Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 620
- History 449
- Development 330
- Application software 295
- Management 261
- Engineering & Applied Sciences 254
- Computer Science 184
- Law 154
- Social aspects 145
- Education 142
- Philosophy 142
- Calles 139
- Història 133
- RELIGION 133
- Economics 132
- Biblia 126
- History and criticism 126
- Data processing 124
- Leadership 122
- Computer programming 119
- Crítica e interpretación 119
- Economic conditions 118
- Filosofía 118
- Java (Computer program language) 112
- Poesía española 112
- Computer programs 110
- Study and teaching 109
- Business & Economics 106
- Operating systems (Computers) 105
- Politics and government 105
-
8901Publicado 2021Tabla de Contenidos: “…-- Case Study: Using Intelligent Automation to Improve Demand Planners' FVA -- A New IA Approach Called "Assisted Demand Planning"…”
Libro electrónico -
8902Publicado 2005Tabla de Contenidos: “…. -- Chapter 2: Constructors, Destructors, and Assignment Operators -- Item 5: Know what functions C++ silently writes and calls. -- Item 6: Explicitly disallow the use of compiler-generated functions you do not want. -- Item 7: Declare destructors virtual in polymorphic base classes. -- Item 8: Prevent exceptions from leaving destructors. -- Item 9: Never call virtual functions during construction or destruction. -- Item 10: Have assignment operators return a reference to *this. -- Item 11: Handle assignment to self in operator=. -- Item 12: Copy all parts of an object. -- Chapter 3: Resource Management -- Item 13: Use objects to manage resources. -- Item 14: Think carefully about copying behavior in resource-managing classes. -- Item 15: Provide access to raw resources in resource-managing classes. -- Item 16: Use the same form in corresponding uses of new and delete. -- Item 17: Store newed objects in smart pointers in standalone statements. -- Chapter 4: Designs and Declarations -- Item 18: Make interfaces easy to use correctly and hard to use incorrectly. -- Item 19: Treat class design as type design. -- Item 20: Prefer pass-by-reference-to-const to pass-by-value. -- Item 21: Don't try to return a reference when you must return an object. -- Item 22: Declare data members private. -- Item 23: Prefer non-member non-friend functions to member functions. -- Item 24: Declare non-member functions when type conversions should apply to all parameters. -- Item 25: Consider support for a non-throwing swap…”
Libro electrónico -
8903por Slade, StephenTabla de Contenidos: “…5.1 Interpersonal Behavior5.2 Adversarial and Secondary Relations; 5.3 The Persuade Package Revisited; 5.4 Attitudes and Scales; 5.5 Conversation and Stories; 5.6 Relationship Recapitulation; Chapter 6 The VOTE Program; 6.1 Roll Call Voting; 6.2 Consequences: ISSUES and BILLS; 6.3 Preferences: GROUPS and MEMBERS; 6.4 Relations: MEMBERS and GROUPS; 6.5 The VOTE Algorithm; 6.6 Summary of VOTE Decision Model; Chapter 7 Decision Strategies; 7.1 Choices and Explanations; 7.2 Popular Decision; 7.3 Not Constitutional; 7.4 Unimportant Bill; 7.5 Inconsistent Constituency; 7.6 Best for the Country…”
Publicado 1994
Libro electrónico -
