Mostrando 1,161 - 1,180 Resultados de 2,801 Para Buscar '"Safed"', tiempo de consulta: 0.11s Limitar resultados
  1. 1161
    Publicado 2023
    Tabla de Contenidos: “…Secure coding practices versus safe coding techniques -- Synergies and differences in the testing phase -- Summary -- References -- Part 3: Executing the Process to Engineer a Secure Automotive Product -- Chapter 7: A Practical Threat Modeling Approach for Automotive Systems -- The fundamentals of performing an effective TARA -- Assets -- Damage scenarios -- Threat scenarios -- Attacker model and threat types -- Attack paths -- Risk assessment methods -- Risk treatment -- Common pitfalls when preparing a TARA -- Defining the appropriate TARA scope -- The practical approach -- Know your system -- Make your assumptions known -- Use case-driven analysis -- Prepare context and data flow diagrams -- Damages versus assets - where to start -- Identifying assets with the help of asset categories -- Building threat catalogs -- Creating attack paths using a system flow diagram -- Risk prioritization -- Defining cybersecurity goals -- Choosing security controls and operational environment (OE) requirements -- Tracking shared and accepted risks -- Review and signoff -- Case study using a digital video recorder (DVR) -- Assumptions -- Context diagram -- Identifying the assets -- Damage scenarios -- Cybersecurity requirements and controls -- Summary -- References -- Chapter 8: Vehicle-Level Security Controls -- Choosing cybersecurity controls -- Challenging areas -- Vehicle-level versus ECU-level controls -- Policy controls -- Secure manufacturing -- Challenges -- Secure off-board network communication -- Wi-Fi -- Bluetooth -- Cellular -- Host-based intrusion detection -- Network intrusion detection and prevention (NIDP) -- Domain separation and filtering -- Sensor authentication -- Secure software updates -- In-vehicle network protection -- CAN message authentication -- Ethernet -- Securing diagnostic abilities -- Security access control via UDS service 0x27…”
    Libro electrónico
  2. 1162
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: Common Apex Mistakes -- Null pointer exceptions -- Exceptions on object instances -- Exceptions when working with maps -- Safe navigation operator -- Retrieving configuration data in a bulkified way -- Hot and cold data -- Bulkification - querying within loops -- Bulkification - DML within loops -- Hardcoding -- Summary -- Chapter 2: Debugging Apex -- Technical requirements -- Debugging on Salesforce -- Prevention is better than cure -- Log levels -- SFDX and streaming logs -- Debugging using the Apex Replay Debugger -- Apex Interactive Debugger -- ISV Customer Debugger -- Which tool to use? …”
    Libro electrónico
  3. 1163
    por Höppner, Thomas
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  4. 1164
    Publicado 2021
    Tabla de Contenidos: “…Reducing memory overhead and increasing performance using ranges -- Moving computations at compile time -- Helping the compiler help you by using const -- Leveraging the power of safe types -- Constraining template parameters -- Writing modular C++ -- Summary -- Questions -- Further reading -- Chapter 6: Design Patterns and C++ -- Technical requirements -- Writing idiomatic C++ -- Automating scope exit actions using RAII guards -- Managing copyability and movability -- Implementing non-copyable types -- Adhering to the rules of three and five -- Adhering to the rule of zero -- Using hidden friends -- Providing exception safety using the copy-and-swap idiom -- Writing niebloids -- Policy-based design idiom -- Curiously recurring template pattern -- Knowing when to use dynamic versus static polymorphism -- Implementing static polymorphism -- Interlude - using type erasure -- Creating objects -- Using factories -- Using factory methods -- Using factory functions -- Choosing the return type of a factory -- Using factory classes -- Using builders -- Building with composites and prototypes -- Tracking state and visiting objects in C++ -- Dealing with memory efficiently -- Reducing dynamic allocations using SSO/SOO -- Saving memory by herding COWs -- Leveraging polymorphic allocators -- Using memory arenas -- Using the monotonic memory resource -- Using pool resources -- Writing your own memory resource -- Ensuring there are no unexpected allocations -- Winking out memory -- Summary -- Questions -- Further reading -- Chapter 7: Building and Packaging -- Technical requirements -- Getting the most out of compilers -- Using multiple compilers -- Reducing build times -- Using a fast compiler -- Rethinking templates -- Leveraging tools -- Finding potential code issues -- Using compiler-centric tools -- Abstracting the build process -- Introducing CMake…”
