Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 270
- Literatura cristiana oriental 240
- Management 213
- Patrística siria 208
- Application software 207
- Engineering & Applied Sciences 201
- Computer security 174
- Security measures 174
- Computer networks 159
- Computer Science 134
- Business & Economics 131
- History 122
- Leadership 120
- Artificial intelligence 111
- Computer programs 107
- Cloud computing 98
- Computer software 97
- Operating systems (Computers) 93
- Web site development 92
- Historia 91
- Data processing 80
- Computer programming 77
- Finance 72
- Technology: general issues 72
- Social aspects 69
- Database management 68
- Information technology 67
- Photography 67
- Web sites 66
- Design 64
-
4601Publicado 2008Tabla de Contenidos: “…Cover -- Contents -- Preface -- Acknowledgments -- Part I: History -- 1 Introduction -- 1.1 The Standard Rubric -- 1.2 The Matrix -- 1.3 Other Views -- 1.4 Safe States and the Access Control Matrix -- 1.5 Other Hard Questions -- 1.6 The Take-Home Message -- 1.7 Project Ideas -- 2 The Old Testament -- 2.1 The Basic Framework -- 2.2 Security Models -- 2.3 The Orange Book -- 2.4 INFOSEC, OPSEC, JOBSEC -- 2.5 The Take-Home Message -- 2.6 Project Ideas -- 3 Old Principles, New World -- 3.1 Solving the Wrong Problem? …”
Libro electrónico -
4602Publicado 2001Tabla de Contenidos: “…Time-of-Check, Time-of-Use -- Broken passwd -- Avoiding TOCTOU Problems -- Secure File Access -- Temporary Files -- File Locking -- Other Race Conditions -- Conclusion -- 10 Randomness and Determinism -- Pseudo-random Number Generators -- Examples of PRNGs -- The Blum-Blum-Shub PRNG -- The Tiny PRNG -- Attacks Against PRNGs -- How to Cheat in On-line Gambling -- Statistical Tests on PRNGs -- Entropy Gathering and Estimation -- Hardware Solutions -- Software Solutions -- Poor Entropy Collection: How to Read "Secret" Netscape Messages -- Handling Entropy -- Practical Sources of Randomness -- Tiny -- Random Numbers for Windows -- Random Numbers for Linux -- Random Numbers in Java -- Conclusion -- 11 Applying Cryptography -- General Recommendations -- Developers Are Not Cryptographers -- Data Integrity -- Export Laws -- Common Cryptographic Libraries -- Cryptlib -- OpenSSL -- Crypto++ -- BSAFE -- Cryptix -- Programming with Cryptography -- Encryption -- Hashing -- Public Key Encryption -- Threading -- Cookie Encryption -- More Uses for Cryptographic Hashes -- SSL and TLS (Transport Layer Security) -- Stunnel -- One-Time Pads -- Conclusion -- 12 Trust Management and Input Validation -- A Few Words on Trust -- Examples of Misplaced Trust -- Trust Is Transitive -- Protection from Hostile Callers -- Invoking Other Programs Safely -- Problems from the Web -- Client-side Security -- Perl Problems -- Format String Attacks -- Automatically Detecting Input Problems -- Conclusion -- 13 Password Authentication -- Password Storage -- Adding Users to a Password Database -- Password Authentication -- Password Selection -- More Advice -- Throwing Dice -- Passphrases -- Application-Selected Passwords -- One-Time Passwords -- Conclusion -- 14 Database Security -- The Basics -- Access Control -- Using Views for Access Control -- Field Protection…”
Libro electrónico -
4603Publicado 2014Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- About the Authors -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I: Essential Knowledge -- Chapter 1: Getting Started -- Installing Hudson -- Trying Hudson with the Easy Installation Method -- Installing Hudson as a Windows Service -- Installing Hudson to Start When a User Logs in to Mac OS X -- Installing Hudson Within Tomcat -- Installing Hudson on GNU/Linux -- Basic Hudson Configuration -- Your First Job: Back Everything Up -- Summary -- Chapter 2: Hudson Precondition Primer -- Hudson in the Software Development Lifecycle -- Developer -- Tester -- Manager -- Architect -- Release Engineer -- Example: Orchestration