Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 12
- Engineering & Applied Sciences 11
- Computer Science 10
- Computer software 10
- Computer security 9
- HTML (Document markup language) 9
- Security measures 9
- Computer networks 8
- Design 8
- Web sites 8
- Cascading style sheets 6
- Computer programming 6
- Linux 6
- Netscape Mozilla 6
- Application software 5
- Computer programs 5
- JavaScript (Computer program language) 5
- Open source software 5
- Web site development 5
- Cloud computing 4
- Internet 4
- Internet programming 4
- Software engineering 4
- Biografia 3
- Browsers (Computer programs) 3
- Client/server computing 3
- Computer science 3
- Firefox 3
- Llibrets 3
- Management 3
-
141por Manuel Moreno Lupiáñez“…Darth Vader, E.T., Spiderman o Godzilla son solo algunos de los muchos personajes que se dan cita en este libro, en el que se nos demuestra que la ciencia-ficción, además de ser un apasionante entretenimiento, también puede ser una manera inmejorable de aprender las leyes de la ciencia. …”
Publicado 2017
Texto completo en Odilo
Otros -
142Publicado 1999“…Netscape has opened the source code to Mozilla; IBM supports Apache; major database vendors haved ported their products to Linux. …”
Libro electrónico -
143Publicado 2004Tabla de Contenidos: “…3.6.4 Ximian Evolution -- 3.6.5 Mozilla Mail -- 3.6.6 KMail -- 3.7 Virus detection and prevention -- 3.8 Manageability -- 3.8.1 Telnet -- 3.8.2 SSH -- 3.8.3 Hummingbird Exceed -- 3.8.4 Reflection X -- 3.8.5 Webmin -- 3.8.6 VNC -- 3.9 File systems -- 3.10 Financial device support -- 3.11 Summary -- Chapter 4. …”
Libro electrónico -
144por DiBona, ChrisTabla de Contenidos: “…Building an Open Source Project; 1.2. Young Adulthood-the Mozilla Foundation; 1.3. The Future; 2. Open Source and Proprietary Software Development; 2.1.1.2. …”
Publicado 2005
Libro electrónico -
145por Ferrer Martínez, JuanTabla de Contenidos: “…PRUEBAS Y VERIFICACIÓN DE PÁGINAS WEB -- 4.1 TÉCNICAS DE VERIFICACIÓN -- 4.1.1 VERIFICAR EN BASE A CRITERIOS DE CALIDAD -- 4.1.2 VERIFICAR EN BASE A CRITERIOS DE ACCESIBILIDAD -- 4.2 HERRAMIENTAS DE DEPURACIÓN PARA DISTINTOS NAVEGADORES -- 4.2.1 HERRAMIENTAS PARA MOZILLA -- 4.2.2 HERRAMIENTAS PARA GOOGLE CHROME -- 4.2.3 HERRAMIENTAS PARA INTERNET EXPLORER -- 4.2.4 HERRAMIENTAS PARA OPERA -- 4.2.5 CREACIÓN Y UTILIZACIÓN DE FUNCIONES DE DEPURACIÓN EN JAVASCRIPT -- 4.3 NAVEGADORES: TIPOS Y PLUGINS -- 4.3.1 NAVEGADORES MÁS IMPORTANTES -- 4.3.2 DESCRIPCIÓN DE COMPLEMENTOS -- 4.3.3 COMPLEMENTOS PARA IMÁGENES -- 4.3.4 COMPLEMENTOS PARA MÚSICA -- 4.3.5 COMPLEMENTOS PARA VÍDEO Y CONTENIDO -- 4.3.6 MÁQUINAS VIRTUALES DE PROCESO O APLICACIÓN -- EJERCICIOS PROPUESTOS -- TEST DE CONOCIMIENTOS -- SOLUCIONARIO DE LOS TEST DE CONOCIMIENTOS -- ÍNDICE ALFABÉTICO…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
146Publicado 2014Tabla de Contenidos: “…-- Kinds of Tests -- Unit and Component Testing with Arquillian in Hudson -- Hudson Automated Testing Tips -- Summary -- Chapter 6: Hudson as Part of Your Tool Suite -- IDE Integration -- Creating a New Hudson Job Directly from a NetBeans Project -- Eclipse Hudson Integration -- IntelliJ IDEA Hudson Integration -- JDeveloper Hudson Integration -- Hudson Issue Tracker Integration -- Atlassian JIRA Integration -- Bugzilla Integration -- Other Issue Trackers -- Browser and Desktop Integration -- Browser Integration -- Desktop Integration -- Mobile Integration -- Publishing Build Artifacts from Hudson -- Artifact Repository -- Deploy to Container -- FTP Publisher Plugin -- Summary -- Chapter 7: Distributed Building Using Hudson -- Master-Slave Mode -- Hudson Slaves -- Types of Slaves -- Adding a Slave Node to Hudson -- Adding an Unmanaged Slave via JNLP Launcher -- Adding an SSH-Based Managed Slave -- Distributing the Builds -- Managing Slaves -- Summary -- Chapter 8: Basic Plugin Development -- Writing a HelloWorld Plugin -- Creating the Plugin Project -- Creating a Service Hook -- Building the Plugin -- Testing the Plugin -- HPI Tool -- Creating a Skeleton Plugin Project -- Building and Running the Plugin Project -- Testing the Skeleton Plugin…”
