Mostrando 2,921 - 2,940 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.49s Limitar resultados
  1. 2921
    Publicado 2004
    Tabla de Contenidos: “…Before you begin integration: pre-integration validation -- 5.1 Introduction -- 5.1.1 Important log files and configuration files -- 5.1.2 Some network considerations -- 5.2 Software requirements and case study setup -- 5.2.1 Software requirements for LWWCM -- 5.2.2 Software requirements for Content Manager -- 5.2.3 Case study setup -- 5.2.4 How to check installed software versions -- 5.3 Validation checklist -- 5.3.1 WebSphere Application Server and IBM HTTP Server -- 5.3.2 LWWCM -- 5.3.3 DB2 and NSE -- 5.3.4 IBM Content Manager and Information Integration for Content -- 5.4 Problem determination and troubleshooting -- 5.4.1 General hints and tips -- 5.4.2 WebSphere Application Server -- 5.4.3 DB2 and NSE -- 5.4.4 IBM Content Manager and Information Integration for Content -- 5.4.5 LWWCM -- Chapter 6. …”
    Libro electrónico
  2. 2922
    por Ebel, Nadin
    Publicado 2021
    Tabla de Contenidos: “…7.1 Practices als Teil des Service-Wertsystems -- 7.1.1 Practices in vier Dimensionen -- 7.1.2 Einteilung der Practices -- 7.2 General Management Practices -- 7.2.1 Architecture Management -- 7.2.2 Continual Improvement -- 7.2.3 Information Security Management -- 7.2.4 Knowledge Management -- 7.2.5 Measurement and Reporting -- 7.2.5.1 Einfluss von Kennzahlen auf das Verhalten -- 7.2.5.2 Berichtswesen -- 7.2.6 Organizational Change Management -- 7.2.6.1 Aktivitäten des organisatorischen Veränderungsmanagements -- 7.2.7 Portfolio Management -- 7.2.8 Project Management -- 7.2.9 Relationship Management -- 7.2.10 Risk Management -- 7.2.11 Service Financial Management -- 7.2.12 Strategy Management -- 7.2.13 Supplier Management -- 7.2.13.1 Sourcing, Lieferantenstrategie und -beziehungen -- 7.2.13.2 Bewertung und Auswahl von Lieferanten -- 7.2.13.3 Aktivitäten -- 7.2.13.4 Service-Integration -- 7.2.14 Workforce and Talent Management -- 7.2.14.1 Aktivitäten -- 7.3 Service Management Practices -- 7.3.1 Availability Management -- 7.3.2 Business Analysis -- 7.3.3 Capacity and Performance Management -- 7.3.4 Change Enablement -- 7.3.5 Incident Management -- 7.3.6 IT Asset Management -- 7.3.7 Monitoring and Event Management -- 7.3.8 Problem Management -- 7.3.8.1 Problemidentifizierungsphase -- 7.3.8.2 Problem-Control-Phase -- 7.3.8.3 Error-Control-Phase -- 7.3.8.4 Schnittstellen -- 7.3.9 Release Management -- 7.3.10 Service Catalogue Management -- 7.3.11 Service Configuration Management -- 7.3.12 Service Continuity Management -- 7.3.13 Service Design -- 7.3.13.1 Design Thinking -- 7.3.13.2 Customer und User Experience -- 7.3.14 Service Desk -- 7.3.15 Service Level Management -- 7.3.15.1 Service Level Agreements -- 7.3.16 Service Request Management -- 7.3.17 Service Validation and Testing -- 7.3.17.1 Service Validation -- 7.3.17.2 Testing…”
    Libro electrónico
  3. 2923
    Publicado 2018
    Tabla de Contenidos: “…-- 4.5 Placing an order on the book app -- 4.6 Adding extra features to your business logic handling -- 4.6.1 Validating the data that you write to the database -- 4.6.2 Using transactions to daisy-chain a sequence of business logic code -- Summary -- 5 Using EF Core in ASP.NET Core web applications -- 5.1 Introducing ASP.NET Core -- 5.2 Understanding the architecture of the book app -- 5.3 Understanding dependency injection -- 5.3.1 Why you need to learn about DI in ASP.NET Core -- 5.3.2 A basic example of dependency injection in ASP.NET Core -- 5.3.3 The lifetime of a service created by DI -- 5.4 Making the application's DbContext available via DI -- 5.4.1 Providing information on the database's location…”
    Libro electrónico
  4. 2924
    por Ganegedara, Thushan
