Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 350
- Application software 286
- History 232
- Management 198
- Engineering & Applied Sciences 180
- Economics 167
- Historia 159
- Social aspects 145
- Education 137
- Data processing 119
- Computer Science 117
- Microsoft .NET Framework 110
- Computer networks 109
- Security measures 102
- Computer security 97
- Design 96
- RELIGION 95
- Python (Computer program language) 93
- Programming 92
- Web sites 92
- Cross-cultural studies 89
- Web site development 83
- Cloud computing 78
- Computer programs 78
- Machine learning 78
- Computer programming 74
- JavaScript (Computer program language) 71
- History and criticism 66
- Research 65
- Computer software 64
-
6421Publicado 2022Tabla de Contenidos: “…Rearranging document sections in Outline view -- Collapsing and Expanding Parts of a Document -- Generating a Table of Contents -- Creating a TOC -- Updating and removing a TOC -- Customizing a TOC -- Changing the structure of a TOC -- Indexing a Document -- Marking index items in the document -- Generating the index -- Editing an index -- Putting Cross-References in a Document -- Putting Footnotes and Endnotes in Documents -- Entering a footnote or endnote -- Choosing the numbering scheme and position of notes -- Deleting, moving, and editing notes -- Compiling a Bibliography -- Inserting a citation for your bibliography -- Editing a citation -- Changing how citations appear in text -- Generating the bibliography -- Book 3 Excel 365 -- Chapter 1 Up and Running with Excel -- Creating a New Excel Workbook -- Getting Acquainted with Excel -- Rows, columns, and cell addresses -- Workbooks and worksheets -- Entering Data in a Worksheet -- The basics of entering data -- Entering text labels -- Entering numeric values -- Entering date and time values -- Quickly Entering Lists and Serial Data with the AutoFill Command -- Formatting Numbers, Dates, and Time Values -- Establishing Data-Validation Rules -- Chapter 2 Refining Your Worksheet -- Editing Worksheet Data -- Moving Around in a Worksheet -- Getting a Better Look at the Worksheet -- Freezing and splitting columns and rows -- Hiding columns and rows -- Notes for Documenting Your Worksheet -- Comments for Collaborating with Others on a Workbooks -- Selecting Cells in a Worksheet -- Deleting, Copying, and Moving Data -- Handling the Worksheets in a Workbook -- Keeping Others from Tampering with Worksheets -- Hiding a worksheet -- Protecting a worksheet -- Chapter 3 Formulas and Functions for Crunching Numbers -- How Formulas Work -- Referring to cells in formulas -- Referring to formula results in formulas…”
Libro electrónico -
6422por Du, XiangyunTabla de Contenidos: “…Front Cover -- Half Title Pages -- RIVER PUBLISHERS SERIES IN INNOVATION AND CHANGEIN EDUCATION - CROSS-CULTURAL PERSPECTIVE -- Title Page - Arts-Based Methods in Education Around the World -- Copyright Pages -- Contents -- List of Contributors -- List of Figures -- List of Tables -- List of Abbreviations -- Chapter 1 - Arts-Based Methods in Education -A Global Perspective -- 1.1 Learning and the Arts: A Long Journey -- 1.1.1 The Arts Are Good for Learning -- 1.1.2 The Arts in Society -- 1.1.3 Our Contribution -- References -- Chapter 2 - Artistry in Teaching: A Choreographic Approach to Studying the Performative Dimensions of Teaching -- 2.1 Introduction -- 2.2 Artistry in Teaching -- 2.3 Choreography as a Framework for Exploring Teaching -- 2.3.1 Data Collection -- 2.3.2 Embodied Method -- 2.4 A Day in the Life of the Classroom -- 2.4.1 Before the Class Begins -- 2.4.2 During the Class -- 2.4.3 Summary -- 2.5 The Choreography and the Dance: Curriculum Embodied -- 2.5.1 Scripting an Experience -- 2.5.2 Creating Experiences on the Fly -- 2.5.3 Structure Embodied -- 2.6 Conclusion -- References -- Chapter 3 - New and Different: Student Participation in Artist-School Partnerships1 -- 3.1 Something New in the State of Denmark -- 3.2 A Laboratory for the Arts and Culture -- 3.3 Partnership: What's in a Name? …”
