Mostrando 1,741 - 1,760 Resultados de 5,772 Para Buscar '"Copi"', tiempo de consulta: 0.11s Limitar resultados
  1. 1741
    por Sutor, Robert S.
    Publicado 2024
    Tabla de Contenidos: “…14.1 Ecosystem and community -- 14.2 Applications and strategy -- 14.3 Computing system access -- 14.4 Software -- 14.5 Hardware -- 14.6 Education -- 14.7 Workforce -- 14.8 Summary -- Afterword -- Appendices -- A Quick Reference -- A.1 One qubit kets -- A.2 Two qubit kets -- A.3 Pauli gates and matrices -- A.4 Pauli strings of length 2 -- A.5 Greek letters -- B Notices -- B.1 Photos, images, and diagrams -- B.2 Marks -- B.3 Creative Commons Attribution-NoDerivs 2.0 Generic -- B.4 Creative Commons Attribution-ShareAlike 2.0 Germany -- B.5 Creative Commons Attribution 3.0 Unported -- B.6 Creative Commons Attribution-ShareAlike 3.0 Unported -- B.7 Los Alamos National Laboratory -- B.8 Python 3 license -- C Production Notes -- C.1 How this book was built -- C.2 Citing this book -- C.3 Python version -- C.4 LaTeX environment -- Other Books You May Enjoy -- References -- Index -- Share your thoughts -- Download a free PDF copy of this book -- Other Books You May Enjoy -- Index -- Blank Page…”
    Libro electrónico
  2. 1742
    Publicado 2023
    Tabla de Contenidos:
    Libro electrónico
  3. 1743
    Publicado 2024
    Tabla de Contenidos: “…Using partitions in the fact table -- Scaling with aggregations and composite models -- Leveraging composite models -- Leveraging aggregations -- Improving performance with Synapse and Fabric -- The modern data warehouse architecture (Synapse) -- ADLS -- Azure Synapse Analytics and Fabric -- Summary -- Further reading -- Part 5: Optimizing Capacities in Power BI Enterprises -- Chapter 13: Working with Capacities -- How a noisy neighbor impacts shared capacity -- Controlling capacity workloads and settings -- Capacity settings -- How capacities manage resources -- Managing capacity overload and Autoscale -- Handling peak loads in Premium capacity with Autoscale -- Capacity planning, monitoring, and optimization -- Determining the initial capacity size -- Validating capacity size with load testing -- Alert notifications -- Monitoring capacities -- Understanding the compute report page -- Summary -- Chapter 14: Performance Needs for Fabric Artifacts -- Fabric artifacts -- Delta tables -- Warehouse or lakehouse -- The Spark engine -- Using Direct Lake for data sources -- Monitoring Fabric resource consumption -- Measuring the hotness of data -- Tips for enhancements -- Load balancing -- Dataflow copy fast -- On-demand loading -- Loading data in large chunks -- Vacuum and Delta table structure -- Summary -- Chapter 15: Embedding in Web Apps -- Improving embedded performance -- Measuring embedded performance -- Summary -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  4. 1744
    Publicado 2022
    Tabla de Contenidos: “…A combined diamond model and kill chain intrusion analysis -- Attribution -- Summary -- Questions -- Part 2: Evidence Acquisition -- Chapter 5: Collecting Network Evidence -- An overview of network evidence -- Preparation -- A network diagram -- Configuration -- Firewalls and proxy logs -- Firewalls -- Web application firewalls -- Web proxy servers -- NetFlow -- Packet capture -- tcpdump -- WinPcap and RawCap -- Wireshark -- Evidence collection -- Summary -- Questions -- Further reading -- Chapter 6: Acquiring Host-Based Evidence -- Preparation -- Order of volatility -- Evidence acquisition -- Evidence collection procedures -- Acquiring volatile memory -- FTK Imager -- WinPmem -- RAM Capturer -- Virtual systems -- Acquiring non-volatile evidence -- FTK obtaining protected files -- The CyLR response tool -- Kroll Artifact Parser and Extractor -- Summary -- Questions -- Further reading -- Chapter 7: Remote Evidence Collection -- Enterprise incident response challenges -- Endpoint detection and response -- Velociraptor overview and deployment -- Velociraptor server -- Velociraptor Windows collector -- Velociraptor scenarios -- Velociraptor evidence collection -- CyLR -- WinPmem -- Summary -- Questions -- Chapter 8: Forensic Imaging -- Understanding forensic imaging -- Image versus copy -- Logical versus physical volumes -- Types of image files -- SSD versus HDD -- Tools for imaging -- Preparing a staging drive -- Using write blockers -- Imaging techniques -- Dead imaging -- Live imaging -- Virtual systems -- Linux imaging -- Summary -- Questions -- Further reading -- Part 3: Evidence Analysis -- Chapter 9: Analyzing Network Evidence -- Network evidence overview -- Analyzing firewall and proxy logs -- SIEM tools -- The Elastic Stack -- Analyzing NetFlow -- Analyzing packet captures -- Command-line tools -- Real Intelligence Threat Analytics…”
    Libro electrónico
  5. 1745
    Publicado 2004
    Tabla de Contenidos: “…Hardware -- 2.1 Environmental -- 2.1.1 Power -- 2.1.2 Cooling -- 2.1.3 Geographic location -- 2.1.4 Physical security -- 2.1.5 Automation -- 2.1.6 Physical configuration control -- 2.2 Central Processing Complexes (CPCs) -- 2.2.1 How many CPCs to have -- 2.2.2 Availability features -- 2.2.3 Concurrent upgrade -- 2.2.4 Redundant capacity -- 2.2.5 Hardware configuration -- 2.3 Coupling Facilities -- 2.3.1 Coupling Facility Capacity -- 2.3.2 Failure isolation -- 2.3.3 Recovering from CF failure -- 2.3.4 How many CFs -- 2.3.5 Coupling Facility Control Code Level considerations -- 2.3.6 CF maintenance procedures -- 2.3.7 CF volatility -- 2.3.8 Nondisruptive Coupling Facilities hardware upgrades -- 2.4 9037 Sysplex Timers considerations -- 2.4.1 Sysplex Timer® Models -- 2.4.2 Recovering from loss of all timer signals -- 2.4.3 Maximizing 9037 availability -- 2.4.4 Message time ordering -- 2.5 Intelligent Resource Director -- 2.5.1 An IRD Illustration -- 2.5.2 WLM LPAR CPU Management -- 2.5.3 Dynamic Channel-path Management (DCM) -- 2.5.4 Channel Subsystem I/O Priority Queueing -- 2.6 Switches -- 2.6.1 ESCON Directors -- 2.6.2 FICON Switches -- 2.7 DASD -- 2.7.1 Peer to Peer Remote Copy (PPRC) -- 2.7.2 Extended Remote Copy (XRC) -- 2.8 Geographically Dispersed Parallel SysplexTM -- 2.8.1 Data consistency -- 2.8.2 The HyperSwap -- 2.9 Other hardware equipment…”
    Libro electrónico
  6. 1746
    por Warrick, Cathy
    Publicado 2005
    Tabla de Contenidos: “…Model characteristics -- 1.1 Benefits of the DS6000 series -- 1.1.1 Infrastructure Simplification -- 1.1.2 Business Continuity -- 1.1.3 Information Life Cycle Management -- 1.2 Hardware overview -- 1.2.1 DS6800 controller enclosure (Model 1750-511) -- 1.2.2 DS6000 expansion enclosure (Model 1750-EX1) -- 1.3 Functional overview -- 1.3.1 Storage capacity: RAID 5 and RAID 10 -- 1.3.2 Resiliency -- 1.3.3 Copy Services -- 1.4 DS management tools -- 1.4.1 IBM TotalStorage DS Storage Manager -- 1.4.2 IBM TotalStorage DS Open API -- 1.4.3 IBM TotalStorage DS Command Line Interface (CLI) -- 1.5 Supported environments -- 1.6 Performance overview -- 1.6.1 Sequential Prefetching in Adaptive Replacement Cache (SARC) -- 1.6.2 Performance for zSeries -- 1.6.3 IBM TotalStorage Multi-path Subsystem Device Driver (SDD) -- 1.6.4 Command Tag Queuing -- 1.7 IBM TotalStorage DS family comparisons -- 1.7.1 DS6000 series compared to ESS -- 1.7.2 DS6000 series compared to DS8000 -- 1.7.3 DS6000 series compared to DS4000 series -- 1.8 IBM DS6000 combined with virtualization products -- 1.8.1 IBM SAN Volume Controller -- 1.8.2 IBM SAN File System -- Chapter 2. …”
    Libro electrónico
  7. 1747
    Publicado 2002
