Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,954
- Publicaciones periódicas 1,946
- Educación 1,465
- Teología 1,214
- Education 1,119
- Psicología 1,091
- Periodicals 1,069
- Derecho 1,066
- Economía 1,005
- Filosofía 1,003
- Revistes 893
- Ciencias sociales 878
- Social sciences 762
- Medicina 688
- Humanidades 655
- Información general 575
- Psychology 572
- Agricultura 552
- Literatura 536
- Science 533
- Agriculture 494
- Psicología industrial 475
- Technology 473
- Tecnología 470
- Arquitectura 459
- Ciencia 459
- Psychology, Industrial 451
- Work 444
- Història 439
- Articulos Publicaciones periodicas 431
-
65761por Marcial Rubio“…Así, aborda en primer lugar la parte doctrinaria, con referencias marginales a la legislación nacional; luego, sin pretender un estudio detallado de cada artículo, revisa las normas generales de nuestra legislación sobre materia a fin de que el lector realice una rápida revisión de las disposiciones; finalmente, realiza estudios transversales del Código Civil sobre dos aspectos: las normas de forma del acto como requisito ad probationem o ad solemnitatem y la aplicación del artículo V del título preliminar…”
Publicado 2014
Texto completo en Odilo
Otros -
65762por Pérez, AnnaTabla de Contenidos: “…b) Compartir entre diferents escoles la tasca per ferc) Les conclusions de la tasca i el comiat dels participants; 2.3. Requisits per participar; 2.4. Participar en projectes telemàtics, una decisió compartida en elcentre; 2.4.1. …”
Publicado 2006
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
65763por Colobran Huguet, MiquelTabla de Contenidos: “…Funcions del servidor; 2.1. Requisits dels sistemes operatius de xarxa; 3. Elements del servidor; 3.1. …”
Publicado 2008
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
65764por Rubio Correa, MarcialTabla de Contenidos: “…Las normas que satisfacen el requisito de reserva de ley; 3.1.2.5. La caracterización de las leyes orgánicas; 3.1.2.6. …”
Publicado 2011
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
65765Publicado 2003Tabla de Contenidos: “…XIX); VIII. Período realista (2a. mitad del s. XIX); Índice; Introducción; I. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
65766Publicado 2021Tabla de Contenidos: “…10.2.5 Processing classification changes recap -- 10.3 Implementing an access model -- 10.3.1 Security groups -- 10.3.2 Securing Azure Data Explorer -- 10.3.3 Access model recap -- 10.4 Complying with GDPR and other considerations -- 10.4.1 Data handling -- 10.4.2 Data subject requests -- 10.4.3 Other considerations -- Summary -- 11 Distributing data -- 11.1 Data distribution overview -- 11.2 Building a data API -- 11.2.1 Introducing Azure Cosmos DB -- 11.2.2 Populating the Cosmos DB collection -- 11.2.3 Retrieving data -- 11.2.4 Data API recap -- 11.3 Serving machine learning -- 11.4 Sharing data for bulk copy -- 11.4.1 Separating compute resources -- 11.4.2 Introducing Azure Data Share -- 11.4.3 Sharing data for bulk copy recap -- 11.5 Data sharing best practices -- Summary -- Appendix A. …”
Libro electrónico -
65767Publicado 2021Tabla de Contenidos: “…8.5 Running parallel tests with Jenkins -- 8.6 Improving quality with code analysis -- 8.7 Running mocked database tests -- 8.8 Generating HTML coverage reports -- 8.9 Automating UI testing with Headless Chrome -- 8.10 Integrating SonarQube Scanner with Jenkins -- Summary -- 9 Building Docker images within a CI pipeline -- 9.1 Building Docker images -- 9.1.1 Using the Docker DSL -- 9.1.2 Docker build arguments -- 9.2 Deploying a Docker private registry -- 9.2.1 Nexus Repository OSS -- 9.2.2 Amazon Elastic Container Registry -- 9.2.3 Azure Container Registry -- 9.2.4 Google Container Registry -- 9.3 Tagging Docker images the right way -- 9.4 Scanning Docker images for vulnerabilities -- 9.5 Writing a Jenkins declarative pipeline -- 9.6 Managing pull requests with Jenkins -- Summary -- 10 Cloud-native applications on Docker Swarm -- 10.1 Running a distributed Docker Swarm cluster -- 10.2 Defining a continuous deployment process -- 10.3 Integrating Jenkins with Slack notifications -- 10.4 Handling code promotion with Jenkins -- 10.5 Implementing the Jenkins delivery pipeline -- Summary -- 11 Dockerized microservices on K8s -- 11.1 Setting up a Kubernetes cluster -- 11.2 Automating continuous deployment flow with Jenkins -- 11.2.1 Migrating Docker Compose to K8s manifests with Kompose -- 11.3 Walking through continuous delivery steps -- 11.4 Packaging Kubernetes applications with Helm -- 11.5 Running post-deployment smoke tests -- 11.6 Discovering Jenkins X -- Summary -- 12 Lambda-based serverless functions -- 12.1 Deploying a Lambda-based application -- 12.2 Creating deployment packages -- 12.2.1 Mono-repo strategy -- 12.2.2 Multi-repo strategy -- 12.3 Updating Lambda function code -- 12.4 Hosting a static website on S3 -- 12.5 Maintaining multiple Lambda environments -- 12.6 Configuring email notification in Jenkins -- Summary…”
