Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 953
- Management 817
- Computer networks 801
- Control de calidad 753
- Computer Science 715
- History 702
- Security measures 662
- Historia 614
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
50161Publicado 2017“…Apply core security techniques including 2FA and strong passwords Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods Use the security-focused Tails distribution as a quick path to a hardened workstation Compartmentalize workstation tasks into VMs with varying levels of trust Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can't be used Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream Set up standalone Tor services and hidden Tor services and relays Secure Apache and Nginx web servers, and take full advantage of HTTPS Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC Systematically protect databases via network access control,..…”
Libro electrónico -
50162Publicado 2016“…With this guide, you will Understand the discipline and vocabulary of testing from the developer’s standpoint Base developer tests on well-established testing techniques and best practices Recognize code constructs that impact testability Effectively name, organize, and execute unit tests Master the essentials of classic and “mockist-style” TDD Leverage test doubles with or without mocking frameworks Capture the benefits of programming by contract, even without runtime support for contracts Take control of dependencies between classes, components, layers, and tiers Handle combinatorial explosions of test cases, or scenarios requiring many similar tests Manage code duplication when it can’t be eliminated Actively maintain and improve your test suites Perform more advanced tests at the integration, system, and end-to-end levels Develop an understanding for how the organizational context influences quality assurance Establish well-balanc..…”
Libro electrónico -
50163Publicado 2023“…What you will learn Execute commands to launch applications, control services, and change network settings Develop your skills to use commands for package management, file manipulation, and networking Get clear explanations and practical examples for each command Discover tips and techniques to use the Linux command line effectively Get to grips with troubleshooting common problems and fixing errors Master best practices to manage and maintain Linux systems Develop expertise in system performance, security, and Linux in the cloud Who this book is for This book is for system administrators, IT professionals, and students who want to enhance their knowledge of Linux administration and improve their skills in this field. …”
Libro electrónico -
50164Publicado 2023“…What you will learn Navigate and utilize Xcode for app development Design interfaces using SwiftUI components like Views, HStack, and VStack Implement Swift basics including variables, types, and control structures Create and manage Lists and Arrays in Swift Integrate and manage data with SwiftData Fetch and handle data from Web APIs Decode and display JSON data effectively Audience This course is ideal for beginners and newcomers in the field of iPhone App Development. …”
Video -
50165Publicado 2023“…Clint has contributed to the field as the author of two insightful books: 'Hacking Exposed: Industrial Control Systems' and 'ChatGPT for Cybersecurity Cookbook.' …”
Video -
50166Publicado 2007“…The book also Presents step-by-step coverage of developing persistence, business logic, and presentation tiers with WTP and Java Introduces best practices for multiple styles of Web and Java EE development Demonstrates JDBC database access and configuration Shows how to configure application servers for use with WTP Walks through creating Web service application interfaces Covers automated testing with JUnit and Cactus, and automated builds utilizing Ant, Maven, and CruiseControl Introduces testing and profiling Web applications with the Eclipse Test and Performance Tools Platform (TPTP) project Describes how to extend WTP with new servers, file types, and WSDL extensions Foreword Preface Acknowledgments About the Authors Part I: Getting Started Chapter 1: Introduction Chapter 2: About the Eclipse Web Tools Platform Project Chapter 3: Quick Tour Chapter 4: Setting Up Your Workspace Part II: Java Web Application Development Chapter 5: Web Application Architecture and Design Chapter 6: Organizing Your Development Project Chapter 7: The Presentation Tier Chapter 8: The Business Logic Tier Chapter 9: The Persistence Tier Chapter 10: Web Services Chapter 11: Testing Part III: Extending WTP Chapter 12: Adding New Servers Chapter 13: Supporting New File Types Chapter 14: Creating WSDL Extensions Chapter 15: Customizing Resource Resolution Part IV: Products and Plans Chapter 16: Other Web Tools Based on Eclipse Chapter 17: The Road Ahead Glossary References Index This book is an invaluable resource for every Eclipse and enterprise Java Web developer: both those who use Eclipse to build other Web applications, and those who build Eclipse technologies into their own products. …”
Libro electrónico -
50167por Diamond, Scott B.“…Highlights of This Book Include • Navigating within the Visual Basic Editor • Using variables, constants, and data types • Employing built-in functions • Creating procedures • Understanding object-and event-driven coding • Working with arrays • Understanding scope • Working with forms • Using selection controls • Creating reports • Exploring menus, navigation, and ribbons • Using object models • Working with data • Defining database schema • Using the Windows API • Working with XML files • Exploring Access SQL On the Website Download database files used in the book at www.quepublishing.com. …”
Publicado 2008
Libro electrónico -