of Roles Around Hudson -- Software Development as Marionette Theatre Production -- Development Platforms -- Software Configuration Management -- Builders -- Integrated Development Environments -- Eclipse -- Oracle JDeveloper -- IntelliJ IDEA -- NetBeans -- Testing Tools -- Soft Correctness Testing Tools -- Summary -- Chapter 3: Basic Concepts -- Intermediate Hudson Configuration -- Adding Source Code Management (SCM) to Your Jobs -- Your Second Job: A Simple Java Program -- Your Third Job: A Simple Servlet -- Using the Plugin Center -- Your Fourth Job: Advanced Backup Options -- Hudson Authentication Security -- Adding Quality Assurance Systems -- Build Notifiers -- Configuring E-mail Server -- Configuring the Job to Send Build Status Message -- Summary -- Part II: Applying Hudson -- Chapter 4: Hudson as a Continuous Integration Server -- What Is Continuous Integration? …”
Libro electrónico -
4604por Palloff, Rena M., 1950-Tabla de Contenidos: “…to Keep the Discussion Moving -- Learn How to Ask Broad Questions That Stimulate Thinking to Promote Participation -- Include Humor in Your Posts to Help Students Feel Welcome and Safe -- Post a Welcoming Response to Student Introductions to Help All Join More Successfully -- Teaching Students to Learn in the Online Environment -- Respecting Student Intellectual Property -- Chapter Eight Online Classroom Dynamics -- Group Dynamics and Online Classroom Dynamics -- Applying What We Understand AboutGroups to Online Classes -- Preforming -- Unity -- Disunity -- Conflict‐Confrontation -- Disharmony -- Harmony -- Performing -- Concluding Thoughts About the Soul and Spirit Group -- Other Ways of Looking at Online Groups -- The Student -- The Group -- The Instructor/Facilitator -- The Task -- The Technology -- Conflict Revisited -- Working with Difficult Students -- When It Simply Isn't Working -- Chapter Nine Lessons Learned in the Virtual Classroom -- A Look Back -- The Myths -- Lessons for Faculty -- Instructors Need Not Fear Online Learning -- Course Development Needs to Focus on Interactivity, Not Content -- Instructor and Student Roles Need to Change -- Lessons for Instructional Designers andFaculty Developers -- Both Faculty and Students Need Training…”
Publicado 2013
Libro electrónico -
4605Publicado 2010Tabla de Contenidos: “…Part III: Unleashing Windows Home Server Performance and Maintenance -- 14 Tuning Windows Home Server Performance -- Monitoring Performance -- Optimizing the Hard Disk -- Optimizing Virtual Memory -- Optimizing Applications -- More Optimization Tricks -- From Here -- 15 Maintaining Windows Home Server -- Checking System Uptime -- Checking Your Hard Disk for Errors -- Checking Free Disk Space on the System Drive -- Deleting Unnecessary Files from the System Drive -- Defragmenting the System Drive -- Reviewing Event Viewer Logs -- Setting Up a Maintenance Schedule -- From Here -- 16 Customizing the Windows Home Server Interface -- Making the Start Menu More Efficient -- Making the Taskbar More Efficient -- Modifying the Start Menu and Taskbar with Group Policies -- Customizing the Color Quality and Resolution -- Setting the Screensaver -- Customizing the Desktop Colors, Fonts, and Sizes -- From Here -- 17 Troubleshooting Windows Home Server -- Replacing Your System Hard Drive -- Restoring a Windows Home Server Backup -- Understanding Troubleshooting Strategies -- General Troubleshooting Tips -- Troubleshooting Using Online Resources -- Troubleshooting Device Problems -- Troubleshooting Startup -- Reinstalling Windows Home Server -- From Here -- Part IV: Unleashing Windows Home Server Advanced Tools -- 18 Working with the Windows Home Server Registry -- Starting the Registry Editor -- Navigating the Registry -- Keeping the Registry Safe -- Working with Registry Entries -- Finding Registry Entries -- From Here -- 19 Using Windows Home Server's Command-Line Tools -- Getting to the Command Line -- Working at the Command Line -- Understanding Batch File Basics -- Working with the Command-Line Tools -- From Here -- 20 Using Other Windows Home Server Power Tools -- Using the Group Policy Object Editor -- Getting More Out of Control Panel…”
