Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 24
- Application software 20
- Cloud computing 13
- Open source software 7
- Application program interfaces (Computer software) 6
- Computer networks 6
- Computer software 6
- Web applications 6
- Linux 5
- Management 5
- Web site development 5
- Computer security 4
- Computer programs 3
- History and criticism 3
- Java (Computer program language) 3
- Kubernetes 3
- Operating systems (Computers) 3
- Photography 3
- Python (Computer program language) 3
- Software architecture 3
- Architecture 2
- C# (Computer program language) 2
- Cascading style sheets 2
- Computer programming 2
- Dickens, Charles 2
- Digital techniques 2
- Electronic data processing 2
- History 2
- Image processing 2
- Information technology 2
-
81por Scoppettuolo, DionTabla de Contenidos: “…Making Adjustments in Full Screen View -- Enhancing an Image -- Improving Highlights and Shadows -- Adjusting Image Levels -- Converting Color Images to Black and White -- Comparing Image Versions -- Lesson Review -- Lesson 8 Correcting Color -- Working with Color in the Enhance Controls -- Controlling Image Vibrancy -- Selectively Improving Color Using the Color Controls -- Working with Curves -- Correcting Chromatic Aberration -- Working with an External Editor -- Lesson Review -- Lesson 9 Making Local Adjustments with Brushes -- Using Brushes -- Adding and Erasing Brush Strokes -- Smoothing Skin -- Brightening Areas Using the Dodge Brush -- Darkening Areas Using the Burn Brush -- Applying a Brush to an Entire Image -- Correcting Halo Artifacts -- Retouching Images -- Cloning an Image -- Making a Brush from an Adjustment -- Creating Multiple Instances of a Brush -- Lesson Review -- Lesson 10 Working with RAW Images -- Working with RAW+JPEG Pairs -- Comparing RAW and JPEG Files -- Decoding a RAW File -- Adjusting Boost and Hue Boost -- Using Sharpening and Noise Reduction -- Removing Moire from RAW Images -- Saving RAW Fine-Tuning Presets -- Working with DNG Files -- Lesson Review -- Cameo: Don Holtz -- Sharing Your Work -- Lesson 11 Creating Dynamic Slideshows -- Using Slideshow Presets and Albums -- Using Slideshow Presets -- Creating a Slideshow Album -- Enhancing Slideshows -- Using Titles, Transitions, and Photo Effects -- Mixing Music and Sound Effects -- Working with Video -- Editing to the Beat -- Editing on the Fly -- Sharing Your Slideshow -- Lesson Review -- Lesson 12 Presenting Your Photos on the Web -- Posting to Facebook, Flickr, and MobileMe -- Creating a Web Journal -- Adding Images to a Web Journal -- Changing and Modifying Web Journal Themes -- Publishing a Web Journal -- Lesson Review…”
Publicado 2010
Libro electrónico -
82Publicado 2017“…Virtual machines loaded with full operating systems and thousands of utilities don’t make sense in the cloud. They waste resources and provide a wide attack surface with a target-rich environment, as demonstrated by massive data breaches in the past few years. …”
Libro electrónico -
83Publicado 2019“…There are even more reasons, but make sure you don't get left behind! You as a network engineer start learning Linux. …”
-
84Publicado 2017“…With the Amazon Web Services cloud platform, you can trade expensive glass room hardware and custom infrastructure for virtual servers and easy-to-configure storage, security, and networking services. Better, because you don't own the hardware, you only pay for the computing power you need! …”
Libro electrónico -
85por Thengvall, Mary. author“…Don’t get left behind – join the community today…”
Publicado 2018
Libro electrónico -
86Publicado 2024Tabla de Contenidos:Libro electrónico
-
87Publicado 2016Tabla de Contenidos: “…CONSIDERACIONES SOBRIAS / TRANSARCHIPELISCHES DENKEN -- GEDANKEN ÜBER UNSICHTBARE INSELGRUPPEN / LA GRANDE DÉS-ORIENTATION. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
88Publicado 2021Tabla de Contenidos: “…Development environment setup -- A.1 Setting up an IDE -- A.1.1 Visual Studio -- A.1.2 Visual Studio Code -- A.1.3 JetBrains Rider -- A.2 Setting up the dotnet command-line interface -- A.3 Setting up REST client in VS Code -- A.4 Docker and Kubernetes -- A.5 Azure CLI -- further reading -- index -- inside back cover…”
Libro electrónico -
89Publicado 2018Libro electrónico
-
