Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
2381
-
2382Publicado 2017Tabla de Contenidos: “…Variables -- Import directives -- Nested selectors -- Mixins -- Extend pseudo-class -- LESS docs and support -- SASS, Stylus, and other alternatives -- Implementing LESS -- Installing LESS compiler -- Compiling LESS files with Webpack -- DIY versus framework-based styling -- Do-it-yourself approach -- Pros -- Cons -- Framework-based approach -- Pros -- Cons -- Conclusions -- Working with Bootstrap -- Changing the theme -- Rebuild the Webpack vendor config file -- Delete the /wwwroot/dist/ folder -- Update the .csproj file -- Create the update-webpack.bat file -- Testing the new theme -- Revising the UI structure -- AppComponent -- NavMenuComponent -- QuizSearchComponent -- Registering QuizSearchComponent -- The logo SVG file -- A quick test -- Styling the components -- CSS encapsulation -- Native encapsulation using Shadow DOM -- Disable encapsulation -- HomeComponent -- QuizListComponent -- Another UI test -- QuizComponent -- Testing it up -- QuizEditComponent -- Question, answer, and result components -- Buttons and icons -- Tables and DIVs -- Forms and inputs -- Full-scale layout test -- Suggested topics -- Summary -- Chapter 7: Forms and Data Validation -- Data validation -- Forms in Angular -- Template-Driven forms -- The pros -- The cons -- Model-Driven/Reactive forms -- Our first Reactive form -- Adding ReactiveFormsModule -- Updating QuizEditComponent -- Adding validators -- Adding shortcuts -- Upgrading components -- QuestionEditComponent -- AnswerEditComponent -- ResultEditComponent -- Debugging and testing -- A look at the Form Model -- The pipe operator -- Reacting to changes -- Observing the Observable -- Extending the activity log -- Client-side debugging -- Forms unit testing -- Suggested topics -- Summary -- Chapter 8: Authentication and Authorization -- To auth, or not to auth -- Authentication -- Third-party authentication…”
Libro electrónico -
2383Publicado 2011Tabla de Contenidos: “…-- Benefits -- Common terms -- Rails in the wild -- 1.2.Developing your first application -- Installing Rails -- Generating an application -- Starting the application -- Scaffolding -- Migrations -- Viewing and creating purchases -- Validations -- Showing off -- Routing -- Updating -- Deleting -- 1.3.Summary -- 2.Testing saves your bacon -- 2.1.Test-and behavior-driven development -- 2.2.Test-driven development -- Why test? …”
Libro electrónico -
2384Publicado 2017Tabla de Contenidos: “…-- Spark and big data analytics -- Thinking about a single machine versus a cluster of machines -- Using Spark for IoT data processing -- To stream or not to stream -- Lambda architectures -- Handling change -- Summary -- Chapter 6: Getting to Know Your Data - Exploring IoT Data -- Exploring and visualizing data -- The Tableau overview -- Techniques to understand data quality -- Look at your data - au naturel -- Data completeness -- Data validity -- Assessing Information Lag -- Representativeness -- Basic time series analysis -- What is meant by time series? …”
Libro electrónico -
2385Publicado 2011Tabla de Contenidos: “…Moving from Spreadsheets to Databases -- Reliving Database History -- Defining the Structure of Relational Databases -- Conforming to Table Design Rules -- Choosing Primary Key Codes -- Maintaining Data Integrity and Accuracy -- Displaying Data with Queries and Views -- 5 Working with Access Databases and Tables -- Understanding Access Database Files -- Creating a New Access Database from Scratch -- Exploring the Properties of Tables and Fields -- Choosing Field Data Types, Sizes, and Formats -- Preparing to Add a Table Related to the Employees Table -- Setting Default Values of Fields -- Working with Relations, Key Fields, and Indexes -- Altering Fields and Relationships -- Working with Object Dependencies and Access Smart Tags -- Copying and Pasting Tables -- Using the Table Analyzer Wizard -- Generating a Data Dictionary with the Database Documenter -- 6 Entering, Editing, and Validating Access Table Data -- Using Keyboard Operations for Entering and Editing Data -- Adding Records to a Table -- Selecting, Appending, Replacing, and Deleting Table Records -- Validating Data Entry -- Adding Records to the HRActions Table -- Testing Field and Table Validation Rules -- 7 Sorting, Finding, and Filtering Data -- Sorting Table Data -- Finding Matching Records in a Table -- Replacing Matched Field Values Automatically -- Filtering Table Data -- Applying Advanced Filters and Sort Orders -- Customizing Table Datasheet View -- Copying, Exporting, and Mailing Sorted and Filtered Data -- 8 Linking, Importing, and Exporting Data -- Importing and Linking Spreadsheet Files -- Working with Microsoft Outlook and Exchange Folders -- Importing Text Files -- Working with Tables in Other Database File Formats -- Using the Linked Table Manager Add-in to Relink Tables -- Using the Access Mail Merge Wizard -- Exporting Tables to Word, Excel, PDF, and XPS Files…”
Libro electrónico -
2386Publicado 2022Tabla de Contenidos:Libro electrónico
-
2387Publicado 2004Tabla de Contenidos: “…WebSphere Business Integration Modeler: modeling the scenario -- 6.1 Validate reference model -- 6.1.1 Modeling a process in BPEL mode -- 6.1.2 Exporting files from WebSphere Business Integration Modeler -- 6.1.3 Understanding the generated files -- 6.1.4 Importing files into WebSphere Studio…”
Libro electrónico -
2388Publicado 2023Tabla de Contenidos: “…Summary -- Further reading -- Chapter 5: Setting Up Isolated Penetration Testing Lab Environments on Azure -- Technical requirements -- Preparing the necessary components and prerequisites -- Part 1 of 2 - Manually creating a resource group -- Part 2 of 2 - Generating SSH keys to access the attacker VM instance -- Defining the project's structure -- Preparing the isolated network -- Setting up the target resources -- Part 1 of 2 - Preparing the target resources using Terraform -- Part 2 of 2 - Verifying our target VM instance setup -- Manually setting up the attacker VM instance -- Part 1 of 2 - Manually launching and setting up the attacker instance -- Part 2 of 2 - Verifying that our setup is working -- Leveraging Terraform to automatically set up the attacker VM instance -- Part 1 of 3 - Creating the golden image -- Part 2 of 3 - Deleting the manually created resources -- Part 3 of 3 - Preparing the Terraform configuration files -- Simulating penetration testing in the isolated network environment -- Part 1 of 4 - Scanning with Nmap -- Part 2 of 4 - Using the VNC login scanner module of Metasploit -- Part 3 of 4 - Breaking out of the container -- Part 4 of 4 - Locating the flags -- Cleaning up -- Summary -- Further reading -- Chapter 6: Setting Up Isolated Penetration Testing Lab Environments on AWS -- Technical requirements -- Leveraging Terraform to automatically set up the lab environment -- Validating network connectivity and security -- Part 1 of 3 - Authorizing the use of the serial console -- Part 2 of 3 - Manually verifying network connectivity with ping tests -- Part 3 of 3 - Using the Reachability Analyzer to validate network connectivity -- Setting up the attacker VM instance -- Simulating penetration testing in the isolated network environment -- Part 1 of 3 - Obtaining the first flag…”
Libro electrónico -
