Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,383
- Application software 1,224
- Microsoft .NET Framework 806
- Management 671
- Engineering & Applied Sciences 599
- Web site development 516
- Taxation 482
- Computer Science 473
- Java (Computer program language) 407
- Law and legislation 385
- Computer networks 337
- Economics 330
- Design 329
- Computer programming 326
- Artificial intelligence 318
- Computer software 316
- Microsoft software 312
- Security measures 308
- Web sites 308
- JavaScript (Computer program language) 306
- Python (Computer program language) 300
- Web applications 293
- Computer security 291
- Information technology 272
- Data processing 264
- Programming 261
- Cloud computing 258
- Computer programs 252
- Economic conditions 242
- History 238
-
14941por O'Sullivan, BryanTabla de Contenidos: “…Functional Programming -- Thinking in Haskell -- A Simple Command-Line Framework -- Warming Up: Portably Splitting Lines of Text -- A Line-Ending Conversion Program -- Infix Functions -- Working with Lists -- Basic List Manipulation -- Safely and Sanely Working with Crashy Functions -- Partial and Total Functions -- More Simple List Manipulations -- Working with Sublists -- Searching Lists -- Working with Several Lists at Once -- Special String-Handling Functions -- How to Think About Loops -- Explicit Recursion…”
Publicado 2009
Libro electrónico -
14942Publicado 2014Tabla de Contenidos: “…Concurrent Statistics Gathering -- Enhancements to Incremental Statistics -- Online Statistics Gathering for Bulk Loads -- Session-Private Statistics for Global Temporary Tables -- Running Statistics Gathering Options in Reporting Mode -- Reports on Past Statistics Collection Operations -- Optimizer-Related New Features -- Adaptive Query Optimization -- Histograms -- End of Line -- Chapter 12: Other Oracle Database 12c New Features -- Data Pump Export and Import New Features -- The views_as_tables Parameter -- Moving Databases Across Platforms, Regardless of Byte Format, with Transportable Tablespaces -- Transform Clause New Features -- Data Pump Fully Supports Oracle's New Multitenant Database Technologies -- Enable Unified Auditing for Data Pump Jobs -- Miscellaneous Enhancements to Data Pump -- Oracle SQL*Loader Enhancements -- SQL*Loader Express Mode -- SQL*Loader Support for Identity Columns -- SQL*Loader Support for Extended Data Types -- SQL*Loader Support for Unified Auditing -- SQL*Loader dNFS-Related Features -- SQL*Loader Control File New Clauses -- SQL*Loader Command-Line Enhancements -- Oracle External Tables Enhancements -- Oracle Log Miner Enhancements -- ADR DDL and Debug Logs -- Oracle SecureFiles Enhancements -- Oracle R Enterprise, Hadoop, and MapReduce -- Oracle R Enterprise -- Hadoop/MapReduce in the Oracle Database -- CloneDB -- SQL Translation Framework -- End of Line -- Appendix A: Deprecated and Desupported Features in Oracle Database 12c -- Defining Deprecation and Desupport -- Deprecated Features in Oracle Database 12c -- Desupported Features in Oracle Database 12c -- Deprecated Parameters in Oracle Database 12c -- Deprecated Views in Oracle Database 12c -- Appendix B: New Parameters and Views in Oracle Database 12c -- New Parameters in Oracle Database 12c -- New Views in Oracle Database 12c -- Index…”
Libro electrónico -
14943Publicado 2013Tabla de Contenidos: “…-- 7 Fundraising and the Giver's Mind -- 7.1 Charity Auctions -- 7.2 Motivational Crowding -- 7.3 Peer Pressure -- 7.4 The Giving Habit -- 7.5 Giving to Disasters -- 7.6 Giving Bundled with Consuming -- 8 Conclusion -- References -- 2.Taxation and Development -- 1 Introduction -- 2 Perspectives on Taxation and Development -- 3 Background Facts -- 4 Framework -- 5 Drivers of Change -- 5.1 Economic Development -- 5.2 Politics -- 5.3 Value of Public Spending -- 5.4 Non-Tax Revenues -- 5.5 Compliance Technologies -- 6 Conclusion -- Acknowledgments -- References -- 3.Social Insurance: Connecting Theory to Data -- 1 Introduction -- 2 Motivations for Social Insurance -- 2.1 Adverse Selection: Review of the Basic Theory -- 2.1.1 A Stylized Model -- 2.1.2 The Textbook Case…”
Libro electrónico -
14944Publicado 2019Tabla de Contenidos: “…Boling, Karen Kohn -- "Scrumming" the Library Materials Budget: A Serendipitous Application of an Agile Project Management Framework / Raimonda Margjoni, Michelle McClure -- Sudden Collections Coordinators: When You Don't Know What You Don't Know / Ariel F. …”
