Mostrando 2,261 - 2,280 Resultados de 3,162 Para Buscar 'debbugs~', tiempo de consulta: 1.37s Limitar resultados
  1. 2261
    Publicado 2003
    Tabla de Contenidos: “…4.3.2 Setting up the path and classpath variables -- 4.3.3 Compiling and running a JDK sample -- 4.3.4 Compiling and running a toolkit sample with the JDK -- 4.3.5 Packing an application in a jar file -- 4.4 Using WebSphere Studio Application Developer -- 4.4.1 Getting and installing WebSphere Studio Application Developer -- 4.4.2 Creating a project for Sametime development -- 4.4.3 Importing a sample program -- 4.4.4 Running a program -- 4.4.5 Debugging -- 4.4.6 Exporting a program in a JAR file -- 4.4.7 Importing the redbook samples from JAR files -- 4.5 Deploying a server application -- 4.5.1 JavaLauncher -- 4.5.2 Launching the server application -- Part 2 Community Server Toolkit samples -- Chapter 5. …”
    Libro electrónico
  2. 2262
    Publicado 2018
    Tabla de Contenidos: “…Bundling Stylesheets -- Minifying and Adding Sourcemaps -- More Things webpack Can Do -- Visual Studio 2017 and Build Systems -- The Bundler and Minifier Extension -- The Task Runner Explorer -- IntelliSense for Gulp -- Summary -- Chapter 7: Deploying ASP.NET Core -- The New Hosting Model of ASP.NET Core -- Installing on Internet Information Services On Premise -- Making Sure All Is Well -- Installing AspNetCoreModule -- Publishing Applications via the Command Line -- Creating the Website -- Publishing the Applications via Visual Studio -- Deploying on Azure -- Deploying to Azure from Visual Studio with Web Deploy -- Continuous Deployment to Azure with Git -- Configuring the Azure Web App -- Configuring the Local Repository -- Deploying to Docker Containers -- Installing the Docker Support -- Publishing a Docker Image -- Summary -- Chapter 8: Developing Outside of Windows -- Installing .NET Core on macOS -- Building the First ASP.NET Core App on macOS -- Using dotnet Command-Line Interface -- Using Yeoman -- Visual Studio Code -- Setting It Up -- Development Features in Visual Studio Code -- IntelliSense -- Refactoring -- Errors and Suggestions -- Debugging -- Version Control -- Tasks -- Other Features -- OmniSharp -- Other IDEs -- Using Command-line Tools -- Summary -- Chapter 9: Putting It All Together -- Building a Triathlon Race Results Web Site -- Building the Back-Office Site -- Setting Up Entity Framework -- The Object Model -- The EF Core Context -- Migrations -- Building CRUD Screens -- The Controller -- The View -- Building the Registration Page -- Showing Real-Time Results -- Creating the Angular Client-Side Application -- Building the Web APIs -- Connecting with IoT Devices -- Deploying -- Summary -- Index -- EULA…”
    Libro electrónico
  3. 2263
    Publicado 2023
    Tabla de Contenidos: “…Chapter 17: Git, Drush, Composer, and DevOps -- Technical requirements -- Git basics -- Setup -- Common commands -- Drush basics -- Setup -- Common commands -- Composer basics -- Setup -- Common commands -- DevOps practices -- A developer pushes a new commit to a development branch -- Developer reviews and merges code into the main branch -- Tag-based deployments for release candidates -- Addressing production deployments -- Summary -- Chapter 18: Module Development -- Concepts -- Early Drupal concepts -- Modern Drupal concepts -- Common patterns -- PHP patterns -- Symfony capabilities -- Drupal patterns -- Module definitions -- Configuration -- PHP code -- Templates -- Summary -- Chapter 19: Theme Development -- Technical requirements -- Setting up for theme development -- Disabling CSS and JS aggregation -- Setting up theme debugging and disabling caches -- Turning on verbose error messages -- Creating a new theme using the theme generator tool -- Creating a new theme from scratch -- Creating your dexter.info.yml -- Creating your dexter.libraries.yml file -- Creating your CSS directory and files -- Creating your templates directory -- Creating your JS directory -- Creating a new theme from a base theme (subtheming) -- Popular base themes -- Working with Libraries API (and where to put CSS/JS) -- Loading the library globally through your theme's *.info.yml file -- Attaching the library through a Twig template -- Loading the library programmatically through preprocess -- Overriding another module's or theme's libraries -- Managing dependencies -- Notes on CSS grouping -- Setting weights and other options -- Working with templates -- How to find and create templates -- Twig basics -- Twig filters -- Twig functions -- Working with the attributes object -- Preprocessing data and PHP -- Working with CSS -- Working with JS -- Drupal behaviors…”