Libro electrónico -
65768Publicado 2015Tabla de Contenidos: “…Using custom camera views -- Other functions -- Orientation to point -- Point to orientation -- Getting the location -- Self-test questions -- Summary -- Chapter 9: Google Maps Intents -- The need for Google Maps Intents -- Defining Intent requests -- Action -- URI -- Package -- Display maps -- Display maps with a specified zoom level -- Searching for a location -- Advanced search -- Label location -- Using navigation -- Displaying StreetViewPanorama -- Self-test questions -- Summary -- Chapter 10: Creating a Custom Map Application -- What the custom application does -- What additional libraries/classes do we use -- Prerequisites -- Adding dependencies -- Using the material design icons -- Adding permissions -- Defining the API key and Google Play services version -- Implementation -- Defining the app theme -- Defining strings -- Defining and creating a database -- Creating layouts -- Creating activities and fragments -- Summary -- Appendix: Answers to Self-test Questions -- Chapter 1, Setting Up the Development Environment -- Chapter 2, Configuring an API Key and Creating Our First Map Application -- Chapter 3, Working with Different Map Types -- Chapter 4, Adding Information to Maps -- Chapter 5, Interacting with a Map -- Chapter 6, Working with Custom Views -- Chapter 7, Working with Location Data -- Chapter 8, Knowing About the Street View -- Chapter 9, Google Maps Intents -- Index…”
Libro electrónico -
65769Publicado 2024Tabla de Contenidos: “…Chapter 8 Social Engineering in Cybersecurity-Threats and Defenses -- 8.1 Introduction -- 8.2 The Evolution of Social Engineering in the Context of Cybersecurity -- 8.3 Phases of Social Engineering -- 8.3.1 Discovery and Investigation -- 8.3.2 Deception and Hook -- 8.3.3 Attack -- 8.3.4 Retreat -- 8.4 Social Engineering Threats -- 8.4.1 Data Breaches -- 8.4.2 Risky Hybrid or Remote Work Environments -- 8.4.3 Mobile Attacks -- 8.4.4 Phishing -- 8.4.5 Ransomware -- 8.4.6 Crypto Jacking -- 8.4.7 Cyber-Physical Attacks -- 8.4.8 State-Sponsored Attacks -- 8.4.9 The Internet of Things (IoT) Attacks -- 8.5 Social Engineering Attacks -- 8.6 Social Engineering Defenses -- 8.6.1 Train Everybody in Your Organization -- 8.6.2 Determine Your Company's Valuable Assets -- 8.6.3 Set Up and Enforce Good Security Policies -- 8.6.4 Update Your Software Regularly -- 8.6.5 Do Not Share Private Information with Strangers -- 8.6.6 Implement Access Control Within Your Company -- 8.6.7 Watch Out for Pretexting and Strange Requests -- 8.6.8 Enforcement of Strong Passwords -- 8.7 Conclusion -- Chapter 9 A Machine Learning Algorithm to Tackle Chat Messages -- 9.1 Introduction -- 9.2 Social Engineering Attacks -- 9.3 Background -- 9.3.1 Backpropagations Algorithm -- 9.3.2 Apriori Algorithm -- 9.4 Literature Survey -- 9.5 Previous Work -- 9.6 Proposed Work -- 9.6.1 Accuracy -- 9.6.2 Context-Awareness -- 9.7 Future Scope -- 9.8 Conclusion -- Chapter 10 A Survey on a Security Model for the Internet of Things Environment -- 10.1 Introduction -- 10.2 Literature Survey -- 10.2.1 Supervised Learning-Based Attack Detection Methodologies -- 10.2.2 Data Integrity through the Fusion Mechanism -- 10.2.3 Ensemble Learning for Concept Drift -- 10.2.4 Ensemble Learning for Imbalance Data -- 10.2.5 Software Defined Networking (SDN) of Loading Security…”
Libro electrónico -
65770Publicado 2018Tabla de Contenidos: “…runAsync() - running a task asynchronously -- supplyAsync() - running a task asynchronously, with a return value -- Attaching a callback to the CompletableFuture -- Spring Security configuration -- Configuring Spring Security dependencies -- Configuring a security filter for incoming requests -- Configuring Spring Security -- Adding a controller -- Authentication cache -- Implementing the caching configuration class -- Providing UserCache to AuthenticationProvider -- Providing AuthenticationProvider to AuthenticationManagerBuilder -- Fast and stateless API authentication with Spring Security -- API authentication with the JSESSIONID cookie -- API