Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
1021Publicado 2013Tabla de Contenidos: “…Sheet-Metal Construction -- Design Philosophies -- Safe-Life Design -- Fail-Safe Design…”
Libro electrónico -
1022Publicado 2018Tabla de Contenidos: “…ANDROID SOFTWARE STACK [18] -- FIGURA 2. ARQUITECTURA DE SAFE CANDY -- FIGURA 3. MARCO DE TRABAJO PARA EL ANÁLISIS ESTÁTICO -- FIGURA 4. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1023por Ireland.Tabla de Contenidos: “…Dinneen, Molly Byrne -- The systematic approach to improving care for Frail Older Patients (SAFE) study: A protocol for co-designing a frail older person's pathway -- Éidín Ní Shé, Mary McCarthy, Deirdre O'Donnell, Orla Collins, Graham Hughes, Nigel Salter, Lisa Cogan, Coailfhionn O'Donoghue, Emmet McGrath, John O'Donovan, Andrew Patton, Eilish McAuliffe, Diarmuid O'Shea, Marie Therese Cooney -- Sexual transmission of Hepatitis C Virus infection in a heterosexual population: A systematic review -- Francesca Wuytack, Vittoria Lutje, Janus Christian Jakobsen, Karl Heinz Weiss, Paula Flanagan, Georgina Gethin, Louise Murphy, Siobhan Smyth, Declan Devane, Valerie Smith -- Assessment of the understanding of informed consent including participants' experiences, and generation of a supplemental consent decision aid for Gestational Diabetes Mellitus (GDM) research -- Shubham Atal, Fidelma Dunne -- A community-based parent-support programme to prevent child maltreatment: Protocol for a randomised controlled trial -- Mairead Furlong, Ann Stokes, Sinead McGilloway, Grainne Hickey, Yvonne Leckey, Tracey Bywater, Ciaran O'Neill, Chris Cardwell, Brian Taylor, Michael Donnelly, ENRICH Research Team -- Participants' perspectives and preferences on clinical trial result dissemination: The TRUST Thyroid Trial experience -- Emmy Racine, Caroline Hurley, Aoife Cheung, Carol Sinnott, Karen Matvienko-Sikar, Christine Baumgartner, Nicolas Rodondi, William H. …”
Publicado 2018
Revista digital -
1024Publicado 2022Tabla de Contenidos: “…Infrastructure as Code at Scale -- Evolving Business Requirements -- Evolving Security Requirements -- Evolving Provider Requirements -- The Way Ahead -- Chapter 3: Management of Infrastructure as Code -- The Emergence of Infrastructure Teams -- Preparing Infrastructure as Code -- Evaluation of Infrastructure -- Choosing the Right Security Mechanisms -- Structuring the Data -- Automating Workloads -- Uniform Governance -- Hybrid Strategies -- Blue-Green Deployment Strategy -- Process and Architecture -- Working Mechanism -- Preparing Deployments -- Adapting Simplicity -- Environment Replicability -- Configuration Management -- Process and Architecture -- The Way Ahead -- Chapter 4: Production Complexity Management -- Modern Application Infrastructures -- Managing Deployments Without Downtime -- Canary Deployment Strategy -- Process and Architecture -- Working Mechanism -- Adapting Simplicity -- Environment Replicability -- Rolling Release Deployment Strategy -- Process and Architecture -- Steps for Managing Production Complexity -- Harnessing the Power -- Fail-Safe Environment Management -- Monitoring Your Infrastructure -- Compartmentalizing Releases -- Adapting Serverless Architecture -- Feature Flagging -- The Impact of Deployment Strategies -- Caveats While Managing Complex Production Environments -- The Way Ahead -- Chapter 5: Business Solutions with Infrastructure as Code -- Managing Modern Infrastructures -- Enabling Business Possibilities -- Enabling Domain Sustainability -- Supporting Evolving Strategies -- Decision-Making for Businesses -- The Way Ahead -- Part 2: Hands-on Experience -- Chapter 6: Hands-on Infrastructure as Code with Hashicorp Terraform -- Introduction to Terraform -- Why Choose Terraform? …”
Libro electrónico -
1025por Tanner, Abdul WahidTabla de Contenidos: “…Chapter 15: How to Test With Multiple Threads -- Technical requirements -- Using multiple threads in tests -- Making the logging library thread-safe -- The need to justify multiple threads -- Changing the service return type -- Making multiple service calls -- How to test multiple threads without sleep -- Fixing one last problem detected with logging -- Summary -- Index -- Other Books You May Enjoy…”
