Mostrando 43,101 - 43,120 Resultados de 43,382 Para Buscar '"URL"', tiempo de consulta: 0.18s Limitar resultados
  1. 43101
    Publicado 2022
    Tabla de Contenidos: “…Chapter 13: Custom Domains -- Technical Requirements -- Adding a Custom Domain -- What Domains to Add -- Azure Portal Custom Domain Pane -- Self-Managed Domain -- Domain on Azure DNS -- Azure-Generated URL -- Conclusion -- Appendix A: Next Steps -- Add User Details -- Blog Post Summary Refresh -- Search -- Custom Summary Length -- Preview Complete Flag -- Tag Lookup -- Blog Post Preview -- Make the Application Multiauthor -- Fully Implement Post Status -- Styling -- Appendix B: Changing the GitHub Workflow -- Opening the Workflow File -- Index…”
    Libro electrónico
  2. 43102
    Publicado 2023
    Tabla de Contenidos: “…-- Developing for Drupal -- Technologies that drive Drupal -- PHP -- Databases and MySQL -- The web server -- Drupal architecture -- Drupal's major subsystems -- Tools for developing in Drupal -- Summary -- Chapter 2: Creating Your First Module -- Creating a module -- Your first hook implementation -- Route and controller -- Services -- Using services in Drupal -- Injecting the service into our Controller -- Invoked Controllers -- The Form API -- Altering forms -- Custom submit handlers -- Rendering forms -- Service dependencies -- Blocks -- Our first block plugin -- Block configuration -- Working with links -- The URL -- The link -- Which way to link? -- Event Dispatcher and redirects -- Redirecting from a Controller -- Redirecting from a subscriber -- Dispatching events -- Summary -- Chapter 3: Logging and Mailing -- Logging -- The Drupal logging theory -- Our own logger channel -- Our own logger -- Logging for Hello World -- Logging recap -- Mail API -- The theory behind the Mail API -- Implementing hook_mail() -- Sending emails -- Altering someone else's emails -- Custom mail plugins -- Mail API recap -- Tokens -- The Token API -- Using tokens -- Defining new tokens -- Tokens recap -- Summary -- Chapter 4: Theming -- Business logic versus presentation logic -- Twig -- Theme hooks -- Theme hook suggestions -- Render arrays -- The structure of a render array -- The render pipeline -- Assets and libraries -- Libraries -- Common theme hooks -- Lists -- Links -- Tables -- Attributes -- Layouts -- Defining layouts -- Rendering a layout -- Theming our Hello World module -- Summary -- Chapter 5: Menus and Menu Links -- The menu system -- Menus…”
    Libro electrónico
  3. 43103
    Publicado 2011
    Tabla de Contenidos: “…. -- NISO's IOTA working group: creating an index for measuring the quality of open URL links / Rafal Kasprowski, Susan Marcin. -- License management: making it fun and flexible with CORAL / Andrea Langhurst, Xan Arch. -- Analysis of claiming print journals at the University of Manitoba libraries / Lisa O'Hara, Pat Milne. -- Making do: ERM alternatives / Fran Rosen, Jennifer Dean…”
    Libro electrónico
  4. 43104
  5. 43105
    Publicado 2024
    Libro
  6. 43106
    Publicado 2017
    Libro
  7. 43107
    Publicado 1996
    Libro
  8. 43108
    Publicado 2018
    Libro
  9. 43109
    Publicado 2022
    Libro
  10. 43110
    Publicado 2020
    Libro
  11. 43111
    Publicado 2017
    Libro
  12. 43112
  13. 43113
  14. 43114
  15. 43115
  16. 43116
  17. 43117
  18. 43118
    Publicado 2021
    Tabla de Contenidos: “…Summary -- 10 Using third-party hooks -- 10.1 Accessing state in the URL with React Router -- 10.1.1 Setting up routes to enable nesting -- 10.1.2 Adding nested routes to the Bookables page -- 10.1.3 Accessing URL parameters with the useParams hook -- 10.1.4 Navigating with the useNavigate hook -- 10.2 Getting and setting query string search parameters -- 10.2.1 Getting search parameters from the query string -- 10.2.2 Setting the query string -- 10.3 Streamlining data-fetching with React Query -- 10.3.1 Introducing React Query -- 10.3.2 Giving components access to a React Query client -- 10.3.3 Fetching data with useQuery -- 10.3.4 Accessing data in the query cache -- 10.3.5 Updating server state with useMutation -- Summary -- Part 2 -- 11 Code splitting with Suspense -- 11.1 