    Tabla de Contenidos: “…7.2.1 Restricted and unrestricted agents, methods and operations -- 7.3 Creating an agent -- 7.3.1 Naming the agent -- 7.3.2 Scheduling the agent -- 7.3.3 Selecting documents to be processed -- 7.3.4 Specifying what an agent should do -- 7.3.5 Displaying the pop-up menu of an agent -- 7.3.6 Signing an agent -- 7.4 Testing an agent -- 7.4.1 Testing an agent during development -- 7.4.2 Testing an agent before copying it to a live database -- 7.4.3 Checking the Agent Log -- 7.4.4 Debugging agents -- 7.5 Enabling and disabling scheduled agents -- 7.5.1 To disable and enable individual agents -- 7.5.2 To disable all automated agents in a database -- 7.6 Troubleshooting agents -- 7.6.1 Agent is not running -- 7.6.2 Agent Manager is not working -- 7.6.3 Agents are running slowly -- 7.6.4 Agent will not run on a particular server -- 7.6.5 Debugging with NOTES.INI settings -- 7.6.6 Debugging at the server console -- 7.7 Agents and the Web -- 7.7.1 The Document Context of a Web agent and CGI variables -- 7.7.2 Agent output -- 7.7.3 Running multiple instances of an agent -- 7.7.4 WebQueryOpen and WebQuerySave agents -- 7.7.5 Using the @URLOpen command to call agents -- 7.8 Using agents (advanced topics) -- 7.9 New features in Domino 6 -- 7.10 Summary -- Chapter 8. …”
    Libro electrónico
  8. 1748
    por Kahate, Atul
    Publicado 2004
    Tabla de Contenidos: “…6.8.2 Granting Object Privileges -- 6.8.3 Restricting Object Privileges to Certain Columns -- 6.8.4 Granting All Privileges at the Same Time -- 6.8.5 Allowing Others to Grant Privileges -- 6.9 Taking Away Privileges -- 6.10 Filtering Table Privileges -- 6.11 Statistical Databases -- Key Terms and Concepts -- Chapter Summary -- Practice Set -- Chapter 7: Query Execution and Optimisation -- 7.1 Query Processing -- 7.2 Using Indexes -- 7.3 Optimiser Functionality -- 7.3.1 Driver Index -- 7.3.2 List Merge -- 7.4 Implementing SELECT -- 7.4.1 Simple SELECT -- 7.4.2 Complex SELECT Implementation -- 7.4.3 JOIN Implementation -- 7.4.4 PROJECT Implementation -- 7.4.5 SET Operator Implementation -- 7.4.6 Aggregate Functions Implementation -- 7.5 Optimisation Recommendations -- 7.6 Database Statistics -- Key Terms and Concepts -- Chapter Summary -- Practice Set -- Chapter 8: Distributed Databases -- 8.1 Distributed Database Concepts -- 8.1.1 Distributed Computing -- 8.1.2 Distributed Databases -- 8.2 Distributed Database Architectures -- 8.3 Advantages of Distributed Databases -- 8.4 Distributed Database Requirements -- 8.5 Distributed Database Techniques -- 8.5.1 Data Fragmentation -- 8.5.2 Data Replication -- 8.6 Distributed Query Processing -- 8.6.1 Costs -- 8.6.2 Semi-join -- 8.6.3 Distributed Query Decomposition -- 8.7 Distributed Concurrency Control and Recovery -- 8.7.1 Concurrency and Recovery Problems -- 8.7.2 Distinguished Copy -- 8.7.2.1 Primary site technique -- 8.7.2.2 Primary site with backup site technique -- 8.7.2.3 Primary copy technique -- 8.7.3 Dealing with Coordinator Failures -- 8.7.4 Voting Method -- 8.7.5 Distributed Recovery -- 8.8 Distributed Deadlocks -- 8.8.1 Prevent a Deadlock -- 8.8.2 Avoid a Deadlock -- 8.8.3 Detect a Deadlock -- 8.9 Client/Server Computing and DDBMS -- 8.9.1 Client/server Computing…”
    Libro electrónico
  9. 1749
    por Zhu, Wel-Dong
    Publicado 2005
    Tabla de Contenidos: “…. -- 9.6 Update existing CM system on multiplatforms -- 9.7 Review database naming conventions -- 9.8 Install Content Manager V8.3 system on z/OS -- 9.9 Copy CM V7.1 Library Server database to z/OS -- 9.9.1 Use DB2LOOK to extract DB2 table definitions -- 9.9.2 Create Content Manager V2.3 database on z/OS -- 9.9.3 Catalog CM V7 z/OS database on workstation -- 9.9.4 Create Content Manager V2.3 tables on z/OS -- 9.9.5 Unload data from multiplatforms Library Server database -- 9.9.6 Load data into z/OS database -- 9.9.7 Status at this point -- 9.9.8 Alternative ways of moving a DB2 database -- 9.10 Run Content Manager V8.3 migration jobs -- 9.10.1 ICMMMI70 -- 9.10.2 ICMMMI71 -- 9.10.3 ICMMMI72…”
    Libro electrónico
  10. 1750
    Publicado 2016
