Mostrando 4,501 - 4,520 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.76s Limitar resultados
  1. 4501
    por Tanner, Abdul Wahid
    Publicado 2022
    Tabla de Contenidos: “…Chapter 15: How to Test With Multiple Threads -- Technical requirements -- Using multiple threads in tests -- Making the logging library thread-safe -- The need to justify multiple threads -- Changing the service return type -- Making multiple service calls -- How to test multiple threads without sleep -- Fixing one last problem detected with logging -- Summary -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  2. 4502
    Publicado 2023
    Tabla de Contenidos: “…Control challenges (motion control) -- Overview of an application -- Overcoming the control challenge (motion control) -- Summary -- Chapter 6: Material Dispensing Control -- The need for quantity control -- Control challenge (quantity control - weight or volume) -- Overview of an application -- Overcoming the control challenge (quantity control - weight or volume) -- Summary -- Part 2: Automation and Humans -- Chapter 7: The Interplay of Humans-Machines-Automation -- Humans and machines -- The need for interaction with machines -- Interaction while in operation -- Interaction while the machine is constructed -- Interaction at the design and testing stages -- Interaction at the supply chain and procurement stages -- Programming platforms and programming languages -- IEC 61131-3 languages -- Various formats of the application software -- Data from the process - values, alarms, and events -- Elementary operator interface - switches, dials, and meters -- Supervisory control -- Plantwide information -- Digital dashboards -- SCADA systems -- DCSs -- Advanced functions -- Mobile first - control from anywhere -- Summary -- Chapter 8: Automation - Dramatically Helping Avoid Human Intervention -- The need to reduce human intervention -- The control challenge in designing machines without supervision -- Application examples -- Continuous processes -- No-second-chance missions -- A high cost of error -- How the control challenge is solved -- Stored program controllers -- Maintenance techniques -- Systems with redundancy -- Fail-safe configurations -- Graceful degradation -- Lights-out factory -- Almost-human machines -- Summary -- Chapter 9: Automation Can Build a Super-Organism with Awareness -- A blueprint of automation with awareness -- Automation as a super-organism -- Automation and awareness -- Technological advances to help realize the blueprint…”
    Libro electrónico
  3. 4503
    Publicado 2025
    Tabla de Contenidos: “…-- The Case for Action -- Becoming Company B -- Explore and Discover -- Assess the Current State -- Create a Vision with Substance -- Build Trust -- Create a Safe Environment -- Train and Transform -- Remove Systemic Barriers -- Raise the Bar -- Share and Learn -- Reflecting on the Future -- Notes -- About the Author -- Index -- EULA…”
    Libro electrónico
  4. 4504
    por MODELS 2009
    Publicado 2009
    Tabla de Contenidos: “…-- (Meta-)Model Modeling and Management -- Modeling Modeling -- Representation and Traversal of Large Clabject Models -- Meta-model Pruning -- Quantitative Modeling with UML -- A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems -- Model Driven Performance Measurement and Assessment with MoDePeMART -- Security Analysis of a Biometric Authentication System Using UMLsec and JML -- Model Transformations and Constraints -- Automatically Discovering Hidden Transformation Chaining Constraints -- CSP(M): Constraint Satisfaction Problem over Models -- Parsing SBVR-Based Controlled Languages -- Model Management -- SLIM—A Lightweight Environment for Synchronous Collaborative Modeling -- Language-Independent Change Management of Process Models -- Requirements for Practical Model Merge – An Industrial Perspective -- UML in Practice and Quality Assurance -- Evaluating the Impact of UML Modeling on Software Quality: An Industrial Case Study -- Concern Visibility in Base Station Development – An Empirical Investigation -- Influencing Factors in Model-Based Testing with UML State Machines: Report on an Industrial Cooperation -- Formalization of Model