Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 693
- Application software 600
- Engineering & Applied Sciences 492
- Historia 486
- History 440
- Java (Computer program language) 404
- Computer Science 396
- Python (Computer program language) 308
- Computer programming 291
- Classes socials 233
- Web site development 227
- Design 223
- Programming 222
- Història 212
- Microsoft .NET Framework 193
- Education 188
- Management 181
- Web sites 178
- Computer software 177
- Programming languages (Electronic computers) 171
- Clases sociales 170
- Ensenyament 158
- JavaScript (Computer program language) 155
- Computer programs 154
- Object-oriented programming (Computer science) 154
- C# (Computer program language) 151
- Social aspects 138
- C++ (Computer program language) 133
- Social conditions 128
- Software engineering 122
-
11021Publicado 2017Tabla de Contenidos: “…. -- Working with type classes -- Getting ready -- How to do it... -- How it works... -- Working with Monoid -- Getting ready -- How to do it... -- How it works... -- Chapter 4: Working with Functors, Applicatives, and Monads -- Introduction -- Working with Functors -- How to do it... -- How it works... -- Binary tree as Functor -- How to do it... -- How it works... -- Working with Applicatives -- How to do it... -- How it works... -- Binary tree as Applicative -- How to do it... -- How it works... -- Working with monad -- How to do it... -- How it works... -- There's more... -- List as monad -- How to do it... -- How it works... -- Working with IO monad -- How to do it... -- How it works... -- Writing INI parser -- How to do it... -- How it works... -- Errors and exception handling -- How to do it... -- How it works... -- Chapter 5: More about Monads -- Introduction -- Writing a State Monad -- How to do it... -- How it works... -- Computing a fibonacci number with State Monad -- How to do it... -- How it works... -- Writing a State Monad transformer -- How to do it... -- How it works... -- Working with the Reader monad transformer -- How to do it... -- How it works... -- Working with the Writer monad transformer -- Getting ready -- How to do it... -- How it works... -- Combining monad transformers -- How to do it... -- How it works…”
Libro electrónico -
11022Publicado 2018Tabla de Contenidos: “…XOR Encryption -- Random Number Generators -- Symmetric Key Cryptography -- Block Ciphers -- Block Cipher Modes -- Block Cipher Padding -- Padding Oracle Attack -- Stream Ciphers -- Asymmetric Key Cryptography -- RSA Algorithm -- RSA Padding -- Diffie-Hellman Key Exchange -- Signature Algorithms -- Cryptographic Hashing Algorithms -- Asymmetric Signature Algorithms -- Message Authentication Codes -- Public Key Infrastructure -- X.509 Certificates -- Verifying a Certificate Chain -- Case Study: Transport Layer Security -- The TLS Handshake -- Initial Negotiation -- Endpoint Authentication -- Establishing Encryption -- Meeting Security Requirements -- Final Words -- Chapter 8: Implementing the Network Protocol -- Replaying Existing Captured Network Traffic -- Capturing Traffic with Netcat -- Using Python to Resend Captured UDP Traffic -- Repurposing Our Analysis Proxy -- Repurposing Existing Executable Code -- Repurposing Code in .NET Applications -- Repurposing Code in Java Applications -- Unmanaged Executables -- Encryption and Dealing with TLS -- Learning About the Encryption In Use -- Decrypting the TLS Traffic -- Final Words -- Chapter 9: The Root Causes of Vulnerabilities -- Vulnerability Classes -- Remote Code Execution -- Denial-of-Service -- Information Disclosure -- Authentication Bypass -- Authorization Bypass -- Memory Corruption Vulnerabilities -- Memory-Safe vs. …”
Libro electrónico -
