Mostrando 1,221 - 1,240 Resultados de 1,883 Para Buscar '"XML"', tiempo de consulta: 0.10s Limitar resultados
  1. 1221
    por Moore, Dana, 1947-
    Publicado 2008
    Tabla de Contenidos: “…Chapter 7: Physics and VehiclesPHYSICAL OBJECTS; VEHICLES; SUMMARY; Chapter 8: Inventory; INVENTORY PROPERTIES; GIVING INVENTORY; TAKING INVENTORY; PERMISSIONS; SUMMARY; Chapter 9: Special Effects; PARTICLE EFFECTS; TEXTURE ANIMATION; LIGHT; SUMMARY; Chapter 10: Scripting the Environment; TIME; AIR, EARTH, WATER, AND WEATHER; SUMMARY; Chapter 11: Multimedia; WORKING WITH SOUND; STREAMING MEDIA; SUMMARY; Chapter 12: Reaching Outside Second Life; LOADING WEB PAGES IN-WORLD; USING HTTP REQUESTS TO GET DATA FROM THE WEB; USING XML-RPC TO CONTROL SL FROM THE OUTSIDE; SUMMARY…”
    Libro electrónico
  2. 1222
    por Troelsen, Andrew W.
    Publicado 2011
    Tabla de Contenidos: “…The Role of Data BindingControl-to-Control Data Binding; Converting Data Types; Understanding Data Binding Modalities; Binding to Properties of Non-UI Objects; Working with Data Templates; Defining a WPF XML Data Source; Creating a List Details Data Binding; Exploring the Role of Sample Data; Data Binding: A Brief Word on Final Topics; Summary; CHAPTER 7 Designing for Windows Phone 7; Installing the Windows Phone 7 SDK; Exploring the Windows Phone Application Project Type; Exploring the Panorama Application Project Type; Exploring the Pivot Application Project Type…”
    Libro electrónico
  3. 1223
    por Maximo, Rui
    Publicado 2009
    Tabla de Contenidos: “…Object ModelUnified Communications Client API; Scenarios; Considerations; Application Architecture; The UCC API Object Model; Unified Communications AJAX API; Scenarios; Considerations; Application Architecture; XML Model; Office Communications Server 2007 Speech Server Developer Edition; Scenarios; Considerations; Application Architecture; Summary; Additional Resources; Part II: Office Communicator Automation API; Chapter 3: Programming a Microsoft Office Communicator Automation API Application; Signing In to and Out of Office Communicator; Using the Messenger Class…”
    Libro electrónico
  4. 1224
    Publicado 2012
    Tabla de Contenidos: “…7 Development of book publishing business models and financesIntroduction; The impact of digitisation and digital publishing; The stakeholders and market drivers of digital book publishing; The shape and development of new book publishing business models; Conclusion - the future of 'stuff'; Acknowledgement; Further reading; References; 8 Editorial and production workflows; Introduction; Advances in formats and in editorial and production workflows; Metadata and XML-based processing; Electronic production workflows; Business process management and IT systems development; Quality assurance…”
    Libro electrónico
  5. 1225
    Publicado 2014
    Tabla de Contenidos: “…Single countersMultiple counters; Coprocessors; The observer coprocessor; The endpoint coprocessor; The administrative API; The data definition API; Table name methods; Column family methods; Other methods; The HBaseAdmin API; Summary; Chapter 6: HBase Clients; The HBase shell; Data definition commands; Data manipulation commands; Data-handling tools; Kundera - object mapper; CRUD using Kundera; Query HBase using Kundera; Using filters within query; REST client; Getting started; The plain format; The XML format; The JSON format (defined as a key-value pair); The REST Java client…”
    Libro electrónico
  6. 1226
    por Mohanty, Soumendra
    Publicado 2013
