Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 882
- Application software 749
- Management 628
- Engineering & Applied Sciences 519
- History 411
- Computer programs 406
- Design 377
- Computer networks 339
- Data processing 334
- Web site development 328
- Computer Science 326
- Web sites 311
- Cloud computing 305
- Historia 304
- Artificial intelligence 303
- Python (Computer program language) 296
- Leadership 275
- Photography 275
- Security measures 275
- Computer software 268
- Computer programming 267
- Programming 267
- Law and legislation 260
- Business & Economics 245
- Computer security 241
- Operating systems (Computers) 240
- Digital techniques 239
- Social aspects 239
- Java (Computer program language) 237
- Information technology 229
-
9241Publicado 2015Tabla de Contenidos: “…Chapter 1 Introductory Concepts -- 1-1 Digital and Analog Quantities -- 1-2 Binary Digits, Logic Levels, and Digital Waveforms -- 1-3 Basic Logic Functions -- 1-4 Combinational and Sequential Logic Functions -- 1-5 Introduction to Programmable Logic -- 1-6 Fixed-Function Logic Devices -- 1-7 Test and Measurement Instruments -- 1-8 Introduction to Troubleshooting -- Chapter 2 Number Systems, Operations, and Codes -- 2-1 Decimal Numbers -- 2-2 Binary Numbers -- 2-3 Decimal-to-Binary Conversion -- 2-4 Binary Arithmetic -- 2-5 Complements of Binary Numbers -- 2-6 Signed Numbers -- 2-7 Arithmetic Operations with Signed Numbers -- 2-8 Hexadecimal Numbers -- 2-9 Octal Numbers -- 2-10 Binary Coded Decimal (BCD) -- 2-11 Digital Codes -- 2-12 Error Codes -- Chapter 3 Logic Gates -- 3-1 The Inverter -- 3-2 The AND Gate -- 3-3 The OR Gate -- 3-4 The NAND Gate -- 3-5 The NOR Gate -- 3-6 The Exclusive-OR and Exclusive-NOR Gates -- 3-7 Programmable Logic -- 3-8 Fixed-Function Logic Gates -- 3-9 Troubleshooting -- Chapter 4 Boolean Algebra and Logic Simplification -- 4-1 Boolean Operations and Expressions -- 4-2 Laws and Rules of Boolean Algebra -- 4-3 DeMorgan's Theorems -- 4-4 Boolean Analysis of Logic Circuits -- 4-5 Logic Simplification Using Boolean Algebra -- 4-6 Standard Forms of Boolean Expressions -- 4-7 Boolean Expressions and Truth Tables -- 4-8 The Karnaugh Map -- 4-9 Karnaugh Map SOP Minimization -- 4-10 Karnaugh Map POS Minimization -- 4-11 The Quine-McCluskey Method -- 4-12 Boolean Expressions with VHDL -- Applied Logic -- Chapter 5 Combinational Logic Analysis -- 5-1 Basic Combinational Logic Circuits -- 5-2 Implementing Combinational Logic -- 5-3 The Universal Property of NAND and NOR Gates -- 5-4 Combinational Logic Using NAND and NOR Gates -- 5-5 Pulse Waveform Operation -- 5-6 Combinational Logic with VHDL -- 5-7 Troubleshooting -- Applied Logic -- Chapter 6 Functions of Combinational Logic -- 6-1 Half and Full Adders -- 6-2 Parallel Binary Adders -- 6-3 Ripple Carry and Look-Ahead Carry Adders -- 6-4 Comparators -- 6-5 Decoders -- 6-6 Encoders -- 6-7 Code Converters -- 6-8 Multiplexers (Data Selectors) -- 6-9 Demultiplexers -- 6-10 Parity Generators/Checkers -- 6-11 Troubleshooting -- Applied Logic -- Chapter 7 Latches, Flip-Flops, and Timers -- 7-1 Latches -- 7-2 Flip-Flops -- 7-3 Flip-Flop Operating Characteristics -- 7-4 Flip-Flop Applications -- 7-5 One-Shots -- 7-6 The Astable Multivibrator -- 7-7 Troubleshooting -- Applied Logic -- Chapter 8 Shift Registers -- 8-1 Shift Register Operations -- 8-2 Types of Shift Register Data I/Os -- 8-3 Bidirectional Shift Registers -- 8-4 Shift Register Counters -- 8-5 Shift Register Applications -- 8-6 Logic Symbols with Dependency Notation -- 8-7 Troubleshooting -- Applied Logic -- Chapter 9 Counters -- 9-1 Finite State Machines -- 9-2 Asynchronous Counters -- 9-3 Synchronous Counters -- 9-4 Up/Down Synchronous Counters -- 9-5 Design of Synchronous Counters -- 9-6 Cascaded Counters -- 9-7 Counter Decoding -- 9-8 Counter Applications -- 9-9 Logic Symbols with Dependency Notation -- 9-10 Troubleshooting -- Applied Logic -- Chapter 10 Programmable Logic -- 10-1 Simple Programmable Logic Devices (SPLDs) -- 10-2 Complex Programmable Logic Devices (CPLDs) -- 10-3 Macrocell Modes -- 10-4 Field-Programmable Gate Arrays (FPGAs) -- 10-5 Programmable Logic Software -- 10-6 Boundary Scan Logic -- 10-7 Troubleshooting -- Applied Logic -- Chapter 11 Data Storage -- 11-1 Semiconductor Memory Basics -- 11-2 The Random-Access Memory (RAM) -- 11-3 The Read-Only Memory (ROM) -- 11-4 Programmable ROMs -- 11-5 The Flash Memory -- 11-6 Memory Expansion -- 11-7 Special Types of Memories -- 11-8 Magnetic and Optical Storage -- 11-9 Memory Hierarchy -- 11-10 Cloud Storage -- 11-11 Troubleshooting -- Chapter 12 Signal Conversion and Processing -- 12-1 Analog-to-Digital Conversion -- 12-2 Methods of Analog-to-Digital Conversion -- 12-3 Methods of Digital-to-Analog Conversion -- 12-4 Digital Signal Processing -- 12-5 The Digital Signal Processor (DSP) -- Chapter 13 Data transmission -- 13-1 Data Transmission Media -- 13-2 Methods and Modes of Data Transmission -- 13-3 Modulation of Analog Signals with Digital Data -- 13-4 Modulation of Digital Signals with Analog Data -- 13-5 Multiplexing and Demultiplexing -- 13-6 Bus Basics -- 13-7 Parallel Buses -- 13-8 The Universal Serial Bus (USB) -- 13-9 Other Serial Buses -- 13-10 Bus Interfacing -- Chapter 14 Data Processing and Control -- 14-1 The Computer System -- 14-2 Practical Computer System Considerations -- 14-3 The Processor: Basic Operation -- 14-4 The Processor: Addressing Modes -- 14-5 The Processor: Special Operations -- 14-6 Operating Systems and Hardware -- 14-7 Programming -- 14-8 Microcontrollers and Embedded Systems -- 14-9 System on Chip (SoC) -- Chapter 15 Integrated Circuit Technologies -- 15-1 Basic Operational Characteristics and Parameters -- 15-2 CMOS Circuits -- 15-3 TTL (Bipolar) Circuits -- 15-4 Practical Considerations in the Use of TTL -- 15-5 Comparison of CMOS and TTL Performance -- 15-6 Emitter-Coupled Logic (ECL) Circuits -- 15-7 PMOS, NMOS, and E2CMOS…”
Libro electrónico -
9242por Organization for Economic Cooperation and DevelopmentTabla de Contenidos: “…Formalise and implement the Mining Strategy with a timeframe of strategic projects based on the priorities of the different regional stakeholders -- Establish a governance mechanism to monitor progress and ensure the sustainability of the Mining Strategy over the long run and beyond government cycles -- Define a monitoring and evaluation framework with different levels of indicators -- Ensure a formal channel of communication and involvement of regional stakeholders in the Mining Strategy's construction, progress and changes -- Improve the institutional capacity of the national agencies operating at the regional level -- References -- Note -- 2 Strengths and challenges for regional development in Antofagasta -- Introduction -- Megatrends affecting regions specialised in mining and extractive activities -- Antofagasta's future: Mining and its communities -- Comparing Antofagasta using an international benchmark of mining regions -- Acknowledging the impacts of mining activities on the territory and looking beyond economic performance -- A future together with its numerous Indigenous communities -- Charting mining's future, Antofagasta captures the spotlight -- The strategic importance of Antofagasta's lithium reserves for the global energy transition -- Demographic patterns -- Population growth in Antofagasta has accelerated in the last decade -- Foreign migration as a key driver of the population increase in the region -- Yet more efforts are needed towards gender parity for social prosperity in Antofagasta -- Antofagasta has a demographic bonus but ageing is an increasing trend -- Antofagasta's declining youth dependency ratio since 2000 signals an evolving demographic landscape, yet the region still retains a demographic bonus…”
