Domain txnm.de kaufen?

Produkte zum Begriff Applications:


  • 8088 and 8086 Microprocessors, The: Programming, Interfacing, Software, Hardware, and Applications
    8088 and 8086 Microprocessors, The: Programming, Interfacing, Software, Hardware, and Applications

    The full text downloaded to your computer With eBooks you can: search for key concepts, words and phrases make highlights and notes as you study share your notes with friends eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps. Upon purchase, you'll gain instant access to this eBook. Time limit The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed. For one or two-semester courses in Microprocessors or Intel 16-32 Bit Chips. Future designers of microprocessor-based electronic equipment need a systems-level understanding of the 80x86 microcomputer. This text offers thorough, balanced, and practical coverage of both software and hardware topics. Basic concepts are developed using the 8088 and 8086 microprocessors, but the 32-bit versions of the 80x86 family are also discussed. The authors examine how to assemble, run, and debug programs, and how to build, test, and troubleshoot interface circuits.

    Preis: 47.07 € | Versand*: 0 €
  • Securing PHP Web Applications
    Securing PHP Web Applications

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.Easy, Powerful Code Security Techniques for Every PHP Developer   Hackers specifically target PHP Web applications. Why? Because they know many of these apps are written by programmers with little or no experience or training in software security. Don’t be victimized. Securing PHP Web Applications will help you master the specific techniques, skills, and best practices you need to write rock-solid PHP code and harden the PHP software you’re already using.   Drawing on more than fifteen years of experience in Web development, security, and training, Tricia and William Ballad show how security flaws can find their way into PHP code, and they identify the most common security mistakes made by PHP developers. The authors present practical, specific solutions–techniques that are surprisingly easy to understand and use, no matter what level of PHP programming expertise you have.   Securing PHP Web Applications covers the most important aspects of PHP code security, from error handling and buffer overflows to input validation and filesystem access. The authors explode the myths that discourage PHP programmers from attempting to secure their code and teach you how to instinctively write more secure code without compromising your software’s performance or your own productivity.   Coverage includes Designing secure applications from the very beginning–and plugging holes in applications you can’t rewrite from scratch Defending against session hijacking, fixation, and poisoning attacks that PHP can’t resist on its own Securing the servers your PHP code runs on, including specific guidance for Apache, MySQL, IIS/SQL Server, and more Enforcing strict authentication and making the most of encryption Preventing dangerous cross-site scripting (XSS) attacks Systematically testing yourapplications for security, including detailed discussions of exploit testing and PHP test automation Addressing known vulnerabilities in the third-party applications you’re already running Tricia and William Ballad demystify PHP security by presenting realistic scenarios and code examples, practical checklists, detailed visuals, and more. Whether you write Web applications professionally or casually, or simply use someone else’s PHP scripts, you need this book–and you need it now, before the hackers find you!

    Preis: 23.53 € | Versand*: 0 €
  • Model-Based Development: Applications
    Model-Based Development: Applications

    A Proven Development Methodology That Delivers On the Promise of Model-Based Approaches Software continues to become more and more complex, while software consumers’ expectations for performance, reliability, functionality, and speed-to-market are also growing exponentially. H. S. Lahman shows how to address all these challenges by integrating proven object-oriented techniques with a powerful new methodology.   Model-Based Development represents Lahman’s half century of experience as a pioneering software innovator. Building on Shlaer-Mellor’s work, Lahman’s unique approach fully delivers on the promise of models and is firmly grounded in the realities of contemporary development, design, and architecture. The book introduces the methodology’s core principles, showing how it separates each of a project’s concerns, enabling practitioners to optimize each domain for its unique needs and characteristics. Next, it demonstrates how to perform more effective object-oriented analysis, emphasizing abstraction, disciplined partitioning, modeling invariants, finite state machines, and efficient communications among program units.   Coverage includes How we got here: a historical perspective and pragmatic review of object principles Problem space versus computing space: reflecting crucial distinctions between customer and computer environments in your designsApplication partitioning: why it matters and how do it wellBuilding static models that describe basic application structureModeling classes, class responsibilities, associations, and both referential and knowledge integrityCreating dynamic models that describe behavior via finite state machinesSuccessfully using abstract action languages (AALs) and action data flow diagrams (ADFDs)   Throughout, Lahman illuminates theoretical issues in practical terms, explaining why things are done as they are, without demanding rigorous math. His focus is on creating implementation-independent models that resolve functional requirements completely, precisely, and unambiguously. Whether you’re a developer, team leader, architect, or designer, Lahman’s techniques will help you build software that’s more robust, easier to maintain, supports larger-scale reuse, and whose specification is rigorous enough to enable full-scale automatic code generation.

