Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 267
- Application software 238
- Java (Computer program language) 185
- Big data 162
- Cloud computing 155
- Streaming video 152
- Engineering & Applied Sciences 129
- Management 128
- Data mining 126
- Electronic data processing 117
- Computer networks 111
- Database management 98
- Data processing 90
- Computer Science 86
- Machine learning 83
- Computer programming 82
- Computer programs 82
- Python (Computer program language) 75
- Computer software 70
- Examinations 68
- Artificial intelligence 67
- Distributed processing 64
- Security measures 61
- Computer security 58
- Information technology 58
- Operating systems (Computers) 57
- Programming 56
- Microsoft .NET Framework 55
- Design 54
- Software engineering 53
-
1701por Lewis, Chris. authorTabla de Contenidos: “…Pattern TemplateShorthand Notations; Organization of Patterns; Motivational Design Patterns; Motivational Dark Patterns; Conclusion; Chapter 4: Gameful Patterns; When to Use; Pattern: Collection; How It's Used; What to Watch for; Specialization of Collection: Badge; How It's Used; What to Watch for; Pattern: Growth; How It's Used; Pattern: Increased Responsibility; How It's Used; Pattern: Leaderboard; How It's Used; What to Watch for; Pattern: Score; How It's Used; What to Watch for; Conclusion; Chapter 5: Social Patterns; When to Use; Pattern: Activity Stream; How It's Used…”
Publicado 2014
Libro electrónico -
1702por Moemeka, EdwardTabla de Contenidos: “…""Chapter 4: Navigating the Media Maze""""Media Playback""; ""Setting Up the Project""; ""Media Playback""; ""Video/Audio Effects""; ""Background Audio""; ""Streaming Media to Other Devices""; ""Media Capture""; ""Summary""; ""Chapter 5: Making the Most Out of Charms and Contracts""; ""Charms""; ""Search Charm""; ""Search Charm Usage""; ""The Search Experience""; ""Search Declarations""; ""Adding Permissions""; ""Search Within Applications""; ""Share Charm""; ""Sharing as Source""; ""Sharing as a Target""; ""Start Charm""; ""Devices Charm""; ""Settings Charm""; ""Implicit Contracts""…”
Publicado 2013
Libro electrónico -
1703por Jackson, Wallace. authorTabla de Contenidos: “…""Screen Real Estate: View and Activity Classes""""Interactivity: Using Android Intent and Event Handling""; ""UI Design: Adding User Controls to Your Apps""; ""Graphics Design: Add Visuals to Your Apps""; ""Animation: Adding Motion Graphics to Your Apps""; ""Digital Video: Captive or Streaming Video for an Application""; ""Digital Audio: Adding Audio Media to Your Apps""; ""Services: Adding Background Processing to Apps""; ""Content Providers: Accessing Stored Data Inside of Your App""; ""Android Wearables: Creating a Smartwatch Application""…”
Publicado 2014
Libro electrónico -
1704Publicado 1995Tabla de Contenidos: “…Select a Set of Indicators -- Revise Sampling Design -- Information-Management System -- Publish Study Results -- Delay Full Implementation Until Results of Demonstration Projects are Evaluated -- GREAT LAKES -- Conclusions -- SURFACE WATERS -- Background and Objectives -- Assessment End Points -- Indicators -- Sampling Design -- Lake Pilot Project -- Streams -- Intra-Agency Cooperation -- Oversight And Coordination Among EMAP Resource Groups -- EMAP-Center Organization -- References -- Appendix A September 20, 1994 letter from Dr. …”
Libro electrónico -