    Libro electrónico
  4. 2264
    Publicado 2017
    Tabla de Contenidos: “…Intro -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Understanding the Serverless Model -- Introducing serverless -- Thinking serverless -- Serverless and PaaS -- IaaS and On-Premises -- The main goals of serverless -- Scalability -- Availability -- Cost efficiency -- The pros and cons of serverless -- Pros -- Reduced operational costs -- Focus on business -- System security -- Continuous delivery -- Microservices friendly -- Cost model -- Cons -- Higher latency -- Constraints -- Hidden inefficiencies -- Vendor dependency -- Debugging difficulties -- Atomic deploys -- Uncertainties -- Use cases -- Static websites -- Lean websites -- Small e-commerce websites -- Temporary websites -- Triggered processing -- Chatbots -- IoT backends -- Scheduled events -- Big Data -- What you should avoid -- Summary -- Chapter 2: Getting Started with AWS -- Amazon Web Services -- Handling user accounts and security -- AWS IAM -- Creating users and groups -- Sign in with a non-root user account -- Amazon Cognito -- Managing AWS resources -- AWS Management Console -- AWS SDKs -- AWS CLI -- AWS CloudFormation -- Amazon CloudWatch -- Frontend services -- Amazon S3 -- Using S3 with the CLI -- Amazon Route 53 -- Amazon CloudFront -- AWS Certificate Manager -- Messaging and notifications -- Amazon SNS -- AWS IoT -- Backend services -- AWS Lambda -- Creating a Lambda function -- Amazon API Gateway -- Expose your Lambda function using API Gateway -- Database services -- Amazon SimpleDB -- Amazon DynamoDB -- The serverless architecture of our online store -- Estimating costs -- Assumptions -- Route 53 pricing -- S3 pricing -- CloudFront pricing -- Certificate Manager pricing -- IAM pricing -- Cognito pricing -- IoT pricing -- SNS pricing -- CloudWatch pricing…”
    Libro electrónico
  5. 2265
    Publicado 2017
    Tabla de Contenidos: “…. -- Template -- Validate the template -- Build the AMI -- There's more... -- Debugging -- Orphaned resources -- Deregistering AMIs -- Other platforms -- Creating security groups -- Getting ready -- How to do it... -- There's more... -- Differences from traditional firewalls -- Creating a load balancer -- How to do it... -- How it works... -- There's more... -- HTTPS/SSL -- Path-based routing -- Chapter 5: Management Tools -- Introduction -- Auditing your AWS account -- How to do it... -- How it works... -- There's more... -- Recommendations with Trusted Advisor -- How to do it... -- How it works... -- There's more... -- Creating e-mail alarms -- How to do it... -- How it works... -- There's more... -- Existing topics -- Other subscriptions -- See also -- Publishing custom metrics in CloudWatch -- Getting ready -- How to do it... -- How it works... -- There's more... -- Cron -- Auto scaling -- Backfilling -- See also -- Creating monitoring dashboards -- Getting ready -- How to do it... -- There's more... -- Widget types -- See also -- Creating a budget -- Getting ready -- How to do it... -- How it works... -- Feeding log files into CloudWatch logs -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 6: Database Services -- Introduction -- Creating a database with automatic failover -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a NAT gateway -- Getting ready -- How to do it... -- How it works... -- See also -- Creating a database read-replica -- Getting ready -- How to do it... -- How it works... -- There's more... -- Promoting a read-replica to master -- Getting ready -- How to do it... -- Creating a one-time database backup -- Getting ready -- How to do it... -- Restoring a database from a snapshot -- Getting ready -- How to do it... -- There's more…”
