Mostrando 2,381 - 2,400 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.61s Limitar resultados
  1. 2381
    por Mullennex, Lauren
    Publicado 2023
    Tabla de Contenidos:
    Libro electrónico
  2. 2382
    Publicado 2017
    Tabla de Contenidos: “…Variables -- Import directives -- Nested selectors -- Mixins -- Extend pseudo-class -- LESS docs and support -- SASS, Stylus, and other alternatives -- Implementing LESS -- Installing LESS compiler -- Compiling LESS files with Webpack -- DIY versus framework-based styling -- Do-it-yourself approach -- Pros -- Cons -- Framework-based approach -- Pros -- Cons -- Conclusions -- Working with Bootstrap -- Changing the theme -- Rebuild the Webpack vendor config file -- Delete the /wwwroot/dist/ folder -- Update the .csproj file -- Create the update-webpack.bat file -- Testing the new theme -- Revising the UI structure -- AppComponent -- NavMenuComponent -- QuizSearchComponent -- Registering QuizSearchComponent -- The logo SVG file -- A quick test -- Styling the components -- CSS encapsulation -- Native encapsulation using Shadow DOM -- Disable encapsulation -- HomeComponent -- QuizListComponent -- Another UI test -- QuizComponent -- Testing it up -- QuizEditComponent -- Question, answer, and result components -- Buttons and icons -- Tables and DIVs -- Forms and inputs -- Full-scale layout test -- Suggested topics -- Summary -- Chapter 7: Forms and Data Validation -- Data validation -- Forms in Angular -- Template-Driven forms -- The pros -- The cons -- Model-Driven/Reactive forms -- Our first Reactive form -- Adding ReactiveFormsModule -- Updating QuizEditComponent -- Adding validators -- Adding shortcuts -- Upgrading components -- QuestionEditComponent -- AnswerEditComponent -- ResultEditComponent -- Debugging and testing -- A look at the Form Model -- The pipe operator -- Reacting to changes -- Observing the Observable -- Extending the activity log -- Client-side debugging -- Forms unit testing -- Suggested topics -- Summary -- Chapter 8: Authentication and Authorization -- To auth, or not to auth -- Authentication -- Third-party authentication…”
    Libro electrónico
  3. 2383
    Publicado 2011
    Tabla de Contenidos: “…-- Benefits -- Common terms -- Rails in the wild -- 1.2.Developing your first application -- Installing Rails -- Generating an application -- Starting the application -- Scaffolding -- Migrations -- Viewing and creating purchases -- Validations -- Showing off -- Routing -- Updating -- Deleting -- 1.3.Summary -- 2.Testing saves your bacon -- 2.1.Test-and behavior-driven development -- 2.2.Test-driven development -- Why test? …”
    Libro electrónico
  4. 2384
    Publicado 2017
    Tabla de Contenidos: “…-- Spark and big data analytics -- Thinking about a single machine versus a cluster of machines -- Using Spark for IoT data processing -- To stream or not to stream -- Lambda architectures -- Handling change -- Summary -- Chapter 6: Getting to Know Your Data - Exploring IoT Data -- Exploring and visualizing data -- The Tableau overview -- Techniques to understand data quality -- Look at your data - au naturel -- Data completeness -- Data validity -- Assessing Information Lag -- Representativeness -- Basic time series analysis -- What is meant by time series? …”
    Libro electrónico
  5. 2385
    Publicado 2011
    Tabla de Contenidos: “…Moving from Spreadsheets to Databases -- Reliving Database History -- Defining the Structure of Relational Databases -- Conforming to Table Design Rules -- Choosing Primary Key Codes -- Maintaining Data Integrity and Accuracy -- Displaying Data with Queries and Views -- 5 Working with Access Databases and Tables -- Understanding Access Database Files -- Creating a New Access Database from Scratch -- Exploring the Properties of Tables and Fields -- Choosing Field Data Types, Sizes, and Formats -- Preparing to Add a Table Related to the Employees Table -- Setting Default Values of Fields -- Working with Relations, Key Fields, and Indexes -- Altering Fields and Relationships -- Working with Object Dependencies and Access Smart Tags -- Copying and Pasting Tables -- Using the Table Analyzer Wizard -- Generating a Data Dictionary with the