Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,058
- Application software 975
- Java (Computer program language) 452
- Cloud computing 327
- Application program interfaces (Computer software) 301
- Engineering & Applied Sciences 299
- Web site development 286
- Python (Computer program language) 271
- Computer Science 250
- Computer programming 242
- JavaScript (Computer program language) 231
- Web applications 220
- Programming 191
- Computer programs 190
- Microsoft .NET Framework 179
- Computer software 175
- Design 167
- Web sites 162
- Internet programming 153
- Machine learning 145
- Artificial intelligence 140
- Mobile computing 126
- Open source software 123
- Programming languages (Electronic computers) 121
- Computer networks 120
- Android (Electronic resource) 119
- Management 114
- Data mining 109
- Software engineering 107
- Web services 101
-
2261Publicado 2022“…Learn to build greedy algorithms, then convert them to microservices and finally containerized them and deploy to AWS with App Runner. 00:00 Intro 00:38 Github Code Repo of Traveling Salesman Problem 02:00 Overview of Cities in Problem 04:50 Launching Github Codespaces to work on problem 06:30 Cleaning up the code and fixing Makefile and Lint 09:30 Running simulations and minimizing the cost 14:00 Pinning version numbers in requirements.txt 16:00 Setup Github Actions 19:00 Fixing Python Black error 21:32 Create Github Actions Status Badge 25:00 Creating FastAPI Microservice 28:00 Building Greedy Coin Change Microservice 36:00 Deploying Python FastAPI Microservice to AWS with App Runner 46:00 Theory of logic to containerization 51:00 Building Containerized C# Service in AWS Cloud9 and App Runner 01:03:44 Testing via Curl in AWS CloudShell 01:06:00 Building Containerized FastAPI Service in AWS Cloud9 and App Runner 01:11:03 Pushing to Amazon ECR 01:14:00 Testing via FastAPI App Runner API with Swagger UI…”
Video -
2262
-
2263
-
2264
-
2265
-
2266
-
2267
-
2268
-
2269
-
2270Publicado 2024Tabla de Contenidos: “…Implementing CRUD operations -- CRUD operations of items -- Adding a new item -- Editing or deleting an item -- CRUD operations of fields -- Refactoring Razor components -- Creating the Navbar component -- Creating a Dropdown component for the context menu -- Using templated components -- Creating a ListView component -- Using the ListView component -- Accessing a native API from Blazor Hybrid apps -- Summary -- Part 3: Testing and Deployment -- Chapter 11: Developing Unit Tests -- Technical requirements -- Unit testing in .NET -- Setting up the unit test project -- Developing test cases for the model -- Sharing context between tests -- Sharing using a constructor -- Sharing using class fixtures -- Sharing using collection fixtures -- Mock .NET MAUI components -- Razor component testing using bUnit -- Changing the project configuration for bUnit -- Creating a bUnit test case -- Creating test cases in Razor files -- Using the RenderFragment delegate -- Testing Razor pages -- Summary -- Further reading -- Chapter 12: Deploying and Publishing in App Stores -- Technical requirements -- Preparing application packages for publishing -- Preparing for publishing -- Publishing to Microsoft Store -- Publishing to Google Play Store -- Publishing to Apple's App Store -- GitHub Actions -- Understanding GitHub Actions -- Workflows -- Events -- Jobs -- Runners -- Steps -- Summary -- Further reading -- Other Books You May Enjoy -- Index…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2271Publicado 2018Tabla de Contenidos: “…. -- See also -- Running your first Security API code -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running your first MVC 1.0 code -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 2: Server-Side Development -- Using CDI to inject context and dependency -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using Bean Validation for data validation -- Getting ready -- How to do it... -- How it works... -- See also -- Using servlet for request and response management -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using Server Push to make objects available beforehand -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using EJB and JTA for transaction management -- Getting ready -- How to do it... -- How it works... -- There's more…”
