Mostrando 5,181 - 5,200 Resultados de 12,444 Para Buscar '"LinkedIn"', tiempo de consulta: 0.10s Limitar resultados
  1. 5181
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Common Performance Pitfalls -- Asking the Rust compiler about performance -- Optimizations -- Build configuration -- Optimization level -- Debug information -- Link-time optimizations -- Debug assertions -- Panic behavior -- Runtime library paths -- Translation issues -- Indexing degradations -- Using iterators -- Iterator adaptors -- Real-life example -- Specialized adaptors -- Interaction between adaptors -- Itertools -- Borrowing degradations -- Cyclomatic complexity -- Summary -- Chapter 2: Extra Performance Enhancements -- Compile-time checks -- Sequential state machines -- Complex state machines -- Real-life type system check example -- Extra performance tips -- Using closures to avoid runtime evaluation -- Unstable sorting -- Map hashing -- Perfect hash functions -- Standard library collections -- Sequences -- Maps -- Sets -- Summary -- Chapter 3: Memory Management in Rust -- Mastering the borrow checker -- Allocations -- Mutability, borrowing, and owning -- Lifetimes -- Memory representation -- Alignment -- Complex enumerations -- Unions -- Shared pointers -- The cell module -- Cells -- RefCell -- The rc module -- Summary -- Chapter 4: Lints and Clippy -- Using Rust compiler lints -- Lints -- Avoiding anonymous parameters -- Avoiding heap allocated box pointers -- Avoiding missing implementations -- Enforcing documentation -- Pointing out trivial casts -- Linting unsafe code blocks -- Unused lints -- Variant size differences -- Lint groups -- Clippy -- Installation -- Configuration -- Lints -- Casting -- Bad practice -- Performance lints -- Unwraps -- Shadowing -- Integer overflow -- Lint groups -- Summary -- Chapter 5: Profiling Your Rust Application -- Understanding the hardware…”
    Libro electrónico
  2. 5182
    Publicado 2016
    Tabla de Contenidos: “…File Management -- File and Directory Names -- File and Directory Wildcards -- Looking Inside Files -- cat -- less -- grep -- Creating and Editing Files -- Text Editors and Word Processors -- The vi Text Editor -- vi Basics -- A Simpler vi Alternative: Pico -- The More Complex Option: Emacs -- Managing Files -- Creating Directories with mkdir -- Copying Files -- Renaming and Moving Files with mv -- Removing Files and Directories -- Working with Links -- Compressing and Archiving Files -- Files on Other Operating Systems -- Chapter 5. …”
    Libro electrónico
  3. 5183
    Publicado 2015
    Tabla de Contenidos: “…TRILL (Transparent Interconnection of a Lot of Links); 4.7. LISP (Locator/Identifier Separation Protocols); 4.8. …”
    Libro electrónico
  4. 5184
    Publicado 2016
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- Acknowledgments -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Deploying Ubuntu Server -- Setting up our lab -- Determining your server's role -- Obtaining Ubuntu Server -- Deciding between 32-bit and 64-bit installations -- Creating a bootable Ubuntu Server flash drive (Windows) -- Creating a bootable Ubuntu Server flash drive (Linux) -- Creating a bootable Ubuntu Server flash drive (Mac) -- Planning the partition layout -- Installing Ubuntu Server -- Installing Ubuntu Server (Raspberry Pi) -- Summary -- Chapter 2: Managing Users -- Understanding when to use root -- Creating and removing users -- Understanding the /etc/passwd and /etc/shadow files -- Distributing default configuration files with /etc/skel -- Switching between users -- Managing groups -- Managing passwords and password policies -- Configuring administrator access with sudo -- Setting permissions on files and directories -- Summary -- Chapter 3: Managing Storage Volumes -- Viewing disk usage -- Adding additional storage volumes -- Partitioning and formatting volumes -- Mounting and unmounting storage volumes -- Understanding the /etc/fstab file -- Managing swap -- Utilizing LVM volumes -- Using symbolic and hard links -- Summary -- Chapter 4: Connecting to Networks -- Setting the hostname -- Managing network interfaces -- Assigning static IP addresses -- Understanding Linux name resolution -- Understanding Network Manager -- Getting started with OpenSSH -- Getting started with SSH key management -- Simplifying SSH connections with a ~/.ssh/config file -- Summary -- Chapter 5: Managing Software Packages -- Understanding Linux package management -- Installing and removing software -- Searching for packages -- Managing software repositories -- Keeping your server up to date…”