Libro electrónico -
4606Publicado 2017Tabla de Contenidos: “…The Ox-Bezoar Empowerment for Fertility and Safe Childbirth: Selected Readings from the Shingon Ritual Collections -- 34. …”
Libro electrónico -
4607Publicado 2018Tabla de Contenidos: “…Tolhurst Revisiting Wildland Fire Fuel -- Quantification Methods: The Challenge of Understanding a Dynamic, Biotic Entity Reprinted from: Forests 2017, 8, 351, doi: 10.3390/f8090351 1 -- Qian Fan, Cuizhen Wang, Dongyou Zhang and Shuying Zang Environmental Influences on Forest Fire Regime in the Greater Hinggan Mountains, Northeast China Reprinted from: Forests 2017, 8, 372, doi: 10.3390/f8100372 19 -- Charlotte A. …”
Libro electrónico -
4608Publicado 2023Tabla de Contenidos: “…API Tests from the Trenches -- API Test Examples -- Mixed API/GUI Scenarios -- Chapter 13: Gherkin and Behavior Driven Development -- Behavior Driven Development -- Applying BDD for COTS Integration Projects -- Gherkin Without BDD: Pros and Cons -- Gherkin Language: Readability Above All, If Possible -- Scenario Readability -- Some Good and Bad Examples -- Example 1 -- Example 2 -- Example 3 -- Chapter 14: JIRA with Boozang via XRay -- Using JIRA with XRay -- Xray for Test Automation -- Boozang Integration with XRay -- Importing Features Files -- Pushing Test Results Back to XRay -- Chapter 15: Jenkins and the Boozang Runner -- Continuous Delivery and the Need for Automating Acceptance Tests -- Puppeteer and the Boozang Runner -- How to Use the Docker Runner -- Keeping Execution Time Low with Parallel Runs -- Parallel Execution and Workers Setup -- Boozang Workers Concepts -- Boozang Workers Setup in the Jenkins Pipeline -- Launching the Workers -- Launching the Master -- Reports and Log Files -- Execution Reports -- Log Files and the Log Formatter -- Root Cause Analysis Report -- Publishing Reports on Jenkins and JIRA -- Cucumber Reports -- HTML Reports -- JIRA Reports -- Complete Working Pipeline -- Test Users Setup -- Set Variables -- Define Job Parameters -- Set Build Information -- Execute Smoke Tests -- Launch Boozang Workers and Master -- Aggregate JSON Reports and Log Files -- Download and Execute RCA Script -- Publish Cucumber Reports -- Get Currently Deployed Version -- Import Results into XRay -- HTML Publisher -- Docker in Docker Setup -- Chapter 16: Boozang for Teams -- Team Collaboration -- Explicit Lock -- Concurrent Development and Safe Refactoring with Branches -- Working with Branches -- Using a Feature Branch Approach -- Branch Naming Convention -- Adding a Develop Branch -- Merging Process -- Tests Map -- Quality Control…”
Libro electrónico -
4609Publicado 2013“…To get ahead, you need soft skills. To stay ahead you need The Advantage. …”
Libro electrónico -
4610Publicado 2018Tabla de Contenidos: “…Turn-off Analysis -- 2.3.4. Safe Operation Area -- 2.3.5. MOSFET Applications…”
Libro electrónico -
4611por Rajkumar, K.Tabla de Contenidos: “…7.5.1 Creating a Package -- 7.5.2 Importing Packages -- 7.5.3 Including Classes to Package -- 7.5.4 Subpackages -- 7.5.5 Protected Members Revisited -- 7.6 Exception Handling -- 7.6.1 Try-catch-finally Statements -- 7.6.2 Multicatch Statement -- 7.6.3 Exception Hierarchy -- 7.6.4 User-defined Exceptions with throw and throws -- 7.6.5 Extending RuntimeException Class -- 7.7 Summary -- Key Terms -- Review Questions -- Exercises -- Part III - Java Containers for Holding Objects -- Chapter 8: Sequence Containers -- 8.1 Introduction -- 8.2 Collection Taxonomy -- 8.3 Vectors -- 8.3.1 Enumeration -- 8.3.2 Type-specific vectors -- 8.4 StringTokenizer -- 8.5 Stack -- 8.5.1 Character Stack -- 8.5.2 Problem: Brackets Matching -- 8.6 Iterators -- 8.7 PriorityQueue -- 8.8 ArrayList -- 8.8.1 Type-Safe ArrayLists -- 8.8.2 Problem: Shopping Cart -- 8.8.3 Problem: Search an Element Inside Array -- 8.8.4 Problem: Merge Two Arrays -- 8.8.5 Problem: Remove All Duplicates in an Array -- 8.9 LinkedList -- 8.9.1 Problem: Designing Stack Using LinkedList -- 8.9.2 Type-safe LLStack Using Generics -- 8.10 Summary -- Key Terms -- Review Questions -- Exercises -- Chapter 9: Map Containers -- 9.1 Introduction -- 9.2 Hashtable -- 9.3 Problem: Word Counting in a Text -- 9.4 Problem: Couples-Sensitive Brackets Checker -- 9.5 HashMap -- 9.6 Multimaps -- 9.7 Nested HashMaps -- 9.8 LinkedHashMap -- 9.9 TreeMap -- 9.10 Problem: Random Number Generator -- 9.11 Properties -- 9.12 Summary -- Key Terms -- Review Questions -- Exercises -- Chapter 10: Set Containers -- 10.1 Introduction -- 10.2 Set Interface -- 10.3 HashSet -- 10.4 Problem: Counting Duplicates in a Text -- 10.5 LinkedHashSet -- 10.6 TreeSet -- 10.7 Summary -- Key Terms -- Review Questions -- Exercises -- Chapter 11: Sorting and Searching -- 11.1 Introduction -- 11.2 Sorting and Searching Using Arrays Class…”
Publicado 2013
Libro electrónico -
4612Publicado 2010Tabla de Contenidos: “…Alignment -- 7.2 Unions -- 7.3 Enumerated Values -- 7.3.1 Enumerated Types -- 7.3.2 Enum Properties -- 7.4 Alias -- 7.5 Parameterized Scopes with template -- 7.5.1 Eponymous templates -- 7.6 Injecting Code with mixin templates -- 7.6.1 Symbol Lookup inside a mixin -- 7.7 Summary and Reference -- 8 Type Qualifiers -- 8.1 The immutable Qualifier -- 8.1.1 Transitivity -- 8.2 Composing with immutable -- 8.3 Immutable Parameters and Methods -- 8.4 Immutable Constructors -- 8.5 Conversions involving immutable -- 8.6 The const Qualifier -- 8.7 Interaction between const and immutable -- 8.8 Propagating a Qualifier from Parameter to Result -- 8.9 Summary -- 9 Error Handling -- 9.1 Throwing and catching -- 9.2 Types -- 9.3 Finally clauses -- 9.4 Nothrow Functions and the Special Nature of Throwable -- 9.5 Collateral Exceptions -- 9.6 Stack Unwinding and Exception-Safe Code -- 9.7 Uncaught Exceptions -- 10 Contract Programming -- 10.1 Contracts -- 10.2 Assertions -- 10.3 Preconditions -- 10.4 Postconditions -- 10.5 Invariants -- 10.6 Skipping Contract Checks. …”
Libro electrónico -
4613Publicado 2020Tabla de Contenidos: “…United States and the global youth-led legal campaign for a safe climate / Patti Moore, Danny Noonan and Erik Woodward -- 17. …”
Libro electrónico -
4614Publicado 2019Tabla de Contenidos: “…Sexism and Gender Bias in the Audio Industry "Opting out" of the conversation Sexual Harassment On motherhood On Age The Annenberg Study Recording Academy Task Force The Grammys and Recording Academy Class of 2019 Audio Engineering Society 2019 Chapter Two: Outreach: Organizations and Current Initiatives Pull Digital Audio Eco Feminism Erin Barra and Beats By Girlz (USA) Fun Facts: Ableton Live and Ableton Push Phebean Adedamola Oluwagbemi (Nigeria) Audio Girl Africa (Nigeria) Female Frequency (USA) Dani Mari (USA) I Am Snow Angel (USA) Women in Sound Zine and Madeleine Campbell (USA) Gender Amplified (USA) Ebonie Smith (USA) The Creator's Suite (USA) Abhita Austin (USA) Yorkshire Sound Women Network (England) International Women Working in Film Sound Women (United Kingdom) Terri Winston and Women's Audio Mission (USA) SoundGirls.org Chapter Three: Radio and Podcasts Careers in radio and podcasts Tools of the Trade: Radio Cathy Hughes (USA) Ann Charles (England) Ioana Barbu Caryl Owen (USA) Suraya Mohamed (USA) Lorna White (USA) Nadia Hassan-Garschagen (Germany) Podcasts Chapter Four: Sound for Television & Film Careers in Sound for Film and Television Feature Films and Documentaries Post Production Live Broadcast Tools of the Trade: Location Sound Tools of the Trade: Post Production for television and film Jan McLaughlin, CAS (USA) Judi Lee-Headman (England) Lori Dovi (USA) Ai-Ling Lee (Singapore) April Tucker (USA) Karol Urban, CAS (USA) Haniya Aslam (Pakistan) 'Lisa' Xiang Li (China) Sajida Khan (India) Catharine Wood (USA) Anna Bertmark (Sweden) Chapter Five: Music Recording and Electronic Music Careers in Music Recording and Electronic Music Electronic Music Pamela Z Suzanne Ciani Cecilia Wu (China) Producers Kay Huang (Taiwan) Elaine Martone (USA) Erica Brenner (USA) Linda Briceño (Venezuela) Virginia Read (Australia) Mastering Engineers Emily Lazar (USA) Jett Galindo (Philippines) Piper Payne (USA) Anna Frick (USA) Darcy Proper (USA) Fun facts: Vinyl Mastering Fun Facts: Loudness Wars Recording Engineers Lenise Bent (USA) Erin Tonkon (USA) Jill Zimmermann (Germany) Wendy Beines (Argentina) Other Women in Music Recording Chapter Six: Hardware and Software Design Careers in Hardware and Software Fun Facts: Make your own Audio Plugin with MATLAB Tools of the Trade: Hardware and Software Design Laurie Spiegel (USA) Carla Scaletti (USA) EveAnna Dauray Manley (USA) Marina Bosi (Italy) Erisa Sato (Japan) Elisabeth Löchen (France) Marie Louise Killick (England) Carol Bousquet (USA) Dawn Birr (USA) Other women in Hardware and Software Chapter Seven: Acoustics and Design Careers in Acoustics Tools of the Trade: Acoustics Fun Facts: Weighting Curves Jamie Angus-Whiteoak (England) Fun Facts: Spread Spectrum Elizabeth Cohen (USA) Samantha Weller (USA) Fun Facts: Ray Tracing Orla Murphy (Ireland) Fun Facts: Ear Training and Critical Listening Linda Gedemer (USA) Women in Acoustics Committee Chapter Eight: Live and Theater Sound Careers in Live Sound: Tools of the Trade: Live Sound Fun Facts: Safe Listening Levels Kathy Sander-Olhoeft (USA) Betty Cantor-Jackson (USA) Brandie Lane (USA) Karrie Keyes (USA) Michelle Sabolchick Pettinato (USA) Fela Davis Carolina Anton (Mexico) Leya Soraide (Bolivia) Tzu-Wei Peng (Taiwan) Jessica Paz (USA) Chapter Nine: Education A brief history of audio education Academic Standards Careers in Higher Education Education-related Volunteer and Non-Profit Work Tools of the Trade: Education Martha de Francisco (Columbia) Robin Coxe-Yeldham (USA) Theresa Leonard (Canada) Lisa Nigris (USA) Valeria Palomino (Mexico) Liz Dobson Cosette Collier (USA) Chapter Ten: Games, Immersive Sound, and Audio for Virtual, Augmented, and Mixed Reality Tools of the Trade: Game Sound Tools of the Trade: Immersive Audio Tools of the Trade: Binaural Audio Other tools Women in Game Sound: Industry Statistics Winifred Phillips (USA) Eiko Ishiwata (Canada) Ayako Yamauchi (Japan) Fun Facts: Ambisonics Emily Ridgeway (Australia) Fun Facts: Head Related Transfer Functions Khris Brown (USA) Fun Facts: TASCAM Portastudio Pam Aronoff (USA) Fun Facts: Wwise Anastasia Devana (Russia) Fun Facts: Virtual, Augmented, and Mixed Reality Victoria Dorn (USA) Sally Kellaway (Australia) Fei Yu (China) About the Author Glossary Recommended Reading Appendix 1 Appendix 2…”
Libro electrónico -
4615por Korstanje, JoosTabla de Contenidos: “…Multivariate Models -- Key Takeaways -- Chapter 2: Model Evaluation for Forecasting -- Evaluation with an Example Forecast -- Model Quality Metrics -- Metric 1: MSE -- Metric 2: RMSE -- Metric 3: MAE -- Metric 4: MAPE -- Metric 5: R2 -- Model Evaluation Strategies -- Overfit and the Out-of-Sample Error -- Strategy 1: Train-Test Split -- Strategy 2: Train-Validation-Test Split -- Strategy 3: Cross-Validation for Forecasting -- K-Fold Cross-Validation -- Time Series Cross-Validation -- Rolling Time Series Cross-Validation -- Backtesting -- Which Strategy to Use for Safe Forecasts? -- Final Considerations on Model Evaluation -- Key Takeaways -- Part II: Univariate Time Series Models -- Chapter 3: The AR Model -- Autocorrelation: The Past Influences the Present -- Compute Autocorrelation in Earthquake Counts -- Positive and Negative Autocorrelation -- Stationarity and the ADF Test -- Differencing a Time Series -- Lags in Autocorrelation -- Partial Autocorrelation -- How Many Lags to Include? …”
