Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,950
- Publicaciones periódicas 1,945
- Educación 1,464
- Teología 1,211
- Education 1,119
- Psicología 1,091
- Periodicals 1,069
- Derecho 1,066
- Economía 1,005
- Filosofía 1,001
- Revistes 893
- Ciencias sociales 878
- Social sciences 762
- Medicina 683
- Humanidades 654
- Información general 575
- Psychology 572
- Agricultura 552
- Literatura 536
- Science 533
- Agriculture 494
- Psicología industrial 475
- Technology 473
- Tecnología 470
- Arquitectura 459
- Ciencia 458
- Psychology, Industrial 451
- Work 444
- Història 441
- Articulos Publicaciones periodicas 431
-
68421Publicado 2022“…It will take you to the point where you will understand what method (GET or POST) to use when sending form data, how to define where the data goes, and how to perform advanced client-side validation (checking errors on the form before it is sent to the server), how to write custom pattern validation rules (using regular expressions), how to run servers, and how to view all HTTP request information. This is awesome knowledge. This course will captivate you and catapult you to the next level and set you well on your way to becoming a true grandmaster in front-end webform development. …”
Video -
68422por Luby, Stephen“…It is easier for experienced scientists to ignore the request, or to simply rewrite the article. Early career scientists are motivated to address these barriers but specific advice is difficult to find, and much of this advice is behind a pay wall. …”
Publicado 2022
Libro electrónico -
68423por Organisation for Economic Co-operation and Development.“…This paper originated in a request from the Ministry of Finance of the Czech Republic for SIGMA advice in developing new legal provisions for the financial management of public agencies. …”
Publicado 2001
Capítulo de libro electrónico -
68424Publicado 2015“…The Revenue Growth Habit shows how to request and collect testimonials and how to communicate these testimonials to grow your business. …”
Libro electrónico -
68425Publicado 2015“…It will also be of use to personnel in non-IT roles, in an effort to make this unwieldy subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents. …”
Libro electrónico -
68426Publicado 2022“…A lo largo de una serie de doce capítulos y una<U+000d><U+000a>coda en que pasa revista no solamente a varios filósofos sino también a representaciones artísticas y literarias diversas, la filósofa italiana cuestiona que<U+000d><U+000a>la rectitud sea la postura propia del ser humano y defiende que esta postura ha tapado otra que nos es mucho más propia, la de la inclinación, que tradicionalmente el arte y la filosofía han reservado exclusivamente a la mujer. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
68427Publicado 2008“…You’ll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely—and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own · Create more secure “mashup” applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers…”
Libro electrónico -
68428Publicado 2002“…You'll conclude with design and implementation guidelines for some of the more popular and widely requested VoIP services, such as prepaid services, fax services, and virtual private networks (VPNs). …”
Libro electrónico -
68429por Hougland, Damon“…Make the most of scriptlets, expressions, declarations, actions and directives Get under the hood with Sun's JSP engine: multithreading, persistence, implicit objects, and more Understand JSP requests and responses—in depth Track sessions and data: hidden frames and form fields, cookies, URL rewriting, and the HttpSession API Integrate databases: JDBCTM, SQL, metadata, connection pooling, and more Creating custom JSP actions (custom tags) Optimize the performance of your JSP pages Every Core Series book: DEMONSTRATES how to write commercial quality code FEATURES dozens of nontrivial programs and examples—no toy code! …”
Publicado 2001
Libro electrónico -
68430Publicado 2015“…From these considerations, a novel, pressing request arises from the life sciences to design methodologies and approaches that allow for these data to be interpreted as a whole, i.e. as intertwined molecular signatures containing genes, proteins, mRNAs and miRNAs, able to capture inter-layers connections and complexity. …”
Libro electrónico -
68431Publicado 2017“…Under the Bribery Act 2010, a maximum of ten years’ imprisonment and an unlimited fine may be imposed for offering, promising, giving, requesting, agreeing, receiving or accepting bribes. …”
Libro electrónico -
68432Publicado 2006“…Coverage includes · Ensuring that every build you create is complete, consistent, and reproducible · Configuring a ClearCase-controlled environment to support your development organization’s build and release process · Installing Ant and configuring it to build all of your project assets · Integrating Ant with ClearCase and effectively using them together · Installing CruiseControl and configuring it to schedule and automate different types of builds · Integrating CruiseControl with ClearCase to schedule builds and automate baselines and reports · Creating custom baseline and change request reports · Setting up automatic notification whenever build problems arise · Creating and packaging releasable, traceable builds with ClearCase and ClearQuestTM…”
Libro electrónico -
68433Publicado 1994“…Many technical journals now request that articles be submitted in TeX. TeX is also playing an increasing role in the Standard Generalized Markup Language (SGML) environment. …”
Libro electrónico -
68434Publicado 2008“…Coverage includes Planning Ajax interfaces for simplicity, clarity, and intuitiveness Creating scalable, maintainable architectures for client-side JavaScript Using the latest tools to profile, validate, and debug client-side code Architecting the server side for security and functionality, while restricting loaded data, objects, and actions to current requests Protecting against the most widespread and significant Ajax security risks Optimizing every component of an Ajax application, from server-side scripts to database interactions Introducing cutting-edge Ajax: game development, Ajax with canvas, and Ajax for enterprise applications About the Web Site This book’s companion Web site (http://advancedajax.frozen-o.com) doesn’t just provide all the code: It shows code examples in action , as building blocks of a real Web application interface…”
Libro electrónico -
68435Publicado 2019“…Este libro recoge seis textos previamente publicados en la revista Izquierdas, incorpora también la traducción inédita de un texto del historiador uruguayo Aldo Marchesi; y recopila una serie de columnas publicadas a propósito del cierre de la muestra "Hijos de la Libertad" del Museo Histórico Nacional en mayo de 2018. …”
Libro electrónico -
68436Publicado 2019“…You'll continue to build up larger applications involving HTTP requests for communication. Integrate your Elm applications with JavaScript so you can update legacy applications or take advantage of JavaScript resources. …”
Libro electrónico -
68437Publicado 2020“…You will: Create immersive experiences using Microsoft HoloLens 2 and Office 365 Access Office 365 data programmatically using the Microsoft Graph API Control your immersive experiences using natural gestures and eye tracking Understand and correctly use different visualization models Implement design patterns to write better code in Unity Know how to access services using web requests via DLLs…”
Libro electrónico -
68438por Institute of Medicine (U.S.).“…Enhancing Food Safety: The Role of the Food and Drug Administration, a new book from the Institute of Medicine and the National Research Council, responds to a congressional request for recommendations on how to close gaps in FDA's food safety systems. …”
Publicado 2010
Libro electrónico -
68439Publicado 2023“…You will have the knowledge and skills required to do the following: The Security Engineering and Cryptography Domain is about applying security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques This course in the CASP series covers the following topics: Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys…”
Video -
68440Publicado 2016“…José Manuel Losada (Universidad Complutense), es fundador y editor de Amaltea. Revista de Mitocrítica, presidente de Asteria. Asociación Internacional de Mitocrítica y director de Acis. …”
Libro electrónico