Mostrando 3,081 - 3,100 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.58s Limitar resultados
  1. 3081
    Publicado 2022
    Tabla de Contenidos: “…Fire prevention, detection, and suppression -- Power -- Chapter 6 Communication and Network Security -- Assess and Implement Secure Design Principles in Network Architectures -- OSI and TCP/IP models -- The OSI Reference Model -- The TCP/IP Model -- Secure Network Components -- Operation of hardware -- Transmission media -- Network access control devices -- Endpoint security -- Implement Secure Communication Channels According to Design -- Voice -- Multimedia collaboration -- Remote access -- Data communications -- Virtualized networks -- Third-party connectivity -- Chapter 7 Identity and Access Management -- Control Physical and Logical Access to Assets -- Information -- Systems and devices -- Facilities -- Applications -- Manage Identification and Authentication of People, Devices, and Services -- Identity management implementation -- Single-/multifactor authentication -- Accountability -- Session management -- Registration, proofing, and establishment of identity -- Federated identity management -- Credential management systems -- Single sign-on -- Just-in-Time -- Federated Identity with a Third-Party Service -- On-premises -- Cloud -- Hybrid -- Implement and Manage Authorization Mechanisms -- Role-based access control -- Rule-based access control -- Mandatory access control -- Discretionary access control -- Attribute-based access control -- Risk-based access control -- Manage the Identity and Access Provisioning Life Cycle -- Implement Authentication Systems -- OpenID Connect/Open Authorization -- Security Assertion Markup Language -- Kerberos -- RADIUS and TACACS+ -- Chapter 8 Security Assessment and Testing -- Design and Validate Assessment, Test, and Audit Strategies -- Conduct Security Control Testing -- Vulnerability assessment -- Penetration testing -- Log reviews -- Synthetic transactions -- Code review and testing -- Misuse case testing…”
    Libro electrónico
  2. 3082
    Publicado 2024
    Tabla de Contenidos: “…Data-informed approach versus data-driven approach -- The symphony of growth -- Decoding experiment analysis and iteration for ongoing growth -- Analyzing experiment results - the pillars of informed decision-making -- Embracing a growth mindset - embracing failure as an ally -- The symphony of evolution -- Summary -- Questions -- Answers -- Chapter 8: Define, Monitor, and Act on Your Performance Metrics -- The strategic importance of performance metrics -- Mitigate risk -- Focus innovation on validated user needs -- Increase team alignment -- Speed up iteration and adaptation -- Optimize user journeys end-to-end -- Fuel data-driven decision-making -- Defining the right performance metrics -- Connecting metrics to business objectives -- Monitoring and analyzing performance metrics -- Using performance metrics to drive growth -- Analyzing experiment results and iterating on product features and marketing strategies -- The power of experimentation -- Setting the stage for experiments -- Conducting experiments -- The importance of rigorous analysis -- Iterating and implementing changes -- Establishing a performance-driven culture -- Why does a metrics culture matter? …”
    Libro electrónico
  3. 3083
    Publicado 2024
    Tabla de Contenidos: “…Hybrid dedicated/outsourced teams -- Patterns to avoid during implementation -- Selecting an implementation pattern -- Summary -- Chapter 12: Measuring Progress and Outcomes -- Measures of progress and outcomes -- Why measures of progress and outcomes are important -- Linking measures to capability maturity -- Examples of outcome metrics -- Examples of progress metrics -- Selecting measures -- Leadership and teams for selecting outcome and progress metrics -- Practices for designing metrics and dashboards -- Designing an outcome and progress metrics -- Architectures for dashboards displaying metrics -- Sustaining measures of progress