Database Documenter -- 6 Entering, Editing, and Validating Access Table Data -- Using Keyboard Operations for Entering and Editing Data -- Adding Records to a Table -- Selecting, Appending, Replacing, and Deleting Table Records -- Validating Data Entry -- Adding Records to the HRActions Table -- Testing Field and Table Validation Rules -- 7 Sorting, Finding, and Filtering Data -- Sorting Table Data -- Finding Matching Records in a Table -- Replacing Matched Field Values Automatically -- Filtering Table Data -- Applying Advanced Filters and Sort Orders -- Customizing Table Datasheet View -- Copying, Exporting, and Mailing Sorted and Filtered Data -- 8 Linking, Importing, and Exporting Data -- Importing and Linking Spreadsheet Files -- Working with Microsoft Outlook and Exchange Folders -- Importing Text Files -- Working with Tables in Other Database File Formats -- Using the Linked Table Manager Add-in to Relink Tables -- Using the Access Mail Merge Wizard -- Exporting Tables to Word, Excel, PDF, and XPS Files…”
    Libro electrónico
  6. 2386
    Publicado 2022
    Tabla de Contenidos:
    Libro electrónico
  7. 2387
    Publicado 2004
    Tabla de Contenidos: “…WebSphere Business Integration Modeler: modeling the scenario -- 6.1 Validate reference model -- 6.1.1 Modeling a process in BPEL mode -- 6.1.2 Exporting files from WebSphere Business Integration Modeler -- 6.1.3 Understanding the generated files -- 6.1.4 Importing files into WebSphere Studio…”
    Libro electrónico
  8. 2388
    Publicado 2023
    Tabla de Contenidos: “…Summary -- Further reading -- Chapter 5: Setting Up Isolated Penetration Testing Lab Environments on Azure -- Technical requirements -- Preparing the necessary components and prerequisites -- Part 1 of 2 - Manually creating a resource group -- Part 2 of 2 - Generating SSH keys to access the attacker VM instance -- Defining the project's structure -- Preparing the isolated network -- Setting up the target resources -- Part 1 of 2 - Preparing the target resources using Terraform -- Part 2 of 2 - Verifying our target VM instance setup -- Manually setting up the attacker VM instance -- Part 1 of 2 - Manually launching and setting up the attacker instance -- Part 2 of 2 - Verifying that our setup is working -- Leveraging Terraform to automatically set up the attacker VM instance -- Part 1 of 3 - Creating the golden image -- Part 2 of 3 - Deleting the manually created resources -- Part 3 of 3 - Preparing the Terraform configuration files -- Simulating penetration testing in the isolated network environment -- Part 1 of 4 - Scanning with Nmap -- Part 2 of 4 - Using the VNC login scanner module of Metasploit -- Part 3 of 4 - Breaking out of the container -- Part 4 of 4 - Locating the flags -- Cleaning up -- Summary -- Further reading -- Chapter 6: Setting Up Isolated Penetration Testing Lab Environments on AWS -- Technical requirements -- Leveraging Terraform to automatically set up the lab environment -- Validating network connectivity and security -- Part 1 of 3 - Authorizing the use of the serial console -- Part 2 of 3 - Manually verifying network connectivity with ping tests -- Part 3 of 3 - Using the Reachability Analyzer to validate network connectivity -- Setting up the attacker VM instance -- Simulating penetration testing in the isolated network environment -- Part 1 of 3 - Obtaining the first flag…”
    Libro electrónico
  9. 2389
    por Feng, Guangliang
    Publicado 2024
    Tabla de Contenidos: “…Analysis of Temperature Field Characteristics in Seasonal Frost Region Airport Pavement Subgrade -- 1 Introduction -- 2 Theoretical Analysis -- 2.1 Fundamentals of Temperature Field Description -- 2.2 Governing Temperature Field Equation -- 3 Finite Element Model Establishment -- 3.1 Geometric Parameters -- 3.2 Basic Parameters -- 3.3 Boundary Conditions -- 4 Analysis of the Natural Subgrade Temperature Field -- 5 Conclusion -- References -- Use of Temporal Convolutional Network with an Attention Mechanism and a Bidirectional Gated Recurrent Unit to Capture and Predict Slope Debris Flow Risk -- 1 Introduction -- 2 Slope Debris Flow Simulation Platform -- 3 Methodology -- 3.1 Topsis-Entrory Method -- 3.2 Models -- 