Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,058
- Application software 975
- Java (Computer program language) 452
- Cloud computing 327
- Application program interfaces (Computer software) 301
- Engineering & Applied Sciences 299
- Web site development 286
- Python (Computer program language) 271
- Computer Science 250
- Computer programming 242
- JavaScript (Computer program language) 231
- Web applications 220
- Programming 191
- Computer programs 190
- Microsoft .NET Framework 179
- Computer software 175
- Design 167
- Web sites 162
- Internet programming 153
- Machine learning 145
- Artificial intelligence 140
- Mobile computing 126
- Open source software 123
- Programming languages (Electronic computers) 121
- Computer networks 120
- Android (Electronic resource) 119
- Management 114
- Data mining 109
- Software engineering 107
- Web services 101
-
2041Publicado 2018Tabla de Contenidos: “…Chapter 7: The Idea of the Type Classes -- Rich Wrapper pattern -- Motivation -- Implicit conversions -- Rich Wrapper -- The Type Class pattern -- Interpretation of the Type Class pattern -- Injectable interfaces -- Toolboxes -- Type classes in different languages -- Summary -- Questions -- Chapter 8: Basic Type Classes and Their Usage -- A motivation for organizing type classes into systems and libraries -- The Cats library for purely functional programming -- The structure of the library -- Core -- Type class hierarchy -- Abstract methods -- Concrete methods -- Laws -- Syntax -- Instances -- Data -- Infrastructure synergy -- Type classes -- Monad -- Writer effect type -- The tailRecM method -- Functor -- Applicative -- Motivation -- Applicative type class -- Implementation of the type class -- Monoid -- Implementation for Either -- MonoidK -- Traverse -- Summary -- Questions -- Chapter 9: Libraries for Pure Functional Programming -- Cats effect -- ProductR -- IO - the concurrence data type -- Referential transparency -- Inversion of control -- Asynchrony with IO -- Blocking example -- Concurrency infrastructure -- Running tasks in bunches -- Heavy load with blocking -- Synchronous tasks -- Constructing asynchronous tasks -- Asynchronous API -- Asynchronous example -- Fibers -- The computation -- IO combination without Fibers -- IO combination with Fibers -- Canceling Fibers -- Bracket -- Server-side programming -- The architecture of a server-side application -- Communication protocol -- The software architecture of a server -- Example specification -- Orchestration and infrastructure -- Docker -- Docker-compose -- Dockerfiles -- Backend architecture -- Model -- Database layer -- Server-side programming -- Querying the server -- Summary -- Questions -- Chapter 10: Patterns of Advanced Functional Programming -- Monad Transformers…”
Libro electrónico -
2042por Calcote, LeeTabla de Contenidos: “…-- Envoy in Istio -- Sidecar Injection -- Manuelle Sidecar Injection -- Sidecars ad hoc injizieren -- Automatische Sidecar Injection -- Init-Container von Kubernetes -- Bereitstellung von Sidecar-Ressourcen -- Die Funktionalität von Envoy -- Kernkonstrukte -- Zertifikate und Schutz des Datenverkehrs -- Kapitel 6: Sicherheit und Identität -- Zugriffssteuerung -- Authentifizierung -- Autorisierung -- Identität -- SPIFFE -- Architektur der Schlüsselverwaltung -- Citadel -- Knotenagenten -- Envoy -- Pilot -- mTLS -- Die Richtlinien für Authentifizierung/Autorisierung von Istio konfigurieren -- Authentifizierungsrichtlinie: mTLS konfigurieren -- Autorisierungsrichtlinie: Konfigurieren, wer mit wem sprechen kann -- Kapitel 7: Pilot -- Pilot konfigurieren -- Mesh-Konfiguration -- Netzwerkkonfiguration -- Diensterkennung -- Konfiguration übermitteln -- Debugging und Fehlersuche in Pilot -- istioctl -- Fehlerbehebung in Pilot -- Eine Konfiguration verfolgen -- Listener -- Routen -- Cluster -- Kapitel 8: Verwaltung des Datenverkehrs -- Der Datenverkehrsfluss in Istio -- Die Netzwerk-APIs von Istio -- ServiceEntry -- DestinationRule -- VirtualService -- Gateway -- Lenkung und Routing des Datenverkehrs -- Resilienz -- Strategie zur Lastverteilung -- Ausreißer erkennen -- Wiederholungen -- Time-outs -- Fault Injection -- Ingress und Egress -- Eingehender Datenverkehr - Ingress…”
Publicado 2020
Libro electrónico -