Libro electrónico -
2272Publicado 2018Tabla de Contenidos: “…. -- Loading framework plugins -- How to do it... -- Meterpreter API and mixins -- Getting ready -- How to do it... -- How it works... -- Railgun-converting Ruby into a weapon -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding DLL and function definitions to Railgun -- How to do it... -- How it works... -- Injecting the VNC server remotely -- Getting ready -- How to do it... -- Enabling Remote Desktop -- How to do it... -- How it works... -- Chapter 5: Post-Exploitation -- Introduction -- Post-exploitation modules -- Getting ready -- How to do it... -- How it works... -- How to do it... -- How it works... -- Bypassing UAC -- Getting ready -- How to do it... -- Dumping the contents of the SAM database -- Getting ready -- How to do it... -- Passing the hash -- How to do it... -- Incognito attacks with Meterpreter -- How to do it... -- Using Mimikatz -- Getting ready -- How to do it... -- There's more... -- Setting up a persistence with backdoors -- Getting ready -- How to do it... -- Becoming TrustedInstaller -- How to do it... -- Backdooring Windows binaries -- How to do it... -- Pivoting with Meterpreter -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
2273Publicado 2018Tabla de Contenidos: “…-- Developing a churn analytics pipeline -- Description of the dataset -- Exploratory analysis and feature engineering -- LR for churn prediction -- SVM for churn prediction -- DTs for churn prediction -- Random Forest for churn prediction -- Selecting the best model for deployment -- Summary -- Chapter 3: High Frequency Bitcoin Price Prediction from Historical and Live Data -- Bitcoin, cryptocurrency, and online trading -- State-of-the-art automated trading of Bitcoin -- Training -- Prediction -- High-level data pipeline of the prototype -- Historical and live-price data collection -- Historical data collection -- Transformation of historical data into a time series -- Assumptions and design choices -- Data preprocessing -- Real-time data through the Cryptocompare API -- Model training for prediction -- Scala Play web service -- Concurrency through Akka actors -- Web service workflow -- JobModule -- Scheduler…”
Libro electrónico -
2274Publicado 2018Tabla de Contenidos: “…. -- Chapter 6: Basic Server-Side Development -- Introduction -- Defining model methods and using the API decorators -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Reporting errors to the user -- Getting ready -- How to do it... -- How it works... -- There's more... -- Obtaining an empty recordset for a different model -- Getting ready -- How to do it... -- How it works... -- See also -- Creating new records -- Getting ready…”
Libro electrónico -
2275por Vanderburg, Eric A.Tabla de Contenidos: “…Maintenance Automation -- Monitoring Techniques -- Collector Protocols and Methods -- Tagging -- Log Analysis -- Baselines -- Thresholds -- Trending -- Automated Event Responses -- Log Scrubbing -- Verification of Continuous Monitoring Activities -- Management Tools -- Chapter Review -- Questions -- Answers -- Chapter 11 Security in the Cloud -- Data Security -- Encryption -- Public Key Infrastructure -- Encryption Protocols -- Tunneling Protocols -- Ciphers -- Storage Security -- Protected Backups -- Network Security -- Segmentation -- Firewall -- DDoS Protection -- Packet Capture -- Network Flow -- IDS/IPS -- Packet Broker -- APIs -- Effects of Cloud Service Models on Security Implementation -- Endpoint Protection -- Host-Based Firewall -- Antivirus/Antimalware -- Endpoint Detection and Response -- Data Loss Prevention -- Exercise 11-1: Creating a DLP Policy for Office 365 -- NAC -- Hardening -- Application Whitelisting -- Impact of Security Tools to Systems and Services -- Access Control -- Identification -- Authentication -- Authorization -- Single Sign-On -- Federation -- Access Control Protocols -- Access Control Methodologies -- Multifactor Authentication -- Chapter Review -- Questions -- Answers -- Chapter 12 Security Best Practices -- Cloud Security Engineering -- Implementing Layered Security -- Protecting Against Availability Attacks -- Least Privilege -- Separation of Duties -- Security Automation -- Security Governance and Strategy -- Developing Company Security Policies -- Account Management Policies -- Documenting Security Procedures -- Assessment and Auditing -- Leveraging Established Industry Standards and Regulations -- Applying Platform-Specific Security Standards -- Data Classification -- Legal Holds -- Exercise 12-1: Creating a Legal Hold for a Mailbox in Office 365 -- Keeping Employees and Tools Up to Date…”
Publicado 2021
Libro electrónico -
2276Publicado 2018Tabla de Contenidos: “…Retrieving JSON data outside of test methods -- Supporting multibranded applications -- Multilocators -- Conditional code -- Runtime flags -- Multiple driver support -- Dual WebDriver testing -- Dual WebDriver and AppiumDriver testing -- Parallel testing -- Suite XML file -- Parallel properties method -- Common setup -- Summary -- Chapter 8: Designing a Selenium Grid -- Introduction -- Virtual grids -- Grid structure -- Single browser nodes -- Multibrowser nodes -- Single mobile device nodes -- Multimobile/browser nodes -- Selenium driver class - WebDriver versus RemoteWebDriver -- The setDriver method for browser -- The setDriver method for mobile -- Overloaded setDriver method for browser -- Switching from local to remote driver -- Suite parameters -- JVM argument -- Default global variables -- Processing runtime parameters -- Selenium standalone server and client drivers -- Local use of drivers -- Remote use of drivers -- Selenium standalone server and browser driver command-line options -- Selenium hub -- Selenium hub JSON configuration file -- Selenium nodes -- Selenium node JSON configuration file -- Appium server and mobile simulator/emulator command-line options -- Appium nodes -- Appium node JSON configuration file -- Selenium Grid console -- Directing traffic to Selenium nodes -- Multiple nodes of the same platform and version -- Directing traffic using desired capabilities -- Maintenance of the Selenium Grid -- Summary -- Chapter 9: Third-Party Tools and Plugins -- Introduction -- IntelliJ IDEA Selenium plugin -- Sample project files -- Generating element locators -- Wrap-up on Selenium Plugin -- TestNG results in IntelliJ and Jenkins -- IntelliJ TestNG results -- Jenkins TestNG results -- HTML Publisher Plugin -- Installation -- BrowserMob Proxy Plugin -- Getting started -- ExtentReports Reporter API class -- ExtentHTMLReporter…”
Libro electrónico -
2277Publicado 2021Tabla de Contenidos: “…Command Injection Attacks -- LDAP Injection Attacks -- Exploiting Authentication Vulnerabilities -- Password Authentication -- Session Attacks -- Kerberos Exploits -- Exploiting Authorization Vulnerabilities -- Insecure Direct Object References -- Directory Traversal -- File Inclusion -- Privilege Escalation -- Exploiting Web Application Vulnerabilities -- Cross-Site Scripting (XSS) -- Request Forgery -- Clickjacking -- Unsecure Coding Practices -- Source Code Comments -- Error Handling -- Hard-Coded Credentials -- Race Conditions -- Unprotected APIs -- Unsigned Code -- Steganography -- Application Testing Tools -- Static Application Security Testing (SAST) -- Dynamic Application Security Testing (DAST) -- Mobile Tools -- Summary -- Exam Essentials -- Lab Exercises -- Activity 9.1: Application Security Testing Techniques -- Activity 9.2: Using the ZAP Proxy -- Activity 9.3: Creating a Cross-Site Scripting Vulnerability -- Review Questions -- Chapter 10 Attacking Hosts, Cloud Technologies, and Specialized Systems -- Attacking Hosts -- Linux -- Windows -- Cross-Platform Exploits -- Credential Attacks and Testing Tools -- Credential Acquisition -- Offline Password Cracking -- Credential Testing and Brute-Forcing Tools -- Wordlists and Dictionaries -- Remote Access -- SSH -- NETCAT and Ncat -- Metasploit and Remote Access -- Proxies and Proxychains -- Attacking Virtual Machines and Containers -- Virtual Machine Attacks -- Containerization Attacks -- Attacking Cloud Technologies -- Attacking Cloud Accounts -- Attacking and Using Misconfigured Cloud Assets -- Other Cloud Attacks -- Tools for Cloud Technology Attacks -- Attacking Mobile Devices -- Attacking IoT, ICS, Embedded Systems, and SCADA Devices -- Attacking Data Storage -- Summary -- Exam Essentials -- Lab Exercises -- Activity 10.1: Dumping and Cracking the Windows SAM and Other Credentials…”
