Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Development 355
- History 349
- Application software 303
- Engineering & Applied Sciences 237
- Computer Science 177
- Filosofía 152
- Computer programs 138
- Management 129
- Crítica e interpretación 124
- Computer networks 113
- Computer security 113
- Web site development 109
- Java (Computer program language) 107
- Security measures 102
- Computer programming 97
- Cloud computing 94
- Computer software 94
- Microsoft .NET Framework 94
- Historia y crítica 93
- Internet programming 80
- Biblia 76
- Programming 76
- Software engineering 71
- Cristianismo 70
- Artificial intelligence 69
- Job hunting 68
- History and criticism 66
- Design 65
- Business & Economics 63
-
6041PowerShell 7 Workshop Learn How to Program with PowerShell 7 on Windows, Linux, and the Raspberry PiPublicado 2024Tabla de Contenidos: “…- redux -- Discovering value types -- Booleans -- Integers -- Real numbers -- Char -- Typing explained -- Dynamic versus static typing -- Casting variables -- Navigating reference types -- Arrays -- Strings -- Hashtables -- Splatting - a cool use for hashtables -- Summary -- Exercises -- Further reading -- Chapter 5: PowerShell Control Flow - Conditionals and Loops -- An introduction to IDEs and VS Code -- Installing VS Code -- Configuring VS Code for PowerShell -- Conditional control - if, else, elseif, and switch -- The if statement -- The switch statement -- Loops - foreach, do while, do until, while, for -- The foreach loop statement -- The do while and do until loop statements -- The while loop -- The for loop -- Breaking and continuing -- The break statement -- The continue statement -- Let's play a game -- Summary -- Exercises -- Further reading -- Chapter 6: PowerShell and Files - Reading, Writing, and Manipulating Data -- Understanding formatting -- Format-List -- Format-Table -- Format-Wide -- Formatting gotchas -- Writing a text file -- Using ConvertTo- and Export- cmdlets -- CSV -- XML -- HTML -- Handling files -- A brief note about PSProviders and PSDrives -- Item- cmdlets -- Working with files -- Get-Content -- Import- cmdlets -- Let's have some fun - measuring the most frequent words in a text file -- Summary -- Exercises -- Further reading -- Chapter 7: PowerShell and the Web - HTTP, REST, and JSON -- Working with HTTP -- Why don't we see Forms information in PowerShell 7? …”
Libro electrónico -
6042Publicado 2018Tabla de Contenidos: “…Marquardt, Katelin R. Knight, Hunter Bane, Alice Barber and Robert K. DeLong ZnO Nanoparticles Protect RNA from Degradation Better than DNA Reprinted from: Nanomaterials 2017, 7, 378, doi: 10.3390/nano7110378 -- Jin Yu, Hyeon-Jin Kim, Mi-Ran Go, Song-Hwa Bae and Soo-Jin Choi ZnO Interactions with Biomatrices: Effect of Particle Size on ZnO-Protein Corona Reprinted from: Nanomaterials 2017, 7, 377, doi: 10.3390/nano7110377 -- Alberto Casu, Andrea Lamberti, Stefano Stassi and Andrea Falqui Crystallization of TiO2 Nanotubes by In Situ Heating TEM Reprinted from: Nanomaterials 2018, 8, 40, doi: 10.3390/nano8010040…”
Libro electrónico -
6043Publicado 2024Tabla de Contenidos: “…Identifying organizational infrastructure -- Data leakage on job websites -- Finding vulnerable systems using Shodan -- Discovering exposed systems with Censys -- Mapping external systems using Maltego -- Identifying infrastructure with Netcraft -- Using Recon-ng for data harvesting -- Data collection with theHarvester -- Harvesting employees' data using Hunter -- Automating social media reconnaissance with Sherlock -- Summary -- Further reading -- Chapter 6: Active Reconnaissance -- Technical requirements -- Understanding active information -- Profiling websites using