2043Publicado 2019Tabla de Contenidos: “…POST Requests -- Performing Blind SSRFs -- Attacking Users with SSRF Responses -- ESEA SSRF and Querying AWS Metadata -- Google Internal DNS SSRF -- Internal Port Scanning Using Webhooks -- Summary -- 11 XML External Entity -- eXtensible Markup Language -- How XXE Attacks Work -- Read Access to Google -- Facebook XXE with Microsoft Word -- Wikiloc XXE -- Summary -- 12 Remote Code Execution -- Executing Shell Commands -- Executing Functions -- Strategies for Escalating Remote Code Execution -- Polyvore ImageMagick -- Algolia RCE on facebooksearch.algolia.com -- RCE Through SSH -- Summary -- 13 Memory Vulnerabilities -- Buffer Overflows -- Read Out of Bounds -- PHP ftp_genlist() Integer Overflow -- Python Hotshot Module -- Libcurl Read Out of Bounds -- Summary -- 14 Subdomain Takeover -- Understanding Domain Names -- How Subdomain Takeovers Work -- Ubiquiti Subdomain Takeover -- Scan.me Pointing to Zendesk -- Shopify Windsor Subdomain Takeover -- Snapchat Fastly Takeover -- Legal Robot Takeover -- Uber SendGrid Mail Takeover -- Summary -- 15 Race Conditions -- Accepting a HackerOne Invite Multiple Times -- Exceeding Keybase Invitation Limits -- HackerOne Payments Race Condition -- Shopify Partners Race Condition -- Summary -- 16 Insecure Direct Object References -- Finding Simple IDORs -- Finding More Complex IDORs -- Binary.com Privilege Escalation -- Moneybird App Creation -- Twitter Mopub API Token Theft -- ACME Customer Information Disclosure -- Summary -- 17 OAuth Vulnerabilities -- The OAuth Workflow -- Stealing Slack OAuth Tokens -- Passing Authentication with Default Passwords…”
Libro electrónico -
2044Publicado 2019Tabla de Contenidos: “…The component lifecycle -- 4.1. The Web Components API -- 4.2. The connectedCallback handler -- 4.3. …”
Libro electrónico -
2045Publicado 2023Tabla de Contenidos: “…Chapter 6: Infinite Flyer -- Technical requirements -- Project setup -- Inputs -- Airplane scene -- Collision shapes -- Scripting the plane -- Building the world -- World objects -- Chunks -- Main scene -- Spawning new chunks -- Increasing difficulty -- Collisions -- Fuel and score -- Title screen -- Audio -- Saving a high score -- About file locations -- Accessing files -- Suggestions for additional features -- Summary -- Chapter 7: Next Steps and Additional Resources -- Using Godot's documentation -- Reading the API documentation -- Version control - using Git with Godot -- Using Blender with Godot -- Import hints -- Using blend files -- Exporting projects -- Getting the export templates -- Export presets -- Exporting -- Exporting for specific platforms -- Introduction to shaders -- Creating a 2D shader -- 3D shaders -- Learning more -- Using other programming languages in Godot -- C# -- Other languages - GDExtension -- Getting help - community resources -- Godot Recipes -- Contributing to Godot -- Contributing to the engine -- Writing documentation -- Donations -- Summary -- Final words -- Index -- Other Books You May Enjoy…”
Libro electrónico -
2046Publicado 2024Tabla de Contenidos: “…Understanding hidden sources -- Diving into the deep and dark web -- Let's make sure we understand the internet -- Harvesting more with theHarvester -- Shodan -- Automating OSINT collection and analysis -- Summary -- Chapter 4: Exploring the Unknown - How Discovery Tools Reveal Hidden Information -- Introduction to discovery tools -- Unlocking network secrets -- Domain and IP address analysis -- Understanding the DNA of WHOIS - Its definition and purpose -- Applicability - Not just domains but IP blocks too -- The online magnifying glasses - Popular WHOIS lookup platforms -- Finding the connections -- The darker side - When attackers use WHOIS -- DNS and IP analysis - Connecting domains to infrastructure -- Traceroute and network mapping - Navigating the vast cyber seas -- Website reconnaissance - Mastering the unseen layers -- Web page scraping and analysis -- Document and metadata analysis -- Identifying hidden information in documents and files -- Analyzing document contents for valuable clues -- OSINT data visualization -- Tools and techniques for visualizing OSINT data -- Best practices for using discovery tools -- Summary -- Chapter 5: From Recon-ng to Trace Labs - A Tour of the Best Open Source