    Publicado 2022
    Tabla de Contenidos: “…Exploring and processing text -- 9.2 Getting text ready for the model -- 9.2.1 Splitting training/validation and testing data -- 9.2.2 Analyze the vocabulary -- 9.2.3 Analyzing the sequence length -- 9.2.4 Text to words and then to numbers with Keras -- 9.3 Defining an end-to-end NLP pipeline with TensorFlow -- 9.4 Happy reviews mean happy customers: Sentiment analysis -- 9.4.1 LSTM Networks -- 9.4.2 Defining the final model -- 9.5 Training and evaluating the model…”
    Libro electrónico
  5. 2925
    Publicado 2024
    Tabla de Contenidos: “…11.2.2 Introduce Machine Learning and Its Key Concepts, Including Algorithms, Training, and Validation…”
    Libro electrónico
  6. 2926
    Publicado 2019
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- Acknowledgments -- Part I Examples in Discrete Time -- Chapter 1 Borel's Law of Large Numbers -- 1.1 A Protocol for Testing Forecasts -- 1.2 A Game‐Theoretic Generalization of Borel's Theorem -- 1.3 Binary Outcomes -- 1.4 Slackenings and Supermartingales -- 1.5 Calibration -- 1.6 The Computation of Strategies -- 1.7 Exercises -- 1.8 Context -- Chapter 2 Bernoulli's and De Moivre's Theorems -- 2.1 Game‐Theoretic Expected value and Probability -- 2.2 Bernoulli's Theorem for Bounded Forecasting -- 2.3 A Central Limit Theorem -- 2.4 Global Upper Expected Values for Bounded Forecasting -- 2.5 Exercises -- 2.6 Context -- Chapter 3 Some Basic Supermartingales -- 3.1 Kolmogorov's Martingale -- 3.2 Doléans's Supermartingale -- 3.3 Hoeffding's Supermartingale -- 3.4 Bernstein's Supermartingale -- 3.5 Exercises -- 3.6 Context -- Chapter 4 Kolmogorov's Law of Large Numbers -- 4.1 Stating Kolmogorov's Law -- 4.2 Supermartingale Convergence Theorem -- 4.3 How Skeptic Forces Convergence -- 4.4 How Reality Forces Divergence -- 4.5 Forcing Games -- 4.6 Exercises -- 4.7 Context -- Chapter 5 The Law of the Iterated Logarithm -- 5.1 Validity of the Iterated‐Logarithm Bound -- 5.2 Sharpness of the Iterated‐Logarithm Bound -- 5.3 Additional Recent Game‐Theoretic Results -- 5.4 Connections with Large Deviation Inequalities -- 5.5 Exercises -- 5.6 Context -- Part II Abstract Theory in Discrete Time -- Chapter 6 Betting on a Single Outcome -- 6.1 Upper and Lower Expectations -- 6.2 Upper and Lower Probabilities -- 6.3 Upper Expectations with Smaller Domains -- 6.4 Offers -- 6.5 Dropping the Continuity Axiom -- 6.6 Exercises -- 6.7 Context -- Chapter 7 Abstract Testing Protocols -- 7.1 Terminology and Notation -- 7.2 Supermartingales -- 7.3 Global Upper Expected Values…”
    Libro electrónico
  7. 2927
    Publicado 2018
    Tabla de Contenidos: “…-- Logging implementations - which one to pick -- Logging facade - the good bad idea -- Logging frameworks -- Log4j -- Log4j2 -- Logback -- JUL -- Choosing an implementation -- Summary -- Chapter 9: Benchmarking Your Application -- Benchmarking - validating your application against your SLA -- Benchmark, benchmark, benchmark -- Preparing your benchmark -- Defining the benchmark criteria -- Defining the metric -- Defining acceptance criteria -- Defining the scenario -- Defining the environment -- The machines -- The network -- Databases and remote services -- The server -- Automatize your scenarios -- JMeter -- Gatling -- Other tools -- Ensuring you have support -- Time boxing your optimization benchmark -- Installing and resetting procedures -- Benchmark iterations -- Iterating -- Changing a single setting at a time -- Resetting any state between runs -- Warming up your system -- After your benchmark…”
    Libro electrónico
  8. 2928
    Publicado 2018
