Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
1241Publicado 2019Tabla de Contenidos: “…Seeing What's New in Windows Server 2019 -- Deciding Which Windows Server 2019 Edition Is Right for You -- Essentials -- Standard -- Datacenter -- Walking the Walk: Windows Server 2019 User Experiences -- Desktop Experience -- Server Core -- Nano -- Seeing What Server Manager Has to Offer -- Windows Admin Center: Your New Best Friend -- Chapter 2 Using Boot Diagnostics -- Accessing Boot Diagnostics -- From the DVD -- From the boot menu -- Using a Special Boot Mode -- Safe Mode -- Enable Boot Logging -- Enable Low-Resolution Video -- Last Known Good Configuration -- Directory Services Restore Mode -- Debugging Mode -- Disable Automatic Restart on System Failure -- Disable Driver Signature Enforcement -- Disable Early Launch Anti-Malware Driver -- Performing a Memory Test -- Using the Command Prompt -- Working with Third-Party Boot Utilities -- Chapter 3 Performing the Basic Installation -- Making Sure You Have What It Takes -- Central processing unit -- Random access memory -- Storage -- Network adapter -- DVD drive -- UEFI-based firmware -- Trusted Platform Module -- Monitor -- Keyboard and mouse -- Performing a Clean Install -- Upgrading Windows -- Performing a Network Install with Windows Deployment Services -- Chapter 4 Performing Initial Configuration Tasks -- Understanding Default Settings -- Getting an Overview of the Configuration Process -- Providing Computer Information -- Windows Server 2019 with Desktop Experience -- Windows Server 2019 Core -- Updating Windows Server 2019.…”
Libro electrónico -
1242Publicado 2023Tabla de Contenidos: “…Benefiting from industrialization -- The BRIC countries -- China -- Brazil -- What Makes Commodities Unique -- Gaining from inelasticity -- Finding a safe haven -- Hedging against inflation -- Taking time to bring new sources online -- Sell in May and go away? …”
Libro electrónico -
1243Publicado 2024Tabla de Contenidos: “…-- Chapter 5: Designing Authentication and Authorization -- Technical requirements -- Designing an auth workflow -- JWT life cycle -- TypeScript operators for safe data handling -- Null and undefined checking -- The conditional or ternary operator -- The null coalescing operator -- The nullish coalescing operator -- Optional chaining -- Implementing data entities and interfaces -- Classes, Interfaces, and Enums -- Reusable services leveraging OOP concepts -- Creating an auth service -- Implement an abstract auth service -- Abstract functions -- A cache service using localStorage -- Caching the JWT -- An in-memory auth service -- Simple login -- Logout -- Resuming a JWT session -- An HTTP interceptor -- Summary -- Further reading -- Questions -- Chapter 6: Implementing Role-Based Navigation -- Technical requirements -- Dynamic UI components and navigation -- Implementing the login component -- Conditional navigation -- Common validations for forms -- UI service using environment provider -- Side navigation -- Role-based routing using guards -- Route guards -- Auth guards -- Auth service fake and common testing providers -- A Firebase authentication recipe -- Create a Firebase application…”
Libro electrónico -
1244por Belew, ShannonTabla de Contenidos: “…Becoming all things to all people with trial-and-error inventory -- Specializing with limited inventory -- Chapter 6 Fulfilling Expectations and Orders -- Figuring Out the Logistics of Shipping -- Developing an In-House Fulfillment Model -- Deciding to Outsource Fulfillment -- Finding an outsourcing partner -- Establishing your outsourcing relationship -- Operating with an outsourced fulfillment house -- Assessing the quality of the fulfillment work -- Shaping Up and Shipping Out -- Giving your customers shipping options -- Creating online postage and labels -- Having items picked up for delivery -- Shipping international orders -- Maintaining the Backend -- Deciding on a database -- Using handheld scanners and bar codes -- Developing a shelving inventory system -- Feeding orders into the shipping department -- Book 5 Managing Security Risks -- Chapter 1 Understanding Security and Your Risks -- Legal Responsibility: The Merchant and the Customer -- Avoiding chargebacks -- Protecting privacy: GDPR and growing compliance concerns -- Keeping Your Website Secure -- Chapter 2 Developing a Plan: Security and Business Continuity -- Making a Plan -- Policies and procedures -- Inventory and skills assessments -- Risk analysis -- Existing security measures -- Action plan and backup alternatives -- People, resources, and follow-up communications -- Creating a Budget for Your Plan -- Finding Security Resources -- Chapter 3 Spotting and Thwarting Bad Actors, Hackers, and More -- Fending Off Attacks -- Deterring Bad Actors -- Avoiding Common Threats -- Keeping Your Domain Name Safe -- Staying Away from Scams -- Social engineering -- Phishing -- Smishing -- Pharming -- Vishing -- Scareware -- Extortion -- Insider threats -- Mobile Security Risks -- Understanding How a Wireless LAN Works -- Establishing Barriers -- Following your common sense…”
