Mostrando 1,181 - 1,200 Resultados de 2,801 Para Buscar '"Safed"', tiempo de consulta: 0.13s Limitar resultados
  1. 1181
    Publicado 2022
    Tabla de Contenidos: “…Using Method References -- Calling static Methods -- Calling Instance Methods on a Particular Object -- Calling Instance Methods on a Parameter -- Calling Constructors -- Reviewing Method References -- Working with Built-in Functional Interfaces -- Implementing Supplier -- Implementing Consumer and BiConsumer -- Implementing Predicate and BiPredicate -- Implementing Function and BiFunction -- Implementing UnaryOperator and BinaryOperator -- Checking Functional Interfaces -- Using Convenience Methods on Functional Interfaces -- Learning the Functional Interfaces for Primitives -- Working with Variables in Lambdas -- Listing Parameters -- Using Local Variables Inside a Lambda Body -- Referencing Variables from the Lambda Body -- Summary -- Exam Essentials -- Review Questions -- Chapter 9 Collections and Generics -- Using Common Collection APIs -- Using the Diamond Operator -- Adding Data -- Removing Data -- Counting Elements -- Clearing the Collection -- Check Contents -- Removing with Conditions -- Iterating -- Determining Equality -- Using the List Interface -- Comparing List Implementations -- Creating a List with a Factory -- Creating a List with a Constructor -- Working with List Methods -- Converting from List to an Array -- Using the Set Interface -- Comparing Set Implementations -- Working with Set Methods -- Using the Queue and Deque Interfaces -- Comparing Deque Implementations -- Working with Queue and Deque Methods -- Using the Map Interface -- Comparing Map Implementations -- Working with Map Methods -- Calling Basic Methods -- Iterating through a Map -- Getting Values Safely -- Replacing Values -- Putting if Absent -- Merging Data -- Comparing Collection Types -- Sorting Data -- Creating a Comparable Class -- Comparing Data with a Comparator -- Comparing Comparable and Comparator -- Comparing Multiple Fields -- Sorting and Searching…”
    Libro electrónico
  2. 1182
    Publicado 2024
    Tabla de Contenidos: “…Realizing the Benefits of a Trusting and Psychologically Safe Workplace -- Identifying the Factors that Drive and Undermine Psychological Safety -- Factors that undermine trust and psychological safety -- Factors that cultivate trust and psychological safety -- Creating Psychological Safety -- Increasing Inclusion Safety -- Increasing Learner Safety -- Increasing Contributor Safety -- Increasing Challenger Safety -- Measuring Psychological Safety -- Recognizing Best Practice Companies -- Pixar: "Fail Early and Often" -- Eileen Fisher: "Leadership is About Listening" -- Barry-Wehmiller: "What We Do Matters" -- X Development LLC: "Shoot for the Moon" -- Chapter 12 Coaching and Giving Feedback -- Acknowledging the Impact of Not Providing Coaching and Feedback -- Understanding the Difference between Coaching and Feedback -- Customizing Your Coaching Approach using Situational Leadership -- Telling -- Selling -- Participating -- Delegating -- Avoiding Common Feedback Pitfalls -- Being unprepared -- Failing to establish trust -- Ignoring cultural context -- Treating everyone the same way -- Avoiding reciprocal feedback -- Giving Great Feedback -- Before the conversation -- During the conversation -- After the conversation -- Chapter 13 Communicating Inclusively -- Recognizing the Benefits of Inclusive Communication -- Understanding the Impact of Non-Inclusive Language -- Working With Human Resources to Promote Inclusive Language -- Practicing Inclusive Communication -- Chapter 14 Dealing with Conflict -- Addressing the Reasons We Avoid Conflict -- Normalizing Conflict as a Tool for Higher Performance -- Identifying the Topics We Tend to Avoid -- Seeing the Benefits of Engaging in Uncomfortable Conversations -- Interpreting Two Models for Managing Conflict -- Thomas-Kilman conflict modes -- Intercultural Conflict Styles…”
    Libro electrónico
  3. 1183
