Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 386
- Application software 267
- Computer software 161
- Cloud computing 119
- Git (Computer file) 116
- Computer programming 99
- Open source software 85
- Python (Computer program language) 79
- Computer programs 68
- Web site development 67
- Web applications 58
- Management 50
- Software engineering 48
- Application program interfaces (Computer software) 47
- Microsoft .NET Framework 44
- Artificial intelligence 43
- Programming 43
- JavaScript (Computer program language) 40
- Machine learning 40
- Design 39
- Java (Computer program language) 36
- Web sites 35
- Electronic data processing 31
- Computer networks 29
- Linux 29
- Programming languages (Electronic computers) 29
- Data mining 25
- Operating systems (Computers) 25
- Software architecture 24
- Testing 24
-
921Publicado 2024Tabla de Contenidos: “…-- Keeping inventory -- Web searches and Google hacks -- Exploring some useful Google hacks -- Preventing exploitation through Google searches -- WHOIS database records -- Accessing WHOIS information -- Understanding the name server entry -- Third-party sources of intel -- Sources for collecting intelligence -- Accessing hidden information -- Maltego -- GitHub and online forums -- SpiderFoot tool -- Dmitry -- Shodan -- Archived information -- Lab - Reconnaissance -- Summary -- Assessment -- Answer -- Chapter 3: Ethical Hacking Scanning and Enumeration -- Comparing scanning and enumeration -- Exploring scanning techniques -- Ping…”
Libro electrónico -
922
-
923
-
924Publicado 2018Tabla de Contenidos: “…-- Defining an owned type -- Configuring owned types -- Creating the orders migration -- Installing and configuring the Stripe.net NuGet package -- Configuring Stripe -- Processing orders and payments -- Persisting the order object -- Calculating the total order price -- Processing the payment with Stripe -- Adding an order list API endpoint -- Summary -- Chapter 9: Building an Admin Panel -- Extending the authentication endpoint with user roles -- Client-side role-based authorization -- Adding role checks to client-side routes -- Server-side role-based authorization -- Hiding UI elements based on role -- Building the admin panel components -- Configuring nested route definitions -- Refactoring components for reuse -- Product list component -- Creating a product form component -- Creating an add variant modal component -- Vue component inheritance -- Defining a form input base component -- Inheriting from a base component -- Building custom input controls -- Building a custom typeahead control -- Building a multi-select control -- Persisting new products to the database -- Creating a slug generator -- Creating the API endpoint -- Remote validation with Vee-Validate -- Making our app aware of the new custom validation rule -- Creating the validation API endpoint -- Tidying things up -- Linking to the admin panel -- Fixing a logout bug -- Fixing a bug by selecting a product variant -- Summary -- Chapter 10: Deployment -- Registering for an Azure account -- Setting up an Azure environment -- Understanding Azure subscriptions and resources -- Creating a subscription and resource group -- Creating a database -- Creating an app service -- Configuring environment variables -- Preparing the application for deployment -- Configuring multiple database providers -- Tweaking the post-publish build steps -- Configuring Git deployments…”
Libro electrónico -
925Publicado 2017Tabla de Contenidos: “…Many Pandas -- Multiphase bosses -- A better spawning system -- Switching difficulty at runtime -- Training and extending your Unity skills to become a better game developer -- Making things easier for other team members -- Exposing events -- Sprinkles pooling -- Saving your data -- Debugging -- Remote Logs -- Cleaning the release version -- More about communication between scripts -- Documenting the code -- Protecting your game -- Building for more than one platform -- Input/output devices -- Virtual reality in Unity -- Balancing the game -- Extending the Unity editor -- Multiplayer and networking -- Practice makes perfect -- Improving