Mostrando 5,781 - 5,800 Resultados de 14,052 Para Buscar '"Knowing"', tiempo de consulta: 0.15s Limitar resultados
  1. 5781
    Publicado 2022
    Tabla de Contenidos: “…To Thine Own Self Be True -- Twitch Doesn't Believe in a Comfort Zone, and That's a Good Thing -- Twitch Opened Doors I Didn't Know Existed -- There Are a Lot of Good People in the World - Connect with Them -- Twitch Taught Me the Power of Community -- If You Have Something to Share, You Have to Make It Happen -- Twitch Proves the Power of Paying It Forward -- Chapter 17 Ten Final Thoughts from a TeeMonster on Twitch -- Five Lessons from Five Years -- Grow at your own pace -- Don't let life pass you by -- Stream fearlessly -- Make yourself your stream's top priority -- Stream because you love it -- Five Goals for the Streams to Come -- Don't define yourself by analytics -- A good mantra to focus on: My stream is a fun place to be -- Remember, there's no silver bullet to success -- To thine own self be true -- Partnership is not the endgame -- Index -- EULA…”
    Libro electrónico
  2. 5782
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Understanding the Fundamentals of Costs -- Chapter 1 So You Want to Know about Cost Accounting -- Comparing Accounting Methods -- Considering your shareholders -- Mulling over creditors -- Addressing concerns of regulators -- Using management accounting -- Fitting in cost accounting -- Using Cost Accounting to Your Advantage -- Starting with cost-benefit analysis -- Planning your work: Budgeting -- Controlling your costs -- Setting a price -- Improving going forward -- Chapter 2 Brushing Up on Cost Accounting Basics -- Understanding the Big Four Terms -- Comparing direct and indirect costs -- Mulling over fixed and variable costs -- Fitting the costs together -- Covering Costs in Different Industries -- Reviewing manufacturing costs -- Considering costs for retailers -- Adding up costs for e-commerce firms -- Finding costs most companies incur -- Why Are You Spending? …”
    Libro electrónico
  3. 5783
    Publicado 2023
    Tabla de Contenidos: “…SEO Planning -- Strategy Before Tactics -- The Business of SEO -- Ethical and Moral Considerations -- The Escape Clause -- Deciding on Accepting Work -- Typical Scenarios -- Startups (Unlaunched) -- Startups (Launched) -- Established Small Businesses -- Large Corporations -- Initial Triage -- Document Previous SEO Work -- Look for Black Hat SEO Efforts -- Watch for Site Changes That Can Affect SEO -- Identify Technical Problems -- Know Your Client -- Take Inventory of the Client's Relevant Assets -- Perform a Competitive Analysis -- Information Architecture -- SEO Content Strategy -- The Long Tail of Search -- Examples of Sites That Create Long-Tail Content -- Why Content Breadth and Depth Matter -- Can Generative AI Solutions Help Create Content? …”
    Libro electrónico
  4. 5784
    Publicado 2023
    Tabla de Contenidos: “…. -- Auditing database access -- Getting ready -- Auditing access -- Auditing SQL statements -- Auditing table access -- Managing the audit log -- Auditing data changes -- Always knowing which user is logged in -- Getting ready -- How to do it... -- How it works... -- There's more... -- Not inheriting user attributes -- Integrating with LDAP -- Getting ready -- How to do it... -- How it works... -- There's more... -- Setting up the client to use LDAP -- Replacement for the User Name Map feature -- See also -- Connecting using encryption (SSL / GSSAPI) -- Getting ready -- How to do it... -- How it works... -- There's more... -- Getting the SSL key and certificate…”
    Libro electrónico
  5. 5785
    Publicado 2024