50168Publicado 2008“…Coverge includes Using AJAX to implement Model-View-Controller (MVC) in the browser Encapsulating user interface functionality to facilitate code reuse and reduce cross-browser development problems Overcoming the unique security challenges associated with AJAX Web applications Optimizing AJAX usability: the "back" button, caching, bookmarking, offline usage, and beyond ..…”
Libro electrónico -
50169Publicado 2003“…Here's a sampling of what you'll find: Drawing shapes at runtime Controlling movie clips programmatically Accepting user input and manipulating text strings Accessing audio and video via Flash Communications Server Working with Flash Remoting to connect to back end databases Using record sets with data grids And, much, much more in over 20 recipe-laden chapters... …”
Libro electrónico -
50170Publicado 2007“…Introduction Part I: Creating Forms Chapter 1 Creating and Using a Form Chapter 2 Working with Form Controls Chapter 3 Designing Forms for Efficient and Accurate Data Entry Chapter 4 Designing Forms for Business Use Chapter 5 Creating Specialized Forms Part II: Designing and Customizing Reports Chapter 6 Creating and Publishing a Report Chapter 7 Designing Effective Business Reports Chapter 8 Designing Advanced Reports Chapter 9 Creating Specialized Reports Part III: Creating Powerful Queries Chapter 10 Creating a Basic Query Chapter 11 Building Criteria Expressions Chapter 12..…”
Libro electrónico -
50171Publicado 2004“…You'll learn how to unlock the power of all the new Elements 3 features, including how to manage your photos using the new Organizer, how to use the new "pro tools" like the Healing Brush and the Shadow/Highlight controls, and how to master the new "Creation" section to take your photos to an entirely new level. …”
Libro electrónico -
50172por Hamilton, J. P.“…VTable modification, which allows control of the HRESULT (or status code) returned by a call to a COM method. …”
Publicado 2000
Libro electrónico -
50173por Bejtlich, Richard“…No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? …”
Publicado 2005
Libro electrónico -
50174por Hernandez, Michael J. 1955-“…– Matt Greer , Process Control Development, The Dow Chemical Company “Mike’s approach to database design is totally common-sense based, yet he’s adhered to all the rules of good relational database design. …”
Publicado 2003
Libro electrónico -
50175Publicado 1999“…Word exposes nearly all of its functionality through its object model, which allows Word to be controlled programmatically using VBA. While the Word object model, with almost 200 objects, is the largest among the Office applications, readers need be familiar with only a handful of objects. …”
Libro electrónico -
50176Publicado 2007“…Plan your implementation and migration to Exchange 2007 Confirm that your architecture of Exchange 2007 meets best practices Build a lab environment to test that your migration, implementation, and support processes are valid Implement Cluster Continuous Replication for effective disaster recovery of a failed Exchange server or site Integrate Exchange 2007 Unified Messaging into an existing telephony environment Optimize Exchange 2007 for a scalable enterprise environment Administer and support Exchange on an ongoing basis Introduction Part I Microsoft Exchange Server 2007 Overview 1 Exchange Server 2007 Technology Primer 2 Best Practices at Planning, Prototyping, Migrating, and Deploying Exchange Server 2007 Part II Planning and Designing an Exchange Server 2007 Environment 3 Understanding Core Exchange Server 2007 Design Plans 4 Architecting an Enterprise-Level Exchange Environment 5 Integrating Exchange Server 2007 in a Non-Windows Environment 6 Understanding Network Services and Active Directory Domain Controller Placement for Exchange Server 2007 Part III Implementing Exchange Server 2007 Services 7 Installing Exchange Server 2007 8 Implementing Edge Services for an Exchange Server 2007 Environment 9 Using the Windows PowerShell in an Exchange Server 2007 Environment Part IV Securing an Exchange Server 2007 Environment 10 Client-Level Secured Messaging 11 Server and Transport-Level Security 12 Encrypting Email Communications with Exchange Server 2007 13 Securing Exchange Server 2007 with ISA Server 14 Understanding Enterprise Policy Enforcement Security Part V Migrations and Coexistence with Exchange Server 2007 15 Migrating from Windows 2000 Server to Windows Server 2003 16 Migrating to Exchange Server 2007 17 Implementing Client Access and Hub Transport Servers 18 Administering ..…”
Libro electrónico -
50177por Cattell, R. G. G.“…J2EE technology helps the US Military Traffic Management Command, Freight Systems Office (FSO) manage and control costs of small package shipping. 0201746220B01172002…”
Publicado 2001
Libro electrónico -
50178Publicado 2008“…This book will teach you how to implement media resources, LDAP directory integration, and various endpoints including Skinny Client Control Protocol (SCCP) and Session Initiation Protocol (SIP). …”
Libro electrónico -
50179por Rand-Hendriksen, Morten“…· Import text from Microsoft Word and other software · Make the most of Expression Web 2’s advanced image-editing features · Create hyperlinks that simplify navigation, perform actions, and send commands · Write error-free code quickly and easily with Code View and IntelliSense · Use CSS to control your site’s appearance, create standards-based, cross-browser content, and simplify redesigns · Design site layouts that communicate more effectively · Use Dynamic Web Templates to consistently format (or reformat) hundreds of pages · Implement state-of-the-art interactivity with Behaviors · Add Silverlight, Flash, and other multimedia content · Build a web-based email form with FrontPage Server Extensions and PHP · Integrate web application code written in ASP.NET or PHP Morten Rand-Hendriksen is a web designer, developer, programmer, and digital media expert based in Burnaby, B.C., Canada. …”
Publicado 2009
Libro electrónico -
50180por Roland, John F.“…Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. …”
Publicado 2004
Libro electrónico