the atmosphere of the game -- Visuals -- Color schemes -- Homework -- Lighting -- Lights in Unity -- Homework -- Environment -- Homework -- Special effects -- Particle systems -- Post processing -- Other visual effects -- Audio -- Music -- Sound effects -- Eliciting emotions -- Homework -- Audio in Unity -- External audio systems -- Teamwork -- It is not just about you, it is about working in a team -- Sharing a common vision -- Managing expectations -- Collaboration and communication are key -- Ways to communicate -- Version control -- Make a GDD and stick to it -- Keeping it tidy with project management tools -- Slack -- HacknPlan -- Drive -- Dropbox -- Trello -- Redbooth -- GitHub -- BitBucket -- Calendar -- Pinterest -- Hootsuite -- Polishing your game -- Processing the power -- Checking the build size -- Texture optimitation -- Stats and profiling -- Other optimization tips -- Playtesting -- Why are you even playtesting? …”
Libro electrónico -
926Publicado 2017Tabla de Contenidos: “…Running the Script -- The Results -- #42 Deleting a User Account -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #43 Validating the User Environment -- The Code -- How It Works -- Running the Script -- The Results -- #44 Cleaning Up After Guests Leave -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 6: System Administration: System Maintenance -- #45 Tracking Set User ID Applications -- The Code -- How It Works -- Running the Script -- The Results -- #46 Setting the System Date -- The Code -- How It Works -- Running the Script -- The Results -- #47 Killing Processes by Name -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #48 Validating User crontab Entries -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #49 Ensuring that System cron Jobs Are Run -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #50 Rotating Log Files -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #51 Managing Backups -- The Code -- How It Works -- Running the Script -- The Results -- #52 Backing Up Directories -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 7: Web and Internet Users -- #53 Downloading Files via FTP -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #54 Extracting URLs from a Web Page -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #55 Getting GitHub User Information -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #56 ZIP Code Lookup -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #57 Area Code Lookup -- The Code -- How It Works…”
Libro electrónico -
927Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Configuring Git in Jenkins -- Getting ready -- How to do it... -- How it works... -- Configuring ANT_HOME in Jenkins -- Getting ready -- How to do it... -- How it works... -- Configuring MAVEN_HOME in Jenkins -- Getting ready -- How to do it... -- How it works... -- Configuring GRADLE_HOME in Jenkins -- Getting ready -- How to do it... -- How it works... -- Creating a Freestyle job for Ant Project -- Getting ready -- How to do it... -- How it works... -- Creating a Maven Job for Maven Project -- Getting ready -- How to do it... -- How it works…”
Libro electrónico -
928por Hochstein, LorinTabla de Contenidos: “…Deploying Mezzanine with Ansible -- Listing Tasks in a Playbook -- Organization of Deployed Files -- Variables and Secret Variables -- Using Iteration (with_items) to Install Multiple Packages -- Adding the Sudo Clause to a Task -- Updating the Apt Cache -- Checking Out the Project Using Git -- Installing Mezzanine and Other Packages into a virtualenv -- Complex Arguments in Tasks: A Brief Digression -- Creating the Database and Database User -- Generating the local_settings.py File from a Template -- Running django-manage Commands -- Running Custom Python Scripts in the Context of the Application -- Setting Service Configuration Files -- Enabling the Nginx Configuration -- Installing TLS Certificates -- Installing Twitter Cron Job -- The Full Playbook -- Running the Playbook Against a Vagrant Machine…”
Publicado 2015
Libro electrónico -
