Mostrando 13,181 - 13,200 Resultados de 13,921 Para Buscar 'Idmón~', tiempo de consulta: 1.05s Limitar resultados
  1. 13181
    Publicado 2012
    Tabla de Contenidos: “…Internal Connections -- External Connections -- Peripherals -- Security -- Objective 10.02 Implementing a Wireless Network -- Installing the Access Point -- Set the Admin Password -- Change Wireless Settings -- Implement MAC Filtering -- Implement Encryption -- Upgrade the Antenna -- Security Concerns with Signaling -- Installing the Client -- Troubleshooting Wireless Networking -- Objective 10.03 Specialized Network Devices -- Objective 10.04 Network Configuration Management -- Configuration Management Documentation -- Network Connectivity -- Baselines -- Policies, Procedures, and Configurations -- Regulations -- Change Management Documentation -- Checkpoint -- Review Questions -- Review Answers -- Chapter 11: Troubleshooting Networks -- Objective 11.01 The Troubleshooting Process -- Identify the Problem -- Gather Information, Identify Symptoms, and Question Users -- Determine If Anything Has Changed -- Establish a Theory of Probable Cause -- Test the Theory to Determine Cause -- Establish a Plan of Action and Identify Potential Effects -- Implement and Test the Solution or Escalate as Necessary -- Verify Full System Functionality and Implement Preventative Measures -- Document Findings, Actions, and Outcomes -- Objective 11.02 Troubleshooting Network Hardware -- Power Issues -- Network Media -- Visual Indications of Problems -- Check the NIC -- Bad Modules -- Troubleshooting Other Physical Network Issues -- Issues That Need To Be Escalated -- Objective 11.03 Testing Equipment -- Multimeters -- Tone Locators and Toner Probes -- Cable Testers -- Checkpoint -- Review Questions -- Review Answers -- Chapter 12: Network Utilities and Optimization -- Objective 12.01 TCP/IP Utilities -- ipconfig and ifconfig -- ipconfig -- ifconfig -- tracert -- arp -- netstat -- nbtstat -- nslookup -- arping -- dig -- mtr -- route…”
    Libro electrónico
  2. 13182
    Publicado 2005
    Tabla de Contenidos: “…Component design and development -- 4.1 Solution technology -- 4.1.1 Portlet application concepts -- 4.1.2 Enterprise JavaBeans (EJB) concepts -- 4.2 Solution details -- 4.2.1 AuditAdmin portlet -- 4.2.2 New ReportCU project -- 4.2.3 RecordsAdmin project -- 4.2.4 ReportTasks portlet -- 4.2.5 PortalToCM project -- 4.2.6 ReportApproval project -- 4.3 Summary -- Chapter 5. …”
    Libro electrónico
  3. 13183
    Publicado 2018
    Tabla de Contenidos: “…Authentication -- Blueprint -- Models -- Forms -- Views -- Templates -- Todo -- Blueprint -- Model -- Forms -- Views -- CREATE -- RETRIEVE -- UPDATE -- DELETE -- Templates -- FLASK_APP -- Deployment -- Summary -- Questions -- Chapter 4: Building a Flask-Based REST API with Zappa -- Technical requirements -- Installing and configuring Flask -- Flask extensions -- Flask-JWT -- Learning about JWT -- Flask-RESTful -- Begining with REST -- Designing the REST API -- Configuring the application settings -- Implementing authentication -- Implementing the todo API -- Building, testing, and deploying the REST API using Zappa -- Configuring Zappa -- Initiating deployment using Zappa -- Demonstrating the deployed application -- Sign up API -- Login API -- Todo API -- Todo API without authorization -- Todo API with the authorization header -- Summary -- Questions -- Chapter 5: Building a Django Application with Zappa -- Technical requirements -- Installing and configuring Django -- Setting up a virtual environment -- Installing pipenv -- Configuring and installing packages -- Designing an image gallery application -- Design overview -- Initializing the project -- Implementing models -- Integrating with the admin panel -- Application demonstration -- Configuring the Amazon CloudFront CDN -- Creating CloudFront distributions -- Setting up static and media files -- Standard configuration -- django-storage -- Building, testing, and deploying the Django application using Zappa -- Configuring Zappa -- Building and deploying -- Django management command using Zappa -- Summary -- Questions -- Chapter 6: Building a Django REST API with Zappa -- Technical requirements -- Installing and configuring the Django REST Framework -- Installing the required packages -- Designing REST APIs -- What is the Django Rest Framework? …”
    Libro electrónico
  4. 13184
    Publicado 2003
    Tabla de Contenidos: “…Places architecture -- 3.1 Introduction -- 3.1.1 Unique place types -- 3.1.2 Communication in a place -- 3.1.3 Permissions list -- 3.1.4 Client place versus server place configuration -- 3.2 Activities -- 3.3 Toolkit Places services -- 3.3.1 Places admin service -- 3.3.2 Places activity service -- Chapter 4. …”
    Libro electrónico
  5. 13185
    Publicado 2023
    Tabla de Contenidos: “…Combinatorial optimization problems with the QUBO model -- Binary linear programming -- The Knapsack problem -- Graph coloring -- The Traveling Salesperson Problem -- Other problems and other formulations -- Summary -- Chapter 4: Adiabatic Quantum Computing and Quantum Annealing -- Adiabatic quantum computing -- Quantum annealing -- Using Ocean to formulate and transform optimization problems -- Constrained quadratic models in Ocean -- Solving constrained quadratic models with dimod -- Running constrained problems on quantum annealers -- Solving optimization problems on quantum annealers with Leap -- The Leap annealers -- Embeddings and annealer topologies -- Controlling annealing parameters -- The importance of coupling strengths -- Classical and hybrid samplers -- Classical solvers -- Hybrid solvers -- Summary -- Chapter 5: QAOA: Quantum Approximate Optimization Algorithm -- From adiabatic computing to QAOA -- Discretizing adiabatic quantum computing -- QAOA: The algorithm -- Circuits for QAOA -- Estimating the energy -- QUBO and HOBO -- Using QAOA with Qiskit -- Using QAOA with Hamiltonians -- Solving QUBO problems with QAOA in Qiskit -- Using QAOA with PennyLane -- Summary -- Chapter 6: GAS: Grover Adaptive Search -- Grover's algorithm -- Quantum oracles -- Grover's circuits -- Probability of finding a marked element -- Finding minima with Grover's algorithm -- Quantum oracles for combinatorial optimization -- The quantum Fourier transform -- Encoding and adding integer numbers -- Computing the whole polynomial -- Constructing the oracle -- Using GAS with Qiskit -- Summary -- Chapter 7: VQE: Variational Quantum Eigensolver -- Hamiltonians, observables, and their expectation values -- Observables -- Estimating the expectation values of observables -- Introducing VQE -- Getting excited with VQE -- Using VQE with Qiskit…”
    Libro electrónico
  6. 13186
    Publicado 2018
    Tabla de Contenidos: “…Dot-walking and GlideElement -- Script includes -- Server-side GlideAjax -- Business rules -- After business rules -- Asynchronous business rules -- Display business rules and g_scratchpad -- Default versus calculated field values -- Default values -- Calculated values -- Summary -- Chapter 12: Client-Side Scripting -- Client scripts -- Client script types -- onLoad -- onChange -- onSubmit -- onCellEdit -- Security -- Compatibility -- Build for performance -- Reference fields -- GlideAjax and asynchronous GlideRecord -- g_scratchpad -- UI scripts -- Running only necessary scripts -- Scripts from the server -- Summary -- Chapter 13: Service Portal Scripting -- Setting up appointments -- URLs in the service portal -- Creating the meeting widget -- Aesthetic changes -- Option schema -- Troubleshooting widgets -- Summary -- Chapter 14: Debugging -- Logging -- Client-side debugging -- Debugging field visibility -- Server-side debugging -- Reference versus value -- Debugging security -- JavaScript debugger -- Debugger interface -- Breakpoints -- General debugging -- Summary -- Chapter 15: Pro Tips -- Admin pro tips -- List personalization -- Update set selector -- Reference field background color -- List v3 rendering -- List, form, and new window shortcuts -- Adding the ServiceNow frame by URL -- Impersonation simplification -- Derived field risks -- Finding derived fields and other field data -- Dictionary overrides -- Scripting pro tips -- Avoiding nested loops -- Limit logging -- Always use getters and setters -- What the pros wish they knew -- Field case -- Generating encoded query strings -- How to modify OOB scripts -- Other technical best practices -- Summary -- Index…”
    Libro electrónico
  7. 13187
    Publicado 2023
    Tabla de Contenidos: “…Container security -- 10 Security container isolation -- 10.1 Read-only Linux kernel pseudo filesystems -- 10.1.1 Unmasking the masked paths -- 10.1.2 Masking additional paths -- 10.2 Linux capabilities -- 10.2.1 Dropped Linux capabilities -- 10.2.2 Dropped CAP_SYS_ADMIN -- 10.2.3 Dropping capabilities -- 10.2.4 Adding capabilities -- 10.2.5 No new privileges -- 10.2.6 Root with no capabilities is still dangerous -- 10.3 UID isolation: User namespace -- 10.3.1 Isolating containers using the - -userns=auto flag -- 10.3.2 User-namespaced Linux capabilities -- 10.3.3 Rootless Podman with the - -userns=auto flag -- 10.3.4 User volumes with the - -userns=auto flag -- 10.4 Process isolation: PID namespace -- 10.5 Network isolation: Network namespace -- 10.6 IPC isolation: IPC namespace -- 10.7 Filesystem isolation: Mount namespace -- 10.8 Filesystem isolation: SELinux -- 10.8.1 SELinux type enforcement…”
    Libro electrónico
  8. 13188
    Publicado 2021
    Tabla de Contenidos: “…Modifying the Board Creation Permission -- Defining Special Social Learning Users -- Summary -- Chapter 13: AI-Powered Recommendations for Learners -- Technical requirements -- A Word on Adobe Sensei -- Revisiting the learner home page -- Reviewing the Administrator options -- Reviewing the Learner Experience -- Using industry-aligned skills -- Industry-aligned skills in the learner experience -- Recommendations Based on Peer Activity -- Using Manual Recommendations -- Viewing manual recommendations as a learner -- Summary -- Section 4: Administering the Platform -- Chapter 14: Working with Catalogs and Peer Accounts -- Technical requirements -- Working With Multiple Catalogs -- Creating custom catalogs -- Adding content to catalogs -- Sharing Catalogs -- Internal Sharing -- External Sharing -- Enabling and Disabling Catalogs -- Modifying the Default Catalog -- Catalogs in the learner experience -- Exploring the Content Marketplace -- Browsing the Content Marketplace as a learner -- Reviewing the express interest report -- Working With Peer Accounts -- Summary -- Chapter 15: Working With Messages and Announcements -- Technical Requirements -- Working With Announcements -- Creating Notifications -- Creating Masthead Announcements -- Exporting the Notification Announcement Report -- Viewing, Modifying, and Deleting Announcements -- Configuring the Messaging System -- Modifying the Sender's Name and Address -- Customizing the email banner and the email signature -- Disabling Optional Manager Emails -- Configuring the Do Not Disturb feature -- Configuring the Digest Email Messages feature -- Customizing individual email messages -- Enabling and Disabling Messages -- Modifying the Content of Email Messages -- Summary -- Chapter 16: Exploring the Integration Admin Role -- Technical requirements -- Data Exchange Between Captivate Prime and Other Systems…”
    Libro electrónico
  9. 13189
    Publicado 2017
    Tabla de Contenidos: “…Python - Architectural Patterns -- Introducing MVC -- Model Template View (MTV) - Django -- Django admin - automated model-centric views -- Flexible Microframework - Flask -- Event-driven programming -- Chat server and client using I/O multiplexing with the select module -- Event-driven programming versus Concurrent programming -- Twisted…”
    Libro electrónico
  10. 13190
    por Freeman, Adam. author
    Publicado 2014
    Tabla de Contenidos: “…Preparing the Application -- Creating the Directory Structure -- Installing the AngularJS and Bootstrap Files -- Building the Basic Outline -- Displaying the (Fake) Product Data -- Creating the Controller -- Displaying the Product Details -- Generating the Content Elements -- Displaying the Category List -- Creating a List of Categories -- Generating the Category Navigation Links -- Generating the Navigation Elements -- Handling the Click Event -- Selecting the Category -- Defining the Controller -- Applying the Controller and Filtering the Products -- Highlighting the Selected Category -- Adding Pagination -- Updating the Controller -- Implementing the Filters -- Updating the View -- Summary -- Chapter 7: SportsStore: Navigation and Checkout -- Preparing the Example Project -- Using the Real Product Data -- Handling Ajax Errors -- Creating Partial Views -- Creating the Cart -- Defining the Cart Module and Service -- Creating a Cart Widget -- Applying the Cart Widget -- Adding Product Selection Buttons -- Adding URL Navigation -- Defining URL Routes -- Displaying the Routed View -- Using URL Routing to Navigate -- Starting the Checkout Process -- Applying the Checkout Summary -- Summary -- Chapter 8: SportsStore: Orders and Administration -- Preparing the Example Project -- Getting Shipping Details -- Adding Form Validation -- Preparing for Validation -- Displaying Validation Feedback -- Linking the Button to Validity -- Adding the Remaining Form Fields -- Placing Orders -- Extending the Deployd Server -- Defining the Controller Behavior -- Calling the Controller Behavior -- Defining the View -- Making Improvements -- Administering the Product Catalog -- Preparing Deployd -- Securing the Collections -- Creating the Admin Application -- Adding the Placeholder View -- Implementing Authentication -- Defining the Authenticatio n View…”
    Libro electrónico
  11. 13191
    Publicado 2018
    Tabla de Contenidos: “…Chapter 16: Pricing Considerations -- Compute Engine -- BigTable -- BigQuery -- Datastore -- Cloud SQL -- Google Kubernetes Engine -- Pub/Sub -- Cloud ML Engine -- Stackdriver -- Video Intelligence API -- Key Management Service - KMS -- Vision API -- Summary -- Chapter 17: Effective Use of the GCP -- Eat the Kubernetes frog -- Careful that you don't get nickel-and-dimed -- Pay for what you allocate not what you use -- Make friends with the gsuite admins -- Try to find reasons to use network peering -- Understand how sustained use discounts work -- Read the fine print on GCS pricing -- Use BigQuery unless you have a specific reason not to -- Use pre-emptible instances in your Dataproc clusters -- Keep your Dataproc clusters stateless -- Understand the unified architecture for batch and stream -- Understand the main choices for ML applications -- Understand the differences between snapshots and images -- Don't be Milton! …”
    Libro electrónico
  12. 13192
    Publicado 2018
    Tabla de Contenidos: “…Regular expressions -- Wrapping up with Ruby basics -- Developing custom modules -- Building a module in a nutshell -- The architecture of the Metasploit framework -- Understanding the file structure -- The libraries layout -- Understanding the existing modules -- The format of a Metasploit module -- Disassembling the existing HTTP server scanner module -- Libraries and the function -- Writing out a custom FTP scanner module -- Libraries and functions -- Using msftidy -- Writing out a custom SSH-authentication with a brute force attack -- Rephrasing the equation -- Writing a drive-disabler post-exploitation module -- Writing a credential harvester post-exploitation module -- Breakthrough Meterpreter scripting -- Essentials of Meterpreter scripting -- Setting up persistent access -- API calls and mixins -- Fabricating custom Meterpreter scripts -- Working with RailGun -- Interactive Ruby shell basics -- Understanding RailGun and its scripting -- Manipulating Windows API calls -- Fabricating sophisticated RailGun scripts -- Summary and exercises -- Chapter 3: The Exploit Formulation Process -- The absolute basics of exploitation -- The basics -- The architecture -- System organization basics -- Registers -- Exploiting stack-based buffer overflows with Metasploit -- Crashing the vulnerable application -- Building the exploit base -- Calculating the offset -- Using the pattern_create tool -- Using the pattern_offset tool -- Finding the JMP ESP address -- Using the Immunity Debugger to find executable modules -- Using msfpescan -- Stuffing the space -- Relevance of NOPs -- Determining bad characters -- Determining space limitations -- Writing the Metasploit exploit module -- Exploiting SEH-based buffer overflows with Metasploit -- Building the exploit base -- Calculating the offset -- Using the pattern_create tool -- Using the pattern_offset tool…”
    Libro electrónico
  13. 13193
    Publicado 2018
    Tabla de Contenidos: “…-- Using the @FindBy annotation -- Understanding PageFactory -- Good practices for the PageObjects design -- Think of a web page as a services provider -- Always look for implied services -- Using PageObjects within a PageObject -- The AddNewPost PageObject -- The AllPostsPage PageObject -- Think of methods in PageObjects as services and not as user actions -- Identifying some WebElements on the fly -- Keeping the page-specific details off the test script -- Understanding loadable components -- Working on an end-to-end example of WordPress -- Looking at all the PageObjects -- The AdminLoginPage PageObject -- The AllPostsPage PageObject -- The AddNewPostPage PageObject -- The EditPostPage PageObject -- The DeletePostPage PageObject -- Looking at the test cases -- Adding a new post -- Editing a post…”
    Libro electrónico
  14. 13194
    Publicado 2018
    Tabla de Contenidos: “…Civitella della Chiana -- Civitella del Tronto -- Colfiorito -- Colle di Compito -- Corropoli -- Elba Island -- Fabriano -- Farfa -- Ferramonti di Tarsia -- Fertilia -- Fiume -- Forlì -- Fossalon -- Fossoli -- Gioia del Colle -- Gonars -- Isernia -- Isola del Gran Sasso -- Istonio Marina -- Lama dei Peligni -- Lanciano -- Laurana -- Lauria -- Le Fraschette di Alatri -- Lipari Island -- Manfredonia -- Mantua -- Monigo -- Montalbano -- Montechiarugolo -- Monteforte Irpino -- Nereto -- Notaresco -- Petriolo -- Pietrafitta-Tavernelle -- Pisticci -- Poggio Terza Armata -- Pollenza (aka Villa Lauri) -- Ponza -- Prignano sulla Secchia -- Renicci di Anghiari -- Roccatederighi -- San Tomaso della Fossa -- Sassoferrato -- Scipione -- Scuola Santa Croce -- Senigallia -- Servigliano -- Sforzacosta -- Solofra -- Sondrio -- Tollo -- Tonezza del Cimone -- Tortoreto -- Tossicia -- Treia -- Tremiti Islands -- Ugliano -- Urbisaglia -- Ustica Island -- Vallecrosia -- Venice -- Ventotene -- Verona -- Vicenza -- Vinchiaturo -- Visco -- Vo' Vecchio -- ITALIAN-OCCUPIED ALBANIA -- Fier -- Fushë Arrëz -- Gërman -- Kavajë -- Klos -- Kolonjë -- Kruja -- Kukës -- Pejë -- Peqin -- Prezë -- Priština -- Pukë -- Villa Shiroka -- ITALIAN-OCCUPIED EAST AFRICA (ERITREA, ETHIOPIA, AND SOMALIA) -- ITALIAN-OCCUPIED GREECE -- Akronafplia -- Anafi Island -- Athens/Averōf Prison -- Athens/Empeirikeio -- Athens/Kallithéa -- Corfù-Lazaretto Island -- Iōannina -- Kalavryta -- Katouna -- Larissa -- Pholegandros -- Thebes -- Trikala -- Vonitsa -- ITALIAN-OCCUPIED NORTH AFRICA -- Buqbuq -- Giado -- Sidi Azaz -- ITALIAN-OCCUPIED SOUTHEAST FRANCE -- Embrun -- Lynwood Villa -- Megève -- Mentone -- Modane -- Sospello -- Vence -- ITALIAN-OCCUPIED YUGO SLAVIA -- Antivari -- Arbe -- Brazza Island -- Buccari -- Cighino and Trebussa Inferiore -- Cupari -- Curzola Island -- Gravosa -- Lesina Island…”
    Libro electrónico
  15. 13195
  16. 13196
    Publicado 2018
    Tabla de Contenidos: “…Mesh topology -- Hybrid topology -- Transmission modes -- Communication networks -- Local area network -- Metropolitan area network -- Wide area network -- Wireless network -- Data center multi-tier model design -- Open Systems Interconnection model -- In-depth network scanning -- TCP communication -- ICMP scanning -- SSDP scanning -- UDP Scanning -- Intrusion detection systems -- Machine learning for intrusion detection -- Supervised learning -- Unsupervised learning -- Semi-supervised learning -- Reinforcement -- Machine learning systems' workflow -- Machine learning model evaluation metrics -- Services enumeration -- Insecure SNMP configuration -- DNS security -- DNS attacks -- Sniffing attacks -- DDoS attacks -- Types of DDoS attacks -- Defending against DDoS attacks -- DDoS scrubbing centers -- Software-Defined Network penetration testing -- SDN attacks -- SDNs penetration testing -- DELTA: SDN security evaluation framework -- SDNPWN -- Attacks on database servers -- Summary -- Chapter 4: Active Directory Exploitation -- Active Directory -- Single Sign-On -- Kerberos authentication -- Lightweight Directory Access Protocol -- PowerShell and Active Directory -- Active Directory attacks -- PowerView -- Kerberos attacks -- Kerberos TGS service ticket offline cracking (Kerberoast) -- SPN scanning -- Passwords in SYSVOL and group policy preferences -- 14-068 Kerberos vulnerability on a domain controller -- Dumping all domain credentials with Mimikatz -- Pass the credential -- Dumping LSASS memory with Task Manager (get domain admin credentials) -- Dumping Active Directory domain credentials from an NTDS.dit file -- Summary -- Chapter 5: Docker Exploitation -- Docker fundamentals -- Virtualization -- Cloud computing -- Cloud computing security challenges -- Docker containers -- Docker exploitation -- Kernel exploits -- DoS and resource abuse…”
    Libro electrónico
  17. 13197
    Publicado 2018
    Tabla de Contenidos: “…-- Community and Enterprise Editions of Odoo -- Getting started with Odoo Online -- Taking advantage of Odoo Online Instant Access -- Odoo browser requirements -- Odoo mobile phone and tablet support -- Accessing the Odoo free online trial -- Continuing to use the trial version of Odoo -- Subscribing to Odoo -- Using Odoo without subscription fees -- Getting to know the Odoo architecture -- Introducing the PostgreSQL database -- Writing code with Python -- Following the Model-View-Controller design -- Designing models -- Rendering views -- Authoring controllers -- Choosing your installation operating system -- Choosing a Microsoft Windows Odoo installation -- Learning Ubuntu is not required -- Introducing Ubuntu -- Choosing an Ubuntu Odoo installation -- Choosing another OS option for Odoo -- Understanding Odoo releases -- Upgrading Odoo -- Installing Odoo on Windows OS -- Performing an all-in-one Odoo installation on Windows -- Configuring PostgresSQL on Windows -- Installing Odoo on Ubuntu -- Modifying the sources.list file -- Testing your Odoo installation -- Troubleshooting and Odoo management tips -- Checking your browser destination -- Verifying that the Odoo service is running -- Checking for the Odoo services running in Windows -- Checking for Odoo services running in Ubuntu -- Starting and stopping Odoo services in Ubuntu -- Finding the primary Odoo log file -- Modifying the Odoo configuration file -- Changing port numbers -- Accessing the database management tools -- Changing the admin password -- Finding additional resources on installing Odoo -- Summary -- Chapter 2: Installing Your First Application -- What's new in Odoo 11? …”
    Libro electrónico
  18. 13198
    Publicado 2017
    Tabla de Contenidos: “…Starting, stopping, and restarting Jenkins on Windows -- Installing a standalone Jenkins server on Ubuntu -- Prerequisites -- Installing Java -- Installing the latest version of Jenkins -- Installing the latest stable version of Jenkins -- Starting, stopping, and restarting Jenkins on Ubuntu -- Installing a standalone Jenkins server on Red Hat Linux -- Prerequisites -- Installing Java -- Installing the latest version of Jenkins -- Installing the latest stable version of Jenkins -- Starting, stopping, and restarting Jenkins on Red Hat Linux -- Running Jenkins behind a reverse proxy -- Prerequisites -- Installing and configuring Nginx -- Configuring the firewall on a Nginx server -- Starting, stopping, and restarting the Nginx server -- Securing Nginx using OpenSSL -- Creating an SSL certificate -- Creating strong encryption settings -- Modifying the Nginx configuration -- Enabling the changes and testing our Nginx setup -- Configuring the Jenkins server -- Adding reverse proxy settings to the Nginx configuration -- Running Nginx and Jenkins on the same machine -- Running Jenkins on Docker -- Prerequisites -- Setting up a Docker host -- Setting up the repository -- Installing Docker -- Installing from a package -- Running the Jenkins container -- Running a Jenkins container using a data volume -- Testing the data volume -- Creating development and staging instances of Jenkins -- Prerequisites -- Creating an empty data volume -- Copying data between data volumes -- Creating the development and staging instances -- Summary -- Chapter 3: The New Jenkins -- The Jenkins setup wizard -- Prerequisites -- Unlocking Jenkins -- Customizing Jenkins -- Creating the first admin user -- The new Jenkins pipeline job -- Prerequisite -- Creating a Jenkins pipeline job -- The Global Tool Configuration page -- Jenkins pipeline Stage View -- Declarative Pipeline syntax…”
    Libro electrónico
  19. 13199
    Publicado 2022
    Tabla de Contenidos: “…-- Top Concerns of Management -- Do Not Fight the Tide -- Remote Working Is Older Than You May Think -- Productivity and Job Performance -- Adjusting to the New Work and Home Balance -- Social Isolation -- Employee Engagement -- Maintaining Growth and Profitability -- Let's Get to Work -- Notes -- Chapter 2 The Remote Workspace: Set Up Your Mind and Your Space -- Your Work Zone: Distinguished from the Rest of the House -- Choosing Your Space -- Good Lighting -- Broadband -- Monitors -- Grab a Seat -- Invest in Yourself -- Add Privacy If Needed -- Set Healthy Boundaries with Family and Friends -- No Is a Powerful Asset -- Self-Motivation from Home Can Be Perilous -- Productive Procrastination -- Work and Play -- Your Mental Space -- Take Breaks and Don't Feel Guilty -- You Are Not a Machine -- Replenish Your Resources -- Take Breaks Early -- Take Better Breaks -- Create a Morning Routine Different from When You Were Commuting -- Set Daily Goals -- Tasks vs. …”
    Libro electrónico
  20. 13200
    por Parker, David J.
    Publicado 2013
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Overview of Process Management in Microsoft Visio 2013 -- Exploring the new process management features in Visio 2013 -- Reviewing Visio Process Management capabilities -- Understanding the Visio BMP Maturity Model -- Reviewing the foundations of structured diagramming -- Reviewing the enhanced process flow templates -- Looking at the Flowchart templates -- Reviewing the new process flow templates -- Understanding a BPMN Diagram -- Understanding a Microsoft SharePoint 2013 workflow -- Validation of process diagrams -- Analyzing the structure of a Visio document -- Using the Visio Process Repository -- Publishing visual data from Visio -- Understanding the Visio 2013 editions -- Planning your own solutions -- Summary -- Chapter 2: Understanding the Microsoft Visio Object Model -- Introducing the Visio Type libraries -- Going beyond the object model -- Classifying the Visio document -- Selecting a programming language to use with Visio -- Understanding the Drawing Explorer window -- Understanding the Visio object model -- Examining the Application object -- Reviewing the ActiveDocument and ActivePage objects -- Reviewing the Addons collection -- Reviewing the COMAddIns collection -- Reviewing the CurrentEdition property -- Reviewing the DataFeaturesEnabled property -- Reviewing the Documents collection -- Reviewing the TypelibMinorVersion and Version properties -- Examining the Document object -- Reviewing the Advanced Properties object -- Reviewing the DataRecordsets collection -- Reviewing the DocumentSheet object -- Reviewing the ID and Index properties -- Reviewing the FullName and Name properties -- Reviewing the Masters collection -- Reviewing the Pages collection -- Reviewing the ReadOnly property…”
    Libro electrónico