    Tabla de Contenidos: “…-- How This Book Is Organized -- About the Online Resources -- How to Use This Book -- Part 1: Tools of the Trade -- Chapter 1: Scanning Memory Using Cheat Engine -- Why Memory Scanners Are Important -- Basic Memory Scanning -- Cheat Engine's Memory Scanner -- Scan Types -- Running Your First Scan -- Next Scans -- When You Can't Get a Single Result -- Cheat Tables -- Memory Modification in Games -- Manual Modification with Cheat Engine -- Trainer Generator -- Pointer Scanning -- Pointer Chains -- Pointer Scanning Basics -- Pointer Scanning with Cheat Engine -- Pointer Rescanning -- Lua Scripting Environment -- Searching for Assembly Patterns -- Searching for Strings -- Closing Thoughts -- Chapter 2: Debugging Games with OllyDbg -- A Brief Look at OllyDbg's User Interface -- OllyDbg's CPU Window -- Viewing and Navigating a Game's Assembly Code -- Viewing and Editing Register Contents -- Viewing and Searching a Game's Memory -- Viewing a Game's Call Stack -- Creating Code Patches -- Tracing Through Assembly Code -- OllyDbg's Expression Engine -- Using Expressions in Breakpoints -- Using Operators in the Expression Engine -- Working with Basic Expression Elements -- Accessing Memory Contents with Expressions -- OllyDbg Expressions in Action -- Pausing Execution When a Specific Player's Name Is Printed -- Pausing Execution When Your Character's Health Drops -- OllyDbg Plug-ins for Game Hackers -- Copying Assembly Code with Asm2Clipboard -- Adding Cheat Engine to OllyDbg with Cheat Utility -- Controlling OllyDbg Through the Command Line…”
    Libro electrónico
  11. 1751
    Publicado 2022
    Tabla de Contenidos: “…-- Get and Use Good Data -- Heed Growing Threats More -- Row the Same Direction -- Focus on Social Engineering Mitigation -- Track Processes and Network Traffic -- Improve Overall Cybersecurity Hygiene -- Use Multifactor Authentication -- Use a Strong Password Policy -- Secure Elevated Group Memberships -- Improve Security Monitoring -- Secure PowerShell -- Secure Data -- Secure Backups -- Summary -- Chapter 11 What Not to Do -- Assume You Can't Be a Victim -- Think That One Super-Tool Can Prevent an Attack -- Assume Too Quickly Your Backup Is Good -- Use Inexperienced Responders -- Give Inadequate Considerations to Paying Ransom -- Lie to Attackers -- Insult the Gang by Suggesting Tiny Ransom -- Pay the Whole Amount Right Away -- Argue with the Ransomware Gang -- Apply Decryption Keys to Your Only Copy -- Not Care About Root Cause -- Keep Your Ransomware Response Plan Online Only -- Allow a Team Member to Go Rogue -- Accept a Social Engineering Exclusion in Your Cyber-Insurance Policy -- Summary -- Chapter 12 Future of Ransomware -- Future of Ransomware -- Attacks Beyond Traditional Computers -- IoT Ransoms -- Mixed-PurposeHacking Gangs -- Future of Ransomware Defense -- Future Technical Defenses -- Ransomware Countermeasure Apps and Features -- AI Defense and Bots -- Strategic Defenses -- Focus on Mitigating Root Causes -- Geopolitical Improvements -- Systematic Improvements…”
    Libro electrónico
  12. 1752
    Publicado 2017
    Tabla de Contenidos: “…GPIO callback functions -- DC motor control in Python -- Some mini-project challenges for the reader -- Summary -- Chapter 4: Communication Interfaces -- UART - serial port -- Raspberry Pi Zero's UART port -- Setting up the Raspberry Pi Zero serial port -- Example 1 - interfacing a carbon dioxide sensor to the Raspberry Pi -- Python code for serial port communication -- I2C communication -- Example 2 - PiGlow -- Installing libraries -- Example -- Example 3 - Sensorian add-on hardware for the Raspberry Pi -- I2C drivers for the lux sensor -- Challenge -- The SPI interface -- Example 4 - writing to external memory chip -- Challenge to the reader -- Summary -- Chapter 5: Data Types and Object-Oriented Programming in Python -- Lists -- Operations that could be performed on a list -- Append element to list: -- Remove element from list: -- Retrieving the index of an element -- Popping an element from the list -- Counting the instances of an element: -- Inserting element at a specific position: -- Challenge to the reader -- Extending a list -- Clearing the elements of a list -- Sorting the elements of a list -- Reverse the order of elements in list -- Create copies of a list -- Accessing list elements -- Accessing a set of elements within a list -- List membership -- Let's build a simple game! …”