    Tabla de Contenidos: “…-- Fixing SQL injection attacks -- Cross-site request forgery -- Authentication and authorization in action -- Basic authentication, token-based authorization, and other authentications -- Basic authentication -- The security concerns of basic authentication -- Token-based authorization -- Other authentication methods -- Securing services using annotations -- Validations -- Securing context -- Data encryption and storing sensitive data -- Sensitive data -- Summary -- Chapter 9: Scaling RESTful Services (Performance of Web Services) -- Clustering -- Load balancing -- How does it work? …”
    Libro electrónico
  9. 2929
    por Cagan, Marty
    Publicado 2020
    Tabla de Contenidos: “…Decisions -- Problem Solving -- Organizing Effective Meetings -- Chapter 23 Ethics -- Chapter 24 Happiness -- Meaningful Work -- Personal Relationship -- Personal Recognition -- Work Habits -- Modeling Good Behaviors -- Career Planning -- Chapter 25 Leader Profile: Lisa Kavanaugh -- Path to Leadership -- Leadership in Action -- Part III Staffing -- Chapter 26 Competence and Character -- Competence -- Character -- Chapter 27 Recruiting -- Chapter 28 Interviewing -- Chapter 29 Hiring -- Chapter 30 Remote Employees -- Artifacts -- Trust -- Time -- Chapter 31 Onboarding -- Chapter 32 New Employee Bootcamp -- Chapter 33 Performance Reviews -- Chapter 34 Terminating -- Chapter 35 Promoting -- Chapter 36 Leader Profile: April Underwood -- Path to Leadership -- Leadership in Action -- Part IV Product Vision and Principles -- Chapter 37 Creating a Compelling Vision -- Customer‐Centric -- North Star -- Scope and Timeframe -- Leveraging Industry Trends -- Chapter 38 Sharing the Product Vision -- Communicating the Product Vision -- Validating the Product Vision -- Product Vision as a Recruiting Tool -- Product Vision as an Evangelism Tool -- Chapter 39 Product Principles and Ethics -- Chapter 40 Leader Profile: Audrey Crane -- Path to Leadership -- Leadership in Action -- Part V Team Topology -- Chapter 41 Optimizing for Empowerment -- Ownership -- Autonomy -- Alignment -- Chapter 42 Team Types -- Platform Teams -- Experience Teams -- Chapter 43 Empowering Platform Teams -- Shared Team Objectives -- Platform‐as‐a‐Product Objectives -- Chapter 44 Empowering Experience Teams -- Media Product -- E‐Commerce Product -- Enterprise Product -- Marketplace Product -- Customer‐Enabling Product -- Chapter 45 Topology and Proximity -- Optimizing for the Product Team -- Chapter 46 Topology Evolution -- Evolving a Topology -- Topology Warning Signs…”
    Libro electrónico
  10. 2930
    Publicado 2014
    Tabla de Contenidos: “…Encoding Secret Messages with Steganography -- Background briefing - handling file formats -- Working with the OS filesystem -- glob -- os -- Processing simple text files -- Working with ZIP files -- Working with JSON files -- Working with CSV files -- JPEG and PNG graphics - pixels and metadata -- Using the Pillow library -- Adding the required supporting libraries -- GNU/Linux secrets -- Mac OS X secrets -- Windows secrets -- Installing and confirming Pillow -- Decoding and encoding image data -- Manipulating images - resizing and thumbnails -- Manipulating images - cropping -- Manipulating images - enhancing -- Manipulating images - filtering -- Manipulating images - ImageOps -- Some approaches to steganography -- Getting the red-channel data -- Extracting bytes from Unicode characters -- Manipulating bits and bytes -- Assembling the bits -- Encoding the message -- Decoding a message -- Detecting and preventing tampering -- Using hash totals to validate a file -- Using a key with a digest -- Solving problems - encrypting a message -- Unpacking a message -- Summary -- 4. …”
    Libro electrónico
  11. 2931
    Publicado 2017
    Tabla de Contenidos: “…-- Specify and Model Requirements -- Verify Requirements -- Validate Requirements -- Define Requirements Architecture -- Define Design Options -- Analyze Potential Value and Recommend Solution…”