    Libro electrónico
  5. 5185
    por Bellandi, Francesco
    Publicado 2012
    Tabla de Contenidos: “…1.4.3.7 Selection of Working Principles in the Financial Statement Presentation Project 1.4.4 Interrelationships and Conflicts among Working Principles; 1.4.5 Link to the Topic of This Book; 1.5 Main Interrelationships with Other Projects; 1.6 Significance of Equity; 1.7 Scope of Book; 2 Views on Equity and Implications; 2.1 Terminology and Definitions of Terms; 2.1.1 Equity; 2.1.2 Equity Owners; 2.1.2.1 Shareholders; 2.1.2.2 Owners; 2.1.2.3 Equity Holders; 2.1.2.4 Beneficiaries; 2.1.2.5 Equity Investors; 2.1.2.6 Equity Participants; 2.1.2.7 Interchangeability, Inconsistency, and Dissimilarity…”
    Libro electrónico
  6. 5186
    Tabla de Contenidos: “…-- Computational Environments for Coupling Multiphase Flow, Transport, and Mechanics in Porous Media -- The Excitement in Parallel Computing -- Session I: Performance Optimization -- Improving Performance of Digest Caches in Network Processors -- Optimization of BLAS on the Cell Processor -- Fine Tuning Matrix Multiplications on Multicore -- The Design and Architecture of MAQAOAdvisor: A Live Tuning Guide -- A Load Balancing Framework for Clustered Storage Systems -- Construction and Evaluation of Coordinated Performance Skeletons -- Session II: Parallel Algorithms and Applications -- Data Sharing Analysis of Emerging Parallel Media Mining Workloads -- Efficient PDM Sorting Algorithms -- Accelerating Cone Beam Reconstruction Using the CUDA-Enabled GPU -- Improving the Performance of Tensor Matrix Vector Multiplication in Cumulative Reaction Probability Based Quantum Chemistry Codes -- Experimental Evaluation of Molecular Dynamics Simulations on Multi-core Systems -- Parsing XML Using Parallel Traversal of Streaming Trees -- Session III: Scheduling and Resource Management -- Performance Analysis of Multiple Site Resource Provisioning: Effects of the Precision of Availability Information -- An Open Computing Resource Management Framework for Real-Time Computing -- A Load Aware Channel Assignment and Link Scheduling Algorithm for Multi-channel Multi-radio Wireless Mesh Networks -- Multi-round Real-Time Divisible Load Scheduling for Clusters -- Energy-Efficient Dynamic Scheduling on Parallel Machines -- A Service-Oriented Priority-Based Resource Scheduling Scheme for Virtualized Utility Computing -- Session IV: Sensor Networks -- Scalable Processing of Spatial Alarms -- Coverage Based Expanding Ring Search for Dense Wireless Sensor Networks -- An Energy-Balanced Task Scheduling Heuristic for Heterogeneous Wireless Sensor Networks -- Energy Efficient Distributed Algorithms for Sensor Target Coverage Based on Properties of an Optimal Schedule -- In-Network Data Estimation for Sensor-Driven Scientific Applications -- Localization in Ad Hoc and Sensor Wireless Networks with Bounded Errors -- Session V: Energy-Aware Computing -- Optimization of Fast Fourier Transforms on the Blue Gene/L Supercomputer -- ScELA: Scalable and Extensible Launching Architecture for Clusters -- Parallel Information Theory Based Construction of Gene Regulatory Networks -- Communication Analysis of Parallel 3D FFT for Flat Cartesian Meshes on Large Blue Gene Systems -- Scalable Multi-cores with Improved Per-core Performance Using Off-the-critical Path Reconfigurable Hardware -- Session VI: Distributed Algorithms -- TrustCode: P2P Reputation-Based Trust Management Using Network Coding -- Design, Analysis, and Performance Evaluation of an Efficient Resource Unaware Scheduling Strategy for Processing Divisible Loads on Distributed Linear Daisy Chain Networks -- A Novel Learning Based Solution for Efficient Data Transport in Heterogeneous Wireless Networks -- Scalable Data Collection in Sensor Networks -- Task Scheduling on Heterogeneous Devices in Parallel Pervasive Systems (P 2 S) -- A Performance Guaranteed Distributed Multicast Algorithm for Long-Lived Directional Communications in WANETs -- Session VII: Communication Networks -- Maintaining Quality of Service with Dynamic Fault Tolerance in Fat-Trees -- Designing a High-Performance Clustered NAS: A Case Study with pNFS over RDMA on InfiniBand -- Sockets Direct Protocol for Hybrid Network Stacks: A Case Study with iWARP over 10G Ethernet -- Making a Case for Proactive Flow Control in Optical Circuit-Switched Networks -- FBICM: Efficient Congestion Management for High-Performance Networks Using Distributed Deterministic Routing -- Achieving 10Gbps Network Processing: Are We There Yet? …”
    Libro electrónico
  7. 5187
    por Peréz, André
    Publicado 2012
    Tabla de Contenidos: “…Modification of the RLC/MAC layer; 2.5.4. Link control; Chapter 3. The UMTS Network; 3.1. The services; 3.2. …”
    Libro electrónico
  8. 5188
    Publicado 2018
    Tabla de Contenidos: “…3.4.3 5G Roadmaps3.5 Spectrum Usage Aspects at High Frequencies; 3.5.1 Propagation Challenges; 3.5.2 Beamforming and 5G Mobile Coverage; 3.5.3 Analysis of Deployment Scenarios; 3.5.4 Coexistence of 5G Systems and Fixed Service Links; 3.5.5 Coexistence under License-exempt Operation; 3.6 Spectrum Management; 3.6.1 Evolutions in Dynamic Spectrum Management; 3.6.2 Functional Spectrum Management Architecture; 3.7 Summary and Outlook; References; Chapter 4 Channel Modeling; 4.1 Introduction; 4.2 Core Features of New Channel Models; 4.2.1 Path Loss; 4.2.2 LOS Probability; 4.2.3 O2I Penetration Loss…”
    Libro electrónico
  9. 5189
    Publicado 2007
    Tabla de Contenidos: “…-- Using the Button Component -- Using the RadioButton Component -- Changing Component Appearances -- Summary -- Q&A -- Workshop -- HOUR 17 Using Components -- Using Data Providers -- Exercises with Other Components -- Summary -- Q&A -- Workshop -- HOUR 18 Using Video -- Embedding Video Versus Playing External Video -- Using Video -- Summary -- Q&A -- Workshop -- Part IV: Putting It All Together for the Web -- HOUR 19 Linking a Movie to the Web -- Basic Publishing -- Simple Hyperlinks -- Using Style Sheets -- What Other Web Tasks Can Flash Do? …”
    Libro electrónico
  10. 5190
    por Bragg, Steven M.
    Publicado 2007
    Tabla de Contenidos: “…; 2-6 HOW CLOSELY SHOULD I LINK CAPITAL EXPENDITURES TO STRATEGY?; 2-7 WHAT FORMAT SHOULD I USE FOR A CAPITAL REQUEST FORM?…”
    Libro electrónico
  11. 5191
    por Braithwaite, Chris
    Publicado 2004
    Tabla de Contenidos: “…2.3.1.2 Sample Usage and Service Offerings2.3.2 Cell Coverage Estimation; 2.3.2.1 Link Budget; 2.3.2.2 Soft Handover Gain; 2.3.2.3 Coverage Limited; 2.3.2.4 Capacity Limited; 2.3.2.5 Load Factor; 2.3.3 Cell Count Estimation Model; 2.3.4 Area Coverage Probability; 2.3.4.1 Area Coverage Probability - Outage; 2.3.4.2 Cell Edge Coverage Probability; 2.3.5 Blocking; 2.3.5.1 The Poisson Distribution; 2.3.6 Simulation Analysis of Network Design Plan; 2.4 Optimization; Part II CAPACITY AND NETWORK PLANNING; 3 Detailed Network Planning…”
    Libro electrónico
  12. 5192
    por Schmalz, Michael
    Publicado 2005
    Tabla de Contenidos: “…Integration from the Access Interface; 4.2. Linking Excel Data; 4.3. Using Export and Analyzing It with Microsoft Office Excel; 4.4. …”
    Libro electrónico
  13. 5193
    por Nakhjiri, Madjid
    Publicado 2005
