Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 882
- Application software 749
- Management 628
- Engineering & Applied Sciences 519
- History 411
- Computer programs 406
- Design 377
- Computer networks 339
- Data processing 334
- Web site development 328
- Computer Science 326
- Web sites 311
- Cloud computing 305
- Historia 304
- Artificial intelligence 303
- Python (Computer program language) 296
- Leadership 275
- Photography 275
- Security measures 275
- Computer software 268
- Computer programming 267
- Programming 267
- Law and legislation 260
- Business & Economics 245
- Computer security 241
- Operating systems (Computers) 240
- Digital techniques 239
- Social aspects 239
- Java (Computer program language) 237
- Information technology 229
-
8961Publicado 2016Tabla de Contenidos: “…2.4.5.4 Failure modes and effects analysis2.4.5.5 Bayesian networks; 2.4.6 CONSEQUENCE-BASED APPROACHES; 2.4.6.1 Fire consequence modeling; Impact on personnel; Impact on structures; Impact on Electrical Equipment; Impact on the environment; 2.4.6.2 Probit analysis: dose-response modeling; 2.4.7 QUALITATIVE AND SEMI-QUANTITATIVE APPROACHES; 2.4.7.1 Layer of protection analysis; 2.4.7.2 Risk matrix; 2.4.7.3 HAZOP; 2.4.7.4 What-if analysis; 2.4.7.5 Checklist; 2.4.7.6 What-if/checklist; 2.4.7.7 Dow fire and explosion index; 2.5 PROCESS SAFETY CHALLENGES AND LOOKING AT THE FUTURE…”
Libro electrónico -
8962Publicado 2018Tabla de Contenidos: “…-- Code Sample 2.7 -- Play testing -- Building -- Summary -- Test your knowledge -- Further reading -- Chapter 3: Creating a Space Shooter -- Looking ahead - the completed project -- Getting started with a space shooter -- Creating a player object -- Player input -- Code Sample 3.1 -- Configuring the game camera -- Bounds locking -- Code Sample 3.2 -- Health -- Code Sample 3.3 -- Death and particles -- Code Sample 3.4 -- Enemies -- Code Sample 3.6 -- Code Sample 3.7 -- Code Sample 3.8 -- Enemy spawning -- Code Sample 3.9 -- Summary -- Test your knowledge -- Further reading -- Chapter 4: Continuing the Space Shooter -- Guns and gun turrets -- Ammo prefabs -- Code Sample 4-1 -- Ammo spawning -- Code Sample 4.2 -- Code Sample 4.3 -- User controls -- Scores and scoring - UI and text objects -- Working with scores - scripting with text -- Code Sample 4.4 -- Polishing -- Testing and diagnosis -- Building -- Summary -- Test your knowledge -- Further Reading -- Chapter 5: Creating a 2D Adventure Game -- A 2D Adventure - getting started -- Importing assets -- Creating an environment - getting started -- Environment Physics -- Creating a player…”
Libro electrónico -
8963Publicado 2016Tabla de Contenidos: “…-- Examining the Risks -- Adjusting Behavior -- A Model for Improving Security Awareness -- Broadening the Awareness Model -- The Security Benefits of Personal Use -- Roundabouts and Stop Signs -- The Technology Professional -- Insider Threats -- Deter -- Detect -- Discipline -- Finding the Balance -- Chapter 6: Emerging Threats and Vulnerabilities: Reality and Rhetoric -- Structured Methods for Identifying Threat Trends -- The Product Life Cycle Model -- Understanding Threat Agents -- Playing War Games -- Trends That Span the Threat Landscape -- Trust Is an Attack Surface -- Barriers to Entry Are Crumbling -- The Rise of Edge Case Insecurity -- The Enemy Knows the System -- Key Threat Activity Areas -- The Industry of Malware -- The Web Expands to the Internet of Things -- Smartphones -- Web Applications -- Conclusion -- Chapter 7: A New Security Architecture to Improve Business Agility -- The 9 Box of Controls, Business Trends, and Architecture Requirements -- 9 Box of Controls -- IT Consumerization -- New Business Needs -- Cloud Computing -- Changing Threat Landscape -- Privacy and Regulatory Requirements -- New Architecture -- Trust Calculation -- Source Score -- Destination Score -- Available Controls -- Calculating Trust -- Security Zones -- Untrusted Zones -- Selective Zones -- Trusted Zones -- Balanced Controls -- Users, Data, and the Internet of Things: The New Perimeters -- Data Perimeter -- User Perimeter -- Internet of Things -- Conclusion -- Chapter 8: Looking to the Future: Emerging Security Capabilities…”
Libro electrónico -
