Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
2241Publicado 2016Tabla de Contenidos: “…Front Cover -- The Safety Critical Systems Handbook -- The Safety Critical Systems Handbook -- Copyright -- Contents -- The relationship of the documents to IEC 61508 -- A Quick Overview -- The 2010 Version of IEC 61508 -- Architectural Constraints (Chapter 3) -- Security (Chapter 2) -- Safety Specifications (Chapter 3) -- Digital Communications (Chapter 3) -- ASICs and Integrated Circuits (Chapters 3 and 4) -- Safety Manual (Chapters 3 and 4) -- Synthesis of Elements (Chapter 3) -- Software Properties of Techniques (Chapter 4) -- Element (Appendix 8) -- The 2016 Version of IEC 61511 -- Acknowledgments -- A - The Concept of Safety Integrity -- 1 - The Meaning and Context of Safety Integrity Targets -- 1.1 Risk and the Need for Safety Targets -- 1.2 Quantitative and Qualitative Safety Target -- 1.3 The Life-Cycle Approach -- Section 7.1 of Part 1 -- Concept and scope [Part 1-7.2 and 7.3] -- Hazard and risk analysis [Part 1-7.4] -- Safety requirements and allocation [Part 1-7.5 and 7.6] -- Plan operations and maintenance [Part 1-7.7] -- Plan installation and commissioning [Part 1-7.9] -- Plan the validation [Part 1d7.8] -- The safety requirements specification [Part 1-7.10] -- Design and build the system [Part 1-7.11 and 7.12] -- Install and commission [Part 1-7.13] -- Validate that the safety-systems meet the requirements [Part 1-7.14] -- Operate, maintain, and repair [Part 1-7.15] -- Control modifications [Part 1-7.16] -- Disposal [Part 1-7.17] -- Verification [Part 1-7.18] -- Functional safety assessments [Part 1-8] -- 1.4 Steps in the Assessment Process -- Step 1. …”
Libro electrónico -
2242Publicado 2023Tabla de Contenidos: “…6.1.2 Creating images with Dockerfiles -- 6.1.3 Publishing images on GitHub Container Registry -- 6.2 Packaging Spring Boot applications as container images -- 6.2.1 Preparing Spring Boot for containerization -- 6.2.2 Containerizing Spring Boot with Dockerfiles -- 6.2.3 Building container images for production -- 6.2.4 Containerizing Spring Boot with Cloud Native Buildpacks -- 6.3 Managing Spring Boot containers with Docker Compose -- 6.3.1 Using Docker Compose to manage the container life cycle -- 6.3.2 Debugging Spring Boot containers -- 6.4 Deployment pipeline: Package and publish -- 6.4.1 Building release candidates in the commit stage -- 6.4.2 Publishing container images with GitHub Actions -- Summary -- 7 Kubernetes fundamentals for Spring Boot -- 7.1 Moving from Docker to Kubernetes -- 7.1.1 Working with a local Kubernetes cluster -- 7.1.2 Managing data services in a local cluster -- 7.2 Kubernetes Deployments for Spring Boot -- 7.2.1 From containers to Pods -- 7.2.2 Controlling Pods with Deployments -- 7.2.3 Creating a Deployment for a Spring Boot application -- 7.3 Service discovery and load balancing -- 7.3.1 Understanding service discovery and load balancing -- 7.3.2 Client-side service discovery and load balancing -- 7.3.3 Server-side service discovery and load balancing -- 7.3.4 Exposing Spring Boot applications with Kubernetes Services -- 7.4 Scalability and disposability -- 7.4.1 Ensuring disposability: Fast startup -- 7.4.2 Ensuring disposability: Graceful shutdown -- 7.4.3 Scaling Spring Boot applications -- 7.5 Local Kubernetes development with Tilt -- 7.5.1 Inner development loop with Tilt -- 7.5.2 Visualizing your Kubernetes workloads with Octant -- 7.6 Deployment pipeline: Validate Kubernetes manifests -- 7.6.1 Validating Kubernetes manifests in the commit stage…”
Libro electrónico -
