Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,383
- Application software 1,224
- Microsoft .NET Framework 806
- Management 671
- Engineering & Applied Sciences 599
- Web site development 516
- Taxation 482
- Computer Science 473
- Java (Computer program language) 407
- Law and legislation 385
- Computer networks 337
- Economics 330
- Design 329
- Computer programming 326
- Artificial intelligence 318
- Computer software 316
- Microsoft software 312
- Security measures 308
- Web sites 308
- JavaScript (Computer program language) 306
- Python (Computer program language) 300
- Web applications 293
- Computer security 291
- Information technology 272
- Data processing 264
- Programming 261
- Cloud computing 258
- Computer programs 252
- Economic conditions 242
- History 238
-
14901por Jay, RabiTabla de Contenidos: “…Educate Everyone as to How AI/ML Can Solve Business Problems -- Define Your Business Objectives -- Identify the Pain Points -- Start with Root-Cause Analysis -- Identify the Success Metrics -- Explore the Latest Industry Trends -- Review AI Applications in Various Industries -- Map the Use Case to the Business Problem -- Prioritizing Your Use Cases -- Define the Impact Criteria -- Define the Feasibility Criteria -- Assess the Impact -- Assess the Feasibility -- Prioritize the Use Cases -- Review and Refine the Criteria -- Choose the Right Model -- Use Cases to Choose From -- AI Use Cases for DevOps -- AI for Healthcare and Life Sciences -- AI Enabled Contact Center Use Cases -- Business Metrics Analysis -- Content Moderation -- AI for Financial Services -- Cybersecurity -- Digital Twinning -- Identity Verification -- Intelligent Document Processing -- Intelligent Search -- Machine Translation -- Media Intelligence -- ML Modernization -- ML-Powered Personalization -- Computer Vision -- Personal Protective Equipment -- Generative AI -- Workbook Template: Use Case Identification Sheet -- Summary -- Review Questions -- Answer Key -- Chapter 9 Evaluating AI/ML Platforms and Services -- Benefits and Factors to Consider When Choosing an AI/ML Service -- Benefits of Using Cloud AI/ML Services -- Factors to Consider When Choosing an AI/ML Service -- AWS AI and ML Services -- AI Services -- Amazon SageMaker -- AI Frameworks -- Differences Between Machine Learning Algorithms, Models, and Services -- Core AI Services -- Text and Document Services -- Chatbots: Amazon Lex -- Speech -- Vision Services -- Specialized AI Services -- Business Processing Services -- Kendra for Search -- Code and DevOps -- Industrial Solutions -- Healthcare Solutions -- Machine Learning Services -- Amazon SageMaker -- Amazon SageMaker Canvas -- SageMaker Studio Lab…”
Publicado 2024
Libro electrónico -
14902Publicado 2024Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Ethical Hacking -- Understanding the need for cybersecurity -- Exploring cybersecurity terminology -- Identifying threat actors and their intent -- Understanding what matters to threat actors -- Time -- Resources -- Financial factors -- Hack value -- Exploring the importance of penetration testing -- Penetration testing methodologies -- Pre-engagement phase -- Information-gathering phase -- Threat modeling -- Vulnerability analysis -- Exploitation -- Post-exploitation -- Report writing -- Discovering penetration testing approaches -- Types of penetration testing -- Web application penetration testing -- Mobile application penetration testing -- Social engineering penetration testing -- Network penetration testing (external and internal) -- Cloud penetration testing -- Physical penetration testing -- Exploring the phases of penetration testing -- Reconnaissance -- Scanning and enumeration -- Gaining access (exploitation) -- Maintaining access -- Covering your tracks -- Understanding the Cyber Kill Chain framework -- Reconnaissance -- Weaponization -- Delivery -- Exploitation -- Installation -- Command and Control (C2) -- Actions on objectives -- Summary -- Further reading -- Chapter 2: Building a Penetration Testing Lab -- Technical requirements -- An overview of the lab setup and technologies used -- Setting up a hypervisor and virtual networks -- Part 1 - setting up the hypervisor -- Part 2 - creating virtually isolated networks -- Setting up and working with Kali Linux -- Part 1 - deploying Kali Linux as a virtual machine -- Part 2 - customizing Kali Linux and its network adapters -- Part 3 - getting started with Kali Linux -- Part 4 - updating repository sources and packages -- Setting up a vulnerable web application…”
Libro electrónico -
14903Publicado 2024Tabla de Contenidos: “…Dead-letter queues (DLQs) -- Event sourcing -- Command query responsibility segregation (CQRS) -- Securing Lambda functions -- Code integrity -- Secure environment variables -- Runtime protection -- Lambda function versioning and aliases -- Access control -- Networking -- Execution limits -- Monitoring and logging -- Summary -- Questions -- Answers -- Further reading -- Chapter 8: Secure Design Patterns for Multi-tenancy in Shared Environments -- Understanding multi-tenancy concepts and challenges -- Definition and importance of multi-tenancy -- Challenges in multi-tenancy -- Multi-tenancy design patterns -- The silo model -- The pool model -- The bridge model -- Choosing the right design pattern -- Implementing secure data isolation techniques -- Network-level isolation -- Database-level Isolation -- Compute-level Isolation -- Application-level isolation -- Encryption-level isolation -- Managing access control for tenants -- Tenant authentication -- Implementing access control -- Tenant-managed access control -- Summary -- Questions -- Answers -- Further readings -- Chapter 9: Automate-Everything to Build Immutable and Ephemeral Resources -- From manual to programmatic management -- Manual and programmatic management defined -- Risks of manual resource management -- Shift to programmatic management -- Snowflake versus Phoenix systems -- IaC frameworks -- Benefits of adopting IaC -- Automated security testing -- Treating infrastructure as software -- Security testing in IaC pipelines -- Tools for automated security scanning -- Security best practices for IaC -- Apply least privileges -- Handle secrets securely -- Ensure compliance -- The Automate-Everything approach -- Summary -- Questions -- Answers -- Further reading -- Part 3: Monitoring, Automation and Continuous Improvement -- Chapter 10: Advanced Logging, Auditing, and Monitoring in AWS…”
Libro electrónico -
14904por Frederic H. MartiniTabla de Contenidos: “…Mitosis -- Cytokinesis -- 3-9 Tumors and cancers are characterized by abnormal cell growth and division -- 3-10 Cellular differentiation is cellular specialization as a result of gene activation or repression -- SPOTLIGHT -- Anatomy of a Model Cell -- Protein Synthesis, Processing, and Packaging -- CLINICAL NOTES -- Inheritable Mitochondrial Disorders -- DNA Fingerprinting -- Mutations and Mosaicism -- Chapter Review -- 4 The Tissue Level of Organization -- An Introduction to the Tissue Level of Organization -- 4-1 The four tissue types are epithelial, connective, muscle, and nervous -- 4-2 Epithelial tissue covers body surfaces, lines cavities and tubular structures, and serves essential functions -- Functions of Epithelia -- Intercellular Connections -- The Epithelial Surface -- The Basement Membrane -- Epithelial Renewal and Repair -- 4-3 Cell shape and number of layers determine the classification of epithelia -- Cell Layers -- Cell Shapes -- Classification of Epithelia -- Glandular Epithelia -- 4-4 Connective tissue provides a protective structural framework for other tissue types -- Connective Tissue Proper -- Types of Connective Tissue Proper -- Fluid Connective Tissues -- Supporting Connective Tissues -- 4-5 Tissue membranes are physical barriers of four types: mucous, serous, cutaneous, and synovial -- Mucous Membranes -- Serous Membranes -- The Cutaneous Membrane -- Synovial Membranes -- 4-6 The three types of muscle tissue are skeletal, cardiac, and smooth -- Skeletal Muscle Tissue -- Cardiac Muscle Tissue -- Smooth Muscle Tissue -- 4-7 Nervous tissue responds to stimuli and propagates electrical impulses throughout the body -- 4-8 The response to tissue injury involves inflammation and regeneration -- 4-9 With advancing age, tissue repair declines and cancer rates increase -- Aging and Tissue Structure -- Aging and Cancer Rates…”
Publicado 2021
Libro electrónico -
14905Publicado 2023Tabla de Contenidos: “…Automating builds and tests with CodeBuild -- Using CodeDeploy to orchestrate deployment workflows in compute environments -- Key components in CodeDeploy -- Key features offered by CodeDeploy -- Implementing end-to-end software delivery with CodePipeline -- Key constructs used by CodePipeline -- Triggering actions in other regions -- Rolling out a fully automated CI/CD pipeline in your AWS account -- Creating a base AMI for the application instances -- Deploying infrastructure and application stacks -- Summary -- Further reading -- Chapter 6: Programmatic Approach to IaC with AWS CDK -- Different approaches to managing infrastructure in AWS -- Manual infrastructure management -- Automating infrastructure rollouts with scripts -- Adopting a declarative approach -- Using infrastructure definition generators -- Using frameworks that offer high-level abstractions -- What is AWS CDK? …”
Libro electrónico -
14906Publicado 2024Tabla de Contenidos: “…Fetching and pushing branches and tags -- Push modes and their use -- Summary -- Questions -- Answers -- Further reading -- Chapter 9: Merging Changes Together -- Methods of combining changes -- Merging branches -- Copying and applying a changeset -- Rebasing a branch -- Squash merge -- Resolving merge conflicts -- The three-way merge -- Examining failed merges -- Avoiding merge conflicts -- Dealing with merge conflicts -- Summary -- Questions -- Answers -- Further reading -- Chapter 10: Keeping History Clean -- An introduction to Git internals -- Git objects -- Plumbing and porcelain Git commands -- Rewriting history -- Amending the last commit -- The interactive rebase -- External tools - patching management interfaces -- Rewriting project history with Git filter-repo -- External tools for large-scale history rewriting -- The perils of rewriting published history -- Amending history without rewriting -- Reverting a commit -- Storing additional information with notes -- Using git replace -- Summary -- Questions -- Answers -- Further reading -- Part 3 - Managing, Configuring, and Extending Git -- Chapter 11: Managing Subprojects -- Building a living framework -- Managing dependencies outside of Git -- Manually importing the code into your project -- A Git subtree solution for embedding the subproject code -- Creating a remote for a subproject -- Adding a subproject as a subtree -- Cloning and updating superprojects with subtrees -- Getting updates from subprojects with a subtree merge -- Showing changes between a subtree and its upstream -- Sending changes to the upstream of a subtree -- The Git submodules solution - a repository inside a repository -- Gitlinks, .git files, and the git submodule command -- Adding a subproject as a submodule -- Cloning superprojects with submodules -- Updating submodules after superproject changes…”
Libro electrónico -