8964Publicado 2024Tabla de Contenidos: “…. -- Getting to Know HTML -- Working with HTML elements and tags -- Dealing with tag attributes -- A barebones HTML page -- Giving your page a title -- Adding some text -- Getting Familiar with CSS -- Understanding cascading style sheets -- Styles: Bundles of formatting options -- Sheets: Collections of styles -- Cascading: How styles propagate -- Getting comfy with CSS rules and declarations -- Applying styles to a page -- Inserting inline styles -- Embedding an internal style sheet -- Linking to an external style sheet -- Chapter 2 Constructing Pages with Good Bones -- Getting to Know HTML's Basic Structure Tags -- Forging paragraphs -- Naming page parts with headings -- Giving a line a break -- Structuring the Page -- The < -- header> -- tag -- The < -- nav> -- tag -- The < -- main> -- tag -- The < -- article> -- tag -- The < -- section> -- tag -- The < -- aside> -- tag -- The < -- footer> -- tag -- Handling non-semantic content with < -- div> -- -- Handling words and characters with < -- span> -- -- Chapter 3 Adding Links, Lists, and Images -- Applying the Basic Text Tags -- Emphasizing text -- Marking important text -- Adding quotations -- Creating Links -- Building Bulleted and Numbered Lists -- Making your point with bulleted lists -- Numbered lists: Easy as one, two, three -- Inserting Special Characters -- Inserting Images -- First, a mercifully brief look at image formats -- Inserting an image -- Turning an image into a link -- Chapter 4 Building Web Forms…”
Libro electrónico -
8965Publicado 2023Tabla de Contenidos: “…. -- Facing War Arendt and Habermas 181 -- Arendt's Jewish War 182 -- Habermas looks at Ukraine 185 -- Violence and power 187 -- Life 192 -- Federations 13. -- Federalism - A Hidden Treasure 197 -- Remember Europe 198 -- Arendt's hidden dialogue with integral federalism 205 -- The traps of the nation-state 207 -- The failure of federal plans and the consequences 216 -- Conclusion 22614. -- Bridge and Border - Queering Europe 229Making an image / a concept - deconstructing the concept 230 -- Is there a federalist mindset? …”
Libro electrónico -
8966Publicado 2023Tabla de Contenidos: “…An Unjust Transition: Energy, Colonialism and Extractivism in Occupied Western Sahara -- A brief history of the Western Sahara conflict -- Extractivism in occupied Western Sahara -- Powering the occupation: how energy does diplomatic work for the Moroccan regime -- Powering oppression: Saharawi perspectives of the energy system in occupied Western Sahara -- What would a Saharawi-led "just transition" look like? Inspiration and questions from the camps -- Conclusion -- 3. …”
Libro electrónico -
8967Publicado 2023Tabla de Contenidos: “…-- Introducing this book and its contents -- Setting up your development environment -- Understanding .NET -- Building console apps using Visual Studio 2022 -- Building console apps using Visual Studio Code -- Making good use of the GitHub repository for this book -- Looking for help -- Practicing and exploring -- Summary -- Chapter 2: Speaking C# -- Introducing the C# language -- Discovering your C# compiler version -- Understanding C# grammar and vocabulary -- Working with variables -- Exploring more about console apps -- Understanding async and await -- Practicing and exploring -- Summary -- Chapter 3: Controlling Flow, Converting Types, and Handling Exceptions -- Operating on variables -- Understanding selection statements -- Understanding iteration statements -- Storing multiple values in an array -- Casting and converting between types -- Handling exceptions -- Checking for overflow -- Practicing and exploring -- Summary -- Chapter 4: Writing, Debugging, and Testing Functions -- Writing functions -- Debugging during development -- Hot reloading during development -- Logging during development and runtime -- Unit testing -- Throwing and catching exceptions in functions -- Practicing and exploring -- Summary -- Chapter 5: Building Your Own Types with Object-Oriented Programming -- Talking about OOP -- Building class libraries -- Storing data in fields -- Working with methods and tuples -- Controlling access with properties and indexers -- Pattern matching with objects -- Working with record types -- Practicing and exploring -- Summary -- Chapter 6: Implementing Interfaces and Inheriting Classes -- Setting up a class library and console application -- Static methods and overloading operators -- Making types safely reusable with generics…”
Libro electrónico -