Publicado 2022
Libro electrónico -
6423Publicado 2017Tabla de Contenidos: “…. -- Executing commands remotely -- Spidering web servers to find vulnerable applications -- Detecting insecure cross-domain policies -- How to do it... -- How it works... -- There's more... -- Finding attacking domains available for purchase -- Detecting exposed source code control systems -- How to do it... -- How it works... -- There's more... -- Obtaining information from subversion source code control systems -- Auditing the strength of cipher suites in SSL servers -- How to do it... -- How it works... -- There's more... -- Scrapping e-mail accounts from web servers -- How to do it... -- How it works... -- There's more... -- Chapter 5: Scanning Databases -- Introduction -- Listing MySQL databases -- How to do it... -- How it works... -- There's more... -- Listing MySQL users -- How to do it... -- How it works... -- There's more... -- Listing MySQL variables -- How to do it... -- How it works... -- There's more... -- Brute forcing MySQL passwords -- How to do it... -- How it works... -- There's more... -- Finding root accounts with an empty password in MySQL servers -- How to do it... -- How it works... -- There's more... -- Detecting insecure configurations in MySQL servers -- How to do it... -- How it works... -- There's more... -- Brute forcing Oracle passwords -- How to do it... -- How it works…”
Libro electrónico -
6424
-
6425Publicado 2018Tabla de Contenidos: “…IAM roles -- The structure of IAM policies -- Organization-level policies -- Project-level policies -- Resource-level policies -- Cross-project access -- Managing IAM -- Service accounts -- Billing on Google Cloud -- Billing accounts -- Billing accounts and IAM -- Budgets and billing alerts -- Google Cloud Platform Pricing Calculator -- Creating an estimate -- Summary -- Chapter 4: Google App Engine -- Compute services on the GCP -- Google Compute Engine -- Google Kubernetes Engine (GKE) -- Google App Engine -- Google Cloud Functions -- General considerations -- Google App Engine -- Features and benefits -- Developer velocity -- Visibility -- Scalability -- Simple integrations -- Structure of a Google App Engine application -- Architecture of an App Engine solution -- Microservices -- Batch work and task queues -- App Engine locations -- IAM on the Google App Engine -- App Engine service accounts -- The standard and flexible environments -- Standard environment -- Flexible environment -- Setting up the App Engine -- The App Engine standard environment -- Language support -- Developing for the App Engine standard environment -- The Python runtime -- WSGI and CGI -- Getting started -- The App Engine development server -- The Go runtime -- Running multiple services locally -- The Java 8 runtime -- Deploying App Engine standard services -- Deployment behavior -- Splitting network traffic -- Instance classes -- Pricing in the standard environment -- Spending limits -- The App Engine flexible environment -- Benefits of the flexible environment -- More control over the infrastructure -- Application portability -- Language support -- Developing for the flexible environment -- Deploying App Engine flexible apps -- Container technologies -- Google Container Builder -- Google Container Registry -- Custom runtimes -- Building custom runtime services…”
Libro electrónico -
6426Publicado 2018Tabla de Contenidos: “…-- Ethereum -- Hyperledger Fabric -- Summary -- Chapter 9: Building a Next-Generation Oracle B2B Platform -- Introducing the business case -- Traditional cross-organizational applications -- Introducing Oracle B2B -- Introducing Oracle SOA Suite -- Implementing the business case on a B2B network -- What is the common application architecture? …”
Libro electrónico -