Publicado 2023
Libro electrónico -
9243Publicado 2024Tabla de Contenidos: “…A persona outline for Ellie the explorer -- Ellie's conversational scope -- Technical features -- Getting our data ready for the chatbot -- Selecting our data sources -- Preparing the hotel data -- Creating our agent for complex interactions -- Creating the agent tools -- Bringing it all together - building Your own LangChain Chatbot with Streamlit -- Creating secrets and config management -- Creating our agent service -- Building our Streamlit chat app -- Running and testing Ellie, our chatbot application -- Ways to improve Ellie -- Summary -- Further reading -- Chapter 9: The Future of Conversational AI with LLMs -- Technical requirements -- Going into production -- Understanding the dangers of going into production -- Challenges of RAG systems -- Evaluating production systems -- Components of an evaluation system -- Learning how to use LangSmith to evaluate your project -- Application monitoring in production with LangSmith -- Advanced monitoring features with LangSmith -- Tracing and data management -- Monitoring tools -- Advanced monitoring features -- Alternatives to ChatGPT and LangChain -- Some alternatives to ChatGPT and OpenAI LLMs -- Some alternatives to LangChain -- Looking at the growing LLM landscape -- The growth of the small language model (SLM) -- Are LLMs reaching their limit? …”
Libro electrónico -
9244Publicado 2019Tabla de Contenidos: “…5.2 Learning a Task-Speci c Deep Architecture for Clustering -- 5.2.1 Introduction -- 5.2.2 Related Work -- 5.2.2.1 Sparse Coding for Clustering -- 5.2.2.2 Deep Learning for Clustering -- 5.2.3 Model Formulation -- 5.2.3.1 TAGnet: Task-speci c And Graph-regularized Network -- 5.2.3.2 Clustering-Oriented Loss Functions -- 5.2.3.3 Connections to Existing Models -- 5.2.4 A Deeper Look: Hierarchical Clustering by DTAGnet -- 5.2.5 Experiment Results -- 5.2.5.1 Datasets and Measurements -- 5.2.5.2 Experiment Settings -- 5.2.5.3 Comparison Experiments and Analysis -- Bene ts of the Task-speci c Deep Architecture -- Effects of Graph Regularization -- Scalability and Robustness -- 5.2.5.4 Hierarchical Clustering on CMU MultiPIE -- 5.2.6 Conclusion -- References -- 6 Signal Processing -- 6.1 Deeply Optimized Compressive Sensing -- 6.1.1 Background -- 6.1.2 An End-to-End Optimization Model of CS -- 6.1.3 DOCS: Feed-Forward and Jointly Optimized CS -- Complexity -- Related Work -- 6.1.4 Experiments -- Settings -- Simulation -- Reconstruction Error -- Ef ciency -- Experiments on Image Reconstruction -- 6.1.5 Conclusion -- 6.2 Deep Learning for Speech Denoising -- 6.2.1 Introduction -- 6.2.2 Neural Networks for Spectral Denoising -- 6.2.2.1 Network Architecture -- 6.2.2.2 Implementation Details -- Activation Function -- Cost Function -- Training Strategy -- 6.2.2.3 Extracting Denoised Signals -- 6.2.2.4 Dealing with Gain -- 6.2.3 Experimental Results -- 6.2.3.1 Experimental Setup -- 6.2.3.2 Network Structure Analysis -- 6.2.3.3 Analysis of Robustness to Variations -- 6.2.3.4 Comparison with NMF -- 6.2.4 Conclusion and Future Work -- References -- 7 Dimensionality Reduction -- 7.1 Marginalized Denoising Dictionary Learning with Locality Constraint -- 7.1.1 Introduction -- 7.1.2 Related Works -- 7.1.2.1 Dictionary Learning -- 7.1.2.2 Auto-encoder…”
