Mostrando 861 - 880 Resultados de 1,227 Para Buscar '"Guard"', tiempo de consulta: 0.10s Limitar resultados
  1. 861
    por Shieh, William
    Publicado 2009
    Tabla de Contenidos: “…2.3.4 Spectral Efficiency for Optical OFDM2.3.5 Cross-Channel OFDM: Multiplexing without Guard Band; 2.3.6 Complex and Real Representations of an OFDM Signal; 2.4 Peak-to-Average Power Ratio of OFDM Signals; 2.5 Frequency Offset and Phase Noise Sensitivity; References; Chapter 3: Optical Communication Fundamentals; 3.1 Introduction; 3.2 Key Optical Components; 3.2.1 Optical Transmitters; 3.2.2 Optical Receivers; 3.2.3 Optical Fibers; 3.2.4 Optical Amplifiers; 3.2.5 Other Optical Components; 3.3 Noise Sources; 3.3.1 Mode Partition Noise; 3.3.2 Reflection-Induced Noise…”
    Libro electrónico
  2. 862
    Publicado 2015
    Tabla de Contenidos: “…System Controls; 3.8. Safety and Guarding; 3.9. Summary; Chapter 4: Typical Applications; Chapter Contents; 4.1. …”
    Libro electrónico
  3. 863
    por Lenk, John D.
    Publicado 1996
    Tabla de Contenidos: “…Chopper-Stabilized Op-Amp Design; 6.1 Amplifier Circuits; 6.2 Intermodulation Effects; 6.3 Capacitor Connections; 6.4 Output Clamp; 6.5 Clock Circuits; 6.6 Selection Capacitors; 6.7 Static Protection; 6.8 Avoiding Latchup; 6.9 Output Load; 6.10 Thermoelectric Effects; 6.11 Guarding; 6.12 Pin Compatibility; 6.13 Simplified Design of Basic Amplifier Circuits…”
    Libro electrónico
  4. 864
    Publicado 2018
    Tabla de Contenidos: “…-- The multiple-selection structure (switch) -- The expression is tested at the top of the loop (while) -- The expression is tested at the bottom of the loop (do...while) -- Iterate on each object's properties (for...in) -- Iterate values in an iterable (for...of) -- Counter-controlled repetition (for) -- Functions -- Classes -- Interfaces -- Namespaces -- Putting everything together -- Summary -- Chapter 2: Working with Types -- The TypeScript type system's characteristics -- The line between TypeScript and JavaScript -- Type inference -- Optional static type annotations -- Structural type system -- Core features of the TypeScript type system -- Union types -- Type aliases -- Intersection types -- Non-nullable types -- The --strict mode -- The typeof operator -- Type guards -- Custom type guards -- Control flow analysis -- Literal types -- Discriminated unions -- The never type -- Enumerations -- Object literals -- Weak types -- The keyof operator -- Index signature -- Local types -- Type casting -- Advanced features of the TypeScript type system -- Generic types -- Generic constraints -- Mapped types -- Lookup types -- Mapped type modifiers -- Conditional types…”
    Libro electrónico
  5. 865
    Publicado 2017
    Tabla de Contenidos: “…range - a collection of evenly spaced integers -- Starting value -- Step argument -- Not using range: enumerate() -- list in action -- Negative indexing for lists (and other sequences) -- Slicing lists -- Copying lists -- Shallow copies -- Repeating lists -- Finding list elements with index() -- Membership testing with count() and in -- Removing list elements by index with del -- Removing list elements by value with remove() -- Inserting into a list -- Concatenating lists -- Rearranging list elements -- Out-of-place rearrangement -- Dictionaries -- Copying dictionaries -- Updating dictionaries -- Iterating over dictionary keys -- Iterating over dictionary values -- Iterating over key-value pairs -- Membership testing for dictionary keys -- Removing dictionary items -- Mutability of dictionaries -- Pretty printing -- set - an unordered collection of unique elements -- The set constructor -- Iterating over sets -- Membership testing of sets -- Adding elements to sets -- Removing elements from sets -- Copying sets -- Set algebra operations -- Union -- Intersection -- Difference -- Symmetric difference -- Subset relationships -- Collection protocols -- Container protocol -- Sized protocol -- Iterable protocol -- Sequence protocol -- Other protocols -- Summary -- Chapter 6: Exceptions -- Exceptions and control flow -- Handling exceptions -- Handling multiple exceptions -- Programmer errors -- Empty blocks - the pass statement -- Exception objects -- Imprudent return codes -- Re-raising exceptions -- Exceptions are part of your function's API -- Exceptions raised by Python -- Catching exceptions -- Raising exceptions explicitly -- Guard clauses -- Exceptions, APIs, and protocols -- IndexError -- ValueError -- KeyError -- Choosing not to guard against TypeError -- Pythonic style - EAFP versus LBYL -- Clean-up actions -- Moment of zen…”
    Libro electrónico
  6. 866
    Publicado 2017