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Home Assistant - Installation and Configuration -- Chapter 1: Understanding Home Automation Systems -- Technical requirements -- Overview of home automation systems -- Benefits of having an automated home -- Saving time -- Feeling comfortable -- Saving money -- Being safe -- Home automation structure -- Home automation server -- Sensors -- Actuators -- Communication media -- Protocols and brokers (MQTT) -- User interface and other clients -- Example of a real home automation system -- History -- Current configuration -- Bill of materials and costs -- Summary -- Chapter 2: Getting Started with Home Assistant -- Technical requirements -- Learning about Home Assistant -- Introduction and evolution -- Home Assistant features and resources -- Important Home Assistant definitions -- Home Assistant availability -- Community and support -- YAML -- Raspberry Pi as a home automation server -- Hardware architecture -- Main Raspberry Pi features used by the home automation system -- Installing Home Assistant on a Raspberry Pi -- Preparing the SD card for Home Assistant installation -- Home Assistant installation verification of Raspberry Pi -- Home Assistant initial configuration -- Exploring a Home Assistant installation -- Home Assistant default screen and menu disposition -- Home Assistant sidebar navigation -- Home Assistant basic configurations -- User preference configuration -- General configuration -- People configuration -- MQTT configuration -- Wi-Fi network configuration -- Dashboard cleanup -- Summary -- Part 2: Install, Create, and Hack Sensors and Actuators -- Chapter 3: Hands-On Project 1 - Creating Your Own Sensor -- Technical requirements -- Knowing the parts and tools to build your sensor…”
    Libro electrónico
  4. 1184
    por Reddy, Martin
    Publicado 2024
    Tabla de Contenidos: “…The maybe_unused attribute -- Migrating to C++17 -- C++20 API features -- Modules -- Named Modules -- Header units -- The spaceship operator -- Constraints and concepts -- Abbreviated function templates -- The consteval specifier -- The constinit specifier -- Migrating to C++20 -- C++23 API features -- Expected values -- Multidimensional subscript operator -- Preprocessor directives -- Migrating to C++23 -- 8 - Performance -- Pass input arguments by const reference -- Minimize #include dependencies -- Avoid "Winnebago" headers -- Forward declarations -- Redundant #include guards -- Declaring constants -- The constexpr, consteval, and constinit keywords -- Initialization lists -- Memory optimization -- Don't inline functions until you need to -- Copy on write -- Iterating over elements -- Iterators -- Random access -- Array references -- Extern templates -- Performance analysis -- Time-based analysis -- Memory-based analysis -- Multithreading analysis -- 9 - Concurrency -- Multithreading with C++ -- Terminology -- Data races and race conditions -- Thread safety -- Reentrancy -- Asynchronous tasks -- Parallelism -- Accessing shared data -- Stateless APIs -- Initializing shared data -- Synchronized data access -- Concurrent API design -- Concurrency best practices -- Thread-Safe Interface pattern -- 10 - Versioning -- Version numbers -- Version number significance -- Esoteric numbering schemes -- Creating a version API -- Software branching strategies -- Branching strategies -- Branching policies -- APIs and parallel branches -- File formats and parallel products -- Life cycle of an API -- Levels of compatibility -- Backward compatibility -- Functional compatibility -- Source compatibility -- Binary/application binary interface compatibility -- Binary incompatible API changes -- Binary compatible API changes -- Forward compatibility…”
    Libro electrónico
  5. 1185
    Publicado 2024
    Tabla de Contenidos: “…Using API specifications in Postman -- Creating a mock server -- Validating requests -- Summary -- Chapter 4: Considerations for Good API Test Automation -- Technical requirements -- Exploratory and automated testing -- Exercise - considerations for good API test automation -- Writing good automation -- Types of API tests -- Organizing and structuring tests -- Creating the test structure -- Organizing the tests -- Environments -- Collection variables -- Choosing a variable scope -- Exercise - using variables -- Creating maintainable tests -- Using logging -- Test reports -- Creating repeatable tests -- Summary -- Chapter 5: Understanding Authorization Options -- Understanding API security -- Authorization in APIs -- Authentication in APIs -- API security in Postman -- Getting started with authorization in Postman -- Using Basic Auth -- Using bearer tokens -- Using API keys -- Using AWS Signature -- Using OAuth -- Setting up OAuth 2.0 in Postman -- OAuth 1.0 -- Digest authentication -- Hawk authentication -- Using NTLM authentication -- Using Akamai EdgeGrid -- Handling credentials in Postman safely -- Summary -- Chapter 6: Creating Test Validation Scripts -- Technical requirements -- Checking API responses -- Checking the status code in a response -- Using the pm.test method -- Using Chai assertions in Postman -- Try it out -- Checking the body of a response -- Checking whether the response contains a given string -- Checking JSON properties in the response -- Try it out -- Checking headers -- Custom assertion objects in Postman -- Creating your own tests -- Try it out -- Creating folder and collection tests -- Cleaning up after tests -- Setting up pre-request scripts -- Using variables in pre-request scripts -- Passing data between tests -- Building request workflows -- Looping over the current request -- Running requests in the collection runner…”
    Libro electrónico
  6. 1186
    Publicado 2024
    Tabla de Contenidos: “…-- Synchronization with async/await -- Canceling a thread -- Thread-safe programming techniques -- Lock() -- Records -- Avoid static members and classes -- Using the volatile keyword -- Concurrent collections in .NET -- Next steps -- Chapter 5: The One with the Filesystem Chronicles -- Technical requirements -- File writing basics -- FileStream -- Even faster - Win32 -- File reading basics -- Reading binary data -- Directory operations -- The Path class -- The Directory class -- The DirectoryInfo class -- File system monitoring -- Asynchronous I/O -- The naïve approach -- Using CancellationTokens -- BufferedStream -- File system security -- Encryption basics -- Symmetric encryption and decryption -- Asymmetric encryption and decryption -- File compression -- Compressing some data -- Decompressing some data -- Serialization - JSON and Binary -- JSON serialization -- Binary serialization -- Next steps -- Chapter 6: The One Where Processes Whisper -- Technical requirements -- Overview of IPC and its importance in modern computing -- Windows Messages -- A sample…”
    Libro electrónico
  7. 1187
    Publicado 2022
    Tabla de Contenidos: “…Capability Maturity Model -- Putting It All Together -- Chapter Review -- Quick Review -- Questions -- Answers -- Part II Asset Security -- Chapter 5 Assets -- Information and Assets -- Identification -- Classification -- Physical Security Considerations -- Protecting Mobile Devices -- Paper Records -- Safes -- Managing the Life Cycle of Assets -- Ownership -- Inventories -- Secure Provisioning -- Asset Retention -- Data Life Cycle -- Data Acquisition -- Data Storage -- Data Use -- Data Sharing -- Data Archival -- Data Destruction -- Data Roles -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 6 Data Security -- Data Security Controls -- Data States -- Standards -- Scoping and Tailoring -- Data Protection Methods -- Digital Asset Management -- Digital Rights Management -- Data Loss Prevention -- Cloud Access Security Broker -- Chapter Review -- Quick Review -- Questions -- Answers -- Part III Security Architecture and Engineering -- Chapter 7 System Architectures -- General System Architectures -- Client-Based Systems -- Server-Based Systems -- Database Systems -- High-Performance Computing Systems -- Industrial Control Systems -- Devices -- Distributed Control System -- Supervisory Control and Data Acquisition -- ICS Security -- Virtualized Systems -- Virtual Machines -- Containerization -- Microservices -- Serverless -- Cloud-Based Systems -- Software as a Service -- Platform as a Service -- Infrastructure as a Service -- Everything as a Service -- Cloud Deployment Models -- Pervasive Systems -- Embedded Systems -- Internet of Things -- Distributed Systems -- Edge Computing Systems -- Chapter Review -- Quick Review -- Questions -- Answers -- Chapter 8 Cryptology -- The History of Cryptography -- Cryptography Definitions and Concepts -- Cryptosystems -- Kerckhoffs' Principle -- The Strength of the Cryptosystem -- One-Time Pad…”
    Libro electrónico
  8. 1188
    Publicado 2018