and outcomes -- Evaluating and deprecating metrics -- Introducing new metrics -- Validating metric implementations -- Summary -- Part 4: Exploring Future Trends and Continuous Learning -- Chapter 13: Emerging Trends -- Macro trends in DevOps, DevSecOps, and SRE -- Testability and observability trends -- Platform engineering trends -- VSM trends -- AI/ML trends -- Summary -- Chapter 14: Exploring Continuous Learning and Improvement -- The Third Way of DevOps -- Continuous improvement in DevOps -- Learning in DevOps -- Continuous testing, quality, and security -- Learning from sharing -- Building a culture of open communication -- Sharing best practices and tools -- Cross-team collaboration and external engagement -- Leveraging feedback for continuous improvement -- Learning from outreach -- The role of external engagement in continuous improvement -- The benefits of industry collaboration -- Implementing outreach learnings in DevOps practices -- Learning from experimentation -- The importance of experimentation in DevOps -- Conducting safe experiments in DevOps -- Learning from experimentation outcomes -- Learning from failure -- Embracing a no-blame culture -- Practical steps to analyze failures…”
    Libro electrónico
  4. 3084
    Publicado 2015
    Tabla de Contenidos: “…Active Server Pages -- Benefi ts of ASP.NET Web Pages -- Special Website Files -- Development -- Controls: The Toolbox -- Building Websites -- Creating a Web Form for Client- and Server-Side Processing -- Website Locations with VS 2015 -- Performing Data Entry and Validation -- Using the GridView to Build a Data-Driven Web Form -- Summary -- CHAPTER 15: DEPLOYING YOUR APPLICATION -- What Is Deployment? …”
    Libro electrónico
  5. 3085
    por Hall, Vincent Austin
    Publicado 2024
    Tabla de Contenidos: “…India and Canada - human author's skill and judgment -- Australia - to the person making the necessary arrangements -- Japan - copyright requires human authorship -- South Korea -- Brazil - human authorship required -- Indonesia - human authorship needed -- Evolving legal landscape -- Precedent -- Addressing liability and responsibility for LLM-generated code -- Licensing -- Attribution and credit -- Quality and reliability -- Ethical considerations -- Product liability -- Use case restrictions -- Security concerns -- Transparency and explainability -- Third-party dependencies -- Use good communication to avoid legal action -- Code of ethics when using AI -- Accountability and redress mechanisms -- Examining legal frameworks governing the use of LLMs in coding -- UN resolution on AI -- EU - the European Parliament adopts the "AI Act" -- California AI kill switch bill proposed -- AI Acts of other countries -- Other regulations -- Possible future of the regulation of AI-generated code -- Key points moving forward -- Questions that should still be answered -- Keep up to date -- Summary -- Bibliography -- Chapter 7: Security Considerations and Measures -- Technical requirements -- Understanding the security risks of LLMs -- Data privacy and confidentiality -- Security risks in LLM-generated code -- Implementing security measures for LLM-powered coding -- Input sanitization and validation -- Secure integration patterns -- Monitoring and logging -- Version control and traceability -- Encryption and data protection -- Regular security assessments -- Incident response planning -- Bonus - training -- Who can help here? …”
    Libro electrónico
  6. 3086
    Publicado 2017
