Mostrando 4,581 - 4,600 Resultados de 6,504 Para Buscar '"The Set Up"', tiempo de consulta: 0.17s Limitar resultados
  1. 4581
    Publicado 2018
    Tabla de Contenidos: “…. -- How it works... -- Setting up Docker Registry -- How to do it... -- How it works... -- Logging into Docker Registry -- How to do it... -- How it works... -- Using Docker Compose to manage services -- How to do it... -- How it works... -- Scaling up Compose-based service -- How to do it... -- How it works... -- Deploying a sample application -- How to do it... -- How it works... -- Diving into OpenStack with Ansible -- Introduction -- Preparing Ansible to work with OpenStack -- How to do it... -- Adding a keypair -- How to do it... -- Managing security groups -- How to do it... -- How it works... -- Managing network resources -- How to do it... -- How it works... -- Managing a Nova compute instance -- How to do it... -- How it works... -- Creating a Cinder volume and attaching it to a Nova compute instance -- How to do it... -- Managing objects in Swift -- How to do it... -- How it works... -- User management -- How to do it... -- How it works... -- Creating a flavor -- How to do it... -- Adding an image -- How to do it... -- How it works... -- Dynamic inventory -- How to do it... -- Deploying the phonebook application -- How to do it... -- Ansible Tower -- Introduction -- Installing Ansible Tower -- How to do it... -- Getting started with Tower -- How to do it... -- Adding a machine credential -- How to do it... -- Building a simple inventory -- How to do it…”
    Libro electrónico
  2. 4582
    Publicado 2018
    Tabla de Contenidos: “…Working with SQL injection and cross-site scripting conditions -- Automating WAF Web ACL deployments using CloudFormation -- Monitoring WAF using CloudWatch -- Planning your next steps -- Introduction to AWS Shield -- Summary -- Chapter 5: Governing Your Environments Using AWS CloudTrail and AWS Config -- Introducing AWS CloudTrail -- Working with AWS CloudTrail -- Creating your first CloudTrail Trail -- Viewing and filtering captured CloudTrail Logs and Events -- Modifying a CloudTrail Trail using the AWS CLI -- Monitoring CloudTrail Logs using CloudWatch -- Creating custom metric filters and alarms for monitoring CloudTrail Logs -- Automating deployment of CloudWatch alarms for AWS CloudTrail -- Analyzing CloudTrail Logs using Amazon Elasticsearch -- Introducing AWS Config -- Concepts and terminologies -- Getting started with AWS Config -- Creating custom config rules -- Tips and best practices -- Summary -- Chapter 6: Access Control Using AWS IAM and AWS Organizations -- What's new with AWS IAM -- Using the visual editor to create IAM policies -- Testing IAM policies using the IAM Policy Simulator -- Introducing AWS Organizations -- Getting started with AWS Organizations -- Planning your next steps -- Summary -- Chapter 7: Transforming Application Development Using the AWS Code Suite -- Understanding the AWS Code Suite -- Getting Started with AWS CodeCommit -- Working with branches, commits, and triggers -- Introducing AWS CodeDeploy -- Concepts and terminologies -- Installing and configuring the CodeDeploy agent -- Setting up the AppSpec file -- Creating a CodeDeploy application and deployment group -- Introducing AWS CodePipeline -- Creating your own continuous delivery pipeline -- Putting it all together -- Planning your next steps -- Summary -- Chapter 8: Messaging in the Cloud Using Amazon SNS and Amazon SQS…”
    Libro electrónico
  3. 4583
    Publicado 2018