authentication without the JSESSIONID cookie -- Monitoring and managing Tomcat with JMX -- Connecting JMX to monitor Tomcat -- Creating an MBean -- Exporting an MBean in a Spring context -- Spring MVC performance improvements -- High performance using connection pooling -- Hibernate improvements -- Testing improvements -- Proper server maintenance -- Using the authentication cache with Spring Security -- Implementing Executor service framework -- Summary -- Chapter 5: Understanding Spring Database Interactions -- Spring JDBC configuration -- Problems with core JDBC -- Solving problems with Spring JDBC -- Spring JDBC dependencies -- Spring JDBC example -- Database design for optimal performance -- Table design -- Vertical partitioning of a table -- Use indexing -- Using the correct data type -- Defining column constraints -- Using stored procedures -- Transaction management -- Choosing a transaction manager in Spring -- Declarative ACID using @Transactional -- Optimal isolation levels -- Read uncommitted -- Read committed -- Repeatable read -- Serializable -- Optimal fetch size -- Optimal connection pooling configuration -- Sizing the connection pool -- Validate connections -- Connection leaks…”
Libro electrónico -
65771por OECDTabla de Contenidos: “…-- Biens importés : biens de faible valeur par opposition à l'ensemble des biens -- Ventes entre entreprises (B2B) et ventes des entreprises aux consommateurs finaux (B2C) -- 2.2.4. Informations requises pour le fonctionnement du régime de responsabilité intégrale en matière de TVA/TPS -- 2.2.5. …”
Publicado 2019
Libro electrónico -
65772Publicado 2023Tabla de Contenidos: “…Chapter 15: Planning For, Conducting, and Managing eDiscovery Cases -- Recommending eDiscovery (Standard) or eDiscovery (Premium) -- Planning for content searches and eDiscovery -- Delegating the required permissions to use search and discovery tools -- Creating eDiscovery cases -- Managing eDiscovery cases -- Adding custodians -- Collecting data -- Analyzing the review set results -- Exporting and downloading case data -- Additional tasks -- Summary -- Questions -- Further reading -- Chapter 16: Managing Regulatory and Privacy Requirements -- Planning your regulatory compliance journey in Microsoft 365 -- Managing regulatory compliance in Microsoft Purview Compliance Manager -- Access to Compliance Manager -- Improvement actions -- Assessments and assessment templates -- Exploring Microsoft Priva -- Implementing privacy risk management -- Implementing and managing Subject Rights Requests with Microsoft Priva -- Summary -- Questions -- Further reading -- Chapter 17: Managing Insider Risk Solutions in Microsoft 365 -- Implementing Customer Lockbox -- Implementing and managing Communication Compliance policies -- Implementing and managing insider risk management policies -- Getting started with Insider Risk Management policies -- Creating Insider Risk Management policies -- Implementing and managing Information Barriers policies -- Segments and policies for Information Barriers -- Implementing and managing Privileged Access Management -- Summary -- Questions -- Further reading -- Answers -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 11 -- Chapter 12 -- Chapter 13 -- Chapter 14 -- Chapter 15 -- Chapter 16 -- Chapter 17 -- Index -- About Packt -- Other Books You May Enjoy…”
Libro electrónico -
65773Publicado 2004Tabla de Contenidos: “…-- Do women have the requisite financial knowledge, skills, and experience? …”
Libro electrónico -
65774por Costales, BryaneTabla de Contenidos: “…Table of Contents; Preface; Changes Since the Previous Edition; Why This Book Is Necessary; History; Thoughts from Eric Allman; Organization; Audience and Assumptions; Unix and sendmail Versions; Conventions Used in This Book; Using Code Examples; Additional Sources of Information; Other Books, Other Problems; How to Contact Us; Safari® Books Online; Acknowledgments; Some Basics; 1.1 Email Basics; 1.2 Requests for Comments (RFCs); 1.3 Email and sendmail; 1.3.1 Other MTAs; 1.3.2 Why sendmail Is So Complex; 1.4 Basic Parts of sendmail; 1.4.1 The Configuration File; 1.4.2 The Queue…”
Publicado 2007
Libro electrónico -
65775por Akin, ThomasTabla de Contenidos: “…ICMP Timestamp and Information Requests; 7.2. Source Routing; 7.3. Small Services; 7.4. …”
Publicado 2002
Libro electrónico -