Libro electrónico -
2278Publicado 2022Tabla de Contenidos: “…Where the Symmetric Key Is Just Protected by a Password -- Working with and Indexing Encrypted Columns -- Migrating or Restoring a Database with Column Encryption -- Temporary Keys -- Encryption by Passphrase -- Protection of Key Passwords Being Sent to SQL Server -- Summary -- Appendix A: Glossary of Terms -- A -- Advanced Encryption Standard -- AES -- Always Encrypted -- Always Encrypted Wizard -- Asymmetric Encryption -- Asymmetric Key -- At-Rest Data -- Attestation -- Authenticator -- Automated Key Management -- Azure Key Vault -- B -- Backup Encryption -- C -- CA -- CEK -- Certificate -- Certification Authority -- Certificate Store -- CMK -- Code Integrity Policy -- Column Encryption Key -- Column Master Key -- D -- Data Encryption Standard -- Database Encryption Key -- Database Master Key -- DEK -- DES -- Deterministic Encryption -- Diffie Hellman -- DMA Protection -- DMK -- DPAPI -- E -- EKM -- Enclave -- Encryption Scan -- Extensible Key Management -- H -- Hardware Security Module -- Hash -- HGS -- Host Guardian Service -- Host Health Certificate -- Host Key -- HSM -- I -- In-Transit Encryption -- K -- Key Rotation -- P -- Parameterization for Always Encrypted -- Private Key -- Public Key -- R -- Randomized Encryption -- S -- Salt -- Secure Boot -- Secure Hashing Algorithm -- Service Master Key -- SHA -- SMK -- Symmetric Encryption -- Symmetric Key -- T -- TDE -- TDS -- Temporary Key -- Thumbprint -- TLS -- TPM -- TPM Baseline -- TPM Endorsement Key -- Transport Layer Security -- Transparent Data Encryption -- Trusted Platform Module -- V -- VBS -- Virtualization Based Security -- W -- Windows Data Protection API -- Appendix B: Encryption in the Cloud -- Azure VM -- Azure SQL Database or Managed Instance -- TDE -- Backup Encryption -- Always Encrypted with Secure Enclaves -- TLS -- AWS VM (EC2) -- EKM -- Always Encrypted with Secure Enclaves…”
Libro electrónico -
2279Publicado 2017Tabla de Contenidos: “…. -- Customizing the dictionary -- Adjusting the number of threads -- Specifying a DNS server -- Using the NSE library target -- Obtaining profile information from Google's People API -- Getting ready -- How to do it... -- How it works... -- There's more... -- Matching services with public vulnerability advisories -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 4: Scanning Web Servers -- Introduction -- Listing supported HTTP methods -- How to do it... -- How it works... -- There's more... -- Interesting HTTP methods -- Checking whether a web server is an open proxy -- How to do it... -- How it works... -- There's more... -- Discovering interesting files and folders in web servers -- How to do it... -- How it works... -- There's more... -- Using a Nikto database -- Abusing mod_userdir to enumerate user accounts -- How to do it... -- How it works... -- There's more... -- Brute forcing HTTP authentication -- How to do it... -- How it works... -- There's more... -- Brute modes -- Brute forcing web applications -- How to do it... -- How it works... -- There's more... -- Brute forcing WordPress installations -- Brute forcing WordPress installations -- Detecting web application firewalls -- How to do it... -- How it works... -- There's more... -- Detecting possible XST vulnerabilities -- How to do it... -- How it works…”
Libro electrónico -
2280Publicado 2017Tabla de Contenidos: “…. -- Different server types -- Eclipse templates for JSP pages -- Remotely triggering jobs through the Jenkins API -- Getting ready -- How to do it... -- How it works... -- There's more... -- Running jobs from within Maven -- Remotely generating jobs -- See also -- Chapter 6: Continuous Delivery -- Introduction -- Archiving artifacts -- Getting ready -- How to do it... -- See also…”
Libro electrónico