Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
1101Publicado 2017Tabla de Contenidos: “…-- 7.2 - Probability Theory -- 7.2.1 - The Multiplication Rule -- 7.2.2 - The Addition Rule -- 7.2.3 - The Binomial Theorem -- 7.2.4 - Bayes Theorem -- 7.3 - Reliability of Series Systems -- 7.4 - Redundancy Rules -- 7.4.1 - General Types of Redundant Configuration -- 7.4.2 - Full Active Redundancy (Without Repair) -- 7.4.3 - Partial Active Redundancy (Without Repair) -- 7.4.4 - Conditional Active Redundancy -- 7.4.5 - Standby Redundancy -- 7.4.6 - Load Sharing -- 7.5 - General Features of Redundancy -- 7.5.1 - Incremental Improvement -- 7.5.2 - Further Comparisons of Redundancy -- 7.5.3 - Redundancy and Cost -- Exercises -- Chapter 8 - Methods of Modeling -- 8.1 - Block Diagrams and Repairable Systems -- 8.1.1 - Reliability Block Diagrams -- 8.1.1.1 - Establish failure criteria -- 8.1.1.2 - Create a reliability block diagram -- 8.1.1.3 - Failure mode analysis -- 8.1.1.4 - Calculation of system reliability -- 8.1.1.5 - Reliability allocation -- 8.1.2 - Repairable Systems (Revealed Failures) -- 8.1.3 - Repairable Systems (Unrevealed Failures) -- 8.1.4 - Systems With Cold Standby Units and Repair -- 8.1.5 - Modeling Repairable Systems with Both Revealed and Unrevealed Failures -- 8.1.6 - Allowing for imperfect proof tests -- 8.1.7 - Conventions for Labeling 'Dangerous', 'Safe', Revealed and Unrevealed Failures -- 8.2 - Common Cause (Dependent) Failure -- 8.2.1 - What is CCF? …”
Libro electrónico -
1102Publicado 2014Tabla de Contenidos: “…17 The Emergence of Sovereign Wealth Funds in Asia -- 17.1 Introduction -- 17.2 Stylized Facts about Developing Asia's Foreign Exchange Reserves -- 17.3 Informal Examination of the Adequacy of Developing Asia's FOREIGN EXCHANGE Reserves -- 17.4 Sovereign Wealth Funds as a Blueprint for Investing Developing Asia's Excess Reserves -- 17.5 Policy Prescriptions for Developing Asia's SWFs -- 17.6 Conclusion -- References -- 18 China Investment Corporation: China's Sovereign Wealth Fund -- 18.1 Introduction -- 18.2 Overview and Organizational Structure -- 18.2.1 CIC International -- 18.2.2 Central Huijin -- 18.3 Investment Strategy -- 18.3.1 CIC -- 18.3.2 CIC International -- 18.3.3 Central Huijin -- 18.4 Current Problems -- 18.4.1 Ministerial Conflict Between SAFE and the Ministry of Finance -- 18.4.2 Internal Conflict Between CIC International and Central Huijin -- 18.4.3 Unsatisfactory Performance of CIC Investments -- 18.4.4 The Problematic Financing Mechanism of CIC International -- 18.4.5 Low Transparency of CIC -- 18.5 Policy Recommendations -- 18.5.1 Better Coordination Between SAFE and the Ministry of Finance -- 18.5.2 More Sustainable Financing Mechanism -- 18.5.3 Enhance Investment Performance -- 18.5.4 Improve Transparency of its Operation -- 18.5.5 Reorganization of CIC -- 18.6 Conclusion -- References -- 19 Portfolio Allocation Dynamics of China Investment Corporation in the Aftermath of the Global Financial Crisis of 2007-2009 -- 19.1 Introduction -- 19.2 SWFs and China's Economic Policy -- 19.2.1 Large and Growing FX Reserves of China -- 19.2.2 Rising Costs of Sterilization -- 19.2.3 Quest for Higher Returns -- 19.3 CIC: Establishment and Objectives -- 19.3.1 Immediate Circumstances Leading up to Establishment of CIC -- 19.3.2 Establishment of CIC: Policy Disputes -- 19.3.3 CIC: Current Structure -- 19.3.4 Funding of CIC…”
Libro electrónico -
1103por World Health OrganizationTabla de Contenidos: “…Introduction -- 1.1 General considerations and principles -- 1.1.1 Framework for safe drinking-water -- 1.1.2 Microbial aspects -- 1.1.3 Disinfection -- 1.1.4 Chemical aspects -- 1.1.5 Radiological aspects -- 1.1.6 Acceptability aspects: taste, odour and appearance -- 1.2 Roles and responsibilities in drinking-water safety management -- 1.2.1 Surveillance and quality control -- 1.2.2 Public health authorities -- 1.2.3 Local authorities -- 1.2.4 Water resource management -- 1.2.5 Drinking-water supply agencies -- 1.2.6 Community management -- 1.2.7 Water vendors -- 1.2.8 Individual consumers -- 1.2.9 Certification agencies -- 1.2.10 Plumbing -- 1.3 Supporting resources to the Guidelines -- 1.3.1 Published documents -- 2. …”