90Publicado 2022Tabla de Contenidos: “…183 Producing easy metrics 183 Benefiting from just-in-time training 184 Differentiating between risky and secure users. 184 Planning a Phishing Program 185 Identifying the players 185 Obtaining permission and buy-in. 186 Allocating enough time for phishing simulations. 187 Choosing responsive tools. 187 Choosing a Phishing Tool. 188 Creating custom phishing tools. 188 Choosing vendor options. 189 Implementing a Phishing Simulation Program. 192 Integrating Active Directory. 192 Working with subcultures and geographies. 193 Choosing languages 193 Registering phishing domains. 194 Defining program goals 194 Collecting Day 0 metrics. 194 Running a Phishing Simulation. 195 Determining the targets. 195 Preparing the lures. 196 Creating landing pages. 200 Addressing logistical concerns 201 Conducting a pilot test. 203 Tracking Metrics and Identifying Trends. 204 Dealing with Repeat Offenders. 205 Management Reporting. 206 Part 4: the Part of Tens. 207 Chapter 13: Ten Ways to Win Support for Your Awareness Program. 209 Finding Yourself a Champion. 209 Setting the Right Expectations. 210 Addressing Business Concerns. 211 Creating an Executive Program. 211 Starting Small and Simple 212 Finding a Problem to Solve 212 Establishing Credibility. 213 Highlighting Actual Incidents. 213 Security Awareness For Dummies Being Responsive 213 Looking for Similar Programs 214 Chapter 14: Ten Ways to Make Friends and Influence People. 215 Garnering Active Executive Support. 215 Courting the Organization's Influencers 216 Supporting Another Project That Has Support. 216 Choosing Topics Important to Individuals. 217 Having Some Fun Events 218 Don't Promise Perfection. 218 Don't Overdo the FUD Factor. 218 Scoring an Early Win. 219 Using Real Gamification. 219 Integrating the Organization's Mission Statement. 220 Chapter 15: Ten Fundamental Awareness Topics. 221 Phishing 221 Business Email Compromise. 222 Mobile Device Security. 222 Home Network and Computer Security. 223 Password Security. 223 Social Media Security 223 Physical Security 224 Malware and Ransomware 224 Social Engineering. 225 It Can Happen to You. 225 Chapter 16: Ten Helpful Security Awareness Resources. 227 Security Awareness Special Interest Group. 228 CybSafe Research Library. 228 Cybersecurity Culture Guidelines. 229 RSA Conference Library. 229 You Can Stop Stupid. 229 The Work of Sydney Dekker. 230 Human Factors Knowledge Area. 230 People-Centric Security 230 Human Security Engineering Consortium. 231 How to Run a Security Awareness Program Course 231 Appendix: Sample Questionnaire 233 Index…”
Libro electrónico -
91Publicado 2023Tabla de Contenidos: “…Security considerations -- Monitoring considerations -- Summary -- Chapter 6: Verifying Your Code -- Technical requirements -- Building code in a CI/CD pipeline -- Compiling Java with javac -- Compiling Java with Maven -- Compiling C with Gnu Compiler Collection (GCC) -- Storing built code as artifacts -- Checking code quality in a CI/CD pipeline -- Enabling Code Quality -- Viewing Code Quality results -- Running automated functional tests in a CI/CD pipeline -- Enabling automated functional tests -- Viewing automated functional test results -- Fuzz testing in a CI/CD pipeline -- The architecture and workflow of fuzz testing -- A fuzz testing workflow -- Viewing the results of fuzz testing -- Extra considerations when fuzz testing -- Fuzz testing with a corpus -- Checking accessibility in a CI/CD pipeline -- Enabling accessibility testing -- Viewing accessibility testing results -- Additional ways to verify your code -- Code coverage -- Browser performance testing -- Load performance testing -- Summary -- Chapter 7: Securing Your Code -- Technical requirements -- Understanding GitLab's security scanning strategy -- GitLab uses open-source scanners -- Scanners are packaged as Docker images -- Some scanners use different analyzers for different languages -- Vulnerabilities don't stop the pipeline -- Findings appear in three different reports -- Pipelines can use non-GitLab-provided scanners -- Using SAST to scan your source code for vulnerabilities -- Understanding SAST -- Enabling SAST -- Configuring SAST -- Viewing SAST's findings -- Using Secret Detection to find private information in your repository -- Understanding Secret Detection -- Enabling and configuring Secret Detection -- Viewing Secret Detection's findings -- Using DAST to find vulnerabilities in web applications -- Understanding DAST -- Enabling and configuring DAST…”
Libro electrónico -