    Libro electrónico
  5. 1165
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Blockchain 101 -- The growth of blockchain technology -- Distributed systems -- The history of blockchain and Bitcoin -- Electronic cash -- Blockchain -- Blockchain defined -- Peer-to-peer -- Distributed ledger -- Cryptographically-secure -- Append-only -- Updateable via consensus -- Generic elements of a blockchain -- How blockchain works -- How blockchain accumulates blocks -- Benefits and limitations of blockchain -- Tiers of blockchain technology -- Features of a blockchain -- Types of blockchain -- Distributed ledgers -- Distributed Ledger Technology -- Public blockchains -- Private blockchains -- Semiprivate blockchains -- Sidechains -- Permissioned ledger -- Shared ledger -- Fully private and proprietary blockchains -- Tokenized blockchains -- Tokenless blockchains -- Consensus -- Consensus mechanism -- Types of consensus mechanisms -- Consensus in blockchain -- CAP theorem and blockchain -- Summary -- Chapter 2: Decentralization -- Decentralization using blockchain -- Methods of decentralization -- Disintermediation -- Contest-driven decentralization -- Routes to decentralization -- How to decentralize -- The decentralization framework example -- Blockchain and full ecosystem decentralization -- Storage -- Communication -- Computing power and decentralization -- Smart contracts -- Decentralized Organizations -- Decentralized Autonomous Organizations -- Decentralized Autonomous Corporations -- Decentralized Autonomous Societies -- Decentralized Applications (DApps) -- Requirements of a Decentralized Application -- Operations of a DApp -- DApp examples -- KYC-Chain -- OpenBazaar -- Lazooz -- Platforms for decentralization -- Ethereum -- MaidSafe -- Lisk -- Summary -- Chapter 3: Symmetric Cryptography…”
    Libro electrónico
  6. 1166
    Publicado 2021
    Tabla de Contenidos: “…-- Certification Exam Policies -- Tips for Taking Your Cloud+ Exam -- Cloud+ Exam Renewal -- CompTIA Cloud+ Study Guide: Exam CV0-003 Objective Map -- 1.0 Cloud Architecture and Design -- 2.0 Security -- 3.0 Deployment -- 4.0 Operations and Support -- 5.0 Troubleshooting -- Reader Support for This Book -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Introducing Cloud Computing Configurations and Deployments -- Introducing Cloud Computing -- Virtualization -- Cloud Service Models -- Cloud Reference Designs and Delivery Models -- Introducing Cloud Concepts and Components -- Connecting the Cloud to the Outside World -- Deciding Whether to Move to the Cloud -- Selecting Cloud Compute Resources -- Hypervisor Affinity Rules -- Validating and Preparing for the Move to the Cloud -- Choosing Elements and Objects in the Cloud -- Internet of Things -- Machine Learning/Artificial Intelligence (AI) -- Creating and Validating a Cloud Deployment -- The Cloud Shared Resource Pooling Model -- Organizational Uses of the Cloud -- Scaling and Architecting Cloud Systems Based on Requirements -- Understanding Cloud Performance -- Delivering High Availability Operations -- Managing and Connecting to Your Cloud Resources -- Is My Data Safe? (Replication and Synchronization) -- Understanding Load Balancers -- Cloud Testing -- Verifying System Requirements -- Correct Scaling for Your Requirements -- Making Sure the Cloud Is Always Available -- Remote Management of VMs…”
    Libro electrónico
  7. 1167
    Publicado 2022
