Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,523
- Development 1,382
- Java (Computer program language) 1,307
- Application software 1,225
- JavaScript (Computer program language) 876
- Història 815
- Engineering & Applied Sciences 746
- Web site development 670
- Computer Science 606
- Web sites 386
- Computer programming 384
- Java (Lenguaje de programación) 368
- Design 365
- Web applications 329
- Internet programming 298
- Biblia 289
- Cajas de ahorros 284
- Computer software 274
- Computer programs 225
- Caza 213
- Programming languages (Electronic computers) 208
- Programming 200
- History 186
- HTML (Document markup language) 183
- Universidad Pontificia de Salamanca (España) 181
- Casas, Bartolomé de las 180
- Android (Electronic resource) 179
- Arquitectura 169
- Crítica e interpretación 164
- Software engineering 162
-
29481Publicado 2018Tabla de Contenidos: “…Stage 4 - self-build security services -- Stage 5 - big data security analysis and automation -- Role of a security team in an organization -- Security office under a CTO -- Dedicated security team -- Case study - a matrix, functional, or taskforce structure -- Security resource pool -- Security technical committee (taskforce) -- Summary -- Questions -- Further reading -- Chapter 4: Security Requirements and Compliance -- Security requirements for the release gate -- Release gate examples -- Common Vulnerability Scoring System (CVSS) -- Security requirements for web applications -- OWASP Application Security Verification Standard (ASVS) -- Security knowledge portal -- Security requirements for big data -- Big data security requirements -- Big data technical security frameworks -- Privacy requirements for GDPR -- Privacy Impact Assessment (PIA) -- Privacy data attributes -- Example of a data flow assessment -- GDPR security requirements for data processor and controller -- Summary -- Questions -- Further reading -- Chapter 5: Case Study - Security Assurance Program -- Security assurance program case study -- Microsoft SDL and SAMM -- Security training and awareness -- Security culture -- Web security frameworks -- Baking security into DevOps -- Summary -- Questions -- Further reading -- Chapter 6: Security Architecture and Design Principles -- Security architecture design principles -- Cloud service security architecture reference -- Security framework -- Java web security framework -- Non-Java web security frameworks -- Web readiness for privacy protection -- Login protection -- Cryptographic modules -- Input validation and sanitization -- Data masking -- Data governance - Apache Ranger and Atlas -- Third-party open source management -- Summary -- Questions -- Further reading -- Chapter 7: Threat Modeling Practices and Secure Design…”
Libro electrónico -
29482Publicado 2004Tabla de Contenidos: “…Using DB2 with .NET framework -- 8.1 An overview of ADO.NET -- 8.2 ADO.NET architecture -- 8.2.1 Connection -- 8.2.2 Command -- 8.2.3 DataReader -- 8.2.4 DataAdapter -- 8.2.5 DataSet -- 8.3 Connecting to the database -- 8.4 Data providers for DB2 -- 8.4.1 OLE DB .NET Data Provider -- 8.4.2 ODBC .NET Data Provider -- 8.4.3 DB2 .NET Data Provider -- 8.4.4 Comparison between providers -- 8.5 Performing operations on a DB2 database…”
Libro electrónico -
29483Publicado 2016“…Tämä antaisi arvon monenlaiselle hyödylliselle toimelle, joka nyt jää yhteiskunnassa tunnistamatta. …”
Libro electrónico -
29484Publicado 2001“…Se registró un total de cinco taxa, siendo los pulpos Opisthoteuthis sp. y Benthoctopus sp. las especies con la mayor importancia relativa, mientras que los calamares Todarodes filippovae, Gonatus antarcticus y Neorossia sp. fueron menos frecuentes en las capturas. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Artículo digital -
29485Publicado 2010Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
29486por Adamo, Maria Gabriella“…Grâce de Montrer son Âme Dans le VÃÂatement…”
Publicado 2019
Electrónico -
29487Publicado 2020Tabla de Contenidos: “…Conceptualizing National Family Policies: A Capabilities Approach; Jana Javornik & Mara A. Yerkes -- 8. Early Childhood Care and Education Policies That Make a Difference; Michel Vandenbroeck -- 9. …”
Libro electrónico -
29488
-
29489Publicado 2024“…Den Ausgangspunkt dafür bildet das Projekt der DASA Arbeitswelt Ausstellung zum Thema Storytelling. …”
Libro electrónico -
29490por Flanagan, DavidTabla de Contenidos: “…Canvas Reference; Canvas; Canvas.getContext(); Canvas.toDataURL(); CanvasGradient; CanvasGradient.addColorStop()…”
Publicado 2010
Libro electrónico -
29491Publicado 2023Libro electrónico
-
