Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 372
- Computer Science 300
- Development 251
- Application software 244
- Java (Computer program language) 193
- Web site development 149
- XML (Document markup language) 132
- Web sites 125
- Database management 123
- Design 114
- Computer programs 104
- Internet programming 93
- Microsoft .NET Framework 88
- XML (Lenguaje de marcas) 86
- Electrical & Computer Engineering 76
- Telecommunications 75
- C# (Computer program language) 60
- Computer programming 59
- Android (Electronic resource) 55
- SQL server 54
- Programming languages (Electronic computers) 51
- Data processing 50
- Python (Computer program language) 48
- Computer software 47
- Programming 47
- Client/server computing 46
- Web services 44
- Management 42
- Relational databases 41
- Mobile computing 40
-
1661Publicado 2023Tabla de Contenidos: “…PBR Service Graph Deployment Verification -- PBR Contracts Programming -- Traffic Flow Between EPGs with PBR -- Symmetric PBR -- Summary -- Chapter 9: Integrating ACI with Virtualization and Container Platforms -- Virtualization platform Integration -- VMware Integration Overview -- Access Policies for ESXi Hosts -- To Use LLDP/CDP or Not to Use LLDP/CDP -- ACI VMM Domain -- vDS Uplink to ESXi Mapping -- VMM Domain to EPG Binding -- VM to Port Group Association -- Container Integration to ACI -- Kubernetes Platform Overview -- Kubernetes Control Plane Components -- Kubernetes Worker Node Components -- Kubernetes Networking Overview -- Preparing ACI and Kubernetes Integration -- Kubernetes Server Nodes Network configuration -- Kubernetes Installation -- ACI CNI Components -- Demo YELB Application with ACI L4-L7 Service Graph and EPG segmentation -- Summary -- Chapter 10: ACI Automation and Programmability -- ACI Programmability Introduction -- REST APIs -- REST HTTP Response Codes -- Data Encoding Formats -- XML -- JSON -- YAML -- ACI Object Model -- Managed Object Discovery Tools -- ACI Documentation -- APIC URL/Debug Info -- Save-As Feature -- Visore -- API Inspector -- APIC CLI -- ACI REST API -- URL and Body Format -- REST API Authentication -- Direct REST API Access -- Linux Command Line - cURL -- Postman -- Python Requests Library -- Cobra Software Development Kit -- Cobra SDK Installation -- Using Cobra SDK for Querying and Creating ACI Objects -- Automating ACI Using Ansible -- Ansible Component Architecture -- Playbook Structure -- Inventory File -- Ansible Variables -- Ansible Roles -- ACI Ansible Collection and Installation -- Practical Example 1 - Create and Query ACI Objects -- Practical Example 2 - CSV Based ACI Automation -- YAML Tenant Structure Definition -- BD and EPG Automation from CVS Data -- Automating ACI Using Terraform…”
Libro electrónico -
1662Publicado 2022Tabla de Contenidos: “…-- Intel QuickAssist (QAT) Backup Compression -- Backup Metadata -- Multi-write Replication -- Other Engine "Stuff" -- XML Compression -- In-Memory OLTP Memory Management -- Auto-drop Statistics -- Resumable Add Table Constraints -- New Wait Types -- New Extended Events -- An Industry-Proven Engine -- Chapter 7: Data Virtualization and Object Storage -- Data Virtualization in SQL Server 2022 -- REST, Azure Storage, and S3…”
Libro electrónico -