    Tabla de Contenidos: “…Introducing machine learning -- Touching new heights -- Chapter 4 Pioneering Specialized Hardware -- Relying on Standard Hardware -- Understanding the standard hardware -- Describing standard hardware deficiencies -- Relying on new computational techniques -- Using GPUs -- Considering the von Neumann bottleneck -- Defining the GPU -- Considering why GPUs work well -- Working with Deep Learning Processors (DLPs) -- Defining the DLP -- Using the mobile Neural Processing Unit (NPU) -- Accessing the cloud-based Tenser Processing Unit (TPU) -- Creating a Specialized Processing Environment -- Increasing Hardware Capabilities -- Adding Specialized Sensors -- Devising Methods to Interact with the Environment -- Part 2 Considering the Uses of AI in Society -- Chapter 5 Seeing AI Uses in Computer Applications -- Introducing Common Application Types -- Using AI in typical applications -- Realizing AI's wide range of fields -- Considering the Chinese Room argument -- Seeing How AI Makes Applications Friendlier -- Performing Corrections Automatically -- Considering the kinds of corrections -- Seeing the benefits of automatic corrections -- Understanding why automated corrections don't work -- Making Suggestions -- Getting suggestions based on past actions -- Getting suggestions based on groups -- Obtaining the wrong suggestions -- Considering AI-based Errors -- Chapter 6 Automating Common Processes -- Developing Solutions for Boredom -- Making tasks more interesting -- Helping humans work more efficiently -- Understanding how AI reduces boredom -- Considering how AI can't reduce boredom -- Working in Industrial Settings -- Developing various levels of automation -- Using more than just robots -- Relying on automation alone -- Creating a Safe Environment -- Considering the role of boredom in accidents -- Using AI to avoid safety issues…”
    Libro electrónico
  8. 1168
    Publicado 2023
    Tabla de Contenidos: “…General Data Protection Regulation -- EU-US Safe Harbor -- US Privacy Act of 1974 -- International Cooperation -- Import/Export Restrictions -- Trans-border Data Flow -- Important Laws and Regulations -- US Computer Fraud and Abuse Act -- HIPAA -- United States Breach Notification Laws -- Ethics -- The (ISC)2 Code of Ethics -- The (ISC)2 Code of Ethics Canons in Detail -- Computer Ethics Institute -- IABs Ethics and the Internet -- Information Security Governance -- Security Policy and Related Documents -- Policy -- Components of Program Policy -- Policy Types -- Procedures -- Standards -- Guidelines -- Baselines -- Personnel Security -- Candidate Screening and Hiring -- Onboarding -- Employee Termination -- Security Awareness and Training -- Gamification -- Security Champions -- Access Control Defensive Categories and Types -- Preventive -- Detective -- Corrective -- Recovery -- Deterrent -- Compensating -- Comparing Access Controls -- Risk Analysis -- Assets -- Threats and Vulnerabilities -- Risk=Threat x Vulnerability -- Impact -- Risk Analysis Matrix -- Calculating Annualized Loss Expectancy -- Asset Value -- Exposure Factor -- Single Loss Expectancy -- Annual Rate of Occurrence -- Annualized Loss Expectancy -- Total Cost of Ownership -- Return on Investment -- Budget and Metrics -- Risk Response -- Accept the Risk -- Risk Acceptance Criteria -- Mitigate the Risk -- Transfer the Risk -- Risk Avoidance -- Quantitative and Qualitative Risk Analysis -- The Risk Management Process -- Risk Maturity Modeling -- Security and Third Parties -- Service Provider Contractual Security -- Minimum Security Requirements -- Service Level Agreements and Service Level Requirements -- Attestation -- Right to Penetration Test/Right to Audit -- Supply Chain Risk Management -- Risks Associated With Hardware, Software, and Services -- Vendor Governance -- Acquisitions…”
    Libro electrónico
  9. 1169
    Publicado 2024
