Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,523
- Development 1,382
- Java (Computer program language) 1,307
- Application software 1,225
- JavaScript (Computer program language) 876
- Història 815
- Engineering & Applied Sciences 746
- Web site development 670
- Computer Science 606
- Web sites 386
- Computer programming 384
- Java (Lenguaje de programación) 368
- Design 365
- Web applications 329
- Internet programming 298
- Biblia 289
- Cajas de ahorros 284
- Computer software 274
- Computer programs 225
- Caza 213
- Programming languages (Electronic computers) 208
- Programming 200
- History 186
- HTML (Document markup language) 183
- Universidad Pontificia de Salamanca (España) 181
- Casas, Bartolomé de las 180
- Android (Electronic resource) 179
- Arquitectura 169
- Crítica e interpretación 164
- Software engineering 162
-
28761por Zofío Jiménez, JavierTabla de Contenidos: “…1.6 > Espaciados, saltos de línea y párrafos1.7 > Cabeceras; 1.8 > Semántica en textos; 1.9 > Listas de elementos; 1.10 > Imágenes; 1.11 > Vínculos o hiperenlaces; 1.12 > Tablas; 1.13 > Formularios; 2 >> Hojas de estilos CSS; 2.1 > Introducción; 2.2 > Hoja de estilos; 2.3 > Formas de aplicar estilo; 2.4 > Conceptos fundamentales; 2.5 > Criterios de selección, selectores; 2.6 > Unión y combinación de selectores; 2.7 > Elementos HTML y ; 2.8 > Colores, fondos, textos y fuentes; 2.9 > Bloques, capas o cajas; 2.10 > Tamaño y posicionamiento; 3 >> Lenguajes de script de navegador…”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
28762Publicado 2009Tabla de Contenidos: “…; 11.2 Konstruktion und Anwendung eines Systems trennen; 11.3 Aufwärtsskalierung; 11.4 Java-Proxies; 11.5 Reine Java-AOP-Frameworks; 11.6 AspectJ-Aspekte…”
Libro electrónico -
28763Publicado 2023Tabla de Contenidos: “…. -- See also -- Chapter 7: Validating (Data) Inputs - Part 2 -- Technical requirements -- Testing for code injection -- Getting ready -- How to do it... -- How it works... -- Testing for command injection -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing for server-side template injection -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing for server-side request forgery -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 8: Business Logic Testing -- Technical requirements -- Test ability to forge requests -- Getting ready -- How to do it... -- How it works... -- See also -- Test for process timing -- Getting ready -- How to do it... -- How it works... -- See also -- Testing for the circumvention of workflows -- Getting ready -- How to do it... -- How it works... -- See also -- Testing upload of unexpected file types with a malicious payload -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 9: Client-Side Testing -- Technical requirements -- Testing for DOM-based cross-site scripting -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing for JavaScript execution -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing for HTML injection -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing for client-side URL redirect -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing cross-origin resource sharing -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing WebSockets -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 10: Advanced Attack Techniques -- Technical requirements…”
Libro electrónico -
28764Publicado 2018Tabla de Contenidos: “…SQL Injection -- Text-Encoding Character Replacement -- Final Words -- Chapter 10: Finding and Exploiting Security Vulnerabilities -- Fuzz Testing -- The Simplest Fuzz Test -- Mutation Fuzzer -- Generating Test Cases -- Vulnerability Triaging -- Debugging Applications -- Improving Your Chances of Finding the Root Cause of a Crash -- Exploiting Common Vulnerabilities -- Exploiting Memory Corruption Vulnerabilities -- Arbitrary Memory Write Vulnerability -- Writing Shell Code -- Getting Started -- Simple Debugging Technique -- Calling System Calls -- Executing the Other Programs -- Generating Shell Code with Metasploit -- Memory Corruption Exploit Mitigations -- Data Execution Prevention -- Return-Oriented Programming Counter-Exploit -- Address Space Layout Randomization (ASLR) -- Detecting Stack Overflows with Memory Canaries -- Final Words -- Appendix: Network Protocol Analysis Toolkit -- Passive Network Protocol Capture and Analysis Tools -- Microsoft Message Analyzer -- TCPDump and LibPCAP -- Wireshark -- Active Network Capture and Analysis -- Canape -- Canape Core -- Mallory -- Network Connectivity and Protocol Testing -- Hping -- Netcat -- Nmap -- Web Application Testing -- Burp Suite -- Zed Attack Proxy (ZAP) -- Mitmproxy -- Fuzzing, Packet Generation, and Vulnerability Exploitation Frameworks -- American Fuzzy Lop (AFL) -- Kali Linux -- Metasploit Framework -- Scapy -- Sulley -- Network Spoofing and Redirection -- DNSMasq -- Ettercap -- Executable Reverse Engineering -- Java Decompiler (JD) -- IDA Pro -- Hopper -- ILSpy -- .NET Reflector -- Index -- Footnotes -- Chapter 2: Capturing Application Traffic -- Chapter 3: Network Protocol Structures -- Chapter 6: Application Reverse Engineering…”
Libro electrónico -
28765
-
28766por Assayag, Jackie“…Qu’est le monde en effet et celui, homme ou dieu, qui s’y inscrit fugitivement, sinon la création de la māyā, l’Illusion cosmique ? Sur le tréteau de l’univers, Śiva, le Nitarāja, prince et modèle des acteurs, est le dieu qui joue, souverainement. …”
Publicado 2020
Electrónico -
28767Publicado 2016“…As a result, they become scalable, responsive, and fault-tolerant. Java and Scala developers can use the Play Framework and the Akka concurrency toolkit to easily implement reactive applications without building everything from scratch. …”
Libro electrónico -
28768por Kotaru, Venkata Keerti. authorTabla de Contenidos: “…Chapter 1: Introduction -- Chapter 2: Getting Started -- Chapter 3: Modules -- Chapter 4: Angular: Components -- Chapter 5: Angular Basics: Data Binding and Change Detection -- Chapter 6: Angular: Directives -- Chapter 7: Angular: Services and Dependency Injection -- Chapter 8: Material Design: User Input -- Chapter 9: Angular: Building Forms -- Chapter 10: Material Design: Additional Form Fields -- Chapter 11: Angular: Routing -- Chapter 12: Material Design: Navigation -- Chapter 13: Material Design: Layout -- Chapter 14: Material Design: Using Lists -- Chapter 15: Material Design: Alerts and Dialogs -- Chapter 16: Angular: HTTP Client. …”
Publicado 2020
Libro electrónico -
28769Publicado 2016“…With Ionic, you can do just that: create hybrid mobile apps using web technologies that you already know, like HTML, CSS, and JavaScript, that will run on both iOS and Android. …”
Libro electrónico -
28770por Seneviratne, Pradeeka. author“…Next, build a simple single channel LoRa gateway with Raspberry Pi and forward uplink data to The Things Network. Also, write simple JavaScript functions to decode payloads to extract sensor data. …”
Publicado 2019
Libro electrónico -
28771
-
28772Publicado 2023“…You will build an xUnit automated test framework using JavaScript: initially a clone of Jest, but adding a couple of neat features borrowed from RSpec, the genre-defining tool for behavior-driven development (BDD). …”
Libro electrónico -
28773
-
28774
-
28775por Stiefel, Michael“…Practical, useful information on the .NET Framework, the Common Language Runtime, ADO.NET, ASP.NET, Web Services, security, interoperability, and more Running case study: see how concepts work together when you build .NET applications Experienced C++, Java, and Visual Basic programmers: become effective with .NET! …”
Publicado 2002
Libro electrónico -
28776Publicado 2018“…You'll create a single application, but the interface will be reskinned and rebuilt throughout using different methods to illustrate their uses and functions using HTML, CSS, and JavaScript. You will also learn to develop an application that creates documents and reports using R Markdown. …”
Libro electrónico -
28777por Cheng, Fu. author“…Ionic uses Angular as the JavaScript framework and has a nice default UI style with a similar look and feel to native apps. …”
Publicado 2017
Libro electrónico -
28778Publicado 2006Tabla de Contenidos: “…Understanding the Impact of Web Accessibility -- Understanding Web Accessibility -- Overview of Law and Guidelines -- Implementing Accessibility in the Enterprise -- Implementing Accessible Websites -- Overview of Accessible Technologies -- Assistive Technology: Screen Readers and Browsers -- Accessible Content -- Accessible Navigation -- Accessible Data Input -- CSS for Accessible Web Pages -- Accessible Javascript -- Accessible Flash -- PDF Accessibility -- Accessibility Testing -- to WCAG 2.0 -- Retrofitting Case Study:Redesign of a University Website -- Accessibility Law and Policy -- U.S. …”
Libro electrónico -
28779por Bingham, Richard“…Understand the components and architecture of Oracle Fusion Applications Plan, develop, and implement an effective application management plan Resolve reliability issues with Oracle Enterprise Manager Configure and deploy applications from the Oracle WebLogic Server Administration Console Adjust run-time parameters using Java Management Extensions and MBeans Generate and distribute reports using Oracle Business Intelligence 11 g Establish solid user authentication, access control, and data protection policies Work with Oracle Fusion Governance, Risk, and Compliance Intelligence…”
Publicado 2011
Libro electrónico -
28780por Parisi, Tony“…Explore HTML5 APIs and related technologies for creating 3D web graphics, including WebGL, Canvas, and CSS Work with the popular JavaScript 3D rendering and animation libraries Three.js and Tween.js Delve into the 3D content creation pipeline, and the modeling and animation tools for creating killer 3D content Look into several game engines and frameworks for building 3D applications, including the author’s Vizi framework Create 3D environments with multiple objects and complex interaction, using examples and supporting code Examine the issues involved in building WebGL-based 3D applications for mobile browsers…”
Publicado 2014
Libro electrónico