8904por Kamthane, Ashok N.Tabla de Contenidos: “…-- Function Definition Syntax -- The Return Statement -- Types of Functions -- Without Arguments and Return Values -- With Arguments But Without Return Values -- Function With Passing Arguments and Return Values -- Function Without Passing Arguments, But With Return Values -- Call by Value and Reference -- Function Returning More Values -- Function as an Argument -- Function With Operators -- Function and Decision Statements -- Function and Loop Statements -- Functions With Arrays and Pointers -- Initialization of Array Using Function -- Passing Array Elements to Function -- Recursion -- Library Functions -- Exercises -- Answers -- Storage Class -- Introduction -- Automatic Variables -- External Variables -- Static Variables -- Register Variables -- Exercises -- Answers -- Preprocessor Directives -- Introduction -- #define Directive -- Undefining a Macro -- Token Pasting and Stringizing Operators -- #include Directive -- Conditional Compilation -- #ifndef Directive -- #error Directive -- #line Directive -- inline Directive -- #pragma Saveregs -- The Pre-Defined Macros in ANSI and Turbo C -- ANSI C Pre-Defined Macros -- Turbo C Pre-Defined Macros…”
Publicado 2010
Libro electrónico -
8905Publicado 2011Tabla de Contenidos: “…-- Service Requirements -- The Ruby Tool Set -- Sinatra -- ActiveRecord -- JSON -- Typhoeus -- Rspec -- The User Service Implementation -- Using GET -- POSTing a User -- PUTing a User -- Deleting a User -- Verifying a User -- Implementing the Client Library -- Finding a User -- Creating a User -- Updating a User -- Destroying a User -- Verifying a User -- Putting It All Together -- Conclusion -- 2 An Introduction to Service-Oriented Design -- Use of Service-Oriented Design in the Wild -- Service-Oriented Design Versus Service-Oriented Architecture Versus RESTful-Oriented Architecture -- Making the Case for Service-Oriented Design -- Isolation -- Robustness -- Scalability -- Agility -- Interoperability -- Reuse -- Conclusion -- 3 Case Study: Social Feed Reader -- A Typical Rails Application -- The Rails Social Feed Reader Application -- Features -- Current Setup -- Converting to Services -- Segmenting into Services -- Breaking Up the Application into Services -- Conclusion -- 4 Service and API Design -- Partitioning Functionality into Separate Services -- Partitioning on Iteration Speed -- Partitioning on Logical Function -- Partitioning on Read/Write Frequencies -- Partitioning on Join Frequency -- Versioning Services -- Including a Version in URIs -- Using Accept Headers for Versioning -- URIs and Interface Design -- Successful Responses -- HTTP Status Codes -- HTTP Caching -- Successful Response Bodies -- Error Responses -- HTTP Status Codes -- Error Response Bodies -- Handling Joins -- Storing References -- Joining at the Highest Level -- Beware of Call Depth -- API Complexity -- Atomic APIs -- Multi-Gets -- Multiple Models -- Conclusion -- 5 Implementing Services -- The Vote Service…”
Libro electrónico -
8906por Liberty, JesseTabla de Contenidos: “…Set Your Watch; 10.2. The Call Stack; 11. Inheritance and Polymorphism; 11.2. …”
Publicado 2003
Libro electrónico -
8907por Cunningham, MatthewTabla de Contenidos: “…Give us a creed: The ideology of the citizens' movements -- 4. A call to arms: The populist culture of mass conservative mobilisation -- 5. …”
Publicado 2022
Libro electrónico -
8908Publicado 2024Tabla de Contenidos: “…Ticketing to Concerts and Sports Events Will Never Be the Same -- A Game‐Changer for Cartoons, Film, and Television -- Culture Is Evolving with the Community -- The Phygital Boom -- Music and Art Drive Culture -- Some of Us Still Work at the Office and Your Employees Can Benefit -- Transform Communities with Decentralized Autonomous Organizations (DAOs) -- Mic Drop -- Chapter 7: The Perfect Playbook: How to Make the Right Calls -- The Old Playbook -- Rewriting the Playbook -- Making the Right Calls -- Education -- Developing a Strategic Stance -- Proper Use Cases -- Building a Thriving Community -- Understanding Web3 Communities -- Defining the Community Objectives -- Test and Iterate -- Prepare