    Tabla de Contenidos: “…Hybrid dedicated/outsourced teams -- Patterns to avoid during implementation -- Selecting an implementation pattern -- Summary -- Chapter 12: Measuring Progress and Outcomes -- Measures of progress and outcomes -- Why measures of progress and outcomes are important -- Linking measures to capability maturity -- Examples of outcome metrics -- Examples of progress metrics -- Selecting measures -- Leadership and teams for selecting outcome and progress metrics -- Practices for designing metrics and dashboards -- Designing an outcome and progress metrics -- Architectures for dashboards displaying metrics -- Sustaining measures of progress and outcomes -- Evaluating and deprecating metrics -- Introducing new metrics -- Validating metric implementations -- Summary -- Part 4: Exploring Future Trends and Continuous Learning -- Chapter 13: Emerging Trends -- Macro trends in DevOps, DevSecOps, and SRE -- Testability and observability trends -- Platform engineering trends -- VSM trends -- AI/ML trends -- Summary -- Chapter 14: Exploring Continuous Learning and Improvement -- The Third Way of DevOps -- Continuous improvement in DevOps -- Learning in DevOps -- Continuous testing, quality, and security -- Learning from sharing -- Building a culture of open communication -- Sharing best practices and tools -- Cross-team collaboration and external engagement -- Leveraging feedback for continuous improvement -- Learning from outreach -- The role of external engagement in continuous improvement -- The benefits of industry collaboration -- Implementing outreach learnings in DevOps practices -- Learning from experimentation -- The importance of experimentation in DevOps -- Conducting safe experiments in DevOps -- Learning from experimentation outcomes -- Learning from failure -- Embracing a no-blame culture -- Practical steps to analyze failures…”
    Libro electrónico
  10. 1170
    Publicado 2017
    Tabla de Contenidos: “…Installing and Managing Software by Using Microsoft Office 365 and Windows Store Apps -- Sideloading Apps into Online and Offline Images -- Integrating Microsoft Accounts Including Personalization Settings -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 9 Managing Authorization and Authentication -- Understanding User Accounts -- Account Types -- Built-In Accounts -- Local and Domain User Accounts -- Working with User Accounts -- Using the Local Users and Groups Utility -- Using the User Accounts Option in Control Panel -- Creating New Users -- Disabling User Accounts -- Deleting User Accounts -- Renaming User Accounts -- Changing a User's Password -- Using a Microsoft Passport, Pictures, and Biometrics -- Using Device Guard -- Understanding Credential Guard -- Configuring Device Health Attestation -- Managing User Properties -- Managing User Group Membership -- Setting Up User Profiles, Logon Scripts, and Home Folders -- Troubleshooting User Account Authentication -- Managing and Creating Groups -- Using Built-In Groups -- Creating Groups -- Managing Group Membership -- Deleting Groups -- Managing Security Using GPOs and LGPOs -- Understanding the GPO and LGPO Basics -- Using the Group Policy Result Tool -- Managing and Applying LGPOs -- Configuring Local Security Policies -- Using Account Policies -- Using Local Policies -- Configuring User Account Control -- Privilege Elevation -- Registry and File Virtualization -- Understanding Smart Cards -- Configuring Remote Management -- Remote Assistance -- Remote Desktop -- Configuring a VPN Connection -- Transparent Caching -- Broadband Tethering -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 10 Configuring Monitoring and Recovery -- Understanding Recovery -- Knowing the Advanced Boot Options -- Starting in Safe Mode -- Enabling Boot Logging…”
    Libro electrónico
  11. 1171
    Publicado 2024
    Tabla de Contenidos: “…-- Knowledge of TQM Tools -- Tools of TQM -- Check Sheets -- Scatter Diagrams -- Cause-and-Effect Diagrams -- Pareto Charts -- Flowcharts -- Histograms -- Statistical Process Control (SPC) -- The Role of Inspection -- When and Where to Inspect -- OM in Action: Inspecting the Boeing 787 -- Source Inspection -- Service Industry Inspection -- OM in Action: Safe Patients, Smart Hospitals -- Inspection of Attributes versus Variables -- TQM in Services -- OM in Action: Richey International's Spies -- Summary -- Key Terms -- Ethical Dilemma -- Discussion Questions -- Solved Problems -- Problems -- Case Studies…”
    Libro electrónico
  12. 1172
    Publicado 2023