    Tabla de Contenidos: “…""References""""Chapter 4: Emerging Database Landscapeimages ""; ""The Database Evolution""; ""The Scale-Out Architecture""; ""The Relational Database and the Non-Relational Database""; ""OldSQL, NewSQL, and the Emerging NoSQL""; ""The Influence of Map-Reduce and Hadoop""; ""Key Value Stores and Distributed Hash Tables""; ""XML Defined Data""; ""Unstructured Data as Un-modeled Data""; ""Database Workloads""; ""Workload Characteristics""; ""Implication of Big Data Scale on Data Processing""; ""Database Technologies for Managing the Workloads""; ""Hardware Architectures and Databases""…”
    Libro electrónico
  7. 1227
    por Juneau, Josh
    Publicado 2013
    Tabla de Contenidos: “…""The Flow Managed Bean""""Navigating View Nodes""; ""Flow EL""; ""Java API for Flow Context""; ""Packaging a Flow""; ""Ajax Queues""; ""File Upload""; ""Stateless Views""; ""HTML5 and JSF""; ""Passthrough Attributes""; ""HTML5-Friendly Markup""; ""Facelets Enhancements""; ""Exclude XML from Custom Components""; ""@FaceletsResourceResolver Annotation""; ""Resource Library Contracts""; ""Security Enhancements""; ""Summary""; ""Chapter 3: Expression Language (EL)""; ""Lambda Expressions""; ""Lambda Concept and Examples""; ""Variable Assignment""; ""Nesting""; ""Passing Lambdas to Java""…”
    Libro electrónico
  8. 1228
    Publicado 2022
    Tabla de Contenidos: “…Dictionary comprehension -- Raw data cleanup -- Chapter 4: Working with Collections -- An overview of function varieties -- Working with iterables -- Parsing an XML file -- Parsing a file at a higher level -- Pairing up items from a sequence -- Using the iter() function explicitly -- Extending an iteration -- Applying generator expressions to scalar functions -- Using any() and all() as reductions -- Using len() and sum() on collections -- Using sums and counts for statistics -- Using zip() to structure and flatten sequences -- Unzipping a zipped sequence -- Flattening sequences…”
    Libro electrónico
  9. 1229
    por Rauland, Patrick
    Publicado 2024
    Tabla de Contenidos: “…Mutually exclusive and collectively exhaustive -- Tagging products -- Optimizing product archive pages -- Writing descriptions for product categories -- Context matters -- Meta-description for categories -- A pretty category description -- URLs -- Redirects in WordPress -- Adding product filters to your Shop page -- Hidden widgets -- Active product filters -- Understanding product blocks -- Single product pages -- Customizing product blocks -- Featuring a product -- The value of blocks -- Summary -- Chapter 4: Attracting Traffic with Search Engine Optimization -- Technical Requirements -- Why you should invest in SEO -- One-off marketing strategies -- Always-on marketing -- Keyword research for e-commerce -- Creating a list of keywords -- Comparing search volume -- Optimizing for keywords -- Configuring breadcrumbs for search engines and users -- Adding custom PHP code -- Using a plugin -- Creating and sharing an XML sitemap -- Submitting an XML sitemap to Google -- Keeping an eye on Google Search Console -- Summary -- Part 2: Managing an Online Store -- Chapter 5: Managing Sales Through WP Admin -- Technical requirements -- Fulfilling orders -- Exploring new order notifications -- New order badge in the site admin -- Browsing orders -- Viewing shipping information -- Packing the boxes -- Printing shipping labels -- Dropping off packages -- Marking orders as complete -- Refunding orders and payments -- Refund requests -- Building a refund process -- Viewing sales data -- WooCommerce analytics -- What sells -- Gross profit -- Taxes -- Using third-party reporting platforms -- Exploring Metorik -- Pick one -- Summary -- Chapter 6: Syncing Product Data -- Exporting out of WooCommerce -- Exploring a CSV file -- Including content in a CSV file -- Importing products via CSV -- Importing a CSV -- Integrating with an ERP -- Finding an ERP…”