Libro electrónico -
9245Publicado 2015Tabla de Contenidos: “…CART -- 18.5.4 Detailed Look at the Statistical Analysis -- 18.5.5 Early Results on Defect Data Sets -- 18.6 Summary -- Part IV: Sharing Models -- Chapter 19: Sharing Models: Challenges and Methods -- Chapter 20: Ensembles of Learning Machines -- 20.1 When and Why Ensembles Work -- 20.1.1 Intuition -- 20.1.2 Theoretical Foundation -- 20.2 Bootstrap Aggregating (Bagging) -- 20.2.1 How Bagging Works -- 20.2.2 When and Why Bagging Works -- 20.2.3 Potential Advantages of Bagging for SEE -- 20.3 Regression Trees (RTs) for Bagging -- 20.4 Evaluation Framework -- 20.4.1 Choice of Data Sets and Preprocessing Techniques -- 20.4.1.1 PROMISE data -- 20.4.1.2 ISBSG data -- 20.4.2 Choice of Learning Machines -- 20.4.3 Choice of Evaluation Methods -- 20.4.4 Choice of Parameters -- 20.5 Evaluation of Bagging+RTs in SEE -- 20.5.1 Friedman Ranking -- 20.5.2 Approaches Most Often Ranked First or Second in Terms of MAE, MMRE and PRED(25) -- 20.5.3 Magnitude of Performance Against the Best -- 20.5.4 Discussion -- 20.6 Further Understanding of Bagging+RTs in SEE -- 20.7 Summary -- Chapter 21: How to Adapt Models in a Dynamic World -- 21.1 Cross-Company Data and Questions Tackled…”
Libro electrónico -
9246por Panik, Michael J.Tabla de Contenidos: “…Intro -- Growth Curve Modeling: Theory and Applications -- Copyright -- Contents -- Preface -- 1 Mathematical Preliminaries -- 1.1 Arithmetic Progression -- 1.2 Geometric Progression -- 1.3 The Binomial Formula -- 1.4 The Calculus of Finite Differences -- 1.5 The Number e -- 1.6 The Natural Logarithm -- 1.7 The Exponential Function -- 1.8 Exponential and Logarithmic Functions: Another Look -- 1.9 Change of Base of a Logarithm -- 1.10 The Arithmetic (Natural) Scale versus the Logarithmic Scale -- 1.11 Compound Interest Arithmetic -- 2 Fundamentals of Growth -- 2.1 Time Series Data -- 2.2 Relative and Average Rates of Change -- 2.3 Annual Rates of Change -- 2.3.1 Simple Rates of Change -- 2.3.2 Compounded Rates of Change -- 2.3.3 Comparing Two Time Series: Indexing Data to a Common Starting Point -- 2.4 Discrete versus Continuous Growth -- 2.5 The Growth of a Variable Expressed in Terms of the Growth of Its Individual Arguments -- 2.6 Growth Rate Variability -- 2.7 Growth in a Mixture of Variables -- 3 Parametric Growth Curve Modeling -- 3.1 Introduction -- 3.2 The Linear Growth Model -- 3.3 The Logarithmic Reciprocal Model -- 3.4 The Logistic Model -- 3.5 The Gompertz Model -- 3.6 The Weibull Model -- 3.7 The Negative Exponential Model -- 3.8 The von Bertalanffy Model -- 3.9 The Log-Logistic Model -- 3.10 The Brody Growth Model -- 3.11 The Janoschek Growth Model -- 3.12 The Lundqvist-Korf Growth Model -- 3.13 The Hossfeld Growth Model -- 3.14 The Stannard Growth Model -- 3.15 The Schnute Growth Model -- 3.16 The Morgan-Mercer-Flodin (M-M-F) Growth Model -- 3.17 The McDill-Amateis Growth Model -- 3.18 An Assortment of Additional Growth Models -- 3.18.1 The Sloboda Growth Model -- Appendix 3.A The Logistic Model Derived -- Appendix 3.B The Gompertz Model Derived -- Appendix 3.C The Negative Exponential Model Derived…”
Publicado 2014
Libro electrónico -
