Mostrando 9,241 - 9,260 Resultados de 17,802 Para Buscar '"Look"', tiempo de consulta: 0.16s Limitar resultados
  1. 9241
    Publicado 2015
    Tabla de Contenidos: “…Chapter 1 Introductory Concepts -- 1-1 Digital and Analog Quantities -- 1-2 Binary Digits, Logic Levels, and Digital Waveforms -- 1-3 Basic Logic Functions -- 1-4 Combinational and Sequential Logic Functions -- 1-5 Introduction to Programmable Logic -- 1-6 Fixed-Function Logic Devices -- 1-7 Test and Measurement Instruments -- 1-8 Introduction to Troubleshooting -- Chapter 2 Number Systems, Operations, and Codes -- 2-1 Decimal Numbers -- 2-2 Binary Numbers -- 2-3 Decimal-to-Binary Conversion -- 2-4 Binary Arithmetic -- 2-5 Complements of Binary Numbers -- 2-6 Signed Numbers -- 2-7 Arithmetic Operations with Signed Numbers -- 2-8 Hexadecimal Numbers -- 2-9 Octal Numbers -- 2-10 Binary Coded Decimal (BCD) -- 2-11 Digital Codes -- 2-12 Error Codes -- Chapter 3 Logic Gates -- 3-1 The Inverter -- 3-2 The AND Gate -- 3-3 The OR Gate -- 3-4 The NAND Gate -- 3-5 The NOR Gate -- 3-6 The Exclusive-OR and Exclusive-NOR Gates -- 3-7 Programmable Logic -- 3-8 Fixed-Function Logic Gates -- 3-9 Troubleshooting -- Chapter 4 Boolean Algebra and Logic Simplification -- 4-1 Boolean Operations and Expressions -- 4-2 Laws and Rules of Boolean Algebra -- 4-3 DeMorgan's Theorems -- 4-4 Boolean Analysis of Logic Circuits -- 4-5 Logic Simplification Using Boolean Algebra -- 4-6 Standard Forms of Boolean Expressions -- 4-7 Boolean Expressions and Truth Tables -- 4-8 The Karnaugh Map -- 4-9 Karnaugh Map SOP Minimization -- 4-10 Karnaugh Map POS Minimization -- 4-11 The Quine-McCluskey Method -- 4-12 Boolean Expressions with VHDL -- Applied Logic -- Chapter 5 Combinational Logic Analysis -- 5-1 Basic Combinational Logic Circuits -- 5-2 Implementing Combinational Logic -- 5-3 The Universal Property of NAND and NOR Gates -- 5-4 Combinational Logic Using NAND and NOR Gates -- 5-5 Pulse Waveform Operation -- 5-6 Combinational Logic with VHDL -- 5-7 Troubleshooting -- Applied Logic -- Chapter 6 Functions of Combinational Logic -- 6-1 Half and Full Adders -- 6-2 Parallel Binary Adders -- 6-3 Ripple Carry and Look-Ahead Carry Adders -- 6-4 Comparators -- 6-5 Decoders -- 6-6 Encoders -- 6-7 Code Converters -- 6-8 Multiplexers (Data Selectors) -- 6-9 Demultiplexers -- 6-10 Parity Generators/Checkers -- 6-11 Troubleshooting -- Applied Logic -- Chapter 7 Latches, Flip-Flops, and Timers -- 7-1 Latches -- 7-2 Flip-Flops -- 7-3 Flip-Flop Operating Characteristics -- 7-4 Flip-Flop Applications -- 7-5 One-Shots -- 7-6 The Astable Multivibrator -- 7-7 Troubleshooting -- Applied Logic -- Chapter 8 Shift Registers -- 8-1 Shift Register Operations -- 8-2 Types of Shift Register Data I/Os -- 8-3 Bidirectional Shift Registers -- 8-4 Shift Register Counters -- 8-5 Shift Register Applications -- 8-6 Logic Symbols with Dependency Notation -- 8-7 Troubleshooting -- Applied Logic -- Chapter 9 Counters -- 9-1 Finite State Machines -- 9-2 Asynchronous Counters -- 9-3 Synchronous Counters -- 9-4 Up/Down Synchronous Counters -- 9-5 Design of Synchronous Counters -- 9-6 Cascaded Counters -- 9-7 Counter Decoding -- 9-8 Counter Applications -- 9-9 Logic Symbols with Dependency Notation -- 9-10 Troubleshooting -- Applied Logic -- Chapter 10 Programmable Logic -- 10-1 Simple Programmable Logic Devices (SPLDs) -- 10-2 Complex Programmable Logic Devices (CPLDs) -- 10-3 Macrocell Modes -- 10-4 Field-Programmable Gate Arrays (FPGAs) -- 10-5 Programmable Logic Software -- 10-6 Boundary Scan Logic -- 10-7 Troubleshooting -- Applied Logic -- Chapter 11 Data Storage -- 11-1 Semiconductor