    Acceso restringido con credenciales UPSA
    Libro electrónico
  10. 1230
    Publicado 2018
    Tabla de Contenidos: “…Exploitation using Metasploit -- SQL injection -- An SQL primer -- The SELECT statement -- Vulnerable code -- SQL injection testing methodology -- Extracting data with SQL injection -- Getting basic environment information -- Blind SQL injection -- Automating exploitation -- sqlninja -- BBQSQL -- sqlmap -- Attack potential of the SQL injection flaw -- XML injection -- XPath injection -- XPath injection with XCat -- The XML External Entity injection -- The Entity Expansion attack -- NoSQL injection -- Testing for NoSQL injection -- Exploiting NoSQL injection -- Mitigation and prevention of injection vulnerabilities -- Summary -- Chapter 6: Finding and Exploiting Cross-Site Scripting (XSS) Vulnerabilities -- An overview of Cross-Site Scripting -- Persistent XSS -- Reflected XSS -- DOM-based XSS -- XSS using the POST method -- Exploiting Cross-Site Scripting -- Cookie stealing -- Website defacing -- Key loggers -- Taking control of the user's browser with BeEF-XSS -- Scanning for XSS flaws -- XSSer -- XSS-Sniper -- Preventing and mitigating Cross-Site Scripting -- Summary -- Chapter 7: Cross-Site Request Forgery, Identification, and Exploitation -- Testing for CSRF flaws -- Exploiting a CSRF flaw -- Exploiting CSRF in a POST request -- CSRF on web services -- Using Cross-Site Scripting to bypass CSRF protections -- Preventing CSRF -- Summary -- Chapter 8: Attacking Flaws in Cryptographic Implementations -- A cryptography primer -- Algorithms and modes -- Asymmetric encryption versus symmetric encryption -- Symmetric encryption algorithm -- Stream and block ciphers -- Initialization Vectors -- Block cipher modes -- Hashing functions -- Salt values -- Secure communication over SSL/TLS -- Secure communication in web applications -- TLS encryption process -- Identifying weak implementations of SSL/TLS -- The OpenSSL command-line tool -- SSLScan -- SSLyze…”
    Libro electrónico
  11. 1231
    Publicado 2004
    Tabla de Contenidos: “…Web services technology and standards -- 1.1 Web services architecture -- 1.2 Transport layer -- 1.2.1 HTTP -- 1.2.2 JMS -- 1.2.3 SMTP -- 1.2.4 Emerging standards for transport -- 1.3 Service communication protocol layer -- 1.3.1 SOAP -- 1.4 Service description layer -- 1.4.1 XML -- 1.4.2 ebXML -- 1.4.3 WSDL -- 1.5 Service layer -- 1.5.1 Web services and J2EE -- 1.5.2 A new set of Java Specification Requests -- 1.5.3 The Apache Web Services Invoation Framework -- 1.6 Business process layer -- 1.6.1 Process Choreographer -- 1.6.2 WSFL and XLANG -- 1.6.3 Emerging standards for business process -- 1.7 Service registry layer -- 1.7.1 Static and dynamic Web services -- 1.7.2 UDDI -- 1.8 Policy layer -- 1.8.1 Security layer -- 1.8.2 Security at the transport layer -- 1.8.3 Security at the service communication protocol layer -- 1.8.4 Security at the service description layer -- 1.8.5 Emerging standards for security -- 1.8.6 Web services security references for further information -- 1.9 Transaction layer -- 1.9.1 WS-Coordination -- 1.9.2 WS-Transaction -- 1.9.3 Conversation support for Web services -- 1.10 Management layer -- Chapter 2. …”
    Libro electrónico
  12. 1232
    por Parker, David J.
