Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer programs 80
- Engineering & Applied Sciences 60
- Application software 50
- Development 49
- Computer Science 44
- Operating systems (Computers) 38
- Computer security 37
- Microsoft Excel (Computer file) 36
- Business 34
- Data processing 34
- Security measures 34
- Design 31
- JavaScript (Computer program language) 31
- Programming 31
- Electronic spreadsheets 30
- Computer graphics 29
- Digital techniques 28
- Photography 28
- Computer networks 26
- Computer programming 26
- Java (Computer program language) 24
- Web site development 24
- Web sites 21
- Database management 20
- Image processing 19
- Computer software 18
- Mac OS 18
- Microsoft Windows (Computer file) 18
- Python (Computer program language) 18
- Macintosh (Computer) 17
-
401Publicado 2018Tabla de Contenidos:Libro electrónico
-
402Publicado 2011Tabla de Contenidos: “…16 Meeting Others in Groups -- Understanding Facebook Groups -- Finding and Joining Groups -- Viewing Your Groups-and Your Friends' Groups -- Participating in a Group -- Creating Your Own Group -- 17 Networking for Business-and for Jobs -- Understanding Facebook Networks -- Joining Your Work Network -- Networking Professionally -- Job Hunting on Facebook -- 18 Finding Fun Games and Applications -- Understanding Facebook Applications -- Discovering Applications and Games -- Using an Application or Game -- Viewing and Managing Your Applications-and Those Your Friends Are Using -- Apps for Grown-Ups -- 19 Using Facebook on the Go -- Connecting from Your iPhone -- Connecting from Other Smartphones -- Connecting via Text Message -- 20 Buying and Selling in the Facebook Marketplace -- Understanding the Facebook Marketplace -- Shopping for Something to Buy -- Selling Your Own Stuff -- Part VI: Basic Facebook Housekeeping Chores -- 21 Keeping Some Things Private -- Understanding Facebook Privacy -- Changing Facebook's Privacy Settings -- Hiding Your Information from Other Websites -- Removing Unwanted Fan Pages -- What to Keep Private-and What to Share -- 22 Managing Your Facebook Account -- Changing Account Settings -- Controlling When and How Facebook Contacts You -- Leaving Facebook -- Index…”
Libro electrónico -
403Publicado 2022Tabla de Contenidos: “…-- Isolation in Cloud Native Applications -- Applying Isolation to Software Design -- Separation of Concern -- Applying SoC to Software Design -- Use Layering -- Layering in Traditional Application -- Layering in Cloud Native Application -- Applying Layering to Software Design -- Information Hiding -- Why Information Hiding? -- Applying Information Hiding to Software Design -- You Aren't Gonna Need It -- Idea of YAGNI -- How to Decide What You Need -- SOLID Design Principles -- Single Responsibility Principle -- Applying Single Responsibility to Microservice Design -- Open-Closed Principle -- Applying Open-Closed to Microservices -- Liskov Substitution Principle -- Applying Liskov Substitution to Microservices Design -- Interface Segregation Principle -- Dependency Inversion Principle -- Summary -- Chapter 4: Cloud Native Architecture and Design Patterns -- Evolution of Design Patterns -- What Are Software Patterns? …”
Libro electrónico -
404Publicado 2010Tabla de Contenidos:Libro electrónico
-
405Publicado 2022Tabla de Contenidos: “…Reference -- Casting Objects -- The instanceof Operator -- Polymorphism and Method Overriding -- Overriding vs. Hiding Members -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Lambdas and Functional Interfaces -- Writing Simple Lambdas -- Looking at a Lambda Example -- Learning Lambda Syntax -- Coding Functional Interfaces -- Defining a Functional Interface -- Adding Object Methods…”
