Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,954
- Publicaciones periódicas 1,946
- Educación 1,465
- Teología 1,214
- Education 1,119
- Psicología 1,091
- Periodicals 1,069
- Derecho 1,066
- Economía 1,005
- Filosofía 1,003
- Revistes 893
- Ciencias sociales 878
- Social sciences 762
- Medicina 688
- Humanidades 655
- Información general 575
- Psychology 572
- Agricultura 552
- Literatura 536
- Science 533
- Agriculture 494
- Psicología industrial 475
- Technology 473
- Tecnología 470
- Arquitectura 459
- Ciencia 459
- Psychology, Industrial 451
- Work 444
- Història 439
- Articulos Publicaciones periodicas 431
-
65481Publicado 2007Tabla de Contenidos: “…7.4 Hierarchical Modulation7.5 Automatic Repeat Request, Hybrid FEC/ARQ; 7.6 Summary and Further Reading; References; Chapter 8. …”
Libro electrónico -
65482
-
65483por Pachev, Alexander, 1973-Tabla de Contenidos: “…innodb_flush_log_at_trx_commitinnodb_file_per_table; innodb_lock_wait_timeout; innodb_force_recovery; init-file; key_buffer_size; language; log; log-bin; log-isam; log-slow-queries; max_allowed_packet; max_connections; max_heap_table_size; max_join_size; max_sort_length; myisam-recover; query_cache_type; read_buffer_size; relay-log; server-id; skip-grant-tables; skip-stack-trace; slave-skip-errors; sort_buffer_size; sql-mode; table_cache; temp-pool; transaction-isolation; Thread-Based Request Handling; Threads Versus Processes; Advantages of Using Threads; Disadvantages of Using Threads…”
Publicado 2007
Libro electrónico -
65484por Harold, Elliotte RustyTabla de Contenidos: “…Table of Contents; Preface; What's New in This Edition; Organization of the Book; Part I: Basic I/O; Part II: Data Sources; Part III: Filter Streams; Part IV: New I/O; Part V: The File System; Part VI: Text; Part VII: Devices; Who You Are; About the Examples; Conventions Used in This Book; Request for Comments; Safari Enabled; Acknowledgments; Part I; Introducing I/O; What Is a Stream?…”
Publicado 2006
Libro electrónico -
65485por Sheppard, Andrew, 1961-Tabla de Contenidos: “…Initial 10 limitNo transfer of credits; Payments from anonymous proxies will be rejected; Delays; Minimize money transfer fees; Exchange rate fees; VAT; Claim Your Money Back; The No-Quibble Refund; The Quibble Refund; Requesting a Charge Back; Avoid Higher SkypeOut Rates; Higher-Rate Avoidance Strategies; Avoid Additional Mobile Phone Charges; Make Money with Skype; Skype Points; Make Money with the Skype API; Avoid Forfeiting SkypeOut Credits; Get the Best Deal for VoIP Telephony; Round Call Time to Your Advantage; Round Calls and Save Money; Manage Bandwidth Costs; Monitoring; Metering…”
Publicado 2005
Libro electrónico -
65486por Chiaretta, SimoneTabla de Contenidos: “…ADO.NET Database ObjectsADO.NET Entity Framework; XML; Important Considerations about Creating Data Models; Third-Party Components and Tools; Summary; Exercise; Chapter 5: The Controller; What the Controller Does; Creating a Controller; Defining an Action; Passing Data to the View; Retrieving Data from the Request; Types of Action Results; Using the Core ASP.NET Objects; Summary; Exercises; Chapter 6: The View; The Responsibilities of the View; The Anatomy of a View; Creating a View with Visual Studio; Writing HTML the ASP.NET MVC Way; What about the rest?…”
Publicado 2009
Libro electrónico -
65487por Siggelkow, BillTabla de Contenidos: “…3.9 Generating Dynamic Select List OptionsProblem; Solution; Discussion; See Also; 3.10 Filtering Text Input; Problem; Solution; Discussion; See Also; 3.11 Generating a Set of Related Radio Buttons; Problem; Solution; Discussion; See Also; 3.12 Handling Unchecked Checkboxes; Problem; Solution; Discussion; See Also; 3.13 Handling Date Input Fields; Problem; Solution; Discussion; See Also; 3.14 Setting Tab Order; Problem; Solution; Discussion; See Also; 3.15 Generating URLs; Problem; Solution; Discussion; See Also; 3.16 Adding Request Parameters to a Link; Problem; Solution; Discussion…”
Publicado 2005
Libro electrónico -
65488por Knudsen, JonathanTabla de Contenidos: “…; About This Book; What's Not in This Book; About the Examples; Versions; File Naming; CLASSPATH; Variable Naming; Downloading; Font Conventions; Request for Comments; Acknowledgments; Chapter 1. …”
Publicado 1998
Libro electrónico -
65489por Goodman, DannyTabla de Contenidos: “…Table of Contents; Preface; About You; About the Recipes; What's in This Book; Browser Platforms; Conventions Used in This Book; Request for Comments; Acknowledgments; Strings; 1.0 Introduction; Creating a String; Regular Expressions; 1.1 Concatenating (Joining) Strings; Problem; Solution; Discussion; See Also; 1.2 Accessing Substrings; Problem; Solution; Discussion; See Also; 1.3 Changing String Case; Problem; Solution; Discussion; See Also; 1.4 Testing Equality of Two Strings; Problem; Solution; Discussion; See Also; 1.5 Testing String Containment Without Regular Expressions; Problem…”
Publicado 2003
Libro electrónico -
65490por Galbraith, PatrickTabla de Contenidos: “…Chapter 12: Contact List ApplicationUsing MySQL and memcached Together; A CGI Program; Program Flow; WebApp Class Methods; Database Methods; Caching Methods; Other Methods; Testing; Summary; Chapter 13: mod_perl; New mod_perl 2.0 Features; Configuring mod_perl; mod_perl Configuration Directives; mod_perl Handler Directives; Apache Life Cycle Overview; Perl Apache2 Modules; Summary; Chapter 14: Using mod_perl Handlers; PerlResponseHandler Example; Connection mod_perl Handlers; PerlPreConnectionHandler Example; Other HTTP Request Cycle Phase Handlers; Summary; Chapter 15: More mod_perl…”
Publicado 2009
Libro electrónico -
65491por Dwivedi, HimanshuTabla de Contenidos: “…Acknowledgments; Introduction; Book Overview; Lab Setup; SIP/IAX/H.323 Server; SIP Setup; H.323 Setup (Ekiga); IAX Setup; 1: An Introduction to VoIP Security; Why VoIP; VoIP Basics; How It Works; Protocols; Deployments; VoIP Security Basics; Authentication; Authorization; Availability; Encryption; Attack Vectors; Summary; PART I: VoIP Protocols; 2: Signaling: SIP Security; SIP Basics; SIP Messages; Making a VoIP Call with SIP Methods; Registration; The INVITE Request; Enumeration and Registration; Enumerating SIP Devices on a Network; Registering with Identified SIP Devices; Authentication…”
Publicado 2008
Libro electrónico -
65492por Fleischauer, MichaelTabla de Contenidos: “…Using an offscreen frame buffer to take a screenshotChapter 8: Working with the Model Library; Introduction; Importing a 3D model for use in PlayStation Mobile; Loading and displaying a 3D model; Using BasicProgram to perform texture and shader effects; Controlling lighting using BasicProgram; Animating a model; Handling multiple animations; Using bones to add a sword to our animated model; Chapter 9: Finishing Touches; Introduction; Opening and loading a web browser; Socket-based client and server networking; Accessing (Twitter) data over the network using REST and HttpWebRequest…”
Publicado 2013
Libro electrónico -
65493por Sy, Dux RaymondTabla de Contenidos: “…Adding Stakeholders to the PMISProject Communications Plan; Site Access in SharePoint; Creating SharePoint Groups; Adding Site Members; Enabling the Access Request Feature; Customizing Permissions; Workshop 4.1: Adding Site Members; Part 1: Adding Site Members; Part 2: Customizing List Permissions; Workshop 4.1 Debriefing; Best Practices Checklist; Summary; Chapter 5. …”
Publicado 2012
Libro electrónico -
65494por Lyons, SuzanneTabla de Contenidos: “…; MAKING DEPOSITS: DETAILS; GET YOUR VISA OR MASTERCARD NOW; THE CHECKS AND VISA ARE IN YOUR NAME ONLY!; CHECK REQUEST FORM; PAYROLL COMPANY OR NOT?; Chapter 6 Sales Presentation and Finding Investors; PREPARATION; OUTLINE; BOOKING THE VENUE; GETTING THE WORD OUT; LOGISTICS; SETTING UP THE ROOM; YOUR ASSISTANTS REPRESENT YOUR COMPANY; IT'S SHOWTIME: WELCOME EVERYONE…”
Publicado 2012
Libro electrónico -
65495por Kuryanovich, EgorTabla de Contenidos: “…3D graphics with WebGLBetter animation performance with requestAnimationFrame; Music and sound with HTML5 audio and the audio data APIs; Real-time multiplayer gameplay with WebSockets; Store data locally with IndexedDB, Local Storage, and other APIs; Play games offline with the application cache; Immersive gameplay with the FullScreen API; Tame the mouse with the Mouse Lock API; Console-like experience with the Gamepad API; Identify players with services like BrowserID; Create native OS applications with environments like WebRT; With much more on the way…”
Publicado 2012
Libro electrónico -
65496por Miller, Mark, 1955-Tabla de Contenidos: “…WorkflowData View web parts/forms; Scripts; Rudder Workflow; Empowered Utopia in 10 Steps; Configuration Management Is Thoughtful Maintenance; Empowerment Without Responsibility Is Chaos; Summary; Chapter 3. jQuery to the Rescue; Automate an All-Day Event; Requesting a Review Only Once Per User; jQuery to the Rescue; Step 1: Adding the libraries; Step 2: Getting the case numbers; Step 3: Getting the last survey item ID; Step 4: Changing the survey link; Default Text Based on Radio Button Click; Writing a Survey ID to a List on Response Creation (without Workflow)…”