    Tabla de Contenidos: “…-- Knowledge of TQM Tools -- Tools of TQM -- Check Sheets -- Scatter Diagrams -- Cause-and-Effect Diagrams -- Pareto Charts -- Flowcharts -- Histograms -- Statistical Process Control (SPC) -- The Role of Inspection -- When and Where to Inspect -- OM in Action: Inspecting the Boeing 787 -- Source Inspection -- Service Industry Inspection -- OM in Action: Safe Patients, Smart Hospitals -- Inspection of Attributes versus Variables -- TQM in Services -- OM in Action: Richey International's Spies -- Summary -- Key Terms -- Ethical Dilemma -- Discussion Questions -- Solved Problems -- Problems -- Case Studies…”
    Libro electrónico
  13. 1173
    Publicado 2025
    Tabla de Contenidos: “…Understanding the distinction between information and knowledge -- Asking questions to extract information -- Asking questions to gain knowledge -- Seeking clarification with follow-up questions -- Using Questions and Guardrails to Initiate and Guide Conversations -- Asking safe questions to get the conversation moving -- Adding guardrails to limit the scope of a question -- Using questions to transition to other topics -- Chapter 7 Holding Productive and Meaningful Conversations -- Appreciating the Value of Reciprocity, Self-Disclosure, and Give-and-Take -- Embracing reciprocity -- Building trust and reciprocity through self-disclosure -- Giving and taking more or less equally -- Being a Good Conversation Partner -- Cultivating two-way interaction -- Putting the principle of reciprocity into practice -- Strengthening Relationships with Self-Disclosure -- Following the ebb and flow of the conversation -- Getting personal, even in a business setting -- Creating Mutual Meaning -- Checking for confirmation -- Agreeing on next steps -- Part 3 Owning Your Message with Confident Communication -- Chapter 8 Making Simple Communication Changes for Significant Impact -- Making People Less Defensive and More Receptive -- Using the I+verb framework -- Avoiding "you" statements -- Steering clear of generalizations -- Getting to Yes Faster -- Subtly framing your requests -- Providing choices -- Removing all reasons to say no -- Focusing Less on Names and More on Pertinent Details -- Avoiding cheesy sales talk -- Admitting what you don't know -- Pivoting to someone else -- Tabling a topic for later -- Returning the serve -- Purging "Sorry" and "Just" from Your Vocabulary -- Stop saying "sorry" -- Jettison "just" -- Chapter 9 Setting the Stage for Effective Communication -- Challenging the Status Quo -- Understanding why changing the status quo can be difficult…”
    Libro electrónico
  14. 1174
    Publicado 2017
    Tabla de Contenidos: “…Getting information -- Comparing containers -- Changing Items -- Finding Items -- Sorting items -- Using the numeric libraries -- Compile time arithmetic -- Complex numbers -- Using the Standard Library -- Summary -- Chapter 9: Using Strings -- Using the string class as a container -- Getting information about a string -- Altering strings -- Searching strings -- Internationalization -- Using facets -- Strings and numbers -- Converting strings to numbers -- Converting numbers to strings -- Using stream classes -- Outputting floating point numbers -- Outputting integers -- Outputting time and money -- Converting numbers to strings using streams -- Reading numbers from strings using streams -- Using regular expressions -- Defining regular expressions -- Standard Library classes -- Matching expressions -- Using iterators -- Replacing strings -- Using strings -- Creating the project -- Processing header subitems -- Summary -- Chapter 10: Diagnostics and Debugging -- Preparing your code -- Invariants and conditions -- Conditional compilation -- Using pragmas -- Adding informational messages -- Compiler switches for debugging -- Pre-processor symbols -- Producing diagnostic messages -- Trace messages with the C runtime -- Tracing messages with Windows -- Using asserts -- Application termination -- Error values -- Obtaining message descriptions -- Using the Message Compiler -- C++ exceptions -- Exception specifications -- C++ exception syntax -- Standard exception classes -- Catching exceptions by type -- Function try blocks -- System errors -- Nested exceptions -- Structured Exception Handling -- Compiler exception switches -- Mixing C++ and SEH exception handling -- Writing exception-safe classes -- Summary -- Index…”
    Libro electrónico
  15. 1175
    Publicado 2020