Intelligence Tools -- Recon-ng - A powerful OSINT framework -- Running modules and gathering information with Recon-ng -- Maltego - Visualizing OSINT data and connections -- Getting started with Maltego for OSINT investigations -- Discovering the infrastructure -- Shodan - The search engine for IoT -- Getting started with Shodan -- Using Shodan's API -- Trace Labs - A powerful OS designed just for OSINT -- Overview of the Aircrack-ng suite -- Airmon-ng -- Airodump-ng -- Aireplay-ng -- Aircrack-ng -- Airbase-ng -- Airgraph-ng -- Finding hidden networks -- Additional open source OSINT tools -- SpiderFoot -- Twint -- Some final thoughts on tools…”
Libro electrónico -
2047Publicado 2023Tabla de Contenidos: “…-- Cloud-native principles -- Microservices -- Containers and orchestration -- DevOps -- CI/CD -- Introducing the 12-factor app -- Code base -- Dependencies -- Config -- Backing services -- Build, release, run -- Processes -- Port binding -- Concurrency -- Disposability -- Dev/prod parity -- Logs -- Admin processes -- How to start the transformation -- Summary -- Chapter 9: Deploying Jakarta EE Applications in the Cloud -- Technical requirements -- Deploying to Azure -- Creating a container registry -- Uploading an image to the registry -- Creating a container instance -- Metrics of containers in the cloud -- Summary -- Chapter 10: Introducing MicroProfile -- Technical requirements -- A brief history of MicroProfile -- MicroProfile Config -- MicroProfile Health -- MicroProfile Fault Tolerance -- @Asynchronous -- @Retry -- @Timeout -- @Bulkhead -- @CircuitBreaker -- @Fallback -- Final remarks -- MicroProfile Metrics -- @Counted -- @Gauge -- @Metric -- @Timed -- Telemetry Tracing -- Automatic instrumentation -- Manual instrumentation -- Other specifications -- OpenAPI -- RestClient -- JSON Web Token Authentication -- Jakarta EE 10 Core Profile -- Summary -- Appendix A -- Appendix B -- Index -- Other Books You May Enjoy…”
Libro electrónico -
2048por Chow, DennisTabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Automating Detection Inputs and Deployments -- Chapter 1: Detection as Code Architecture and Lifecycle -- Understanding detection life cycle concepts -- Establish requirements -- Development -- Testing -- Implementation -- Deprecation -- Conceptualizing detection as code requirements -- Version control systems -- API support -- Use case syntax -- Testing instrumentation -- Secrets management -- Planning automation milestones -- Summary -- Further reading -- Chapter 2: Scoping and Automating Threat-Informed Defense Inputs -- Technical requirements -- Scoping threat-based inputs -- Parsing indicators and payloads -- Lab 2.1 - Custom STIX2 JSON parser -- Lab 2.2 - Automatically block domains with intel feed -- Lab 2.3 - Integrate malicious hashes into Wazuh EDR -- Lab 2.4 - Deploy custom IOCs to CrowdStrike -- Leveraging context enrichment -- Lab 2.5 - Analyze and develop custom detections in Google Chronicle -- Summary -- Further reading -- Chapter 3: Developing Core CI/CD Pipeline Functions -- Technical requirements -- Deploying code repositories -- GitHub usage concepts -- Branching strategy -- Lab 3.1 - Create a new repository -- Setting up CI/CD runners -- Lab 3.2 - Deploy a custom IOA to CrowdStrike Falcon -- Lab 3.3 - CI/CD with Terraform Cloud and Cloudflare WAF -- Lab 3.4 - Policy as Code with Cloud Custodian in AWS -- Lab 3.5 - Custom RASP rule in Trend Micro Cloud One -- Lab 3.6 - Custom detection for Datadog Cloud SIEM with GitHub Actions -- Monitoring pipeline jobs -- Summary -- Chapter 4: Leveraging AI for Use Case Development -- Technical requirements -- Optimizing generative AI usage -- Lab 4.1 - Tuning an LLM-based chatbot -- Experimenting with multiple AI tools -- Lab 4.2 - Exploring SOC Prime Uncoder AI…”
Publicado 2024
Libro electrónico -