11023Publicado 2017Tabla de Contenidos: “…. -- Clustering data from classes -- How to do it... -- Learning association rules from data -- Getting ready -- How to do it... -- Selecting features/attributes using the low-level method, the filtering method, and the meta-classifier method -- Getting ready -- How to do it... -- Chapter 5: Learning from Data - Part 2 -- Introduction -- Applying machine learning on data using Java Machine Learning (Java-ML) library -- Getting ready -- How to do it... -- Classifying data points using the Stanford classifier -- Getting ready -- How to do it... -- How it works... -- Classifying data points using Massive Online Analysis (MOA)…”
Libro electrónico -
11024por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Taxation is not neutral across different asset classes -- Property taxes -- Figure 1.13. Taxes on property are low by international standards -- Value added tax -- Figure 1.14. …”
Publicado 2015
Libro electrónico -
11025Publicado 2012Tabla de Contenidos: “…Next Generation Wireless Network Mobility Models 35 -- 3.3 A Taxonomy of Existing Mobility Models 38 -- 3.4 Mobility Models and Real-World Traces: The CRAWDAD Resource 43 -- 3.5 Basic Definitions 45 -- Part II “GENERAL-PURPOSE” MOBILITY MODELS -- 4 Random Walk Models 51 -- 4.1 Discrete Random Walks 52 -- 4.2 Continuous Random Walks 55 -- 4.3 Other Random Walk Models 57 -- 4.4 Theoretical Properties of Random Walk Models 58 -- 5 The Random Waypoint Model 61 -- 5.1 The RWP Model 62 -- 5.2 The Node Spatial Distribution of the RWP Model 64 -- 5.3 The Average Nodal Speed of the RWP Model 69 -- 5.4 Variants of the RWP Model 73 -- 6 Group Mobility and Other Synthetic Mobility Models 75 -- 6.1 The RPGM Model 76 -- 6.2 Other Synthetic Mobility Models 83 -- 7 Random Trip Models 89 -- 7.1 The Class of Random Trip Models 89 -- 7.2 Stationarity of Random Trip Models 93 -- 7.3 Examples of Random Trip Models 94 -- Part III MOBILITY MODELS FOR WLAN AND MESH NETWORKS -- 8 WLAN and Mesh Networks 101 -- 8.1 WLAN and Mesh Networks: State of the Art 101 -- 8.2 WLAN and Mesh Networks: User Scenarios 107 -- 8.3 WLAN and Mesh Networks: Perspectives 109 -- 8.4 Further Reading 111 -- 9 Real-World WLAN Mobility 113 -- 9.1 Real-World WLAN Traces 113 -- 9.2 Features of WLAN Mobility 116 -- 10 WLAN Mobility Models 121 -- 10.1 The LH Mobility Model 122 -- 10.2 The KKK Mobility Model 129 -- 10.3 Final Considerations and Further Reading 137.…”
Libro electrónico -
11026Publicado 2018Tabla de Contenidos: “…. -- Styling a component with CSS classes and inline styles -- How to do it... -- How it works... -- There's more... -- Passing props to a component and validating them with PropTypes -- How to do it... -- How it works... -- There's more... -- Using local state in a component -- How to do it... -- How it works... -- There's more... -- Making a functional or stateless component -- How to do it... -- How it works... -- There's more... -- Understanding React lifecycle methods -- How to do it... -- Todo list - implementing ComponentWillMount -- Pomodoro timer - implementing the constructor and componentDidMount -- Crypto coins exchanger - implementing shouldComponentUpdate -- Notes - implementing componentWillReceiveProps and componentWillUnmount -- C3.js chart - implementing componentDidUpdate -- Basic animation - implementing componentWillUpdate -- How it works... -- Understanding React Pure Components -- Getting ready -- How to do it... -- How it works... -- Preventing XSS vulnerabilities in React -- How to do it... -- How it works... -- There's more... -- Chapter 3: Handling Events, Binding and Useful React Packages -- Introduction -- Binding methods using the constructor versus using arrow functions -- How to do it... -- How it works... -- Creating form elements with events…”
Libro electrónico -
