Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- TFC 5,514
- PFC 2,817
- TFM 2,674
- Empreses 1,796
- TFG 1,791
- Direcció i administració 1,507
- Gestió de projectes 1,411
- Arquitectura 1,410
- Història 1,175
- Planificació estratègica 1,024
- Planificació 944
- Sistemes d'informació per a la gestió 831
- PFG 772
- TFMP 735
- Arquitectura domèstica 728
- Ensenyament 685
- Innovacions tecnològiques 659
- Llibres de text 593
- Habitatges 550
- Congressos 546
- Edificis 534
- Aspectes socials 490
- Política i govern 453
- Comerç electrònic 452
- Disseny 450
- Pàgines web 428
- Revistes 414
- Educació primària 413
- Xarxes d'ordinadors 401
- Màrqueting 385
-
43121Publicado 2016Tabla de Contenidos: “…Chapter 10: Data IO in Go -- IO with readers and writers -- The io.Reader interface -- Chaining readers -- The io.Writer interface -- Working with the io package -- Working with files -- Creating and opening files -- Function os.OpenFile -- Files writing and reading -- Standard input, output, and error -- Formatted IO with fmt -- Printing to io.Writer interfaces -- Printing to standard output -- Reading from io.Reader -- Reading from standard input -- Buffered IO -- [Buffered writers and readers] -- Buffered writers and readers -- Scanning the buffer -- In-memory IO -- Encoding and decoding data -- Binary encoding with gob -- Encoding data as JSON -- Controlling JSON mapping with struct tags -- Custom encoding and decoding -- Summary -- Chapter 11: Writing Networked Services -- The net package -- Addressing -- The net.Conn Type -- Dialing a connection -- Listening for incoming connections -- Accepting client connections -- A TCP API server -- Connecting to the TCP server with telnet -- Connecting to the TCP server with Go -- The HTTP package -- The http.Client type -- Configuring the client -- Handling client requests and responses -- A simple HTTP server -- The default server -- Routing requests with http.ServeMux -- The default ServeMux -- A JSON API server -- Testing the API server with cURL -- An API server client in Go -- A JavaScript API server client -- Summary -- Chapter 12: Code Testing -- The Go test tool -- Test file names -- Test organization -- Writing Go tests -- The test functions -- Running the tests -- Filtering executed tests -- Test logging -- Reporting failure -- Skipping tests -- Table-driven tests -- HTTP testing -- Testing HTTP server code -- Testing HTTP client code -- Test coverage -- The cover tool -- Code benchmark -- Running the benchmark -- Skipping test functions -- The benchmark report -- Adjusting N.…”
Libro electrónico -
43122Publicado 2016Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- Acknowledgement -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: The Era of Big Data -- Big Data - The monster re-defined -- Big Data toolbox - dealing with the giant -- Hadoop - the elephant in the room -- Databases -- Hadoop Spark-ed up -- R - The unsung Big Data hero -- Summary -- Chapter 2: Introduction to R Programming Language and Statistical Environment -- Learning R -- Revisiting R basics -- Getting R and RStudio ready -- Setting the URLs to R repositories -- R data structures -- Vectors -- Scalars -- Matrices -- Arrays -- Data frames -- Lists -- Exporting R data objects -- Applied data science with R -- Importing data from different formats -- Exploratory Data Analysis -- Data aggregations and contingency tables -- Hypothesis testing and statistical inference -- Tests of differences -- Independent t-test example (with power and effect size estimates) -- ANOVA example -- Tests of relationships -- An example of Pearson's r correlations -- Multiple regression example -- Data visualization packages -- Summary -- Chapter 3: Unleashing the Power of R from Within -- Traditional limitations of R -- Out-of-memory data -- Processing speed -- To the memory limits and beyond -- Data transformations and aggregations with the ff and ffbase packages -- Generalized linear models with the ff and ffbase packages -- Logistic regression example with ffbase and biglm -- Expanding memory with the bigmemory package -- Parallel R -- From bigmemory to faster computations -- An apply() example with the big.matrix object -- A for() loop example with the ffdf object -- Using apply() and for() loop examples on a data.frame -- A parallel package example -- A foreach package example -- The future of parallel processing in R -- Utilizing Graphics Processing Units with R.…”
Libro electrónico -
