Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,058
- Application software 975
- Java (Computer program language) 452
- Cloud computing 327
- Application program interfaces (Computer software) 301
- Engineering & Applied Sciences 299
- Web site development 286
- Python (Computer program language) 271
- Computer Science 250
- Computer programming 242
- JavaScript (Computer program language) 231
- Web applications 220
- Programming 191
- Computer programs 190
- Microsoft .NET Framework 179
- Computer software 175
- Design 167
- Web sites 162
- Internet programming 153
- Machine learning 145
- Artificial intelligence 140
- Mobile computing 126
- Open source software 123
- Programming languages (Electronic computers) 121
- Computer networks 120
- Android (Electronic resource) 119
- Management 114
- Data mining 109
- Software engineering 107
- Web services 101
-
2141Publicado 2019Tabla de Contenidos: “…-- 10.3.1 Regression -- 10.3.2 Clustering -- 10.3.3 Working with maps -- 10.3.4 Interacting with APIs -- 10.3.5 Sharing your package -- 10.4 More resources -- Terminology -- Summary -- Appendix A: Installing R -- Windows -- Mac -- Linux -- From source -- Appendix B: Installing RStudio -- Installing RStudio -- Packages used in this book -- Appendix C: Graphics in base R -- Index -- List of Figures -- List of Tables -- List of Listings…”
Libro electrónico -
2142por Singh, PaulTabla de Contenidos: “…-- Understanding TPM, RPM, and PTUs -- Scaling Design patterns -- Retries with exponential backoff - the scaling special sauce -- Rate Limiting Policy in Azure API Management -- Monitoring, logging, and HTTP return codes -- Monitoring and logging -- HTTP return codes -- Costs, training and support -- Costs -- Training -- Support -- Summary -- References -- Part 4: Building Safe and Secure AI - Security and Ethical Considerations -- Chapter 8: Security and Privacy Considerations for Gen AI - Building Safe and Secure LLMs -- Understanding and mitigating security risks in generative AI -- Emerging security threats - a look at attack vectors and future challenges -- Model denial of service (DoS) -- Jailbreaks and prompt injections -- Training data poisoning -- Insecure plugin (assistant) design -- Insecure output handling -- Applying security controls in your organization -- Content filtering -- Managed identities -- Key management system -- What is privacy? …”
Publicado 2024
Libro electrónico -
2143Publicado 2024Tabla de Contenidos: “…Capital One's cloud transformation journey -- Capital One's talent acquisition strategy -- Re-architecting the Capital One mobile app on the cloud -- Summary -- Further reading -- Part 3: Lead and Transform Your Business with Cloud -- Chapter 8: Architecting a Cloud-Ready Enterprise -- Building a framework for a cloud-ready enterprise -- Cloud foundation layer -- Legacy apps -- Application development and operations -- API orchestration, and integration layer -- Cloud architecture frameworks from major cloud service providers -- AWS Well-Architected Framework -- Google Cloud Architecture Framework -- Microsoft Azure Well-Architected Framework -- Private and hybrid cloud strategies -- Summary -- Further reading -- Chapter 9: Facets of Digital Transformation -- Building a security-first cloud architecture -- Foundational security principles -- Automating cloud asset management -- IAM -- Network security -- Application security -- Data security -- Data sovereignty and data residency -- Rethinking infrastructure -- Compute infrastructure -- Network infrastructure -- Storage infrastructure -- Application modernization strategy -- Traditional application modernization -- Cloud-native DevOps -- Data modernization -- Cloud optimization and cost governance -- The inform phase -- The optimize phase -- The operate phase -- Summary -- Further readings -- Chapter 10: Leading and Innovating with the Cloud -- Innovating with the cloud -- Setting up innovation labs -- Vision and governance -- Talent and partnerships -- Innovate and deliver -- Innovating with big data and serverless -- Banking and financial services -- Retail -- Healthcare -- Embedding AI across the enterprise -- GenAI -- XR -- Edge computing -- Blockchain -- Quantum computing -- Responsible uses of emerging technologies -- Summary -- Further reading -- Chapter 11: ESG and Sustainability…”
Libro electrónico -