Transformations -- Towards Composite Model Transformations Using Distributed Graph Transformation Concepts -- On-the-Fly Construction, Correctness and Completeness of Model Transformations Based on Triple Graph Grammars -- Formal Support for QVT-Relations with Coloured Petri Nets -- Scenario Modeling -- An Example Is Worth a Thousand Words: Composite Operation Modeling By-Example -- Refactoring-Safe Modeling of Aspect-Oriented Scenarios -- Model-Based Testing Using LSCs and S2A -- Business Application Development -- Model Driven Development of Graphical User Interfaces for Enterprise Business Applications – Experience, Lessons Learnt and a Way Forward -- Business Process Models as a Showcase for Syntax-Based Assistance in Diagram Editors -- Rule-Enhanced Business Process Modeling Language for Service Choreographies -- Model Synchronisation and Change Propagation -- Change-Driven Model Transformations -- An Incremental Algorithm for High-Performance Runtime Model Consistency -- Traceability-Based Change Awareness -- Keynote 2 -- Interaction Design and Model-Driven Development -- Language Specification and Annotation -- Towards Test-Driven Semantics Specification -- Scalable Semantic Annotation Using Lattice-Based Ontologies -- OntoDSL: An Ontology-Based Framework for Domain-Specific Languages -- Domain-Specific Languages -- Domain-Specific Languages in Practice: A User Study on the Success Factors -- Evaluating Context Descriptions and Property Definition Patterns for Software Formal Validation -- Anatomy of a Visual Domain-Specific Language Project in an Industrial Context -- Model-Based Analysis -- A Goal-Based Modeling Approach to Develop Requirements of an Adaptive System with Environmental Uncertainty -- A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation -- Polymorphic Scenario-Based Specification Models: Semantics and Applications -- Model (De-)Composition and Abstractio -- Aspect Model Unweaving -- Model Composition Contracts -- Abstracting Complex Languages through Transformation and Composition -- An Approach for Evolving Transformation Chains -- Distributed Software Development -- Deterministic UML Models for Interconnected Activities and State Machines -- Automated Encapsulation of UML Activities for Incremental Development and Verification -- Using UML Statecharts with Knowledge Logic Guards -- Service and Business Process Integration -- A Modeling Language for Activity-Oriented Composition of Service-Oriented Software Systems -- A Domain Specific Modeling Language Supporting Specification, Simulation and Execution of Dynamic Adaptive Systems -- Executable Domain Specific Language for Message-Based System Integration -- Keynote 3 -- Architectural Mining: The Other Side of the MDD -- Genericity and Constraints -- Generic Model Refactorings -- Constraining Type Parameters of UML 2 Templates with Substitutable Classifiers -- Generating Assertion Code from OCL: A Transformational Approach Based on Similarities of Implementation Languages -- OCLLib, OCLUnit, OCLDoc: Pragmatic Extensions for the Object Constraint Language -- Variability Management -- Variability within Modeling Language Definitions -- Variability Modelling throughout the Product Line Lifecycle -- Weaving Variability into Domain Metamodels -- Automatic Domain Model Migration to Manage Metamodel Evolution -- Model Transformation Engineering -- Model Transformation by Demonstration -- Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets -- Incremental Development of Model Transformation Chains Using Automated Testing -- Test-Driven Development of Model Transformations -- Symposium -- Educators’ Symposium at MODELS 2009.…”
    Libro electrónico
  5. 4505
    Publicado 2007
    Tabla de Contenidos: “…Designing a Framework for Your Site; 1.7.2. Safe and Secure…”
    Libro electrónico
  6. 4506
    por DiBona, Chris
    Publicado 2005
    Tabla de Contenidos: “…Subversion; 2.3.1.3. What About SourceSafe?; 2.3.1.4. The Special Case of BitKeeper; 2.4. …”
    Libro electrónico
  7. 4507
    por Vyncke, Eric, Paggen, Christopher
    Publicado 2008
