Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 8,635
- Història 4,168
- Biblia 3,441
- Filosofía 2,853
- Crítica e interpretación 2,459
- Bíblia 2,156
- Església Catòlica 1,559
- Teología 1,512
- -Historia 1,498
- Iglesia Católica 1,352
- Crítica i interpretació 1,277
- Jesuitas 1,113
- History 1,077
- Espiritualidad 1,042
- Padres de la Iglesia 987
- Filosofia 976
- Matemáticas 966
- Teología dogmática 924
- Economía 904
- Biografia 870
- Política 868
- Literatura 865
- Jesucristo 852
- Psicología 795
- Teologia 787
- Derecho 775
- Historia y crítica 771
- historia 747
- Iglesia 734
- Patrística 731
-
285781por Seacord, Robert C.“…In addition, a large retail-supply-system case study--a system written in COBOL being modernized to one based on the J2EE architecture--runs throughout this book to demonstrate a real-world legacy system modernization effort. 0321118847B01232003…”
Publicado 2003
Libro electrónico -
285782por Wyke-Smith, Charles“…Write lightweight but powerful object-oriented code Modify the Document Object Model “Progressively enhance” your pages with JavaScript to provide the highest levels of accessibility to all users Learn sophisticated techniques for making your pages respond to user actions Use the downloadable Scriptin’ library of helper functions to speed development and ensure cross-browser compatibility Use Ajax scripting techniques to update specific areas of the page with data from the server Create powerful interface interactions, such as sliding panels and tree menus Evaluate frameworks such as jQuery and Prototype to find the best one for your needs Build an online application that looks and responds like a regular desktop application Easily adapt the Scriptin’ code examples for use in your own projects—download them at www.scriptinwithajax.com…”
Publicado 2010
Libro electrónico -
285783Publicado 2010“…In the books title, the stork represents the Dutch and the garuda functions as a symbol of Indonesia. J. Herman Burgers (1926) worked at the Dutch Department of Foreign Affairs. …”
Libro electrónico -
285784Publicado 2011“…Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authentication technologies See how real-world session attacks leak sensitive data and how to fortify your applications Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments Safety deploy XML, social networking, cloud computing, and Web 2.0 services Defend against RIA, Ajax, UGC, and browser-based, client-side exploits Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures…”
Libro electrónico -
285785Publicado 2010“…In this book, you’ll learn: Why common coding approaches leave users behind, and how progressive enhancement is a more inclusive and accessible alternative How to analyze complex interface designs, see the underlying semantic HTML experience that will work everywhere, and layer on advanced enhancements safely A unique browser capabilities testing suite that helps deliver enhancements only to devices that can handle them Real-world best practices for coding HTML, CSS, and JavaScript to work with progressive enhancement, and cases where forward-looking HTML5 and CSS3 techniques can be applied effectively today How to factor in accessibility features like WAI-ARIA and keyboard support to ensure universal access Detailed techniques to transform semantic HTML into interactive components like sliders, tabs, tree controls, and charts, along with downloadable jQuery-based widgets to apply directly in your projects…”
Libro electrónico -
285786Publicado 2016“…Previously, he worked as a data scientist, software engineer, and researcher at Foursquare, Google, Andreessen Horowitz, J.P. Morgan, and NASA. He is a regular contributor to VentureBeat, The Next Web, and Harvard Business Review. …”
-
285787Publicado 2012“…He has worked at Microsoft, where he developed and managed developers on the Visual Basic, Visual J++, and .NET Windows Forms teams, and co-founded a mobile development startup in Beijing specialising in iOS and Android apps. …”
-
285788por López, Antonio“…Deep gratitude for the generous support of those institutions that provided funding to enable this volume to be available simultaneously in print and open access: University of Oregon Libraries Open Access Publishing Award, Frank J. Guarini School of Busi-ness at John Cabot University, University of Vermont Humanities Center, University of California Santa Barbara, University of Lausanne, and School of Humanities at Nanyang Technological University…”
Publicado 2023
Libro electrónico -
285789Publicado 2002“…Rice Karl Erik Rosengren James Slevin Pamela J. Shoemaker John Tomlinson Gaye Tuchman Ellen Wartella Judith Williamson Dolf Zillmann Liesbet van Zoonen…”
Libro -
285790Publicado 2010“…Rothbart, M. R. Rueda, Brandon J. Schmeichel, Edward Slingerland, Oliver Stoll, Yiyuan Tang, Tores Theorell, Fredrik Ullen, Gabriele Wulf…”
Libro -
285791por Moran, Joe, 1970-“…Via trips down memory lane with Morecambe and Wise, Richard Dimbleby, David Frost, Blue Peter and Coronation Street, you can flick between fascinating nuggets from the strange side of TV: what happened after a chimpanzee called 'Fred J. Muggs' interrupted American footage of the Queen's wedding, and why aliens might be tuning in to The Benny Hill Show. …”
Publicado 2013
Libro -
285792Publicado 2015“…Differences-in-differences analysis of a Depression-era banking crisis offers a response. Could arresting O. J. Simpson have saved his ex-wife's life? Instrumental variables methods instruct law enforcement authorities in how best to respond to domestic abuse.Wielding econometric tools with skill and confidence, Mastering 'Metrics uses data and statistics to illuminate the path from cause to effect. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
285793por Jakobsen, Adam TilmarTabla de Contenidos: “…6.4.9.8 Browser Password -- 6.4.9.9 Supercookies -- 6.4.10 Mail -- 6.4.10.1 Mail Archives -- 6.4.10.2 Offline Folder Files -- 6.4.10.3 Unread Mail -- 6.4.11 Persistence -- 6.4.11.1 Auto Start Programs -- 6.4.11.2 Scheduled Tasks -- 6.4.11.3 Service -- 6.4.12 Evidence Destruction -- 6.4.12.1 Log Clearing -- 6.4.12.2 File Deletion Detection Using J -- 6.5 Summary -- Chapter 7 macOS Forensics -- 7.1 File System -- 7.1.1 Native File Types -- 7.2 Security -- 7.3 Acquisition -- 7.3.1 Memory -- 7.3.1.1 Hibernation and RAM -- 7.4 Analysis -- 7.5 Evidence Location -- 7.5.1 System Configuration -- 7.5.2 User Accounts and Activity -- 7.5.2.1 Keychain -- 7.5.2.2 Notes -- 7.5.2.3 Recent Items -- 7.5.3 System Logs -- 7.5.4 Browser Usage -- 7.5.5 Email -- 7.5.6 Persistence Mechanisms -- 7.5.6.1 Login Item -- 7.5.6.2 Launch Items (Agents and Daemons) -- 7.5.6.3 Log In/Log Out Hooks -- 7.5.6.4 Dynamic Libraries (dylib) -- 7.5.6.5 At Tasks -- 7.5.6.6 Event Monitor Rules -- 7.5.6.7 Re‐opened Applications -- 7.5.7 Evidence of Destruction -- 7.6 Summary -- Chapter 8 Linux Forensics -- 8.1 File System -- 8.1.1 File System Timestamps -- 8.2 Security -- 8.3 Acquisition -- 8.3.1 Dump Memory -- 8.4 Analysis -- 8.4.1 chroot -- 8.5 Evidence Location -- 8.5.1 System Info -- 8.5.1.1 System Version -- 8.5.1.2 Computer Name -- 8.5.1.3 Localtime Settings -- 8.5.1.4 Boot Logs -- 8.5.1.5 Kernel Logs -- 8.5.1.6 Apt Install Repository Sources -- 8.5.1.7 Hosts File -- 8.5.1.8 Root UUID -- 8.5.1.9 Services -- 8.5.1.10 Syslogs -- 8.5.1.11 Background Processes -- 8.5.1.12 Disk Partitions -- 8.5.2 User Activity -- 8.5.2.1 Accounts and Groups -- 8.5.2.2 Group Information -- 8.5.2.3 Command History -- 8.5.2.4 Authentication -- 8.5.2.5 Last Login -- 8.5.2.6 Failed Logon Attempts -- 8.5.2.7 Installation of Software -- 8.5.2.8 File Edit -- 8.5.3 Network -- 8.5.3.1 Interfaces…”
Publicado 2024
Libro electrónico -
285794Publicado 2020“…Dimock; D. Ingenschay; J. Mecke; M. Rössner; G. Pisarz-Ramirez; C. Sieber. …”
Libro electrónico -
285795Publicado 2014“…Merleau-Ponty, E. Levinas, M. Henry, J.L. Nancy, entre otros…”
Libro -
285796Publicado 2010“…The savvy editors have crafted a substantive volume that gives hope for true dialogue in our world of almost bewildering religious diversity."" --Anthony J. Godzieba Villanova University Catherine Cornille is Associate Professor of Comparative Theology at Boston College. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Libro -
285797Publicado 2011“…With contributions from Andrea Acri, Helen Creese, Arlo Griffiths, Thomas Hunter, Roy Jordaan, Lydia Kieven, Cecelia Levin, Wesley Michel, Stuart Robson and Adrian Vickers, this book is the result of a workshop held at the KITLV branch in Jakarta on May 26th–28th 2009 and supported by the Australia-Netherlands Research Collaboration, the École Française d’Extrême-Orient, and the Stichting J. Gonda Fonds. Full text (Open Access)…”
Libro electrónico -
285798Publicado 2011“…Dalle scorie produce il puro oro così come ciò che è afferrato dallo spirito del vero artista viene per così dire purificato attraverso il fuoco» (F.W.J. Schelling)…”
Libro electrónico -
285799por Mohapatra, Sanjay“…He has worked in various capacities in organizations like Hindusthan Aeronautics Limited, Larsen & Toubro, PricewaterHouse Coopers, Infosys, Polaris & J&B Software. He has consulted many organizations in different domains such as Utilities, Banking, Insurance and healthcare sectors. …”
Publicado 2013
Libro electrónico -
285800Publicado 2018“…Here are just some of the areas in which this course can benefit you: Review the historical context of Moore’s Law and how Java has benefitted from it over the years Examine the technical complexities of the JVM subsystems See how to design and set up monitoring and logging systems to help you analyze and assess how your code is functioning Learn both basic and advanced garbage collection techniques Compile AOT and JIT, including tiered compilation and how it really works Investigate concurrent techniques such as synchronization, OS-level locking, and non-availability to single-core processors Your host, Ben Evans is an author, speaker, consultant and educator. He is a co-founder of jClarity, a startup which delivers performance tools and services to help development and ops teams. …”