Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 673
- Social aspects 461
- Development 428
- Historia 380
- Management 334
- Application software 306
- Education 267
- RELIGION 258
- Social conditions 226
- Engineering & Applied Sciences 193
- Research 188
- Politics and government 176
- Web site development 160
- Computer networks 151
- Design 151
- Community development 148
- Computer programs 144
- Python (Computer program language) 144
- Study and teaching 140
- Computer software 137
- Innovaciones tecnológicas 137
- Leadership 135
- Social Sciences 135
- Economic aspects 129
- Technological innovations 127
- Information technology 126
- Web sites 126
- Security measures 125
- Investigación científica 124
- Open source software 124
-
15581
-
15582
-
15583
-
15584
-
15585
-
15586
-
15587
-
15588Publicado 2024Tabla de Contenidos: “…Windows -- Android -- iOS and macOS -- Building and testing the iOS target -- Building and testing the macOS target -- Migrating from Xamarin -- Migrating and reusing the Shell template from Xamarin.Forms -- Visual Studio project template -- Summary -- Chapter 3: User Interface Design with XAML -- Technical requirements -- Creating a XAML page -- XAML syntax -- XML declaration -- Element -- Attribute -- XML and XAML namespaces -- Creating a new page using XAML -- Creating the same new page using C# -- XAML markup extensions -- Building a user interface -- Layouts -- StackLayout -- Grid -- FlexLayout -- AbsoluteLayout -- Views -- Label -- Image -- Editor -- Entry -- ListView -- Master-detail UI design -- Side-by-side -- Stacked -- Navigation in the master-detail UI design -- ItemDetailPage -- ItemsPage -- Supporting multiple languages - localization -- Creating a .resx file -- Localizing text -- Summary -- Further reading -- Chapter 4: Exploring MVVM and Data Binding -- Technical requirements -- Understanding MVVM and MVC -- MVVM in PassXYZ.Vault -- Data binding -- Binding object -- Binding target -- Binding source -- Properties of a Binding object -- Source -- Binding mode -- Changing notifications in ViewModels -- .NET Community Toolkit -- How to use the MVVM Toolkit -- Improving the data model and service -- KPCLib -- Abstraction of PwGroup and PwEntry -- PassXYZLib -- Updating the model -- Updating the service -- Binding to collections -- Using custom views -- Summary -- Further reading -- Chapter 5: Navigation Using .NET MAUI Shell and NavigationPage -- Technical requirements -- Implementing navigation -- INavigation interface and NavigationPage -- Using the navigation stack -- Manipulating the navigation stack -- Inserting a page -- Removing a page -- Using Shell -- Flyout -- Flyout items -- Menu items -- Tabs -- Shell navigation…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
15589Cryptocurrency All-in-One For DummiesCryptocurrency All–in–One For DummiesPublicado 2022Tabla de Contenidos: “…-- Beginning with the Basics of Cryptocurrencies -- The definition of money -- Some cryptocurrency history -- Key crypto benefits -- Common crypto and blockchain myths -- Risks -- Gearing Up to Make Transactions -- Wallets -- Exchanges -- Communities -- Making a Plan Before You Jump In -- Chapter 2 How Cryptocurrencies Work -- Explaining Basic Terms in the Cryptocurrency Process -- Cryptography -- Nodes -- Mining -- Proof of work -- Proof of stake -- Proof of importance -- Transactions: Putting it all together -- Cruising through Other Important Crypto Concepts -- Adaptive scaling -- Decentralization -- Harvesting -- Open source -- Public ledger -- Smart contracts -- Stick a Fork in It: Digging into Cryptocurrency Forks -- What is a fork, and why do forks happen? …”
Libro electrónico -
15590Publicado 2021Tabla de Contenidos: “…-- Tactics -- Techniques -- Threat Hunting Using Five Common Tactics -- Privilege Escalation -- Case Study -- Credential Access -- Case Study -- Lateral Movement -- Case Study -- Command and Control -- Case Study -- Exfiltration -- Case Study -- Other Methodologies and Key Threat-Hunting Tools to Combat Attack Vectors -- Zero Trust -- Threat Intelligence and Zero Trust -- Build Cloud-Based Defense-in-Depth -- Analysis Tools -- Microsoft Tools -- Connect To All Your Data -- Workbooks -- Analytics -- Security Automation and Orchestration -- Investigation -- Hunting -- Community -- AWS Tools -- Analyzing Logs Directly -- SIEMs in the Cloud -- Summary -- Resources -- Part II Hunting in Microsoft Azure -- Chapter 4 Microsoft Azure Cloud Threat Prevention Framework -- Introduction to Microsoft Security -- Understanding the Shared Responsibility Model -- Microsoft Services for Cloud Security Posture Management and Logging/Monitoring -- Overview of Azure Security Center and Azure Defender -- Overview of Microsoft Azure Sentinel -- Using Microsoft Secure and Protect Features -- Identity & -- Access Management -- Infrastructure & -- Network -- Data & -- Application -- Customer Access…”