9247Publicado 2024Tabla de Contenidos: “…-- 6.6 Sub-Pixel Interpolation -- 6.6.1 What Does a Sub-Pixel Interpolated Reference Frame Look Like? -- 6.6.2 Interpolation Filters -- 6.6.3 Trade-Offs in Sub-Pixel Interpolation -- 6.7 Reference Pictures -- 6.7.1 Reference Pictures for Inter Prediction -- 6.7.2 Reference Picture Structures -- 6.7.2.1 Low-Delay Picture Structures -- 6.7.2.2 Random Access Picture Structures -- 6.7.3 Reference Picture Buffers -- 6.7.3.1 Adding Pictures to the Reference Picture Buffer -- 6.7.3.2 Removing Pictures from the Reference Picture Buffer -- 6.7.3.3 Ordering Reference Pictures -- 6.7.3.4 Communicating Reference Picture Structures -- 6.8 Signalling Inter Prediction Choices -- 6.8.1 Inter Prediction Parameters -- 6.8.2 Signalling the Base Motion Vector Parameters -- 6.8.3 Signalling the Delta Motion Vector Parameters -- 6.8.4 Signalling Reference Picture Choices -- 6.9 Skip Mode -- 6.10 Loop Filter -- 6.11 When Inter Prediction Does Not Find a Good Match -- 6.12 HEVC Inter Prediction -- 6.12.1 Overview -- 6.12.1.1 HEVC Inter Prediction Example -- 6.12.2 HEVC Inter prediction Unit Partitioning -- 6.12.2.1 Slice Types and PU Types -- 6.12.2.2 Symmetric PU Partitions -- 6.12.2.3 Asymmetric PU Partitions -- 6.12.2.4 CU Partitionings into Inter-PUs: Examples -- 6.12.3 HEVC Inter-PU Coding -- 6.12.3.1 Skip or Merge Coding -- 6.12.3.2 Inter-PU Coding: Advanced Motion Vector Prediction -- 6.12.3.3 HEVC Inter-PU Coding: Examples -- 6.12.4 HEVC Inter Prediction Sources…”
Libro electrónico -
9248Publicado 2004“…Next we take an in-depth look into the architecture and design guidelines for the runtime and development environment topologies, application architecture, data model, workflow, authentication and authorization. …”
Libro electrónico -
9249por Rogers, PaulTabla de Contenidos: “…-- 22.2 AIX tracing and core dumps -- 22.2.1 tcpdump and iptrace -- 22.2.2 UNIX systems core dump analysis -- 22.2.3 Generating a core dump -- 22.2.4 Looking at a system core dump -- 22.2.5 Ensuring that a good core file is generated -- 22.2.6 errpt command -- 22.3 WebSphere Application Server -- 22.3.1 Reviewing the JVM logs -- 22.3.2 Interpreting the JVM log data -- 22.3.3 Collector tool -- 22.4 Debugging with the Application Server toolkit -- 22.5 WebSphere Application Server tracing -- 22.5.1 Enabling tracing -- 22.5.2 Enabling trace at server startup -- 22.5.3 Enabling trace on a running server -- 22.5.4 Enabling trace on an application client or stand-alone process…”
Publicado 2005
Libro electrónico -
9250por Delahaye, SylvieTabla de Contenidos: “…2.4.4 System programmer notes -- 2.4.5 Look out for your PF keys -- 2.4.6 How to quickly locate a record in browse -- 2.4.7 What to do when a copybook fails to compile -- 2.4.8 Record structure defined in source application program -- 2.4.9 Watch out for that bad disposition -- 2.5 Copybook and include -- 2.6 Product updates -- 2.6.1 Multiple Find with Version 3 -- 2.6.2 QSAM allocation using a model -- 2.6.3 Work with VTOC -- 2.6.4 Get information about a load module -- 2.6.5 Dynamic template -- 2.6.6 Compare data sets using templates -- 2.6.7 Edit related tables -- 2.6.8 Load IMS database -- Chapter 3. …”
Publicado 2002
Libro electrónico -
9251por Moore, BillTabla de Contenidos: “…Administration tools -- 11.1 Administrative tools for the developer -- 11.2 Starting the tools -- 11.2.1 Starting Interchange Server Express -- 11.2.2 Starting System Manager -- 11.2.3 Starting the Flow manager -- 11.2.4 Setting up to run the Web-based tools -- 11.2.5 Starting ICSMonitor -- 11.2.6 Starting Failed Event Manager -- 11.3 Logging and tracing -- 11.3.1 Configuring logging and tracing -- 11.3.2 Generating sample tracing -- 11.3.3 Viewing the tracing information -- 11.3.4 Using the Log Viewer to look at trace -- 11.4 Debugging collaborations -- 11.4.1 Debugging a success flow -- 11.4.2 Debugging a failure flow -- 11.4.3 Finished debugging -- 11.5 Managing failed events -- 11.5.1 Using Flow manager -- 11.5.2 Using the Failed Event Manager -- 11.5.3 Failed event actions -- 11.6 Using statistics for system interrogation -- 11.6.1 Connector statistics -- 11.6.2 Collaboration statistics -- 11.7 Starting and stopping components -- 11.7.1 Controlling components from System Manager -- 11.7.2 Controlling components from ICSMonitor -- Part 3 Developing an integration sample -- Chapter 12. …”