1663Publicado 2005Tabla de Contenidos: “…Technical impact of major design changes -- 5.1 VisiBroker to IBM ORB change -- 5.1.1 IBM ORB setup -- 5.1.2 Using Server Access Interface with the IBM ORB -- 5.1.3 WebSphere MQ triggering replacing Object Activation Daemon -- 5.1.4 Setting up WebSphere MQ triggering -- 5.2 Tooling changes to WebSphere InterChange Server -- 5.2.1 WebSphere InterChange Server development model -- 5.2.2 Configuration files updated to XML -- 5.2.3 Eclipse platform -- 5.2.4 System Manager -- 5.2.5 System Monitor -- 5.2.6 Business Object Probes -- 5.2.7 Web-based flow and failed-flow management -- 5.2.8 Integrated Test Environment -- 5.2.9 Collaboration debugger -- 5.2.10 Activity Editor -- Chapter 6. …”
Libro electrónico -
1664por Moeller, MortenTabla de Contenidos: “…A.3.3 allow_policy -- A.3.4 select_policy -- A.3.5 gateway.lst -- A.3.6 login_policy -- A.3.7 after_policy -- A.3.8 sub_ep.sh -- A.3.9 ep_login_notif.sh -- A.3.10 run_ep_customization_task.sh -- A.4 DB2 monitoring deployment-related scripts -- A.4.1 create_db2_instance_objects.sh -- A.4.2 create_db2_database_objects.sh -- A.4.3 itm_db2_instance_rm_distrib.sh -- A.4.4 itm_db2_database_rm_distrib.sh -- A.5 WebSphere Application Server monitoring deployment files -- A.5.1 create_app_server.sh -- A.5.2 itm_was_rm_distrib.sh -- A.5.3 was_configure_tec_adapter.sh -- A.5.4 was_start_tec_adapter.sh -- A.5.5 was_stop_tec_adapter.sh -- A.6 TMTP monitoring deployment scripts -- A.6.1 addtoagentgroup.sh -- A.6.2 deployj2ee.sh -- A.7 Software Packages and related files -- A.7.1 Common scripts -- A.7.2 IBM HTTP Server v2.0.47 -- A.7.3 WebSphere Message Queuing Server v5.3 -- A.7.4 WebSphere Message Queuing Server v5.3 Fixpack 8 -- A.7.5 WebSphere Application Server v5.1 -- A.7.6 WebSphere Application Server v5.1 Fixpack 1 -- A.7.7 DB2 Server v8.2 -- A.7.8 TMTP Agent v5.3 -- A.7.9 WebSphere Caching Proxy v5.1 -- A.7.10 WebSphere Caching Proxy v5.1 Fixpack 1 -- A.7.11 TimeCard v5.1 -- A.8 APM related scripts and files -- A.8.1 ep_customization.sh -- A.8.2 Production_Outlet_Plan_v1.0.xml -- Appendix B. Obtaining the installation images -- IBM Business Partners -- Appendix C. …”
Publicado 2005
Libro electrónico -
1665Publicado 2004“…The book's example-rich coverage includes: Implementing cryptography with the JCA (Java Cryptography Architecture) and JCE (Java Cryptography Extension) security APIs Building PKI systems with Java: implementing X.509 certificates, Certification Authorities, Certificate Revocation Lists, and repositories Java security managers, policy files, and JAAS: implementing access control based on code origin, code signer and user credentials Securing the wire: Using SSL and the JSSE API to secure data exchange over unprotected networks Ensuring XML message integrity, authentication, and confidentiality with the standards: XML Signature & XML Encryption using the VeriSign TSIK, and Infomosaic SecureXML libraries Addressing security issues in RMI-based distributed applications Developing and deploying servlets and EJBs for authenticated and secure access Securing Web services with transport- and message-based security: SSL for transport-based and WS Security for message-based security Covering security aspects of best-of-breed products: Apache Tomcat, Apache Axis, and BEA WebLogic Server…”
Libro electrónico -