Publicado 2022
Libro electrónico -
1104Publicado 2000Tabla de Contenidos: “…8.4.2 Concentration Effects of Safe Third Country- Arrangements -- 8.5 Two Interpretive Approaches -- 8.5.1 Subsidiarity -- 8.5.2 Game Theory -- 8.6 Conclusion -- 9 INTERNATIONAL LAW AND EXTRATERRITORIAL PROTECTION -- 9.1 Protection -- 9.1.1 A Right to Seek and Enjoy Asylum? …”
Libro electrónico -
1105por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Verifiche fiscali simultanee -- E. I safe harbour -- F. Accordi preventivi sui prezzi di trasferimento -- G. …”
Publicado 2013
Libro electrónico -
1106por International Social Science Council.Tabla de Contenidos: “…-- The consequences of global environmental change -- Relocation as a policy response to climate change vulnerability in northern China -- Fighting to include local voices in environmental policy-making in Brazil -- Inclusive wealth and the transition to sustainability -- Indigenous groups and climate change in Colombia -- Between social and planetary boundaries: Navigating pathways in the safe and just space for humanity -- Are increasing greenhouse gas emissions inevitable? …”
Publicado 2013
Libro electrónico -
1107Publicado 2018Tabla de Contenidos: “…Intro -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: From Object-Oriented to Functional Programming -- Java - an introduction -- Java programming paradigms -- Imperative programming -- Real-life imperative example -- Object-oriented paradigm -- Objects and classes -- Encapsulation -- Abstraction -- Inheritance -- Polymorphism -- Declarative programming -- Functional programming -- Working with collections versus working with streams -- An introduction to Unified Modeling Language -- Class relations -- Generalization -- Realization -- Dependency -- Association -- Aggregation -- Composition -- Design patterns and principles -- Single responsibility principle -- Open/closed principle -- Liskov Substitution Principle -- Interface Segregation Principle -- Dependency inversion principle -- Summary -- Chapter 2: Creational Patterns -- Singleton pattern -- Synchronized singletons -- Synchronized singleton with double-checked locking mechanism -- Lock-free thread-safe singleton -- Early and lazy loading -- The factory pattern -- Simple factory pattern -- Static factory -- Simple factory with class registration using reflection -- Simple factory with class registration using Product.newInstance -- Factory method pattern -- Anonymous concrete factory -- Abstract factory -- Simple factory versus factory method versus abstract factory -- Builder pattern -- Car builder example -- Simplified builder pattern -- Anonymous builders with method chaining -- Prototype pattern -- Shallow clone versus deep clone -- Object pool pattern -- Summary -- Chapter 3: Behavioral Patterns -- The chain-of-responsibility pattern -- Intent -- Implementation -- Applicability and examples -- The command pattern -- Intent -- Implementation -- Applicability and examples -- The interpreter pattern -- Intent…”
Libro electrónico -
1108Publicado 2017Tabla de Contenidos: “…flatMapValues -- repartitionAndSortWithinPartitions -- coalesce -- foldByKey -- aggregateByKey -- combineByKey -- Advanced actions -- Approximate actions -- Asynchronous actions -- Miscellaneous actions -- Shared variable -- Broadcast variable -- Properties of the broadcast variable -- Lifecycle of a broadcast variable -- Map-side join using broadcast variable -- Accumulators -- Driver program -- Summary -- Chapter 8: Working with Spark SQL -- SQLContext and HiveContext -- Initializing SparkSession -- Reading CSV using SparkSession -- Dataframe and dataset -- SchemaRDD -- Dataframe -- Dataset -- Creating a dataset using encoders -- Creating a dataset using StructType -- Unified dataframe and dataset API -- Data persistence -- Spark SQL operations -- Untyped dataset operation -- Temporary