Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- TFC 5,514
- PFC 2,817
- TFM 2,674
- Empreses 1,796
- TFG 1,791
- Direcció i administració 1,507
- Gestió de projectes 1,411
- Arquitectura 1,410
- Història 1,175
- Planificació estratègica 1,024
- Planificació 944
- Sistemes d'informació per a la gestió 831
- PFG 772
- TFMP 735
- Arquitectura domèstica 728
- Ensenyament 685
- Innovacions tecnològiques 659
- Llibres de text 593
- Habitatges 550
- Congressos 546
- Edificis 534
- Aspectes socials 490
- Política i govern 453
- Comerç electrònic 452
- Disseny 450
- Pàgines web 428
- Revistes 414
- Educació primària 413
- Xarxes d'ordinadors 401
- Màrqueting 385
-
43181Publicado 2024Tabla de Contenidos: “…The evolution of distributed systems -- Designing a distributed queue -- Designing a pub/sub system -- Key characteristics of pub/sub systems -- Pub/sub system design considerations -- Kafka -- The importance of Kafka in distributed systems -- Kafka Streams -- Kinesis -- Summary -- Part 3: System Design in Practice -- Chapter 8: Design and Implementation of System Components: API, Security, and Metrics -- REST APIs -- Design principles of REST APIs -- Use cases for REST APIs -- Strengths and weaknesses -- gRPC APIs -- Design principles of gRPC APIs -- Use cases for gRPC APIs -- Strengths and weaknesses -- Comparing REST and gRPC -- API security -- Authentication -- Authorization -- Secure communication of APIs -- Rate limiting -- Distributed systems logging -- Centralized logging -- Best practices for implementing distributed logging -- Metrics in a distributed system -- Types of metrics -- Open source tools for metrics -- Best practices for implementing metrics -- Alerting in a distributed system -- Designing effective alerts -- Open-source tools for alerting -- Best practices for implementing alerting -- Tracing in a distributed system -- Distributed tracing -- Open-source tools for distributed tracing -- Best practices for implementing tracing -- Best practices -- Summary -- Chapter 9: System Design - URL Shortener -- Real-world use cases -- Functional requirements -- Non-functional requirements -- Client APIs needed -- Estimates and calculations -- System design -- Core challenge -- Choice of database -- High-level solution architecture -- Requirements verification -- Summary -- Chapter 10: System Design - Proximity Service -- Real-world use cases -- Functional requirements -- Non-functional requirements -- Client APIs needed -- Estimates and calculations -- System design -- High-level system design -- Core challenge…”
Libro electrónico -
43182por Simovic, VladimirTabla de Contenidos: “…-- 1.4 Grundlegende Einstellungen -- 1.4.1 Allgemein -- 1.4.2 Schreiben - Einstellungen für das Schreiben von Beiträgen -- 1.4.3 Lesen - Startseite, Blogseite und Newsfeed konfigurieren -- 1.4.4 Diskussion - Einstellungen für Kommentare und mehr -- 1.4.5 Medien - Bildeinstellungen -- 1.4.6 Permalinks - sprechende URLs erstellen -- 1.4.7 Datenschutz -- 2 WordPress anpassen -- 2.1 Backend anpassen -- 2.2 Profil anpassen -- 2.2.1 Persönliche Optionen -- 2.2.2 Name -- 2.2.3 Kontaktinformationen -- 2.2.4 Über Dich -- 2.2.5 Benutzerkonten-Verwaltung -- 2.2.6 Anwendungspasswörter -- 2.3 Benutzerverwaltung (Rechtemanagement) -- 2.4 Plugins -- 2.4.1 Plugins installieren -- 2.5 Themes -- 2.5.1 Themes installieren -- 3 Seiten und Beiträge verfassen und bearbeiten -- 3.1 Worin unterscheiden sich Beiträge von Seiten? …”
Publicado 2022
Libro electrónico -