Publicado 2005
Libro electrónico -
9252por Almond, ChrisTabla de Contenidos: “…-- 1.2 NFS V2 and NFS V3 History -- 1.3 NFS V4 design motivations -- 1.4 Objectives of NFS V4 (RFC3530) -- 1.5 AIX 5.3 specific implementation of NFS V4 -- 1.5.1 Mandatory features -- 1.5.2 Optional features -- 1.6 Planning and implementation considerations -- 1.6.1 Pre-implementation design considerations -- 1.7 Looking ahead to the rest of the book -- Chapter 2. …”
Publicado 2004
Libro electrónico -
9253por Lee, Tony T., 1960-Tabla de Contenidos: “…Preface -- About the Authors -- 1 Introduction and Overview -- 1.1 Switching and Transmission -- 1.1.1 Roles of Switching and Transmission -- 1.1.2 Telephone Network Switching and Transmission Hierarchy -- 1.2 Multiplexing and Concentration -- 1.3 Timescales of Information Transfer -- 1.3.1 Sessions and Circuits -- 1.3.2 Messages -- 1.3.3 Packets and Cells -- 1.4 Broadband Integrated Services Network -- Problems -- 2 Circuit Switch Design Principles -- 2.1 Space-Domain Circuit Switching -- 2.1.1 Nonblocking Properties -- 2.1.2 Complexity of Nonblocking Switches -- 2.1.3 Clos Switching Network -- 2.1.4 Benes Switching Network -- 2.1.5 Baseline and Reverse Baseline Networks -- 2.1.6 Cantor Switching Network -- 2.2 Time-Domain and Time-Space-Time Circuit Switching -- 2.2.1 Time-Domain Switching -- 2.2.2 Time-Space-Time Switching -- Problems -- 3 Fundamental Principles of Packet Switch Design -- 3.1 Packet Contention in Switches -- 3.2 Fundamental Properties of Interconnection Networks -- 3.2.1 Definition of Banyan Networks -- 3.2.2 Simple Switches Based on Banyan Networks -- 3.2.3 Combinatoric Properties of Banyan Networks -- 3.2.4 Nonblocking Conditions for the Banyan Network -- 3.3 Sorting Networks -- 3.3.1 Basic Concepts of Comparison Networks -- 3.3.2 Sorting Networks Based on Bitonic Sort -- 3.3.3 The Odd-Even Sorting Network -- 3.3.4 Switching and Contention Resolution in Sort-Banyan Network -- 3.4 Nonblocking and Self-Routing Properties of Clos Networks -- 3.4.1 Nonblocking Route Assignment -- 3.4.2 Recursiveness Property -- 3.4.3 Basic Properties of Half-Clos Networks -- 3.4.4 Sort-Clos Principle -- Problems -- 4 Switch Performance Analysis and Design Improvements -- 4.1 Performance of Simple Switch Designs -- 4.1.1 Throughput of an Internally Nonblocking Loss System -- 4.1.2 Throughput of an Input-Buffered Switch -- 4.1.3 Delay of an Input-Buffered Switch -- 4.1.4 Delay of an Output-Buffered Switch -- 4.2 Design Improvements for Input Queueing Switches -- 4.2.1 Look-Ahead Contention Resolution…”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
9254Publicado 2016Tabla de Contenidos: “…-- How This Book Is Organized -- About the Online Resources -- How to Use This Book -- Part 1: Tools of the Trade -- Chapter 1: Scanning Memory Using Cheat Engine -- Why Memory Scanners Are Important -- Basic Memory Scanning -- Cheat Engine's Memory Scanner -- Scan Types -- Running Your First Scan -- Next Scans -- When You Can't Get a Single Result -- Cheat Tables -- Memory Modification in Games -- Manual Modification with Cheat Engine -- Trainer Generator -- Pointer Scanning -- Pointer Chains -- Pointer Scanning Basics -- Pointer Scanning with Cheat Engine -- Pointer Rescanning -- Lua Scripting Environment -- Searching for Assembly Patterns -- Searching for Strings -- Closing Thoughts -- Chapter 2: Debugging Games with OllyDbg -- A Brief Look at OllyDbg's