Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 372
- Computer Science 300
- Development 251
- Application software 244
- Java (Computer program language) 193
- Web site development 149
- XML (Document markup language) 132
- Web sites 125
- Database management 123
- Design 114
- Computer programs 104
- Internet programming 93
- Microsoft .NET Framework 88
- XML (Lenguaje de marcas) 86
- Electrical & Computer Engineering 76
- Telecommunications 75
- C# (Computer program language) 60
- Computer programming 59
- Android (Electronic resource) 55
- SQL server 54
- Programming languages (Electronic computers) 51
- Data processing 50
- Python (Computer program language) 48
- Computer software 47
- Programming 47
- Client/server computing 46
- Web services 44
- Management 42
- Relational databases 41
- Mobile computing 40
-
1541Publicado 2024Tabla de Contenidos: “…-- Good practices for commenting your source code -- Documenting public APIs in class libraries -- XML comment documentation -- How to document code using XML comments -- Generating documentation using DocFX -- Creating a DocFX project -- Adding custom documentation content -- Markdown markup language -- Headings -- Formatting text -- Creating lists -- Links and images -- Code blocks and syntax highlighting -- Tables…”
Libro electrónico -
1542por León Sanz, RafaelTabla de Contenidos: “…ANDROID ; 3.1 Qué hace a Android especial; 3.2 Descripción del entorno; 3.2.1 El kernel Linux; 3.2.2 La máquina virtual Dalvik; 3.2.3 El Software Development Kit (SDK) de Android; 3.3 Arquitectura de las Aplicaciones; 3.4 Estructura de un Proyecto Android; 3.5 El fichero AndroidManifest.xml (Manifiesto de la aplicación); 3.6 Ejercicios propuestos para el tema 3:; 3.6.1 Instalación del Entorno de Desarrollo; 3.6.2 Instalación de Java…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1543Publicado 2018Tabla de Contenidos: “…-- Message versioning guidance -- Message publishing -- Message flow -- Exchanges -- Direct exchange -- Default exchange -- Topic exchange -- Fanout exchange -- Headers exchange -- Common messages -- Summary -- Chapter 2: ReflectInsight - Microservice Logging Redefined -- Router -- Log Viewer -- Live Viewer -- Message navigation -- Message properties -- Watches -- Bookmarks -- Call Stack -- Advanced Search -- Quick Search -- Advanced Search -- Time zone formatting -- Auto Save/Purge -- Auto Save -- Auto Purge -- Configuration Editor -- Overview -- XML configuration -- Dynamic configuration -- Configuration Editor -- Summary -- Exercises -- Chapter 3: Creating a Base Microservice and Interface -- Classes versus interfaces -- Creating our base project -- Creating a base interface -- Creating our base microservice class -- Variables -- Base microservice constructor -- Implementing our interface -- Publishing a memory update message -- Minimal microservice -- Summary -- Chapter 4: Designing a Memory Management Microservice -- Creating our microservice -- Our code -- Reclaiming memory -- Dynamically creating an exchange -- Dynamically creating a queue -- Publishing a message -- Summary -- Exercises…”
Libro electrónico -
1544por Tate, Bruce, 1965-Tabla de Contenidos: “…Distribution; 5.1.2.4. EJB; 5.1.2.5. XML; 5.1.2.6. Persistence frameworks; 5.1.2.7. Web services; 5.2. …”
Publicado 2004
Libro electrónico -
1545por MacDonald, MatthewTabla de Contenidos: “…Where can I learn more?; 1.10. Create XML Documentation for Your Code; 1.10.2. What about...; 1.10.3. …”
Publicado 2005
Libro electrónico -
1546Publicado 2023Tabla de Contenidos: “…-- Vulnerabilities on SAML -- Other authentication methods used with HTTP -- How to discover and exploit vulnerabilities in SAML -- Installing SAML Raider -- Verifying the typical flow - the happy case -- Verifying whether it is possible to send information without signature -- Verifying whether it is possible to use a self-signed certificate -- Verifying whether it is possible to use XML Signature Wrapping (XSW) -- Other attacks and vulnerabilities on SAML -- Summary -- Further reading -- Chapter 4: Attacking Internet-Facing Web Applications - SQL Injection and Cross-Site Scripting (XSS) on WordPress -- Technical requirements -- Scenario files -- WordPress scenario introduction -- How does SQL injection work? …”
