Mostrando 1,921 - 1,940 Resultados de 4,542 Para Buscar '"Apiés"', tiempo de consulta: 0.12s Limitar resultados
  1. 1921
    por Kirk, David, 1960-
    Publicado 2013
    Tabla de Contenidos: “…2.1 Evolution of Graphics PipelinesThe Era of Fixed-Function Graphics Pipelines; Evolution of Programmable Real-Time Graphics; Unified Graphics and Computing Processors; 2.2 GPGPU: An Intermediate Step; 2.3 GPU Computing; Scalable GPUs; Recent Developments; Future Trends; References and Further Reading; 3 Introduction to Data Parallelism and CUDA C; 3.1 Data Parallelism; 3.2 CUDA Program Structure; 3.3 A Vector Addition Kernel; 3.4 Device Global Memory and Data Transfer; 3.5 Kernel Functions and Threading; 3.6 Summary; Function Declarations; Kernel Launch; Predefined Variables; Runtime API…”
    Libro electrónico
  2. 1922
    Publicado 2017
    Tabla de Contenidos: “…PIR motion sensor -- Ultrasonic sensor - HC-SR04 -- Thermal sensor -- Optical sensor -- Displaying and delivering ad content -- Flask -- Pyramid -- Django -- Building a smart digital advertising dashboard -- Summary -- Chapter 5: A Smart Speaker Machine -- Introducing smart speaker machines -- Exploring existing smart speaker machines -- Amazon Echo -- Google Home -- Ivee -- Triby -- Introducing ReSpeaker -- How it works -- Integrating your IoT boards with ReSpeaker -- GPIO programming on ReSpeaker -- Connecting to the Microsoft Bing Speech API -- Building your own smart speaker machine -- Summary -- Chapter 6: Autonomous Firefighter Robot -- Introducing&amp -- #160 -- autonomous firefighter robots -- Exploring robot platforms -- Zumo robot for Arduino -- MiniQ Discovery Arduino robot kit -- Turtle kit - a 2WD DIY Arduino robotics kit for beginners -- GoPiGo robot -- Detecting a fire source -- Grove - flame sensor -- SainSmart flame detection sensor module -- Demo - fire detection -- Basic remote robot navigation -- Detecting obstacles -- How it works -- Designing an autonomous robot -- Building an autonomous firefighter robot -- Summary -- Chapter 7: Multi-Robot Cooperation Using Swarm Intelligence -- Introducing multi-robot cooperation -- Learning about swarm intelligence -- Implementing mesh network for multi-robot cooperation -- XBee modules -- Configuring XBee modules -- Demo - data communication using XBee -- How it works -- XBee development for Arduino -- Configuring the XBee module -- Writing the sketch program -- Testing -- Working with the XBee library for Arduino -- Designing a multi-robot cooperation model using swarm intelligence -- Defining objectives -- Selecting a robot platform -- Selecting the algorithm for swarm intelligence -- Summary -- Appendix: Essential Hardware Components -- Index…”
    Libro electrónico
  3. 1923
    por Afonso, Daniel
    Publicado 2023
    Tabla de Contenidos: “…-- Using the initialData pattern -- Applying the initialData pattern in Next.js -- Applying the initialData pattern in Remix -- Using the hydrate pattern -- Applying the hydrate pattern in Next.js -- Applying the hydrate pattern in Remix -- Summary -- Chapter 8: Testing React Query Hooks and Components -- Technical requirements -- Configuring Mock Service Worker -- Organizing code -- Creating an API file -- Leveraging query key factories -- Creating a hooks folder -- Testing components that use React Query -- Setting up testing utils -- Testing queries -- Testing mutations -- Testing custom hooks that use React Query -- Summary -- Chapter 9: What Changes in React Query v5? …”
    Libro electrónico
  4. 1924
    por Chinchilla, Chris
    Publicado 2024
    Tabla de Contenidos: “…-- Marketing -- Product -- Sales -- Support -- Developer relations -- Engineering -- Machine readers -- Proofreading for accuracy and safety -- Content silos -- Writer in the middle -- Understanding who you are writing for -- Learning by example -- Don't forget the end users and the end-end users -- Summary -- Chapter 2: Understanding Different Types of Documentation in Software Development -- Templates -- Getting started and onboarding -- A detailed overview of Getting Started -- Learning with an example -- Templates for a Getting Started guide -- Tutorials -- Expanding on the example -- Templates for tutorials -- Reference -- API documentation -- Architecture and