Libro electrónico -
14945por Hales, JasonTabla de Contenidos: “…Exercise 4.01: Maintaining Order within a List -- Queues -- Stacks -- HashSets -- Dictionaries -- Exercise 4.02: Using a Dictionary to Count the Words in a Sentence -- LINQ -- Query Operators -- Query Expressions -- Deferred Execution -- Standard Query Operators -- Projection Operations -- Select -- Anonymous Types -- SelectMany -- Filtering Operations -- Sorting Operations -- OrderBy and OrderByDescending -- ThenBy and ThenByDescending -- Exercise 4.03: Filtering a List of Countries by Continent and Sorting by Area -- Partitioning Operations -- Grouping Operations -- Exercise 4.04: Finding the Most Commonly Used Words in a Book -- Aggregation Operations -- Quantifier Operations -- Join Operations -- Using a let Clause in Query Expressions -- Activity 4.01: Treasury Flight Data Analysis -- Summary -- Chapter 5: Concurrency: Multithreading Parallel and Async Code -- Introduction -- Running Asynchronous Code Using Tasks -- Creating a New Task -- Using Task.Factory.StartNew -- Using Task.Run -- Exercise 5.01: Using Tasks to Perform Multiple Slow-Running Calculations -- Coordinating Tasks -- Waiting for Tasks to Complete -- Exercise 5.02: Waiting for Multiple Tasks to Complete Within a Time Period -- Continuation Tasks -- Using Task.WhenAll and Task.WhenAny with Multiple Tasks -- Exercise 5.03: Waiting for All Tasks to Complete -- Asynchronous Programming -- Async Lambda Expressions -- Canceling Tasks -- Exercise 5.04: Canceling Long-Running Tasks -- Exception Handling in Async/Await Code -- Exercise 5.05: Handling Async Exceptions -- The AggregateException Class -- IAsyncEnumerable Streams -- Parallel Programming -- Data Parallelism -- Task Parallelism -- The Parallel Class -- Parallel.For and Parallel.ForEach -- Activity 5.01: Creating Images from a Fibonacci Sequence -- Summary -- Chapter 6: Entity Framework with SQL Server -- Introduction…”
Publicado 2022
Libro electrónico -
14946Publicado 2022Tabla de Contenidos: “…2.3.3.3 In Situ Irradiated XPS -- 2.4 Applications -- 2.4.1 Photocatalytic Water Splitting -- 2.4.2 Photocatalytic CO2 Reduction -- 2.4.3 Photocatalytic N2 Fixation -- 2.4.4 Photocatalytic Environmental Remediation -- 2.4.5 Photocatalytic Disinfection -- 2.5 Summary and Future Perspective -- References -- Chapter 3 Graphene‐Based Photocatalysts -- 3.1 Introduction -- 3.2 Graphene and Its Derivatives -- 3.2.1 Graphene Oxide -- 3.2.2 Reduced Graphene Oxide -- 3.2.3 Graphene Quantum Dot -- 3.3 General Preparation Techniques of Graphene in Photocatalysis -- 3.3.1 Chemical Exfoliation -- 3.3.2 Chemical Vapor Deposition -- 3.4 General Advantages of Graphene -- 3.4.1 Conductor Behavior -- 3.4.2 Photothermal Effect -- 3.4.3 Large Specific Surface Area -- 3.4.4 Enhancing Photostability -- 3.4.5 Improving Nanoparticle Dispersion -- 3.5 Characterization Methods -- 3.5.1 Transmission Electron Microscopy -- 3.5.2 Atomic Force Microscopy -- 3.5.3 Raman Spectroscopy -- 3.5.4 X‐ray Photoelectron Spectroscopy -- 3.6 Recent Development in Graphene‐Based Photocatalysts -- 3.6.1 Metal Oxide -- 3.6.2 Metal Sulfide -- 3.6.3 Non‐metal Semiconductor -- 3.6.4 Metal‐Organic Framework -- 3.7 Summary and Concluding Remarks -- Acknowledgments -- References -- Chapter 4 Metal Sulfide Semiconductor Photocatalysts -- 4.1 Introduction -- 4.2 General View of Metal Sulfide Photocatalysts -- 4.3 Synthesis of Metal Sulfide Photocatalysts -- 4.3.1 Solution‐Based Methods -- 4.3.1.1 Hydrothermal Method -- 4.3.1.2 Solvothermal Method -- 4.3.2 Chemical Bath Deposition -- 4.3.3 Template Method -- 4.3.4 Ion‐Exchange Method -- 4.3.5 Other Synthesis Methods -- 4.4 CdS‐Based Photocatalyst -- 4.4.1 Crystal Structures and Morphology -- 4.4.1.1 Zero‐Dimensional Structure -- 4.4.1.2 One‐Dimensional Structure -- 4.4.1.3 Two‐Dimensional Structure -- 4.4.1.4 Three‐Dimensional Structure…”
Libro electrónico -
14947Publicado 2023Tabla de Contenidos: “…-- What the operating agreement governs -- Creating a clear-cut ownership structure -- Assigning manager titles and duties -- Why you need an operating agreement -- Establishing Your Framework -- Achieving A+ form and structure -- Building your outline -- Drafting Basic Provisions -- Laying out organizational matters -- Formation and Qualification -- Name -- Term -- Purpose of the Company -- Giving specifics on company records and reporting -- Books and Records…”
