Mostrando 65,981 - 66,000 Resultados de 69,254 Para Buscar 'Réquista~', tiempo de consulta: 2.04s Limitar resultados
  1. 65981
    Publicado 2024
    Tabla de Contenidos: “…Stream inspectors -- Wizard and binder inspectors -- Summary -- Chapter 9: Stream Inspectors -- Relevant protocols for the stream inspector -- IP -- ICMP -- TCP -- UDP -- Flow -- The stream inspectors -- stream_ip -- stream_udp -- stream_icmp -- stream_tcp -- stream_base -- Summary -- Chapter 10: HTTP Inspector -- Basics of HTTP -- HTTP request -- HTTP response -- HTTP/2 -- HTTP inspector -- HTTP buffers -- HTTP/2 inspector -- HTTP inspector configuration -- Summary -- Chapter 11: DCE/RPC Inspectors -- A DCE/RPC overview -- Connectionless versus connection-oriented DCE/RPC -- DCE/RPC inspectors -- DCE/RPC rule options -- Exercise -- Summary -- Chapter 12: IP Reputation -- Background -- IP address as an entity - use of blocklists -- Challenges -- History of IP blocking in Snort -- Configuration of the IP reputation inspector module -- Functionality of the IP reputation inspector -- Data structure for storing IP reputation scores -- IP reputation inspector - alerts and pegs -- Summary -- Part 4: Rules and Alerting -- Chapter 13: Rules -- Snort rule - the structure -- Service rule -- File rule -- File identification rule -- Rule header -- Traditional rule header -- Rule options -- General rule options -- Payload options -- Non-payload options -- Recommendations for writing good rules -- Using fast_pattern wisely -- Using the inspection buffers for rule matching -- Defining the right service or protocol -- Summary -- Chapter 14: Alert Subsystem -- Post-inspection processing -- Event generation -- Event thresholding -- Applying a rule action to a packet -- Logging the alert -- Alert formats -- CSV format -- Unified2 format -- Alert Fast format -- Alert Full format -- JSON format -- Summary -- Chapter 15: OpenAppID -- The OpenAppID feature -- Design and architecture -- Detectors -- The inspector -- The rules -- Exercise -- Summary…”
    Libro electrónico
  2. 65982
    Publicado 2021
    Tabla de Contenidos: “…-- Evolution of web applications -- Programming the web -- The social web -- Separation of frontend and backend -- Everything becomes micro -- From SOA to microservices -- Advantages of microservices -- Disadvantages of microservices -- Micro and frontend -- Emerging web standards -- Isolation via Web Components -- Frame communication -- Web workers and proxies -- Faster TTM -- Decreasing onboarding time -- Multiple teams -- Isolated features -- A/B testing -- Summary -- Chapter 2: Common Challenges and Pitfalls -- Performance -- Resource caching -- Bundle size -- Request optimizations -- Security -- Central user management -- Individual user management -- Script execution -- Knowledge sharing -- Reliability -- User experience -- Wording -- Pattern libraries -- Summary -- Chapter 3: Deployment Scenarios -- Central deployments -- Using a monorepo -- Joining multiple repositories -- Distributed deployments -- Using a monorepo -- Using dedicated pipelines -- Hybrid solutions -- Scheduled releases -- Triggering on change -- Summary -- Chapter 4: Domain Decomposition -- Principles of DDD -- Modules -- Bounded context -- Context map -- Strategic domain design versus tactical design -- SoC -- Technical split -- Functional split -- Example decomposition -- Architectural boundaries -- Shared capabilities -- Choosing the right level of freedom -- Accessing the DOM -- Universality of microfrontends -- Summary -- Section 2: Dry Honey - Implementing Microfrontend Architectures -- Chapter 5: Types of Micro frontend Architectures -- Technical requirements -- The micro frontend landscape -- Static versus dynamic micro frontends…”
    Libro electrónico
  3. 65983
    Publicado 2018
