Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 12,477
- Aspectos religiosos 6,196
- Aspectes religiosos 6,165
- Aspectos sociales 5,781
- Història 5,416
- Engineering & Applied Sciences 4,842
- History 4,107
- Aspectes socials 3,749
- Universidad Pontificia de Salamanca (España) 3,461
- Computer Science 3,312
- Social aspects 3,158
- Església Catòlica 3,137
- Iglesia Católica 3,113
- Filosofía 3,031
- aspectos sociales 2,963
- Cristianisme 2,791
- Aspecto religioso 2,788
- Educación 2,414
- Management 2,412
- Crítica e interpretación 2,399
- Cristianismo 2,347
- Francisco de Asís 2,253
- Psicología 2,209
- Aspectos morales 2,153
- Aspectos económicos 2,142
- Derecho 2,105
- Aspectos psicológicos 2,001
- Development 2,001
- Biblia 2,000
- aspectos económicos 1,946
-
453821Publicado 2017“…Therefore, we will take you through several design patterns that solve the various challenges associated with realizing the Microservices architecture in enterprise applications. …”
Libro electrónico -
453822Publicado 2016“…Starting with installing CentOS, this book will walk you through the networking aspects of CentOS. You will then learn how to manage users and their permissions, software installs, disks, filesystems, and so on. …”
Libro electrónico -
453823Publicado 2017“…What You Will Learn Install OBIEE in Windows, including how to create the underlying Weblogic Application server and the required database Build the BI system repository, the vital engine connecting your data to the front end of Oracle BI Develop effective analysis, draw out meaning from the data, and present it to end users on interactive dashboards Build pixel-perfect, printable reports using the embedded BI Publisher feature Build agents for actionable insight and enable your users to act on Business Intelligence at their desktop or on the move Understand the various aspects of securing the Oracle BI system, from data restrictions to whole dashboard access rights Get acquainted with the system management tools and methods available for the continuous improvement of your system In Detail Oracle Business Intelligence Enterprise Edition (OBIEE) 12c is packed full of features and has a fresh approach to information presentation, system management, and security. …”
Libro electrónico -
453824Publicado 2017“…He curates The Linux Setup, a large collection of interviews with desktop Linux users, and writes for assorted library science journals…”
Libro electrónico -
453825Publicado 2017“…You will touch base on data monitoring, controlling appliances, and security aspects. By the end of the book, you will understand how to completely control and monitor your home from the cloud and from a mobile application. …”
Libro electrónico -
453826por Cisco Networking Academy Staff“…Summary of Activities and Labs –Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. …”
Publicado 2014
Libro electrónico -
453827Publicado 2017“…Angie co-founded ASI and is also the founder of Data Science Lab London, one of the biggest communities of data scientists and data engineers in Europe, with over 2,500 members. …”
-
453828por Malin, Cameron H.“…Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. …”
Publicado 2012
Libro electrónico -
453829por Cisco Networking Academy Program Staff“…Summary of Activities and Labs –Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. …”
Publicado 2014
Libro electrónico -
453830por Bollella, Gregory“…Key topics include Real-time principles and concepts, and the unique requirements of real-time application design and development How Java has been adapted to real-time environments A complete chapter on garbage collection concepts and Java SE collectors Using the Java RTS APIs to solve actual real-time system problems as efficiently as possible Utilizing today’s leading Java RTS development and debugging tools Understanding real-time garbage collection, threads, scheduling, and dispatching Programming new RTSJ memory models Dealing with asynchronous event handling and asynchronous transfer of control…”
Publicado 2009
Libro electrónico -
453831Publicado 2002“…Full of expert tips, techniques, and guidelines, it covers virtually every aspect of working with DB2 UDB in enterprise server: administration, connectivity, development, and much more. …”
Libro electrónico -
453832Publicado 2008“…You’ll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely—and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own · Create more secure “mashup” applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers…”
Libro electrónico -
453833Publicado 2008“…Finally, they carefully review the design and business considerations associated with architecting solutions based on CardSpace or any other user-centered identity management system. …”
Libro electrónico -
453834Publicado 1999“…The key to success lies in using simple tools, often open source, that effectively blend in established Internet technologies that have always had a collaborative aspect (SMTP, NNTP) with new technologies that enhance our ability to manage collaborative documents (HTTP, XML). …”
Libro electrónico -
453835Publicado 2008“…This book Illuminates the tradeoffs associated with testing, so you can make better decisions about what and how to test Introduces TestNG, explains its goals and features, and shows how to apply them in real-world environments Shows how to integrate TestNG with your existing code, development frameworks, and software libraries Demonstrates how to test crucial code features, such as encapsulation, state sharing, scopes, and thread safety Shows how to test application elements, including JavaEE APIs, databases, Web pages, and XML files Presents advanced techniques: testing partial failures, factories, dependent testing, remote invocation, cluster-based test farms, and more Walks through installing and using TestNG plug-ins for Eclipse, and IDEA Contains extensive code examples Whether you use TestNG, JUnit, or another testing framework, the testing design patterns presented in this book will show you how to improve your tests by giving you concrete advice on how to make your code and your design more testable…”
Libro electrónico -
453836por Vasseur, Jean-Phillipe“…Following these are details of all aspects of the network design, covering VPN, QoS, TE, network recovery, and—where applicable—multicast, IPv6, and pseudowire. …”
Publicado 2005
Libro electrónico -
453837Publicado 2002“…Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. …”
Libro electrónico -
453838Publicado 2008“…., located in the greater Dallas, Texas area and an Intuit Solutions Provider that specializes in on-site and Internet-assisted accounting software implementation, set-up, training and troubleshooting. …”
Libro electrónico -
453839Publicado 2008“…He is the president of Liberty Associates, Inc., where he provides custom programming, consulting, and training. …”
Libro electrónico -
453840por Shapiro, Jeffrey R.“…Coverage includes Building the foundations for a highly available Active Directory and network architecture Selecting and integrating high-performance hardware, storage, and networks Installing and configuring Windows Clustering Services for both scale-out and failover Leveraging the Microsoft Operations Framework (MOF) and Microsoft Systems Architecture (MSA) Delivering high-performance, high availability file- and print-server solutions Using clustering to maximize SQL Server and Exchange Server availability Restoring failed servers: best practices and step-by-step techniques for recovering from downtime or disaster Deploying Network Load Balancing (NLB) IIS and application servers Administering Windows Server 2003 high-performance systems—including performance monitoring and alerts with Microsoft Operations Manager Avoiding the pitfalls associated with Windows high availability solutions © Copyright Pearson Education. …”
Publicado 2009
Libro electrónico