2389por Feng, GuangliangTabla de Contenidos: “…Analysis of Temperature Field Characteristics in Seasonal Frost Region Airport Pavement Subgrade -- 1 Introduction -- 2 Theoretical Analysis -- 2.1 Fundamentals of Temperature Field Description -- 2.2 Governing Temperature Field Equation -- 3 Finite Element Model Establishment -- 3.1 Geometric Parameters -- 3.2 Basic Parameters -- 3.3 Boundary Conditions -- 4 Analysis of the Natural Subgrade Temperature Field -- 5 Conclusion -- References -- Use of Temporal Convolutional Network with an Attention Mechanism and a Bidirectional Gated Recurrent Unit to Capture and Predict Slope Debris Flow Risk -- 1 Introduction -- 2 Slope Debris Flow Simulation Platform -- 3 Methodology -- 3.1 Topsis-Entrory Method -- 3.2 Models -- 4 Simulation Experimental Data and Model Validation of Slope Debris Flow -- 4.1 Simulation Experimental Data and Analysis -- 4.2 Model Test -- 5 Conclusion and Discussion -- References -- Deformation Analysis of Deep Buried Soft Rock Tunnel and Adaptive Control Measure of TBM Construction -- 1 Introduction -- 2 Theoretical Inversion of Mechanical Parameters for Deep Buried Soft Rock Tunnel -- 2.1 Theoretical Inversion Principles Based on the Convergence-Confinement Method -- 2.2 Calculation of Support Resistance -- 2.3 On-Site Monitoring Information -- 2.4 Parameter Theory Inversion and Validation -- 3 Adaptive Prevention and Control Measures for Open TBM Excavation of Deep Buried Soft Rock Tunnel -- 3.1 The Simulation of the TBM Excavation Based on Finite Element Method -- 3.2 Soft Rock Excavation Unloading Response -- 3.3 Principle of Support and Effect of Retractable Steel Arches -- 4 Conclusion -- References -- Effect of Dry-Wet Cycle on Slope Stability of Laterite Subgrade -- 1 Introduction -- 2 Test Scheme -- 2.1 Test Soil Sample -- 2.2 Experimental Methods and Equipment…”
Publicado 2024
Libro electrónico -
2390Publicado 2021Tabla de Contenidos: “…Working with Python Operators -- Arithmetic operators -- Comparison operators -- Boolean operators -- Creating and Using Variables -- Creating valid variable names -- Creating variables in code -- Manipulating variables -- Saving your work -- Running your Python app in VS Code -- Understanding What Syntax Is and Why It Matters -- Putting Code Together -- Book 2 Understanding Python Building Blocks -- Chapter 1 Working with Numbers, Text, and Dates -- Calculating Numbers with Functions -- Still More Math Functions -- Formatting Numbers -- Formatting with f-strings -- Showing dollar amounts -- Formatting percent numbers -- Making multiline format strings -- Formatting width and alignment -- Grappling with Weirder Numbers -- Binary, octal, and hexadecimal numbers -- Complex numbers -- Manipulating Strings -- Concatenating strings -- Getting the length of a string -- Working with common string operators -- Manipulating strings with methods -- Uncovering Dates and Times -- Working with dates -- Working with times -- Calculating timespans -- Accounting for Time Zones -- Working with Time Zones -- Chapter 2 Controlling the Action -- Main Operators for Controlling the Action -- Making Decisions with if -- Adding else to your if logic -- Handling multiple else statements with elif -- Ternary operations -- Repeating a Process with for -- Looping through numbers in a range -- Looping through a string -- Looping through a list -- Bailing out of a loop -- Looping with continue -- Nesting loops -- Looping with while -- Starting while loops over with continue -- Breaking while loops with break -- Chapter 3 Speeding Along with Lists and Tuples -- Defining and Using Lists -- Referencing list items by position -- Looping through a list -- Seeing whether a list contains an item -- Getting the length of a list -- Adding an item to the end of a list…”
Libro electrónico -
