Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 30
- Computer security 26
- Environmental aspects 23
- carbon footprint 21
- Management 20
- Penetration testing (Computer security) 20
- sustainability 20
- Security measures 19
- Application software 18
- Technology: general issues 16
- Development 15
- History of engineering & technology 14
- climate change 14
- Engineering & Applied Sciences 13
- Data processing 12
- Information technology 12
- Hackers 10
- Certification 9
- Computer-aided design 9
- IBM computers 9
- Research & information: general 9
- Sustainability 9
- Sustainable development 9
- Architectural drawing 8
- Autodesk Revit 8
- China 8
- Cloud computing 8
- Computer graphics 8
- circular economy 8
- energy efficiency 8
-
501Publicado 2020“…Two integrated memory controllers that double the memory footprint of IBM POWER8® servers. Integrated I/O subsystem and hot-pluggable Peripheral Component Interconnect Express (PCIe) Gen4 and Gen3 I/O slots. …”
Libro electrónico -
502por Hunt, Charlie“…Coverage includes Taking a proactive approach to meeting application performance and scalability goals Monitoring Java performance at the OS level in Windows, Linux, and Oracle Solaris environments Using modern Java Virtual Machine (JVM) and OS observability tools to profile running systems, with almost no performance penalty Gaining ';under the hood' knowledge of the Java HotSpot VM that can help you address most Java performance issues Integrating JVM-level and application monitoring Mastering Java method and heap (memory) profiling Tuning the Java HotSpot VM for startup, memory footprint, response time, and latency Determining when Java applications require rework to meet performance goals Systematically profiling and tuning performance in both Java SE and Java EE applications Optimizing the performance of the Java HotSpot VM Using this book, you can squeeze maximum performance and value from all your Java applicationsno matter how complex they are, what platforms they're running on, or how long you've been running them…”
Publicado 2011
Libro electrónico -
503Publicado 2022“…Detailed system firmware development case studies using a futuristic approach cover: Future scalable system firmware development models Types of firmware development (system firmware, device firmware, manageability firmware) Tools and their usage while creating system firmware How to build infrastructure for seamless firmware development using a multi-party development model Debugging methodologies used during various phases of firmware product development Setting up key expectations for future firmware, including thinner firmware footprints and faster execution time, easier configuration, and increased transparent security What You Will Learn Understand the system firmware working model of the future Gain knowledge to say goodbye to proprietary firmware for different types of firmware development Know the different types of tools required for creating firmware source code before flashing the final image into the boot device of the embedded system Develop skills to understand the failure in firmware or in the system and prepare the debugging environment to root cause the defects Discern the platform minimal security requirement Optimize the system firmware boot time based on the target hardware requirement Comprehend the product development cycle using open source firmware development…”
Libro electrónico -
504Publicado 2022“…Audience This book is for executive IT leaders such as CIOs, CDOs, and CTOs dedicated to influencing, inspiring, and engaging businesses, organizations, and individuals to reduce their carbon footprint through sustainable IT practices…”
Grabación no musical -
505Publicado 2016“…Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers About This Book Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Footprint, monitor, and audit your network and investigate any ongoing infestations Customize Kali Linux with this professional guide so it becomes your pen testing toolkit Who This Book Is For If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. …”
Libro electrónico -
506Publicado 2016“…Once a firm grounding in the Cortex-M processor has been established the book introduces the use of a small footprint RTOS and the CMSIS-DSP library. The book also examines techniques for software testing and code reuse specific to Cortex-M microcontrollers. …”
Libro electrónico -
507por Uphill, Thomas“…The Puppet tool is an intelligent solution that increases the automation footprint for the proactive management of server infrastructures. …”
Publicado 2015
Libro electrónico -
508Publicado 2018“…The z14 ZR1 is designed for enhanced modularity, in an industry standard footprint. A data-centric infrastructure must always be available with a 99.999% or better availability, have flawless data integrity, and be secured from misuse. …”
Libro electrónico -