43123Publicado 2017Tabla de Contenidos: “…Implementing an add article component -- Making components functional -- Rendering component trees -- Feature components and utility components -- Summary -- Chapter 6: The React Component Lifecycle -- Why components need a lifecycle -- Initializing properties and state -- Fetching component data -- Initializing state with properties -- Updating state with properties -- Optimize rendering efficiency -- To render or not to render -- Using metadata to optimize rendering -- Rendering imperative components -- Rendering jQuery UI widgets -- Cleaning up after components -- Cleaning up asynchronous calls -- Summary -- Chapter 7: Validating Component Properties -- Knowing what to expect -- Promoting portable components -- Simple property validators -- Basic type validation -- Requiring values -- Any property value -- Type and value validators -- Things that can be rendered -- Requiring specific types -- Requiring specific values -- Writing custom property validators -- Summary -- Chapter 8: Extending Components -- Component inheritance -- Inheriting state -- Inheriting properties -- Inheriting JSX and event handlers -- Composition with higher-order components -- Conditional component rendering -- Providing data sources -- Summary -- Chapter 9: Handling Navigation with Routes -- Declaring routes -- Hello route -- Decoupling route declarations -- Parent and child routes -- Handling route parameters -- Resource IDs in routes -- Optional parameters -- Using link components -- Basic linking -- URL and query parameters -- Lazy routing -- Summary -- Chapter 10: Server-Side React Components -- What is isomorphic JavaScript? …”
Libro electrónico -
43124Publicado 2016Tabla de Contenidos: “…Chapter 6: Visualization -- Prerequisites - configuration settings -- Tables -- Tables - Data overlay -- Tables - Sparkline -- Sparkline - Filling and changing color -- Sparkline - The max value indicator -- Sparkline - A bar style -- Tables - An icon set -- Single value -- Charts -- Charts - Coloring -- Chart overlay -- Bubble charts -- Drilldown -- Dynamic drilldown -- The x-axis or y-axis value as a token to a form -- Dynamic drilldown to pass a respective row's specific column value -- Dynamic drilldown to pass a fieldname of a clicked value -- Contextual drilldown -- The URL field value drilldown -- Single value drilldown -- Summary -- Chapter 7: Advanced Visualization -- Sunburst sequence -- What is a sunburst sequence? …”
Libro electrónico -
43125Publicado 2017Tabla de Contenidos: “…. -- Extracting web data from a URL using JSoup -- Getting ready -- How to do it... -- Extracting web data from a website using Selenium Webdriver -- Getting ready -- How to do it... -- Reading table data from a MySQL database -- Getting ready -- How to do it... -- Chapter 2: Indexing and Searching Data -- Introduction -- Indexing data with Apache Lucene -- Getting ready -- How to do it... -- How it works... -- Searching indexed data with Apache Lucene -- Getting ready -- How to do it... -- Chapter 3: Analyzing Data Statistically -- Introduction -- Generating descriptive statistics -- How to do it... -- Generating summary statistics -- How to do it... -- Generating summary statistics from multiple distributions -- How to do it... -- There's more...…”
Libro electrónico -
43126Publicado 2023Tabla de Contenidos: “…-- Getting started with Newspaper3k -- Scraping all news URLs from a website -- Scraping a news story from a website -- Scraping nicely and blending in -- Converting text into network data -- End-to-end Network3k scraping and network visualization -- Introducing the Twitter Python Library -- What is the Twitter Python Library? …”
Libro electrónico -
43127Publicado 2023Tabla de Contenidos: “…. -- Testing for client-side URL redirect -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing cross-origin resource sharing -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing WebSockets -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 10: Advanced Attack Techniques -- Technical requirements…”
Libro electrónico -
43128Publicado 2024Tabla de Contenidos: “…Business logic vulnerabilities -- Preview of the Open Worldwide Application Security Project API Security Top 10 2023 -- Summary -- Further reading -- Chapter 4: Investigating Recent Breaches -- The importance of learning from mistakes -- Examining 10 high-profile API breaches from 2022 -- 1-Global shipping company -- 2-Campus access control -- 3-Microbrewery application -- 4-Cryptocurrency portal -- 5-Dating application -- 6-The All in One SEO WordPress plugin -- 7-X account information leakage -- 8-Home router -- 9-Remote access to two popular vehicles -- 10-Smart Scale -- Key takeaways and learning -- Summary -- Further reading -- Part 2: Attacking APIs -- Chapter 5: Foundations of Attacking APIs -- Technical requirements -- Understanding API attackers and their methods -- Interacting with APIs -- Finding API keys -- Enumeration and discovery of APIs -- Fuzzing API endpoints -- Attacking JWTs -- Mastering the tools of the trade -- CLI clients (HTTPie/cURL) -- Postman -- Browser tools -- Burp Suite -- Reverse proxies -- Learning the key skills of API attacking -- Building a laboratory -- Hacking vulnerable APIs -- Training courses -- Summary -- Further reading -- Chapter 6: Discovering APIs -- Technical requirements -- Passive discovery -- Google -- Offensive security Google database -- Other API-specific searchable databases -- Code analysis techniques -- Active discovery -- Network discovery and scan -- OWASP ZAP -- Burp Suite -- Reverse-engineering mobile apps -- Postman -- Implementation analysis -- Verbose error and debug messages -- OS and framework enumeration -- Timing or volume attacks -- Utilizing online tools such as BuiltWith or Wappalyzer -- Evading common defenses -- Summary -- Further reading -- Chapter 7: Attacking APIs -- Technical requirements -- Authentication attacks -- Insecure implementation logic…”