Publicado 2024
Libro electrónico -
1245Publicado 2017Tabla de Contenidos: “…-- Predictive Maintenance for People -- 4.5 Connected Buildings -- Commercial: Shopping and Working in Smart Buildings -- Consumers: Comfortable and Safe Living -- Industrial: Robots as Workmates -- Public: schools, universities, and public administration -- Whose Standard Will Prevail? …”
Libro electrónico -
1246Publicado 2017Tabla de Contenidos: “…Creating simple Java classes with deftype and defrecord -- Managing states with agents -- Agent example -- Style guide -- Quiz -- Summary -- Chapter 8: Clojure Programming -- The Counterclockwise plugin for Eclipse IDE -- Installing the Counterclockwise plugin -- Switching to the Java perspective -- Leiningen's build tool -- Installing Leiningen -- Creating executable programs in Clojure -- Compiling to class files without Leiningen -- Compiling projects with Leiningen -- Creating a new Counterclockwise project -- Clojure REPL in Eclipse IDE -- Updating the project's Clojure version -- Adding a dependency -- Exploring monads by applying test-driven development -- The Luminus web framework -- Creating a Luminus project -- Importing the project in Counterclockwise -- Exploring the Luminus project -- Adding a page to the web application -- Summary -- Chapter 9: Kotlin -- Installing Kotlin -- Launch scripts -- Kotlin's REPL interactive shell -- Kotlin language fundamentals -- Defining local variables -- Defining a function -- Kotlin's types -- Kotlin basic types -- Strings -- Null safety handling -- Option 1 - Adding a conditional check -- Option 2 - Using the safe call operator ?. -- Option 3 - Using the Elvis operator ?…”
Libro electrónico -
1247Publicado 2022Tabla de Contenidos: “…-- 4.1.1 Home setup -- 4.1.2 Corporate network -- 4.2 Data injection attacks -- 4.2.1 SQLi -- 4.2.2 Cross-site scripting -- 4.3 Malware: Viruses, Trojans, and ransomware -- 4.3.1 Viruses -- 4.3.2 Trojans -- 4.3.3 Ransomware -- 4.3.4 Protection -- 4.4 Dodgy Wi-Fi -- 4.4.1 Defenses -- 4.5 Mobile phones, SMS, and 5G -- 4.5.1 Malware -- 4.5.2 IMEI cloning -- 4.5.3 SMS spoofing -- 4.5.4 Problems with 5G -- 4.5.5 Keeping safe -- Summary -- 5 Tricking our way in: Social engineering -- 5.1 The weakest link: People -- 5.2 Malicious USB -- 5.2.1 USB devices with malware -- 5.2.2 BadUSB: USB devices that attack your laptop and phone -- 5.2.3 Evil maid attacks -- 5.3 Targeted attacks: Phishing -- 5.4 Credential theft and passwords -- 5.4.1 Store passwords more securely -- 5.4.2 Make it easier to use unique, complex passwords -- 5.4.3 Stop relying on just a password to protect your accounts -- 5.5 Building access cards -- Summary -- 6 Internal attacks -- 6.1 What happens after they get in? …”
Libro electrónico -
1248Publicado 2023Tabla de Contenidos: “…-- 18.6 Absent Voices: Gaps in our Knowledge about Teacher Diversity -- 18.7 Conclusion -- Notes -- References -- Chapter 19: Charting Pathways towards a More Diverse, Equitable and Inclusive Teaching Profession -- 19.1 Introduction -- 19.2 Barriers to Teacher Diversity along the Career Pathway -- 19.3 Towards a Diverse, Equitable and Inclusive Teaching Profession: Principles, Policy and Practice -- Principle 1: Build Critical Awareness of Teacher Education and Schools as Sites of Cultural Practice -- Principle 2: Identify Patterns of Under-representation and Devise Measures to Attract and Recruit Individuals from Under-represented Groups in/to Teaching -- Principle 3: Support (Student) Teachers and School Leaders from Under-represented Groups -- Principle 4: Recognise Uniqueness and Plurality within Diversity -- Principle 5: Create Safe Spaces in Education for Democratic Participation -- Principle 6: Recognise That the Development of Inclusive Schools Is the Responsibility of All Educators -- Principle 7: Commit to Research-informed Policy and Practice -- 19.4 Conclusion and Recommendations -- Notes -- References -- Index…”