Publicado 2012
Libro electrónico -
65497por Galloway, Jon AlanTabla de Contenidos: “…Seeding a Database Editing an Album; Building a Resource to Edit an Album; Models and View Models Redux; The Edit View; Responding to the Edit POST Request; The Edit Happy Path; The Edit Sad Path; Model Binding; The DefaultModelBinder; Explicit Model Binding; Summary; Chapter 5: Forms and HTML Helpers; Using Forms; The Action and the Method; To GET or to POST?…”
Publicado 2012
Libro electrónico -
65498por Stackpole, Cynthia, 1962-Tabla de Contenidos: “…Acknowledgments vii Introduction ix 1 Initiating Forms 1 1.0 Initiating Process Group / 1 1.1 Project Charter / 2 1.2 Stakeholder Register / 8 1.3 Stakeholder Analysis Matrix / 11 2 Planning Forms 13 2.0 Planning Process Group / 13 2.1 Project Management Plan / 16 2.2 Scope Management Plan / 20 2.3 Requirements Management Plan / 23 2.4 Requirements Documentation / 27 2.5 Requirements Traceability Matrix / 29 2.6 Project Scope Statement / 33 2.7 Assumption and Constraint Log / 36 2.8 Work Breakdown Structure / 38 2.9 WBS Dictionary / 40 2.10 Schedule Management Plan / 43 2.11 Activity List / 46 2.12 Activity Attributes / 48 2.13 Milestone List / 51 2.14 Network Diagram / 53 2.15 Activity Resource Requirements / 55 2.16 Resource Breakdown Structure / 57 2.17 Activity Duration Estimates / 59 2.18 Duration Estimating Worksheet / 61 2.19 Project Schedule / 65 2.20 Cost Management Plan / 68 2.21 Activity Cost Estimates / 71 2.22 Cost Estimating Worksheet / 73 2.23 Cost Baseline / 78 2.24 Quality Management Plan / 80 2.25 Quality Metrics / 83 2.26 Process Improvement Plan / 85 2.27 Responsibility Assignment Matrix / 91 2.28 Roles and Responsibilities / 93 2.29 Human Resource Management Plan / 96 2.30 Communications Management Plan / 100 2.31 Risk Management Plan / 102 2.32 Risk Register / 109 2.33 Probability and Impact Assessment / 112 2.34 Probability and Impact Matrix / 117 2.35 Risk Data Sheet / 119 2.36 Procurement Management Plan / 122 2.37 Source Selection Criteria / 127 2.38 Stakeholder Management Plan / 129 2.39 Change Management Plan / 132 3 Executing Forms 135 3.0 Executing Process Group / 135 3.1 Team Member Status Report / 137 3.2 Change Request / 143 3.3 Change Log / 148 3.4 Decision Log / 150 3.5 Quality Audit / 152 3.6 Team Directory / 155 3.7 Team Operating Agreement / 157 3.8 Team Performance Assessment / 160 3.9 Team Member Performance Assessment / 165 3.10 Issue Log / 170 4 Monitoring and Control Forms 173 4.0 Monitoring and Controlling Process Group / 173 4.1 Project Performance Report / 175 4.2 Variance Analysis / 181 4.3 Earned Value Status / 185 4.4 Risk Audit / 188 4.5 Contractor Status Report / 192 4.6 Formal Acceptance / 196 5 Closing 199 5.0 Closing Process Group / 199 5.1 Procurement Audit / 199 5.2 Contract Close-Out / 203 5.3 Project or Phase Close-Out / 207 5.4 Lessons Learned / 211…”
Publicado 2013
Libro electrónico -
65499Publicado 2018Tabla de Contenidos: “…-- The concept of a port scanner -- How to create an efficient port scanner -- Summary -- Chapter 3: Sniffing and Penetration Testing -- Introducing a network sniffer -- Passive sniffing -- Active sniffing -- Implementing a network sniffer using Python -- Format characters -- Learning about packet crafting -- Introducing ARP spoofing and implementing it using Python -- The ARP request -- The ARP reply -- The ARP cache -- Testing the security system using custom packet crafting -- A half-open scan -- The FIN scan -- ACK flag scanning -- Summary -- Chapter 4: Network Attacks and Prevention -- Technical requirements -- DHCP starvation attack -- The MAC flooding attack -- How the switch uses the CAM tables -- The MAC flood logic -- Gateway disassociation by RAW socket…”
Libro electrónico -
65500por Percival, JohnTabla de Contenidos: “…Canvas Browser SupportAnimated Gifs; Canvas in Advertising; SVG; RaphaëlJS; SMIL; Canvas and SVG; SVG in Advertising; Web Fonts; WOFF; TrueType Fonts; Embedded OpenType; Using SVG with Fonts; Font Squirrel; Web Font Licensing; Web Fonts in Advertising; Summary; CHAPTER 5 Animations and Presentations; Browser Support; CSS3 Animations; Vendor Prefixes; Going Prefixless; JavaScript Animation vs. CSS3 Animation; requestAnimationFrame, setInterval, and setTimeout?…”
Publicado 2013
Libro electrónico