14907Publicado 2024Tabla de Contenidos: “…-- Testing is a complex culture -- Testing has to be a team activity -- Take advantage now -- Testing approach and philosophy -- Testing is wildly used in the world -- The test pyramid -- How should I test my code? -- Frameworks and libraries -- Our first test -- Testing principles and goals -- Writing our first test suite -- Utils module -- Test core library -- Using the Jest library -- Mastering code coverage tooling -- Configuration -- Running the tests -- Node.js report -- TDD in action -- Summary -- Further reading -- Part 3: Web Application Fundamentals -- Chapter 9: Handling HTTP and REST APIs -- Technical requirements -- How the internet works under the hood…”
Libro electrónico -
14908OECD Workshop on Consumer Dispute Resolution and Redress in the Global Marketplace Background Reportpor Organisation for Economic Co-operation and Development.“…This report presents an overview of OECD member country frameworks for consumer dispute resolution and redress. …”
Publicado 2005
Capítulo de libro electrónico -
14909por International Energy Agency.“…The implementation phase for achieving a net zero steel industry will require robust methodologies for measuring emissions at the site- and product-level, together with data collection frameworks to facilitate comparison and track progress. …”
Publicado 2023
Libro electrónico -
14910por Hersent, OlivierTabla de Contenidos: “…10.5.1 Reference Topology and Network Elements 171 -- 10.5.2 C12.22 Node to C12.22 Network Communications 173 -- 10.5.3 C12.22 Device to C12.22 Communication Module Interface 174 -- 10.5.4 C12.19 Updates 176 -- 10.6 Other Parts of ANSI C12 Protocol Suite 176 -- 10.7 RFC 6142: C12.22 Transport Over an IP Network 176 -- 10.8 REST-Based Interfaces to C12.19 177 -- 11 DLMS/COSEM 179 -- 11.1 DLMS Standardization 179 -- 11.1.1 The DLMS UA 179 -- 11.1.2 DLMS/COSEM, the Colored Books 179 -- 11.1.3 DLMS Standardization in IEC 180 -- 11.2 The COSEM Data Model 181 -- 11.3 The Object Identification System (OBIS) 182 -- 11.4 The DLMS/COSEM Interface Classes 184 -- 11.4.1 Data-Storage ICs 185 -- 11.4.2 Association ICs 185 -- 11.4.3 Time- and Event-Bound ICs 186 -- 11.4.4 Communication Setup Channel Objects 186 -- 11.5 Accessing COSEM Interface Objects 186 -- 11.5.1 The Application Association Concept 186 -- 11.5.2 The DLMS/COSEM Communication Framework 187 -- 11.5.3 The Data Communication Services of COSEM Application Layer 189 -- 11.6 End-to-End Security in the DLMS/COSEM Approach 191 -- 11.6.1 Access Control Security 191 -- 11.6.2 Data-Transport Security 192 -- Part IV THE NEXT GENERATION: IP-BASED PROTOCOLS -- 12 6LoWPAN and RPL 195 -- 12.1 Overview 195 -- 12.2 What is 6LoWPAN? …”
Publicado 2012
Libro electrónico -
14911Publicado 2012“…CakePHP ist der schmackhafte Senkrechtstarter unter den Rapid-Development-Frameworks für PHP, mit ihm lässt sich die Entwicklungszeit von PHP-Applikationen extrem beschleunigen. …”
Libro electrónico -
14912Publicado 2020“…For each of these application types, you'll use frameworks such as Actix, Tera, Yew, Quicksilver, ggez, and nom. …”
Libro electrónico -
14913
Grabación musical -
14914Publicado 2023“…Understanding these frameworks as colonial constructions of the human, identity is traced to a socio-material condition that emerges with the modernity/colonialism binary…”
Libro electrónico -
14915
-
14916por Martín Sierra, Antonio J.Tabla de Contenidos: “…3.1.2 IMPLEMENTACIÓN DE LA CLASE OBJETOAJAX -- 3.1.2.1 CONSTRUCTOR -- 3.1.2.2 EL ENVÍO DE LA PETICIÓN -- 3.1.2.3 ACCESO A LA RESPUESTA -- 3.1.2.4 ESTADO DE LA RESPUESTA -- 3.1.3 UTILIZACIÓN DE LA CLASE OBJETOAJAX -- 3.2 JSON -- 3.2.1 CARACTERÍSTICAS DE JSON -- 3.2.2 ESTRUCTURA DE DATOS JSON -- 3.2.2.1 OBJETOS JSON -- 3.2.2.2 ARRAYS -- 3.2.3 INTERPRETACIÓN DE JSON EN CLIENTE 3.2.3 INTERPRETACIÓN DE JSON EN CLIENTE -- 3.2.4 EJEMPLO DE UTILIZACIÓN -- 3.2.5 LA LIBRERÍA JSON -- 3.3 DIRECT WEB REMOTING -- 3.3.1 COMPONENTES DWR -- 3.3.2 EL KIT DE DESARROLLO DWR3.3.2 EL KIT DE DESARROLLO DWR -- 3.3.3 FUNCIONAMIENTO DE UNA APLICACIÓN DWR -- 3.3.4 DESARROLLO DE