    Tabla de Contenidos: “…. -- Stopping the server safely and quickly -- How to do it... -- How it works... -- See also -- Stopping the server in an emergency -- How to do it... -- How it works... -- Reloading the server configuration files -- How to do it... -- How it works... -- There's more... -- Restarting the server quickly -- How to do it... -- There's more... -- Preventing new connections -- How to do it... -- How it works... -- Restricting users to only one session each -- How to do it... -- How it works... -- Pushing users off the system -- How to do it... -- How it works... -- Deciding on a design for multitenancy -- How to do it... -- How it works... -- Using multiple schemas -- Getting ready -- How to do it... -- How it works... -- Giving users their own private database -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running multiple servers on one system -- Getting ready -- How to do it... -- How it works... -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Chapter 5: Tables and Data -- Choosing good names for database objects -- Getting ready -- How to do it... -- There's more... -- Handling objects with quoted names -- Getting ready -- How to do it... -- How it works... -- There's more... -- Enforcing the same name and definition for columns -- Getting ready -- How to do it... -- How it works... -- There's more... -- Identifying and removing duplicates -- Getting ready…”
    Libro electrónico
  9. 1189
    Publicado 2018
    Tabla de Contenidos: “…Running a multiuser cluster -- The case for a multiuser cluster -- Using namespaces for safe multitenancy -- Avoiding namespace pitfalls -- Summary -- Chapter 6: Using Critical Kubernetes Resources -- Designing the Hue platform -- Defining the scope of Hue -- Hue components -- Hue microservices -- Planning workflows -- Automatic workflows -- Human workflows -- Budget-aware workflows -- Using Kubernetes to build the Hue platform -- Using Kubectl effectively -- Understanding Kubectl resource configuration files -- Deploying long-running microservices in pods -- Creating pods -- Decorating pods with labels -- Deploying long-running processes with deployments -- Updating a deployment -- Separating internal and external services -- Deploying an internal service -- Creating the hue-reminders service -- Exposing a service externally -- Ingress -- Using namespace to limit access -- Launching jobs -- Running jobs in parallel -- Cleaning up completed jobs -- Scheduling cron jobs -- Mixing non-cluster components -- Outside-the-cluster-network components -- Inside-the-cluster-network components -- Managing the Hue platform with Kubernetes -- Using liveness probes to ensure your containers are alive -- Using readiness probes to manage dependencies -- Employing Init Containers for orderly pod bring-up -- Sharing with DaemonSet pods -- Evolving the Hue platform with Kubernetes -- Utilizing Hue in enterprises -- Advancing science with Hue -- Educating the kids of the future with Hue -- Summary -- Chapter 7: Handling Kubernetes Storage -- Persistent volumes walk-through -- Volumes -- Using emptyDir for intra-pod communication -- Using HostPath for intra-node communication -- Using local volumes for durable node storage -- Provisioning persistent volumes -- Creating persistent volumes -- Capacity -- Volume mode -- Access modes -- Reclaim policy -- Storage class…”
    Libro electrónico
  10. 1190
    Publicado 2018
    Tabla de Contenidos:
    Libro electrónico
  11. 1191
    Publicado 2018
    Tabla de Contenidos: “…Putting it all together -- Training -- Inference -- Loading data -- Creating reverse indices -- Loading models -- Translating a sequence -- Decoding a sequence -- Example translations -- Summary -- Chapter 12: Using Deep Reinforcement Learning -- Reinforcement learning overview -- Markov Decision Processes -- Q Learning -- Infinite state space -- Deep Q networks -- Online learning -- Memory and experience replay -- Exploitation versus exploration -- DeepMind -- The Keras reinforcement learning framework -- Installing Keras-RL -- Installing OpenAI gym -- Using OpenAI gym -- Building a reinforcement learning agent in Keras -- CartPole -- CartPole neural network architecture -- Memory -- Policy -- Agent -- Training -- Results -- Lunar Lander -- Lunar Lander network architecture -- Memory and policy -- Agent -- Training -- Results -- Summary -- Chapter 13: Generative Adversarial Networks -- An overview of the GAN -- Deep Convolutional GAN architecture -- Adversarial training architecture -- Generator architecture -- Discriminator architecture -- Stacked training -- Step 1 - train the discriminator -- Step 2 - train the stack -- How GANs can fail -- Stability -- Mode collapse -- Safe choices for GAN -- Generating MNIST images using a Keras GAN -- Loading the dataset -- Building the generator -- Building the discriminator -- Building the stacked model -- The training loop -- Model evaluation -- Generating CIFAR-10 images using a Keras GAN -- Loading CIFAR-10 -- Building the generator -- Building the discriminator -- The training loop -- Model evaluation -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  12. 1192