2243Publicado 2024Tabla de Contenidos: “…-- Integrating Beagle Security into our security pipeline -- Automating testing with Python -- Ensuring reliability and resilience in automated workflows -- Robust error-handling mechanisms -- Implementing retry logic -- Building idempotent operations -- Automated testing and validation -- Documentation and knowledge sharing -- Security and access control -- Implementing a logger for security pipelines -- Summary -- Chapter 7: Creating Custom Security Automation Tools with Python -- Designing and developing tailored security automation tools -- Integrating external data sources and APIs for enhanced functionality -- Extending tool capabilities with Python libraries and frameworks -- pandas -- scikit-learn -- Summary -- Part 4: Python Defense Strategies for Robust Security -- Chapter 8: Secure Coding Practices with Python -- Understanding secure coding fundamentals -- Principles of secure coding -- Common security vulnerabilities -- Input validation and sanitization with Python -- Input validation -- Input sanitization -- Preventing code injection and execution attacks -- Preventing SQL injection -- Preventing command injection -- Data encryption and Python security libraries -- Symmetric encryption -- Asymmetric encryption -- Hashing -- Secure deployment strategies for Python applications -- Environment configuration -- Dependency management…”
Libro electrónico -
2244Publicado 2019Tabla de Contenidos: “…Model Verification and Validation -- 3.2. Experiences and Empirical Reports on OCL -- 3.3. …”
Libro electrónico -
2245Publicado 2018Tabla de Contenidos: “…8.5.2 Exploiting domain rules -- 8.6 Validating configuration -- 8.6.1 Causes for configuration-related security flaws -- 8.6.2 Automated tests as your safety net -- 8.6.3 Knowing your defaults and verifying them -- Summary -- 9 Handling failures securely -- 9.1 Using exceptions to deal with failure -- 9.1.1 Throwing exceptions -- 9.1.2 Handling exceptions -- 9.1.3 Dealing with exception payload -- 9.2 Handling failures without exceptions -- 9.2.1 Failures aren't exceptional -- 9.2.2 Designing for failures -- 9.3 Designing for availability -- 9.3.1 Resilience -- 9.3.2 Responsiveness -- 9.3.3 Circuit breakers and timeouts -- Always specify a timeout -- 9.3.4 Bulkheads -- 9.4 Handling bad data -- Cross-site scripting and second-order attacks -- 9.4.1 Don't repair data before validation -- 9.4.2 Never echo input verbatim -- Summary -- 10 Benefits of cloud thinking -- 10.1 The twelve-factor app and cloud-native concepts -- 10.2 Storing configuration in the environment -- 10.2.1 Don't put environment configuration in code -- 10.2.2 Never store secrets in resource files -- 10.2.3 Placing configuration in the environment -- 10.3 Separate processes -- 10.3.1 Deploying and running are separate things -- 10.3.2 Processing instances don't hold state -- 10.3.3 Security benefits -- 10.4 Avoid logging to file -- 10.4.1 Confidentiality -- 10.4.2 Integrity -- 10.4.3 Availability -- 10.4.4 Logging as a service -- 10.5 Admin processes -- 10.5.1 The security risk of overlooked admin tasks -- 10.5.2 Admin tasks as first-class citizens -- Admin of log files -- 10.6 Service discovery and load balancing -- 10.6.1 Centralized load balancing -- 10.6.2 Client-side load balancing -- 10.6.3 Embracing change -- 10.7 The three R's of enterprise security -- 10.7.1 Increase change to reduce risk -- 10.7.2 Rotate -- 10.7.3 Repave -- 10.7.4 Repair -- Summary…”
Libro electrónico -
2246Publicado 2021Tabla de Contenidos: “…Simplified Payment Verification -- 7.3. Block Validation -- 7.4. Transaction Validation -- 8. Data Structures for Blockchain -- 8.1. …”
Libro electrónico -
2247Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Dedication -- Packt Upsell -- Foreword -- Contributors -- Table of Contents -- Preface -- Chapter 1: New Features and Improvements -- Running your first Bean Validation 2.0 code -- Getting ready -- How to do it... -- How it works... -- See also -- Running your first CDI 2.0 code -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running your first JAX-RS 2.1 code -- Getting ready -- How to do it... -- How it works... -- See also -- Running your first JSF 2.3 code -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running your first JSON-P 1.1 code -- Getting ready -- How to do it... -- How it works... -- See also -- Running your first JSON-B code -- Getting ready -- How to do it... -- How it works... -- See also -- Running your first Servlet 4.0 code -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running your first Security API code -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running your first MVC 1.0 code -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 2: Server-Side Development -- Using CDI to inject context and dependency -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using Bean Validation for data validation -- Getting ready -- How to do it... -- How it works... -- See also -- Using servlet for request and response management -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using Server Push to make objects available beforehand -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using EJB and JTA for transaction management -- Getting ready -- How to do it... -- How it works... -- There's more…”