UNA APLICACIÓN DWR3.3.4 DESARROLLO DE UNA APLICACIÓN DWR -- 3.3.4.1 CONFIGURACIÓN DEL ENTORNO -- 3.3.4.2 IMPLEMENTACIÓN DE LA CLASE DEL SERVIDOR -- 3.3.4.3 CREACIÓN DEL ARCHIVO DWR.XML -- 3.3.4.4 CREACIÓN DE LA PÁGINA CLIENTE -- 3.3.4.5 UTILIDADES DWR DE CLIENTE -- 3.3.5 OPCIONES DE CONFIGURACIÓN DE DWR.XML3.3.5 OPCIONES DE CONFIGURACIÓN DE DWR.XML -- 3.3.5.1 INSTANCIAS DE OBJETOS SIN CONSTRUCTORES PÚBLICOS -- 3.3.5.2 INCLUSIÓN Y EXCLUSIÓN DE MÉTODOS -- 3.3.5.3 CONVERTIDORES -- 3.4 HERRAMIENTAS AJAX PARA CLIENTE -- 3.4.1 PROTOTYPE -- 3.4.1.1 EL NÚCLEO DE OBJETOS PROTOTYPE -- 3.4.1.2 UTILIDADES PROTOTYPE -- 3.4.2 LA LIBRERÍA SCRIPT.ACULO.US -- 3.4.3 EL FRAMEWORK JQUERY -- 3.4.3.1 UTILIZACIÓN DE JQUERY -- 3.4.3.2 COMPONENTES JQUERY -- 4 AJAX EN APLICACIONES JAVA EE -- 4.1 ARQUITECTURA DE TRES CAPAS -- 4.1.1 CAPA CLIENTE -- 4.1.2 CAPA INTERMEDIA -- 4.1.3 CAPA DE DATOS -- 4.2 ARQUITECTURA MODELO VISTA CONTROLADOR -- 4.2.1 EL CONTROLADOR -- 4.2.2 LA VISTA -- 4.2.3 EL MODELO. -- 4.2.4 APLICACIÓN MVC BÁSICA -- 4.2.4.1 SOLUCIÓN SIN AJAX -- 4.2.4.2 SOLUCIÓN CON AJAX -- 4.2.5 IMPLEMENTACIÓN DE UN CARRITO DE COMPRA -- 4.2.5.1 EL MODELO -- 4.2.5.2 EL CONTROLADOR -- 4.2.5.3 LA VISTA -- 4.3 JAVASERVER FACES…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
14917Publicado 2019Tabla de Contenidos: “…MILLIONS OF NUMBERS WITHOUT SOUL -- NUMERICAL SIMULATION OF GROUNDWATER CIRCULATION WELLS: A STOCHASTIC APPROACH TO EVALUATE THEIR EFFECTIVENESS -- COMPOSITIONAL FINGERPRINTING TOOLS FOR HYDROCARBON CONTAMINATED SITE CHARACTERIZATION: SOURCE APPORTIONMENT AND SPILL DATING APPLICATIONS AT TWO FIELD CASE STUDIES -- MULTI-ISOTOPIC APPROACH FOR THE GROUNDWATER FLOW AND CONTAMINANTS CHARACTERIZATION IN A COMPLEX CONTAMINATED SITE: EX-ACNA DI CENGIO (SV) -- AN INTERDISCIPLINARY APPROACH TO EVALUATE THE NATURAL ATTENUATION AS POTENTIAL REMEDIATION ACTION -- INNOVATIVE TOOLS FOR THE ANALYSIS OF BIOLOGICAL PROCESSES FOR THE REMEDIATION OF CONTAMINATED AQUIFERS -- INTEGRATED USE OF BIODEGRADABLE SURFACTANTS AND ISCO REAGENTS FOR THE TREATMENT OF HYDROCARBON CONTAMINATED SOILS AND AQUIFERSHYDROGEOLOGICAL CHARACTERIZATION OF A CLOSED MSW LANDFILL USING MULTIVARIATE STATISTICAL ANALYSIS AND GROUNDWATER NUMERICAL MODELLING -- URBAN HYDROGEOLOGY -- HOW MODELS SURPRISE -- NULLSPACE MONTE CARLO PARTICLE TRACKING TO IDENTIFY SOURCE AREAS OF GROUNDWATER POLLUTION IN THE N-W MILANO FUA (AMIIGA PROJECT-CE No 32) -- WATER RESOURCES PROVIDED BY THE MAJOR AQUIFERS IN THE PROVINCE OF SIENA WITHIN THE FRAMEWORK OF THE PROVINCIAL TERRITORIAL PLAN (PTCP) -- HYDROGEOLOGICAL SETTING OF A ROME CITY SECTOR: SHALLOW GROUNDWATER IN THE RIGHT BANK OF TIBER RIVER INSIDE THE G.R.A HIGHWAY -- A PRELIMINARY METHOD FOR THE ASSESSMENT OF GROUNDWATER FLOODING SUSCEPTIBILITY IN URBAN AND RURAL AREAS -- HYDROTHERMAL MANAGEMENT OF AN ATES SYSTEM IN WALLONIA, BELGIUM -- EVALUATION OF HYDROFACIES CONNECTIVITY AND HYDRAULIC PROPERTIES BY USING FACIES AND SEQUENCE STRATIGRAPHY ANALYSIS: THE CASE OF THE PALATINE HILL, CENTRAL ARCHAEOLOGICAL AREA OF ROME -- EVALUATION OF NITRATE TRENDS IN GROUNDWATER: A CASE STUDY IN A GROUNDWATER BODY IN SOUTHERN ITALY -- PRESERVING ARCHAEOLOGICAL HERITAGES FROM FLOOD HAZARD: USE OF 3D GEOLOGICAL MODELS AS A BASE FOR CONCEPTUAL HYDROGEOLOGICAL SCHEME IN THE AREA OF THE COLISEUM (ROME) -- FOLLOW-UP INVESTIGATION ON GROUNDWATER FLOWPATH AT REGIONAL SCALE USING A MULTI-ISOTOPIC APPROACH: THE CASE STUDY OF LOMBARDY REGION -- ASSESSING AQUIFER VULNERABILITY TO SEAWATER INTRUSION ACCOUNTING FOR SURFACE WATER BODIES -- EVALUATION OF THE DEPOSITION, INFILTRATION AND DRAINAGE OF THE ATMOSPHERIC POLLUTANTS IN THE VADOSE ZONE -- HOW LONG WILL IT TAKE? …”
Libro electrónico -