    Preis: 34.23 € | Versand*: 0 €
  • Core Python Applications Programming
    Core Python Applications Programming

    Already know Python but want to learn more? A lot more? Dive into a variety of topics used in practice for real-world applications. Covers regular expressions, Internet/network programming, GUIs, SQL/databases/ORMs, threading, and Web development.Learn about contemporary development trends such as Google+, Twitter, MongoDB, OAuth, Python 3 migration, and Java/Jython. Presents brand new material on Django, Google App Engine, CSV/JSON/XML, and Microsoft Office. Includes Python 2 and 3 code samples to get you started right away!Provides code snippets, interactive examples, and practical exercises to help build your Python skills. The Complete Developer’s Guide to Python Python is an agile, robust, and expressive programming language that continues to build momentum. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. In Core Python Applications Programming, Third Edition, leading Python developer and corporate trainer Wesley Chun helps you take your Python knowledge to the next level.   This book has everything you need to become a versatile Python developer. You will be introduced to multiple areas of application development and gain knowledge that can be immediately applied to projects, and you will find code samples in both Python 2 and 3, including migration tips if that’s on your roadmap too. Some snippets will even run unmodified on 2.x or 3.x.   Learn professional Python style, best practices, and good programming habits Build clients and servers using TCP, UDP, XML-RPC, and be exposed to higher-level libraries like SocketServer and Twisted Develop GUI applications using Tkinter and other available toolkits Improve application performance by writing extensions in C/C++, or enhance I/O-bound code with multithreading Discover SQL and relational databases, ORMs, and even non-relational (NonSQL) databases like MongoDB Learn the basics of Web programming, including Web clients and servers, plus CGI and WSGI Expose yourself to regular expressions and powerful text processing tools for creating and parsing CSV, JSON, and XML data Interface with popular Microsoft Office applications such as Excel, PowerPoint, and Outlook using COM client programming Dive deeper into Web development with the Django framework and cloud computing with Google App Engine Explore Java programming with Jython, the way to run Python code on the JVM Connect to Web services Yahoo! Finance to get stock quotes, or Yahoo! Mail, Gmail, and others to download or send e-mailJump into the social media craze by learning how to connect to the Twitter and Google+ networks   Core Python Applications Programming, Third Edition, delivers Broad coverage of a variety of areas of development used in real-world applications today Powerful insights into current and best practices for the intermediate Python programmer Dozens of code examples, from quick snippets to full-fledged applications A variety of exercises at the end of every chapter to help hammer the concepts home

    Preis: 33.16 € | Versand*: 0 €
  • Was ist die nachfolgende Technologie für HTML Applications (HTA)?

    Die nachfolgende Technologie für HTML Applications (HTA) ist die Progressive Web App (PWA). PWAs sind Webanwendungen, die sich wie native Apps verhalten und auf verschiedenen Plattformen und Geräten funktionieren. Sie bieten eine bessere Benutzererfahrung und können offline verwendet werden.

  • Wie kann ich OOP (Objektorientierte Programmierung) mit VBA (Visual Basic for Applications) umsetzen?

    Um OOP mit VBA umzusetzen, kannst du Klassen erstellen, die Eigenschaften und Methoden enthalten. Du kannst dann Objekte dieser Klassen erstellen und auf ihre Eigenschaften und Methoden zugreifen. Du kannst auch Vererbung verwenden, um Klassen zu erweitern und gemeinsame Eigenschaften und Methoden zu erben.

  • Software oder Hardware?

    Die Entscheidung zwischen Software und Hardware hängt von verschiedenen Faktoren ab. Software bietet oft mehr Flexibilität und Anpassungsmöglichkeiten, während Hardware möglicherweise eine bessere Leistung und Stabilität bietet. Letztendlich hängt die Wahl von den spezifischen Anforderungen und Zielen des Projekts ab.