    Libro electrónico
  6. 2266
    Publicado 2002
    Tabla de Contenidos:
    Libro electrónico
  7. 2267
    Publicado 2018
    Tabla de Contenidos: “…-- Time to say goodbye to SSL and early TLS -- SSL certificate component -- Root certificate -- Intermediate certificate -- SSL certificates classes -- TLS versus SSL -- Public Key Infrastructure -- Symmetric encryption -- Asymmetric encryption -- Hash function -- Attacks against PKI -- Microsoft Windows and IIS -- OpenSSL -- SSL Management tools -- Summary -- Questions -- Further reading -- Chapter 10: Firewall Placement and Detection Techniques -- Technical requirements -- Firewall and design considerations -- Firewall terminology -- Firewall generations -- Firewall performance -- Firewall placement and design network topology -- Single firewall architecture -- Single firewall architecture with a single IP subnet -- Single firewall architecture with multiple IP subnets -- Multilayer firewall architecture -- Firewall sandwich design -- Demilitarized Zone -- DMZ to Internal Access Policy -- OSI model versus TCP/IP model -- Firewall performance, capabilities, and function -- Firewall management -- Application proxies -- Detecting firewalls -- Debugging tools -- Summary -- Questions -- Further Reading -- Chapter 11: VPN and WAN Encryption -- Overview -- Classes of VPN -- Type of VPN protocol -- Point-to-Point tunneling protocol -- Layer 2 Tunneling Protocol -- Secure Socket Tunneling protocol -- Internet Protocol Security -- SSL VPN…”
    Libro electrónico
  8. 2268
    Publicado 2023
    Tabla de Contenidos: “…-- Creating tests for a simple ETL pipeline -- Unit testing -- Validation testing -- Integration testing -- End-to-end testing -- Performance testing -- Resilience testing -- Best practices for a testing environment for ETL pipelines -- Defining testing objectives -- Establishing a testing framework -- Automating ETL tests -- Monitoring ETL pipelines -- ETL testing challenges -- Data privacy and security -- Environment parity -- Top ETL testing tools -- Summary -- Chapter 14: Best Practices for ETL Pipelines -- Technical requirements -- Data quality -- Poor scalability -- Lack of error-handling and recovery methods -- ETL logging in Python -- Debugging and issue resolution -- Auditing and compliance -- Performance monitoring -- Including contextual information -- Handling exceptions and errors -- The Goldilocks principle -- Implementing logging in Python -- Checkpoint for recovery -- Avoiding SPOFs -- Modularity and auditing -- Modularity -- Auditing -- Summary -- Chapter 15: Use Cases and Further Reading -- Technical requirements…”
    Libro electrónico
  9. 2269
    por Kerim, Abdulrahman
    Publicado 2023
    Tabla de Contenidos: “…-- Applications of predictive analytics -- Predictive analytics issues with real data -- Partial and scarce training data -- Bias -- Cost -- Case studies of utilizing synthetic data for predictive analytics -- Provinzial and synthetic data -- Healthcare benefits from synthetic data in predictive analytics -- Amazon fraud transaction prediction using synthetic data -- Summary -- Chapter 13: Best Practices for Applying Synthetic Data -- Unveiling the challenges of generating and utilizing synthetic data -- Domain gap -- Data representation -- Privacy, security, and validation -- Trust and credibility -- Domain-specific issues limiting the usability of synthetic data -- Healthcare -- Finance -- Autonomous cars -- Best practices for the effective utilization of synthetic data -- Summary -- Part 5: Current Challenges and Future Perspectives -- Chapter 14: Synthetic-to-Real Domain Adaptation -- The domain gap problem in ML -- Sensitivity to sensors' variations -- Discrepancy in class and feature distributions -- Concept drift -- Approaches for synthetic-to-real domain adaptation -- Domain randomization -- Adversarial domain adaptation -- Feature-based domain adaptation -- Synthetic-to-real domain adaptation - issues and challenges -- Unseen domain -- Limited real data -- Computational complexity -- Synthetic data limitations -- Multimodal data complexity -- Summary -- Chapter 15: Diversity Issues in Synthetic Data -- The need for diverse data in ML -- Transferability -- Better problem modeling -- Security -- Process of debugging -- Robustness to anomalies -- Creativity -- Inclusivity -- Generating diverse synthetic datasets -- Latent space variations…”