Memory Basics -- 11-2 The Random-Access Memory (RAM) -- 11-3 The Read-Only Memory (ROM) -- 11-4 Programmable ROMs -- 11-5 The Flash Memory -- 11-6 Memory Expansion -- 11-7 Special Types of Memories -- 11-8 Magnetic and Optical Storage -- 11-9 Memory Hierarchy -- 11-10 Cloud Storage -- 11-11 Troubleshooting -- Chapter 12 Signal Conversion and Processing -- 12-1 Analog-to-Digital Conversion -- 12-2 Methods of Analog-to-Digital Conversion -- 12-3 Methods of Digital-to-Analog Conversion -- 12-4 Digital Signal Processing -- 12-5 The Digital Signal Processor (DSP) -- Chapter 13 Data transmission -- 13-1 Data Transmission Media -- 13-2 Methods and Modes of Data Transmission -- 13-3 Modulation of Analog Signals with Digital Data -- 13-4 Modulation of Digital Signals with Analog Data -- 13-5 Multiplexing and Demultiplexing -- 13-6 Bus Basics -- 13-7 Parallel Buses -- 13-8 The Universal Serial Bus (USB) -- 13-9 Other Serial Buses -- 13-10 Bus Interfacing -- Chapter 14 Data Processing and Control -- 14-1 The Computer System -- 14-2 Practical Computer System Considerations -- 14-3 The Processor: Basic Operation -- 14-4 The Processor: Addressing Modes -- 14-5 The Processor: Special Operations -- 14-6 Operating Systems and Hardware -- 14-7 Programming -- 14-8 Microcontrollers and Embedded Systems -- 14-9 System on Chip (SoC) -- Chapter 15 Integrated Circuit Technologies -- 15-1 Basic Operational Characteristics and Parameters -- 15-2 CMOS Circuits -- 15-3 TTL (Bipolar) Circuits -- 15-4 Practical Considerations in the Use of TTL -- 15-5 Comparison of CMOS and TTL Performance -- 15-6 Emitter-Coupled Logic (ECL) Circuits -- 15-7 PMOS, NMOS, and E2CMOS…”
    Libro electrónico
  2. 9242
    Tabla de Contenidos: “…Formalise and implement the Mining Strategy with a timeframe of strategic projects based on the priorities of the different regional stakeholders -- Establish a governance mechanism to monitor progress and ensure the sustainability of the Mining Strategy over the long run and beyond government cycles -- Define a monitoring and evaluation framework with different levels of indicators -- Ensure a formal channel of communication and involvement of regional stakeholders in the Mining Strategy's construction, progress and changes -- Improve the institutional capacity of the national agencies operating at the regional level -- References -- Note -- 2 Strengths and challenges for regional development in Antofagasta -- Introduction -- Megatrends affecting regions specialised in mining and extractive activities -- Antofagasta's future: Mining and its communities -- Comparing Antofagasta using an international benchmark of mining regions -- Acknowledging the impacts of mining activities on the territory and looking beyond economic performance -- A future together with its numerous Indigenous communities -- Charting mining's future, Antofagasta captures the spotlight -- The strategic importance of Antofagasta's lithium reserves for the global energy transition -- Demographic patterns -- Population growth in Antofagasta has accelerated in the last decade -- Foreign migration as a key driver of the population increase in the region -- Yet more efforts are needed towards gender parity for social prosperity in Antofagasta -- Antofagasta has a demographic bonus but ageing is an increasing trend -- Antofagasta's declining youth dependency ratio since 2000 signals an evolving demographic landscape, yet the region still retains a demographic bonus…”
    Libro electrónico
  3. 9243
    Publicado 2024
    Tabla de Contenidos: “…A persona outline for Ellie the explorer -- Ellie's conversational scope -- Technical features -- Getting our data ready for the chatbot -- Selecting our data sources -- Preparing the hotel data -- Creating our agent for complex interactions -- Creating the agent tools -- Bringing it all together - building Your own LangChain Chatbot with Streamlit -- Creating secrets and config management -- Creating our agent service -- Building our Streamlit chat app -- Running and testing Ellie, our chatbot application -- Ways to improve Ellie -- Summary -- Further reading -- Chapter 9: The Future of Conversational AI with LLMs -- Technical requirements -- Going into production -- Understanding the dangers of going into production -- Challenges of RAG systems -- Evaluating production systems -- Components of an evaluation system -- Learning how to use LangSmith to evaluate your project -- Application monitoring in production with LangSmith -- Advanced monitoring features with LangSmith -- Tracing and data management -- Monitoring tools -- Advanced monitoring features -- Alternatives to ChatGPT and LangChain -- Some alternatives to ChatGPT and OpenAI LLMs -- Some alternatives to LangChain -- Looking at the growing LLM landscape -- The growth of the small language model (SLM) -- Are LLMs reaching their limit? …”
    Libro electrónico
  4. 9244
    Publicado 2019
    Tabla de Contenidos: “…5.2 Learning a Task-Speci c Deep Architecture for Clustering -- 5.2.1 Introduction -- 5.2.2 Related Work -- 5.2.2.1 Sparse Coding for Clustering -- 5.2.2.2 Deep Learning for Clustering -- 5.2.3 Model Formulation -- 5.2.3.1 TAGnet: Task-speci c And Graph-regularized Network -- 5.2.3.2 Clustering-Oriented Loss Functions -- 5.2.3.3 Connections to Existing Models -- 5.2.4 A Deeper Look: Hierarchical Clustering by DTAGnet -- 5.2.5 Experiment Results -- 5.2.5.1 Datasets and Measurements -- 5.2.5.2 Experiment Settings -- 5.2.5.3 Comparison Experiments and Analysis -- Bene ts of the Task-speci c Deep Architecture -- Effects of Graph Regularization -- Scalability and Robustness -- 5.2.5.4 Hierarchical Clustering on CMU MultiPIE -- 5.2.6 Conclusion -- References -- 6 Signal Processing -- 6.1 Deeply Optimized Compressive Sensing -- 6.1.1 Background -- 6.1.2 An End-to-End Optimization Model of CS -- 6.1.3 DOCS: Feed-Forward and Jointly Optimized CS -- Complexity -- Related Work -- 6.1.4 Experiments -- Settings -- Simulation -- Reconstruction Error -- Ef ciency -- Experiments on Image Reconstruction -- 6.1.5 Conclusion -- 6.2 Deep Learning for Speech Denoising -- 6.2.1 Introduction -- 6.2.2 Neural Networks for Spectral Denoising -- 6.2.2.1 Network Architecture -- 6.2.2.2 Implementation Details -- Activation Function -- Cost Function -- Training Strategy -- 6.2.2.3 Extracting Denoised Signals -- 6.2.2.4 Dealing with Gain -- 6.2.3 Experimental Results -- 6.2.3.1 Experimental Setup -- 6.2.3.2 Network Structure Analysis -- 6.2.3.3 Analysis of Robustness to Variations -- 6.2.3.4 Comparison with NMF -- 6.2.4 Conclusion and Future Work -- References -- 7 Dimensionality Reduction -- 7.1 Marginalized Denoising Dictionary Learning with Locality Constraint -- 7.1.1 Introduction -- 7.1.2 Related Works -- 7.1.2.1 Dictionary Learning -- 7.1.2.2 Auto-encoder…”
    Libro electrónico
  5. 9245
    Publicado 2015
    Tabla de Contenidos: “…CART -- 18.5.4 Detailed Look at the Statistical Analysis -- 18.5.5 Early Results on Defect Data Sets -- 18.6 Summary -- Part IV: Sharing Models -- Chapter 19: Sharing Models: Challenges and Methods -- Chapter 20: Ensembles of Learning Machines -- 20.1 When and Why Ensembles Work -- 20.1.1 Intuition -- 20.1.2 Theoretical Foundation -- 20.2 Bootstrap Aggregating (Bagging) -- 20.2.1 How Bagging Works -- 20.2.2 When and Why Bagging Works -- 20.2.3 Potential Advantages of Bagging for SEE -- 20.3 Regression Trees (RTs) for Bagging -- 20.4 Evaluation Framework -- 20.4.1 Choice of Data Sets and Preprocessing Techniques -- 20.4.1.1 PROMISE data -- 20.4.1.2 ISBSG data -- 20.4.2 Choice of Learning Machines -- 20.4.3 Choice of Evaluation Methods -- 20.4.4 Choice of Parameters -- 20.5 Evaluation of Bagging+RTs in SEE -- 20.5.1 Friedman Ranking -- 20.5.2 Approaches Most Often Ranked First or Second in Terms of MAE, MMRE and PRED(25) -- 20.5.3 Magnitude of Performance Against the Best -- 20.5.4 Discussion -- 20.6 Further Understanding of Bagging+RTs in SEE -- 20.7 Summary -- Chapter 21: How to Adapt Models in a Dynamic World -- 21.1 Cross-Company Data and Questions Tackled…”
    Libro electrónico
  6. 9246
    por Panik, Michael J.
    Publicado 2014
    Tabla de Contenidos: “…Intro -- Growth Curve Modeling: Theory and Applications -- Copyright -- Contents -- Preface -- 1 Mathematical Preliminaries -- 1.1 Arithmetic Progression -- 1.2 Geometric Progression -- 1.3 The Binomial Formula -- 1.4 The Calculus of Finite Differences -- 1.5 The Number e -- 1.6 The Natural Logarithm -- 1.7 The Exponential Function -- 1.8 Exponential and Logarithmic Functions: Another Look -- 1.9 Change of Base of a Logarithm -- 1.10 The Arithmetic (Natural) Scale versus the Logarithmic Scale -- 1.11 Compound Interest Arithmetic -- 2 Fundamentals of Growth -- 2.1 Time Series Data -- 2.2 Relative and Average Rates of Change -- 2.3 Annual Rates of Change -- 2.3.1 Simple Rates of Change -- 2.3.2 Compounded Rates of Change -- 2.3.3 Comparing Two Time Series: Indexing Data to a Common Starting Point -- 2.4 Discrete versus Continuous Growth -- 2.5 The Growth of a Variable Expressed in Terms of the Growth of Its Individual Arguments -- 2.6 Growth Rate Variability -- 2.7 Growth in a Mixture of Variables -- 3 Parametric Growth Curve Modeling -- 3.1 Introduction -- 3.2 The Linear Growth Model -- 3.3 The Logarithmic Reciprocal Model -- 3.4 The Logistic Model -- 3.5 The Gompertz Model -- 3.6 The Weibull Model -- 3.7 The Negative Exponential Model -- 3.8 The von Bertalanffy Model -- 3.9 The Log-Logistic Model -- 3.10 The Brody Growth Model -- 3.11 The Janoschek Growth Model -- 3.12 The Lundqvist-Korf Growth Model -- 3.13 The Hossfeld Growth Model -- 3.14 The Stannard Growth Model -- 3.15 The Schnute Growth Model -- 3.16 The Morgan-Mercer-Flodin (M-M-F) Growth Model -- 3.17 The McDill-Amateis Growth Model -- 3.18 An Assortment of Additional Growth Models -- 3.18.1 The Sloboda Growth Model -- Appendix 3.A The Logistic Model Derived -- Appendix 3.B The Gompertz Model Derived -- Appendix 3.C The Negative Exponential Model Derived…”
    Libro electrónico
  7. 9247
    Publicado 2024
    Tabla de Contenidos: “…-- 6.6 Sub-Pixel Interpolation -- 6.6.1 What Does a Sub-Pixel Interpolated Reference Frame Look Like? -- 6.6.2 Interpolation Filters -- 6.6.3 Trade-Offs in Sub-Pixel Interpolation -- 6.7 Reference Pictures -- 6.7.1 Reference Pictures for Inter Prediction -- 6.7.2 Reference Picture Structures -- 6.7.2.1 Low-Delay Picture Structures -- 6.7.2.2 Random Access Picture Structures -- 6.7.3 Reference Picture Buffers -- 6.7.3.1 Adding Pictures to the Reference Picture Buffer -- 6.7.3.2 Removing Pictures from the Reference Picture Buffer -- 6.7.3.3 Ordering Reference Pictures -- 6.7.3.4 Communicating Reference Picture Structures -- 6.8 Signalling Inter Prediction Choices -- 6.8.1 Inter Prediction Parameters -- 6.8.2 Signalling the Base Motion Vector Parameters -- 6.8.3 Signalling the Delta Motion Vector Parameters -- 6.8.4 Signalling Reference Picture Choices -- 6.9 Skip Mode -- 6.10 Loop Filter -- 6.11 When Inter Prediction Does Not Find a Good Match -- 6.12 HEVC Inter Prediction -- 6.12.1 Overview -- 6.12.1.1 HEVC Inter Prediction Example -- 6.12.2 HEVC Inter prediction Unit Partitioning -- 6.12.2.1 Slice Types and PU Types -- 6.12.2.2 Symmetric PU Partitions -- 6.12.2.3 Asymmetric PU Partitions -- 6.12.2.4 CU Partitionings into Inter-PUs: Examples -- 6.12.3 HEVC Inter-PU Coding -- 6.12.3.1 Skip or Merge Coding -- 6.12.3.2 Inter-PU Coding: Advanced Motion Vector Prediction -- 6.12.3.3 HEVC Inter-PU Coding: Examples -- 6.12.4 HEVC Inter Prediction Sources…”
    Libro electrónico
  8. 9248
    Publicado 2004
    “…Next we take an in-depth look into the architecture and design guidelines for the runtime and development environment topologies, application architecture, data model, workflow, authentication and authorization. …”
    Libro electrónico
  9. 9249
    por Rogers, Paul
    Publicado 2005
    Tabla de Contenidos: “…-- 22.2 AIX tracing and core dumps -- 22.2.1 tcpdump and iptrace -- 22.2.2 UNIX systems core dump analysis -- 22.2.3 Generating a core dump -- 22.2.4 Looking at a system core dump -- 22.2.5 Ensuring that a good core file is generated -- 22.2.6 errpt command -- 22.3 WebSphere Application Server -- 22.3.1 Reviewing the JVM logs -- 22.3.2 Interpreting the JVM log data -- 22.3.3 Collector tool -- 22.4 Debugging with the Application Server toolkit -- 22.5 WebSphere Application Server tracing -- 22.5.1 Enabling tracing -- 22.5.2 Enabling trace at server startup -- 22.5.3 Enabling trace on a running server -- 22.5.4 Enabling trace on an application client or stand-alone process…”
    Libro electrónico
  10. 9250
    por Delahaye, Sylvie
    Publicado 2002
    Tabla de Contenidos: “…2.4.4 System programmer notes -- 2.4.5 Look out for your PF keys -- 2.4.6 How to quickly locate a record in browse -- 2.4.7 What to do when a copybook fails to compile -- 2.4.8 Record structure defined in source application program -- 2.4.9 Watch out for that bad disposition -- 2.5 Copybook and include -- 2.6 Product updates -- 2.6.1 Multiple Find with Version 3 -- 2.6.2 QSAM allocation using a model -- 2.6.3 Work with VTOC -- 2.6.4 Get information about a load module -- 2.6.5 Dynamic template -- 2.6.6 Compare data sets using templates -- 2.6.7 Edit related tables -- 2.6.8 Load IMS database -- Chapter 3. …”
    Libro electrónico
  11. 9251
    por Moore, Bill
    Publicado 2005
    Tabla de Contenidos: “…Administration tools -- 11.1 Administrative tools for the developer -- 11.2 Starting the tools -- 11.2.1 Starting Interchange Server Express -- 11.2.2 Starting System Manager -- 11.2.3 Starting the Flow manager -- 11.2.4 Setting up to run the Web-based tools -- 11.2.5 Starting ICSMonitor -- 11.2.6 Starting Failed Event Manager -- 11.3 Logging and tracing -- 11.3.1 Configuring logging and tracing -- 11.3.2 Generating sample tracing -- 11.3.3 Viewing the tracing information -- 11.3.4 Using the Log Viewer to look at trace -- 11.4 Debugging collaborations -- 11.4.1 Debugging a success flow -- 11.4.2 Debugging a failure flow -- 11.4.3 Finished debugging -- 11.5 Managing failed events -- 11.5.1 Using Flow manager -- 11.5.2 Using the Failed Event Manager -- 11.5.3 Failed event actions -- 11.6 Using statistics for system interrogation -- 11.6.1 Connector statistics -- 11.6.2 Collaboration statistics -- 11.7 Starting and stopping components -- 11.7.1 Controlling components from System Manager -- 11.7.2 Controlling components from ICSMonitor -- Part 3 Developing an integration sample -- Chapter 12. …”
    Libro electrónico
  12. 9252
    por Almond, Chris
    Publicado 2004
    Tabla de Contenidos: “…-- 1.2 NFS V2 and NFS V3 History -- 1.3 NFS V4 design motivations -- 1.4 Objectives of NFS V4 (RFC3530) -- 1.5 AIX 5.3 specific implementation of NFS V4 -- 1.5.1 Mandatory features -- 1.5.2 Optional features -- 1.6 Planning and implementation considerations -- 1.6.1 Pre-implementation design considerations -- 1.7 Looking ahead to the rest of the book -- Chapter 2. …”
    Libro electrónico
  13. 9253
    por Lee, Tony T., 1960-
    Publicado 2010
    Tabla de Contenidos: “…Preface -- About the Authors -- 1 Introduction and Overview -- 1.1 Switching and Transmission -- 1.1.1 Roles of Switching and Transmission -- 1.1.2 Telephone Network Switching and Transmission Hierarchy -- 1.2 Multiplexing and Concentration -- 1.3 Timescales of Information Transfer -- 1.3.1 Sessions and Circuits -- 1.3.2 Messages -- 1.3.3 Packets and Cells -- 1.4 Broadband Integrated Services Network -- Problems -- 2 Circuit Switch Design Principles -- 2.1 Space-Domain Circuit Switching -- 2.1.1 Nonblocking Properties -- 2.1.2 Complexity of Nonblocking Switches -- 2.1.3 Clos Switching Network -- 2.1.4 Benes Switching Network -- 2.1.5 Baseline and Reverse Baseline Networks -- 2.1.6 Cantor Switching Network -- 2.2 Time-Domain and Time-Space-Time Circuit Switching -- 2.2.1 Time-Domain Switching -- 2.2.2 Time-Space-Time Switching -- Problems -- 3 Fundamental Principles of Packet Switch Design -- 3.1 Packet Contention in Switches -- 3.2 Fundamental Properties of Interconnection Networks -- 3.2.1 Definition of Banyan Networks -- 3.2.2 Simple Switches Based on Banyan Networks -- 3.2.3 Combinatoric Properties of Banyan Networks -- 3.2.4 Nonblocking Conditions for the Banyan Network -- 3.3 Sorting Networks -- 3.3.1 Basic Concepts of Comparison Networks -- 3.3.2 Sorting Networks Based on Bitonic Sort -- 3.3.3 The Odd-Even Sorting Network -- 3.3.4 Switching and Contention Resolution in Sort-Banyan Network -- 3.4 Nonblocking and Self-Routing Properties of Clos Networks -- 3.4.1 Nonblocking Route Assignment -- 3.4.2 Recursiveness Property -- 3.4.3 Basic Properties of Half-Clos Networks -- 3.4.4 Sort-Clos Principle -- Problems -- 4 Switch Performance Analysis and Design Improvements -- 4.1 Performance of Simple Switch Designs -- 4.1.1 Throughput of an Internally Nonblocking Loss System -- 4.1.2 Throughput of an Input-Buffered Switch -- 4.1.3 Delay of an Input-Buffered Switch -- 4.1.4 Delay of an Output-Buffered Switch -- 4.2 Design Improvements for Input Queueing Switches -- 4.2.1 Look-Ahead Contention Resolution…”
    Libro electrónico
  14. 9254
    Publicado 2016
    Tabla de Contenidos: “…-- How This Book Is Organized -- About the Online Resources -- How to Use This Book -- Part 1: Tools of the Trade -- Chapter 1: Scanning Memory Using Cheat Engine -- Why Memory Scanners Are Important -- Basic Memory Scanning -- Cheat Engine's Memory Scanner -- Scan Types -- Running Your First Scan -- Next Scans -- When You Can't Get a Single Result -- Cheat Tables -- Memory Modification in Games -- Manual Modification with Cheat Engine -- Trainer Generator -- Pointer Scanning -- Pointer Chains -- Pointer Scanning Basics -- Pointer Scanning with Cheat Engine -- Pointer Rescanning -- Lua Scripting Environment -- Searching for Assembly Patterns -- Searching for Strings -- Closing Thoughts -- Chapter 2: Debugging Games with OllyDbg -- A Brief Look at OllyDbg's User Interface -- OllyDbg's CPU Window -- Viewing and Navigating a Game's Assembly Code -- Viewing and Editing Register Contents -- Viewing and Searching a Game's Memory -- Viewing a Game's Call Stack -- Creating Code Patches -- Tracing Through Assembly Code -- OllyDbg's Expression Engine -- Using Expressions in Breakpoints -- Using Operators in the Expression Engine -- Working with Basic Expression Elements -- Accessing Memory Contents with Expressions -- OllyDbg Expressions in Action -- Pausing Execution When a Specific Player's Name Is Printed -- Pausing Execution When Your Character's Health Drops -- OllyDbg Plug-ins for Game Hackers -- Copying Assembly Code with Asm2Clipboard -- Adding Cheat Engine to OllyDbg with Cheat Utility -- Controlling OllyDbg Through the Command Line…”
    Libro electrónico
  15. 9255
    Publicado 2018
    Tabla de Contenidos: “…File structure -- Server-side source code -- Java source -- Resources -- client-side source code -- Starting the application -- Application modules -- Home and Login modules -- Account modules -- Settings -- Password -- Registration -- Admin module -- User management -- Metrics -- Health -- Configuration -- Audits -- Logs -- API -- Running generated tests -- Server-side tests -- Client-side tests -- Summary -- Chapter 4: Entity Modeling with JHipster Domain Language -- Introduction to JDL -- DSL grammar for JDL -- Entity modeling with JDL -- Relationship management -- DTO, service, and pagination options -- JDL Studio -- Use case entity model with explanation -- Entities -- Relationships -- Options for entities -- Entity generation with JHipster -- Generated code walkthrough -- Server-side source code -- Domain class for the entity -- Repository interface for the entity -- Service class for the entity -- Resource class for the entity -- Client side -- TypeScript model class for the entity -- Angular services for the entity -- Angular components of the entity -- Angular route for the entity -- Angular module for the entity -- Generated pages -- Running generated tests -- Summary -- Chapter 5: Customization and Further Development -- Live reload for development -- Spring Boot DevTools -- Webpack dev server and BrowserSync -- Setting up live reload for an application -- Customizing the Angular frontend for an entity -- Editing an entity using the JHipster entity sub-generator -- Changing the look and feel of the application -- Adding a new i18n language -- Authorization with Spring Security -- Limiting access to entities -- Limiting access to create/edit/delete entities -- Limiting access to data of other users -- Summary -- Chapter 6: Testing and Continuous Integration -- Fixing and running tests -- Continuous integration -- CI/CD tools -- Jenkins…”
    Libro electrónico
  16. 9256
    Publicado 2021
    Tabla de Contenidos: “…Remote strong style -- Remote setup -- Remote specifics -- Good remote practices -- Remote breaks -- Secondary communication channel -- Remote commit approach -- Summary -- Section 3: Tools to Enhance Remote Pair Programming -- Chapter 7: Video and Audio -- Recap of what we have learned so far -- General technical aspects -- Audio is more important than video -- Video settings -- Screen sharing settings -- Quality sound and video for the win -- Learning how to enhance video -- Looking into the camera -- Using a green screen -- Using a virtual background -- Learning to enhance audio -- Speaking into the microphone -- Using an audio compressor -- Performing soundcheck -- Monitoring the sound -- Adding a pop filter -- Enhancing speech -- Employing diction -- Choosing words -- Warming up your voice -- Summary -- Chapter 8: Source Control Rules -- Recap of the source control rules -- Using source control -- Improving source control usage -- Using the commit types -- Understanding commit heuristics -- Committing