EyeWitness -- Exploring active scanning techniques -- Changing your MAC address -- Performing live host discovery -- Identifying open ports, services, and operating systems -- Using scanning evasion techniques -- Avoiding detection with decoys -- Using MAC and IP spoofing techniques -- Stealth scanning techniques -- Enumerating network services -- Enumerating SMB services -- Enumerating SMTP services -- Enumerating SNMP services -- Discovering data leaks in the cloud -- Summary -- Further reading -- Chapter 7: Performing Vulnerability Assessments -- Technical requirements -- Getting started with Nessus -- Part 1 - installing Nessus -- Part 2 - identifying vulnerabilities -- Part 3 - vulnerability analysis -- Part 4 - exporting vulnerability reports -- Vulnerability identification using Nmap -- Working with Greenbone Vulnerability Manager -- Part 1 - installing GVM -- Part 2 - vulnerability identification -- Part 3 - vulnerability analysis and reporting -- Using web application scanners -- WhatWeb -- Nmap -- Nikto -- Metasploit -- WPScan -- Summary -- Further reading -- Chapter 8: Understanding Network Penetration Testing -- Technical requirements -- Introduction to network penetration testing -- Working with bind and reverse shells -- Working with remote shells using Netcat…”
Libro electrónico -
6044Publicado 2024Tabla de Contenidos: “…Dead-letter queues (DLQs) -- Event sourcing -- Command query responsibility segregation (CQRS) -- Securing Lambda functions -- Code integrity -- Secure environment variables -- Runtime protection -- Lambda function versioning and aliases -- Access control -- Networking -- Execution limits -- Monitoring and logging -- Summary -- Questions -- Answers -- Further reading -- Chapter 8: Secure Design Patterns for Multi-tenancy in Shared Environments -- Understanding multi-tenancy concepts and challenges -- Definition and importance of multi-tenancy -- Challenges in multi-tenancy -- Multi-tenancy design patterns -- The silo model -- The pool model -- The bridge model -- Choosing the right design pattern -- Implementing secure data isolation techniques -- Network-level isolation -- Database-level Isolation -- Compute-level Isolation -- Application-level isolation -- Encryption-level isolation -- Managing access control for tenants -- Tenant authentication -- Implementing access control -- Tenant-managed access control -- Summary -- Questions -- Answers -- Further readings -- Chapter 9: Automate-Everything to Build Immutable and Ephemeral Resources -- From manual to programmatic management -- Manual and programmatic management defined -- Risks of manual resource management -- Shift to programmatic management -- Snowflake versus Phoenix systems -- IaC frameworks -- Benefits of adopting IaC -- Automated security testing -- Treating infrastructure as software -- Security testing in IaC pipelines -- Tools for automated security scanning -- Security best practices for IaC -- Apply least privileges -- Handle secrets securely -- Ensure compliance -- The Automate-Everything approach -- Summary -- Questions -- Answers -- Further reading -- Part 3: Monitoring, Automation and Continuous Improvement -- Chapter 10: Advanced Logging, Auditing, and Monitoring in AWS…”
Libro electrónico -
6045Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to WinUI and Windows Applications -- Chapter 1: Introduction to WinUI -- Technical requirements -- Before UWP - Windows 8 XAML applications -- Windows application UI design -- Windows Runtime (WinRT) -- User backlash and the path forward to Windows 10 -- Windows 10 and UWP application development -- Language choice with UWP development -- Lifting app restrictions -- UWP backward compatibility -- What is XAML? …”
Libro electrónico -
6046Publicado 2024Tabla de Contenidos: “…Installing Anaconda on Mac OS X -- Downloading the Datasets and Example Code -- Using Jupyter Notebook -- Starting Jupyter Notebook -- Stopping the Jupyter Notebook server -- Defining the code repository -- Defining a new folder -- Creating a new notebook -- Adding notebook content -- Exporting a notebook -- Removing a notebook -- Importing a notebook -- Understanding the datasets used in this book -- Chapter 4 Working with Google Colab -- Defining Google Colab -- Understanding what Google Colab does -- Considering the online coding difference -- Using local runtime support -- Working with Notebooks -- Creating a new notebook -- Opening existing notebooks -- Using Google Drive for existing notebooks -- Using GitHub for existing notebooks -- Using local storage for existing notebooks -- Saving notebooks -- Using Drive to save notebooks -- Using GitHub to save notebooks -- Using GitHub gists to save notebooks -- Downloading notebooks -- Performing Common Tasks -- Creating code cells -- Creating text cells -- Creating special cells -- Editing cells -- Moving cells -- Using Hardware Acceleration -- Executing the Code -- Viewing Your Notebook -- Displaying the table of contents -- Getting notebook information -- Checking code execution -- Sharing Your Notebook -- Getting Help -- Part 2 Getting Your Hands Dirty with Data -- Chapter 5 Working with Jupyter Notebook -- Using Jupyter Notebook -- Working with styles -- Getting Python help -- Using magic functions -- Obtaining the magic functions list -- Working with magic functions -- Discovering objects -- Getting object help -- Obtaining object specifics -- Using extended Python object help -- Restarting the kernel -- Restoring a checkpoint -- Performing Multimedia and Graphic Integration -- Embedding plots and other images -- Loading examples from online sites -- Obtaining online graphics and multimedia…”
Libro electrónico -
6047Publicado 2024Tabla de Contenidos: “…. -- See also -- Creating visualizations from runtime fields -- Getting ready…”
Libro electrónico -
6048por Dowswell, KurtTabla de Contenidos: “…Expanding Your Conversation to a New Window -- Shifting the Conversation to the Right -- Utilizing Inline Chat -- Discovering Quick Chat -- Defining Prompt Engineering with Copilot Chat -- Understanding the Basics -- Prompting for Code -- Prompting for Solutions -- Having a Single Clear Objective -- Specifying a Specific Technology -- Keeping Prompts Short -- Gaining Context in Chat -- Open Tabs Context -- Editor Context -- File Context -- Selection Context -- Commanding Your Conversation with Precision -- Querying with @workspace -- Learning with /explain -- Generating Tests with /tests -- Finding a Fix with /fix -- Scaffolding with /new -- Crafting with /newNotebook -- Engaging with @vscode -- Inquiring with /api -- Learning with @terminal -- Conclusion -- Part III Practical Applications of GitHub Copilot -- Chapter 5 Learning a New Programming Language -- Introducing Language Education with Copilot -- Setting Up Your Development Environment -- Prerequisites -- Setup Guide -- Learning the Basics -- Prerequisites -- Learning C# with Copilot -- Creating a Console Application -- Prerequisites -- Creating a C# Console Application with Copilot -- Explaining Code with Copilot -- Adding New Code -- Learning to Test -- Creating Context with Selection -- Creating Context with Tags -- Running Tests -- Conclusion -- Reference -- Chapter 6 Writing Tests with Copilot -- Establishing the Example Project -- Prerequisites -- Adding Unit Tests to Existing Code -- Driving Unit Test Creation with Comments -- Using Inline Chat to Generate Tests -- Exploring Behavior-Driven Development with Copilot -- Adding User Accounts -- Setup -- End-to-End Tests -- Conclusion -- Chapter 7 Diagnosing and Resolving Bugs -- Establishing the Example Project -- Prerequisites -- Fixing Syntax Errors -- Resolving Runtime Exceptions -- Setup -- Resolving Terminal Errors -- Conclusion…”
Publicado 2024
Libro electrónico -
6049Publicado 2022Tabla de Contenidos: “…Chapter 6: Using Query Store for Query Performance and Execution Plans -- Query Store Function and Design -- Information Collected by Query Store -- Query Runtime Data -- Controlling Query Store -- Capture Mode -- Query Store Reporting -- Plan Forcing -- Forcing Query Hints -- Optimized Plan Forcing -- Query Store for Upgrades -- Summary -- Chapter 7: Execution Plan Cache Behavior -- Querying the Plan Cache -- Execution Plan Caching and Plan Reuse -- Ad Hoc Workload -- Optimize for Ad Hoc Workload -- Simple Parameterization -- Forced Parameterization -- Prepared Workload -- Stored Procedure -- Stored Procedure Compiled on Initial Execution -- Performance Benefits of Stored Procedures -- Nonperformance Benefits of Stored Procedures -- sp_executesql -- Prepare/Execute Model -- Query Hash and Query Plan Hash -- Execution Plan Cache Recommendations -- Explicitly Parameterize Values in Your Query -- Use Stored Procedures Where You Can -- Use sp_executesql As an Alternative to Stored Procedures -- Take Advantage of the Prepare/Execute Model -- Avoid Ad Hoc Queries -- Enable Optimize For Ad Hoc -- Summary -- Chapter 8: Query Recompilation -- Benefits and Drawbacks of Recompilation -- Identifying the Statement Being Recompiled -- Analyzing Causes of Recompilation -- Deferred Object Resolution -- Recompilation on a Table -- Recompilation on a Temporary Table -- Avoiding Recompiles -- Avoid Interleaving DDL and DML Statements -- Reduce Recompilation Caused by Statistics Changes -- Use the KEEPFIXED PLAN Hint -- Disable Automatic Statistics Maintenance on a Table -- Use Table Variables -- Use Temporary Tables Across Multiple Scopes -- Avoid Changing SET Options Within a Batch -- Controlling Recompile Results -- Plan Forcing -- Query Hints -- Plan Guides -- Hint Forcing -- Summary -- Chapter 9: Index Architecture -- What Is a Rowstore Index?…”
Libro electrónico -
6050Publicado 2024Tabla de Contenidos: “…Installing Docker -- Running MongoDB with a container -- Running MongoDB with Docker Compose -- Adding Docker commands to package.json -- Connecting to MongoDB -- Other ways to install MongoDB -- How to load secrets in Node.js -- Environment variables -- The .env file -- dotenv -- Using an ORM - Mongoose -- Migrating a web application to MongoDB -- Installing dependencies -- Managing the secrets -- Migrating the data layer -- Testing our MongoDB integration layer -- Update the utilities -- Refactoring the test suite -- Some tests must change -- Checking the coverage -- Summary -- Further reading -- Chapter 13: User Authentication and Authorization with Passport.js -- Technical requirements -- Understanding modern authentication and authorization -- Authentication -- Authorization -- JWT in a nutshell -- The process -- The theory -- Cryptography 101 -- JWT structure -- JWT.io -- Understanding Passport.js fundamentals -- Adding authentication and authorization to our web application -- Clone the base project -- Setup -- Run the tests -- The UI changes -- Added dependencies -- Changes in the frontend -- Added a new store for users -- JWT utilities -- Adding new routes -- Improved testing utilities -- Test case changes -- Test coverage -- Summary -- Further reading -- Chapter 14: Error Handling in Node.js -- Technical requirements -- Exploring the types of errors -- Syntax errors -- Runtime errors -- Throwing meaningful errors -- The error object -- Custom errors -- Managing errors in Express -- Error-handling middleware -- Custom errors -- Gracefully shutting down the application -- Events -- Exit codes -- Avoiding zombie processes -- Summary -- Further reading -- Chapter 15: Securing Web Applications -- Technical requirements -- The importance of security -- Social engineering -- Risks in the supply chain -- The business impact…”