view -- Global temporary view -- Spark UDF -- Spark UDAF -- Untyped UDAF -- Type-safe UDAF: -- Hive integration -- Table Persistence -- Summary -- Chapter 9: Near Real-Time Processing with Spark Streaming -- Introducing Spark Streaming -- Understanding micro batching -- Getting started with Spark Streaming jobs -- Streaming sources -- fileStream -- Kafka -- Streaming transformations -- Stateless transformation -- Stateful transformation -- Checkpointing -- Windowing -- Transform operation -- Fault tolerance and reliability -- Data receiver stage -- File streams -- Advanced streaming sources -- Transformation stage -- Output stage -- Structured Streaming -- Recap of the use case -- Structured streaming - programming model -- Built-in input sources and sinks -- Input sources -- Built-in Sinks -- Summary -- Chapter 10: Machine Learning Analytics with Spark MLlib -- Introduction to machine learning -- Concepts of machine learning -- Datatypes -- Machine learning work flow -- Pipelines -- Operations on feature vectors -- Feature extractors -- Feature transformers…”
Libro electrónico -
1109Publicado 2017Tabla de Contenidos: “…. -- Managing passwords safely -- Getting ready -- How to do it... -- How it works... -- Applying configuration changes through the REST API -- Getting ready -- How to do it... -- How it works... -- Chapter 3: Using SLAX to Write Op Scripts -- Introduction -- Making remote procedure calls -- Getting ready -- How to do it... -- How it works... -- Using XPath predicate expressions -- Getting started -- How to do it... -- How it works... -- Working with regular expressions -- Getting ready -- How to do it... -- How it works... -- Working with IP addresses…”
Libro electrónico -
1110Publicado 2023Tabla de Contenidos: “…Meet Your Mini 3/Mini 3 Pro -- Your Out-of-Box Experience -- Mini 3/Mini 3 Pro Roadmap -- Key Features and Differences -- Still Image Quality -- Shooting Modes -- Flight Performance -- Video Features -- Next Up -- Chapter 3. Flying Safely and Legally -- Obstacle Avoidance -- BOLO (Be On the Lookout -- APAS 4.0 -- Flight Time/Distance -- Range -- Flight Modes -- Getting Legal -- A Visit to Acronymland -- Airspaces Simplified -- The Recreational UAS Safety Test (TRUST) -- How to Register Your Aircraft -- Remote ID Requirements -- Next Up -- Chapter 4. …”
Libro electrónico -
1111VBScript, WMI and ADSI unleashed : using VBSscript, WMI, and ADSI to automate Windows administrationPublicado 2007Tabla de Contenidos: “…Alternative Methods -- Summary -- 19 Querying Complex WMI Information -- Understanding WMI Relationships -- Associating WMI Instances -- Writing the Query -- Testing the Query -- Writing the Query in VBScript -- Another Example -- Summary -- 20 Putting It All Together: Your First WMI/ADSI Script -- Designing the Script -- Writing Functions and Subroutines -- Writing the Main Script -- Testing the Script -- Summary -- 21 Testing and Debugging WMI and ADSI Queries -- Debugging Outside the Script -- Debugging WMI Queries -- Debugging ADSI Queries -- Summary -- Part IV: Advanced Scripting Techniques -- 22 Modular Script Programming -- Looking for Modules -- Introduction to Windows Script Components -- Scripting and XML -- Summary -- 23 Scripts Packaging and Protection -- Installing the Script Encoder -- Writing Encoded Scripts -- Running Encoded Scripts -- Encoding: The Downside -- Script Packaging -- Summary -- 24 Scripting Security -- Why Scripting Can Be Dangerous -- Security Improvements in Windows XP and Windows Server 2003 -- Digitally Signing Scripts -- Running Only Signed Scripts -- Ways to Implement Safe Scripting -- Summary -- 25 Introduction to HTML Applications -- Event-Driven Scripting -- How an HTA Is Built -- HTA Differences -- Steps for Writing an HTA -- Summary -- 26 Debugging Tips, Tools, and Techniques -- Types of Bugs -- Preventing Syntax Errors -- Debugging Logic Errors -- Summary -- Part V: Ready-to-Run Examples -- 27 Logon and Logoff Scripts -- NT and Active Directory Logon Scripts -- Active Directory-Specific Logon Scripts -- Active Directory Logoff Scripts -- Summary -- 28 Windows and Domain Administration Scripts -- Automating User Creation -- Finding Inactive Users -- Collecting System Information -- Templates -- Summary -- 29 Network Administration Scripts -- Shutting Down Remote Computers -- Listing Remote Shares…”
