Showing 381 - 400 results of 509 for search '"Statelessness"', query time: 0.09s Refine Results
  1. 381

    Implementing Cisco UCS Solutions. by Ahmed, Farhan

    Published 2013
    Table of Contents: “…Cover; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Cisco UCS Physical Architecture and Installing UCS Hardware; Looking at the UCS equipment; Stateless computing; Rapid provisioning of servers; Simplified troubleshooting; Virtualization readiness; Choice of industry-standard form factors; Extended memory technology for increased density; Understanding the physical architecture of UCS; The Cisco UCS FIs; The Cisco UCS blade servers; The Cisco UCS rack-mount servers; Understanding FIs; The Cisco 6296UP FI.…”
    CONNECT
    Electronic eBook
  2. 382

    Requirements modelling and specification for service oriented architecture / by Graham, Ian, 1948-

    Published 2008
    Table of Contents: “…2.1.1 Architecture as High Level Structure; 2.1.2 Architecture as Design Rationale or Vision; 2.1.3 Architecture and Reuse; 2.2 Architecture through the Ages; 2.3 Objects and Components; 2.3.1 Components for Flexibility; 2.3.2 Large-Scale Connectors; 2.3.3 How Services Relate to Components; 2.4 Architecture and SOA; 2.5 Stateless Services; 2.6 Practical Principles for Developing, Maintaining and Exploiting SOA; 2.7 Summary; 2.8 Bibliographical Notes; 3 Approaches to Requirements Engineering; 3.1 Conventional Approaches; 3.1.1 Approaches Based on Human Factors…”
    CONNECT
    Electronic eBook
  3. 383

    Encyclopedia of modern ethnic conflicts /

    Published 2016
    Table of Contents: “…. -- Canada: The Nationalism Movement in Quebec / Saul Newman -- Central Europe: The Romany: A Stateless Minority in a World of States / Joseph R. …”
    CONNECT
    Electronic eBook
  4. 384

    A history of American crime fiction /

    Published 2017
    Table of Contents: “…Journalism and Popular Depictions of Crime: Sensationalism to Science -- Seen and Unseen: Criminology and Surveillance in Realist Fiction -- Culture, Perception, and the Redefinition of Criminality -- Works Cited -- Part IV Modernist Era -- Chapter 11 Criminal Modernism -- Detection and Modernism -- Modernist Criminals -- Criminal Modernism -- Works Cited -- Chapter 12 American Golden Age Crime Fiction -- Works Cited -- Chapter 13 Red Harvest: Hard- Boiled Crime Fiction and the Fate of Left Populism -- Works Cited -- Chapter 14 Stateless Mothers/Motherless States: The Femme Fatale on the Threshold of American Citizenship -- Works Cited -- Chapter 15 One of Us: The Emergence of the Psychopathological Protagonist -- Works Cited -- Part V Postmodernist Era -- Chapter 16 Unusual Suspects: American Crimes, Metaphysical Detectives, Postmodernist Genres -- Fraternal Twins -- Missing Persons -- Clinical Cases -- Secret Histories -- Whodunit Hoodoo -- Popular Pastiches -- Speculative Detectives -- Toxic Terror -- Neuro-Noir -- Polymorphous Detection -- Works Cited -- Chapter 17 Identity Politics and Crime Fiction -- Dramas of Identity -- Dramas of Neoliberalism -- Works Cited -- Chapter 18 Native American Detective Fiction and Settler Colonialism -- Violent Crime in Native American Literary History -- The Golden Age Roots of Native American Detective Fiction -- Contemporary Native Detective Fiction -- Communitism and Survivance in Native American Detective Fiction -- Works Cited -- Chapter 19 African-American Crime and Detective Fiction -- Works Cited -- Chapter 20 Criminal Family Drama before and after The Sopranos -- Works Cited -- Chapter 21 Making Murderers: The Evolution of True Crime -- Works Cited -- Chapter 22 Spy Narratives in post-9/11 American Culture -- Premediation -- Surveillance -- Sovereignty -- Works Cited -- Chapter 23 Film Noir and Neo-Noir.…”
    CONNECT
    Electronic eBook
  5. 385