6427por Mueller, John PaulTabla de Contenidos: “…Considering the Off-the-Shelf Cross- Platform Scientific Distributions -- Getting Continuum Analytics Anaconda -- Getting Enthought Canopy Express -- Getting WinPython -- Installing Anaconda on Windows -- Installing Anaconda on Linux -- Installing Anaconda on Mac OS X -- Downloading the Datasets and Example Code -- Using Jupyter Notebook -- Defining the code repository -- Understanding the datasets used in this book -- Chapter 4 Working with Google Colab -- Defining Google Colab -- Understanding what Google Colab does -- Considering the online coding difference -- Using local runtime support -- Getting a Google Account -- Creating the account -- Signing in -- Working with Notebooks -- Creating a new notebook -- Opening existing notebooks -- Saving notebooks -- Downloading notebooks -- Performing Common Tasks -- Creating code cells -- Creating text cells -- Creating special cells -- Editing cells -- Moving cells -- Using Hardware Acceleration -- Executing the Code -- Viewing Your Notebook -- Displaying the table of contents -- Getting notebook information -- Checking code execution -- Sharing Your Notebook -- Getting Help -- Part 2 Getting Your Hands Dirty with Data -- Chapter 5 Understanding the Tools -- Using the Jupyter Console -- Interacting with screen text -- Changing the window appearance -- Getting Python help -- Getting IPython help -- Using magic functions -- Discovering objects -- Using Jupyter Notebook -- Working with styles -- Restarting the kernel -- Restoring a checkpoint -- Performing Multimedia and Graphic Integration -- Embedding plots and other images -- Loading examples from online sites -- Obtaining online graphics and multimedia -- Chapter 6 Working with Real Data -- Uploading, Streaming, and Sampling Data -- Uploading small amounts of data into memory -- Streaming large amounts of data into memory…”
Publicado 2019
Libro electrónico -
6428por Blewett, Richard. author, Clymer, Andrew. author, Ltd, Rock Solid Knowledge. authorTabla de Contenidos: “…-- Conclusion -- Chapter 4: Basic Thread Safety -- Asynchrony and Data -- It's Not Always Good to Share -- Immutable State -- Atomic State Transition -- Nonatomic State Transition -- Correctness Is Not the Only Problem -- Thread Safety -- The Interlocked Class -- Basic Operations -- Richer Functions -- Interlocked.Exchange -- Interlocked.CompareExchange -- Monitor: The Workhorse of .NET Synchronization -- The lock Keyword -- Timing Out of Monitor Acquisition -- Signaling with Monitors -- Signaling As a Building Block -- Optimizing for Read -- ReaderWriterLock -- Problems with ReaderWriterLock -- ReaderWriterLockSlim -- A Semaphore Out of the Box -- Raising the Starting Gate: ManualResetEventSlim -- CountdownEvent: Simplifying Fork and Join -- Barrier: Rendezvous-Based Synchronization -- Crossing the AppDomain Boundary with WaitHandle -- Mutex -- Semaphore -- Events -- WaitHandle-The Kernel Synchronization Abstraction -- Working with Multiple WaitHandles -- WaitHandle.WaitAll -- WaitHandle.WaitAny -- WaitHandle.SignalAndWait -- Integrating Standard Primitives and Kernel Objects -- Synchronization Is Not the Only Answer -- Conclusion -- Chapter 5: Concurrent Data Structures -- Simplifying Thread Safety -- Lazy -- Concurrent Collections -- ConcurrentDictionary -- Locking Mechanics -- ConcurrentQueue and ConcurrentStack -- ConcurrentBag -- Blocking Collections -- Graceful Shutdown -- Consuming Enumerable -- BlockingCollection of X -- Summary -- Chapter 6: Asynchronous UI -- UI Mechanics -- UI Threading Model -- Synchronization Context -- Send and Post…”
Publicado 2013
Libro electrónico -