2049Publicado 2022Tabla de Contenidos: “…Migration considerations -- About the Zero-Downtime Migration tool -- Migrating on-premises database to Autonomous Database using ZDM -- Implementing migration to Autonomous Database using ZDM -- Installing and configuring ZDM software on a dedicated host -- Target Autonomous Database creation -- Generating an OCI API key pair in the pem format -- Installing the OCI CLI -- Preparing an SSH key pair -- Creating an Object Store bucket -- Creating an OCI user authentication token -- Keeping the same time zone -- Database character set -- Setting up the GoldenGate Microservices hub in the OCI marketplace -- Setting up the OCI CLI in the source database server for file transfer -- Preparing a ZDM response file for migration -- A dry run of ZDM -- Run the migration job -- Summary -- Questions -- Answers -- Chapter 4: ADB Disaster Protection with Autonomous Data Guard -- Overview and associated terminologies -- AuDG -- Local standby -- Remote standby (cross-region standby) -- Associated specifications in AuDG -- Region and roles specification -- RTO and RPO in an AuDG configuration -- Status and operation in AuDG -- Implementing AuDG -- Enabling AuDG -- Performing a manual switchover operation - local standby -- Performing a manual switchover operation - remote standby -- Disabling AuDG -- Leveraging OCI Events Service for AuDG operations -- Points to remember about AuDG -- Summary -- Questions -- Answers -- Further reading: -- Chapter 5: Backup and Restore with Autonomous Database in OCI -- Technical requirements -- Understanding the backup types -- Working with automated backup in the OCI portal -- Learning how to take a manual backup -- Restoring database backups -- Manual database backup using Data Pump -- Creating a dump set -- Creating a Data Pump backup directly to object storage -- Data Pump import backup -- Refreshing Autonomous Database schemas…”
Libro electrónico -
2050Publicado 2007Tabla de Contenidos: “…Athanaileas [and others] -- A pro-active mobility extension for pub/sub systems / Abdulbaset Gaddah, Thomas Kunz -- Topology variety model for mobile ad hoc networks / Guangli Tian, Wandong Cai, Wei Wang -- Code mobility modeling: a temporal labeled reconfigurable nets / Kahloul Laid, Chaoui Allaoua -- A web-based surveillance system for mobile phones / Yoshiro Imai, Yukio Hori, Yuichi Suigiue -- Controlling remote system using mobile telephony / Rifat Shahriyar [and others] -- A remote monitoring and control of home appliances on ubiquitous smart homes / Seong Joon Lee [and others] -- Channel estimation and equalization for fixed/mobile OFDM WiMAX system in simulink / Onsy Abdel Alim [and others] -- On communication protocols for tactical navigation assistance / Evren Onem [and others] -- Monitoring smartphones for anomaly detection / Aubrey-Derrick Schmidt [and others] -- Activity recognition system for mobile phones using the MotionBand device / Ákos Fábián, Norbert Győrbíró, Gergely Hományi -- Modular, service-oriented API for peer-to-peer middleware / Gábor Paller, Heikki Kokkinen -- MWSMF: a mediation framework realizing scalable mobile web service provisioning / Satish Narayana Srirama, Matthias Jarke, Wolfgang Prinz -- AGORA: an integrated approach for collaboration in MANETs / Marcel Arrufat, Gerard París, Pedro García López -- MACRO+: a network coding driven integrated MAC/routing protocol for multihop wireless networks / L. …”
Libro electrónico -
2051Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 Web3 Data Analysis Basics -- Chapter 1: Where Data and Web3 Meet -- Technical requirements -- Exploring the data ingredients -- Understanding the blockchain ingredients -- Three generations of blockchain -- Introducing the blockchain ingredients -- Making the first transaction -- Approaching Web3 industry metrics -- Block height -- Time -- Tokenomics -- Total Value Locked (TVL) -- Total market cap -- Data quality challenges -- Data standards challenges -- Retail -- Confirmations -- NFT Floor Price -- The concept of "lost" -- A brief overview of APIs -- Summary -- Further reading -- Chapter 2: Working with On-Chain Data -- Technical requirements -- Dissecting a transaction -- Nonce -- Gas price -- Gas limit -- Recipient -- Sender -- Value -- Input data -- V,R,S -- Transaction receipt -- Status -- Gas used and Cumulative gas used -- Logs -- Dissecting a block -- Exploring state data -- Reviewing data sources -- Block explorers -- Infura -- Moralis -- GetBlock -- Dune -- Covalent -- Flipside -- The Graph -- Google BigQuery -- Summary -- Further reading -- Chapter 3: Working with Off-Chain Data -- Technical requirements -- Introductory example - listing data sources -- Adding prices to our dataset -- CoinGecko -- CoinMarketCap -- Binance -- Oracles - Chainlink -- OHLC - Kraken -- Final thoughts on prices -- Adding news to our dataset -- Adding social networks to our dataset -- X (formerly Twitter) -- Summary -- Further reading -- Chapter 4: Exploring the Digital Uniqueness of NFTs - Games, Art, and Identity -- Technical requirements -- Enabling unique asset tracking on the blockchain using NFT -- The business requests -- The technical solution -- Blockchain gaming - the GameFi proposal -- Introduction to the business landscape…”