to Scale -- Conclusion -- Chapter 8: The Rise of the Machines: How AI Will Affect Us All -- The Rise of the Machines -- Transforming the Future of the Internet -- Technology Running Mates -- The Power to Transform Community -- Controlling the Rise of the Machines -- Conclusion -- Chapter 9: Liars, Cheaters, Scammers, and Cash Grabbers -- Crypto and Cartoon Elite -- New Path Forward -- Chapter 10: The Future of Work -- Part 1: The Metaverse -- What the Metaverse Is Not -- Only One Metaverse -- The Next Iteration of the Internet -- Metaverse Goals: A Strategic Stance -- Conclusion -- Part 2: The Industrial Metaverse -- The Future of Work -- Ice, Ice Baby -- Acquiring the Right Talent -- Conclusion -- Chapter 11: The Future of Community -- A New Beginning -- Giving Power Back to the People -- Driving Innovation -- Rome Wasn't Built in a Day -- Artificial Intelligence and the Evolution of Community, Brand Building, and Social Media: A Dive into the Next Wave of Human Connection -- Quantum Computing: Revolutionizing Community Building, Branding, and Social Media Interactions in the Digital Era…”
Libro electrónico -
8909Publicado 2023Tabla de Contenidos: “…Tools to Help You Track Your Progress -- Picking Up the Phone -- Crafting Call and Voicemail Scripts -- Call Blocks -- Social Selling -- A High-performing Profile -- Social Selling Actions -- Emails That Get Opened -- Video -- Chapter 8 Uncover Business Problems Worth Solving -- Timing Is Everything -- Clarifying Initiatives and Issues -- Connecting the Dots for Your Customers -- Asking Questions -- Being Curious -- Getting into Your Prospect's Head -- Making the Connection -- Begin at the End -- Chapter 9 Eliminating No-decision Opportunities and Improving Forecast Accuracy -- The Four Questions for Efficient Qualification -- Should They Buy? …”
Libro electrónico -
8910Publicado 2024Tabla de Contenidos: “…Exercise 4: Iterables and Iterators -- Chapter 3 Conclusion -- Chapter 4: Functions, Modules, and Packages -- 4.1 Function Definition and Call -- 4.1.1 Function Definition -- 4.1.2 Function Call -- 4.1.3 Function Parameters -- 4.1.4 Docstrings -- 4.1.5 Local and Global Variables -- 4.2 Scope of Variables -- 4.2.1 Global Scope -- 4.2.2 Local Scope -- 4.2.3 Nonlocal Scope -- 4.2.4 Built-In Scope -- 4.2.5 Best Practices for Variable Scope -- 4.3 Modules and Packages -- 4.3.1 Modules in Python -- 4.3.2 Packages in Python -- 4.3.3 Python's import system -- 4.4 Recursive Functions in Python…”
Libro electrónico -
8911Publicado 2023Tabla de Contenidos: “…-- Chapter 7: Modules -- Files as Modules -- Defining Modules -- Using Modules -- Opening Modules -- Destructuring a Module -- Module Examples -- Module Signatures -- Interface Files -- Defining Module Signatures -- Functors -- Defining and Using Functors -- Extending Modules -- Functors in the Standard Library -- Final Thoughts -- Chapter 8: JavaScript Interoperability -- Calling JavaScript from ReScript -- Embedding Raw JavaScript in ReScript Files -- Calling ReScript from JavaScript -- Exporting Values from ReScript -- Using ReScript Modules from JavaScript -- Shared Data Types -- Integers…”
Libro electrónico -