    Tabla de Contenidos: “…-- Summary -- References -- Chapter 4 Are VLANS Safe? -- IEEE 802.1Q Overview -- Understanding Cisco Dynamic Trunking Protocol -- Understanding Cisco VTP -- Summary -- References -- Chapter 5 Leveraging DHCP Weaknesses -- DHCP Overview -- Attacks Against DHCP -- Countermeasures to DHCP Exhaustion Attacks -- DHCP Snooping Against IP/MAC Spoofing Attacks -- Summary -- References -- Chapter 6 Exploiting IPv4 ARP -- Back to ARP Basics -- Risk Analysis for ARP -- ARP Spoofing Attack -- Mitigating an ARP Spoofing Attack -- Mitigating Other ARP Vulnerabilities -- Summary -- References -- Chapter 7 Exploiting IPv6 Neighbor Discovery and Router Advertisement -- Introduction to IPv6 -- Analyzing Risk for ND and Stateless Configuration -- Mitigating ND and RA Attacks -- Here Comes Secure ND -- Summary -- References -- Chapter 8 What About Power over Ethernet? …”
    Libro electrónico
  8. 4508
    Publicado 2005
    Tabla de Contenidos: “…. -- Item 29: Strive for exception-safe code. -- Item 30: Understand the ins and outs of inlining. -- Item 31: Minimize compilation dependencies between files. -- Chapter 6: Inheritance and Object-Oriented Design -- Item 32: Make sure public inheritance models "is-a." -- Item 33: Avoid hiding inherited names. -- Item 34: Differentiate between inheritance of interface and inheritance of implementation. -- Item 35: Consider alternatives to virtual functions. -- Item 36: Never redefine an inherited non-virtual function. -- Item 37: Never redefine a function's inherited default parameter value. -- Item 38: Model "has-a" or "is-implemented-in-terms-of" through composition. -- Item 39: Use private inheritance judiciously. -- Item 40: Use multiple inheritance judiciously. -- Chapter 7: Templates and Generic Programming -- Item 41: Understand implicit interfaces and compile-time polymorphism. -- Item 42: Understand the two meanings of typename. -- Item 43: Know how to access names in templatized base classes. -- Item 44: Factor parameter-independent code out of templates. -- Item 45: Use member function templates to accept "all compatible types." -- Item 46: Define non-member functions inside templates when type conversions are desired. -- Item 47: Use traits classes for information about types. -- Item 48: Be aware of template metaprogramming. -- Chapter 8: Customizing new and delete -- Item 49: Understand the behavior of the new-handler. -- Item 50: Understand when it makes sense to replace new and delete. -- Item 51: Adhere to convention when writing new and delete. -- Item 52: Write placement delete if you write placement new. -- Chapter 9: Miscellany…”
    Libro electrónico
  9. 4509
    por Ballad, Tricia
    Publicado 2009
    Tabla de Contenidos: “…-- Prevent Buffer Overflows by Sanitizing Variables -- Patch the Application -- Wrapping It Up -- Chapter 5 Input Validation -- New Feature: Allow Users to Sign Their Guestbook Comments -- The Problem: Users Who Give You More Than You Asked For -- Assumptions: You Know What Your Data Looks Like -- The Solution: Regular Expressions to Validate Input -- Wrapping It Up -- Chapter 6 Filesystem Access: Accessing the Filesystem for Fun and Profit -- Opening Files -- Creating and Storing Files -- Changing File Properties Safely -- Patching the Application to Allow User-Uploaded Image Files -- Wrapping It Up -- Part IV: "Aw come on man, you can trust me" -- Chapter 7 Authentication -- What Is User Authentication? …”
    Libro electrónico
  10. 4510
    Publicado 2000
    Tabla de Contenidos: “…Reliability: Modeling, Prediction, and Optimization; Contents; Part A: Context of Reliability Analysis; 1 An Overview; 1.1 Introduction; 1.2 Illustrative Examples of Products and Systems; Example 1.1 Incandescent Electric Bulb; Example 1.2 Hydraulically Operated Fail-Safe Gate Valve; Example 1.3 Pneumatic Pump; Example 1.4 Brake Mechanism for Train Wagons; Example 1.5 Liquid Rocket Engine; Example 1.6 Electric Power System; 1.3 System and Product Deterioration and Failure; 1.3.1 Failures and Faults; 1.3.2 Failure Modes; 1.3.3 Failure Causes and Severity; 1.3.4 Deterioration…”
    Libro electrónico
  11. 4511
    Publicado 2014
