Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- TFC 5,514
- PFC 2,817
- TFM 2,674
- Empreses 1,796
- TFG 1,791
- Direcció i administració 1,507
- Gestió de projectes 1,411
- Arquitectura 1,410
- Història 1,175
- Planificació estratègica 1,024
- Planificació 944
- Sistemes d'informació per a la gestió 831
- PFG 772
- TFMP 735
- Arquitectura domèstica 728
- Ensenyament 685
- Innovacions tecnològiques 659
- Llibres de text 593
- Habitatges 550
- Congressos 546
- Edificis 534
- Aspectes socials 490
- Política i govern 453
- Comerç electrònic 452
- Disseny 450
- Pàgines web 428
- Revistes 414
- Educació primària 413
- Xarxes d'ordinadors 401
- Màrqueting 385
-
43321Publicado 2003“…Page 204 How do I find a URL or an email address in text? Page 228 How do I process a report with a concrete state machine? …”
Libro electrónico -
43322Publicado 2007“…You will see how symfony can make your life easier by effectively managing form data, enhancing the user experience with Ajax, internationalizing applications for a global audience, and using smart URLs. Authors François Zaninotto and Fabien Potencier put a strong emphasis on the tools that symfony provides for professional environments, showing you how to take advantage of unit tests, scaffolding, plug-ins, the command line, and extensible configuration. …”
Libro electrónico -
43323por Geary, David M.“…Key topics covered: Building HTML forms; accessing form data, JavaBeans components (beans), collections, and maps; constructing URLs and importing their content; redirecting HTTP responses; iterating over collections of objects; handling errors Localizing Web sites for multiple languages and countries, including localizing text and formatting and parsing numbers, currencies, percents, and dates. …”
Publicado 2003
Libro electrónico -
43324Publicado 2015“…To facilitate this process, over 15 videos have been identified and their URLs have been provided so that students can pursue them. …”
Libro electrónico -
43325por Howard, Michael, 1965-“…Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilities Use of magic URLs, predictable cookies, and hidden form fields Buffer overruns Format string problems Integer overflows C++ catastrophes Insecure exception handling Command injection Failure to handle errors Information leakage Race conditions Poor usability Not updating easily Executing code with too much privilege Failure to protect stored data Insecure mobile code Use of weak password-based systems Weak random numbers Using cryptography incorrectly Failing to protect network traffic Improper use of PKI Trusting network name resolution…”
Publicado 2009
Libro electrónico -
43326por De Jonge, Adriaan“…Coverage includes Setting up a development environment that makes it easy to continually address performance Understanding the anatomy of a Google App Engine application Making the right technical setup and design choices for each new application Efficiently modeling data for App Engine’s NoSQL data storage Recognizing when to avoid OR-mapping and pass datastore entities directly to HTML templates Finding alternatives to frameworks and libraries that impair App Engine performance Using JavaScript and AJAX on the client side of your cloud applications Improving browser performance and reducing resource consumption via better use of HTML5 and CSS3 Taking advantage of key App Engine APIs: datastore, blobstore, mail, task scheduling, memory caching, URL retrieval, and messaging Securing cloud-based Web applications with Google Accounts, OpenID, and OAuth Improving your cloud development, quality assurance, and deployment processes Targeting, marketing, and selling cloud solutions, from planning to payment handling…”
Publicado 2011
Libro electrónico -
43327“…You will: Leverage the new features in JSF 2.3 in your existing applications Integrate JSF and CDI Use the brand new Component Search Expression framework, which enables you to more easily locate components from your template Extend the Component Search Expression framework with your own search operators Work with the different ways of mapping requests to JSF, make your application use extensionless URLs, and programmatically inspect which resources are present in your application Master the best practices for web application development and see which are obsolete…”
Libro electrónico -
43328Publicado 2022“…Mellon Foundation, the Carnegie Corporation of New York, the MIT Press, and the Digital Publications Initiative of Brown University. The URL for this project will be islamic-pasts-futures.org…”
Libro electrónico -
43329por Fernández Gómez, Eva
Publicado 2002Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universidad de Deusto)Libro -
43330Publicado 2016“…programming platforms Covers new features of Java 8 such as closures, the most eagerly anticipated language feature in years Easy-to-understand, practical examples clearly illustrate the fundamentals of Java programming Discover how Swing can help you quickly develop programs with a graphical user interface Find out about JDBC 4.2 programming with the Derby database and XML parsing with the open source XOM class library Learn how to use streams to write programs that communicate with the Internet, including socket programming, buffers, channels, and URL handling. Register your book at informit.com/register for convenient access to downloads, updates, and corrections as they become available…”
Libro electrónico -
43331Publicado 2023“…Share your view onto the data painlessly by storing your search parameters in the URL. Data is one of the most valuable assets of your business, but you cannot unlock its potential if you don't know how to make it accessible. …”
Libro electrónico -