design details -- Security and privacy details -- Technical blog posts -- Summary -- Chapter 3: Language and the Fundamental Mechanics of Explaining -- Common reasons for not writing confidently -- Not a native speaker -- Intentionally vague -- Marketing and product reasons -- Reducing cognitive load -- Inclusive language -- How to improve your writing -- Consistency -- Involving the user -- Keeping it short -- Removing unnecessary words -- Don't show off - let the product speak for itself -- Don't repeat yourself -- Inclusive language: in more detail -- Overly negative language -- Biased language -- Gender -- Out-of-date language -- Summary -- Chapter 4: Page Structure and How It Aids Reading -- Humans are not your only readers -- The principles of good layout -- A quick primer on the markup language of the web -- Thinking about pages semantically -- Lists -- Paragraph breaks -- Tables -- Admonitions -- Tabs -- An example of a well-structured page…”
    Libro electrónico
  5. 1925
    Publicado 2023
    Tabla de Contenidos: “…-- Installing Streamlit -- Organizing Streamlit apps -- Streamlit plotting demo -- Making an app from scratch -- Using user input in Streamlit apps -- Finishing touches - adding text to Streamlit -- Summary -- Chapter 2: Uploading, Downloading, and Manipulating Data -- Technical requirements -- The setup - Palmer's Penguins -- Exploring Palmer's Penguins -- Flow control in Streamlit -- Debugging Streamlit apps -- Developing in Streamlit -- Exploring in Jupyter and then copying to Streamlit -- Data manipulation in Streamlit -- An introduction to caching -- Persistence with Session State -- Summary -- Chapter 3: Data Visualization -- Technical requirements -- San Francisco Trees - a new dataset -- Streamlit visualization use cases -- Streamlit's built-in graphing functions -- Streamlit's built-in visualization options -- Plotly -- Matplotlib and Seaborn -- Bokeh -- Altair -- PyDeck -- Configuration options -- Summary -- Chapter 4: Machine Learning and AI with Streamlit -- Technical requirements -- The standard ML workflow -- Predicting penguin species -- Utilizing a pre-trained ML model in Streamlit -- Training models inside Streamlit apps -- Understanding ML results -- Integrating external ML libraries - a Hugging Face example -- Integrating external AI libraries - an OpenAI example -- Authenticating with OpenAI -- OpenAI API cost -- Streamlit and OpenAI -- Summary -- Chapter 5: Deploying Streamlit with Streamlit Community Cloud -- Technical requirements -- Getting started with Streamlit Community Cloud -- A quick primer on GitHub -- Deploying with Streamlit Community Cloud -- Debugging Streamlit Community Cloud -- Streamlit Secrets -- Summary -- Chapter 6: Beautifying Streamlit Apps…”
    Libro electrónico
  6. 1926
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Snowpark Foundation and Setup -- Chapter 1: Discovering Snowpark -- Introducing Snowpark -- Leveraging Python for Snowpark -- Capabilities of Snowpark for Python -- Why Python for Snowpark -- Understanding Snowpark for different workloads -- Data science and ML -- Data engineering -- Data governance and security -- Data applications -- Realizing the value of using Snowpark -- Summary -- Chapter 2: Establishing a Foundation with Snowpark -- Technical requirements -- Configuring the Snowpark development environment -- Snowpark Python worksheet -- Snowpark development in a local environment -- Operating with Snowpark -- The Python Engine -- Client APIs -- UDFs -- Establishing a project structure for Snowpark -- Summary -- Part 2: Snowpark Data Workloads -- Chapter 3: Simplifying Data Processing Using Snowpark -- Technical requirements -- Data ingestion -- Important note on datasets -- Ingesting a CSV file into Snowflake -- Ingesting JSON into Snowflake -- Ingesting Parquet files into Snowflake -- Ingesting images into Snowpark -- Data exploration and transformation -- Data exploration -- Data transformations -- Data grouping and analysis -- Data grouping -- Data analysis -- Summary -- Chapter 4: Building Data Engineering Pipelines with Snowpark -- Technical requirements -- Developing resilient data pipelines with Snowpark -- Traditional versus modern data pipelines -- Data engineering with Snowpark -- Implementing programmatic ELT with Snowpark -- Deploying efficient DataOps in Snowpark -- Developing a data engineering pipeline -- Overview of tasks in Snowflake -- Compute models for tasks -- Task graphs -- Managing tasks and task graphs with Python -- Implementing logging and tracing in Snowpark -- Event tables…”
