Mostrando 287,861 - 287,880 Resultados de 288,750 Para Buscar '"S. J."', tiempo de consulta: 0.73s Limitar resultados
  1. 287861
    por Nunes, Fabio Mazanatti
    Publicado 2013
    Tabla de Contenidos: “…Understanding how to use the startup annotation -- Establishing a startup and shutdown sequence -- Dealing with concurrency when using singletons -- Singleton applied to web services -- Persisting an object using JPA -- Understanding the available transaction contexts -- Using container-managed transactions -- Using bean-managed transactions -- Acquiring a transaction context manually -- A brief intermission -- Web services and SOAP -- The reservation web service -- Testing the service provider -- Consuming the service -- Web resources -- Summary -- Chapter 6: Using Events, Interceptors, and Logging Services -- Understanding interceptors -- Creating a log interceptor -- Interceptors and Aspect Oriented Programming -- Using asynchronous methods -- Understanding WebLogic's logging service -- Anatomy of a log message -- Redirecting standard output to a log file -- Integrating Log4J to WebLogic's logging services -- Accessing and reading log files -- Events -- Defining audit events -- Web resources -- Summary -- Chapter 7: Remote Access with JMS -- WebLogic clients -- Thin T3 client - wlthint3client.jar -- RMI thin client - wlclient.jar -- JMS thin client - wljmsclient.jar -- JMS SAF client - wlsafclient.jar -- JMS T3 SAF client - wlsaft3client.jar -- Full client - wlfullclient.jar -- JMX client - wljmxclient.jar -- Java Messaging Service (JMS) and WebLogic -- The persistent store -- The JMS server -- The JMS module -- The JMS subdeployment -- The JMS queue -- The JMS connection factory -- Posting messages from a standalone client -- Creating the project -- Coding the message producer -- Queuing messages -- Consuming messages with an MDB -- Configuring thread limits for MDBs -- The Store-and-Forward client feature -- Creating the configuration file -- Encrypting the connection password -- Adjusting the configuration file -- Adjusting the code…”
    Libro electrónico
  2. 287862
    Publicado 2012
    Tabla de Contenidos: “…Chapter 12 Security Administration and Planning -- Understanding Security Policies -- Security Policy Characteristics -- Enforcing Security Policies -- Value of a Security Policy -- Understanding Code of Ethics -- Policy Awareness -- Updating Security Policies -- Understanding Business Continuity Plans -- Business Impact Analysis -- Disaster Recovery Plan -- Comparing a BCP and a DRP -- Alternate Locations -- Identifying Security Organizations -- NIST -- US-CERT -- CERT/CC -- Questions -- Answers -- Chapter 13 Legal Issues -- Exploring Computer Forensics -- First Responders and Preserving the Scene -- Three Phases of a Computer Forensics Investigation -- Forensic Evidence Guiding Principles -- Volatile Data -- Comparing Computer Abuse and Computer Crime -- Understanding Fraud and Embezzlement Crime -- Mandatory Vacations -- Job Rotation -- Understanding Privacy Issues -- European Directives -- California Supreme Court Rules That Zip Codes Are PII -- Connecticut's Public Act No. 08-167 -- Children's Online Privacy Protection -- California Online Privacy Protection Act of 2003 -- Questions -- Answers -- Chapter 14 Cryptography -- An Overview of Cryptography Concepts -- Enforcing Integrity with Hashing -- Hashing Algorithms Provide One-Way Encryption -- Hashing Algorithms -- Verifying a Hash -- Exploring Symmetric Encryption -- ROT13 -- Comparing Block and Stream Ciphers -- Advanced Encryption Standard -- Other Symmetric Encryption Algorithms -- Exploring Asymmetric Encryption -- Secure Sockets Layer -- Protecting E-mail with S/MIME -- Other Encryption Schemes -- Steganography -- IPsec -- Public Key Infrastructure -- Certificates -- Certification Authority -- Comparing Cryptanalysis Attacks -- Known Plaintext Attack -- Cipher Text Attack -- Questions -- Answers -- Appendix: About the CD -- Glossary -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K.…”
    Libro electrónico
  3. 287863
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Overview of Spring 5 and Spring Security 5 -- How examples are structured -- New-generation application requirements -- Reactive programming -- Reactive applications -- Reactive Manifesto -- Responsive -- Resilient -- Elastic -- Message-driven -- Spring Framework -- Reactive Landscape in Java -- Reactive Streams and Reactive Streams Specifications -- Non-blocking -- Backpressure -- Reactive Extensions -- RxJava -- Reactive Streams and RxJava -- JDK 9 additions -- Important interfaces -- The Publisher Interface -- The Subscriber Interface -- The Subscription interface -- The Processor interface -- Spring Framework and reactive applications -- Modules in Reactor -- Reactive types in Reactor Core -- The Flux reative type -- The Mono reactive type -- Data stream types -- Reactor and RxJava -- Reactive Web Application -- Spring WebFlux -- Reactive Spring Web -- WebClient -- WebSockets -- Application security -- Spring Security -- Spring Security terminologies -- Spring Security's core features -- Authentication -- Authorization -- Spring Security 5's new features -- Working of Spring Security -- Servlet Filter -- Filter Chain -- Security Interceptor (DelegatingFilterProxy) -- Core Spring Security modules -- Summary -- Chapter 2: Deep Diving into Spring Security -- Authentication -- Setting up AuthenticationManager -- AuthenticationProvider -- Custom AuthenticationProvider -- Multiple AuthenticationProvider -- Sample application -- Base project setup -- Step 1-Create a Maven project in IntelliJ IDEA -- Step 2-pom.xml changes -- Step 3-MySQL database schema setup -- Step 4-Setting up MySQL database properties in your project -- Step 5-Spring application configuration -- Step 6-Web application configuration…”
