cello and piano in concert…”
    Libro electrónico