8968Publicado 2023Tabla de Contenidos: “…. -- The Rifle: Digital Transformation and Market Capitalization -- The Shotgun: Digital Transformation and Future Earnings -- Some Tiny Steps Toward Causality -- Potential Predictors: Recognize Your Starting Point -- Chapter 13 Predictor Markets: Different Industries Require Different Labors for Payback -- It Only Goes Upward (for Digital Transformation Replicable References) -- Not All Sectors Are Created Equal -- Chapter 14 Predictor Financials: Your P& -- L and Balance Sheet Context Indicate Your Ability to Achieve Your Payday -- Financials Matter: You Are What You Are -- Chapter 15 Predictor Communications: It Is About What You Sing and How You Sing to Influence Your Payday -- Sentiment Elasticity Details: "Always Look at the Bright Side of Life" (Monty Python)…”
Libro electrónico -
8969Publicado 1996Tabla de Contenidos: “…Francia -- The Man Who (Thought He) Looked Like Robert Taylor / Bienvenido Santos -- Crossing Over / N. …”
Libro -
8970Publicado 2021Tabla de Contenidos: “…. -- How it works... -- Looking up information in the built-in manual page -- Getting ready -- How to do it... -- How it works... -- There's more... -- Searching the manual for information -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 2: Making Your Programs Easy to Script -- Technical requirements -- Return values and how to read them -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Exiting a program with a relevant return value -- Getting ready -- How to do it... -- How it works... -- There's more... -- Redirecting stdin, stdout, and stderr -- Getting ready -- How to do it... -- How it works... -- There's more... -- Connecting programs using pipes -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Writing to stdout and stderr -- How to do it... -- How it works... -- There's more... -- Reading from stdin -- Getting ready -- How to do it... -- How it works... -- There's more... -- Writing a pipe-friendly program -- Getting ready -- How to do it... -- How it works... -- There's more... -- Redirecting the result to a file -- Getting ready -- How to do it... -- How it works... -- There's more... -- Reading environment variables -- Getting ready -- How to do it... -- How it works...…”
Libro electrónico -
8971Publicado 2018Tabla de Contenidos: “…Creating a user group and adding members to it -- Adding members as we create their user accounts -- Using usermod to add an existing user to a group -- Adding users to a group by editing the /etc/group file -- Creating a shared directory -- Setting the SGID bit and the sticky bit on the shared directory -- Using ACLs to access files in the shared directory -- Setting the permissions and creating the ACL -- Charlie tries to access Vicky's file with an ACL set for Cleopatra -- Hands-on lab - creating a shared group directory -- Summary -- Chapter 7: Implementing Mandatory Access Control with SELinux and AppArmor -- How SELinux can benefit a systems administrator -- Setting security contexts for files and directories -- Installing the SELinux tools -- Creating web content files with SELinux enabled -- Fixing an incorrect SELinux context -- Using chcon -- Using restorecon -- Using semanage -- Hands-on lab - SELinux type enforcement -- Troubleshooting with setroubleshoot -- Viewing setroubleshoot messages -- Using the graphical setroubleshoot utility -- Troubleshooting in permissive mode -- Working with SELinux policies -- Viewing the Booleans -- Configuring the Booleans -- Protecting your web server -- Protecting network ports -- Creating custom policy modules -- Hands-on lab - SELinux Booleans and ports -- How AppArmor can benefit a systems administrator -- Looking at AppArmor profiles -- Working with AppArmor command-line utilities -- Troubleshooting AppArmor problems -- Summary -- Chapter 8: Scanning, Auditing, and Hardening -- Installing and updating ClamAV and maldet -- Installing ClamAV and maldet -- Configuring maldet -- Updating ClamAV and maldet -- Scanning with ClamAV and maldet -- SELinux considerations -- Scanning for rootkits with Rootkit Hunter -- Installing and updating Rootkit Hunter -- Scanning for rootkits…”
Libro electrónico -
8972Publicado 2022Tabla de Contenidos: “…-- Changing the Default Style -- Modifying Widget Appearances -- Using HTML to Change the Look of Text -- Using Qt Style Sheets to Change the Look of Widgets -- Explanation for Using "Inline" Qt Style Sheets -- Customizing Styles to React to Interactions -- Explanation for Using "Embedded" Qt Style Sheets…”