    Tabla de Contenidos: “…Importance of web application security testing -- Application profiling -- Common web application security testing tools -- Authentication -- Credentials over a secure channel -- Authentication error messages -- Password policy -- Method for submitting credentials -- OWASP mapping -- Authorization -- OWASP mapping -- Session management -- Cookie checks -- Cross-Site Request Forgery -- OWASP mapping -- Input validation -- OWASP mapping -- Security misconfiguration -- OWASP mapping -- Business logic flaws -- Testing for business logic flaws -- Auditing and logging -- OWASP mapping -- Cryptography -- OWASP mapping -- Testing tools -- OWASP ZAP -- Burp Suite -- Summary -- Chapter 8: Privilege Escalation -- What is privilege escalation? …”
    Libro electrónico
  4. 65984
    Publicado 2017
    Tabla de Contenidos: “…-- Key terminologies of RMI -- RMI for distributed computing -- Writing an RMI server -- Implementing a remote interface -- Creating a client program -- Compiling programs -- Building a JAR file from the interface classes -- Building the server classes -- Building the client classes -- Running a remote client program -- Starting the server -- Invoking the client -- Common Object Request Broker Architecture (CORBA) -- CORBA standards -- Inter-ORB communication -- Java support for CORBA -- OMG IDL samples -- Interfaces -- Types and constants -- Structures -- Discriminated unions -- Sequences -- CORBA services -- Sample CORBA program using JAVA IDL -- IDL interface specification -- Compiling the IDL -- Client application -- Object implementation -- Defining the server -- Compiling and starting the server -- Executing the client -- JavaSpaces -- Overview -- How it works -- Sample JavaSpaces code -- How Java 9 adds value -- Summary -- Chapter 4: Enterprise Messaging -- EMS -- JMS -- The publish/subscribe messaging paradigm…”
    Libro electrónico
  5. 65985
    por Le Coze, Jean-Christophe
    Publicado 2023
    Tabla de Contenidos: “…Obsolescence as a Long-Term Sociotechnical Concern -- 3.5 A Concluding Speculation on When System Safety is Breached -- References -- 4 Digitalisation, Safety and Privacy -- 4.1 Introduction -- 4.2 Individualised Digital Tools and Privacy at Work -- 4.2.1 An Empirical Analysis -- 4.3 Conclusion -- Bibliography -- 5 Design and Dissemination of Blockchain Technologies: The Challenge of Privacy -- 5.1 A First Privacy Test: Defining Governance -- 5.1.1 The Appointment of a Controller, a "Test" for the Consortium -- 5.1.2 A Form of Recentralisation Contrary to the Imagination of Blockchain Designers -- 5.1.3 The Compromise of Choosing the Consortium Blockchain -- 5.2 Second Privacy Test: Management of Personal Data -- 5.2.1 Setting up an Off-Chain System to Store the Data -- 5.2.2 Data Minimisation -- 5.3 Third Privacy Test: A User Pathway Tested for Explicability and Security -- 5.3.1 Three Requests for Consent -- 5.3.2 An Opaque Security Key System…”
    Libro electrónico
  6. 65986
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1 - Part Fundamentals -- Chapter 1: Business Central and Power Platform - Better Together -- Technical requirements -- How Business Central and Power Platform are better together -- Setting up your development environment -- Business use case - the K&amp -- S Solutions Inc. company -- The Business Central and Power Platform ecosystem -- Power Pages -- Power Virtual Agents -- Power Automate -- Power Apps -- Summary -- Chapter 2: Getting to Know Business Central APIs -- Technical requirements -- An introduction to Business Central APIs -- How to connect to Business Central APIs -- Configuring Azure Active Directory for OAuth use with Postman and Business Central -- Adding API permissions -- Creating your first GET request in Postman -- Exercise 2.1 - using Postman to call an API in Business Central -- What are the limits of working with APIs? …”