929Publicado 2018Tabla de Contenidos: “…MacPorts installation -- Command-line completion -- Using the Initializr with the Spring Boot CLI -- Spring Boot Actuator - taking Application's Insights -- Enabling Spring Boot's Actuator in your application -- Analyzing the Actuator's endpoints -- Exposing configuration details -- Exposing metrics endpoints -- Exposing application information -- Shutting down your application -- Customizing your Actuator endpoints -- Enabling or disabling endpoints -- Changing endpoint IDs -- Changing the sensitivity of the Actuator's endpoints -- Writing custom health indicators -- Creating a custom endpoint -- Securing the Actuator endpoints -- The Actuator with Spring Boot 2.X -- Summary -- Chapter 4: Getting Started with Spring Cloud and Configuration -- Cloud-native application architecture -- Microservices architecture -- Microservice benefits -- Microservice challenges -- Introduction to Spring Cloud -- Building blocks of the cloud and microservice applications -- Usages of Spring Cloud -- Configuring the Spring Cloud application -- Creating the configuration producer Spring Cloud Config Server -- Project setup and dependencies -- Implementing Cloud Config Server -- Configuring the application.properties file -- Creating a Git repository as configuration storage -- Running your configuration application -- Configuring multiple repositories using patterns -- Authentication -- Force-pull property -- Creating the configuration consumer Spring Cloud Config client -- Summary -- Chapter 5: Spring Cloud Netflix and Service Discovery -- Introduction to Spring Cloud Netflix -- The need for Service Discovery in the microservices architecture -- Implementing Service Discovery - Eureka Server -- The Maven build configuration file -- The Gradle build configuration file -- Enabling the Eureka server as a Discovery Service server…”
Libro electrónico -
930Publicado 2018Tabla de Contenidos: “…. -- How it works... -- Parsing a GitHub project and generate a report -- Getting ready -- How to do it... -- How it works... -- Creating a poor man's incremental remote backup -- Getting ready -- How to do it... -- How it works...…”
Libro electrónico -
931Publicado 2024Tabla de Contenidos: “…Looping Over a List with "with_items" -- Handlers -- Using Handlers -- Using Handlers with Multiple Tasks -- Using Handlers with Multiple Tasks and Different Handlers -- Conditional Execution -- Using "ignore_errors" to Continue Execution Even After Failures -- Using "changed_when" to Control When a Task Is Considered Changed -- Using "failed_when" to Control When a Task Is Considered Failed -- Failing a Playbook with "fail" -- Vault -- Editing an Encrypted File -- Updating Encryption Password -- Viewing an Encrypted File -- Encrypting a File -- Encrypting a File with a Password File -- Decrypting a File -- Encrypting a String -- Encrypting a String with a Password File -- Asynchronous Tasks -- Running a Task Asynchronously -- Checking the Status of Asynchronous Tasks -- Roles -- Creating a Role -- Using a Role -- Using a Role with Variables -- Using a Role with Multiple Variables -- Using a Role with Tags -- Ansible Galaxy -- Searching for Roles -- Installing a Role -- Installing a Role with a Specific Version -- Ansible Collections -- Installing a Collection -- Installing a Collection with a Specific Version -- Installing a Collection from a File -- Installing a Collection from a Directory -- Resources About Ansible -- Official Ansible Documentation -- Ansible Blogs and Articles -- Ansible Community and Forums -- Ansible GitHub Repository -- Ansible Videos -- Ansible Tools -- IDE Extensions -- VSCode -- PyCharm -- Sublime -- Vim -- Newsletters -- Afterword -- Your Feedback Matters…”
Libro electrónico -
932Publicado 2018Tabla de Contenidos: “…. -- emptyDir -- hostPath -- NFS -- glusterfs -- downwardAPI -- gitRepo -- There's more... -- PersistentVolumes -- Using storage classes -- gcePersistentDisk -- awsElasticBlockStore -- See also -- Working with Secrets -- Getting ready -- How to do it... -- Creating a Secret -- Working with kubectl create command line -- From a file -- From a directory -- From a literal value -- Via configuration file -- Using Secrets in Pods -- By environment variables -- By volumes -- Deleting a Secret -- How it works... -- There's more... -- Using ConfigMaps -- Mounting Secrets and ConfigMap in the same volume -- See also -- Working with names -- Getting ready -- How to do it... -- How it works... -- See also -- Working with Namespaces -- Getting ready -- How to do it... -- Creating a Namespace…”
