Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
19741Publicado 2015Tabla de Contenidos: “…-- Creating transparent textures -- The grass texture -- The grunge texture -- Doing a quick render with Blender Internal -- Setting lights -- Placing the camera -- Setting the environment (sky and mist) -- Summary -- Chapter 7: Haunted House - Adding Materials and Lights in Cycles -- Understanding the basic settings of Cycles -- The sampling -- Light path settings -- Performances -- Lighting -- Creating a testing material -- Understanding the different types of light -- Lighting our scene -- Painting and using an Image Base Lighting -- Creating materials with nodes -- Creating the materials of the house, the rocks, and the tree -- Adding a mask for the windows -- Using procedural textures -- Making and applying normal maps in Cycles -- Creating realistic grass -- Generating the grass with particles -- Creating the grass shader -- Baking textures in Cycles -- Cycles versus Blender Internal -- Baking the tree -- Compositing a mist pass -- Summary -- Chapter 8: The Rat Cowboy - Learning To Rig a Character for Animation -- An introduction to the rigging process -- Rigging the Rat Cowboy -- Placing the deforming bones -- The leg and the foot -- The arm and the hand -- The hips -- The tail -- The head and the eyes -- Mirroring the rig -- Rigging the gun -- Rigging the holster -- Adding a root bone -- Skinning -- The Weight Paint tools -- Manually assigning weight to vertices -- Correcting the foot deformation…”
Libro electrónico -
19742Publicado 2023Tabla de Contenidos: “…-- Human Resources -- Occupational Health -- Health Promotion Specialists -- Lifestyle Medicine -- The Well-Being Culture Building Blocks -- How I Help Hopkins Get Healthy -- That's a Wrap-Let's Get Started -- Chapter 2 Getting Personal: How Our Subcultures Influence Our Well-Being -- Influence of Subcultures on Lifestyle Habits -- The Remote Worker Subculture -- How to Support Healthy Subcultures -- Supporting Subcultures Gathered Around Healthy Themes -- Customize the Organizational Experience at the Team Level -- Talk About Health and Well-Being -- Give Your Leaders Driving Lessons -- How I Help Hopkins Get Healthy -- Pushing Back on Unhealthy Subcultures -- Cultural Health Awareness -- How I Help Hopkins Get Healthy -- That's a Wrap -- Chapter 3 Best Companies Value Well-Being: Shared Values -- The Value of Shared Values -- Choosing the Shared Values -- Make Well-Being a Shared Vision -- Characteristics of a Shared Vision -- Sharing the Well-Being Values and Vision -- Maybe Not Everyone Agrees -- Making the Shared Values Come to Life -- Include Employee Health and Well-Being in the Annual Performance Evaluation -- That's a Wrap -- Chapter 4 Oh, the Weather Outside Is Frightful: Social Climate -- Getting to Know Your Community of Meteorologists -- Onboarding -- Meet and Greet -- Vulnerability and Trust…”
Libro electrónico -
19743Publicado 2023Tabla de Contenidos: “…The part (or component) engineering -- 4.5. The performance-based requirement in design -- 4.6. The elimination of weakness in design and technologies…”
Libro electrónico -
19744Publicado 2024Tabla de Contenidos: “…Adding more predictors -- Regression metrics -- Summary -- Chapter 11: Predictions Don't Grow on Trees, or Do They? -- Performing naïve Bayes classification -- Classification metrics -- Understanding decision trees -- Measuring purity -- Exploring the Titanic dataset -- Dummy variables -- Diving deep into UL -- When to use UL -- k-means clustering -- The Silhouette Coefficient -- Feature extraction and PCA -- Summary -- Chapter 12: Introduction to Transfer Learning and Pre-Trained Models -- Understanding pre-trained models -- Benefits of using pre-trained models -- Commonly used pre-trained models -- Decoding