    Tabla de Contenidos: “…-- What is ActivatedRoute? -- Route Guards for access control -- Routing configuration design patterns -- Routing within AppModule -- Routing as a separate module at the app root level -- Routing within feature modules -- Creating a single page app (SPA)&amp -- #160 -- -- Lean root module -- Features as separate modules -- Auth module -- Doctor module -- Route Guards for controlled access -- Debugging Angular app -- Debugging Angular app using Firefox and Chrome -- Debugging Angular app using Augury -- Summary -- Chapter 8: Unit Testing with Angular Apps -- Introduction to unit testing -- Unit testing tools for Angular apps -- Jasmine -- Karma -- Protractor&amp -- #160…”
    Libro electrónico
  7. 867
    Publicado 2015
    Tabla de Contenidos: “…- a more complicated case -- In-depth explanation -- Hard disk for sale - beware of your contractors -- In-depth explanation -- Unauthorised domain links - it is easy to harm a company's reputation -- In-depth explanation -- The trusted guard who was not -- In-depth explanation -- Insider badmouthing -- In-depth explanation -- The software vulnerability that was not - a case of blackmail -- In-depth explanation -- Lessons learned -- Part 3 - A Sample Treatment Process -- Chapter 10: A Sample Treatment Process -- Step 1 Gather information -- Step 2 Determine extent and damage -- Step 3 Establish and conduct investigation -- Step 4 Determine mitigation -- Step 5 Implement mitigation -- Step 6 Follow up on investigation results -- Step 7 Determine degree of resolution achieved -- Abbreviations and Acronyms -- ITG Resources…”
    Libro electrónico
  8. 868
    por Prusinski, Ben
    Publicado 2011
    “…You’ll learn to configure highly-available environments involving GoldenGate, Real Application Clusters, and Data Guard. From installation to design to implementation and troubleshooting, Expert Oracle GoldenGate helps you master all aspects of using and applying Oracle GoldenGate as the replication tool of choice in your environment. …”
    Libro electrónico
  9. 869
    Chasing digital a playbook for the new economy
    Chasing Digital
    Chasing Digital
    Publicado 2018
    “…Incumbents of the old guard find themselves superseded by new, digitally-charged, data-fuelled organisations that leverage platform-based business models. …”
    Libro electrónico
  10. 870
    Publicado 2022
    Tabla de Contenidos: “…Migration considerations -- About the Zero-Downtime Migration tool -- Migrating on-premises database to Autonomous Database using ZDM -- Implementing migration to Autonomous Database using ZDM -- Installing and configuring ZDM software on a dedicated host -- Target Autonomous Database creation -- Generating an OCI API key pair in the pem format -- Installing the OCI CLI -- Preparing an SSH key pair -- Creating an Object Store bucket -- Creating an OCI user authentication token -- Keeping the same time zone -- Database character set -- Setting up the GoldenGate Microservices hub in the OCI marketplace -- Setting up the OCI CLI in the source database server for file transfer -- Preparing a ZDM response file for migration -- A dry run of ZDM -- Run the migration job -- Summary -- Questions -- Answers -- Chapter 4: ADB Disaster Protection with Autonomous Data Guard -- Overview and associated terminologies -- AuDG -- Local standby -- Remote standby (cross-region standby) -- Associated specifications in AuDG -- Region and roles specification -- RTO and RPO in an AuDG configuration -- Status and operation in AuDG -- Implementing AuDG -- Enabling AuDG -- Performing a manual switchover operation - local standby -- Performing a manual switchover operation - remote standby -- Disabling AuDG -- Leveraging OCI Events Service for AuDG operations -- Points to remember about AuDG -- Summary -- Questions -- Answers -- Further reading: -- Chapter 5: Backup and Restore with Autonomous Database in OCI -- Technical requirements -- Understanding the backup types -- Working with automated backup in the OCI portal -- Learning how to take a manual backup -- Restoring database backups -- Manual database backup using Data Pump -- Creating a dump set -- Creating a Data Pump backup directly to object storage -- Data Pump import backup -- Refreshing Autonomous Database schemas…”
    Libro electrónico
  11. 871
    Publicado 2023
    Tabla de Contenidos: “…-- (Re)introducing Vue Router -- Navigation guards -- Defaults and error pages -- Summary -- Part 4: Release and Deployment -- Chapter 11: Feature Flags -- Technical requirements -- An introduction to feature flags -- Feature flag configuration -- Use cases for using feature flags -- Installing the feature flag server -- The high-level architecture of feature flags -- Integration of the feature flag -- Web application -- Microservice integration -- Summary -- Chapter 12: Building Continuous Integration -- Technical requirements -- Importance of CI -- Setting up GitHub -- GitHub Actions -- Publishing Docker images -- Dockerfile -- GitHub Packages -- Publishing to GitHub Packages…”