1666por Geary, David M.“…Creating and accessing data sources, making queries and iterating over the results; performing database inserts, updates, and deletes; executing database transactions Parsing XML documents; using XPath with JSTL custom actions; transforming XML with XSLT, filtering XML; accessing external entities Core JSTL shows you how to: Use JSTL to simplify Web development tasks Use the new JSTL expression language Access databases and execute transactions Develop internationalized Web sites Work with XML documents and JSP technology Extend JSTL with custom tags…”
Publicado 2003
Libro electrónico -
1667por Gómez Gutiérrez, Juan AntonioTabla de Contenidos: “…DESARROLLADOR -- 9.1 CÓDIGO -- 9.1.1 VISUAL BASIC -- 9.1.2 MACROS -- 9.1.3 GRABAR MACRO -- 9.1.4 USAR REFERENCIAS RELATIVAS -- 9.1.5 SEGURIDAD DE MACROS -- 9.2 COMPLEMENTOS -- 9.2.1 COMPLEMENTOS -- 9.2.2 COMPLEMENTOS DE EXCEL -- 9.2.3 COMPLEMENTOS COM -- 9.3 CONTROLES -- 9.3.1 INSERTAR -- 9.3.2 MODO DISEÑO -- 9.3.3 PROPIEDADES -- 9.3.4 VER CÓDIGO -- 9.3.5 EJECUTAR CUADRO DE DIÁLOGO -- 9.4 XML -- 9.4.1 ORIGEN -- 9.4.2 PROPIEDADES DE LA ASIGNACIÓN -- 9.4.3 PAQUETES DE EXPANSIÓN -- 9.4.4 ACTUALIZAR DATOS -- 9.4.5 IMPORTAR -- 9.4.6 EXPORTAR -- MATERIAL ADICIONAL -- ÍNDICE ALFABÉTICO…”
Publicado 2017
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1668Publicado 2023Tabla de Contenidos: “…-- 1.1.1 Relational databases -- 1.1.2 Understanding SQL -- 1.1.3 Using SQL in Java -- 1.2 The paradigm mismatch -- 1.2.1 The problem of granularity -- 1.2.2 The problem of inheritance -- 1.2.3 The problem of identity -- 1.2.4 The problem of associations -- 1.2.5 The problem of data navigation -- 1.3 ORM, JPA, Hibernate, and Spring Data -- Summary -- 2 Starting a project -- 2.1 Introducing Hibernate -- 2.2 Introducing Spring Data -- 2.3 "Hello World" with JPA -- 2.3.1 Configuring a persistence unit -- 2.3.2 Writing a persistent class -- 2.3.3 Storing and loading messages -- 2.4 Native Hibernate configuration -- 2.5 Switching between JPA and Hibernate -- 2.6 "Hello World" with Spring Data JPA -- 2.7 Comparing the approaches of persisting entities -- Summary -- 3 Domain models and metadata -- 3.1 The example CaveatEmptor application -- 3.1.1 A layered architecture -- 3.1.2 Analyzing the business domain -- 3.1.3 The CaveatEmptor domain model -- 3.2 Implementing the domain model -- 3.2.1 Addressing leakage of concerns -- 3.2.2 Transparent and automated persistence -- 3.2.3 Writing persistence-capable classes -- 3.2.4 Implementing POJO associations -- 3.3 Domain model metadata -- 3.3.1 Annotation-based metadata -- 3.3.2 Applying constraints to Java objects -- 3.3.3 Externalizing metadata with XML files…”
Libro electrónico -
1669Publicado 2017Tabla de Contenidos: “…-- 8.2 A Few Practical Concerns -- 8.3 Binary versus Multiclass -- 8.4 Example Script -- 8.5 Specific Classifiers -- 8.6 Evaluating Classifiers -- 8.7 Selecting Classification Cutoffs -- 8.8 Further Reading -- 8.9 Glossary -- Chapter 9 Technical Communication and Documentation -- 9.1 Several Guiding Principles -- 9.2 Slide Decks -- 9.3 Written Reports -- 9.4 Speaking: What Has Worked for Me -- 9.5 Code Documentation -- 9.6 Further Reading -- 9.7 Glossary -- Part II Stuff You Still Need to Know -- Chapter 10 Unsupervised Learning: Clustering and Dimensionality Reduction -- 10.1 The Curse of Dimensionality -- 10.2 Example: Eigenfaces for Dimensionality Reduction -- 10.3 Principal Component Analysis and Factor Analysis -- 10.4 Skree Plots and Understanding