    Tabla de Contenidos: “…Chapter 9: Functional Programming and Reactive Programming -- Combining FP with OOP -- Functional reactive programming -- The Reactive Manifesto -- Functional reactive frameworks for Kotlin -- Getting started with RxKotlin -- Downloading and setting up RxKotlin -- Comparing the Pull mechanism with the RxJava Push mechanism -- Observables -- How Observable works -- The Observable.create method -- The Observable.from methods -- Iterator&lt -- T&gt -- .toObservable -- Subscriber - the Observer interface -- Subscribing and disposing -- Summary -- Chapter 10: Functors, Applicatives, and Monads -- Functors -- Monads -- Applicatives -- Summary -- Chapter 11: Working with Streams in Kotlin -- Introduction to Streams -- Collections versus Streams -- Working with Streams -- Primitive streams -- Stream factory methods -- Stream Builder -- Creating empty Streams - Stream.empty() -- Creating a Stream by passing elements - Stream.of() -- Generating Streams - Stream.generate() -- Collector and Stream.collect - collecting Streams -- The Collectors.toList(), Collectors.toSet(), and Collectors.toCollection() methods -- Collecting into Map - Collectors.toMap() -- Joining Stream of strings - Collectors.joining() -- Grouping elements of Stream - Collectors.groupingBy() -- Summary -- Chapter 12: Getting Started with Arrow -- Function composition -- Partial application -- Binding -- Reverse -- Pipes -- Currying -- Differences between the currying and partial application -- Logical complement -- Memoization -- Partial functions -- Identity and constant -- Optics -- Configuring Arrows code generation -- Generating lenses -- Summary -- Chapter 13: Arrow Types -- Option -- Arrow's type hierarchy -- Either -- Monad transformers -- Try -- State -- Corecursion with State -- Summary -- Appendix: Kotlin's Quick Start -- Writing and running Kotlin -- Kotlin online -- On your console…”
    Libro electrónico
  4. 4584
    por Munagavalasa, Srini
    Publicado 2022
    Tabla de Contenidos: “…Reviewing the benefits of CRPs -- Practical tips for success -- Summary -- Questions -- Further reading -- Chapter 9: Technical and Quality Testing -- Planning testing activities -- Testing strategy -- Testing levels -- Testing methods -- Testing schedule -- Testing approach -- Testing phases -- Types of testing -- Sample test script/case fields -- Benefits of testing -- Practical tips for success -- Summary -- Questions -- Further reading -- Chapter 10: Requirements Traceability Matrix -- Understanding the importance of an RTM -- Learning what to capture in an RTM -- Exploring types of traceability -- Reviewing an RTM template sample -- Benefits of an RTM -- Practical tips for success -- Summary -- Questions -- Further reading -- Part 3: End User Testing, Communication, Training, and Support -- Chapter 11: User Acceptance Testing -- Identifying the right set of UAT users -- Learning how to help UAT users test effectively -- Getting feedback on usability -- Exploring the need for UAT -- Reviewing the benefits of UAT -- Practical tips for success -- Summary -- Questions -- Further reading -- Chapter 12: Communication and Knowledge Management -- End user communication -- Different knowledge management types -- Explicit knowledge -- Tacit knowledge -- Knowledge artifacts accessibility -- Benefits of communication and knowledge management -- Practical tips for success -- Summary -- Questions -- Chapter 13: End User Training -- Planning for training -- Preparing for training -- Setting up the training environment -- Reviewing types of training materials -- Understanding the importance of in-person or live training -- Facilitating a training session -- Benefits of end user training -- Practical tips for success -- Summary -- Questions -- Chapter 14: Post Go-Live Support / User Forums -- Super care -- Production support -- User forums…”
    Libro electrónico
  5. 4585
    Publicado 2015
    Tabla de Contenidos: “…-- Network programming with Python -- Breaking a few eggs -- Taking it from the top -- Downloading an RFC -- Looking deeper -- Programming for TCP/IP networks -- Firewalls -- Network Address Translation -- IPv6 -- Summary -- Chapter 2 : HTTP and Working with the Web -- Request and response -- Requests with urllib -- Response objects -- Status codes -- Handling problems -- HTTP headers -- Customizing requests -- Content compression -- Multiple values -- Content negotiation -- Content types -- User agents -- Cookies -- Cookie handling -- Know your cookies -- Redirects -- URLs -- Paths and relative URLs -- Query strings -- URL encoding -- URLs