Libro electrónico -
406por Walker, Jon, 1958-Tabla de Contenidos: “…t Murdered Anyone""; ""Desire Must Be Welded to Love""; ""Grace and Obedience Are Inseparable""; ""Follow Jesus, not Lists""; ""It Takes Faith to Be Faithful""; ""Our Despair Prepares Us for Grace""; ""The Whole Truth on Display""; ""When We Hide the Truth, It Is a Faith Issue""; ""We Are Character Witnesses""; ""The Right to Revenge""; ""Jesus Never Ignored Evil""; ""Redemption, Not Retribution""; ""No More Tit-for-Tat""; ""Love Defined in Uncompromising Terms""…”
Publicado 2010
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
407Publicado 2019Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Part 1 Cybersecurity Concept -- 1 Introduction on Cybersecurity -- 1.1 Introduction to Cybersecurity -- 1.2 Cybersecurity Objectives -- 1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) -- 1.4 Cybersecurity Roles -- 1.5 Cybercrimes -- 1.5.1 Overview -- 1.5.2 Traditional Computer Crime and Contemporary Computer Crime -- 1.5.3 Combating Crimes -- 1.5.3.1 Securing Networks -- 1.5.3.2 Incident Response Team -- 1.5.3.3 Detecting Malware -- 1.5.3.4 Authentication and Authorization -- 1.5.3.5 Filtering -- 1.5.3.6 Best Practices -- 1.6 Security Models -- 1.7 Computer Forensics -- 1.8 Cyber Insurance -- 1.8.1 Digital Citizenship -- 1.8.2 Information Warfare and Its Countermeasures -- 1.8.3 Network Neutrality -- 1.8.4 Good Practices and Policies -- 1.8.5 Cybersecurity and Human Rights -- 1.9 Future of Cybersecurity -- 1.10 Conclusion -- References -- 2 Steganography and Steganalysis -- 2.1 Introduction -- 2.2 Steganography -- 2.2.1 Method for Evaluating Hidden Information Schema Security -- 2.2.2 Peak Signal-to-Noise Ratio -- 2.3 Steganalysis -- 2.3.1 Blind Detection Based on LSB -- 2.3.1.1 Standard Deviation Analysis -- 2.3.1.2 Statistical Method X2 with a Degree of Freedom -- 2.3.1.3 Analyzing the Gray Ratio between Any Image and Image Set Up as \Landmark -- 2.3.1.4 Estimating Information Concealed in an Image -- 2.3.2 Constraint Steganalysis -- 2.3.2.1 HKC Hiding Technique -- 2.3.2.2 DIH Technique -- 2.3.2.3 IWH Hiding Technique -- 2.3.2.4 RVH Hiding Technique ( Hiding in Two Phases) -- 2.4 Conclusion -- References -- 3 Security Threats and Vulnerabilities in E-business -- 3.1 Introduction to e-Business -- 3.1.1 Benefits of e-Business -- 3.1.2 Business Revolution…”
Libro electrónico -
408Publicado 2010Tabla de Contenidos: “…Copying and Moving Text -- Changing Fonts -- Changing Font Size -- Text Leading -- Text Kerning -- Text Tracking -- Scaling or Skewing Text -- Aligning Paragraphs -- Indenting and Spacing Paragraphs -- Creating a Drop Cap -- Applying a Paragraph Rule -- Adding Bullets and Numbering -- Setting Tabs -- Working with Glyphs -- Inserting Special Text Characters -- Working with Hidden Text -- Setting Text Frame Options -- Creating Columns -- Wrapping Text Around an Object -- Creating Type Outlines -- Adding Page Numbers to Continued Text -- 5 Placing and Working with Graphics -- Placing Graphics -- Placing Graphics with Options -- Setting Place Import Options -- Placing Multiple Graphics -- Placing Graphics from Adobe Bridge -- Adding Captions to Graphics -- Copying or Moving Graphics -- Using the Links Panel -- Managing Linked Graphics -- Editing a Linked Graphic -- Displaying XMP Graphic Information -- Creating Specialty Frames for Graphics -- Selecting and Moving Frames and Graphics -- Fitting Graphics in Frames -- Nesting Graphics in Frames -- Formatting Graphics in Frames -- Controlling Graphics Display Performance -- 6 Working with Objects and Layers -- Creating Shapes -- Creating Lines -- Creating Multiple Objects in a Grid -- Using the Selection Tool -- Using the