Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 372
- Computer Science 300
- Development 251
- Application software 244
- Java (Computer program language) 193
- Web site development 149
- XML (Document markup language) 132
- Web sites 125
- Database management 123
- Design 114
- Computer programs 104
- Internet programming 93
- Microsoft .NET Framework 88
- XML (Lenguaje de marcas) 86
- Electrical & Computer Engineering 76
- Telecommunications 75
- C# (Computer program language) 60
- Computer programming 59
- Android (Electronic resource) 55
- SQL server 54
- Programming languages (Electronic computers) 51
- Data processing 50
- Python (Computer program language) 48
- Computer software 47
- Programming 47
- Client/server computing 46
- Web services 44
- Management 42
- Relational databases 41
- Mobile computing 40
-
1481Publicado 2017Tabla de Contenidos: “…. -- There's more... -- See also -- XML -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Cocoa Touch -- Getting ready -- How to do it... -- There's more... -- See also -- Chapter 6: Swift Playgrounds -- Introduction -- Using Swift Playgrounds for UI -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Import Resources into Playgrounds -- Getting ready -- How to do it... -- How it works... -- See also -- Import Code into Playgrounds -- Getting ready -- How to do it... -- How it works... -- See also -- Multi-Page Playgrounds -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 7: Server-Side Swift -- Introduction -- Swift on Ubuntu -- Getting started -- How to do it... -- There's more... -- Building a REST API using Vapor -- Getting started -- How to do it... -- How it works... -- There's more... -- See also -- Persistence with Vapor using Postgres -- Getting started -- How to do it... -- There's more... -- See also -- Hosting your Vapor app on Heroku -- Getting started -- How to do it... -- See also -- Chapter 8: Performance and Responsiveness in Swift -- Introduction…”
Libro electrónico -
1482Publicado 2016Tabla de Contenidos: “…Simple search engine with result caching -- Cache basics -- Cache invalidation of Redis data -- Using browser localStorage as cache -- Working with streams -- Storing and searching XML documents using PHP -- Using Elasticsearch to search a social network database -- Displaying randomized search engine results -- Summary -- Chapter 5: Creating a RESTful Web Service -- RESTful basics -- REST architectures -- Common HTTP methods and response codes -- First steps with the Slim framework -- Installing Slim -- A small sample application -- Accepting URL parameters -- Accepting HTTP requests with a message body -- The PSR-7 standard -- Middleware -- Implementing the REST service -- Designing the service -- Bootstrapping the project -- Building the persistence layer with MongoDB -- Adding and retrieving users -- Listing and searching users -- Deleting profiles -- Validating input -- Streams and large files -- Profile image upload -- Using GridFS storage -- Summary -- Chapter 6: Building a Chat Application -- The WebSocket protocol -- First steps with Ratchet -- Architectural considerations -- Getting started -- Testing WebSocket applications -- Playing with the event loop -- Implementing the chat application -- Bootstrapping the project server-side -- Bootstrapping the HTML user interface -- Building a simple chat application -- Receiving messages -- Sending messages -- Testing the application -- Keeping the connection from timing out -- Deployment options -- Bridging Ratchet and PSR-7 applications -- Accessing your application via the web server -- Adding authentication -- Creating the login form -- Checking the authorization -- Connecting users and messages -- Summary -- Chapter 7: Building an Asynchronous Microservice Architecture -- The target architecture -- ZeroMQ patterns -- Request/reply pattern -- Publish/subscribe pattern -- Push/pull pattern…”