in summary -- HTTP methods -- The HEAD method -- The POST method -- Formal inspection -- HTTPS -- The Requests library -- Handling errors with Requests -- Summary -- Chapter 3 : APIs in Action -- Getting started with XML -- The XML APIs -- The basics of ElementTree -- Pretty printing -- Element attributes -- Converting to text -- The Amazon S3 API -- Registering with AWS -- Authentication -- Setting up an AWS user -- Regions -- S3 buckets and objects -- An S3 command-line client -- Creating a bucket with the API -- Uploading a file -- Retrieving an uploaded file through a web browser -- Displaying an uploaded file in a web browser -- Downloading a file with the API…”
    Libro electrónico
  6. 4586
    por Tome, Eric
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1 - Introduction to Data Engineering, Scala, and an Environment Setup -- Chapter 1: Scala Essentials for Data Engineers -- Technical requirements -- Understanding functional programming -- Understanding objects, classes, and traits -- Classes -- Object -- Trait -- Working with higher-order functions (HOFs) -- Examples of HOFs from the Scala collection library -- Understanding polymorphic functions -- Variance -- Option type -- Collections -- Understanding pattern matching -- Wildcard patterns -- Constant patterns -- Variable patterns -- Constructor patterns -- Sequence patterns -- Tuple patterns -- Typed patterns -- Implicits in Scala -- Summary -- Further reading -- Chapter 2: Environment Setup -- Technical requirements -- Setting up a cloud environment -- Leveraging cloud object storage -- Using Databricks -- Local environment setup -- The build tool -- Summary -- Further reading -- Part 2 - Data Ingestion, Transformation, Cleansing, and Profiling Using Scala and Spark -- Chapter 3: An Introduction to Apache Spark and Its APIs - DataFrame, Dataset, and Spark SQL -- Technical requirements -- Working with Apache Spark -- How do Spark applications work? …”
    Libro electrónico
  7. 4587
    por Kondameda, Gopi
    Publicado 2023
    Tabla de Contenidos: “…Best practices with the Graph API -- Pagination -- Batching -- Throttling -- Summary -- Chapter 4: Microsoft Teams PowerShell -- Microsoft Teams PowerShell Module -- Installing Microsoft TPM -- Updating Microsoft TPM -- Connecting to Microsoft TPM -- CLI for Microsoft 365 -- Installing CLI for Microsoft 365 -- Connecting to CLI for Microsoft 365 -- Adding a new Microsoft team with CLI for Microsoft 365 -- Summary -- Chapter 5: Microsoft Teams Customization Using the SharePoint Framework (SPFx) -- SharePoint development history -- Setting up an SPFx development environment -- Developing your first Teams tab or app using the SPFx -- What is the difference between a Teams app and a Teams tab? …”
    Libro electrónico
  8. 4588
    Publicado 2023
    Tabla de Contenidos: “…-- Redis Stack deployment types -- Summary -- Chapter 2: Developing Modern Use Cases with Redis Stack -- Technical requirements -- Caching, rate-limiting, geo-positioning, and other Redis traditional use cases -- Caching -- Session store -- Rate limiter -- Leaderboards -- Data deduplication -- Geo-positioning -- Message processing and delivery -- Going beyond the real-time cache with Redis Stack -- Querying, indexing, and search -- Monitoring and analysis -- Fraud detection -- Feature store for machine learning -- Designing microservice architectures with Redis Stack -- API gateway -- Summary -- Chapter 3: Getting Started with Redis Stack -- Installing Redis Stack using binary packages -- Installing Redis Stack using native packages -- macOS-native package -- Linux-native package -- Running Redis Stack using Docker -- Using Redis Cloud -- Installing RedisInsight -- Installing the Redis Stack client libraries -- Java client library -- JavaScript client library -- Python client library -- Golang client library -- C#/.NET client library -- Running health checks -- Summary -- Chapter 4: Setting Up Client Libraries -- Technical requirements -- Redis Stack client libraries -- Programming in Python using redis-py -- Storing information in Redis Stack using Python -- Redis OM for Python -- Programming in Java using Jedis -- Storing information in Redis Stack using Java -- Redis OM for Java…”