Libro electrónico -
2248Publicado 2018Tabla de Contenidos: “…-- Membership services -- Consensus services -- The peer and ordering service architecture -- The distributed ledger and world state -- Channels for limiting access and visibility -- Peer gossip data dissemination protocol -- Consensus protocol -- Endorsement -- Ordering -- Validation (commitment) -- Chaincode services -- Why did Oracle build a managed platform? …”
Libro electrónico -
2249Publicado 2023Tabla de Contenidos: “…-- The API design process -- API security risks and their mitigations -- On-premises APIs versus cloud APIs -- API development in C# -- Web API security with OWASP -- Importance of OWASP adherence in C# API development -- Creating an OWASP-compliant API -- Implementing OWASP-compliant two-factor authentication (2FA) -- OpenID Connect (OIDC) and OAuth 2.0 (OAuth2) -- Summary -- Questions -- Further reading -- Chapter 8: Addressing Cross-Cutting Concerns -- A definition of cross-cutting concerns -- Importance and impact on software development -- Common examples of cross-cutting concerns -- Logging -- Error handling and exception management -- Caching -- Performance optimization -- Transaction management -- Validation -- Auditing and compliance -- Localization and internationalization -- Logging and monitoring…”
Libro electrónico -
2250Publicado 2019Tabla de Contenidos: “…From statistical learning theory to empirical validation -- I.3.3. Challenges -- I.4. Conclusion -- I.5. …”
Libro electrónico -
2251Publicado 2017Tabla de Contenidos: “…. -- Creating interceptors for login data validation -- Getting started -- How to do it... -- How it works... -- Chapter 5: Cross-Cutting the MVC -- Logging and auditing service methods -- Getting started -- How to do it... -- How it works... -- Managing DAO transactions -- Getting started -- How to do it... -- How it works... -- Monitoring services and request handlers -- Getting started -- How to do it... -- How it works... -- Validating parameters and arguments -- Getting started -- How to do it... -- How it works... -- Managing exceptions -- Getting started -- How to do it... -- How it works... -- Implementing the caching mechanism -- Getting started -- How to do it... -- How it works... -- Intercepting request transactions -- Getting started -- How to do it... -- How it works... -- Implementing user authentication -- Getting started -- How to do it... -- How it works... -- Accessing with restrictions -- Getting started -- How to do it... -- How it works…”
Libro electrónico -
2252Publicado 2017Tabla de Contenidos: “…-- Conclusion -- Chapter 24: Migrating Applications to Cloud Environments - Key Testing Considerations -- Need for validating applications for cloud migration -- Key testing focus areas in cloud migration of applications -- Key challenges in validation during cloud migration of applications -- Application migration validation - a holistic approach -- Conclusion -- Chapter 25: How Should a Tester Adapt to Cloud - Call for Change of Mindset among Testers -- What must testers prepare for when testing applications on cloud -- Testing the invisible -- Understanding the distance -- Breaking the communication barriers -- Securing the application -- Replicating the platform -- Using the right tools -- Conclusion -- Chapter 26: On-Demand Performance Testing on Self-Service Environments -- On-demand performance testing environments - key challenges and solutions -- Need for a cloud platform to build end-to-end performance testing…”
Libro electrónico -
2253por Dimotikalis, YiannisTabla de Contenidos: “…Validation loss -- 15.3.5. Overall accuracy -- 15.4. …”
Publicado 2024
Libro electrónico -
