Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
641Publicado 2012“…The update to the best-selling Rails tutorial includes: fully updated for Rails 3.2 and Ruby 1.9; all-new design using Twitter's Bootstrap; coverage of the new asset pipeline, including Sprockets & Sass; behavior-driven development (BDD) with Capybara & Rspec; better automated testing with Guard & Spork; roll your own authentication with has_secure_password; and an introduction to Gherkin & Cucumber. …”
-
642Publicado 2022“…Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidents Key Features Learn how to secure your Azure cloud workloads across applications and networks Protect your Azure infrastructure from cyber attacks Discover tips and techniques for implementing, deploying, and maintaining secure cloud services using best practices Book Description Security is integrated into every cloud, but this makes users put their guard down as they take cloud security for granted. …”
Libro electrónico -
643Publicado 1982Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad de Deusto, Biblioteca Seminario Metropolitano de Oviedo, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca de la Universidad de Navarra)Libro
-
644
-
645
-
646
-
647por Belda, Rafael
Publicado 1987Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Biblioteca Universidad de Deusto, Biblioteca de Pastoral Madrid, Biblioteca Seminario Metropolitano de Oviedo, Biblioteca Diocesana de Salamanca, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Universidad Loyola - Universidad Loyola Granada, Biblioteca Diocesana Bilbao, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Seminario Diocesano de Jaén)Libro -
648Publicado 2014Tabla de Contenidos: “…Chapter 9 Glider Wings: Wherein our heroes get separated -- Build a Pair of Glider Wings -- Step 1: Lay Out the Patterns -- Step 2: Cut Part 1 of the Wings -- Step 3: Cut Part 2 of the Wings -- Step 4: Cut Part 3 of the Wings -- Step 5: Embellish the Wings -- Step 6: Assemble the Wings -- Step 7: The Harness -- Step 8: Mount the Wings -- Chapter 10 Rivet Gun (Modded Nerf Blaster): Wherein our heroes get stranded -- Build the Rivet Gun -- Step 1: Paint the Gun -- Step 2: The Handle -- Step 3: The Slide -- Step 4: The Top Ridge -- Step 5: The Magazine -- Step 6: The Barrel -- Step 7: Further Embellishment -- Chapter 11 Power Armor and Magnetic Amplification Gauntlet: Wherein our heroes are reunited -- Build the Power Armor -- Step 1: The Chest Plate -- Step 2: A Bit of Armor -- Step 3: Make the Belt -- Step 4: Make the Riveting Details -- Step 5: Form the Chest Plate -- Step 6: The Gauge -- Step 7: The Back Plate -- Step 8: Strapping -- Step 9: Finishing Touches on the Body Armor -- Step 10: Shoulders -- Step 11: Arm Pieces -- Step 12: Embellishments -- Build the Magnetic Amplification Gauntlet -- Step 1: Cut Out Your Patterns -- Step 2: The Base of the Arm Guard -- Step 3: The Grill -- Step 4: Put Them Together -- Step 5: Steampunk Tailoring for the Arm Guard -- Step 6: Hand and Knuckle Guards -- Step 7: Put It All Together -- Step 8: Embellishments -- Chapter 12 Rocket Pack: Wherein our heroes visit their uncle -- Build the Rocket Pack -- Step 1: Prepare the Bottles for Painting -- Step 2: Paint -- Step 3: The Mounting Plate and Harness -- Step 4: Decorate the Tanks -- Step 5: Attach the Tanks to the Mounting Plate -- Step 6: Attach the Nozzles -- Step 7: Embellishments -- Chapter 13 Epilogue: Wherein our heroes escape -- Part the Third: Hastily Scribbled Laboratory Notes -- Appendix A: This Way Lies Madness -- Further Reading -- Viewing -- Music…”
Libro electrónico -
649Publicado 1998Tabla de Contenidos: “…Basic Implication for U.S. Military Policy: ""Guarded Openness""Chapter Seven - Beyond Mexico; Toward a Demography of Social Netwar; Evolution of Organization, Doctrine, and Strategy; Favorable Conditions for Social Netwar; Challenges to Authoritarian Systems; Implications for the U.S. …”