    Libro electrónico
  9. 4589
    Publicado 2021
    Tabla de Contenidos: “…Horizontal- versus vertical-composed micro frontends -- Backend- versus frontend-driven micro frontends -- Summary -- Chapter 6: The Web Approach -- Technical requirements -- Basics of the web approach -- The architecture -- Sample implementation -- Potential enhancements -- Advantages and disadvantages -- Links -- Central linking directory -- Local linking directory -- Iframes -- Security -- Accessibility -- Layout -- Summary -- Chapter 7: Server-Side Composition -- Technical requirements -- Basics of server-side composition -- The architecture -- Sample implementation -- Potential enhancements -- Advantages and disadvantages -- Introducing Mosaic 9 -- Introducing Podium -- Known users -- Creating a composition layout -- Understanding layout responsibilities -- Using SSI -- Using ESI -- Using JS template strings -- Setting up micro frontend projects -- Podlets -- Examining the life cycle -- Summary -- Chapter 8: Edge-Side Composition -- Technical requirements -- Basics of edge-side composition -- The architecture -- Sample implementation -- Potential enhancements -- Advantages and disadvantages -- SSI and ESI -- SSI -- ESI -- Stitching in BFFs -- Summary -- Chapter 9: Client-Side Composition -- Technical requirements -- Basics of client-side composition -- The architecture -- Sample implementation -- Potential enhancements -- Advantages and disadvantages -- Diving into Web components -- Understanding Web components -- Isolating styles with shadow DOM -- Composing micro frontends dynamically -- Using a micro frontend registry -- Updating micro frontends at runtime -- Summary -- Chapter 10: SPA Composition -- Technical requirements -- Basics of SPA composition -- The architecture -- Sample implementation -- Potential enhancements -- Advantages and disadvantages -- Building a core SPA shell -- Activating pages -- Sharing dependencies…”
    Libro electrónico
  10. 4590
    Publicado 2017
    Tabla de Contenidos: “…-- Chapter 3: The Implications are not Fully Understood -- Chapter 4: An Obsession with Process over Outcomes -- Chapter 5: Inertia -- Chapter 6: The Project is Set Up to Fail -- Chapter 7: Poor Communications and Disingenuous Stakeholder Engagement -- Change Projects that Fail, Fail to Communicate Effectively -- Change Projects that Fail, Also Fail to Engage Genuinely with Their Stakeholders -- Chapter 8: We Forget that Emotions Trump Logic Every Time -- One Industry that Has Been Built Around the Fact that Our Emotions Rule Our Decisions is the World of Advertising -- The Economist Plays with Our Emotions! …”
    Libro electrónico
  11. 4591
    Publicado 2017
    Tabla de Contenidos: “…-- What we will learn in this book? -- Setting up -- Navigating the Central Repository -- Using Gradle -- Using Maven -- A quick exposure to RxJava -- RxJava 1.0 versus RxJava 2.0 - which one do I use? …”
    Libro electrónico
  12. 4592
    por Harder, Jennifer
    Publicado 2024
    Tabla de Contenidos: “…Your Smartphone Camera, an Additional Adobe App, and a Scanner Bin -- Summary -- Chapter 4: Setting Up Your Workspace -- Creating a New Document in Illustrator -- Workspace Options -- Panels and Tools Overview -- Illustrator Panels -- Toolbars -- Control -- Color -- Color Guide -- Swatches -- Brushes -- Symbols -- Stroke -- Gradient -- Transparency -- Appearance -- Graphic Styles -- Layers -- Asset Export -- Artboards -- Comments -- Properties -- Libraries -- Using Your History Panel -- New Contextual Task Bar -- Menus -- Summary -- Chapter 5: Working with Artboards and Saving Files -- Working with Artboards -- Adding Rulers -- Editing the Artboard -- Linking Your Digital Mock-Up Image to the Illustrator File -- Project: Saving Your Illustrator File -- Saving Duplicates of Your File -- Working with Your Infographics Between Photoshop and Illustrator -- Summary -- Chapter 6: A Basic Review of Illustrator's Shape Tools -- Drawing Tools Overview -- Rectangle Tool (M) -- Rounded Rectangle Tool -- Ellipse Tool (L) -- Polygon Tool -- Star Tool -- Line Segment, Arc, and Spiral Tools -- Drawing Tools That Can Be Used to Create Basic Graphs -- Moving and Selecting Your Shapes on the Artboard -- Selection Tool (V) -- Direct Selection Tool (A) -- Group Selection Tool -- Basic Modification to Shapes -- Arranging Shape and Path Order -- Working with the Control, Transform, and Properties Panel -- Summary -- Chapter 7: A Basic Review of Illustrator's Pen Tools -- Drawing Custom Shapes with the Pen Tool -- Pen Tool (P) and Curvature Tool (Shift+~) Basics -- Join Points on an Open Path -- Add Anchor Point Tool (+) Review -- Delete Anchor Point Tool (-) Review -- Anchor Point Tool (Shift +C) Review -- Curvature Tool (Shift +~) Review -- Swapping Fill and Stroke Colors with the Pen Tool -- Control Panel Anchor Point Options and How They Relate to Related Tools…”
    Libro electrónico
  13. 4593
    por Le Coze, Jean-Christophe
    Publicado 2023
    Tabla de Contenidos: “…Obsolescence as a Long-Term Sociotechnical Concern -- 3.5 A Concluding Speculation on When System Safety is Breached -- References -- 4 Digitalisation, Safety and Privacy -- 4.1 Introduction -- 4.2 Individualised Digital Tools and Privacy at Work -- 4.2.1 An Empirical Analysis -- 4.3 Conclusion -- Bibliography -- 5 Design and Dissemination of Blockchain Technologies: The Challenge of Privacy -- 5.1 A First Privacy Test: Defining Governance -- 5.1.1 The Appointment of a Controller, a "Test" for the Consortium -- 5.1.2 A Form of Recentralisation Contrary to the Imagination of Blockchain Designers -- 5.1.3 The Compromise of Choosing the Consortium Blockchain -- 5.2 Second Privacy Test: Management of Personal Data -- 5.2.1 Setting up an Off-Chain System to Store the Data -- 5.2.2 Data Minimisation -- 5.3 Third Privacy Test: A User Pathway Tested for Explicability and Security -- 5.3.1 Three Requests for Consent -- 5.3.2 An Opaque Security Key System…”
    Libro electrónico
  14. 4594
    por Kalman, Balazs
    Publicado 2004
    Tabla de Contenidos: “…WebSphere Studio Workload Simulator installation, configuration, and administration -- 3.1 Workload Simulator simulation Engine and monitoring agent -- 3.1.1 Installing the engine -- 3.1.2 Downloading controller code -- 3.1.3 Installing the controller -- 3.1.4 Setting up and starting the Monitor Agent -- 3.1.5 Identifying an Engine for users -- 3.2 Overview of capturing, playing back, and analyzing tasks -- 3.3 Starting and configuring the controller -- 3.3.1 Starting the controller -- 3.3.2 Setting controller options -- 3.4 Capturing a Web session -- 3.4.1 Capturing a script -- 3.4.2 Setting run options for graphing -- 3.5 Playing back a script -- 3.5.1 Defining an Engine -- 3.5.2 Sending a script to the engine -- 3.5.3 Starting and monitoring a simulation -- 3.6 Analyzing test results -- 3.6.1 Downloading data files -- 3.6.2 Graphing test data…”
    Libro electrónico
  15. 4595
    Publicado 2002
    Tabla de Contenidos: “…Securing remote command execution -- 5.1 Remote command execution software -- 5.2 OpenSSH installation on AIX -- 5.2.1 Downloading OpenSSH and prerequisite OpenSSL software -- 5.2.2 Preinstallation tasks -- 5.2.3 Installing SSH on AIX manually -- 5.2.4 Post-installation tasks -- 5.2.5 Installing OpenSSH 3.4 for AIX 5L on AIX servers using NIM -- 5.2.6 Verifying the SSH installation on the AIX nodes -- 5.3 Installing SSH on Linux nodes -- 5.4 OpenSSH configuration inside the CSM cluster -- 5.4.1 Preliminary actions -- 5.4.2 Update the Cluster Systems Management database -- 5.4.3 Checking the dsh settings -- 5.4.4 Set up OpenSSH -- 5.4.5 How the automated configuration works -- 5.4.6 Verifying the SSH configuration -- 5.5 Other remote command execution programs -- Chapter 6. …”
    Libro electrónico
  16. 4596
    Publicado 2013