43183por Press, Posts & TelecomTabla de Contenidos: “…Intro -- 内容提 -- 作 简介 -- 审稿人简介 -- 前 -- 源与支持 -- 目录 -- 第1章 取数据与清洗数据 -- 1.1 简介 -- 1.2 使用 Java 从分层目录中提取所有文件名 -- 准备工作 -- 操作步 -- 1.3 使用Apache Commons IO从多层目录中提取所有文件名 -- 准备工作 -- 操作步 -- 1.4 使用 Java 8 从文本文件一次性 取所有内容 -- 操作步 -- 1.5 使用Apache Commons -- 准备工作 -- 操作方法 -- 1.6 使用Apache Tika 提取PDF 文本 -- 准备知 -- 操作步 -- 1.7 使用正则 式清洗 ASCII 文本文件 -- 操作步 -- 1.8 使用Univocity 析CSV 文件 -- 准备工作 -- 操作步 -- 1.9 使用Univocity 析TSV 文件 -- 准备工作 -- 操作步 -- 1.10 使用JDOM 析XML 文件 -- 准备工作 -- 操作步 -- 1.11 使用JSON.simple 编写JSON 文件 -- 准备工作 -- 操作步 -- 1.12 使用JSON.simple 取JSON 文件 -- 准备工作 -- 操作步 -- 1.13 使用JSoup 从一个URL 提取Web 数据 -- 准备工作 -- 操作步 -- 1.14 使用Selenium Webdriver 从网站提取Web 数据 -- 准备工作 -- 操作步 -- 1.15 从MySQL 数据库 取 格数据 -- 准备工作 -- 操作步 -- 第2章 为数据建立索引与搜索数据 -- 2.1 简介 -- 2.2 使用Apache Lucene 为数据建立索引 -- 准备工作 -- 操作步 -- 工作原理 -- 2.3 使用Apache Lucene 搜索带索引的数据 -- 准备工作 -- 操作步 -- 第3章 数据统 分析 -- 3.1 简介 -- 3.2 生成描 性统 -- 操作步 -- 3.3 生成概 统 -- 操作步 -- 3.4 从多种分布生成概 统 -- 操作步 -- 更多内容 -- 3.5 算 率分布 -- 操作步 -- 3.6 算字符串中的 -- 操作步 -- 工作原理 -- 3.7 使用Java 8 算字符串中的 -- 操作步 -- 3.8 算简单回归 -- 操作步 -- 3.9 算普 最小二乘回归 -- 操作步 -- 3.10 算广义最小二乘回归 -- 操作步 -- 3.11 算两组数据点的协方差 -- 操作步 -- 3.12 为两组数据点 算皮尔 相关系数 -- 操作步 -- 3.13 执 对t检 -- 操作步 -- 3.14 执 卡方检 -- 操作步 -- 3.15 执 单因素方差分析 one-way ANOVA test -- 操作步 -- 3.16 执 K-S 检 -- 操作步 -- 第4章 数据学习I -- 4.1 简介 -- 4.2 创建与保存ARFF 文件 -- 操作步 -- 4.3 对机器学习模型 交叉 -- 操作步 -- 4.4 对新的测 数据 分类 -- 准备工作 -- 操作步 -- 4.5 使用 滤分类器对新测 数据分类 -- 操作步 -- 4.6 创建线性回归模型 -- 操作步 -- 4.7 创建 回归模型 -- 操作步 -- 4.8 使用K均值算法对数据点 类 -- 操作步 -- 4.9 依据类别对数据 类处理 -- 操作方法 -- 4.10 学习数据 的关 则 -- 准备工作 -- 操作步 -- 4.11 使用低层方法、 滤方法、元分类器方法 择特征/属性 -- 准备工作 -- 操作步 -- 第5章 数据学习II -- 5.1 简介 -- 5.2 使用Java 机器学习库 Java-ML 向数据应用机器学习 -- 准备工作 -- 操作步 -- 5.3 使用斯坦福分类器对数据点分类 -- 准备工作 -- 操作步 -- 工作原理 -- 5.4 使用MOA 对数据点分类 -- 准备工作 -- 操作步 -- 5.5 使用 Mulan 对多标签数据点 分类 -- 准备工作 -- 操作步 -- 第6章 从文本数据提取信息 -- 6.1 简介 -- 6.2 使用Java 检测标 单…”
Publicado 2024
Libro electrónico -
43184por Jaer, André de
Publicado 2011Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Universidad Loyola - Universidad Loyola Granada, Biblioteca Universidad de Deusto, Red de bibliotecas Iglesia Navarra, Biblioteca Universitat Ramon Llull, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca del Instituto Superior de Teología de las Islas Canarias)Libro -
43185
-
43186por Lluch Frechina, Enrique, 1967-
Publicado 2015Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca de Pastoral Madrid, Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad de Navarra, Biblioteca Central de Capuchinos de España, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca Universitat Ramon Llull)Libro -
43187Publicado 1992Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca Universitat Ramon Llull, Biblioteca de Pastoral Madrid, Universidad Loyola - Universidad Loyola Granada, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Diocesana Bilbao, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Universidad de Deusto, Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Biblioteca de la Universidad de Navarra)Libro
-
43188por Barrientos García, José
Publicado 2011Red de Bibliotecas de la Diócesis de Córdoba (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca de la Universidad de Navarra, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca Universidad de Deusto, Biblioteca Universitat Ramon Llull, Universidad Loyola - Universidad Loyola Granada)Libro -
43189Publicado 2021Tabla de Contenidos: “…Cover -- Copyright -- Foreword -- Contributors -- Table of Contents -- Preface -- Section 1: Exploring and the Building Blocks of VB -- Chapter 1: What, Why, and How (WWH) of Visual Builder -- Technical requirements -- Introducing VB -- Reviewing the features and benefits of VB -- Knowing the tools required to use VB -- Knowing the technologies used in VB -- Understanding the VB architecture -- Summary -- Questions -- Chapter 2: Provisioning and Understanding the Visual Builder Instance -- Technical requirements -- Provisioning a VB instance -- Creating an instance using Quick Start -- Creating a custom instance -- Creating users and assigning roles -- Adding a user to IDCS -- Assigning a role to a user -- Deriving the cost of using VB -- Accessing the VB instance -- Accessing VB via the Visual Builder instance page -- Accessing VB using a direct URL -- Exploring various navigations of VB -- All Applications -- Settings -- Certificates -- Summary -- Questions -- Chapter 3: Exploring Visual Builder Ingredients -- Technical requirements -- Creating a VB application -- Understanding Business Objects -- Working with Business Objects -- Exploring Service Connections -- Various options to create a Service Connection -- Understanding variables, their types, and their scopes -- Understanding implicit objects of VB -- Exploring events and Action Chains -- Events -- Action Chains -- Actions inside an Action Chain -- Understanding the application's structure -- Understanding the various editors and the application designer -- Summary -- Questions -- Section 2: Working with Data and Services -- Chapter 4: Creating and Managing Business Objects -- Technical requirements -- Creating and modifying a Business Object -- Creating a Business Object -- Modifying a Business Object -- Adding a formula to a field -- Creating a relationship between Business Objects…”
Libro electrónico -
43190Publicado 2022Tabla de Contenidos: “…Updating an Index When Data Is Modified -- Index Rebuilds -- Database Recovery After Failure or Shutdown -- Joins -- Summary -- Chapter 17: Setting Up TPM Attestation -- Prerequisites for Your SQL Server to Support TPM Attestation -- Artifacts That Are Required by Attestation -- TPM Endorsement Key Certificate -- TPM Baseline -- Code Integrity Policy -- Installing and Configuring HGS -- Configuring the SQL Server -- Install the Attestation Client Components -- Making Sure VBS Is Configured Correctly -- Configure the Attestation URL -- Configuring a Code Integrity Policy -- Collect and Register Attestation Artifacts -- Check SQL Server Can Attest Successfully -- Configure the Enclave Type in SQL Server -- Summary -- Part V: Completing the Picture -- Chapter 18: Encryption In Transit Using Transport Layer Security -- How TLS Works -- Obtaining a Certificate to Use for TLS -- Setting Up TLS on Your SQL Server -- Performance -- Summary -- Chapter 19: Hashing and Salting of Passwords -- Hashing -- Salting -- Using the HASHBYTES Function -- Storing Passwords Using HASHBYTES and a Salt Value -- Summary -- Chapter 20: Extensible Key Management (EKM) -- Creating the Required Objects in Azure -- Creating the Resource Group -- Creating the Azure Active Directory App Registration -- Creating the Key Vault -- Setting Up TDE to Use Azure Key Vault -- Creating the Key for TDE -- Setting Up the SQL Server -- Working with Always Encrypted and EKM -- Creating a CMK in Azure Key Vault -- Encrypting Columns and Working with Data -- Working with Azure Key Vault from Your Application -- Summary -- Chapter 21: Other Methods of Column Encryption -- Encryption Using a Symmetric Key -- Your Key Hierarchy -- Working with Automated Key Management -- Creating the Keys -- Encrypting and Decrypting Data -- Using an Authenticator -- Where the DMK Is Not Protected by the SMK…”
Libro electrónico -
43191Publicado 2017Tabla de Contenidos: “…Running the Script -- The Results -- #42 Deleting a User Account -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #43 Validating the User Environment -- The Code -- How It Works -- Running the Script -- The Results -- #44 Cleaning Up After Guests Leave -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 6: System Administration: System Maintenance -- #45 Tracking Set User ID Applications -- The Code -- How It Works -- Running the Script -- The Results -- #46 Setting the System Date -- The Code -- How It Works -- Running the Script -- The Results -- #47 Killing Processes by Name -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #48 Validating User crontab Entries -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #49 Ensuring that System cron Jobs Are Run -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #50 Rotating Log Files -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #51 Managing Backups -- The Code -- How It Works -- Running the Script -- The Results -- #52 Backing Up Directories -- The Code -- How It Works -- Running the Script -- The Results -- Chapter 7: Web and Internet Users -- #53 Downloading Files via FTP -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #54 Extracting URLs from a Web Page -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #55 Getting GitHub User Information -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #56 ZIP Code Lookup -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #57 Area Code Lookup -- The Code -- How It Works…”