    Libro electrónico
  7. 65987
    Publicado 2024
    Tabla de Contenidos: “…-- Using the async/await syntax -- Understanding tasks -- Task groups -- Asynchronous streams -- Actors -- MainActor -- Bridging old GCD and structured concurrency -- Summary -- Chapter 14: An Introduction to SwiftData -- Technical requirements -- Understanding the differences between SwiftData and Core Data -- SwiftData and SwiftUI -- Exploring changes in the binding mechanisms -- Creating a data model -- Understanding relationships in SwiftData -- One-to-one relationships -- One-to-many relationships -- Many-to-one relationships -- Many-to-many relationships -- Cascading deletion rules -- Fetching data -- Filtering data with predicates -- Summary -- Chapter 15: Consuming REST Services in SwiftUI -- Technical requirements -- An overview of REST -- Ports -- Understanding REST requests in Swift -- Codable, Encodable, and Decodable protocols -- Using URLSession -- Implementing HTTP methods -- Setting headers -- Handling errors -- URLProtocol -- Summary…”
    Libro electrónico
  8. 65988
    por Kalman, Balazs
    Publicado 2004
    Tabla de Contenidos: “…WebSphere Studio Application Monitor - installation, configuration and administration -- 4.1 Planning and installation -- 4.1.1 Installation plan -- 4.1.2 Staffing -- 4.1.3 Prerequisites -- 4.1.4 Installation verification -- 4.1.5 Managing Server installation -- 4.1.6 z/OS Data Collector installation -- 4.1.7 AIX Data Collector installation -- 4.1.8 Windows Data Collector installation -- 4.1.9 Managing Server installation on multiple servers -- 4.1.10 Test and production servers -- 4.1.11 Integration with other products -- 4.2 Configuration -- 4.2.1 Managing Server sizing -- 4.2.2 Managing Server topology -- 4.2.3 Managing Server tuning considerations -- 4.2.4 Using Request Mapper -- 4.2.5 Using SMF records on z/OS -- 4.2.6 Synchronizing clocks across servers -- 4.3 Administration -- 4.3.1 Users and roles -- 4.3.2 Server groups -- 4.3.3 Application Monitor database management -- 4.3.4 Monitoring levels -- 4.3.5 Changing monitoring levels -- 4.3.6 Traps and alerts -- 4.3.7 Logs -- 4.3.8 Self diagnosis -- Chapter 5. …”
    Libro electrónico
  9. 65989
    Publicado 2002
    Tabla de Contenidos: “…Cluster Systems Management security infrastructure -- 3.1 Reliable Scalable Cluster Technology security -- 3.2 Components of Cluster Security Services (CtSec) -- 3.2.1 Mechanism abstract layer (MAL) -- 3.2.2 Mechanism pluggable module (MPM) -- 3.2.3 UNIX mechanism pluggable module -- 3.2.4 Host-based authentication with ctcasd -- 3.2.5 Identity mapping service -- 3.2.6 Resource Monitoring and Control access control list -- 3.3 Communication flow examples -- 3.3.1 Initial cluster setup -- 3.3.2 Adding a new node -- 3.3.3 Requesting access to resources -- Chapter 4. Practical security considerations…”
    Libro electrónico
  10. 65990
    por Preston, Mike
    Publicado 2013
    Tabla de Contenidos: “…Understanding vSphere Storage Concepts and Methodologies -- Storage virtualization -- Supported filesystems -- VMFS -- NFS -- Raw disk -- Storage naming -- Viewing device identifiers -- Within the vSphere Client -- Within ESXi Shell -- The many ways vSphere identifies storage -- Friendly names -- Identifiers -- NAA identifiers -- T10 identifiers -- IQN identifiers -- MPX identifiers -- Runtime names -- The vSphere Pluggable Storage Architecture -- Pluggable Storage Architecture (PSA) roles and commands -- Multipathing Plugin - the VMware Native Multipathing Plugin roles and commands -- Storage Array Type Plugin roles and commands -- Path Selection Plugin roles and commands -- An I/O request - from start to finish -- Summary -- 2. Commonly Used Tools for Troubleshooting Storage -- The vSphere troubleshooting methodology -- vCenter Storage Views (Reports and Maps) -- Reports -- Maps -- Using esxtop/resxtop -- Switching displays -- Field customization -- Refresh interval -- Logfiles used in vSphere Storage troubleshooting -- ESXi logging -- Viewing ESXi logs -- vCenter Server logging -- Virtual machine logging -- Summary -- 3. …”
