Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- TFC 5,514
- PFC 2,817
- TFM 2,674
- Empreses 1,796
- TFG 1,791
- Direcció i administració 1,507
- Gestió de projectes 1,411
- Arquitectura 1,410
- Història 1,175
- Planificació estratègica 1,024
- Planificació 944
- Sistemes d'informació per a la gestió 831
- PFG 772
- TFMP 735
- Arquitectura domèstica 728
- Ensenyament 685
- Innovacions tecnològiques 659
- Llibres de text 593
- Habitatges 550
- Congressos 546
- Edificis 534
- Aspectes socials 490
- Política i govern 453
- Comerç electrònic 452
- Disseny 450
- Pàgines web 428
- Revistes 414
- Educació primària 413
- Xarxes d'ordinadors 401
- Màrqueting 385
-
42741Publicado 2002Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro
-
42742Publicado 1998Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra)Libro
-
42743Publicado 2011Libro
-
42744Publicado 2019Libro
-
42745
-
42746Publicado 2020Libro
-
42747Publicado 2020Libro
-
42748Publicado 2019Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto, Biblioteca de la Universidad de Navarra)Libro
-
42749
-
42750por Hamman, Adalbert-Gauthier, 1910-2000
Publicado 2009Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull, Red de bibliotecas Iglesia Navarra, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca de la Universidad de Navarra, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Instituto Superior de Teología de las Islas Canarias)Libro -
42751
-
42752Publicado 2010Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro
-
42753por Gómez-Heras, José María G.
Publicado 2012Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
42754
-
42755por Conger, Jay A
Publicado 1998Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra)Libro -
42756Publicado 2021Tabla de Contenidos: “…-- Selenium and Puppeteer -- Introducing Headless browsers -- Available headless browsers -- The Chromium DevTools Protocol -- Introducing Puppeteer -- The Puppeteer object model -- Puppeteer use cases -- Task Automation -- Web Scraping -- Content generation -- End-to-end testing -- Setting up the environment -- Node.js -- Visual Studio Code -- Our first Puppeteer code -- Installing Puppeteer -- Hello world in Puppeteer -- Asynchronous programming in JavaScript -- Promise.all -- Promise.race -- Fulfilling our own promises -- Summary -- Chapter 2: Automated Testing and Test runners -- Technical requirements -- Introduction to Automated Testing -- Unit tests -- Service tests -- End-to-end tests -- Test runner features -- Available test runners -- Creating our first test project -- Organizing our code -- Introducing the Page Object Model -- Summary -- Chapter 3: Navigating through a website -- Technical requirements -- Introducing the tests sites for this chapter -- Creating a Puppeteer browser -- Using the Puppeteer.launch function -- Headless -- The user data directory -- Executable Path -- Default Viewport -- Product -- Browser Arguments -- Mobile options -- Options in practice -- Navigating through a site -- Timeouts -- waitUntil -- Referrer -- Using the response object -- Getting the response URL -- Getting the response status code -- Introduction to continuous integration -- Summary -- Chapter 4: Interacting with a page -- Technical requirements -- Introduction to HTML, the DOM, and CSS -- HTML -- The DOM -- CSS Selectors -- Finding elements -- Finding elements using XPath -- Interacting with Elements -- Typing on input elements -- Clicking on elements…”
Libro electrónico -
42757Publicado 2018Tabla de Contenidos: “…-- How data flows to the HEC -- Logging data -- Using a token with data -- Sending out the data request -- Verifying the token -- Indexing the data -- Enabling the HEC -- Generating an HEC authentication token -- Seeing the HEC in action with cURL -- Indexer acknowledgement -- Summary -- Chapter 8: Best Practices and Advanced Queries -- Indexes for testing -- Searching within an index -- Search within a limited time frame -- Quick searches via fast mode -- Using event sampling -- Use the fields command to improve search performance -- Advanced searches -- Subsearch -- Using append -- Using join -- Using eval and if -- Using eval and match with a case function -- Summary -- Chapter 9: Taking Splunk to the Organization -- Common organizational use cases -- IT operations -- Cybersecurity -- Software development and support operations -- Internet of Things -- Splunk architecture considerations…”
Libro electrónico -
42758Publicado 2016Tabla de Contenidos: “…8.4.1 Installation vorbereiten8.4.2 Das Plugin installieren; 8.4.3 Die Bildergalerie mit Inhalten füllen; 8.4.4 Plugins zur Benutzerverwaltung; 8.5 Weitere empfehlenswerte Erweiterungen; 8.5.1 Backup und Restore; 8.5.2 Joomla lernt Sprachen; 8.5.3 Suchen und Finden; Kapitel 9: Suchmaschinenoptimierung - SEO; 9.1 Optimieren der Beiträge; 9.2 Suchmaschinenfreundliche URLs; Stichwortverzeichnis…”
Libro electrónico -
42759Publicado 2023Tabla de Contenidos: “…Detecting vulnerabilities with Defender -- Summary -- Chapter 4: Ransomware Countermeasures - Windows Endpoints, Identity, and SaaS -- Technical requirements -- Securing endpoints -- ASR rules -- Microsoft Defender and antimalware -- Update management -- Securing Microsoft Office apps -- Securing the web browser -- Other miscellaneous endpoint countermeasures -- DNS filtering -- PowerShell -- SMB protocol -- LOLBins -- Default applications -- Securing user identity -- Securing Active Directory -- Securing email services -- Protecting the domains -- Protecting the content and URLs -- Other countermeasures -- Summary -- Chapter 5: Ransomware Countermeasures - Microsoft Azure Workloads -- Technical requirements -- Network segmentation and design -- Identity and access management in Microsoft Azure -- Hub-and-spoke virtual networks -- The anatomy of a VM in Azure -- Microsoft Defender for Servers -- Azure Policy -- Azure Backup -- Overall recommendations for Azure-based workloads -- Summary -- Chapter 6: Ransomware Countermeasures - Networking and Zero-Trust Access -- Attackers and lateral movement -- Providing users with secure access to services -- Microsoft -- Citrix -- Cloudflare -- SASE -- File access -- Remote management services -- DDoS protection -- Summary -- Chapter 7: Protecting Information Using Azure Information Protection and Data Protection -- Technical requirements -- Data exfiltration -- Data classification -- Azure Information Protection -- DLP features and the future of AIP -- Encryption on SQL Server -- Best practices for backups and data protection -- Summary -- Part 3: Assume Breach -- Chapter 8: Ransomware Forensics -- You got ransomware, now what? …”
Libro electrónico -
42760Publicado 2001Tabla de Contenidos: “…Software Engineering Integration with HTML Sprinkling PHP within an HTML Document Using PHP to Output All HTML Separating HTML from PHP Creating <SELECT> Fields Passing Arrays in Forms Design Writing Requirements Specifications Writing Design Documents Using CVS Modularization Using include FreeEnergy FastTemplate Midgard Ariadne Preserving State and Providing Security Cloaking URLs Friendly to Search Engines Running a Script Regularly Efficiency and Debugging Measuring Performance Fetching Database Query Results When to Store Content in a Database In-Line Debugging Remote Debugging Simulating HTTP Connections…”
Libro electrónico