    Encyclopedia of human rights issues since 1945 / by Langley, Winston

    Published 1999
    Table of Contents: “…Dedication -- Preface -- Introduction -- Abbreviations -- Users' Guide -- Significant Dates in the Field of Human Rights -- Appendix A: Selected Human Rights Groups -- Appendix B: the International Bill of Human Rights -- Appendix C: Convention on the Rights of the Child -- Glossary -- About the Author -- Abortion -- Academic Freedom and Human Rights -- Adjudication -- Advisory Services in the Field of Human Rights -- Affirmative Action -- Afghanistan -- African Charter on Human and Peoples' Rights -- Age of Consent -- AIDS and Human Rights -- Algeria -- Aliens -- American Convention on Human Rights -- American Declaration of the Rights and Duties of Man -- Amnesty International -- Amnesty Laws -- Apartheid -- Arab World and Human Rights -- Arbitrary Arrest and Detention -- Armed Conflict -- Asian Values -- Assembly and Association -- Associated Country Women of the World -- Asylum -- Atlantic Charter -- Australia -- Bahai International Community -- Bangkok Declaration -- Bangladesh -- B'nai B'rith International -- Bonded Labor -- Bosnia-Herzegovina -- Brazil -- Burma -- Business Corporations and Human Rights -- Cambodia -- Canada -- Capital Punishment -- Carter, Jimmy (James Earl, Jr.) (1924- ) -- Centre for Human Rights -- Charter 77 -- Chechnya -- Child Labor -- Child, Rights of -- Chile -- China -- Civil and Political Rights -- Cloning and Biomedicine -- Code of Conduct for Law Enforcement Officials -- Collectivization -- Commission on Human Rights -- Commission on the Status of Women -- Committee Against Torture -- Committee of Ministers of the Council of Europe -- Committee on Economic, Social and Cultural Rights -- Committee on Nongovernmental Organizations -- Committee on the Elimination of Discrimination Against Women -- Committee on the Elimination of Racial Discrimination -- Committee on the Exercise of the Inalienable Rights of the Palestinian People -- Compensation for Victims of Human Rights Abuse -- Conditionality -- Convention Against Discrimination in Education -- Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment -- Convention Concerning Equal Opportunities and Equal Treatment for Men and Women Workers: Workers with Family Responsibilities -- Convention Concerning Equal Remuneration for Men and Women Workers for Work of Equal Value -- Convention Concerning Maternity Protection -- Convention for the Suppression of the Traffic in Persons and the Exploitation of the Prostitution of Others -- Convention on Consent to Marriage, Minimum Age for Marriage and Registration of Marriages -- Convention on Human Rights and Biomedicine -- Convention on the Elimination of All Forms of Discrimination Against Women -- Convention on the Nationality of Married Women -- Convention on the Non-Applicability of the Statutory Limitations to War Crimes and Crimes Against Humanity -- Convention on the Political Rights of Women -- Convention on the Prevention and Punishment of the Crime of Genocide -- Convention on the Reduction of Statelessness -- Convention on the Rights of the Child -- Convention Relating to the Status of Refugees -- Convention Relating to the Status of Stateless Persons -- Council of Europe -- Crimes Against Humanity -- Crimes Against Peace -- Cuba -- Cultural Life -- Dalai Lama -- Death Squads -- Declaration Concerning Essentials of Peace -- Declaration for the Protection of War Victims -- Declaration of a Global Ethic -- Declaration of the Basic Principles of Justice for Victims of Crime and Abuse of Power -- Declaration of the Rights of the Child -- Declaration on Permanent Sovereignty Over Natural Resources -- Declaration on Social and Legal Principles Relating to the Protection and Welfare of Children, with Special Reference to Foster Placement and Adoption Nationally and Internationally -- Declaration on Territorial Asylum -- Declaration on the Elimination of All Forms of Intolerance and of Discrimination Based on Religion or Belief -- Declaration on the Elimination of Violence Against Women -- Declaration on the Granting of Independence to Colonial Countries and Peoples -- Declaration on the Human Rights of Individuals Who Are not Nationals of the Country in Which They Live -- Declaration on the Promotion Among Youth of the Ideals of Peace, Mutual Respect and Understanding Between Peoples -- Declaration on the Protection of All Persons From Being Subject to Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment -- Declaration on the Protection of All Persons From Enforced Disappearance -- Declaration on the Protection of Women and Children in Emergency Armed Conflict -- Declaration on the Right of Peoples to Peace -- Declaration on the Right to Development -- Declaration on the Rights of Disabled Persons -- Declaration on the Rights of Mentally Retarded Persons -- Declaration on the Rights of Persons Belonging to National or Ethnic, Religious and Linguistic Minorities -- Declaration on the Use of Scientific and Technological Progress in the Interest of Peace and for the Benefit of Mankind -- Defense for Children International -- Democratic Entitlement -- Derogation -- Detention -- Discrimination -- Domestic Violence -- Drugs and Human Rights -- Duties -- Earth Charter -- Economic and Social Council -- Economic, Social and Cultural Rights -- Education -- Employment -- Environment -- Equality -- Ethnic Cleansing -- European Convention on Human Rights -- European Court of Human Rights -- European Social Charter -- Expulsion -- Fact-Finding -- Fair Trial -- Family -- First Tranche -- Food -- Forced Labor -- Framework Convention for the Protection of National Minorities -- Friends World Committee for Consultation -- Fundamentalism -- Gandhi, Mohandas Karamchand (1869-1948) -- General Assembly -- Generations of Rights -- Geneva Conventions -- Genital Mutilation -- Genocide -- Gorbachev, Mikhail S. (1931- ) -- Gulag Archipelago -- Haiti -- Havel, Va'Clav (1946- ) -- Health -- Helsinki Accords -- Holy See -- Housing -- Human Dimension (Mechanism) -- Human Rights -- Human Rights and Youth -- Human Rights Commissions (Regional) -- Human Rights Committee -- Human Rights Day -- Human Rights Watch.…”
    CONNECT
    Electronic eBook
  6. 386