Libro electrónico -
1483Publicado 2015Tabla de Contenidos: “…-- ClickOnce Deployment -- XCOPY Deployment -- Visual Studio 2015 Setup Application Options -- Deploying Different Solutions -- Private Assemblies -- Shared Assemblies -- Deploying Desktop Applications -- Deploying Web Applications -- Deploying XML Web Services -- Useful Tools -- Summary -- CHAPTER 16: WINDOWS 8 APPS -- Windows 8 Application Design Principles -- Using Touch -- Application Commands -- Windows 8 Controls -- Coding Windows 8 Apps with XAML -- Creating Your First Windows 8 App -- Application Layout -- Application Views -- Screen Sizes and Orientation -- Summary -- APPENDIX: EXERCISE SOLUTIONS -- INDEX -- ADVERT -- EULA…”
Libro electrónico -
1484Publicado 2018Tabla de Contenidos: “…Fuzzing web requests using the Intruder tab -- Intruder attack types -- Practical examples -- Installing third-party apps using Burp Extender -- Summary -- Chapter 5: Understanding Web Application Vulnerabilities -- File Inclusion -- Local File Inclusion -- Remote File Inclusion -- Cross-Site Scripting -- Reflected XSS -- Stored XSS -- Exploiting stored XSS using the header -- DOM XSS -- JavaScript validation -- Cross-Site Request Forgery -- Step 01 - victim -- Step 02 - attacker -- Results -- SQL Injection -- Authentication bypass -- Extracting the data from the database -- Error-based SQLi enumeration -- Blind SQLi -- Command Injection -- OWASP Top 10 -- 1 - Injection -- 2 - Broken Authentication -- 3 - Sensitive Data -- 4 - XML External Entities -- 5 - Broken Access Control -- 6 - Security Misconfiguration -- 7 - Cross-Site Scripting (XSS) -- 8 - Insecure Deserialization -- 9 - Using Components with Known Vulnerabilities -- 10 - Insufficient Logging & -- Monitoring -- Summary -- Chapter 6: Application Security Pre-Engagement -- Introduction -- The first meeting -- The day of the meeting with the client -- Non-Disclosure Agreement -- Kick-off meeting -- Time and cost estimation -- Statement of work -- Penetration Test Agreement -- External factors -- Summary -- Chapter 7: Application Threat Modeling -- Software development life cycle -- Application Threat Modeling at a glance -- Application Threat Modeling in real life -- Application Threat Modeling document parts -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Test strategies -- Security risks -- Practical example -- xBlog Threat Modeling -- Scope -- Threat Modeling -- Project information -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Threats list -- Spoofing - authentication -- Tampering - integrity…”
Libro electrónico -
1485Publicado 2017Tabla de Contenidos: “…. -- 7.6 Textvorlagen -- Anrede -- Bestellbestätigung -- Versandbestätigung -- Info Auslandsversand -- 7.7 Checkout Formular -- Bestellabschluss -- 7.8 Shop-Artikel anlegen -- 7.9 Artikeltexte -- 7.10 Detailansicht -- Produktliste -- Gutscheine -- Kapitel 8: SEO mit Jimdo -- 8.1 SEO-Grundwissen für Anfänger -- 8.2 Die Möglichkeiten mit Jimdo -- Grundlage: unique content -- Navigationskonzept und -bezeichnung -- Überschriftenkonzept -- Interne Verlinkung / Verlinkung -- Das integrierte SEO-Tool -- Seitentitel -- XML-Sitemap -- 8.3 Google Analytics (Tracking-ID integrieren) -- 8.4 URL-Weiterleitungen -- 8.5 Beständigkeit -- Kapitel 9: Eigene Designs umsetzen (für Profis) -- 9.1 Die Layoutschnittstelle -- 9.2 Wo liegt das eigene Layout? …”
Libro electrónico -