1705Publicado 2024Tabla de Contenidos: “…Initial Conceptual Framework and Empirical Insights -- Software startups -- Benefits, Challenges and Implications of Open-Source Software for Health-Tech Startups: An Empirical Study -- Corporate Startups: A Systematic Literature Review on Governance and Autonomy -- Exploring the Finnish Impact Investing Ecosystem: Perspectives on Challenges from Technology Startups -- Practitioner Views on Defining Analytics for Software Startups: A Preliminary Guide Based on Gray Literature -- Software Product Management -- An Evaluation of the Product Security Maturity Model through Case Studies at 15 Software Producing Organizations -- Strategic Digital Software Product Management in the Age of AI -- Experimentation in Early-Stage Video Game Startups: Practices and Challenges -- Software and Business Co-Development -- DevOps challenges and Risk mitigation strategies by DevOps professionals teams -- Good agile practices increase positive customer experience -- Information-Centric Adoption and Use of Standard-Compliant DevSecOps for Operational Technology: From Experience to Design Principles -- Exploring Sentiments and Emotions in Online Meetings: Unpacking Agile Retrospective Teams -- Emerging Digital World -- Feeling the Elephant: Insiders’ Perspectives on the Metaverse -- What does Scopes 1, 2 and 3 mean for software companies -- Understanding Cost Dynamics of Serverless Computing: An Empirical Study -- Quantum Software Ecosystem: Stakeholders, Interactions and Challenges -- Dynamic Capabilities for Sustainable Digital Transformation Amid Crisis: Insights from Law Firms in Emerging Economy -- Research Streams of Barriers to Digital Transformation: Mapping Current State and Future Directions…”
Libro electrónico -
1706Publicado 2023Tabla de Contenidos: “…Redirect()->back() -- Other Redirect Methods -- redirect()->with() -- Aborting the Request -- Custom Responses -- response()->make() -- response()->json() and ->jsonp() -- response()->download(), ->streamDownload(), and ->file() -- Testing -- TL -- DR -- Chapter 4. …”
Libro electrónico -
1707por Ajay, KumarTabla de Contenidos: “…3.3.2 Column Transposition -- 3.4 Steganography -- 3.4.1 Modern Steganography Techniques -- 3.4.2 Attacks on Steganography -- 3.4.3 Applications -- 3.5 Linear Feedback Shift Registers -- 3.5.1 Linear Recurrence Relation -- 3.5.2 LFSR Operation -- Key Terms -- Summary -- Review Questions -- CHAPTER 4 Data Encryption Standard -- 4.1 Simplified Data Encryption Standard -- 4.1.1 S-DES Encryption -- 4.1.2 Key Expansion Process -- 4.1.3 S-DES Decryption -- 4.2 Data Encryption Standard -- 4.2.1 DES Encryption and Decryption -- 4.2.2 DES Key Expansion -- 4.2.3 DES Decryption -- 4.3 Strength of DES -- 4.3.1 Brute-force Attack -- 4.3.2 Differential Cryptanalysis -- 4.3.3 Linear Cryptanalysis -- 4.4 Modes of Operation -- 4.4.1 Electronic Code Book Mode -- 4.4.2 Cipher Block Chaining Mode -- 4.4.3 Cipher Feedback Mode -- 4.4.4 Output Feedback Mode -- 4.4.5 Counter Mode -- Key Terms -- Summary -- Review Questions -- References -- CHAPTER 5 Secure Block Cipher and Stream Cipher Technique -- 5.1 Need for Double DES and Triple DES -- 5.2 Double DES -- 5.2.1 Meet-in-the-Middle Attack -- 5.2.2 Attacking Scenario -- 5.3 Triple DES -- 5.4 Pseudo Random Number Generator -- 5.4.1 Linear Congruential Generator -- 5.4.2 Blum Blum Shub Generator -- 5.5 RC4 -- 5.5.1 Principle of RC4 -- 5.5.2 The Key-scheduling Algorithm -- 5.5.3 The Pseudo Random Generation Algorithm -- 5.5.4 Encryption and Decryption -- 5.6 RC5 -- 5.6.1 Principles of RC5 -- 5.6.2 RC5 Key Expansion -- 5.6.3 RC5 Encryption -- 5.6.4 RC5 Decryption -- 5.7 International Data Encryption Algorithm -- 5.7.1 Principles of IDEA -- 5.7.2 Key Expansion -- 5.7.3 IDEA Encryption and Decryption -- 5.8 Blowfish Encryption -- 5.8.1 Principles of Blowfish -- 5.8.2 Key Expansion -- 5.8.3 Encryption and Decryption -- 5.9 CAST-128 -- 5.9.1 CAST-128 Algorithm -- 5.9.2 Strength of CAST -- 5.10 RC2 -- 5.10.1 Key Expansion Process…”
Publicado 2016
Libro electrónico -