Libro electrónico -
6051Publicado 2024Tabla de Contenidos: “…Worker Nodes -- Creating a Highly Available Kubernetes Cluster with Kubespray and Ansible -- Available Options to Deploy Kubernetes -- Prerequisites and Initial Setup -- Creating The Inventory -- Creating the Cluster -- How Kubespray Works -- Step 1: Pre-Configuration Checks and Setup -- Step 2: Setting Up Container Runtime -- Step 3: Network Plugin Installation -- Step 4: Kubernetes Components Installation -- Step 5: Initialization of the First Control Plane Node -- Step 6: Setting Up etcd Cluster -- Step 7: Joining Additional Control Plane Nodes -- Step 8: Joining Worker Nodes -- Step 9: Cluster Configuration With Addons -- Step 10: Cluster Verification And Health Checks -- Step 11: Security Configuration -- Step 12: Applying Custom Configurations -- Step 13: Cluster Ready For Deployment -- Start Using The Cluster -- Deploying to Kubernetes with Ansible -- Deploying to Kubernetes with Ansible and the K8s Module -- Using Remote Manifests -- Inline Manifests -- Validating Kubernetes Definitions -- Managing Multiple Clusters -- Patching Resources -- Restarting Deployments -- Deploying to Kubernetes with Ansible and Helm -- Templating Kubernetes Resources With Ansible -- Troubleshooting Kubernetes with Ansible -- Creating Generic Debug Tasks to View Kubernetes Resources -- Viewing Kubernetes Pod Logs with Ansible -- Ansible + Kubernetes = A Powerful Combination -- Ansible Cheat Sheet -- Installing Ansible -- On Linux -- On macOS -- On Windows -- Configuring Ansible -- Inventory -- Setting Up the Inventory File (INI) -- Setting Up the Inventory File (YAML) -- Ansible Host Variables -- Testing Your Setup -- Playbook Structure -- Playbook Keywords -- Common Modules -- Running a Command -- Running a Shell Command -- Running a Raw Command -- Copying a File -- Installing a Package -- Restarting a Service -- Copying a File with Permissions…”
Libro electrónico -
6052Publicado 2005“…The marriage of two strong-minded people provides the spark for a comic confrontation between the sexes: The "shrew," Katharina, is so ill-tempered she seems unlikely to find a husband. Her father refuses to let her younger sister marry until Katherina is off his hands. …”
+información
DVD -
6053
-
6054Publicado 2018“…Unlike other works on the subject, it is Africa-wide in its scope, with case studies in Ethiopia, Kenya, Malawi, Nigeria, Rwanda, and South Africa. …”
Libro electrónico -
6055Publicado 2020Tabla de Contenidos: “…8.1 Introduction 179 -- 8.2 Scenario and Application 182 -- 8.2.1 Concept Definition 182 -- 8.2.2 Fog-enabled IoT Application 184 -- 8.2.3 Characteristics and Open Challenges 185 -- 8.2.4 Orchestration Requirements 187 -- 8.3 Architecture: A Software-Defined Perspective 188 -- 8.3.1 Solution Overview 188 -- 8.3.2 Software-Defined Architecture 189 -- 8.4 Orchestration 191 -- 8.4.1 Resource Filtering and Assignment 192 -- 8.4.2 Component Selection and Placement 194 -- 8.4.3 Dynamic Orchestration with Runtime QoS 195 -- 8.4.4 Systematic Data-Driven Optimization 196 -- 8.4.5 Machine-Learning for Orchestration 197 -- 8.5 Fog Simulation 198 -- 8.5.1 Overview 198 -- 8.5.2 Simulation for IoT Application in Fog 199 -- 8.5.3 Simulation