Libro electrónico -
15591Publicado 2017Tabla de Contenidos: “…-- Conventions are good -- Test frameworks and commercial choices are increasing -- Offsetting work to Jenkins nodes -- Starving QA/integration servers -- Reading the change log of Jenkins -- Avoiding human bottlenecks -- Avoiding groupthink -- Training and community -- Visibly rewarding successful developers -- Stability and code maintenance -- Resources on quality assurance -- And there's always more -- Final comments -- Index…”
Libro electrónico -
15592por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…DAC members' bilateral development finance institutions -- Notes -- 9 In my view: Reinventing official development assistance: From an Arlequin tapestry to a more inspiring Kandinsky-Kasse moment -- References -- Notes -- 10 In focus: Aid effectiveness in Afghanistan, Mali and South Sudan -- Key messages -- Aid did not make extremely fragile contexts more stable, capable or better governed -- Donors overestimate capacity and underestimate resistance by entrenched elites -- Development co-operation providers must mind the opportunity costs -- Rethink, reset and be realistic about what aid can truly achieve in fragile settings -- Note -- 11 In my view: Funding more proximately is not risky but not doing so is -- In ignoring local resources, the aid system disempowers the very communities it targets -- References -- Notes -- 12 In focus: Enablers of locally led development -- Key messages -- Stronger evidence on the benefits and challenges of locally led development is needed -- Long-term core funding is more likely to foster sustainable outcomes and local ownership -- Localisation also calls for support for diverse partnerships tailored to local conditions -- Providers need to reframe risks, shift institutional culture and build internal capacities -- Some providers are starting to progressively redress power imbalances -- Anticipating how localisation may shift local political and economic dynamics can help avoid common pitfalls…”
Publicado 2023
Libro electrónico -
15593Publicado 2023Tabla de Contenidos: “…-- You're overconfident (jumbo ego) -- Clearing Away the Obstacles -- Going back to familiar territory -- Tapping your personal network -- Designing an Environment that Inspires Creativity and Innovation -- Making time to be creative -- Find a favorite thinking space -- Play with toys, games, and kids -- Finding the right place for innovation -- Making your work environment friendly -- Growing Ideas with Outside Help: Incubators and Accelerators -- Spotting the Best Opportunities -- Finding opportunity in failure (yours and others) -- Finding opportunity for underrepresented communities -- Finding opportunity in things that don't go together -- Chapter 4 Testing an Opportunity Before You Leap -- Starting with Your First Risk: You! …”
Libro electrónico -
15594Publicado 2023Tabla de Contenidos: “…-- Change the Targeting/Messaging Strategy -- Change the Distribution Strategy -- Content Marketing Channel Management and Promotion -- Adjust the Editorial Calendar -- Put More Resources Toward Social Media/Online Communities -- Change the Website -- Change the Products/Services -- Content Marketing Measurement and Control -- Adjust the KPIs -- Change the Content Marketing Metrics -- Chapter 6 Social Media Marketing -- Welcome to the Endless Coffee Cup Podcast -- Social Media Context -- Term "Social Media" Coined in 2004 -- Key Definitions and Framework -- Social Media Marketing Today -- Areas Associated with Social Media Marketing Today -- Content Marketing -- Reputation Management -- Disinformation -- Monitoring/Participating in Conversations -- Influencer Marketing -- Digital Advertising -- Social Media Marketing and Organizational Structure -- Social Media Marketing Strategy and Planning -- How Social Media Impacts Business Goals -- Value of Influencers -- Social Media Channel Management -- Early Social Media Channels -- Social Networks -- Video Sharing -- Microblogging -- Photo Sharing -- Blogs…”
Libro electrónico -
15595Publicado 2023Tabla de Contenidos: “…Setting up the software and connecting -- Troubleshooting -- Calibrating and getting readings -- Calibration code -- The calibration process -- Always face North behavior -- CircuitPython code for the face North behavior -- Troubleshooting -- Making a known turn behavior -- Summary -- Exercises -- Further reading -- Chapter 13: Determining Position Using Monte Carlo Localization -- Technical requirements -- Creating a training area for our robot -- What we will make -- How we will make the arena -- Tips for cutting -- Modeling the space -- Representing the arena and robot position as numbers -- Serving the arena from the robot -- The Bleak library -- Creating a Bluetooth LE wrapper library -- Showing the robot's data on the computer screen -- Using sensors to track relative pose -- Setting up poses -- Displaying poses -- Moving with collision avoidance -- Moving poses with the encoders -- Pose movement probabilities -- Monte Carlo localization -- Generating pose weights from a position -- Resampling the poses -- Incorporating distance sensors -- Tuning and improving the Monte Carlo model -- Summary -- Exercises -- Further reading -- Chapter 14: Continuing Your Journey - Your Next Robot -- Technical requirements -- A summary of what you have learned in this book -- Basic robotics with Raspberry Pi Pico -- Extending a Raspberry Pi Pico robot with sensors -- Writing CircuitPython behavior code for Raspberry Pi Pico -- Planning to extend this robot -- Sensors you could add -- Interacting with the robot -- Chassis and form enhancements -- Electronics enhancements -- Outputs you could add -- Extending the code and behaviors -- Planning your next robot -- Form, shape, and chassis -- Electronics and sensors -- Code and behavior -- Further suggested areas to learn about -- Electronics -- Design and manufacturing -- Robotic competitions and communities…”
Libro electrónico -
15596Publicado 2022Tabla de Contenidos: “…The industry's platforms versus direct cloud native dilemma -- How communities of practice strengthen DevOps platforms -- The main five strategic platforms incumbents focus on -- The ITSM platform -- The CI/CD pipeline platform -- The testing services platform -- The observability platform - telemetry -- Private cloud platforms -- Public cloud platforms -- Summary -- Chapter 8: 360° Regulatory Compliance as Code -- Setting the regulatory compliance scene in the FSI -- What are the regulatory compliance categories? …”
Libro electrónico -
15597Publicado 2023Tabla de Contenidos: “…Contrived complexity -- Dead code -- Excessive data return -- Feature envy -- Identifier size -- Inappropriate intimacy -- Long lines (God lines) -- Lazy methods -- Long methods (God methods) -- Long parameter lists (too many parameters) -- Message chains -- The middleman method -- Oddball solutions -- Speculative generality -- Summary -- Questions -- Further reading -- Chapter 12: Functional Programming -- Technical requirements -- Imperative versus functional programming -- Imperative programming -- Key differences -- Overview of functional programming in C# -- First-class functions and Lambda expressions -- Lambda expressions in C# -- Higher-order functions -- Immutability and pure functions -- Functional composition -- Using Lambda expressions -- Using LINQ and extension methods -- Using higher-order functions -- Option types and the Maybe monad -- Usage of option types in C# -- The Maybe monad in C# -- Functional error handling -- Option types -- The Maybe monad -- The Either monad -- Result objects -- Functional data transformation and pipelines -- Lazy evaluation -- Pattern matching -- Currying and partial application -- Currying -- Partial application -- Key differences -- Concurrency with functional programming -- Recursion -- Summary -- Questions -- Further reading -- Chapter 13: Cross-Platform Application Development with MAUI -- Technical requirements -- Project overview -- Windows version -- Android version -- Creating the project -- Understanding XAML structure -- The MVVM pattern -- Adding CommunityToolkit.Mvvm -- The models -- The ViewModels -- The views -- Configuring our to-do application -- Summary -- Questions -- Further reading -- Chapter 14: Microservices -- What are microservices? …”
Libro electrónico -
15598Publicado 2023Tabla de Contenidos: “…-- Advantages and limitations of DAST -- The DAST process -- DAST usage for developers -- DAST usage for security testers -- The importance of DAST in secure development environments -- Incorporating DAST into the application development life cycle -- Advanced DAST techniques -- Choosing the right DAST tool -- How to perform a DAST scan in an organization -- Integrating DAST with other security tools -- Incorporating DAST into DevOps processes -- Prioritizing and remediating vulnerabilities -- Comparing DAST with other security testing approaches -- SAST -- IAST -- RASP -- The future of DAST -- Summary -- Part 4: Tools -- Chapter 12: Setting Up a DevSecOps Program with Open Source Tools -- Techniques used in setting up the program -- Understanding DevSecOps -- Setting up the CI/CD pipeline -- The technicalities of setting up a CI/CD pipeline -- Implementing security controls -- Identifying open source