Mostrando 11,021 - 11,040 Resultados de 13,858 Para Buscar '"The Class"', tiempo de consulta: 0.19s Limitar resultados
  1. 11021
    Publicado 2017
    Tabla de Contenidos: “…. -- Working with type classes -- Getting ready -- How to do it... -- How it works... -- Working with Monoid -- Getting ready -- How to do it... -- How it works... -- Chapter 4: Working with Functors, Applicatives, and Monads -- Introduction -- Working with Functors -- How to do it... -- How it works... -- Binary tree as Functor -- How to do it... -- How it works... -- Working with Applicatives -- How to do it... -- How it works... -- Binary tree as Applicative -- How to do it... -- How it works... -- Working with monad -- How to do it... -- How it works... -- There's more... -- List as monad -- How to do it... -- How it works... -- Working with IO monad -- How to do it... -- How it works... -- Writing INI parser -- How to do it... -- How it works... -- Errors and exception handling -- How to do it... -- How it works... -- Chapter 5: More about Monads -- Introduction -- Writing a State Monad -- How to do it... -- How it works... -- Computing a fibonacci number with State Monad -- How to do it... -- How it works... -- Writing a State Monad transformer -- How to do it... -- How it works... -- Working with the Reader monad transformer -- How to do it... -- How it works... -- Working with the Writer monad transformer -- Getting ready -- How to do it... -- How it works... -- Combining monad transformers -- How to do it... -- How it works…”
    Libro electrónico
  2. 11022
    Publicado 2018
    Tabla de Contenidos: “…XOR Encryption -- Random Number Generators -- Symmetric Key Cryptography -- Block Ciphers -- Block Cipher Modes -- Block Cipher Padding -- Padding Oracle Attack -- Stream Ciphers -- Asymmetric Key Cryptography -- RSA Algorithm -- RSA Padding -- Diffie-Hellman Key Exchange -- Signature Algorithms -- Cryptographic Hashing Algorithms -- Asymmetric Signature Algorithms -- Message Authentication Codes -- Public Key Infrastructure -- X.509 Certificates -- Verifying a Certificate Chain -- Case Study: Transport Layer Security -- The TLS Handshake -- Initial Negotiation -- Endpoint Authentication -- Establishing Encryption -- Meeting Security Requirements -- Final Words -- Chapter 8: Implementing the Network Protocol -- Replaying Existing Captured Network Traffic -- Capturing Traffic with Netcat -- Using Python to Resend Captured UDP Traffic -- Repurposing Our Analysis Proxy -- Repurposing Existing Executable Code -- Repurposing Code in .NET Applications -- Repurposing Code in Java Applications -- Unmanaged Executables -- Encryption and Dealing with TLS -- Learning About the Encryption In Use -- Decrypting the TLS Traffic -- Final Words -- Chapter 9: The Root Causes of Vulnerabilities -- Vulnerability Classes -- Remote Code Execution -- Denial-of-Service -- Information Disclosure -- Authentication Bypass -- Authorization Bypass -- Memory Corruption Vulnerabilities -- Memory-Safe vs. …”
    Libro electrónico
  3. 11023
    Publicado 2017
    Tabla de Contenidos: “…. -- Clustering data from classes -- How to do it... -- Learning association rules from data -- Getting ready -- How to do it... -- Selecting features/attributes using the low-level method, the filtering method, and the meta-classifier method -- Getting ready -- How to do it... -- Chapter 5: Learning from Data - Part 2 -- Introduction -- Applying machine learning on data using Java Machine Learning (Java-ML) library -- Getting ready -- How to do it... -- Classifying data points using the Stanford classifier -- Getting ready -- How to do it... -- How it works... -- Classifying data points using Massive Online Analysis (MOA)…”
    Libro electrónico
  4. 11024
    Tabla de Contenidos: “…Taxation is not neutral across different asset classes -- Property taxes -- Figure 1.13. Taxes on property are low by international standards -- Value added tax -- Figure 1.14. …”