    Libro electrónico
  12. 872
    por MODELS 2009
    Publicado 2009
    Tabla de Contenidos: “…-- (Meta-)Model Modeling and Management -- Modeling Modeling -- Representation and Traversal of Large Clabject Models -- Meta-model Pruning -- Quantitative Modeling with UML -- A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems -- Model Driven Performance Measurement and Assessment with MoDePeMART -- Security Analysis of a Biometric Authentication System Using UMLsec and JML -- Model Transformations and Constraints -- Automatically Discovering Hidden Transformation Chaining Constraints -- CSP(M): Constraint Satisfaction Problem over Models -- Parsing SBVR-Based Controlled Languages -- Model Management -- SLIM—A Lightweight Environment for Synchronous Collaborative Modeling -- Language-Independent Change Management of Process Models -- Requirements for Practical Model Merge – An Industrial Perspective -- UML in Practice and Quality Assurance -- Evaluating the Impact of UML Modeling on Software Quality: An Industrial Case Study -- Concern Visibility in Base Station Development – An Empirical Investigation -- Influencing Factors in Model-Based Testing with UML State Machines: Report on an Industrial Cooperation -- Formalization of Model Transformations -- Towards Composite Model Transformations Using Distributed Graph Transformation Concepts -- On-the-Fly Construction, Correctness and Completeness of Model Transformations Based on Triple Graph Grammars -- Formal Support for QVT-Relations with Coloured Petri Nets -- Scenario Modeling -- An Example Is Worth a Thousand Words: Composite Operation Modeling By-Example -- Refactoring-Safe Modeling of Aspect-Oriented Scenarios -- Model-Based Testing Using LSCs and S2A -- Business Application Development -- Model Driven Development of Graphical User Interfaces for Enterprise Business Applications – Experience, Lessons Learnt and a Way Forward -- Business Process Models as a Showcase for Syntax-Based Assistance in Diagram Editors -- Rule-Enhanced Business Process Modeling Language for Service Choreographies -- Model Synchronisation and Change Propagation -- Change-Driven Model Transformations -- An Incremental Algorithm for High-Performance Runtime Model Consistency -- Traceability-Based Change Awareness -- Keynote 2 -- Interaction Design and Model-Driven Development -- Language Specification and Annotation -- Towards Test-Driven Semantics Specification -- Scalable Semantic Annotation Using Lattice-Based Ontologies -- OntoDSL: An Ontology-Based Framework for Domain-Specific Languages -- Domain-Specific Languages -- Domain-Specific Languages in Practice: A User Study on the Success Factors -- Evaluating Context Descriptions and Property Definition Patterns for Software Formal Validation -- Anatomy of a Visual Domain-Specific Language Project in an Industrial Context -- Model-Based Analysis -- A Goal-Based Modeling Approach to Develop Requirements of an Adaptive System with Environmental Uncertainty -- A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation -- Polymorphic Scenario-Based Specification Models: Semantics and Applications -- Model (De-)Composition and Abstractio -- Aspect Model Unweaving -- Model Composition Contracts -- Abstracting Complex Languages through Transformation and Composition -- An Approach for Evolving Transformation Chains -- Distributed Software Development -- Deterministic UML Models for Interconnected Activities and State Machines -- Automated Encapsulation of UML Activities for Incremental Development and Verification -- Using UML Statecharts with Knowledge Logic Guards -- Service and Business Process Integration -- A Modeling Language for Activity-Oriented Composition of Service-Oriented Software Systems -- A Domain Specific Modeling Language Supporting Specification, Simulation and Execution of Dynamic Adaptive Systems -- Executable Domain Specific Language for Message-Based System Integration -- Keynote 3 -- Architectural Mining: The Other Side of the MDD -- Genericity and Constraints -- Generic Model Refactorings -- Constraining Type Parameters of UML 2 Templates with Substitutable Classifiers -- Generating Assertion Code from OCL: A Transformational Approach Based on Similarities of Implementation Languages -- OCLLib, OCLUnit, OCLDoc: Pragmatic Extensions for the Object Constraint Language -- Variability Management -- Variability within Modeling Language Definitions -- Variability Modelling throughout the Product Line Lifecycle -- Weaving Variability into Domain Metamodels -- Automatic Domain Model Migration to Manage Metamodel Evolution -- Model Transformation Engineering -- Model Transformation by Demonstration -- Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets -- Incremental Development of Model Transformation Chains Using Automated Testing -- Test-Driven Development of Model Transformations -- Symposium -- Educators’ Symposium at MODELS 2009.…”