1708Publicado 2022Tabla de Contenidos: “…2.3 Electronic Mail in the Internet -- 2.3.1 SMTP -- 2.3.2 Mail Message Formats -- 2.3.3 Mail Access Protocols -- 2.4 DNS-The Internet's Directory Service -- 2.4.1 Services Provided by DNS -- 2.4.2 Overview of How DNS Works -- 2.4.3 DNS Records and Messages -- 2.5 Peer-to-Peer File Distribution -- 2.6 Video Streaming and Content Distribution Networks -- 2.6.1 Internet Video -- 2.6.2 HTTP Streaming and DASH -- 2.6.3 Content Distribution Networks -- 2.6.4 Case Studies: Netflix and YouTube -- 2.7 Socket Programming: Creating Network Applications -- 2.7.1 Socket Programming with UDP -- 2.7.2 Socket Programming with TCP -- 2.8 Summary -- Homework Problems and Questions -- Socket Programming Assignments -- Wireshark Labs: HTTP -- Wireshark Lab: DNS -- Interview: Tim Berners-Lee -- Chapter 3: Transport Layer -- 3.1 Introduction and Transport-Layer Services -- 3.1.1 Relationship Between Transport and Network Layers -- 3.1.2 Overview of the Transport Layer in the Internet -- 3.2 Multiplexing and Demultiplexing -- 3.3 Connectionless Transport: UDP -- 3.3.1 UDP Segment Structure -- 3.3.2 UDP Checksum -- 3.4 Principles of Reliable Data Transfer -- 3.4.1 Building a Reliable Data Transfer Protocol -- 3.4.2 Pipelined Reliable Data Transfer Protocols -- 3.4.3 Go-Back-N (GBN) -- 3.4.4 Selective Repeat (SR) -- 3.5 Connection-Oriented Transport: TCP -- 3.5.1 The TCP Connection -- 3.5.2 TCP Segment Structure -- 3.5.3 Round-Trip Time Estimation and Timeout -- 3.5.4 Reliable Data Transfer -- 3.5.5 Flow Control -- 3.5.6 TCP Connection Management -- 3.6 Principles of Congestion Control -- 3.6.1 The Causes and the Costs of Congestion -- 3.6.2 Approaches to Congestion Control -- 3.7 TCP Congestion Control -- 3.7.1 Classic TCP Congestion Control -- 3.7.2 Network-Assisted Explicit Congestion Notification and Delayed-based Congestion Control -- 3.7.3 Fairness…”
Libro electrónico -
1709Publicado 2017Tabla de Contenidos: “…-- Reactive programming in a nutshell -- Reactive systems -- Responsive -- Resilient -- Elastic -- Message-driven -- Back-pressure -- Reactive streams -- Reactive programming in Java…”
Libro electrónico -
1710Publicado 2023Tabla de Contenidos: “…Creating a projected graph from Python -- Running GDS algorithms from Python and extracting data in a dataframe -- write mode -- stream mode -- Dropping the projected graph -- Using features from graph algorithms in a scikit-learn pipeline -- Machine learning tasks with graphs -- Our task -- Computing features -- Extracting and visualizing data -- Building the model -- Summary -- Further reading -- Exercise -- Chapter 7: Automatically Extracting Features with Graph Embeddings for Machine Learning -- Technical requirements -- Introducing graph embedding algorithms -- Defining embeddings -- Graph embedding classification -- Using a transductive graph embedding algorithm -- Understanding the Node2Vec algorithm -- Using Node2Vec with GDS -- Training an inductive embedding algorithm -- Understanding GraphSAGE -- Introducing the GDS model catalog -- Training GraphSAGE with GDS -- Computing new node representations -- Summary -- Further reading -- Exercises -- Chapter 8: Building a GDS Pipeline for Node Classification Model Training -- Technical requirements -- The GDS pipelines -- What is a pipeline? …”
Libro electrónico -
1711Publicado 2009Tabla de Contenidos: “…Timing Attack -- Power Analysis -- Fault Analysis -- Backdoor Attacks -- Attacks on RSA -- An Attack on ElGamal Signatures -- An Attack on ElGamal Encryption -- Countermeasures -- Quantum Computation and Cryptography -- Introduction -- Quantum Computation -- System -- Entanglement -- Evolution -- Measurement -- The Deutsch Algorithm -- Quantum Cryptography -- Quantum Cryptanalysis -- Shor's Algorithm for Computing Period -- Breaking RSA -- Factoring Integers -- Computing Discrete Logarithms -- Symmetric Techniques -- Introduction -- Block Ciphers -- A Case Study: DES -- The Advanced Standard: AES -- Multiple Encryption -- Modes of Operation -- Stream Ciphers -- Linear Feedback Shift Registers -- Stream Ciphers Based on LFSRs -- Hash Functions -- Merkle's Meta Method -- The Secure Hash Algorithm -- Key Exchange in Sensor Networks -- Complexity Theory and Cryptography -- Introduction -- Provably Difficult Computational