2144Publicado 2023Tabla de Contenidos: “…-- Mobile app security threats -- Architecting secure mobile apps -- The traditional way of doing security testing -- Introduction to mobile DevSecOps -- Benefits of Mobile DevSecOps -- Building a culture of security -- Starting your DevSecOps journey -- Automating mobile security testing with mobile CI/CD and DevOps -- Tools to automate security testing -- Tips for security automation for mobile DevOps -- Summary -- Chapter 9: Mobile DevOps Best Practices -- Best practices for CI/CD in mobile app development -- Key metrics to track for CI/CD in mobile app development -- Managing mobile app versions and releases -- Monorepo -- Multi-repo -- Managing mobile app infrastructure -- IaC for mobile apps -- Configuration management for mobile apps -- Remote and dependency caching -- Execution of CI builds and tests in parallel -- A/B testing and feature flags -- A/B testing for mobile apps -- Feature flags for mobile apps -- Mock APIs -- Building, testing, and releasing with fastlane -- ChatOps for mobile DevOps collaboration -- Slack -- AWS Chatbot -- Summary -- Part 4: Moving Beyond Mobile DevOps and the Future of DevOps…”
Libro electrónico -
2145Publicado 2024Tabla de Contenidos: “…-- The OTel project -- OTel -- Summary -- Chapter 12: Distributing Your Apps -- Technical requirements -- Go Modules -- The routine using modules -- CI -- Caching -- Static analysis -- Releasing your application -- Summary -- Part 5: Going Beyond -- Chapter 13: Capstone Project - Distributed Cache -- Technical requirements -- Understanding distributed caching -- System requirements -- Requirements -- Design and trade-offs -- Creating the project -- Thread safety -- Choosing the right approach -- Adding thread safety -- The interface -- TCP -- HTTP -- Others -- Eviction policies -- Sharding -- Summary -- Chapter 14: Effective Coding Practices -- Technical requirements -- Reusing resources -- Using sync.Pool in a network server -- Using sync.Pool for JSON marshaling -- Executing tasks once -- singleflight -- Effective memory mapping -- API usage -- Advanced usage with protection and mapping flags -- Avoiding common performance pitfalls -- Leaking with time.After -- Defer in for loops -- Maps management -- Resource management -- Handling HTTP bodies -- Channel mismanagement -- Summary -- Chapter 15: Stay Sharp with System Programming -- Real-world applications -- Dropbox's leap of faith…”
Libro electrónico -
2146Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started with Python Polars -- Technical requirements -- Introducing key features in Polars -- Speed and efficiency -- Expressions -- The lazy API -- See also -- The Polars DataFrame -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Polars Series -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- The Polars LazyFrame -- How to do it... -- How it works... -- There's more... -- See also -- Selecting columns and filtering data -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating, modifying, and deleting columns -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Understanding method chaining -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Processing larger-than-RAM datasets -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 2: Reading and Writing Files -- Technical requirements -- Reading and writing CSV files -- How to do it... -- How it works... -- There's more... -- See also -- Reading and writing Parquet files -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Reading and writing Delta Lake tables -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Reading and writing JSON files -- How to do it... -- How it works... -- There's more... -- See also -- Reading and writing Excel files -- Getting ready -- How to do it... -- How it works... -- See also -- Reading and writing other data file formats -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Reading and writing multiple files…”
Libro electrónico -
2147Publicado 2023Tabla de Contenidos: “…Specifying security requirements for web workloads, including Azure App Service -- Specifying security requirements for containers -- Specifying security requirements for container orchestration -- Case study - security requirements for IaaS, PaaS, and SaaS -- Summary -- Part 5: Designing a Strategy for Data and Applications -- Chapter 9: Specifying Security Requirements for Applications -- Specifying priorities for mitigating threats to applications -- Identity and secrets handling and use -- Segmentation and configuration -- Static and dynamic testing -- Data handling and access -- Security posture management and workload protection -- Specifying a security standard for onboarding a new application -- Specifying a security strategy for applications and APIs -- Case study - security requirements for applications -- Summary -- Chapter 10: Designing a Strategy for Securing Data -- Specifying priorities for mitigating threats to data -- Managing the risk to data -- Ransomware protection and recovery -- Designing a strategy to identify and protect sensitive data -- Specifying an encryption standard for data at rest and in motion -- Encryption at rest -- Encryption in transit -- Identity and secrets handling and use -- Case study - designing a strategy to secure data -- Summary -- Chapter 11: Case Study Responses and Final Assessment/Mock Exam -- Case study sample responses -- Chapter 4 - designing a zero-trust architecture -- Chapter 5 - designing for regulatory compliance -- Chapter 6 - evaluating the security posture -- Chapter 7 - designing a secure architecture for endpoints -- Chapter 8 - security requirements for IaaS, PaaS, and SaaS -- Chapter 9 - security requirements for applications -- Chapter 10 - designing a strategy to secure data -- Mock exam practice questions -- Questions -- Mock exam answers and chapter reference -- Summary…”
