Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 8,635
- Història 4,168
- Biblia 3,441
- Filosofía 2,853
- Crítica e interpretación 2,459
- Bíblia 2,156
- Església Catòlica 1,559
- Teología 1,512
- -Historia 1,498
- Iglesia Católica 1,352
- Crítica i interpretació 1,277
- Jesuitas 1,113
- History 1,077
- Espiritualidad 1,042
- Padres de la Iglesia 987
- Filosofia 976
- Matemáticas 966
- Teología dogmática 924
- Economía 904
- Biografia 870
- Política 868
- Literatura 865
- Jesucristo 852
- Psicología 795
- Teologia 787
- Derecho 775
- Historia y crítica 771
- historia 747
- Iglesia 734
- Patrística 731
-
285161Publicado 2012Tabla de Contenidos: “…Heidrun Panhofer, Universidad Autónoma de Barcelona -- Bienestar psicológico en la danza: un análisis social cognitivo / J.F. Guzmán Luján, Carmela García García, comunicación -- Lunares: el arte flamenco y su expresión en lugares terapéuticos educativos y sociales / Tania Ugena Candel, comunicación -- Movimeinto somático y danza movimiento terapia: su aplicación en contextos educativos / Rosa Maria Rod́riguez Jiménez, Patricia Gracia Parra, comunicación -- Condición física y morfo estática de la danza / Dra. …”
Accés llliure (RedIT) al capítol: "La interpretación en la danza. De la necesidad de un entrenamiento específico para bailarines" de Jordi Fàbrega
Libro -
285162por Lewandowska, JuliaTabla de Contenidos: “….) -- María de Santa Isabel (O. S. J.) -- Valentina Pinelo (O. A. R.) -- Modelo III -- Cecilia del Nacimiento (O. …”
Publicado 2019
Libro electrónico -
285163Publicado 1999Tabla de Contenidos: “…Informelle Investoren -- Finanzierung durch Eigenkapital und Start-up-Kapital -- Steuern und Sozialabgaben -- Entwicklung und Verbreitung von Technologie -- Kasten 9 Maßnahmen zur Förderung der Technologiediffusion -- Tabelle 16 Forscher je Beschäftigungssektor -- Gesamtbeurteilung und weiterer Handlungsbedarf -- Anmerkungen -- Anhang - Wirtschaftspolitische Chronik -- STATISTISCHER ANHANG UND STRUKTURELLE INDIKATOREN -- Tabelle A Bruttoinlandsprodukt -- Tabelle B Einnahmen und Ausgaben der öffentlichen Hand -- Tabelle C Produktion, Beschäftigung und Produktivität in der Industrie -- Tabelle D Einzelhandelsumsätze und Preise -- Tabelle E Geld- und Bankwesen -- Tabelle F Bundeshaushalt -- Tabelle G Zahlungsbilanz -- Tabelle H Außenhandel nach Gebieten -- Tabelle I Arbeitsmarktkennzahlen -- Tabelle J Öffentlicher Sektor -- Tabelle K Produktionsstruktur und Leistungskennzahlen -- Tabelle K (Forts.) …”
Libro electrónico -
285164por Conférence Européenne des Ministres des Transports.Tabla de Contenidos: “…Lancement du processus d'EES pour les réseaux paneuropéens -- J. Intégration de l'EES dans les mécanismes de financement -- Notes -- Annexe 1. …”
Publicado 2000
Libro electrónico -
285165Publicado 2016Tabla de Contenidos: “…BAKSHI -- BOTOND BERTOK -- NAVDEEP BHADBHADE -- DEBANGSU BHATTACHARYYA -- ANA CARVALHO -- DAVID J.C. CONSTABLE -- URMILA DIWEKAR -- MAHMOUD M. …”
Libro electrónico -
285166Publicado 2017Tabla de Contenidos: “…Merging SparkR DataFrames -- Using User Defined Functions (UDFs) -- Using SparkR for computing summary statistics -- Using SparkR for data visualization -- Visualizing data on a map -- Visualizing graph nodes and edges -- Using SparkR for machine learning -- Summary -- Chapter 9: Developing Applications with Spark SQL -- Introducing Spark SQL applications -- Understanding text analysis applications -- Using Spark SQL for textual analysis -- Preprocessing textual data -- Computing readability -- Using word lists -- Creating data preprocessing pipelines -- Understanding themes in document corpuses -- Using Naive Bayes classifiers -- Developing a machine learning application -- Summary -- Chapter 10: Using Spark SQL in Deep Learning Applications -- Introducing neural networks -- Understanding deep learning -- Understanding representation learning -- Understanding stochastic gradient descent -- Introducing