Libro electrónico -
14948Publicado 2024Tabla de Contenidos: “…Timing out HTTP connections -- Using SetDeadline() -- Setting the timeout period on the client side -- Setting the timeout period on the server side -- Summary -- Exercises -- Additional resources -- Chapter 10: Working with TCP/IP and WebSocket -- TCP/IP -- The nc(1) command line utility -- The net package -- Developing a TCP client -- Developing a TCP client with net.Dial() -- Developing a TCP client that uses net.DialTCP() -- Developing a TCP server -- Developing a TCP server with net.Listen() -- Developing a TCP server that uses net.ListenTCP() -- Developing a UDP client -- Developing a UDP server -- Developing concurrent TCP servers -- Creating a WebSocket server -- The implementation of the server -- Using websocat -- Creating a WebSocket client -- Working with RabbitMQ -- Running RabbitMQ -- Writing to RabbitMQ -- Reading from RabbitMQ -- How to remove a module -- Summary -- Exercises -- Additional resources -- Chapter 11: Working with REST APIs -- An introduction to REST -- Developing RESTful servers and clients -- A RESTful server -- A RESTful client -- Creating a functional RESTful server -- The REST API -- Using gorilla/mux -- The use of subrouters -- The Gin HTTP framework -- Gin versus Gorilla -- Working with the database -- Implementing the RESTful server -- Testing the RESTful server -- Testing GET handlers -- Testing POST handlers -- Testing the PUT handler -- Testing the DELETE handler -- Creating a RESTful client -- Creating the structure of the command line client -- Implementing the RESTful client commands -- Using the RESTful client -- Working with multiple REST API versions -- Summary -- Exercises -- Additional resources -- Chapter 12: Code Testing and Profiling -- Optimizing code -- Rewriting the main() function for better testing -- Profiling code -- Profiling a command line application -- Profiling an HTTP server…”
Libro electrónico -
14949Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
14950Publicado 2023Tabla de Contenidos: “…Adding user interface elements to static table view cells -- Summary -- Section III -- Chapter 14: Getting Started with MVC and Table Views -- Technical requirements -- Understanding the Model-View-Controller design pattern -- Exploring view controllers -- Understanding table views -- Conforming to the UITableViewDataSource protocol -- Conforming to the UITableViewDelegate protocol -- Creating a TableViewExampleController instance -- Revisiting the Journal List screen -- Summary -- Chapter 15: Getting Data into Table Views -- Technical requirements -- Understanding model objects -- Creating a class to represent a journal entry -- Creating sample data -- Displaying data in a table view -- Creating a custom UITableViewCell subclass -- Connecting the outlets in journalCell -- Updating the data source methods in JournalListViewController -- Summary -- Chapter 16: Passing Data between View Controllers -- Technical requirements -- Passing data from the Add New Journal Entry screen to the Journal List screen -- Creating the AddJournalEntryViewController class -- Connecting the UI elements to the AddJournalEntryViewController class -- Creating a JournalEntry instance from user input -- Updating the table view with a new journal entry -- Removing rows from a table view -- Exploring text field and text view delegate methods -- Passing data from the Journal List screen to the Journal Entry Detail screen -- Creating the JournalEntryDetailViewController class -- Connecting the UI elements to the JournalEntryDetailViewController class -- Displaying the details of a journal entry -- Displaying the details of a selected journal entry -- Summary -- Chapter 17: Getting Started with Core Location and MapKit -- Technical requirements -- Getting your device location using the Core Location framework -- Modifying the AddJournalEntryViewController class…”
Libro electrónico -
14951Publicado 2023Tabla de Contenidos: “…Introduction -- 2. The framework of the Indian paper industries -- 3. Sources of paper pulping -- 3.1 Sources from waste -- 3.2 Sources from virgin wood and other materials -- 4. …”
Libro electrónico -
14952Publicado 2018Tabla de Contenidos: “…-- Creating an application using manage.py -- What is created by manage.py -- Configuring settings.py -- Adding a new database connection -- Adding new installed apps -- Creating the application -- manage.py -- Generating data models -- Multipolygons -- Database migrations -- makemigrations -- sqlmigrate -- migrate -- LayerMapping -- Running the layer mapping -- Administrative panel -- GeoDjango administrative panel -- admin.py -- createsuperuser -- runserver -- URLs -- URL patterns -- Views -- Required folders and files -- forms.py -- templates folder -- Writing views -- index view -- queryarena function -- arena view -- Running the application -- Summary -- Chapter 13: Geospatial REST API -- Writing a REST API in Python -- REST -- JSON -- Python for REST API -- Flask -- REST modules -- Other frameworks -- Variables in Flask URLs -- Number converters -- Other data converters -- Request methods -- GET -- POST -- Other available request methods -- PUT -- DELETE -- The REST API application -- Application components -- Application folder and file structure -- app.py -- __init__.py -- The database -- models.py -- Importing required modules -- Declaring the session -- Declaring the models -- forms.py -- views.py -- Importing modules -- Base URL -- Arenas -- Getting all arenas -- Getting arenas by ID -- Getting arenas by name -- A geospatial query -- States -- Getting all states -- Getting a state by ID -- Getting a state by name -- Getting arenas by state -- Counties -- Getting a county by ID -- Getting a county by name -- Districts -- Getting all districts -- Getting a district by ID -- Getting a district by name -- API POST endpoints -- New arenas -- The view function -- The addarena.html head -- The addarena.html script -- The addarena.html form…”
Libro electrónico -
14953Publicado 2013“…In this Objective-C programming training course expert author Jesse Feiler teaches you how to leverage the technologies that Objective-C, Xcode and the Apple Frameworks have to offer. This course focuses on the Objective-C programming language, utilizing Xcode and Frameworks wherever necessary to build your App. …”
-
14954Publicado 2018“…Bootstrap stands as one of the most popular, open-source, front-end frameworks on the Web. Since its official release in 2011, it has undergone several changes, and it's now one of the most stable and responsive frameworks available. …”
Libro electrónico -
14955por Schumann, Abel“…Furthermore, it highlights the need to harmonise different monitoring frameworks within an administration…”
Publicado 2016
Capítulo de libro electrónico -
14956por Organization for Economic Co-operation and Development (OECD)“…The Factbook tracks how countries are actually implementing the Principles, which offer a comprehensive set of recommendations to policy makers to support sound corporate governance frameworks. Covering more than 40 jurisdictions, including OECD, G20 and Financial Stability Board members, the Corporate Governance Factbook is the most comprehensive catalogue of legal and regulatory frameworks, institutions and practices in place. …”
Publicado 2015
Libro electrónico -
14957Publicado 2022“…Build a very simple command line tool with Python without using external dependencies or frameworks. In this video you'll see how with just a few lines of Python you can transform a file into a script with a help menu. …”
Video -
14958Publicado 2019“…Explore modern Web Component design and integrate them with a variety of web frameworks to build encapsulated reusable UI components for your web apps Key Features Learn Web Components with more than 50 web component examples for both beginners and advanced users Create responsive and highly customizable web pages using HTML, CSS, and JavaScript Extend the potential of Web Components by integrating them with standard web frameworks Book Description Web Components are a set of APIs that help you build reusable UI modules that can operate in any modern browser using just Vanilla JavaScript. …”
Libro electrónico -
14959por Oakley, Kenneth Page
Publicado 1969Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
14960Publicado 2018“…Auf der Serverseite deckt es ASP.NET und ASP.NET Core, die Neugestaltung des Web Application Frameworks, ab. ASP.NET Core bietet eine einheitliche Umgebung zum Erstellen von Webbenutzeroberflächen und Web-APIs. …”
Libro electrónico