Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 452
- Application software 417
- Historia 237
- Java (Computer program language) 200
- Application program interfaces (Computer software) 185
- Tàpies, Antoni 161
- Engineering & Applied Sciences 150
- Historia y crítica 132
- Computer Science 128
- Cloud computing 121
- Web site development 121
- Computer programming 117
- Management 114
- Crítica e interpretación 112
- Programming 111
- Python (Computer program language) 107
- Health & Biological Sciences 104
- JavaScript (Computer program language) 99
- Communauté de Taizé 92
- Història 85
- Tapices 81
- Web applications 81
- Microsoft .NET Framework 76
- Design 75
- Computer networks 74
- Computer programs 74
- Data processing 73
- Mobile computing 73
- Android (Electronic resource) 71
- Computer software 70
-
8061Publicado 2017Tabla de Contenidos: “…Identifying the Players -- Smart(er) VBA Document Deployment -- Email and Saved Passwords -- Keyloggers and Cookies -- Bringing It All Together -- Summary -- Exercises -- Chapter 6: Criminal Intelligence -- Payload Delivery Part VI: Deploying with HTA -- Malware Detection -- Privilege Escalation in Microsoft Windows -- Escalating Privileges with Local Exploits -- Exploiting Automated OS Installations -- Exploiting the Task Scheduler -- Exploiting Vulnerable Services -- Hijacking DLLs -- Mining the Windows Registry -- Command and Control Part VI: The Creeper Box -- Creeper Box Specification -- Introducing the Raspberry Pi and Its Components -- GPIO -- Choosing an OS -- Configuring Full-Disk Encryption -- A Word on Stealth -- Configuring Out-of-Band Command and Control Using 3G/4G -- Creating a Transparent Bridge -- Using a Pi as a Wireless AP to Provision Access by Remote Keyloggers -- The Attack -- Spoofing Caller ID and SMS Messages -- Summary -- Exercises -- Chapter 7: War Games -- Background and Mission Briefing -- Payload Delivery Part VII: USB Shotgun Attack -- USB Media -- A Little Social Engineering -- Command and Control Part VII: Advanced Autonomous Data Exfiltration -- What We Mean When We Talk About "Autonomy" -- Means of Egress -- The Attack -- Constructing a Payload to Attack a Classified Network -- Stealthy 3G/4G Software Install -- Attacking the Target and Deploying the Payload -- Efficient "Burst-Rate" Data Exfiltration -- Summary -- Exercises -- Chapter 8: Hack Journalists -- Briefing -- Advanced Concepts in Social Engineering -- Cold Reading -- C2 Part VIII: Experimental Concepts in Command and Control -- Scenario 1: C2 Server Guided Agent Management -- Scenario 2: Semi-Autonomous C2 Agent Management -- Payload Delivery Part VIII: Miscellaneous Rich Web Content -- Java Web Start -- Adobe AIR -- A Word on HTML5 -- The Attack…”
Libro electrónico -
8062Publicado 2024Tabla de Contenidos: “…-- Aligning features to technology stacks -- Experience Cloud - Self-Service -- Experience Cloud - PRM -- Experience Cloud - content management system (CMS) -- Experience Cloud - business-to-business (B2B) commerce -- Experience Cloud - External Apps -- Narrowing down the optimal combination -- Service functions -- Sales functions -- Custom objects -- Tracking your digital experience strategy -- Summary -- Part 2: Infrastructure Setup to Support and Customize Design Strategy -- Chapter 4: Curating Data Models -- Connecting the data dots -- Standard objects -- Custom objects -- Designing for requested KPIs -- Identifying data sensitivity -- Deep dive into Target Audience data practices -- Curating an enterprise architecture map -- Marketing technologies -- Finance technologies -- IT systems -- Mapping it out -- Curating an ERD -- Licensure considerations -- Guide to reading the ERD tables -- Franchisee Experience Cloud ERD -- End Consumer Experience Cloud ERD -- Summary…”
Libro electrónico -
8063Publicado 2023Tabla de Contenidos: “…. -- The Operating Plan -- Chapter 19 Alignment Through Compensation -- Variable Compensation -- Compensation, KPIs, and the Operating Plan -- SMART Goals -- Specific and Measurable -- Attainable and Relevant -- Time-Bound -- Qualitative Targets: The 90-Day Plan -- Pay Graciously -- Transition from Legacy Plans -- A Final Thought . . . -- Alignment Through Compensation -- Part V An Obsession with Quality -- Chapter 20 Quality Drives Profit -- Moments of Truth…”
Libro electrónico -
8064Publicado 2022Tabla de Contenidos: “…. -- Gesture recognition on Raspberry Pi Pico with Arm Mbed OS -- Getting ready -- How to do it... -- Building a gesture-based interface with PyAutoGUI -- Getting ready -- How to do it... -- Chapter 7: Running a Tiny CIFAR-10 Model on a Virtual Platform with the Zephyr OS -- Technical requirements -- Getting started with the Zephyr OS -- Getting ready -- How to do it... -- Designing and training a tiny CIFAR-10 model -- Getting ready -- How to do it... -- Evaluating the accuracy of the TFLite model -- Getting ready -- How to do it... -- Converting a NumPy image to a C-byte array -- Getting ready -- How to do it... -- Preparing the skeleton of the TFLu project -- Getting ready -- How to do it... -- Building and running the TFLu application on QEMU -- Getting ready -- How to do it... -- Chapter 8: Toward the Next TinyML Generation with microNPU -- Technical requirements -- Setting up Arm Corstone-300 FVP -- Getting ready -- How to do it... -- Installing TVM with Arm Ethos-U support -- Getting ready -- How to do it... -- Installing the Arm toolchain and Ethos-U driver stack -- Getting ready -- How to do it...…”
Libro electrónico -
8065A CISO Guide to Cyber Resilience A How-To Guide for Every CISO to Build a Resilient Security ProgramPublicado 2024Tabla de Contenidos: “…-- Zero trust vs. software-defined perimeter -- How a typical TLS session works -- What is mutual authentication? …”
Libro electrónico -
8066Publicado 2016Tabla de Contenidos: “…-- 3.8.4 Listenoperationen -- 3.8.5 Projekt: Zufallsnamen -- 3.8.6 Projekt: Telefonliste -- 3.8.7 Listen durch Comprehensions erzeugen -- 3.9 Zahlen in einer Folge - range()-Funktion -- 3.10 Projekt: Klopfzeichen -- 3.11 Mengen -- 3.11.1 Projekt: Häufigkeit von Buchstaben in einem Text -- 3.12 Projekt: Zufallssounds -- 3.12.1 Wie kommen Töne aus dem Raspberry Pi? -- 3.12.2 Sounds mit PyGame -- 3.12.3 Programmierung -- 3.13 Dictionaries -- 3.13.1 Operationen für Dictionaries -- 3.13.2 Projekt: Morsen -- 3.14 Projekt: Der kürzeste Weg zum Ziel -- 3.15 Aufgaben -- 3.16 Lösungen -- Kapitel 4: Funktionen -- 4.1 Aufruf von Funktionen -- 4.1.1 Unterschiedliche Anzahl von Argumenten -- 4.1.2 Positionsargumente und Schlüsselwort-Argumente -- 4.1.3 Für Experten: Funktionen als Argumente -- 4.2 Definition von Funktionen -- 4.3 Funktionen in der IDLE-Shell testen -- 4.4 Docstrings -- 4.5 Veränderliche und unveränderliche Objekte als Parameter…”
Libro electrónico -
8067por Hassler, MarcoTabla de Contenidos: “…10.6 Videos und Podcasts -- 10.6.1 Was gemessen werden kann -- 10.6.2 Wie Sie es nutzen sollten -- 10.6.3 Was es zu beachten gilt -- Kapitel 11: Metriken und Dimensionen nutzen -- 11.1 Beobachten -- 11.1.1 Alle Metriken im Überblick -- 11.1.2 Wichtige Metriken selektieren -- 11.1.3 Reports und Dashboards nutzen -- 11.2 Vergleichen -- 11.2.1 Eigene Benchmarks setzen -- 11.2.2 Konkurrenzvergleich und externe Benchmarks -- 11.3 Nachforschen -- 11.3.1 Segmentierung macht den Unterschied -- 11.3.2 Einfache Ad-hoc-Segmentierung -- 11.3.3 Erweiterte Segmentierung -- 11.3.4 Segmentierungsstrategien und Herangehensweisen -- Teil 3: Erfolg nachhaltig steigern -- Kapitel 12: Digital-Ziele definieren -- 12.1 Typen von Zielen -- 12.1.1 Unternehmensziele -- 12.1.2 Benutzerziele -- 12.1.3 Weitere Ziele auf Verantwortlichkeitsebene -- 12.2 Vorgehen zur Findung von Digitalkanal-Zielen -- 12.3 Interne Anspruchsgruppen identifizieren -- 12.3.1 Direkte und indirekte Akteure -- 12.3.2 Digital-Stakeholder-Karte -- 12.4 Global-Ziele und Erfolgsfaktoren definieren -- 12.4.1 Vorbereitung eines Zielfindungsworkshops -- 12.4.2 Workshop-Durchführung -- 12.4.3 Nachbearbeitung -- 12.5 Benutzerziele ergänzen -- 12.6 Zielorientierte Digitalkanal-Aktivitäten und Messgrößen definieren -- 12.6.1 Workshop-Vorbereitung -- 12.6.2 Workshop-Durchführung -- 12.6.3 Nachbearbeitung und Ausarbeitung der Messgrößen -- Kapitel 13: Zielerreichung und Conversion -- 13.1 Was Conversions sind -- 13.2 Conversions nutzen -- 13.2.1 Conversions im Analytics-System messen -- 13.2.2 Verwendung von Conversion-Metriken -- 13.3 Conversion-Kosten -- 13.4 Return on Investment -- 13.4.1 Werte von E-Commerce-Conversions -- 13.4.2 Werte von Nicht-E-Commerce-Conversions -- Kapitel 14: Key Performance Indicators -- 14.1 Definition von KPIs…”
Publicado 2023
Libro electrónico -
8068Publicado 2021Tabla de Contenidos: “…Using Zapier for teams -- Popular Zaps -- Exploring Push by Zapier -- Setting up Push by Zapier -- Zapier based on your business -- Project management -- Customer support -- Social media -- E-commerce -- Summary -- Chapter 9: Slack API, Webhooks, Block Kit, and Sandboxes -- What is a Slack API? …”
Libro electrónico -
8069Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Foreword -- Contributors -- Table of Contents -- Preface -- Chapter 1: Working with Azure Virtual Machines -- Technical requirements -- Designing solutions for virtual machines -- Virtual machine series and sizes -- Available VM series and sizes -- Availability Sets -- Fault domains and update domains -- Managed Disks -- Creating highly available virtual machines -- Creating highly available virtual machines from the Azure Portal -- Creating highly available virtual machines from PowerShell -- VM Scale Sets -- Creating a VM Scale Set from the Azure Portal -- Accessing your VM Scale Sets -- VM Scale Set templates -- Disaster recovery -- Backup and recovery -- Replication -- Summary -- Questions -- Further reading -- Chapter 2: Configuring Compute-Intensive Applications -- High-performance compute virtual machines -- Microsoft HPC Pack -- Cloud-native HPC solutions -- Hybrid HPC architecture -- Azure Batch -- Creating an Azure Batch service -- Stateless components -- Containers on Azure Batch -- Summary -- Questions -- Further reading -- Chapter 3: Designing Web Applications -- Technical requirements -- Azure Web Apps -- App Service plans -- The App Service Environment (ASE) -- Creating an ASE -- Web Apps for Containers -- Getting started with Web App for Containers -- Designing Web Apps for high availability, scalability, and performance -- High availability and performance -- Using a CDN -- Using Redis Cache -- Using Azure Traffic Manager -- Scalability -- Scaling out -- Scaling up -- Designing and securing custom Web APIs -- Designing your Web API -- Securing your Web API -- Summary -- Questions -- Further reading -- Chapter 4: Implementing Serverless and Microservices -- Technical requirements -- Event-driven actions using Azure Functions -- Consumption App Service plan…”
Libro electrónico -
8070Publicado 2018Tabla de Contenidos: “…Multithreading and Asynchronous Programming in .NET Core -- Multithreading versus asynchronous programming -- Multithreading in .NET Core -- Multithreading caveats -- Threads in .NET Core -- Creating threads in .NET Core -- Thread lifetime -- The thread pool in .NET -- Thread synchronization -- Monitors -- Task parallel library (TPL) -- Creating a task using TPL -- Task-based asynchronous pattern (TAP) -- Naming convention -- Return type -- Parameters -- Exceptions -- Task status -- Task cancellation -- Task progress reporting -- Implementing TAP using compilers -- Implementing TAP with greater control over Task -- Design patterns for parallel programming -- Pipeline pattern -- Dataflow pattern -- Producer/consumer pattern -- Parallel.ForEach -- Parallel LINQ (PLINQ) -- Summary -- Data Structures and Writing Optimized Code in C# -- What are data structures? …”
Libro electrónico -
8071Publicado 2018Tabla de Contenidos: “…-- Summary -- Chapter 10: Node.js Development with TypeScript -- Understanding Node.js -- Understanding non-blocking I/O -- The main components of Node.js -- V8 -- Libuv -- Bindings -- The Node.js core API (node-core) -- Node.js environment versus browser environment -- The Node.js ecosystem -- The Node.js core API…”
Libro electrónico -
8072Publicado 2018Tabla de Contenidos: “…Using fixtures to provide initial data for models -- Creating models for diverse content -- Using model inheritance -- Abstract models -- Multi-table model inheritance -- Proxy models -- Creating the content models -- Creating custom model fields -- Adding ordering to module and content objects -- Creating a CMS -- Adding an authentication system -- Creating the authentication templates -- Creating class-based views -- Using mixins for class-based views -- Working with groups and permissions -- Restricting access to class-based views -- Managing course modules and content -- Using formsets for course modules -- Adding content to course modules -- Managing modules and contents -- Reordering modules and contents -- Using mixins from django-braces -- Summary -- Chapter 11: Rendering and Caching Content -- Displaying courses -- Adding student registration -- Creating a student registration view -- Enrolling in courses -- Accessing the course contents -- Rendering different types of content -- Using the cache framework -- Available cache backends -- Installing Memcached -- Cache settings -- Adding Memcached to your project -- Monitoring Memcached -- Cache levels -- Using the low-level cache API -- Caching based on dynamic data -- Caching template fragments -- Caching views -- Using the per-site cache -- Summary -- Chapter 12: Building an API -- Building a RESTful API -- Installing Django REST framework -- Defining serializers -- Understanding parsers and renderers -- Building list and detail views -- Creating nested serializers -- Building custom views -- Handling authentication -- Adding permissions to views -- Creating view sets and routers -- Adding additional actions to view sets -- Creating custom permissions -- Serializing course contents -- Summary -- Chapter 13: Going Live -- Creating a production environment…”
Libro electrónico -
8073Publicado 2018Tabla de Contenidos: “…Segregated Witness (SegWit) -- Bitcoin Cash -- Bitcoin Unlimited -- Bitcoin Gold -- Bitcoin investment and buying and selling bitcoins -- Summary -- Chapter 7: Bitcoin Clients and APIs -- Bitcoin installation -- Types of Bitcoin Core clients -- Bitcoind -- Bitcoin-cli -- Bitcoin-qt -- Setting up a Bitcoin node -- Setting up the source code -- Setting up bitcoin.conf -- Starting up a node in testnet -- Starting up a node in regtest -- Experimenting with Bitcoin-cli -- Bitcoin programming and the command-line interface -- Summary -- Chapter 8: Alternative Coins -- Theoretical foundations -- Alternatives to Proof of Work -- Proof of Storage -- Proof of Stake (PoS) -- Various stake types -- Proof of coinage -- Proof of Deposit (PoD) -- Proof of Burn -- Proof of Activity (PoA) -- Nonoutsourceable puzzles -- Difficulty adjustment and retargeting algorithms -- Kimoto Gravity Well -- Dark Gravity Wave -- DigiShield -- MIDAS -- Bitcoin limitations -- Privacy and anonymity -- Mixing protocols -- Third-party mixing protocols -- Inherent anonymity -- Extended protocols on top of Bitcoin -- Colored coins -- Counterparty -- Development of altcoins -- Consensus algorithms -- Hashing algorithms -- Difficulty adjustment algorithms -- Inter-block time -- Block rewards -- Reward halving rate -- Block size and transaction size -- Interest rate -- Coinage -- Total supply of coins -- Namecoin -- Trading Namecoins -- Obtaining Namecoins -- Generating Namecoin records -- Litecoin -- Primecoin -- Trading Primecoin -- Mining guide -- Zcash -- Trading Zcash -- Mining guide -- Address generation -- GPU mining -- Downloading and compiling nheqminer -- Initial Coin Offerings (ICOs) -- ERC20 tokens -- Summary -- Chapter 9: Smart Contracts -- History -- Definition -- Ricardian contracts -- Smart contract templates -- Oracles -- Smart Oracles…”
Libro electrónico -
8074Publicado 2021“…With Jenkins as the backbone, you'll programmatically control all the pieces of your pipeline via modern APIs. Hands-on examples include building CI/CD workflows for distributed Kubernetes applications, and serverless functions. …”
Libro electrónico -
8075Publicado 2021Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Acknowledgments -- About the Authors -- About the Technical Editor -- Contents at a Glance -- Contents -- Introduction -- CompTIA -- The PenTest+ Exam -- Study and Exam Preparation Tips -- Taking the Exam -- After the PenTest+ Exam -- What Does This Book Cover? …”
Libro electrónico -
8076Publicado 2021Tabla de Contenidos: “…-- Free IDS/IPS -- IPS versus IDS -- Summary -- Chapter 9: Deep Diving into Physical Security -- Technical requirements -- Understanding physical security and associated threats -- The powerful LAN Turtle -- The stealthy Plunder Bug LAN Tap -- The dangerous Packet Squirrel -- The portable Shark Jack -- The amazing Screen Crab -- The advanced Key Croc -- USB threats -- Equipment theft -- Environmental risks -- Physical security mechanisms -- Mastering physical security -- Clean desk policy -- Physical security audits -- Summary -- Further reading -- Chapter 10: Applying IoT Security -- Understanding the Internet of Things -- The risks -- The vulnerabilities -- Understanding IoT networking technologies -- LoRaWAN -- Zigbee -- Sigfox -- Bluetooth -- Security considerations -- Improving IoT security -- Creating cybersecurity hardware using IoT-enabled devices -- Raspberry Pi firewall and intrusion detection system -- Defensive security systems for industrial control systems (SCADA) -- Secure USB-to-USB copy machine -- Creating a 10 honeypot -- Advanced monitoring of web apps and networks -- Creating an internet ad blocker -- Access control and physical security systems -- Bonus track - Understanding the danger of unauthorized IoT devices -- Detecting unauthorized IoT devices -- Detecting a Raspberry Pi -- Disabling rogue Raspberry Pi devices -- Summary -- Further reading -- Chapter 11: Secure Development and Deployment on the Cloud -- Technical requirements -- Secure deployment and implementation of cloud applications…”
Libro electrónico -
8077Publicado 2018Tabla de Contenidos: “…Import orderer settings at member organizations -- Setting up a private channel -- Create a new channel as the founder -- Adding member peers to the channel -- Summary -- Chapter 12: Designing and Developing Your First Smart Contract -- The proposed application -- Model-first design approach -- Designing the participants and base assets -- Designing the accident assets and transactions -- Designing the repair assets and transactions -- Designing the insurance assets and transactions -- Setting up the necessary development tools -- Installing cURL -- Installing Docker and Docker Compose -- Installing the Go programming language -- Step 1 - Installing Go -- Step 2 - Setting environment paths -- Step 3 - Setting up your Go workspace -- Downloading platform-specific binaries -- Installing Visual Studio Code (IDE) -- Programming the smart contract -- Setting up a workspace in VSCode -- Installing missing Go packages and commands -- Programming the actual chaincode -- Programming the initial chaincode skeleton -- Adding the data model objects -- Programming the ReportAccident transaction -- Summary -- Chapter 13: Deploying and Testing Your First Smart Contract -- Deploying your smart contract -- Installing chaincode on the founder's peers -- Activating the chaincode on a channel -- Installing a new version of our chaincode -- Installing chaincode on member organizations -- Exposing smart contracts using the REST proxy -- Exposing chaincode using the Advanced method -- Exposing chaincode using the Quick method -- Testing a smart contract using a REST client -- Installing a client to call the REST proxy's API -- Importing and testing chaincode API requests -- Available REST proxy APIs -- Getting the version of the OBCS API -- Overview of chaincode interactions -- Setting up all of the required demo assets -- Reading asset data to check the current values…”
Libro electrónico -
8078Publicado 2015Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Setting Up the Development Environment -- The importance of Android Google Maps -- An example of a map application -- IDEs for developing Android applications -- Android Studio -- System requirements for Android Studio -- Eclipse -- Choosing one IDE over another -- Setting up Android Studio -- Windows -- Mac OS X -- Linux -- Setting up Eclipse with the ADT plugin -- Windows -- Mac OS X -- Linux -- Downloading and setting up Google Play services -- Downloading the Google APIs System Image -- Setting up AVD for testing -- Setting up AVD from Android Studio -- Setting up AVD from Eclipse -- Exploring Android Studio -- Creating a sample application -- Exporting the Android application as APK -- Additional helpful stuff -- Using Android Debug Bridge -- Configuring JAVA environment variables -- Android API levels -- Self-test questions -- Summary -- Chapter 2: Configuring an API Key and Creating Our First Map Application -- Generating the SHA1 fingerprint -- Windows -- Linux -- Mac OS X -- Registering in the Google Developer Console -- Configuring Google Play services -- Android Studio -- Eclipse -- Adding permissions and defining the API key -- Adding permissions -- INTERNET -- ACCESS_NETWORK_STATE -- WRITE_EXTERNAL_STORAGE -- READ_GSERVICES -- Specifying the Google Play services version -- Specifying the version 2 of OpenGL ES -- Defining the API key -- Creating our first map application -- Working with a layout -- Optional (for old APIs) -- Working with the Activity class -- Optional (for old APIs) -- Adding MapFragment programatically -- activity_maps.xml - code 3 -- Optional - for older APIs -- Using the callback method -- The GoogleMap object -- Common problems and solutions -- Self-test questions -- Summary…”
Libro electrónico -
8079
-
8080Publicado 2023Tabla de Contenidos: “…Declaring routes -- Creating the products list page -- Understanding React Router's router -- Declaring the products route -- Creating navigation -- Using the Link component -- Using the NavLink component -- Using nested routes -- Understanding nested routes -- Using nested routes in the app -- Using route parameters -- Understanding route parameters -- Using route parameters in the app -- Creating an error page -- Understanding error pages -- Adding an error page -- Using index routes -- Understanding index routes -- Using an index route in the app -- Using search parameters -- Understanding search parameters -- Adding search functionality to the app -- Navigating programmatically -- Using form navigation -- Implementing lazy loading -- Understanding React lazy loading -- Adding a lazy admin page to the app -- Summary -- Questions -- Answers -- Chapter 7: Working with Forms -- Technical requirements -- Using controlled fields -- Creating the project -- Creating a contact form -- Using uncontrolled fields -- Using React Router Form -- Using native validation -- Using React Hook Form -- Understanding React Hook Form -- Using React Hook Form -- Adding validation -- Summary -- Questions -- Answers -- Part 3: Data -- Chapter 8: State Management -- Technical requirements -- Creating the project -- Using prop drilling -- Using React context -- Understanding React context -- Using React context -- Using Redux -- Understanding Redux -- Installing Redux -- Using Redux -- Summary -- Questions -- Answers -- Chapter 9: Interacting with RESTful APIs -- Technical requirements -- Creating the project -- Setting up the project -- Understanding the component structure -- Creating a REST API -- Using the effect hook with fetch -- Getting blog posts using fetch -- Strongly typing response data -- Creating a blog posts list component…”
Libro electrónico