11027Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Software Architecture Today -- Defining software architecture -- I know my land -- I want to stay ahead -- Predicting the future -- Architecture and architects -- Software architecture principles -- Components -- Low coupling -- High cohesion -- SOLID principles -- The single responsibility principle (SRP) -- The Open-Closed Principle (OCP) -- The Liskov substitution principle -- The interface segregation principle (ISP) -- The dependency inversion (DI) principle -- Conway's law -- Choosing the right technology for you -- New trends -- Summary -- Chapter 2: Software Architecture Dimensions -- Dimensions -- The business dimension -- Managing user requirements -- Identifying and tracking business metrics -- The data dimension -- The technical dimension -- The operations dimension -- How to deploy an application -- How interaction occurs among your components -- Dealing with infrastructure -- Understanding the infrastructure -- Versioning -- Testing -- Cloud versus on-premise -- Deploying your application -- The C4 model -- Context diagram -- Container diagram -- Components diagram -- Class diagram -- Summary -- Chapter 3: Spring Projects -- Why Spring appeared -- Spring projects -- Spring Initializr -- Spring Boot in a Nutshell -- Servlet container integration -- Autoconfiguration -- Dependency management -- mvnw and mvnw.cmd -- pom.xml -- DemoApplication.java -- The application.properties file -- DemoApplicationTests.java -- Avoiding redeployment with developer tools -- Spring Data -- Supporting EIPs with Spring Integration -- Spring Batch -- The read step -- The process step -- The write step -- Securing applications with Spring Security -- Embracing (Spring) HATEOAS -- Spring Cloud and the microservices world…”
Libro electrónico -
11028Publicado 2017Tabla de Contenidos: “…Front Cover -- PEERING CARRIER ETHERNET NETWORKS -- PEERING CARRIER ETHERNET NETWORKS -- Copyright -- Dedications -- CONTENTS -- LIST OF FIGURES -- LIST OF TABLES -- ABOUT THE AUTHOR -- PREFACE -- About this Book -- Organization of the Book -- Miscellaneous Items -- Audience of the Book -- ACKNOWLEDGMENTS -- GLOSSARY -- 1 - INTRODUCTION -- 1.1 Telephone Networks -- 1.2 Data Networks -- 1.3 Hybrid Fiber-Coaxial Networks -- 1.4 Wireless Networks -- 1.5 Chapter Summary -- 2 - SHAPING OF DATA NETWORKS -- 2.1 Protocols, Models, and Architecture of Data Networks -- 2.2 Convergence in Backhaul -- 2.3 Diversity in Access -- 2.4 Voice as Another Data Application -- 2.5 Chapter Summary -- 3 - THE ETHERNET LANDSCAPE -- 3.1 Ethernet Protocol for Data Link Layer -- 3.2 Evolution of Ethernet -- 3.3 Components of an Ethernet Switch -- 3.4 Emergence of Carrier Ethernet Networks -- 3.5 Chapter Summary -- 4 - CARRIER ETHERNET NETWORKS -- 4.1 Carrier Ethernet-Related Terminology and Architecture -- 4.2 Ethernet Services Framework -- 4.2.1 Ethernet Physical Interface Attribute (Scalability-Related Attributes) -- 4.2.2 Bandwidth Profile Attribute (Traffic Policing-Related Attribute) -- 4.2.3 Performance Attribute (Frame Delay, Frame Delay Variation, and Frame Loss-Related QoS Attributes) -- 4.2.4 Class of Service-Related Attributes (Queuing and Scheduling Related to QoS) -- 4.2.5 Service Frame Delivery Attribute (Unicast, Multicast, Broadcast, and L2CP Related) -- 4.2.6 VLAN Tag Support Attribute (Service Delivery Related) -- 4.2.7 Service Multiplexing Attribute (Service Delivery Related) -- 4.2.8 Bundling Attribute (Service Delivery Related) -- 4.2.9 Security Filters Attribute (Security Related) -- 4.3 Services Defined by Carrier Ethernet -- 4.3.1 EP-Line Service -- 4.3.2 EVP-Line (EVPL) Service -- 4.3.3 EP-LAN -- 4.3.4 EVP-LAN -- 4.3.5 EP-Tree -- 4.3.6 EVP-Tree…”
Libro electrónico -
11029Publicado 2017Tabla de Contenidos: “…-- Building Random Forest and Extremely Random Forest classifiers -- Estimating the confidence measure of the predictions -- Dealing with class imbalance -- Finding optimal training parameters using grid search -- Computing relative feature importance -- Predicting traffic using Extremely Random Forest regressor -- Summary…”
Libro electrónico -