2391Publicado 2017Tabla de Contenidos: “…-- The Self-Report of Emotional Intelligence -- Other Models -- Can Self-Reporting Emotional Intelligence Be Valid? -- Self-Report Emotional Intelligence, IQ, Personality, and Work Performance -- Chapter 4: Emotional Contagion -- Spreading Emotions @work -- Emotional Temperature -- A Tale of Two Leaders -- What Does the Research Say about Emotional Contagion? …”
Libro electrónico -
2392por Celko, JoeTabla de Contenidos: “…4.2.3 Handling Timestamps4.2.4 Handling Times; 4.3 Queries with Date Arithmetic; 4.4 The Nature of Temporal Data Models; 4.4.1 Temporal Duplicates; 4.4.2 Temporal Databases; 4.4.3 Temporal Projection and Selection; 4.4.4 Temporal Joins; 4.4.5 Modifying Valid-Time State Tables; 4.4.6 Current Modifications; 4.4.7 Sequenced Modifications; 4.4.8 Nonsequenced Modifications; 4.4.9 Transaction-Time State Tables; 4.4.10 Maintaining the Audit Log; 4.4.11 Querying the Audit Log; 4.4.12 Modifying the Audit Log; 4.4.13 Bitemporal Tables; 4.4.14 Temporal Support in Standard SQL…”
Publicado 2005
Libro electrónico -
2393por Huber, Peter J.“…What techniques work best, and for whom? How valid are the results? How much data should be tested? …”
Publicado 2011
Libro electrónico -
2394por Klein, TobiasTabla de Contenidos: “…Step 1: Trigger the NULL Pointer Dereference for a Denial of ServiceStep 2: Use the Zero Page to Get Control over EIP/RIP; 3.3 Vulnerability Remediation; 3.4 Lessons Learned; 3.5 Addendum; NULL Pointer FTW; NULL Pointer FTW; 4.1 Vulnerability Discovery; Step 1: List the Demuxers of FFmpeg; Step 2: Identify the Input Data; Step 3: Trace the Input Data; 4.2 Exploitation; Step 1: Find a Sample 4X Movie File with a Valid strk Chunk; Step 2: Learn About the Layout of the strk Chunk; Step 3: Manipulate the strk Chunk to Crash FFmpeg; Step 4: Manipulate the strk Chunk to Gain Control over EIP…”
Publicado 2011
Libro electrónico -
2395Publicado 2007“…First, no longer can be upheld as valid Cartesian and Leibnizian assumptions about monadic subjects with disembodied minds without windows to each other except as mediated by culture. …”
Libro electrónico -
2396Publicado 2024Tabla de Contenidos: “…Creating a class that has orderable objects -- Deleting from a list of complicated objects -- Chapter 9: Functional Programming Features -- Writing generator functions with the yield statement -- Applying transformations to a collection -- Using stacked generator expressions -- Picking a subset - three ways to filter -- Summarizing a collection - how to reduce -- Combining the map and reduce transformations -- Implementing ``there exists'' processing -- Creating a partial function -- Writing recursive generator functions with the yield from statement -- Chapter 10: Working with Type Matching and Annotations -- Designing with type hints -- Using the built-in type matching functions -- Using the match statement -- Handling type conversions -- Implementing more strict type checks with Pydantic -- Including run-time valid value checks -- Chapter 11: Input/Output, Physical Format, and Logical Layout -- Using pathlib to work with filenames -- Replacing a file while preserving the previous version -- Reading delimited files with the CSV module -- Using dataclasses to simplify working with CSV files -- Reading complex formats using regular expressions -- Reading JSON and YAML documents -- Reading XML documents -- Reading HTML documents -- Chapter 12: Graphics and Visualization with Jupyter Lab -- Starting a Notebook and creating cells with Python code -- Ingesting data into a notebook -- Using pyplot to create a scatter plot -- Using axes directly to create a scatter plot -- Adding details to markdown cells -- Including Unit Test Cases in a Notebook -- Chapter 13: Application Integration: Configuration -- Finding configuration files -- Using TOML for configuration files -- Using Python for configuration files -- Using a class as a namespace for configuration -- Designing scripts for composition -- Using logging for control and audit output…”