Dimensionality -- 10.5 Factor Analysis -- 10.6 Limitations of PCA -- 10.7 Clustering -- 10.8 Further Reading -- 10.9 Glossary -- Chapter 11 Regression -- 11.1 Example: Predicting Diabetes Progression -- 11.2 Least Squares -- 11.3 Fitting Nonlinear Curves -- 11.4 Goodness of Fit: R2 and Correlation -- 11.5 Correlation of Residuals -- 11.6 Linear Regression -- 11.7 LASSO Regression and Feature Selection -- 11.8 Further Reading -- 11.9 Glossary -- Chapter 12 Data Encodings and File Formats -- 12.1 Typical File Format Categories -- 12.2 CSV Files -- 12.3 JSON Files -- 12.4 XML Files…”
Libro electrónico -
1670por Tuhls, G. O.Tabla de Contenidos: “…-- Über dieses Buch -- Hilflose Hilfe -- Versions- und Wissensstand -- Der Weg zur Funktion -- Konventionen -- Kapitel 1: Das virtuelle Blatt Papier -- 1.1 Das Papierformat -- 1.1.1 Lineale einblenden -- 1.1.2 Seitenränder festlegen -- 1.1.3 Seitenränder außerhalb des druckbaren Bereichs -- 1.1.4 Seite einrichten für beidseitigen Druck -- 1.1.5 Text auf der Seite vertikal ausrichten/anordnen -- 1.1.6 Unterschiedliche Seiteneinstellungen in einem Dokument -- 1.1.7 Wenn der Abschnittswechsel nicht sichtbar ist -- 1.1.8 Einstellungen in der Dokumentvorlage sichern -- 1.1.9 Seiteneinstellungen übertragen -- 1.2 Textspalten -- 1.2.1 Spaltenanzahl und -breite -- 1.2.2 Spaltenwechsel erzwingen -- 1.2.3 Gleiche Höhe (Registerhaltigkeit) der Zeilen im Spaltensatz -- 1.2.4 Bündiger Spaltenabschluss am Textende -- 1.3 Das Layout testen (Blindtext) -- 1.4 Textfelder und Positionsrahmen -- 1.4.1 Standardformatierung für Textfelder definieren -- 1.4.2 Text in Textfeldern verknüpfen (Textüberlauf) -- 1.4.3 Positionsrahmen formatieren -- 1.4.4 Positionsrahmen als Formatvorlage -- Kapitel 2: Der Briefbogen -- 2.1 Fertigen Briefbogen bedrucken -- 2.1.1 Kopfbogen-Scan als Orientierungshilfe -- 2.1.2 Text im Kopfbogen positionieren -- 2.2 Briefkopf etc. im Dokument -- 2.2.1 Briefkopf und Geschäftsangaben in die Vorlage übernehmen -- 2.2.2 Das Anschriftenfeld einfügen -- 2.2.3 Automatisches Datum -- 2.2.4 Loch- und Falzmarken -- 2.3 Informationen auf Folgeseiten wiederholen -- 2.3.1 Mit Textmarke und {StyleRef} -- 2.3.2 Mit XML-Koppelung -- Kapitel 3: Kopf- und Fußzeilen -- 3.1 Kopf- und Fußzeilen einrichten -- 3.1.1 Kopf- und Fußzeilen aus- und einblenden -- 3.1.2 Abstände von Kopf und Fußzeilen zum Seitenrand einrichten -- 3.2 Kopf- und Fußzeilen bearbeiten -- 3.2.1 Tabulatoren in Kopfzeilen benutzen -- 3.2.2 Die erste Seite anders gestalten…”
Publicado 2024
Libro electrónico -
1671por Foltz, KevinTabla de Contenidos: “…3.3.4 Secure Data Acquisition -- 3.3.5 Integrity at the Source -- 3.4 Temporal Data -- 3.5 Credential Data -- 3.6 Distributed Stores -- 4 Access and Privilege -- 4.1 Access Control -- 4.2 Authorization and Access in General -- 4.3 Access Control List -- 4.3.1 Group Requirements -- 4.3.2 Role Requirements -- 4.3.3 ACRs and ACLs -- 4.3.4 Discretionary Access Control and Mandatory Access Control -- 4.4 Complex Access Control Schemas -- 4.5 Privilege -- 4.6 Concept of Least Privilege -- 4.6.1 Least Privilege Case Study -- 5 Cryptography -- 5.1 Introduction -- 5.2 Cryptographic Keys and Key Management -- 5.2.1 Asymmetric Key Pairs -- 5.2.1.1 RSA Key Generation -- 5.3 Symmetric Keys -- 5.3.1 TLS Mutual Authentication Key Production -- 5.3.2 Other Key Production -- 5.4 Store Keys -- 