1486VBScript, WMI and ADSI unleashed : using VBSscript, WMI, and ADSI to automate Windows administrationPublicado 2007Tabla de Contenidos: “…Alternative Methods -- Summary -- 19 Querying Complex WMI Information -- Understanding WMI Relationships -- Associating WMI Instances -- Writing the Query -- Testing the Query -- Writing the Query in VBScript -- Another Example -- Summary -- 20 Putting It All Together: Your First WMI/ADSI Script -- Designing the Script -- Writing Functions and Subroutines -- Writing the Main Script -- Testing the Script -- Summary -- 21 Testing and Debugging WMI and ADSI Queries -- Debugging Outside the Script -- Debugging WMI Queries -- Debugging ADSI Queries -- Summary -- Part IV: Advanced Scripting Techniques -- 22 Modular Script Programming -- Looking for Modules -- Introduction to Windows Script Components -- Scripting and XML -- Summary -- 23 Scripts Packaging and Protection -- Installing the Script Encoder -- Writing Encoded Scripts -- Running Encoded Scripts -- Encoding: The Downside -- Script Packaging -- Summary -- 24 Scripting Security -- Why Scripting Can Be Dangerous -- Security Improvements in Windows XP and Windows Server 2003 -- Digitally Signing Scripts -- Running Only Signed Scripts -- Ways to Implement Safe Scripting -- Summary -- 25 Introduction to HTML Applications -- Event-Driven Scripting -- How an HTA Is Built -- HTA Differences -- Steps for Writing an HTA -- Summary -- 26 Debugging Tips, Tools, and Techniques -- Types of Bugs -- Preventing Syntax Errors -- Debugging Logic Errors -- Summary -- Part V: Ready-to-Run Examples -- 27 Logon and Logoff Scripts -- NT and Active Directory Logon Scripts -- Active Directory-Specific Logon Scripts -- Active Directory Logoff Scripts -- Summary -- 28 Windows and Domain Administration Scripts -- Automating User Creation -- Finding Inactive Users -- Collecting System Information -- Templates -- Summary -- 29 Network Administration Scripts -- Shutting Down Remote Computers -- Listing Remote Shares…”
Libro electrónico -
1487por Mensah, Kuassi“…The traditional division of labor between the database (which only stores and manages SQL and XML data for fast, easy data search and retrieval) and the application server (which runs application or business logic, and presentation logic) is obsolete. …”
Publicado 2006
Libro electrónico -
1488por Darmawan, BudiTabla de Contenidos: “…6.3 Endpoint logs -- 6.3.1 Common endpoint logs -- 6.3.2 Windows endpoint logs -- 6.3.3 Non-Windows endpoint logs -- 6.4 Web Health Console logs and traces -- 6.4.1 Modifying Web Health Console tracing parameters -- 6.4.2 WebSphere tracing -- 6.5 Tools -- 6.5.1 Tool to generate XML file -- 6.5.2 Serviceability tasks -- 6.6 Helpful troubleshooting procedures -- 6.6.1 Profile distribution problems -- 6.6.2 IBM Tivoli Monitoring engine troubleshooting -- 6.6.3 Resolving resource model problems -- Chapter 7. …”
Publicado 2005
Libro electrónico -
1489Publicado 2008Tabla de Contenidos: “…Cover -- Contents -- Acknowledgments -- About the Author -- Introduction -- 0.1 Ajax, the Acronym -- 0.1.1 Asynchronous -- 0.1.2 JavaScript -- 0.1.3 XML -- 0.2 This Book's Intentions -- 0.3 Prerequisites for This Book -- Chapter 1 Usability -- 1.1 Interface Versus Showcase -- 1.1.1 Implementation -- 1.2 User Expectations -- 1.3 Indicators and Other Forms of User Feedback -- 1.3.1 The Throbber -- 1.3.2 Progress Indicators -- 1.3.3 Keeping the User in the Loop -- 1.4 Semantic Markup -- 1.4.1 More Accessible -- 1.4.2 Easier to Use -- 1.4.3 Easier to Maintain -- 1.4.4 Easier to Parse -- 1.5 What CSS and JavaScript Have in Common -- Chapter 2 Accessibility -- 2.1 WCAG and Section 508 -- 2.1.1 WCAG -- 2.1.2 Section 508 -- 2.2 Screen Readers Can Handle Ajax -- 2.2.1 Content Replacement -- 2.2.2 Form Validation -- 2.3 Unobtrusive Ajax -- 2.4 Designing with Accessibility in Mind -- 2.4.1 High-Contrast Design -- 2.4.2 Zoomable Interface -- 2.4.3 Easily Targeted Controls -- 2.5 WAI-ARIA -- Chapter 3 Client-Side Application Architecture -- 3.1 Objects and Event Triggering -- 3.1.1 Native Object Event Handling -- 3.1.2 JavaScript Objects -- 3.2 Model-View-Controller Design Pattern -- 3.2.1 The Model -- 3.2.2 The View -- 3.2.3 The Controller -- 3.3 Event-Driven Application Development -- 3.3.1 Advantages of Architecture -- Chapter 4 Debugging Client-Side Code -- 4.1 Validation, Validation, Validation -- 4.1.1 Markup Validator -- 4.1.2 CSS Validator -- 4.1.3 Semantic Extractor -- 4.2 Browser Tools and Plugins -- 4.2.1 The Console -- 4.2.2 Internet Explorer -- 4.2.3 Firefox -- 4.2.4 Opera -- 4.2.5 Safari -- 4.3 JavaScript Profiling -- 4.3.1 Recognizing Bottlenecks -- 4.4 Unit Testing -- 4.4.1 Assertions -- 4.4.2 Test Setup -- 4.4.3 The Test Itself -- 4.4.4 Mock Objects -- 4.4.5 Test Suites -- Chapter 5 Performance Optimization -- 5.1 Database Performance…”
Libro electrónico -
1490por MacVittie, Lori A., 1969-“…The cornerstone for building these new user interfaces is XAML (""Zammel""), the XML-based markup language that works with Windows Presentation Foundation (WPF), Vista's new graphics subsystem. …”
Publicado 2006
Libro electrónico -
1491por Witt, GrahamTabla de Contenidos: “…Graphical user interface building tools; 3.1.6. Constraints in XML schemas; 3.1.7. Rules engines; 3.2. Documenting rules; 3.2.1. …”
Publicado 2012
Libro electrónico -
1492Publicado 2009Tabla de Contenidos: “…Tuning the Database -- Identifying Performance Obstacles -- Using Built-in Tuning Tools -- LESSON 17: Database Security -- Security's Role in Database Administration -- Popular Database Products and Security -- Oracle Express and MySQL Security -- LESSON 18: Exploring the Data Dictionary (System Catalog) -- An Introduction to the Data Dictionary -- Identifying Data Dictionary Users -- Exploring the Contents of the Data Dictionary -- A Look Inside Oracle's Data Dictionary -- A Look Inside MySQL's Data Dictionary -- PART V: More SQL Objects -- LESSON 19: Temporary Tables, Stored Procedures, Triggers, and Cursors -- Creating Temporary Tables -- Using Cursors -- Creating and Using Stored Procedures -- Designing and Using Triggers -- Using Embedded SQL -- LESSON 20: New Objects in the Latest Standard -- Exploring the CREATE ROLE Statement -- Creating Triggers -- Using the CREATE TYPE Statement -- Regular Expressions -- Working with BLOB Data Types -- A Short XML Example -- PART VI: Advanced SQL Programming -- LESSON 21: Using SQL to Generate SQL Statements -- Understanding the Power of SQL Statement Generation -- Miscellaneous SQL*Plus Commands -- Counting the Rows in All Tables -- Granting System Privileges to Multiple Users -- Granting Privileges on Your Tables to Another User -- Disabling Table Constraints to Load Data -- Creating Numerous Synonyms in a Single Bound -- Creating Views on Your Tables -- Truncating All Tables in a Schema -- Using SQL to Generate Shell Scripts -- Applying SQL Generation and Other Concepts to the Real World -- LESSON 22: Creating Complex SQL Queries -- CREATE TABLE statements -- Examples of Complex Queries -- Tips for Building Complex Queries -- LESSON 23: Debugging Your SQL Statements -- Exploring Common SQL Errors -- Exploring Common Logical Mistakes -- Preventing Problems with Your Data…”
Libro electrónico -
1493Publicado 2012“…Fully updated with the newest features and techniques available, Java 7 Recipes provides code examples involving Servlets, Java FX 2.0, XML, Java Swing, and much more. Content is presented in the popular problem-solution format: Look up the programming problem that you want to solve. …”
Libro electrónico -
1494Publicado 2019Tabla de Contenidos: “…POST Requests -- Performing Blind SSRFs -- Attacking Users with SSRF Responses -- ESEA SSRF and Querying AWS Metadata -- Google Internal DNS SSRF -- Internal Port Scanning Using Webhooks -- Summary -- 11 XML External Entity -- eXtensible Markup Language -- How XXE Attacks Work -- Read Access to Google -- Facebook XXE with Microsoft Word -- Wikiloc XXE -- Summary -- 12 Remote Code Execution -- Executing Shell Commands -- Executing Functions -- Strategies for Escalating Remote Code Execution -- Polyvore ImageMagick -- Algolia RCE on facebooksearch.algolia.com -- RCE Through SSH -- Summary -- 13 Memory Vulnerabilities -- Buffer Overflows -- Read Out of Bounds -- PHP ftp_genlist() Integer Overflow -- Python Hotshot Module -- Libcurl Read Out of Bounds -- Summary -- 14 Subdomain Takeover -- Understanding Domain Names -- How Subdomain Takeovers Work -- Ubiquiti Subdomain Takeover -- Scan.me Pointing to Zendesk -- Shopify Windsor Subdomain Takeover -- Snapchat Fastly Takeover -- Legal Robot Takeover -- Uber SendGrid Mail Takeover -- Summary -- 15 Race Conditions -- Accepting a HackerOne Invite Multiple Times -- Exceeding Keybase Invitation Limits -- HackerOne Payments Race Condition -- Shopify Partners Race Condition -- Summary -- 16 Insecure Direct Object References -- Finding Simple IDORs -- Finding More Complex IDORs -- Binary.com Privilege Escalation -- Moneybird App Creation -- Twitter Mopub API Token Theft -- ACME Customer Information Disclosure -- Summary -- 17 OAuth Vulnerabilities -- The OAuth Workflow -- Stealing Slack OAuth Tokens -- Passing Authentication with Default Passwords…”
Libro electrónico -
1495por Aspin, Adam“…You'll find solutions for importing from Microsoft Office data stores such as Excel and Access, from text files such as CSV files, from XML, from other database brands such as Oracle and MySQL, and even from other SQL Server databases. …”
Publicado 2012
Libro electrónico -
1496por McDonald, Brian“…Pull data from relational databases, from XML, and from other sources. Present that data to users in tabular and graphical forms, and more. …”
Publicado 2012
Libro electrónico -
1497Publicado 2024Tabla de Contenidos: “…Data Transmission (EDI and XML) -- Databases and Business Analytics -- Application Systems -- Enterprise Resource Planning (ERP) -- Procurement Systems -- Advanced Planning and Scheduling -- Transportation Planning Systems -- Demand Planning -- Customer Relationship Management (CRM) and Sales Force Automation (SFA) -- Supply Chain Management (SCM) -- Inventory Management Systems -- Manufacturing Execution Systems (MES) -- Transportation Scheduling Systems -- Warehouse Management Systems (WMS) -- New Supply Chain Technology -- Industrial Robots -- Drones and Driverless Vehicles -- Artificial Intelligence (AI) -- Internet of Things (IoT) and Big Data -- Real-Time Product Information -- 3D Printing and Additive Manufacturing -- Simulation Modeling -- Impact on Supply Chain Operations -- Combining New Technologies for Agile Supply Chains -- Putting New Technologies to Work -- Increasing Productivity and Customer Service -- Chapter Summary -- Chapter 5 Metrics for Measuring Supply Chain Performance -- Useful Model of Markets and Their Supply Chains -- Market Performance Categories -- Customer Service -- Internal Efficiency -- Product Demand Flexibility -- Product Development -- A Framework for Performance Measurement -- Customer Service Metrics -- Build to Stock -- Build to Order -- Internal Efficiency Metrics -- Inventory Value -- Inventory Turns -- Return on Sales -- Cash-to-Cash Cycle Time -- Demand Flexibility Metrics -- Activity Cycle Time -- Upside Flexibility -- Outside Flexibility -- Product Development Metrics -- Operations that Enable Supply Chain Performance -- Collecting and Displaying Performance Data -- Three Levels of Detail -- The Data Warehouse -- Spotlighting Problems and Finding Opportunities -- Markets Migrate from One Quadrant to Another -- Sharing Data across the Supply Chain -- Chapter Summary…”
Libro electrónico -
1498por Carreras Monfort, CèsarTabla de Contenidos: “…Descripció i gestió dels recursos; 2.1. XML; Capítol IV. Difusió de les col·leccions. Narratives a Internet; 1. …”
Publicado 2007
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1499por Nadeau, Thomas D.Tabla de Contenidos: “…Management Interfaces; Introduction; 2.1 The Basics of Management Interfaces; 2.2 The Command-Line Interface; 2.3 CORBA; 2.4 XML; 2.5 Bulk File Transfer; 2.6 The Simple Network Management Protocol (SNMP); 2.7 Summary; Further Reading…”
Publicado 2003
Libro electrónico -
1500