    Tabla de Contenidos: “…Building a log file -- Summary -- Chapter 11: Error Handling in Ruby -- Error handling tutorial -- Error handling - the best practices -- Developing a custom error logger in Ruby -- Summary -- Chapter 12: Regular Expressions in Ruby -- Regular expression code example -- Regex code example -- How to validate an IP address using regular expressions -- How to develop a wheel of fortune game -- Summary -- Chapter 13: Searching with grep in Ruby -- How to use grep in Ruby -- How to use grep instead of the select and map methods -- Summary -- Chapter 14: Ruby Gems -- Introduction to Ruby gems -- How to research Ruby gems -- How to research gems -- Summary -- Chapter 15: Ruby Metaprogramming -- Metaprogramming introduction -- How to integrate metaprogramming techniques into a custom class -- How to use metaprogramming for opening and customizing the String class -- How Rails use metaprogramming for the find_by method -- Utilizing metaprogramming with method_missing to create methods on the fly -- Why do we need to call super? …”
    Libro electrónico
  7. 3087
    Publicado 2017
    Tabla de Contenidos: “…-- Lazy generator pipelines -- Laziness and the infinite -- Generating the Lucas series -- Generator expressions -- [Generator objects only run once] -- Generator objects only run once -- Iteration without memory -- Optional parentheses -- Using an if-clause in generator expressions -- Batteries included iteration tools -- Introducing itertools -- Sequences of booleans -- Merging sequences with zip -- More than two sequences with zip() -- Lazily concatenating sequences with chain() -- Pulling it all together -- Summary -- Generators -- Iteration tools -- Chapter 8: Defining new types with classes -- Defining classes -- Instance methods -- Instance initializers -- A lack of access modifiers -- Validation and invariants -- Adding a second class -- Collaborating classes -- Moment of zen -- Booking seats -- Allocating seats to passengers -- Naming methods for implementation details -- Implementing relocate_passenger() -- Counting available seats -- Sometimes the only object you need is a function -- Making Flight create boarding cards -- Polymorphism and duck-typing -- Refactoring Aircraft…”
    Libro electrónico
  8. 3088
    Publicado 2017
    Tabla de Contenidos:
    Libro electrónico
  9. 3089
    Publicado 2017
    Tabla de Contenidos: “…. -- How it works... -- Validating input for Go structs and user inputs -- Getting ready -- How to do it... -- How it works... -- Rendering and content negotiation -- Getting ready -- How to do it... -- How it works... -- Implementing and using middleware -- Getting ready -- How to do it... -- How it works... -- Building a reverse proxy application -- Getting ready -- How to do it... -- How it works... -- Exporting GRPC as a JSON API -- Getting ready -- How to do it... -- How it works... -- Chapter 8: Testing -- Introduction -- Mocking using the standard library -- Getting ready -- How to do it... -- How it works... -- Using the Mockgen package -- Getting ready -- How to do it... -- How it works... -- Using table-driven tests to improve coverage -- Getting ready -- How to do it... -- How it works... -- Using third-party testing tools -- Getting ready -- How to do it... -- How it works... -- Practical fuzzing -- Getting ready -- How to do it... -- How it works…”
    Libro electrónico
  10. 3090
    Publicado 2010
    Tabla de Contenidos: “…Construct Scannable Paragraphs, Headings, and Lists -- Write Clearly and Simply -- Keep Paragraphs Short -- Eliminate Unnecessary Material -- Be Careful When Condensing Text -- Write for the Reader -- Make Decisions for the Reader -- Anticipate the Reader's Questions -- Avoid Style That Could Offend the Reader -- Avoid Humor -- Avoid Sexist Language -- Do Not Talk Down to the Reader -- Common Writing Problems to Avoid -- Anthropomorphisms -- Idioms and Colloquialisms -- Phrasal Verbs -- Commands as Verbs -- Redundancies -- 4 Structuring Information -- Organization Schemes -- Organize by Hierarchy -- Organize by Inverted Pyramid -- Organize by Table -- Organize by Flow Diagram -- Organize by Task Map -- Writing Short, Self-Contained Sections -- Divide Text Into Self-Contained Topics -- Include Transitions -- 5 Online Writing Style -- About These Guidelines -- Solving Online Writing Problems -- Creating an Effective Online Document Structure -- Writing Online Topics -- Constructing Scannable Text in Online Documents -- Preserving Context in Online Documents -- Make