6429Publicado 2023Tabla de Contenidos: “…-- Communication of Important Announcements or Visitor -- Questions from the Team-Level Huddles -- Learning Minute -- Team-Level Huddles -- Introduction to +QDIP -- +QDIP Evolution and Journey at Company X -- First Evolution -- Second Evolution -- Plus (+) = Safety/5S -- Q = Quality -- D = Delivery -- I = Inventory -- P = Productivity -- Daily Management +QDIP Boards versus Huddle Boards -- Results Focused on the Factory Floor as the Customer -- Maintenance -- Third Step in the Evolution: Open-Book Management -- Huddles and the +QDIP/Gemba Walk -- KPI Board -- Cross-Functional Representation Is Important -- Metric Boards and Huddles -- Gemba Walks/Watches -- Daily Management-QDIP Linkage -- Chapter Questions -- Notes -- Additional Readings -- 5. …”
Libro electrónico -
6430Publicado 2023Tabla de Contenidos: “…Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Environmental problems caused by humans -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- 2 Personal Cybersecurity -- Chapter 1 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment -- Your work environment…”
Libro electrónico -
6431Publicado 2023Tabla de Contenidos: “…Platform Convergence -- Top Social Media Channels Today -- YouTube -- Facebook -- Instagram -- Twitter -- TikTok -- Pinterest -- LinkedIn -- Cross-Platform Content Strategies -- Launching a New Product Across Multiple Platforms -- Engaging a Target Audience Across Multiple Platforms -- Using Social Commerce to Sell Products Across Multiple Platforms -- Reputation Management Practices -- Social Media Advertising -- Decline of Organic Reach -- Creating and Targeting Social Media Ads -- Targeting by Intent, not Demographics -- Social Media Measurement and Control -- Avoiding Vanity Metrics -- Measuring Brand Lift and Engaged-View Conversions -- Measuring Conversation, Amplification, and Applause Rates -- Comparing the Economic Value of All Your Social Media Accounts -- Social Media Reporting -- Selecting KPIs Tied to Your Business Objectives -- Using "Action Dashboard" Versus "Crappy Dashboard" -- Reporting -- Chapter 7 Conversion Optimization -- Build It and They Will Come -- Easy Conversion Guidelines -- Don't Design for Yourself -- Study User Behavior -- Determine Who Performs Conversion Optimization -- Persuasive Design for Conversion -- Instant Feedback -- Being Responsive Is About Meeting Expectations -- Desirability, Momentum, and Conversions -- Avoid High Bounce Rates -- Conversion Optimization Strategy and Planning -- Awareness, Interest, Desire, Action -- Advocating for Your Website Visitors -- Understanding Customer Intent -- Creating User Personas -- Designing the Landing Page -- What Makes a Great Landing Page? …”
Libro electrónico -
6432Publicado 2024Tabla de Contenidos: “…Real-life applications for labeling audio data -- Audio data fundamentals -- Hands-on with analyzing audio data -- Example code for loading and analyzing sample audio file -- Best practices for audio format conversion -- Example code for audio data cleaning -- Extracting properties from audio data -- Tempo -- Chroma features -- Mel-frequency cepstral coefficients (MFCCs) -- Zero-crossing rate -- Spectral contrast -- Considerations for extracting properties -- Visualizing audio data with matplotlib and Librosa -- Waveform visualization -- Loudness visualization -- Spectrogram visualization -- Mel spectrogram visualization -- Considerations for visualizations -- Ethical implications of audio data -- Recent advances in audio data analysis -- Troubleshooting common issues during data analysis -- Troubleshooting common installation issues for audio libraries -- Summary -- Chapter 11: Labeling Audio Data -- Technical requirements -- Downloading FFmpeg -- Azure Machine Learning -- Real-time voice classification with Random Forest -- Transcribing audio using the OpenAI Whisper model -- Step 1 - importing the Whisper model -- Step 2 - loading the base Whisper model -- Step 3 - setting up FFmpeg -- Step 4 - transcribing the YouTube audio using the Whisper model -- Classifying a transcription using Hugging Face transformers -- Hands-on - labeling audio data using a CNN -- Exploring audio data augmentation -- Introducing Azure Cognitive Services - the speech service -- Creating an Azure Speech service -- Speech to text -- Speech translation -- Summary -- Chapter 12: Hands-On Exploring Data Labeling Tools -- Technical requirements -- Azure Machine Learning data labeling -- Label Studio -- pyOpenAnnotate -- Data labeling using Azure Machine Learning -- Benefits of data labeling with Azure Machine Learning -- Data labeling steps using Azure Machine Learning…”