Libro electrónico -
147Publicado 2010“…HTML5 is still evolving, yet browsers such as Safari, Mozilla, Opera, and Chrome already support many of its features -- and mobile browsers are even farther ahead. …”
Libro electrónico -
148por Harper, Frederic. author“…What’s not to like about becoming a rock star developer? The good news—as Mozilla’s senior technology evangelist, Frédéric Harper, writes—is that it’s never been easier to improve your skills, stand out, share more quickly, and grow your network. …”
Publicado 2015
Libro electrónico -
149por Loshin, PeterTabla de Contenidos: “…1.6.7 Business People and IT Professionals1.6.8 Others; 1.6.9 The Benefit of Having Diverse Users; 1.7 How Do I Use Tor; 1.7.1 Plan Ahead and Learn Tor Now; 1.7.2 TBB or Tails; 1.7.3 Tor Browser Bundle; 1.7.4 Tails; 1.7.5 What Can Go Wrong; 1.8 Using Tor Safely; 1.8.1 Use the Tor Browser; 1.8.2 Don't Open Documents; 1.8.3 Don't Install or Enable Browser Plugins; 1.8.4 Avoid Websites that Are Not HTTPS-Enabled; 1.8.5 Use Bridges/Find Company; 2 Using the Tor Browser Bundle; 2.1 What Is Bundled in the Tor Browser Bundle; 2.1.1 Vidalia; 2.1.2 Tor; 2.1.3 Mozilla Firefox ESR+Torbutton…”
Publicado 2013
Libro electrónico -
150Publicado 2017Tabla de Contenidos: “…. -- See also -- Chapter 8: Web Browser Forensics -- Introduction -- Mozilla Firefox analysis with BlackBag's BlackLight -- Getting ready -- How to do it... -- How it works... -- See also -- Google Chrome analysis with Magnet AXIOM -- Getting ready -- How to do it... -- How it works... -- See also -- Microsoft Internet Explorer and Microsoft Edge analysis with Belkasoft Evidence Center -- Getting ready -- How to do it... -- How it works... -- See also -- Extracting web browser data from Pagefile.sys -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 9: Email and Instant Messaging Forensics -- Introduction -- Outlook mailbox parsing with Intella -- Getting ready -- How to do it... -- How it works... -- See also -- Thunderbird mailbox parsing with Autopsy -- Getting ready -- How to do it... -- How it works... -- See also -- Webmail analysis with Magnet AXIOM -- Getting ready -- How to do it... -- How it works... -- See also -- Skype forensics with Belkasoft Evidence Center -- Getting ready -- How to do it... -- How it works... -- See also -- Skype forensics with SkypeLogView -- Getting ready…”
Libro electrónico -
151Publicado 2015Tabla de Contenidos: “…Intermediale Verschränkungen 109 Intermedialität als Bedingung von Theater: methodische Überlegungen 117 Multi-, Trans- und Intermedialität: drei unterschiedliche Perspektiven auf die Beziehungen zwischen den Medien 125 The Use of Audio-visual Media in Italian Futurist Theatre 133 Das intermediale Jahrhundert: die Saison 1922/23 141 Medium, Theater und Film bei Beckett 161 Bilder, die das Auge berührt - Zum Verhältnis von Film und Körperkunst bei Matthew Barney 171 Lars von Trier und Volker Lösch erkunden ihr Medium in »Dogville« 179 Seriendramaturgien als Performance? …”
Electrónico -
152por Gasston, PeterTabla de Contenidos: “…Device Apis -- Geolocation -- Orientation -- Fullscreen -- Vibration -- Battery Status -- Network Information -- Camera and Microphone -- Web Storage -- Drag and Drop -- Interacting with Files -- Mozilla's Firefox OS and WebAPIs -- PhoneGap and Native Wrappers -- Summary -- G. …”
Publicado 2013
Libro electrónico -
153Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Spoofing Mozilla Firefox in your client code -- How to do it... -- How it works... -- Saving bandwidth in web requests with the HTTP compression -- How to do it... -- How it works... -- Writing an HTTP fail-over client with resume and partial downloading -- How to do it... -- How it works... -- Writing a simple HTTPS server code with Python and OpenSSL -- Getting ready -- How to do it... -- How it works... -- Building asynchronous network applications with Twisted -- Getting ready -- How to do it... -- How it works... -- Building asynchronous network applications with Tornado -- Getting ready -- How to do it... -- How it works... -- Building concurrent applications with Tornado Future -- Getting ready -- How to do it... -- How it works... -- Chapter 5: Email Protocols, FTP, and CGI Programming -- Introduction -- Listing the files in a remote FTP server -- Getting ready -- How to do it... -- How it works... -- Common error -- Uploading a local file to a remote FTP server -- Getting ready -- How to do it... -- How it works... -- Emailing your current working directory as a compressed ZIP file -- Getting ready -- How to do it... -- How it works... -- See also -- Downloading your Google email with POP3 -- Getting ready -- How to do it... -- How it works... -- Checking your remote email with IMAP -- Getting ready -- How to do it... -- How it works... -- Sending an email with an attachment via Gmail SMTP server -- Getting ready -- How to do it... -- How it works... -- Writing a guestbook for your (Python-based) web server with CGI -- Getting ready -- How to do it... -- How it works... -- Finding the mail server from an email address -- Getting ready…”
Libro electrónico -
154Publicado 2024Tabla de Contenidos: “…Understanding DevSecOps in the planning phase -- Understanding threat modeling and its benefits -- Traditional threat modeling frameworks -- Threat modeling in DevSecOps -- Understanding the Mozilla RRA process -- Hands-on exercise 1 - Provisioning the lab VM -- Task 1 - Initializing the template deployment to Azure -- Task 2 - Connecting to the lab VM using Azure Bastion -- Hands-on exercise 2 - Performing threat modeling of an e-commerce application -- Task 1 - Downloading and installing the Microsoft Threat Modeling Tool -- Task 2 - Creating a threat model diagram for the eShop application -- Task 3 - Running a threat analysis on the model -- Implementing continuous code-to-cloud security training -- Summary -- Further reading -- Chapter 4: Implementing Pre-Commit Security Controls -- Technical requirements -- Overview of the pre-commit coding phase of DevOps -- Understanding the developer environment options -- Understanding the security categories in the pre-commit phase -- Securing the development environment -- Risk 1 - IDE vulnerability risks -- Risk 2 - Malicious and vulnerable IDE extensions -- Risk 3 - Working with untrusted code -- Risk 4 - Compromised IDE source code -- Additional thoughts on hardening of the development environment -- Addressing common development security mistakes -- Risk 1 - Addressing in-house code vulnerability risk -- Risk 2 - Open source component risk -- Risk 3 - Exposed secret risk -- Choosing the right developer-first security tooling -- Hands-on exercise 1 - Performing code review, dependency checks, and secret scanning on the IDE -- Task 1 - Connecting to the lab VM using Azure Bastion -- Task 2 - Configuring Snyk on Visual Studio Code -- Task 3 - Importing eShopOnWeb to your Visual Studio Code workspace -- Hands-on exercise 2 - Installing and configuring Git pre-commit hooks on the IDE…”
Libro electrónico -
155Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introducing WebDriver and WebElements -- Selenium Testing Tools -- Selenium WebDriver -- Selenium Server -- Selenium IDE -- Differences between Selenium 2 and Selenium 3 -- Handling the browser -- Having better APIs -- Having developer support and advanced functionalities -- Testing Mobile Apps with Appium -- Setting up a project in Eclipse with Maven and TestNG using Java -- WebElements -- Locating WebElements using WebDriver -- The findElement method -- The findElements method -- Inspecting Elements with Developer Tools -- Inspecting pages and elements with Mozilla Firefox -- Inspecting pages and elements in Google Chrome with Developer Tools -- Using