5.5 Delete Keys -- 5.6 Encryption -- 5.7 Symmetric versus Asymmetric Encryption Algorithms -- 5.7.1 Asymmetric Encryption -- 5.7.2 RSA Asymmetric Encryption -- 5.7.3 Combination of Symmetric and Asymmetric Encryption -- 5.7.4 Symmetric Encryption -- 5.7.4.1 Stream Ciphers -- 5.7.4.2 Block Ciphers -- 5.7.5 AES/Rijndael Encryption -- 5.7.5.1 Description of the AES Cipher -- 5.7.6 Data Encryption Standard -- 5.7.6.1 Triple DES -- 5.7.6.2 Description of the Triple DES Cipher -- 5.8 Decryption -- 5.8.1 Asymmetric Decryption -- 5.8.2 Symmetric Decryption -- 5.9 Hash Function -- 5.9.1 Hash Function Algorithms -- 5.9.2 Hashing with Cryptographic Hash Function -- 5.9.2.1 MD-5 -- 5.9.2.2 SHA-3-Defined SHA-512 -- 5.10 Signatures -- 5.10.1 XML Signature -- 5.10.2 S/MIME Signature -- 5.10.3 E-Content Signature -- 5.11 A Note on Cryptographic Key Lengths -- 5.11.1 Encryption Key Discovery -- 5.11.2 The High-Performance Dilemma -- 5.11.3 Parallel Decomposition of Key Discovery -- 5.12 Internet Protocol Security -- 5.13 Other Cryptographic Services -- 5.14 The Java Cryptography Extension…”
Publicado 2020
Libro electrónico -
1672Publicado 2003“…This book will allow developers to: Develop a solid basis in the theory of cryptography, so they can understand how the security tools in the .NET Framework function Learn to use symmetric algorithms, asymmetric algorithms, and digital signatures Master both traditional encryption programming as well as the new techniques of XML encryption and XML signatures Learn how these tools apply to ASP.NET and Web Services security…”
Libro electrónico -
1673Publicado 2004Tabla de Contenidos: “…Migration -- 11.1 What is migration -- 11.2 Migration categories -- 11.3 Migration planning -- 11.3.1 What content should be migrated -- 11.3.2 Will the Lotus Workplace Web Content Management environment support the migrated content -- 11.3.3 Migration timing -- 11.4 Migration scenarios and the best tools for each -- 11.4.1 Assumptions -- 11.4.2 Typical use cases for migration offerings -- 11.5 Migration tools -- 11.5.1 XML Data Mediator -- 11.5.2 Information Integrator -- Part 4 Appendix -- Appendix A. …”
Libro electrónico -
1674Tabla de Contenidos: “…DFSMSrmm enhancements -- 2.1 Changes introduced with z/OS V1R6 DFSMSrmm -- 2.1.1 ISPF dialog enhancements -- 2.1.2 DFSMSrmm client/server support -- 2.1.3 Enhanced IBM 3592 support -- 2.1.4 Command reference summary in Guide and Reference -- 2.1.5 C++ API with XML Output Option -- 2.2 Changes introduced with z/OS V1R5 DFSMSrmm -- 2.2.1 Enhanced multilevel security -- 2.3 Changes introduced with z/OS V1R3 DFSMS -- 2.3.1 Duplicate volume support -- 2.3.2 Backup at any time -- 2.3.3 Multilevel security support -- 2.3.4 CDS utilization displays now available…”
Libro electrónico -
1675Publicado 2008“…Fundamental and Advanced XML Schema XML Schema basics are covered within the context of Web services and SOA, after which advanced XML Schema chapters delve into a variety of specialized message design considerations and techniques, including the use of wildcards, reusability of schemas and schema fragments, type inheritance and composition, CRUD-style message design, and combining industry and custom schemas. …”
Libro electrónico -