    Libro electrónico
  7. 1927
    Publicado 2018
    Tabla de Contenidos: “…Segregated Witness (SegWit) -- Bitcoin Cash -- Bitcoin Unlimited -- Bitcoin Gold -- Bitcoin investment and buying and selling bitcoins -- Summary -- Chapter 7: Bitcoin Clients and APIs -- Bitcoin installation -- Types of Bitcoin Core clients -- Bitcoind -- Bitcoin-cli -- Bitcoin-qt -- Setting up a Bitcoin node -- Setting up the source code -- Setting up bitcoin.conf -- Starting up a node in testnet -- Starting up a node in regtest -- Experimenting with Bitcoin-cli -- Bitcoin programming and the command-line interface -- Summary -- Chapter 8: Alternative Coins -- Theoretical foundations -- Alternatives to Proof of Work -- Proof of Storage -- Proof of Stake (PoS) -- Various stake types -- Proof of coinage -- Proof of Deposit (PoD) -- Proof of Burn -- Proof of Activity (PoA) -- Nonoutsourceable puzzles -- Difficulty adjustment and retargeting algorithms -- Kimoto Gravity Well -- Dark Gravity Wave -- DigiShield -- MIDAS -- Bitcoin limitations -- Privacy and anonymity -- Mixing protocols -- Third-party mixing protocols -- Inherent anonymity -- Extended protocols on top of Bitcoin -- Colored coins -- Counterparty -- Development of altcoins -- Consensus algorithms -- Hashing algorithms -- Difficulty adjustment algorithms -- Inter-block time -- Block rewards -- Reward halving rate -- Block size and transaction size -- Interest rate -- Coinage -- Total supply of coins -- Namecoin -- Trading Namecoins -- Obtaining Namecoins -- Generating Namecoin records -- Litecoin -- Primecoin -- Trading Primecoin -- Mining guide -- Zcash -- Trading Zcash -- Mining guide -- Address generation -- GPU mining -- Downloading and compiling nheqminer -- Initial Coin Offerings (ICOs) -- ERC20 tokens -- Summary -- Chapter 9: Smart Contracts -- History -- Definition -- Ricardian contracts -- Smart contract templates -- Oracles -- Smart Oracles…”
    Libro electrónico
  8. 1928
    Publicado 2018
    Tabla de Contenidos: “…. -- See also -- Building a REST API client with Retrofit and a coroutines adapter -- Getting ready -- How to do it... -- How it works... -- See also -- Wrapping third-party callback-style APIs with coroutines -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 8: Best Practices for the Android, JUnit, and JVM UI Frameworks -- Introduction -- Clean and safe view-binding with the Android Extensions plugin -- Getting ready -- How to do it... -- How it works... -- There's more... -- Applying coroutines for asynchronous UI programming on Android, JavaFX, and Swing -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Easy class serialization on Android using the @Parcelize annotation -- Getting ready -- How to do it... -- How it works... -- See also -- Implementing a custom property delegate that provides lifecycle-aware values -- Getting ready -- How to do it... -- How it works... -- See also -- Easy operations on SharedPreferences -- Getting ready…”
    Libro electrónico
  9. 1929
    Publicado 2021
    Tabla de Contenidos: “…Security by cloud models -- Data security in the cloud -- Securing Kubernetes and APIs -- Cloud-native security -- Controlling access to the Kubernetes API -- Controlling access to kubelet -- Preventing containers from loading unwanted kernel modules -- Restricting access to etcd -- Avoiding the use of alpha or beta features in production -- Third-party integrations -- Hardening database services -- Testing your cloud security -- Azure Security Center -- Amazon CloudWatch -- AppDynamics -- Nessus vulnerability scanner -- InsightVM -- Intruder -- Summary -- Further reading -- Chapter 12: Mastering Web App Security -- Technical requirements -- Gathering intelligence about your site/web application -- Importance of public data gathering -- Open Source Intelligence -- Hosting information -- Checking data exposure with Google hacking (dorks) -- Leveraging DVWA -- Installing DVWA on Kali Linux -- Overviewing the most common attacks on web applications -- Exploring XSS attacks -- Using Burp Suite -- Burp Suite versions -- Setting up Burp Suite on Kali -- SQL injection attack on DVWA -- Fixing a common error -- Brute forcing web applications' passwords -- Analyzing the results -- Summary -- Further reading -- Section 3: Deep Dive into Defensive Security -- Chapter 13: Vulnerability Assessment Tools -- Technical requirements -- Dealing with vulnerabilities -- Who should be looking for vulnerabilities? …”