deep learning in Spark -- Introducing CaffeOnSpark -- Introducing DL4J -- Introducing TensorFrames -- Working with BigDL -- Tuning hyperparameters of deep learning models -- Introducing deep learning pipelines -- Understanding Supervised learning -- Understanding convolutional neural networks -- Using neural networks for text classification -- Using deep neural networks for language processing -- Understanding Recurrent Neural Networks -- Introducing autoencoders -- Summary -- Chapter 11: Tuning Spark SQL Components for Performance -- Introducing performance tuning in Spark SQL -- Understanding DataFrame/Dataset APIs -- Optimizing data serialization -- Understanding Catalyst optimizations -- Understanding the Dataset/DataFrame API -- Understanding Catalyst transformations -- Visualizing Spark application execution -- Exploring Spark application execution metrics -- Using external tools for performance tuning -- Cost-based optimizer in Apache Spark 2.2.…”
Libro electrónico -
285167por Freeman, Adam. authorTabla de Contenidos: “…Managing Special Attributes -- Managing Boolean Attributes -- Managing Other Attributes -- Summary -- Chapter 12: Working with Forms -- Preparing the Example Project -- Using Form Elements with Two-Way Data Bindings -- Implicitly Creating Model Properties -- Checking That the Data Model Object Has Been Created -- Validating Forms -- Performing Basic Form Validation -- Adding the Form Element -- Using Validation Attributes -- Monitoring the Validity of the Form -- Providing Form Validation Feedback -- Using CSS to Provide Feedback -- Providing Feedback for Specific Validation Constraints -- Using the Special Variables to Provide Feedback -- Reducing the Number of Feedback Elements -- Deferring Validation Feedback -- Using the Form Directive Attributes -- Using Input Elements -- Using Checkboxes -- Using Text Areas -- Using Select Elements -- Changing the First Option Element -- Changing the Selection Value -- Creating optgroup Elements -- Summary -- Chapter 13: Using Controllers and Scopes -- Why and When to Use Controllers and Scopes -- Preparing the Example Project -- Understanding the Basics -- Creating and Applying Controllers -- Setting Up the Scope -- Modifying the Scope -- Organizing Controllers -- Using a Monolithic Controller -- Reusing a Controller -- Communicating Between Scopes -- Using a Service to Mediate Scope Events -- Using Controller Inheritance -- Adding to the Inherited Data and Behaviors -- Overriding Inherited Data and Behaviors -- Understanding Data Inheritance -- Using Multiple Controllers -- Using Scope-less Controllers -- Explicitly Updating the Scope -- Setting Up jQuery UI -- Controlling the Button State -- Counting the Button Clicks -- Summary -- Chapter 14: Using Filters -- Why and When to Use Filters -- Preparing the Example Project -- Downloading the Localization File -- Filtering Single Data Values…”
Publicado 2014
Libro electrónico -
285168Publicado 2016Tabla de Contenidos: “…9.5 FOCUS GROUP 2: THE LIBRARY JOB CLUB -- 9.5.1 Library Usage -- 9.5.2 Benefits of the Library Job Club -- 9.5.3 Extracting Information Poverty Indicators From the Library Job Club Focus Group -- 9.5.4 Focus Group 2: Key Findings -- 9.6 LEARNING FROM OTHER LOCATIONS -- 9.7 SUMMARY AND CONCLUSIONS -- 10 - Concluding Thoughts and Recommendations -- 10.1 INTRODUCTION -- 10.2 SUMMING UP -- 10.3 FUTURE CHALLENGES FOR PUBLIC LIBRARIES -- 10.4 RECOMMENDATIONS FOR POLICY AND PRACTICE -- 10.4.1 Recommendation 1: Develop an Information Poverty Strategy -- 10.4.2 Recommendation 2: Develop and Implement a Community Engagement Strategy -- 10.4.3 Recommendation 3: Further Develop the Educational Role of Public Libraries -- 10.4.4 Recommendation 4: Further Develop the Social Role of Public Libraries -- 10.4.5 Recommendation 5: Raising Awareness and Marketing -- 10.4.6 Recommendation 6: Identifying and Targeting Groups -- 10.4.7 Recommendation 7: Developing Services for the Unemployed -- 10.4.8 Recommendation 8: Improving Stock -- 10.4.9 Recommendation 9: Library Staff -- 10.5 CONCLUDING THOUGHTS -- APPENDICES -- APPENDIX 1: MACRO- AND MESO-LEVEL INTERVIEWEES -- APPENDIX 2: SURVEY QUESTIONS -- APPENDIX 3: INFORMATION POVERTY INDICATORS FROM THE MACRO-LEVEL DATA -- APPENDIX 4: THE 20 MOST CITED INDICATORS OF INFORMATION POVERTY IN THE LITERATURE -- REFERENCES -- INDEX -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- S -- T -- U -- W -- Z -- Back Cover…”
