Mostrando 43,181 - 43,200 Resultados de 43,382 Para Buscar '"URL"', tiempo de consulta: 0.17s Limitar resultados
  1. 43181
    Publicado 2024
    Tabla de Contenidos: “…The evolution of distributed systems -- Designing a distributed queue -- Designing a pub/sub system -- Key characteristics of pub/sub systems -- Pub/sub system design considerations -- Kafka -- The importance of Kafka in distributed systems -- Kafka Streams -- Kinesis -- Summary -- Part 3: System Design in Practice -- Chapter 8: Design and Implementation of System Components: API, Security, and Metrics -- REST APIs -- Design principles of REST APIs -- Use cases for REST APIs -- Strengths and weaknesses -- gRPC APIs -- Design principles of gRPC APIs -- Use cases for gRPC APIs -- Strengths and weaknesses -- Comparing REST and gRPC -- API security -- Authentication -- Authorization -- Secure communication of APIs -- Rate limiting -- Distributed systems logging -- Centralized logging -- Best practices for implementing distributed logging -- Metrics in a distributed system -- Types of metrics -- Open source tools for metrics -- Best practices for implementing metrics -- Alerting in a distributed system -- Designing effective alerts -- Open-source tools for alerting -- Best practices for implementing alerting -- Tracing in a distributed system -- Distributed tracing -- Open-source tools for distributed tracing -- Best practices for implementing tracing -- Best practices -- Summary -- Chapter 9: System Design - URL Shortener -- Real-world use cases -- Functional requirements -- Non-functional requirements -- Client APIs needed -- Estimates and calculations -- System design -- Core challenge -- Choice of database -- High-level solution architecture -- Requirements verification -- Summary -- Chapter 10: System Design - Proximity Service -- Real-world use cases -- Functional requirements -- Non-functional requirements -- Client APIs needed -- Estimates and calculations -- System design -- High-level system design -- Core challenge…”
    Libro electrónico
  2. 43182
    por Simovic, Vladimir
    Publicado 2022
    Tabla de Contenidos: “…-- 1.4 Grundlegende Einstellungen -- 1.4.1 Allgemein -- 1.4.2 Schreiben - Einstellungen für das Schreiben von Beiträgen -- 1.4.3 Lesen - Startseite, Blogseite und Newsfeed konfigurieren -- 1.4.4 Diskussion - Einstellungen für Kommentare und mehr -- 1.4.5 Medien - Bildeinstellungen -- 1.4.6 Permalinks - sprechende URLs erstellen -- 1.4.7 Datenschutz -- 2 WordPress anpassen -- 2.1 Backend anpassen -- 2.2 Profil anpassen -- 2.2.1 Persönliche Optionen -- 2.2.2 Name -- 2.2.3 Kontaktinformationen -- 2.2.4 Über Dich -- 2.2.5 Benutzerkonten-Verwaltung -- 2.2.6 Anwendungspasswörter -- 2.3 Benutzerverwaltung (Rechtemanagement) -- 2.4 Plugins -- 2.4.1 Plugins installieren -- 2.5 Themes -- 2.5.1 Themes installieren -- 3 Seiten und Beiträge verfassen und bearbeiten -- 3.1 Worin unterscheiden sich Beiträge von Seiten? …”
    Libro electrónico
  3. 43183
    por Press, Posts & Telecom
    Publicado 2024
    Tabla de Contenidos: “…Intro -- 内容提 -- 作 简介 -- 审稿人简介 -- 前 -- 源与支持 -- 目录 -- 第1章 取数据与清洗数据 -- 1.1 简介 -- 1.2 使用 Java 从分层目录中提取所有文件名 -- 准备工作 -- 操作步 -- 1.3 使用Apache Commons IO从多层目录中提取所有文件名 -- 准备工作 -- 操作步 -- 1.4 使用 Java 8 从文本文件一次性 取所有内容 -- 操作步 -- 1.5 使用Apache Commons -- 准备工作 -- 操作方法 -- 1.6 使用Apache Tika 提取PDF 文本 -- 准备知 -- 操作步 -- 1.7 使用正则 式清洗 ASCII 文本文件 -- 操作步 -- 1.8 使用Univocity 析CSV 文件 -- 准备工作 -- 操作步 -- 1.9 使用Univocity 析TSV 文件 -- 准备工作 -- 操作步 -- 1.10 使用JDOM 析XML 文件 -- 准备工作 -- 操作步 -- 1.11 使用JSON.simple 编写JSON 文件 -- 准备工作 -- 操作步 -- 1.12 使用JSON.simple 取JSON 文件 -- 准备工作 -- 操作步 -- 1.13 使用JSoup 从一个URL 提取Web 数据 -- 准备工作 -- 操作步 -- 1.14 使用Selenium Webdriver 从网站提取Web 数据 -- 准备工作 -- 操作步 -- 1.15 从MySQL 数据库 取 格数据 -- 准备工作 -- 操作步 -- 第2章 为数据建立索引与搜索数据 -- 2.1 简介 -- 2.2 使用Apache Lucene 为数据建立索引 -- 准备工作 -- 操作步 -- 工作原理 -- 2.3 使用Apache Lucene 搜索带索引的数据 -- 准备工作 -- 操作步 -- 第3章 数据统 分析 -- 3.1 简介 -- 3.2 生成描 性统 -- 操作步 -- 3.3 生成概 统 -- 操作步 -- 3.4 从多种分布生成概 统 -- 操作步 -- 更多内容 -- 3.5 算 率分布 -- 操作步 -- 3.6 算字符串中的 -- 操作步 -- 工作原理 -- 3.7 使用Java 8 算字符串中的 -- 操作步 -- 3.8 算简单回归 -- 操作步 -- 3.9 算普 最小二乘回归 -- 操作步 -- 3.10 算广义最小二乘回归 -- 操作步 -- 3.11 算两组数据点的协方差 -- 操作步 -- 3.12 为两组数据点 算皮尔 相关系数 -- 操作步 -- 3.13 执 对t检 -- 操作步 -- 3.14 执 卡方检 -- 操作步 -- 3.15 执 单因素方差分析 one-way ANOVA test -- 操作步 -- 3.16 执 K-S 检 -- 操作步 -- 第4章 数据学习I -- 4.1 简介 -- 4.2 创建与保存ARFF 文件 -- 操作步 -- 4.3 对机器学习模型 交叉 -- 操作步 -- 4.4 对新的测 数据 分类 -- 准备工作 -- 操作步 -- 4.5 使用 滤分类器对新测 数据分类 -- 操作步 -- 4.6 创建线性回归模型 -- 操作步 -- 4.7 创建 回归模型 -- 操作步 -- 4.8 使用K均值算法对数据点 类 -- 操作步 -- 4.9 依据类别对数据 类处理 -- 操作方法 -- 4.10 学习数据 的关 则 -- 准备工作 -- 操作步 -- 4.11 使用低层方法、 滤方法、元分类器方法 择特征/属性 -- 准备工作 -- 操作步 -- 第5章 数据学习II -- 5.1 简介 -- 5.2 使用Java 机器学习库 Java-ML 向数据应用机器学习 -- 准备工作 -- 操作步 -- 5.3 使用斯坦福分类器对数据点分类 -- 准备工作 -- 操作步 -- 工作原理 -- 5.4 使用MOA 对数据点分类 -- 准备工作 -- 操作步 -- 5.5 使用 Mulan 对多标签数据点 分类 -- 准备工作 -- 操作步 -- 第6章 从文本数据提取信息 -- 6.1 简介 -- 6.2 使用Java 检测标 单…”
    Libro electrónico
  4. 43184
  5. 43185
  6. 43186
  7. 43187
  8. 43188
  9. 43189
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Copyright -- Foreword -- Contributors -- Table of Contents -- Preface -- Section 1: Exploring and the Building Blocks of VB -- Chapter 1: What, Why, and How (WWH) of Visual Builder -- Technical requirements -- Introducing VB -- Reviewing the features and benefits of VB -- Knowing the tools required to use VB -- Knowing the technologies used in VB -- Understanding the VB architecture -- Summary -- Questions -- Chapter 2: Provisioning and Understanding the Visual Builder Instance -- Technical requirements -- Provisioning a VB instance -- Creating an instance using Quick Start -- Creating a custom instance -- Creating users and assigning roles -- Adding a user to IDCS -- Assigning a role to a user -- Deriving the cost of using VB -- Accessing the VB instance -- Accessing VB via the Visual Builder instance page -- Accessing VB using a direct URL -- Exploring various navigations of VB -- All Applications -- Settings -- Certificates -- Summary -- Questions -- Chapter 3: Exploring Visual Builder Ingredients -- Technical requirements -- Creating a VB application -- Understanding Business Objects -- Working with Business Objects -- Exploring Service Connections -- Various options to create a Service Connection -- Understanding variables, their types, and their scopes -- Understanding implicit objects of VB -- Exploring events and Action Chains -- Events -- Action Chains -- Actions inside an Action Chain -- Understanding the application's structure -- Understanding the various editors and the application designer -- Summary -- Questions -- Section 2: Working with Data and Services -- Chapter 4: Creating and Managing Business Objects -- Technical requirements -- Creating and modifying a Business Object -- Creating a Business Object -- Modifying a Business Object -- Adding a formula to a field -- Creating a relationship between Business Objects…”
    Libro electrónico
  10. 43190
    Publicado 2022
    Tabla de Contenidos: “…Updating an Index When Data Is Modified -- Index Rebuilds -- Database Recovery After Failure or Shutdown -- Joins -- Summary -- Chapter 17: Setting Up TPM Attestation -- Prerequisites for Your SQL Server to Support TPM Attestation -- Artifacts That Are Required by Attestation -- TPM Endorsement Key Certificate -- TPM Baseline -- Code Integrity Policy -- Installing and Configuring HGS -- Configuring the SQL Server -- Install the Attestation Client Components -- Making Sure VBS Is Configured Correctly -- Configure the Attestation URL -- Configuring a Code Integrity Policy -- Collect and Register Attestation Artifacts -- Check SQL Server Can Attest Successfully -- Configure the Enclave Type in SQL Server -- Summary -- Part V: Completing the Picture -- Chapter 18: Encryption In Transit Using Transport Layer Security -- How TLS Works -- Obtaining a Certificate to Use for TLS -- Setting Up TLS on Your SQL Server -- Performance -- Summary -- Chapter 19: Hashing and Salting of Passwords -- Hashing -- Salting -- Using the HASHBYTES Function -- Storing Passwords Using HASHBYTES and a Salt Value -- Summary -- Chapter 20: Extensible Key Management (EKM) -- Creating the Required