Publicado 2022
Libro electrónico -
1026Publicado 2023Tabla de Contenidos: “…Control challenges (motion control) -- Overview of an application -- Overcoming the control challenge (motion control) -- Summary -- Chapter 6: Material Dispensing Control -- The need for quantity control -- Control challenge (quantity control - weight or volume) -- Overview of an application -- Overcoming the control challenge (quantity control - weight or volume) -- Summary -- Part 2: Automation and Humans -- Chapter 7: The Interplay of Humans-Machines-Automation -- Humans and machines -- The need for interaction with machines -- Interaction while in operation -- Interaction while the machine is constructed -- Interaction at the design and testing stages -- Interaction at the supply chain and procurement stages -- Programming platforms and programming languages -- IEC 61131-3 languages -- Various formats of the application software -- Data from the process - values, alarms, and events -- Elementary operator interface - switches, dials, and meters -- Supervisory control -- Plantwide information -- Digital dashboards -- SCADA systems -- DCSs -- Advanced functions -- Mobile first - control from anywhere -- Summary -- Chapter 8: Automation - Dramatically Helping Avoid Human Intervention -- The need to reduce human intervention -- The control challenge in designing machines without supervision -- Application examples -- Continuous processes -- No-second-chance missions -- A high cost of error -- How the control challenge is solved -- Stored program controllers -- Maintenance techniques -- Systems with redundancy -- Fail-safe configurations -- Graceful degradation -- Lights-out factory -- Almost-human machines -- Summary -- Chapter 9: Automation Can Build a Super-Organism with Awareness -- A blueprint of automation with awareness -- Automation as a super-organism -- Automation and awareness -- Technological advances to help realize the blueprint…”
Libro electrónico -
1027Publicado 2025Tabla de Contenidos: “…-- The Case for Action -- Becoming Company B -- Explore and Discover -- Assess the Current State -- Create a Vision with Substance -- Build Trust -- Create a Safe Environment -- Train and Transform -- Remove Systemic Barriers -- Raise the Bar -- Share and Learn -- Reflecting on the Future -- Notes -- About the Author -- Index -- EULA…”
Libro electrónico -
1028por MODELS 2009Tabla de Contenidos: “…-- (Meta-)Model Modeling and Management -- Modeling Modeling -- Representation and Traversal of Large Clabject Models -- Meta-model Pruning -- Quantitative Modeling with UML -- A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems -- Model Driven Performance Measurement and Assessment with MoDePeMART -- Security Analysis of a Biometric Authentication System Using UMLsec and JML -- Model Transformations and Constraints -- Automatically Discovering Hidden Transformation Chaining Constraints -- CSP(M): Constraint Satisfaction Problem over Models -- Parsing SBVR-Based Controlled Languages -- Model Management -- SLIM—A Lightweight Environment for Synchronous Collaborative Modeling -- Language-Independent Change Management of Process Models -- Requirements for Practical Model Merge – An Industrial Perspective -- UML in Practice and Quality Assurance -- Evaluating the Impact of UML Modeling on Software Quality: An Industrial Case Study -- Concern Visibility in Base Station Development – An Empirical Investigation -- Influencing Factors in Model-Based Testing with UML State Machines: Report on an Industrial Cooperation -- Formalization of Model Transformations -- Towards Composite Model Transformations Using Distributed Graph Transformation Concepts -- On-the-Fly Construction, Correctness and Completeness of Model Transformations Based on Triple Graph Grammars -- Formal Support for QVT-Relations with Coloured