Libro electrónico -
285169Publicado 2014Tabla de Contenidos: “…ALLOCATION OF FUNDS -- Qard Hasan Loans -- Mudaraba -- Civil Partnership -- Legal Partnership -- Installment Sale -- Salam (Forward Dealing) -- Hire-Purchase (Leasing) -- Muzaraah -- Musaqat -- Joaalah -- Debt-Purchase -- Direct Investment -- OTHER REGULATIONS -- MONETARY POLICY -- Direct Instruments -- Indirect Instruments -- Adjustments to Monetary Policy Making -- HOW IRANIAN PRACTICES DIFFER FROM THOSE OF OTHER COUNTRIES -- CHALLENGES AND STRENGTHS -- COOPERATION WITH OTHER ISLAMIC COUNTRIES -- IRANIAN BANKING SYSTEM STATISTICS -- THE IRANIAN ISLAMIC CAPITAL MARKET -- History -- Structure -- Financial Institutions -- Financial Instruments -- Laws and Regulations -- Growth -- Cross-Border Cooperation -- REFERENCES -- ABOUT THE AUTHOR -- Chapter 12: Japan -- CORPORATE BANKING -- Regulatory Changes -- Market Positioning -- Major Performances -- RETAIL BANKING AND MICROFINANCE -- DEBT CAPITAL MARKETS ( SUKUK) -- SUKUK REGULATION AND TAXATION: THE CASE OF J- SUKUK -- EQUITY CAPITAL MARKETS -- Indexes -- Private Equity Funds -- ASSET MANAGEMENT -- Equity Funds -- Exchange Traded Funds -- Real Estate Funds -- Endowment Funds -- TAKAFUL AND RE- TAKAFUL -- Market Positioning -- Prospects -- SOVEREIGN WEALTH FUNDS -- REGULATORY ISSUES -- TAX AND ACCOUNTING -- Tax Legislation -- Tax Neutrality -- Tax Incentives and Exemptions -- Other Tax and Accounting Issues -- CONCLUSION -- ABOUT THE AUTHOR -- Chapter 13: Jordan -- ASSET MANAGEMENT -- TAX AND ACCOUNTING -- MICROFINANCE -- Microfinance in Jordan -- Islamic Microfinance in Jordan -- TAKAFUL AND RE- TAKAFUL -- DEBT CAPITAL MARKETS -- CROSS-BORDER FINANCING -- SOVEREIGN SUKUK -- REGULATORY ISSUES -- CONCLUSION -- NOTE -- REFERENCES -- ABOUT THE AUTHOR -- Chapter 14: Kazakhstan -- PAST PERFORMANCE -- PROSPECTS -- ASSET MANAGEMENT -- TAX AND ACCOUNTING -- RETAIL AND MICROFINANCE -- TAKAFUL AND RE- TAKAFUL…”
Libro electrónico -
285170Publicado 2013Tabla de Contenidos: “…Hors d'oeuvre: Old English -- 2. Le.j. cours: Middle English -- 3. Le.ij. cours: Early Modern English -- 4. …”
Libro electrónico -
285171Publicado 2021Tabla de Contenidos: “…Gimeno Blay -- El deix occità de Bartomeu de Tresbens / Sebastià Giralt Soler -- «Curial in bivio», la ciència de Bacus i la iconografia de les Arts Liberals / Francesc J. Gómez -- Eiximenis a la premsa catalana dels anys 1925-1939 / David Guixeras -- Ramon Llull and the rhetoric of prayer: a brief commentary / Robert Desmond Hughes -- Una aproximació a Jean Gerson i Felip de Malla com a mestre i deixeble / Josep Izquierdo -- Algunes observacions sobre l'etimologia del mot «dessen» de l'occità antic / Francesc Xavier Lamuela García -- Civic ideals and “humanism” in the Crown of Aragon, 1383-1588 / Jeremy N. …”
Enlace del recurso
991006033449706719 -
285172Publicado 2014Tabla de Contenidos: “…Un reflexió sobre el parlament de Cardona de 1543 al regne de Sardenya / Lluís- J. Guía Marín -- El rector Vicente Blasco (1735-1813): un universitario al servicio de la monarquía borbónica / María- Llum Juan-Liern -- Patronazgo y servicio a la corona en las escuadras de galeras del Mediterráneo: el caso del Veedor general Martín de Quijano (1578-1606) / Manuel Lomas Cortés -- Los informes de Jorge Juan en la junta de defensa de La Habana (1762). …”
Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Libro -