    Libro electrónico
  10. 2270
    por Godse, Jay. author
    Publicado 2018
    “…After reading this book, you will have a deeper understanding of how to break data-processing problems into processing stages, each of which is understandable, debuggable, and composable, and how to combine the stages to solve your data-processing problem. …”
    Libro electrónico
  11. 2271
    Publicado 2012
    “…And through hands-on experiments, you’ll experience its internal behavior firsthand—knowledge you can apply to improve application design, debugging, system performance, and support. In Part 1, you will: Understand how core system and management mechanisms work—including the object manager, synchronization, Wow64, Hyper-V, and the registry Examine the data structures and activities behind processes, threads, and jobs Go inside the Windows security model to see how it manages access, auditing, and authorization Explore the Windows networking stack from top to bottom—including APIs, BranchCache, protocol and NDIS drivers, and layered services Dig into internals hands-on using the kernel debugger, performance monitor, and other tools…”
    Libro electrónico
  12. 2272
    Publicado 2018
    Tabla de Contenidos: “…Testing SSL configuration using Nmap -- Exploiting Heartbleed -- POODLE -- Custom encryption protocols -- Identifying encrypted and hashed information -- Hashing algorithms -- hash-identifier -- Frequency analysis -- Entropy analysis -- Identifying the encryption algorithm -- Common flaws in sensitive data storage and transmission -- Using offline cracking tools -- Using John the Ripper -- Using Hashcat -- Preventing flaws in cryptographic implementations -- Summary -- Chapter 9: AJAX, HTML5, and Client-Side Attacks -- Crawling AJAX applications -- AJAX Crawling Tool -- Sprajax -- The AJAX Spider - OWASP ZAP -- Analyzing the client-side code and storage -- Browser developer tools -- The Inspector panel -- The Debugger panel -- The Console panel -- The Network panel -- The Storage panel -- The DOM panel -- HTML5 for penetration testers -- New XSS vectors -- New elements -- New properties -- Local storage and client databases -- Web Storage -- IndexedDB -- Web Messaging -- WebSockets -- Intercepting and modifying WebSockets -- Other relevant features of HTML5 -- Cross-Origin Resource Sharing (CORS) -- Geolocation -- Web Workers -- Bypassing client-side controls -- Mitigating AJAX, HTML5, and client-side vulnerabilities -- Summary -- Chapter 10: Other Common Security Flaws in Web Applications -- Insecure direct object references -- Direct object references in web services -- Path traversal -- File inclusion vulnerabilities -- Local File Inclusion -- Remote File Inclusion -- HTTP parameter pollution -- Information disclosure -- Mitigation -- Insecure direct object references -- File inclusion attacks -- HTTP parameter pollution -- Information disclosure -- Summary -- Chapter 11: Using Automated Scanners on Web Applications -- Considerations before using an automated scanner -- Web application vulnerability scanners in Kali Linux -- Nikto -- Skipfish…”
    Libro electrónico
  13. 2273
    Publicado 2021
    Tabla de Contenidos: “…-- Internal Penetration Testing Teams -- External Penetration Testing Teams -- Selecting Penetration Testing Teams -- The CompTIA Penetration Testing Process -- Planning and Scoping -- Information Gathering and Vulnerability Scanning -- Attacks and Exploits -- Reporting and Communication -- Tools and Code Analysis -- The Cyber Kill Chain -- Reconnaissance -- Weaponization -- Delivery -- Exploitation -- Installation -- Command and Control -- Actions on Objectives -- Tools of the Trade -- Reconnaissance -- Vulnerability Scanners -- Social Engineering -- Credential Testing Tools -- Debuggers and Software Testing Tools -- Network Testing -- Remote Access -- Exploitation -- Steganography -- Cloud Tools -- Summary -- Exam Essentials -- Lab Exercises -- Activity 1.1: Adopting the Hacker Mindset -- Activity 1.2: Using the Cyber Kill Chain -- Review Questions -- Chapter 2 Planning and Scoping Penetration Tests…”
