LEADER 03869nam 2200613 a 450 001 9910830416503321 005 20210604105226.0 010 $a1-118-66643-7 010 $a1-118-67239-9 035 $a(CKB)3450000000004311 035 $a(EBL)1184227 035 $a(OCoLC)843188539 035 $a(SSID)ssj0000726675 035 $a(PQKBManifestationID)11401090 035 $a(PQKBTitleCode)TC0000726675 035 $a(PQKBWorkID)10673980 035 $a(PQKB)10709633 035 $a(MiAaPQ)EBC1184227 035 $a(PPN)176543147 035 $a(EXLCZ)993450000000004311 100 $a20130523d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aOcean modeling in an eddying regime$b[electronic resource]$fMatthew W. Hecht, Hiroyasu Hasumi, editors 210 $aWashington, D.C. $cAmerican Geophysical Union$dc2008 215 $a1 online resource (418 p.) 225 1 $aGeophysical Monograph Series ;$v177 300 $aDescription based upon print version of record. 311 $a0-87590-442-4 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aTitle Page; Contents; Preface; Introduction: Ocean Modeling-Eddy or Not; Section 1: Oceanographic Processes and Regimes: Fundamental Question; The Nature and Consequences of Oceanic Eddies; Submesoscale Processes and Dynamics; Gulf Stream Separation in Numerical Ocean Models; Eddy-Resolving Modeling of Overflows; High-Frequency Winds and Eddy-Resolving Models; Resolution Dependence of Eddy Fluxes; Eddies and Upper-Ocean Nutrient Supply; Eddies in Eastern Boundary Subtropical Upwelling Systems; Section 2: Ocean Dynamics and State: From Region to Global Scale 327 $aThe Fidelity of Ocean Models With Explicit EddiesCommon Success and Failure in Simulating the Pacific Surface Currents Shared byFour High-Resolution Ocean Models; Eddies in Numerical Models of the Southern Ocean; High-Resolution Indian Ocean Simulations- Recent Advances and Issues From OFES; Toward a Physical Understanding of the North Atlantic: A Review of Model Studies in an Eddying Regime; Towards Eddy-Resolving Models of the Arctic Ocean; Pacific Upper Ocean Response to Global Warming-Climate Modelingin an Eddying Ocean Regime 327 $aSection 3: Modeling at the Mesoscale: State of the Art and Future DirectionsFormulating the Equations of Ocean Models; Can Large Eddy Simulation Techniques Improve Mesoscale Rich Ocean Models?; Lateral Mixing in the Eddying Regime and a New Broad-Ranging Formulation; Eddy-Resolving Global Ocean Prediction; Unstructured Adaptive Meshes for Ocean Modeling 330 $aPublished by the American Geophysical Union as part of the Geophysical Monograph Series, Volume 177.This monograph is the first to survey progress in realistic simulation in a strongly eddying regime made possible by recent increases in computational capability. Its contributors comprise the leading researchers in this important and constantly evolving field. Divided into three parts Oceanographic Processes and Regimes: Fundamental QuestionsOcean Dynamics and State: From Regional to Global Scale, andModeling at the Mesoscale: State of the Art a 410 0$aGeophysical monograph ;$v177. 606 $aOceanography$xMathematical models 606 $aOcean circulation$xMathematical models 606 $aEddies 615 0$aOceanography$xMathematical models. 615 0$aOcean circulation$xMathematical models. 615 0$aEddies. 676 $a551.46015118 701 $aHecht$b Matthew W$026778 701 $aHasumi$b Hiroyasu$0880046 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830416503321 996 $aOcean modeling in an eddying regime$91965115 997 $aUNINA LEADER 04341nam 22005655 450 001 9910896177903321 005 20250807124731.0 010 $a979-88-6880-494-6 024 7 $a10.1007/979-8-8688-0494-6 035 $a(CKB)36251287700041 035 $a(MiAaPQ)EBC31696283 035 $a(Au-PeEL)EBL31696283 035 $a(DE-He213)979-8-8688-0494-6 035 $a(CaSebORM)9798868804946 035 $a(OCoLC)1459142222 035 $a(OCoLC-P)1459142222 035 $a(EXLCZ)9936251287700041 100 $a20241002d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced ASP.NET Core 8 Security $eMove Beyond ASP.NET Documentation and Learn Real Security /$fby Scott Norberg 205 $a2nd ed. 2024. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2024. 215 $a1 online resource (470 pages) 300 $aIncludes index. 311 08$a979-88-6880-493-9 327 $aChapter 1: Intro to Security -- Chapter 2: Software Security Overview -- Chapter 3: Web Security -- Chapter 4: Thinking Like a Hacker -- Chapter 5: Introduction to ASP.NET Core Security -- Chapter 6: Cryptography -- Chapter 7: Processing User Input -- Chapter 8: Data Access and Storage -- Chapter 9: Authentication and Authorization -- Chapter 10: Advanced Web Security -- Chapter 11: Logging and Error Handling. Chapter 12: Setup and Configuration. - Chapter 13: Secure Software Development Life Cycle. (SSDLC). 330 $aMost .NET developers do not incorporate security best practices when creating websites. The problem? Even if you use all of the best practices that the ASP.NET team recommends, you are still falling short in several key areas due to issues within the framework itself. And most developers don?t use all of the best practices that are recommended. If you are interested in truly top-notch security, available sources don?t give you the information you need. Most blogs and other books simply state how to use the configurations within ASP.NET, but do not teach you security as understood by security professionals. Online code samples aren't much help because they are usually written by developers who aren?t incorporating security practices. This book solves those issues by teaching you security first, going over software best practices as understood by security professionals, not developers. Then it teaches you how security is implemented in ASP.NET. With that foundation, it dives into specific security-related functionality and discusses how to improve upon the default functionality with working code samples. And you will learn how security professionals build software security programs so you can continue building software security best practices into your own Secure Software Development Life Cycle (SSDLC). What You?ll Learn Know how both attackers and professional defenders approach web security Establish a baseline of security for understanding how to design more secure software Discern which attacks are easy to prevent, and which are more challenging, in ASP.NET Dig into ASP.NET source code to understand how the security services work Know how the new logging system in ASP.NET falls short of security needs Incorporate security into your software development process New to This Edition This edition has been updated with the following changes: Best practices and code samples updated to reflect security-related changes in ASP.NET 8 Improved examples, including a fully-functional website incorporating security suggestions Best practices for securely using Large Language Models (LLMs) and AI Expansions and clarifications throughout . 606 $aMicrosoft software 606 $aMicrosoft .NET Framework 606 $aData protection 606 $aMicrosoft 606 $aData and Information Security 615 0$aMicrosoft software. 615 0$aMicrosoft .NET Framework. 615 0$aData protection. 615 14$aMicrosoft. 615 24$aData and Information Security. 676 $a005.268 700 $aNorberg$b Scott$01058755 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910896177903321 996 $aAdvanced ASP.NET Core 8 Security$94375012 997 $aUNINA