Libro electrónico -
2397Publicado 2005Tabla de Contenidos: “…Integrating JOB/SCAN -- 7.1 Customizing for JOB/SCAN installations -- 7.1.1 Product library allocation -- 7.1.2 Changing the TWS for z/OS command table -- 7.1.3 Modifying the Optional functions panel -- 7.1.4 Setting the JCL edit tool -- 7.1.5 Configuring JOB/SCAN to match your environment -- 7.2 Preparing the JCL for scheduling -- 7.2.1 Preparing and validating JCL within the ISPF editor -- 7.2.2 Viewing and editing JCL from within an application definition -- 7.2.3 Automating the conversion from test to production JCL -- 7.3 Validating the dependencies between operations -- 7.4 Assessing the impact of changing variables -- 7.5 Avoiding production problems -- 7.5.1 Daily validation of jobs in the current plan -- 7.5.2 Daily planning process -- 7.5.3 Validating JCL beyond the current plan -- 7.5.4 Ad-hoc changes -- 7.6 Tuning JOB/SCAN for special situations -- 7.6.1 Extending this example -- Part 3 TWS Distributed integrations -- Chapter 8. …”
Libro electrónico -
2398Publicado 2003Tabla de Contenidos: “…4.1.1 Installation steps -- 4.1.2 Starting the installation program -- 4.2 Installation troubleshooting -- 4.2.1 Miscellaneous log file locations -- 4.3 Validating the individual products -- 4.3.1 Validate the installation of DB2 Universal Database -- 4.3.2 Validate the installation of the IBM HTTP Server program -- 4.3.3 Validate the installation of the IBM WebSphere -- 4.4 Performance tuning parameters -- 4.4.1 Relocation of DB2 log files -- 4.4.2 Increase Java maximum heap size -- 4.5 Setting up the TotalStorage Expert -- 4.5.1 Configuration Utility -- 4.6 TotalStorage Expert graphical user interfaces (GUIs) -- 4.6.1 The left pane shows a list of operations -- 4.6.2 The right pane shows the main information -- 4.6.3 The TotalStorage Expert displays system messages -- 4.7 Configuration Utility -- 4.7.1 Basic configuration -- 4.7.2 Database setup -- 4.7.3 Define administrators -- 4.7.4 Enter license key -- 4.7.5 Restart TotalStorage Expert -- 4.8 Migrating to TotalStorage Expert V2.1 -- 4.8.1 Migration process -- 4.8.2 Migrating to a new Windows 2000 Server machine -- 4.8.3 Migrate on the existing machine -- 4.8.4 Migrate StorWatch Expert database on a new machine -- 4.9 Starting and stopping the servers -- 4.9.1 Starting the servers in Windows 2000 Server -- 4.9.2 Stopping the Servers in Windows 2000 Server -- 4.9.3 Stopping and restarting TotalStorage Expert with Configuration Utility -- 4.10 Changing the passwords in Windows 2000 Server platform -- 4.10.1 DB2 user name restrictions -- 4.10.2 Creating a new Windows 2000 Server user name -- 4.10.3 Windows 2000 Server Log on as a service advanced user rights -- 4.10.4 Secure WebSphere Administrative console -- 4.10.5 Changing user name and password for IBM HTTP Server -- 4.10.6 IBM HTTP Server protection for StorWatchConfig Servlet user name -- 4.11 SWExport and SWImport utilities…”
Libro electrónico -
2399Publicado 2012Tabla de Contenidos: “…; EFECTO DEL TRABAJO CON LA PIZARRA DIGITAL INTERACTIVA RESPECTO A LOS ESTILOS DE APRENDIZAJE EN LA CLASE DE INGLÉS EN PRIMARIA; THE MLAT-E IN CATALAN: A CONSTRUCT VALIDITY STUDY USING OBJECTIVE PROFICIENCY MEASURES; LA ADQUISICIÓN DE LAS PROPIEDADES MORFOSINTÁCTICAS Y DISCURSIVAS DE LOS PRONOMBRES CLÍTICOS DEL CATALÁN EN UN CONTEXTO ESCOLAR; 2. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2400Publicado 2018Tabla de Contenidos: “…HOW TO ASSESS RELIABILITY AND VALIDITY -- 3.4. SAMPLE -- 3.4.1. Sample in the European Commission -- 3.4.2. …”
Electrónico