Libro electrónico -
8973Publicado 2023Tabla de Contenidos: “…Understanding the Payments to Deposit account -- Recording invoice payments -- Entering a sales receipt -- Recording Bank Deposits -- Keeping Tabs on Invoice Status and Receiving Payment -- Giving Money Back to a Customer -- Recording a credit memo -- Issuing a refund to a customer -- Writing Off Bad Debt -- Setting up a bad debt account and item -- Creating bad debt write-off transactions -- Reviewing and Creating Transactions with Spreadsheet Sync -- Chapter 7 Paying Bills and Writing Checks -- Looking at Expense and Bill Payment Methods -- Understanding the Transaction Types -- Entering an Expense -- Writing a Check -- Entering a Bill -- Paying Bills -- Paying two or more bills at once -- Writing a check to pay a bill -- Recording Vendor Credits and Refunds -- Entering a vendor credit -- Applying vendor credits against bills -- Recording vendor refund checks and payments -- Managing Recurring Transactions -- Reviewing and Creating Transactions with Spreadsheet Sync -- Chapter 8 Paying Employees and Contractors -- Getting Started with QuickBooks Payroll -- Turning on QuickBooks Payroll -- Setting payroll preferences -- Setting up payroll taxes -- Preparing Payroll -- Recording payroll information -- Enabling employee time tracking -- Reviewing and generating payroll checks -- Establishing or correcting payroll exemptions -- Printing payroll reports -- Managing Payroll Taxes -- Paying payroll taxes -- Viewing payroll tax forms -- Paying Contractors -- Setting up 1099-eligible contractors -- Paying contractors -- Reporting on 1099 vendor payments -- Preparing 1099s -- Chapter 9 Working in Registers -- Understanding Registers -- Customizing the Register View -- Entering and Editing Transactions -- Entering transactions -- Editing a transaction -- Performing Other Register Activities -- Sorting transactions -- Filtering transactions…”
Libro electrónico -
8974Publicado 2018Tabla de Contenidos: “…-- Is it DNSSEC-signed? -- How to look at a Whois record for a new TLD -- dig -- Understanding dig responses -- The HEADER section -- The ANSWER section -- The AUTHORITY section -- The ADDITIONAL section -- Using dig -- DNSSEC -- Reverse lookups -- Delegation chains -- host -- named-checkzone and named-checkconf -- dnstop -- Web-based debugging tools -- DNS stuff -- whatismydns -- dnsviz -- easywhois -- domaintools -- Summary -- References -- Chapter 11: DNS Operations and Use Cases -- Transferring domain names -- Change of registrant -- Nameserver redelegations -- Redelegating DNSSEC-signed domains -- Registrar transfer (without changing nameservers) -- IMPORTANT - make sure your new registrar knows what to do with the nameservers…”
Libro electrónico -
8975Publicado 2017Tabla de Contenidos: “…-- A brief look at the ModelProcessor interface -- Building Hypermedia As The Engine Of Application State (HATEOAS) APIs -- Programmatically building entity body links using JAX-RS APIs -- Programmatically building header links using JAX-RS APIs -- Declaratively building links using Jersey annotations -- Specifying the dependency to use Jersey declarative linking -- Enabling the Jersey declarative linking feature for the application -- Declaratively adding links to the resource representation -- Grouping multiple links using @InjectLinks…”
Libro electrónico -
8976Publicado 2018Tabla de Contenidos: “…Referring to Objects -- Navigating through the hierarchy -- Simplifying object references -- Diving into Object Properties and Methods -- Object properties -- Object methods -- Object events -- Finding Out More -- Using VBA's Help system -- Using the Object Browser -- Automatically listing properties and methods -- Chapter 5 VBA Sub and Function Procedures -- Understanding Subs versus Functions -- Looking at Sub procedures -- Looking at Function procedures -- Naming Subs and Functions -- Executing Sub procedures -- Executing the Sub procedure directly -- Executing the procedure from the Macro dialog box -- Executing a macro by using a shortcut key -- Executing the procedure from a button or shape -- Executing the procedure from another procedure -- Executing Function procedures -- Calling the function from a Sub procedure -- Calling a function from a worksheet formula -- Chapter 6 Using the Excel Macro Recorder -- Recording Basics -- Preparing to Record -- Relative or Absolute? …”