    Libro electrónico
  5. 11025
    Publicado 2012
    Tabla de Contenidos: “…Next Generation Wireless Network Mobility Models 35 -- 3.3 A Taxonomy of Existing Mobility Models 38 -- 3.4 Mobility Models and Real-World Traces: The CRAWDAD Resource 43 -- 3.5 Basic Definitions 45 -- Part II “GENERAL-PURPOSE” MOBILITY MODELS -- 4 Random Walk Models 51 -- 4.1 Discrete Random Walks 52 -- 4.2 Continuous Random Walks 55 -- 4.3 Other Random Walk Models 57 -- 4.4 Theoretical Properties of Random Walk Models 58 -- 5 The Random Waypoint Model 61 -- 5.1 The RWP Model 62 -- 5.2 The Node Spatial Distribution of the RWP Model 64 -- 5.3 The Average Nodal Speed of the RWP Model 69 -- 5.4 Variants of the RWP Model 73 -- 6 Group Mobility and Other Synthetic Mobility Models 75 -- 6.1 The RPGM Model 76 -- 6.2 Other Synthetic Mobility Models 83 -- 7 Random Trip Models 89 -- 7.1 The Class of Random Trip Models 89 -- 7.2 Stationarity of Random Trip Models 93 -- 7.3 Examples of Random Trip Models 94 -- Part III MOBILITY MODELS FOR WLAN AND MESH NETWORKS -- 8 WLAN and Mesh Networks 101 -- 8.1 WLAN and Mesh Networks: State of the Art 101 -- 8.2 WLAN and Mesh Networks: User Scenarios 107 -- 8.3 WLAN and Mesh Networks: Perspectives 109 -- 8.4 Further Reading 111 -- 9 Real-World WLAN Mobility 113 -- 9.1 Real-World WLAN Traces 113 -- 9.2 Features of WLAN Mobility 116 -- 10 WLAN Mobility Models 121 -- 10.1 The LH Mobility Model 122 -- 10.2 The KKK Mobility Model 129 -- 10.3 Final Considerations and Further Reading 137.…”
    Libro electrónico
  6. 11026
    Publicado 2018
    Tabla de Contenidos: “…. -- Styling a component with CSS classes and inline styles -- How to do it... -- How it works... -- There's more... -- Passing props to a component and validating them with PropTypes -- How to do it... -- How it works... -- There's more... -- Using local state in a component -- How to do it... -- How it works... -- There's more... -- Making a functional or stateless component -- How to do it... -- How it works... -- There's more... -- Understanding React lifecycle methods -- How to do it... -- Todo list - implementing ComponentWillMount -- Pomodoro timer - implementing the constructor and componentDidMount -- Crypto coins exchanger - implementing shouldComponentUpdate -- Notes - implementing componentWillReceiveProps and componentWillUnmount -- C3.js chart - implementing componentDidUpdate -- Basic animation - implementing componentWillUpdate -- How it works... -- Understanding React Pure Components -- Getting ready -- How to do it... -- How it works... -- Preventing XSS vulnerabilities in React -- How to do it... -- How it works... -- There's more... -- Chapter 3: Handling Events, Binding and Useful React Packages -- Introduction -- Binding methods using the constructor versus using arrow functions -- How to do it... -- How it works... -- Creating form elements with events…”
    Libro electrónico
  7. 11027
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Software Architecture Today -- Defining software architecture -- I know my land -- I want to stay ahead -- Predicting the future -- Architecture and architects -- Software architecture principles -- Components -- Low coupling -- High cohesion -- SOLID principles -- The single responsibility principle (SRP) -- The Open-Closed Principle (OCP) -- The Liskov substitution principle -- The interface segregation principle (ISP) -- The dependency inversion (DI) principle -- Conway's law -- Choosing the right technology for you -- New trends -- Summary -- Chapter 2: Software Architecture Dimensions -- Dimensions -- The business dimension -- Managing user requirements -- Identifying and tracking business metrics -- The data dimension -- The technical dimension -- The operations dimension -- How to deploy an application -- How interaction occurs among your components -- Dealing with infrastructure -- Understanding the infrastructure -- Versioning -- Testing -- Cloud versus on-premise -- Deploying your application -- The C4 model -- Context diagram -- Container diagram -- Components diagram -- Class diagram -- Summary -- Chapter 3: Spring Projects -- Why Spring appeared -- Spring projects -- Spring Initializr -- Spring Boot in a Nutshell -- Servlet container integration -- Autoconfiguration -- Dependency management -- mvnw and mvnw.cmd -- pom.xml -- DemoApplication.java -- The application.properties file -- DemoApplicationTests.java -- Avoiding redeployment with developer tools -- Spring Data -- Supporting EIPs with Spring Integration -- Spring Batch -- The read step -- The process step -- The write step -- Securing applications with Spring Security -- Embracing (Spring) HATEOAS -- Spring Cloud and the microservices world…”
    Libro electrónico
  8. 11028
    Publicado 2017
    Tabla de Contenidos: “…Front Cover -- PEERING CARRIER ETHERNET NETWORKS -- PEERING CARRIER ETHERNET NETWORKS -- Copyright -- Dedications -- CONTENTS -- LIST OF FIGURES -- LIST OF TABLES -- ABOUT THE AUTHOR -- PREFACE -- About this Book -- Organization of the Book -- Miscellaneous Items -- Audience of the Book -- ACKNOWLEDGMENTS -- GLOSSARY -- 1 - INTRODUCTION -- 1.1 Telephone Networks -- 1.2 Data Networks -- 1.3 Hybrid Fiber-Coaxial Networks -- 1.4 Wireless Networks -- 1.5 Chapter Summary -- 2 - SHAPING OF DATA NETWORKS -- 2.1 Protocols, Models, and Architecture of Data Networks -- 2.2 Convergence in Backhaul -- 2.3 Diversity in Access -- 2.4 Voice as Another Data Application -- 2.5 Chapter Summary -- 3 - THE ETHERNET LANDSCAPE -- 3.1 Ethernet Protocol for Data Link Layer -- 3.2 Evolution of Ethernet -- 3.3 Components of an Ethernet Switch -- 3.4 Emergence of Carrier Ethernet Networks -- 3.5 Chapter Summary -- 4 - CARRIER ETHERNET NETWORKS -- 4.1 Carrier Ethernet-Related Terminology and Architecture -- 4.2 Ethernet Services Framework -- 4.2.1 Ethernet Physical Interface Attribute (Scalability-Related Attributes) -- 4.2.2 Bandwidth Profile Attribute (Traffic Policing-Related Attribute) -- 4.2.3 Performance Attribute (Frame Delay, Frame Delay Variation, and Frame Loss-Related QoS Attributes) -- 4.2.4 Class of Service-Related Attributes (Queuing and Scheduling Related to QoS) -- 4.2.5 Service Frame Delivery Attribute (Unicast, Multicast, Broadcast, and L2CP Related) -- 4.2.6 VLAN Tag Support Attribute (Service Delivery Related) -- 4.2.7 Service Multiplexing Attribute (Service Delivery Related) -- 4.2.8 Bundling Attribute (Service Delivery Related) -- 4.2.9 Security Filters Attribute (Security Related) -- 4.3 Services Defined by Carrier Ethernet -- 4.3.1 EP-Line Service -- 4.3.2 EVP-Line (EVPL) Service -- 4.3.3 EP-LAN -- 4.3.4 EVP-LAN -- 4.3.5 EP-Tree -- 4.3.6 EVP-Tree…”
    Libro electrónico
  9. 11029
    Publicado 2017
    Tabla de Contenidos: “…-- Building Random Forest and Extremely Random Forest classifiers -- Estimating the confidence measure of the predictions -- Dealing with class imbalance -- Finding optimal training parameters using grid search -- Computing relative feature importance -- Predicting traffic using Extremely Random Forest regressor -- Summary…”
    Libro electrónico
  10. 11030
    Publicado 2007