92Publicado 2018Tabla de Contenidos: “…-- Design principles -- You Ain't Gonna Need It -- Don't Repeat Yourself -- Keep it simple, stupid -- Occam's razor -- SOLID principles -- Connect 4 -- Requirements -- Test-last implementation of Connect 4 -- Requirement 1 - the game's board -- Requirement 2 - introducing discs -- Requirement 3 - player shifts -- Requirement 4 - the game's output -- Requirement 5 - win conditions (I) -- Requirement 6 - win condition (II) -- Requirement 7 - win condition (III) -- Requirement 8 - win condition (IV) -- The TDD or test-first implementation -- Hamcrest -- Requirement 1 - the game's board -- Requirement 2 - introducing discs -- Requirement 3 - player shifts -- Requirement 4 - the game's output -- Requirement 5 - win condition (I) -- Requirement 6 - win condition (II) -- Requirement 7 - win condition (III) -- Requirement 8 - win condition (IV) -- Final considerations -- Summary -- Chapter 6: Mocking - Removing External Dependencies -- Mocking -- Why mocks? …”
Libro electrónico -
93
-
94Publicado 2023Tabla de Contenidos: “…-- 1.4 What you will learn in this book -- Summary -- 2 Introducing Behavior-Driven Development -- 2.1 BDD was originally designed to make teaching TDD easier -- 2.2 BDD also works well for requirements analysis -- 2.3 BDD principles and practices -- 2.3.1 Focus on features that deliver business value -- 2.3.2 Work together to specify features -- 2.3.3 Embrace uncertainty -- 2.3.4 Illustrate features with concrete examples -- 2.3.5 A Gherkin primer -- 2.3.6 Don't write automated tests -- write executable specifications -- 2.3.7 These principles also apply to unit tests -- 2.3.8 Deliver living documentation -- 2.3.9 Use living documentation to support ongoing maintenance work -- 2.4 Benefits of BDD -- 2.4.1 Reduced waste -- 2.4.2 Reduced costs -- 2.4.3 Easier and safer changes -- 2.4.4 Faster releases -- 2.5 Disadvantages and potential challenges of BDD -- 2.5.1 BDD requires high business engagement and collaboration -- 2.5.2 BDD works best in an Agile or iterative context -- 2.5.3 BDD doesn't work well in a silo -- 2.5.4 Poorly written tests can lead to higher test-maintenance costs -- Summary…”
Libro electrónico -
95Publicado 2024Libro electrónico
-
96por Tank, WAI Architecture ThinkTabla de Contenidos: “…Intro -- Cover -- Title -- Contents -- Introduction: How to read Universal Principles of Architecture -- Archetypes -- 1 Volumetric Archetypes: Architectures of pure geometric forms and their combinations -- 2 Spatial Archetypes: Design by addition, subtraction, and other strategies of space -- 3 Organizational Archetypes: Architectures of centrality, axiality, networks, layering, and stacking -- 4 Square Archetypes: Closed, nuclear, dominated, grouped, and amorphous open spaces -- 5 Megalithic Archetypes: Dolmens, menhirs, inukshuks, and other structures in stone -- 6 Vitruvian Archetypes: Ordering, composition, proportion, symmetry, decorum, and economy -- 7 Figurative Archetypes: Forms and shapes that are representative of something else -- 8 Hardcorist Archetypes: Architecture designed as pure formal exploration -- 9 Five Points: Designing free plan, free structure, garden roof, pilotis, and free facades -- 10 Nonsolid Architectures: Architectures that are not made of conventionally solid materials -- 11 Void: Carved, dug, buried, and other forms of architectures of subtraction -- 12 Ornament: Decoration in the facades, structures, and interiors of architecture -- 13 Megastructure: Very big terrestrial, aquatic, flying, cosmic, extraplanetary structures -- 14 Super Tall: Structures, buildings, and spaces reaching extraordinary heights -- 15 Stealth: Architectures of disappearance, disguise, and camouflage -- 16 Blob: Amorphous, shapeless, and irregularly shaped architectures -- 17 Topo Architecture: Buildings, structures, and spaces that are also landscape -- 18 Parasitic Architectures: Structures attached to or protruding from other buildings -- 19 Infrastructural Architecture: Buildings that are also bridges, tunnels, and other forms of utilities -- 20 Big Box: Very large buildings contained inside a single-facade envelope -- Methods…”
Publicado 2023
Libro electrónico -
97Publicado 2018“…Flow makes catching errors easier. Docker containers make deployment in a stack simpler. …”
Libro electrónico -
98
-
99
-
100por Toole, John Kennedy, 1937-1969“…Su autor ha sido comparado a Cervantes, Fielding, Swift, Rabelais, Dickens... Resulta imposible resumir la trama picaresca y siempre sorprendente de esta obra, ambientada en Nueva Orleans y sus bajos fondos. …”
Publicado 2013
Libro