Libro electrónico -
650Publicado 2006Tabla de Contenidos: “…Army Medical DepartmentNational Guard Bureau State Partnership Program; U.S. Army South; Conclusion; Chapter Seven - Concluding Observations; AIA Lessons Learned; How Should AIAKSS Information Be Used?…”
Libro electrónico -
651por Yoshida, NobukoTabla de Contenidos: “…The Decidability of Verification under PS 2.0 -- Data Flow Analysis of Asynchronous Systems using Infinite Abstract Domains -- Types for Complexity of Parallel Computation in Pi-Calculus -- Checking Robustness Between Weak Transactional Consistency Models -- Verified Software Units -- An Automated Deductive Verication Framework for Circuit-building Quantum Programs -- Nested Session Types -- Coupled Relational Symbolic Execution for Differential Privacy -- Graded Hoare Logic and its Categorical Semantics -- Do Judge a Test by its Cover: Combining Combinatorial and Property-Based Testing -- For a Few Dollars More – Verified Fine-Grained Algorithm Analysis Down to LLVM -- Run-time Complexity Bounds Using Squeezers -- Complete trace models of state and control -- Session Coalgebras: A Coalgebraic View on Session Types and Communication Protocols -- Correctness of Sequential Monte Carlo Inference for Probabilistic Programming Languages -- Densities of Almost Surely Terminating Probabilistic Programs are Differentiable Almost Everywhere -- Graded Modal Dependent Type Theory -- Automated Termination Analysis of Polynomial Probabilistic Programs -- Bayesian strategies: probabilistic programs as generalised graphical models -- Temporal Refinements for Guarded Recursive Types -- Query Lifting: Language-integrated query for heterogeneous nested collections -- Reverse AD at Higher Types: Pure, Principled and Denotationally Correct -- Sound and Complete Concolic Testing for Higher-order Functions -- Strong-Separation Logic. …”
Publicado 2021
Libro electrónico -
652Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: TypeScript Best Practices -- Environment setup -- Node.js and npm for Linux -- TypeScript -- Quick overview -- Best practices -- Naming -- Interface redefinitions -- Getters and setters -- Constructor -- Type guards -- Enumerator -- Pitfalls -- Type-casting and JSON -- Inheritance and polymorphism -- Summary -- Chapter 2: Angular Bootstrapping -- Architectural overview -- Component -- Services -- Directives -- Pipes -- Routes -- Angular CLI -- Installation -- Creating a new application -- Generating -- Serving -- Deploying -- Summary -- Chapter 3: Classical Patterns -- Components -- Singleton -- Factory method -- Observer -- TypeScript observables with parameters -- Observing HTTP responses -- Implementation -- Understanding the implementation -- Promises -- Summary -- Chapter 4: Navigational Patterns -- MVC -- Model-view-controller at large -- Model-view-controller limitations for the frontend -- Angular's model-view-controller -- Redux -- Summary -- Chapter 5: Stability Patterns -- Timeouts -- Circuit breaker -- Factory -- Memento -- Summary -- Chapter 6: Performance Patterns -- AJAX overkill -- Proxy patterns -- Loop count -- Change detection and immutable states -- Prototype and the reusable pool -- Summary -- Chapter 7: Operation Patterns -- General health metrics -- Specific metrics -- Error reporting -- Method metrics with AOP -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
653Publicado 2011Tabla de Contenidos: “…Coming Home: Examining the Homecoming Experiences of Young Veterans Beyond Words: Homeless Veterans Who Served in Iraq and Afghanistan; Tragedy, Loss, and Triumph After Combat: A Portrait of Young Women Veteran Survivors of Sexual and Combat Trauma; Living in Transition: Young Veterans' Health and the Postdeployment Shift to Family Life 1; Ensuring Equality After the War for the National Guard and Reserve Forces: Revisiting the Yellow Ribbon Initiative; Managing the Return to the Workplace: Reservists Navigating the Stormy Seas of the Homeland…”