Libro electrónico -
2148Publicado 2015“…His 2013 book, "RESTful Web APIs" goes one step further and describes how Hypermedia APIs can increase flexibility and reusability of APIs.But what are Hypermedia APIs? …”
-
2149Publicado 2023“…Hands-on Python for MLOps Build powerful APIs, tools, and scripts with Python Use Python to create APIs and automation scripts for machine learning operations. …”
Video -
2150Publicado 2015“…In this video, he shares his commanding knowledge of the platform with this review of the primary APIs that make up Java EE7. He explains each API in detail, using demonstrations and a discussion of each API’s unique value proposition. …”
-
2151Publicado 2017“…Could every API seamlessly interoperate with every other API using a common lingua franca? …”
-
2152Publicado 2021“…He covers how to translate business requirements to a graph data model, how to design API using GraphQL type definitions, how to generate a CRUD GraphQL API using the Neo4j GraphQL Library, adding custom logic using the Cypher schema directive, and how to secure API with authorization rules…”
Video -
2153por Rauland, PatrickTabla de Contenidos: “…Configuring Finale Inventory -- Importing products into ERP -- Using an ERP -- Summary -- Chapter 7: Configuring In-Store POS Solutions -- Technical requirements -- Setting up WooCommerce POS -- Accepting credit cards -- Setting up payment for Stripe -- Selecting WooCommerce POS -- Setting up Square -- Connecting with Square -- Setting up Square for WooCommerce -- Syncing data -- Syncing data in-store and with WooCommerce -- Single database systems -- Mastering synced databases via an API -- Manually syncing data -- Summary -- Chapter 8: Using Fulfillment Software -- Sending and updating shipping information -- Sending shipping data -- Sending emails -- Configuring webhooks -- Building a custom integration -- Updating data -- Processing a daily email -- Retrieving order data through a custom integration -- Configuring Shippo -- Signing up for Shippo -- Configuring Shippo's setup information -- Fulfilling orders with Shippo -- Configuring ShipStation -- Integrating with ShipStation -- Fulfilling packages with ShipStation -- Printing pick lists -- Using the ShipStation app -- Summary -- Chapter 9: Speeding Up Your Store -- Technical requirements -- Monitoring speed and performance -- Finding a starting point with GTmetrix -- Web Vitals -- Testing changes -- Minifying CSS and JavaScript resources -- Setting up Autoptimize -- Concatenate files if necessary -- Optimizing images -- Optimizing images with Jetpack -- Optimizing images with Imagify -- Using the bulk updater -- Caching and e-commerce -- Configuring caching plugins -- Configuring caching via HTACCESS -- Page caching -- Optimizing content above the fold -- Summary -- Part 3: Customizing the Appearance and Functionality of Your Store -- Chapter 10: Setting Up Your Theme -- Choosing a theme for WooCommerce -- Exploring the Twenty Twenty-Four theme -- Storefront -- Exploring Astra…”
Publicado 2024
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull)Acceso restringido con credenciales UPSA
Libro electrónico -
2154Publicado 2018Tabla de Contenidos: “…-- Secure design -- Summary -- Questions -- Further reading -- Chapter 8: Secure Coding Best Practices -- Secure coding industry best practices -- Establishing secure coding baselines -- Secure coding awareness training -- Tool evaluation -- Tool optimization -- High-risk module review -- Manual code review tools -- Secure code scanning tools -- Secure compiling -- Common issues in practice -- Summary -- Questions -- Further reading -- Chapter 9: Case Study - Security and Privacy by Design -- Case study background -- Secure architecture review -- Authentication -- Authorization -- Session management -- Data input/output -- Privacy by design -- Summary of security and privacy frameworks -- Third-party component management -- Summary -- Questions -- Further reading -- Chapter 10: Security-Testing Plan and Practices -- Security-testing knowledge kit -- Security-testing plan templates -- Security-testing