    Publicado 2018
    Tabla de Contenidos: “…Real world examples of metaprogramming -- Example 1 - Reflection -- Making a class reflect its members -- C++ libraries which simplifies reflection -- Using the reflection -- Evaluating the assembler output of the reflection -- Conditionally overloading global functions -- Testing reflection capabilities -- Example 2 - Creating a generic safe cast function -- Example 3 - Hash strings at compile time -- The advantages of compile-time hash sum calculation -- Implement and verify a compile-time hash function -- Constructing a PrehashedString class -- Forcing PrehashedString to only accept compile time string literals -- Evaluating PrehashedString -- Evaluating get_bitmap_resource() with PrehashedString -- Summary -- Chapter 9: Proxy Objects and Lazy Evaluation -- An introduction to lazy evaluation and proxy objects -- Lazy versus eager evaluation -- Proxy objects -- Comparing concatenated strings using a proxy -- Implementing the proxy -- Performance evaluation -- The r-value modifier -- Assigning a concatenated proxy -- Postponing an sqrt computation when comparing distances -- A simple two-dimensional point class -- The underlying mathematics -- Implementing the DistProxy object -- Expanding DistProxy to something more useful -- Comparing distances with DistProxy -- Calculating distances with DistProxy -- Preventing the misuse of DistProxy -- Performance evaluation -- Creative operator overloading and proxy objects -- The pipe operator as an extension method -- The pipe operator -- The infix operator -- Further reading -- Summary -- Chapter 10: Concurrency -- Understanding the basics of concurrency -- What makes concurrent programming hard? …”
    Libro electrónico
  13. 1193
    Cryptocurrency All-in-One For Dummies
    Cryptocurrency All–in–One For Dummies
    Publicado 2022
    Tabla de Contenidos: “…-- Wallets store private keys -- Wallets create and store keys and addresses -- Wallets communicate with the Bitcoin network -- Wallets can be hot or cold -- Exploring Wallet Hardware -- Brain wallets -- Paper wallets -- Metal wallets -- Hardware wallets -- Web wallets -- Dedicated full nodes -- Dedicated hardware full nodes -- Full-node software -- Software wallets -- Finding a Wallet -- Setting Up a Bitcoin Wallet -- Creating and securing your first wallet -- Creating a 24-word seed -- Increasing security with a fake account -- Receiving Bitcoin -- Getting those notifications -- Checking your addresses -- Sending Bitcoin -- Following the money -- Backing up your wallet -- Importing (or recovering) a wallet -- Creating a watch-only wallet -- Exploring multiple-signature wallets -- Using the Lightning Network -- Chapter 4 Keeping Your Bitcoin Safe -- Understanding How You Can Lose Control of Your Bitcoin -- Grasping the Goal: Private Key and Seed Protection -- Making a Choice: Custodial or Private Wallet? …”
    Libro electrónico
  14. 1194
    Financial security for dummies
    Financial Security for Dummies
    Publicado 2022
    Tabla de Contenidos: “…Locating money through real estate -- Turning to small business options -- Searching for safe money investments -- Cultivating Good Investing Habits -- Understanding fees -- Managing monitoring and trading your investments -- Keeping your emotions from following market trends -- Dealing with investment setbacks -- Developing a Personal Investing Plan -- Taxing situations -- Assessing your current portfolio -- Allocating those assets -- Selecting the Best Mutual Funds and Exchange-Traded Funds (ETFs) -- Investing in stock and bond funds -- Minding the ABCs of ETFs -- Seizing Investment Opportunities During Tough Times -- Cashing in on reduced stock and real estate prices -- Mustering the courage to buy when more people are selling -- Chapter 11 Getting and Maintaining Proper Insurance -- Being Prepared: A Quick Lesson on Insurance -- Don't sweat the small losses . . . -- Define a small loss . . . -- Insurance