Libro electrónico -
1547por Liberty, JesseTabla de Contenidos: “…Where can I learn more?; 2.7. Visualize XML Data; 2.7.2. What about . . .; 2.7.3. Where can I learn more?…”
Publicado 2005
Libro electrónico -
1548por Greenwald, RickTabla de Contenidos: “…Oracle Spatial Option; 1.4.2.3. XML; 1.5. Database Connection Features; 1.5.1.2. …”
Publicado 2004
Libro electrónico -
1549Publicado 2024Tabla de Contenidos: “…Chapter 5: Writing Elegant T-SQL Queries -- Technical requirements -- Best practices for T-SQL querying -- Referencing objects -- Joining tables -- Using NOLOCK -- Using cursors -- The perils of SELECT * -- Functions in our predicate -- Deconstructing table-valued functions -- Complex expressions -- Optimizing OR logic -- NULL means unknown -- Fuzzy string matching -- Inequality logic -- EXECUTE versus sp_executesql -- Composable logic -- Summary -- Chapter 6: Discovering T-SQL Anti- Patterns in Depth -- Technical requirements -- Implicit conversions -- Avoiding unnecessary sort operations -- UNION ALL versus UNION -- SELECT DISTINCT -- Avoiding UDF pitfalls -- Avoiding unnecessary overhead with stored procedures -- Pitfalls of complex views -- Pitfalls of correlated sub-queries -- Properly storing intermediate results -- Using table variables and temporary tables -- Using Common Table Expressions (CTEs) -- Summary -- Part 3: Assembling Our Query Troubleshooting Toolbox -- Chapter 7: Building Diagnostic Queries Using DMVs and DMFs -- Technical requirements -- Introducing DMVs -- Exploring query execution DMVs -- sys.dm_exec_sessions -- sys.dm_exec_requests -- sys.dm_exec_sql_text -- sys.dm_os_waiting_tasks -- Exploring query plan cache DMVs -- sys.dm_exec_query_stats -- sys.dm_exec_procedure_stats -- sys.dm_exec_query_plan -- sys.dm_exec_cached_plans -- Troubleshooting common scenarios with DMV queries -- Investigating blocking -- Cached query plan issues -- Single-use plans (query fingerprints) -- Finding resource-intensive queries -- Queries with excessive memory grants -- Mining XML query plans -- Plans with missing indexes -- Plans with warnings -- Plans with implicit conversions -- Plans with lookups -- Summary -- Chapter 8: Building XEvent Profiler Traces -- Technical requirements -- Introducing XEvents…”
Libro electrónico -
1550Publicado 2023Tabla de Contenidos: “…-- Why we chose the Cargo Tracker application -- Installing and running the Cargo Tracker application -- Features of the Cargo Tracker application -- Public Tracking Interface -- Administration Interface -- Mobile Event Logger -- Java EE features used in the Cargo Tracker application -- Enterprise Java Beans -- Persistence (JPA) -- Messaging (JMS) -- Context and Dependency Injection -- Java Service Faces (JSF) -- JAX-RS -- JSON binding -- Transactions -- Batch -- Summary -- Part 2: Modern Jakarta EE -- Chapter 3: Moving from Java EE to Jakarta EE -- Technical requirements -- It's all about namespaces -- Migrating strategies -- Using an open source multiplatform editor -- Sed -- Using a specialized plugin for your IDE -- Upgrading your pom.xml file -- Migrating dependencies -- Upgrading the project -- Upgrading the Payara application server -- Upgrading PrimeFaces -- Red Hat MTA -- Upgrading your application server -- Summary -- Chapter 4: Modernizing Your Application with the Latest Features -- Technical requirements -- The most significant changes to Jakarta EE 10 -- Core Profile -- Using UUIDs as keys -- Multi-part form parameters -- Pure Java Jakarta Faces views -- Authenticating with OpenID -- Improved concurrency…”
Libro electrónico -
