Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,383
- Application software 1,224
- Microsoft .NET Framework 806
- Management 671
- Engineering & Applied Sciences 599
- Web site development 516
- Taxation 482
- Computer Science 473
- Java (Computer program language) 407
- Law and legislation 385
- Computer networks 337
- Economics 330
- Design 329
- Computer programming 326
- Artificial intelligence 318
- Computer software 316
- Microsoft software 312
- Security measures 308
- Web sites 308
- JavaScript (Computer program language) 306
- Python (Computer program language) 300
- Web applications 293
- Computer security 291
- Information technology 272
- Data processing 264
- Programming 261
- Cloud computing 258
- Computer programs 252
- Economic conditions 242
- History 238
-
17581Publicado 2018“…What you will learn Understand the benefts of serverless computing and know when to use it Develop serverless applications on AWS, Azure, and Google Cloud Get to grips with Function as a Service (FaaS) Apply triggers to serverless functions Build event-driven apps using serverless frameworks Use the Node.js programming language to build serverless apps Use code editors, such as Visual Studio Code, as development environments Master the best development practices for creating scalable and practical solutions Who this book is for This book is targeted towards developers, system administrators or any stakeholder working in the Serverless environment and want to understand how functions work. …”
Libro electrónico -
17582“…What You Will Learn: Understand the value of time and trust in a cyber-warfare world Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack Accelerate response time by adopting a holistic approach Eliminate friction across the threat defense lifecycle, from protection to detection to correction Gain a sustainable competitive advantage by seizing first mover advantage Deploy solutions across an open, integrated security framework Who This Book Is For: Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. …”
Libro electrónico -
17583Publicado 2008“…You’ll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely—and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own · Create more secure “mashup” applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers…”
Libro electrónico -
17584Publicado 2015“…The underlying technology platform has migrated from ASP.NET 2.0 to ASP.NET 4.0 and DNN has also integrated Microsoft's Web API as the service framework at the core of the DNN solution. All of these enhancements provide developers with a lot of power in one solution. …”
Libro electrónico -
17585Publicado 2020“…For example, some effect such as aggregate formation may cumulate over time and finally contribute to the formation of whole soil profiles, which serve as a framework for other soil processes such as water movement, decomposition, etc. …”
Libro electrónico -
17586Publicado 2021“…The Organizational Water Footprint method builds on two environmental assessment frameworks which have been identified as suitable for the purpose of this project: Water Footprint (ISO 14046, 2014 and Organizational Life Cycle Assessment (UNEP 2015). …”
Libro electrónico -
17587Publicado 2015“…Coverage includes A framework for understanding the various types of data quality checks, including cell-based rules, distribution validation, and outlier analysis Assessing tradeoffs in common approaches to imputing missing values Implementing quality checks with Pig or Hive UDFs Transforming raw data into “feature matrix” format for machine learning algorithms Choosing features and instances Implementing text features via “bag-of-words” and NLP techniques Handling time-series data via frequency- or time-domain methods Manipulating feature values to prepare for modeling Data Munging with Hadoop is part of a larger, forthcoming work entitled Data Science Using Hadoop . …”
Libro electrónico -
17588Publicado 2019“…In this regard, the enumeration of arcane Arabic words often negotiate the contemporary discourses of gender, pleasure and language and read them 'against the grain'. In the framework of the "return to philology" (Edward Said), this book treats al-Shidyāq's approach to language as a radical social and cultural criticism of the nineteenth century, which sheds new light on the Nahḍa, the Arab renewal movement on the eve of modernity. …”
Libro electrónico -
17589por Borchert, Heiko“…One of the book’s key strengths is the unitary analytical framework, which makes the detailed case studies easily accessible and provides insightful findings on cross-regional commonalities and differences. …”
Publicado 2024
Libro electrónico -
17590por McGraw, Gary, 1966-“…Inside you'll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. …”
Publicado 2006
Libro electrónico -
17591por Moss, Larissa Terpeluk“…The book directs business representatives, business sponsors, project managers, and technicians to the chapters that address their distinct responsibilities. The framework of the book allows organizations to begin at any step and enables projects to be scheduled and managed in a variety of ways. …”
Publicado 2003
Libro electrónico -
17592Publicado 2002“…If you're in the latter group, this book also teaches you such advanced topics as integrating servlets and JavaBeans with JSP, using the popular Apache Struts MVC framework to illustrate how it's done. Finally, the author presents how to develop custom tag libraries, using realistic examples that you can use as a springboard for your own JSP libraries. …”
Libro electrónico -
17593Publicado 2004“…Key coverage includes: Denise Draper on "Mapping Between XML and Relational Data" Michael Rys exploring "Integrating XQuery and Relational Database Systems" Jim Tivy's analysis of "A Native XML DBMS" Mary Mary Fernández, Jérôme Siméon, and Philip Wadler, presenting "Static Typing in XQuery" Information presented in both a tutorial and a reference framework for use by XML professionals of any level For IT managers, professionals, programmers, or anyone involved with XML, XQuery from the Experts is an invaluable resource. 0321180607B07212003…”
Libro electrónico -
17594por Klevinsky, T. J.“…Most importantly, the book provides a framework for performing penetration testing and offers step-by-step descriptions of each stage in the process. …”
Publicado 2002
Libro electrónico -
17595Publicado 2017“…Through stories, illustrations, and insightful observations Haudan explores the concept of engagement in business--from the “roots of engagement” to the six reasons why so many workers rank themselves as disengaged to the keys to unlocking engagement in any organization. He also includes a framework for implementing the process of strategically engaging employees as well as a self-assessment for checking your own company's level of strategic engagement. …”
Libro electrónico -
17596Publicado 2009“…Silverlight 2 in Action devotes extensive coverage to flexible layout components, the extensible control model, the communication framework, and the data-binding features "all cornerstones of software development. …”
Libro electrónico -
17597Publicado 2010“…Silverlight 4 in Action devotes extensive coverage to flexible layout components, the extensible control model, the communication framework, and the data-binding features-all cornerstones of software development. …”
Libro electrónico -
17598Publicado 2012“…Financial Forensics Body of Knowledge is: The only codified financial forensics/forensic accounting methodology known to exist; The only codified methodology comprising civil, criminal, and dispute methodologies within the same framework; The only codified methodology supported by optional Internet-based software that continually updates content with newly discovered and developed forensic tools, techniques, methods and methodologies, and act..…”
Libro electrónico -
17599Publicado 2020“…Rather, the Warnock Report was responsible for changing the conceptualisation and legislative framework in England, and the Education Act 1981 that followed the report had a totally new system for assessment and determining provision. …”
Libro electrónico -
17600Publicado 2018“…What you will learn Develop your ideas fast and efficiently using the Ethereum blockchain Make writing and deploying smart contracts easy and manageable Work with private data in blockchain applications Handle large files in blockchain applications Ensure your decentralized applications are safe Explore how Ethereum development frameworks work Create your own cryptocurrency or token on the Ethereum blockchain Make sure your cryptocurrency is ERC20-compliant to launch an ICO Who this book is for This book is for individuals who want to build decentralized applications using blockchain technology and the power of Ethereum from scratch. …”
Libro electrónico