    Libro electrónico
  13. 1753
    Publicado 2023
    Tabla de Contenidos: “…-- Creating a scheduled task -- Example - scheduled maintenance window -- Example - automatically optimizing your images -- Exercises -- Exercise 1 - handling planned maintenance -- Exercise 2 - calling an endpoint -- Summary -- Further reading -- Chapter 10: Tailored Communication with Mail Templates -- Notifications as a branding item -- The Mail Templates feature -- Customizing an email template -- Case study - customizing the user registration email -- Exercises -- Exercise 1 - customizing the courtesy Contact Form Mail Copy -- Exercise 2 - modifying your emails with your logo -- Summary -- Chapter 11: Command-Line Interface -- Using Joomla via the CLI -- Available commands -- Example - managing users through the CLI -- Example - updating your site through the CLI -- Exercises -- Exercise 1 - accessing Joomla's CLI -- Exercise 2 - Scheduled Tasks via the CLI -- Summary -- Further reading -- Part 3: Styling and Securing Your Website -- Chapter 12: Styling Your Website - Templates -- What is a template? …”
    Libro electrónico
  14. 1754
    Publicado 2005
    Tabla de Contenidos: “…Managing Your Class -- Understanding and Using Roles -- Assigning Roles in Your Course -- Removing Students -- Managing Enrollment -- Capabilities and Permissions -- Role Overrides -- Assigning Roles in Activities -- Student Groups -- Backups -- Restoring and Copying Courses -- Reports…”
    Libro electrónico
  15. 1755
    Publicado 2013
    Tabla de Contenidos: “…Recovering from Transient and Permanent Disk Failures -- ASM and I/O Error Failure Management -- Space Management Views for ASM Redundancy -- Disk Groups and Attributes -- Attributes Overview -- Summary -- Chapter 5: Managing Databases in ASM -- Interaction Between ASM and Database -- Cloning ASM and Database Homes -- Create Database in Command-Line Mode -- Database Interaction with ASM -- Disk Groups and Databases -- Transportable Tablespaces and ASM -- Performing the Preliminary Steps to Set Up the TTSs -- Alert Log Monitoring -- Monitoring the ASM Disk Group -- Issues DBAs Encounter with ASM -- Spfile with an Incorrect Initialization Parameter -- Archiver Is Stuck -- Moving the Control Files to ASM -- Use Cases for DBAs -- Impact of DB_UNIQUE_NAME for the ASM Directory Structure -- Backing Up the Database to the FRA Disk Group -- Specifying Default Locations for Data Files and Redo Logs -- Copying Files from One ASM Instance to Another -- How to Migrate from File System to ASM with Minimal Downtime -- How to Move a Tablespace from One Disk Group to Another -- Create Multiplexed Redo Logs -- Summary -- Chapter 6: ASMLIB Concepts and Overview -- Benefits of ASMLIB -- Device Discovery -- I/O Processing -- ASMLIB Implementation -- ASMLIB Installation -- Setting Up and Configuring ASMLIB -- Managing Disks in ASMLIB -- Troubleshooting ASMLIB -- Summary -- Chapter 7: ASM Files, Aliases, and Security -- ASM Filenames -- ASM Directories -- ASM Aliases -- Templates -- VASM_TEMPLATE -- ASM File Access Control -- ASM ACL Overview -- ASM ACL Setup Example -- Summary -- Chapter 8: ASM Space Allocation and Rebalance -- ASM Space Allocation -- ASM Allocation Units -- ASM Extents -- ASM Striping -- Setting Larger AU Sizes for VLDBs -- ASM Rebalance -- Rebalance Operation -- Fast Rebalance -- Effects of Imbalanced Disks -- ASM and Storage Array Migration…”
    Libro electrónico
  16. 1756
    Publicado 2017