    Tabla de Contenidos: “…3.1.4.2 Key Agreement3.1.4.3 Manual Key Establishment; 3.2 Management of Symmetric Keys; 3.2.1 EAP Key Management Methods; 3.2.2 Diffie-Hellman Key Agreement for Symmetric Key Generation; 3.2.2.1 Problems with Diffie-Hellman; 3.2.3 Internet Key Exchange for Symmetric Key Agreement; 3.2.4 Kerberos and Single Sign On; 3.2.4.1 Kerberos Issues; 3.2.5 Kerberized Internet Negotiation of Keys (KINK); 3.3 Management of Public Keys and PKIs; 3.4 Further Resources; 3.5 References; Chapter 4 Internet Security and Key Exchange Basics; 4.1 Introduction: Issues with Link Layer-Only Security…”
    Libro electrónico
  14. 5194
    por Miles, Russ
    Publicado 2006
    Tabla de Contenidos: “…Bringing Your Classes to Life: Object Diagrams; 6.2. Links; 6.3. Binding Class Templates; 6.4. What&s Next?…”
    Libro electrónico
  15. 5195
    por Kazoun, Chafic
    Publicado 2007
    Tabla de Contenidos:
    Libro electrónico
  16. 5196
    por Kumar, Anurag
    Publicado 2008
    Tabla de Contenidos: “…Application Models and Performance Issues; 3.1 Network Architectures and Application Scenarios; 3.2 Types of Traffic and QoS Requirements; 3.3 Real-Time Stream Sessions: Delay Guarantees; 3.3.1 CBR Speech; 3.3.2 VBR Speech; 3.3.3 Speech Playout; 3.3.4 QoS Objectives; 3.3.5 Network Service Models; 3.4 Elastic Transfers: Feedback Control; 3.4.1 Dynamic Control of Bandwidth Sharing; 3.4.2 Control Mechanisms: MAC andTCP; 3.4.3 TCP Performance over Wireless Links…”
    Libro electrónico
  17. 5197
    por Gupta, Gaurav
    Publicado 2013
    Tabla de Contenidos: “…Connection with Database -- PHP -- Syntax -- Form handling -- The GET method -- The POST method -- The filter method -- Validating user input data -- Sanitizing user input data -- The FILTER_CALLBACK filter -- Filter multiple inputs -- MySQL -- MySQL for PHP -- MySQL-PHP connectivity -- Open a connection to the MySQL server -- Close a connection -- Create or select a database -- Create a database -- Select a database -- Create a table -- Primary keys -- Spoofing and forging forms -- Forging HTTP requests -- Spoofing submissions -- Shared secrets -- Setting expectations -- Linking a form to a server -- Summary -- 5. Responsive Web Forms -- Responsive design -- Google's view about responsive design -- Benefits of using responsive design -- How responsive design works -- Screen resolutions -- Viewport -- Media queries -- Media types -- Internal media query -- Syntax…”
    Libro electrónico
  18. 5198
    por Wing, Eric, 1970-
    Publicado 2013
    Tabla de Contenidos: “…-- Chapter 20: Importing and Coordinating Models -- Linking a Revit Structure Model -- Activating Copy/Monitor -- Running Interference Detection -- Importing and Exporting CAD Formats -- Are You Experienced? …”
    Libro electrónico
  19. 5199
    por Bean, James
    Publicado 2009
    Tabla de Contenidos: “…1.5.4 Business Activity Monitoring-BAM1.5.5 Web Services Management-WSM; 1.5.6 Closing the SOA Loop; 1.6 The Benefits of SOA; CHAPTER 2 Core SOA Principles; 2.1 Loose Coupling; 2.2 Interoperability; 2.3 Reusability; 2.4 Discoverability; 2.5 Governance; 2.5.1 Design-Time Governance; 2.5.2 Bind-Time Governance; 2.5.3 Run-Time Governance; CHAPTER 3 Web Services and Other Service Types and Styles; 3.1 Web Services and SOAP; 3.2 ReST Style Services; 3.3 Legacy Services and API's; CHAPTER 4 Data, the Missing Link; 4.1 Data at Rest-Persistence; 4.2 Data in Motion-Messaged Context…”
    Libro electrónico
  20. 5200
    por Vasseur, Jean-Philippe
    Publicado 2010
    Tabla de Contenidos: “…CHAPTER 7 Service Discovery7.1 Service Discovery in IP Networks; 7.2 Service Discovery Protocols; 7.2.1 SLP; 7.2.2 Zeroconf, Rendezvous, and Bonjour; 7.2.3 UPnP; 7.3 Conclusions; CHAPTER 8 Security for Smart Objects; 8.1 The Three Properties of Security; 8.1.1 Confidentiality; 8.1.2 Integrity; 8.1.3 Availability; 8.2 ""Security"" by Obscurity; 8.3 Encryption; 8.4 Security Mechanisms for Smart Objects; 8.4.1 Security Policies for Smart Objects; 8.4.2 Link Layer Encryption; 8.5 Security Mechanisms in the IP Architecture; 8.5.1 IPsec; 8.5.2 TLS; 8.6 Conclusions…”
    Libro electrónico