  • Kann die Hardware ohne Software funktionieren?

    Nein, die Hardware kann ohne Software nicht funktionieren. Die Hardware ist die physische Komponente eines Computers oder Geräts, während die Software die Programme und Anwendungen sind, die auf der Hardware ausgeführt werden. Ohne Software kann die Hardware keine Anweisungen erhalten und keine Aufgaben ausführen.

Ähnliche Suchbegriffe für Applications:


  • Google Web Toolkit Applications
    Google Web Toolkit Applications

    “Ryan clearly understands the GWT value proposition and how GWT integrates into a diverse web technology stack—and not just in a theoretical way. With the popularity of gpokr.com and kdice.com, Ryan can speak with the authority of concrete success.” —Bruce Johnson, creator of Google Web Toolkit “This book distinguishes itself from other books on GWT in that it walks through the entire process of building several nontrivial GWT applications, not the toy applications that most books present.” —R. Mark Volkmann, Object Computing, Inc. “Google™ Web Toolkit Applications is an excellent resource for any GWT developer. Solutions to challenges commonly encountered in GWT are presented through the design and development of actual applications. The applications developed throughout the text demonstrate best practices from simple UI design all the way to custom code generation, and are presented with little pretext about the amount of Java knowledge a given developer may have. Advanced concepts are not withheld but are presented in a way that will be understood by both novice and seasoned developers alike. Good application development practices and proper Model View Controller design is reinforced throughout the book, nearly guaranteeing that the reader will come away a better programmer. “ —Jason Essington, Senior Web/Java Engineer, Green River Computing “Dewsbury’s Google™ Web Toolkit Applications is a book for both experts and beginner programmers who want to discover this open source Java software development framework, as well as write Ajax applications. A very detailed book!” —Massimo Nardone, Advisory IT Security Architect Accelerate and Simplify Ajax Development with Google Web Toolkit Get the edge you need to deliver exceptional user experiences with Google™ Web Toolkit Applications, a guidebook that provides web developers with core information and instructions for creating rich web applications. Whether you’re a developer who needs to build a high-performance front end for Java, PHP, or Ruby applications, or to integrate with external web services, this resource from expert Google Web Toolkit (GWT) developer Ryan Dewsbury delivers the in-depth coverage you’ll need. In this valuable book, insider Ryan Dewsbury provides instructions for using the robust tool set and gets you on your way to creating first-class web applications by providing a comprehensive overview of GWT technology. In addition, he shares his “in-the-trenches” insights on Building elegant and responsive user interfaces with Cascading Style Sheets and GWT’s Widgets and Panels Creating seamless user experiences through asynchronous communication with HTTP, REST, JSON/JSONP, and RPC Interoperating with web standards—such as XML, RSS, and Atom—and web services—such as Google Maps, Amazon Books, Yahoo! Search, Flickr, and Blogger Overcoming browser security restrictions, such as HTTP’s two-connection limit and the Same-Origin policy Accelerating development, using software engineering, code generation, internationalization, application patterns, and Java tools Deploying for optimal performance with resource compression and caching Building five non-trivial applications: a gadget application with a rich drag-and-drop interface, a multi-search application that makes requests to many search engines, a blog editor application for managing entries across multiple blogs, a web-based instant messenger, and a database manager for a traditional web page This practical guide to GWT introduces you to the technology; provides techniques, tips, and examples; and puts you on the road to delivering top-notch user experiences for your web applications.