not to buy -- Insurance worth purchasing -- Protecting Your Health -- Reviewing your current health insurance -- Saving tax dollars with health savings accounts -- Maximizing your personal health -- Securing Your Income-Earning Ability -- Long-term disability insurance -- Life insurance -- Insurance on Your Assets -- Insuring your home -- Auto insurance -- Excess liability insurance -- Will, Trusts, and Estate Planning -- Starting with a will -- Preparing other useful legal documents -- Considering your preparation options -- Protecting Yourself from Identity Theft and Fraud -- Part 5 Prepping for Future Armageddon -- Chapter 12 What Pundits Scare People About -- Fearmongers Have Been Scaring Folks for Generations -- Case study: Peter Schiff has been scaring investors for generations -- Understanding what pundits are trying to sell you -- Seeing why fearmongers' predictions are often wrong -- Surveying the Leading Worries Being Pitched Today…”
    Libro electrónico
  15. 1195
    Publicado 2017
    Tabla de Contenidos: “…Checking whether a host is flagged by Google Safe Browsing for malicious activities -- Getting ready -- How to do it... -- How it works... -- There's more... -- Collecting valid e-mail accounts and IP addresses from web servers -- How to do it... -- How it works... -- There's more... -- Discovering hostnames pointing to the same IP address -- How to do it... -- How it works... -- There's more... -- Discovering hostnames by brute forcing DNS records -- How to do it... -- How it works... -- There's more... -- Customizing the dictionary -- Adjusting the number of threads -- Specifying a DNS server -- Using the NSE library target -- Obtaining profile information from Google's People API -- Getting ready -- How to do it... -- How it works... -- There's more... -- Matching services with public vulnerability advisories -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 4: Scanning Web Servers -- Introduction -- Listing supported HTTP methods -- How to do it... -- How it works... -- There's more... -- Interesting HTTP methods -- Checking whether a web server is an open proxy -- How to do it... -- How it works... -- There's more... -- Discovering interesting files and folders in web servers -- How to do it... -- How it works... -- There's more... -- Using a Nikto database -- Abusing mod_userdir to enumerate user accounts -- How to do it... -- How it works... -- There's more... -- Brute forcing HTTP authentication -- How to do it... -- How it works... -- There's more... -- Brute modes -- Brute forcing web applications -- How to do it... -- How it works... -- There's more... -- Brute forcing WordPress installations -- Brute forcing WordPress installations -- Detecting web application firewalls -- How to do it... -- How it works... -- There's more... -- Detecting possible XST vulnerabilities -- How to do it... -- How it works…”
    Libro electrónico
  16. 1196
    Publicado 2017
    Tabla de Contenidos: “…-- Finding the module you need -- Using r10k -- Understanding the Puppetfile -- Managing dependencies with generate-puppetfile -- Using modules in your manifests -- Using puppetlabs/mysql -- Using puppetlabs/apache -- Using puppet/archive -- Exploring the standard library -- Safely installing packages with ensure_packages -- Modifying files in place with file_line -- Introducing some other useful functions -- The pry debugger -- Writing your own modules -- Creating a repo for your module -- Writing the module code -- Creating and validating the module metadata -- Tagging your module -- Installing your module -- Applying your module -- More complex modules -- Uploading modules to the Puppet Forge -- Summary -- Chapter 8: Classes, roles, and profiles -- Classes -- The class keyword -- Declaring parameters to classes -- Automatic parameter lookup from Hiera data -- Parameter data types -- Available data types -- Range parameters -- Content type parameters…”
    Libro electrónico
  17. 1197
    Publicado 2017