security tools -- Implementing security policies and procedures -- Managing DevSecOps in production -- Monitoring and managing the DevSecOps pipeline in production -- Using open source tools for monitoring, logging, and alerting -- Incorporating continuous compliance and auditing into the pipeline -- Managing incidents and responding to security breaches -- The benefits of the program -- Summary -- Part 5: Governance and an Effective Security Champions Program -- Chapter 13: License Compliance, Code Coverage, and Baseline Policies -- DevSecOps and its relevance to license compliance -- The distinction between traditional licenses and security implications -- Source code access -- Modification and redistribution -- Community oversight -- Vendor dependency -- Cost and resource allocation -- Different types of software licenses -- Permissive licenses (MIT, Apache)…”
Libro electrónico -
15599por Orzach, YoramTabla de Contenidos: “…Layer 5-based vulnerabilities -- Layer 6-based vulnerabilities -- Layer 7-based vulnerabilities -- Fuzzing tools -- Basic fuzzing -- Breaking usernames and passwords (brute-force attacks) -- Fuzzing network protocols -- Crash analysis - what to do when we find a bug -- Summary -- Questions -- Part 2: Network, Network Devices, and Traffic Analysis-Based Attacks -- Chapter 6: Finding Network-Based Attacks -- Planning a network-based attack -- Gathering information from the network -- Stealing information from the network -- Preventing users from using IT resources -- Active and passive attacks -- Active attacks -- Passive attacks -- Reconnaissance and information gathering -- Listening to network broadcasts -- Listening on a single device/port-mirror -- Network-based DoS/DDoS attacks and flooding -- Flooding through scanning attacks -- Random traffic generation flooding -- Generating and defending against flooding and DoS/DDoS attacks -- L2-based attacks -- MAC flooding -- STP, RSTP, and MST attacks -- L3- and ARP-based attacks -- ARP poisoning -- DHCP starvation -- Summary -- Questions -- Chapter 7: Detecting Device-Based Attacks -- Network devices' structure and components -- The functional structure of communications devices -- The physical structure of communications devices -- Attacks on the management plane and how to defend against them -- Brute-force attacks on console, Telnet, and SSH passwords -- Brute-force attacks against SNMP passwords (community strings) -- Brute-force attacks against HTTP/HTTPS passwords -- Attacks on other ports and services -- SYN-scan and attacks targeting the management plane processes' availability -- Attacks on the control plane and how to defend against them -- Control plane-related actions that influence device resources -- Attacks on the data plane and how to defend against them…”
Publicado 2022
Libro electrónico -
15600Publicado 2017Tabla de Contenidos: “…Bucketing on geo-spatial data -- Geo distance aggregation -- GeoHash grid aggregation -- Pipeline aggregations -- Calculating the cumulative sum of usage over time -- Summary -- Chapter 5: Analyzing Log Data -- Log analysis challenges -- Logstash -- Installation and configuration -- Prerequisites -- Downloading and installing Logstash -- Installing on Windows -- Installing on Linux -- Running Logstash -- Logstash architecture -- Overview of Logstash plugins -- Installing or updating plugins -- Input plugins -- Output plugins -- Filter plugins -- Codec plugins -- Exploring plugins -- Exploring Input plugins -- File -- Beats -- JDBC -- IMAP -- Output plugins -- Elasticsearch -- CSV -- Kafka -- PagerDuty -- Codec plugins -- JSON -- Rubydebug -- Multiline -- Filter plugins -- Ingest node -- Defining a pipeline -- Ingest APIs -- Put pipeline API -- Get Pipeline API -- Delete pipeline API -- Simulate pipeline API -- Summary -- Chapter 6: Building Data Pipelines with Logstash -- Parsing and enriching logs using Logstash -- Filter plugins -- CSV filter -- Mutate filter -- Grok filter -- Date filter -- Geoip filter -- Useragent filter -- Introducing Beats -- Beats by Elastic.co -- Filebeat -- Metricbeat -- Packetbeat -- Heartbeat -- Winlogbeat -- Auditbeat -- Community Beats -- Logstash versus Beats -- Filebeat -- Downloading and installing Filebeat -- Installing on Windows -- Installing on Linux -- Architecture -- Configuring Filebeat -- Filebeat prospectors -- Filebeat global options -- Filebeat general options -- Output configuration -- Filebeat modules -- Summary -- Chapter 7: Visualizing data with Kibana -- Downloading and installing Kibana -- Installing on Windows -- Installing on Linux -- Configuring Kibana -- Data preparation -- Kibana UI -- User interaction -- Configuring the index pattern -- Discover -- Elasticsearch query string…”
Libro electrónico