2254Publicado 2017Tabla de Contenidos: “…ANOVA and the confidence intervals -- Time for action - ANOVA and the confidence intervals -- What just happened? -- Model validation -- Time for action - residual plots for model validation -- What just happened? …”
Libro electrónico -
2255Publicado 2012Tabla de Contenidos: “…How It Works -- How to Use It -- The Recipe -- Recipe 23: CheckLinks() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 24: DirectoryList() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 25: QueryHighlight() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 26: RollingCopyright() -- About the Recipe -- How It Works -- How to Use It -- The Recipe -- Recipe 27: EmbedYouTubeVideo() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 28: CreateList() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 29: HitCounter() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 30: RefererLog() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Chapter 6: Forms and User Input -- Recipe 31: EvaluateExpression() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 32: ValidateCC() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 33: CreateCaptcha() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 34: CheckCaptcha() -- About the Recipe -- How It Works -- How to Use It -- The Recipe -- Recipe 35: ValidateText() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe -- Recipe 36: ValidateEmail() -- About the Recipe -- Variables, Arrays, and Functions -- How It Works -- How to Use It -- The Recipe…”
Libro electrónico -
2256Publicado 2024Tabla de Contenidos: “…The Innovation Systems Cycle -- In a Nutshell -- Introduction -- Levels of Innovation Complexity -- The Innovation Systems Cycle (ISC) Explained -- Phase I - Creation Phase -- Innovative Improvement Opportunities -- Process Grouping 1 - Opportunity Identification -- Inputs to Process Grouping 1 -- Team Roles and Responsibilities -- The Innovation Team Sponsor -- The Innovation Team Leader -- The Innovation Team Facilitator -- The Innovation Team Member -- Ways to Identify Improvement Opportunities -- Application to Your Organization -- The Potential IMS Improvement Identification -- Tollgate I -- Process Grouping 2 - Opportunity Development -- Process Grouping 2: Opportunity Development Activities for Apparent or Minor Opportunities -- Process Grouping 2: Opportunity Development Activity Block Diagram for Major Opportunities -- Process Grouping 2: Opportunity Development Activity Block Diagram for New Paradigms and Discovery Opportunities -- Summary of Opportunity Development -- Process Grouping 3 - Value Proposition -- Inputs to Process Grouping 3: Value Proposition -- Tollgate II: Concepts Approval -- Process Grouping 4 - Concept Validation -- Process Grouping 4 - Concept Validation - Activity Block Diagram -- Summary of Phase I - Creation -- Phase II: Preparation and Producing -- Tollgate III: Project Approval Supports the Business Case Analysis…”
Libro electrónico -
2257Publicado 2023Tabla de Contenidos: “…Writing readable assertions with FluentAssertions -- Testing performance with Shouldly -- Generating test data with Bogus -- Mocking dependencies with Moq and NSubstitute -- Understanding the need for mocking libraries -- Creating mock objects with Moq -- Programming Moq return values -- Verifying Moq calls -- Mocking with NSubstitute -- Pinning tests with Snapper -- Experimenting with Scientist .NET -- Summary -- Questions -- Further reading -- Chapter 10: Defensive Coding Techniques -- Technical requirements -- Introducing the Cloudy Skies API -- Validating inputs -- Performing basic validation -- Using the nameof keyword -- Validation with guard clauses -- Guard clauses with the GuardClauses library -- Using CallerMemberInformation attributes -- Protecting against null -- Enabling nullability analysis in C# -- Using nullability operators -- Moving beyond classes -- Preferring immutable classes -- Using required and init-only properties -- Primary constructors -- Converting classes into record classes -- Cloning objects using with expressions -- Advanced type usage -- Exploring pattern matching -- Using generics to reduce duplication -- Introducing type aliases with the using directive -- Summary -- Questions -- Further reading -- Part 3: Advanced Refactoring with AI and Code Analysis -- Chapter 11: AI-Assisted Refactoring with GitHub Copilot -- Technical requirements -- Introducing GitHub Copilot -- Understanding GitHub's predictive model -- Starting the conversation with GitHub Copilot Chat -- Getting started with GitHub Copilot in Visual Studio -- Installing and activating GitHub Copilot -- Getting access to GitHub Copilot -- Generating suggestions with GitHub Copilot -- Interacting with GitHub Copilot Chat -- Refactoring with GitHub Copilot Chat -- GitHub Copilot Chat as a code reviewer -- Targeted refactoring with GitHub Copilot Chat…”
Libro electrónico -
2258Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Table of Contents -- Committee -- Compressor considerations -- Compressor considerations -- 1 Introduction -- 2 Experimental Set-Up And Measuring Equipment -- 3 Experimental Results -- 4 Conclusion -- References -- An investigation on influence of inlet elbow on performance of a centrifugal compressor with vaned diffuser -- 1 Introduction -- 2 The Centrifugal Compressor And Numerical Method -- 2.1 Centrifugal compressor configurations -- 2.2 Numerical method and validations -- 3 Performance Of Inlet Straight Pipe And Different Bending Directions -- 3.1 Compressor performance at different inlet bending directions -- 3.2 Coupling mechanism -- 4 Conclusions -- Nomenclatures -- References -- Electrification/Driven -- Electrification/Driven -- 1 Introduction -- 2 Engine Model, Simulation Settings And Performance Indicator -- 2.1 Engine model and simulation settings -- 2.2 Performance indicators -- 3 Simulation Results - How Does An eTC Improve Engine Efficiency? …”
Libro electrónico -
2259por Dowswell, KurtTabla de Contenidos: “…Chapter 8 Code Refactoring with Copilot -- Introducing Code Refactoring with Copilot -- Establishing the Example Project -- Prerequisites -- Refactoring Duplicate Code -- Adding Unit Tests -- Refactoring Duplicate Error Handling Code -- Refactoring Validators -- Adding Unit Tests -- Extracting Validation Code to Functions -- Refactoring Bad Variable Names -- Documenting and Commenting Code -- Method Documentation -- Project Documentation -- Conclusion -- Chapter 9 Enhancing Code Security -- Detailing Code Security -- Establishing the Example Project -- Prerequisites -- Exploring Code Security -- Using HTTPS -- Implementing Validation -- Conclusion -- Finding and Fixing Security Issues -- Fixing Weak Password Hashing -- Fixing SQL Injection -- Conclusion -- Chapter 10 Accelerating DevSecOps Practices -- Detailing DevSecOps -- Simplifying Containers -- Creating a Container -- Deploying a Container -- Applying Security Controls -- Automating Infrastructure as Code -- Creating IaC -- Deploying Code Using Terraform -- Applying Security Controls -- Streamlining CI/CD Pipelines -- Creating CI Pipeline -- Adding Security Scanning -- Creating CD Pipeline -- Conclusion -- Chapter 11 Enhancing Development Environments with Copilot -- Amplifying Visual Studio with Copilot -- Prerequisites -- Installing the GitHub Copilot Extension -- Exploring Code Completions -- Chatting with Copilot -- Elevating Azure Data Studio with Copilot -- Prerequisites -- Installing the GitHub Copilot Extension -- Constructing Database Schemas with Copilot -- Inserting Test Data with Copilot -- Querying with Copilot -- Boosting JetBrains IntelliJ IDEA with Copilot -- Prerequisites -- Installing the GitHub Copilot Extension -- Exploring Code Completions -- Chatting with Copilot -- Enhancing Neovim with Copilot -- Prerequisites -- Installing the GitHub Copilot Extension…”
Publicado 2024
Libro electrónico -
2260por Institute of Medicine (U.S.) Committee on Military Nutrition Research.Tabla de Contenidos: “…ARMY BODY FAT STANDARDS -- Development Of Army Body Fat Equations -- References -- 4 Body Composition In The Military Services: Standards And Methods -- BACKGROUND -- BODY COMPOSITION STANDARDS -- Body Composition And Physical Performance -- Body Composition And Appearance -- Body Composition And Health -- BODY COMPOSITION MEASUREMENT -- Reliability And Trainability -- Equation Validity -- U.S. Army -- U.S. Navy -- U.S. Marine Corps -- U.S. …”
Publicado 1992
Libro electrónico