509Publicado 2022“…What you will learn Get to grips with information security and ethical hacking Undertake footprinting and reconnaissance to gain primary information about a potential target Perform vulnerability analysis as a means of gaining visibility of known security weaknesses Become familiar with the tools and techniques used by an attacker to hack into a target system Discover how network sniffing works and ways to keep your information secure Explore the social engineering techniques attackers use to compromise systems Who this book is for This ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. …”
Libro electrónico -
510Publicado 2017“…You will benefit from knowing about security footprint of all major AWS services for multiple domains, use cases, and scenarios. …”
Libro electrónico -
511Publicado 2018“…You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. …”
Libro electrónico -
512Publicado 2023“…Minimize your vulnerabilities and data footprint. Solve your password problems and use two-factor authentication. …”
Libro electrónico -
513Publicado 2018“…What You Will Learn The basics of network pentesting including network scanning and sniffing Wireless, wired attacks, and building traps for attack and torrent detection Web server footprinting and web application attacks, including the XSS and SQL injection attack Wireless frames and how to obtain information such as SSID, BSSID, and the channel number from a wireless frame using a Python script The importance of web server signatures, email gathering, and why knowing the server signature is the first step in hacking In Detail This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. …”
Libro electrónico -
514Publicado 2024“…What you will learn Optimize software and infrastructure for sustainability Integrate green software principles into the Agile Software Development Life Cycle Explore emerging trends and technologies shaping the future of green software engineering Reflect on tech ethics as well as address societal and environmental concerns Implement industry standards and reporting methodologies for software emissions Measure digital operations' environmental footprint with methodologies Mitigate software's ecological impact with strategic approaches Who this book is for If you're a software developer, software architect, or IT professional who wants to integrate sustainability into your organization, this book is for you. …”
Libro electrónico -
515Publicado 2022“…With API Connect's security, flexibility, and high performance, you'll be able to meet the needs of your enterprise and clients by extending your API footprint. This book provides a complete roadmap to create, manage, govern, and publish your APIs. …”
Libro electrónico -
516Publicado 2018“…This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. About This Book Identify and mitigate security risks in your Windows Server 2016 infrastructure Learn how to build a PKI and use it to issue certificates within your network In-depth information for setting up Microsoft DirectAccess Who This Book Is For If you are a Windows Server administrator interested in learning the key security and networking functions available in Windows Server 2016, keep this book close at hand. …”
Libro electrónico -
517Publicado 2018“…Key Features Identify the vulnerabilities in your system using Kali Linux 2018.02 Discover the art of exploiting Windows kernel drivers Get to know several bypassing techniques to gain control of your Windows environment Book Description Windows has always been the go-to platform for users around the globe to perform administration and ad hoc tasks, in settings that range from small offices to global enterprises, and this massive footprint makes securing Windows a unique challenge. …”
Libro electrónico -
518Publicado 2014“…These benefits include better user experience, server and application consolidation, development cycle reduction, application scalability, data center footprint savings, and improved price performance economics. …”
Libro electrónico -
519Publicado 2017“…What You Will Learn Debug Node.js programs Write and publish your own Node.js modules Detailed coverage of Node.js core API's Use web frameworks such as Express, Hapi and Koa for accelerated web application development Apply Node.js streams for low-footprint data processing Fast-track performance knowledge and optimization abilities Persistence strategies, including database integrations with MongoDB, MySQL/MariaDB, Postgres, Redis, and LevelDB Apply critical, essential security concepts Use Node with best-of-breed deployment technologies: Docker, Kubernetes and AWS In Detail Today's web demands efficient real-time applications and scalability. …”
Libro electrónico -
520Publicado 2017“…Creating complex and rich web applications, with a lighter resource footprint, has never been easier or faster. Angular is now at release 4, with significant changes through previous versions. …”
Libro electrónico