    Libro electrónico
  14. 2274
    Publicado 2017
    Tabla de Contenidos: “…-- Finding the module you need -- Using r10k -- Understanding the Puppetfile -- Managing dependencies with generate-puppetfile -- Using modules in your manifests -- Using puppetlabs/mysql -- Using puppetlabs/apache -- Using puppet/archive -- Exploring the standard library -- Safely installing packages with ensure_packages -- Modifying files in place with file_line -- Introducing some other useful functions -- The pry debugger -- Writing your own modules -- Creating a repo for your module -- Writing the module code -- Creating and validating the module metadata -- Tagging your module -- Installing your module -- Applying your module -- More complex modules -- Uploading modules to the Puppet Forge -- Summary -- Chapter 8: Classes, roles, and profiles -- Classes -- The class keyword -- Declaring parameters to classes -- Automatic parameter lookup from Hiera data -- Parameter data types -- Available data types -- Range parameters -- Content type parameters…”
    Libro electrónico
  15. 2275
    Publicado 2017
    Tabla de Contenidos: “…-- Finding the module you need -- Using r10k -- Understanding the Puppetfile -- Managing dependencies with generate-puppetfile -- Using modules in your manifests -- Using puppetlabs/mysql -- Using puppetlabs/apache -- Using puppet/archive -- Exploring the standard library -- Safely installing packages with ensure_packages -- Modifying files in place with file_line -- Introducing some other useful functions -- The pry debugger -- Writing your own modules -- Creating a repo for your module -- Writing the module code -- Creating and validating the module metadata -- Tagging your module -- Installing your module -- Applying your module -- More complex modules -- Uploading modules to Puppet Forge -- Summary -- Chapter 8: Classes, roles, and profiles -- Classes -- The class keyword -- Declaring parameters to classes -- Automatic parameter lookup from Hiera data -- Parameter data types -- Available data types…”
    Libro electrónico
  16. 2276
    Publicado 2015
    Tabla de Contenidos:
    Libro electrónico
  17. 2277
    Publicado 2023
    Tabla de Contenidos: “…Handling forms in React and Flask -- Troubleshooting tips for the React frontend and the Flask backend -- Summary -- Chapter 11: Fetching and Displaying Data in a React-Flask Application -- Technical requirements -- Fetching and displaying data - the React-Flask approach -- Retrieving the speakers' list from Flask -- Displaying data in React -- Adding data to a database - the React-Flask approach -- Adding data to Flask -- Adding the speaker data to the backend using the CreateSpeaker component -- Editing data - the React-Flask approach -- Editing data in Flask -- Displaying the edited data in React -- Deleting data from a database - the React-Flask approach -- Handling delete requests in Flask -- Handling delete requests in React -- Managing pagination in a React-Flask application -- Summary -- Chapter 12: Authentication and Authorization -- Technical requirements -- Understanding the fundamentals of information security -- Defining authentication and the authentication role in web application -- Implementing password security and hashing passwords -- Understanding access and authorization in web application development -- Adding authentication to your Flask application -- Flask backend -- React frontend -- Identifying system users and managing their information -- Session management -- Flask backend -- React Frontend -- Creating a password-protected dashboard -- Flask backend -- React frontend -- Implementing flash messages in Flask -- Flask backend -- React frontend -- Summary -- Chapter 13: Error Handling -- Technical requirements -- Using the Flask debugger -- Creating error handlers -- Flask backend -- React frontend -- Creating custom error pages -- Tracking events in your application -- Sending error emails to administrators -- Summary -- Chapter 14: Modular Architecture - Harnessing the Power of Blueprints -- Technical requirements…”
