Mostrando 68,421 - 68,440 Resultados de 69,047 Para Buscar 'Réquista~', tiempo de consulta: 1.86s Limitar resultados
  1. 68421
    Publicado 2022
    “…It will take you to the point where you will understand what method (GET or POST) to use when sending form data, how to define where the data goes, and how to perform advanced client-side validation (checking errors on the form before it is sent to the server), how to write custom pattern validation rules (using regular expressions), how to run servers, and how to view all HTTP request information. This is awesome knowledge. This course will captivate you and catapult you to the next level and set you well on your way to becoming a true grandmaster in front-end webform development. …”
    Video
  2. 68422
    por Luby, Stephen
    Publicado 2022
    “…It is easier for experienced scientists to ignore the request, or to simply rewrite the article. Early career scientists are motivated to address these barriers but specific advice is difficult to find, and much of this advice is behind a pay wall. …”
    Libro electrónico
  3. 68423
    “…This paper originated in a request from the Ministry of Finance of the Czech Republic for SIGMA advice in developing new legal provisions for the financial management of public agencies. …”
    Capítulo de libro electrónico
  4. 68424
    Publicado 2015
    “…The Revenue Growth Habit shows how to request and collect testimonials and how to communicate these testimonials to grow your business. …”
    Libro electrónico
  5. 68425
    Publicado 2015
    “…It will also be of use to personnel in non-IT roles, in an effort to make this unwieldy subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents. …”
    Libro electrónico
  6. 68426
    Publicado 2022
    “…A lo largo de una serie de doce capítulos y una<U+000d><U+000a>coda en que pasa revista no solamente a varios filósofos sino también a representaciones artísticas y literarias diversas, la filósofa italiana cuestiona que<U+000d><U+000a>la rectitud sea la postura propia del ser humano y defiende que esta postura ha tapado otra que nos es mucho más propia, la de la inclinación, que tradicionalmente el arte y la filosofía han reservado exclusivamente a la mujer. …”
    Libro
  7. 68427
    Publicado 2008
    “…You’ll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely—and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own · Create more secure “mashup” applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers…”
    Libro electrónico
  8. 68428
    Publicado 2002
    “…You'll conclude with design and implementation guidelines for some of the more popular and widely requested VoIP services, such as prepaid services, fax services, and virtual private networks (VPNs). …”
    Libro electrónico
  9. 68429
    por Hougland, Damon
    Publicado 2001
    “…Make the most of scriptlets, expressions, declarations, actions and directives Get under the hood with Sun's JSP engine: multithreading, persistence, implicit objects, and more Understand JSP requests and responses—in depth Track sessions and data: hidden frames and form fields, cookies, URL rewriting, and the HttpSession API Integrate databases: JDBCTM, SQL, metadata, connection pooling, and more Creating custom JSP actions (custom tags) Optimize the performance of your JSP pages Every Core Series book: DEMONSTRATES how to write commercial quality code FEATURES dozens of nontrivial programs and examples—no toy code! …”
    Libro electrónico
  10. 68430
    Publicado 2015
    “…From these considerations, a novel, pressing request arises from the life sciences to design methodologies and approaches that allow for these data to be interpreted as a whole, i.e. as intertwined molecular signatures containing genes, proteins, mRNAs and miRNAs, able to capture inter-layers connections and complexity. …”
    Libro electrónico
  11. 68431
    Publicado 2017
    “…Under the Bribery Act 2010, a maximum of ten years’ imprisonment and an unlimited fine may be imposed for offering, promising, giving, requesting, agreeing, receiving or accepting bribes. …”
    Libro electrónico
  12. 68432
    Publicado 2006
    “…Coverage includes · Ensuring that every build you create is complete, consistent, and reproducible · Configuring a ClearCase-controlled environment to support your development organization’s build and release process · Installing Ant and configuring it to build all of your project assets · Integrating Ant with ClearCase and effectively using them together · Installing CruiseControl and configuring it to schedule and automate different types of builds · Integrating CruiseControl with ClearCase to schedule builds and automate baselines and reports · Creating custom baseline and change request reports · Setting up automatic notification whenever build problems arise · Creating and packaging releasable, traceable builds with ClearCase and ClearQuestTM…”
    Libro electrónico
  13. 68433
    Publicado 1994
    “…Many technical journals now request that articles be submitted in TeX. TeX is also playing an increasing role in the Standard Generalized Markup Language (SGML) environment. …”
    Libro electrónico
  14. 68434
    Publicado 2008
    “…Coverage includes Planning Ajax interfaces for simplicity, clarity, and intuitiveness Creating scalable, maintainable architectures for client-side JavaScript Using the latest tools to profile, validate, and debug client-side code Architecting the server side for security and functionality, while restricting loaded data, objects, and actions to current requests Protecting against the most widespread and significant Ajax security risks Optimizing every component of an Ajax application, from server-side scripts to database interactions Introducing cutting-edge Ajax: game development, Ajax with canvas, and Ajax for enterprise applications About the Web Site This book’s companion Web site (http://advancedajax.frozen-o.com) doesn’t just provide all the code: It shows code examples in action , as building blocks of a real Web application interface…”
    Libro electrónico
  15. 68435
    Publicado 2019
    “…Este libro recoge seis textos previamente publicados en la revista Izquierdas, incorpora también la traducción inédita de un texto del historiador uruguayo Aldo Marchesi; y recopila una serie de columnas publicadas a propósito del cierre de la muestra "Hijos de la Libertad" del Museo Histórico Nacional en mayo de 2018. …”
    Libro electrónico
  16. 68436
    Publicado 2019
    “…You'll continue to build up larger applications involving HTTP requests for communication. Integrate your Elm applications with JavaScript so you can update legacy applications or take advantage of JavaScript resources. …”
    Libro electrónico
  17. 68437
    Publicado 2020
    “…You will: Create immersive experiences using Microsoft HoloLens 2 and Office 365 Access Office 365 data programmatically using the Microsoft Graph API Control your immersive experiences using natural gestures and eye tracking Understand and correctly use different visualization models Implement design patterns to write better code in Unity Know how to access services using web requests via DLLs…”
    Libro electrónico
  18. 68438
    por Institute of Medicine (U.S.).
    Publicado 2010
    “…Enhancing Food Safety: The Role of the Food and Drug Administration, a new book from the Institute of Medicine and the National Research Council, responds to a congressional request for recommendations on how to close gaps in FDA's food safety systems. …”
    Libro electrónico
  19. 68439
    Publicado 2023
    “…You will have the knowledge and skills required to do the following: The Security Engineering and Cryptography Domain is about applying security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques This course in the CASP series covers the following topics: Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys…”
    Video
  20. 68440
    Publicado 2016
    “…José Manuel Losada (Universidad Complutense), es fundador y editor de Amaltea. Revista de Mitocrítica, presidente de Asteria. Asociación Internacional de Mitocrítica y director de Acis. …”
    Libro electrónico