User Interface -- OllyDbg's CPU Window -- Viewing and Navigating a Game's Assembly Code -- Viewing and Editing Register Contents -- Viewing and Searching a Game's Memory -- Viewing a Game's Call Stack -- Creating Code Patches -- Tracing Through Assembly Code -- OllyDbg's Expression Engine -- Using Expressions in Breakpoints -- Using Operators in the Expression Engine -- Working with Basic Expression Elements -- Accessing Memory Contents with Expressions -- OllyDbg Expressions in Action -- Pausing Execution When a Specific Player's Name Is Printed -- Pausing Execution When Your Character's Health Drops -- OllyDbg Plug-ins for Game Hackers -- Copying Assembly Code with Asm2Clipboard -- Adding Cheat Engine to OllyDbg with Cheat Utility -- Controlling OllyDbg Through the Command Line…”
Libro electrónico -
9255Publicado 2018Tabla de Contenidos: “…File structure -- Server-side source code -- Java source -- Resources -- client-side source code -- Starting the application -- Application modules -- Home and Login modules -- Account modules -- Settings -- Password -- Registration -- Admin module -- User management -- Metrics -- Health -- Configuration -- Audits -- Logs -- API -- Running generated tests -- Server-side tests -- Client-side tests -- Summary -- Chapter 4: Entity Modeling with JHipster Domain Language -- Introduction to JDL -- DSL grammar for JDL -- Entity modeling with JDL -- Relationship management -- DTO, service, and pagination options -- JDL Studio -- Use case entity model with explanation -- Entities -- Relationships -- Options for entities -- Entity generation with JHipster -- Generated code walkthrough -- Server-side source code -- Domain class for the entity -- Repository interface for the entity -- Service class for the entity -- Resource class for the entity -- Client side -- TypeScript model class for the entity -- Angular services for the entity -- Angular components of the entity -- Angular route for the entity -- Angular module for the entity -- Generated pages -- Running generated tests -- Summary -- Chapter 5: Customization and Further Development -- Live reload for development -- Spring Boot DevTools -- Webpack dev server and BrowserSync -- Setting up live reload for an application -- Customizing the Angular frontend for an entity -- Editing an entity using the JHipster entity sub-generator -- Changing the look and feel of the application -- Adding a new i18n language -- Authorization with Spring Security -- Limiting access to entities -- Limiting access to create/edit/delete entities -- Limiting access to data of other users -- Summary -- Chapter 6: Testing and Continuous Integration -- Fixing and running tests -- Continuous integration -- CI/CD tools -- Jenkins…”
Libro electrónico -
9256Publicado 2021Tabla de Contenidos: “…Remote strong style -- Remote setup -- Remote specifics -- Good remote practices -- Remote breaks -- Secondary communication channel -- Remote commit approach -- Summary -- Section 3: Tools to Enhance Remote Pair Programming -- Chapter 7: Video and Audio -- Recap of what we have learned so far -- General technical aspects -- Audio is more important than video -- Video settings -- Screen sharing settings -- Quality sound and video for the win -- Learning how to enhance video -- Looking into the camera -- Using a green screen -- Using a virtual background -- Learning to enhance audio -- Speaking into the microphone -- Using an audio compressor -- Performing soundcheck -- Monitoring the sound -- Adding a pop filter -- Enhancing speech -- Employing diction -- Choosing words -- Warming up your voice -- Summary -- Chapter 8: Source Control Rules -- Recap of the source control rules -- Using source control -- Improving source control usage -- Using the commit types -- Understanding commit heuristics -- Committing when part of a feature is done -- Committing when all the tests are written, and green, for a user scenario -- Committing before taking a break, in a stable state -- Committing when the preparatory refactoring is done -- Committing when one characterization test is done -- Committing when one unit test is green -- Summary -- Further reading -- Chapter 9: Remote Access -- Recapping the rules of remote pairing -- Understanding how remote access tools work -- TeamViewer -- AnyDesk -- Screen -- Chrome Remote Desktop -- Relying on tools -- Bug magnet -- Security for remote access -- Summary -- Further reading -- Why subscribe? …”
Libro electrónico -
9257Publicado 2021Tabla de Contenidos: “…Encoding structs to JSON -- Encoding interfaces to JSON -- Chapter 10 Defining Method Signatures Using Interfaces -- Working with Interfaces in Go -- Defining an interface -- Implementing an interface -- Looking at How You May Use Interfaces -- Adding methods to a type that doesn't satisfy an interface -- Using the Stringer interface -- Implementing multiple interfaces -- Using an empty interface -- Determining whether a value implements a specific interface -- Part 3 Multitasking in Go -- Chapter 11 Threading Using Goroutines -- Understanding Goroutines -- Using Goroutines with Shared Resources -- Seeing how shared resources impact goroutines -- Accessing shared resources using mutual exclusion -- Using atomic counters for modifying shared resources -- Synchronizing Goroutines -- Chapter 12 Communicating between Goroutines Using Channels -- Understanding Channels -- How channels work -- How channels are used -- Iterating through Channels -- Asynchronously Waiting on Channels -- Using Buffered Channels -- Part 4 Organizing Your Code -- Chapter 13 Using and Creating Packages in Go -- Working with Packages -- Creating shareable packages -- Organizing packages using directories -- Using Third-Party Packages -- Emojis for Go -- Go Documentation -- Chapter 14 Grouping Packages into Modules -- Creating a Module -- Testing and Building a Module -- Publishing a Module on GitHub -- Part 5 Seeing Go in Action -- Chapter 15 Consuming Web APIs Using Go -- Understanding Web APIs -- Fetching Data from Web Services in Go -- Writing a Go program to connect to a web API -- Decoding JSON data -- Refactoring the code for decoding JSON data -- Fetching from multiple web services at the same time -- Returning Goroutine's results to the main() function -- Chapter 16 Getting Ready to Serve Using REST APIs -- Building Web Services Using REST APIs -- HTTP messages…”
Libro electrónico -
9258Publicado 2021Tabla de Contenidos: “…-- Notes -- PART TWO: Going All In -- CHAPTER 5: The "Do Something" Generation -- Get Out There and Do It -- Looking for a Real Relationship -- With Great Power Comes Great Responsibility -- Engaged Donors Are Bigger, Better Donors -- What Does This Mean? …”
Libro electrónico -
9259Publicado 2013Tabla de Contenidos: “…. -- What a Network Vulnerability Assessment Can Reveal -- E-mail Data Review and Server Restoration -- Stepping Up Your Game: Knowledge Meets Creativity -- Chapter 13: Stealing Information -- What Are We Looking For? -- Determining Where the Data Went -- LNK Files -- Shellbags -- Scenario: Recovering Log Files to Catch a Thief -- Chapter 14: Internal Leaks -- Why Internal Leaks Happen…”
Libro electrónico -
9260Publicado 2017Tabla de Contenidos: “…-- Summary -- Chapter 13: Injectable Devices -- A deeper look into USB -- A possible threat -- An evil USB -- How does the Rubber Ducky work? …”
Libro electrónico