1551Publicado 2018Tabla de Contenidos: “…Creating the digital output object instance class -- Setting remotely updated output values -- Testing your LWM2M device -- Configuring the bootstrap server -- Configuring the LWM2M server -- Interacting with your devices -- Summary -- Chapter 9: Social Interaction with Your Devices Using XMPP -- Introducing XMPP -- Using XML -- Understanding the value of brokers -- Providing global scalability -- Extending server functionality -- Authenticating clients -- Understanding XMPP addresses -- Using trust-based communication to secure the network -- Understanding XMPP communication patterns -- Understanding stanzas -- Extending XMPP -- Selecting a client library -- Selecting a broker -- Adding XMPP to our devices -- Connecting to our broker -- Getting persisted credentials -- Preparing the connection for first-time use -- Connecting to the server -- Following the connection process -- Registering a new account -- Maintaining the connection -- Managing the roster -- Making sensor data available over XMPP -- Understanding the conceptual model -- Creating an XMPP sensor server -- Returning momentary values -- Returning historical values -- Returning writable values -- Triggering events -- Publishing control parameters -- Understanding the conceptual model -- Creating an XMPP control server -- Adding a chat interface -- Creating an XMPP chat server -- Testing your devices -- Testing the human interface -- Testing the machine interface -- For further study -- Summary -- Chapter 10: The Controller -- Discovering things on the internet -- Introducing Thing Registry -- Propagating information -- Claiming ownership of things -- Transferring the conceptual identity to the owner -- Using thing registries in XMPP -- Registering our devices -- Looping through available components -- Finding the thing registry -- Creating a Thing Registry client…”
Libro electrónico -
1552Publicado 2019Tabla de Contenidos: “….* -- /etc/mail -- /etc/mail.rc -- /etc/mail/mailer.conf -- /etc/make.conf -- /etc/master.passwd -- /etc/motd -- /etc/mtree -- /etc/netconfig -- /etc/netstart -- /etc/network.subr -- /etc/newsyslog.conf -- /etc/nscd.conf -- /etc/nsmb.conf -- /etc/nsswitch.conf -- /etc/ntp/, /etc/ntp.conf -- /etc/opie* -- /etc/pam.d/* -- /etc/passwd -- /etc/pccard_ether -- /etc/periodic.conf and /etc/defaults/periodic.conf -- /etc/pf.conf, /etc/pf.os -- /etc/phones -- /etc/portsnap.conf -- /etc/ppp/ -- /etc/printcap -- /etc/profile -- /etc/protocols -- /etc/pwd.db -- /etc/rc* -- /et/regdomain.xml -- /etc/remote -- /etc/resolv.conf -- /etc/rpc -- /etc/security/ -- /etc/services -- /etc/shells -- /etc/skel/ -- /etc/snmpd.config -- /etc/spwd.db -- /etc/src.conf -- /etc/ssh/ -- /etc/ssl/ -- /etc/sysctl.conf -- /etc/syslog.conf, /etc/syslog.conf.d/ -- /etc/termcap, /etc/termcap.small -- /etc/ttys -- /etc/unbound/ -- /etc/wall_cmos_clock -- /etc/zfs/ -- 15 MAKING YOUR SYSTEM USEFUL -- Ports and Packages -- Packages -- Package Repositories -- Package Branches -- Upgrading Packages -- 16 CUSTOMIZING SOFTWARE WITH PORTS -- Making Software -- Source Code and Software -- The Ports Collection -- The Ports Index -- What's In a Port? …”
Libro electrónico -
1553Publicado 2021Tabla de Contenidos: “…Chapter 15: Animations and Transitions with CoordinatorLayout and MotionLayout -- Introduction -- Activity Transitions -- Adding Activity Transitions through XML -- Adding Activity Transitions through Code -- Starting an Activity with an Activity Transition -- Exercise 15.01: Creating Activity Transitions in an App -- Adding a Shared Element Transition -- Starting an Activity with the Shared Element Transition -- Exercise 15.02: Creating the Shared Element Transition -- Animations with CoordinatorLayout -- Animations with MotionLayout -- Adding MotionLayout -- Creating Animations with MotionLayout -- Exercise 15.03: Adding Animations with MotionLayout -- The Motion Editor -- Debugging MotionLayout -- Modifying the MotionLayout Path -- Exercise 15.04: Modifying the Animation Path with Keyframes -- Activity 15.01: Password Generator -- Summary -- Chapter 16: Launching Your App on Google Play -- Introduction -- Preparing Your Apps for Release -- Versioning Apps -- Creating a Keystore -- Exercise 16.01: Creating a Keystore in Android Studio -- Storing the Keystore and Passwords -- Signing Your Apps for Release -- Exercise 16.02: Creating a Signed APK -- Android App Bundle -- Exercise 16.03: Creating a Signed App Bundle -- App Signing by Google Play -- Creating a Developer Account -- Uploading an App to Google Play -- Creating a Store Listing -- App Details -- Graphic Assets -- Preparing the Release -- APK/App Bundle -- Rolling Out a Release -- Managing App Releases -- Release Tracks -- Feedback Channel and Opt-in Link -- Internal Testing -- Closed Testing -- Open Testing -- Staged Rollouts -- Managed Publishing -- Activity 16.01: Publishing an App -- Summary -- Index…”
Libro electrónico -
1554Publicado 2022Tabla de Contenidos: “…Using the Calibration panel -- Working with Filmstrips -- Working with Profiles -- Looking at the Adobe Camera Raw profiles -- Managing profiles -- Creating a Favorites list -- Opening Non-Raw Images in the Camera Raw Editor -- Changing Image Defaults -- Working with XML Files and Preferences -- Changing program defaults -- Using Save Options -- Using sidecar files -- Chapter 8 Making and Modifying Selections -- Defining Selections -- Creating Rectangular and Elliptical Selections -- Perfecting squares and circles with Shift and Alt (Option on the Mac) -- Applying Marquee options -- Making Freeform Selections with the Lasso Tools -- Selecting with the Lasso tool -- Getting straight with the Polygonal Lasso tool -- Snapping with the Magnetic Lasso tool -- Working Wizardry with the Magic Wand -- Talking about Tolerance -- Wielding the Wand to select -- Modifying Your Selections -- Adding to, subtracting from, and intersecting a selection -- Avoiding key collisions -- Painting with the Selection Brush -- Painting with the Quick Selection Tool -- Selecting with the Auto Selection Tool -- Selecting Your Subject -- Fine-Tuning with the Refine Selection Brush -- Working with the Cookie Cutter Tool -- Eliminating with the Eraser Tools -- The Eraser tool -- The Background Eraser tool -- The Magic Eraser tool -- Using the Select Menu -- Selecting all or nothing -- Reselecting a selection -- Inversing a selection -- Feathering a selection -- Refining the edges of a selection -- Using the Modify commands -- Applying the Grow and Similar commands -- Saving and loading selections -- Chapter 9 Working with Layers -- Getting to Know Layers -- Converting a background to a layer -- Anatomy of the Layers panel -- Using the Layer and Select menus -- Working with Different Layer Types -- Image layers -- Adjustment layers -- Fill layers -- Shape layers -- Type layers…”
Libro electrónico -
1555Publicado 2022Tabla de Contenidos: “…Summary -- Chapter 6: Data Discovery and the Spark SQL Catalog -- Data Discovery and Data Catalogs -- Why Data Catalogs Matter -- Data Wishful Thinking -- Data Catalogs to the Rescue -- The Apache Hive Metastore -- Metadata with a Modern Twist -- Exercise 6-1: Enhancing Spark SQL with the Hive Metastore -- Configuring the Hive Metastore -- Create the Metastore Database -- Connect to the MySQL Docker Container -- Authenticate as the root the MySQL User -- Create the Hive Metastore Database -- Grant Access to the Metastore -- Create the Metastore Tables -- Authenticate as the dataeng User -- Switch Databases to the Metastore -- Import the Hive Metastore Tables -- Configuring Spark to Use the Hive Metastore -- Configure the Hive Site XML -- Configure Apache Spark to Connect to Your External Hive Metastore -- Using the Hive Metastore for Schema Enforcement -- Production Hive Metastore Considerations -- Exercise 6-1: Summary -- The Spark SQL Catalog -- Exercise 6-2: Using the Spark SQL Catalog -- Creating the Spark Session -- Spark SQL Databases -- Listing Available Databases -- Finding the Current Database -- Creating a Database -- Loading External Tables Using JDBC -- Listing Tables -- Creating Persistent Tables -- Finding the Existence of a Table -- Databases and Tables in the Hive Metastore -- View Hive Metastore Databases -- View Hive Metastore Tables -- Hive Table Parameters -- Working with Tables from the Spark SQL Catalog -- Data Discovery Through Table and Column-Level Annotations -- Adding Table-Level Descriptions and Listing Tables -- Adding Column Descriptions and Listing Columns -- Caching Tables -- Cache a Table in Spark Memory -- The Storage View of the Spark UI -- Force Spark to Cache -- Uncache Tables -- Clear All Table Caches -- Refresh a Table -- Testing Automatic Cache Refresh with Spark Managed Tables -- Removing Tables -- Drop Table…”