Libro electrónico -
1112Publicado 2008Tabla de Contenidos: “…Cover -- Contents -- Preface -- Acknowledgments -- Part I: History -- 1 Introduction -- 1.1 The Standard Rubric -- 1.2 The Matrix -- 1.3 Other Views -- 1.4 Safe States and the Access Control Matrix -- 1.5 Other Hard Questions -- 1.6 The Take-Home Message -- 1.7 Project Ideas -- 2 The Old Testament -- 2.1 The Basic Framework -- 2.2 Security Models -- 2.3 The Orange Book -- 2.4 INFOSEC, OPSEC, JOBSEC -- 2.5 The Take-Home Message -- 2.6 Project Ideas -- 3 Old Principles, New World -- 3.1 Solving the Wrong Problem? …”
Libro electrónico -
1113Publicado 2001Tabla de Contenidos: “…Time-of-Check, Time-of-Use -- Broken passwd -- Avoiding TOCTOU Problems -- Secure File Access -- Temporary Files -- File Locking -- Other Race Conditions -- Conclusion -- 10 Randomness and Determinism -- Pseudo-random Number Generators -- Examples of PRNGs -- The Blum-Blum-Shub PRNG -- The Tiny PRNG -- Attacks Against PRNGs -- How to Cheat in On-line Gambling -- Statistical Tests on PRNGs -- Entropy Gathering and Estimation -- Hardware Solutions -- Software Solutions -- Poor Entropy Collection: How to Read "Secret" Netscape Messages -- Handling Entropy -- Practical Sources of Randomness -- Tiny -- Random Numbers for Windows -- Random Numbers for Linux -- Random Numbers in Java -- Conclusion -- 11 Applying Cryptography -- General Recommendations -- Developers Are Not Cryptographers -- Data Integrity -- Export Laws -- Common Cryptographic Libraries -- Cryptlib -- OpenSSL -- Crypto++ -- BSAFE -- Cryptix -- Programming with Cryptography -- Encryption -- Hashing -- Public Key Encryption -- Threading -- Cookie Encryption -- More Uses for Cryptographic Hashes -- SSL and TLS (Transport Layer Security) -- Stunnel -- One-Time Pads -- Conclusion -- 12 Trust Management and Input Validation -- A Few Words on Trust -- Examples of Misplaced Trust -- Trust Is Transitive -- Protection from Hostile Callers -- Invoking Other Programs Safely -- Problems from the Web -- Client-side Security -- Perl Problems -- Format String Attacks -- Automatically Detecting Input Problems -- Conclusion -- 13 Password Authentication -- Password Storage -- Adding Users to a Password Database -- Password Authentication -- Password Selection -- More Advice -- Throwing Dice -- Passphrases -- Application-Selected Passwords -- One-Time Passwords -- Conclusion -- 14 Database Security -- The Basics -- Access Control -- Using Views for Access Control -- Field Protection…”
Libro electrónico -
1114Publicado 2014Tabla de Contenidos: “…-- Extending an Extension Point -- Examining the Sample Extension -- Modifying the Sample Extension -- Extension UI Configuration -- Configuration File Conventions -- Configuration UI Rendering -- Interaction Between UI and Model -- UI Validation -- Global UI Configuration -- Summary -- Part III: The Hudson Lifestyle -- Chapter 9: Advanced Plugin Development -- Extending Various Aspects of Hudson Dashboards -- Creating a Custom Rendered Jobs Status View -- Using the Custom Rendered View -- Adding a Custom Column to the Default View -- Adding an Action to the Action Panel of the Main Dashboard -- Custom Decoration of Hudson Pages -- Extending Various Aspects of a Hudson Job -- Adding a Custom Notifier to a Job -- Adding a Custom Link to a Job Dashboard -- Creating a Custom Build Wrapper -- Summary -- Chapter 10: Hudson Best Practices -- Manage the Hudson Resources Effectively -- Tune Memory -- Restrict Job History Depth -- Monitor the Disk Space -- Put Your Hudson Behind a Web Proxy -- Do Not Use Your Hudson as a File Server -- Periodically Back Up Your Hudson Contents -- Set Up a Fail-Safe Mode for Your Hudson -- Redundant Hudson Server Setup -- Monitoring Hudson Setup -- Server Switch on Failure -- Redirecting HTTP Traffic to a Redundant Server -- Scale Up the Security of Your Hudson -- Restrict Job Access to Certain Users -- Add Roles to the Authorization Matrix -- Upgrade Your Hudson Diligently -- Understand the Hudson Versioning Scheme -- Upgrade in a Sandbox First -- Summary -- Part IV: Appendixes -- Appendix A: Widely Used Hudson Plugins -- Appendix B: Personal Hudson Instance -- Hudson-as-Valet -- Optimal Hudson-as-Valet Setup -- Hudson for Work Area Maintenance -- The Open-Source Liaison Role -- The Committer Role -- Hudson as General-Purpose Scheduler…”
