Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 667
- Desarrollo rural 527
- History 452
- Sociología rural 289
- Educación 281
- Història 281
- Agricultura 272
- Development 264
- Urban, Rural and Regional Development 261
- Vida rural 231
- Engineering & Applied Sciences 205
- Metodología 205
- Condicions rurals 202
- Didáctica 197
- Application software 182
- Computer programming 176
- Rural development 171
- City planning 167
- Urban Studies 160
- Urbanismo 156
- Computer Science 154
- Desarrollo urbano 153
- Sociology 151
- Ensenyament 148
- Sociology, Urban 144
- Java (Computer program language) 143
- JavaScript (Computer program language) 139
- Mundo urbano 131
- Condiciones rurales 130
- Agriculture 128
-
17981Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Design Patterns and Java Platform Functionalities -- Chapter 1: Getting into Software Design Patterns -- Technical requirements -- Code - from symbols to program -- Examining OOP and APIE -- Only exposing what's required - encapsulation -- Inevitable evolution - inheritance -- Behavior on demand - polymorphism -- Standard features - abstraction -- Gluing parts to APIE -- Understanding the SOLID design principles -- The single-responsibility principle (SRP) - the engine is just an engine -- The open-closed principle (OCP) -- The Liskov Substitution Principle (LSP) - substitutability of classes -- The interface segregation principle (ISP) -- The dependency inversion principle (DIP) -- Significance of design patterns -- Reviewing what challenges design patterns solve -- Summary -- Questions -- Further reading -- Chapter 2: Discovering the Java Platform for Design Patterns -- Technical requirements -- Knocking on Java's door -- Exploring the model and functionality of the Java platform -- The JDK -- The JRE -- The JVM -- Reviewing GC and the Java memory model -- The JMM -- GC and automatic memory management -- Examining the core Java APIs -- Primitive data types and wrappers -- Working with the String API -- Introducing arrays -- Discovering a collection framework -- Math APIs -- Functional programming and Java -- Introducing lambdas and functional interfaces -- Using functional interfaces in lambda expressions -- Getting to grips with the Java Module System -- A quick review of Java features from 11 to 17+ -- The local variable syntax for lambda parameters (Java SE 11, JEP-323) -- Switch expressions (Java SE 14, JEP-361) -- Text blocks (Java SE 15, JEP-378) -- Pattern matching for instanceof (Java SE 16, JEP-394)…”
Libro electrónico -
17982Publicado 2023Tabla de Contenidos: “…Intro -- Preface -- Part 1: Introduction -- Chapter 1: Introducing React -- Technical requirements -- Understanding the benefits of React -- Understanding JSX -- Creating a component -- Creating a CodeSandbox project -- Understanding the React entry point -- Understanding the React component tree -- Creating a basic alert component -- Understanding imports and exports -- Understanding the importance of modules -- Using export statements -- Using import statements -- Adding Alert to the App component -- Using props -- Understanding props -- Adding props to the alert component -- Using state -- Understanding state -- Implementing a visible state in the alert component -- Adding a close button to Alert -- Using events -- Understanding events -- Implementing a close button click handler in the alert -- Implementing an alert close event -- Summary -- Questions -- Answers -- Chapter 2: Introducing TypeScript -- Technical requirements -- Understanding the benefits of TypeScript -- Understanding TypeScript -- Catching type errors early -- Improving developer experience and productivity with IntelliSense -- Understanding JavaScript types -- Using basic TypeScript types -- Using type annotations -- Using type inference -- Using the Date type -- Using the any type -- Using the unknown type -- Using the void type -- Using the never type -- Using arrays -- Creating TypeScript types -- Using object types -- Creating type aliases -- Creating interfaces -- Creating classes -- Creating enumerations -- Creating union types -- Using the TypeScript compiler -- Summary -- Questions -- Answers -- Chapter 3: Setting Up React and TypeScript -- Technical requirements -- Creating a project with webpack -- Introducing webpack -- Creating the folder structure -- Creating package.json -- Adding a web page -- Adding TypeScript -- Adding React -- Adding Babel…”
Libro electrónico -
