Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
1901por Schmitt, ChristopherTabla de Contenidos: “…SolutionDiscussion; See Also; 1.10 Creating Lists; Problem; Solution; Discussion; See Also; 1.11 Making a Link to a Web Page; Problem; Solution; Discussion; Linking to another web page on the same site; Moving up folders; Using the root relative link; Linking to certain elements within a web page; See Also; 1.12 Coding Tables; Problem; Solution; Discussion; See Also; 1.13 Creating an HTML vCard (hCard); Problem; Solution; Discussion; Extending hCards; See Also; 1.14 Marking Up an Event (hCalendar); Problem; Solution; Discussion; See Also; 1.15 Validating HTML; Problem; Solution…”
Publicado 2010
Libro electrónico -
1902por Wempen, FaitheTabla de Contenidos: “…Rearrange FieldsInsert and Delete Fields; Understanding Data Types; Change a Field's Data Type; Understanding Field Properties; Understanding Field Sizes; Change a Field Size; Set a Field's Format; Set a Field Caption; Set a Default Value; Make a Field Required; Index a Field; Apply Smart Tags; Create an Input Mask; Create a Validation Rule; Create a Record-Level Validation Rule; Chapter 5 Working with Relationships and Lookups; Understanding Relationships; Create a Relationship between Two Tables; Edit a Relationship; Remove a Relationship; Arrange the Relationships Window…”
Publicado 2007
Libro electrónico -
1903Publicado 2015Tabla de Contenidos: “…Determine the Need; 4.3.3. Modify and Validate; 4.3.4. Develop a Marketing Plan; 4.3.5. Develop the Final Product or Service; 4.3.6. …”
Libro electrónico -
1904Publicado 2018Tabla de Contenidos: “…Hakkinen and Bob Thompson -- Interpreting Mobile and Handheld Air Sensor Readings in Relation to Air Quality Standards and Health Effect Reference Values: Tackling the Challenges doi: 10.3390/atmos8100182 114 Books MDPI -- Daniel-Eduard Constantin, Alexis Merlaud, Mirela Voiculescu, Carmelia Dragomir, Lucian Georgescu, Francois Hendrick, Gaia Pinardi and Michel Van Roozendael Mobile DOAS Observations of Tropospheric NO2 Using an UltraLight Trike and Flux Calculation doi: 10.3390/atmos8040078 140 -- Richard M ́enard and Martin Deshaies-Jacques Evaluation of Analysis by Cross-Validation. Part I: Using Verification Metrics doi: 10.3390/atmos9030086 153 -- Richard M ́enard and Martin Deshaies-Jacques -- Evaluation of Analysis by Cross-Validation, Part II: Diagnostic and Optimization of Analysis Error Covariance doi: 10.3390/atmos9020070 169 -- Barry Baker and Li Pan -- Overview of the Model and Observation Evaluation Toolkit (MONET) Version 1.0 for Evaluating Atmospheric Transport Models doi: 10.3390/atmos8110210 190.…”
Libro electrónico -
1905por Chandramouli, SubramanianTabla de Contenidos: “…Defect Detection Rate -- Escaped Defects -- Chapter 7 Agile Analysis and Design -- Introduction -- Collecting and Validating Requirements of Agile Projects -- Participatory Decision Model -- Product Vision -- Product Roadmap -- Backlog -- Story Maps -- Agile Modeling -- Business Case Development -- Chartering -- Chapter 8 Product Quality and Process Improvement -- Introduction -- Frequent Verification and Validation -- Test-Driven Development (TDD) -- Definition of Done -- Incremental Delivery -- Feedback Techniques for Product -- Continuous Improvement Process -- Process Analysis and Improvement Techniques -- Value Stream Mapping -- Five Whys -- Cause and Effect/Fishbone Diagrams -- Control Limits -- Chapter 9 Interpersonal Skills -- Emotional Intelligence Quotient (EQ) -- Collaboration -- Adaptive Leadership -- Negotiations -- Conflict Resolution -- Quick Quiz on Conflict Management -- Servant Leadership -- Brainstorming Techniques -- Building Empowered Team -- Coaching and Mentoring -- Team Motivation and Knowledge Sharing -- Leadership Styles -- Problem-solving Steps -- Culture and Team Diversity -- Chapter 10 Value-based Prioritization -- Introduction -- Definition of Value -- ROI, NPV, IRR -- Value-driven Delivery -- Elicit Non-functional Requirements -- Relative Prioritization and Ranking -- Value-based Prioritization -- Minimally Marketable Feature (MMF) -- Agile Compliance -- Regulatory Compliance -- Chapter 11 Agile Project Risk Management -- Introduction -- Approaching risk in Agile Projects -- Identify Risks -- Risk Adjusted Backlog -- Risk Burn-down Graphs -- Perform Qualitative Risk Analysis -- Risk-based Spike -- Architectural Spike -- Plan Risk Responses -- Monitoring and Control Risks -- Checkpoints in Agile Projects -- Chapter 12 PMI Code of Ethics and Professional Conduct -- Introduction -- Structure of the Code…”