285173Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Introducing Java EE and Configuring the Development Environment -- JSON and HTML5 -- WebSockets -- Simplified JMS 2.0 API -- Groundwork for Cloud environments -- Batch applications -- Updated web profiles -- Concurrency utilities -- Context dependency injection -- Java API for RESTful web services (JAX-RS) 2.0 -- Servlet 3.1 -- JNDI -- Asynchronous invocation -- Timers -- EJB Lite -- Development in WildFly -- Operating system -- Java -- Application server -- Build system -- Structure of the exercises -- Tests -- IDE -- Netbeans IDE -- IntelliJ IDEA -- Eclipse IDE -- Importing exercises -- Debug exercises -- Summary -- Chapter 2 : Working with Dependency Injection -- Dependency injection 1.0 for Java -- [Qualifiers] -- Qualifiers -- EL name resolution -- Resources -- Context and dependency injection 1.1 for Java -- Injection and contexts -- Managed beans -- Producer methods and fields -- Bean types -- The BeanManager object -- CDI -- Unmanaged -- Enabled and disabled beans -- The injection target -- Scopes -- Session beans -- Service Provider Interfaces -- Events -- Event qualifiers -- Observer methods -- Container lifecycle events -- Utilities -- Decorators -- Enabled decorators -- And more... -- Model -- TransientReference -- Interceptors 1.2 -- Interceptor classes -- Associating an interceptor class with the target class -- Default interceptors -- Interceptors for lifecycle callbacks -- Interceptor bindings -- Common annotations for the Java platform 1.2 -- Common annotation -- SQL utilities -- Web console for monitoring beans -- Summary -- Chapter 2: Persistence -- Common JPA annotations -- Named queries -- Relationships -- Cascade on one-to-one and one-to-many…”
Libro electrónico -
285174Publicado 2020Tabla de Contenidos: “…10.2.3.1 Interrupting Leading Indicators -- 10.2.4 How to Use Lagging Indicators -- 10.2.4.1 Interrupting Lagging Indicators -- 10.3 Continuous Improvement -- 10.3.1 Using Knowledge and Experience to Drive Improvements -- 10.3.2 The Propensity for Change to Facilitate Improvements -- 10.4 Applied Learning -- 10.4.1 Case Study -- References -- Chapter 11 Lessons Learned -- 11.1 Learning from the Past to Prevent Future Occurrences -- 11.2 Capturing and Documenting Lessons Learned -- 11.3 Communicating Lessons Learned -- 11.4 Integrating Lessons Learned to Produce Change -- 11.5 Applied Learning -- 11.5.1 Case Study -- References -- Chapter 12 Compliance and Implementation Toolkit -- Appendix A: Toolkit for Evaluating Resource Conservation and Recovery Act (RCRA) -- Appendix B: Toolkit for Evaluating NPDES -- Appendix C: Evaluating Air Emissions -- Appendix D: Toolkit for Evaluating EPCRA -- Appendix E: Toolkit for Evaluating SDWA -- Appendix F: Toolkit for Evaluating SPCC -- Appendix G: Toolkit for Evaluating FIFRA -- Appendix H: Toolkit for Evaluating TSCA -- Appendix I: Toolkit for Evaluating NEPA -- Appendix J: Toolkit for CERCLA -- Index…”
Libro electrónico -
285175Publicado 2024Tabla de Contenidos: “…Use case 3 - real-time fraud detection -- Summary -- Questions -- Chapter 7: Concurrency in Java for Machine Learning -- Technical requirements -- An overview of ML computational demands and Java concurrency alignment -- The intersection of Java concurrency and ML demands -- Parallel processing - the key to efficient ML workflows -- Handling big data with ease -- An overview of key ML techniques -- Case studies - real-world applications of Java concurrency in ML -- Java's tools for parallel processing in ML workflows -- DL4J - pioneering neural networks in Java -- Java thread pools for concurrent data processing -- Achieving scalable ML deployments using Java's concurrency APIs -- Best practices for thread management and reducing synchronization overhead -- Generative AI and Java - a new frontier -- Leveraging Java's concurrency model for efficient generative AI model training and inference -- Summary -- Questions -- Chapter 8: Microservices in the Cloud and Java's Concurrency -- Technical requirements -- Core principles of microservices - architectural benefits in cloud platforms -- Foundational concepts - microservices architecture and its benefits in the cloud -- Real-world examples - Netflix's evolution and Amazon's flexibility -- Essential Java concurrency tools for microservice management -- Concurrency tools - an exploration of Java's concurrency tools that are tailored for microservices -- Challenges and solutions in microservices concurrency -- Bottlenecks - diagnosing potential challenges in concurrent microservices architectures -- Consistency - ensuring data consistency and smooth inter-service communication -- Resilience - achieving system resilience and fault tolerance -- Practical design and implementation - building effective Java microservices -- Strategic best practices - deploying and scaling microservices…”
Libro electrónico -
285176Publicado 2004Tabla de Contenidos: “…Tips collection -- WebSphere Application Server Version 5 -- Administration -- J2EE based application -- Startup and shutdown procedure -- DB2 Universal Database Version 8 -- Relational database system -- DB2 on z/OS systems -- DB2 on AIX or Window systems -- Differences between z/OS and distributed DB2 processing -- Important tables -- z/OS Communication Server TCP/IP -- IBM Tivoli NetView for z/OS Version 5.…”
Libro electrónico -
285177Publicado 2003Tabla de Contenidos: “…Technology options -- 5.1 Web client -- 5.1.1 Web browser -- 5.1.2 HTML -- 5.1.3 Dynamic HTML -- 5.1.4 CSS -- 5.1.5 JavaScript -- 5.1.6 Java applets -- 5.1.7 XML (client side) -- 5.1.8 XHTML 1.1 (HTML 4.01) -- 5.1.9 VoiceXML -- 5.1.10 XForms -- 5.1.11 XSLT -- 5.1.12 Mobile clients -- 5.2 Web application server -- 5.2.1 Java servlets -- 5.2.2 JavaServer Pages (JSPs) -- 5.2.3 JavaBeans -- 5.2.4 XML -- 5.2.5 Enterprise JavaBeans -- 5.2.6 Additional enterprise Java APIs -- 5.3 Integration technologies -- 5.3.1 Web services -- 5.3.2 J2EE Connector Architecture -- 5.3.3 Java Message Service -- 5.3.4 Message Oriented Middleware -- 5.3.5 Others -- 5.4 Where to find more information -- Chapter 6. …”
Libro electrónico -
285178por Nunes, Fabio MazanattiTabla de Contenidos: “…Understanding how to use the startup annotation -- Establishing a startup and shutdown sequence -- Dealing with concurrency when using singletons -- Singleton applied to web services -- Persisting an object using JPA -- Understanding the available transaction contexts -- Using container-managed transactions -- Using bean-managed transactions -- Acquiring a transaction context manually -- A brief intermission -- Web services and SOAP -- The reservation web service -- Testing the service provider -- Consuming the service -- Web resources -- Summary -- Chapter 6: Using Events, Interceptors, and Logging Services -- Understanding interceptors -- Creating a log interceptor -- Interceptors and Aspect Oriented Programming -- Using asynchronous methods -- Understanding WebLogic's logging service -- Anatomy of a log message -- Redirecting standard output to a log file -- Integrating Log4J to WebLogic's logging services -- Accessing and reading log files -- Events -- Defining audit events -- Web resources -- Summary -- Chapter 7: Remote Access with JMS -- WebLogic clients -- Thin T3 client - wlthint3client.jar -- RMI thin client - wlclient.jar -- JMS thin client - wljmsclient.jar -- JMS SAF client - wlsafclient.jar -- JMS T3 SAF client - wlsaft3client.jar -- Full client - wlfullclient.jar -- JMX client - wljmxclient.jar -- Java Messaging Service (JMS) and WebLogic -- The persistent store -- The JMS server -- The JMS module -- The JMS subdeployment -- The JMS queue -- The JMS connection factory -- Posting messages from a standalone client -- Creating the project -- Coding the message producer -- Queuing messages -- Consuming messages with an MDB -- Configuring thread limits for MDBs -- The Store-and-Forward client feature -- Creating the configuration file -- Encrypting the connection password -- Adjusting the configuration file -- Adjusting the code…”
Publicado 2013
Libro electrónico -
285179Publicado 2012Tabla de Contenidos: “…Chapter 12 Security Administration and Planning -- Understanding Security Policies -- Security Policy Characteristics -- Enforcing Security Policies -- Value of a Security Policy -- Understanding Code of Ethics -- Policy Awareness -- Updating Security Policies -- Understanding Business Continuity Plans -- Business Impact Analysis -- Disaster Recovery Plan -- Comparing a BCP and a DRP -- Alternate Locations -- Identifying Security Organizations -- NIST -- US-CERT -- CERT/CC -- Questions -- Answers -- Chapter 13 Legal Issues -- Exploring Computer Forensics -- First Responders and Preserving the Scene -- Three Phases of a Computer Forensics Investigation -- Forensic Evidence Guiding Principles -- Volatile Data -- Comparing Computer Abuse and Computer Crime -- Understanding Fraud and Embezzlement Crime -- Mandatory Vacations -- Job Rotation -- Understanding Privacy Issues -- European Directives -- California Supreme Court Rules That Zip Codes Are PII -- Connecticut's Public Act No. 08-167 -- Children's Online Privacy Protection -- California Online Privacy Protection Act of 2003 -- Questions -- Answers -- Chapter 14 Cryptography -- An Overview of Cryptography Concepts -- Enforcing Integrity with Hashing -- Hashing Algorithms Provide One-Way Encryption -- Hashing Algorithms -- Verifying a Hash -- Exploring Symmetric Encryption -- ROT13 -- Comparing Block and Stream Ciphers -- Advanced Encryption Standard -- Other Symmetric Encryption Algorithms -- Exploring Asymmetric Encryption -- Secure Sockets Layer -- Protecting E-mail with S/MIME -- Other Encryption Schemes -- Steganography -- IPsec -- Public Key Infrastructure -- Certificates -- Certification Authority -- Comparing Cryptanalysis Attacks -- Known Plaintext Attack -- Cipher Text Attack -- Questions -- Answers -- Appendix: About the CD -- Glossary -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K.…”
Libro electrónico -
285180Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Overview of Spring 5 and Spring Security 5 -- How examples are structured -- New-generation application requirements -- Reactive programming -- Reactive applications -- Reactive Manifesto -- Responsive -- Resilient -- Elastic -- Message-driven -- Spring Framework -- Reactive Landscape in Java -- Reactive Streams and Reactive Streams Specifications -- Non-blocking -- Backpressure -- Reactive Extensions -- RxJava -- Reactive Streams and RxJava -- JDK 9 additions -- Important interfaces -- The Publisher Interface -- The Subscriber Interface -- The Subscription interface -- The Processor interface -- Spring Framework and reactive applications -- Modules in Reactor -- Reactive types in Reactor Core -- The Flux reative type -- The Mono reactive type -- Data stream types -- Reactor and RxJava -- Reactive Web Application -- Spring WebFlux -- Reactive Spring Web -- WebClient -- WebSockets -- Application security -- Spring Security -- Spring Security terminologies -- Spring Security's core features -- Authentication -- Authorization -- Spring Security 5's new features -- Working of Spring Security -- Servlet Filter -- Filter Chain -- Security Interceptor (DelegatingFilterProxy) -- Core Spring Security modules -- Summary -- Chapter 2: Deep Diving into Spring Security -- Authentication -- Setting up AuthenticationManager -- AuthenticationProvider -- Custom AuthenticationProvider -- Multiple AuthenticationProvider -- Sample application -- Base project setup -- Step 1-Create a Maven project in IntelliJ IDEA -- Step 2-pom.xml changes -- Step 3-MySQL database schema setup -- Step 4-Setting up MySQL database properties in your project -- Step 5-Spring application configuration -- Step 6-Web application configuration…”
Libro electrónico