    Libro electrónico
  10. 1930
    Publicado 2018
    Tabla de Contenidos: “…Twitter Sign-in -- Twitter Api key -- Project Configuration -- Phone number sign-in -- Project configuration -- Firebase SDK social networking site authentication -- Google sign-in -- Facebook login -- Twitter sign-in -- Phone number sign-in -- Anonymous Authentication -- Link multiple Auth providers -- Firebase Authentication failures -- Firebase Authentication exceptions -- Summary -- Chapter 3: Safe and Sound - Firebase Crashlytics -- Firebase Crash Reporting and Crashlytics -- Firebase Crash Reporting setup -- Creating crash reports -- Creating custom logs -- Deobfuscating ProGuard labels -- Crash Report support for multiple APK -- Disabling Crash Reporting -- Firebase Crashlytics -- Firebase Crashlytics setup and upgrading from Crash Reporting -- Migrating from Firebase Crash Reporting to Crashlytics -- Validating Crashlytics implementation -- Enabling Crashlytics debug mode -- Customizing Crashlytics reports -- Crashlytics and functions -- Summary -- Chapter 4: Genie in the Cloud - Firebase Cloud Functions -- Firebase Cloud Functions -- Set up the development environment -- Project structure -- Required modules -- Deploying Cloud functions project -- Custom logs and reviewing functions -- Trigger functions -- Cloud Firestore Triggers -- Specific documents -- Creating a document -- Updating documents -- Deleting a document -- Changes in a document -- Realtime Database Triggers -- Firebase Authentication Triggers -- Analytics and Crashlytics Triggers -- Cloud Storage Triggers -- HTTP Triggers -- Cloud Pub/Sub Triggers -- Writing Firebase functions -- Cloud Functions to fire a push notification -- Summary -- Chapter 5: Arsenal for Your Files - Firebase Cloud Storage -- Firebase a Cloud Storage -- Creating storage reference -- Storage reference properties -- Limitations of reference -- Uploading and downloading files -- Uploading files…”
    Libro electrónico
  11. 1931
    Publicado 2018
    Tabla de Contenidos:
    Libro electrónico
  12. 1932
    Publicado 2016
    Tabla de Contenidos: “…"HSAIL Spec" -- 2.4 HSA Software -- 2.5 The HSA Foundation -- 2.6 Summary -- Chapter 3: HSAIL - Virtual Parallel ISA -- 3.1 Introduction -- 3.2 Sample Compilation Flow -- 3.3 HSAIL Execution Model -- 3.4 A Tour of the HSAIL Instruction Set -- 3.4.1 Atomic Operations -- 3.4.2 Registers -- 3.4.3 Segments -- 3.4.4 Wavefronts and Lanes -- 3.5 HSAIL Machine Models and Profiles -- 3.6 HSAIL Compilation Flow -- 3.7 HSAIL Compilation Tools -- 3.7.1 Compiler Frameworks -- 3.7.2 CL Offline Compilation (CLOC) -- 3.7.3 HSAIL Assembler/Disassembler -- 3.7.4 ISA and Machine Code Assembler/Disassembler -- 3.8 Conclusion -- Chapter 4: HSA Runtime -- 4.1 Introduction -- 4.2 The HSA Core Runtime API -- 4.2.1 Runtime Initialization and Shutdown -- 4.2.2 Runtime Notifications -- 4.2.3 System and HSA Agent Information -- 4.2.4 Signals -- 4.2.5 Queues -- 4.2.6 Architected Queuing Language -- 4.2.7 Memory -- 4.2.8 Code Objects and Executables -- 4.3 HSA Runtime Extensions -- 4.3.1 HSAIL Finalization -- 4.3.2 Images and Samplers -- 4.4 Conclusion -- References -- Chapter 5: HSA Memory Model -- 5.1 Introduction -- 5.2 HSA Memory Structure -- 5.2.1 Segments -- 5.2.2 Flat Addressing -- 5.2.3 Shared Virtual Addressing -- 5.2.4 Ownership -- 5.2.5 Image Memory…”
    Libro electrónico
  13. 1933
    Publicado 2017