    Preis: 22.46 € | Versand*: 0 €
  • Securing PHP Web Applications
    Securing PHP Web Applications

    Easy, Powerful Code Security Techniques for Every PHP Developer   Hackers specifically target PHP Web applications. Why? Because they know many of these apps are written by programmers with little or no experience or training in software security. Don’t be victimized. Securing PHP Web Applications will help you master the specific techniques, skills, and best practices you need to write rock-solid PHP code and harden the PHP software you’re already using.   Drawing on more than fifteen years of experience in Web development, security, and training, Tricia and William Ballad show how security flaws can find their way into PHP code, and they identify the most common security mistakes made by PHP developers. The authors present practical, specific solutions—techniques that are surprisingly easy to understand and use, no matter what level of PHP programming expertise you have.   Securing PHP Web Applications covers the most important aspects of PHP code security, from error handling and buffer overflows to input validation and filesystem access. The authors explode the myths that discourage PHP programmers from attempting to secure their code and teach you how to instinctively write more secure code without compromising your software’s performance or your own productivity.   Coverage includes Designing secure applications from the very beginning—and plugging holes in applications you can’t rewrite from scratch Defending against session hijacking, fixation, and poisoning attacks that PHP can’t resist on its own Securing the servers your PHP code runs on, including specific guidance for Apache, MySQL, IIS/SQL Server, and more Enforcing strict authentication and making the most of encryption Preventing dangerous cross-site scripting (XSS) attacks Systematically testing yourapplications for security, including detailed discussions of exploit testing and PHP test automation Addressing known vulnerabilities in the third-party applications you’re already running Tricia and William Ballad demystify PHP security by presenting realistic scenarios and code examples, practical checklists, detailed visuals, and more. Whether you write Web applications professionally or casually, or simply use someone else’s PHP scripts, you need this book—and you need it now, before the hackers find you!

    Preis: 18.18 € | Versand*: 0 €
  • Fluid Power with Applications
    Fluid Power with Applications

    For sophomore- or junior-level courses in Fluid Power, Hydraulics, and Pneumatics in two- or four-year Engineering Technology and Industrial Technology programs.   Fluid Power with Applications presents broad coverage of fluid power technology in a readable and understandable fashion. An extensive array of industrial applications is provided to motivate and stimulate students' interest in the field. Balancing theory and applications, this text is updated to reflect current technology; it focuses on the design, analysis, operation, and maintenance of fluid power systems. The full text downloaded to your computer With eBooks you can: search for key concepts, words and phrases make highlights and notes as you study share your notes with friends eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps. Upon purchase, you'll gain instant access to this eBook. Time limit The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed.

    Preis: 47.07 € | Versand*: 0 €
  • Core Python Applications Programming
    Core Python Applications Programming

    Already know Python but want to learn more? A lot more? Dive into a variety of topics used in practice for real-world applications. Covers regular expressions, Internet/network programming, GUIs, SQL/databases/ORMs, threading, and Web development.Learn about contemporary development trends such as Google+, Twitter, MongoDB, OAuth, Python 3 migration, and Java/Jython. Presents brand new material on Django, Google App Engine, CSV/JSON/XML, and Microsoft Office. Includes Python 2 and 3 code samples to get you started right away!Provides code snippets, interactive examples, and practical exercises to help build your Python skills. The Complete Developer’s Guide to Python Python is an agile, robust, and expressive programming language that continues to build momentum. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. In Core Python Applications Programming, Third Edition, leading Python developer and corporate trainer Wesley Chun helps you take your Python knowledge to the next level.   This book has everything you need to become a versatile Python developer. You will be introduced to multiple areas of application development and gain knowledge that can be immediately applied to projects, and you will find code samples in both Python 2 and 3, including migration tips if that’s on your roadmap too. Some snippets will even run unmodified on 2.x or 3.x.   Learn professional Python style, best practices, and good programming habits Build clients and servers using TCP, UDP, XML-RPC, and be exposed to higher-level libraries like SocketServer and Twisted Develop GUI applications using Tkinter and other available toolkits Improve application performance by writing extensions in C/C++, or enhance I/O-bound code with multithreading Discover SQL and relational databases, ORMs, and even non-relational (NonSQL) databases like MongoDB Learn the basics of Web programming, including Web clients and servers, plus CGI and WSGI Expose yourself to regular expressions and powerful text processing tools for creating and parsing CSV, JSON, and XML data Interface with popular Microsoft Office applications such as Excel, PowerPoint, and Outlook using COM client programming Dive deeper into Web development with the Django framework and cloud computing with Google App Engine Explore Java programming with Jython, the way to run Python code on the JVM Connect to Web services Yahoo! Finance to get stock quotes, or Yahoo! Mail, Gmail, and others to download or send e-mailJump into the social media craze by learning how to connect to the Twitter and Google+ networks   Core Python Applications Programming, Third Edition, delivers Broad coverage of a variety of areas of development used in real-world applications today Powerful insights into current and best practices for the intermediate Python programmer Dozens of code examples, from quick snippets to full-fledged applications A variety of exercises at the end of every chapter to help hammer the concepts home

    Preis: 25.67 € | Versand*: 0 €
  • Welche Hardware und Software benötigt man?