Publicado 2021
Libro electrónico -
4616por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Régimen de protección (safe harbours) -F. Acuerdos previos sobre valoración de precios de transferencia -G. …”
Publicado 2013
Libro electrónico -
4617Publicado 2019Tabla de Contenidos: “…. -- I'm sorry, I can't remember -- Sleep stability -- Fighting sleep can lead to fisticuffs -- Playing catch-up doesn't work -- Stay away from the (blue) light -- Sleeping on the job: the power of the nap -- Helping ourselves to sleep better -- Brainy tips for better sleep hygiene -- Brainy tips for avoiding workplace fatigue -- 4 Mental stretch: Flexing our mental muscles -- Curiosity breeds success…”
Libro electrónico -
4618Publicado 2018Tabla de Contenidos: “…XOR Encryption -- Random Number Generators -- Symmetric Key Cryptography -- Block Ciphers -- Block Cipher Modes -- Block Cipher Padding -- Padding Oracle Attack -- Stream Ciphers -- Asymmetric Key Cryptography -- RSA Algorithm -- RSA Padding -- Diffie-Hellman Key Exchange -- Signature Algorithms -- Cryptographic Hashing Algorithms -- Asymmetric Signature Algorithms -- Message Authentication Codes -- Public Key Infrastructure -- X.509 Certificates -- Verifying a Certificate Chain -- Case Study: Transport Layer Security -- The TLS Handshake -- Initial Negotiation -- Endpoint Authentication -- Establishing Encryption -- Meeting Security Requirements -- Final Words -- Chapter 8: Implementing the Network Protocol -- Replaying Existing Captured Network Traffic -- Capturing Traffic with Netcat -- Using Python to Resend Captured UDP Traffic -- Repurposing Our Analysis Proxy -- Repurposing Existing Executable Code -- Repurposing Code in .NET Applications -- Repurposing Code in Java Applications -- Unmanaged Executables -- Encryption and Dealing with TLS -- Learning About the Encryption In Use -- Decrypting the TLS Traffic -- Final Words -- Chapter 9: The Root Causes of Vulnerabilities -- Vulnerability Classes -- Remote Code Execution -- Denial-of-Service -- Information Disclosure -- Authentication Bypass -- Authorization Bypass -- Memory Corruption Vulnerabilities -- Memory-Safe vs. Memory-Unsafe Programming Languages -- Memory Buffer Overflows -- Out-of-Bounds Buffer Indexing -- Data Expansion Attack -- Dynamic Memory Allocation Failures -- Default or Hardcoded Credentials -- User Enumeration -- Incorrect Resource Access -- Canonicalization -- Verbose Errors -- Memory Exhaustion Attacks -- Storage Exhaustion Attacks -- CPU Exhaustion Attacks -- Algorithmic Complexity -- Configurable Cryptography -- Format String Vulnerabilities -- Command Injection…”
Libro electrónico -
4619Publicado 2013Tabla de Contenidos: “…Eruvin 21b-22a and Mark 7:1-23 on the tradition of the elders and the commandment of God / Shaye J.D. Cohen -- Jesus and Joshau ben Perahiah: a Jewish-Christian dialogue on magic in Babylonia / Tal Ilan -- Some notes on Jesus and his parents: from the New Testament Gospels to the Toledot Yeshu / John G. …”
991006553369706719 -
4620Publicado 2017Tabla de Contenidos: “…-- REST versus SOAP -- Nature of HTTP methods -- Safe/unsafe HTTP methods -- Idempotent and non-idempotent methods -- HTTP response -- Response type -- Response codes -- Case study - RESTful web service endpoints for a blog -- Blog post -- Requirements -- Endpoints -- Creating blog post -- Reading blog post -- Updating blog post -- Delete blog post -- Listing all blog posts -- Blog post comments -- Requirements -- Endpoints -- Creating the post's comment -- Reading a comment -- Updating a comment -- Deleting a post comment -- Listing all comments for a particular post -- More resources -- Summary -- Chapter 2: PHP7, To Code It Better -- Scalar type declaration -- Return type declaration -- Null coalescing operator -- Spaceship operator -- Group use declarations -- Generator-related features -- What are generators? …”
Libro electrónico