Libro electrónico -
1556Publicado 2016Tabla de Contenidos: “…Finding out the package name of your target application -- Getting information about a package -- Dumping the AndroidManifes.xml file -- Finding out the attack surface: -- Attacks on activities -- Attacks on services -- Broadcast receivers -- Content provider leakage and SQL Injection using Drozer -- Attacking SQL Injection using Drozer -- Path traversal attacks in content providers -- Reading /etc/hosts -- Reading kernel version -- Exploiting debuggable apps -- Introduction to Cydia Substrate -- Runtime monitoring and analysis using Introspy -- Hooking using Xposed framework -- Dynamic instrumentation using Frida -- What is Frida? …”
Libro electrónico -
1557por Chou, EricTabla de Contenidos: “…The traditional change management process -- Introduction to continuous integration -- Installing GitLab -- GitLab runners -- First GitLab example -- GitLab network example -- Summary -- Chapter 16: Test-Driven Development for Networks -- Test-driven development overview -- Test definitions -- Topology as code -- XML parsing example -- Python's unittest module -- More on Python testing -- pytest examples -- Writing tests for networking -- Testing for reachability -- Testing for network latency -- Testing for security -- Testing for transactions -- Testing for network configuration -- Testing for Ansible -- pyATS and Genie -- Summary -- Other Books You May Enjoy -- Index…”
Publicado 2023
Libro electrónico -
1558Publicado 2023Tabla de Contenidos: “…Virtualization -- Serverless -- High-Performance Computing (HPC) and Grid Computing -- Peer-to-Peer -- Thin Clients -- Diskless Workstations -- Thin Client Applications -- Embedded Systems and The Internet of Things (IoT) -- Distributed Systems and Edge Computing Systems -- Industrial Control Systems (ICS) -- System Vulnerabilities, Threats, and Countermeasures -- Emanations -- Covert Channels -- Covert Storage Channels -- Covert Timing Channels -- Backdoors -- Malicious Code (Malware) -- Computer Viruses -- Worms -- Trojans -- Rootkits -- Packers -- Logic Bombs -- Antivirus Software -- Server-Side Attacks -- Client-Side Attacks -- Web Architecture and Attacks -- Applets -- Java -- ActiveX -- OWASP -- XML -- Service Oriented Architecture (SOA) -- Database Security -- Polyinstantiation -- Inference and Aggregation -- Inference and Aggregation Controls -- Data Mining -- Data Analytics -- Countermeasures -- Mobile Device Attacks -- Mobile Device Defenses -- Cornerstone Cryptographic Concepts -- Key Terms -- Confidentiality, Integrity, Authentication, and Non-repudiation -- Confusion, Diffusion, Substitution, and Permutation -- Cryptographic Strength -- Monoalphabetic and Polyalphabetic Ciphers -- Modular Math -- Exclusive Or (XOR) -- Data at Rest and Data in Motion -- Protocol Governance -- Types of Cryptography -- Symmetric Encryption -- Stream and Block Ciphers -- Initialization Vectors and Chaining -- DES -- Modes of DES -- Electronic Code Book (ECB) -- Cipher Block Chaining (CBC) -- Cipher Feedback (CFB) -- Output Feedback (OFB) -- Counter Mode (CTR) -- Single DES -- Triple DES -- International Data Encryption Algorithm (IDEA) -- Advanced Encryption Standard (AES) -- Choosing AES…”
Libro electrónico -
1559por Havey, Michael“…A new technology called Business Process Management, or BPM, helps software architects and developers design, code, run, administer, and monitor complex network-based business processes BPM replaces those sketchy flowchart diagrams that business analysts draw on whiteboards with a precise model that uses standard graphical and XML representations, an…”
Publicado 2005
Libro electrónico -
1560Publicado 2004Tabla de Contenidos: “…Consuming DB2 Web services in .NET -- 9.1 Web services and DB2 -- 9.2 Web Services Object Runtime Framework (WORF) -- 9.2.1 Document access definition extension (DADX) -- 9.2.2 DB2 XML Extender -- 9.2.3 How WORF processes a Web service request -- 9.2.4 Setting up a WORF environment for Windows -- 9.2.5 Creating and deploying DB2 WORF service -- 9.3 Consuming the DADX Web service using .NET client -- Chapter 10. …”
Libro electrónico