    Tabla de Contenidos: “…Listing the products -- Adding a new route -- Looping through products -- Creating pagination -- Calculating the values -- Displaying a paginated list -- Creating paginating buttons -- Updating the URL on navigation -- Creating pagination links -- Updating the items per page -- Creating the ListProducts component -- Creating a curated list for the home page -- Showing more information -- Creating categories -- Creating a category list -- Creating an "miscellaneous" category -- Displaying the categories -- Displaying products in a category -- Code optimization -- Ordering products in a category -- Store the product price -- Wiring up the ordering -- Creating Vuex getters -- Building the filtering component based on products -- Dynamically creating filters -- Resetting filters -- Updating the URL on checkbox filter change -- Preselecting filters on page load -- Filtering the products -- Summary -- Chapter 11: Building an E-Commerce Store - Adding a Checkout -- Creating the basket array placeholder -- Adding product information to the store -- Creating the store mutation to add products to the basket -- Updating the Add to basket button when adding an item -- Showing the product count in the header of the app -- Calculating the basket quantity -- Finalizing the Shop Vue-router URLs -- Building the Order process and ListProducts component -- Order Confirmation screen -- Using Vue filters to format the price -- Calculating a total price -- Creating an Order Checkout page -- Copying details between addresses -- Creating an editable basket -- Creating editable fields -- Removing items from your cart -- Completing the shop SPA -- Summary -- Chapter 12: Using Vue Dev Tools and Testing Your SPA -- Using the Vue.js developer tools -- Inspecting Vue components data and computed values -- Viewing Vuex mutations and time-travel -- Previewing event data…”
    Libro electrónico
  17. 1757
    Publicado 2017
    Tabla de Contenidos: “…Rotating the Empties -- Scaling empties and adjusting for differences in pictures -- Modeling the base of the house -- Using Extrude and merging vertices -- Using Loop Cut and Slide -- Summary -- Chapter 9: Mesh Modeling and Positioning the Details -- Modeling windows -- Creating a window as a separate object -- Adding shutters with a multi-cut Loop Cut and Slide -- Starting window panes with Subdivide -- Subdividing edges -- Controlling the number of cuts -- Finishing window panes with Inset -- Noting and applying exact thicknesses -- Raising the details with Extrude -- Renaming and copying windows -- Perfecting the positioning with Snap -- Summary -- Chapter 10: Making Textures with the Array Modifier and Scalable Vector Graphics -- Making brickwork with the Array Modifier -- Adding an Array Modifier -- Picking the Fit Type -- Understanding the impact of scale on the Array Modifier -- Setting the Offset -- Nesting Array Modifiers -- Importing a Scalable Vector Graphics file for stonework -- Using the Outliner and Properties Shelf to find objects -- Scaling, rotating and converting to 3D mesh -- Combining with the Array Modifier -- Summary -- Chapter 11: Applying Textures with Boolean Intersection -- Making template shapes -- Duplicating and separating vertices -- Joining and separating objects as a shortcut -- Joining and making new faces -- Deleting unnecessary faces and edges -- Adjusting vertex coordinates -- Creating new edges and filling faces -- Taking an intersection -- Adding a Boolean Intersection Modifier -- Previewing modifiers -- Switching viewport shading to wireframe -- Hiding the supporting object -- Making adjustments -- Applying and placing the Intersection -- Finalizing and exporting the house -- Summary -- Chapter 12: Making Organic Shapes with the Subdivision Surface Modifier -- Thinking about overhangs and flat bases…”
    Libro electrónico
  18. 1758
    Publicado 2018