Few Assumptions About Reading Order -- Offer Contextual Cues -- Give the Precise Location of Related Information -- 6 Constructing Links -- About These Guidelines -- Where to Place Links -- General Linking Strategies -- Avoid Overlinking -- Prevent Reader Disorientation -- Include Links That Answer the Reader's Questions -- Use Links to Make Text Seem Shorter -- Provide Links in a List -- Place Links at the End of a Topic -- Provide URLs Only When Needed -- Test the Validity of Links -- Guidelines for Crafting Link Text -- Provide Context in Link Text and Surrounding Text -- Weave Link Text Into Sentence Structure -- Choose Key Words or Phrases for Link Text -- Choose an Appropriate Length for Link Text -- Write Scannable Link Text -- Make Link Text Conceptually Similar to Titles or Headings…”
    Libro electrónico
  11. 3091
    Publicado 2023
    Tabla de Contenidos: “…VIII Div. 02 Wall Thickness Calculation -- 4.3 Wafer Design Thickness Validation -- Questions and Answers -- Further Reading -- Chapter 5 Material and Corrosion -- 5.1 Introduction -- 5.2 Carbon Dioxide Corrosion -- 5.2.1 Corrosion Mechanism -- 5.2.2 Corrosion Mitigation -- 5.2.3 Corrosion Rate Calculation -- 5.2.3.1 Basic CO2 Corrosion Rate -- 5.2.3.2 Corrective CO2 Corrosion Rate -- 5.2.3.3 Final CO2 Corrosion Rate -- 5.3 Pitting Corrosion -- 5.4 Carbon Equivalent -- 5.5 Hydrogen-Induced. …”
    Libro electrónico
  12. 3092
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credit -- Dedicated -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introducing the Game Production Process -- Game design roles -- Specialization and T-shaping -- Development teams -- Responsibilities of a game designer -- Software development models -- Waterfall -- Agile -- Production schedule and milestones -- Greenlight gates and vertical slice -- A traditional milestone structure -- Validation funnel in-game development -- The role of a games publisher -- Summary -- Chapter 2: Preparing a Game Concept -- What is a game concept? …”
    Libro electrónico
  13. 3093
    Publicado 2024
    Tabla de Contenidos: “…The Neuro Dance: Decoding the Cortisol Waltz in the Female Brain -- The Many Hats of Hera: Unraveling Female Multitasking Mastery -- Connecting the Dots: The Female Brain and the Long Game in Marketing -- Queries over Commands: The Female Brain's Linguistic Harmony -- The Emotional Palette: Decoding Subtlety in the Female Mind -- The Cisgender Male Brain -- Chapter 5 The Maternal Brain -- The Maternal Instinct: Nurturing the Future -- The Mother's Mind: Understanding the Transformation -- Communication That Resonates to the Maternal Mind -- Sensory Enhancement and Swift Decision-Making -- Hyper Vigilance, Healthy Skepticism, Seeking Trust -- How Grandmothers Nurture Generations -- Summary -- Chapter 6 The Middle-Aged Brain -- Dopamine Drops and Midlife Mischief -- Desperately Seeking Serotonin - World of Color Transforms to 50 Shades of Gray -- Daily Novelty - Inject Excitement and Mojo into Midlife -- Touch, Hug, and Gratitude - Serotonin Boosts without Pills -- Light at the End of the Tunnel - Brain Shrinkage to the Rescue -- Chapter 7 The Senior Brain and What It Prefers -- Keep It Simple - and Focused -- Positive Framing Only -- Scented Memories -- Songs and Jingles of Youth - Musical Nostalgia -- Grandparents and Grandchildren - A Special Bond -- Pragmatism, Realism, and Acceptance -- We Mattered: Nostalgia, Accomplishment, Recognition, and Acknowledgment -- Feeling Young at Heart - The Benjamin Button Effect -- Part 2 neuroAi Applications -- Chapter 8 neuroAi Applications across Categories and Industry Sectors -- Chapter 9 desireGPT - Drive Desire with neuroAi -- The Brain and Desire - Six-Dimension Neuroscience Framework -- Dopamine Rush: Desire from Novelty and Intrigue -- Serotonin Satisfaction: Desire for Comfort and Familiarity -- Oxytocin Oasis: Desire for Trust and Validation -- Cognitive Fluency: Desire for Simplicity…”
    Libro electrónico
  14. 3094
    por Rodriguez, Juan R.
    Publicado 2005
    Tabla de Contenidos: “…Building a portlet for offline form access -- 11.1 Building a form based portlet -- 11.2 Adding field validations -- 11.3 Adding a script to highlight the field in error -- 11.4 Deploying the sample portlet as an offline portlet -- 11.5 Running the portlet from a Pocket PC -- 11.6 Portlet offline configuration -- 11.7 Configure the portlet client with offline option -- Chapter 12. …”
    Libro electrónico
  15. 3095
    por Marchioni, Francesco
    Publicado 2013
    Tabla de Contenidos: “…Combining Persistence with CDI -- Data persistence meets a standard -- Working with JPA -- Adding persistence to our application -- Setting up the database -- Installing the JDBC driver on JBoss AS 7 -- Using the command-line interface to create a new data source -- Creating the Maven project -- Adding Maven configuration -- Cooking entities -- Adding JavaBeans Validation -- Configuring persistence -- Adding producer classes -- Coding queries for your application -- Adding services to your application -- Adding a controller to drive user requests -- Coding the JSF view…”
    Libro electrónico
  16. 3096
    Publicado 2017
    Tabla de Contenidos: “…-- Preparing, training, and testing data -- Building the corpus with tokenization and data cleaning -- Document feature matrices -- Training models with cross validation -- Training our first predictive model -- Improving speed with parallelization -- Computing predictive accuracy and confusion matrices -- Improving our results with TF-IDF -- Adding flexibility with N-grams -- Reducing dimensionality with SVD -- Extending our analysis with cosine similarity -- Digging deeper with sentiment analysis -- Testing our predictive model with unseen data -- Retrieving text data from Twitter -- Summary -- Chapter 7: Developing Automatic Presentations -- Required packages -- Why invest in automation? …”
    Libro electrónico
  17. 3097
    Publicado 2017
    Tabla de Contenidos: “…. -- Identifying weak validation of data from external components to prevent attacks such as cross-site request forgery and path tampering -- Getting ready -- How to do it... -- Identifying performance improvements to source code using FxCop analyzers -- Getting ready -- How to do it... -- How it works... -- Chapter 6: Live Unit Testing in Visual Studio Enterprise -- Introduction -- Running live unit tests in Visual Studio for unit test projects based on NUnit, XUnit, and MSTest frameworks -- Getting started -- How to do it... -- Viewing and navigating live unit test results -- Getting started -- How to do it... -- Understanding incremental live unit test execution with code changes -- Getting started -- How to do it... -- How it works... -- Understanding Start/Stop/Pause/Continue/Restart functionality for fine grain control of LUT -- Getting started -- How to do it... -- Including and excluding subset of tests for live execution -- Getting started -- How to do it... -- Configuring different options for live unit testing using the Tools Options dialog -- Getting started -- How to do it... -- Chapter 7: C# Interactive and Scripting -- Introduction -- Writing a simple C# script and evaluating it within the Visual Studio interactive window -- Getting started -- How to do it... -- How it works... -- Using script directives and REPL commands in the C# interactive window -- Getting started -- How to do it... -- Using keyboard shortcuts for evaluating and navigating through script sessions in the C# interactive window -- Getting started -- How to do it... -- Initializing the C# interactive session from the existing C# project -- Getting started -- How to do it...…”
    Libro electrónico
  18. 3098
    Publicado 2018
    Tabla de Contenidos: “…-- Deep learning frameworks -- Setting up a cloud-based deep learning environment with GPU support -- Choosing a cloud provider -- Setting up your virtual server -- Configuring your virtual server -- Installing and updating deep learning dependencies -- Accessing your deep learning cloud environment -- Validating GPU-enablement on your deep learning environment -- Setting up a robust, on-premise deep learning environment with GPU support -- Neural network basics -- A simple linear neuron…”