objective -- Security-testing baseline -- Security-testing environment -- Testing strategy -- High-risk modules -- Recommended security-testing tools -- Web security testing -- Privacy -- Security-testing domains -- Thinking like a hacker -- Exploits and CVE -- Hacker techniques -- Malware Information -- Security-Training environment -- Summary -- Questions -- Further reading -- Chapter 11: Whitebox Testing Tips -- Whitebox review preparation -- Viewing the whole project -- High-risk module -- Whitebox review checklist -- Top common issues -- Secure coding patterns and keywords -- Case study - Java struts security review -- Struts security review approaches -- Struts security checklist -- Struts security strings search in struts.xml and API -- Summary -- Questions -- Further reading…”
Libro electrónico -
2155Publicado 2021Tabla de Contenidos: “…Identity Governance -- Access Management -- Authentication -- LDAP -- RADIUS -- SAML -- OAuth2 -- OpenID Connect (OIDC) -- Certificate-Based Authentication -- FIDO2 -- Mobile and Biometrics -- Authorization -- Zero Trust and IAM -- Authentication, Authorization, and Zero Trust Integration -- Enhancing Legacy System Authentication -- Zero Trust as Catalyst for Improving IAM -- Summary -- Chapter 6: Network Infrastructure -- Network Firewalls -- The Domain Name System -- Public DNS Servers -- Private DNS Servers -- Monitoring DNS for Security -- Wide Area Networks -- Load Balancers, Application Delivery Controllers, and API Gateways -- Web Application Firewalls -- Summary -- Chapter 7: Network Access Control -- Introduction to Network Access Control -- Zero Trust and Network Access Control -- Unmanaged Guest Network Access -- Managed Guest Network Access -- Managed vs. …”
Libro electrónico -
2156Publicado 2021Tabla de Contenidos: “…Adding a code component to a table -- Adding a code component to a sub-grid -- Configuring a code component on a dashboard -- Adding a code component to a canvas app -- Configuring a field type code component on a screen -- Configuring a dataset type code component on a screen -- Adding a code component to a gallery component -- Summary -- Test your knowledge -- Further reading -- Section 3: Enhancing Code Components and Your Development Experience -- Chapter 10: Diving Deep into the Features Provided by PCF -- Technical requirements -- Understanding the context -- Exploring the updateView method -- Understanding the importance of the getOutputs method -- Setting a null value on the field -- Setting values on the field based on a condition -- Omitting updates to a field -- Inspecting the caching mechanism -- Working with external devices -- Exploring the Web API -- Summary -- Test your knowledge -- Further reading -- Chapter 11: Creating Advanced Dataset Code Components -- Technical requirements -- Recap of what was built -- Sorting the data in a dataset -- Implementing pagination on a dataset -- Integrating code components with out-of-the-box options -- Understanding the technique to open a record from a dataset -- Defining properties on a dataset -- Summary -- Test your knowledge -- Further reading -- Chapter 12: Enriching Your Dev Experience -- Technical requirements -- Using Lint and Prettier -- Understanding the process of linting your code -- Integrating Prettier with a linter -- Working with ESLint and Prettier -- Setting up a testing framework -- Using React and Fluent UI to build code components -- Summary -- Test your knowledge -- Further reading -- Answers to Knowledge Tests -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 11 -- Chapter 12.…”
Libro electrónico -
2157Publicado 2021Tabla de Contenidos: “…-- Function Naming -- Use Intention-Revealing Names -- Parameters and Return Values -- Number of Parameters -- Avoid Flag Parameters -- Avoid Output Parameters -- Don't Pass or Return 0 (NULL, nullptr) -- Strategies for Avoiding Regular Pointers -- Choose simple object construction on the stack instead of on the heap -- In a function's argument list, use (const) references instead of pointers -- If it is inevitable to deal with a pointer to a resource, use a smart one -- If an API returns a raw pointer... -- The Power of const Correctness -- About Old C-Style in C++ Projects -- Choose C++ Strings and Streams over Old C-Style char* -- Avoid Using printf(), sprintf(), gets(), etc. -- Choose Standard Library Containers over Simple C-Style Arrays -- Use C++ Casts Instead of Old C-Style Casts -- Avoid Macros -- Chapter 5: Advanced Concepts of Modern C++ -- Managing Resources -- Resource Acquisition Is Initialization (RAII) -- Smart Pointers -- Unique Ownership with std::unique_ptr< -- T> -- -- Shared Ownership with std::shared_ptr< -- T> -- -- No Ownership, but Secure Access with std::weak_ptr< -- T> -- -- Atomic Smart Pointers -- Avoid Explicit New and Delete -- Managing Proprietary Resources -- We Like to Move It -- What Are Move Semantics? …”