    Libro electrónico
  4. 287864
    Publicado 2004
    Tabla de Contenidos: “…Functional considerations -- 3.1 Host connectivity -- 3.1.1 IBM WebSphere Host On-Demand -- 3.1.2 x3270 -- 3.1.3 tn5250 and tn5250j -- 3.1.4 PowerTerm InterConnect -- 3.2 Web browsers -- 3.2.1 Mozilla -- 3.2.2 Konqueror -- 3.2.3 Galeon -- 3.2.4 Epiphany -- 3.2.5 Opera -- 3.3 Web browser plug-ins -- 3.3.1 PDF -- 3.3.2 Java plug-in for applets -- 3.3.3 Flash -- 3.3.4 RealOne and Helix -- 3.4 Instant messaging -- 3.4.1 Lotus Instant Messaging and Web Conferencing 3.1 -- 3.4.2 Yahoo! …”
    Libro electrónico
  5. 287865
    Publicado 2024
    Tabla de Contenidos: “…Generating code -- Cleaning up -- Summary -- Chapter 4: Securing Your Code with Cloud Workstations -- Technical requirements -- Introduction to Cloud Workstations -- Cloud Workstations architecture -- Configuring workstations for developers -- Creating a workstation cluster -- Creating a workstation configuration for the base editor -- Creating a workstation configuration for the IntelliJ IDEA Ultimate IDE -- Creating workstations and assigning them to developers -- Customizing Cloud Workstations -- Creating a custom image and workstation configuration -- Updating Cloud workstations -- Coding on Cloud Workstations -- Accessing a Cloud workstation configured with the base editor -- Accessing a Cloud workstation configured with a JetBrains IDE -- Cleaning up -- Summary -- Part 2: Build and Package Your Application -- Chapter 5: Automating Continuous Integration with Cloud Build -- Technical requirements -- Cloud Build architecture and capabilities -- Building your application manually -- Running a simple build from the command line -- Adding automated tests to your build -- Building your application using Skaffold -- Using substitutions -- Customizing your build workers -- Custom machine types -- Private worker pools -- Generating security information for your build -- Producing digitally signed provenance -- Viewing vulnerability reports and provenance -- Automating builds -- Creating your source code repository -- Connecting your source code repository to Cloud Build -- Creating a trigger for your build -- Running an automated build after a code commit -- Summary -- Chapter 6: Securely Store Your Software on Artifact Registry -- Technical requirements -- Managing container images with Artifact Registry -- Creating an Artifact Registry repository to store your image -- Viewing role-based access control on a repository…”
    Libro electrónico
  6. 287866
    Publicado 2019
    Tabla de Contenidos: “…Designing a Solar Collector -- J. Asymptotic Behavior of Solutions to Linear Equations -- Chapter 3: Mathematical Models and Numerical Methods Involving First-Order Equations -- 3.1. …”
    Libro electrónico
  7. 287867
    por Knapp, Eric D.
    Publicado 2024
    Tabla de Contenidos: “…OPC -- ICCP/TASE.2 -- Physical hardware -- Summary -- 7 - Hacking Industrial Control Systems -- Motives and consequences -- Consequences of a successful cyberincident -- Cybersecurity and safety -- Common industrial targets -- The evolution of the industrial cyberattack -- Common attack methods -- Attack phases -- Initial attack phases -- Industrial attack phases -- Cyber-physical attacks -- Rogue access devices -- Keylogging/keystroke injections/HID attacks -- Man-in-the-middle attacks -- Denial-of-service attacks -- Replay attacks -- Compromising the human-machine interface -- Compromising the engineering workstation -- Blended attacks -- Weaponized industrial cyberthreats -- Stuxnet -- Dissecting stuxnet -- What it does -- Lessons learned -- Shamoon/DistTrack -- Flame/flamer/skywiper -- Dragonfly -- BlackEnergy -- Industroyer -- TRISIS/TRITON -- Industroyer2 -- Incontroller/pipedream -- Attack trends -- Evolving vectors -- Supply chain vulnerabilities -- Adobe Portable Document Format -- Macros -- Secure sockets layers -- Log4j -- Ransomware and industrial control systems -- Industrial application layer protocols -- Antisocial networks: A new playground for malware -- Polymorphic and adaptive malware -- Dealing with an infection -- Summary -- 8 - Risk and Vulnerability Assessments -- Cybersecurity and risk management -- Why risk management is the foundation of cyber security? …”
    Libro electrónico
  8. 287868
    por Charantimath, Poornima M.