Libro electrónico -
2052Publicado 2004Tabla de Contenidos: “…Overview of WebSphere Application Server V5 -- 2.1 Java 2 Enterprise Edition (J2EE) overview -- 2.1.1 J2EE platform roles -- 2.1.2 J2EE benefits -- 2.1.3 Application components and their containers -- 2.1.4 Standard services -- 2.1.5 J2EE packaging -- 2.2 WebSphere Application Server V5 product family -- 2.3 WebSphere Application Server runtime architecture -- 2.3.1 WAS Version 5 base runtime architecture -- 2.3.2 WAS Version 5 Network Deployment runtime architecture -- 2.3.3 Architectural features -- 2.4 WebSphere Application Server V5 tools -- 2.4.1 Tools for installing, upgrading, and migrating -- 2.4.2 Tools for assembling applications -- 2.4.3 Tools for deploying and administering -- 2.4.4 Tools for monitoring and tuning -- 2.4.5 Tools for troubleshooting -- 2.5 WAS V5.0.2 and Supported J2EE APIs -- 2.5.1 What is new in WebSphere Application Server V5.0.2 -- 2.5.2 Supported J2EE APIs in WAS 5.0.2 -- Chapter 3. …”
Libro electrónico -
2053Publicado 2018Tabla de Contenidos: “…. -- PEP 543 - Unified TLS API -- How to do it... -- There's more... -- Chapter 9: Documenting with LyX -- Introduction -- Python documentation tools and techniques -- How to do it... -- Inline comments and the dir command -- Using docstrings -- How to do it... -- There's more... -- Using PyDoc help -- How to do it... -- HTML reports -- How to do it... -- Using reStructuredText files -- Getting ready -- How to do it... -- Using the Sphinx documentation program -- Getting ready -- How to do it... -- Using LaTeX and LyX document preparation programs -- Getting ready -- How to do it... -- There's more... -- Other Books You May Enjoy -- Index…”
Libro electrónico -
2054Publicado 2018Tabla de Contenidos: “…. -- Scheduling jobs -- How to do it... -- Ansible Tower API -- How to do it... -- Autoscaling using Callback -- How to do it... -- Other Books You May Enjoy -- Leave a review - let other readers know what you think -- Index…”
Libro electrónico -
2055Publicado 2022Tabla de Contenidos: “…On Aspect-Oriented Programming -- Chapter 10: Go Unit Tests and Benchmarks -- Test Cases and Benchmarks in Go -- Test Cases in Java -- Chapter 11: Going into the Future -- Improved Error Handling -- Go Generics -- Capstone Game of Life Example -- Game of Life Go Source -- Capstone Project in Java -- Main.java -- Server.java -- Game.java -- Utility.java -- Formatter.java -- ParameterProvider.java -- AnnimatedGifWriter.java -- Logger.java -- Capstone Project in Go -- Main.go -- Server.go -- Game.go -- Utility.go -- Go Doc Output -- API Outputs -- Game Outputs -- Part III: Go Library Survey -- Chapter 12: Key Package Comparison -- Java Lang Packages -- Java IO Package -- Java Text Package -- Java Time Packages -- Java Util Packages -- Chapter 13: Key Method/Function Comparison -- Chapter 14: Go Package Survey -- File Access with Go -- Compression Services -- Archive Packages -- Compression Packages -- Image -- Input/Output (I/O) -- Bytes Package -- Format Package -- Data Collections -- Sorting -- Context Package -- Cryptography and Hashing and Data Encoding -- Encoding Packages -- Unicode Encoding Packages -- Chapter 15: SQL Database Access -- Chapter 16: Client and Server Support -- MIME Packages -- Network Packages -- The Net Package -- The HTTP Template Package -- The Net.HTTP Package -- URL Package -- Chapter 17: Go Runtime -- Errors Package -- Flag Package -- Log Package -- Math Package -- Operating System Support Packages -- Reflection Package -- Regular Expression Package -- Go Runtime Packages -- String Processing Packages -- Concurrency and Goroutines -- Testing Package -- Time and Date Package -- Appendix A: Installing Go -- Appendix B: Some Go FAQs -- Appendix C: Go Gotchas to Look Out For -- Appendix D: Mark-Sweep Pseudocode -- Appendix E: ASCII vs. …”