17983Publicado 2015Tabla de Contenidos: “…-- Applications You Can Write with C# -- C# in this Book -- Visual Studio 2015 -- Visual Studio Express 2015 Products -- Solutions -- Chapter 2: Writing a C# Program -- The Visual Studio 2015 Development Environment -- Console Applications -- The Solution Explorer -- The Properties Window -- The Error List Window -- Desktop Applications -- Chapter 3: Variables and Expressions -- Basic C# Syntax -- Basic C# Console Application Structure -- Variables -- Simple Types -- Variable Naming -- Literal Values -- Expressions -- Mathematical Operators -- Assignment Operators -- Operator Precedence -- Namespaces -- Chapter 4: Flow Control -- Boolean Logic -- Boolean Bitwise and Assignment Operators -- Operator Precedence Updated -- Branching -- The Ternary Operator -- The if Statement -- The switch Statement -- Looping -- do Loops -- while Loops -- for Loops -- Interrupting Loops -- Infinite Loops -- Chapter 5: More about Variables -- Type Conversion -- Implicit Conversions -- Explicit Conversions -- Explicit Conversions Using the Convert Commands -- Complex Variable Types -- Enumerations -- Structs -- Arrays -- String Manipulation -- Chapter 6: Functions -- Defining and Using Functions -- Return Values -- Parameters -- Variable Scope -- Variable Scope in Other Structures -- Parameters and Return Values versus Global Data -- The Main() Function -- Struct Functions -- Overloading Functions -- Using Delegates -- Chapter 7: Debugging and Error Handling -- Debugging in Visual Studio -- Debugging in Nonbreak (Normal) Mode -- Debugging in Break Mode -- Error Handling -- try...catch...finally…”
Libro electrónico -
17984
-
17985
-
17986por Vourc'h, Ann“…The cap-and-trade system for water rights in the Murray Darling basin aims at better integration of economic and environmental reform. …”
Publicado 2001
Capítulo de libro electrónico -
17987
-
17988Publicado 2021Tabla de Contenidos: “…Ergodic theorems for perturbed Markov chains with damping component in the triangular array mode -- 2.4.4. Numerical examples -- 2.5. Acknowledgments -- 2.6. …”
Libro electrónico -
17989Publicado 2016Tabla de Contenidos: “…5.3 HSA Memory Consistency Basics -- 5.3.1 Background: Sequential Consistency -- 5.3.2 Background: Conflicts and Races -- 5.3.3 The HSA Memory Model for a Single Memory Scope -- 5.3.3.1 HSA synchronization operations -- 5.3.3.2 Transitive synchronization through different addresses -- 5.3.3.3 Finding a race -- 5.3.4 HSA Memory Model Using Memory Scopes -- 5.3.4.1 Scope motivation -- 5.3.4.2 HSA scopes -- 5.3.4.3 Using smaller scopes -- Scope inclusion -- Scope transitivity -- 5.3.5 Memory Segments -- 5.3.6 Putting It All Together: HSA Race Freedom -- 5.3.6.1 Simplified definition of HSA race freedom -- 5.3.6.2 General definition of HSA race freedom -- 5.3.7 Additional Observations and Considerations -- 5.4 Advanced Consistency in the HSA Memory Model -- 5.4.1 Relaxed Atomics -- 5.4.2 Ownership and Scope Bounding -- 5.5 Conclusions -- References -- Chapter 6: HSA Queuing Model -- 6.1 Introduction -- 6.2 User Mode Queues -- 6.3 Architected Queuing Language -- 6.3.1 Packet Types -- 6.3.2 Building Packets -- 6.4 Packet Submission and Scheduling -- 6.5 Conclusions -- References -- Chapter 7: Compiler Technology -- 7.1 Introduction -- 7.2 A Brief Introduction to C + + AMP -- 7.2.1 C++ AMP array_view -- 7.2.2 C++ AMP parallel_for_each, or Kernel Invocation -- 7.2.2.1 Lambdas or functors as kernels -- 7.2.2.2 Captured variables as kernel arguments -- 7.2.2.3 The restrict(amp) modifier -- 7.3 HSA as a Compiler Target -- 7.4 Mapping Key C++ AMP Constructs to HSA -- 7.5 C++ AMP Compilation Flow -- 7.6 Compiled C++ AMP Code -- 7.7 Compiler Support for Tiling in C++ AMP -- 7.7.1 Dividing Compute Domain -- 7.7.2 Specifying Address Space and Barriers -- 7.8 Memory Segment Annotation -- 7.9 Towards Generic C++ for HSA -- 7.10 Compiler Support for Platform Atomics -- 7.10.1 One Simple Example of Platform Atomics -- 7.11 Compiler Support for New/Delete Operators…”
Libro electrónico -
17990Publicado 2018Tabla de Contenidos: “…. -- Colons ":: -- At sign "@ -- Primitive types and literals -- The Boolean type -- Integral types -- Floating-point types -- Default values of primitive types -- Primitive type literals -- Reference types and String -- Class types -- Interface types -- Arrays -- Default value of a reference type -- Reference type literals -- String immutability -- Enum types…”
Libro electrónico -
17991Publicado 2017Tabla de Contenidos: “…. -- Variable expansion in strings -- Strongly typed variables -- Working with arrays and hash tables -- How to do it... -- How it works... -- There's more... -- See also -- Looping through items -- How to do it... -- How it works... -- There's more... -- See also -- Creating custom objects -- How to do it... -- How it works... -- There's more... -- See also -- Using debugger functions -- How to do it... -- How it works... -- There's more... -- See also -- Understanding the new execution policy -- How to do it... -- How it works... -- There's more... -- See also -- Using the Save-Help function -- How to do it... -- How it works... -- See also -- Working with script repositories -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 2: Exchange Management Shell Common Tasks -- Introduction -- Performing some basic steps -- Manually configuring remote PowerShell connections -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also…”
Libro electrónico -
17992Publicado 2023Tabla de Contenidos: “…-- Exploring the C++ program structure -- Defining C++ functions -- Defining functions with or without parameters -- Calling functions -- Writing the main() function -- Working with a basic calculator program -- Learning the C++ syntax -- Using the C++ data types -- Defining variables -- Using C++ arrays -- Using C++ operators -- Accepting user input…”
Libro electrónico -
17993Publicado 2013Tabla de Contenidos: “…Availability Risks -- Best Practices -- Zoning -- Arrays -- Servers -- Staff -- Offsite Data Storage -- Summary -- References -- Chapter 12: Database Security -- General Database Security Concepts -- Understanding Database Security Layers -- Server-Level Security -- Network-Level Security -- Operating System Security -- Understanding Database-Level Security -- Database Administration Security -- Database Roles and Permissions -- Object-Level Security -- Using Other Database Objects for Security -- Using Application Security -- Limitations of Application-Level Security -- Supporting Internet Applications -- Database Backup and Recovery -- Determining Backup Constraints -- Determining Recovery Requirements -- Types of Database Backups -- Keeping Your Servers Up to Date -- Database Auditing and Monitoring -- Reviewing Audit Logs -- Database Monitoring -- Summary -- References -- Part III: Network Security -- Chapter 13: Secure Network Design -- Introduction to Secure Network Design -- Acceptable Risk -- Designing Security into a Network -- Designing an Appropriate Network -- The Cost of Security -- Performance -- Availability -- Security -- Wireless Impact on the Perimeter -- Remote Access Considerations -- Internal Security Practices -- Intranets, Extranets, and DMZs -- Outbound Filtering -- Compliance with Standards -- NIST -- ISO 27002 -- COBIT -- Summary -- References -- Chapter 14: Network Device Security -- Switch and Router Basics -- MAC Addresses, IP Addresses, and ARP -- TCP/IP -- Hubs -- Switches -- Routers -- Network Hardening -- Patching -- Switch Security Practices -- Access Control Lists -- Disabling Unused Services -- Administrative Practices -- Internet Control Message Protocol (ICMP) -- Anti-Spoofing and Source Routing -- Logging -- Summary -- References -- Chapter 15: Firewalls -- Overview -- The Evolution of Firewalls…”
Libro electrónico -
17994por Saha, A.Tabla de Contenidos: “…3.6.1 Image Formats, Containers, and Compression Standards -- 3.7 Speech and Audio Coding -- 3.8 Shannon-Fano Coding -- 3.9 Human Coding -- 3.10 Arithmetic Coding -- 3.11 Lempel-Ziv-Welch Coding -- 3.12 Run-length Encoding -- 3.13 MPEG Audio and Video Coding Standards -- 3.14 Psychoacoustic Model of Human Hearing -- 3.14.1 The Masking Phenomenon -- 3.14.2 Temporal Masking -- 3.14.3 Perceptual Coding in MPEG Audio -- 3.15 Dolby -- 3.16 Linear Predictive Coding Model -- 3.17 Solved Problems -- Multiple Choice Questions -- Review Questions -- Part B: Error Control Coding -- Chapter 4: Coding Theory -- 4.1 Introduction -- 4.2 Types of Codes -- 4.2.1 Code Rate -- 4.3 Types of Errors -- 4.4 Error Control Strategies -- 4.4.1 Throughput Efficiency of ARQ -- 4.5 Mathematical Fundamentals -- 4.5.1 Modular Arithmetic -- 4.5.2 Sets -- 4.5.3 Groups -- 4.5.4 Fields -- 4.5.5 Arithmetic of Binary Field -- 4.5.6 Roots of Equations -- 4.5.7 Galois Field -- 4.6 Vector Spaces -- 4.6.1 Subspace -- 4.6.2 Linear Combination -- 4.6.3 Basis (or Base) -- 4.6.4 Dimension -- 4.6.5 Orthogonality -- 4.6.6 Dual Space -- 4.7 Matrices -- 4.7.1 Row Space -- 4.8 Solved Problems -- Multiple Choice Questions -- Review Questions -- Chapter 5: Linear Block Codes -- 5.1 Introduction -- 5.2 Generator Matrices -- 5.3 Parity-Check Matrices -- 5.3.1 Dual Code -- 5.4 Error Syndrome -- 5.4.1 Undetectable Error Pattern -- 5.5 Error Detection -- 5.6 Minimum Distance -- 5.7 Error-detecting Capability -- 5.8 Error-correcting Capability -- 5.9 Standard Array and Syndrome Decoding -- 5.9.1 Coset and Coset Leader -- 5.10 Probability of Undetected Errors Over a BSC -- 5.11 Hamming Code -- 5.12 Solved Problems -- Multiple Choice Questions -- Review Questions -- Chapter 6: Cyclic Codes -- 6.1 Introduction -- 6.2 Generation -- 6.2.1 Generation and Parity-check Matrices -- 6.2.2 Realization of Cyclic Code…”
Publicado 2013
Libro electrónico -
17995Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Understanding the Node Environment -- Introduction - JavaScript as a systems language -- The Unix design philosophy -- POSIX -- Events for everything -- Standard libraries -- Extending JavaScript -- Events -- Modularity -- The network -- V8, JavaScript, and optimizations -- Flags -- Optimizing your code -- Numbers and tracing optimization/de-optimization -- Objects and arrays -- Functions -- Optimized JavaScript -- Help with variables -- Arrow functions -- String manipulation -- The process object -- The REPL -- Summary -- Chapter 2: Understanding Asynchronous Event-Driven Programming -- Node's unique design -- Collaboration -- Queueing -- Understanding the event loop -- Event loop ordering, phases, and priorities -- Listening for events -- Signals -- Child processes -- File events -- Deferred execution -- process.nextTick -- setImmediate -- Timers -- setTimeout -- setInterval -- unref and ref -- Concurrency and errors -- Managing concurrency -- Callbacks -- Promises -- async/await -- Generators and Iterators -- Errors and exceptions -- Considerations -- Building a Twitter feed using file events -- Summary -- Chapter 3: Streaming Data Across Nodes and Clients -- Why use streams? …”
Libro electrónico -
17996Publicado 2018Tabla de Contenidos: “…Cover -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Approaching a Penetration Test Using Metasploit -- Organizing a penetration test -- Preinteractions -- Intelligence gathering/reconnaissance phase -- Threat modeling -- Vulnerability analysis -- Exploitation and post-exploitation -- Reporting -- Mounting the environment -- Setting up Kali Linux in a virtual environment -- The fundamentals of Metasploit -- Conducting a penetration test with Metasploit -- Recalling the basics of Metasploit -- Benefits of penetration testing using Metasploit -- Open source -- Support for testing large networks and natural naming conventions -- Smart payload generation and switching mechanism -- Cleaner exits -- The GUI environment -- Case study - diving deep into an unknown network -- Gathering intelligence -- Using databases in Metasploit -- Modeling threats -- Vulnerability analysis - arbitrary file upload (unauthenticated) -- Attacking mechanism on the PhpCollab 2.5.1 application -- Exploitation and gaining access -- Escalating privileges with local root exploits -- Maintaining access with Metasploit -- Post-exploitation and pivoting -- Vulnerability analysis - SEH based buffer overflow -- Exploiting human errors by compromising Password Managers -- Revisiting the case study -- Revising the approach -- Summary and exercises -- Chapter 2: Reinventing Metasploit -- Ruby - the heart of Metasploit -- Creating your first Ruby program -- Interacting with the Ruby shell -- Defining methods in the shell -- Variables and data types in Ruby -- Working with strings -- Concatenating strings -- The substring function -- The split function -- Numbers and conversions in Ruby -- Conversions in Ruby -- Ranges in Ruby -- Arrays in Ruby -- Methods in Ruby -- Decision-making operators -- Loops in Ruby…”
Libro electrónico -
17997por Charlebois-Laprade, Nikolas. authorTabla de Contenidos: “…-- SharePoint Foundation versus SharePoint Server -- What You Will Learn in This Book -- Summary -- Chapter 2: What's New in PowerShell for SharePoint 2013 -- SharePoint 2013 Apps -- Service Applications -- User License Enforcements -- PowerShell Web Access -- Backups -- Bing Maps -- Search -- Tenants -- Office 365 -- Site Upgrade -- Summary -- Chapter 3: Configuring Your Environment for PowerShell -- Getting Started with the Integrated Scripting Environment (ISE) -- Windows Server 2008 R2 -- Windows Server 2012 -- Windows PowerShell ISE Essential Features -- IntelliSense -- Snippets -- Commands Explorer -- Execution Policy -- PowerShell Web Access (PWA) -- Requirements -- Installing PWA -- Configuring the Gateway -- Summary -- Chapter 4: PowerShell Basics -- Terminology -- Session -- Cmdlets -- Profile -- Snap-In -- Module -- PowerShell Operators and Common Operations -- Printing Values on Screen -- Console Colors -- Variables -- Comments -- Casting -- Conditional Logic -- Decisions -- Comparison -- Logical Operators -- Function -- Loops -- Piping -- Instance Referrer -- Error Handling -- Enumerations -- Arrays -- Environment Variables -- WhatIf Rollback -- Graphical User Interface -- Demo Project-Selective Deletion of Files in a Folder -- Customization -- My Profile -- Custom Modules -- Leaping Ahead -- Desired State Configuration -- Dynamic Method and Property Names -- Summary -- Chapter 5: Installing & -- Deploying SharePoint with PowerShell -- Requirements -- Hardware Requirements -- Software Requirements -- Roles and Features -- .NET Framework 3.5 -- Domain Controller -- Users and Groups -- Application Server Role…”
Publicado 2014
Libro electrónico -
17998Publicado 2022Tabla de Contenidos: “…Step 1: Identify the Problem -- Step 2: Establish a Theory -- Step 3: Test the Theory -- Step 4: Establish a Plan of Action -- Step 5: Verify Functionality -- Step 6: Document Findings -- Troubleshooting Motherboards, CPUs, RAM, and Power Problems -- Identifying General Hardware Symptoms and Causes -- Identifying BIOS/UEFI and POST Routine Problems -- Identifying Motherboard and CPU Problems -- Identifying Memory Issues -- Identifying Power Supply Problems -- Summary -- Exam Essentials -- Review Questions -- Performance-Based Question -- Chapter 12 Hardware and Network Troubleshooting -- Troubleshooting Storage Drives and RAID Arrays -- Lights and Sounds -- Devices Not Found -- Performance Issues -- S.M.A.R.T. …”
Libro electrónico -
17999Publicado 2024Tabla de Contenidos: “…Basics of shell scripting -- Creating a shell script file -- Variables in shell scripts -- Using mathematical expressions in shell scripts -- Using programming structures -- Using arrays in Bash -- Reading input data -- Formatting output data -- Understanding exit statuses and testing structures -- Using conditional if statements -- Using looping statements -- Working with functions -- Using sed and (g)awk commands -- Using scripts to showcase interprocess communication -- Shared storage -- Unnamed pipes -- Named pipes -- Sockets -- Scripting for administrative tasks -- Creating scripts for system administrative tasks -- Packaging scripts -- Summary -- Questions -- Further reading -- Chapter 9: Securing Linux -- Technical requirements -- Understanding Linux security -- Introducing SELinux -- Working with SELinux -- Introducing AppArmor -- Working with AppArmor -- Final considerations -- Working with firewalls -- Understanding the firewall chain -- Introducing Netfilter -- Working with iptables -- Introducing nftables -- Using firewall managers -- Summary -- Exercises -- Further reading -- Chapter 10: Disaster Recovery, Diagnostics, and Troubleshooting -- Technical requirements -- Planning for disaster recovery -- A brief introduction to risk management -- Risk calculation -- Designing a DRP -- Backing up and restoring the system -- Disk cloning solutions -- Introducing common Linux diagnostic tools for troubleshooting -- Tools for troubleshooting boot issues -- Tools for troubleshooting general system issues -- Tools for troubleshooting network issues -- Tools for troubleshooting hardware issues -- Summary -- Questions -- Further reading -- Part 3: Server Administration -- Chapter 11: Working with Virtual Machines -- Technical requirements -- Introduction to virtualization on Linux -- Efficiency in resource usage -- Introduction to hypervisors…”
Libro electrónico -
18000Publicado 2024Tabla de Contenidos: “…-- The CTS -- Value types and reference types -- Classes and structs -- Floating-point numbers -- Where types live - the difference between value types and reference types -- The stack and the heap -- Boxing and unboxing -- Hidden boxing and unboxing -- Choosing the right data structures and algorithms -- Arrays, Lists, and LinkedLists -- Stacks and queues -- HashSets and lists -- SortedList, SortedDictionary, and Dictionary -- Dictionary or last of tuples/objects -- For versus ForEach -- Strings -- Use StringBuilder for concatenation -- Interning strings -- Use String.Concat or String.Join -- Comparison…”
Libro electrónico