Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 8,645
- Història 4,168
- Biblia 3,494
- Filosofía 2,882
- Crítica e interpretación 2,459
- Bíblia 2,155
- Teología 1,641
- Església Catòlica 1,559
- -Historia 1,496
- Iglesia Católica 1,367
- Crítica i interpretació 1,277
- Jesuitas 1,193
- Espiritualidad 1,148
- History 1,077
- Padres de la Iglesia 990
- Filosofia 976
- Matemáticas 966
- Teología dogmática 924
- Economía 919
- Política 898
- Jesucristo 886
- Literatura 873
- Biografia 870
- Psicología 809
- Teologia 787
- Derecho 779
- Historia y crítica 771
- Iglesia 767
- historia 747
- Patrística 737
-
287861por Nunes, Fabio MazanattiTabla de Contenidos: “…Understanding how to use the startup annotation -- Establishing a startup and shutdown sequence -- Dealing with concurrency when using singletons -- Singleton applied to web services -- Persisting an object using JPA -- Understanding the available transaction contexts -- Using container-managed transactions -- Using bean-managed transactions -- Acquiring a transaction context manually -- A brief intermission -- Web services and SOAP -- The reservation web service -- Testing the service provider -- Consuming the service -- Web resources -- Summary -- Chapter 6: Using Events, Interceptors, and Logging Services -- Understanding interceptors -- Creating a log interceptor -- Interceptors and Aspect Oriented Programming -- Using asynchronous methods -- Understanding WebLogic's logging service -- Anatomy of a log message -- Redirecting standard output to a log file -- Integrating Log4J to WebLogic's logging services -- Accessing and reading log files -- Events -- Defining audit events -- Web resources -- Summary -- Chapter 7: Remote Access with JMS -- WebLogic clients -- Thin T3 client - wlthint3client.jar -- RMI thin client - wlclient.jar -- JMS thin client - wljmsclient.jar -- JMS SAF client - wlsafclient.jar -- JMS T3 SAF client - wlsaft3client.jar -- Full client - wlfullclient.jar -- JMX client - wljmxclient.jar -- Java Messaging Service (JMS) and WebLogic -- The persistent store -- The JMS server -- The JMS module -- The JMS subdeployment -- The JMS queue -- The JMS connection factory -- Posting messages from a standalone client -- Creating the project -- Coding the message producer -- Queuing messages -- Consuming messages with an MDB -- Configuring thread limits for MDBs -- The Store-and-Forward client feature -- Creating the configuration file -- Encrypting the connection password -- Adjusting the configuration file -- Adjusting the code…”
Publicado 2013
Libro electrónico -
287862Publicado 2012Tabla de Contenidos: “…Chapter 12 Security Administration and Planning -- Understanding Security Policies -- Security Policy Characteristics -- Enforcing Security Policies -- Value of a Security Policy -- Understanding Code of Ethics -- Policy Awareness -- Updating Security Policies -- Understanding Business Continuity Plans -- Business Impact Analysis -- Disaster Recovery Plan -- Comparing a BCP and a DRP -- Alternate Locations -- Identifying Security Organizations -- NIST -- US-CERT -- CERT/CC -- Questions -- Answers -- Chapter 13 Legal Issues -- Exploring Computer Forensics -- First Responders and Preserving the Scene -- Three Phases of a Computer Forensics Investigation -- Forensic Evidence Guiding Principles -- Volatile Data -- Comparing Computer Abuse and Computer Crime -- Understanding Fraud and Embezzlement Crime -- Mandatory Vacations -- Job Rotation -- Understanding Privacy Issues -- European Directives -- California Supreme Court Rules That Zip Codes Are PII -- Connecticut's Public Act No. 08-167 -- Children's Online Privacy Protection -- California Online Privacy Protection Act of 2003 -- Questions -- Answers -- Chapter 14 Cryptography -- An Overview of Cryptography Concepts -- Enforcing Integrity with Hashing -- Hashing Algorithms Provide One-Way Encryption -- Hashing Algorithms -- Verifying a Hash -- Exploring Symmetric Encryption -- ROT13 -- Comparing Block and Stream Ciphers -- Advanced Encryption Standard -- Other Symmetric Encryption Algorithms -- Exploring Asymmetric Encryption -- Secure Sockets Layer -- Protecting E-mail with S/MIME -- Other Encryption Schemes -- Steganography -- IPsec -- Public Key Infrastructure -- Certificates -- Certification Authority -- Comparing Cryptanalysis Attacks -- Known Plaintext Attack -- Cipher Text Attack -- Questions -- Answers -- Appendix: About the CD -- Glossary -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K.…”
Libro electrónico -
287863Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Overview of Spring 5 and Spring Security 5 -- How examples are structured -- New-generation application requirements -- Reactive programming -- Reactive applications -- Reactive Manifesto -- Responsive -- Resilient -- Elastic -- Message-driven -- Spring Framework -- Reactive Landscape in Java -- Reactive Streams and Reactive Streams Specifications -- Non-blocking -- Backpressure -- Reactive Extensions -- RxJava -- Reactive Streams and RxJava -- JDK 9 additions -- Important interfaces -- The Publisher Interface -- The Subscriber Interface -- The Subscription interface -- The Processor interface -- Spring Framework and reactive applications -- Modules in Reactor -- Reactive types in Reactor Core -- The Flux reative type -- The Mono reactive type -- Data stream types -- Reactor and RxJava -- Reactive Web Application -- Spring WebFlux -- Reactive Spring Web -- WebClient -- WebSockets -- Application security -- Spring Security -- Spring Security terminologies -- Spring Security's core features -- Authentication -- Authorization -- Spring Security 5's new features -- Working of Spring Security -- Servlet Filter -- Filter Chain -- Security Interceptor (DelegatingFilterProxy) -- Core Spring Security modules -- Summary -- Chapter 2: Deep Diving into Spring Security -- Authentication -- Setting up AuthenticationManager -- AuthenticationProvider -- Custom AuthenticationProvider -- Multiple AuthenticationProvider -- Sample application -- Base project setup -- Step 1-Create a Maven project in IntelliJ IDEA -- Step 2-pom.xml changes -- Step 3-MySQL database schema setup -- Step 4-Setting up MySQL database properties in your project -- Step 5-Spring application configuration -- Step 6-Web application configuration…”
Libro electrónico -
287864Publicado 2004Tabla de Contenidos: “…Functional considerations -- 3.1 Host connectivity -- 3.1.1 IBM WebSphere Host On-Demand -- 3.1.2 x3270 -- 3.1.3 tn5250 and tn5250j -- 3.1.4 PowerTerm InterConnect -- 3.2 Web browsers -- 3.2.1 Mozilla -- 3.2.2 Konqueror -- 3.2.3 Galeon -- 3.2.4 Epiphany -- 3.2.5 Opera -- 3.3 Web browser plug-ins -- 3.3.1 PDF -- 3.3.2 Java plug-in for applets -- 3.3.3 Flash -- 3.3.4 RealOne and Helix -- 3.4 Instant messaging -- 3.4.1 Lotus Instant Messaging and Web Conferencing 3.1 -- 3.4.2 Yahoo! …”
Libro electrónico -
287865Publicado 2024Tabla de Contenidos: “…Generating code -- Cleaning up -- Summary -- Chapter 4: Securing Your Code with Cloud Workstations -- Technical requirements -- Introduction to Cloud Workstations -- Cloud Workstations architecture -- Configuring workstations for developers -- Creating a workstation cluster -- Creating a workstation configuration for the base editor -- Creating a workstation configuration for the IntelliJ IDEA Ultimate IDE -- Creating workstations and assigning them to developers -- Customizing Cloud Workstations -- Creating a custom image and workstation configuration -- Updating Cloud workstations -- Coding on Cloud Workstations -- Accessing a Cloud workstation configured with the base editor -- Accessing a Cloud workstation configured with a JetBrains IDE -- Cleaning up -- Summary -- Part 2: Build and Package Your Application -- Chapter 5: Automating Continuous Integration with Cloud Build -- Technical requirements -- Cloud Build architecture and capabilities -- Building your application manually -- Running a simple build from the command line -- Adding automated tests to your build -- Building your application using Skaffold -- Using substitutions -- Customizing your build workers -- Custom machine types -- Private worker pools -- Generating security information for your build -- Producing digitally signed provenance -- Viewing vulnerability reports and provenance -- Automating builds -- Creating your source code repository -- Connecting your source code repository to Cloud Build -- Creating a trigger for your build -- Running an automated build after a code commit -- Summary -- Chapter 6: Securely Store Your Software on Artifact Registry -- Technical requirements -- Managing container images with Artifact Registry -- Creating an Artifact Registry repository to store your image -- Viewing role-based access control on a repository…”
Libro electrónico -
287866Publicado 2019Tabla de Contenidos: “…Designing a Solar Collector -- J. Asymptotic Behavior of Solutions to Linear Equations -- Chapter 3: Mathematical Models and Numerical Methods Involving First-Order Equations -- 3.1. …”
Libro electrónico -
287867por Knapp, Eric D.Tabla de Contenidos: “…OPC -- ICCP/TASE.2 -- Physical hardware -- Summary -- 7 - Hacking Industrial Control Systems -- Motives and consequences -- Consequences of a successful cyberincident -- Cybersecurity and safety -- Common industrial targets -- The evolution of the industrial cyberattack -- Common attack methods -- Attack phases -- Initial attack phases -- Industrial attack phases -- Cyber-physical attacks -- Rogue access devices -- Keylogging/keystroke injections/HID attacks -- Man-in-the-middle attacks -- Denial-of-service attacks -- Replay attacks -- Compromising the human-machine interface -- Compromising the engineering workstation -- Blended attacks -- Weaponized industrial cyberthreats -- Stuxnet -- Dissecting stuxnet -- What it does -- Lessons learned -- Shamoon/DistTrack -- Flame/flamer/skywiper -- Dragonfly -- BlackEnergy -- Industroyer -- TRISIS/TRITON -- Industroyer2 -- Incontroller/pipedream -- Attack trends -- Evolving vectors -- Supply chain vulnerabilities -- Adobe Portable Document Format -- Macros -- Secure sockets layers -- Log4j -- Ransomware and industrial control systems -- Industrial application layer protocols -- Antisocial networks: A new playground for malware -- Polymorphic and adaptive malware -- Dealing with an infection -- Summary -- 8 - Risk and Vulnerability Assessments -- Cybersecurity and risk management -- Why risk management is the foundation of cyber security? …”
Publicado 2024
Libro electrónico -
287868por Charantimath, Poornima M.Tabla de Contenidos: “…Entrepreneurial Development Models -- (a) Psychological Models -- (b) Sociological Models -- (e) Integrated Models -- Problems Faced by Entrepreneurs and Capacity Building for Entrepreneurship -- Internal Problems of Entrepreneurs -- External Problems of Entrepreneurs -- Specific Management Problems -- Capacity Building for Entrepreneurship -- Profiles of Successful Entrepreneurs -- Rags to Riches-Dhirubhai Ambani -- The Nirma Story-The Saga of Karsanbhai Patel -- Business opportunity identification -- The King of Omega-3-P.J. ). Kunjachan -- Summary -- Key Words -- Case Studies -- Exercises -- References -- Chapter 3: Women