Libro electrónico -
1115por Palloff, Rena M., 1950-Tabla de Contenidos: “…to Keep the Discussion Moving -- Learn How to Ask Broad Questions That Stimulate Thinking to Promote Participation -- Include Humor in Your Posts to Help Students Feel Welcome and Safe -- Post a Welcoming Response to Student Introductions to Help All Join More Successfully -- Teaching Students to Learn in the Online Environment -- Respecting Student Intellectual Property -- Chapter Eight Online Classroom Dynamics -- Group Dynamics and Online Classroom Dynamics -- Applying What We Understand AboutGroups to Online Classes -- Preforming -- Unity -- Disunity -- Conflict‐Confrontation -- Disharmony -- Harmony -- Performing -- Concluding Thoughts About the Soul and Spirit Group -- Other Ways of Looking at Online Groups -- The Student -- The Group -- The Instructor/Facilitator -- The Task -- The Technology -- Conflict Revisited -- Working with Difficult Students -- When It Simply Isn't Working -- Chapter Nine Lessons Learned in the Virtual Classroom -- A Look Back -- The Myths -- Lessons for Faculty -- Instructors Need Not Fear Online Learning -- Course Development Needs to Focus on Interactivity, Not Content -- Instructor and Student Roles Need to Change -- Lessons for Instructional Designers andFaculty Developers -- Both Faculty and Students Need Training…”
Publicado 2013
Libro electrónico -
1116Publicado 2010Tabla de Contenidos: “…Part III: Unleashing Windows Home Server Performance and Maintenance -- 14 Tuning Windows Home Server Performance -- Monitoring Performance -- Optimizing the Hard Disk -- Optimizing Virtual Memory -- Optimizing Applications -- More Optimization Tricks -- From Here -- 15 Maintaining Windows Home Server -- Checking System Uptime -- Checking Your Hard Disk for Errors -- Checking Free Disk Space on the System Drive -- Deleting Unnecessary Files from the System Drive -- Defragmenting the System Drive -- Reviewing Event Viewer Logs -- Setting Up a Maintenance Schedule -- From Here -- 16 Customizing the Windows Home Server Interface -- Making the Start Menu More Efficient -- Making the Taskbar More Efficient -- Modifying the Start Menu and Taskbar with Group Policies -- Customizing the Color Quality and Resolution -- Setting the Screensaver -- Customizing the Desktop Colors, Fonts, and Sizes -- From Here -- 17 Troubleshooting Windows Home Server -- Replacing Your System Hard Drive -- Restoring a Windows Home Server Backup -- Understanding Troubleshooting Strategies -- General Troubleshooting Tips -- Troubleshooting Using Online Resources -- Troubleshooting Device Problems -- Troubleshooting Startup -- Reinstalling Windows Home Server -- From Here -- Part IV: Unleashing Windows Home Server Advanced Tools -- 18 Working with the Windows Home Server Registry -- Starting the Registry Editor -- Navigating the Registry -- Keeping the Registry Safe -- Working with Registry Entries -- Finding Registry Entries -- From Here -- 19 Using Windows Home Server's Command-Line Tools -- Getting to the Command Line -- Working at the Command Line -- Understanding Batch File Basics -- Working with the Command-Line Tools -- From Here -- 20 Using Other Windows Home Server Power Tools -- Using the Group Policy Object Editor -- Getting More Out of Control Panel…”
Libro electrónico -
1117Publicado 2017Tabla de Contenidos: “…The Ox-Bezoar Empowerment for Fertility and Safe Childbirth: Selected Readings from the Shingon Ritual Collections -- 34. …”