    Libro electrónico
  13. 873
    Publicado 2009
    Tabla de Contenidos: “…State Machines and C++ Exception Handling; 3.7.3. Implementing Guards and Choice Pseudostates; 3.7.4. Implementing Entry and Exit Actions; 3.8. …”
    Libro electrónico
  14. 874
    por Loshin, Pete
    Publicado 2013
    Tabla de Contenidos: “…; Introduction; 1 Using Gnu Privacy Guard; 1.1 Keeping Data Secret, for a Novice GnuPG User; 1.2 The Simplest Example: GnuPG Symmetric Encrypting Text; 1.3 Decrypting a File (Symmetric Key); 1.4 Encrypting Interactively; 1.5 ASCII Armor; 1.6 Command Summary and Review; 1.7 Review Questions…”
    Libro electrónico
  15. 875
  16. 876
    Publicado 2021
    Tabla de Contenidos: “…-- Prerequisites -- Configure GuardDuty to Detect Privilege Escalation -- Reviewing the Findings -- How Do You Detect Credential Access? …”
    Libro electrónico
  17. 877
    por Birt, Nate
    Publicado 2023
    Tabla de Contenidos:
    Libro electrónico
  18. 878
    Publicado 2018
    Tabla de Contenidos: “…Providing a project navigation -- Recap -- One editor to rule them all -- Creating an editor component -- Integrating the editor component -- Recap -- Dealing with users -- User service -- User area component -- Integrating the user area component -- Building a commenting system -- Introducing a model for comments -- Building the comment component -- Building the comments component -- Integrating the commenting system into projects -- Recap -- Summary -- Chapter 5: Component-Based Routing -- An introduction to the Angular router -- Composition using the router -- Routing with container components -- Router configuration -- Back to the routes -- Composing projects using the router -- Child routes for project details -- Guarding our projects -- Summary -- Chapter 6: Keeping up with Activities -- Creating a service for logging activities -- Logging activities -- Leveraging the power of SVG -- Styling SVG -- Building SVG components -- Building an interactive activity slider component -- Projection of time -- Rendering activity indicators -- Bringing it to life -- Recap -- Building the activity timeline -- Summary -- Chapter 7: Components for User Experience -- Tag management -- A model for our tags -- Creating a tags service -- Rendering tags -- Integrating tags using a pipe -- Supporting tag input -- Creating a tag input directive -- Creating a tags select component -- Integrating tag selection within the editor component -- Integrating tag selection in project comments -- Finishing up our tagging system -- Drag and drop -- Updating our model for ordering tasks -- Implementing the draggable directive -- Implementing a drop target directive -- Integrating drag and drop -- Recapitulate on drag and drop -- Summary -- Chapter 8: Time Will Tell -- Task details -- Navigating to task details -- Enabling tags for tasks -- Managing efforts…”
    Libro electrónico
  19. 879
    por Di Gennaro, Davide. author
    Publicado 2015
    Tabla de Contenidos: “…Preprocessor; 1.7.1. Include Guards; 1.7.2. Macro Expansion Rules; Chapter 2: Small Object Toolkit; 2.1. …”
    Libro electrónico
  20. 880
    Publicado 2020
    Tabla de Contenidos: “…Laravels Dump-Server -- Testen -- TL -- DR -- Kapitel 9: Authentifizierung und Autorisierung -- User-Modell und -Migration -- Verwendung des globalen auth()-Helfers und der Auth-Fassade -- Die Auth-Controller -- Auth::routes() -- Das Auth-Gerüst -- »Remember Me«: Die Erinnerungsfunktion -- Manuelle Authentifizierung von Benutzern -- Manuelles Abmelden eines Benutzers -- Auth-Middleware -- E-Mail-Verifizierung -- Blade-Direktiven zur Authentifizierung -- Guards -- Authentifizierungs-Ereignisse -- Autorisierung (ACL) und Rollen -- Testen -- TL -- DR -- Kapitel 10: Request, Response und Middleware -- Der Lebenszyklus des Request-Objekts -- Das Request-Objekt -- Das Response-Objekt -- Laravel und Middleware -- Vertrauenswürdige Proxys -- Testen -- TL -- DR -- Kapitel 11: Der Container -- Eine kurze Einführung in die Injektion von Abhängigkeiten -- Abhängigkeitsinjektion und Laravel -- Der globale Helfer app() -- Wie ist der Container verdrahtet? …”
    Libro electrónico