when part of a feature is done -- Committing when all the tests are written, and green, for a user scenario -- Committing before taking a break, in a stable state -- Committing when the preparatory refactoring is done -- Committing when one characterization test is done -- Committing when one unit test is green -- Summary -- Further reading -- Chapter 9: Remote Access -- Recapping the rules of remote pairing -- Understanding how remote access tools work -- TeamViewer -- AnyDesk -- Screen -- Chrome Remote Desktop -- Relying on tools -- Bug magnet -- Security for remote access -- Summary -- Further reading -- Why subscribe? …”
    Libro electrónico
  17. 9257
    Publicado 2021
    Tabla de Contenidos: “…Encoding structs to JSON -- Encoding interfaces to JSON -- Chapter 10 Defining Method Signatures Using Interfaces -- Working with Interfaces in Go -- Defining an interface -- Implementing an interface -- Looking at How You May Use Interfaces -- Adding methods to a type that doesn't satisfy an interface -- Using the Stringer interface -- Implementing multiple interfaces -- Using an empty interface -- Determining whether a value implements a specific interface -- Part 3 Multitasking in Go -- Chapter 11 Threading Using Goroutines -- Understanding Goroutines -- Using Goroutines with Shared Resources -- Seeing how shared resources impact goroutines -- Accessing shared resources using mutual exclusion -- Using atomic counters for modifying shared resources -- Synchronizing Goroutines -- Chapter 12 Communicating between Goroutines Using Channels -- Understanding Channels -- How channels work -- How channels are used -- Iterating through Channels -- Asynchronously Waiting on Channels -- Using Buffered Channels -- Part 4 Organizing Your Code -- Chapter 13 Using and Creating Packages in Go -- Working with Packages -- Creating shareable packages -- Organizing packages using directories -- Using Third-Party Packages -- Emojis for Go -- Go Documentation -- Chapter 14 Grouping Packages into Modules -- Creating a Module -- Testing and Building a Module -- Publishing a Module on GitHub -- Part 5 Seeing Go in Action -- Chapter 15 Consuming Web APIs Using Go -- Understanding Web APIs -- Fetching Data from Web Services in Go -- Writing a Go program to connect to a web API -- Decoding JSON data -- Refactoring the code for decoding JSON data -- Fetching from multiple web services at the same time -- Returning Goroutine's results to the main() function -- Chapter 16 Getting Ready to Serve Using REST APIs -- Building Web Services Using REST APIs -- HTTP messages…”
    Libro electrónico
  18. 9258
    Publicado 2021
    Tabla de Contenidos: “…-- Notes -- PART TWO: Going All In -- CHAPTER 5: The "Do Something" Generation -- Get Out There and Do It -- Looking for a Real Relationship -- With Great Power Comes Great Responsibility -- Engaged Donors Are Bigger, Better Donors -- What Does This Mean? …”
    Libro electrónico
  19. 9259
    Publicado 2013
    Tabla de Contenidos: “…. -- What a Network Vulnerability Assessment Can Reveal -- E-mail Data Review and Server Restoration -- Stepping Up Your Game: Knowledge Meets Creativity -- Chapter 13: Stealing Information -- What Are We Looking For? -- Determining Where the Data Went -- LNK Files -- Shellbags -- Scenario: Recovering Log Files to Catch a Thief -- Chapter 14: Internal Leaks -- Why Internal Leaks Happen…”
    Libro electrónico
  20. 9260
    Publicado 2017
    Tabla de Contenidos: “…-- Summary -- Chapter 13: Injectable Devices -- A deeper look into USB -- A possible threat -- An evil USB -- How does the Rubber Ducky work? …”
    Libro electrónico