for Fog Orchestration 201 -- 8.6 Early Experience 202 -- 8.6.1 Simulation-Based Orchestration 202 -- 8.6.2 Orchestration in Container-Based Systems 206 -- 8.7 Discussion 207 -- 8.8 Conclusion 208 -- Acknowledgment 208 -- References 208 -- 9 A Decentralized Adaptation System for QoS Optimization 213 /Nanxi Chen, Fan Li, Gary White, Siobh©Łn Clarke, and Yang Yang -- 9.1 Introduction 213 -- 9.2 State of the Art 217 -- 9.2.1 QoS-aware Service Composition 217 -- 9.2.2 SLA (Re-)negotiation 219 -- 9.2.3 Service Monitoring 221 -- 9.3 Fog Service Delivery Model and AdaptFog 224 -- 9.3.1 AdaptFog Architecture 224 -- 9.3.2 Service Performance Validation 227 -- 9.3.3 Runtime QoS Monitoring 232 -- 9.3.4 Fog-to-Fog Service Level Renegotiation 235 -- 9.4 Conclusion and Open Issues 240 -- References 240 -- 10 Efficient Task Scheduling for Performance Optimization 249 /Yang Yang, Shuang Zhao, Kunlun Wang, and Zening Liu -- 10.1 Introduction 249 -- 10.2 Individual Delay-minimization Task Scheduling 251 -- 10.2.1 System Model 251 -- 10.2.2 Problem Formulation 251 -- 10.2.3 POMT Algorithm 253 -- 10.3 Energy-efficient Task Scheduling 255 -- 10.3.1 Fog Computing Network 255 -- 10.3.2 Medium Access Protocol 257 -- 10.3.3 Energy Efficiency 257 -- 10.3.4 Problem Properties 258.…”
Libro electrónico -
6056
-
6057
-
6058
-
6059Publicado 2018Tabla de Contenidos: “…-- Query Store architecture -- Enabling and configuring Query Store -- Enabling Query Store with SSMS -- Enabling Query Store with Transact-SQL -- Configuring Query Store -- Query Store default configuration -- Query Store recommended configuration -- Disabling and cleaning Query Store -- Query Store in action -- Capturing the Query info -- Capturing plan info -- Collecting runtime statistics…”
Libro electrónico -
6060Publicado 2021Tabla de Contenidos: “…Problems That Are Likely to Happen -- SY-SUBRC -- BAPIs -- BDCs -- Field Symbols -- Problems That Really Shouldn't Happen -- Self-Repair: Example 1 -- Self-Repair: Example 2 -- Problems That Should Never, Ever Happen -- Spotting the Impossible -- Dealing with the Impossible -- Dealing with Instability: Using Humans -- What's Wrong #1 -- What's Wrong #2 -- Conclusion -- Recommended Reading -- Chapter 5: Performance: The Third Pillar of Code Quality -- CPO Concept -- Daily Dumps -- Annual In-House CPO -- Static Checks -- Geometric Loops -- Secondary Indexes for Internal Tables -- Runtime Checks -- ST05 in General -- Identical SELECTS -- How to Spot the Problem -- Strategies to Deal with the Problem -- Real-Life Example -- Stuttering -- Asking Stupid Questions -- Reading More Data Than Needed -- Selecting More Columns Than You Need -- Selecting More Rows Than You Need -- The Behavior Never Made Sense -- The Behavior No Longer Makes Sense -- The Behavior Makes Sense -- Existence Checks -- Multiple Reads on the Same Table -- Contract Example -- Partner Function Example -- Shipment Cost Example -- Using FOR ALL ENTRIES -- Indexes -- Indexes: Always Using One -- Indexes: Missing the First Field -- Indexes: SKIP SCAN -- Nested SELECTs -- "Bad" Joins on Database Tables -- Postmortem Checks -- Standard SAP Transactions for Troubleshooting Performance Problems -- SAT -- ST04 -- SRTCM -- Technical Attributes of Database Tables -- Indexes -- Pointless Index -- Terrible Index -- Really Good Index -- Buffering -- Possible Buffering Settings -- Example of How Buffering Can Help -- Common Misconception About Generic Buffering -- How to Decide Which Z Tables to Buffer -- Postmortem Tricks -- Batch Jobs -- Deadlocks -- Sneaky Tricks -- Database Reads in a Loop -- Using Standard SAP "Buffering" Modules -- When to Use Them -- KNA1_SINGLE_READER -- Prefilling Buffers…”
Libro electrónico