4 Simulation Experimental Data and Model Validation of Slope Debris Flow -- 4.1 Simulation Experimental Data and Analysis -- 4.2 Model Test -- 5 Conclusion and Discussion -- References -- Deformation Analysis of Deep Buried Soft Rock Tunnel and Adaptive Control Measure of TBM Construction -- 1 Introduction -- 2 Theoretical Inversion of Mechanical Parameters for Deep Buried Soft Rock Tunnel -- 2.1 Theoretical Inversion Principles Based on the Convergence-Confinement Method -- 2.2 Calculation of Support Resistance -- 2.3 On-Site Monitoring Information -- 2.4 Parameter Theory Inversion and Validation -- 3 Adaptive Prevention and Control Measures for Open TBM Excavation of Deep Buried Soft Rock Tunnel -- 3.1 The Simulation of the TBM Excavation Based on Finite Element Method -- 3.2 Soft Rock Excavation Unloading Response -- 3.3 Principle of Support and Effect of Retractable Steel Arches -- 4 Conclusion -- References -- Effect of Dry-Wet Cycle on Slope Stability of Laterite Subgrade -- 1 Introduction -- 2 Test Scheme -- 2.1 Test Soil Sample -- 2.2 Experimental Methods and Equipment…”
    Libro electrónico
  10. 2390
    Publicado 2021
    Tabla de Contenidos: “…Working with Python Operators -- Arithmetic operators -- Comparison operators -- Boolean operators -- Creating and Using Variables -- Creating valid variable names -- Creating variables in code -- Manipulating variables -- Saving your work -- Running your Python app in VS Code -- Understanding What Syntax Is and Why It Matters -- Putting Code Together -- Book 2 Understanding Python Building Blocks -- Chapter 1 Working with Numbers, Text, and Dates -- Calculating Numbers with Functions -- Still More Math Functions -- Formatting Numbers -- Formatting with f-strings -- Showing dollar amounts -- Formatting percent numbers -- Making multiline format strings -- Formatting width and alignment -- Grappling with Weirder Numbers -- Binary, octal, and hexadecimal numbers -- Complex numbers -- Manipulating Strings -- Concatenating strings -- Getting the length of a string -- Working with common string operators -- Manipulating strings with methods -- Uncovering Dates and Times -- Working with dates -- Working with times -- Calculating timespans -- Accounting for Time Zones -- Working with Time Zones -- Chapter 2 Controlling the Action -- Main Operators for Controlling the Action -- Making Decisions with if -- Adding else to your if logic -- Handling multiple else statements with elif -- Ternary operations -- Repeating a Process with for -- Looping through numbers in a range -- Looping through a string -- Looping through a list -- Bailing out of a loop -- Looping with continue -- Nesting loops -- Looping with while -- Starting while loops over with continue -- Breaking while loops with break -- Chapter 3 Speeding Along with Lists and Tuples -- Defining and Using Lists -- Referencing list items by position -- Looping through a list -- Seeing whether a list contains an item -- Getting the length of a list -- Adding an item to the end of a list…”
    Libro electrónico
  11. 2391
    Publicado 2017
    Tabla de Contenidos: “…-- The Self-Report of Emotional Intelligence -- Other Models -- Can Self-Reporting Emotional Intelligence Be Valid? -- Self-Report Emotional Intelligence, IQ, Personality, and Work Performance -- Chapter 4: Emotional Contagion -- Spreading Emotions @work -- Emotional Temperature -- A Tale of Two Leaders -- What Does the Research Say about Emotional Contagion? …”
    Libro electrónico
  12. 2392
    por Celko, Joe
    Publicado 2005
    Tabla de Contenidos: “…4.2.3 Handling Timestamps4.2.4 Handling Times; 4.3 Queries with Date Arithmetic; 4.4 The Nature of Temporal Data Models; 4.4.1 Temporal Duplicates; 4.4.2 Temporal Databases; 4.4.3 Temporal Projection and Selection; 4.4.4 Temporal Joins; 4.4.5 Modifying Valid-Time State Tables; 4.4.6 Current Modifications; 4.4.7 Sequenced Modifications; 4.4.8 Nonsequenced Modifications; 4.4.9 Transaction-Time State Tables; 4.4.10 Maintaining the Audit Log; 4.4.11 Querying the Audit Log; 4.4.12 Modifying the Audit Log; 4.4.13 Bitemporal Tables; 4.4.14 Temporal Support in Standard SQL…”
    Libro electrónico
  13. 2393
    por Huber, Peter J.