    Tabla de Contenidos: “…4.1 The organisation4.1.1 Structure; 4.1.2 Processes; 4.2 Loosely coupled tasks; 4.2.1 Task dependencies; 4.2.2 Events and event patterns; 4.2.3 Support for dynamic modifications; 4.3 Behaviour-based processes; 4.3.1 Organisational behaviour; 4.3.2 Process definitions; 4.4 Two-tier constraints; 4.4.1 The boundary for a safe modification; 4.4.2 The minimal set of constraints; 4.4.3 Benefits of two-tier constraints; 4.5 Behaviour specialisation; 4.5.1 Variations in organisational behaviour; 4.5.2 Specialisation rules; 4.5.3 Support for unforeseen variations; 4.6 Interaction membranes…”
    Libro electrónico
  12. 4512
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Journey to the Spring World -- Spring modularity -- Spring Core Framework -- Core container -- Spring Messaging -- Spring AMQP -- Spring for Apache Kafka -- Spring JMS -- Spring Web MVC -- Spring WebFlux -- Spring Data -- Spring Security -- Spring Cloud -- Spring Cloud Netflix -- Spring Cloud Config -- Spring Cloud Consul -- Spring Cloud Security -- Spring Cloud Bus -- Spring Cloud Stream -- Spring Integration -- Spring Boot -- Microservices and Spring Boot -- Setting up our development environment -- Installing OpenJDK -- Installing Maven -- Installing IDE -- IntelliJ IDEA -- Spring Tools Suite -- Installing Docker -- Introducing Docker concepts -- Docker images -- Containers -- Docker networks -- Docker volumes -- Docker commands -- Docker run -- Docker container -- Docker network -- Docker volume -- Summary -- Chapter 2: Starting in the Spring World - the CMS Application -- Creating the CMS application structure -- The CMS project -- Project metadata section -- The dependencies section -- Generating the project -- Running the application -- Looking under the hood -- Running the application -- IntelliJ IDEA -- Command line -- Command line via the Maven goal -- Command line via the JAR file -- Creating the REST resources -- Models -- Adding Lombok dependency -- Creating the models -- Tag -- Category -- User -- News -- Hello REST resources -- Creating the CategoryResource class -- UserResource -- NewsResource -- Adding service layer -- Changes in the model -- Adding a new review -- Keeping the news safely -- Before starting the service layer -- CategoryService -- UserService -- NewsService -- Configuring Swagger for our APIs -- Adding dependencies to pom.xml -- Configuring Swagger -- First documented API…”
    Libro electrónico
  13. 4513
    Publicado 2022
    Tabla de Contenidos: “…-- Documenting .NET libraries using DocFX -- Documenting a Web API using Swagger -- Use case - reusing code as a fast way to deliver good and safe software -- Summary -- Questions -- Further reading -- Chapter 13: Applying Service-Oriented Architectures with .NET -- Technical requirements -- Understanding the principles of the SOA approach -- SOAP web services -- SOAP specifications -- Difficulties associated with the standard -- REST web services -- Service type compatibility rules -- REST and native HTTP features -- Example of methods in the REST language -- The OpenAPI standard -- REST service authorization and authentication -- How does .NET 6 deal with SOA? …”
    Libro electrónico
  14. 4514
    por OECD
    Publicado 2021
    Tabla de Contenidos: “…Do services deliver improvement of individual's condition? -- Are services safe? -- Inpatient suicides point to shortcoming in OECD countries -- Coercion in contemporary mental health care -- Do mental health services account for and respect the needs of vulnerable groups? …”
    Libro electrónico
  15. 4515
    Publicado 2015
    Tabla de Contenidos: “…Adding up the extras -- Organizing all your parts -- Protecting You and Your Electronics -- Understanding that electricity can really hurt -- Soldering safely -- Avoiding static like the plague -- Chapter 14 Interpreting Schematics -- What's a Schematic and Why Should I Care? …”
    Libro electrónico
  16. 4516
    Publicado 2017
    Tabla de Contenidos: “…. -- Accessing std::vector instances the fast or the safe way -- How to do it... -- How it works... -- There's more... -- Keeping std::vector instances sorted -- How to do it... -- How it works... -- There's more... -- Inserting items efficiently and conditionally into std::map -- How to do it... -- How it works... -- There's more…”