Publicado 2016
Libro electrónico -
1906Publicado 2024Tabla de Contenidos: “…Microsoft Excel and Google Sheets functionalities to improve data quality and integrity -- Version control -- Collaboration tools -- Data validation -- Conditional formatting -- Summary -- Further reading -- Part 2: Pragmatic Solutions to Manage Financial Data Quality and Data Integrity -- Chapter 4: Understanding the Data Integrity Management Capabilities of Business Intelligence Tools -- Technical requirements -- Recognizing the importance of BI tools -- Exploring common data quality management capabilities of BI tools -- Data profiling -- Data cleansing -- Data validation -- Data lineage -- Data governance -- Reviewing the most popular BI tools and how to get started with them -- Microsoft Power BI -- Tableau by Salesforce -- Alteryx analytics cloud platform -- Summary -- Further reading -- Chapter 5: Using Business Intelligence Tools to Fix Data Integrity Issues -- Technical requirements -- Managing data integrity issues with BI tools -- Ensuring consistent data type formatting -- Data profiling features -- Column quality -- Column distribution -- Column profile -- Data cleansing methods -- Removing empty cells -- Removing duplicates -- Identifying data outliers -- Managing relationships in data models -- Dealing with large financial datasets using data validation -- Summary -- Further reading -- Chapter 6: Implementing Best Practices When Using Business Intelligence Tools -- Technical requirements -- Handling confusing date convention formats -- Using data visualization to identify data outliers -- Visualizing using a scatter chart -- Visualizing using a histogram -- Managing orphaned records -- Identifying orphaned records in Power BI -- Identifying orphaned records in Alteryx -- Summary -- Further reading -- Chapter 7: Detecting Fraudulent Transactions Affecting Financial Report Integrity -- Technical requirements…”
Libro electrónico -
1907Publicado 2024Tabla de Contenidos: “…Chapter 7: Attacking API Input Validation and Encryption Techniques -- Technical requirements -- Understanding API input validation controls -- Techniques for bypassing input validation controls in APIs -- SQL injection -- XSS attacks -- XML attacks -- Introduction to API encryption and decryption mechanisms -- Techniques for evading API encryption and decryption mechanisms -- Case studies - Real-world examples of API encryption attacks -- Summary -- Further reading -- Part 3: Advanced Techniques for API Security Testing and Exploitation -- Chapter 8: API Vulnerability Assessment and Penetration Testing -- Understanding the need for API vulnerability assessment -- API reconnaissance and footprinting -- Techniques for API reconnaissance and footprinting -- API scanning and enumeration -- Techniques for API scanning and enumeration -- API exploitation and post-exploitation techniques -- Exploitation techniques -- Post-exploitation techniques -- Best practices for API VAPT -- API vulnerability reporting and mitigation -- Future of API penetration testing and vulnerability assessment -- Summary -- Further reading -- Chapter 9: Advanced API Testing: Approaches, Tools, and Frameworks -- Technical requirements -- Automated API testing with AI -- Specialized tools and frameworks in AI-powered API testing -- Other AI security automation tools -- Large-scale API testing with parallel requests -- Gatling -- How to use Gatling for large-scale API testing with parallel requests -- Advanced API scraping techniques -- Pagination -- Rate limiting -- Authentication -- Dynamic content -- Advanced fuzzing techniques for API testing -- AFL -- Example use case -- API testing frameworks -- The RestAssured framework -- The WireMock framework -- The Postman framework -- The Karate DSL framework -- The Citrus framework -- Summary -- Further reading…”
Libro electrónico -
1908Publicado 2019Tabla de Contenidos:Libro electrónico
-