    Tabla de Contenidos: “…Integration Using Framework Elements -- DataSource -- Local data source -- Remote data source -- Templates -- Rendering templates -- Inline templates -- External templates -- MVVM -- MVVM design pattern -- Getting started with Kendo MVVM -- HTML -- JavaScript -- Bindings -- MVVM in mobile -- HTML -- JavaScript -- Integrating with the Movie Tickets app -- The User Account screen -- Backend - setting up a Web API service -- Frontend - architecture -- Revealing Module Pattern -- Advantages -- Namespacing -- Configuration -- Data access -- Initialization -- Common utility methods -- User Account ViewModel -- HTML UI -- Adding the User Account TabStrip button -- User Account view -- Login section -- User details section -- Fixing cross-domain access issues -- Summary -- 5. …”
    Libro electrónico
  17. 4597
    por Frahim, Jazib, Santos, Omar
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Contents -- Introduction -- Part I: Product Overview -- Chapter 1 Introduction to Security Technologies -- Firewalls -- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) -- Virtual Private Networks -- Summary -- Chapter 2 Cisco ASA Product and Solution Overview -- Cisco ASA 5505 Model -- Cisco ASA 5510 Model -- Cisco ASA 5520 Model -- Cisco ASA 5540 Model -- Cisco ASA 5550 Model -- Cisco ASA 5580-20 and 5580-40 Models -- Cisco ASA AIP-SSM Module -- Cisco ASA Gigabit Ethernet Modules -- Cisco ASA CSC-SSM Module -- Summary -- Chapter 3 Initial Setup and System Maintenance -- Accessing the Cisco ASA Appliances -- Managing Licenses -- Initial Setup -- Device Setup -- IP Version 6 -- Setting Up the System Clock -- Configuration Management -- Remote System Management -- System Maintenance -- System Monitoring -- Device Monitoring and Troubleshooting -- Summary -- Part II: Firewall Technology -- Chapter 4 Controlling Network Access -- Packet Filtering -- Configuring Traffic Filtering -- Advanced ACL Features -- Content and URL Filtering -- Deployment Scenarios for Traffic Filtering -- Monitoring Network Access Control -- Understanding Address Translation -- DNS Doctoring -- Monitoring Address Translations -- Summary -- Chapter 5 IP Routing -- Configuring Static Routes -- RIP -- OSPF -- EIGRP -- IP Multicast -- Summary -- Chapter 6 Authentication, Authorization, and Accounting (AAA) -- AAA Protocols and Services Supported by Cisco ASA -- Defining an Authentication Server -- Configuring Authentication of Administrative Sessions -- Authenticating Firewall Sessions (Cut-Through Proxy Feature) -- Configuring Authorization -- Configuring Accounting -- Summary -- Chapter 7 Application Inspection -- Enabling Application Inspection -- Selective Inspection -- Computer Telephony Interface Quick Buffer Encoding Inspection…”
    Libro electrónico
  18. 4598
    por Millas, Jose Luis Latorre
    Publicado 2013
    Tabla de Contenidos: “…. -- How it works... -- Setting up a self-hosted ASP.NET web API -- Getting ready -- How to do it... -- How it works... -- 9. …”
    Libro electrónico
  19. 4599
    Publicado 2017
    Tabla de Contenidos: “…. -- Chapter 5: Implementing Approval Processes -- Introduction -- Creating an email template for use with approval assignments -- How to do it... -- Setting up a user to be associated with an approval process -- How to do it... -- Building an opportunity approval process for deals greater than USD 100,000 -- How to do it... -- How it works... -- There's more…”
    Libro electrónico
  20. 4600
    Publicado 2018
    Tabla de Contenidos: “…-- A glimpse of hacking -- Browser exploitation framework -- Accessing the target computer's webcam -- Summary -- Chapter 2: Setting Up a Lab -- Lab overview -- VirtualBox -- Installation of VirtualBox -- Installing Kali Linux -- Installing Metasploitable -- Installing Windows -- Creating and using snapshots -- Summary -- Chapter 3: Linux Basics -- Overview of Kali Linux -- Status bar icons -- Connecting the wireless card -- Linux commands -- Commands -- The ls command -- The man command -- The help command -- The Tab button -- Updating resources -- Summary -- Chapter 4: Network Penetration Testing -- What is a network? …”
    Libro electrónico