Libro electrónico -
43192Publicado 2016Tabla de Contenidos: “…Stashing away your changes -- Using git stash -- Stash and the staging area -- Stash internals -- Un-applying a stash -- Recovering stashes that were dropped erroneously -- Managing worktrees and the staging area -- Examining files and directories -- Searching file contents -- Un-tracking, un-staging, and un-modifying files -- Resetting a file to the old version -- Cleaning the working area -- Multiple working directories -- Summary -- Chapter 5: Collaborative Development with Git -- Collaborative workflows -- Bare repositories -- Interacting with other repositories -- The centralized workflow -- The peer-to-peer or forking workflow -- The maintainer or integration manager workflow -- The hierarchical or dictator and lieutenants workflows -- Managing remote repositories -- The origin remote -- Listing and examining remotes -- Adding a new remote -- Updating information about remotes -- Renaming remotes -- Changing the remote URLs -- Changing the list of branches tracked by remote -- Setting the default branch of remote -- Deleting remote-tracking branches -- Support for triangular workflows -- Transport protocols -- Local transport -- Smart transports -- Native Git protocol -- SSH protocol -- Smart HTTP(S) protocol -- Offline transport with bundles -- Cloning and updating with bundle -- Using bundle to update an existing repository -- Utilizing bundle to help with the initial clone -- Remote transport helpers -- Transport relay with remote helpers -- Using foreign SCM repositories as remotes -- Credentials/password management -- Asking for passwords -- Public key authentication for SSH -- Credential helpers -- Publishing your changes upstream -- Pushing to a public repository -- Generating a pull request -- Exchanging patches -- Chain of trust -- Content-addressed storage -- Lightweight, annotated, and signed tags -- Lightweight tags…”
Libro electrónico -
43193Publicado 2018Tabla de Contenidos: “…Import orderer settings at member organizations -- Setting up a private channel -- Create a new channel as the founder -- Adding member peers to the channel -- Summary -- Chapter 12: Designing and Developing Your First Smart Contract -- The proposed application -- Model-first design approach -- Designing the participants and base assets -- Designing the accident assets and transactions -- Designing the repair assets and transactions -- Designing the insurance assets and transactions -- Setting up the necessary development tools -- Installing cURL -- Installing Docker and Docker Compose -- Installing the Go programming language -- Step 1 - Installing Go -- Step 2 - Setting environment paths -- Step 3 - Setting up your Go workspace -- Downloading platform-specific binaries -- Installing Visual Studio Code (IDE) -- Programming the smart contract -- Setting up a workspace in VSCode -- Installing missing Go packages and commands -- Programming the actual chaincode -- Programming the initial chaincode skeleton -- Adding the data model objects -- Programming the ReportAccident transaction -- Summary -- Chapter 13: Deploying and Testing Your First Smart Contract -- Deploying your smart contract -- Installing chaincode on the founder's peers -- Activating the chaincode on a channel -- Installing a new version of our chaincode -- Installing chaincode on member organizations -- Exposing smart contracts using the REST proxy -- Exposing chaincode using the Advanced method -- Exposing chaincode using the Quick method -- Testing a smart contract using a REST client -- Installing a client to call the REST proxy's API -- Importing and testing chaincode API requests -- Available REST proxy APIs -- Getting the version of the OBCS API -- Overview of chaincode interactions -- Setting up all of the required demo assets -- Reading asset data to check the current values…”