Libro electrónico -
1249Publicado 2020Tabla de Contenidos: “…-- Antivirus programs -- Safe computing…”
Libro electrónico -
1250Publicado 2020Tabla de Contenidos: “…7.5.3 Reflecting automation as a priority with your staff -- 7.5.4 Providing time for training and learning -- 7.6 Filling the skill-set gap -- 7.6.1 But if I build it, I own it -- 7.6.2 Building the new skill set -- 7.7 Approaching automation -- 7.7.1 Safety in tasks -- 7.7.2 Designing for safety -- 7.7.3 Complexity in tasks -- 7.7.4 How to rank tasks -- 7.7.5 Automating simple tasks -- 7.7.6 Automating complicated tasks -- 7.7.7 Automating complex tasks -- Summary -- 8 Off-hour deployments -- 8.1 War story -- 8.2 The layers of a deployment -- 8.3 Making deployments routine affairs -- 8.3.1 Accurate preproduction environments -- 8.3.2 Staging will never be exactly like production -- 8.4 Frequency reduces fear -- 8.5 Reducing fear by reducing risk -- 8.6 Handling failure in the layers of the deployment process -- 8.6.1 Feature flags -- 8.6.2 When to toggle off your feature flag -- 8.6.3 Fleet rollbacks -- 8.6.4 Deployment artifact rollbacks -- 8.6.5 Database-level rollbacks -- 8.7 Creating deployment artifacts -- 8.7.1 Leveraging package management -- 8.7.2 Configuration files in packages -- 8.8 Automating your deployment pipeline -- 8.8.1 Safely installing the new application -- Summary -- 9 Wasting a perfectly good incident -- 9.1 The components of a good postmortem -- 9.1.1 Creating mental models -- 9.1.2 Following the 24-hour rule -- 9.1.3 Setting the rules of the postmortem -- 9.2 The incident -- 9.3 Running the postmortem -- 9.3.1 Choosing whom to invite to the postmortem -- 9.3.2 Running through the timeline -- 9.3.3 Defining action items and following up -- 9.3.4 Documenting your postmortem -- 9.3.5 Sharing the postmortem -- Summary -- 10 Information hoarding: Only Brent knows -- 10.1 Understanding how information hoarding happens -- 10.2 Recognizing unintentional hoarders -- 10.2.1 Documentation isn't valued…”
Libro electrónico -
1251Publicado 2023Tabla de Contenidos: “…Stack barriers -- 11.6. GC safe-points and mutator suspension -- 11.7. Garbage collecting code -- 11.8. …”
Libro electrónico -
1252Publicado 2023Tabla de Contenidos: “…Hybrid Controller Synthesis for Nonlinear Systems Subject to Reach-Avoid Constraints -- 1 Introduction -- 1.1 Related Works -- 2 Preliminaries -- 3 Hybrid Polynomial-DNN Controllers Training -- 3.1 Training Well-Performing DNN Controllers Using RL -- 3.2 Polynomial Approximation -- 3.3 Training the Residual Controller -- 4 Reach-Avoid Verification with Lyapunov-Like Functions and Barrier Certificates Generation -- 4.1 Constructing Polynomial Simulations of the Controller Network -- 4.2 Producing Barrier Certificate and Lyapunov-Like Function -- 5 Experiments -- 6 Conclusion -- References -- Safe Environmental Envelopes of Discrete Systems -- 1 Introduction -- 2 Motivating Example -- 3 Modeling Formalism -- 4 Robustness Against Environmental Deviations -- 4.1 Deviations -- 4.2 Comparing Deviations -- 4.3 Robustness -- 4.4 Problem Statement -- 4.5 Comparing Robustness -- 5 Computing Robustness -- 5.1 Brute-Force Algorithm -- 5.2 Controlling the Deviations Without Environmental Constraints -- 5.3 Controlling the Deviations with Environmental Constraints -- 6 Case Studies -- 6.1 Implementation -- 6.2 Therac-25 -- 6.3 Voting -- 6.4 Oyster -- 6.5 PCA Pump -- 6.6 Results and Discussion -- 7 Related Work -- 8 Conclusion -- References -- Verse: A Python Library for Reasoning About Multi-agent Hybrid System Scenarios -- 1 Introduction -- 2 Overview of Verse -- 3 Scenarios in Verse -- 4 Verse Scenario to Hybrid Verification -- 5 Experiments and Use Cases -- 6 Related Work -- 7 Conclusions and Future Directions -- References -- Synthesis -- Counterexample Guided Knowledge Compilation for Boolean Functional Synthesis -- 1 Introduction -- 2 A Motivating Example -- 3 Preliminaries and Notation -- 4 A New Knowledge Representation for Skolem Functions -- 5 Towards Synthesizing the Skolem Basis Vector -- 6 Counterexample-Guided Rectification…”
Libro electrónico -
1253por Leonard, AnghelTabla de Contenidos: “…Using pseudo-random generators in a thread-safe fashion (multithreaded environments) -- Summary -- Chapter 2: Objects, Immutability, Switch Expressions, and Pattern Matching -- Problems -- 38. …”
Publicado 2024
Libro electrónico -
1254Publicado 2024Tabla de Contenidos: “…Chapter 2: Command and Control -- Technical requirements -- Introduction -- if statements -- Exercise 2.01 - a simple if statement -- if else statements -- Exercise 2.02 - using an if else statement -- else if statements -- Exercise 2.03 - using an else if statement -- initial if statements -- Exercise 2.04 - implementing initial if statements -- Expression switch statements -- Exercise 2.05 - using a switch statement -- Exercise 2.06 - switch statements and multiple case values -- Exercise 2.07 - expressionless switch statements -- Loops -- Exercise 2.08 - using a for i loop -- Exercise 2.09 - looping over arrays and slices -- range loop -- Exercise 2.10 - looping over a map -- Activity 2.01 - looping over map data using range -- Activity 2.02 - implementing FizzBuzz -- break and continue -- Exercise 2.11 - using break and continue to control loops -- Activity 2.03 - bubble sort -- goto statements -- Exercise 2.12 - using goto statements -- Summary -- Chapter 3: Core Types -- Technical requirements -- Introduction -- True and false -- Exercise 3.01 - Program to measure password complexity -- Numbers -- Integers -- Floating-point numbers -- Exercise 3.02 - Floating-point number accuracy -- Overflow and wraparound -- Exercise 3.03 - Triggering number wraparound -- Big numbers -- Exercise 3.04 - Big numbers -- byte -- Text -- Rune -- Exercise 3.05 - Safely looping over a string -- The nil value -- Activity 3.01 - Sales tax calculator -- Activity 3.02 - Loan calculator -- Summary -- Chapter 4: Complex Types -- Technical requirements -- Introduction -- Collection types -- Arrays -- Exercise 4.01 - Defining an array -- Comparing arrays -- Exercise 4.02 - Comparing arrays -- Initializing arrays using keys -- Exercise 4.03 - Initializing an array using keys -- Reading from an array -- Exercise 4.04 - Reading a single item from an array…”
Libro electrónico -
1255Publicado 2024Tabla de Contenidos: “…-- Integrating with other identity providers -- Other security topics -- Always use Hypertext Transfer Protocol Secure (HTTPS) -- Using a strong password policy -- Implementing two-factor authentication (2FA) -- Implementing rate-limiting -- Using model validation -- Using parameterized queries -- Using data protection -- Keeping secrets safe -- Keeping the framework up to date -- Checking the Open Web Application Security Project (OWASP) Top 10 -- Summary -- Chapter 9: Testing in ASP.NET Core (Part 1 - Unit Testing) -- Technical requirements -- Introduction to testing in ASP.NET Core…”
Libro electrónico -
1256Publicado 2024Tabla de Contenidos:Libro electrónico
-
1257por Perkins, BenjaminTabla de Contenidos: “…Optimize Pipelines for Analytical or Transactional Purposes -- Scale Resources -- Design and Configure Exception Handling -- Handle Interruptions -- Ingest and Transform Data -- Transform Data Using Azure Stream Analytics -- Monitor Data Storage and Data Processing -- Monitor Stream Processing -- Summary -- Exam Essentials -- Review Questions -- Part IV Secure, Monitor, and Optimize Data Storage and Data Processing -- Chapter 8 Keeping Data Safe and Secure -- Design Security for Data Policies and Standards -- Design a Data Auditing Strategy -- Design a Data Retention Policy -- Design for Data Privacy -- Design to Purge Data Based on Business Requirements -- Design Data Encryption for Data at Rest and in Transit -- Design Row-Level and Column-Level Security -- Design a Data Masking Strategy -- Design Access Control for Azure Data Lake Storage Gen2 -- Implement Data Security -- Implement a Data Auditing Strategy -- Manage Sensitive Information -- Implement a Data Retention Policy -- Encrypt Data at Rest and in Motion -- Implement Row-Level and Column-Level Security -- Implement Data Masking -- Manage Identities, Keys, and Secrets Across Different Data Platform Technologies -- Implement Access Control for Azure Data Lake Storage Gen2 -- Implement Secure Endpoints (Private and Public) -- Implement Resource Tokens in Azure Databricks -- Load a DataFrame with Sensitive Information -- Write Encrypted Data to Tables or Parquet Files -- Develop a Batch Processing Solution -- Handle Security and Compliance Requirements -- Design and Implement the Data Exploration Layer -- Browse and Search Metadata in Microsoft Purview Data Catalog -- Push New or Updated Data Lineage to Microsoft Purview -- Summary -- Exam Essentials -- Review Questions -- Chapter 9 Monitoring Azure Data Storage and Processing -- Monitoring Data Storage and Data Processing…”
Publicado 2023
Libro electrónico -
1258
-
1259
-
1260