Mostrando 285,781 - 285,800 Resultados de 286,064 Para Buscar '"S. J."', tiempo de consulta: 0.64s Limitar resultados
  1. 285781
    por Seacord, Robert C.
    Publicado 2003
    “…In addition, a large retail-supply-system case study--a system written in COBOL being modernized to one based on the J2EE architecture--runs throughout this book to demonstrate a real-world legacy system modernization effort. 0321118847B01232003…”
    Libro electrónico
  2. 285782
    por Wyke-Smith, Charles
    Publicado 2010
    “…Write lightweight but powerful object-oriented code Modify the Document Object Model “Progressively enhance” your pages with JavaScript to provide the highest levels of accessibility to all users Learn sophisticated techniques for making your pages respond to user actions Use the downloadable Scriptin’ library of helper functions to speed development and ensure cross-browser compatibility Use Ajax scripting techniques to update specific areas of the page with data from the server Create powerful interface interactions, such as sliding panels and tree menus Evaluate frameworks such as jQuery and Prototype to find the best one for your needs Build an online application that looks and responds like a regular desktop application Easily adapt the Scriptin’ code examples for use in your own projects—download them at www.scriptinwithajax.com…”
    Libro electrónico
  3. 285783
    Publicado 2010
    “…In the books title, the stork represents the Dutch and the garuda functions as a symbol of Indonesia. J. Herman Burgers (1926) worked at the Dutch Department of Foreign Affairs. …”
    Libro electrónico
  4. 285784
    Publicado 2011
    “…Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authentication technologies See how real-world session attacks leak sensitive data and how to fortify your applications Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments Safety deploy XML, social networking, cloud computing, and Web 2.0 services Defend against RIA, Ajax, UGC, and browser-based, client-side exploits Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures…”
    Libro electrónico
  5. 285785
    Publicado 2010
    “…In this book, you’ll learn: Why common coding approaches leave users behind, and how progressive enhancement is a more inclusive and accessible alternative How to analyze complex interface designs, see the underlying semantic HTML experience that will work everywhere, and layer on advanced enhancements safely A unique browser capabilities testing suite that helps deliver enhancements only to devices that can handle them Real-world best practices for coding HTML, CSS, and JavaScript to work with progressive enhancement, and cases where forward-looking HTML5 and CSS3 techniques can be applied effectively today How to factor in accessibility features like WAI-ARIA and keyboard support to ensure universal access Detailed techniques to transform semantic HTML into interactive components like sliders, tabs, tree controls, and charts, along with downloadable jQuery-based widgets to apply directly in your projects…”
    Libro electrónico
  6. 285786
    Publicado 2016
    “…Previously, he worked as a data scientist, software engineer, and researcher at Foursquare, Google, Andreessen Horowitz, J.P. Morgan, and NASA. He is a regular contributor to VentureBeat, The Next Web, and Harvard Business Review. …”
    Video
  7. 285787
    Publicado 2012
    “…He has worked at Microsoft, where he developed and managed developers on the Visual Basic, Visual J++, and .NET Windows Forms teams, and co-founded a mobile development startup in Beijing specialising in iOS and Android apps. …”
    Video
  8. 285788
    por López, Antonio
    Publicado 2023
    “…Deep gratitude for the generous support of those institutions that provided funding to enable this volume to be available simultaneously in print and open access: University of Oregon Libraries Open Access Publishing Award, Frank J. Guarini School of Busi-ness at John Cabot University, University of Vermont Humanities Center, University of California Santa Barbara, University of Lausanne, and School of Humanities at Nanyang Technological University…”
    Libro electrónico
  9. 285789
    Publicado 2002
    “…Rice Karl Erik Rosengren James Slevin Pamela J. Shoemaker John Tomlinson Gaye Tuchman Ellen Wartella Judith Williamson Dolf Zillmann Liesbet van Zoonen…”
    Libro
  10. 285790
    Publicado 2010
    “…Rothbart, M. R. Rueda, Brandon J. Schmeichel, Edward Slingerland, Oliver Stoll, Yiyuan Tang, Tores Theorell, Fredrik Ullen, Gabriele Wulf…”
    Libro
  11. 285791
    por Moran, Joe, 1970-
    Publicado 2013
    “…Via trips down memory lane with Morecambe and Wise, Richard Dimbleby, David Frost, Blue Peter and Coronation Street, you can flick between fascinating nuggets from the strange side of TV: what happened after a chimpanzee called 'Fred J. Muggs' interrupted American footage of the Queen's wedding, and why aliens might be tuning in to The Benny Hill Show. …”
    Libro
  12. 285792
    Publicado 2015
    “…Differences-in-differences analysis of a Depression-era banking crisis offers a response. Could arresting O. J. Simpson have saved his ex-wife's life? Instrumental variables methods instruct law enforcement authorities in how best to respond to domestic abuse.Wielding econometric tools with skill and confidence, Mastering 'Metrics uses data and statistics to illuminate the path from cause to effect. …”
    Libro
  13. 285793
    por Jakobsen, Adam Tilmar
    Publicado 2024
    Tabla de Contenidos: “…6.4.9.8 Browser Password -- 6.4.9.9 Supercookies -- 6.4.10 Mail -- 6.4.10.1 Mail Archives -- 6.4.10.2 Offline Folder Files -- 6.4.10.3 Unread Mail -- 6.4.11 Persistence -- 6.4.11.1 Auto Start Programs -- 6.4.11.2 Scheduled Tasks -- 6.4.11.3 Service -- 6.4.12 Evidence Destruction -- 6.4.12.1 Log Clearing -- 6.4.12.2 File Deletion Detection Using J -- 6.5 Summary -- Chapter 7 macOS Forensics -- 7.1 File System -- 7.1.1 Native File Types -- 7.2 Security -- 7.3 Acquisition -- 7.3.1 Memory -- 7.3.1.1 Hibernation and RAM -- 7.4 Analysis -- 7.5 Evidence Location -- 7.5.1 System Configuration -- 7.5.2 User Accounts and Activity -- 7.5.2.1 Keychain -- 7.5.2.2 Notes -- 7.5.2.3 Recent Items -- 7.5.3 System Logs -- 7.5.4 Browser Usage -- 7.5.5 Email -- 7.5.6 Persistence Mechanisms -- 7.5.6.1 Login Item -- 7.5.6.2 Launch Items (Agents and Daemons) -- 7.5.6.3 Log In/Log Out Hooks -- 7.5.6.4 Dynamic Libraries (dylib) -- 7.5.6.5 At Tasks -- 7.5.6.6 Event Monitor Rules -- 7.5.6.7 Re‐opened Applications -- 7.5.7 Evidence of Destruction -- 7.6 Summary -- Chapter 8 Linux Forensics -- 8.1 File System -- 8.1.1 File System Timestamps -- 8.2 Security -- 8.3 Acquisition -- 8.3.1 Dump Memory -- 8.4 Analysis -- 8.4.1 chroot -- 8.5 Evidence Location -- 8.5.1 System Info -- 8.5.1.1 System Version -- 8.5.1.2 Computer Name -- 8.5.1.3 Localtime Settings -- 8.5.1.4 Boot Logs -- 8.5.1.5 Kernel Logs -- 8.5.1.6 Apt Install Repository Sources -- 8.5.1.7 Hosts File -- 8.5.1.8 Root UUID -- 8.5.1.9 Services -- 8.5.1.10 Syslogs -- 8.5.1.11 Background Processes -- 8.5.1.12 Disk Partitions -- 8.5.2 User Activity -- 8.5.2.1 Accounts and Groups -- 8.5.2.2 Group Information -- 8.5.2.3 Command History -- 8.5.2.4 Authentication -- 8.5.2.5 Last Login -- 8.5.2.6 Failed Logon Attempts -- 8.5.2.7 Installation of Software -- 8.5.2.8 File Edit -- 8.5.3 Network -- 8.5.3.1 Interfaces…”
    Libro electrónico
  14. 285794
    Publicado 2020
    “…Dimock; D. Ingenschay; J. Mecke; M. Rössner; G. Pisarz-Ramirez; C. Sieber. …”
    Libro electrónico
  15. 285795
    Publicado 2014
    “…Merleau-Ponty, E. Levinas, M. Henry, J.L. Nancy, entre otros…”
    Libro
  16. 285796
    Publicado 2010
    “…The savvy editors have crafted a substantive volume that gives hope for true dialogue in our world of almost bewildering religious diversity."" --Anthony J. Godzieba Villanova University Catherine Cornille is Associate Professor of Comparative Theology at Boston College. …”
    Libro
  17. 285797
    Publicado 2011
    “…With contributions from Andrea Acri, Helen Creese, Arlo Griffiths, Thomas Hunter, Roy Jordaan, Lydia Kieven, Cecelia Levin, Wesley Michel, Stuart Robson and Adrian Vickers, this book is the result of a workshop held at the KITLV branch in Jakarta on May 26th–28th 2009 and supported by the Australia-Netherlands Research Collaboration, the École Française d’Extrême-Orient, and the Stichting J. Gonda Fonds. Full text (Open Access)…”
    Libro electrónico
  18. 285798
    Publicado 2011
    “…Dalle scorie produce il puro oro così come ciò che è afferrato dallo spirito del vero artista viene per così dire purificato attraverso il fuoco» (F.W.J. Schelling)…”
    Libro electrónico
  19. 285799
    por Mohapatra, Sanjay
    Publicado 2013
    “…He has worked in various capacities in organizations like Hindusthan Aeronautics Limited, Larsen & Toubro, PricewaterHouse Coopers, Infosys, Polaris & J&B Software. He has consulted many organizations in different domains such as Utilities, Banking, Insurance and healthcare sectors. …”
    Libro electrónico
  20. 285800
    Publicado 2018
    “…Here are just some of the areas in which this course can benefit you: Review the historical context of Moore’s Law and how Java has benefitted from it over the years Examine the technical complexities of the JVM subsystems See how to design and set up monitoring and logging systems to help you analyze and assess how your code is functioning Learn both basic and advanced garbage collection techniques Compile AOT and JIT, including tiered compilation and how it really works Investigate concurrent techniques such as synchronization, OS-level locking, and non-availability to single-core processors Your host, Ben Evans is an author, speaker, consultant and educator. He is a co-founder of jClarity, a startup which delivers performance tools and services to help development and ops teams. …”
    Video