Libro electrónico -
43194Publicado 2015Tabla de Contenidos: “…The Hadoop Distributed Filesystem -- The Design of HDFS -- HDFS Concepts -- Blocks -- Namenodes and Datanodes -- Block Caching -- HDFS Federation -- HDFS High Availability -- The Command-Line Interface -- Basic Filesystem Operations -- Hadoop Filesystems -- Interfaces -- The Java Interface -- Reading Data from a Hadoop URL -- Reading Data Using the FileSystem API -- Writing Data -- Directories -- Querying the Filesystem -- Deleting Data -- Data Flow -- Anatomy of a File Read -- Anatomy of a File Write -- Coherency Model -- Parallel Copying with distcp -- Keeping an HDFS Cluster Balanced -- Chapter 4. …”
Libro electrónico -
43195Publicado 2015Tabla de Contenidos: “…Web Scraping -- Project: mapit.py with the webbrowser Module -- Step 1: Figure Out the URL -- Step 2: Handle the Command Line Arguments -- Step 3: Handle the Clipboard Content and Launch the Browser -- Ideas for Similar Programs -- Downloading Files from the Web with the requests Module -- Downloading a Web Page with the requests.get() Function -- Checking for Errors -- Saving Downloaded Files to the Hard Drive -- HTML -- Resources for Learning HTML -- A Quick Refresher…”
Libro electrónico -
43196Publicado 2023Tabla de Contenidos: “…Drive-by downloads -- Stealing passwords -- Exploiting Maintenance Difficulties -- Advanced Attacks -- Opportunistic attacks -- Targeted attacks -- Blended (opportunistic and targeted) attacks -- Some Technical Attack Techniques -- Rootkits -- Brute-force attacks -- Injection attacks -- Cross-site scripting -- SQL injection -- Session hijacking -- Malformed URL attacks -- Buffer overflow attacks -- Chapter 3 The Bad Guys You Must Defend Against -- Bad Guys and Good Guys Are Relative Terms -- Bad Guys Up to No Good -- Script kiddies -- Kids who are not kiddies -- Terrorists and other rogue groups -- Nations and states -- Corporate spies -- Criminals -- Hacktivists -- Terrorists -- Rogue insiders -- Cyberattackers and Their Colored Hats -- How Cybercriminals Monetize Their Actions -- Direct financial fraud -- Indirect financial fraud -- Profiting off illegal trading of securities -- Stealing credit card, debit card, and other payment-related information -- Stealing goods -- Stealing data -- Ransomware -- Cryptominers -- Not All Dangers Come From Attackers: Dealing with Nonmalicious Threats -- Human error -- Humans: The Achilles' heel of cybersecurity -- Social engineering -- External disasters -- Natural disasters -- Pandemics -- Environmental problems caused by humans -- Cyberwarriors and cyberspies -- The impotent Fair Credit Reporting Act -- Expunged records are no longer really expunged -- Social Security numbers -- Social media platforms -- Google's all-knowing computers -- Mobile device location tracking -- Defending against These Attackers -- 2 Personal Cybersecurity -- Chapter 1 Evaluating Your Current Cybersecurity Posture -- Don't be Achilles: Identifying Ways You May Be Less than Secure -- Your home computer(s) -- Your mobile devices -- Your Internet of Things (IoT) devices -- Your networking equipment -- Your work environment…”
Libro electrónico -
43197Publicado 2023Tabla de Contenidos: “…-- The Importance of Keyword Research -- Researching Keywords -- Implementing Keywords into On-Page Optimization -- Building Credibility with Links -- Links Replicate Human Judgement -- Gaining Links Is About Quality, not Quantity -- Link Structure -- Link Attributes -- Building Links -- Website Architecture and Technical SEO -- Architecture -- Duplicate Content -- Canonical URLs -- Redirects -- Robots.txt -- Sitemaps -- Speed (Load Time) -- Hreflang Attribute -- Search Engine Algorithms -- Major Algorithm Updates -- How to Handle Updates -- Measuring SEO Results -- The Problem with Measuring Rankings -- Analytics Is the Objective Measurement…”