Petri Nets -- Scenario Modeling -- An Example Is Worth a Thousand Words: Composite Operation Modeling By-Example -- Refactoring-Safe Modeling of Aspect-Oriented Scenarios -- Model-Based Testing Using LSCs and S2A -- Business Application Development -- Model Driven Development of Graphical User Interfaces for Enterprise Business Applications – Experience, Lessons Learnt and a Way Forward -- Business Process Models as a Showcase for Syntax-Based Assistance in Diagram Editors -- Rule-Enhanced Business Process Modeling Language for Service Choreographies -- Model Synchronisation and Change Propagation -- Change-Driven Model Transformations -- An Incremental Algorithm for High-Performance Runtime Model Consistency -- Traceability-Based Change Awareness -- Keynote 2 -- Interaction Design and Model-Driven Development -- Language Specification and Annotation -- Towards Test-Driven Semantics Specification -- Scalable Semantic Annotation Using Lattice-Based Ontologies -- OntoDSL: An Ontology-Based Framework for Domain-Specific Languages -- Domain-Specific Languages -- Domain-Specific Languages in Practice: A User Study on the Success Factors -- Evaluating Context Descriptions and Property Definition Patterns for Software Formal Validation -- Anatomy of a Visual Domain-Specific Language Project in an Industrial Context -- Model-Based Analysis -- A Goal-Based Modeling Approach to Develop Requirements of an Adaptive System with Environmental Uncertainty -- A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation -- Polymorphic Scenario-Based Specification Models: Semantics and Applications -- Model (De-)Composition and Abstractio -- Aspect Model Unweaving -- Model Composition Contracts -- Abstracting Complex Languages through Transformation and Composition -- An Approach for Evolving Transformation Chains -- Distributed Software Development -- Deterministic UML Models for Interconnected Activities and State Machines -- Automated Encapsulation of UML Activities for Incremental Development and Verification -- Using UML Statecharts with Knowledge Logic Guards -- Service and Business Process Integration -- A Modeling Language for Activity-Oriented Composition of Service-Oriented Software Systems -- A Domain Specific Modeling Language Supporting Specification, Simulation and Execution of Dynamic Adaptive Systems -- Executable Domain Specific Language for Message-Based System Integration -- Keynote 3 -- Architectural Mining: The Other Side of the MDD -- Genericity and Constraints -- Generic Model Refactorings -- Constraining Type Parameters of UML 2 Templates with Substitutable Classifiers -- Generating Assertion Code from OCL: A Transformational Approach Based on Similarities of Implementation Languages -- OCLLib, OCLUnit, OCLDoc: Pragmatic Extensions for the Object Constraint Language -- Variability Management -- Variability within Modeling Language Definitions -- Variability Modelling throughout the Product Line Lifecycle -- Weaving Variability into Domain Metamodels -- Automatic Domain Model Migration to Manage Metamodel Evolution -- Model Transformation Engineering -- Model Transformation by Demonstration -- Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets -- Incremental Development of Model Transformation Chains Using Automated Testing -- Test-Driven Development of Model Transformations -- Symposium -- Educators’ Symposium at MODELS 2009.…”
Publicado 2009
Libro electrónico -
1029Publicado 2007Tabla de Contenidos: “…Designing a Framework for Your Site; 1.7.2. Safe and Secure…”
Libro electrónico -
1030por DiBona, ChrisTabla de Contenidos: “…Subversion; 2.3.1.3. What About SourceSafe?; 2.3.1.4. The Special Case of BitKeeper; 2.4. …”
Publicado 2005
Libro electrónico -