Importing code dynamically with the import function -- 11.1.1 Setting up a web page to load JavaScript when a button is clicked -- 11.1.2 Using default and named exports -- 11.1.3 Using static imports to load JavaScript -- 11.1.4 Calling the import function to dynamically load JavaScript -- 11.2 Importing components dynamically with lazy and Suspense -- 11.2.1 Converting a component to a lazy component with the lazy function -- 11.2.2 Specifying fallback content with the Suspense component -- 11.2.3 Understanding how lazy and Suspense work together -- 11.2.4 Code splitting an app on its routes -- 11.3 Catching errors with error boundaries -- 11.3.1 Checking out the error boundary example in the React docs -- 11.3.2 Creating our own error boundary -- 11.3.3 Recovering from errors -- Summary -- 12 Integrating data fetching with Suspense -- 12.1 Data fetching with Suspense -- 12.1.1 Upgrading promises to include their status -- 12.1.2 Using the promise status to integrate with Suspense -- 12.1.3 Fetching data as early as possible -- 12.1.4 Fetching new data…”
    Libro electrónico
  19. 43119
    Publicado 2021
    Tabla de Contenidos: “…-- 8.1.1 URIs -- 8.1.2 URLs -- 8.1.3 URNs -- 8.1.4 DIDs -- 8.2 The functional level: How DIDs work -- 8.2.1 DID documents -- 8.2.2 DID methods -- 8.2.3 DID resolution -- 8.2.4 DID URLs -- 8.2.5 Comparison with the Domain Name System (DNS) -- 8.2.6 Comparison with URNs and other persistent Identifiers -- 8.2.7 Types of DIDs -- 8.3 The architectural level: Why DIDs work -- 8.3.1 The core problem of Public Key Infrastructure (PKI) -- 8.3.2 Solution 1: The conventional PKI model -- 8.3.3 Solution 2: The web-of-trust model -- 8.3.4 Solution 3: Public key-based identifiers -- 8.3.5 Solution 4: DIDs and DID documents -- 8.4 Four benefits of DIDs that go beyond PKI -- 8.4.1 Beyond PKI benefit 1: Guardianship and controllership -- 8.4.2 Beyond PKI benefit 2: Service endpoint discovery -- 8.4.3 Beyond PKI benefit 3: DID-to-DID connections -- 8.4.4 Beyond PKI benefit 4: Privacy by design at scale -- 8.5 The semantic level: What DIDs mean -- 8.5.1 The meaning of an address -- 8.5.2 DID networks and digital trust ecosystems -- 8.5.3 Why isn't a DID human-meaningful? …”
    Libro electrónico
  20. 43120
    Publicado 2024
    Tabla de Contenidos: “…9.6.3 Multiview Fusion -- 9.6.4 Multimodal Fusion -- 9.6.5 Multi-Focus Fusion -- 9.6.6 Multi-Temporal Fusion -- 9.7 Image Fusion Applications -- 9.7.1 Medical Image Fusion -- 9.7.2 Remote-Sensing Image Fusion -- 9.7.3 Visible-Infrared Fusion -- 9.7.4 Multi-Focus Image Fusion -- 9.8 Conclusion -- References -- Chapter 10Detecting Phishing URLs through Deep Learning Models -- 10.1 Introduction -- 10.2 DL Models Used in Cybersecurity -- 10.2.1 Convolutional Neural Network -- 10.2.2 Recurrent Neural Networks -- 10.2.3 Long Short-Term Memory -- 10.2.4 Deep Belief Networks -- 10.2.5 Multi-Layer Perceptron -- 10.2.6 Generative Adversarial Network -- 10.3 Metrics -- 10.3.1 Accuracy -- 10.3.2 Precision -- 10.3.3 Recall (Sensitivity) -- 10.3.4 F1 Score -- 10.3.5 Confusion Matrix -- 10.4 Application of Deep Learning in Cybersecurity Use Cases -- 10.4.1 Intrusion Detection System -- 10.4.2 Malware Detection -- 10.4.3 Botnet Detection -- 10.4.4 Network Traffic Identification -- 10.4.5 Credit Card Fraud Detection -- 10.5 Existing Work Related to Phishing URL Detection Using DL Models -- 10.6 Conclusion -- References -- Chapter 11 Augmenting Multimedia Analysis: A Fusion of Deep Learning with Differential Privacy -- 11.1 Introduction -- 11.2 Multimedia Data and Crowdsensing Privacy Concerns -- 11.3 Deep Learning and Privacy Risks -- 11.3.1 Privacy Attacks in Deep Learning Pipeline -- 11.4 Algorithms for Preserving Privacy -- 11.5 The Differential Privacy Distributions -- 11.6 How Differential Privacy Fuses With Deep Learning -- 11.7 Methodology: Exploring the Intersection of Multimedia Data With Deep Learning and Privacy in Literature -- 11.7.1 Preserving-Privacy Image Analysis -- 11.7.2 Preserving-Privacy Video Analysis -- 11.7.3 Preserving-Privacy With Other Methods -- 11.8 Discussion -- 11.9 Conclusion -- References…”
    Libro electrónico