    Tabla de Contenidos: “…. -- Stopping the server safely and quickly -- How to do it... -- How it works... -- See also -- Stopping the server in an emergency -- How to do it... -- How it works... -- Reloading the server configuration files -- How to do it... -- How it works... -- There's more... -- Restarting the server quickly -- How to do it... -- There's more... -- Preventing new connections -- How to do it... -- How it works... -- Restricting users to only one session each -- How to do it... -- How it works... -- Pushing users off the system -- How to do it... -- How it works... -- Deciding on a design for multitenancy -- How to do it... -- How it works... -- Using multiple schemas -- Getting ready -- How to do it... -- How it works... -- Giving users their own private database -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Running multiple servers on one system -- Getting ready -- How to do it... -- How it works... -- Setting up a connection pool -- Getting ready -- How to do it... -- How it works... -- There's more... -- Accessing multiple servers using the same host and port -- Getting ready -- How to do it... -- There's more... -- Chapter 5: Tables and Data -- Introduction -- Choosing good names for database objects -- Getting ready -- How to do it…”
    Libro electrónico
  18. 1198
    Publicado 2017
    Tabla de Contenidos: “…. -- See also -- Shutdown Jenkins safely -- Getting ready -- How to do it... -- Monitoring Jenkins with JavaMelody -- Getting ready -- How to do it... -- There's more... -- Troubleshooting with JavaMelody - memory -- Troubleshooting with JavaMelody - painful jobs -- Monitoring a Jenkins Job using a Build Monitor View -- Getting ready -- How to do it... -- Configuring mail notifications -- Getting ready -- How to do it... -- Signaling the need to archive -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 3: Managing Security -- Introduction -- Improving security with Jenkins configuration -- Getting ready -- How to do it... -- Configuring Authorization - Matrix-based security -- Getting ready -- How to do it... -- Configuring a Project-based Matrix Authorization Strategy -- Getting ready -- How to do it... -- Jenkins and OpenLDAP integration -- Getting ready -- How to do it... -- There's more... -- Jenkins and Active Directory integration -- Getting ready -- How to do it... -- Jenkins and OWASP Zed Attack Proxy integration -- Getting ready -- How to do it... -- See also -- Testing for OWASP's top 10 security issues -- Getting ready -- How to do it... -- How it works... -- There's more... -- Target practice with WebGoat -- More tools of the trade -- See also…”
    Libro electrónico
  19. 1199
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: The First Step - Concurrency Design Principles -- Basic concurrency concepts -- Concurrency versus parallelism -- Synchronization -- Immutable object -- Atomic operations and variables -- Shared memory versus message passing -- Possible problems in concurrent applications -- Data race -- Deadlock -- Livelock -- Resource starvation -- Priority inversion -- A methodology to design concurrent algorithms -- The starting point - a sequential version of the algorithm -- Step 1 - analysis -- Step 2 - design -- Step 3 - implementation -- Step 4 - testing -- Step 5 - tuning -- Conclusion -- Java Concurrency API -- Basic concurrency classes -- Synchronization mechanisms -- Executors -- The fork/join framework -- Parallel streams -- Concurrent data structures -- Concurrency design patterns -- Signaling -- Rendezvous -- Mutex -- Multiplex -- Barrier -- Double-checked locking -- Read-write lock -- Thread pool -- Thread local storage -- Tips and tricks for designing concurrent algorithms -- Identifying the correct independent tasks -- Implementing concurrency at the highest possible level -- Taking scalability into account -- Using thread-safe APIs -- Never assume an execution order -- Preferring local thread variables over static and shared when possible -- Finding the easier parallelizable version of the algorithm -- Using immutable objects when possible -- Avoiding deadlocks by ordering the locks -- Using atomic variables instead of synchronization -- Holding locks for as short a time as possible -- Taking precautions using lazy initialization -- Avoiding the use of blocking operations inside a critical section -- Summary -- Chapter 2: Working with Basic Elements - Threads and Runnables…”
    Libro electrónico
  20. 1200
    Publicado 2015
    Tabla de Contenidos: “…Administering Hadoop -- HDFS -- Persistent Data Structures -- Safe Mode -- Audit Logging -- Tools -- Monitoring -- Logging -- Metrics and JMX -- Maintenance -- Routine Administration Procedures -- Commissioning and Decommissioning Nodes -- Upgrades -- Part IV. …”
    Libro electrónico