11030Publicado 2007Tabla de Contenidos: “…11.3 Types of State -- 11.4 Measuring Service Statelessness -- 11.5 Statelessness and Service Design -- 11.6 Risks Associated with Service Statelessness -- 11.7 Case Study Example -- Chapter 12: Service Discoverability (Interpretability and Communication) -- 12.1 Discoverability Explained -- 12.2 Profiling this Principle -- 12.3 Types of Discovery and Discoverability Meta Information -- 12.4 Measuring Service Discoverability -- 12.5 Discoverability and Service Design -- 12.6 Risks Associated with Service Discoverability -- 12.7 Case Study Example -- Chapter 13: Service Composability (Composition Member Design and Complex Compositions) -- 13.1 Composition Explained -- 13.2 Profiling this Principle -- 13.3 Composition Concepts and Terminology -- 13.4 The Complex Service Composition -- 13.5 Measuring Service Composability and Composition Effectiveness Potential -- 13.6 Composition and Service Design -- 13.7 Risks Associated with Service Composition -- 13.8 Case Study Example -- PART III: SUPPLEMENTAL -- Chapter 14: Service-Orientation and Object-Orientation: A Comparison of Principles and Concepts -- 14.1 A Tale of Two Design Paradigms -- 14.2 A Comparison of Goals -- 14.3 A Comparison of Fundamental Concepts -- 14.4 A Comparison of Design Principles -- 14.5 Guidelines for Designing Service-Oriented Classes -- Chapter 15: Supporting Practices -- 15.1 Service Profiles -- 15.2 Vocabularies -- 15.3 Organizational Roles -- Chapter 16: Mapping Service-Orientation Principles to Strategic Goals -- 16.1 Principles that Increase Intrinsic Interoperability -- 16.2 Principles that Increase Federation -- 16.3 Principles that Increase Vendor Diversification Options -- 16.4 Principles that Increase Business and Technology Domain Alignment -- 16.5 Principles that Increase ROI -- 16.6 Principles that Increase Organizational Agility…”
Libro electrónico -
11031Publicado 2008Tabla de Contenidos: “…Analyzing and Choosing Subnet Masks -- Analyzing Existing Subnets -- Design: Choosing the Subnets of a Classful Network -- Exam Preparation Tasks -- Review All the Key Topics -- Complete the Tables and Lists from Memory -- Definitions of Key Terms -- Read Appendix F Scenario 1, Part A -- Subnetting Questions and Processes -- Chapter 13 Operating Cisco Routers -- Do I Know This Already?" …”
Libro electrónico -
11032por Jacob, BartTabla de Contenidos: “…Creating an installation program -- 6.1 Basic flow -- 6.1.1 Common terms -- 6.1.2 Installation process -- 6.2 Writing a custom installer -- 6.2.1 Checking the environment as defined by the software package -- 6.2.2 Obtaining user input and overriding default values -- 6.2.3 Obtaining and validating the dependencies of the package -- 6.2.4 Installing the package -- 6.2.5 Registering the installable units -- 6.3 Interfacing with ChangeManager and other classes -- 6.3.1 com.ibm.ac.si.mr.MediaInfo -- 6.3.2 com.ibm.ac.si.checker.DependencyChecker -- 6.3.3 com.ibm.ac.si.checker.CheckerUtil -- 6.3.4 com.ibm.ac.si.checker.PropertySelection -- 6.3.5 com.ibm.ac.si.checker.SoftwareSelection -- 6.3.6 com.ibm.ac.si.instances.ParameterOverrides -- 6.3.7 com.ibm.ac.si.selections.FeatureSelectionInput -- 6.3.8 com.ibm.ac.si.instances.SoftwareInstance -- 6.3.9 com.ibm.ac.si.cm.CreateOperation -- 6.3.10 com.ibm.ac.si.cm.DeleteOperation -- 6.3.11 com.ibm.ac.si.cm.ChangeRequest -- 6.3.12 com.ibm.ac.si.cm.IChangeManager -- 6.4 Sample installation program -- 6.4.1 Manifest files -- 6.4.2 Installation program -- 6.4.3 Setup of installation program -- 6.5 Feature selection example -- 6.5.1 Manifest files -- 6.5.2 Installation program -- 6.5.3 Payload -- 6.5.4 Response file -- 6.5.5 Execution -- 6.5.6 Output -- 6.6 Summary -- Chapter 7. …”
Publicado 2004
Libro electrónico -
11033Publicado 2017Tabla de Contenidos: “…-- Controversies and Separation of Concerns -- Class components versus functional components -- Our second component -- State in React -- Reusing components -- Summary -- Chapter 4: Easy Backend Setup With Firebase -- What is Firebase? …”