    Publicado 2011
    “…What techniques work best, and for whom? How valid are the results? How much data should be tested? …”
    Libro electrónico
  14. 2394
    por Klein, Tobias
    Publicado 2011
    Tabla de Contenidos: “…Step 1: Trigger the NULL Pointer Dereference for a Denial of ServiceStep 2: Use the Zero Page to Get Control over EIP/RIP; 3.3 Vulnerability Remediation; 3.4 Lessons Learned; 3.5 Addendum; NULL Pointer FTW; NULL Pointer FTW; 4.1 Vulnerability Discovery; Step 1: List the Demuxers of FFmpeg; Step 2: Identify the Input Data; Step 3: Trace the Input Data; 4.2 Exploitation; Step 1: Find a Sample 4X Movie File with a Valid strk Chunk; Step 2: Learn About the Layout of the strk Chunk; Step 3: Manipulate the strk Chunk to Crash FFmpeg; Step 4: Manipulate the strk Chunk to Gain Control over EIP…”
    Libro electrónico
  15. 2395
    Publicado 2007
    “…First, no longer can be upheld as valid Cartesian and Leibnizian assumptions about monadic subjects with disembodied minds without windows to each other except as mediated by culture. …”
    Libro electrónico
  16. 2396
    Publicado 2024
    Tabla de Contenidos: “…Creating a class that has orderable objects -- Deleting from a list of complicated objects -- Chapter 9: Functional Programming Features -- Writing generator functions with the yield statement -- Applying transformations to a collection -- Using stacked generator expressions -- Picking a subset - three ways to filter -- Summarizing a collection - how to reduce -- Combining the map and reduce transformations -- Implementing ``there exists'' processing -- Creating a partial function -- Writing recursive generator functions with the yield from statement -- Chapter 10: Working with Type Matching and Annotations -- Designing with type hints -- Using the built-in type matching functions -- Using the match statement -- Handling type conversions -- Implementing more strict type checks with Pydantic -- Including run-time valid value checks -- Chapter 11: Input/Output, Physical Format, and Logical Layout -- Using pathlib to work with filenames -- Replacing a file while preserving the previous version -- Reading delimited files with the CSV module -- Using dataclasses to simplify working with CSV files -- Reading complex formats using regular expressions -- Reading JSON and YAML documents -- Reading XML documents -- Reading HTML documents -- Chapter 12: Graphics and Visualization with Jupyter Lab -- Starting a Notebook and creating cells with Python code -- Ingesting data into a notebook -- Using pyplot to create a scatter plot -- Using axes directly to create a scatter plot -- Adding details to markdown cells -- Including Unit Test Cases in a Notebook -- Chapter 13: Application Integration: Configuration -- Finding configuration files -- Using TOML for configuration files -- Using Python for configuration files -- Using a class as a namespace for configuration -- Designing scripts for composition -- Using logging for control and audit output…”
    Libro electrónico
  17. 2397
    Publicado 2005