14918por BCS, The Chartered Institute for ITTabla de Contenidos: “…-- Farah Magrabi, Ibrahim Habli, Mark Sujan, David Wong, Harold Thimbleby, Maureen Baker, Enrico Coiera -- Technologies that transform: digital solutions for optimising medicines use in the NHS -- Stephen John Goundrey-Smith -- Communications -- Human factors challenges for the safe use of artificial intelligence in patient care -- Mark Sujan, Dominic Furniss, Kath Grundy, Howard Grundy, David Nelson, Matthew Elliott, Sean White, Ibrahim Habli, Nick Reynolds -- Recording problems and diagnoses in clinical care: developing guidance for healthcare professionals and system designers -- Anoop Dinesh Shah, Nicola J Quinn, Afzal Chaudhry, Ralph Sullivan, Julian Costello, Dermot O'Riordan, Jan Hoogewerf, Martin Orton, Lorraine Foley, Helene Feger, John G Williams -- Editorial -- Welcome to BMJ Health & Care Informatics -- Philip Scott -- Original Article -- Large retrospective analysis on frailty assessment in primary care: electronic Frailty Index versus frailty coding -- Pablo Millares-Martin -- Original Research -- Patient perceptions and interactions with their web portal-based laboratory results -- Sean Robinson, Melissa Reed, Travis Quevillon, Ed Hirvi -- Small interface changes have dramatic impacts: how mandatory fields in electronic medical records increased pertussis vaccination rates in Australian obstetric patients -- Roberto Orefice, Julie A Quinlivan -- Potential impact of data source and interoperability messaging on health information technology (HIT) users: a study series from the United States Department of Veterans Affairs -- Jennifer Herout, Donna Baggetta, Amanda Cournoyer, Aaron S Dietz, Jane Robbins, Kyle Maddox, Jolie Dobre -- Clinician preferences for computerised clinical decision support for medications in primary care: a focus group study -- Katy E Trinkley, Weston W Blakeslee, Daniel D Matlock, David P Kao, Amanda G Van Matre, Robert Harrison, Cynthia L Larson, Nic Kostman, Jennifer A Nelson, Chen-Tan Lin, Daniel C Malone -- Reliability of comorbidity scores derived from administrative data in the tertiary hospital intensive care setting: a cross-sectional study -- Michael Hua-Gen Li, Anastasia Hutchinson, Mark Tacey, Graeme Duke -- Conformity of Diabetes Mobile apps with the Chronic Care Model -- Raheleh Salari, Sharareh R Niakan Kalhori, Marjan Ghazisaeidi, Farhad Fatehi -- Digital innovation evaluation: user perceptions of innovation readiness, digital confidence, innovation adoption, user experience and behaviour change -- Tim Benson -- Dietitians can improve accuracy of prescribing by interacting with electronic prescribing systems -- Susan De Waal, Laurie Lucas, Simon Ball, Tanya Pankhurst -- Lessons learned from a comprehensive electronic patient record procurement process-implications for healthcare organisations -- W Priestman, R Collins, H Vigne, S Sridharan, L Seamer, D Bowen, N J Sebire -- Trend of intestinal infectious diseases recorded at a tertiary care hospital in India: an ICD-10 analysis -- P N Roopalekha Jathanna, Ramya Vijeta, Vinod R Jathanna -- Developing a telerehabilitation programme for postoperative recovery from knee surgery: specifications and requirements -- MReza Naeemabadi, Birthe Dinesen, Ole Kæseler Andersen, Niels Kragh Madsen, Ole Højgaard Simonsen, John Hansen -- Interventions to improve the use of EMRs in primary health care: a systematic review and meta-analysis -- Noura Hamade, Amanda Terry, Monali Malvankar-Mehta -- Web and mobile-based technologies for monitoring high-risk pregnancies -- Haleh Ayatollahi, Malihe Ghalandar Abadi, Morteza Hemmat -- Characteristics of patients with body mass index recorded within the Kent Integrated Dataset (KID) -- Zara Cuccu, Gerrard Abi-Aad, Allison Duggal -- Growth of health literacy research activity in three Middle Eastern countries -- Soheila Bazm, Reihaneh Bazm, Farzaneh Sardari -- Effectiveness of the eCARE programme: a short message service for asthma monitoring -- Lathy Prabhakaran, Yap