Libro electrónico -
11034Publicado 2010Tabla de Contenidos: “…-- Installing the .NET Framework, Visual Web Developer, and SQL Server 2008 -- A Brief Tour of Visual Web Developer -- Q&A -- Workshop -- HOUR 2: Understanding the ASP.NET Programming Model -- Examining the HTML Portion of an ASP.NET Page -- Examining the Source Code Portion of an ASP.NET Page -- Q&A -- Workshop -- HOUR 3: Using Visual Web Developer -- Creating a New Website -- Opening Existing Websites -- Working with Web Pages and Other Content -- Customizing the Visual Web Developer Experience -- Viewing, Moving, and Resizing Windows -- A World of Help at Your Fingertips -- Q&A -- Workshop -- HOUR 4: Designing, Creating, and Testing ASP.NET Pages -- Specifying the Design Requirements -- Creating the User Interface -- Writing the Source Code for the ASP.NET Page -- Testing the Financial Calculator -- Examining the Source Code -- Using the Debugger -- Q&A -- Workshop -- HOUR 5: Understanding Visual Basic's Variables and Operators -- The Purpose of Programming Languages -- Declaring and Using Variables -- Examining Visual Basic's Operators -- Learning Visual Basic's Type Rules -- Q&A -- Workshop -- HOUR 6: Managing Program Flow with Visual Basic's Control Structures -- Understanding Control Structures -- Exploring the Conditional Control Structure -- Working with Visual Basic's Looping Control Structures -- Exploring the Modularizing Control Structures: Subroutines and Functions -- Q&A -- Workshop -- HOUR 7: Working with Objects in Visual Basic -- Reexamining the Role of Classes and Objects -- Creating an Object -- Setting an Object's Properties -- Calling an Object's Methods -- Creating Event Handlers for an Object's Events -- Q&A -- Workshop -- HOUR 8: ASP.NET Web Controls for Displaying Text…”
Libro electrónico -
11035Publicado 2024Tabla de Contenidos: “…. -- Chapter 6: Transitioning from Qt 5 to Qt 6 -- Technical requirements -- Changes in C++ classes -- How to do it... -- How it works... -- There's more... -- Using Clazy checks for Clang and C++ -- How to do it... -- How it works... -- Changes in QML types -- How to do it... -- How it works... -- Chapter 7: Using Network and Managing Large Documents -- Technical requirements -- Creating a TCP server -- How to do it... -- How it works... -- Creating a TCP client -- How to do it... -- How it works... -- Uploading and downloading files using FTP -- How to do it... -- How it works... -- Chapter 8: Threading Basics -Asynchronous Programming -- Technical requirements -- Using threads -- How to do it...…”
Libro electrónico -
11036por OECDTabla de Contenidos: “…Tackling parent attitudes, bullying and discipline is key to increasing attendance rates -- Ability grouping within classes at schools is extensive and may run counter to equity objectives -- Assisting children with disabilities and extra learning needs -- The objectives and regulation of partnership schools need to be carefully designed -- Findings and recommendations -- References -- 5 A fight on two fronts: Adapting to climate change and reducing GHG emissions -- 5.1. …”
Publicado 2024
Libro electrónico -
11037Publicado 2022“…Classes with a special emphasis (so-called profile classes) represent a central element of current school development processes and are considered as one of the most prominent ways of practical implementation of school autonomy. …”
Libro electrónico -