Libro electrónico -
8977Publicado 2015Tabla de Contenidos: “…Wrapping Your Mind around Collections -- Referring to Objects -- Navigating through the hierarchy -- Simplifying object references -- Diving into Object Properties and Methods -- Object properties -- Object methods -- Object events -- Finding Out More -- Using VBA's Help system -- Using the Object Browser -- Automatically listing properties and methods -- Chapter 5 VBA Sub and Function Procedures -- Understanding Subs versus Functions -- Looking at Sub procedures -- Looking at Function procedures -- Naming Subs and Functions -- Executing Sub procedures -- Executing the Sub procedure directly -- Executing the procedure from the Macro dialog box -- Executing a macro by using a shortcut key -- Executing the procedure from a button or shape -- Executing the procedure from another procedure -- Executing Function procedures -- Calling the function from a Sub procedure -- Calling a function from a worksheet formula -- Chapter 6 Using the Excel Macro Recorder -- Is It Live, or Is It VBA? …”
Libro electrónico -
8978Publicado 2016Tabla de Contenidos: “…Tear Down the Walls -- 5. Look to the Past to See the Future -- 6. Benchmark Yourself -- 7. …”
Libro electrónico -
8979por Belew, ShannonTabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Book 1 Start-Up Essentials -- Chapter 1 Starting from Scratch -- Creating online businesses for today and tomorrow -- Finding a business that's your type -- Chapter 2 Turning Ideas into a Viable Internet Business -- Thinking Like an Online Entrepreneur -- Putting Your Business Idea under the Microscope -- Using informal research to verify your idea -- Applying a SWOT analysis to your idea -- Creating a feasibility study to validate an idea -- Identifying Your Market and Target Customer -- Classifying your customer -- Going to the source -- Competing to Win: Analyzing Your Competition -- Chapter 3 Getting Real: Creating a Usable Business Plan -- Understanding the Value of a Plan -- Recognizing That the Parts of the Plan Make a Whole -- Getting Help to Write the Plan -- Determining when to hire a professional -- Knowing what to expect from a business plan consultant -- Using a Business Plan Today, Tomorrow, and Always -- Chapter 4 Funding Your Online Business -- Bootstrapping the Low-Cost, No-Cost Site -- Making the leap to the bootstrapping lifestyle -- Saving money to make money -- Getting resourceful -- Looking at the pros and cons of bootstrapping -- Finding the Perfect Investor -- Turning to your friends and family -- Finding angels -- Venturing into the world of venture capital -- Checking Out Alternative Financing -- Taking a Shortcut: Purchasing an Existing Site -- Chapter 5 Creating Policies and Managing Compliance to Keep It Real -- Taking Care of Customers -- I pledge to you -- Put it in writing -- Delivering on Your Promises -- Putting Policies in Place -- Privacy policy -- User agreement or terms and conditions -- Shipping policy -- Return policy…”
Publicado 2024
Libro electrónico -
8980Publicado 2024Tabla de Contenidos: “…-- Dig Deeper: XR Extended Reality -- Ethical Computing -- Defining Ethics -- Objective 1.8 Define ethics and describe various ethical systems -- Sound Byte: How to Debate Ethical Issues -- Personal Ethics -- Objective 1.9 Describe influences on the development of your personal ethics -- Ethics and Technology -- Objective 1.10 Present examples of how technology creates ethical challenges -- Solve This: How Technology Is Used on the World Stage and in Your Personal Life -- Chapter 2. Looking at Computers: Understanding the Parts -- Part 1: Understanding Digital Components -- Learning Outcome 2.1 You will be able to describe the devices that make up a computer system -- Understanding Your Computer -- Computers Are Data Processing Devices -- Objective 2.1 Describe the four main functions of a computer system and how they interact with data and information -- Binary: The Language of Computers -- Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed -- Sound Byte: Binary Numbers Interactive -- Types of Computers -- Objective 2.3 List common types of computers, and discuss their main features -- Active Helpdesk: Understanding Bits and Bytes -- Bits& -- Bytes: Today's Supercomputers: Faster Than Ever -- Input Devices…”
Libro electrónico