    Tabla de Contenidos: “…Unnecessary operations -- Misplaced or missing indexes -- Using CTE when not mandatory -- Using the PL/pgSQL procedural language consideration -- Cross column correlation -- Table partitioning -- Constraint exclusion limitations -- Query rewriting -- Summary -- Chapter 14: Testing -- Unit testing -- Specificity of unit testing in databases -- Unit test frameworks -- Schema difference -- Database abstraction interfaces -- Data difference -- Performance testing -- Summary -- Chapter 15: Using PostgreSQL in Python Applications -- Python DB API 2.0 -- Low-level database access with psycopg2 -- Connecting to a database -- Connection pooling -- Executing SQL commands -- Reading data from a database -- The COPY command -- Asynchronous access -- Alternative drivers for PostgreSQL -- pg8000 -- asyncpg -- Object relational mapping with SQLAlchemy -- Main components of SQLAlchemy -- Connecting to a database and retrieving data with SQL Expression Language -- ORM -- Summary -- Chapter 16: Scalability -- The problem of scalability and the CAP theorem -- Data replication in PostgreSQL -- Transaction log -- Physical replication -- Log shipping replication -- Streaming replication -- Synchronous replication -- Logical replication -- Using replication to scale PostgreSQL -- Scaling for heavy querying -- Data sharding -- Scaling for big number of connections -- Summary -- Index…”
    Libro electrónico
  14. 1934
    por Nomani, Qamar
    Publicado 2024
    Tabla de Contenidos: “…-- Summary -- Further reading -- Part 2: CSPM Deployment Aspects -- Chapter 5: Deploying the CSPM Tool -- Deployment model overview -- Key considerations for effective deployment -- The SaaS/cloud-based deployment model -- On-premises deployments -- Hybrid deployment -- Leveraging managed service provider (MSP) support -- Different deployment methodologies -- Agent-based deployment -- API-based deployment -- Proxy-based deployment -- Tool deployment best practices -- Summary -- Further reading -- Chapter 6: Onboarding Cloud Accounts -- Key considerations and steps involved -- Account onboarding key considerations -- Steps for successful onboarding -- Best practices for onboarding of cloud accounts -- Account onboarding steps -- Onboarding AWS accounts -- Onboarding Azure accounts -- Onboarding GCP accounts -- Onboarding other clouds -- Onboarding roadblocks and mitigation best practices -- Roadblock #1 - Lack of necessary permissions -- Roadblock #2 - Complex cloud environments -- Roadblock #3 - Resistance to change -- Roadblock #4 - Policy complexity -- Roadblock #5 - Alert fatigue -- Roadblock #6 - Integration complexity -- Roadblock #7 - Monitoring and alerting configuration -- Roadblock #8 - Data privacy and security -- Roadblock #9 - Compliance variability -- Roadblock #10 - Scalability -- Offboarding cloud accounts…”
    Libro electrónico
  15. 1935
    Publicado 2023
    Tabla de Contenidos: “…-- Toward a theory of error -- Testing software - an example -- Testing software - an analysis -- Quick attacks - the airdropped tester -- Test design - input space coverage -- Equivalence classes and boundaries -- Decision tables -- Decision trees -- All-pairs and pairwise testing -- High volume automated approaches -- Other approaches -- Data and predictability - the oracle problem -- Summary -- Further reading -- Chapter 2: Fundamental Issues in Tooling and Automation -- Technical requirements -- No silver bullets - you can't radically fix the test cycle -- The minefield regression problem -- Coverage model -- The Battleships problem - testing versus checking -- Comparing Battleships to bugs -- Automation rarely beats human intuition -- The maintenance problem -- The dangers of comprehensive tests -- The money problem -- Lessons from the fundamental issues -- Summary -- Chapter 3: Programmer-Facing Testing -- Technical requirements -- The programmer's view -- Testing and reliability -- The hexagonal architecture -- Introducing FizzBuzz -- Unit tests -- TDD -- Consequences of TDD -- Unit test and unit code design -- Using test doubles to create seams -- Mutation testing -- Web APIs from a test perspective -- Web API testing strategy -- Testing functional and legacy code -- A Roman Numerals Kata -- Summary -- Chapter 4: Customer-Facing Tests -- Technical requirements -- A word of warning -- Human Or Tooling-is it either/or? …”
    Libro electrónico
  16. 1936
    Publicado 2018
    Tabla de Contenidos: “…Chapter 16: Pricing Considerations -- Compute Engine -- BigTable -- BigQuery -- Datastore -- Cloud SQL -- Google Kubernetes Engine -- Pub/Sub -- Cloud ML Engine -- Stackdriver -- Video Intelligence API -- Key Management Service - KMS -- Vision API -- Summary -- Chapter 17: Effective Use of the GCP -- Eat the Kubernetes frog -- Careful that you don't get nickel-and-dimed -- Pay for what you allocate not what you use -- Make friends with the gsuite admins -- Try to find reasons to use network peering -- Understand how sustained use discounts work -- Read the fine print on GCS pricing -- Use BigQuery unless you have a specific reason not to -- Use pre-emptible instances in your Dataproc clusters -- Keep your Dataproc clusters stateless -- Understand the unified architecture for batch and stream -- Understand the main choices for ML applications -- Understand the differences between snapshots and images -- Don't be Milton! …”
    Libro electrónico
  17. 1937
    Publicado 2017
    Tabla de Contenidos: “…range - a collection of evenly spaced integers -- Starting value -- Step argument -- Not using range: enumerate() -- list in action -- Negative indexing for lists (and other sequences) -- Slicing lists -- Copying lists -- Shallow copies -- Repeating lists -- Finding list elements with index() -- Membership testing with count() and in -- Removing list elements by index with del -- Removing list elements by value with remove() -- Inserting into a list -- Concatenating lists -- Rearranging list elements -- Out-of-place rearrangement -- Dictionaries -- Copying dictionaries -- Updating dictionaries -- Iterating over dictionary keys -- Iterating over dictionary values -- Iterating over key-value pairs -- Membership testing for dictionary keys -- Removing dictionary items -- Mutability of dictionaries -- Pretty printing -- set - an unordered collection of unique elements -- The set constructor -- Iterating over sets -- Membership testing of sets -- Adding elements to sets -- Removing elements from sets -- Copying sets -- Set algebra operations -- Union -- Intersection -- Difference -- Symmetric difference -- Subset relationships -- Collection protocols -- Container protocol -- Sized protocol -- Iterable protocol -- Sequence protocol -- Other protocols -- Summary -- Chapter 6: Exceptions -- Exceptions and control flow -- Handling exceptions -- Handling multiple exceptions -- Programmer errors -- Empty blocks - the pass statement -- Exception objects -- Imprudent return codes -- Re-raising exceptions -- Exceptions are part of your function's API -- Exceptions raised by Python -- Catching exceptions -- Raising exceptions explicitly -- Guard clauses -- Exceptions, APIs, and protocols -- IndexError -- ValueError -- KeyError -- Choosing not to guard against TypeError -- Pythonic style - EAFP versus LBYL -- Clean-up actions -- Moment of zen…”
    Libro electrónico
  18. 1938
    Publicado 2024
    Tabla de Contenidos: “…Denormalization - storing multiple copies is OK -- Data that needs to be accessed together must be stored together -- Multi-table versus single-table design -- Breaking down your data -- Single table - swapping extra tables for items -- Breaking down items -- Handling large items -- Summary -- References -- Chapter 6: Read Consistency, Operations, and Transactions -- Understanding the read consistency model -- Strong consistency -- Eventual consistency -- Choosing the right read consistency mode -- Reviewing read APIs -- GetItem -- BatchGetItem -- Query -- Scan -- PartiQL read operations -- Transactions and atomicity -- Differences from traditional RDBMS transactions -- Reviewing key highlights of transactions -- Using transactional APIs in your application -- Summary -- References -- Chapter 7: Vertical Partitioning -- Understanding item collections -- Breaking down our data for vertical partitioning -- Naming conventions -- Naming conventions for attribute names -- Naming conventions for attribute values -- Future growth and expansion -- Summary -- References -- Chapter 8: Secondary Indexes -- Handling additional access patterns -- Example model - e-wallet -- Example model - app authentication -- Example model - the Employee data model -- Local secondary indexes -- Feature highlights of LSIs -- Considerations when using LSIs -- Global secondary indexes -- Feature highlights of GSIs -- Considerations when using GSIs -- Comparing secondary indexes -- Best practices for modeling data with secondary indexes -- Designing sparse indexes -- Leveraging KEYS_ONLY indexes -- Write sharding -- Indexing data with keys of low cardinality -- Designing table replicas for skewed read access -- Summary -- References -- Part 3: Table Management and Internal Architecture -- Chapter 9: Capacity Modes and Table Classes -- Diving into capacity modes…”
    Libro electrónico
  19. 1939
    Publicado 2018
    Tabla de Contenidos: “…Regular expressions -- Wrapping up with Ruby basics -- Developing custom modules -- Building a module in a nutshell -- The architecture of the Metasploit framework -- Understanding the file structure -- The libraries layout -- Understanding the existing modules -- The format of a Metasploit module -- Disassembling the existing HTTP server scanner module -- Libraries and the function -- Writing out a custom FTP scanner module -- Libraries and functions -- Using msftidy -- Writing out a custom SSH-authentication with a brute force attack -- Rephrasing the equation -- Writing a drive-disabler post-exploitation module -- Writing a credential harvester post-exploitation module -- Breakthrough Meterpreter scripting -- Essentials of Meterpreter scripting -- Setting up persistent access -- API calls and mixins -- Fabricating custom Meterpreter scripts -- Working with RailGun -- Interactive Ruby shell basics -- Understanding RailGun and its scripting -- Manipulating Windows API calls -- Fabricating sophisticated RailGun scripts -- Summary and exercises -- Chapter 3: The Exploit Formulation Process -- The absolute basics of exploitation -- The basics -- The architecture -- System organization basics -- Registers -- Exploiting stack-based buffer overflows with Metasploit -- Crashing the vulnerable application -- Building the exploit base -- Calculating the offset -- Using the pattern_create tool -- Using the pattern_offset tool -- Finding the JMP ESP address -- Using the Immunity Debugger to find executable modules -- Using msfpescan -- Stuffing the space -- Relevance of NOPs -- Determining bad characters -- Determining space limitations -- Writing the Metasploit exploit module -- Exploiting SEH-based buffer overflows with Metasploit -- Building the exploit base -- Calculating the offset -- Using the pattern_create tool -- Using the pattern_offset tool…”
    Libro electrónico
  20. 1940
    Publicado 2007
    Tabla de Contenidos: “…6.3 Booting Zones -- 6.4 Security -- 6.5 Process Model -- 6.6 File Systems -- 6.7 Networking -- 6.8 Devices -- 6.9 Interprocess Communication -- 6.10 Resource Management and Observability -- 6.11 MDB Reference -- Chapter 7 Projects, Tasks, and Resource Controls -- 7.1 Projects and Tasks Framework -- 7.2 The Project Database -- 7.3 Project and Task APIs -- 7.4 Kernel Infrastructure for Projects and Tasks -- 7.5 Resource Controls -- 7.6 Interfaces for Resource Controls -- 7.7 Kernel Interfaces for Resource Controls -- PART FOUR: Memory -- Chapter 8 Introduction to Solaris Memory -- 8.1 Virtual Memory Primer -- 8.2 Two Levels of Memory -- 8.3 Memory Sharing and Protection -- 8.4 Pages: Basic Units of Physical Memory -- 8.5 Virtual-to-Physical Translation -- 8.6 Physical Memory Management: Paging and Swapping -- 8.7 Virtual Memory as a File System Cache -- 8.8 New Features of the Virtual Memory Implementation -- Chapter 9 Virtual Memory -- 9.1 Design Overview -- 9.2 Virtual Address Spaces -- 9.3 Tracing the VM System -- 9.4 Virtual Address Space Management -- 9.5 Segment Drivers -- 9.6 Anonymous Memory -- 9.7 The Anonymous Memory Layer -- 9.8 The swapfs Layer -- 9.9 Virtual Memory Watchpoints -- 9.10 Changes to Support Large Pages -- 9.11 MDB Reference -- Chapter 10 Physical Memory -- 10.1 Physical Memory Allocation -- 10.2 Pages: The Basic Unit of Solaris Memory -- 10.3 The Page Scanner -- 10.4 MDB Reference -- Chapter 11 Kernel Memory -- 11.1 Kernel Virtual Memory Layout -- 11.2 Kernel Memory Allocation -- 11.3 The Vmem Allocator -- 11.4 Kernel Memory Allocator Tracing -- 11.5 MDB Reference -- Chapter 12 Hardware Address Translation -- 12.1 HAT Overview -- 12.2 The UltraSPARC HAT Layer -- 12.3 The x64 HAT Layer -- 12.4 MDB Reference -- Chapter 13 Working with Multiple Page Sizes in Solaris -- 13.1 Determining When to Use Large Pages…”
    Libro electrónico