    Tabla de Contenidos: “…11.3 Types of State -- 11.4 Measuring Service Statelessness -- 11.5 Statelessness and Service Design -- 11.6 Risks Associated with Service Statelessness -- 11.7 Case Study Example -- Chapter 12: Service Discoverability (Interpretability and Communication) -- 12.1 Discoverability Explained -- 12.2 Profiling this Principle -- 12.3 Types of Discovery and Discoverability Meta Information -- 12.4 Measuring Service Discoverability -- 12.5 Discoverability and Service Design -- 12.6 Risks Associated with Service Discoverability -- 12.7 Case Study Example -- Chapter 13: Service Composability (Composition Member Design and Complex Compositions) -- 13.1 Composition Explained -- 13.2 Profiling this Principle -- 13.3 Composition Concepts and Terminology -- 13.4 The Complex Service Composition -- 13.5 Measuring Service Composability and Composition Effectiveness Potential -- 13.6 Composition and Service Design -- 13.7 Risks Associated with Service Composition -- 13.8 Case Study Example -- PART III: SUPPLEMENTAL -- Chapter 14: Service-Orientation and Object-Orientation: A Comparison of Principles and Concepts -- 14.1 A Tale of Two Design Paradigms -- 14.2 A Comparison of Goals -- 14.3 A Comparison of Fundamental Concepts -- 14.4 A Comparison of Design Principles -- 14.5 Guidelines for Designing Service-Oriented Classes -- Chapter 15: Supporting Practices -- 15.1 Service Profiles -- 15.2 Vocabularies -- 15.3 Organizational Roles -- Chapter 16: Mapping Service-Orientation Principles to Strategic Goals -- 16.1 Principles that Increase Intrinsic Interoperability -- 16.2 Principles that Increase Federation -- 16.3 Principles that Increase Vendor Diversification Options -- 16.4 Principles that Increase Business and Technology Domain Alignment -- 16.5 Principles that Increase ROI -- 16.6 Principles that Increase Organizational Agility…”
    Libro electrónico
  11. 11031
    Publicado 2008
    Tabla de Contenidos: “…Analyzing and Choosing Subnet Masks -- Analyzing Existing Subnets -- Design: Choosing the Subnets of a Classful Network -- Exam Preparation Tasks -- Review All the Key Topics -- Complete the Tables and Lists from Memory -- Definitions of Key Terms -- Read Appendix F Scenario 1, Part A -- Subnetting Questions and Processes -- Chapter 13 Operating Cisco Routers -- Do I Know This Already?" …”
    Libro electrónico
  12. 11032
    por Jacob, Bart
    Publicado 2004
    Tabla de Contenidos: “…Creating an installation program -- 6.1 Basic flow -- 6.1.1 Common terms -- 6.1.2 Installation process -- 6.2 Writing a custom installer -- 6.2.1 Checking the environment as defined by the software package -- 6.2.2 Obtaining user input and overriding default values -- 6.2.3 Obtaining and validating the dependencies of the package -- 6.2.4 Installing the package -- 6.2.5 Registering the installable units -- 6.3 Interfacing with ChangeManager and other classes -- 6.3.1 com.ibm.ac.si.mr.MediaInfo -- 6.3.2 com.ibm.ac.si.checker.DependencyChecker -- 6.3.3 com.ibm.ac.si.checker.CheckerUtil -- 6.3.4 com.ibm.ac.si.checker.PropertySelection -- 6.3.5 com.ibm.ac.si.checker.SoftwareSelection -- 6.3.6 com.ibm.ac.si.instances.ParameterOverrides -- 6.3.7 com.ibm.ac.si.selections.FeatureSelectionInput -- 6.3.8 com.ibm.ac.si.instances.SoftwareInstance -- 6.3.9 com.ibm.ac.si.cm.CreateOperation -- 6.3.10 com.ibm.ac.si.cm.DeleteOperation -- 6.3.11 com.ibm.ac.si.cm.ChangeRequest -- 6.3.12 com.ibm.ac.si.cm.IChangeManager -- 6.4 Sample installation program -- 6.4.1 Manifest files -- 6.4.2 Installation program -- 6.4.3 Setup of installation program -- 6.5 Feature selection example -- 6.5.1 Manifest files -- 6.5.2 Installation program -- 6.5.3 Payload -- 6.5.4 Response file -- 6.5.5 Execution -- 6.5.6 Output -- 6.6 Summary -- Chapter 7. …”
    Libro electrónico
  13. 11033
    Publicado 2017
    Tabla de Contenidos: “…-- Controversies and Separation of Concerns -- Class components versus functional components -- Our second component -- State in React -- Reusing components -- Summary -- Chapter 4: Easy Backend Setup With Firebase -- What is Firebase? …”
    Libro electrónico
  14. 11034
    Publicado 2010