    Libro electrónico
  12. 2932
    Publicado 2017
    Tabla de Contenidos: “…2.3.5 Product Quality Review -- 3 Organization and Personnel -- 3.1 Responsibilities of Various Departments -- 3.1.1 Production Department -- 3.1.2 QC Department -- 3.1.3 Shared Responsibilities Between the QC Head and Production Department Head -- 3.1.4 Personal Responsibilities of Employees in Manufacturing Premises -- 4 Building and Facilities -- 4.1 Storage Area -- 4.2 QC Area -- 4.3 Production Area -- 4.4 Ancillary Area -- 4.5 Lighting -- 5 Heating, Ventilation, and Air Conditioning (HVAC) System -- 5.1 Importance of HVAC -- 5.2 HVAC System -- 5.3 Cleanroom Classification -- 5.4 Cleanroom Separation/Segregation -- 5.5 Personnel Training -- 5.6 Sanitation and Personal Hygiene -- 5.7 Gowning/Change Room Control and Configuration -- 6 Validation of HVAC System -- 6.1 Airflow Pattern -- 6.2 Airflow Velocity and Changes per Hour -- 6.3 Filter Leak Test -- 6.4 Particle Count Test -- 6.5 Viable Monitoring -- 6.5.1 Active Air Sampling -- 6.5.2 Passive Air Sampling -- 6.5.3 Surface Monitoring -- Contact plate method -- Swabbing method -- 6.6 Filter Integrity Test (DOP/PAO Test) -- 6.7 Pressure Difference -- 6.8 Recovery Test -- 6.9 Temperature and Humidity Uniformity Test -- 6.10 Fresh Air Determination -- 6.11 Acceptance Criteria for HVAC System -- 7 Summary -- References -- 4 The Role of Standards in Cleaning and Contamination Control -- 1 Scope -- 2 Why There Are Standards? …”
    Libro electrónico
  13. 2933
    Publicado 2019
    Tabla de Contenidos: “…-- How to Write a Shell Script -- More Formatting Tricks -- Summing Up -- 25 STARTING A PROJECT -- First Stage: Minimal Document -- Second Stage: Adding a Little Data -- Variables and Constants -- Here Documents -- Summing Up -- 26 TOP-DOWN DESIGN -- Shell Functions -- Local Variables -- Keep Scripts Running -- Summing Up -- 27 FLOW CONTROL: BRANCHING WITH IF -- if Statements -- Exit Status -- Using test -- A More Modern Version of test -- (( ))-Designed for Integers -- Combining Expressions -- Control Operators: Another Way to Branch -- Summing Up -- 28 READING KEYBOARD INPUT -- read-Read Values from Standard Input -- Validating Input -- Menus -- Summing Up -- Extra Credit -- 29 FLOW CONTROL: LOOPING WITH WHILE/UNTIL -- Looping -- Breaking Out of a Loop -- Reading Files with Loops -- Summing Up -- 30 TROUBLESHOOTING -- Syntactic Errors -- Logical Errors -- Testing -- Debugging -- Summing Up -- 31 FLOW CONTROL: BRANCHING WITH CASE -- The case Command -- Summing Up -- 32 POSITIONAL PARAMETERS -- Accessing the Command Line -- Handling Positional Parameters en Masse -- A More Complete Application -- Summing Up -- 33 FLOW CONTROL: LOOPING WITH FOR -- for: Traditional Shell Form…”
    Libro electrónico
  14. 2934
    Publicado 2018
    Tabla de Contenidos: “…-- Summary -- Chapter 3: Casting Votes on Twitter -- Setting up the environment -- Creating a Twitter application -- Adding the configuration file -- Performing authentication -- Creating the Flask application -- Creating the application routes -- Building the Twitter voting application -- Enhancing our code -- Summary -- Chapter 4: Exchange Rates and the Currency Conversion Tool -- Setting up the environment -- Creating the API wrapper -- Adding the database helper class -- Creating the command line parser -- Creating the currency enumeration -- Creating the command line parser -- Basic validation -- Adding the application's entry point…”
    Libro electrónico
  15. 2935
    Publicado 2022