    Tabla de Contenidos: “…3.3.5.2 Waste Generators -- 3.3.5.3 Hazardous Waste Transporters -- 3.3.5.4 Treatment, Storage and Disposal Facilities (TSDFs) -- 3.3.5.5 Land Disposal Restrictions (LDRs) -- 3.3.5.6 Universal Waste -- 3.3.5.7 Underground Storage Tanks -- 3.3.5.8 Used Oil -- 3.3.6 Emergency Planning and Community Right to Know Act (EPCRA) -- 3.3.7 Toxic Substances Control Act -- 3.3.8 Safe Drinking Water Act (SDWA) -- 3.3.9 National Environmental Policy Act -- 3.3.10 Endangered Species Act -- 3.3.11 Federal Insecticide, Fungicide and Rodenticide Act -- 3.3.12 Comprehensive Environmental Response Compensation and Liability Act (CERCLA) -- 3.4 State Laws -- 3.5 County Laws -- 3.6 Local Laws -- 3.7 Regulatory Relationship Development and Sustainment -- 3.8 Other Directives and Corporate Policy -- 3.9 Establishing and Documenting Applicability -- 3.10 Applied Learning -- 3.10.1 Case Study -- References -- Chapter 4 Implementation Roles, Responsibilities and Accountability -- 4.1 Leadership Charting the Way -- 4.1.1 Leadership Style and Impact -- 4.1.2 Communicating the Importance of Environmental Compliance -- 4.2 Employee Participation -- 4.2.1 Where Implementation Really Takes Place -- 4.2.2 Motivated versus Reluctant Implementation -- 4.3 Environmental Subject Matter Experts and Professionals -- 4.3.1 What Defines an Environmental Subject Matter Expert? …”
    Libro electrónico
  16. 1176
    Publicado 2023
    Tabla de Contenidos: “…Further Reading -- Chapter 7 Water Hammering -- 7.1 Introduction -- 7.2 Water Hammering and Pressure Loss in Check Valves -- 7.3 Water Hammering Calculations -- Questions and Answers -- Further Reading -- Chapter 8 Safety Valves -- 8.1 Introduction -- 8.2 Safety Valve Parts -- 8.3 Safety Valve Design and Operation -- 8.3.1 Design and Operation Parameters -- 8.3.1.1 Overpressure Criteria -- 8.3.2 Principle of Operation -- 8.3.3 Safety Valve Reaction Forces -- 8.3.4 Safety Valve Capacity Conversion -- Questions and Answers -- Further Reading -- Chapter 9 Safety and Reliability -- 9.1 Introduction -- 9.2 Safety Standards -- 9.3 Risk Analysis -- 9.4 Basic Safety and Reliability Concepts -- 9.4.1 System Incidents and Failures -- 9.4.1.1 Failure Rate -- 9.4.1.2 Repair Rate -- 9.4.1.3 Mean Time to Failure (MTTF) -- 9.4.1.4 Mean Time Between Failure (MTBF) -- 9.4.1.5 Mean Time to Repair and Recovery (MTTR) -- 9.4.1.6 Mean Time to Detection (MTTD) -- 9.4.2 Reliability and Unreliability -- 9.4.3 Availability and Unavailability -- 9.5 Safety Integrity Level (SIL) Calculations -- 9.5.1 SIL -- 9.5.2 Probability of Failure on Demand (PFD) -- 9.5.3 Mean Downtime -- 9.5.4 Diagnostic Coverage -- 9.5.5 Safe Failure Fraction (SFF) -- 9.6 Condition Monitoring (ValveWatch) -- Questions and Answers -- Further Reading -- Chapter 10 Valve Operation -- 10.1 Introduction -- 10.2 Valve Torque -- 10.3 Stem Design -- 10.3.1 MAST Calculations -- 10.3.2 Buckling Prevention -- 10.3.3 Torsional Deflection Prevention -- 10.3.4 MAST Limitation for Quarter-Turn Cryogenic Valves -- Questions and Answers -- Further Reading -- Chapter 11 Miscellaneous -- 11.1 Introduction -- 11.2 Joint Efficiency -- 11.2.1 Weld Joint Efficiency -- 11.2.2 Bolted Joint Efficiency -- 11.2.2.1 Bolted Bonnet or Cover Joints -- 11.2.2.2 Bolted Body Joints -- 11.2.3 Threaded Joint Efficiency…”
    Libro electrónico
  17. 1177
    Publicado 2016
    Tabla de Contenidos: “…-- Basic Exporting -- Basic Importing -- Importing a Single Binding -- Importing Multiple Bindings -- Importing an Entire Module -- A Subtle Quirk of Imported Bindings -- Renaming Exports and Imports -- Default Values in Modules -- Exporting Default Values -- Importing Default Values -- Re-exporting a Binding -- Importing Without Bindings -- Loading Modules -- Using Modules in Web Browsers -- Browser Module Specifier Resolution -- Summary -- Appendix A: Minor Changes in ECMAScript 6 -- Working with Integers -- Identifying Integers -- Safe Integers -- New Math Methods -- Unicode Identifiers -- Formalizing the __proto__ Property -- Appendix B: Understanding ECMAScript 7 (2016) -- The Exponentiation Operator -- Order of Operations -- Operand Restriction -- The Array.prototype.includes() Method -- How to Use Array.prototype.includes() -- Value Comparison -- A Change to Function-Scoped Strict Mode -- Index -- The Electronic Frontier Foundation (EFF) -- Updates -- Level Up Your JavaScript…”