the By locating mechanism -- The By.id() method -- The By.name() method -- The By.className() method -- The By.linkText() method -- The By.partialLinkText() method -- The By.tagName() method -- The By.xpath() method -- The By.cssSelector() method -- Interacting with WebElements -- Getting element properties and attributes -- The getAttribute() method -- The getText() method -- The getCssValue() method -- The getLocation() method -- The getSize() method -- The getTagName() method -- Performing actions on WebElements -- The sendKeys() method -- The clear() method -- The submit() method -- Checking the WebElement state -- The isDisplayed() method -- The isEnabled() method -- The isSelected() method -- Summary -- Questions -- Further information -- Chapter 2: Different Available WebDrivers -- Firefox Driver -- Using GeckoDriver -- Using Headless Mode -- Understanding the Firefox profile -- Adding the extension to Firefox -- Storing and retrieving a profile -- Dealing with Firefox preferences -- Setting preferences -- Understanding frozen preferences -- Chrome Driver…”
Libro electrónico -
156Publicado 2017Tabla de Contenidos: “…-- Warnings When Using the TOR Network -- Virtual Private Networks -- SSH Tunneling -- Using Proxy Server -- Web Proxy Types -- Security Risks Associated With Proxy Servers -- Anonymous Search Engine -- StartPage -- DUCKDUCKGO -- DISCONNECT SEARCH -- Web Browser Privacy Add-Ons -- Check Browser Fingerprint -- BrowserLeaks.com (https://www.browserleaks.com) -- Panopticlick (https://panopticlick.eff.org) -- Mozilla Firefox Privacy Add-Ons -- HTTPS Everywhere -- Disconnect -- Privacy Badger -- Self-Destructing Cookies -- uBlock Origin -- Random Agent Spoofer -- Secure Anonymous File Sharing -- OnionShare -- ENCRYPTING EMAIL COMMUNICATIONS -- Email Encryption Using Gpg4Win -- Public and Private Key Concept in Encryption -- What Is a Digital Signature Concept? …”
Libro electrónico -
157por Rodriguez, Juan R.Tabla de Contenidos: “…SUSE Linux sample installation -- Installing SUSE Linux -- Planning considerations -- Installing SUSE Linux Enterprise Server V8 -- Configuring the SUSE Linux post installation -- Installing SUSE Linux V8 Service Pack 3 -- Installing and updating Perl -- Configuring IBM Java Runtime Environment V1.3.1 -- Installing Mozilla Web browser (optional) -- Starting VMWare toolbox (optional) -- Configuring the network -- Configuring TCP/IP network -- Configuring Samba -- Common commands -- Appendix B. …”
Publicado 2005
Libro electrónico -
158Publicado 2010Tabla de Contenidos: “…-- Putting It All Together -- Chapter 7 Color and Background Properties -- Choosing Color Values -- Color keywords -- RGB hex values -- RGB decimal values -- Percentage values -- New in CSS3: HSL values -- New in CSS3: Color alpha values -- New in CSS3: Color Gradients in Backgrounds -- Internet Explorer gradients -- Mozilla gradients -- Webkit gradients -- Choosing Your Color Palette -- Color wheel basics -- Online color scheme tools -- Setting Text Color -- Setting a Background Color -- Setting a Background Image -- Using Background Shorthand -- Putting It All Together -- Chapter 8 List and Table Properties -- Setting the Bullet Style -- Creating Your Own Bullets -- Setting Bullet Positions -- Setting Multiple List Styles -- Setting the Table Layout -- Setting the Space Between Table Cells…”
Libro electrónico -
159por Sepúlveda Maillo, David Rodríguez deTabla de Contenidos: “….) -- 9.1 ACCESO A GMAIL -- 9.2 ESTRUCTURA DE GOOGLE GMAIL -- 9.3 MANDAR CORREO NUEVO -- 9.4 RESPONDER O REENVIAR UN CORREO A OTROS -- 9.5 BUSCAR CORREOS -- 9.6 CERRAR EL CORREO -- 9.7 SEGURIDAD EN GMAIL -- 9.7.1 Comprobar últimas conexiones -- 9.7.2 Sistemas de accesos seguros -- 9.8 UNIR GOOGLE GMAIL A UN GESTOR DE CORREO ELECTRÓNICO -- 9.9 MOZILLA THUNDERBIRD -- 9.10 CORREO WEB VS. CORREO DESCARGADO -- 9.11 SPAM Y SEGURIDAD -- 10 GOOGLE +. …”
Publicado 2016
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
160