    Libro electrónico
  18. 2278
    Publicado 2018
    Tabla de Contenidos: “…-- FP techniques -- Composition -- Partial application -- Currying -- Pipes -- Pointfree style -- Recursion -- Category theory -- Functor -- Applicative -- Maybe -- Either -- Monad -- Real-world FP -- Immutable.js -- Ramda -- React and MobX -- Summary -- Chapter 8: Working with Decorators -- Prerequisites -- Annotations versus decorators -- The class decorators -- The method decorators -- The property decorators -- The parameter decorators -- Decorators with arguments -- The reflect metadata API -- The decorator factory -- Summary -- Chapter 9: Automating Your Development Workflow -- A modern development workflow -- Prerequisites -- Node.js -- Visual Studio Code -- Git and GitHub -- Companion source code -- Source control tools -- Package management tools -- The TypeScript compiler -- Linting tools -- Working with npm scripts -- Gulp -- Controlling the gulp task execution order -- Passing in a callback to the task definition function -- Returning a promise -- Returning a stream -- Webpack -- Webpack development server -- Unit testing and test coverage -- Visual Studio Code -- Quick fixes -- Debugging utilities -- Source control utilities -- ts-node -- Continuous integration (CI) tools -- Scaffolding tools -- Why does the command line win? …”
    Libro electrónico
  19. 2279
    Publicado 2018
    Tabla de Contenidos: “…Why you should never invoke compaction manually -- Adjusting compaction throughput due to available resources -- Summary -- Chapter 7: Monitoring -- JMX interface -- MBean packages exposed by Cassandra -- JConsole (GUI) -- Connection and overview -- Viewing metrics -- Performing an operation -- JMXTerm (CLI) -- Connection and domains -- Getting a metric -- Performing an operation -- The nodetool utility -- Monitoring using nodetool -- describecluster -- gcstats -- getcompactionthreshold -- getcompactionthroughput -- getconcurrentcompactors -- getendpoints -- getlogginglevels -- getstreamthroughput -- gettimeout -- gossipinfo -- info -- netstats -- proxyhistograms -- status -- tablestats -- tpstats -- verify -- Administering using nodetool -- cleanup -- drain -- flush -- resetlocalschema -- stopdaemon -- truncatehints -- upgradeSSTable -- Metric stack -- Telegraf -- Installation -- Configuration -- JMXTrans -- Installation -- Configuration -- InfluxDB -- Installation -- Configuration -- InfluxDB CLI -- Grafana -- Installation -- Configuration -- Visualization -- Alerting -- Custom setup -- Log stack -- The system/debug/gc logs -- Filebeat -- Installation -- Configuration -- Elasticsearch -- Installation -- Configuration -- Kibana -- Installation -- Configuration -- Troubleshooting -- High CPU usage -- Different garbage-collection patterns -- Hotspots -- Disk performance -- Node flakiness -- All-in-one Docker -- Creating a database and other monitoring components locally -- Web links -- Summary -- Chapter 8: Application Development -- Getting started -- The path to failure -- Is Cassandra the right database? …”
    Libro electrónico
  20. 2280
    Publicado 2017
    Tabla de Contenidos: “…-- The Vuex Store -- The state is the source of truth -- Mutations update the state -- Strict mode -- Time-travel debugging -- Getters compute and return data -- Actions for store operations -- Mapping helpers -- User state -- Setting up Google OAuth -- Login button -- User in the store -- Adapting the router -- Adapting the fetch plugin -- Check the user session on start -- The profile picture -- Synchronizing the store and the router -- Embedding Google Maps -- Installation -- Getting the API key -- Installing the library -- Adding a map -- Connecting the BlogMap and the store -- Vuex modules…”
    Libro electrónico