11038Publicado 2022Tabla de Contenidos: “…6.7.3 Attention Mechanism Network -- 6.7.4 Graph Convolutional Neural Network -- 6.8 Hands-On of Automobile Fuel Consumption Prediction -- 6.8.1 Dataset -- 6.8.2 Create a Network -- 6.8.3 Training and Testing -- 6.9 References -- Chapter 7: Backward Propagation Algorithm -- 7.1 Derivatives and Gradients -- 7.2 Common Properties of Derivatives -- 7.2.1 Common Derivatives -- 7.2.2 Common Property of Derivatives -- 7.2.3 Hands-On Derivative Finding -- 7.3 Derivative of Activation Function -- 7.3.1 Derivative of Sigmoid Function -- 7.3.2 Derivative of ReLU Function -- 7.3.3 Derivative of LeakyReLU Function -- 7.3.4 Derivative of Tanh Function -- 7.4 Gradient of Loss Function -- 7.4.1 Gradient of Mean Square Error Function -- 7.4.2 Gradient of Cross-Entropy Function -- 7.5 Gradient of Fully Connected Layer -- 7.5.1 Gradient of a Single Neuron -- 7.5.2 Gradient of Fully Connected Layer -- 7.6 Chain Rule -- 7.7 Back Propagation Algorithm -- 7.8 Hands-On Optimization of Himmelblau -- 7.9 Hands-On Back Propagation Algorithm -- 7.9.1 Dataset -- 7.9.2 Network Layer -- 7.9.3 Network model -- 7.9.4 Network Training -- 7.9.5 Network Performance -- 7.10 References -- Chapter 8: Keras Advanced API -- 8.1 Common Functional Modules -- 8.1.1 Common Network Layer Classes -- 8.1.2 Network Container -- 8.2 Model Configuration, Training, and Testing -- 8.2.1 Model Configuration -- 8.2.2 Model Training -- 8.2.3 Model Testing -- 8.3 Model Saving and Loading -- 8.3.1 Tensor Method -- 8.3.2 Network Method -- 8.3.3 SavedModel method -- 8.4 Custom Network -- 8.4.1 Custom Network Layer -- 8.4.2 Customized Network -- 8.5 Model Zoo -- 8.5.1 Load Model -- 8.6 Metrics -- 8.6.1 Create a Metrics Container -- 8.6.2 Write Data -- 8.6.3 Read Statistical Data -- 8.6.4 Clear the Container -- 8.6.5 Hands-On Accuracy Metric -- 8.7 Visualization -- 8.7.1 Model Side -- 8.7.2 Browser Side…”
Libro electrónico -
11039Publicado 2004Tabla de Contenidos: “…3.10 Cross-system Coupling Facility (XCF) -- 3.10.1 XCF systems, groups, and members -- 3.10.2 XCF signaling paths -- 3.10.3 XCF Transport Classes -- 3.10.4 XCF signal path performance problems -- 3.10.5 XCF message buffer length performance problems -- 3.10.6 XCF message buffer space performance problems -- 3.10.7 XCF Coupling Facility performance problems -- 3.10.8 XCF recommendations -- 3.11 GRS -- 3.11.1 GRS start options -- 3.11.2 Dynamic RNLs -- 3.11.3 GRS Ring Availability considerations - Fully connected complex -- 3.11.4 GRS Ring Availability considerations - Mixed complex -- 3.11.5 GRS Star Availability considerations -- 3.11.6 SYNCHRES option -- 3.11.7 Resource Name Lists (RNLs) -- 3.11.8 RNL design -- 3.11.9 GRS monitor (ISGRUNAU) -- 3.11.10 RNL syntax checking -- 3.11.11 GRS recommendations -- 3.12 Tape sharing -- 3.12.1 IEFAUTOS -- 3.12.2 ATS Star -- 3.12.3 Coexistence between Dedicated, IEFAUTOS, and ATS Star -- 3.12.4 Tape-sharing recommendations -- 3.13 JES2 -- 3.13.1 JES2 SPOOL considerations -- 3.13.2 JES2 Checkpoint considerations -- 3.13.3 JES2 Checkpoint access -- 3.13.4 JES2 Checkpoint performance -- 3.13.5 JES2 Checkpoint management -- 3.13.6 JES2 Health Monitor -- 3.13.7 Scheduling environment -- 3.13.8 WLM-managed initiators -- 3.13.9 JESLOG SPIN data sets -- 3.13.10 JES2 recommendations -- 3.14 WLM -- 3.14.1 Service classes -- 3.14.2 WLM recommendations -- 3.15 UNIX System Services -- 3.15.1 Shared HFS -- 3.15.2 Automove -- 3.15.3 zFS -- 3.15.4 BRLM issues -- 3.15.5 UNIX System Services recommendations -- 3.16 RACF -- 3.16.1 RACF sysplex communication -- 3.16.2 RACF non-data sharing mode -- 3.16.3 RACF data sharing mode -- 3.16.4 RACF read-only mode -- 3.16.5 RACF recovery procedures -- 3.16.6 PKI Services -- 3.16.7 RACF recommendations -- 3.17 DFSMShsm -- 3.17.1 Common Recall Queue…”
Libro electrónico -
11040por Rodriguez, Juan R.Tabla de Contenidos: “…JSR 168 portlet development -- 9.1 Overview -- 9.2 Creating a JSR 168 portlet project -- 9.2.1 Creating a basic JSR 168 portlet -- 9.2.2 Examining the generated portlet -- 9.3 Updating the generated portlet -- 9.3.1 Modifying the session bean -- 9.3.2 View mode -- 9.3.3 Edit mode -- 9.3.4 Configure mode -- 9.3.5 Updating the portlet descriptor (portlet.xml) -- 9.3.6 Modifying the MySimplePortletPortletPreferenceValidator class -- 9.4 Running the portlet -- 9.4.1 Executing the portlet -- Chapter 10. …”
Publicado 2005
Libro electrónico