43332Publicado 2002“…Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. …”
Libro electrónico -
43333por Hougland, Damon“…Make the most of scriptlets, expressions, declarations, actions and directives Get under the hood with Sun's JSP engine: multithreading, persistence, implicit objects, and more Understand JSP requests and responses—in depth Track sessions and data: hidden frames and form fields, cookies, URL rewriting, and the HttpSession API Integrate databases: JDBCTM, SQL, metadata, connection pooling, and more Creating custom JSP actions (custom tags) Optimize the performance of your JSP pages Every Core Series book: DEMONSTRATES how to write commercial quality code FEATURES dozens of nontrivial programs and examples—no toy code! …”
Publicado 2001
Libro electrónico -
43334Publicado 2003“…The recipes in the PHP Cookbook range from simple tasks, such as sending a database query and fetching URLs, to entire programs that demonstrate complex tasks, such as printing HTML tables and generating bar charts. …”
Libro electrónico -
43335por Donahoe, Lee“…Deploying a simple but real website to the live Web right away Adding advanced styling to websites, including CSS Flexbox and CSS Grid Installing and configuring Jekyll, a static site generator Getting started with templating systems and programming languages Mastering key layout principles for web design Registering and configuring custom domains, with custom URLs and email addresses Receiving email at your domain with Google's G Suite Setting up analytics to better understand your sites visitors Making all these technologies work well together Michael Hartl's Learn Enough series includes books and video courses that focus on the most important parts of each subject, so you don't have to learn everything to get started--you just have to learn enough to be dangerous and solve technical problems yourself. …”
Publicado 2022
Libro electrónico -
43336por Weltman, Rob, 1953-“…Specific topics covered include: The LDAP naming and information models The command-line tools of the SDK Authentication with a password, SSL, and SASL Configuring access control Writing LDAP applets for a browser Accessing the SDK from JavaScript Storing configuration and preferences in a directory Encapsulating LDAP functionality in a JavaBean Using LDAP in Java servlets LDAP URLs Multiple threads and multiple connections Referrals and replicated systems LDAP controls Synchronous and asynchronous operations Performance tips LDAP Programming with Java (TM) also presents numerous examples, from simple code snippets to complete components and applications…”
Publicado 2000
Libro electrónico -
43337Publicado 2006“…Table of Contents Welcome to the Blogosphere A general discussion on blogs--what they are, how they work, and why people blog Introducing the New Version of Blogger Introduction to Blogger; discussion of the new and changed features in the new version of Blogger Launching Your First Blog Detailed step-by-step instructions on how to create a Blogger blog Creating New Blog Posts Posting from the Blogger dashboard, posting from the Google toolbar, categorizing your posts with labels Multimedia and Mobile Blogging Including photos, feeds, and other media in your posts; mobloging from mobile phones Managing Your Blog Using the Dashboard to manage your blog, controlling who can read your blog, creating a private blog, managing comments, examining blog usage statistics Customizing Your Blog Choosing new Blogger templates, customizing templates, adding new page elements, coding non-standard elements with HTML Hosting Your Own Blog Detailed instructions on how to host a Blogger blog on your own website; also covers how to assign a dedicated domain or URL to your blog Syndicating Your Blog Adding RSS and Atom feeds, syndicating the feed, customizing your feed for individual posts or comments Making Money from Your Blog Adding Google AdSense and other advertising to your blog…”
Libro electrónico -
43338por Walther, Stephen“…Understand how to: Build enterprise-scale web applications far more rapidly and effectively Develop web applications that are easier to maintain and extend over time Gain unprecedented control over the appearance of your website or application Expose intuitive URLs that are friendlier to search engines and users alike Create ASP.NET MVC models that contain all your application’s business, validation, and data access logic Make the most of HTML helpers, model binders, action filters, routing, and authentication Efficiently deploy your ASP.NET MVC applications Use the lightweight JQuery JavaScript library to easily find and manipulate HTML elements Create ASP.NET MVC applications using unit test and mock object framework…”
Publicado 2009
Libro electrónico -
43339Publicado 2017“…About This Book Discover regular expressions and how they work Implement regular expressions with Java to your code base Learn to use regular expressions in emails, URLs, paths, and IP addresses Who This Book Is For This book is for Java developers who would like to understand and use regular expressions. …”
Libro electrónico -
43340Publicado 2020“…What you will learn Choose an operating system for SQL Server in Azure VMs Use the Azure Management Portal to facilitate the deployment process Verify connectivity and network latency in cloud Configure storage for optimal performance and connectivity Explore various disaster recovery options for SQL Server in Azure Optimize SQL Server on Linux Discover how to back up databases to a URL Who this book is for SQL Server on Azure VMs is for you if you are a developer, data enthusiast, or anyone who wants to migrate SQL Server databases to Azure virtual machines. …”
Libro electrónico