1909Publicado 2022Tabla de Contenidos: “…3.3.2.3 SPIN Model Checker -- 3.3.3 Automated Theorem Prover -- 3.3.3.1 ALT-ERGO -- 3.3.4 Static Analysis -- 3.3.4.1 CODESONAR -- 3.4 Validation of IoRT Systems -- 3.4.1 IoRT Testing Methods -- 3.4.2 Design of IoRT Test -- 3.5 Automated Validation -- 3.5.1 Use of Service Visualization -- 3.5.2 Steps for Automated Validation of IoRT Systems -- 3.5.3 Choice of Appropriate Tool for Automated Validation -- 3.5.4 IoRT Systems Open Source Automated Validation Tools -- 3.5.5 Some Significant Open Source Test Automation Frameworks -- 3.5.6 Finally IoRT Security Testing -- 3.5.7 Prevalent Approaches for Security Validation -- 3.5.8 IoRT Security Tools -- References -- 4 Light Fidelity (Li-Fi) Technology: The Future Man-Machine-Machine Interaction Medium -- 4.1 Introduction -- 4.1.1 Need for Li-Fi -- 4.2 Literature Survey -- 4.2.1 An Overview on Man-to-Machine Interaction System -- 4.2.2 Review on Machine to Machine (M2M) Interaction -- 4.2.2.1 System Model -- 4.3 Light Fidelity Technology -- 4.3.1 Modulation Techniques Supporting Li-Fi -- 4.3.1.1 Single Carrier Modulation (SCM) -- 4.3.1.2 Multi Carrier Modulation -- 4.3.1.3 Li-Fi Specific Modulation -- 4.3.2 Components of Li-Fi -- 4.3.2.1 Light Emitting Diode (LED) -- 4.3.2.2 Photodiode -- 4.3.2.3 Transmitter Block -- 4.3.2.4 Receiver Block -- 4.4 Li-Fi Applications in Real Word Scenario -- 4.4.1 Indoor Navigation System for Blind People -- 4.4.2 Vehicle to Vehicle Communication -- 4.4.3 Li-Fi in Hospital -- 4.4.4 Li-Fi Applications for Pharmacies and the Pharmaceutical Industry -- 4.4.5 Li-Fi in Workplace -- 4.5 Conclusion -- References -- 5 Healthcare Management-Predictive Analysis (IoRT) -- 5.1 Introduction -- 5.1.1 Naive Bayes Classifier Prediction for SPAM -- 5.1.2 Internet of Robotic Things (IoRT) -- 5.2 Related Work -- 5.3 Fuzzy Time Interval Sequential Pattern (FTISPAM)…”
Libro electrónico -
1910por Chaplin, GeoffTabla de Contenidos: “…19 Portfolio Product Types20 The Normal Copula and Correlation; 21 Correlation in Practice; 22 Valuation and Hedging; 23 Alternative Copulas; 24 Correlation Portfolio Management; PART IV DEFAULT SWAPS INCLUDING COUNTERPARTY RISK; 25 Single Name CDS; 26 Counterparty CDSs; PART V SYSTEMS IMPLEMENTATION AND TESTING; 27 Mathematical Model and Systems Validation; 28 System Implementation; PART VI THE CREDIT CRISIS; 29 Cause and Effect: Credit Derivatives and the Crisis of 2007; Appendix Markit Credit and Loan Indices; References; Index…”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1911Publicado 2010Tabla de Contenidos: “…Part Three: Strategic Assessment ProgramsChapter 15: THE ROLE OF ASSESSMENT IN SUCCESSION MANAGEMENT; Chapter 16: ASSESSING THE POTENTIAL OF INDIVIDUALS; Chapter 17: ASSESSMENT FOR ORGANIZATIONAL CHANGE; Chapter 18: GLOBAL APPLICATIONS OF ASSESSMENT; Part Four: Advances, Trends, and Issues; Chapter 19: ADVANCES IN TECHNOLOGY-FACILITATED ASSESSMENT; Chapter 20: THE LEGAL ENVIRONMENT FOR ASSESSMENT; Chapter 21: VALIDATION STRATEGIES; Chapter 22: ADDRESSING THE FLAWS IN OUR ASSESSMENT DECISIONS; Chapter 23: STRATEGIC EVALUATION OF THE WORKPLACE ASSESSMENT PROGRAM…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
1912Publicado 2006Tabla de Contenidos: “…Haswell -- Taking a spin on the intelligent essay assessor / Tim McGee -- ACCUPLACER's essay-scoring technology : when reliability does not equal validity / Edmund Jones -- WritePlacer Plus in place : an exploratory case study / Anne Herrington and Charles Moran -- E-Write as a means for placement into three composition courses : a pilot study / Richard N. …”
Libro electrónico -
1913por Esposito, AngeloTabla de Contenidos: “…; Chapter 2: Inventory the Current Service Offering; Chapter 3: Validate the Current Service Model; Chapter 4: Establish an ITSM Steering Committee; Chapter 5: Define the Ideal Target State; Chapter 6: Create the IT Strategic and Tactical Plans; Vision and Mission Analysis; External environment; Industry environment; Internal Analysis, Culture and climate, Resources; Financial Analysis; SWOT…”
Publicado 2013
Libro electrónico -
1914Publicado 2022Tabla de Contenidos: “…-- A Brief Outline of The Book -- Notes -- Chapter 2: Democratic Inclusion in Associations -- Morally Binding Decisions -- The Moralized All-subjected Principle -- Decisions That Claim to Be Binding -- Decisions and Authority -- Subject To De Facto Authority -- The Idea of De Facto Authority -- The Subjects of De Facto Authority -- Rulemaking and De Facto Authority -- The Idea of Democratic Association Revisited -- Democracy in Non-Member Associations -- Notes -- Chapter 3: Democratic Inclusion and the State -- The State and The Law -- How The Law Binds -- The Brute Force Account -- The Moral Account -- The Authority Account -- Notes -- Chapter 4: Subject to Legal Authority -- Authority and Validity -- Two Failed Attempts -- The People and The Internal Point of View -- Challenges to De Facto Legal Authority -- Are The Laws of The State Binding? …”
