Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 16,540
- Biblia 6,706
- Filosofía 4,716
- Universidad Pontificia de Salamanca (España) 4,581
- Crítica e interpretación 4,079
- Derecho 3,747
- RELIGION 3,643
- Educación 3,564
- Història 3,432
- Iglesia Católica 3,123
- Ciencias sociales 2,926
- Moral cristiana 2,558
- Teología dogmática 2,461
- Teología 2,379
- Psicología 2,358
- Sermones 2,216
- Management 2,201
- Development 2,161
- Derecho canónico 2,131
- History 1,989
- Derecho civil 1,961
- Education 1,951
- Documentales 1,893
- Universidad Pontificia de Salamanca, Facultad de Educación 1,877
- Engineering & Applied Sciences 1,850
- Medicina 1,763
- Tecnología 1,715
- Philosophy 1,704
- Application software 1,700
- Economía 1,626
-
641241Publicado 2018Tabla de Contenidos: “…-- Exercise - JUnit @Before and @After annotations -- Answer -- Summary -- Chapter 5: Java Language Elements and Types -- What are the Java language elements? …”
Libro electrónico -
641242Publicado 2017Tabla de Contenidos: “…-- SOLID OOP development - the simple responsibility principle -- The single responsibility principle -- The SRP in the real world -- An SRP example -- The class that knew too much -- Rule of thumb - no ands allowed -- A mailer class -- The sales tax class -- Why the SRP is important -- SOLID OOP development - the open/closed principle guide and example -- The open/closed principle definition -- A surprisingly challenging task -- The open/closed principle example -- The naive approach -- I don't like change! -- A better way -- SOLID OOP development - the Liskov substitution principle -- The LSP definition -- Breaking down the LSP -- The LSP example -- The problem -- The LSP violation -- The fix -- SOLID OOP development - the interface segregation principle -- The ISP definition -- The ISP code example -- Introducing the moderator -- A better way -- The result -- A caveat -- SOLID OOP development - the dependency inversion principle -- The DIP in the real world -- The DIP definition -- The DIP code example -- Recap -- Summary -- Chapter 10: Working with the Filesystem in Ruby -- Creating a file -- Ruby File class -- Other options you can pass as the second option -- Reading files into a program using the File class -- Deleting a file -- Appending a file…”
Libro electrónico -
641243Publicado 2021Tabla de Contenidos: “…Going beyond next -- The yield from expression -- Generator expressions -- Some performance considerations -- Don't overdo comprehensions and generators -- Name localization -- Generation behavior in built-ins -- One last example -- Summary -- Chapter 6: OOP, Decorators, and Iterators -- Decorators -- A decorator factory -- Object-oriented programming (OOP) -- The simplest Python class -- Class and object namespaces -- Attribute shadowing -- The self argument -- Initializing an instance -- OOP is about code reuse -- Inheritance and composition -- Accessing a base class -- Multiple inheritance -- Method resolution order -- Class and static methods -- Static methods -- Class methods -- Private methods and name mangling -- The property decorator -- The cached_property decorator -- Operator overloading -- Polymorphism - a brief overview -- Data classes -- Writing a custom iterator -- Summary -- Chapter 7: Exceptions and Context Managers -- Exceptions -- Raising exceptions -- Defining your own exceptions -- Tracebacks -- Handling exceptions -- Not only for errors -- Context managers -- Class-based context managers -- Generator-based context managers -- Summary -- Chapter 8: Files and Data Persistence -- Working with files and directories -- Opening files -- Using a context manager to open a file -- Reading and writing to a file -- Reading and writing in binary mode -- Protecting against overwriting an existing file -- Checking for file and directory existence -- Manipulating files and directories -- Manipulating pathnames -- Temporary files and directories -- Directory content -- File and directory compression -- Data interchange formats -- Working with JSON -- Custom encoding/decoding with JSON -- I/O, streams, and requests -- Using an in-memory stream -- Making HTTP requests -- Persisting data on disk -- Serializing data with pickle…”
Libro electrónico -
641244por Frenzel, Louis E., JrTabla de Contenidos: “…-- Soldering Tools -- Soldering Procedures -- Desoldering -- A - Book References -- B - Projects Parts List -- PARTS SOURCES -- CHAPTER 2 -- CHAPTER 3 -- CHAPTER 4 -- CHAPTER 5 -- CHAPTER 7 -- CHAPTER 12 -- CHAPTER 13 -- CHAPTER 14 -- C - Learning Resources -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- Y -- Z -- Back Cover…”
Publicado 2018
Libro electrónico -
641245Publicado 2023Tabla de Contenidos: “…-- Creating classes in C++ -- Creating objects in C++ -- Working on an OOP calculator program -- Adding constructor and getter functions for the calculator class -- Creating the CalculatorEx class, which inherits from the Calculator class -- Summary -- Chapter 4: Investigating the Shooter Game's Generated Project and C++ Code -- Technical requirements -- Understanding the MyShooter C++ project structure -- Understanding the game program structure -- Getting familiar with the source code -- MyShooterCharacter.h -- MyShooterCharacter.cpp -- MyShooterProjectile.h and MyShooterProjectile.cpp -- TP_PickUpComponent.h and TP_PickUpComponent.cpp -- TP_WeaponComponent.h and TP_WeaponComponent.cpp -- MyShooter.h and MyShooter.cpp -- MyShooterGameMode.h and MyShooterGameMode.cpp -- MyShooter.Build.cs, MyShooter.Target.cs, and MyShooterEditor.target.cs -- Launching Unreal Editor and opening the game project in Visual Studio -- Summary -- Part 2 - C++ Scripting for Unreal Engine -- Chapter 5: Learning How to Use UE Gameplay Framework Base Classes -- Technical requirements -- Creating a Pangaea top-down game project -- Understanding the gameplay framework base classes -- Creating game actor classes -- Creating the ADefenseTower class -- Creating the AProjectile class -- Creating the APlayerAvatar class -- Recompiling C++ projects -- Using the UPROPERTY macro -- The UPROPERTY syntax -- The UPROPERTY specifiers and metadata keys -- Marking the ADefenseTower, AProjectile, and APlayerAvatar attributes as UE properties -- Using the UFUNCTION macro -- The UFUNCTION syntax -- UFUNCTION specifiers and metadata keys…”
Libro electrónico -
641246Publicado 2023Tabla de Contenidos: “…-- Playtesting formats -- Sourcing candidates -- Running playtesting sessions -- Summary -- Chapter 14: Mastering Games as a Service -- Terms of engagement -- Basic stats -- Marketing and analytics -- Economy and balancing -- Live operations -- Staffing -- Efficient live ops -- Managing the content treadmill -- Live-game balancing -- Tools and setup -- Content management system (CMS) -- Customer relationship management (CRM) -- Dashboards -- Test environments -- Live ops tools -- Asset streaming -- Events -- Event classification -- Event components -- Event rewards -- Community and customer support -- Supporting players -- Official Discord servers, Reddit communities, and social media accounts -- Gathering feedback -- Newsletters -- Localized customer support -- Live streaming -- Introduction to season passes -- Designing a season pass -- Progression mechanics -- Accessing previous passes -- Premium rewards and perks -- Season pass tips -- Summary…”
Libro electrónico -
641247por Leblanc, RichardTabla de Contenidos: “…Recommendation by the Human Resources and Compensation Committee for Approval of the Board -- 3. CEO Position Description -- 4. Information Required to Complete the Evaluation -- 5. …”
Publicado 2024
Libro electrónico -
641248Publicado 2004Tabla de Contenidos: “…Mainframe Web application implementation -- 5.1 Scenario overview -- 5.2 Preparing for the implementation -- 5.2.1 Preparing HFS files -- 5.2.2 Preparing DB2 -- 5.2.3 Graphic package -- 5.2.4 Preparing WebSphere Application Server -- 5.3 Web application implementation -- 5.3.1 Installation procedure overview -- 5.3.2 Verification -- 5.4 Start and stop procedures -- 5.4.1 Start up the Web application -- 5.4.2 Shut down the Web application -- 5.5 Backup and recovery -- 5.5.1 Backup and restore of file systems -- 5.5.2 Backup and restore of DB2 database -- Chapter 6. …”
Libro electrónico -
641249por Manoel, EdsonTabla de Contenidos: “…Case study scenario: Application Servers on AIX first-level automation domain -- 5.1 Application server automation domain overview -- 5.1.1 Automation requirements -- 5.2 Automation domain configuration -- 5.2.1 Create the first-level automation domain -- 5.2.2 Define automation domain resources -- 5.2.3 Create the automation policy using relationship definitions -- 5.2.4 Change the Operational State of the resource group -- 5.2.5 Verify the operational quorum and tie breaker definition -- 5.3 End-to-end Automation Adapter configuration -- 5.3.1 Generate End-to-end Automation Adapter configuration files -- 5.3.2 Replicate the End-to-end Automation Adapter configuration files -- 5.3.3 Define the End-to-end Automation Adapter automation policy -- 5.4 Maintaining defined policies -- Chapter 6. …”
Publicado 2005
Libro electrónico -
641250Publicado 2002Tabla de Contenidos: “…Management node configuration -- 5.1 Install xCAT -- 5.2 Populate tables -- 5.2.1 Site definition -- 5.2.2 Hosts file -- 5.2.3 List of nodes and groups -- 5.2.4 Installation resources -- 5.2.5 Node types -- 5.2.6 Node hardware management -- 5.2.7 MPN topology -- 5.2.8 MPA configuration -- 5.2.9 Power control with APC MasterSwitch -- 5.2.10 MAC address collection using Cisco 3500-series -- 5.2.11 Console server configuration -- 5.2.12 Password table -- 5.3 Configure management node services…”
Libro electrónico -
641251por Wilkinson, Michael, 1957-Tabla de Contenidos: “…The Secrets to Recording: The Power of the Pen-Use It, Don't Abuse It, Make It Theirs -- Questions Answered in This Chapter -- Case Study: Public Safety Collaborative -- How Facilitators Abuse the Pen -- Using, Not Abusing the Pen -- Secret #23-The Secret to Using, Not Abusing, the Power of the Pen -- Case Study: The Power of the Pen, ELMO, and Parking Boards -- Knowing What to Record -- Secret #24-The Secret to Knowing What to Record -- Managing the Recording Process -- Secret #25-The Secret to Keeping the Recording Concise -- Using Strategies to Avoid Lulls While Writing -- Secret #26-The Secret to Avoiding Lulls While Writing -- Additional Techniques for Recording -- The Seven Deadly Sins of Facilitation -- Applying the Secrets to Recording -- Facilitator's Checklist for Recording -- Exercise Your Skills -- VII. …”
Publicado 2012
Libro electrónico -
641252Publicado 2013Tabla de Contenidos: “…Application Control -- Must-Have Firewall Features -- Core Firewall Functions -- Network Address Translation (NAT) -- Auditing and Logging -- Additional Firewall Capabilities -- Application and Website Malware Execution Blocking -- Antivirus -- Intrusion Detection and Intrusion Prevention -- Web Content (URL) Filtering and Caching -- E-Mail (Spam) Filtering -- Enhance Network Performance -- Firewall Design -- Firewall Strengths and Weaknesses -- Firewall Placement -- Firewall Configuration -- Summary -- References -- Chapter 16: Virtual Private Networks -- How a VPN Works -- VPN Protocols -- IPSec -- PPTP -- L2TP over IPSec -- SSL VPNs -- Remote Access VPN Security -- Authentication Process -- Client Configuration -- Client Networking Environment -- Offline Client Activity -- Site-to-Site VPN Security -- Summary -- References -- Chapter 17: Wireless Network Security -- Radio Frequency Security Basics -- Security Benefits of RF Knowledge -- Layer One Security Solutions -- Data-Link Layer Wireless Security Features, Flaws, and Threats -- 802.11 and 802.15 Data-Link Layer in a Nutshell -- 802.11 and 802.15 Data-Link Layer Vulnerabilities and Threats -- Closed-System SSIDs, MAC Filtering, and Protocol Filtering -- Built-in Bluetooth Network Data-Link Security and Threats -- Wireless Vulnerabilities and Mitigations -- Wired Side Leakage -- Rogue Access Points -- Misconfigured Access Points -- Wireless Phishing -- Client Isolation -- Wireless Network Hardening Practices and Recommendations -- Wireless Security Standards -- Temporal Key Integrity Protocol and Counter Mode with CBC-MAC Protocol -- 802.1x-Based Authentication and EAP Methods -- Wireless Intrusion Detection and Prevention -- Wireless IPS and IDS -- Bluetooth IPS -- Wireless Network Positioning and Secure Gateways -- Summary -- References…”
Libro electrónico -
641253Roslyn cookbook compiler as a service, static code analysis, code quality, code generation, and morePublicado 2017Tabla de Contenidos: “…. -- Creating a CodeRefactoringProvider to refactor source code to recommend using C# 7.0 tuples -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a CompletionProvider to provide additional intellisense items while editing code. -- Getting ready -- How to do it... -- How it works... -- Writing unit tests for a CodeFixProvider -- Getting ready -- How to do it... -- How it works... -- Chapter 4: Improving Code Maintenance of C# Code Base -- Introduction -- Configuring C# code style rules built into Visual Studio 2017 -- Getting ready -- How to do it... -- How it works... -- There is more... -- Using the .editorconfig file for configuration of code style rules -- Getting ready -- How to do it... -- How it works... -- Using the public API analyzer for API surface maintenance -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using third-party StyleCop analyzers for code style rules -- Getting ready -- How to do it... -- How it works... -- Chapter 5: Catch Security Vulnerabilities and Performance Issues in C# Code -- Introduction -- Identifying configuration-related security vulnerabilities in web applications -- Getting ready -- How to do it... -- How it works... -- Identifying cross-site scripting vulnerabilities in view markup files (.cshtml, .aspx files) in web applications -- Getting ready -- How to do it... -- How it works... -- Identifying insecure method calls that can lead to SQL and LDAP injection attacks…”
Libro electrónico -
641254Publicado 2020Tabla de Contenidos: “…-- Cost of computation: The reason for smart algorithms -- Problems applicable to searching algorithms -- Representing state: Creating a framework to represent problem spaces and solutions -- Graphs: Representing search problems and solutions -- Representing a graph as a concrete data structure -- Exercise: Represent a Graph as a Matrix -- Solution: Represent a Graph as a Matrix -- Trees: The concrete structures used to represent search solutions -- Uninformed search: Looking blindly for solutions -- Breadth-first search: Looking wide before looking deep -- Exercise: Determine the path to the solution -- Solution: Determine the path to the solution -- Depth-first search: Looking deep before looking wide -- Exercise: Determine the path to the solution -- Solution: Determine the path to the solution -- Use cases for uninformed search algorithms -- Optional: More about graph categories -- Optional: More ways to represent graphs -- Incidence matrix -- Adjacency list -- Summary of search fundamentals -- 3 Intelligent search -- Defining heuristics: Designing educated guesses -- Thought Experiment: Given the following scenario, what heuristic can you imagine? -- Thought Experiment: Possible solution -- Informed search: Looking for solutions with guidance -- A* search -- Use cases for informed search algorithms -- Adversarial search: Looking for solutions in a changing environment -- A simple adversarial problem -- Min-max search: Simulate actions and choose the best future -- Heuristics -- Exercise: What values would propagate in the following Min-max tree? …”
Libro electrónico -
641255Publicado 2017Tabla de Contenidos: “…The Git Model of Branches -- Creating a Branch -- Checking Out a Branch -- Adding Content to a Branch -- One Working Directory-Many Branches -- Getting Information about Branches -- Deleting or Renaming a Branch -- Developing with Branches -- Advanced Topics -- Checking Out Non-branch Commits -- Checking Out Individual Files -- Summary -- About Connected Lab 5: Working with Branches -- Connected Lab 5 Working With Branches -- Prerequisites -- Steps -- Chapter 9: Merging Content -- The Basics of Merging -- The Merge Command -- Preparing for a Merge -- Types of Merges -- Rebasing-Merging with History -- Cherry-Picking -- Differences between Cherry-Pick and Rebase -- Merge Operations -- Dealing with Conflicts -- Merging Is a State -- Error Messages for Conflicts -- Aborting the Operation -- Dealing with Conflicts-the Workflow -- Resolution Options and Strategies -- Visual Merging -- Selecting a Merging Tool -- Making Merge Tools Available to Git -- Advanced Topics -- Alternative Style for Conflict Markers -- Advanced Rebasing Scenario -- Interactive Rebasing -- Summary -- About Connected Lab 6: Practicing with Merging -- Connected Lab 6 Practicing with Merging -- Prerequisites -- Steps -- Chapter 10: Supporting Files in Git -- The Git Attributes File -- What Can You Do with This File? …”
Libro electrónico -
641256Publicado 2010Tabla de Contenidos: “…Create closures to lock in data. -- Item 50. Create new subroutines with subroutines. -- Chapter 5 Files and Filehandles -- Item 51. …”
Libro electrónico -
641257Publicado 2022Tabla de Contenidos: “…Enable the Viva Connections App for Both Desktop and Mobile Users -- Enable the App in the Teams Admin Center -- Customize the App Settings -- Details Section -- Icons Section -- Define Policies for the App -- Defining Your Rings for a Phased Rollout -- Define Permission Policies -- A Real-World Scenario -- Assign Permission Policy to Users -- Option 1: Permission Policy Interface -- Option 2: Permission Policy Interface -- Option 3: PowerShell -- Manage Permission Policies with PowerShell -- List the App Permission Policies -- Assign Users to the App Permission Policy -- Unassigning a Custom Policy of the User -- Assigning a Permission Policy to the Groups -- Assign a Permission Policy to Team Members -- Points to Consider -- Make the App Available to End Users -- Define the App Setup Policy -- Install the App -- Pin the App to the Teams App Bar -- Reorder the Apps -- Assigning a Setup Policy to Users -- PowerShell Support -- Assign a Setup Policy to Groups -- PowerShell Support -- Points to Consider -- Viva Connections App in Action -- Conclusion -- Chapter 9: Define Mobile Settings for Viva Connections -- Viva Connections Mobile Experience -- Dashboard -- Feed -- Resources -- Dashboard for Viva Connections Mobile Experience -- Define Settings for the Mobile App -- Conclusion -- Chapter 10: Define End-User Guidance -- End-User Psychology -- How Easy or Difficult Is It? …”
Libro electrónico -
641258Publicado 2022Tabla de Contenidos: “…after Allen 2006: 433 2028c, B6C. -- Dt and nHH in the age of the Coffin Texts -- Figure 10: address to Khepri -- after De Buck 1951: 321 c-d, T1Cb. -- Figure 11: emphatic use of Dt Dt in CT 29 -- after de Buck 1935: 81 m M.C. 105. -- Figure 12: afterlife conditions expressed in CT 759 -- after De Buck 1956: 389 g. -- Dt and nHH as aspects of creation -- Figure 14: an expression of Creation in CT 335 -- after De Buck 1951: 186 Sq1C. -- Figure 13: afterlife conditions expressed in CT 767 -- after De Buck 1956: 399 f. -- Figure 15: Atum is the Nun, as expressed in CT 335 -- after De Buck 1951: 188 c B9Ca. -- Figure 16: Atum in his sun, as expressed in CT 335 -- after De Buck 1951: 191 d. …”
Libro electrónico -
641259Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Acknowledgments -- About the Author -- About the Technical Editor -- Contents at a Glance -- Contents -- Introduction -- About This Book -- The SSCP Seven Domains -- Using This Book to Defeat the Cybersecurity Kill Chain -- Where Do You Go from Here? -- The SSCP CBK and Your Professional Growth Path -- Maintaining the SSCP Certification -- Join a Local Chapter -- Let's Get Started! …”
Libro electrónico -
641260Publicado 2022Tabla de Contenidos: “…Intelligence data structuring and storing -- CTI data structuring -- CTI data storing requirements -- Intelligence data storing strategies -- Summary -- Chapter 8: Effective Defense Tactics and Data Protection -- Technical requirements -- Enforcing the CIA triad - overview -- Enforcing and maintaining confidentiality -- Enforcing and maintaining integrity -- Enforcing and maintaining availability -- Challenges and pitfalls of threat defense mechanisms -- Data security top challenges -- Threat defense mechanisms' pitfalls -- Data monitoring and active analytics -- Benefits of system monitoring -- High-level architecture -- Characteristics of a reliable monitoring system -- Vulnerability assessment and data risk analysis -- Vulnerability assessment methodology -- Vulnerability assessment process -- Vulnerability assessment tools -- Vulnerability and data risk assessment -- Encryption, tokenization, masking and quarantining -- Encryption as a defense mechanism -- Tokenization as a defense mechanism -- Masking and quarantining -- Endpoint management -- Reliable endpoint management requirements -- Mobile endpoint management -- Endpoint data breach use case - point of sale -- Summary -- Chapter 9: AI Applications in Cyber Threat Analytics -- Technical requirements -- AI and CTI -- Cyber threat hunting -- How adversaries can leverage AI -- AI's position in the CTI program and security stack -- AI integration - the IBM QRadar Advisor approach -- QRadar simplified architecture -- Deploying QRadar -- What's in it for you or your organization? …”
Libro electrónico