Libro electrónico -
43198Publicado 2024Tabla de Contenidos: “…. -- See also -- Creating S3 presigned URLs -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Protecting files with S3 versioning and object locking -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Encrypting data on S3 -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 5: Network and EC2 Security with VPCs -- Technical requirements -- Setting up VPC plus VPC resources with minimal effort -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating a bare VPC and setting up public and private subnets -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also…”
Libro electrónico -
43199Publicado 2017Tabla de Contenidos: “…. -- Creating a simple @Controller with method-level URL mapping -- Getting started -- How to do it... -- How it works... -- Designing a simple form @Controller -- Getting started -- How to do it... -- How it works... -- Creating a multi-action @Controller -- Getting started -- How to do it... -- How it works... -- Form validation and parameter type conversion -- Getting started -- How to do it... -- How it works... -- Creating request- and session-scoped beans -- Getting started -- How to do it... -- How it works... -- Implementing page redirection and Flash-scoped beans -- Getting started -- How to do it... -- How it works... -- Creating database connection pooling -- Getting started -- How to do it... -- How it works... -- Implementing the DAO layer using the Spring JDBC Framework -- Getting Started -- How to do it... -- How it works... -- Creating a service layer in an MVC application -- Getting started -- How to do it... -- How it works... -- Chapter 4: Securing Spring MVC Applications -- Configuring Spring Security 4.2.2 -- Getting started -- How to do it... -- How it works... -- Mapping sessions to channels and ports -- Getting started -- How to do it... -- How it works... -- Customizing the authentication process -- Getting started…”
Libro electrónico -
43200Publicado 2023Tabla de Contenidos: “…-- Conventions -- Errata -- Important URLs -- Contacting the Author -- Disclaimer -- Part I Software Engineering Step-by-Step -- Chapter 1 Software Engineering from 20,000 Feet -- Requirements Gathering -- High-Level Design -- Low-Level Design -- Development -- Testing -- Deployment -- Maintenance -- Wrap-up -- Everything All at Once -- Summary -- What You Learned in This Chapter -- Chapter 2 Before the Beginning -- Document Management -- Historical Documents -- Email -- Code -- Code Documentation -- Application Documentation -- Summary -- What You Learned in This Chapter -- Chapter 3 The Team -- Team Features -- Clear Roles -- Effective Leadership -- Clear Goals -- Consensus -- Open Communication -- Support for Risk-Taking -- Shared Accountability -- Informal Atmosphere -- Trust -- Team Roles -- Common Roles -- More-Specialized Roles -- Informal Roles -- Roles Wrap-Up -- Team Culture -- Interviews -- Interview Puzzles -- The Bottom Line -- Physical Environment -- Creativity -- Office Space -- Ergonomics -- Work-Life Balance -- Collaboration Software -- Searching -- Overload -- Outsourcing -- Summary -- What You Learned in This Chapter -- Chapter 4 Project Management -- Executive Support -- Project Management -- PERT Charts -- Critical Path Methods -- Gantt Charts -- Scheduling Software -- Predicting Times -- Get Experience -- Break Unknown Tasks into Simpler Pieces -- Look for Similarities -- Expect the Unexpected -- Track Progress -- Risk Management -- Summary -- What You Learned in This Chapter -- Chapter 5 Requirements Gathering -- Requirements Defined…”
Libro electrónico