65776Publicado 2017Tabla de Contenidos: “…Factory method -- Object pool -- Decorator -- Facade -- Proxy -- Observer -- Strategy -- Further patterns -- Domain-Driven Design -- Services -- Entities -- Value objects -- Aggregates -- Repositories -- Factories -- Domain event -- External and cross-cutting concerns in enterprise applications -- Communication with external systems -- How to choose communication technology -- Synchronous HTTP communication -- Representational State Transfer -- Java API for RESTful web services -- Mapping HTTP content types -- Validating requests -- Mapping errors -- Accessing external systems -- Stability when consuming HTTP -- Accessing Hypermedia REST services -- Asynchronous communication and messaging -- Asynchronous HTTP communication -- Message-oriented communication -- Server-sent events -- WebSocket -- Connecting enterprise technology -- Database systems -- Integrating RDBMS systems -- Mapping domain models -- Integrating database systems -- Transactions -- Relational databases versus NoSQL -- Cross-cutting concerns -- Configuring applications -- Caching -- Flow of execution -- Synchronous execution -- Asynchronous execution -- Asynchronous EJB methods -- Managed Executor Service -- Asynchronous CDI events -- Scopes in asynchronicity -- Timed execution -- Asynchronous and reactive JAX-RS -- Concepts and design principles of modern Java EE -- Preserving maintainable code with high quality -- Summary -- Chapter 4: Lightweight Java EE -- Lightweight enterprise technology -- Why Java EE standards? …”
Libro electrónico -
65777Publicado 2015Tabla de Contenidos: “…-- International e-Discovery -- Expert testimony -- Additional resources -- Expert testimony -- Summary -- References -- Chapter 8 - Internet and e-mail -- Information in This Chapter: -- Introduction -- Internet overview -- Additional resources -- Web technology -- Peer-to-peer (P2P) -- More advanced -- Gnutella requests -- The index.dat file -- Web browsers-Internet Explorer -- Cookies -- Temporary Internet Files, a.k.a. web Cache -- Internet history -- More advanced -- The ntuser.dat file -- Internet Explorer artifacts in the registry -- Chat clients -- Internet Relay Chat -- "I seek you" -- E-mail -- Accessing e-mail -- E-mail protocols -- E-mail as evidence -- E-mail-covering the trail -- Alert! …”
Libro electrónico -
65778Publicado 2021Tabla de Contenidos: “…-- The chief needs a fancy tollbooth -- It started as HTTP requests, and it failed -- AJ and Miranda take time to reflect -- AJ ponders about streaming systems -- Comparing backend service and streaming -- How a streaming system could fit -- Queues: A foundational concept -- Data transfer via queues -- Our streaming framework (the start of it) -- The Streamwork framework overview -- Zooming in on the Streamwork engine -- Core streaming concepts -- More details of the concepts -- The streaming job execution flow -- Your first streaming job -- Executing the job -- Inspecting the job execution -- Look inside the engine -- Keep events moving -- The life of a data element -- Reviewing streaming concepts -- Summary -- Exercises -- 3 Parallelization and data grouping -- The sensor is emitting more events -- Even in streaming, real time is hard -- New concepts: Parallelism is important -- New concepts: Data parallelism -- New concepts: Data execution independence -- New concepts: Task parallelism -- Data parallelism vs. task parallelism…”
Libro electrónico -
65779Publicado 2004Tabla de Contenidos: “…SAP BW technical overview -- 2.1 SAP BW information model -- 2.2 Dataflow in SAP BW -- 2.3 Information access -- 2.4 Hierarchies -- 2.5 Extended star schema (InfoCubes) -- 2.6 Dataload into InfoCube -- 2.7 Aggregates -- 2.7.1 Aggregate example -- 2.7.2 Maintaining aggregates -- 2.8 Compression of requests -- 2.9 Operational data store (ODS) -- 2.10 The SAP BW functional components -- 2.11 SAP BW business content -- Chapter 3. …”
Libro electrónico -
65780Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Preface -- Part 1: Introducing Multiplayer Games -- Chapter 1: Getting Started with Multiplayer Game Development -- Technical requirements -- Pre-requisite knowledge -- Hardware requirements -- Software requirements -- Introducing multiplayer games -- Becoming a network programmer in video games -- Understanding multiplayer game categories -- First-person shooters -- Third-person shooters -- Real-time strategy -- Massively multiplayer online role-playing games -- Multi-user dungeons -- Multiplayer online battle arena -- Reviewing gameplay twists -- Asymmetrical gameplay -- Hide-and-seek gameplay -- Asynchronous gameplay -- Is multiplayer technology just for games? …”
Libro electrónico