Problems Are not Suitable -- One-way Functions and the Complexity Class UP -- Introduction -- Security Issues in a Sensor Network -- The Basic Bootstrapping Framework -- The Basic Random Key Predistribution Scheme -- The q-composite Scheme -- Multi-path Key Reinforcement -- Random Pairwise Scheme -- Multi-hop Range Extension -- Polynomial-pool-based Key Predistribution -- Pairwise Key Predistribution -- Grid-based Key Predistribution -- Matrix-based Key Predistribution -- Location-aware Key Predistribution -- Closest Pairwise Keys Scheme -- Location-aware Polynomial-pool-based Scheme -- Complexity Theoryand Cryptography -- Hints to Selected Exercises -- References -- Index…”
Libro electrónico -
1712Publicado 2018Tabla de Contenidos: “…-- Reactive programming in a nutshell -- Reactive systems -- Responsive -- Resilient -- Elastic -- Message-driven -- Back-pressure -- Reactive streams…”
Libro electrónico -
1713Publicado 2017Tabla de Contenidos: “…-- Summary -- Chapter 4: Analyzing Twitter Using Sentiment Analysis and Entity Recognition -- Scope and process -- Getting the data -- Getting Twitter API keys -- Data extraction -- REST API Search endpoint -- Rate Limits -- Streaming API -- Data pull -- Data cleaning -- Sentiment analysis -- Customized sentiment analysis -- Labeling the data -- Creating the model -- Model performance evaluation and cross-validation -- Confusion matrix -- K-fold cross-validation -- Named entity recognition -- Installing NER -- Combining NER and sentiment analysis -- Summary -- Chapter 5: Campaigns and Consumer Reaction Analytics on YouTube - Structured and Unstructured -- Scope and process -- Getting the data -- How to get a YouTube API key -- Data pull -- Data processing…”
Libro electrónico -
1714Publicado 2023Tabla de Contenidos: “…Bonus - dynamic route options for access control -- CSRF protection on routes -- Altering routes -- Entity access -- Injecting services into Entity handlers -- Entity access hooks -- Field access -- Entity access in routes -- Node access grants -- Block access -- Summary -- Chapter 11: Caching -- Introduction to caching -- Cacheability metadata -- Cache tags -- Cache contexts -- max-age -- Using the cache metadata -- Placeholders and lazy building -- Lazy builders -- Using the Cache API -- Creating our own cache bin -- Summary -- Chapter 12: JavaScript and the Ajax API -- JavaScript in Drupal -- Drupal behaviors -- Drupal settings -- The Ajax API -- Ajax links -- Ajax in forms -- The States (Form) system -- Summary -- Chapter 13: Internationalization and Languages -- Introduction to the multilingual ecosystem -- Language -- Content translation -- Configuration translation -- Interface translation -- Internationalization -- Content entities and the translation API -- Summary -- Chapter 14: Batches, Queues, and Cron -- Batch-powered update hooks -- Batch operations -- Creating the batch -- Batch operations -- Cron -- Queues -- Introduction to the Queue API -- Cron-based queues -- Processing a queue programmatically -- The Lock API -- Summary -- Chapter 15: Views -- Entities in Views -- Exposing custom data to Views -- Views data -- Custom Views field -- Field configuration -- Custom Views filter -- Custom Views argument -- Views theming -- Views hooks -- Summary -- Chapter 16: Working with Files and Images -- The filesystem -- Stream wrappers -- Managed versus unmanaged files -- Using the File and Image fields -- Working with managed files -- Attaching managed files to entities -- Helpful functions for dealing with managed files -- Managed file uploads -- Our own stream wrapper -- Working with unmanaged files -- Private filesystem -- Images…”
Libro electrónico -