Objects in Azure -- Creating the Resource Group -- Creating the Azure Active Directory App Registration -- Creating the Key Vault -- Setting Up TDE to Use Azure Key Vault -- Creating the Key for TDE -- Setting Up the SQL Server -- Working with Always Encrypted and EKM -- Creating a CMK in Azure Key Vault -- Encrypting Columns and Working with Data -- Working with Azure Key Vault from Your Application -- Summary -- Chapter 21: Other Methods of Column Encryption -- Encryption Using a Symmetric Key -- Your Key Hierarchy -- Working with Automated Key Management -- Creating the Keys -- Encrypting and Decrypting Data -- Using an Authenticator -- Where the DMK Is Not Protected by the SMK…”
    Libro electrónico
  11. 43191
    Publicado 2017
    Tabla de Contenidos: “…Running the Script -- The Results -- #42 Deleting a User Account -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #43 Validating the User Environment -- The Code -- How It Works -- Running the Script -- The Results -- #44 Cleaning Up After Guests Leave -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 6: System Administration: System Maintenance -- #45 Tracking Set User ID Applications -- The Code -- How It Works -- Running the Script -- The Results -- #46 Setting the System Date -- The Code -- How It Works -- Running the Script -- The Results -- #47 Killing Processes by Name -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #48 Validating User crontab Entries -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #49 Ensuring that System cron Jobs Are Run -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #50 Rotating Log Files -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #51 Managing Backups -- The Code -- How It Works -- Running the Script -- The Results -- #52 Backing Up Directories -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 7: Web and Internet Users -- #53 Downloading Files via FTP -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #54 Extracting URLs from a Web Page -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #55 Getting GitHub User Information -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #56 ZIP Code Lookup -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #57 Area Code Lookup -- The Code -- How It Works…”
    Libro electrónico
  12. 43192
    Publicado 2016
    Tabla de Contenidos: “…Stashing away your changes -- Using git stash -- Stash and the staging area -- Stash internals -- Un-applying a stash -- Recovering stashes that were dropped erroneously -- Managing worktrees and the staging area -- Examining files and directories -- Searching file contents -- Un-tracking, un-staging, and un-modifying files -- Resetting a file to the old version -- Cleaning the working area -- Multiple working directories -- Summary -- Chapter 5: Collaborative Development with Git -- Collaborative workflows -- Bare repositories -- Interacting with other repositories -- The centralized workflow -- The peer-to-peer or forking workflow -- The maintainer or integration manager workflow -- The hierarchical or dictator and lieutenants workflows -- Managing remote repositories -- The origin remote -- Listing and examining remotes -- Adding a new remote -- Updating information about remotes -- Renaming remotes -- Changing the remote URLs -- Changing the list of branches tracked by remote -- Setting the default branch of remote -- Deleting remote-tracking branches -- Support for triangular workflows -- Transport protocols -- Local transport -- Smart transports -- Native Git protocol -- SSH protocol -- Smart HTTP(S) protocol -- Offline transport with bundles -- Cloning and updating with bundle -- Using bundle to update an existing repository -- Utilizing bundle to help with the initial clone -- Remote transport helpers -- Transport relay with remote helpers -- Using foreign SCM repositories as remotes -- Credentials/password management -- Asking for passwords -- Public key authentication for SSH -- Credential helpers -- Publishing your changes upstream -- Pushing to a public repository -- Generating a pull request -- Exchanging patches -- Chain of trust -- Content-addressed storage -- Lightweight, annotated, and signed tags -- Lightweight tags…”
    Libro electrónico
  13. 43193
    Publicado 2018
    Tabla de Contenidos: “…Import orderer settings at member organizations -- Setting up a private channel -- Create a new channel as the founder -- Adding member peers to the channel -- Summary -- Chapter 12: Designing and Developing Your First Smart Contract -- The proposed application -- Model-first design approach -- Designing the participants and base assets -- Designing the accident assets and transactions -- Designing the repair assets and transactions -- Designing the insurance assets and transactions -- Setting up the necessary development tools -- Installing cURL -- Installing Docker and Docker Compose -- Installing the Go programming language -- Step 1 - Installing Go -- Step 2 - Setting environment paths -- Step 3 - Setting up your Go workspace -- Downloading platform-specific binaries -- Installing Visual Studio Code (IDE) -- Programming the smart contract -- Setting up a workspace in VSCode -- Installing missing Go packages and commands -- Programming the actual chaincode -- Programming the initial chaincode skeleton -- Adding the data model objects -- Programming the ReportAccident transaction -- Summary -- Chapter 13: Deploying and Testing Your First Smart Contract -- Deploying your smart contract -- Installing chaincode on the founder's peers -- Activating the chaincode on a channel -- Installing a new version of our chaincode -- Installing chaincode on member organizations -- Exposing smart contracts using the REST proxy -- Exposing chaincode using the Advanced method -- Exposing chaincode using the Quick method -- Testing a smart contract using a REST client -- Installing a client to call the REST proxy's API -- Importing and testing chaincode API requests -- Available REST proxy APIs -- Getting the version of the OBCS API -- Overview of chaincode interactions -- Setting up all of the required demo assets -- Reading asset data to check the current values…”
    Libro electrónico
  14. 43194
    Publicado 2015
    Tabla de Contenidos: “…The Hadoop Distributed Filesystem -- The Design of HDFS -- HDFS Concepts -- Blocks -- Namenodes and Datanodes -- Block Caching -- HDFS Federation -- HDFS High Availability -- The Command-Line Interface -- Basic Filesystem Operations -- Hadoop Filesystems -- Interfaces -- The Java Interface -- Reading Data from a Hadoop URL -- Reading Data Using the FileSystem API -- Writing Data -- Directories -- Querying the Filesystem -- Deleting Data -- Data Flow -- Anatomy of a File Read -- Anatomy of a File Write -- Coherency Model -- Parallel Copying with distcp -- Keeping an HDFS Cluster Balanced -- Chapter 4. …”
    Libro electrónico
  15. 43195
    Publicado 2015
    Tabla de Contenidos: “…Web Scraping -- Project: mapit.py with the webbrowser Module -- Step 1: Figure Out the URL -- Step 2: Handle the Command Line Arguments -- Step 3: Handle the Clipboard Content and Launch the Browser -- Ideas for Similar Programs -- Downloading Files from the Web with the requests Module -- Downloading a Web Page with the requests.get() Function -- Checking for Errors -- Saving Downloaded Files to the Hard Drive -- HTML -- Resources for Learning HTML -- A Quick Refresher…”
    Libro electrónico
  16. 43196
    Publicado 2023
    Tabla de Contenidos: “…Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Environmental problems caused by humans -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- 2 Personal Cybersecurity -- Chapter 1 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment -- Your work environment…”
    Libro electrónico
  17. 43197
    Publicado 2023
    Tabla de Contenidos: “…-- The Importance of Keyword Research -- Researching Keywords -- Implementing Keywords into On-Page Optimization -- Building Credibility with Links -- Links Replicate Human Judgement -- Gaining Links Is About Quality, not Quantity -- Link Structure -- Link Attributes -- Building Links -- Website Architecture and Technical SEO -- Architecture -- Duplicate Content -- Canonical URLs -- Redirects -- Robots.txt -- Sitemaps -- Speed (Load Time) -- Hreflang Attribute -- Search Engine Algorithms -- Major Algorithm Updates -- How to Handle Updates -- Measuring SEO Results -- The Problem with Measuring Rankings -- Analytics Is the Objective Measurement…”
    Libro electrónico
  18. 43198
    Publicado 2024
    Tabla de Contenidos: “…. -- See also -- Creating S3 presigned URLs -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Protecting files with S3 versioning and object locking -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Encrypting data on S3 -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 5: Network and EC2 Security with VPCs -- Technical requirements -- Setting up VPC plus VPC resources with minimal effort -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating a bare VPC and setting up public and private subnets -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also…”
    Libro electrónico
  19. 43199
    Publicado 2017
    Tabla de Contenidos: “…. -- Creating a simple @Controller with method-level URL mapping -- Getting started -- How to do it... -- How it works... -- Designing a simple form @Controller -- Getting started -- How to do it... -- How it works... -- Creating a multi-action @Controller -- Getting started -- How to do it... -- How it works... -- Form validation and parameter type conversion -- Getting started -- How to do it... -- How it works... -- Creating request- and session-scoped beans -- Getting started -- How to do it... -- How it works... -- Implementing page redirection and Flash-scoped beans -- Getting started -- How to do it... -- How it works... -- Creating database connection pooling -- Getting started -- How to do it... -- How it works... -- Implementing the DAO layer using the Spring JDBC Framework -- Getting Started -- How to do it... -- How it works... -- Creating a service layer in an MVC application -- Getting started -- How to do it... -- How it works... -- Chapter 4: Securing Spring MVC Applications -- Configuring Spring Security 4.2.2 -- Getting started -- How to do it... -- How it works... -- Mapping sessions to channels and ports -- Getting started -- How to do it... -- How it works... -- Customizing the authentication process -- Getting started…”
    Libro electrónico
  20. 43200
    Publicado 2023
    Tabla de Contenidos: “…-- Conventions -- Errata -- Important URLs -- Contacting the Author -- Disclaimer -- Part I Software Engineering Step-by-Step -- Chapter 1 Software Engineering from 20,000 Feet -- Requirements Gathering -- High-Level Design -- Low-Level Design -- Development -- Testing -- Deployment -- Maintenance -- Wrap-up -- Everything All at Once -- Summary -- What You Learned in This Chapter -- Chapter 2 Before the Beginning -- Document Management -- Historical Documents -- Email -- Code -- Code Documentation -- Application Documentation -- Summary -- What You Learned in This Chapter -- Chapter 3 The Team -- Team Features -- Clear Roles -- Effective Leadership -- Clear Goals -- Consensus -- Open Communication -- Support for Risk-Taking -- Shared Accountability -- Informal Atmosphere -- Trust -- Team Roles -- Common Roles -- More-Specialized Roles -- Informal Roles -- Roles Wrap-Up -- Team Culture -- Interviews -- Interview Puzzles -- The Bottom Line -- Physical Environment -- Creativity -- Office Space -- Ergonomics -- Work-Life Balance -- Collaboration Software -- Searching -- Overload -- Outsourcing -- Summary -- What You Learned in This Chapter -- Chapter 4 Project Management -- Executive Support -- Project Management -- PERT Charts -- Critical Path Methods -- Gantt Charts -- Scheduling Software -- Predicting Times -- Get Experience -- Break Unknown Tasks into Simpler Pieces -- Look for Similarities -- Expect the Unexpected -- Track Progress -- Risk Management -- Summary -- What You Learned in This Chapter -- Chapter 5 Requirements Gathering -- Requirements Defined…”
    Libro electrónico