    Cloud computing : business trends and technologies / by Faynberg, Igor

    Published 2016
    Table of Contents: “…5.1.2 DNS Operation5.1.3 Top-Level Domain Labels; 5.1.4 DNS Security; 5.2 Firewalls; 5.2.1 Network Perimeter Control; 5.2.2 Stateless Firewalls; 5.2.3 Stateful Firewalls; 5.2.4 Application-Layer Firewalls; 5.3 NAT Boxes; 5.3.1 Allocation of Private IP Addresses; 5.3.2 Architecture and Operation of the NAT Boxes; 5.3.3 Living with NAT; 5.3.4 Carrier-Grade NAT; 5.4 Load Balancers; 5.4.1 Load Balancing in a Server Farm; 5.4.2 A Practical Example: A Load-Balanced Web Service; 5.4.3 Using DNS for Load Balancing; References; 6 Cloud Storage and the Structure of a Modern Data Center.…”
    CONNECT
    Electronic eBook
  7. 387

    Java Web services : up and running / by Kalin, Martin

    Published 2013
    Table of Contents: “…-- Web Services Security: -- Wire-level security: -- HTTPS basics -- Symmetric and asymmetric encryption/decryption -- How HTTPS provides the three security services -- HTTPS handshake -- HttpsURL connection class -- Very lightweight HTTPS server and client -- HTTPS in a production-grade web server: -- Enforcing HTTPS access to a Web Service -- HTTPS client against the predictions2 service -- Container-managed security: -- Linking the service web.xml with Tomcat security realm -- Client side in users/roles security -- Using the curl utility for HTTPS testing -- @WebService under HTTPS with Users/Roles security -- Using a digested password instead of a password -- WS-security: -- Securing a @WebService with WS-security -- What's next -- Web Services And Java Application Servers: -- Web container: -- Message-oriented middleware -- Enterprise Java Bean container -- Naming an lookup service -- Security provider -- Client container -- Database system -- Toward a lightweight JAS -- GlassFish basics -- Servlet-Based Web Services under GlassFish: -- Example with mixed APIs -- Interactive Website and SOAP-Based Web Service -- @WebService as a @Stateless session EJB: -- Packing and deploying the predictions EJB service -- Client against the predictions EJB service -- TomEE: Tomcat with Java EE extensions: -- Porting the predictions EJB Web Service to TomEE -- Deploying an EJB in a WAR file -- Where is the best place to be in Java Web Services?…”
    CONNECT
    Electronic eBook
  8. 388

    Anti-hacker tool kit. by Shema, Mike

    Published 2014
    Table of Contents: “…Firewall -- How a Firewall Protects a Network -- Packet Characteristics to Filter -- Stateless vs. Stateful Firewalls -- Network Address Translation (NAT) and Port Forwarding -- The Basics of Virtual Private Networks -- Inside the Demilitarized Zones -- Linux System Firewall -- OS X System Firewall -- Windows System Firewall -- Snort: An Intrusion-Detection System -- Installation and Implementation -- Snort Plug-ins -- So Much More -- 12. …”
    CONNECT
    Electronic eBook
  9. 389