    Tabla de Contenidos: “….movingaverage() -- .trend() -- .range() -- .precision() -- Data source functions -- Elasticsearch -- Static/value -- World bank -- Setting the offset for data sources -- Saving Timelion graph -- Timelion sheet option -- Deleting Timelion sheet -- Timelion help -- Function reference -- Keyboard tips -- Timelion auto-refresh -- Summary -- Chapter 7: Interact with Your Data Using Dev Tools -- Console -- Copy as cURL -- Auto indent -- Multiple requests in console -- Profiling queries -- Query profile -- Aggregation profile -- Grok debugger -- Summary -- Chapter 8: Tweaking Your Configuration with Kibana Management -- Index pattern -- Creating the index pattern -- Setting the default index pattern -- Refreshing index pattern fields -- Deleting an index pattern -- Managing fields -- String -- Dates -- Geographic point field -- Numbers -- Saved objects -- Dashboards -- Searches -- Visualizations -- Advanced settings -- xPack:defaultAdminEmail -- search:queryLanguage -- search:queryLanguage:switcher:enable -- dateFormat -- dateFormat:tz -- dateFormat:dow -- defaultIndex -- Reporting -- Security -- Roles -- Users -- Watcher -- Creating the watch -- Threshold alert -- Advanced watch -- Deleting the watch -- Summary -- Chapter 9: Understanding X-Pack Features -- Installing X-Pack -- Installing X-Pack into Elasticsearch -- Installing X-Pack into Kibana -- Features of X-Pack -- Monitoring -- Elasticsearch monitoring -- Kibana monitoring -- Security settings -- Users -- Roles -- Machine learning -- Other options of X-Pack -- Application Performance Monitoring -- Logging -- Apache logs -- MySQL logs -- Nginx logs -- System logs -- Metrics -- Apache metrics -- Docker metrics -- Kubernetes metrics -- MySQL metrics -- Nginx metrics -- Redis metrics -- System metrics -- Summary -- Chapter 10: Machine Learning with Kibana -- Machine learning jobs -- Single metric Jobs…”
    Libro electrónico
  19. 1759
    Publicado 2021
    Tabla de Contenidos: “…Composite Types -- Arrays-Too Rigid to Use Directly -- Slices -- len -- append -- Capacity -- make -- Declaring Your Slice -- Slicing Slices -- Converting Arrays to Slices -- copy -- Strings and Runes and Bytes -- Maps -- Reading and Writing a Map -- The comma ok Idiom -- Deleting from Maps -- Using Maps as Sets -- Structs -- Anonymous Structs -- Comparing and Converting Structs -- Wrapping Up -- Chapter 4. …”
    Libro electrónico
  20. 1760
    por Biafore, Bonnie
    Publicado 2014
    Tabla de Contenidos: “…Reclassifications and Corrections -- Recording Depreciation with Journal Entries -- Recording Owners' Contributions -- Chapter 17: Performing Year-End Tasks -- Checking for Problems -- Viewing Your Trial Balance -- Generating Financial Reports -- Generating Tax Reports -- Sharing a Company File with Your Accountant -- 1099s -- Closing the Books for the Year -- Part Three: Managing Your Business -- Chapter 18: Keeping Track of Financial Tasks -- Tracking To-Dos -- Adding Notes -- Reminders -- Your Financial Calendar -- Chapter 19: Managing QuickBooks Files -- Switching Between Multi- and Single-User Mode -- Backing Up Files -- Restoring Backups -- Sending Company Files to Others -- Verifying Your QuickBooks Data -- Condensing Data -- Cleaning Up after Deleting Files -- Chapter 20: Managing Inventory -- Following the Inventory Money Trail -- Setting Up Inventory Items -- Purchasing Inventory -- Selling Inventory -- Running Inventory Reports -- Working with the Inventory Center -- Performing a Physical Inventory -- Adjusting Inventory in QuickBooks -- Chapter 21: Working with Sales Tax -- Setting Up Sales Tax -- Producing Reports of the Sales Tax You Owe -- Paying Sales Tax -- Chapter 22: Budgeting and Planning -- Types of Budgets -- Ways to Build Budgets -- Creating Budgets in QuickBooks -- Creating Customer:Job or Class Budgets -- Filling in Budget Values -- Creating and Copying Budgets with Excel -- Running Budget Reports -- Chapter 23: Tracking Finances with Reports and Graphs -- Finding the Right Reports -- Running Reports -- Printing and Saving Reports -- Customizing Reports -- Memorizing Reports -- Swapping Reports Between Company Files -- Part Four: QuickBooks Power -- Chapter 24: Banking Online with QuickBooks -- Setting Up Your Accounts for Online Services -- Exchanging Data with Your Bank -- Banking Online Using Express Mode…”
    Libro electrónico