Libro electrónico -
6433Publicado 2016Tabla de Contenidos: “…On the value of the analysis -- On the process of emergence of design process (or embodying resulting concepts) -- Assessing designs and field explorations (or assessment criteria) -- Unceasingly mapping cross disciplinary (or ever in search for conjunctions) -- Comparisons of forms/patterns -- Interconnecting K domains -- Counter analogies -- Metaphors -- A3.5. …”
Libro electrónico -
6434Publicado 2023Tabla de Contenidos: “…-- Chapter 1: Introducing DevSecOps -- Product development processes -- The Waterfall model -- The Agile methodology -- Understanding the shift from DevOps to DevSecOps -- The new processes within DevSecOps -- DevSecOps maturity levels -- Maturity level 1 -- Maturity level 2 -- Maturity level 3 -- Maturity level 4 -- KPIs -- DevSecOps - the people aspect -- Summary -- Think and act -- Part 2: DevSecOps Principles and Processes -- Chapter 2: DevSecOps Principles -- DevSecOps principles -- Unifying the CI/CD pipeline -- Fail fast -- Automation and innovation in DevSecOps -- Introducing compliance checks -- Empowering teams to make decisions -- Cross-skilling and educating teams and the cultural aspect approach -- Proper documentation -- Relevant checkpoints -- Building and managing secure Dev environments and toolchains -- Challenges within the DevSecOps pipeline that principles can resolve -- Continuous application changes -- The developer knowledge gap -- Lack of AppSec tool integration -- Summary -- Chapter 3: Understanding the Security Posture -- Understanding your security posture -- Regular meetings -- Managing pipelines -- Testing pipelines -- Tools involved in pipelines -- Why and what measures we take to secure the environment -- Building the vulnerabilities inventory -- Addressing vulnerabilities -- Parameters to define the security posture -- Discovering the third-party component -- Measuring the effectiveness of the technologies used -- Managing workflows -- What measures can we take to monitor an environment? …”
Libro electrónico -
6435Publicado 2010Tabla de Contenidos: “…Changing the Default Document -- Editing Content in the Browser -- Summary -- Chapter 29: Using Library Items and Server-side Includes -- Dreamweaver Library Items -- Using the Library Assets Panel -- Editing a Library Item -- Updating Your Web Sites with Libraries -- Applying Server-Side Includes -- Summary -- Chapter 30: Maximizing Cross-Browser Compatibility -- Converting Pages in Dreamweaver -- Validating Your Code -- Checking Your Page for Compatibility -- Summary -- Chapter 31: Building Web Sites with a Team -- Following Check In/Check Out Procedures -- Keeping Track with Design Notes -- Browsing File View Columns -- Generating Reports -- Administering Adobe Contribute Sites -- Communicating with WebDAV -- Version Control with Subversion -- Summary -- Chapter 32: Integrating with XML and XSLT -- Understanding XML -- Exporting XML -- Importing XML -- Building Your Own XML Files -- Styling with XSL -- Summary -- Part VII: Extending Dreamweaver -- Chapter 33: Customizing Dreamweaver -- Adding New Commands -- Managing Menus and Keyboard Shortcuts -- Working with Custom Tags -- Customizing Property Inspectors -- Making Custom Floating Panels -- Developing Translators -- Extending C-Level Libraries -- Customizing Your Tag Libraries -- Summary -- Chapter 34: Handling Server Behaviors -- Understanding Server Behaviors -- Applying and Managing Server Behaviors -- Standard Server Behaviors -- Installing Additional Server Behaviors -- Creating Custom Server Behaviors -- Summary -- Chapter 35: Creating Adobe AIR Applications -- About Adobe AIR -- Installing AIR into Dreamweaver -- Designing for AIR -- Packaging Your AIR Application -- Summary -- Appendix A: What's New in Dreamweaver CS5 -- Dynamic Scope Expanded -- Totally Revamped Site Setup -- CSS Integration Enhanced -- Online Services Take Off -- Older Features Removed…”