    Tabla de Contenidos: “…1 Introduction 1 -- 1.1 Defining the scope of this work . 4 -- 2 Fundamentals and previous work 5 -- 2.1 Theoretical principles behind spatial fluctuations . 5 -- 2.1.1 Amplitude distribution due to changes in position 5 -- 2.1.2 The impulse response and other room acoustical quantities 10 -- 2.1.3 Variance of the reverberation time over space . 13 -- 2.1.4 Reference to the research question . 14 -- 2.2 Acoustical measurements in auditoria . 15 -- 2.2.1 Principles and established practice . 15 -- 2.2.2 Measurement uncertainty in architectural acoustics 18 -- 2.2.3 Observations in other fields of acoustics 21 -- 2.3 Uncertainties in measurements . 23 -- 2.3.1 General metrological terms . 23 -- 2.3.2 The guide to the expression of uncertainty -- in measurement 24 -- 2.4 The perception of sound in auditoria 33 -- 3 General Methodology 37 -- 4 Uncertainty of room impulse response measurements 41 -- 4.1 Introduction 41 -- 4.2 Uncertainty budget for room impulse response measurements 42 -- 4.3 Discussion . 45 -- 4.4 Conclusions 45 -- 5 Design of a measurement array 47 -- 5.1 Introduction 47 -- 5.2 Methodology . 48 -- 5.2.1 Requirements for the measurement setup . 48 -- 5.2.2 Design of a measurement device 52 -- 5.2.3 Acoustical measurements 53 -- 5.2.4 Data analysis . 56 -- 5.3 Results . 57 -- 5.3.1 Visualization of sound fields . 57 -- 5.3.2 Data for the uncertainty discussions 60 -- 5.4 Discussion . 60 -- 5.5 Conclusions 62 -- 6 Uncertain input quantities of the measurement function 65 -- 6.1 Introduction 65 -- 6.2 Uncertainty of room acoustical quantities . 66 -- 6.2.1 Methodology . 66 -- 6.2.2 Results 74 -- 6.3 Uncertainty of the sampling location 82 -- 6.3.1 Introduction . 82 -- 6.3.2 Initial methodology . 84 -- 6.3.3 Results 87 -- 6.3.4 Revised methodology . 88 -- 6.3.5 Results 88 -- 6.4 Discussion . 90 -- 6.5 Conclusions 91 -- 7 Measurement function 93 -- 7.1 Introduction 93 -- 7.2 Establishing the measurement function . 94 -- 7.2.1 Methodology . 94 -- 7.2.2 Results and discussion 99 -- 7.3 Compensating the effect of a finite sampling area . 103 -- 7.3.1 Methodology . 103 -- 7.3.2 Results and discussion 104 -- 7.4 Reducing the complexity . 106 -- 7.4.1 Methodology . 106 -- 7.4.2 Results 107 -- 7.5 Discussion . 108 -- 7.6 Conclusions 110 -- 8 Validity of the measurement function 111 -- 8.1 Introduction 111 -- 8.2 Methodology . 111 -- 8.2.1 Repeatability . 112 -- 8.2.2 Reproducibility 112 -- 8.3 Results . 117 -- 8.3.1 Repeatability . 119 -- 8.3.2 Reproducibility 121 -- 8.4 Discussion . 139 -- 8.5 Conclusions 141 -- 9 How accurately must a measurement position be defined? …”
    Libro electrónico
  16. 2936
    Publicado 2023
    Tabla de Contenidos: “…4.1.1 Data at rest vs. data in motion -- 4.1.2 Plain secrets -- 4.1.3 Encrypting secrets -- 4.1.4 Creating the secret -- 4.2 Key management server -- 4.2.1 Kubernetes and KMS provider -- 4.2.2 Creating the secret -- Summary -- 5 HashiCorp Vault and Kubernetes -- 5.1 Managing application secrets using HashiCorp Vault -- 5.1.1 Deploying Vault to Kubernetes -- 5.1.2 Deploying an application to access Vault -- 5.2 Kubernetes auth method -- 5.2.1 Configuring Kubernetes auth -- 5.2.2 Testing and validating Kubernetes auth -- 5.3 The Vault Agent Injector -- 5.3.1 Configurations to support Kubernetes Vault Agent injection -- Summary -- 6 Accessing cloud secrets stores -- 6.1 The Container Storage Interface and Secrets Store CSI Driver -- 6.1.1 Container Storage Interface -- 6.1.2 Container Storage Interface and Kubernetes -- 6.1.3 CSI and secrets -- 6.1.4 Installing prerequisites -- 6.1.5 Installing the Secrets Store CSI Driver -- 6.1.6 Consuming HashiCorp Vault secrets via the Secrets Store CSI Driver and the HashiCorp Vault provider -- 6.2 Synchronizing CSI secrets as Kubernetes Secrets -- 6.2.1 Preparing the namespace -- 6.2.2 Defining a SecretProviderClass resource with secretObjects -- 6.3 Autorotating secrets to improve security posture -- 6.3.1 Preparing the namespace -- 6.3.2 Deploying the Pod with a secret mounted -- 6.3.3 Updating the secret -- 6.4 Consuming secrets from cloud secrets stores -- 6.4.1 Azure Key Vault -- 6.4.2 GCP Secret Manager -- 6.4.3 AWS Secrets Manager -- Summary -- Part 3. …”