1031Tabla de Contenidos: “…-- Summary -- References -- Chapter 4 Are VLANS Safe? -- IEEE 802.1Q Overview -- Understanding Cisco Dynamic Trunking Protocol -- Understanding Cisco VTP -- Summary -- References -- Chapter 5 Leveraging DHCP Weaknesses -- DHCP Overview -- Attacks Against DHCP -- Countermeasures to DHCP Exhaustion Attacks -- DHCP Snooping Against IP/MAC Spoofing Attacks -- Summary -- References -- Chapter 6 Exploiting IPv4 ARP -- Back to ARP Basics -- Risk Analysis for ARP -- ARP Spoofing Attack -- Mitigating an ARP Spoofing Attack -- Mitigating Other ARP Vulnerabilities -- Summary -- References -- Chapter 7 Exploiting IPv6 Neighbor Discovery and Router Advertisement -- Introduction to IPv6 -- Analyzing Risk for ND and Stateless Configuration -- Mitigating ND and RA Attacks -- Here Comes Secure ND -- Summary -- References -- Chapter 8 What About Power over Ethernet? …”
Libro electrónico -
1032Publicado 2005Tabla de Contenidos: “…. -- Item 29: Strive for exception-safe code. -- Item 30: Understand the ins and outs of inlining. -- Item 31: Minimize compilation dependencies between files. -- Chapter 6: Inheritance and Object-Oriented Design -- Item 32: Make sure public inheritance models "is-a." -- Item 33: Avoid hiding inherited names. -- Item 34: Differentiate between inheritance of interface and inheritance of implementation. -- Item 35: Consider alternatives to virtual functions. -- Item 36: Never redefine an inherited non-virtual function. -- Item 37: Never redefine a function's inherited default parameter value. -- Item 38: Model "has-a" or "is-implemented-in-terms-of" through composition. -- Item 39: Use private inheritance judiciously. -- Item 40: Use multiple inheritance judiciously. -- Chapter 7: Templates and Generic Programming -- Item 41: Understand implicit interfaces and compile-time polymorphism. -- Item 42: Understand the two meanings of typename. -- Item 43: Know how to access names in templatized base classes. -- Item 44: Factor parameter-independent code out of templates. -- Item 45: Use member function templates to accept "all compatible types." -- Item 46: Define non-member functions inside templates when type conversions are desired. -- Item 47: Use traits classes for information about types. -- Item 48: Be aware of template metaprogramming. -- Chapter 8: Customizing new and delete -- Item 49: Understand the behavior of the new-handler. -- Item 50: Understand when it makes sense to replace new and delete. -- Item 51: Adhere to convention when writing new and delete. -- Item 52: Write placement delete if you write placement new. -- Chapter 9: Miscellany…”
Libro electrónico -
1033por Ballad, TriciaTabla de Contenidos: “…-- Prevent Buffer Overflows by Sanitizing Variables -- Patch the Application -- Wrapping It Up -- Chapter 5 Input Validation -- New Feature: Allow Users to Sign Their Guestbook Comments -- The Problem: Users Who Give You More Than You Asked For -- Assumptions: You Know What Your Data Looks Like -- The Solution: Regular Expressions to Validate Input -- Wrapping It Up -- Chapter 6 Filesystem Access: Accessing the Filesystem for Fun and Profit -- Opening Files -- Creating and Storing Files -- Changing File Properties Safely -- Patching the Application to Allow User-Uploaded Image Files -- Wrapping It Up -- Part IV: "Aw come on man, you can trust me" -- Chapter 7 Authentication -- What Is User Authentication? …”
Publicado 2009
Libro electrónico -
1034Publicado 2000Tabla de Contenidos: “…Reliability: Modeling, Prediction, and Optimization; Contents; Part A: Context of Reliability Analysis; 1 An Overview; 1.1 Introduction; 1.2 Illustrative Examples of Products and Systems; Example 1.1 Incandescent Electric Bulb; Example 1.2 Hydraulically Operated Fail-Safe Gate Valve; Example 1.3 Pneumatic Pump; Example 1.4 Brake Mechanism for Train Wagons; Example 1.5 Liquid Rocket Engine; Example 1.6 Electric Power System; 1.3 System and Product Deterioration and Failure; 1.3.1 Failures and Faults; 1.3.2 Failure Modes; 1.3.3 Failure Causes and Severity; 1.3.4 Deterioration…”
Libro electrónico -