Libro electrónico -
6436Publicado 2016Tabla de Contenidos: “…Handling the upload -- Serving the images -- The Avatar implementation for local files -- Supporting different file types -- Refactoring and optimizing our code -- Replacing concrete types with interfaces -- Changing interfaces in a test-driven way -- Fixing the existing implementations -- Global variables versus fields -- Implementing our new design -- Tidying up and testing -- Combining all three implementations -- Summary -- Chapter 4: Command-Line Tools to Find Domain Names -- Pipe design for command-line tools -- Five simple programs -- Sprinkle -- Domainify -- Coolify -- Synonyms -- Using environment variables for configuration -- Consuming a web API -- Getting domain suggestions -- Available -- Composing all five programs -- One program to rule them all -- Summary -- Chapter 5: Building Distributed Systems and Working with Flexible Data -- The system design -- The database design -- Installing the environment -- Introducing NSQ -- NSQ driver for Go -- Introducing MongoDB -- MongoDB driver for Go -- Starting the environment -- Reading votes from Twitter -- Authorization with Twitter -- Extracting the connection -- Reading environment variables -- Reading from MongoDB -- Reading from Twitter -- Signal channels -- Publishing to NSQ -- Gracefully starting and stopping programs -- Testing -- Counting votes -- Connecting to the database -- Consuming messages in NSQ -- Keeping the database updated -- Responding to Ctrl + C -- Running our solution -- Summary -- Chapter 6: Exposing Data and Functionality through a RESTful Data Web Service API -- RESTful API design -- Sharing data between handlers -- Context keys -- Wrapping handler functions -- API keys -- Cross-origin resource sharing -- Injecting dependencies -- Responding -- Understanding the request -- Serving our API with one function -- Using handler function wrappers -- Handling endpoints…”
Libro electrónico -
6437por Cohen, MartinTabla de Contenidos: “…-- Perusing the paradoxical nature of praise -- Developing the necessary mindset -- Answers to Chapter 8's Exercises -- Dewey's recipe for education -- "It's been an exceptionally wet summer" -- Research on the problems of demotivation -- Part 3 Applying Critical Thinking in Practice -- Chapter 9 Getting to the Heart of the (Reading) Matter -- Appreciating Critical Reading as a Practical Skill -- Reading between the Lines -- Checking the publisher's standing -- Cross-examining the author -- Considering why the text was written -- Appraising how a text is written and presented -- Taking into account when a text is written -- Judging the evidence -- Assessing your reasons for reading the text -- Playing Detective: Examining the Evidence…”
Publicado 2024
Libro electrónico -
6438Publicado 2002Tabla de Contenidos: “…-- Join Conditions -- The USING Clause -- Conditions Involving Multiple Columns -- The Natural Join Clause -- Types of Joins -- Cross Joins/Cartesian Products -- Inner Joins -- Outer Joins -- Left outer joins -- Right outer joins -- Full outer joins -- Equi-Joins Versus Non-Equi-Joins -- Self Joins -- Self outer joins -- Self non-equi-joins -- Partition Outer Joins -- Joins and Subqueries -- DML Statements on a Join View -- Key-Preserved Tables -- INSERT Statements on a Join View -- DELETE Statements on a Join View -- UPDATE Statements on a Join View -- Data Dictionary Views to Find Updatable Columns -- Impact of WITH CHECK OPTION -- Group Operations -- Aggregate Functions -- NULLs and Aggregate Functions -- Use of DISTINCT and ALL…”