    Libro electrónico
  11. 65991
    por Plummer, Tim
    Publicado 2013
    Tabla de Contenidos: “…Security - Avoiding Common Vulnerabilities -- Why you should care about security -- Path disclosure -- SQL injection -- Local File Inclusion -- Remote File Inclusion -- Cross-site scripting -- Cross-site Request Forgery -- Some quick advice -- Summary -- 9. …”
    Libro electrónico
  12. 65992
    Tabla de Contenidos: “…Cover -- Table of Contents -- Introduction -- Part I: An Introduction to Server Farms -- Chapter 1 Overview of Data Centers -- Data Centers Defined -- Application Architecture Models -- Data Center Architecture -- Data Center Services -- Summary -- Chapter 2 Server Architecture Overview -- Network Attachment -- Client and Server Packet Processing -- TCP and Server Applications -- UDP and Server Applications -- Server Availability -- Configuring a Web Server -- Network Architecture Design Options -- Summary -- For Further Reading -- Chapter 3 Application Architectures Overview -- Taxonomy of Applications and Hosted Servers -- Integration of Applications -- Multitier Applications -- Network Architecture Considerations -- Multitier Design Case Study -- Summary -- For Further Reading -- Chapter 4 Data Center Design Overview -- Types of Server Farms and Data Centers -- Data Center Topologies -- Fully Redundant Layer 2 and Layer 3 Designs -- Fully Redundant Layer 2 and Layer 3 Designs with Services -- Summary -- Chapter 5 Data Center Security Overview -- The Need for a Secure Data Center -- Vulnerabilities and Common Attacks -- Network Security Infrastructure -- Security Fundamentals -- Data Center Security Framework -- Summary -- Chapter 6 Server Load-Balancing Overview -- Load Balancing Defined -- Key Concepts of Load Balancing -- High Availability Considerations -- Generic Load Balancer Architecture -- Summary -- Part II: Server Farm Protocols -- Chapter 7 IP, TCP, and UDP -- Layers and Protocols -- IP -- TCP -- UDP -- Summary -- References -- Chapter 8 HTTP and Related Concepts -- Resources and Messages -- HTTP Overview -- HTTP General Header -- Request Header -- Response Header -- Entity Header -- Summary -- Chapter 9 SSL and TLS -- SSL Overview -- SSL Operations -- Performance Implications of SSL -- Authentication and Digital Certificates…”
    Libro electrónico
  13. 65993
    Publicado 2018
    Tabla de Contenidos: “…-- Creating fake access points with the MANA Toolkit -- Summary -- Chapter 6: Network Penetration Testing - Gaining Access -- WEP theory -- Basic web cracking -- Fake authentication attack -- ARP request replay -- WPA introduction -- WPS cracking -- Handshake theory -- Capturing the handshake -- Creating a wordlist -- Wordlist cracking -- Securing network from attacks -- Summary -- Chapter 7: Post-Connection Attacks -- Post-connection attacks -- The netdiscover tool -- The AutoScan tool -- Zenmap…”
    Libro electrónico
  14. 65994
    Publicado 2011