Libro electrónico -
2158Publicado 2003Tabla de Contenidos: “…6.1.4 CSS -- 6.1.5 JavaScript -- 6.1.6 Java applets -- 6.1.7 XML (client side) -- 6.1.8 XHTML 1.1 (HTML 4.01) -- 6.1.9 XForms -- 6.2 Pervasive clients -- 6.2.1 Architecture -- 6.2.2 WAP -- 6.2.3 Microbrowser -- 6.2.4 WML -- 6.2.5 WMLScript -- 6.2.6 cHTML -- 6.2.7 VoiceXML -- 6.2.8 SyncML -- 6.2.9 Mobile devices -- 6.2.10 Mobile client platforms -- 6.3 Wireless networks -- 6.3.1 PAN (Personal Area Network) -- 6.3.2 WLAN (Wireless Local Area Network) -- 6.3.3 WWAN (Wireless Wide Area Network) -- 6.4 Web application server -- 6.4.1 Java servlets -- 6.4.2 Java portlet -- 6.4.3 JavaServer Pages (JSPs) -- 6.4.4 JavaBeans -- 6.4.5 XML -- 6.4.6 Enterprise JavaBeans -- 6.4.7 Additional enterprise Java APIs -- 6.5 Transcoding technology -- Chapter 7. …”
Libro electrónico -
2159Publicado 2018Tabla de Contenidos: “…Training a fully connected layer as a convolution layer -- Convolution implementation of sliding window -- Thinking about localization as a regression problem -- Applying regression to other problems -- Combining regression with the sliding window -- Detecting objects -- Regions of the convolutional neural network (R-CNN) -- Fast R-CNN -- Faster R-CNN -- Single shot multi-box detector -- Object detection API -- Installation and setup -- Pre-trained models -- Re-training object detection models -- Data preparation for the Pet dataset -- Object detection training pipeline -- Training the model -- Monitoring loss and accuracy using TensorBoard -- Training a pedestrian detection for a self-driving car -- The YOLO object detection algorithm -- Summary -- Chapter 5: Semantic Segmentation -- Predicting pixels -- Diagnosing medical images -- Understanding the earth from satellite imagery -- Enabling robots to see -- Datasets -- Algorithms for semantic segmentation -- The Fully Convolutional Network -- The SegNet architecture -- Upsampling the layers by pooling -- Sampling the layers by convolution -- Skipping connections for better training -- Dilated convolutions -- DeepLab -- RefiNet -- PSPnet -- Large kernel matters -- DeepLab v3 -- Ultra-nerve segmentation -- Segmenting satellite images -- Modeling FCN for segmentation -- Segmenting instances -- Summary -- Chapter 6: Similarity Learning -- Algorithms for similarity learning -- Siamese networks -- Contrastive loss -- FaceNet -- Triplet loss -- The DeepNet model -- DeepRank -- Visual recommendation systems -- Human face analysis -- Face detection -- Face landmarks and attributes -- The Multi-Task Facial Landmark (MTFL) dataset -- The Kaggle keypoint dataset -- The Multi-Attribute Facial Landmark (MAFL) dataset -- Learning the facial key points -- Face recognition…”
Libro electrónico -
2160Publicado 2023Tabla de Contenidos: “…Looking into the different options available for data migration -- Summary -- Further reading -- Part 3: The Way Forward: The Art of Possible -- Chapter 9: The Pilot: High Stakes -- Accelerating your transition -- S/4HANA public cloud/new implementations (greenfield) -- System conversions (brownfield) -- The Readiness Check tool -- The Custom Code Migration app -- Selective Data Transition -- Iterative data loads -- Mitigating the risks by starting earlier -- An Agile approach to data conversion and integration testing -- SAP Activate -- SAP's EML -- The UX strategy -- Importance of a UX strategy -- Change management -- Getting ready for the pilot -- Scenarios for the use of TMS + CTS for on-prem deployments -- Transport management with SAP CALM -- Bringing it all together and the pilot rollout -- Summary -- Chapter 10: Going All In: A Leap of Faith -- S/4HANA deployment patterns -- Focusing on defining the Global Template -- Defining the instance strategy -- Methodology -- The rollout approach -- Deployment -- Release management -- Cutover management -- Solution readiness -- People readiness -- Business operational readiness -- The readiness of AMS for deployment and transition -- Monitoring progress to go-live -- Go-live -- Hypercare -- Stabilization and Hypercare - post-go-live support and incident management -- Rollout post go-live -- Summary -- Chapter 11: Innovation Unleashed: The Hunger Games -- The cultural shift to innovation -- Sponsored innovation hackathons -- Innovation awards -- Rewiring the enterprise for agility and scale -- Citizen developers -- Multi-layered APIs -- Security-as-a-Service -- LCNC in SAP (SAP Build) -- SAP Graph and SAP One Domain Model (ODM) -- Web 3.0 -- The future of work -- The spectrum of automation and digitalization -- Digital employees -- Brand ambassadors -- Futuristic retail experiences…”
Libro electrónico