Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 95
- Application software 88
- Java (Computer program language) 75
- Análisis factorial 69
- Historia 65
- History 47
- Management 44
- Computer software 41
- Engineering & Applied Sciences 38
- Coleccion 33
- Documentos 33
- Parlamento britanico 33
- Data processing 31
- Psicología 30
- Python (Computer program language) 30
- Computer programming 29
- Cloud computing 28
- Object-oriented programming (Computer science) 28
- JavaScript (Computer program language) 26
- Web site development 26
- Computer Science 25
- Microsoft .NET Framework 23
- Technological innovations 23
- Programming 22
- Programming languages (Electronic computers) 20
- Web applications 20
- Software patterns 19
- Automation 18
- Software engineering 18
- e 17
-
1281Publicado 2015Tabla de Contenidos: “…Capturing a WordPress password exampleTShark; Beating HTTPS with SSLstrip; Launching a SSLstrip attack; Summary; Chapter 4: Raspberry Pi Attacks; Exploiting a target; Metasploit; Creating your own payloads with Metasploit; Wrapping payloads; Social engineering; The Social Engineering Toolkit; Phishing with BeEF; Rogue access honeypots; Easy-creds; Summary; Chapter 5: Ending the Penetration Test; Covering your tracks; Wiping logs; Masking your network footprint; Proxychains; Resetting the Raspberry Pi to factory settings; Remotely corrupting Kali Linux; Developing reports; Creating screenshots…”
Libro electrónico -
1282por Lee, Keith. authorTabla de Contenidos: “…""Refactoring the Atom Class""""Creating the Hydrogen Initializer Method""; ""Creating a Hydrogen Factory Method""; ""Message Dispatch""; ""Message Forwarding""; ""Forwarding Options""; ""Adding Fast Forwarding to the Hydrogen Class""; ""Message Forwarding Helper Class""; ""Roundup""; ""Chapter 4: Memory Management""; ""Program Memory Usage""; ""Objective-C Memory Model""; ""Implementing Manual Retain-Release""; ""Object Reference and Object Ownership""; ""Basic Memory Management Rules""; ""Deallocating Memory""; ""Delayed Release via Autorelease""; ""Using MRR""…”
Publicado 2013
Libro electrónico -
1283por Juneau, JoshTabla de Contenidos: “…""Chapter 6: Validating Data""""An Overview of Bean Validation with Java EE""; ""Constraint Validation Annotations""; ""Review: Utilizing Different Validation Techniques""; ""Review: Writing a Custom Constraint Annotation""; ""Contexts and Dependency Injection Integration""; ""ValidatorFactory and Validator Injection""; ""Managed Instances of Requested Classes""; ""Method Validation""; ""Declaring Parameter Constraints""; ""Declaring Return Value Constraints""; ""Cascaded Validation""; ""Customizing Method, Constructor, or Getter Validation""; ""Manual Method Level Validation Invocation""…”
Publicado 2013
Libro electrónico -
1284por Crookshanks, Edward. authorTabla de Contenidos: “…Enterprise Patterns: MVC and Inversion of ControlModel-View-Controller; Inversion of Control; Manual Example; Configured Example; Refactoring using Patterns; Factory Method Pattern; Strategy Pattern; Example; Architecture Pattern: N- Tier; Summary; Chapter 8: Software Requirements; Business Requirements; Functional Design; Technical Design; Change Control; Summary; Chapter 9: Just Enough SQL; A Note about the Server and Client Tools; Minimal Database Design; SQL Statement Basics; Filtering and Sorting; More Advanced SQL; Programming Frameworks; Basic ADO.NET; Basic JDBC…”
Publicado 2014
Libro electrónico -
1285
-
1286Publicado 2017Tabla de Contenidos: “…-- Installation of tools -- Node.js -- bacon.js -- RxJS -- Your first code using reactive programming -- Summary -- Chapter 2: Reacting for the First Time -- The bacon.js observables -- Creating our first observable -- Observables from DOM events (asEventStream) -- Observables from promises (fromPromise) -- Observable node event emitter (fromEvent) -- Observables from an array (fromArray) -- Observables from an array (sequentially) -- Observables from an interval (interval) -- Observables from other sources -- Properties -- Changes in an observable -- Reacting to changes -- Subscribing -- Subscribing using the onValue() method -- Subscribing using the log method -- Subscribing using the assign method -- Acting when an error occurs -- Reading how an operator works -- Transforming events using bacon.js -- Reusing observables -- Observables' lazy evaluation -- Summary -- Chapter 3: A World Full of Changes - Reactive Extensions to the Rescue -- RxJS observables -- Difference between bacon.js and RxJS observables -- Hot and cold observables -- Installing RxJS -- Creating an observable -- Creating an observable from iterable objects -- Creating an observable from a sequence factory -- Creating an observable using range () -- Creating an observable using period of time -- Creating an observable from callbacks -- Creating an observable from a promise -- Creating empty observables -- Creating an observable from a single value -- Creating an observable from a factory function -- Creating an observable from arbitrary arguments -- Creating an observable from an error -- Creating observables from DOM events (or EventEmitter)…”
Libro electrónico -
1287por Tome, EricTabla de Contenidos: “…-- Creating a Spark application using Scala -- Spark stages -- Shuffling -- Understanding the Spark Dataset API -- Understanding the Spark DataFrame API -- Spark SQL -- The select function -- Creating temporary views -- Summary -- Chapter 4: Working with Databases -- Technical requirements -- Understanding the Spark JDBC API -- Working with the Spark JDBC API -- Loading the database configuration -- Creating a database interface -- Creating a factory method for SparkSession -- Performing various database operations -- Working with databases…”
Publicado 2024
Libro electrónico -
1288Modular programming in Java 9 write reusable, maintainable code with the Java Platform Module systemPublicado 2017Tabla de Contenidos: “…Solving the API encapsulation problem -- Summary -- Chapter 5: Using Platform APIs -- Adding logging ability -- Using an alternative compiler command -- Reading contacts from an XML file -- Removing the hard-coded contact list -- Creating the module -- Coding the XmlUtil class -- Coding the ContactLoader class -- Shared classes -- Dependency leakage -- Consuming the new module -- Adding UI with Java FX -- Creating the module -- Summary -- Chapter 6: Module Resolution, Readability, and Accessibility -- Readability -- Accessibility -- Interface and implementation accessibility -- Split packages -- Tweaking modularity -- Implied readability -- Aggregator modules -- Java platform aggregator modules -- Qualified exports -- Applying the concepts to address book viewer -- Creating a custom aggregator module -- Optimizing module imports -- Optimizing module exports -- Summary -- Chapter 7: Introducing Services -- The problem of coupling -- Understanding services -- The service registry -- Creating and using services -- Implementing sorting services -- Drawing the module graph -- Advanced services -- Supporting singleton and factory providers -- Implementing service priorities -- Service interface provider lookup -- Selective service instantiation -- Services and the module system goals -- Summary -- Chapter 8: Understanding Linking and Using jlink -- Module resolution process -- Module resolution steps -- Examining module resolution in action -- Revisiting the state of the JDK -- Linking using jlink -- The jlink command -- Link phase optimizations and jlink plugins -- Building a modular JAR file -- Summary -- Chapter 9: Module Design Patterns and Strategies -- Designing modules -- Scoping -- Team structure -- Reusability -- Modularizing by concerns -- Modularizing by layers -- Modularizing by change patterns -- Designing API…”
Libro electrónico -
1289Publicado 2017Tabla de Contenidos: “…Limitations of two-tier client-server patterns -- Three-tier client-server architecture -- Design considerations for using three-tier architecture -- Design considerations for n-tier architecture -- An example of n-tier architecture (shopping cart web application) -- The distributed client-server architecture -- Motivation for development of web application patterns -- Workings of the MVC pattern -- The ASP.Net framework -- The model view presenter (MVP) pattern -- The model-view-viewmodel (MVVM) pattern -- Key advantages of the MVVM pattern -- Design considerations for using the MVVM pattern -- Prism -- Design patterns for web application development -- The front controller pattern -- Spring framework -- Summary -- Chapter 3: Object-Oriented Software Engineering Patterns -- Key elements of OOD -- Additional elements of OOD -- Design principles -- Single responsibility principle (SRP) - SOLID -- Open and close principle - SOLID -- Liskov substitution principle (LSP) - SOLID -- Interface segregation principle (ISP) - SOLID -- Dependency inversion principle (DIP) - SOLID -- Other common design principles -- OO design patterns -- Creational design patterns -- Factory method (virtual constructor) -- Abstract factory (kit) -- Builder -- Prototype -- Singleton -- Structural design patterns -- Adapter class (wrapper) -- Adapter (object) -- Bridge (handle/body) -- Composite -- Decorator -- Façade -- Flyweight -- Proxy -- Behavioral patterns -- Chain of responsibility -- Command (action/transaction) -- Interpreter -- Iterator (cursor) -- Mediator -- Memento -- Observer (dependents/publish/subscribe) -- State (objects for states) -- Strategy (policy) -- The template method -- Visitor -- Concurrency patterns -- Concurrency design pattern -- Producer-consumer -- Active object -- Monitor object -- Concurrency architectural pattern -- Summary -- References…”
Libro electrónico -
1290Publicado 2017Tabla de Contenidos:Libro electrónico
-
1291Publicado 2013“…My Life and Work is not a mechanistic or industry-specific formula that practitioners can follow like work instructions in a factory, but rather a holistic synergy of impartial laws of economics, science, and human behavior—a synergy that Ford called the universal code. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1292Publicado 2014“…But what is safe? The factory job? The cubicle job? Factories all over have been converted to open spaces for startups. …”
Libro electrónico -
1293Publicado 2019Tabla de Contenidos: “…Front Cover -- Half Title -- RIVER PUBLISHERS SERIES IN AUTOMATION, CONTROL AND ROBOTICS -- Title Page - The Digital Shopfloor: Industrial Automation in the Industry 4.0 Era Performance Analysis and Applications -- Copyright -- Contents -- Foreword -- Preface -- List of Contributors -- List of Figures -- List of Tables -- List of Abbreviations -- Chapter 1 - Introduction to Industry 4.0 and the Digital Shopfloor Vision -- 1.1 Introduction -- 1.2 Drivers and Main Use Cases -- 1.3 The Digital Technologies Behind Industry 4.0 -- 1.4 Digital Automation Platforms and the Vision of the Digital Shopfloor -- 1.4.1 Overview of Digital Automation Platforms -- 1.4.2 Outlook Towards a Fully Digital Shopfloor -- 1.5 Conclusion -- References -- PART I -- Chapter 2 - Open Automation Framework for Cognitive Manufacturing -- 2.1 Introduction -- 2.2 State of the Play: Digital Manufacturing Platforms -- 2.2.1 RAMI 4.0 (Reference Architecture Model Industry 4.0) -- 2.2.2 Data-driven Digital Manufacturing Platforms for Industry 4.0 -- 2.2.3 International Data Spaces -- 2.3 Autoware Framework for Digital Shopfloor Automation -- 2.3.1 Digital Shopfloor Evolution: Trends & -- Challenges -- 2.3.1.1 Pillar 1: AUTOWARE open reference architecture for autonomous digital shopfloor -- 2.3.1.2 Pillar 2: AUTOWARE digital abilities for automatic awareness in the autonomous digital shopfloor -- 2.3.1.3 Pillar 3: AUTOWARE business value -- 2.3.2 AUTOWARE Software-Defined Autonomous Service Platform -- 2.3.2.1 Cloud & -- Fog computing services enablers and context management -- 2.3.3 AUTOWARE Framework and RAMI 4.0 Compliance -- 2.4 Autoware Framework for Predictive Maintenance Platform Implementation -- 2.4.1 Z-BRE4K: Zero-Unexpected-Breakdowns and Increased Operating Life of Factories -- 2.4.2 Z-Bre4k Architecture Methodology -- 2.4.3 Z-BRE4K General Architecture Structure…”
Libro electrónico -
1294Publicado 2018Tabla de Contenidos: “…Eclipse MicroProfile -- Setting up a database for a microservice project -- Implementing microservices using WildFly Swarm -- Creating a WildFly Swarm project -- Configuring JPA -- Creating a course entity bean and a JPA factory -- Implementing microservices using Spring Boot -- Deploying microservices in a Docker container -- What is Docker? …”
Libro electrónico -
1295Publicado 2015Tabla de Contenidos: “…Machine generated contents note: Contents Forward Preface 1 -- INTRODUCTIONS AND MOTIVATION 1.1 Introduction 1.2 The book 1.2.1 Objectives 1.2.2 Benefits 1.2.3 Organization 1.2.4 Book Cover 1.2.5 Impact of C-IoT 1.2.6 Summary 1.3 C-IoT Terms of References 1.3.1 Introduction 1.3.2 Need for IoT Framework 1.3.3 C-IoT Domains and Business Apps Model 1.3.4 C-IoT Roadmap 1.3.5 C-IoT Platform and Developer Community 1.3.6 C-IoT Opportunities for Business apps, solutions and systems 1.4 The Future 1.4.1 General Trends 1.4.2 Point Solutions 1.4.3 Collaborative IoT 1.4.4 C-IoT and RFID 1.4.5 C-IoT and Nanotechnology 1.4.6 Cyber-Collaborative IoT (C2-IoT) 1.4.7 C2-IoT and EBOLA Case 1.4.8 Summary 2 -- APPLICATION REQUIREMENTS 2.1 C-IOT Landscape 2.1.1 C-IoT Model and Architecture Layers 2.1.2 C-IoT Model and Enabling Technologies 2.1.3 Definition of key elements 2.1.4 Requirement Considerations 2.1.5 C-IoT System Solution - Requirement Considerations 2.2 Applications Requirement - Use Cases 2.3 Health & Fitness (Lead Example) 2.3.1 Landscape 2.3.2 Health & Fitness - Sensing Requirements 2.3.3 Health & Fitness - Gateway Requirements 2.3.4 Health & Fitness - Service Requirements 2.3.5 Health & Fitness - Solution Considerations 2.3.6 Health & Fitness - System Considerations 2.3.7 Health & Fitness and Hospitals 2.4 Video Surveillance 2.4.1 Landscape 2.4.2 Video Surveillance - Across Home, Industry and Infrastructure 2.4.3 Video Surveillance - Sensing Requirements 2.4.4 Video Surveillance - Gateway Requirements 2.4.5 Video Surveillance - Services 2.4.6 Example: Red Light Camera - Photo Enforcement Camera 2.4.7 Conclusion 2.5 Smart Home & Building 2.5.1 Landscape 2.5.2 Requirement 2.5.3 Home - Sensing Requirements 2.5.4 Home - Gateway Requirements 2.5.5 Home - Services 2.6 Smart Energy 2.6.1 Landscape 2.6.2 Requirements 2.6.3 Smart Energy - Sensing Requirements 2.6.4 Smart Energy - Gateway Requirements 2.6.5 Smart Energy - Services 2.6.6 The Smart Energy App 2.6.7 Smart Energy and Network Security 2.7 Track & Monitor 2.7.1 Landscape 2.7.2 Track & Monitory - Sensing Requirements 2.7.3 Track & Monitor - Services 2.7.4 Track & Monitor - Solution Considerations 2.7.5 Track & Monitor - Examples 2.8 Smart Factory/Manufacturing 2.8.1 Factory Automation - Robot 2.8.2 Caregiver and Robot 2.8.3 Industrial Robot 2.9 Others: Smart Car, Smart Truck and Smart City 2.9.1 Smart Car 2.9.2 Smart Roadside 2.9.3 Drone 2.9.4 Machine Vision 2.9.5 Smart City 3 -- C-IOT APPLICATIONS AND SERVICES 3.1 Smart IoT Application Use Cases 3.1.1 Health monitoring - Individual level (Fitness/Health Tracking wearables) 3.1.2 Health Monitoring at Business level (used in clinic) 3.1.3 Home and Building Automation - Individual level (Smart Home) 3.1.3.1 Smart Thermostat (Smart Energy Management) 3.1.3.2 Smart Smoke Alarm (Safety) 3.1.3.3 Smart IP Camera for Video Surveillance (Security) 3.1.3.4 Smart Service Robots at Consumer level - Roombas iRobot 3.1.3.5 Smart Home Gateway (Scalable for Smart Building Automation) 3.1.3.6 Smart Building Automation 3.1.4 Smart Energy and Smart Grid 3.1.5 Smart Energy Gateways 3.1.6 Industrial and Factory Automation 3.1.7 Smart Transportation & Fleet Logistics (Connected Cars - V2X: V2V, V2I) 3.1.8 Smart City 3.2 Smart IoT Platform 3.2.2 Smart IoT Software Gateway Platform 3.2.3 Smart Sensor Fusion Platform 3.3 Secured C-IoT Software Platform 3.3.1 C-IoT Security - Example on Smart Energy 3.3.2 Securing NAN (Metrology-to-Concentrator) 3.3.3 Securing Home Area Network (HAN) 3.3.4 Securing WAN (Concentrator-to-Sub Station/Utility Servers) 3.3.5 Platform Solution for Concentrator 3.3.6 Platform Solution for Sub Station/Utility Servers 3.3.7 Network Topology and IP Addressing: WAN 3.3.8 Security on the Concentrator and Utility Servers 3.3.9 Summary on C-IoT Security 4 -- IOT REFERENCE DESIGN KIT 5 -- C-IOT CLOUD-BASED SERVICES AND END DEVICE DIVERSIITY 5.1 C-IoT Cloud Based Services 5.1.1 Introduction and Drivers to C-IoT Service Platform 5.1.2 Classes of C-IoT Cloud Computing 5.1.3 C-IoT Innovative and Collaborative Services 5.1.4 The Emerging Data Centre LAN 5.2 C-IoT User Device Diversity 5.2.1 Introduction 5.2.2 C-IoT Developers/Platform 5.2.3 Wearable Devices - Individual 5.2.4 Harvesting (Self-powered nodes) - Infrastructure Applications 5.2.5 Embedded Devices and Servers 5.2.6 Performing Sentiment Analysis Using Big Data 5.2.7 Far-Reaching Consequence 5.2.8 Collaboration 6 -- IMPACT OF C-IOT AND TIPS 6.1 Impact on Business Process Productivity and Smart of Digital Life 6.1.1 Individual 6.1.2 Industry 6.1.3 Infrastructure 6.2 Considerations of developing Differentiated C-IoT Solutions 6.2.1 Software Processes and Platform 6.2.3 Standardization 6.2.4 Advertising Ecosystem Value Exchange 6.2.5 Opportunity with Industry Supply Chain for Material Handling 6.3 Practical Tips in maintaining Digital Life Style 6.3.1 Mobile and Wearable Computing 6.3.2 Robotics and Automation 6.3.3 Sensors and C-IoT 6.3.4 BIG Data and Predictive Analysis 6.3.5 The Changing Workforce 6.3.6 Sustainability 7 -- CONCLUSION 7.1 Simple C-IoT Domains and Model 7.2 Disruptive Business Applications of C-IoT 7.3 A New LifeStyle 7.4 Development Platform 7.5 C-IoT emerging Standards, Consortiums and other Initiatives 7.5.1 C-IoT Emerging Standards 7.5.2 C-IoT Emerging Consortiums 7.5.3 Forums, Workshops, and other Initiatives 7.5.4 C-IoT and Radio Communications 7.5.5 C-IoT and Nanotechnology 7.5.6 C-IoT and Security 7.6 Final Note References About the Authors Index …”
Libro electrónico -
1296Publicado 2015Tabla de Contenidos: “…CLIMA ORGANIZACIONALESTUDIO 1. VALIDEZ FACTORIAL EXPLORATORIA; ESTUDIO 2. EFEC TO DEL CLIMA ORGANIZACIONAL; ESTUDIO 3. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1297por Kimball, RalphTabla de Contenidos: “…Business Intelligence ApplicationsRestaurant Metaphor for the Kimball Architecture; Alternative DW/BI Architectures; Independent Data Mart Architecture; Hub-and-Spoke Corporate Information Factory Inmon Architecture; Hybrid Hub-and-Spoke and Kimball Architecture; Dimensional Modeling Myths; Myth 1: Dimensional Models are Only for Summary Data; Myth 2: Dimensional Models are Departmental, Not Enterprise; Myth 3: Dimensional Models are Not Scalable; Myth 4: Dimensional Models are Only for Predictable Usage; Myth 5: Dimensional Models Can't Be Integrated; More Reasons to Think Dimensionally…”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1298por Wander, Frank, 1957-Tabla de Contenidos: “…Transforming IT Culture: How to use Social Intelligence, Human Factors, and Collaboration to Create an it Department that Outperforms; Copyright; Contents; Foreword; Notes; Acknowledgments; Introduction; The Passing of an Era; A New Era Brings a New Focus; A Quick Book Tour; Note; Chapter 1: A Shining Light: The Blind Spot Revealed; A Race to the Bottom; Human Understanding Enters the Workplace; We Have Been Taught Not to See or Feel; Unlocking Human Potential; Dawn of a New Productivity Model; Working Social; The Social System Is the Factory; Notes…”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1299Publicado 2000Tabla de Contenidos: “…Chapter Twelve - TOXIC CHEMICAL FACTORY LITIGATION: ATKINS v. HARCROS…”
Libro electrónico -
1300Publicado 2016Tabla de Contenidos: “…Chapter 4: Object-Oriented JavaScriptUnderstanding objects; Behavior of JavaScript objects; Prototypes; Instance properties versus prototype properties; Inheritance; Getters and setters; Summary; Chapter 5: JavaScript Patterns; Design patterns; The namespace pattern; The module pattern; ES6 modules; The factory pattern; The mixin pattern; The decorator pattern; The observer pattern; JavaScript Model-View-* patterns; Model-View-Controller; Models; Views; Controllers; The Model-View-Presenter pattern; Model-View-ViewModel; Summary; Chapter 6: Testing and Debugging; Unit testing…”
Libro electrónico