    Tabla de Contenidos: “…Cover -- Table of Contents -- Introduction -- How This Book Is Organized -- Conventions Used in This Book -- Get Ready to Facebook -- Part I: Getting Started with Facebook-and Social Networking -- 1 Welcome to Facebook: It's Not Just for Kids Anymore -- What Social Networking Is and How It Works -- Say Hello to Facebook -- Things You Can-and Can't-Do on Facebook -- Why Grown-Ups Use Facebook -- Social Networking Do's and Don'ts -- 2 Signing Up and Getting Started -- Before You Sign Up -- Creating a Facebook Account -- Find Friends and Complete Your Profile -- Filling Out Your Profile -- 3 Getting Around the Facebook Site -- What's What and What's Where on Facebook -- Navigating the Facebook Toolbar -- Searching Facebook -- Signing Off -- Part II: Facebook for Friends and Family -- 4 How to Find Old Friends-and Make New Ones -- How Facebook Helps You Reconnect -- Why Friends Are Important -- Making Friends with People You're Already in Contact With -- Searching for Long Lost Friends -- Accepting Friend Requests -- Exploring Facebook's Friend Suggestions -- Finding Friends of Friends -- 5 Visiting Friends and Family on Facebook -- Catching Up with the Facebook News Feed -- Getting to and Getting to Know Your Friends' Profile Pages -- Reading the Wall-and Leaving Your Own Comments -- Viewing Your Friends' Personal Information -- Looking at Photos -- Viewing Other Tabs -- 6 Keeping Tabs on Your Kids -- Making Your Children Your Friends -- What to Do If Your Kids Hide from You on Facebook -- Using Facebook to See What Your Kids Are Up To -- Using Facebook to Contact Your Grown Kids -- 7 Organizing Your Friends List -- Creating Friends Lists -- Editing Your Lists -- Displaying Status Updates from List Members -- Deleting Custom Lists -- Getting Rid of Unwanted Friends -- Blocking Unwanted Users -- Part III: Keeping in Touch with Facebook…”
    Libro electrónico
  15. 65995
    Publicado 2023
    Tabla de Contenidos: “…Chapter 5: Configuration and Control Plane -- Technical requirements -- Controlling costs with sampling -- Head-based sampling -- Tail-based sampling -- Enriching and filtering telemetry -- Span processors -- Customizing instrumentations -- Resources -- Metrics -- Customizing context propagation -- Processing a pipeline with the OpenTelemetry Collector -- Summary -- Questions -- Chapter 6: Tracing Your Code -- Technical requirements -- Tracing with System.Diagnostics or the OpenTelemetry API shim -- Tracing with System.Diagnostics -- Tracing with the OpenTelemetry API shim -- Using ambient context -- Recording events -- When to use events -- The ActivityEvent API -- Correlating spans with links -- Using links -- Testing your instrumentation -- Intercepting activities -- Filtering relevant activities -- Summary -- Questions -- Chapter 7: Adding Custom Metrics -- Technical requirements -- Metrics in .NET - past and present -- Cardinality -- When to use metrics -- Reporting metrics -- Using counters -- The Counter class -- The UpDownCounter class -- The ObservableCounter class -- The ObservableUpDownCounter class -- Using an asynchronous gauge -- Using histograms -- Summary -- Questions -- Chapter 8: Writing Structured and Correlated Logs -- Technical requirements -- Logging evolution in .NET -- Console -- Trace -- EventSource -- ILogger -- Logging with ILogger -- Optimizing logging -- Capturing logs with OpenTelemetry -- Managing logging costs -- Pipelines -- Backends -- Summary -- Questions -- Part 3: Observability for Common Cloud Scenarios -- Chapter 9: Best Practices -- Technical requirements -- Choosing the right signal -- Getting more with less -- Building a new application -- Evolving applications -- Performance-sensitive scenarios -- Staying consistent with semantic conventions -- Semantic conventions for HTTP requests…”
    Libro electrónico
  16. 65996