Libro electrónico -
2056Publicado 2017Tabla de Contenidos: “…-- Available transducer implementations for JavaScript -- The transducers-js API -- Using transducers -- Using transducers with RxJS -- Testing transducers -- A performance comparison for JavaScript code using transducers -- Summary -- Chapter 10: A Real-Time Server -- The web chat server -- Creating the project -- The architecture of the server -- Implementing the server -- DataSource -- Service to send messages -- Test implementation -- Service implementation -- Service to listen to new messages -- Test implementation -- Service implementation -- Service to block messages from a given user -- Test implementation -- Service implementation -- Service to send a command -- Test implementation -- Service implementation -- Handling WebSocket connections -- Scaling the server -- Connecting to Redis -- Using Redis as the DataSource for messages -- Summary -- Chapter 11: A Real-Time Client -- Installing dependencies -- The structure of our client -- Building the application for the first time -- Connecting to the server application -- Using RxJS to manage user input -- Connecting user interactions and server communication -- Improving interaction with RxJS -- Batching changes to the DOM -- Testing the application -- Summary -- Index…”
Libro electrónico -
2057Publicado 2016Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Getting Started with the Raspberry Pi -- Hardware requirements -- Power supply -- USB hub -- SD cards -- Extra peripherals -- Essential peripherals -- Useful peripherals -- Internet 3G dongles -- Audio recording -- Other media add-ons -- Fun peripherals -- Installing Raspbian on the Raspberry Pi -- Understanding the design of the Raspberry Pi -- Boot process -- Other capabilities -- Hardware limitations -- Network speeds -- USB bottlenecks -- Time -- References -- Summary -- Chapter 2: Preparing a Network -- Local Area Network (LAN) -- The eth0 port -- The wlan0 interface -- The loopback (LO) interface -- A wireless configuration (Wi-Fi) -- Recommended wireless adapters -- Setting up from a desktop -- Setting up from a console -- Using wicd-curses -- A static network address -- Testing and benchmarking your network -- Basic tests -- Advanced benchmarking tools -- A speedtest application -- iPerf -- Recommended bandwidth -- Internet configurations -- Home packages -- Business packages -- Dynamic DNS -- Installing a client -- The free Dynamic DNS domain workaround -- Summary -- Chapter 3: Configuring Extra Features -- Updating Raspberry Pi -- Updating the firmware -- Updating packages -- Updating distribution -- Outcomes -- Hardware watchdog -- Enabling the watchdog and daemon -- Testing the watchdog -- Enabling extra decoders -- Buying licenses -- MPEG-2 -- VC-1 -- Hardware monitoring -- Summary -- Chapter 4: Using Fast Web Servers and Databases -- Apache versus nginx versus Kestrel -- Installing nginx -- Configuring the nginx virtual hosts -- Extra frameworks for nginx -- Python API -- Executing Python -- Node.js -- Installing Node.js -- What is NPM -- The Node.js server -- .NET and ASP.MVC…”
Libro electrónico -
2058Publicado 2017Tabla de Contenidos: “…. -- There's more... -- Building a REST API using Vapor -- Getting started -- How to do it... -- How it works... -- There's more... -- See also -- Persistence with Vapor using Postgres -- Getting started -- How to do it... -- There's more... -- See also -- Hosting your Vapor app on Heroku -- Getting started -- How to do it... -- See also -- Chapter 8: Performance and Responsiveness in Swift -- Introduction…”
Libro electrónico -
2059Publicado 2020Tabla de Contenidos: “…Anderson -- Learn your IDE to reduce cognitive load / Trisha Gee -- Let's make a contract : the art of designing a Java API / Mario Fusco -- Make code simple and readable / Emily Jiang -- Make your Java groovier / Ken Kousen -- Minimal constructors / Steve Freeman -- Name the date / Kevlin Henney -- The necessity of industrial-strength technologies / Paul W. …”
Libro electrónico -
2060Publicado 2019Tabla de Contenidos: “…Using the WebAssembly JavaScript API -- Real-world use cases -- Exercises -- Summary -- Part 4. …”
Libro electrónico