Direct Selection Tool -- Resizing Objects -- Moving Objects -- Duplicating Objects -- Grouping and Combining Objects -- Aligning Objects -- Distributing Objects -- Arranging Object Stack Order -- Transforming Objects -- Repeating Object Transformations -- Using the Free Transform Tool -- Scaling Objects -- Shearing Objects -- Rotating Objects -- Locking and Unlocking Objects -- Hiding and Showing Objects -- Creating Inline Objects -- Creating Anchored Objects -- Creating and Deleting Object Layers -- Setting Layer Options -- Showing and Hiding Layers and Objects…”
Libro electrónico -
409por Rosen-Zvi, IshayTabla de Contenidos: “…Introduction: The Enigma of Tractate Sotah; Temple and gender: Sotah as a case study; Micro-cultural criticism; The structure of the study; Part One Textual Studies; Chapter One Warning and Hiding, Sotah 1:2; I. How does he warn her?; "The spirit of jealousy comes upon him": Grounds for warning; "No warning"; II. …”
Publicado 2012
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
410por Charleston ConferenceTabla de Contenidos: “…""Cover""; ""Copyright""; ""Contents""; ""Preface""; ""Introduction""; ""Plenary Sessions""; ""The Semantic Web for Publishers and Libraries""; ""Data Papers in the Network Era""; ""Everything We See Hides Another: Coping with Hidden Collections in the 21st Century Library""; ""The Digital Public Library of America: The Idea and Its Implementation""; ""New Initiatives in Open Research""; ""Executives' Roundtable: The Boundaries are Getting Blurred""; ""I Hear the Train A Comin""; ""The Long Arm of the Law""; ""The Future of Online Newspapers""; ""The Status Quo Has Got to Go""…”
Publicado 2012
Libro electrónico -
411por Schwartz, JordanTabla de Contenidos: “…Creating Texture with Fabric ElementsSculpting with Fabric Elements; Rubber Elements; Building with Rubber Tires; Building with Rubber Bands; Creating Texture with Plastic Elements; Chapter 6: Dynamic Sculpting; Organic Models; Bows, Slopes, and Wedges; Flexible Elements; Bruce Lowell on the Lowell Sphere; Stylized Models; Tyler Clites on Creating a Style; Chapter 7: Composition; Lighting; Hiding the Battery Box; Unofficial Lighting Solutions; Silhouettes; Perspective; Color; Basic Rules; Mixing Shades; Advanced Designs; Chapter 8: Wildlife & Foliage; Animals; Articulation; Achieving Realism…”
Publicado 2014
Libro electrónico -
412Publicado 2022Tabla de Contenidos:Libro electrónico
-
413por Sunderaraman, Prabhu. authorTabla de Contenidos: “…""Methods in Ext.Component""""up""; ""enable, disable""; ""show, hide""; ""destroy""; ""on, un""; ""addEvents, fireEvent""; ""Events in Ext.Component""; ""xtype""; ""Ext.container.Container""; ""Configuration Attributes of Ext.container.Container""; ""items""; ""layout""; ""defaults""; ""Some Methods in Container class.Methods of Ext.container.Container""; ""add""; ""doLayout""; ""down""; ""remove""; ""Events of Ext.container.Container""; ""Container Controls""; ""Ext.panel.Panel""; ""Ext.window.Window""; ""Ext.menu.Menu""; ""Ext.tab.Panel""; ""Ext.form.Panel""; ""Ext.toolbar.Toolbar""…”
Publicado 2013
Libro electrónico -
414Publicado 2015Tabla de Contenidos: “…Evading a Simple Signature-Based Detection with the Divide and Conquer TrickBinary Instrumentation and Taint Analysis; Summary; Chapter 7 Evading Signatures; File Formats: Corner Cases and Undocumented Cases; Evading a Real Signature; Evasion Tips and Tricks for Specific File Formats; PE Files; JavaScript; String Encoding; Executing Code on the Fly; Hiding the Logic: Opaque Predicates and Junk Code; PDF; Summary; Chapter 8 Evading Scanners; Generic Evasion Tips and Tricks; Fingerprinting Emulators; Advanced Evasion Tricks; Taking Advantage of File Format Weaknesses…”