1676por Coronel, CarlosTabla de Contenidos: “…-- 1.5 Evolución del procesamiento de datos de un sistema de archivos -- 1.5.1 Sistemas de archivos manuales -- 1.5.2 Sistemas de archivos computarizados -- 1.5.3 El sistema de archivos revisitado: modernas herramientas de productividad para el usuario final -- 1.6 Problemas con el procesamiento de datos del sistema de archivos -- 1.6.1 Dependencia estructural y de datos -- 1.6.2 Redundancia de datos -- 1.6.3 Falta de capacidad para diseñar y modelar datos -- 1.7 Sistemas de bases de datos -- 1.7.1 El ambiente de un sistema de bases de datos -- 1.7.2 Funciones de un DBMS -- 1.7.3 Administración del sistema de bases de datos: un cambio en enfoque -- Resumen -- Términos clave -- Preguntas de repaso -- Problemas -- CAPÍTULO 2 Modelos de datos -- 2.1 Modelado de datos y modelos de datos -- 2.2 La importancia de modelos de datos -- 2.3 Elementos básicos de un modelo de datos -- 2.4 Reglas de negocios -- 2.4.1 Descubrimiento de las reglas de negocios -- 2.4.2 Conversión de reglas de negocios en componentes de modelo de datos -- 2.4.3 Dar nombre a convenciones -- 2.5 La evolución de los modelos de datos -- 2.5.1 Modelos jerárquico y de red -- 2.5.2 El modelo relacional -- 2.5.3 El modelo entidad-relación -- 2.5.4 El modelo orientado a objetos (OO) -- 2.5.5 Modelos más recientes de datos: objeto/relacional y XML -- 2.5.6 El futuro de modelos de datos -- 2.5.7 Modelos de datos: un resumen -- 2.6 Grados de abstracción de datos -- 2.6.1 El modelo externo…”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1677por Moore, BillTabla de Contenidos: “…-- 2.3 Architecture and components -- 2.3.1 Web container -- 2.4 Key technologies -- 2.4.1 Java 2 Platform, Enterprise Edition -- 2.4.2 Java Database Connectivity -- 2.4.3 XML -- 2.4.4 Jakarta -- Chapter 3. Development tools -- 3.1 WebSphere Application Server - Express, V5.0 -- 3.1.1 WebSphere Application Server - Express components -- 3.1.2 Deploying WebSphere Application Server - Express -- 3.1.3 Eclipse technology -- 3.1.4 WebSphere Application Server - Express tooling -- 3.1.5 WebSphere Studio -- 3.1.6 Express Application Server: Overview -- 3.2 Information road map -- 3.2.1 Installation -- 3.2.2 Migration -- 3.2.3 Application development -- 3.3 Using WebSphere Studio -- 3.3.1 Perspectives -- 3.3.2 Editors -- 3.3.3 Customizing perspectives -- 3.3.4 Using fast views -- 3.3.5 Setting perspective preferences -- 3.3.6 The workspace -- 3.3.7 Recovering files from their local history -- 3.3.8 Finding help…”
Publicado 2003
Libro electrónico -
1678Publicado 2018“…You will learn about WSDL (SOAP header, SOAP body and SOAP fault), XSD (XML schema definition) and JAXB (Java API for XML binding). …”
-
1679Publicado 2008“…Download Complete DB2 V9 Trial Version Visit ibm.com/db2/9/download.html to download a complete trial version of DB2, which enables you to try out dozens of the most powerful features of DB2 for yourself: everything from pureXML support to automated administration and optimization. …”
Libro electrónico -
1680Publicado 2011“…Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authentication technologies See how real-world session attacks leak sensitive data and how to fortify your applications Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments Safety deploy XML, social networking, cloud computing, and Web 2.0 services Defend against RIA, Ajax, UGC, and browser-based, client-side exploits Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures…”
Libro electrónico