Libro electrónico -
654Publicado 2022Tabla de Contenidos: “…Acknowledgments -- Preface -- Coding, robotics, and values foundations : a coding playground -- Languages for children -- Starting early -- A window into their world : mouths cannot read bar codes -- The coding wars -- The two sides : a simplified story -- The role of the teacher -- The role of the student -- The role of education -- The role of coding -- A window into their world : robotics guarding nature -- The rise of STEM -- The work pipelines -- Global experience -- Computer science and computational thinking -- The problem with STEM -- A window into their world : programming a map ; building a language -- Coding as another language -- Transitioning languages -- Meaningful sequences -- Doing things with language -- Window into their world : Georgia, Elena,and the old lady -- From theory to practice -- Powerful ideas -- A teacher's perspective -- Coding stages -- A window into their world : the missing audience -- Coding character -- The narrative approach : moral identities -- The reasoning approach : moral thought -- The experiential approach : a moral life -- The values in coding as another language -- A window into Their world : the best use of her time -- The palette of virtues -- The coding playground -- The ten virtues -- Curiosity -- Open-mindedness -- perseverance -- Patience -- Optimism -- Honesty -- Fairness -- Generosity -- Gratitude -- Forgiveness -- Coding a Mensch -- A window into their world : the learning family -- Coding bridges -- The hidden curriculum -- My four powerful ideas : a summary -- A window into their world : A diversity of approaches…”
Libro -
655Publicado 2007Tabla de Contenidos: “…Sample Scenario of STP Election Process -- STP Topology Changes -- Per VLAN Spanning Tree Plus -- MAC Address Allocation and Reduction -- STP and IEEE 802.1Q Trunks -- Configuring the Basic Parameters of PVST+ -- Configuring the Root Bridge -- Configuring Port Cost -- Verifying the STP Configuration -- Rapid Spanning Tree Protocol -- RSTP Port States -- RSTP Port Roles -- RSTP BPDU Format and BPDU Handling -- Rapid Transition to Forwarding -- RSTP Topology Change Mechanism -- Compatibility with 802.1D -- Multiple Spanning Tree -- PVST+ Case -- 802.1Q Case -- MST Case -- MST Regions -- IST Instances -- MST Instances -- Configuring Basic Parameters of MST -- Study Tips -- Summary -- Configuration Exercise: Configuring and Verifying Spanning-Tree Bridge Priorities and Spanning-Tree Port Cost -- Required Resources -- Exercise Objective -- Network Diagram -- Command List -- Task 1: Configure and Verify Spanning Tree Root and Backup Bridges and STP Priorities -- Task 2: Configure and Verify Spanning Tree Port Cost -- Task 3: Identifying STP Topology Changes -- Review Questions -- Chapter 6 Adding Resiliency to Spanning Tree Using Advanced Features and Troubleshooting STP Issues -- Enhancements to 802.1D Spanning Tree Protocol -- PortFast -- UplinkFast -- BackboneFast -- Improving Spanning-Tree Resiliency -- BPDU Guard -- BPDU Filtering -- Root Guard -- Preventing Forwarding Loops and Black Holes -- Loop Guard -- Comparison Between Aggressive Mode UDLD and Loop Guard -- Troubleshooting STP -- Potential STP Problems -- Troubleshooting Methodology for STP Problems -- Know the Network -- Identify a Bridging Loop -- Restore Connectivity -- Check Port Status -- Look for Resource Errors -- Disable Unneeded Features -- Study Tips -- Summary -- Configuration Exercise: Configuring BackboneFast, UplinkFast, Root Guard, and PortFast -- Required Resources…”
Libro electrónico -
656Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Robotics 101 -- The hardware arsenal -- Setting up Raspberry Pi -- Let's program -- Playing with voltage -- Summary -- Chapter 2: Using GPIOs as Input -- A deeper dive into GPIOs -- Interfacing the PIR sensor -- Interfacing the ultrasonic proximity sensor -- Interfacing through I2C -- Summary -- Chapter 3: Making a Gardener Robot -- Working with solenoids -- Making the robot -- Making it more intelligent -- Making it truly intelligent -- Summary -- Chapter 4: Basics of Motors -- The basics -- Getting it rolling -- Changing the speed -- Summary -- Chapter 5: Making a Pet Feeding Robot -- Force measurement -- Constructing the robot -- Making the robot detect pets -- Summary -- Chapter 6: Bluetooth-Controlled Robotic Car -- Basics of the vehicle -- Getting the vehicle ready -- Controlling the vehicle by Bluetooth -- Summary -- Chapter 7: Sensor Interface for Obstacle Avoidance -- Infrared proximity sensor -- Autonomous emergency braking -- Giving the car self-steering capabilities -- Making it fully autonomous -- Summary -- Chapter 8: Making Your Own Area Scanner -- Servo motor -- Lists -- Looking around -- LIDAR on an autonomous vehicle -- Summary -- Chapter 9: Vision Processing -- The basics of images -- Preparing Raspberry Pi for vision processing application -- Image recognition -- Summary -- Chapter 10: Making a Guard Robot -- Face detection -- Knowing the face -- Recognizing the face -- Making the guard robot -- Summary -- Chapter 11: Basic Switching -- Making Jarvis wake you up -- Working with relay and PIR sensor -- Making the alarm irritating -- Making it even more irritating -- Summary -- Chapter 12: Recognizing Humans with Jarvis -- Turn on the light Jarvis -- Understanding motion -- Perfecting motion…”
Libro electrónico -
657Publicado 2015Tabla de Contenidos: “…Overriding Methods: Pirates are People, TooUsing super; Protecting the Kingdom with GuardDogs and FlyingMonkeys; Every GuardDog Has His Day ; Once More, with Feeling!…”
Libro electrónico -
658Publicado 2015Tabla de Contenidos: “…The print server role securityPrint server access mechanisms; The printer driver security and installation; Print server and share permissions; Hyper-V servers; Applying baseline security; Securing the access mechanism; Guard protection; Enabling the guard protection; Encrypting Hyper-V host servers; Internet Information Services; Applying baseline security; Securing web server components; Securing the access mechanisms; Adding dynamic IP restrictions; Summary; Chapter 5: Network Service Security; Baseline policies; Installing RODCs; Configuring RODCs; Domain Name System…”
Libro electrónico -
659por Greenwald, RickTabla de Contenidos: “…Information Lifecycle Management and ILM AssistantBackup and Recovery; Incremental backup and recovery; Oracle Secure Backup; Database Availability; Data Guard; Fail Safe; Oracle Real Application Clusters; Data Guard and RAC; Automated Storage Management; Real Application Testing Option; Database Security Features; Label Security Option; Database Vault Option; Audit Vault Server; Oracle Development Tools; Oracle SQL Developer; Oracle Forms Developer; Oracle Reports Developer; Oracle Designer; Oracle Discoverer Administration Edition; Oracle Portal; Embedded Databases; Oracle Berkeley DB…”
Publicado 2008
Libro electrónico -
660por Prowell, Stacy J.Tabla de Contenidos: “…Spanning Tree AttacksLayers of the Internet; Understanding the Spanning Tree Protocol; The Problem of Loops; Solving the Loop Problem with the Spanning Tree Protocol; How Spanning Tree Attacks Work; Capturing BPDU Traffic; Taking over the Root Bridge; Denial of Service; Man in the Middle; Forging BPDU Frames; Discovering the Network; Dangers of Spanning Tree Attacks; Defending against Spanning Tree Attacks; Disable STP; Root Guard and BPDU Guard; The Future of Spanning Tree Attacks; Summary; Endnotes; Chapter 6. …”
Publicado 2010
Libro electrónico