BERT's pre-training -- TL -- Different types of TL -- Inductive TL -- Transductive TL -- Unsupervised TL - feature extraction -- TL with BERT and GPT -- Examples of TL -- Example - Fine-tuning a pre-trained model for text classification -- Summary -- Chapter 13: Mitigating Algorithmic Bias and Tackling Model and Data Drift -- Understanding algorithmic bias -- Types of bias -- Sources of algorithmic bias -- Measuring bias -- Consequences of unaddressed bias and the importance of fairness -- Mitigating algorithmic bias -- Mitigation during data preprocessing -- Mitigation during model in-processing -- Mitigation during model postprocessing -- Bias in LLMs -- Uncovering bias in GPT-2 -- Emerging techniques in bias and fairness in ML -- Understanding model drift and decay -- Model drift -- Data drift -- Mitigating drift -- Understanding the context -- Continuous monitoring -- Regular model retraining -- Implementing feedback systems -- Model adaptation techniques -- Summary -- Chapter 14: AI Governance -- Mastering data governance -- Current hurdles in data governance -- Data management: crafting the bedrock -- Data ingestion - the gateway to information -- Data integration - from collection to delivery -- Data warehouses and entity resolution…”
Libro electrónico -
19745Publicado 2024Tabla de Contenidos: “…Intro -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Getting Started with Vue.js -- Chapter 1: Exploring the Book's Layout and Companion App -- Technical requirements -- The companion app -- The Companion App features -- The application code -- The core areas of a web application -- Component-based architecture -- One page at a time -- From one page to many components -- Atomic design -- Separation of concern -- Summary -- Chapter 2: The Foundation of Vue.js -- Vue.js reactivity fundamentals -- Understanding the Vue.js lifecycle and hooks -- Vue.js component structure -- Single-file components -- Options API versus Composition API - Two sides of the same coin -- Sample components -- Summary -- Part 2: Understanding the Core Features of Vue.js -- Chapter 3: Making Our HTML Dynamic -- Technical requirements -- Building your first Vue.js project -- Creating our first component -- Introducing properties -- Learning Vue.js reactive data with Refs and Reactive -- Summary -- Chapter 4: Utilizing Vue's Built-In Directives for Effortless Development -- Technical requirements -- Displaying text with v-text and v-html -- Applying dynamic text to our component using v-text -- Modifying the inner HTML of an element with v-html -- Handling element visibility with v-if and v-show -- Hiding elements from the DOM with v-show -- Keeping the DOM clean and performant with v-if -- Simplifying your template with v-for -- Summary -- Chapter 5: Leveraging Computed Properties and Methods in Vue.js -- Technical requirements -- Abstracting functionality using methods -- Creating dynamic data using computed properties -- Learning the difference between methods and computed properties -- Technical differences -- How to spot them in your component -- Summary…”
Libro electrónico -
19746Publicado 2016Tabla de Contenidos: “…Close air support operations in Afghanistan: the code words -- 3.1.1.2. Aerobatic performances of the French Air Forces Aerobatic Team and Patrouille de France: diagrams and body expressions -- 3.1.1.3. …”
Libro electrónico -
19747Publicado 2018Tabla de Contenidos: “…-- 1.6 STRUCTURE OF THE BOOK -- 1.7 USE OF THE BOOK TO MAXIMIZE BENEFIT -- CHAPTER 2: Overview of Project Finance -- 2.1 PROJECT TAXONOMY -- 2.2 PROJECT FINANCE PHASES -- 2.3 KEY ELEMENTS OF PROJECT FINANCE -- 2.4 OWNERSHIP AND FINANCING STRUCTURE CONSIDERATIONS -- 2.5 PRIMARY PROJECT FINANCE ACTIVITIES -- 2.6 COMMON MISCONCEPTIONS AND MYTHS -- CHAPTER 3: The Record of Project Finance -- 3.1 THE RECORD OF PROJECT FINANCE DEALS -- 3.2 REASONS FOR PROJECT FAILURES -- 3.3 LESSONS LEARNED -- CHAPTER 4: Project Financing Processes -- 4.1 VARIANTS OF PROJECT FINANCING PROCESSES -- 4.2 NATURE OF PROJECT FINANCING PROCESSES -- 4.3 ACTIVITIES IN PROJECT FINANCE PROCESSES -- 4.4 MILESTONES OF PROJECT FINANCE PROCESSES -- 4.5 SUCCESSFUL PROJECT FINANCE PROCESS CHARACTERISTICS -- CHAPTER 5: Project Finance Organizations -- 5.1 THE NEED FOR PFOs -- 5.2 BUSINESS DEFINITION OF PFOs -- 5.3 PFO SKILLS AND QUALIFICATIONS -- 5.4 PFO CHALLENGES -- 5.5 PFO PERFORMANCE EVALUATION MEASURES -- 5.6 CHARACTERISTICS OF SUCCESSFUL PFOs -- CHAPTER 6: Project Development -- 6.1 PROJECT DEVELOPMENT PREREQUISITES -- 6.2 PREFEASIBILITY ASSESSMENT -- 6.3 PROJECT DEFINITION -- 6.4 TECHNICAL DESIGN AND ASSESSMENT -- 6.5 FEASIBILITY STUDY -- 6.6 DUE DILIGENCE -- 6.7 PROJECT AND FINANCIAL STRUCTURES -- 6.8 AGREEMENTS AND NEGOTIATIONS -- 6.9 PROJECT MARKETING AND RAISING FINANCING -- 6.10 DEVELOPMENT COSTS AND SUCCESS FACTORS -- CHAPTER 7: Participants and Responsibilities -- 7.1 ROLES OF THE PROJECT TEAM…”
Libro electrónico -
19748Publicado 2018Tabla de Contenidos: “…Repudiation -- Information disclosure - confidentiality -- Denial of service - availability -- Elevation of privilege - authorization -- Test strategies -- Summary -- Chapter 8: Source Code Review -- Programming background -- Enterprise secure coding guidelines -- Static code analysis - manual scan versus automatic scan -- Secure coding checklist -- Summary -- Chapter 9: Network Penetration Testing -- Passive information gathering - reconnaissance - OSINT -- Web search engines -- Google Hacking Database - Google dorks -- Online tools -- Kali Linux tools -- WHOIS lookup -- Domain name system - DNS enumeration -- Gathering email addresses -- Active information gathering - services enumeration -- Identifying live hosts -- Identifying open ports/services -- Service probing and enumeration -- Vulnerability assessment -- OpenVas -- Exploitation -- Finding exploits -- Listener setup -- Generating a shell payload using msfvenom -- Custom shells -- Privilege escalation -- File transfers -- Using PowerShell -- Using VBScript -- Administrator or root -- Summary -- Chapter 10: Web Intrusion Tests -- Web Intrusion Test workflow -- Identifying hidden contents -- Common web page checklist -- Special pages checklist -- Reporting -- Common Vulnerability Scoring System - CVSS -- First case - SQLi -- Second case - Reflected XSS -- Report template -- Summary -- Chapter 11: Pentest Automation Using Python -- Python IDE -- Downloading and installing PyCharm -- PyCharm quick overview -- Penetration testing automation -- Automate.py in action -- Utility functions -- Service enumeration -- DTO service class -- The scanner core -- Summary -- Appendix A: Nmap Cheat Sheet -- Target specification -- Host discovery -- Scan types and service versions -- Port specification and scan order -- Script scan -- Timing and performance -- Firewall/IDS evasion and spoofing -- Output…”
Libro electrónico -
19749Publicado 2021Tabla de Contenidos: “…-- Widgets, widgets, everywhere -- Flutter rendering -- Flutter - rendering by itself -- Composability -- Immutability -- Everything is a widget -- Building and running Flutter -- Debug mode -- Release mode -- Profile mode -- Supported platforms -- The pubspec.yaml file -- Running the generated project -- Summary -- Chapter 2: An Introduction to Dart -- Technical requirements -- Getting started with Dart -- The evolution of Dart -- How Dart works -- Introducing the structure of the Dart language -- Hands-on with Dart -- Variables and data types -- Variable declaration -- Null safety -- Built-in types -- Control flows and looping -- If/else -- While and do-while loops -- For loops -- break and continue -- Hands-on continued -- Functions and methods -- Function parameters -- Summary -- Chapter 3: Flutter versus Other Frameworks -- Native development -- Developers -- Project management -- Defect reports -- Performance -- Platform features -- Hot reload -- User experience -- App size -- New platforms -- Retired platforms -- Overview -- Cross-platform frameworks -- React Native -- Xamarin -- Cordova -- Popularity -- Flutter community -- Events -- News and discussion -- Resources -- Flutter strengths and weaknesses -- Strengths -- Weaknesses -- Summary -- Chapter 4: Dart Classes and Constructs -- Technical requirements -- Object orientation in Dart -- Objects and classes -- Other OOP artifacts…”
Libro electrónico -
19750Publicado 2023Tabla de Contenidos: “…-- General stats overview -- Click performance interface -- Predicted Demographics interface -- How you can use and interpret these reports -- Expanded/advanced reporting features -- Comparative Reports -- Summary -- Further reading -- Chapter 11: Implementing A/B and Multivariate Testing -- Why experiment with engagement? …”
Libro electrónico -
19751Publicado 2018Tabla de Contenidos: “…Browsing the API with resources and relationships -- Defining unique constraints -- Working with unique constraints -- Understanding pagination -- Configuring pagination classes -- Making requests that paginate results -- Working with customized pagination classes -- Making requests that use customized paginated results -- Configuring filter backend classes -- Adding filtering, searching, and ordering -- Working with different types of Django filters -- Making requests that filter results -- Composing requests that filter and order results -- Making requests that perform starts with searches -- Using the browsable API to test pagination, filtering, searching, and ordering -- Test your knowledge -- Summary -- Chapter 8: Securing the API with Authentication and Permissions -- Understanding authentication and permissions in Django, the Django REST framework, and RESTful Web Services -- Learning about the authentication classes -- Including security and permissions-related data to models -- Working with object-level permissions via customized permission classes -- Saving information about users that make requests -- Setting permission policies -- Creating the superuser for Django -- Creating a user for Django -- Making authenticated requests -- Making authenticated HTTP PATCH requests with Postman -- Browsing the secured API with the required authentication -- Working with token-based authentication -- Generating and using tokens -- Test your knowledge -- Summary -- Chapter 9: Applying Throttling Rules and Versioning Management -- Understanding the importance of throttling rules -- Learning the purpose of the different throttling classes in the Django REST framework -- Configuring throttling policies in the Django REST framework -- Running tests to check that throttling policies work as expected -- Understanding versioning classes…”
Libro electrónico -
19752Publicado 2024Tabla de Contenidos: “…Introducing testing microservices -- Unit testing microservices -- Creating and running happy path tests -- Creating and running boundary tests -- End-to-end testing microservices -- Automated testing with Selenium -- Summary -- Chapter 8: Deploying Microservices with Docker -- Technical requirements -- Introducing Docker -- Benefits of Docker (containers) -- Containerizing microservices -- Applying multi-container deployment with Docker Compose -- Deploying a Django microservices application -- Showing a list of the images we created -- Showing a list of created and running containers -- Inspecting the console output of a container -- Stopping a container -- Starting a container -- Removing a container -- Removing an image -- Deploying a new microservices version -- Scaling microservices -- Vertical and horizontal scaling -- Docker Swarm -- Kubernetes -- Summary -- Part 3: Taking Microservices to the Production Level -- Chapter 9: Securing Microservices -- Technical requirements -- Introducing microservices security -- North-south security for microservices -- East-west security for microservices -- Token-based security with JWT -- User-based security with OAuth 2.0 -- Controlling access to microservices -- Securing data communication between microservices -- Summary -- Chapter 10: Improving Microservices Performance with Caching -- Technical requirements -- Introducing caching -- Applying Django's cache framework -- Caching a web page -- Caching page data -- Using Redis for caching -- Redis as a backend cache for Django's cache framework -- Redis as a standalone cache -- Summary -- Chapter 11: Best Practices for Microservices -- Technical requirements -- Organizing code -- Apply the singe task principle -- Separate responsibilities -- Standardize the communication protocols -- Containerize microservices -- Apply version control…”
Libro electrónico -
19753VBScript, WMI and ADSI unleashed : using VBSscript, WMI, and ADSI to automate Windows administrationPublicado 2007Tabla de Contenidos: “…-- How to Use This Book -- Part I: Introduction to Windows Administrative Scripting -- Part II: VBScript Tutorial -- Part III: Windows Management Instrumentation and Active Directory Services Interface -- Part IV: Advanced Scripting Techniques -- Part V: Ready-to-Run Examples -- Appendix -- Preparing to Use This Book -- Typographical Elements -- Sample Scripts -- Sample Scripts-Explained -- Part I: Introduction to Windows Administrative Scripting -- 1 Scripting Concepts and Terminology -- Overview of Scripting -- Script Hosts -- ActiveX Scripting Languages -- The Component Object Model (COM) -- Critical Scripting Security Issues -- VBScript Versus Windows PowerShell -- Summary -- 2 Running Scripts -- Windows Script Host -- Command-Line Scripts -- Notepad and Script Editors -- Writing Your First Script -- Running Your First Script -- Debugging Your First Script -- Summary -- 3 The Components of a Script -- A Typical VBScript -- Functions -- Subroutines -- Main Script -- Comments and Documentation -- Summary -- 4 Designing a Script -- Creating a Task List -- Selecting the Appropriate Tools -- Creating Modules to Perform Tasks -- Validating User Input -- Planning for Errors -- Creating Script Libraries -- Summary -- Part II: VBScript Tutorial -- 5 Functions, Objects, Variables, and More -- Variables Defined -- Functions Defined -- Statements and Subroutines Defined -- Objects Defined -- Summary -- 6 Input and Output -- Displaying Messages -- Asking for Input -- Command-Line Parameters as Input -- Summary -- 7 Manipulating Numbers -- Numbers in VBScript -- Basic Arithmetic -- Advanced Arithmetic -- Boolean Math -- Converting Numeric Data Types -- Converting Other Data Types to Numeric Data -- Summary -- 8 Manipulating Strings -- Strings in VBScript -- Working with Substrings…”
Libro electrónico -
19754Publicado 2003Tabla de Contenidos: “…Installation -- 2.1 Planning -- 2.1.1 Hardware and software prerequisites -- 2.1.2 Check for record identifier conflicts -- 2.1.3 Ensure that the HTTP Sever is installed and working -- 2.2 Performing the SMP/E installation -- 2.2.1 Installation reference table -- 2.3 Customizing your Information Management installation -- 2.3.1 Update your session member -- 2.3.2 Update your BLX-SP parameters -- 2.3.3 Update your IBM panels -- 2.3.4 Load the sample records into your data session -- 2.3.5 Load the data model records into your DMRDB session -- 2.3.6 Create static data views from the data model records -- 2.3.7 Verify your Information Management customizations -- 2.3.8 Set up e-mail notification -- 2.3.9 Configure your HTTP Server for Web Access -- 2.3.10 Update your BLQPARMS file -- 2.3.11 Start the HTTP Server -- 2.3.12 Verify your Web Access installation -- 2.3.13 Generate HTML -- Chapter 3. …”
Libro electrónico -
19755Publicado 2004Tabla de Contenidos: “…-- 3.2.2 Features and advantages -- 3.2.3 Fault management -- 3.2.4 Internet SCSI (iSCSI) support -- 3.2.5 Zone Control Graphical User Interface -- 3.2.6 Selectable launch of device applications -- 3.2.7 IBM Tivoli NetView Web console -- 3.3 IBM TotalStorage Multiple Device Manager -- 3.3.1 Overview -- 3.3.2 IBM TotalStorage Device Manager -- 3.3.3 IBM TotalStorage Performance Manager -- 3.3.4 IBM TotalStorage Replication Manager -- 3.3.5 Provisioning -- 3.4 IBM TotalStorage Productivity Center LaunchPad -- 3.5 Bundling and offering definitions…”
Libro electrónico -
19756Publicado 2004Tabla de Contenidos: “…Silent install example -- Using the non-interactive install process -- Performing a silent install -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover…”
Libro electrónico -
19757Publicado 2009Tabla de Contenidos: “…Example Code Used in This Chapter -- 4 The Anatomy of a Class -- The Name of the Class -- Comments -- Attributes -- Constructors -- Accessors -- Public Interface Methods -- Private Implementation Methods -- Conclusion -- References -- Example Code Used in This Chapter -- 5 Class Design Guidelines -- Modeling Real World Systems -- Identifying the Public Interfaces -- The Minimum Public Interface -- Hiding the Implementation -- Designing Robust Constructors (and Perhaps Destructors) -- Designing Error Handling into a Class -- Documenting a Class and Using Comments -- Building Objects with the Intent to Cooperate -- Designing with Reuse in Mind -- Documenting a Class and Using Comments -- Designing with Extensibility in Mind -- Making Names Descriptive -- Abstracting Out Nonportable Code -- Providing a Way to Copy and Compare Objects -- Keeping the Scope as Small as Possible -- A Class Should Be Responsible for Itself -- Designing with Maintainability in Mind -- Using Iteration -- Testing the Interface -- Using Object Persistence -- Serializing and Marshaling Objects -- Conclusion -- References -- Example Code Used in This Chapter -- 6 Designing with Objects -- Design Guidelines -- Performing the Proper Analysis -- Developing a Statement of Work -- Gathering the Requirements -- Developing a Prototype of the User Interface -- Identifying the Classes -- Determining the Responsibilities of Each Class -- Determining How the Classes Collaborate with Each Other -- Creating a Class Model to Describe the System -- Case Study: A Blackjack Example -- Using CRC Cards -- Identifying the Blackjack Classes -- Identifying the Classes' Responsibilities -- UML Use-Cases: Identifying the Collaborations -- First Pass at CRC Cards -- UML Class Diagrams: The Object Model -- Prototyping the User Interface -- Conclusion -- References -- 7 Mastering Inheritance and Composition…”
Libro electrónico -
19758Publicado 2015Tabla de Contenidos: “…Writing Functions -- Anatomy of PostgreSQL Functions -- Function Basics -- Triggers and Trigger Functions -- Aggregates -- Trusted and Untrusted Languages -- Writing Functions with SQL -- Basic SQL Function -- Writing SQL Aggregate Functions -- Writing PL/pgSQL Functions -- Basic PL/pgSQL Function -- Writing Trigger Functions in PL/pgSQL -- Writing PL/Python Functions -- Basic Python Function -- Writing PL/V8, PL/CoffeeScript, and PL/LiveScript Functions -- Basic Functions -- Writing Aggregate Functions with PL/V8 -- Chapter 9. Query Performance Tuning -- EXPLAIN -- EXPLAIN Options -- Sample Runs and Output -- Graphical Outputs -- Gathering Statistics on Statements -- Guiding the Query Planner -- Strategy Settings -- How Useful Is Your Index? …”
Libro electrónico -
19759Publicado 2013Tabla de Contenidos: “…Use Numbered and Bulleted Lists -- Define New Multilevel Lists -- Add Horizontal Lines, Borders, and Shading -- Format a Page -- Turn On Formatting Marks -- Set Margins -- Copy Formatting -- Use a Dialog Box to Format a Page -- Use Mirror Margins -- Determine Page Orientation -- Specify Paper Size -- Track Inconsistent Formatting -- Set Vertical Alignment -- Chapter 4: Customizing a Document -- Use Styles -- Identify Text with a Style -- Apply Predefined Style Sets to a Document -- Create a New Style -- Modify a Style -- Clear a Style from Text or a Document -- Delete Styles from the Gallery -- Examine Current Styles -- Use Themes -- Assign a Theme to Your Document -- Change a Theme -- Create a Custom Theme -- Use Templates -- Apply a Template to a New Document -- Create a Template -- Work With Documents -- Create Section Breaks -- Create and Use Columns -- Use Tabs -- Add Headers and Footers -- Add Footnotes and Endnotes -- Create an Index -- Create a Table of Contents -- Create and Use Outlines -- Use View Buttons -- Use Word Writing Aids -- Implement AutoCorrect -- Use AutoFormat -- Use Building Blocks -- Count Characters and Words -- Use Highlighting -- Add Hyphenation -- Explore the Thesaurus -- Enter an Equation -- Chapter 5: Printing and Using Mail Merge -- Print Documents -- Set Up Your Printer -- Define How a Document Is Printed -- Preview What You'll Print -- Print a Document -- Print an Envelope -- Print Labels -- Fax a Document -- Send an Email -- Merge Lists with Letters and Envelopes -- Perform a Mail Merge Using the Wizard -- Use Rules -- Merge to Envelopes -- Merge to Labels -- Chapter 6: Using Tables -- Create Tables -- Create a Table -- Use Table Tools -- Select Tables, Rows, Columns, or Cells -- Change the Table Size -- Change Column Width and Row Height -- Work with Tables -- Enter Information into Tables -- Sort Data…”
Libro electrónico -
19760Publicado 2018Tabla de Contenidos: “…-- Improvements in EE 8 -- Overview of Java SE 8 -- Lambdas, streams, and default methods -- CDI 2.0 -- JSON Processing 1.1 -- Working with JSON documents -- JSON Processing API -- JSON Binding 1.0 -- JAXRS 2.1 -- Servlet 4.0 -- Server Push -- JSF 2.3 -- Bean Validation 2.0 -- Java EE Security API 1.0 -- Summary -- Chapter 2: The CDI Advantage Combined with JPA -- Introduction to context and dependency injection -- CDI programming model -- CDI for Java SE 8 -- RequestContext Activation -- Enhancing events -- Asynchronous events -- Ordered events -- Annotation literals -- Java Persistence API (JPA) -- Entities -- Performing CRUD operations with entities -- Entity listeners -- Validations the entity -- Summary -- Chapter 3: Understanding Microservices -- Traditional monoliths -- Need for delivering new features quicker -- Team size and dependency -- Multiple small units of work -- Smaller code base -- Coding practices -- Follow domain-driven design -- Document it -- Build for failure -- Infrastructure tooling as part of code -- Single responsibility -- The need for REST -- Scale only what needs to scale -- The bad parts, yes, there are a few -- Summary -- Chapter 4: Building and Deploying Microservices -- Fat JAR -- Fat JAR approach -- Skinny WAR -- Examples using Payara Micro -- Building our services -- Running our services -- MicroProfile -- Java EE already has support -- WildFly Swarm -- Spring Cloud -- Docker containers -- Working with distributed teams -- Building custom images -- Running multiple containers -- Fat JAR or Skinny WAR with Docker -- The choice -- Summary -- Chapter 5: Java EE Becomes JSON Friendly -- REST prefers JSON -- JSON, a first-class citizen -- JSON in databases…”
Libro electrónico