Libro electrónico -
933Publicado 2021Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Section 1: The Basics -- Chapter 1: Kernel Workspace Setup -- Technical requirements -- Running Linux as a guest VM -- Installing a 64-bit Linux guest -- Turn on your x86 system's virtualization extension support -- Allocate sufficient space to the disk -- Install the Oracle VirtualBox Guest Additions -- Experimenting with the Raspberry Pi -- Setting up the software - distribution and packages -- Installing software packages -- Installing the Oracle VirtualBox guest additions -- Installing required software packages -- Installing a cross toolchain and QEMU -- Installing a cross compiler -- Important installation notes -- Additional useful projects -- Using the Linux man pages -- The tldr variant -- Locating and using the Linux kernel documentation -- Generating the kernel documentation from source -- Static analysis tools for the Linux kernel -- Linux Trace Toolkit next generation -- The procmap utility -- Simple Embedded ARM Linux System FOSS project -- Modern tracing and performance analysis with [e]BPF -- The LDV - Linux Driver Verification - project -- Summary -- Questions -- Further reading -- Chapter 2: Building the 5.x Linux Kernel from Source - Part 1 -- Technical requirements -- Preliminaries for the kernel build -- Kernel release nomenclature -- Kernel development workflow - the basics -- Types of kernel source trees -- Steps to build the kernel from source -- Step 1 - obtaining a Linux kernel source tree -- Downloading a specific kernel tree -- Cloning a Git tree -- Step 2 - extracting the kernel source tree -- A brief tour of the kernel source tree -- Step 3 - configuring the Linux kernel -- Understanding the kbuild build system -- Arriving at a default configuration -- Obtaining a good starting point for kernel configuration…”
Libro electrónico -
934Publicado 2024Tabla de Contenidos: “…Best Practices for Removing Sensitive Data -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 Model Building -- Choice of Framework and Model Parallelism -- Data Parallelism -- Model Parallelism -- Modeling Techniques -- Artificial Neural Network -- Deep Neural Network (DNN) -- Convolutional Neural Network -- Recurrent Neural Network -- What Loss Function to Use -- Gradient Descent -- Learning Rate -- Batch -- Batch Size -- Epoch -- Hyperparameters -- Transfer Learning -- Semi-supervised Learning -- When You Need Semi-supervised Learning -- Limitations of SSL -- Data Augmentation -- Offline Augmentation -- Online Augmentation -- Model Generalization and Strategies to Handle Overfitting and Underfitting -- Bias Variance Trade-Off -- Underfitting -- Overfitting -- Regularization -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Model Training and Hyperparameter Tuning -- Ingestion of Various File Types into Training -- Collect -- Process -- Store and Analyze -- Developing Models in Vertex AI Workbench by Using Common Frameworks -- Creating a Managed Notebook -- Exploring Managed JupyterLab Features -- Data Integration -- BigQuery Integration -- Ability to Scale the Compute Up or Down -- Git Integration for Team Collaboration -- Schedule or Execute a Notebook Code -- Creating a User-Managed Notebook -- Training a Model as a Job in Different Environments -- Training Workflow with Vertex AI -- Training Dataset Options in Vertex AI -- Pre-built Containers -- Custom Containers -- Distributed Training -- Hyperparameter Tuning -- Why Hyperparameters Are Important -- Techniques to Speed Up Hyperparameter Optimization -- How Vertex AI Hyperparameter Tuning Works -- Vertex AI Vizier -- Tracking Metrics During Training -- Interactive Shell -- TensorFlow Profiler -- What-If Tool -- Retraining/Redeployment Evaluation -- Data Drift…”