1715Publicado 2022Tabla de Contenidos: “…-- 8.5 Significance of Iranian Internal Waters for the Passage Regime in the Strait of Hormuz -- 9 Tensions in and over the Taiwan Strait in 2021 -- 9.1 Legal and Geographical Characteristics of the Taiwan Strait -- 9.2 Navigation in the Taiwan Strait in the Light of Recent Developments in China’s Legislation -- 9.3 Geopolitical Tensions in the Taiwan Strait and Intrusions of Taiwan’s Air Defence Identification Zone -- 10 Discriminatory Navigational Restrictions in the Kerch Strait in Respect of Foreign Commercial Ships -- 10.1 The Significance of the Kerch Strait for Commerce -- 10.2 Restrictions on Foreign Commercial Ships’ Navigation through the Kerch Strait -- 11 Discriminatory Prohibition of the Right of Innocent Passage of a Commercial Ship The Vironia Incident in the Gulf of Finland -- 11.1 Right of Innocent Passage in the Eastern Gulf of Finland from 1920s to 2000 -- 11.2 The Russian Federation’s Maritime Zones in the Gulf of Finland -- 11.3 The Vironia Incident in the Gulf of Finland and Its Aftermath -- 11.4 Potential Legal Basis of the Russian Federation’s Permit-Based Passage Regime in the Gulf of Finland -- part 4 -- Major Maritime Industrial Projects, Piracy, and Unidentified Soldiers -- 12 The Nord Stream Project and Estonian-Russian Incidents in the Viro Strait -- 12.1 Link between Industrial Projects and Maritime Security -- 12.2 The Significance of the Viro Strait’s eez Corridor for the Nord Stream Project -- 12.3 Marine Scientific Research in the Context of Seabed Studies on the Pipeline Route -- 12.4 The Incident between the Estonian Coast Guard and Russian Research Vessels in the Viro Strait’s eez Corridor -- 12.5 Permit-Based Marine Scientific Research in an eez: Estonia’s Decision to Deny Seabed Surveys -- 13 Countering the Threat of ‘Little Green Men’ in the Åland Strait -- 13.1 Geopolitical Characteristics of the Åland Strait and Preparations to Counter Unidentified Soldiers on the Åland Islands -- 13.2 Legal Regime of the Åland Strait -- 14 Threats of Piracy in the Straits of Malacca, Sunda, Lombok -- 14.1 Legal and Geopolitical Characteristics -- 14.2 Threats of Piracy in Indonesia and the Straits of Malacca and Singapore -- part 5 -- Concluding Observations on the Implications of Hybrid Threats for Maritime Security Law -- 15 A Need for a New Legal Framework on Hybrid Naval Warfare? …”
Libro electrónico -
1716Publicado 2021Tabla de Contenidos: “…. -- Writing to files with streams -- Getting ready -- How to do it... -- How it works... -- See also -- Reading from files with streams -- Getting ready -- How to do it... -- How it works... -- There's more... -- Reading and writing binary data with streams -- Getting ready -- How to do it... -- How it works... -- There's more... -- Moving around inside a file with lseek() -- Getting ready -- How to do it... -- How it works... -- Moving around inside a file with fseek() -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 6: Spawning Processes and Using Job Control -- Technical requirements -- Exploring how processes are created -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using job control in Bash -- Getting ready -- How to do it... -- How it works... -- Controlling and terminating processes using signals -- Getting ready -- How to do it... -- How it works... -- See also -- Replacing the program in a process with execl() -- Getting ready -- How to do it... -- How it works... -- See also -- Forking a process -- Getting ready…”
Libro electrónico -
1717Publicado 2017Tabla de Contenidos: “…. -- See also -- Chapter 7: Working with Files and Streams -- Introduction -- Reading and writing raw data from/to binary files -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Reading and writing objects from/to binary files -- Getting ready -- How to do it... -- How it works... -- See also -- Using localized settings for streams -- Getting ready -- How to do it... -- How it works... -- See also -- Using I/O manipulators to control the output of a stream -- Getting ready -- How to do it... -- How it works... -- See also -- Using monetary I/O manipulators -- Getting ready -- How to do it... -- How it works... -- See also -- Using time I/O manipulators -- Getting ready -- How to do it... -- How it works... -- See also -- Working with filesystem paths -- Getting ready -- How to do it... -- How it works... -- See also -- Creating, copying, and deleting files and directories -- Getting ready -- How to do it... -- How it works... -- See also -- Removing content from a file -- Getting ready -- How to do it... -- How it works... -- See also -- Checking the properties of an existing file or directory -- Getting ready -- How to do it... -- How it works... -- See also -- Enumerating the content of a directory -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Finding a file -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 8: Leveraging Threading and Concurrency -- Introduction -- Working with threads -- Getting ready -- How to do it... -- How it works... -- See also -- Handling exceptions from thread functions…”
Libro electrónico -
1718Publicado 2016Tabla de Contenidos: “…. -- See also -- Real-time intrusion detection using streaming k-means -- Variable identification -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Simulating real-time data -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Applying streaming k-means -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 5: Working with Spark MLlib -- Introduction -- Working with Spark ML pipelines -- Implementing Naive Bayes' classification -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Implementing decision trees -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Building a recommendation system -- Getting ready -- How to do it... -- How it works...…”
Libro electrónico -
1719Publicado 2022Tabla de Contenidos: “…Kinesis Data Streams -- Summary -- Exam Essentials -- Review Questions -- Part II Architecting for Requirements -- Chapter 10 Resilient Architectures -- Introduction -- Calculating Availability -- Availability Differences in Traditional vs. …”
Libro electrónico -
1720Publicado 2023Tabla de Contenidos: “…. -- See also -- Listening to multiple observable streams -- Getting ready -- How to do it... -- How it works... -- See also -- Unsubscribing streams to avoid memory leaks -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using Angular's async pipe to unsubscribe streams automatically -- Getting ready -- How to do it... -- How it works... -- See also -- Using the map operator to transform data -- Getting ready -- How to do it... -- How it works... -- See also -- Using the switchMap and debounceTime operators with autocompletes for better performance -- Getting ready -- How to do it... -- How it works... -- See also -- Creating a custom RxJS operator -- Getting ready -- How to do it... -- How it works... -- See also -- Retrying failed HTTP calls with RxJS -- Getting ready -- How to do it... -- How it works... -- See also -- Chapters 6: Reactive State Management with NgRx -- Technical requirements -- Creating your first NgRx store with actions and reducers -- Getting ready -- How to do it... -- See also -- Using NgRx Store Devtools to debug state changes -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using NgRx selectors to select and render state in components -- Getting ready -- How to do it... -- How it works... -- See also -- Using NgRx effects to fetch data from API calls -- Getting ready -- How to do it... -- How it works... -- See also -- Using NgRx Component Store to manage the state of a component -- Getting ready -- How to do it... -- How it works... -- See also -- Chapters 7: Understanding Angular Navigation and Routing -- Technical requirements -- Creating routes in an Angular (standalone) app -- Getting ready -- How to do it... -- How it works... -- See also -- Lazily loaded routes in Angular -- Getting ready -- How to do it... -- How it works... -- See also -- Preloading route strategies -- Getting ready…”
Libro electrónico