    Libro electrónico
  17. 2937
    Publicado 2023
    Tabla de Contenidos: “…The purpose of the test factor -- 4.8. Validation of the functions -- 4.9. Environmental stress screening and HA-ESS -- 4.10. …”
    Libro electrónico
  18. 2938
    Publicado 2020
    Tabla de Contenidos: “…- Clinical and Statistical Considerations when Assessing Oxygen Levels in Tumors: Illustrative Results from Clinical EPR Oximetry Studies -- Fatal Alliance of Hypoxia-/HIF-1α-driven Microenvironmental Traits Promoting Cancer Progression -- Quantification of Tumor Oxygenation based on FMISO PET: Influence of Location and Oxygen Level of the Well-Oxygenated Reference Region -- Pathways of Oxygen Diffusion in Cells and Tissues: Hydrophobic channeling via networked lipids -- Part III Muscle Oxygenation and Sports Medicine -- Effect of Exercise Duration on Post-exercise Persistence of Oxyhemoglobin Changes in the Premotor Cortex: A Near-infrared Spectroscopy Study in Moderate-intensity Cycling Exercise -- Relationship Between Muscle Oxygen Saturation and Exercise Load in Patients with Malignant Hematopoietic Disease -- Comparison of the Effects of Continuous and Intermittent Exercise on Cerebral Oxygenation and Cognitive Function -- Relationship between Exercise Capacity and Muscle O2Hb saturation in Patients before Hematopoietic Stem-Cell Transplantation -- Differences in Muscle O2 Dynamics During Treadmill Exercise Between Aerobic Capacity-matched Overweight and Normal-weight Adults -- Cerebral Oxygenation Dynamics of the Prefrontal Cortex and Motor-Related Area During Cardiopulmonary Exercise Test: A Near-infrared Spectroscopy Study -- Reduced Optical Path Length in the Vastus Lateralis during Ramp Cycling Exercise -- Improvements in Skeletal Muscle can be Detected using Broadband NIRS in First-Time Marathon Runners -- Comparison of Two NIRS Tissue Oximeters (Moxy and Nimo) for Non-invasive Assessment of Muscle Oxygenation and Perfusion -- Part IV Cell Metabolism and Tissue Oxygenation -- Effects of Pulsed Magnetic Field on the Hemolysis of Erythrocytes Exposed to Oxidative Stress -- Role of Microtubule-associated Factors in HIF1α Nuclear Translocation -- Extracellular Acidosis Regulates the Expression of Inflammatory Mediators in Rat Epithelial Cells -- Part V Methodology of O2 Measurements -- Reducing False Alarm Rates in Neonatal Intensive Care: A New Machine Learning Approach -- Development of an IoT-based Monitoring System for Healthcare: A Preliminary Study -- Developing a Model to Simulate the Effect of Hypothermia on Cerebral Blood Flow and Metabolism -- Validation and Comparison of Monte Carlo and Finite Element Method in Forward Modeling for Near Infrared Optical Tomography -- Development of a Cuff-less Blood Pressure Monitoring System and its Application -- Usefulness of a New Device to Monitor Cerebral Blood Oxygenation using NIRS during Cardiopulmonary Resuscitation in Patients with Cardiac Arrest: A Pilot Study -- Application of Peripheral Near Infrared Spectroscopy to Assess Risk Factors in Patient with Coronary Artery Disease: Part 1 -- Broadband NIRS Cerebral Evaluation of the Hemodynamic and Oxidative State of Cytochrome-c-oxidase Responses to +Gz Acceleration in Healthy Volunteers -- Time-resolved NIROT ‘Pioneer’ System for Imaging Oxygenation of the Preterm Brain: Preliminary Results -- Application of Peripheral Near Infrared Spectroscopy to Assess Risk Factors in Patient with Coronary Artery Disease: Part 2 -- Optimization of Band Selection in Multispectral and Narrow-Band Imaging: An Analytical Approach -- Fabrication and Optical Characterization of Gelatin-Based Phantoms for Tissue Oximetry -- Two-Photon Autofluorescence Imaging of Fixed Tissues: Feasibility and Potential Values for Biomedical Applications -- Part VI Special Topics -- Acute Anemia Induces Erythropoiesis in Rat Organ Surface Primo-Vascular Tissue -- Analysis and Differential Expression of Primo Genes using RNA-Seq and qRT-PCR Experiments -- Acupuncture Inhibits the Increase in Alpha-synuclein in Substantia nigra in an MPTP- induced Parkinsonism Mouse Model -- On the Biomarkers of Alzheimer’s Disease -- Effective Murine Model Induction for Niche Study in Immune Cells against Leukemia -- Index…”
    Libro electrónico
  19. 2939
    Publicado 2018
    Tabla de Contenidos: “…Fuzzing web requests using the Intruder tab -- Intruder attack types -- Practical examples -- Installing third-party apps using Burp Extender -- Summary -- Chapter 5: Understanding Web Application Vulnerabilities -- File Inclusion -- Local File Inclusion -- Remote File Inclusion -- Cross-Site Scripting -- Reflected XSS -- Stored XSS -- Exploiting stored XSS using the header -- DOM XSS -- JavaScript validation -- Cross-Site Request Forgery -- Step 01 - victim -- Step 02 - attacker -- Results -- SQL Injection -- Authentication bypass -- Extracting the data from the database -- Error-based SQLi enumeration -- Blind SQLi -- Command Injection -- OWASP Top 10 -- 1 - Injection -- 2 - Broken Authentication -- 3 - Sensitive Data -- 4 - XML External Entities -- 5 - Broken Access Control -- 6 - Security Misconfiguration -- 7 - Cross-Site Scripting (XSS) -- 8 - Insecure Deserialization -- 9 - Using Components with Known Vulnerabilities -- 10 - Insufficient Logging &amp -- Monitoring -- Summary -- Chapter 6: Application Security Pre-Engagement -- Introduction -- The first meeting -- The day of the meeting with the client -- Non-Disclosure Agreement -- Kick-off meeting -- Time and cost estimation -- Statement of work -- Penetration Test Agreement -- External factors -- Summary -- Chapter 7: Application Threat Modeling -- Software development life cycle -- Application Threat Modeling at a glance -- Application Threat Modeling in real life -- Application Threat Modeling document parts -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Test strategies -- Security risks -- Practical example -- xBlog Threat Modeling -- Scope -- Threat Modeling -- Project information -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Threats list -- Spoofing - authentication -- Tampering - integrity…”
    Libro electrónico
  20. 2940
    Publicado 2018
    Tabla de Contenidos: “…. -- See also -- Writing custom validators for Mongoose's schemas -- Getting ready -- How to do it... -- See also -- Building a RESTful API to manage users with ExpressJS and Mongoose -- Getting ready -- How to do it... -- Let's test it... -- How it works... -- See also -- Chapter 4: Real-Time Communication with Socket.IO and ExpressJS -- Technical requirements -- Introduction -- Understanding Node.js events -- Getting ready -- How to do it... -- How it works... -- There's more... -- Understanding Socket.IO events -- The Socket.IO server events -- Socket.IO client events -- Getting ready -- How to do it... -- How it works... -- Working with Socket.IO namespaces -- Getting ready -- How to do it... -- Let's test it... -- How it works... -- There's more... -- io.Manager -- Defining and joining Socket.IO rooms -- Getting ready -- How to do it... -- There's more... -- Writing middleware for Socket.IO -- Getting ready -- How to do it... -- Let's test it... -- Integrating Socket.IO with ExpressJS -- Getting ready -- How to do it…”
    Libro electrónico