Libro electrónico -
1915Publicado 2005Tabla de Contenidos: “…Invited Paper -- Proving Program Invariance and Termination by Parametric Abstraction, Lagrangian Relaxation and Semidefinite Programming -- Numerical Abstraction -- Scalable Analysis of Linear Systems Using Mathematical Programming -- The Arithmetic-Geometric Progression Abstract Domain -- An Overview of Semantics for the Validation of Numerical Programs -- Invited Talk -- The Verifying Compiler, a Grand Challenge for Computing Research -- Verification I -- Checking Herbrand Equalities and Beyond -- Static Analysis by Abstract Interpretation of the Quasi-synchronous Composition of Synchronous Programs -- Termination of Polynomial Programs -- Verifying Safety of a Token Coherence Implementation by Parametric Compositional Refinement -- Invited Talk -- Abstraction for Liveness -- Heap and Shape Analysis -- Abstract Interpretation with Alien Expressions and Heap Structures -- Shape Analysis by Predicate Abstraction -- Predicate Abstraction and Canonical Abstraction for Singly-Linked Lists -- Purity and Side Effect Analysis for Java Programs -- Abstract Model Checking -- Automata as Abstractions -- Don’t Know in the ?…”
Libro electrónico -
1916Publicado 2014Tabla de Contenidos: “…-- 7 Identifying the core challenges -- How to identify challenges -- How to validate challenges -- How to select core challenges - the importance of trade-offs -- Defining what success will look like - strategic objectives and strategic guidelines -- 8 Solving the core challenges -- Reducing the complexity of the core challenge -- Developing potential solutions -- Practical tools for generating solutions -- Selecting the best potential solutions -- Timing initiatives -- 9 Reducing uncertainty -- Experimenting to reduce uncertainty -- Phase 1: Stating the underlying assumptions -- Phase 2: Testing assumptions about value -- Phase 3: Testing assumptions about growth -- Phase 4: Testing assumptions about sustainability -- Ongoing testing and learning -- 10 Managing execution -- A will to act -- A coordinated approach -- Setting the scene -- Launching and spreading change…”
Libro electrónico -
1917por York, DanTabla de Contenidos: “…User Interface Changes; Presentation Format Changes; Variable-Length IPv6 Addresses; Port Number Colon; Classless (CIDR) Notation Versus Subnet Masks; Case Sensitivity; Validity Checking of Input Fields; Chapter 2. DNS Changes; Handling AAAA Records; Prioritization of AAAA and A Records; Happy Eyeballs…”
Publicado 2011
Libro electrónico -
1918Publicado 2013Tabla de Contenidos: “…-- Part 6: The project environment -- Prioritisation -- The culture of delivery -- The limits to planning and prediction -- Dealing with external problems -- Part 7: Integrated project management -- The strengths and limits of project management -- Bridging the divide: project and change managers -- From delivery to benefits realisation -- The lessons from lean and six sigma -- Part 8: Aligning projects to business needs -- Hight-speed project management -- Delivering in a cost-constrained environment -- Optionality in projects -- Who has a valid interest in the project? -- Part 9: Challenging projects -- Taking over the project no-one is running -- Not seeing the wood for the trees -- The customers who do not know what they want -- Delivering in times of change -- Part 10: The improving project manager -- Learning from projects -- Best practice, continuous improvement and accreditation -- Adopting a new project management approach…”
Libro electrónico -
1919Publicado 2010Tabla de Contenidos: “…How critical realism clarifies validity issues in theorytesting research: analysis and case Robert B. …”
Libro electrónico -
1920Publicado 2018Tabla de Contenidos: “…-- Implementing SSE on the server-side -- Implementing SSE REST clients -- Implementing and sending SSE broadcasts -- Summary -- Chapter 6: Advanced REST APIs -- Applying Design by Contract - adding validation -- Using JSON Web Tokens for authentication -- Diagnosability - logging, metrics, and tracing -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico