Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,954
- Publicaciones periódicas 1,946
- Educación 1,465
- Teología 1,214
- Education 1,119
- Psicología 1,091
- Periodicals 1,069
- Derecho 1,066
- Economía 1,005
- Filosofía 1,003
- Revistes 893
- Ciencias sociales 878
- Social sciences 762
- Medicina 688
- Humanidades 655
- Información general 575
- Psychology 572
- Agricultura 552
- Literatura 536
- Science 533
- Agriculture 494
- Psicología industrial 475
- Technology 473
- Tecnología 470
- Arquitectura 459
- Ciencia 459
- Psychology, Industrial 451
- Work 444
- Història 439
- Articulos Publicaciones periodicas 431
-
65981Publicado 2024Tabla de Contenidos: “…Stream inspectors -- Wizard and binder inspectors -- Summary -- Chapter 9: Stream Inspectors -- Relevant protocols for the stream inspector -- IP -- ICMP -- TCP -- UDP -- Flow -- The stream inspectors -- stream_ip -- stream_udp -- stream_icmp -- stream_tcp -- stream_base -- Summary -- Chapter 10: HTTP Inspector -- Basics of HTTP -- HTTP request -- HTTP response -- HTTP/2 -- HTTP inspector -- HTTP buffers -- HTTP/2 inspector -- HTTP inspector configuration -- Summary -- Chapter 11: DCE/RPC Inspectors -- A DCE/RPC overview -- Connectionless versus connection-oriented DCE/RPC -- DCE/RPC inspectors -- DCE/RPC rule options -- Exercise -- Summary -- Chapter 12: IP Reputation -- Background -- IP address as an entity - use of blocklists -- Challenges -- History of IP blocking in Snort -- Configuration of the IP reputation inspector module -- Functionality of the IP reputation inspector -- Data structure for storing IP reputation scores -- IP reputation inspector - alerts and pegs -- Summary -- Part 4: Rules and Alerting -- Chapter 13: Rules -- Snort rule - the structure -- Service rule -- File rule -- File identification rule -- Rule header -- Traditional rule header -- Rule options -- General rule options -- Payload options -- Non-payload options -- Recommendations for writing good rules -- Using fast_pattern wisely -- Using the inspection buffers for rule matching -- Defining the right service or protocol -- Summary -- Chapter 14: Alert Subsystem -- Post-inspection processing -- Event generation -- Event thresholding -- Applying a rule action to a packet -- Logging the alert -- Alert formats -- CSV format -- Unified2 format -- Alert Fast format -- Alert Full format -- JSON format -- Summary -- Chapter 15: OpenAppID -- The OpenAppID feature -- Design and architecture -- Detectors -- The inspector -- The rules -- Exercise -- Summary…”
Libro electrónico -
65982Publicado 2021Tabla de Contenidos: “…-- Evolution of web applications -- Programming the web -- The social web -- Separation of frontend and backend -- Everything becomes micro -- From SOA to microservices -- Advantages of microservices -- Disadvantages of microservices -- Micro and frontend -- Emerging web standards -- Isolation via Web Components -- Frame communication -- Web workers and proxies -- Faster TTM -- Decreasing onboarding time -- Multiple teams -- Isolated features -- A/B testing -- Summary -- Chapter 2: Common Challenges and Pitfalls -- Performance -- Resource caching -- Bundle size -- Request optimizations -- Security -- Central user management -- Individual user management -- Script execution -- Knowledge sharing -- Reliability -- User experience -- Wording -- Pattern libraries -- Summary -- Chapter 3: Deployment Scenarios -- Central deployments -- Using a monorepo -- Joining multiple repositories -- Distributed deployments -- Using a monorepo -- Using dedicated pipelines -- Hybrid solutions -- Scheduled releases -- Triggering on change -- Summary -- Chapter 4: Domain Decomposition -- Principles of DDD -- Modules -- Bounded context -- Context map -- Strategic domain design versus tactical design -- SoC -- Technical split -- Functional split -- Example decomposition -- Architectural boundaries -- Shared capabilities -- Choosing the right level of freedom -- Accessing the DOM -- Universality of microfrontends -- Summary -- Section 2: Dry Honey - Implementing Microfrontend Architectures -- Chapter 5: Types of Micro frontend Architectures -- Technical requirements -- The micro frontend landscape -- Static versus dynamic micro frontends…”
Libro electrónico -
65983Publicado 2018Tabla de Contenidos: “…Importance of web application security testing -- Application profiling -- Common web application security testing tools -- Authentication -- Credentials over a secure channel -- Authentication error messages -- Password policy -- Method for submitting credentials -- OWASP mapping -- Authorization -- OWASP mapping -- Session management -- Cookie checks -- Cross-Site Request Forgery -- OWASP mapping -- Input validation -- OWASP mapping -- Security misconfiguration -- OWASP mapping -- Business logic flaws -- Testing for business logic flaws -- Auditing and logging -- OWASP mapping -- Cryptography -- OWASP mapping -- Testing tools -- OWASP ZAP -- Burp Suite -- Summary -- Chapter 8: Privilege Escalation -- What is privilege escalation? …”
Libro electrónico -
65984Publicado 2017Tabla de Contenidos: “…-- Key terminologies of RMI -- RMI for distributed computing -- Writing an RMI server -- Implementing a remote interface -- Creating a client program -- Compiling programs -- Building a JAR file from the interface classes -- Building the server classes -- Building the client classes -- Running a remote client program -- Starting the server -- Invoking the client -- Common Object Request Broker Architecture (CORBA) -- CORBA standards -- Inter-ORB communication -- Java support for CORBA -- OMG IDL samples -- Interfaces -- Types and constants -- Structures -- Discriminated unions -- Sequences -- CORBA services -- Sample CORBA program using JAVA IDL -- IDL interface specification -- Compiling the IDL -- Client application -- Object implementation -- Defining the server -- Compiling and starting the server -- Executing the client -- JavaSpaces -- Overview -- How it works -- Sample JavaSpaces code -- How Java 9 adds value -- Summary -- Chapter 4: Enterprise Messaging -- EMS -- JMS -- The publish/subscribe messaging paradigm…”
Libro electrónico -
65985por Le Coze, Jean-ChristopheTabla de Contenidos: “…Obsolescence as a Long-Term Sociotechnical Concern -- 3.5 A Concluding Speculation on When System Safety is Breached -- References -- 4 Digitalisation, Safety and Privacy -- 4.1 Introduction -- 4.2 Individualised Digital Tools and Privacy at Work -- 4.2.1 An Empirical Analysis -- 4.3 Conclusion -- Bibliography -- 5 Design and Dissemination of Blockchain Technologies: The Challenge of Privacy -- 5.1 A First Privacy Test: Defining Governance -- 5.1.1 The Appointment of a Controller, a "Test" for the Consortium -- 5.1.2 A Form of Recentralisation Contrary to the Imagination of Blockchain Designers -- 5.1.3 The Compromise of Choosing the Consortium Blockchain -- 5.2 Second Privacy Test: Management of Personal Data -- 5.2.1 Setting up an Off-Chain System to Store the Data -- 5.2.2 Data Minimisation -- 5.3 Third Privacy Test: A User Pathway Tested for Explicability and Security -- 5.3.1 Three Requests for Consent -- 5.3.2 An Opaque Security Key System…”
Publicado 2023
Libro electrónico -