    Law and the new logics /

    Published 2017
    Table of Contents: “…Cover -- Half-title -- Title page -- Copyright information -- Dedication -- Table of contents -- List of Contributors -- Preface -- Part I New Logics in the Functioning of Legal Orders -- 1 Logics of Argumentation and the Law -- 1 Introduction -- 2 Arguments and Counterarguments -- 3 Logic of Argumentation -- 4 Defeasible Rules and Generalizations -- 5 Presumptive Argument Schemes -- 6 Logic of Argumentation Formalised -- 6.1 The Structure of Arguments and the Nature of Attack and Defeat -- 6.2 Dialectical Evaluation of Arguments -- 6.3 Labellings versus Positions -- 7 Conclusion -- References -- 2 Conjunction of Evidence and Multivalent Logic -- 1 Introduction -- 2 Logic Systems -- 2.1 Assumptions -- 2.2 Operators -- 2.3 Testing -- 3 Nonclassical Logic -- 3.1 Fuzzy Logic's Basics -- 3.2 Fuzziness Versus Traditional Probability as a Means of Expressing Likelihood -- 3.3 The Law's Choice -- 4 Dysfunction of Conjunction -- 4.1 Fuzzy Logic's Operators -- 4.2 Fuzziness Versus Traditional Probability as a Means of Conjoining Likelihoods -- 4.3 The Law's Choice -- 5 Conclusion -- 3 One God, No State, and Many Legal Arguments: Multivalent Logic in Jewish Law -- 1 Introduction: One God, One Answer -- 2 ''One thing God has spoken, two things I have heard'' -- 3 Galut (Exile): The Real and the Ideal -- 3.1 Divine Authority and Stateless Law -- 3.2 Is Halakhah Really Jewish Law? …”
    CONNECT
    Electronic eBook
  10. 390

    Java EE 8 application development : develop enterprise applications using the latest versions of CDI, JAX-RS, JSON-B, JPA, Security, and more / by Heffelfinger, David R.

    Published 2017
    Table of Contents: “…Enterprise JavaBean life cycles -- Stateful session bean life cycle -- Stateless and singleton session bean life cycles -- Message-driven bean life cycle -- EJB timer service -- Calendar-based EJB timer expressions -- EJB security -- Client authentication -- Summary -- Chapter 5: Contexts and Dependency Injection -- Named beans -- Dependency injection -- Qualifiers -- Named bean scopes -- CDI events -- Firing CDI events -- Handling CDI events -- Asynchronous events -- Event ordering -- Summary -- Chapter 6: JSON Processing with JSON-P and JSON-B -- The JSON-P Model API -- Generating JSON data with the Model API -- Parsing JSON data with the Model API -- The JSON-P Streaming API -- Generating JSON data with the Streaming API -- Parsing JSON data with the Streaming API -- JSON pointer -- JSON Patch -- Populating Java objects from JSON with JSON-B -- Generating JSON strings from Java objects with JSON-B -- Summary -- Chapter 7: WebSocket -- Developing a WebSocket server endpoint -- Developing an annotated WebSocket server endpoint -- Developing WebSocket clients -- Developing JavaScript client-side WebSocket code -- Developing WebSocket clients in Java -- Additional information about the Java API for WebSocket -- Summary -- Chapter 8: Java Messaging Service -- Message queues -- Sending messages to a message queue -- Retrieving messages from a message queue -- Browsing message queues -- Message topics -- Sending messages to a message topic -- Receiving messages from a message topic -- Creating durable subscribers -- Summary -- Chapter 9: Securing Java EE Applications -- Identity stores -- Setting up an identity store stored in a relational database -- Setting up an identity store stored in an LDAP database -- Custom identity stores -- Authentication mechanisms -- Basic authentication mechanism -- Form authentication mechanism.…”
    CONNECT
    CONNECT
    Electronic eBook
  11. 391

    Introduction to computer networks and cybersecurity / by Wu, Chwan-Hwa, Irwin, J. David, 1939-