    Publicado 2013
    Tabla de Contenidos: “…Self-describing tree views -- Making informative tooltips -- Linking detail panels -- Editing rule set properties -- Editing rule properties -- Handling special key strokes -- Adding the Explorer actions -- Creating the Add button -- Creating the Add Issue button -- Creating the Paste button -- Creating the Copy button -- Creating the Delete button -- Displaying the rule for a selected issue -- Displaying the issues for the current selection -- Summary -- Chapter 6: Reviewing Validation Rules and Issues -- Extensions to our ribbon -- Annotating Visio diagrams with issues -- Saving the current user settings -- Displaying the issue mark-up page -- Adding in the issue comments -- Hiding the issue mark-up page -- Exporting rule sets to XML -- Getting the XDocument object -- Getting the VERuleSet XElement -- Getting the VEIssue XElement -- Importing rule sets from XML -- Creating rule set reports -- Getting the XSL stylesheet -- Summary -- Chapter 7: Creating Validation Rules -- Overview of the document validation process -- Validating rule sets -- Validating rules -- Processing a rule -- Validation functions -- Useful ShapeSheet functions -- Filter and Test Expressions -- Checking the type of shape -- Checking the category of shapes -- Checking the layer of a shape -- Checking if the page contains relevant shapes -- Checking for specific cell values -- Checking that connectors are connected -- Checking that shapes have correct connections -- Checking whether shapes are outside containers -- Checking whether a shape has text -- Custom validation rules in code -- Summary -- Chapter 8: Publishing Validation Rules and Diagrams -- Overview of Visio categories and templates -- Creating a custom template -- Adding embellishments -- Adding the template description -- The simplest method to provide a template -- Editing the file paths for templates…”
    Libro electrónico
  13. 1233
    Publicado 2004
    Tabla de Contenidos: “…Underlying technology -- Light-weight Directory Access Protocol (LDAP) -- eXtensible Markup Language (XML) -- Microsoft Excel for browsing XML files -- Certificates and encryption -- Secret Key Cryptography -- Public Key Cryptography -- Refinements on cryptographic techniques -- Secure Sockets Layer protocol -- The Record Layer -- The communication protocols -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover…”
    Libro electrónico
  14. 1234
    por Daudi, Husen
    Publicado 2024
    Tabla de Contenidos: “…. -- See also -- Loading data using XML files -- How to do it... -- How it works…”
    Libro electrónico
  15. 1235
    Publicado 2021
    Tabla de Contenidos: “…-- What RAW Means and How to Digitally Process It -- Compressed File Systems -- Uncompressed File Systems -- Common Camera Media Types -- Common File Formats for Cameras -- Common Production Formats -- What Ingest Means and How to Organize It -- Asset Management -- On-Set Grading -- Dailies -- Sources and Types of Metadata -- The Role of the DIT -- The Role of the Data Wrangler -- eXtensible Markup Language ( XML) -- Key XML Terminology -- Cloud Impacts -- 4 Post-Production -- Introduction -- Post-Production in Detail -- Preparation -- Technical Preparation -- Post-Production Specific for TV -- The End Game! …”
    Libro electrónico
  16. 1236
    Publicado 2024
    Tabla de Contenidos: “…-- Program structure -- Console application -- Building a forms application -- The Object Pascal language phrasebook -- Tokens -- Constants -- Types -- Inline variables declaration -- Sets and arrays -- Helpers -- Generics -- Anonymous code -- Operator overloading -- Runtime type information -- Custom attributes -- Summary -- Chapter 3: Packing Up Your Toolbox -- Technical requirements -- Working with files and streams -- Working with JSON -- Writing JSON -- Reading JSON -- Using the JSON wizard in Delphi 12 -- Working with XML -- Summary -- Chapter 4: Using the Parallel Programming Library -- Technical requirements -- Using threads -- Access synchronization -- Calling Synchronize -- Atomic operations -- Using a critical section -- Using TMonitor -- Exploring the Parallel Programming Library -- Parallel loops -- Using tasks -- The beauty of futures -- Summary -- Part 2: Going Mobile -- Chapter 5: Playing with FireMonkey -- Technical requirements -- Drawing in code -- Get moving with timers -- Precise timing -- The power of parenting -- Shapes -- Animations -- Touching the screen -- Touch -- Gestures -- Multi-touch -- Game of Memory -- Designing the game -- Working with images -- Designing the user interface -- Aligning, anchoring, and margins -- Layouts -- Building the main form of the game -- Storing the game's configuration…”
    Libro electrónico
  17. 1237
    por Pugh, Steve
    Publicado 2009
    Tabla de Contenidos: “…STRING UTILITIES -- PDF Generator -- PDF Generator -- pdfGen.rb -- The Code -- Running the Code -- The Results -- How It Works -- Word Frequency -- Word Frequency -- wordFreq.rb -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- Comma-Separated Value Parser -- Comma-Separated Value Parser -- csv.rb -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- CSV to XML -- CSV to XML -- csvToXML.rb -- The Code -- Running the Code -- The Results…”
    Libro electrónico
  18. 1238
    Publicado 2018
    Tabla de Contenidos: “…Intro -- Secure by Design -- brief contents -- contents -- front matter -- foreword -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- about the authors -- about the cover illustration -- Part 1 Introduction -- 1 Why design matters for security -- 1.1 Security is a concern, not a feature -- 1.1.1 The robbery of Öst-Götha Bank, 1854 -- 1.1.2 Security features and concerns -- 1.1.3 Categorizing security concerns: CIA-T -- 1.2 Defining design -- 1.3 The traditional approach to software security and its shortcomings -- 1.3.1 Explicitly thinking about security -- 1.3.2 Everyone is a security expert -- 1.3.3 Knowing all and the unknowable -- 1.4 Driving security through design -- 1.4.1 Making the user secure by design -- 1.4.2 The advantages of the design approach -- 1.4.3 Staying eclectic -- 1.5 Dealing with strings, XML, and a billion laughs -- 1.5.1 Extensible Markup Language (XML) -- 1.5.2 Internal XML entities in a nutshell -- 1.5.3 The Billion Laughs attack -- 1.5.4 Configuring the XML parser -- 1.5.5 Applying a design mindset -- 1.5.6 Applying operational constraints -- 1.5.7 Achieving security in depth -- Summary -- 2 Intermission: The anti-Hamlet -- 2.1 An online bookstore with business integrity issues -- 2.1.1 The inner workings of the accounts receivable ledger -- 2.1.2 How the inventory system tracks books in the store -- 2.1.3 Shipping anti-books -- 2.1.4 Systems living the same lie -- 2.1.5 A do-it-yourself discount voucher -- 2.2 Shallow modeling -- 2.2.1 How shallow models emerge -- 2.2.2 The dangers of implicit concepts -- 2.3 Deep modeling -- 2.3.1 How deep models emerge -- 2.3.2 Make the implicit explicit -- Summary -- Part 2 Fundamentals -- 3 Core concepts of Domain-Driven Design…”
    Libro electrónico
  19. 1239
    Publicado 2022
    Tabla de Contenidos: “…PROGRAMACIÓN FUNCIONAL AVANZADA -- ESTRUCTURAS DE DATOS FUNCIONALES: LISTAS INMUTABLES -- ENTRADA/SALIDA EN UN ENTORNO FUNCIONAL -- REFACTORIZACIÓN DE PROGRAMAS IMPERATIVOS: CARGA DE UN FICHERO DE PROPIEDADES -- REFACTORIZACIÓN DE PROGRAMAS IMPERATIVOS: LECTURA DE UN FICHERO XML -- ESTRUCTURAS DE DATOS FUNCIONALES: ÁRBOLES BINARIOS DE BÚSQUEDA -- ESTRUCTURAS DE DATOS FUNCIONALES: MAPAS -- 6. …”
    Libro electrónico
  20. 1240
    Publicado 2021
    Tabla de Contenidos: “…Section 3: Hands-On Practical GitOps -- Chapter 08: Practicing the Basics - Declarative Language File Building -- Nesting and flat files -- XML file building -- JSON file building -- YAML file building -- Templatization types -- Summary -- Chapter 09: Originalist Gitops in Practice - Continuous Deployment -- Setting up minikube -- Homebrew -- VirtualBox -- kubectl -- minikube -- Setting up VSCode -- Downloading and installing -- Adding extensions -- Setting up Kubernetes and Helm -- Installing Helm -- Creating a Helm chart -- Removing unwanted files -- Adding required files -- Adding required information -- Exploring the files -- Testing the deployment -- Local continuous deployment with GitOps file building -- Starting minikube -- Run on Save configuration -- GitHub -- GitHub access -- Originalist GitOps with Argo CD -- Starting minikube -- Disabling the Run on Save extension -- Installing Argo CD -- Installing Argo CD CLI -- Argo CD API server access -- Logging in via the CLI -- Registering the cluster -- Creating an application from a Git repository -- Pushing a change -- Summary -- Chapter 10: Verified GitOps Setup: Continuous Delivery GitOps with Harness -- Mapping out the process -- One manifest or many -- Simple LAMP stack deployment -- Advanced setup for Tomcat with Memcached and failover -- A manifest for integrations -- A manifest for configuration -- A manifest for execution -- A manifest for delivery -- Verified GitOps with Harness -- Summary -- Chapter 11: Pitfall Examples - Experiencing Issues with GitOps -- Building and testing Kubernetes manifests -- Failure strategies -- Governance and approvals -- Proprietary manifest building -- Summary -- Chapter 12: What's Next? …”
    Libro electrónico