Entrepreneurs -- Women Entrepreneurship Defined -- Definition -- Importance of Women Entrepreneurs -- Factors Influencing Women Entrepreneurs -- Women Entrepreneurship in Asia -- Women Entrepreneurs in India -- Women Entrepreneurship Environment -- Status of Women Entrepreneurs -- Challenges in the Path of Women Entrepreneurship -- Lack of Confidence -- Problems of Finance and Working Capital -- Socio-cultural Barriers -- Production Problems -- Inefficient Marketing Arrangements -- Strategies for the Development of Women Entrepreneurs -- Empowerment of Women by Entrepreneurship -- Grassroot Entrepreneurship through Self-help Groups (SHGs) -- How do SHGs Work? …”
Publicado 2005
Libro electrónico -
287869Publicado 1977Tabla de Contenidos: “…[et al]; traducción Lorea Barruti, J.L. Ortega Matas, Alberto Cardín Garay.--D.L. 1979.…”
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Biblioteca de la Universidad Pontificia de Salamanca, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Universitat Ramon Llull, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada, Biblioteca de Pastoral Madrid, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca Diocesana Bilbao, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
287870por Poincaré Seminar“…rmed by detailed experiments, incl- ing the precise timing of the double pulsar J0737-3039 explained by M. Kramer, member of the team which discovered it in 2003, and satellite missions such as Gravity Probe B described by J. …”
Publicado 2007
Libro electrónico -
287871Publicado 2005Tabla de Contenidos: “…P.2 - La figura de Tersites en la Segunda Sofística / Alberto J. Quiroga Puertas pags. 497-504 ; Las "Iliupersis" trágicas de Eurípides: "Hécuba" y "Troyanas" / Lucía Romero Mariscal pags. 505-514 ; ¿Testio o Tespio en Ath. …”
Libro -
287872Publicado 2008“…Saggi di Diego Quaglioni, Gian Carlo Garfagnini, J.-L. Fournel, J.-C. Zancarini, J.-J. Marchand, Gian Mario Anselmi. …”
Libro -
287873por Naidu, S. Mani“…Applied Physics is designed to cater to the needs of first year undergraduate engineering students of Jawaharlal Nehru Technical University (J.N.T.U). Written in a lucid style, this book assimilates the best practices of conceptual pedagogy, dealin…”
Publicado 2009
Libro electrónico -
287874
-
287875por Buffon, Georges Louis Leclerc, comte de, 1707-1788
Publicado 1791Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca Episcopal de Plasencia, Biblioteca Universidad de Deusto, Red de bibliotecas Iglesia Navarra, Biblioteca de la Universidad de Navarra, Biblioteca Central de Capuchinos de España)Libro -
287876por Schlickers, SabineTabla de Contenidos: “…Los niños del Brasil (1978) de Franklin J. Schaffner -- 2.2.4. Dora (2013) de Ignacio Minaverry -- 2.3. …”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
287877por Cuenca (Diócesis)Tabla de Contenidos: “…Port. con grab. calc.: "J. Ballester la grabó" Sociedad Económica de Amigos del País(León-Reglamentos. …”
Publicado 1785
Colección -
287878por Barcelona (Catalunya).Tabla de Contenidos: “…Vall d'Hebron, Arq. Manuel Ribas i Piera, J.F. Chico i Sauquet i Servei de Planejament -- P.E. …”
Publicado 1987
Libro -
287879por Neumann, ManfredTabla de Contenidos: “…Monissen, Gießen: Arbeitskreis 1: Unternehmensverfassung und Theorie der Firma -- Ingo Böbel, Erlangen - Nürnberg/Newark (New Jersey)/Manfred J. Dirrheimer, Berlin/Dallas (Texas): Eigentumsrechte, Managementmotivation und Marktverhalten: Ein Beitrag zur Erweiterung der Theorie der Unternehmung -- I. …”
Publicado 2022
Libro electrónico -
287880por Hesse, HelmutTabla de Contenidos: “…Schlußbemerkung -- Walter Kerber S.J., München: Sittlich handeln unter dem Druck ökonomischer Sachzwänge -- I. …”
Publicado 2022
Libro electrónico