65986Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1 - Part Fundamentals -- Chapter 1: Business Central and Power Platform - Better Together -- Technical requirements -- How Business Central and Power Platform are better together -- Setting up your development environment -- Business use case - the K& -- S Solutions Inc. company -- The Business Central and Power Platform ecosystem -- Power Pages -- Power Virtual Agents -- Power Automate -- Power Apps -- Summary -- Chapter 2: Getting to Know Business Central APIs -- Technical requirements -- An introduction to Business Central APIs -- How to connect to Business Central APIs -- Configuring Azure Active Directory for OAuth use with Postman and Business Central -- Adding API permissions -- Creating your first GET request in Postman -- Exercise 2.1 - using Postman to call an API in Business Central -- What are the limits of working with APIs? …”
Libro electrónico -
65987Publicado 2024Tabla de Contenidos: “…-- Using the async/await syntax -- Understanding tasks -- Task groups -- Asynchronous streams -- Actors -- MainActor -- Bridging old GCD and structured concurrency -- Summary -- Chapter 14: An Introduction to SwiftData -- Technical requirements -- Understanding the differences between SwiftData and Core Data -- SwiftData and SwiftUI -- Exploring changes in the binding mechanisms -- Creating a data model -- Understanding relationships in SwiftData -- One-to-one relationships -- One-to-many relationships -- Many-to-one relationships -- Many-to-many relationships -- Cascading deletion rules -- Fetching data -- Filtering data with predicates -- Summary -- Chapter 15: Consuming REST Services in SwiftUI -- Technical requirements -- An overview of REST -- Ports -- Understanding REST requests in Swift -- Codable, Encodable, and Decodable protocols -- Using URLSession -- Implementing HTTP methods -- Setting headers -- Handling errors -- URLProtocol -- Summary…”
Libro electrónico -
65988por Kalman, BalazsTabla de Contenidos: “…WebSphere Studio Application Monitor - installation, configuration and administration -- 4.1 Planning and installation -- 4.1.1 Installation plan -- 4.1.2 Staffing -- 4.1.3 Prerequisites -- 4.1.4 Installation verification -- 4.1.5 Managing Server installation -- 4.1.6 z/OS Data Collector installation -- 4.1.7 AIX Data Collector installation -- 4.1.8 Windows Data Collector installation -- 4.1.9 Managing Server installation on multiple servers -- 4.1.10 Test and production servers -- 4.1.11 Integration with other products -- 4.2 Configuration -- 4.2.1 Managing Server sizing -- 4.2.2 Managing Server topology -- 4.2.3 Managing Server tuning considerations -- 4.2.4 Using Request Mapper -- 4.2.5 Using SMF records on z/OS -- 4.2.6 Synchronizing clocks across servers -- 4.3 Administration -- 4.3.1 Users and roles -- 4.3.2 Server groups -- 4.3.3 Application Monitor database management -- 4.3.4 Monitoring levels -- 4.3.5 Changing monitoring levels -- 4.3.6 Traps and alerts -- 4.3.7 Logs -- 4.3.8 Self diagnosis -- Chapter 5. …”
Publicado 2004
Libro electrónico -
65989Publicado 2002Tabla de Contenidos: “…Cluster Systems Management security infrastructure -- 3.1 Reliable Scalable Cluster Technology security -- 3.2 Components of Cluster Security Services (CtSec) -- 3.2.1 Mechanism abstract layer (MAL) -- 3.2.2 Mechanism pluggable module (MPM) -- 3.2.3 UNIX mechanism pluggable module -- 3.2.4 Host-based authentication with ctcasd -- 3.2.5 Identity mapping service -- 3.2.6 Resource Monitoring and Control access control list -- 3.3 Communication flow examples -- 3.3.1 Initial cluster setup -- 3.3.2 Adding a new node -- 3.3.3 Requesting access to resources -- Chapter 4. Practical security considerations…”
Libro electrónico -
65990por Preston, MikeTabla de Contenidos: “…Understanding vSphere Storage Concepts and Methodologies -- Storage virtualization -- Supported filesystems -- VMFS -- NFS -- Raw disk -- Storage naming -- Viewing device identifiers -- Within the vSphere Client -- Within ESXi Shell -- The many ways vSphere identifies storage -- Friendly names -- Identifiers -- NAA identifiers -- T10 identifiers -- IQN identifiers -- MPX identifiers -- Runtime names -- The vSphere Pluggable Storage Architecture -- Pluggable Storage Architecture (PSA) roles and commands -- Multipathing Plugin - the VMware Native Multipathing Plugin roles and commands -- Storage Array Type Plugin roles and commands -- Path Selection Plugin roles and commands -- An I/O request - from start to finish -- Summary -- 2. Commonly Used Tools for Troubleshooting Storage -- The vSphere troubleshooting methodology -- vCenter Storage Views (Reports and Maps) -- Reports -- Maps -- Using esxtop/resxtop -- Switching displays -- Field customization -- Refresh interval -- Logfiles used in vSphere Storage troubleshooting -- ESXi logging -- Viewing ESXi logs -- vCenter Server logging -- Virtual machine logging -- Summary -- 3. …”
Publicado 2013
Libro electrónico -
65991por Plummer, TimTabla de Contenidos: “…Security - Avoiding Common Vulnerabilities -- Why you should care about security -- Path disclosure -- SQL injection -- Local File Inclusion -- Remote File Inclusion -- Cross-site scripting -- Cross-site Request Forgery -- Some quick advice -- Summary -- 9. …”
Publicado 2013
Libro electrónico -
65992Tabla de Contenidos: “…Cover -- Table of Contents -- Introduction -- Part I: An Introduction to Server Farms -- Chapter 1 Overview of Data Centers -- Data Centers Defined -- Application Architecture Models -- Data Center Architecture -- Data Center Services -- Summary -- Chapter 2 Server Architecture Overview -- Network Attachment -- Client and Server Packet Processing -- TCP and Server Applications -- UDP and Server Applications -- Server Availability -- Configuring a Web Server -- Network Architecture Design Options -- Summary -- For Further Reading -- Chapter 3 Application Architectures Overview -- Taxonomy of Applications and Hosted Servers -- Integration of Applications -- Multitier Applications -- Network Architecture Considerations -- Multitier Design Case Study -- Summary -- For Further Reading -- Chapter 4 Data Center Design Overview -- Types of Server Farms and Data Centers -- Data Center Topologies -- Fully Redundant Layer 2 and Layer 3 Designs -- Fully Redundant Layer 2 and Layer 3 Designs with Services -- Summary -- Chapter 5 Data Center Security Overview -- The Need for a Secure Data Center -- Vulnerabilities and Common Attacks -- Network Security Infrastructure -- Security Fundamentals -- Data Center Security Framework -- Summary -- Chapter 6 Server Load-Balancing Overview -- Load Balancing Defined -- Key Concepts of Load Balancing -- High Availability Considerations -- Generic Load Balancer Architecture -- Summary -- Part II: Server Farm Protocols -- Chapter 7 IP, TCP, and UDP -- Layers and Protocols -- IP -- TCP -- UDP -- Summary -- References -- Chapter 8 HTTP and Related Concepts -- Resources and Messages -- HTTP Overview -- HTTP General Header -- Request Header -- Response Header -- Entity Header -- Summary -- Chapter 9 SSL and TLS -- SSL Overview -- SSL Operations -- Performance Implications of SSL -- Authentication and Digital Certificates…”
Libro electrónico -
65993Publicado 2018Tabla de Contenidos: “…-- Creating fake access points with the MANA Toolkit -- Summary -- Chapter 6: Network Penetration Testing - Gaining Access -- WEP theory -- Basic web cracking -- Fake authentication attack -- ARP request replay -- WPA introduction -- WPS cracking -- Handshake theory -- Capturing the handshake -- Creating a wordlist -- Wordlist cracking -- Securing network from attacks -- Summary -- Chapter 7: Post-Connection Attacks -- Post-connection attacks -- The netdiscover tool -- The AutoScan tool -- Zenmap…”
Libro electrónico -
65994Publicado 2011Tabla de Contenidos: “…Cover -- Table of Contents -- Introduction -- How This Book Is Organized -- Conventions Used in This Book -- Get Ready to Facebook -- Part I: Getting Started with Facebook-and Social Networking -- 1 Welcome to Facebook: It's Not Just for Kids Anymore -- What Social Networking Is and How It Works -- Say Hello to Facebook -- Things You Can-and Can't-Do on Facebook -- Why Grown-Ups Use Facebook -- Social Networking Do's and Don'ts -- 2 Signing Up and Getting Started -- Before You Sign Up -- Creating a Facebook Account -- Find Friends and Complete Your Profile -- Filling Out Your Profile -- 3 Getting Around the Facebook Site -- What's What and What's Where on Facebook -- Navigating the Facebook Toolbar -- Searching Facebook -- Signing Off -- Part II: Facebook for Friends and Family -- 4 How to Find Old Friends-and Make New Ones -- How Facebook Helps You Reconnect -- Why Friends Are Important -- Making Friends with People You're Already in Contact With -- Searching for Long Lost Friends -- Accepting Friend Requests -- Exploring Facebook's Friend Suggestions -- Finding Friends of Friends -- 5 Visiting Friends and Family on Facebook -- Catching Up with the Facebook News Feed -- Getting to and Getting to Know Your Friends' Profile Pages -- Reading the Wall-and Leaving Your Own Comments -- Viewing Your Friends' Personal Information -- Looking at Photos -- Viewing Other Tabs -- 6 Keeping Tabs on Your Kids -- Making Your Children Your Friends -- What to Do If Your Kids Hide from You on Facebook -- Using Facebook to See What Your Kids Are Up To -- Using Facebook to Contact Your Grown Kids -- 7 Organizing Your Friends List -- Creating Friends Lists -- Editing Your Lists -- Displaying Status Updates from List Members -- Deleting Custom Lists -- Getting Rid of Unwanted Friends -- Blocking Unwanted Users -- Part III: Keeping in Touch with Facebook…”
Libro electrónico -
65995Publicado 2023Tabla de Contenidos: “…Chapter 5: Configuration and Control Plane -- Technical requirements -- Controlling costs with sampling -- Head-based sampling -- Tail-based sampling -- Enriching and filtering telemetry -- Span processors -- Customizing instrumentations -- Resources -- Metrics -- Customizing context propagation -- Processing a pipeline with the OpenTelemetry Collector -- Summary -- Questions -- Chapter 6: Tracing Your Code -- Technical requirements -- Tracing with System.Diagnostics or the OpenTelemetry API shim -- Tracing with System.Diagnostics -- Tracing with the OpenTelemetry API shim -- Using ambient context -- Recording events -- When to use events -- The ActivityEvent API -- Correlating spans with links -- Using links -- Testing your instrumentation -- Intercepting activities -- Filtering relevant activities -- Summary -- Questions -- Chapter 7: Adding Custom Metrics -- Technical requirements -- Metrics in .NET - past and present -- Cardinality -- When to use metrics -- Reporting metrics -- Using counters -- The Counter class -- The UpDownCounter class -- The ObservableCounter class -- The ObservableUpDownCounter class -- Using an asynchronous gauge -- Using histograms -- Summary -- Questions -- Chapter 8: Writing Structured and Correlated Logs -- Technical requirements -- Logging evolution in .NET -- Console -- Trace -- EventSource -- ILogger -- Logging with ILogger -- Optimizing logging -- Capturing logs with OpenTelemetry -- Managing logging costs -- Pipelines -- Backends -- Summary -- Questions -- Part 3: Observability for Common Cloud Scenarios -- Chapter 9: Best Practices -- Technical requirements -- Choosing the right signal -- Getting more with less -- Building a new application -- Evolving applications -- Performance-sensitive scenarios -- Staying consistent with semantic conventions -- Semantic conventions for HTTP requests…”
Libro electrónico -