8912por Institute of Medicine (U.S.).Tabla de Contenidos: “…SUPPORT FOR HEALTH SCIENCES RESEARCH -- Patterns and Policies of Federal Health Sciences Support -- Research Community Perceptions -- A Brief Review of Past Policy Decisions for Resource Allocation -- The First 20 Years: Balanced Growth in Research Support -- Constrained Growth and Instability in the 1970s -- Further Constraints and Crises in the 1980s -- Peer Review Process and Allocation Policy -- Conclusions on Research Funding -- Support for Training -- Support for Equipment and Facilities -- TOWARD A POSITIVE RESEARCH ENVIRONMENT -- General Research Funding Guideline -- TALENT RENEWAL -- IMPROVING THE RESEARCH PROJECT GRANTS SYSTEM -- RESTORING THE PHYSICAL INFRASTRUCTURE -- ESTABLISHING AN ONGOING PROCESS FOR RESEARCH PROGRAM MANAGEMENT AND OVERSIGHT -- SCIENTIST RESPONSIBILITIES -- A CALL TO ACTION -- REFERENCES -- Appendix A Tables -- Appendix B Biographies of Committee Members -- Appendix C Task Forces -- TASK FORCE 1 - STRENGTHS AND WEAKNESSES OF THE CURRENT SYSTEM -- Committee Members -- Invited Guests -- TASK FORCE 2 - GOALS OF BIOMEDICAL RESEARCH -- Committee Members -- Invited Guest -- TASK FORCE 3 - OPTIMIZING THE ENVIRONMENT FOR BIOMEDICAL RESEARCH -- Committee Members -- Invited Guests -- Appendix D Respondents to Input Request -- Index…”
Publicado 1990
Libro electrónico -
8913Publicado 2018Tabla de Contenidos: “…SQL Injection -- Text-Encoding Character Replacement -- Final Words -- Chapter 10: Finding and Exploiting Security Vulnerabilities -- Fuzz Testing -- The Simplest Fuzz Test -- Mutation Fuzzer -- Generating Test Cases -- Vulnerability Triaging -- Debugging Applications -- Improving Your Chances of Finding the Root Cause of a Crash -- Exploiting Common Vulnerabilities -- Exploiting Memory Corruption Vulnerabilities -- Arbitrary Memory Write Vulnerability -- Writing Shell Code -- Getting Started -- Simple Debugging Technique -- Calling System Calls -- Executing the Other Programs -- Generating Shell Code with Metasploit -- Memory Corruption Exploit Mitigations -- Data Execution Prevention -- Return-Oriented Programming Counter-Exploit -- Address Space Layout Randomization (ASLR) -- Detecting Stack Overflows with Memory Canaries -- Final Words -- Appendix: Network Protocol Analysis Toolkit -- Passive Network Protocol Capture and Analysis Tools -- Microsoft Message Analyzer -- TCPDump and LibPCAP -- Wireshark -- Active Network Capture and Analysis -- Canape -- Canape Core -- Mallory -- Network Connectivity and Protocol Testing -- Hping -- Netcat -- Nmap -- Web Application Testing -- Burp Suite -- Zed Attack Proxy (ZAP) -- Mitmproxy -- Fuzzing, Packet Generation, and Vulnerability Exploitation Frameworks -- American Fuzzy Lop (AFL) -- Kali Linux -- Metasploit Framework -- Scapy -- Sulley -- Network Spoofing and Redirection -- DNSMasq -- Ettercap -- Executable Reverse Engineering -- Java Decompiler (JD) -- IDA Pro -- Hopper -- ILSpy -- .NET Reflector -- Index -- Footnotes -- Chapter 2: Capturing Application Traffic -- Chapter 3: Network Protocol Structures -- Chapter 6: Application Reverse Engineering…”
Libro electrónico -
8914Publicado 2017Tabla de Contenidos: “…Explicit Gamification -- 4 Application Fields of Gamification -- Chapter 5: The First Core Drive - Epic Meaning & -- Calling -- The Core Drive High Above -- The Encyclopedia that Pwned Me -- Newton's Legacy is Beyond a Fruit -- Mjolnir is Not Just a Tool -- Your Parents are Bigger Than You! …”
Libro electrónico -
8915Publicado 2023Tabla de Contenidos: “…Passing a function to a child to change the parent -- Chaining Functions -- Chapter 9 Getting Oriented with Classes -- Encapsulation -- Abstraction -- Inheritance -- Polymorphism -- Base Classes -- Recognizing that classes aren't hoisted -- Using class expressions -- Making instances of base classes -- Derived Classes -- Constructors -- Properties and Methods -- Creating methods in a class -- Overriding methods in a derived class -- Defining methods, properties, and fields -- Public members -- Private members -- Static members -- Practicing and Becoming comfortable with Classes -- Chapter 10 