Libro electrónico -
6439Publicado 2013Tabla de Contenidos: “…Application Dependency and Performance -- Installing Application Dependency and Performance -- How ADP Monitors Middleware Targets -- Cross-Tier Diagnostics -- Analyzing Heap Snapshots -- Viewing Real-Time Data for a JVM -- Managing JVM Pools -- Tracing Active Threads -- Provisioning Middleware Through Cloud Control 12c -- The Middleware Provisioning Page in EM Cloud Control -- Scaling Up/Scaling Out Oracle Middleware -- Scaling Up and Scaling Out a WebLogic Domain -- Java EE Application Deployment and Undeployment -- Provisioning SOA Artifacts and Composites -- Using Oracle Exalogic Elastic Cloud -- Using the Exalogic Elastic Cloud Discovery Wizard -- Using the Exalogic Elastic Cloud Home Page and Dashboard -- Configuration and Change Management -- Tracking Assets -- Summary -- Part III: Notable Management Packs -- Chapter 12: Lifecycle Management Pack -- Discovery -- Introduction to the Provisioning and Patch Automation -- Configuring the Software Library -- Populating the Software Library with Application Software -- The Procedure Library -- Bare Metal Provisioning -- Setting Up the Bare Metal Provisioning Infrastructure -- Bare Metal Provisioning Deployments -- Database Provisioning -- Middleware Provisioning -- Patching -- Creating a Patch Plan -- Validating and Deploying the Patch Plan -- Linux Patching -- Linux RPM Repository Server Prerequisites -- Create Linux RPM Repository from ULN -- Manage Patching Groups -- Apply Patches -- Manage the RPM Repository -- Configuration Management -- Configuration Searches -- The Configuration Browser -- Configuration History -- Configuration Comparisons -- Other Configuration Activities -- Change Management -- Schema Baselines -- Schema Comparison -- Schema Synchronizations -- Schema Change Plans -- Data Comparison -- Compliance Management -- Compliance and Best Practices…”
Libro electrónico -
6440por Lam, JamesTabla de Contenidos: “…Stress Testing -- Scenario Analysis -- Verifying the Measurements: Back-Testing -- Conditional Value-at-Risk (CVaR) or Expected Shortfall -- Two Useful Rules of Thumb -- Market Risk Management -- Policies -- Best Practices in Market Risk Management -- Basic Practice -- Standard Practice -- Best Practice -- Case Study: Market Risk Management at Chase -- Risk Measurement and Management -- Obstacles and Successes -- A Look to the Future -- Chapter 14 Operational Risk Management -- Operational Risk-Definition and Scope -- Process Risk -- People Risk -- System Risk -- Event Risk -- Business Risk -- The Operational Risk Management Process -- Risk Policy and Organization -- Risk Identification and Assessment -- Capital Allocation and Performance Measurement -- Risk Mitigation and Control -- Risk Transfer and Finance -- Best Practice in Operational Risk Management -- Basic Practice -- Standard Practice -- Best Practice -- Emerging IT Risks -- Cyber Security -- Cloud Computing -- Social Media -- Case Study: Heller Financial -- Changes Within the Organization -- ERM and Operational Risk Management -- Heller's Evolving Risk Profile -- Objectives of ERM -- Organizational Changes -- Components of the ERM Project -- Implementation Phase -- Post Note -- Chapter 15 Business Applications -- Stage I: Minimizing the Downside -- Stage II: Managing Uncertainty -- Stage III: Performance Optimization -- The Further Evolution of Risk Management -- Chapter 16 Financial Institutions -- Industry Trends -- Consolidation -- Deregulation -- Competition -- Convergence -- Risk Management Requirements -- Risks by Industry Sector -- Cross-sector Risks -- Systemic Risk -- A Look to the Future -- Case Study: CIBC -- Chapter 17 Energy Firms -- Industry Trends -- Risk Management Requirements -- Price and Volume Risks -- Event and Weather Risks -- Risk Sharing -- Optionality -- Basis Risk…”
Publicado 2014
Electrónico