Chun Wei -- Design and virtual implementation of a biomedical registry framework for the enhancement of clinical trials: colorectal cancer example -- Athanasios Kotoulas, George Lambrou, Dimitrios-Dionysios Koutsouris -- Coding and classifying GP data: the POLAR project -- Christopher Pearce, Adam McLeod, Jon Patrick, Jason Ferrigi, Michael Michael Bainbridge, Natalie Rinehart, Anna Fragkoudi -- Ontology to identify pregnant women in electronic health records: primary care sentinel network database study -- Harshana Liyanage, John Williams, Rachel Byford, Simon de Lusignan -- An intervention study to assess potential effect and user experience of an mHealth intervention to reduce sedentary behaviour among older office workers -- Simone Boerema, Lex van Velsen, Hermie Hermens -- Availability and usage of clinical decision support systems (CDSSs) in office-based primary care settings in the USA -- Xia Jing, Lina Himawan, Timothy Law -- NHS Scotland's Decision Support Platform: a formative qualitative evaluation -- Kathrin Cresswell, Margaret Callaghan, Hajar Mozaffar, Aziz Sheikh -- Two algorithms for the reorganisation of the problem list by organ system -- Daniel B Hier, Joshua Pearson -- Design and implementation of the stacked, synchronised and iconographic timeline-structured electronic patient record in a UK NHS Global Digital Exemplar hospital -- Alan Arthur Hales, David Cable, Eleanor Crossley, Callum Findlay, David Anthony Rew -- e-Therapies in England for stress, anxiety or depression: how are apps developed? …”
Publicado 2019
Revista digital -
14919Publicado 2018Tabla de Contenidos: “…. -- Chapter 6: Data Access - EF7 with Repository, SQL Server, and Stored Procedures -- Introduction -- DbContext -- Entity Framework (EF) approach -- Configuring the IOC life cycle for the repository pattern -- Getting ready -- How to do it... -- Using EF with an existing database -- Getting ready…”
Libro electrónico -
14920Publicado 2018Tabla de Contenidos: “…Declarations -- Providers -- Imports -- Test doubles -- Jasmine specs -- Angular e2e tests -- e2e test execution -- e2e spec -- Troubleshooting common Angular errors -- Debugging with Chrome Developer Tools -- Optimizing Chrome Dev Tools -- Troubleshooting network issues -- Investigating console errors -- Karma, Jasmine, and Unit Testing errors -- NetworkError -- Generic ErrorEvents -- Debugging with Visual Studio Code -- Null guarding in Angular -- Property initialization -- Safe navigation operator -- Null guarding with *ngIf -- Containerizing the app using Docker -- Installing Docker -- Setting up Docker scripts -- Docker extension in VS Code -- NPM Scripts in VS Code -- Deploying containerized app -- Zeit Now -- Configuring the Now CLI tool -- Deploying -- Summary -- Chapter 4: Staying Up to Date with Angular Updates -- A brief history of web frameworks -- Updating Node -- n - Node version manager for macOS -- Updating npm and Global npm packages -- Global Npm packages -- Npm fails to install a global tool on Windows -- Updating Angular -- Angular update guide -- Take stock of your current version -- Using Angular Update Guide -- Updating your Angular app -- Pre-upgrade checklist -- Before updating -- During the Update -- Incompatible peer dependencies -- Continuing the update -- After the update -- Post Update Checklist -- Manual update -- Testing performance -- Addressing security vulnerabilities -- Updating your web server -- Updating Docker image -- Summary -- Chapter 5: Enhance Angular App with Angular Material -- Angular Material -- Angular Material setup and performance -- Installing Angular Material -- Automatically -- Manually -- Understanding Material's components -- Manually configuring Angular Material -- Importing modules -- Importing theme -- Adding Material Icon font -- Angular Flex Layout -- Responsive layouts…”
Libro electrónico