    Tabla de Contenidos: “…-- Installing the .NET Framework, Visual Web Developer, and SQL Server 2008 -- A Brief Tour of Visual Web Developer -- Q&A -- Workshop -- HOUR 2: Understanding the ASP.NET Programming Model -- Examining the HTML Portion of an ASP.NET Page -- Examining the Source Code Portion of an ASP.NET Page -- Q&A -- Workshop -- HOUR 3: Using Visual Web Developer -- Creating a New Website -- Opening Existing Websites -- Working with Web Pages and Other Content -- Customizing the Visual Web Developer Experience -- Viewing, Moving, and Resizing Windows -- A World of Help at Your Fingertips -- Q&A -- Workshop -- HOUR 4: Designing, Creating, and Testing ASP.NET Pages -- Specifying the Design Requirements -- Creating the User Interface -- Writing the Source Code for the ASP.NET Page -- Testing the Financial Calculator -- Examining the Source Code -- Using the Debugger -- Q&A -- Workshop -- HOUR 5: Understanding Visual Basic's Variables and Operators -- The Purpose of Programming Languages -- Declaring and Using Variables -- Examining Visual Basic's Operators -- Learning Visual Basic's Type Rules -- Q&A -- Workshop -- HOUR 6: Managing Program Flow with Visual Basic's Control Structures -- Understanding Control Structures -- Exploring the Conditional Control Structure -- Working with Visual Basic's Looping Control Structures -- Exploring the Modularizing Control Structures: Subroutines and Functions -- Q&A -- Workshop -- HOUR 7: Working with Objects in Visual Basic -- Reexamining the Role of Classes and Objects -- Creating an Object -- Setting an Object's Properties -- Calling an Object's Methods -- Creating Event Handlers for an Object's Events -- Q&A -- Workshop -- HOUR 8: ASP.NET Web Controls for Displaying Text…”
    Libro electrónico
  15. 11035
    Publicado 2024
    Tabla de Contenidos: “…. -- Chapter 6: Transitioning from Qt 5 to Qt 6 -- Technical requirements -- Changes in C++ classes -- How to do it... -- How it works... -- There's more... -- Using Clazy checks for Clang and C++ -- How to do it... -- How it works... -- Changes in QML types -- How to do it... -- How it works... -- Chapter 7: Using Network and Managing Large Documents -- Technical requirements -- Creating a TCP server -- How to do it... -- How it works... -- Creating a TCP client -- How to do it... -- How it works... -- Uploading and downloading files using FTP -- How to do it... -- How it works... -- Chapter 8: Threading Basics -Asynchronous Programming -- Technical requirements -- Using threads -- How to do it...…”
    Libro electrónico
  16. 11036
    por OECD
    Publicado 2024
    Tabla de Contenidos: “…Tackling parent attitudes, bullying and discipline is key to increasing attendance rates -- Ability grouping within classes at schools is extensive and may run counter to equity objectives -- Assisting children with disabilities and extra learning needs -- The objectives and regulation of partnership schools need to be carefully designed -- Findings and recommendations -- References -- 5 A fight on two fronts: Adapting to climate change and reducing GHG emissions -- 5.1. …”
    Libro electrónico
  17. 11037
    Publicado 2022
    “…Classes with a special emphasis (so-called profile classes) represent a central element of current school development processes and are considered as one of the most prominent ways of practical implementation of school autonomy. …”
    Libro electrónico
  18. 11038
    Publicado 2022
    Tabla de Contenidos: “…6.7.3 Attention Mechanism Network -- 6.7.4 Graph Convolutional Neural Network -- 6.8 Hands-On of Automobile Fuel Consumption Prediction -- 6.8.1 Dataset -- 6.8.2 Create a Network -- 6.8.3 Training and Testing -- 6.9 References -- Chapter 7: Backward Propagation Algorithm -- 7.1 Derivatives and Gradients -- 7.2 Common Properties of Derivatives -- 7.2.1 Common Derivatives -- 7.2.2 Common Property of Derivatives -- 7.2.3 Hands-On Derivative Finding -- 7.3 Derivative of Activation Function -- 7.3.1 Derivative of Sigmoid Function -- 7.3.2 Derivative of ReLU Function -- 