    Published 2013
    Table of Contents: “…Congestion Control in UDP and TCP Compatibility; Concluding Remarks; References; Problems; ; SECTION 5 -- CYBER SECURITY; ; Cyber Security Overview; Introduction; Security from a Global Perspective; Trends in the Types of Attacks and Malware; The Types of Malware; Vulnerability Naming Schemes and Security Configuration Settings; Obfuscation and Mutations in Malware; The Attacker's Motivation and Tactics; Zero-Day Vulnerabilities; Attacks on the Power Grid and Utility Networks; Network and Information Infrastructure Defense Overview; Concluding Remarks; References; Problems; ; Firewalls; Overview; Unified Threat Management; Firewalls; Stateless Packet Filtering; Stateful/Session Filtering; Application-Level Gateways; Circuit-Level Gateways; A Comparison of Four Types of Firewalls; The Architecture for a.…”
    CONNECT
    Electronic eBook
  12. 392

    Enterprise Cloud Security and Governance : Efficiently set data protection and privacy principles. by Vora, Zeal

    Published 2017
    Table of Contents: “…-- 3-way handshake -- Modes of firewall -- Stateful packet inspection -- Stateless packet inspection -- Architecting firewall rules -- The deny all and allow some approach -- The allow all and deny some approach -- Firewall justification document -- A sample firewall justification document -- Inbound rules -- Outbound rules -- Tracking firewall changes with alarms -- Best practices -- Application layer security -- Intrusion Prevention Systems -- Overview architecture of IPS -- IPS in a cloud environment -- Implementing IPS in the cloud -- Deep Security -- Anti-malware -- Application control -- The IPS functionality -- A real-world example -- Implementation -- Advantages that IPS will bring to a cloud environment -- A web application firewall -- Architecture -- Implementation -- Network segmentation -- Understanding a flat network -- Segmented network -- Network segmentation in cloud environments -- Segmentation in cloud environments -- Rule of thumb -- Accessing management -- Bastion hosts -- The workings of bastion hosts -- The workings of SSH agent forwarding -- Practical implementation of bastion hosts -- Security of bastion hosts -- Benefits of bastion hosts -- Disadvantages of bastion hosts -- Virtual Private Network -- Routes -- after VPN is connected -- Installation of OpenVPN -- Security for VPN -- Recommended tools for VPN -- Approaching private hosted zones for DNS -- Public hosted zones -- Private hosted zones -- Challenge -- Solution -- Summary -- Chapter 4: Server Hardening -- The basic principle of host-based security -- Keeping systems up-to-date -- The Windows update methodology -- The Linux update methodology -- Using the security functionality of YUM.…”
    CONNECT
    Electronic eBook
  13. 393

    Modern Python cookbook : the latest in modern Python recipes for the busy modern programmer / by Lott, Steven F.

    Published 2016
    Table of Contents: “…. -- See also -- Designing classes with little unique processing -- Getting ready -- How to do it... -- Stateless objects -- Stateful objects with a new class -- Stateful objects using an existing class -- How it works... -- There's more... -- See also -- Optimizing small objects with __slots__ -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using more sophisticated collections -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Extending a collection -- a list that does statistics -- Getting ready.…”
    CONNECT
    CONNECT
    Electronic eBook
  14. 394

    LBK realpolitik : an archaeometric study of conflict and social structure in the Belgian early Neolithic / by Golitko, Mark

    Published 2015
    Table of Contents: “…. -- Chapter 2 -- Warfare and Economy in Stateless Society -- Warfare and Exchange -- Warfare and Exchange in Prehistory -- Linking Warfare and Exchange in the Archaeological Record -- Chaper 3 -- The Linienbandkeramik -- The Central European Late Mesolithic -- The Linienbandkeramik -- LBK Settlements and Settlement Patterns -- Linienbandkeramik Economic Structure -- Mechanisms of LBK Expansion -- Linienbandkeramik Sociopolitics -- Conflict -- Conflict and Socioeconomic Structure in the Linienbandkeramik -- Figure 3. …”
    CONNECT
    Electronic eBook
  15. 395

    Community, anarchy, and liberty / by Taylor, Michael, Ph.D

    Published 1982
    CONNECT
    Electronic eBook
  16. 396

    A liberal theory of collective rights / by Seymour, Michel, 1954-

    Published 2017
    CONNECT
    Electronic eBook
  17. 397
  18. 398

    Play for Java / by Leroux, Nicolas

    Published 2014
    CONNECT
    Electronic eBook
  19. 399
  20. 400

    IPv6 fundamentals LiveLessons /

    Published 2015
    CONNECT
    Electronic Video