Mostrando 28,761 - 28,780 Resultados de 33,382 Para Buscar 'JAXA~', tiempo de consulta: 0.93s Limitar resultados
  1. 28761
    por Zofío Jiménez, Javier
    Publicado 2013
    Tabla de Contenidos: “…1.6 > Espaciados, saltos de línea y párrafos1.7 > Cabeceras; 1.8 > Semántica en textos; 1.9 > Listas de elementos; 1.10 > Imágenes; 1.11 > Vínculos o hiperenlaces; 1.12 > Tablas; 1.13 > Formularios; 2 >> Hojas de estilos CSS; 2.1 > Introducción; 2.2 > Hoja de estilos; 2.3 > Formas de aplicar estilo; 2.4 > Conceptos fundamentales; 2.5 > Criterios de selección, selectores; 2.6 > Unión y combinación de selectores; 2.7 > Elementos HTML y ; 2.8 > Colores, fondos, textos y fuentes; 2.9 > Bloques, capas o cajas; 2.10 > Tamaño y posicionamiento; 3 >> Lenguajes de script de navegador…”
    Libro electrónico
  2. 28762
    Publicado 2009
    Tabla de Contenidos: “…; 11.2 Konstruktion und Anwendung eines Systems trennen; 11.3 Aufwärtsskalierung; 11.4 Java-Proxies; 11.5 Reine Java-AOP-Frameworks; 11.6 AspectJ-Aspekte…”
    Libro electrónico
  3. 28763
    Publicado 2023
    Tabla de Contenidos: “…. -- See also -- Chapter 7: Validating (Data) Inputs - Part 2 -- Technical requirements -- Testing for code injection -- Getting ready -- How to do it... -- How it works... -- Testing for command injection -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing for server-side template injection -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing for server-side request forgery -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 8: Business Logic Testing -- Technical requirements -- Test ability to forge requests -- Getting ready -- How to do it... -- How it works... -- See also -- Test for process timing -- Getting ready -- How to do it... -- How it works... -- See also -- Testing for the circumvention of workflows -- Getting ready -- How to do it... -- How it works... -- See also -- Testing upload of unexpected file types with a malicious payload -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 9: Client-Side Testing -- Technical requirements -- Testing for DOM-based cross-site scripting -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing for JavaScript execution -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing for HTML injection -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing for client-side URL redirect -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing cross-origin resource sharing -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing WebSockets -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 10: Advanced Attack Techniques -- Technical requirements…”
    Libro electrónico
  4. 28764
    Publicado 2018
    Tabla de Contenidos: “…SQL Injection -- Text-Encoding Character Replacement -- Final Words -- Chapter 10: Finding and Exploiting Security Vulnerabilities -- Fuzz Testing -- The Simplest Fuzz Test -- Mutation Fuzzer -- Generating Test Cases -- Vulnerability Triaging -- Debugging Applications -- Improving Your Chances of Finding the Root Cause of a Crash -- Exploiting Common Vulnerabilities -- Exploiting Memory Corruption Vulnerabilities -- Arbitrary Memory Write Vulnerability -- Writing Shell Code -- Getting Started -- Simple Debugging Technique -- Calling System Calls -- Executing the Other Programs -- Generating Shell Code with Metasploit -- Memory Corruption Exploit Mitigations -- Data Execution Prevention -- Return-Oriented Programming Counter-Exploit -- Address Space Layout Randomization (ASLR) -- Detecting Stack Overflows with Memory Canaries -- Final Words -- Appendix: Network Protocol Analysis Toolkit -- Passive Network Protocol Capture and Analysis Tools -- Microsoft Message Analyzer -- TCPDump and LibPCAP -- Wireshark -- Active Network Capture and Analysis -- Canape -- Canape Core -- Mallory -- Network Connectivity and Protocol Testing -- Hping -- Netcat -- Nmap -- Web Application Testing -- Burp Suite -- Zed Attack Proxy (ZAP) -- Mitmproxy -- Fuzzing, Packet Generation, and Vulnerability Exploitation Frameworks -- American Fuzzy Lop (AFL) -- Kali Linux -- Metasploit Framework -- Scapy -- Sulley -- Network Spoofing and Redirection -- DNSMasq -- Ettercap -- Executable Reverse Engineering -- Java Decompiler (JD) -- IDA Pro -- Hopper -- ILSpy -- .NET Reflector -- Index -- Footnotes -- Chapter 2: Capturing Application Traffic -- Chapter 3: Network Protocol Structures -- Chapter 6: Application Reverse Engineering…”
    Libro electrónico
  5. 28765
  6. 28766
    por Assayag, Jackie
    Publicado 2020
    “…Qu’est le monde en effet et celui, homme ou dieu, qui s’y inscrit fugitivement, sinon la création de la māyā, l’Illusion cosmique ? Sur le tréteau de l’univers, Śiva, le Nitarāja, prince et modèle des acteurs, est le dieu qui joue, souverainement. …”
    Electrónico
  7. 28767
    Publicado 2016
    “…As a result, they become scalable, responsive, and fault-tolerant. Java and Scala developers can use the Play Framework and the Akka concurrency toolkit to easily implement reactive applications without building everything from scratch. …”
    Libro electrónico
  8. 28768
    por Kotaru, Venkata Keerti. author
    Publicado 2020
    Tabla de Contenidos: “…Chapter 1: Introduction -- Chapter 2: Getting Started -- Chapter 3: Modules -- Chapter 4: Angular: Components -- Chapter 5: Angular Basics: Data Binding and Change Detection -- Chapter 6: Angular: Directives -- Chapter 7: Angular: Services and Dependency Injection -- Chapter 8: Material Design: User Input -- Chapter 9: Angular: Building Forms -- Chapter 10: Material Design: Additional Form Fields -- Chapter 11: Angular: Routing -- Chapter 12: Material Design: Navigation -- Chapter 13: Material Design: Layout -- Chapter 14: Material Design: Using Lists -- Chapter 15: Material Design: Alerts and Dialogs -- Chapter 16: Angular: HTTP Client. …”
    Libro electrónico
  9. 28769
    Publicado 2016
    “…With Ionic, you can do just that: create hybrid mobile apps using web technologies that you already know, like HTML, CSS, and JavaScript, that will run on both iOS and Android. …”
    Libro electrónico
  10. 28770
    por Seneviratne, Pradeeka. author
    Publicado 2019
    “…Next, build a simple single channel LoRa gateway with Raspberry Pi and forward uplink data to The Things Network. Also, write simple JavaScript functions to decode payloads to extract sensor data. …”
    Libro electrónico
  11. 28771
  12. 28772
    Publicado 2023
    “…You will build an xUnit automated test framework using JavaScript: initially a clone of Jest, but adding a couple of neat features borrowed from RSpec, the genre-defining tool for behavior-driven development (BDD). …”
    Libro electrónico
  13. 28773
  14. 28774
    por Pinelli, Luca, 1542-1607
    Publicado 1604
    Accés lliure
    991009714937306719
  15. 28775
    por Stiefel, Michael
    Publicado 2002
    “…Practical, useful information on the .NET Framework, the Common Language Runtime, ADO.NET, ASP.NET, Web Services, security, interoperability, and more Running case study: see how concepts work together when you build .NET applications Experienced C++, Java, and Visual Basic programmers: become effective with .NET! …”
    Libro electrónico
  16. 28776
    Publicado 2018
    “…You'll create a single application, but the interface will be reskinned and rebuilt throughout using different methods to illustrate their uses and functions using HTML, CSS, and JavaScript. You will also learn to develop an application that creates documents and reports using R Markdown. …”
    Libro electrónico
  17. 28777
    por Cheng, Fu. author
    Publicado 2017
    “…Ionic uses Angular as the JavaScript framework and has a nice default UI style with a similar look and feel to native apps. …”
    Libro electrónico
  18. 28778
    Publicado 2006
    Tabla de Contenidos: “…Understanding the Impact of Web Accessibility -- Understanding Web Accessibility -- Overview of Law and Guidelines -- Implementing Accessibility in the Enterprise -- Implementing Accessible Websites -- Overview of Accessible Technologies -- Assistive Technology: Screen Readers and Browsers -- Accessible Content -- Accessible Navigation -- Accessible Data Input -- CSS for Accessible Web Pages -- Accessible Javascript -- Accessible Flash -- PDF Accessibility -- Accessibility Testing -- to WCAG 2.0 -- Retrofitting Case Study:Redesign of a University Website -- Accessibility Law and Policy -- U.S. …”
    Libro electrónico
  19. 28779
    por Bingham, Richard
    Publicado 2011
    “…Understand the components and architecture of Oracle Fusion Applications Plan, develop, and implement an effective application management plan Resolve reliability issues with Oracle Enterprise Manager Configure and deploy applications from the Oracle WebLogic Server Administration Console Adjust run-time parameters using Java Management Extensions and MBeans Generate and distribute reports using Oracle Business Intelligence 11 g Establish solid user authentication, access control, and data protection policies Work with Oracle Fusion Governance, Risk, and Compliance Intelligence…”
    Libro electrónico
  20. 28780
    por Parisi, Tony
    Publicado 2014
    “…Explore HTML5 APIs and related technologies for creating 3D web graphics, including WebGL, Canvas, and CSS Work with the popular JavaScript 3D rendering and animation libraries Three.js and Tween.js Delve into the 3D content creation pipeline, and the modeling and animation tools for creating killer 3D content Look into several game engines and frameworks for building 3D applications, including the author’s Vizi framework Create 3D environments with multiple objects and complex interaction, using examples and supporting code Examine the issues involved in building WebGL-based 3D applications for mobile browsers…”
    Libro electrónico