Libro electrónico -
935Publicado 2020Tabla de Contenidos: “…13.1 Pufferüberlauf -- 13.2 Out-of-Bounds -- 13.3 Integer-Überlauf bei PHP-ftp_genlist() -- 13.4 Pythons hotshot-Modul -- 13.5 Libcurl-Out-of-Bounds -- 13.6 Zusammenfassung -- Kapitel 14: Übernahme von Subdomains -- 14.1 Domainnamen verstehen -- 14.2 Wie Subdomain-Übernahmen funktionieren -- 14.3 Subdomain-Übernahme bei Ubiquiti -- 14.4 Scan.me verweist auf Zendesk -- 14.5 Windsor-Subdomain-Übernahme bei Shopify -- 14.6 Fastly-Übernahme bei Snapchat -- 14.7 Legal Robot-Übernahme -- 14.8 SendGrid-Mail-Übernahme bei Uber -- 14.9 Zusammenfassung -- Kapitel 15: Race Conditions -- 15.1 HackerOne-Einladungen mehrfach akzeptieren -- 15.2 Überschreiten des Keybase-Einladungs-Limits -- 15.3 Race Condition bei HackerOne-Zahlungen -- 15.4 Race Condition bei Shopify-Partnern -- 15.5 Zusammenfassung -- Kapitel 16: Insecure Direct Object References -- 16.1 Einfache IDORs aufspüren -- 16.2 Komplexere IDORs aufspüren -- 16.3 Rechte-Ausweitung (Privilege Escalation) bei Binary.com -- 16.4 App-Erzeugung bei Moneybird -- 16.5 API-Token-Diebstahl bei Twitter Mopub -- 16.6 Preisgabe von Kundeninformationen bei ACME -- 16.7 Zusammenfassung -- Kapitel 17: OAuth-Schwachstellen -- 17.1 Der OAuth-Workflow -- 17.2 Slack-OAuth-Token stehlen -- 17.3 Umgehen der Authentifizierung mit Standard-Passwörtern -- 17.4 Microsoft-Log-in-Token stehlen -- 17.5 Offizielle Facebook-Access-Token stehlen -- 17.6 Zusammenfassung -- Kapitel 18: Schwachstellen in Anwendungslogik und -konfiguration -- 18.1 Shopify-Administrator-Rechte umgehen -- 18.2 Account-Schutz bei Twitter umgehen -- 18.3 Signal-Manipulation bei HackerOne -- 18.4 Fehlerhafte S3-Bucket-Rechte bei HackerOne -- 18.5 GitLabs Zwei-Faktor-Authentifizierung umgehen -- 18.6 Preisgabe der PHP-Info bei Yahoo! …”
Libro electrónico -
936Publicado 2023Tabla de Contenidos: “…-- Send a thank-you email -- All about the iOS technical interview -- Worked-on projects -- Answering Swift and algorithm questions -- Solving basic questions about UIKit and SwiftUI -- Mastering development tools -- Cracking the coding interview -- Live coding interview -- Working on a home assessment -- Passing the architecture interview -- Summary -- Chapter 3: Developer Branding -- Understanding the importance of developing a brand -- Learning what a brand is -- Increasing our chances of passing the resume scanning -- Increasing our chances of getting an offer -- Expanding our network -- How to start building your brand -- Contributing to the community -- Being a star in Stack Overflow -- Maintaining a public GitHub repository -- Joining an open source project -- Writing content -- Being experts…”
Libro electrónico -
937Publicado 2024Tabla de Contenidos: “…Forward deployment of AWS Outposts -- Private 5G and DDIL -- Using AWS Snowball Edge to host a private 5G core -- Summary -- Chapter 10: Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures -- Overview of architecting 5G-based MEC solutions -- Public MEC -- Private MEC -- Observability, security, and capacity of Wi-Fi versus 5G -- Observability -- Security -- Capacity -- Computer Vision -- V2X -- ISA devices -- AWS IoT FleetWise -- Software-defined video production -- Summary -- Chapter 11: Addressing the Requirements of Immersive Experiences with AWS -- Overview of immersive experiences -- Virtual Reality (VR) -- Augmented Reality (AR) -- Mixed Reality (MR) -- XR development platforms -- Online gaming with Unity -- Dedicated servers -- Game clients -- Pixel streaming -- Amazon GameLift plugin for Unity -- Connected workers -- Mobile edge computing (MEC) and connected workers -- Workforce development and training -- AR-enhanced sporting events -- AR-integrated live video -- Summary -- Part 4: Implementing Edge Computing Solutions via Hands-On Examples and More -- Chapter 12: Configuring an AWS Snowcone Device to Be an IOT Gateway -- Ordering an AWS Snowcone device -- Step 1 - Creating an S3 bucket -- Step 2 - Creating a new job -- Step 3 - Selecting the job type -- Step 4 - Choosing a form factor -- Step 5 - Selecting optional components -- Step 6 - Setting encryption options -- Step 7 - Confirming your selections -- Step 8 - Saving output files -- Step 9 - Setting up the physical environment -- Deploying the backend in your AWS account -- Step 1 - Installing and configuring AWS CLI v2 -- Step 2 - Cloning the code repository from GitHub -- Step 3 - Copying the code repository to your S3 bucket -- Step 4 - Deploying the CloudFormation templates…”
Libro electrónico -
938Publicado 2024Tabla de Contenidos: “…Setting up a GraphQL API using HotChocolate -- Adding mutations -- Using variables in queries -- Defining a GraphQL schema -- Scalar types -- Object types -- Retrieving related objects using resolvers -- Field resolvers -- Resolver for a list of objects -- Using data loaders -- Batch data loader -- Group data loader -- Dependency injection -- Using the Service attribute -- Understanding the lifetime of the injected services -- Interface and union types -- Interfaces -- Union types -- Filtering, sorting, and pagination -- Filtering -- Sorting -- Pagination -- Visualizing the GraphQL schema -- Summary -- Further reading -- Chapter 13: Getting Started with SignalR -- Technical requirements -- Recap of real-time web APIs -- Setting up SignalR -- Building SignalR clients -- Building a TypeScript client -- Building a Blazor client -- Using authentication and authorization in SignalR -- Adding authentication and authorization to the SignalR server -- Adding a login endpoint -- Authenticating the TypeScript client -- Authenticating the Blazor client -- Managing users and groups -- Managing events in SignalR -- Sending a message to a specific user -- Using strongly typed hubs -- Joining groups -- Sending a message to a group -- Sending messages from other services -- Configuring SignalR hubs and clients -- Configuring SignalR hubs -- HTTP configuration options -- Automatically reconnecting -- Scaling SignalR -- Summary -- Chapter 14: CI/CD for ASP.NET Core Using Azure Pipelines and GitHub Actions -- Technical requirements -- Introduction to CI/CD -- CI/CD concepts and terminologies -- Understanding the importance of CI/CD -- Containerizing ASP.NET Core applications using Docker -- What is containerization? …”
Libro electrónico -
939Publicado 2023Tabla de Contenidos: “…Part 1 of 3 - Generating SSH keys to access the attacker VM instance -- Part 2 of 3 - Setting up the lab network environment with Terraform -- Part 3 of 3 - Accessing the attacker VM instance -- Launching the target VM instances -- Part 1 of 3 - Launching the VM instance for the domain controller -- Part 2 of 3 - Launching the VM instance for the workstation machine -- Part 3 of 3 - Testing network connectivity -- Setting up and configuring the Active Directory lab -- Part 1 of 1 - Installing Active Directory Domain Services -- Part 2 of 12 - Promoting the VM instance to become the domain controller -- Part 3 of 12 - Setting up Active Directory Certificate Services -- Part 4 of 12 - Configuring Active Directory Certificate Services -- Part 5 of 12 - Updating the trusted hosts configuration and enabling PowerShell Remoting -- Part 6 of 12 - Setting up the flag inside the domain controller -- Part 7 of 12 - Creating the John Doe user -- Part 8 of 12 - Creating the Jane Doe user -- Part 9 of 12 - Creating the Service Account user -- Part 10 of 12 - Setting up the SPN for the service account -- Part 11 of 12 - Adding the Service Account user to the Remote Management Users group -- Part 12 of 12 - Configuring the workstation machine -- Simulating penetration testing in the lab environment -- Cleaning up -- Summary -- Further reading -- Chapter 9: Recommended Strategies and Best Practices -- Technical requirements -- Increasing the complexity of penetration testing lab environments -- Leveraging Generative AI for estimating penetration testing lab costs -- Unleashing the power of AI-powered tools to accelerate automation script development -- Part 1 of 3 - Leveraging GitHub Copilot to speed up shell scripting -- Part 2 of 3 - Accelerating Python coding with Amazon CodeWhisperer -- Part 3 of 3 - Coding PowerShell scripts faster with Tabnine Pro…”
Libro electrónico -
940