    Publicado 2005
    Tabla de Contenidos: “…Entrepreneurial Development Models -- (a) Psychological Models -- (b) Sociological Models -- (e) Integrated Models -- Problems Faced by Entrepreneurs and Capacity Building for Entrepreneurship -- Internal Problems of Entrepreneurs -- External Problems of Entrepreneurs -- Specific Management Problems -- Capacity Building for Entrepreneurship -- Profiles of Successful Entrepreneurs -- Rags to Riches-Dhirubhai Ambani -- The Nirma Story-The Saga of Karsanbhai Patel -- Business opportunity identification -- The King of Omega-3-P.J. ). Kunjachan -- Summary -- Key Words -- Case Studies -- Exercises -- References -- Chapter 3: Women Entrepreneurs -- Women Entrepreneurship Defined -- Definition -- Importance of Women Entrepreneurs -- Factors Influencing Women Entrepreneurs -- Women Entrepreneurship in Asia -- Women Entrepreneurs in India -- Women Entrepreneurship Environment -- Status of Women Entrepreneurs -- Challenges in the Path of Women Entrepreneurship -- Lack of Confidence -- Problems of Finance and Working Capital -- Socio-cultural Barriers -- Production Problems -- Inefficient Marketing Arrangements -- Strategies for the Development of Women Entrepreneurs -- Empowerment of Women by Entrepreneurship -- Grassroot Entrepreneurship through Self-help Groups (SHGs) -- How do SHGs Work? …”
    Libro electrónico
  9. 287869
  10. 287870
    por Poincaré Seminar
    Publicado 2007
    “…rmed by detailed experiments, incl- ing the precise timing of the double pulsar J0737-3039 explained by M. Kramer, member of the team which discovered it in 2003, and satellite missions such as Gravity Probe B described by J. …”
    Libro electrónico
  11. 287871
    Publicado 2005
    Tabla de Contenidos: “…P.2 - La figura de Tersites en la Segunda Sofística / Alberto J. Quiroga Puertas pags. 497-504 ; Las "Iliupersis" trágicas de Eurípides: "Hécuba" y "Troyanas" / Lucía Romero Mariscal pags. 505-514 ; ¿Testio o Tespio en Ath. …”
    Libro
  12. 287872
    Publicado 2008
    “…Saggi di Diego Quaglioni, Gian Carlo Garfagnini, J.-L. Fournel, J.-C. Zancarini, J.-J. Marchand, Gian Mario Anselmi. …”
    Libro
  13. 287873
    por Naidu, S. Mani
    Publicado 2009
    “…Applied Physics is designed to cater to the needs of first year undergraduate engineering students of Jawaharlal Nehru Technical University (J.N.T.U). Written in a lucid style, this book assimilates the best practices of conceptual pedagogy, dealin…”
    Libro electrónico
  14. 287874
    Publicado 1777
    Accés lliure via BiPaDi
    Libro
  15. 287875
  16. 287876
    por Schlickers, Sabine
    Publicado 2021
    Tabla de Contenidos: “…Los niños del Brasil (1978) de Franklin J. Schaffner -- 2.2.4. Dora (2013) de Ignacio Minaverry -- 2.3. …”
    Libro electrónico
  17. 287877
    por Cuenca (Diócesis)
    Publicado 1785
    Tabla de Contenidos: “…Port. con grab. calc.: "J. Ballester la grabó" Sociedad Económica de Amigos del País(León-Reglamentos. …”
    Colección
  18. 287878
    por Barcelona (Catalunya).
    Publicado 1987
    Tabla de Contenidos: “…Vall d'Hebron, Arq. Manuel Ribas i Piera, J.F. Chico i Sauquet i Servei de Planejament -- P.E. …”
    Libro
  19. 287879
    por Neumann, Manfred
    Publicado 2022
    Tabla de Contenidos: “…Monissen, Gießen: Arbeitskreis 1: Unternehmensverfassung und Theorie der Firma -- Ingo Böbel, Erlangen - Nürnberg/Newark (New Jersey)/Manfred J. Dirrheimer, Berlin/Dallas (Texas): Eigentumsrechte, Managementmotivation und Marktverhalten: Ein Beitrag zur Erweiterung der Theorie der Unternehmung -- I. …”
    Libro electrónico
  20. 287880
    por Hesse, Helmut
    Publicado 2022
    Tabla de Contenidos: “…Schlußbemerkung -- Walter Kerber S.J., München: Sittlich handeln unter dem Druck ökonomischer Sachzwänge -- I. …”
    Libro electrónico