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Tabel of Contents -- Preface -- Part 1: Backend Programming with Spring Boot -- Chapter 1: Setting Up the Environment and Tools - Backend -- Technical requirements -- Installing Eclipse -- Understanding Gradle -- Using Spring Initializr -- Creating a project -- Running the project -- Spring Boot development tools -- Logs and problem-solving -- Installing MariaDB -- Summary -- Questions -- Further reading -- Chapter 2: Understanding Dependency Injection -- Technical requirements -- Introducing dependency injection -- Using dependency injection in Spring Boot -- Summary -- Questions -- Further reading -- Chapter 3: Using JPA to Create and Access a Database -- Technical requirements -- Basics of ORM, JPA, and Hibernate -- Creating the entity classes -- Creating CRUD repositories -- Adding relationships between tables -- Setting up a MariaDB database -- Summary -- Questions -- Further reading -- Chapter 4: Creating a RESTful Web Service with Spring Boot -- Technical requirements -- Basics of REST -- Creating a RESTful web service with Spring Boot -- Using Spring Data REST -- Documenting a RESTful API -- Summary -- Questions -- Further reading -- Chapter 5: Securing Your Backend -- Technical requirements -- Understanding Spring Security -- Securing your backend with a JSON Web Token -- Securing the login -- Securing the other requests -- Handling exceptions -- Adding a CORS filter -- Role-based security -- Using OAuth2 with Spring Boot -- Summary -- Questions -- Further reading -- Chapter 6: Testing Your Backend -- Technical requirements -- Testing in Spring Boot -- Creating test cases -- Testing with Gradle -- Test-driven development -- Summary -- Questions -- Further reading -- Part II: Frontend Programming with React -- Chapter 7: Setting Up the Environment and Tools - Frontend -- Technical requirements…”
    Libro electrónico
  17. 65997
    Publicado 2024
    Tabla de Contenidos: “…Adding validation to our chat endpoints -- Developing tests with Bun -- Writing tests with Bun's test runner -- Writing tests for our authentication endpoints -- Writing test for our chat endpoints -- Summary -- Chapter 6: Advanced Backend Development - Security, Throttling, Caching, and Logging -- Technical requirements -- Managing security aspects -- Adding request throttling -- Writing the middleware -- Implementing the middleware -- Including the middleware in the main app -- Managing the cache -- Writing the cache middleware -- Using the cache middleware in our chat endpoints -- Using logging -- Creating our logger's configuration -- Adding logger to our caching middleware -- Summary -- Part 3: Integrating PostgreSQL for Data Management -- Chapter 7: PostgreSQL Basics, Storage, and Setup -- Technical requirements -- Setting up PostgreSQL in Docker -- What are Docker and Docker Compose? …”
    Libro electrónico
  18. 65998
    por Guilmette, Aaron
    Publicado 2024
    Tabla de Contenidos: “…-- Learning about Power Automate -- Learning about Copilots -- Learning about Power Apps -- Learning about AI Builder technologies -- Understanding Power Platform licensing -- Exploring additional AI services -- Working with Azure AI Services -- Working with OpenAI models -- Working with services from Google, Anthropic, and more -- Summary -- Chapter 2: Configuring an Environment to Support AI Services -- Configuring Azure -- Requesting API access for Azure OpenAI services -- Setting up OpenAI service resources in Azure -- Configuring API access for ChatGPT -- Configuring your workstation -- Configuring Power Platform -- Summary -- Chapter 3: Talking to ChatGPT -- Working with ChatGPT as a user -- So, what's a token? …”
    Libro electrónico
  19. 65999
    Tabla de Contenidos: “…Carta de Antonio Carnero de Castro en relación a un aviso y respuesta (h . 84r-v.) Inc.: Señor, enuista delo q contiene el auiso de atras de hecho las mas exactas diligencias que fueron posibles...por que me allo sumamente ocupado en dependenzias del amo no puedo sauer si don Joseph Suarez depuga a presentado un titulo (h . 84r.)…”
    Manuscrito
  20. 66000
    por Hernandez, Pedro Pablo
    Publicado 2019
    Tabla de Contenidos: “…La acción pauliana. -- 13. Requisitos para que proceda la Acción Pauliana. -- 14. …”
    Libro electrónico