29492por ISPA (Conference)Tabla de Contenidos: “…Keynote Speech -- Localized Algorithms and Their Applications in Ad Hoc Wireless Networks -- Towards a Single System Image for High-Performance Java -- The Earth Simulator -- Computing on the Restricted LARPBS Model -- Applications on Web-Based and Intranet Systems -- Reliability of a Distributed Search Engine for Fresh Information Retrieval in Large-Scale Intranet -- Self-Projecting Time Series Forecast — An Online Stock Trend Forecast System -- A Web-Based Graphical Interface for General-Purpose High-Performance Computing Clusters -- Compiler and Optimization Techniques -- A Compressed Diagonals Remapping Technique for Dynamic Data Redistribution on Banded Sparse Matrix -- Scheduling Parallel Tasks onto NUMA Multiprocessors with Inter-processor Communication Overhead -- An Efficient Algorithm for Irregular Redistributions in Parallelizing Compilers -- Network Routing -- Balancing Traffic in Meshes by Dynamic Channel Selection -- An Ad Hoc On-Demand Routing Protocol with Alternate Routes -- Design of a Viable Fault-Tolerant Routing Strategy for Optical-Based Grids -- Performance Evaluation of Parallel Systems -- Direct Execution Simulation of Mobile Agent Algorithms -- MPI-2 Support in Heterogeneous Computing Environment Using an SCore Cluster System -- Internet Traffic Congestion Modelling and Parallel Distributed Analysis -- Wireless Communication and Mobile Computing -- Hierarchical Grown Bluetrees (HGB) — An Effective Topology for Bluetooth Scatternets -- A Comparative Investigation into Optimum-Time Synchronization Protocols for a Large Scale of One-Dimensional Cellular Automata -- Impact from Mobile SPAM Mail on Mobile Internet Services -- Parallel Algorithms (I) -- Solving the Set-Splitting Problem in Sticker-Based Model and the Lipton-Adelmann Model -- Parallel MCGLS and ICGLS Methods for Least Squares Problems on Distributed Memory Architectures -- Faster Sorting on a Linear Array with a Reconfigurable Pipelined Bus System -- Parallel Architecture and Network Topology -- An Extended Star Graph: A Proposal of a New Network Topology and Its Fundamental Properties -- Effective Admission Control for Real-Time Anycast Flow -- Synergy: A Comprehensive Software Distributed Shared Memory System -- On the Design of a Register Queue Based Processor Architecture (FaRM-rq) -- Data Mining and Evolutionary Computing -- A Scheme of Interactive Data Mining Support System in Parallel and Distributed Environment -- Parallel Algorithms for Mining Association Rules in Time Series Data -- Theory of Coevolutionary Genetic Algorithms -- Predicting the Solutions of a Challenging NLP Problem with Asynchronous Parallel Evolutionary Modeling Algorithm -- Image Processing and Modelling -- Complete Image Partitioning on Spiral Architecture -- Automatic Remote-Sensing Images Registration by Matching Close-Regions -- Parallel HyperFun Polygonizer -- Parallel Algorithms (II) -- A Parallel Solver Using Block Fourier Decompositions -- A Parallel Algorithm for Medial Axis Transformation -- A Vector-Parallel FFT with a User-Specifiable Data Distribution Scheme -- Network Security -- A Method for Sending Confidential Messages to a Group without Trusted Parties -- Key Agreement in Ad Hoc Networks -- Formalizing Active Networks Security with Seal-Calculus -- Research on Approaches of Iris Texture Feature Representation for Personal Identification -- Database and Multimedia Systems -- A Solution for Fault-Tolerance in Replicated Database Systems -- Information Hiding System StegoWaveK for Improving Capacity -- Multimedia Parallel Programming Tool for Cellular Automata Systems…”
Publicado 2003
Libro electrónico -
29493
-
29494Publicado 2015Libro
-
29495
-
29496Publicado 2004Tabla de Contenidos: “…6.4.1 Viewing AJPEData and AJPEResources item types -- 6.4.2 Storing LWWCM objects in AJPEData/AJPEResources objects -- 6.4.3 Viewing AJPEData and AJPEResources items -- 6.4.4 Viewing AJPEData XMLContent data -- Chapter 7. Publishing Content Manager content -- 7.1 Introduction -- 7.2 Prerequisites -- 7.2.1 LWWCM server -- 7.2.2 Content Manager server -- 7.2.3 Content Manager data -- 7.3 Federated content component -- 7.3.1 What is a federated content component? …”
Libro electrónico -
29497por Ballard, ChuckTabla de Contenidos: “…9.3.7 Configuring application server: adding our EGL Web Project -- 9.3.8 Setting the path to Informix JDBC client libraries on the application server -- 9.3.9 Adding an authentication alias to the application server -- 9.3.10 Adding a data source to the application server -- 9.4 Checkpoint -- 9.5 Setup tasks part 2 -- 9.5.1 Setting up the JDBC data source for use by the EGL compiler -- 9.5.2 Creating Data Parts -- 9.5.3 A sub-task to create a database connection resource -- 9.5.4 Returning to the Data Parts creation task -- 9.5.5 Results of the Data Parts Wizard -- 9.5.6 EGL statements Library: Package, Import, and Use -- 9.5.7 Creating our own EGL Package and Library -- 9.6 Final checkpoint -- 9.7 Alternate means to create JDBC data source -- Chapter 10. …”
Publicado 2005
Libro electrónico -
29498
-
29499Publicado 1756991007966419706719
-
29500