    Libro electrónico
  17. 4517
    Publicado 2024
    Tabla de Contenidos: “…Designing fast selection logic -- Selecting from a huge number of items -- Interoperability with .NET 8 -- Tip - creating a service in Linux -- Achieving security by design -- List of practices for achieving a safe architecture -- Authentication -- Sensitive data -- Web security -- Summary -- Questions -- Further reading -- Chapter 3: Managing Requirements -- Technical requirements -- Introducing Azure DevOps -- Managing system requirements in Azure DevOps -- Epic work items -- Feature work items -- Product Backlog items/User Story work items -- Azure DevOps repository -- Package feeds -- Test Plans -- Pipelines -- Usage -- Introducing GitHub projects -- Summary -- Questions -- Chapter 4: Best Practices in Coding C# 12 -- Technical requirements -- The simpler your code, the better a programmer you are -- Maintainability index -- Cyclomatic complexity -- Depth of inheritance -- Class coupling -- Number of lines of code -- Using a version control system -- Dealing with version control systems in teams -- Writing safe code in C# -- try-catch -- try-finally and using -- The IDisposable interface -- .NET 8 tips and tricks for coding -- Identifying well-written code -- Understanding and applying tools that can evaluate C# code -- Applying extension tools to analyze code -- Applying SonarAnalyzer -- Checking the final code after analysis -- Summary -- Questions -- Further reading -- Chapter 5: Implementing Code Reusability in C# 12 -- Technical requirements -- Understanding the principles of code reusability -- What code reuse is not -- What code reuse is -- Reusability in the development life cycle -- Using .NET 8 for code reuse -- Creating a reusable class library -- How does C# deal with code reuse? …”
    Libro electrónico
  18. 4518
    Publicado 2019
    Tabla de Contenidos: “…3.2.5 VST3 and the GUID -- 3.2.6 VST3 Plugin Class Factory -- 3.3 Description: Plugin Description Strings -- 3.4 Description: Plugin Options/Features -- 3.4.1 Side Chain Input -- 3.4.2 Latency -- 3.4.3 Tail Time -- 3.4.4 Custom GUI -- 3.4.5 Factory Presets and State Save/Load -- 3.4.6 VST3 Support for 64-bit Audio -- 3.5 Initialization: Defining Plugin Parameters -- 3.5.1 Thread-Safe Parameter Access -- 3.5.2 Initialization: Defining Plugin Channel I/O Support -- 3.5.3 Initialization: Channel Counts and Sample Rate Information -- 3.6 The Buffer Process Cycle -- 3.6.1 Processing: Updating Plugin Parameters From GUI Controls -- 3.6.2 Processing: Resetting the Algorithm and Preparing for Streaming -- 3.6.3 Processing: Accessing the Audio Buffers -- 3.6.4 Processing: Writing Output Parameters -- 3.6.5 Processing: VST3 Soft Bypass -- 3.7 Destruction/Termination -- 3.8 Retrieving VST3 Host Information -- 3.9 Validating Your Plugin -- 3.10 Using ASPiK to Create VST3 Plugins -- 3.11 Bibliography -- Chapter 4: AU Programming Guide -- 4.1 Setting Up the AU SDK -- 4.1.1 AU Sample Projects -- 4.1.2 AU Documentation -- 4.2 AU Architecture and Anatomy -- 4.2.1 AU Base Classes -- 4.2.2 MacOS Bundle ID -- 4.2.3 AU Programming Notes -- 4.3 Description: Plugin Description Strings -- 4.4 Description: Plugin Options/Features -- 4.4.1 Side Chain Input -- 4.4.2 Latency -- 4.4.3 Tail Time -- 4.4.4 Custom GUI -- 4.4.5 Factory Presets and State Save/Load -- 4.5 Initialization: Defining Plugin Parameters -- 4.5.1 Thread-Safe Parameter Access -- 4.5.2 Initialization: Defining Plugin Channel I/O Support -- 4.5.3 Initialization: Channel Counts and Sample Rate Information -- 4.6 The Buffer Process Cycle -- 4.6.1 Processing: Updating Plugin Parameters From GUI Controls -- 4.6.2 Processing: Resetting the Algorithm and Preparing for Streaming…”
    Libro electrónico
  19. 4519
    por Vergara Cortina, Nestor
    Publicado 2012
    Tabla de Contenidos: “…9.8 Sistema Andino de Franja de Precios, SAFP10. Medidas no arancelarias; 11. Normas y barreras técnicas al comercio; 11.1 Reglas OMC; 12. …”
    Libro electrónico
  20. 4520
    Publicado 2003
    Tabla de Contenidos: “…Nosotros, cual las hojas...; Safo (siglo vn-600 a.C.); 32. Himno a Afrodita; Teognis de Mégara (c. la. mitad del s. vi a.C.); 33. …”
    Libro electrónico