    Tabla de Contenidos: “…. -- Summary -- Further reading -- Chapter 9: Acting Like a Designer - The Design Thinking Process in Application -- The Design Thinking process - stages, steps, and micro-learning cycles -- Exploring and understanding the five stages of Design Thinking -- The five discovery skills -- From process to methods -- The Design Methods - powerful ways to observe, study, and understand -- Categorizing the Design Methods -- Sequencing the Design Methods -- Applying the Design Methods -- A deeper look at the Observe Methods -- A deeper look at the Question Methods -- A deeper look at the Experiment Methods -- A deeper look at the Study Methods -- Embracing the value Design Methods offer -- Knowing how to select the right Design Methods to use -- Creating our Insights Plan -- Prototyping in Design Thinking - a critical element in the process -- Making prototyping inherent to how we operate in Design Thinking -- Understanding the different purposes of prototyping -- Two important considerations about prototyping -- Understanding the different types of prototypes -- Prototype application and fidelity -- When in doubt, prototype and test - the undeniable power of prototyping -- A little help - how Generative AI can help us -- As a resource for more comprehensive insights -- As a stimulus for enhanced imagination -- Not as a direct resource for novel ideation…”
    Libro electrónico
  6. 5786
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright -- Contents -- Preface -- Editor Biographies -- List of Contributors -- Chapter 1 Introduction to Social Engineering: The Human Element of Hacking -- 1.1 Introduction -- 1.1.1 Why Do We Need to Know about Social Engineering? -- 1.1.2 Open-Source Intelligence (OSINT) and Social Engineering -- 1.2 Impact of Social Engineering -- 1.2.1 Financial Losses -- 1.2.2 Loss of Productivity -- 1.2.3 Cyberattacks Cause Business Disruption -- 1.2.4 Loss of Reputation -- 1.3 Types of Social Engineering Attacks -- 1.3.1 Phishing Attacks -- 1.3.2 What Attributes Make Some People More Susceptible to Phishing Attacks than Others -- 1.3.3 Identification of a Social Engineering Attack -- 1.4 Use of AI in Social Engineering Attacks -- 1.4.1 Most Infamous Cases of Social Engineering -- 1.5 Conclusion -- Chapter 2 Social Engineering -- 2.1 Introduction -- 2.2 Related Work -- 2.3 Methodology -- 2.3.1 Reconnaissance -- 2.3.2 Planning -- 2.3.3 Building Trust -- 2.3.4 Exploitation -- 2.3.5 Exit/Escape -- 2.4 Discussion -- 2.5 Conclusion -- Chapter 3 Cybersecurity Risks, Vulnerabilities, and Countermeasures to Prevent Social Engineering Attacks -- 3.1 Introduction -- 3.2 Social Engineering and Its Role in Cyber-Theft -- 3.2.1 The Role of Social Engineering in Cyber-Theft -- 3.3 Vulnerabilities -- 3.3.1 Risks and Challenges -- 3.4 Current Cybersecurity Risks -- 3.4.1 Cybersecurity Challenges -- 3.4.2 Mitigating the Threat of Social Engineering -- 3.5 Conclusion -- Chapter 4 A Case Study on Packet Sniffers: Tools, Techniques, and Tactics -- 4.1 Introduction -- 4.2 Objective -- 4.3 Sniffing in a Wireless Network -- 4.4 Types of Sniffing Methods -- 4.4.1 Sniffing Can Be Done in Two Ways -- 4.5 Sniffing Uses -- 4.5.1 Ethical Uses -- 4.5.2 Unethical Uses -- 4.6 Sniffing Procedure -- 4.7 Use of Sniffer Tools -- 4.7.1 Ettercap Sniffer Tool…”
    Libro electrónico
  7. 5787
    Publicado 2017
    Tabla de Contenidos: “…. -- See also -- Getting to know check_postgres -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Installing and configuring collectd -- Getting ready -- How to do it... -- How it works... -- See also -- Adding a custom PostgreSQL monitor to collectd -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Installing and configuring Graphite -- Getting ready -- How to do it... -- How it works... -- See also -- Adding collectd data to Graphite -- Getting ready -- How to do it... -- How it works... -- See also -- Building a graph in Graphite -- Getting ready -- How to do it... -- How it works... -- There's more... -- Customizing a Graphite graph -- Getting ready -- How to do it... -- How it works... -- Creating a Graphite dashboard -- Getting ready -- How to do it... -- How it works... -- There's more...…”
    Libro electrónico
  8. 5788
    Publicado 2024
    Tabla de Contenidos: “…Adding an application to K8GB using custom resources -- Adding an application to K8GB using Ingress annotations -- Understanding how K8GB provides global load balancing -- Keeping the K8GB CoreDNS servers in sync -- Summary -- Questions -- Chapter 6: Integrating Authentication into Your Cluster -- Technical requirements -- Getting Help -- Understanding how Kubernetes knows who you are -- External users -- Groups in Kubernetes -- Service accounts -- Understanding OpenID Connect -- The OpenID Connect protocol -- Following OIDC and the API's interaction -- id_token -- Other authentication options -- Certificates -- Service accounts -- TokenRequest API -- Custom authentication webhooks -- Configuring KinD for OpenID Connect -- Addressing the requirements -- Using LDAP and Active Directory with Kubernetes -- Mapping Active Directory groups to RBAC RoleBindings -- Kubernetes Dashboard access -- Kubernetes CLI access -- Enterprise compliance requirements -- Pulling it all together -- Deploying OpenUnison -- Configuring the Kubernetes API to use OIDC -- Verifying OIDC integration -- Using your tokens with kubectl -- Introducing impersonation to integrate authentication with cloud-managed clusters -- What is Impersonation? …”
    Libro electrónico
  9. 5789
    Publicado 2002
    Tabla de Contenidos: “…Repeated Column Names in the GROUP BY Clause -- Grouping on Composite Columns -- Concatenated Groupings -- Concatenated groupings with GROUPING SETS -- ROLLUP and CUBE as arguments to GROUPING SETS -- The GROUPING_ID and GROUP_ID Functions -- GROUPING_ID -- GROUPING and GROUPING_ID in ORDER BY -- GROUP_ID -- Advanced Analytic SQL -- Analytic SQL Overview -- Ranking Functions -- RANK, DENSE_RANK, and ROW_NUMBER -- Handling NULLs -- Top/bottom N queries -- FIRST/LAST -- NTILE -- WIDTH_BUCKET -- CUME_DIST and PERCENT_RANK -- Hypothetical Functions -- Windowing Functions -- Working with Ranges -- FIRST_VALUE and LAST_VALUE -- LAG/LEAD Functions -- Reporting Functions -- Report Partitions -- RATIO_TO_REPORT -- Summary -- SQL Best Practices -- Know When to Use Specific Constructs -- EXISTS Is Preferable to DISTINCT -- WHERE Versus HAVING -- UNION Versus UNION ALL -- LEFT Versus RIGHT OUTER JOIN -- Avoid Unnecessary Parsing -- Using Bind Variables -- Using Table Aliases -- Consider Literal SQL for Decision-Support Systems -- XML -- What Is XML? …”
    Libro electrónico
  10. 5790
    Publicado 2013
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- About the Author -- About the Technical Editor -- Contents at a Glance -- Contents -- Acknowledgments -- Introduction -- What This Book Covers -- Chapter 1: Introduction to JavaScript -- What You Need to Know -- Basic HTML and CSS Knowledge -- Basic Text Editor and Web Browser Knowledge -- Which Version? …”
    Libro electrónico
  11. 5791
    Publicado 2018
    Tabla de Contenidos: “…Understanding the draw method and the SurfaceView class -- The game loop -- Threads -- Problems with threads -- Java try, catch exception handling -- Implementing the game loop with a thread -- Implementing Runnable and providing the run method -- Coding the thread -- Starting and stopping the thread -- Activity lifecycle -- A simplified explanation of the Android lifecycle -- Lifecycle phases: What we need to know -- Lifecycle phases: What we need to do -- Using the Activity lifecycle to start and stop the thread -- Coding the run method -- Running the game -- Summary -- Chapter 10: Coding the Bat and Ball -- The Ball Class -- Communicating with the game engine -- Representing rectangles and squares with RectF -- Coding the variables -- Coding the Ball constructor -- Coding the RectF getter method -- Coding the Ball update method -- Coding the Ball helper methods -- Coding a realistic-ish bounce -- Using the Ball class -- The Bat class -- Coding the Bat variables -- Coding the Bat constructor -- Coding the Bat helper methods -- Coding the Bat's update method -- Using the Bat Class -- Coding the Bat input handling -- Running the game -- Summary -- Chapter 11: Collisions, Sound Effects and Supporting Different Versions of Android -- Handling collisions -- Collision detection options -- Rectangle intersection -- Radius overlapping -- Crossing number algorithm -- Optimizations -- Multiple hitboxes -- Neighbour checking -- Best options for Pong -- The RectF intersects method -- Handling different versions of Android -- Detecting the current Android version -- The Soundpool class -- Initializing SoundPool the new way -- Java Method chaining explained -- Back to initializing SoundPool (the new way) -- Initializing SoundPool the old way -- Loading sound files into memory -- Playing a sound -- Stopping a sound -- Generating sound effects…”
    Libro electrónico
  12. 5792
    Publicado 2010
    Tabla de Contenidos: “…-- Coming to Terms: Specification, Representation, Description, Documentation -- P.2.2 Uses and Audiences for Architecture Documentation -- P.2.3 Architecture Documentation and Quality Attributes -- P.2.4 Economics of Architecture Documentation -- P.2.5 The Views and Beyond "Method" -- P.2.6 Views and Beyond in an Agile Environment -- P.2.7 Architectures That Change Faster Than You Can Document Them -- P.3 Architecture Views -- Coming to Terms: A Short History of Architecture Views -- P.4 Architecture Styles -- P.4.1 Three Categories of Styles -- Coming to Terms: Module, Component -- Coming to Terms: "Architecture Style" and "Architecture Pattern" -- P.5 Seven Rules for Sound Documentation -- Perspectives: Beware Notations Everyone "Just Knows" -- Perspectives: Quivering at Arrows -- P.6 Summary Checklist -- P.7 Discussion Questions -- P.8 For Further Reading -- Part I: A Collection of Software Architecture Styles -- I.1 Three Categories of Styles -- I.2 Style Guides: A Standard Organization for Explaining a Style -- I.3 Choosing Which Element and Relation Properties to Document -- I.4 Notations for Architecture Views -- I.5 Examples -- Chapter 1 Module Views -- 1.1 Overview -- 1.2 Elements, Relations, and Properties of Module Views -- 1.3 What Module Views Are For -- 1.4 Notations for Module Views…”
    Libro electrónico
  13. 5793
    Publicado 2012
    Tabla de Contenidos: “…Controller Based -- SSID, BSSID, MAC Address -- Beacons and Broadcasts -- Associating and Authenticating -- Encryption -- We've Covered -- The 11 security principles -- Wireless networking basic concepts -- Chapter 2: Wireless Tools and Gadgets -- We'll Cover -- A Lab of Your Own -- Client Devices -- Phones -- Printers -- Access Points -- DD-WRT -- WRT54G -- Apple Airport Express -- Mini Access Points -- Mobile Hotspots -- Smartphones -- Enterprise-Grade Access Points -- Antennas -- Types of Antennas -- Gadgets -- GPS -- Smartphones and PDAs -- Pocket Wireless Scanners -- Spectrum Analyzer -- Operating System of Choice -- We've Covered -- Creating a lab environment -- Client devices -- Access points -- Antennas -- Wireless gadgets -- Choosing a wireless operating system -- Part II: Know Thy Enemy…”
    Libro electrónico
  14. 5794
    Publicado 2012
    Tabla de Contenidos: “…-- How to Pass the CompTIA A+ Exams -- Historical/Conceptual -- Chapter Review -- Questions -- Answers -- Chapter 2 Operational Procedures -- 801 -- The Professional Tech -- Appearance -- The Traits of a Tech -- Communication -- Assertive Communication -- Respectful Communication -- Eliciting Answers -- Expectations and Follow-up -- Safety and Tools -- Electrostatic Discharge (ESD) -- Anti-static Tools -- Electromagnetic Interference (EMI) -- Radio Frequency Interference (RFI) -- Physical Safety -- Tools of the Trade -- Chapter Review -- Questions -- Answers -- Chapter 3 The Visible PC -- Historical/Conceptual -- How the PC Works -- Input -- Processing -- Output -- Storage -- The Art of the PC Technician -- 801 -- The Complete PC -- External Connections -- Devices and Their Connectors -- Inside the System Unit -- Case -- CPU -- RAM -- Motherboard -- Power Supply -- Floppy Drive -- Hard Drive -- Optical Drives -- Know Your Parts -- Chapter Review -- Questions -- Answers -- Chapter 4 Visible Windows -- Historical/Conceptual -- A Brief History of Microsoft Windows -- Early Windows -- Modern Windows -- 802 -- Windows XP -- Windows Vista -- Windows 7 -- Enter 64-bit Windows -- The Windows Interface -- User Interface -- Hot Keys -- Operating System Folders -- System Folder -- Program and Personal Document Folders…”
    Libro electrónico
  15. 5795
    Publicado 2022
    Tabla de Contenidos: “…. -- Auditing database access -- Getting ready -- Auditing access -- Auditing SQL -- Auditing table access -- Managing the audit log -- Auditing data changes -- Always knowing which user is logged in -- Getting ready -- How to do it... -- How it works... -- There's more... -- Integrating with LDAP…”
    Libro electrónico
  16. 5796
    Publicado 2022
    Tabla de Contenidos: “…Multitiered Applications -- The Jakarta EE Approach -- Security in Jakarta EE -- Simple Application Security Walkthrough -- Looking Ahead -- Authentication -- Something You Know -- Something You Have -- Something You Are -- Latest Trends in Authentication Methods -- Authentication Examples in Practice -- Authenticating Users Programmatically -- Authorization -- Access Control Lists -- Access Control Models -- Discretionary Access Control (DAC) -- Mandatory Access Control (MAC) -- Role-Based Access Control (RBAC) -- RBAC (Role-Based Access Control) -- Benefits of RBAC -- RBAC - Key Principles -- RBAC in Jakarta EE -- Users, Groups, and Roles -- What Is a User? …”
    Libro electrónico
  17. 5797
    Publicado 2022
    Tabla de Contenidos: “…Encoding using Huffman compression -- Remembering sequences with LZW -- Hiding Your Secrets with Cryptography -- Substituting characters -- Working with AES encryption -- Part 5 Challenging Difficult Problems -- Chapter 15 Working with Greedy Algorithms -- Deciding When It Is Better to Be Greedy -- Understanding why greedy is good -- Keeping greedy algorithms under control -- Considering NP complete problems -- Finding Out How Greedy Can Be Useful -- Arranging cached computer data -- Competing for resources -- Revisiting Huffman coding -- Chapter 16 Relying on Dynamic Programming -- Explaining Dynamic Programming -- Obtaining a historical basis -- Making problems dynamic -- Casting recursion dynamically -- Leveraging memoization -- Discovering the Best Dynamic Recipes -- Looking inside the knapsack -- Touring around cities -- Approximating string search -- Chapter 17 Using Randomized Algorithms -- Defining How Randomization Works -- Considering why randomization is needed -- Understanding how probability works -- Understanding distributions -- Simulating the use of the Monte Carlo method -- Putting Randomness into your Logic -- Calculating a median using quick select -- Doing simulations using Monte Carlo -- Ordering faster with quick sort -- Chapter 18 Performing Local Search -- Understanding Local Search -- Knowing the neighborhood -- Presenting local search tricks -- Explaining hill climbing with n-queens -- Discovering simulated annealing -- Avoiding repeats using Tabu Search -- Solving Satisfiability of Boolean Circuits -- Solving 2-SAT using randomization -- Implementing the Python code -- Realizing that the starting point is important -- Chapter 19 Employing Linear Programming -- Using Linear Functions as a Tool -- Grasping the basic math you need -- Learning to simplify when planning -- Working with geometry using simplex…”
    Libro electrónico
  18. 5798
    Publicado 1994
    Tabla de Contenidos: “…Model -- References -- Comprehension during Interpreting: What do Interpreters know that Bilinguals don't? -- 1. Introduction -- 2. …”
    Libro electrónico
  19. 5799
    Publicado 2024
    Tabla de Contenidos: “…-- Steps to create reusable and extendable components -- Angular component best practices -- Getting to know StyleClass -- Why use PrimeNG StyleClass? -- Example: toggle classes -- Example: animation -- Utilizing PrimeBlocks for creating UI clocks -- Advantages and Disadvantages of using PrimeBlocks -- How to use PrimeBlocks -- Creating reusable and extendable components -- Crafting your own components with PrimeNG -- Why create custom components? …”
    Libro electrónico
  20. 5800
    Publicado 2024
    Tabla de Contenidos: “…-- What programming patterns do you know, and which ones have you implemented in C#? …”
    Libro electrónico