Libro electrónico -
1118Publicado 2023Tabla de Contenidos: “…API Tests from the Trenches -- API Test Examples -- Mixed API/GUI Scenarios -- Chapter 13: Gherkin and Behavior Driven Development -- Behavior Driven Development -- Applying BDD for COTS Integration Projects -- Gherkin Without BDD: Pros and Cons -- Gherkin Language: Readability Above All, If Possible -- Scenario Readability -- Some Good and Bad Examples -- Example 1 -- Example 2 -- Example 3 -- Chapter 14: JIRA with Boozang via XRay -- Using JIRA with XRay -- Xray for Test Automation -- Boozang Integration with XRay -- Importing Features Files -- Pushing Test Results Back to XRay -- Chapter 15: Jenkins and the Boozang Runner -- Continuous Delivery and the Need for Automating Acceptance Tests -- Puppeteer and the Boozang Runner -- How to Use the Docker Runner -- Keeping Execution Time Low with Parallel Runs -- Parallel Execution and Workers Setup -- Boozang Workers Concepts -- Boozang Workers Setup in the Jenkins Pipeline -- Launching the Workers -- Launching the Master -- Reports and Log Files -- Execution Reports -- Log Files and the Log Formatter -- Root Cause Analysis Report -- Publishing Reports on Jenkins and JIRA -- Cucumber Reports -- HTML Reports -- JIRA Reports -- Complete Working Pipeline -- Test Users Setup -- Set Variables -- Define Job Parameters -- Set Build Information -- Execute Smoke Tests -- Launch Boozang Workers and Master -- Aggregate JSON Reports and Log Files -- Download and Execute RCA Script -- Publish Cucumber Reports -- Get Currently Deployed Version -- Import Results into XRay -- HTML Publisher -- Docker in Docker Setup -- Chapter 16: Boozang for Teams -- Team Collaboration -- Explicit Lock -- Concurrent Development and Safe Refactoring with Branches -- Working with Branches -- Using a Feature Branch Approach -- Branch Naming Convention -- Adding a Develop Branch -- Merging Process -- Tests Map -- Quality Control…”
Libro electrónico -
1119Publicado 2018Tabla de Contenidos: “…Turn-off Analysis -- 2.3.4. Safe Operation Area -- 2.3.5. MOSFET Applications…”
Libro electrónico -
1120por Rajkumar, K.Tabla de Contenidos: “…7.5.1 Creating a Package -- 7.5.2 Importing Packages -- 7.5.3 Including Classes to Package -- 7.5.4 Subpackages -- 7.5.5 Protected Members Revisited -- 7.6 Exception Handling -- 7.6.1 Try-catch-finally Statements -- 7.6.2 Multicatch Statement -- 7.6.3 Exception Hierarchy -- 7.6.4 User-defined Exceptions with throw and throws -- 7.6.5 Extending RuntimeException Class -- 7.7 Summary -- Key Terms -- Review Questions -- Exercises -- Part III - Java Containers for Holding Objects -- Chapter 8: Sequence Containers -- 8.1 Introduction -- 8.2 Collection Taxonomy -- 8.3 Vectors -- 8.3.1 Enumeration -- 8.3.2 Type-specific vectors -- 8.4 StringTokenizer -- 8.5 Stack -- 8.5.1 Character Stack -- 8.5.2 Problem: Brackets Matching -- 8.6 Iterators -- 8.7 PriorityQueue -- 8.8 ArrayList -- 8.8.1 Type-Safe ArrayLists -- 8.8.2 Problem: Shopping Cart -- 8.8.3 Problem: Search an Element Inside Array -- 8.8.4 Problem: Merge Two Arrays -- 8.8.5 Problem: Remove All Duplicates in an Array -- 8.9 LinkedList -- 8.9.1 Problem: Designing Stack Using LinkedList -- 8.9.2 Type-safe LLStack Using Generics -- 8.10 Summary -- Key Terms -- Review Questions -- Exercises -- Chapter 9: Map Containers -- 9.1 Introduction -- 9.2 Hashtable -- 9.3 Problem: Word Counting in a Text -- 9.4 Problem: Couples-Sensitive Brackets Checker -- 9.5 HashMap -- 9.6 Multimaps -- 9.7 Nested HashMaps -- 9.8 LinkedHashMap -- 9.9 TreeMap -- 9.10 Problem: Random Number Generator -- 9.11 Properties -- 9.12 Summary -- Key Terms -- Review Questions -- Exercises -- Chapter 10: Set Containers -- 10.1 Introduction -- 10.2 Set Interface -- 10.3 HashSet -- 10.4 Problem: Counting Duplicates in a Text -- 10.5 LinkedHashSet -- 10.6 TreeSet -- 10.7 Summary -- Key Terms -- Review Questions -- Exercises -- Chapter 11: Sorting and Searching -- 11.1 Introduction -- 11.2 Sorting and Searching Using Arrays Class…”
Publicado 2013
Libro electrónico