    Libro electrónico
  18. 1178
    por Hahn, Marcelo Guerra
    Publicado 2023
    Tabla de Contenidos: “…-- Principles of functional programming -- Pure functions -- Folding -- Delving more deeply into recursion -- Head recursion -- Tail recursion -- Metaprogramming in functional C++ -- Summary -- Questions -- Further reading -- Chapter 9: Concurrency and Multithreading -- Technical requirements -- Understanding concurrency and multithreading -- Processes -- Threads -- Working with threads -- Waiting for threads -- Using std::jthread -- Passing arguments to the thread function -- Managing threads and sharing data -- Sharing data -- Protecting shared data using a mutex -- Avoiding deadlocks -- Designing concurrent code -- Introducing coroutines -- Summary -- Questions -- Further reading -- Chapter 10: Designing Concurrent Data Structures -- Technical requirements -- Thread safety -- Lock-based concurrent data structures -- A thread-safe singleton pattern -- Synchronized counters -- Concurrent stacks -- Lock-free concurrent data structures -- Using atomic types -- Operations on atomic types -- Lock-free stacks -- A lock-free queue -- A lock-free hashtable -- A lock-free set -- More operations on atomics -- Summary -- Questions -- Further reading -- Chapter 11: Designing World-Ready Applications -- Technical requirements -- Design patterns…”
    Libro electrónico
  19. 1179
    por Burrows, Mike
    Publicado 2020
    Tabla de Contenidos: “…3.3 Modell 3 - Menschen, Verfahren und Technologie: XP und DevOps -- XP -- DevOps -- 3.4 Modell 4 - Optionen erkunden -- User Story Mapping, Jobs to be Done und Behavior Driven Development (BDD) -- Abb. 3-3 Eine User Story Map -- 3.5 Modell 5 - Co-Creation mit Kunden: Service Design Thinking -- Abb. 3-4 Phasen der Divergenz und Konvergenz -- Service Design Thinking und Digital Leadership -- 3.6 Modell 6 - Systematisches Engpassmanagement: Theory of Constraints -- Kontinuierliche Auslieferung erfordert kontinuierliche Erforschung -- 3.7 Modell 7 - Hypothesengetriebene Geschäftsmodellexperimente: Lean Startup -- Abb. 3-5 Das Changeban-Board -- Abb. 3-6 Wertvoll, machbar, brauchbar -- 3.8 Right to left: Eine umfassende vereinheitlichende Theorie für Lean-Agile -- 3.9 Fragen zum Kapitel -- 4 Tragfähige Skalierung -- 4.1 Das Spotify-Modell: Squads, Tribes, Chapter und Gilden (Guilds) -- Abb. 4-1 Das Squad -- Abb. 4-2 Das Tribe -- Abb. 4-3 Chapter -- Abb. 4-4 Gilden -- 4.2 Skalierte agile Prozessframeworks -- 4.3 SAFe-Grundlagen -- 4.4 Engagementmodelle und die Herausforderungen von Veränderungen -- 4.5 Organisationen haben auch Bedürfnisse -- 4.6 Fragen zum Kapitel -- 5 Von außen nach innen -- 5.1 Was passiert gerade? …”
    Libro electrónico
  20. 1180
    Publicado 2022
    Tabla de Contenidos: “…Understanding the Scene Optimizer and its Operating Modes -- Creating a Custom Optimization Strategy for the Asteroid Belt -- Summary -- Extended Topics -- Chapter 13: Converting the Application to a PWA -- Technical Requirements -- Hosting Requirements -- Options for Hosting your PWA -- Resources and Reading -- Introduction to PWAs -- SSL -- Service Workers -- Web Manifest -- Converting the Space-Truckers application into a PWA -- Putting the "P" in PWA -- Using the PWABuilder Extension -- Using IndexedDB to Persist Scores -- Learning about IndexedDB -- Using IndexedDB -- Recap -- Storing and Displaying High Scores -- The Heist -- The Muscle -- The Safe Cracker -- The Brains -- The Job -- The Integration -- Summary -- Extended Topics -- Chapter 14: Extended Topics, Extended -- AR and VR with WebXR -- An Abridged History of AR/VR on the WWW -- Building Tomorrow, Today with the WebXR Experience Helper -- Further Reading -- A Tour of the Babylon.js Native Project -- Choosing Babylon Native -- The Evolution of a Babylon Native App -- Further Reading -- Incorporating 3D Content into a Website -- Babylon.js and CMS -- Tracing out a Path to Advanced Rendering -- Ray Tracing and its History by Erich Loftis -- Summary -- Index -- About Packt -- Other Books You May Enjoy…”
    Libro electrónico