7.3.3 Derivative of LeakyReLU Function -- 7.3.4 Derivative of Tanh Function -- 7.4 Gradient of Loss Function -- 7.4.1 Gradient of Mean Square Error Function -- 7.4.2 Gradient of Cross-Entropy Function -- 7.5 Gradient of Fully Connected Layer -- 7.5.1 Gradient of a Single Neuron -- 7.5.2 Gradient of Fully Connected Layer -- 7.6 Chain Rule -- 7.7 Back Propagation Algorithm -- 7.8 Hands-On Optimization of Himmelblau -- 7.9 Hands-On Back Propagation Algorithm -- 7.9.1 Dataset -- 7.9.2 Network Layer -- 7.9.3 Network model -- 7.9.4 Network Training -- 7.9.5 Network Performance -- 7.10 References -- Chapter 8: Keras Advanced API -- 8.1 Common Functional Modules -- 8.1.1 Common Network Layer Classes -- 8.1.2 Network Container -- 8.2 Model Configuration, Training, and Testing -- 8.2.1 Model Configuration -- 8.2.2 Model Training -- 8.2.3 Model Testing -- 8.3 Model Saving and Loading -- 8.3.1 Tensor Method -- 8.3.2 Network Method -- 8.3.3 SavedModel method -- 8.4 Custom Network -- 8.4.1 Custom Network Layer -- 8.4.2 Customized Network -- 8.5 Model Zoo -- 8.5.1 Load Model -- 8.6 Metrics -- 8.6.1 Create a Metrics Container -- 8.6.2 Write Data -- 8.6.3 Read Statistical Data -- 8.6.4 Clear the Container -- 8.6.5 Hands-On Accuracy Metric -- 8.7 Visualization -- 8.7.1 Model Side -- 8.7.2 Browser Side…”
    Libro electrónico
  19. 11039
    Publicado 2004
    Tabla de Contenidos: “…3.10 Cross-system Coupling Facility (XCF) -- 3.10.1 XCF systems, groups, and members -- 3.10.2 XCF signaling paths -- 3.10.3 XCF Transport Classes -- 3.10.4 XCF signal path performance problems -- 3.10.5 XCF message buffer length performance problems -- 3.10.6 XCF message buffer space performance problems -- 3.10.7 XCF Coupling Facility performance problems -- 3.10.8 XCF recommendations -- 3.11 GRS -- 3.11.1 GRS start options -- 3.11.2 Dynamic RNLs -- 3.11.3 GRS Ring Availability considerations - Fully connected complex -- 3.11.4 GRS Ring Availability considerations - Mixed complex -- 3.11.5 GRS Star Availability considerations -- 3.11.6 SYNCHRES option -- 3.11.7 Resource Name Lists (RNLs) -- 3.11.8 RNL design -- 3.11.9 GRS monitor (ISGRUNAU) -- 3.11.10 RNL syntax checking -- 3.11.11 GRS recommendations -- 3.12 Tape sharing -- 3.12.1 IEFAUTOS -- 3.12.2 ATS Star -- 3.12.3 Coexistence between Dedicated, IEFAUTOS, and ATS Star -- 3.12.4 Tape-sharing recommendations -- 3.13 JES2 -- 3.13.1 JES2 SPOOL considerations -- 3.13.2 JES2 Checkpoint considerations -- 3.13.3 JES2 Checkpoint access -- 3.13.4 JES2 Checkpoint performance -- 3.13.5 JES2 Checkpoint management -- 3.13.6 JES2 Health Monitor -- 3.13.7 Scheduling environment -- 3.13.8 WLM-managed initiators -- 3.13.9 JESLOG SPIN data sets -- 3.13.10 JES2 recommendations -- 3.14 WLM -- 3.14.1 Service classes -- 3.14.2 WLM recommendations -- 3.15 UNIX System Services -- 3.15.1 Shared HFS -- 3.15.2 Automove -- 3.15.3 zFS -- 3.15.4 BRLM issues -- 3.15.5 UNIX System Services recommendations -- 3.16 RACF -- 3.16.1 RACF sysplex communication -- 3.16.2 RACF non-data sharing mode -- 3.16.3 RACF data sharing mode -- 3.16.4 RACF read-only mode -- 3.16.5 RACF recovery procedures -- 3.16.6 PKI Services -- 3.16.7 RACF recommendations -- 3.17 DFSMShsm -- 3.17.1 Common Recall Queue…”
    Libro electrónico
  20. 11040
    por Rodriguez, Juan R.
    Publicado 2005
    Tabla de Contenidos: “…JSR 168 portlet development -- 9.1 Overview -- 9.2 Creating a JSR 168 portlet project -- 9.2.1 Creating a basic JSR 168 portlet -- 9.2.2 Examining the generated portlet -- 9.3 Updating the generated portlet -- 9.3.1 Modifying the session bean -- 9.3.2 View mode -- 9.3.3 Edit mode -- 9.3.4 Configure mode -- 9.3.5 Updating the portlet descriptor (portlet.xml) -- 9.3.6 Modifying the MySimplePortletPortletPreferenceValidator class -- 9.4 Running the portlet -- 9.4.1 Executing the portlet -- Chapter 10. …”
    Libro electrónico