    Um Computer zu betreiben, benötigt man in der Regel Hardware wie einen Prozessor, Arbeitsspeicher, eine Festplatte oder SSD, eine Grafikkarte, eine Tastatur und eine Maus. Zusätzlich benötigt man ein Betriebssystem wie Windows, macOS oder Linux, um den Computer zu steuern und Programme auszuführen. Je nach Anwendungsbereich können auch weitere Softwareprogramme wie Office-Anwendungen, Bildbearbeitungsprogramme oder Spiele benötigt werden.

  • Ist eine Firewall Hardware oder Software?

    Ist eine Firewall Hardware oder Software? Eine Firewall kann sowohl Hardware als auch Software sein, je nachdem, wie sie implementiert ist. Eine Hardware-Firewall ist ein physisches Gerät, das zwischen einem internen Netzwerk und dem Internet platziert wird, um den Datenverkehr zu überwachen und zu kontrollieren. Eine Software-Firewall hingegen ist ein Programm, das auf einem Computer oder Server installiert ist und den Datenverkehr auf diesem Gerät überwacht und filtert. Beide Arten von Firewalls haben ihre eigenen Vor- und Nachteile und können je nach den Anforderungen und der Infrastruktur eines Unternehmens eingesetzt werden. Letztendlich ist es wichtig, dass Unternehmen sowohl Hardware- als auch Software-Firewalls verwenden, um ihre Netzwerke und Daten vor Bedrohungen zu schützen.

  • Kann eine Software die Hardware beschädigen?

    Kann eine Software die Hardware beschädigen? Ja, in bestimmten Fällen kann eine fehlerhafte oder bösartige Software die Hardware eines Computers beschädigen. Zum Beispiel kann eine Software, die die CPU überlastet, zu Überhitzung führen und die Hardware beschädigen. Ebenso können Viren oder Malware die Festplatte oder andere Komponenten angreifen und beschädigen. Es ist wichtig, sicherzustellen, dass die verwendete Software vertrauenswürdig ist und regelmäßig aktualisiert wird, um solche Probleme zu vermeiden. Letztendlich kann eine Software, wenn sie nicht ordnungsgemäß entwickelt oder verwendet wird, die Hardware eines Computers beschädigen.

  • Was ist eine Hardware und Software?

    Eine Hardware bezieht sich auf die physischen Bestandteile eines Computers oder elektronischen Geräts, wie zum Beispiel Prozessor, Speicher, Grafikkarte und Festplatte. Diese Komponenten ermöglichen es dem Gerät, zu funktionieren und Aufgaben auszuführen. Auf der anderen Seite bezieht sich die Software auf Programme und Anwendungen, die auf der Hardware laufen und es ermöglichen, bestimmte Aufgaben zu erledigen. Beispiele für Software sind Betriebssysteme wie Windows oder macOS, Anwendungssoftware wie Microsoft Office oder Spiele. Hardware und Software arbeiten zusammen, um ein funktionierendes System zu bilden. Die Hardware liefert die physische Plattform, auf der die Software ausgeführt wird, während die Software die Anweisungen und Daten bereitstellt, die von der Hardware verarbeitet werden. Ohne die richtige Software kann die Hardware nicht effektiv genutzt werden, und ohne die richtige Hardware kann die Software nicht ausgeführt werden.

* Alle Preise verstehen sich inklusive der gesetzlichen Mehrwertsteuer und ggf. zuzüglich Versandkosten. Die Angebotsinformationen basieren auf den Angaben des jeweiligen Shops und werden über automatisierte Prozesse aktualisiert. Eine Aktualisierung in Echtzeit findet nicht statt, so dass es im Einzelfall zu Abweichungen kommen kann.