    Tabla de Contenidos: “…Integrating JOB/SCAN -- 7.1 Customizing for JOB/SCAN installations -- 7.1.1 Product library allocation -- 7.1.2 Changing the TWS for z/OS command table -- 7.1.3 Modifying the Optional functions panel -- 7.1.4 Setting the JCL edit tool -- 7.1.5 Configuring JOB/SCAN to match your environment -- 7.2 Preparing the JCL for scheduling -- 7.2.1 Preparing and validating JCL within the ISPF editor -- 7.2.2 Viewing and editing JCL from within an application definition -- 7.2.3 Automating the conversion from test to production JCL -- 7.3 Validating the dependencies between operations -- 7.4 Assessing the impact of changing variables -- 7.5 Avoiding production problems -- 7.5.1 Daily validation of jobs in the current plan -- 7.5.2 Daily planning process -- 7.5.3 Validating JCL beyond the current plan -- 7.5.4 Ad-hoc changes -- 7.6 Tuning JOB/SCAN for special situations -- 7.6.1 Extending this example -- Part 3 TWS Distributed integrations -- Chapter 8. …”
    Libro electrónico
  18. 2398
    Publicado 2003
    Tabla de Contenidos: “…4.1.1 Installation steps -- 4.1.2 Starting the installation program -- 4.2 Installation troubleshooting -- 4.2.1 Miscellaneous log file locations -- 4.3 Validating the individual products -- 4.3.1 Validate the installation of DB2 Universal Database -- 4.3.2 Validate the installation of the IBM HTTP Server program -- 4.3.3 Validate the installation of the IBM WebSphere -- 4.4 Performance tuning parameters -- 4.4.1 Relocation of DB2 log files -- 4.4.2 Increase Java maximum heap size -- 4.5 Setting up the TotalStorage Expert -- 4.5.1 Configuration Utility -- 4.6 TotalStorage Expert graphical user interfaces (GUIs) -- 4.6.1 The left pane shows a list of operations -- 4.6.2 The right pane shows the main information -- 4.6.3 The TotalStorage Expert displays system messages -- 4.7 Configuration Utility -- 4.7.1 Basic configuration -- 4.7.2 Database setup -- 4.7.3 Define administrators -- 4.7.4 Enter license key -- 4.7.5 Restart TotalStorage Expert -- 4.8 Migrating to TotalStorage Expert V2.1 -- 4.8.1 Migration process -- 4.8.2 Migrating to a new Windows 2000 Server machine -- 4.8.3 Migrate on the existing machine -- 4.8.4 Migrate StorWatch Expert database on a new machine -- 4.9 Starting and stopping the servers -- 4.9.1 Starting the servers in Windows 2000 Server -- 4.9.2 Stopping the Servers in Windows 2000 Server -- 4.9.3 Stopping and restarting TotalStorage Expert with Configuration Utility -- 4.10 Changing the passwords in Windows 2000 Server platform -- 4.10.1 DB2 user name restrictions -- 4.10.2 Creating a new Windows 2000 Server user name -- 4.10.3 Windows 2000 Server Log on as a service advanced user rights -- 4.10.4 Secure WebSphere Administrative console -- 4.10.5 Changing user name and password for IBM HTTP Server -- 4.10.6 IBM HTTP Server protection for StorWatchConfig Servlet user name -- 4.11 SWExport and SWImport utilities…”
    Libro electrónico
  19. 2399
    Publicado 2012
    Tabla de Contenidos: “…; EFECTO DEL TRABAJO CON LA PIZARRA DIGITAL INTERACTIVA RESPECTO A LOS ESTILOS DE APRENDIZAJE EN LA CLASE DE INGLÉS EN PRIMARIA; THE MLAT-E IN CATALAN: A CONSTRUCT VALIDITY STUDY USING OBJECTIVE PROFICIENCY MEASURES; LA ADQUISICIÓN DE LAS PROPIEDADES MORFOSINTÁCTICAS Y DISCURSIVAS DE LOS PRONOMBRES CLÍTICOS DEL CATALÁN EN UN CONTEXTO ESCOLAR; 2. …”
    Libro electrónico
  20. 2400
    Publicado 2018
    Tabla de Contenidos: “…HOW TO ASSESS RELIABILITY AND VALIDITY -- 3.4. SAMPLE -- 3.4.1. Sample in the European Commission -- 3.4.2. …”
    Electrónico