Libro electrónico -
415por Nelli, Fabio. authorTabla de Contenidos: “…""Chaining Methods""""jQuery and the DOM""; ""The ready() Method""; ""Traversing the DOM with Selections""; ""Create and Insert New Elements""; ""Remove, Hide, and Replace Elements""; ""jQuery UI: Widgets""; ""Accordion""; ""Tab""; ""Button""; ""Combo Box""; ""Menu""; ""Slider""; ""Progress Bar""; ""Concluding Thoughts on the jQuery Library""; ""Summary""; ""Chapter 3: Introducing jqPlot""; ""The jqPlot library""; ""Including Basic Files""; ""Plot Basics""; ""Adding a Plot Container""; ""Creating the Plot""; ""Using jqPlot Plug-ins""; ""Understanding jqPlot Options""; ""Inserting Options""…”
Publicado 2014
Libro electrónico -
416Tabla de Contenidos: “…Using Mutable Records Avoiding Aliasing ; Using Mutable let Bindings ; Hiding Mutable Data ; Working with Arrays ; Generating and Slicing Arrays; Two-Dimensional Arrays ; Introducing the Imperative .NET Collections ; Using Resizable Arrays ; Using Dictionaries ; Using Dictionary's TryGetValue ; Using Dictionaries with Compound Keys ; Some Other Mutable Data Structures ; Exceptions and Controlling Them; Catching Exceptions ; Using try . . . finally; Defining New Exception Types ; Having an Effect: Basic I/O; .NET I/O via Streams ; Some Other I/O-Related Types…”
Libro electrónico -
417Publicado 2016Tabla de Contenidos: “…; Chapter 2: Spirographs; Parametric Equations; Spirograph Equations; Turtle Graphics; Requirements; The Code; The Spiro Constructor; The Setup Functions; The restart() Method; The draw() Method; Creating the Animation; The SpiroAnimator Class; The genRandomParams() Method; Restarting the Program; The update() Method; Showing or Hiding the Cursor; Saving the Curves; Parsing Command Line Arguments and Initialization; The Complete Code; Running the Spirograph Animation; Summary; Experiments!…”
Libro electrónico -
418Publicado 2015Tabla de Contenidos: “…Scala's easy and breezy decorations - stackable modificationsDependencies injection pattern; A taste of the cake pattern; Sealed traits; Defeating the dreaded diamond; Summary; Chapter 6: Currying Favors with Your Code; Functions as first-class values; Roping in a scope; Local functions - hiding and biding their time; The underscore - Scala's Swiss army knife; A taste of the curry; Type inference; Of implicits and explicits; Stylish blocks; The loan pattern; Serving the curry; Frills and thrills - decorators again; Wrapping it up; Summary…”
Libro electrónico -
419Publicado 2016Tabla de Contenidos: “…Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Understanding Wireless Network Security and Risks ; Understanding wireless environment and threats; An overview of wireless technologies; An overview of wireless threats; Wi-Fi media specifics; Common WLAN protection mechanisms and their flaws; Hiding SSID; MAC filtering; WEP; WPA/WPA2; Pre-shared key mode; Enterprise mode; WPS; Getting familiar with the Wi-Fi attack workflow; General Wi-Fi attack methodology; The active attacking phase; WPA-PSK attacks…”
Libro electrónico -
420Publicado 2015Tabla de Contenidos: “…Abstract Classes and Abstract MembersHiding Inherited Members; Sealing Functions and Classes; The base Keyword; Constructors and Inheritance; Overloading and Resolution; The object Type; Boxing and Unboxing; Static and Runtime Type Checking; The GetType Method and typeof Operator; The ToString Method; Object Member Listing; Structs; Struct Construction Semantics; Access Modifiers; Examples; Friend Assemblies; Accessibility Capping; Restrictions on Access Modifiers; Interfaces; Extending an Interface; Explicit Interface Implementation; Implementing Interface Members Virtually…”
Libro electrónico