65996Publicado 2023Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Tabel of Contents -- Preface -- Part 1: Backend Programming with Spring Boot -- Chapter 1: Setting Up the Environment and Tools - Backend -- Technical requirements -- Installing Eclipse -- Understanding Gradle -- Using Spring Initializr -- Creating a project -- Running the project -- Spring Boot development tools -- Logs and problem-solving -- Installing MariaDB -- Summary -- Questions -- Further reading -- Chapter 2: Understanding Dependency Injection -- Technical requirements -- Introducing dependency injection -- Using dependency injection in Spring Boot -- Summary -- Questions -- Further reading -- Chapter 3: Using JPA to Create and Access a Database -- Technical requirements -- Basics of ORM, JPA, and Hibernate -- Creating the entity classes -- Creating CRUD repositories -- Adding relationships between tables -- Setting up a MariaDB database -- Summary -- Questions -- Further reading -- Chapter 4: Creating a RESTful Web Service with Spring Boot -- Technical requirements -- Basics of REST -- Creating a RESTful web service with Spring Boot -- Using Spring Data REST -- Documenting a RESTful API -- Summary -- Questions -- Further reading -- Chapter 5: Securing Your Backend -- Technical requirements -- Understanding Spring Security -- Securing your backend with a JSON Web Token -- Securing the login -- Securing the other requests -- Handling exceptions -- Adding a CORS filter -- Role-based security -- Using OAuth2 with Spring Boot -- Summary -- Questions -- Further reading -- Chapter 6: Testing Your Backend -- Technical requirements -- Testing in Spring Boot -- Creating test cases -- Testing with Gradle -- Test-driven development -- Summary -- Questions -- Further reading -- Part II: Frontend Programming with React -- Chapter 7: Setting Up the Environment and Tools - Frontend -- Technical requirements…”
Libro electrónico -
65997Publicado 2024Tabla de Contenidos: “…Adding validation to our chat endpoints -- Developing tests with Bun -- Writing tests with Bun's test runner -- Writing tests for our authentication endpoints -- Writing test for our chat endpoints -- Summary -- Chapter 6: Advanced Backend Development - Security, Throttling, Caching, and Logging -- Technical requirements -- Managing security aspects -- Adding request throttling -- Writing the middleware -- Implementing the middleware -- Including the middleware in the main app -- Managing the cache -- Writing the cache middleware -- Using the cache middleware in our chat endpoints -- Using logging -- Creating our logger's configuration -- Adding logger to our caching middleware -- Summary -- Part 3: Integrating PostgreSQL for Data Management -- Chapter 7: PostgreSQL Basics, Storage, and Setup -- Technical requirements -- Setting up PostgreSQL in Docker -- What are Docker and Docker Compose? …”
Libro electrónico -
65998por Guilmette, AaronTabla de Contenidos: “…-- Learning about Power Automate -- Learning about Copilots -- Learning about Power Apps -- Learning about AI Builder technologies -- Understanding Power Platform licensing -- Exploring additional AI services -- Working with Azure AI Services -- Working with OpenAI models -- Working with services from Google, Anthropic, and more -- Summary -- Chapter 2: Configuring an Environment to Support AI Services -- Configuring Azure -- Requesting API access for Azure OpenAI services -- Setting up OpenAI service resources in Azure -- Configuring API access for ChatGPT -- Configuring your workstation -- Configuring Power Platform -- Summary -- Chapter 3: Talking to ChatGPT -- Working with ChatGPT as a user -- So, what's a token? …”
Publicado 2024
Libro electrónico -
65999
Manuscrito -
66000por Hernandez, Pedro PabloTabla de Contenidos: “…La acción pauliana. -- 13. Requisitos para que proceda la Acción Pauliana. -- 14. …”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico