Mostrando 17,981 - 18,000 Resultados de 20,414 Para Buscar 'Urrao~', tiempo de consulta: 0.93s Limitar resultados
  1. 17981
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Design Patterns and Java Platform Functionalities -- Chapter 1: Getting into Software Design Patterns -- Technical requirements -- Code - from symbols to program -- Examining OOP and APIE -- Only exposing what's required - encapsulation -- Inevitable evolution - inheritance -- Behavior on demand - polymorphism -- Standard features - abstraction -- Gluing parts to APIE -- Understanding the SOLID design principles -- The single-responsibility principle (SRP) - the engine is just an engine -- The open-closed principle (OCP) -- The Liskov Substitution Principle (LSP) - substitutability of classes -- The interface segregation principle (ISP) -- The dependency inversion principle (DIP) -- Significance of design patterns -- Reviewing what challenges design patterns solve -- Summary -- Questions -- Further reading -- Chapter 2: Discovering the Java Platform for Design Patterns -- Technical requirements -- Knocking on Java's door -- Exploring the model and functionality of the Java platform -- The JDK -- The JRE -- The JVM -- Reviewing GC and the Java memory model -- The JMM -- GC and automatic memory management -- Examining the core Java APIs -- Primitive data types and wrappers -- Working with the String API -- Introducing arrays -- Discovering a collection framework -- Math APIs -- Functional programming and Java -- Introducing lambdas and functional interfaces -- Using functional interfaces in lambda expressions -- Getting to grips with the Java Module System -- A quick review of Java features from 11 to 17+ -- The local variable syntax for lambda parameters (Java SE 11, JEP-323) -- Switch expressions (Java SE 14, JEP-361) -- Text blocks (Java SE 15, JEP-378) -- Pattern matching for instanceof (Java SE 16, JEP-394)…”
    Libro electrónico
  2. 17982
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Preface -- Part 1: Introduction -- Chapter 1: Introducing React -- Technical requirements -- Understanding the benefits of React -- Understanding JSX -- Creating a component -- Creating a CodeSandbox project -- Understanding the React entry point -- Understanding the React component tree -- Creating a basic alert component -- Understanding imports and exports -- Understanding the importance of modules -- Using export statements -- Using import statements -- Adding Alert to the App component -- Using props -- Understanding props -- Adding props to the alert component -- Using state -- Understanding state -- Implementing a visible state in the alert component -- Adding a close button to Alert -- Using events -- Understanding events -- Implementing a close button click handler in the alert -- Implementing an alert close event -- Summary -- Questions -- Answers -- Chapter 2: Introducing TypeScript -- Technical requirements -- Understanding the benefits of TypeScript -- Understanding TypeScript -- Catching type errors early -- Improving developer experience and productivity with IntelliSense -- Understanding JavaScript types -- Using basic TypeScript types -- Using type annotations -- Using type inference -- Using the Date type -- Using the any type -- Using the unknown type -- Using the void type -- Using the never type -- Using arrays -- Creating TypeScript types -- Using object types -- Creating type aliases -- Creating interfaces -- Creating classes -- Creating enumerations -- Creating union types -- Using the TypeScript compiler -- Summary -- Questions -- Answers -- Chapter 3: Setting Up React and TypeScript -- Technical requirements -- Creating a project with webpack -- Introducing webpack -- Creating the folder structure -- Creating package.json -- Adding a web page -- Adding TypeScript -- Adding React -- Adding Babel…”
    Libro electrónico
  3. 17983
    Publicado 2015
    Tabla de Contenidos: “…-- Applications You Can Write with C# -- C# in this Book -- Visual Studio 2015 -- Visual Studio Express 2015 Products -- Solutions -- Chapter 2: Writing a C# Program -- The Visual Studio 2015 Development Environment -- Console Applications -- The Solution Explorer -- The Properties Window -- The Error List Window -- Desktop Applications -- Chapter 3: Variables and Expressions -- Basic C# Syntax -- Basic C# Console Application Structure -- Variables -- Simple Types -- Variable Naming -- Literal Values -- Expressions -- Mathematical Operators -- Assignment Operators -- Operator Precedence -- Namespaces -- Chapter 4: Flow Control -- Boolean Logic -- Boolean Bitwise and Assignment Operators -- Operator Precedence Updated -- Branching -- The Ternary Operator -- The if Statement -- The switch Statement -- Looping -- do Loops -- while Loops -- for Loops -- Interrupting Loops -- Infinite Loops -- Chapter 5: More about Variables -- Type Conversion -- Implicit Conversions -- Explicit Conversions -- Explicit Conversions Using the Convert Commands -- Complex Variable Types -- Enumerations -- Structs -- Arrays -- String Manipulation -- Chapter 6: Functions -- Defining and Using Functions -- Return Values -- Parameters -- Variable Scope -- Variable Scope in Other Structures -- Parameters and Return Values versus Global Data -- The Main() Function -- Struct Functions -- Overloading Functions -- Using Delegates -- Chapter 7: Debugging and Error Handling -- Debugging in Visual Studio -- Debugging in Nonbreak (Normal) Mode -- Debugging in Break Mode -- Error Handling -- try...catch...finally…”
    Libro electrónico
  4. 17984
    por Iglesia Católica.
    Publicado 1993
    Libro
  5. 17985
    Libro
  6. 17986
    por Vourc'h, Ann
    Publicado 2001
    “…The cap-and-trade system for water rights in the Murray Darling basin aims at better integration of economic and environmental reform. …”
    Capítulo de libro electrónico
  7. 17987
    Publicado 1966
    Libro
  8. 17988
    Publicado 2021
    Tabla de Contenidos: “…Ergodic theorems for perturbed Markov chains with damping component in the triangular array mode -- 2.4.4. Numerical examples -- 2.5. Acknowledgments -- 2.6. …”
    Libro electrónico
  9. 17989
    Publicado 2016
    Tabla de Contenidos: “…5.3 HSA Memory Consistency Basics -- 5.3.1 Background: Sequential Consistency -- 5.3.2 Background: Conflicts and Races -- 5.3.3 The HSA Memory Model for a Single Memory Scope -- 5.3.3.1 HSA synchronization operations -- 5.3.3.2 Transitive synchronization through different addresses -- 5.3.3.3 Finding a race -- 5.3.4 HSA Memory Model Using Memory Scopes -- 5.3.4.1 Scope motivation -- 5.3.4.2 HSA scopes -- 5.3.4.3 Using smaller scopes -- Scope inclusion -- Scope transitivity -- 5.3.5 Memory Segments -- 5.3.6 Putting It All Together: HSA Race Freedom -- 5.3.6.1 Simplified definition of HSA race freedom -- 5.3.6.2 General definition of HSA race freedom -- 5.3.7 Additional Observations and Considerations -- 5.4 Advanced Consistency in the HSA Memory Model -- 5.4.1 Relaxed Atomics -- 5.4.2 Ownership and Scope Bounding -- 5.5 Conclusions -- References -- Chapter 6: HSA Queuing Model -- 6.1 Introduction -- 6.2 User Mode Queues -- 6.3 Architected Queuing Language -- 6.3.1 Packet Types -- 6.3.2 Building Packets -- 6.4 Packet Submission and Scheduling -- 6.5 Conclusions -- References -- Chapter 7: Compiler Technology -- 7.1 Introduction -- 7.2 A Brief Introduction to C + + AMP -- 7.2.1 C++ AMP array_view -- 7.2.2 C++ AMP parallel_for_each, or Kernel Invocation -- 7.2.2.1 Lambdas or functors as kernels -- 7.2.2.2 Captured variables as kernel arguments -- 7.2.2.3 The restrict(amp) modifier -- 7.3 HSA as a Compiler Target -- 7.4 Mapping Key C++ AMP Constructs to HSA -- 7.5 C++ AMP Compilation Flow -- 7.6 Compiled C++ AMP Code -- 7.7 Compiler Support for Tiling in C++ AMP -- 7.7.1 Dividing Compute Domain -- 7.7.2 Specifying Address Space and Barriers -- 7.8 Memory Segment Annotation -- 7.9 Towards Generic C++ for HSA -- 7.10 Compiler Support for Platform Atomics -- 7.10.1 One Simple Example of Platform Atomics -- 7.11 Compiler Support for New/Delete Operators…”
    Libro electrónico
  10. 17990
    Publicado 2018
    Tabla de Contenidos: “…. -- Colons ":: -- At sign "@ -- Primitive types and literals -- The Boolean type -- Integral types -- Floating-point types -- Default values of primitive types -- Primitive type literals -- Reference types and String -- Class types -- Interface types -- Arrays -- Default value of a reference type -- Reference type literals -- String immutability -- Enum types…”
    Libro electrónico
  11. 17991
    Publicado 2017
    Tabla de Contenidos: “…. -- Variable expansion in strings -- Strongly typed variables -- Working with arrays and hash tables -- How to do it... -- How it works... -- There's more... -- See also -- Looping through items -- How to do it... -- How it works... -- There's more... -- See also -- Creating custom objects -- How to do it... -- How it works... -- There's more... -- See also -- Using debugger functions -- How to do it... -- How it works... -- There's more... -- See also -- Understanding the new execution policy -- How to do it... -- How it works... -- There's more... -- See also -- Using the Save-Help function -- How to do it... -- How it works... -- See also -- Working with script repositories -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 2: Exchange Management Shell Common Tasks -- Introduction -- Performing some basic steps -- Manually configuring remote PowerShell connections -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also…”
    Libro electrónico
  12. 17992
    Publicado 2023
    Tabla de Contenidos: “…-- Exploring the C++ program structure -- Defining C++ functions -- Defining functions with or without parameters -- Calling functions -- Writing the main() function -- Working with a basic calculator program -- Learning the C++ syntax -- Using the C++ data types -- Defining variables -- Using C++ arrays -- Using C++ operators -- Accepting user input…”
    Libro electrónico
  13. 17993
    Publicado 2013
    Tabla de Contenidos: “…Availability Risks -- Best Practices -- Zoning -- Arrays -- Servers -- Staff -- Offsite Data Storage -- Summary -- References -- Chapter 12: Database Security -- General Database Security Concepts -- Understanding Database Security Layers -- Server-Level Security -- Network-Level Security -- Operating System Security -- Understanding Database-Level Security -- Database Administration Security -- Database Roles and Permissions -- Object-Level Security -- Using Other Database Objects for Security -- Using Application Security -- Limitations of Application-Level Security -- Supporting Internet Applications -- Database Backup and Recovery -- Determining Backup Constraints -- Determining Recovery Requirements -- Types of Database Backups -- Keeping Your Servers Up to Date -- Database Auditing and Monitoring -- Reviewing Audit Logs -- Database Monitoring -- Summary -- References -- Part III: Network Security -- Chapter 13: Secure Network Design -- Introduction to Secure Network Design -- Acceptable Risk -- Designing Security into a Network -- Designing an Appropriate Network -- The Cost of Security -- Performance -- Availability -- Security -- Wireless Impact on the Perimeter -- Remote Access Considerations -- Internal Security Practices -- Intranets, Extranets, and DMZs -- Outbound Filtering -- Compliance with Standards -- NIST -- ISO 27002 -- COBIT -- Summary -- References -- Chapter 14: Network Device Security -- Switch and Router Basics -- MAC Addresses, IP Addresses, and ARP -- TCP/IP -- Hubs -- Switches -- Routers -- Network Hardening -- Patching -- Switch Security Practices -- Access Control Lists -- Disabling Unused Services -- Administrative Practices -- Internet Control Message Protocol (ICMP) -- Anti-Spoofing and Source Routing -- Logging -- Summary -- References -- Chapter 15: Firewalls -- Overview -- The Evolution of Firewalls…”
    Libro electrónico
  14. 17994
    por Saha, A.
    Publicado 2013
    Tabla de Contenidos: “…3.6.1 Image Formats, Containers, and Compression Standards -- 3.7 Speech and Audio Coding -- 3.8 Shannon-Fano Coding -- 3.9 Human Coding -- 3.10 Arithmetic Coding -- 3.11 Lempel-Ziv-Welch Coding -- 3.12 Run-length Encoding -- 3.13 MPEG Audio and Video Coding Standards -- 3.14 Psychoacoustic Model of Human Hearing -- 3.14.1 The Masking Phenomenon -- 3.14.2 Temporal Masking -- 3.14.3 Perceptual Coding in MPEG Audio -- 3.15 Dolby -- 3.16 Linear Predictive Coding Model -- 3.17 Solved Problems -- Multiple Choice Questions -- Review Questions -- Part B: Error Control Coding -- Chapter 4: Coding Theory -- 4.1 Introduction -- 4.2 Types of Codes -- 4.2.1 Code Rate -- 4.3 Types of Errors -- 4.4 Error Control Strategies -- 4.4.1 Throughput Efficiency of ARQ -- 4.5 Mathematical Fundamentals -- 4.5.1 Modular Arithmetic -- 4.5.2 Sets -- 4.5.3 Groups -- 4.5.4 Fields -- 4.5.5 Arithmetic of Binary Field -- 4.5.6 Roots of Equations -- 4.5.7 Galois Field -- 4.6 Vector Spaces -- 4.6.1 Subspace -- 4.6.2 Linear Combination -- 4.6.3 Basis (or Base) -- 4.6.4 Dimension -- 4.6.5 Orthogonality -- 4.6.6 Dual Space -- 4.7 Matrices -- 4.7.1 Row Space -- 4.8 Solved Problems -- Multiple Choice Questions -- Review Questions -- Chapter 5: Linear Block Codes -- 5.1 Introduction -- 5.2 Generator Matrices -- 5.3 Parity-Check Matrices -- 5.3.1 Dual Code -- 5.4 Error Syndrome -- 5.4.1 Undetectable Error Pattern -- 5.5 Error Detection -- 5.6 Minimum Distance -- 5.7 Error-detecting Capability -- 5.8 Error-correcting Capability -- 5.9 Standard Array and Syndrome Decoding -- 5.9.1 Coset and Coset Leader -- 5.10 Probability of Undetected Errors Over a BSC -- 5.11 Hamming Code -- 5.12 Solved Problems -- Multiple Choice Questions -- Review Questions -- Chapter 6: Cyclic Codes -- 6.1 Introduction -- 6.2 Generation -- 6.2.1 Generation and Parity-check Matrices -- 6.2.2 Realization of Cyclic Code…”
    Libro electrónico
  15. 17995
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Understanding the Node Environment -- Introduction - JavaScript as a systems language -- The Unix design philosophy -- POSIX -- Events for everything -- Standard libraries -- Extending JavaScript -- Events -- Modularity -- The network -- V8, JavaScript, and optimizations -- Flags -- Optimizing your code -- Numbers and tracing optimization/de-optimization -- Objects and arrays -- Functions -- Optimized JavaScript -- Help with variables -- Arrow functions -- String manipulation -- The process object -- The REPL -- Summary -- Chapter 2: Understanding Asynchronous Event-Driven Programming -- Node's unique design -- Collaboration -- Queueing -- Understanding the event loop -- Event loop ordering, phases, and priorities -- Listening for events -- Signals -- Child processes -- File events -- Deferred execution -- process.nextTick -- setImmediate -- Timers -- setTimeout -- setInterval -- unref and ref -- Concurrency and errors -- Managing concurrency -- Callbacks -- Promises -- async/await -- Generators and Iterators -- Errors and exceptions -- Considerations -- Building a Twitter feed using file events -- Summary -- Chapter 3: Streaming Data Across Nodes and Clients -- Why use streams? …”
    Libro electrónico
  16. 17996
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Approaching a Penetration Test Using Metasploit -- Organizing a penetration test -- Preinteractions -- Intelligence gathering/reconnaissance phase -- Threat modeling -- Vulnerability analysis -- Exploitation and post-exploitation -- Reporting -- Mounting the environment -- Setting up Kali Linux in a virtual environment -- The fundamentals of Metasploit -- Conducting a penetration test with Metasploit -- Recalling the basics of Metasploit -- Benefits of penetration testing using Metasploit -- Open source -- Support for testing large networks and natural naming conventions -- Smart payload generation and switching mechanism -- Cleaner exits -- The GUI environment -- Case study - diving deep into an unknown network -- Gathering intelligence -- Using databases in Metasploit -- Modeling threats -- Vulnerability analysis - arbitrary file upload (unauthenticated) -- Attacking mechanism on the PhpCollab 2.5.1 application -- Exploitation and gaining access -- Escalating privileges with local root exploits -- Maintaining access with Metasploit -- Post-exploitation and pivoting -- Vulnerability analysis - SEH based buffer overflow -- Exploiting human errors by compromising Password Managers -- Revisiting the case study -- Revising the approach -- Summary and exercises -- Chapter 2: Reinventing Metasploit -- Ruby - the heart of Metasploit -- Creating your first Ruby program -- Interacting with the Ruby shell -- Defining methods in the shell -- Variables and data types in Ruby -- Working with strings -- Concatenating strings -- The substring function -- The split function -- Numbers and conversions in Ruby -- Conversions in Ruby -- Ranges in Ruby -- Arrays in Ruby -- Methods in Ruby -- Decision-making operators -- Loops in Ruby…”
    Libro electrónico
  17. 17997
    Tabla de Contenidos: “…-- SharePoint Foundation versus SharePoint Server -- What You Will Learn in This Book -- Summary -- Chapter 2: What's New in PowerShell for SharePoint 2013 -- SharePoint 2013 Apps -- Service Applications -- User License Enforcements -- PowerShell Web Access -- Backups -- Bing Maps -- Search -- Tenants -- Office 365 -- Site Upgrade -- Summary -- Chapter 3: Configuring Your Environment for PowerShell -- Getting Started with the Integrated Scripting Environment (ISE) -- Windows Server 2008 R2 -- Windows Server 2012 -- Windows PowerShell ISE Essential Features -- IntelliSense -- Snippets -- Commands Explorer -- Execution Policy -- PowerShell Web Access (PWA) -- Requirements -- Installing PWA -- Configuring the Gateway -- Summary -- Chapter 4: PowerShell Basics -- Terminology -- Session -- Cmdlets -- Profile -- Snap-In -- Module -- PowerShell Operators and Common Operations -- Printing Values on Screen -- Console Colors -- Variables -- Comments -- Casting -- Conditional Logic -- Decisions -- Comparison -- Logical Operators -- Function -- Loops -- Piping -- Instance Referrer -- Error Handling -- Enumerations -- Arrays -- Environment Variables -- WhatIf Rollback -- Graphical User Interface -- Demo Project-Selective Deletion of Files in a Folder -- Customization -- My Profile -- Custom Modules -- Leaping Ahead -- Desired State Configuration -- Dynamic Method and Property Names -- Summary -- Chapter 5: Installing &amp -- Deploying SharePoint with PowerShell -- Requirements -- Hardware Requirements -- Software Requirements -- Roles and Features -- .NET Framework 3.5 -- Domain Controller -- Users and Groups -- Application Server Role…”
    Libro electrónico
  18. 17998
    Publicado 2022
    Tabla de Contenidos: “…Step 1: Identify the Problem -- Step 2: Establish a Theory -- Step 3: Test the Theory -- Step 4: Establish a Plan of Action -- Step 5: Verify Functionality -- Step 6: Document Findings -- Troubleshooting Motherboards, CPUs, RAM, and Power Problems -- Identifying General Hardware Symptoms and Causes -- Identifying BIOS/UEFI and POST Routine Problems -- Identifying Motherboard and CPU Problems -- Identifying Memory Issues -- Identifying Power Supply Problems -- Summary -- Exam Essentials -- Review Questions -- Performance-Based Question -- Chapter 12 Hardware and Network Troubleshooting -- Troubleshooting Storage Drives and RAID Arrays -- Lights and Sounds -- Devices Not Found -- Performance Issues -- S.M.A.R.T. …”
    Libro electrónico
  19. 17999
    Publicado 2024
    Tabla de Contenidos: “…Basics of shell scripting -- Creating a shell script file -- Variables in shell scripts -- Using mathematical expressions in shell scripts -- Using programming structures -- Using arrays in Bash -- Reading input data -- Formatting output data -- Understanding exit statuses and testing structures -- Using conditional if statements -- Using looping statements -- Working with functions -- Using sed and (g)awk commands -- Using scripts to showcase interprocess communication -- Shared storage -- Unnamed pipes -- Named pipes -- Sockets -- Scripting for administrative tasks -- Creating scripts for system administrative tasks -- Packaging scripts -- Summary -- Questions -- Further reading -- Chapter 9: Securing Linux -- Technical requirements -- Understanding Linux security -- Introducing SELinux -- Working with SELinux -- Introducing AppArmor -- Working with AppArmor -- Final considerations -- Working with firewalls -- Understanding the firewall chain -- Introducing Netfilter -- Working with iptables -- Introducing nftables -- Using firewall managers -- Summary -- Exercises -- Further reading -- Chapter 10: Disaster Recovery, Diagnostics, and Troubleshooting -- Technical requirements -- Planning for disaster recovery -- A brief introduction to risk management -- Risk calculation -- Designing a DRP -- Backing up and restoring the system -- Disk cloning solutions -- Introducing common Linux diagnostic tools for troubleshooting -- Tools for troubleshooting boot issues -- Tools for troubleshooting general system issues -- Tools for troubleshooting network issues -- Tools for troubleshooting hardware issues -- Summary -- Questions -- Further reading -- Part 3: Server Administration -- Chapter 11: Working with Virtual Machines -- Technical requirements -- Introduction to virtualization on Linux -- Efficiency in resource usage -- Introduction to hypervisors…”
    Libro electrónico
  20. 18000
    Publicado 2024
    Tabla de Contenidos: “…-- The CTS -- Value types and reference types -- Classes and structs -- Floating-point numbers -- Where types live - the difference between value types and reference types -- The stack and the heap -- Boxing and unboxing -- Hidden boxing and unboxing -- Choosing the right data structures and algorithms -- Arrays, Lists, and LinkedLists -- Stacks and queues -- HashSets and lists -- SortedList, SortedDictionary, and Dictionary -- Dictionary or last of tuples/objects -- For versus ForEach -- Strings -- Use StringBuilder for concatenation -- Interning strings -- Use String.Concat or String.Join -- Comparison…”
    Libro electrónico