1035Publicado 2014Tabla de Contenidos: “…4.1 The organisation4.1.1 Structure; 4.1.2 Processes; 4.2 Loosely coupled tasks; 4.2.1 Task dependencies; 4.2.2 Events and event patterns; 4.2.3 Support for dynamic modifications; 4.3 Behaviour-based processes; 4.3.1 Organisational behaviour; 4.3.2 Process definitions; 4.4 Two-tier constraints; 4.4.1 The boundary for a safe modification; 4.4.2 The minimal set of constraints; 4.4.3 Benefits of two-tier constraints; 4.5 Behaviour specialisation; 4.5.1 Variations in organisational behaviour; 4.5.2 Specialisation rules; 4.5.3 Support for unforeseen variations; 4.6 Interaction membranes…”
Libro electrónico -
1036Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Journey to the Spring World -- Spring modularity -- Spring Core Framework -- Core container -- Spring Messaging -- Spring AMQP -- Spring for Apache Kafka -- Spring JMS -- Spring Web MVC -- Spring WebFlux -- Spring Data -- Spring Security -- Spring Cloud -- Spring Cloud Netflix -- Spring Cloud Config -- Spring Cloud Consul -- Spring Cloud Security -- Spring Cloud Bus -- Spring Cloud Stream -- Spring Integration -- Spring Boot -- Microservices and Spring Boot -- Setting up our development environment -- Installing OpenJDK -- Installing Maven -- Installing IDE -- IntelliJ IDEA -- Spring Tools Suite -- Installing Docker -- Introducing Docker concepts -- Docker images -- Containers -- Docker networks -- Docker volumes -- Docker commands -- Docker run -- Docker container -- Docker network -- Docker volume -- Summary -- Chapter 2: Starting in the Spring World - the CMS Application -- Creating the CMS application structure -- The CMS project -- Project metadata section -- The dependencies section -- Generating the project -- Running the application -- Looking under the hood -- Running the application -- IntelliJ IDEA -- Command line -- Command line via the Maven goal -- Command line via the JAR file -- Creating the REST resources -- Models -- Adding Lombok dependency -- Creating the models -- Tag -- Category -- User -- News -- Hello REST resources -- Creating the CategoryResource class -- UserResource -- NewsResource -- Adding service layer -- Changes in the model -- Adding a new review -- Keeping the news safely -- Before starting the service layer -- CategoryService -- UserService -- NewsService -- Configuring Swagger for our APIs -- Adding dependencies to pom.xml -- Configuring Swagger -- First documented API…”
Libro electrónico -
1037Publicado 2022Tabla de Contenidos: “…-- Documenting .NET libraries using DocFX -- Documenting a Web API using Swagger -- Use case - reusing code as a fast way to deliver good and safe software -- Summary -- Questions -- Further reading -- Chapter 13: Applying Service-Oriented Architectures with .NET -- Technical requirements -- Understanding the principles of the SOA approach -- SOAP web services -- SOAP specifications -- Difficulties associated with the standard -- REST web services -- Service type compatibility rules -- REST and native HTTP features -- Example of methods in the REST language -- The OpenAPI standard -- REST service authorization and authentication -- How does .NET 6 deal with SOA? …”
Libro electrónico -
1038por OECDTabla de Contenidos: “…Do services deliver improvement of individual's condition? -- Are services safe? -- Inpatient suicides point to shortcoming in OECD countries -- Coercion in contemporary mental health care -- Do mental health services account for and respect the needs of vulnerable groups? …”
Publicado 2021
Libro electrónico -
1039Publicado 2015Tabla de Contenidos: “…Adding up the extras -- Organizing all your parts -- Protecting You and Your Electronics -- Understanding that electricity can really hurt -- Soldering safely -- Avoiding static like the plague -- Chapter 14 Interpreting Schematics -- What's a Schematic and Why Should I Care? …”
Libro electrónico -
1040Publicado 2017Tabla de Contenidos: “…. -- Accessing std::vector instances the fast or the safe way -- How to do it... -- How it works... -- There's more... -- Keeping std::vector instances sorted -- How to do it... -- How it works... -- There's more... -- Inserting items efficiently and conditionally into std::map -- How to do it... -- How it works... -- There's more…”
Libro electrónico