Libro electrónico -
43129Publicado 2017Tabla de Contenidos: “…nRF UART (Android and iOS) -- nRF Logger (Android) -- nRF Beacon for Eddystone (Android and iOS) -- nRF BLE Joiner (Android) -- Google Beacon tools (Android) -- Physical web (Android) -- Summary -- Chapter 3: Building a BLE Central and Peripheral Communication System -- Bluetooth Low Energy central and peripheral -- Examples of Bluetooth central peripheral communication -- Smartphone - smartwatch communication -- Smartphone - smart LED strip communication -- Android Bluetooth Low Energy -- An introduction to Android -- Bluetooth Low Energy in API level 24 -- Bluetooth Low Energy permissions -- Bluetooth Low Energy interfaces -- BluetoothAdapter.LeScanCallback -- BluetoothProfile.ServiceListener -- Bluetooth Low Energy classes -- BluetoothAdapter -- BluetoothGatt -- BluetoothGattCallback -- BluetoothGattService -- BluetoothGattCharacteristic -- Building an Android app to list Bluetooth devices in the proximity -- Conventions -- Permissions in AndroidManifest.xml -- Runtime permissions -- Bluetooth scanning process -- Custom list adapter and ListView -- Android app - heart rate monitor application -- Deploying the GATT server using Nordic Connect -- Writing central-side Android apps -- Writing data on the characteristic -- Bluetooth Over-The-Air device firmware update -- Adding Android DFU library using Gradle -- DFUService -- FirmwareUpdateActivity -- Summary -- Chapter 4: Bluetooth Low Energy Beacons -- Introduction to Bluetooth Low Energy Beacons -- Applications of Bluetooth Low Energy Beacons -- Beginner applications -- Advanced applications -- Beacon protocols -- Google Eddystone -- Eddystone-UID -- Eddystone-EID -- Eddystone-URL -- Apple iBeacon -- Estimote beacons -- Estimote SDK for Android -- Getting started -- Background monitoring and ranging -- Estimote SDK for iOS -- Physical web using Estimote -- Estimote cloud interface -- Summary…”
Libro electrónico -
43130Publicado 2017Tabla de Contenidos: “…-- The importance of caching -- The Cache API -- Methods -- The asset manifest -- Setting up our cache -- The install event -- Opening up the cache -- Fetching the asset manifest -- Parsing the JSON -- Adding the relevant URLs to the cache -- The fetch event -- The activate event -- Grab the list of cache names -- Loop over them -- Testing our cache -- Summary -- Chapter 13: Auditing Our App -- What is Lighthouse? …”
Libro electrónico -
43131Publicado 2021Tabla de Contenidos: “…Bookmarking -- Basic Idea -- Updating the URL -- Storing Richer State -- Bookmarking Challenges -- Exercises -- Summary -- Chapter 12. …”
Libro electrónico -
43132Publicado 2010Tabla de Contenidos: “…Web Services -- Creating the TopSongs Application -- Setting up the interface -- Fetching Data From a URL -- Working with NSURLConnection -- Parsing XML -- For the More Curious: The Request Body -- Challenge: More Data -- For the More Curious: Credentials -- 22. …”
Libro electrónico -
43133por Hughes, ChrisTabla de Contenidos: “…Exploit Prediction Scoring System -- EPSS 3.0-Prioritizing Through Prediction -- EPSS 3.0 -- Moving Forward -- Stakeholder-Specific Vulnerability Categorization -- CISA SSVC Guide -- Decision Tree Example -- Software Identification Formats -- Common Platform Enumeration -- Package URL -- Software Identification Tags -- Common Weaknesses and Enumerations -- Summary -- Chapter 6 Vulnerability and Exploit Database Management -- National Vulnerability Database (NVD) -- Sonatype Open Source Software Index -- Open Source Vulnerabilities -- GitHub Advisory Database -- Exploit Databases -- Exploit-DB -- Metasploit -- GitHub -- Summary -- Chapter 7 Vulnerability Chaining -- Vulnerability Chaining Attacks -- Exploit Chains -- Daisy Chains -- Vendor-Released Chains -- Microsoft Active Directory -- VMware vRealize Products -- iPhone Exploit Chain -- Vulnerability Chaining and Scoring -- Common Vulnerability Scoring System -- EPSS -- Gaps in the Industry -- Vulnerability Chaining Blindness -- Terminology -- Usage in Vulnerability Management Programs -- The Human Aspect of Vulnerability Chaining -- Phishing -- Business Email Compromise -- Social Engineering -- Integration into VMPs -- Leadership Principles -- Security Practitioner Integration -- IT and Development Usage -- Summary -- Chapter 8 Vulnerability Threat Intelligence -- Why Is Threat Intel Important to VMPs? …”
Publicado 2024
Libro electrónico -
43134
-
43135
-
43136por Torras i Bages, Josep, 1846-1916
Publicado 2005Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada)Libro -
43137
-
43138
-
43139
-
43140Publicado 2021Tabla de Contenidos: “…-- Attaching tasks to URLs -- Attaching tasks to trigger JavaScript callback functions -- Styling and Theming -- Adding a Custom CSS style sheet -- Modifying Gantt chart-specific theme variables -- Summary -- Chapter 13: Presenting User Behavior with User Journey Diagrams -- Technical requirements -- Defining a User Journey Diagram -- How is a User Journey represented? …”
Libro electrónico