    Libro electrónico
  19. 3099
    Publicado 2010
    Tabla de Contenidos: “…The Java Virtual Machine Initialization Phase -- The wsadmin Environment Initialization Phase -- The Connection Phase -- Defining the Scripting Language -- Trace-Related Options -- wsadmin Profile Script Files -- Commands and Script Files -- Interactive/Interpretive wsadmin Session -- Summary -- Chapter 7 Introduction to Admin Objects -- The Administrative Scripting Objects -- Help for the Help Object -- Help for MBeans -- Help for MBean Attributes -- Help for MBean Operations -- Help for Additional MBean Information -- Help for Other Administrative Objects -- Help for WebSphere Messages -- Useful Information -- Summary -- Chapter 8 The AdminConfig Object -- AdminConfig Overview -- Configuration Identifier (config ID) -- Containment Path -- Configuration Types -- Using a config ID -- Show and Tell Methods -- Create and Modify Methods -- Configuration Verification/Validation -- Document Manipulation Methods -- Miscellaneous Methods -- Summary -- Chapter 9 The AdminControl Object -- Environment Information and Manipulation -- MBean Support Methods -- Objects, Names, and Instances -- Attribute-Related Methods -- Miscellaneous Methods -- *_jmx Methods -- Summary -- Chapter 10 The AdminApp Object -- Application Informational Methods -- Application Installation Methods -- Edit, Update, and Uninstall -- Miscellaneous AdminApp Methods -- Summary -- Chapter 11 The AdminTask Object-Server Management -- Introduction -- Simple One-Line Examples -- ServerType-Related Methods -- Creating Servers and Clusters -- Server-Related Commands -- create*Server Optional and Required Steps -- Server Template-Related Commands -- JVM-Related Methods -- JVM System Properties -- JVM Properties -- z/OS-Specific Methods -- Miscellaneous ServerManagement Methods -- Reference Section -- Node Group Command Group and Core Group Command Group -- createCoreGroup -- createNodeGroup…”
    Libro electrónico
  20. 3100
    Publicado 2010
    Tabla de Contenidos: “…How It Works -- When to Use It -- Wrapping a Function Sequence in a Nested Closure (Ruby) -- Simple C# Example (C#) -- Using Method Chaining (Ruby) -- Function Sequence with Explicit Closure Arguments (Ruby) -- Using Instance Evaluation (Ruby) -- Chapter 39: Literal List -- How It Works -- When to Use It -- Chapter 40: Literal Map -- How It Works -- When to Use It -- The Computer Configuration Using Lists and Maps (Ruby) -- Evolving to Greenspun Form (Ruby) -- Chapter 41: Dynamic Reception -- How It Works -- When to Use It -- Promotion Points Using Parsed Method Names (Ruby) -- Promotion Points Using Chaining (Ruby) -- Removing Quoting in the Secret Panel Controller (JRuby) -- Chapter 42: Annotation -- How It Works -- When to Use It -- Custom Syntax with Runtime Processing (Java) -- Using a Class Method (Ruby) -- Dynamic Code Generation (Ruby) -- Chapter 43: Parse Tree Manipulation -- How It Works -- When to Use It -- Generating IMAP Queries from C# Conditions (C#) -- Chapter 44: Class Symbol Table -- How It Works -- When to Use It -- Statically Typed Class Symbol Table (Java) -- Chapter 45: Textual Polishing -- How It Works -- When to Use It -- Polished Discount Rules (Ruby) -- Chapter 46: Literal Extension -- How It Works -- When to Use It -- Recipe Ingredients (C#) -- Part V: Alternative Computational Models -- Chapter 47: Adaptive Model -- How It Works -- When to Use It -- Chapter 48: Decision Table -- How It Works -- When to Use It -- Calculating the Fee for an Order (C#) -- Chapter 49: Dependency Network -- How It Works -- When to Use It -- Analyzing Potions (C#) -- Chapter 50: Production Rule System -- How It Works -- When to Use It -- Validations for club membership (C#) -- Eligibility Rules: extending the club membership (C#) -- Chapter 51: State Machine -- How It Works -- When to Use It -- Secret Panel Controller (Java)…”
    Libro electrónico