Making Things Happen with Events -- Understanding the JavaScript Runtime Model -- Stacking function calls -- Heaping objects -- Queuing messages -- The Event Loop -- JavaScript is single-threaded -- Messages run until they're done -- Listening for Events -- Listening with HTML event attributes -- Listening with Event handler properties -- Using addEventListener() -- Selecting your event target -- Setting addEventListener()'s parameters -- The Event object -- Listening on multiple targets -- Dispatching events programmatically -- Triggering built-in events -- Creating and triggering custom events -- Removing event listeners -- Preventing default actions -- Chapter 11 Writing Asynchronous JavaScript -- Understanding Asynchronous JavaScript -- Reading synchronous code -- Events to the rescue -- Calling you back -- Making Promises -- Writing promises -- Introducing async functions -- Converting nested callbacks to async functions -- Converting promise chains to async functions -- Handling errors with async/await -- Using AJAX -- Getting data with the Fetch API -- Getting a response with fetch() -- Parsing the Response -- Calling other Response methods -- Response.blob() -- Response.text() -- Handling fetch() errors -- The fetch init object -- Introducing HTTP…”
Libro electrónico -
8916Publicado 2015Tabla de Contenidos: “…-- Self-Contained Classes -- Chapter 22: Structured Play: Making Classes Do Things -- Activating Our Objects -- Creating a Member Function -- Defining a member function -- Naming class members -- Calling a member function -- Accessing other members from within a member function -- Keeping a Member Function after Class -- Overloading Member Functions -- Chapter 23: Pointers to Objects -- Pointers to Objects -- Arrow syntax -- Calling all member functions -- Passing Objects to Functions -- Calling a function with an object value -- Calling a function with an object pointer -- Looking at an example -- Allocating Objects off the Heap -- Chapter 24: Do Not Disturb: Protected Members -- Protecting Members -- Why you need protected members -- Making members protected -- So what? …”
Libro electrónico -
8917por Hébert, Fred, 1988-Tabla de Contenidos: “…*pumps shotgun* -- Generic Event Handlers -- The init and terminate Functions -- The handle_event Function -- The handle_call Function -- The handle_info Function -- The code_change Function -- It's Curling Time! …”
Publicado 2013
Libro electrónico -
8918Publicado 2018Tabla de Contenidos:Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
8919por Casanova Roman, GerardoTabla de Contenidos: “…24 Infecciones de transmisión sexual en la paciente pediátrica25 Infecciones de transmisión sexual en las niñas en situación de calle; 26 Infecciones de transmisión sexual y adolescencia; 27 Infecciones de transmisión sexual en la frontera norte de México; 28 Epidemiología de las infecciones de transmisión sexual en trabajadoras (...); 29 Vulvovaginitis alérgica; 30 Repercusión perinatal de las infecciones de transmisión sexual; 31 Infecciones de transmisión sexual e infertilidad; 32 Guía para el tratamiento de las infecciones de transmisión sexual…”
Publicado 2004
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8920por Choklat, AkiTabla de Contenidos: “…EL DISEÑO DE CALZADO: PASADO Y PRESENTE 8; MODA Y FAMOSOS: LOS SIGLOS XVII Y XVIII; LOS CICLOS DE LA ALTA COSTURA Y DE LA MODA ESTACIONAL: EL SIGLO XIX; INNOVACIÓN Y MODA DE CALLE: EL SIGLO XX; EL FUTURO DEL DISEÑO DE CALZADO: EL SIGLO XXI; LA INDUSTRIA DEL CALZADO; ESTUDIO DE CASO: LIZA SNOOK; ESTUDIO DE CASO: CATHERINE WILLEMS; CAPÍTULO 2. …”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico