Mostrando 2,041 - 2,060 Resultados de 2,758 Para Buscar '"Termination"', tiempo de consulta: 0.13s Limitar resultados
  1. 2041
    Publicado 2017
    Tabla de Contenidos: “…Providing a RESTful API interface for PostgreSQL -- A PostgreSQL full text search -- The tsquery and tsvector data types -- The tsvector data type -- The tsquery data type -- Pattern matching -- Full text search indexing -- Summary -- Chapter 10: Transactions and Concurrency Control -- Transactions -- Transaction and ACID properties -- Transaction and concurrency -- MVCC in PostgreSQL -- Transaction isolation levels -- Explicit locking -- Table-level locks -- Table locking modes -- Row-level locks -- Row-level lock modes -- Deadlocks -- Advisory locks -- Summary -- Chapter 11: PostgreSQL Security -- Authentication in PostgreSQL -- PostgreSQL pg_hba.conf -- Listen addresses -- Authentication best practices -- PostgreSQL default access privileges -- Role system and proxy authentication -- PostgreSQL security levels -- Database security level -- Schema security level -- Table-level security -- Column-level security -- Row-level security -- Encrypting data -- PostgreSQL role password encryption -- pgcrypto -- One-way encryption -- Two-way encryption -- Summary -- Chapter 12: The PostgreSQL Catalog -- The system catalog -- System catalog for administrators -- Getting the database cluster and client tools version -- Terminating and canceling user sessions -- Defining and getting database cluster settings -- Getting the database and database object size -- Cleaning up the database -- Cleaning up the database data -- Tuning for performance -- Selective dump -- Summary -- Chapter 13: Optimizing Database Performance -- PostgreSQL configuration tuning -- Maximum number of connections -- Memory settings -- Hard disk settings -- Planner-related settings -- Bench marking is your friend -- Tuning performance for write -- Tuning performance for read -- Explain command and execution plan -- Detecting problems in query plans -- Common mistakes in writing queries…”
    Libro electrónico
  2. 2042
    Publicado 2022
    Tabla de Contenidos: “…Understand, Adhere to, and Promote Professional Ethics -- (ISC)2 Code of Professional Ethics -- Organizational code of ethics -- Understand and Apply Security Concepts -- Confidentiality -- Integrity -- Availability -- Authenticity -- Nonrepudiation -- Evaluate and Apply Security Governance Principles -- Alignment of security function to business strategy, goals, mission, and objectives -- Organizational processes -- Organizational roles and responsibilities -- Security control frameworks -- Due care and due diligence -- Determine Compliance and Other Requirements -- Contractual, legal, industry standards, and regulatory requirements -- Privacy requirements -- Understand Legal and Regulatory Issues That Pertain to Information Security -- Cybercrimes and data breaches -- Licensing and intellectual property requirements -- Import/export controls -- Transborder data flow -- Privacy -- Understand Requirements for Investigation Types -- Develop, Document, and Implement Security Policies, Standards, Procedures, and Guidelines -- Policies -- Standards (and baselines) -- Procedures -- Guidelines -- Identify, Analyze, and Prioritize Business Continuity (BC) Requirements -- Business impact analysis -- Develop and document the scope and the plan -- Contribute to and Enforce Personnel Security Policies and Procedures -- Candidate screening and hiring -- Employment agreements and policies -- Onboarding, transfers, and termination processes -- Vendor, consultant, and contractor agreements and controls -- Compliance policy requirements -- Privacy policy requirements -- Understand and Apply Risk Management Concepts -- Identify threats and vulnerabilities -- Risk assessment/analysis -- Risk appetite and risk tolerance -- Risk treatment -- Countermeasure selection and implementation -- Applicable types of controls -- Control assessments (security and privacy)…”
    Libro electrónico
  3. 2043
    Publicado 2018
    Tabla de Contenidos: “…Node.js installation -- Installation steps -- Node.js tutorial in VS Code -- Running Hello Readers -- Integrated Terminal -- Postman -- Installation -- Installing on macOS -- Installing on Windows -- Linux installation -- Updating Postman - native app (macOS, Windows, and Linux) -- Postman Echo -- Sending the first request using Postman -- How does this work in Postman? …”
    Libro electrónico
  4. 2044
    Publicado 2017
    Tabla de Contenidos: “…Getting information -- Comparing containers -- Changing Items -- Finding Items -- Sorting items -- Using the numeric libraries -- Compile time arithmetic -- Complex numbers -- Using the Standard Library -- Summary -- Chapter 9: Using Strings -- Using the string class as a container -- Getting information about a string -- Altering strings -- Searching strings -- Internationalization -- Using facets -- Strings and numbers -- Converting strings to numbers -- Converting numbers to strings -- Using stream classes -- Outputting floating point numbers -- Outputting integers -- Outputting time and money -- Converting numbers to strings using streams -- Reading numbers from strings using streams -- Using regular expressions -- Defining regular expressions -- Standard Library classes -- Matching expressions -- Using iterators -- Replacing strings -- Using strings -- Creating the project -- Processing header subitems -- Summary -- Chapter 10: Diagnostics and Debugging -- Preparing your code -- Invariants and conditions -- Conditional compilation -- Using pragmas -- Adding informational messages -- Compiler switches for debugging -- Pre-processor symbols -- Producing diagnostic messages -- Trace messages with the C runtime -- Tracing messages with Windows -- Using asserts -- Application termination -- Error values -- Obtaining message descriptions -- Using the Message Compiler -- C++ exceptions -- Exception specifications -- C++ exception syntax -- Standard exception classes -- Catching exceptions by type -- Function try blocks -- System errors -- Nested exceptions -- Structured Exception Handling -- Compiler exception switches -- Mixing C++ and SEH exception handling -- Writing exception-safe classes -- Summary -- Index…”
    Libro electrónico
  5. 2045
    Publicado 2021
    Tabla de Contenidos: “…Looping -- The for loop -- Iterating over a range -- Iterating over a sequence -- Iterators and iterables -- Iterating over multiple sequences -- The while loop -- The break and continue statements -- A special else clause -- Assignment expressions -- Statements and expressions -- Using the walrus operator -- A word of warning -- Putting all this together -- A prime generator -- Applying discounts -- A quick peek at the itertools module -- Infinite iterators -- Iterators terminating on the shortest input sequence -- Combinatoric generators -- Summary -- Chapter 4: Functions, the Building Blocks of Code -- Why use functions? …”
    Libro electrónico
  6. 2046
    Publicado 2001
    Tabla de Contenidos: “…The Linear Address Fields -- Page Table Handling -- Physical Memory Layout -- Process Page Tables -- Kernel Page Tables -- Provisional kernel Page Tables -- Final kernel Page Table when RAM size is less than 896 MB -- Final kernel Page Table when RAM size is between 896 MB and 4096 MB -- Final kernel Page Table when RAM size is more than 4096 MB -- Fix-Mapped Linear Addresses -- Handling the Hardware Cache and the TLB -- Handling the hardware cache -- Handling the TLB -- Processes -- Processes, Lightweight Processes, and Threads -- Process Descriptor -- Process State -- Identifying a Process -- Process descriptors handling -- Identifying the current process -- Doubly linked lists -- The process list -- The lists of TASK_RUNNING processes -- Relationships Among Processes -- The pidhash table and chained lists -- How Processes Are Organized -- Wait queues -- Handling wait queues -- Process Resource Limits -- Process Switch -- Hardware Context -- Task State Segment -- The thread field -- Performing the Process Switch -- The switch_to macro -- The _ _switch_to ( ) function -- Saving and Loading the FPU, MMX, and XMM Registers -- Saving the FPU registers -- Loading the FPU registers -- Using the FPU, MMX, and SSE/SSE2 units in Kernel Mode -- Creating Processes -- The clone( ), fork( ), and vfork( ) System Calls -- The do_fork( ) function -- The copy_process( ) function -- Kernel Threads -- Creating a kernel thread -- Process 0 -- Process 1 -- Other kernel threads -- Destroying Processes -- Process Termination -- The do_group_exit( ) function -- The do_exit( ) function -- Process Removal -- Interrupts and Exceptions -- The Role of Interrupt Signals -- Interrupts and Exceptions -- IRQs and Interrupts -- The Advanced Programmable Interrupt Controller (APIC) -- Exceptions -- Interrupt Descriptor Table…”
    Libro electrónico
  7. 2047
    Publicado 2012
    Tabla de Contenidos: “…Intro -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I: Enterprise Security -- 1 Cryptographic Tools -- Determine Appropriate Tools and Techniques -- Advanced PKI Concepts -- Hashing -- Cryptographic Applications -- Digital Signatures -- Code Signing -- Nonrepudiation -- Transport Encryption -- Implications of Cryptographic Methods and Design -- Entropy -- Pseudorandom Number Generation -- Perfect Forward Secrecy -- Confusion -- Diffusion -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 2 Computing Platforms -- Advantages and Disadvantages of Virtualizing Servers and Minimizing Physical Space Requirements -- VLAN -- Securing Virtual Environments, Appliances, and Equipment -- Vulnerabilities Associated with a Single Physical Server Hosting Multiple Companies' Virtual Machines -- Vulnerabilities Associated with a Single Platform Hosting Multiple Companies' Virtual Machines -- Secure Use of On-demand/Elastic Cloud Computing -- Vulnerabilities Associated with Co-mingling of Hosts with Different Security Requirements -- Virtual Desktop Infrastructure (VDI) -- Terminal Services -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 3 Enterprise Storage -- Explain the Security Implications of Enterprise Storage -- Virtual Storage -- NAS-Network Attached Storage -- SAN-Storage Area Network -- VSAN -- iSCSI -- FCOE -- LUN Masking -- HBA Allocation -- Redundancy (Location) -- Secure Storage Management -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 4 Infrastructure -- Advanced Network Design -- Complex Network Security Solutions for Data Flow -- Secure Data Flows to Meet Changing Business Needs -- Secure DNS -- Secure Directory Services -- Network Design Consideration…”
    Libro electrónico
  8. 2048
    Publicado 2023
    Tabla de Contenidos: “…Chapter 13: Industrial Network and Communication Protocols Fundamentals -- Understanding industrial networks -- Understanding network topology -- Network media - wired and wireless (Bluetooth, Wi-Fi, and cellular communication - 1G, 2G, 3G, 4G, and 5G) -- Network connectors and other network components -- Understanding network protocols -- Wired network protocols -- Wireless network protocols -- Common industrial network protocol - Foundation Fieldbus -- Common industrial network protocol - PROFIBUS -- Common industrial network protocol - Modbus -- Modbus Remote Terminal Unit (RTU) -- Modbus Transmission Control Protocol/Internet Protocol (TCP/IP) -- Common industrial network protocol - HART -- Common industrial network protocol - PROFINET -- Summary -- Questions -- Chapter 14: Exploring Smart Factory (Industry 4.0) with 5G -- Understanding Industry 4.0 -- Exploring the key technologies in Industry 4.0 -- The benefits of Industry 4.0 -- Basic steps for building a smart factory -- The benefits of a 5G-enabled smart factory -- Connecting your PLC or machine data to the cloud -- Summary -- Questions -- Assessments -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  9. 2049
    Publicado 2024
    Tabla de Contenidos: “…. -- Mimicking keys, menu items, and terminal output -- How to do it... -- How it works... -- There's more... -- Arranging topics like a puzzle -- How to do it... -- How it works... -- Building a word cloud -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 8: Producing Contents, Indexes, and Bibliographies -- Tuning tables of contents and lists of figures and tables -- How to do it... -- How it works... -- There's more... -- Creating a bibliography -- How to do it... -- How it works... -- There's more…”
    Libro electrónico
  10. 2050
    Publicado 2023
    Tabla de Contenidos: “…-- 3.3 Research Systems Constraints -- 3.4 Systems Value Modeling for Research -- 3.5 Research Management by Project -- 3.6 Research for the Grand Challenges of Engineering -- 3.7 Defining a Project Systems Structure for Research -- 3.8 Research Problem Identification -- 3.9 Research Project Definition -- 3.10 Research Project Planning -- 3.11 Research Project Organizing -- 3.12 Research Resource Allocation -- 3.13 Research Activity Scheduling -- 3.14 Research Tracking and Reporting -- 3.15 Research Control -- 3.16 Research Project Termination -- 3.17 Systems Hierarchy for Research -- References -- Chapter 4 General Project Management Process -- 4.1 What Is Project Management? …”
    Libro electrónico
  11. 2051
    por Knapp, Eric D.
    Publicado 2024
    Tabla de Contenidos: “…Common Industrial Security Recommendations -- Identification of critical systems -- Network segmentation/isolation of systems -- Defense in depth -- Access control -- Advanced Industrial Security Recommendations -- Security Monitoring -- Policy whitelisting -- Application whitelisting -- Common Misperceptions About Industrial Network Security -- Assumptions made in this book -- Summary -- 3 - Industrial Cybersecurity History and Trends -- The convergence of OT and IT -- Importance of securing industrial networks -- The evolution of the cyber threat -- APTs and weaponized malware -- Industroyer -- Night dragon -- Stuxnet -- TRISIS -- Advanced persistent threats and cyber warfare -- Still to come -- Defending against modern cyber threats -- The insider -- Hacktivism, cybercrime, cyberterrorism, and cyberwar -- Summary -- 4 - Introduction to Industrial Control Systems and Operations -- System assets -- Programmable logic controller -- Ladder diagrams -- Sequential function charts -- Remote terminal unit -- Intelligent electronic device -- Human-machine interface -- Supervisory workstations -- Data historian -- Business information consoles and dashboards -- Other assets -- System operations -- Control loops -- Control processes -- Feedback loops -- Production information management -- Business information management -- Process management -- Safety instrumented systems -- The smart grid -- Network architectures -- Summary -- 5 - Industrial Network Design and Architecture -- Introduction to industrial networking -- Common topologies -- Network segmentation -- Higher layer segmentation -- Physical versus logical segmentation -- Microsegmentation -- Cryptographic microsegmentation -- Network services -- Wireless networks -- Remote access -- Performance considerations -- Latency and jitter -- Bandwidth and throughput…”
    Libro electrónico
  12. 2052
    Publicado 2018
    Tabla de Contenidos: “…-- Installing backend tools and dependencies -- Installing ASP.NET Core -- Installing PostgreSQL -- Choosing and installing an IDE -- Productivity tools -- Installing VS Code extensions -- Installing the Vue.js Chrome devtools extension -- Installing a Terminal Emulator on Windows (optional) -- Summary -- Chapter 3: Getting Started with the Project -- ASP.NET Core SPA templates versus CLI tools -- An introduction to webpack -- What is webpack? …”
    Libro electrónico
  13. 2053
    Publicado 2018
    Tabla de Contenidos: “…-- Types of AWK -- When and where to use AWK -- Getting started with AWK -- Installation on Linux -- Using the package manager -- Compiling from the source code -- Workflow of AWK -- Action and pattern structure of AWK -- Example data file -- Pattern-only statements -- Action-only statements -- Printing each input line/record -- Using the BEGIN and END blocks construct -- The BEGIN block -- The body block -- The END block -- Patterns -- Actions -- Running AWK programs -- AWK as a Unix command line -- AWK as a filter (reading input from the Terminal) -- Running AWK programs from the source file -- AWK programs as executable script files -- Extending the AWK command line on multiple lines -- Comments in AWK -- Shell quotes with AWK -- Data files used as examples in this book -- Some simple examples with default usage -- Multiple rules with AWK -- Using standard input with names in AWK -- AWK standard options -- Standard command-line options -- The -F option - field separator -- The -f option (read source file) -- The -v option (assigning variables) -- GAWK-only options -- The --dump-variables option (AWK global variables) -- The --profile option (profiling) -- The --sandbox option -- The -i option (including other files in your program) -- Include other files in the GAWK program (using @include) -- The -V option -- Summary -- Chapter 2: Working with Regular Expressions -- Introduction to regular expressions -- What is a regular expression? …”
    Libro electrónico
  14. 2054
    Publicado 2018
    Tabla de Contenidos: “…Wissenschaftliche Aufsätze -- a) Analyse -- aa) Substituierbarkeit wissenschaftlicher Aufsätze -- bb) Substituierbarkeit wissenschaftlicher Zeitschriften aus Autorensicht -- (1) Austauschbarkeit mit Publikationen einer anderen Art -- (2) Austauschbarkeit mit Publikationen derselben Art -- (3) Austauschbarkeit mit Open-Access-Zeitschriften ("Golden Open Access") -- (a) Veröffentlichungskosten -- (b) Langzeitverfügbarkeit -- (c) Renommee -- (d) Zwischenergebnis -- (4) Zwischenergebnis -- cc) Substituierbarkeit wissenschaftlicher Artikel aus Nutzersicht -- (1) Öffentlich verfügbare Kopien des Artikels -- (a) Öffentliche Verfügbarmachung nach deutschem Recht -- (aa) Öffentliche Zugänglichmachung für Unterricht und Forschung -- (bb) Wiedergabe von Werken an elektronischen Leseplätzen in öffentlichen Bibliotheken, Museen und Archiven -- (cc) Kopienversand auf Bestellung -- (dd) Zwischenergebnis -- (b) Öffentliche Verfügbarmachung nach französischem Recht -- (aa) Wiedergabe oder Vervielfältigung für Unterricht und Forschung -- (bb) Wiedergabe an Terminals in öffentlichen Bibliotheken, Museen und Archiven -- (cc) Zwischenergebnis -- (c) Zwischenergebnis -- (2) Open-Access-Zweitveröffentlichung ("Green Open Access") -- (a) Angebot -- (aa) Zweitveröffentlichungsrecht -- [1] Preprints -- [2] Postprints -- (bb) Gebrauch des Zweitveröffentlichungsrechts -- (b) Substituierbarkeit -- (c) Zwischenergebnis -- (3) Zweitverwertung -- (4) Zwischenergebnis -- dd) Preiselastizität -- ee) Zwischenergebnis -- b) Bewertung…”
    Libro electrónico
  15. 2055
    por Russinovich, Mark E.
    Publicado 2009
    Tabla de Contenidos: “…Foreword -- Acknowledgments -- Introduction -- Concepts and Tools -- Windows Operating System Versions -- Foundation Concepts and Terms -- Windows API -- Services, Functions, and Routines -- Processes, Threads, and Jobs -- Virtual Memory -- Kernel Mode vs. User Mode -- Terminal Services and Multiple Sessions -- Objects and Handles -- Security -- Registry -- Unicode -- Digging into Windows Internals -- Reliability and Performance Monitor -- Kernel Debugging -- Windows Software Development Kit -- Windows Driver Kit -- Sysinternals Tools -- Conclusion -- System Architecture -- Requirements and Design Goals -- Operating System Model -- Architecture Overview -- Portability -- Symmetric Multiprocessing -- Scalability -- Differences Between Client and Server Versions -- Checked Build -- Key System Components -- Environment Subsystems and Subsystem DLLs -- Ntdll.dll -- Executive -- Kernel -- Hardware Abstraction Layer -- Device Drivers -- System Processes -- Conclusion -- System Mechanisms -- Trap Dispatching -- Interrupt Dispatching -- Exception Dispatching -- System Service Dispatching -- Object Manager -- Executive Objects -- Object Structure -- Synchronization -- High-IRQL Synchronization -- Low-IRQL Synchronization -- System Worker Threads -- Windows Global Flags -- Advanced Local Procedure Calls (ALPCs) -- Kernel Event Tracing -- Wow64 -- Wow64 Process Address Space Layout -- System Calls -- Exception Dispatching -- User Callbacks -- File System Redirection -- Registry Redirection and Reflection -- I/O Control Requests -- 16-Bit Installer Applications -- Printing -- Restrictions -- User-Mode Debugging -- Kernel Support -- Native Support -- Windows Subsystem Support -- Image Loader -- Early Process Initialization -- Loaded Module Database -- Import Parsing -- Post Import Process Initialization -- Hypervisor (Hyper-V) -- Partitions -- Root Partition…”
    Libro electrónico
  16. 2056
    Publicado 2018
    Tabla de Contenidos: “…Iterating over a range -- Iterating over a sequence -- Iterators and iterables -- Iterating over multiple sequences -- The while loop -- The break and continue statements -- A special else clause -- Putting all this together -- A prime generator -- Applying discounts -- A quick peek at the itertools module -- Infinite iterators -- Iterators terminating on the shortest input sequence -- Combinatoric generators -- Summary -- Chapter 4: Functions, the Building Blocks of Code -- Why use functions? …”
    Libro electrónico
  17. 2057
    Publicado 2018
    Tabla de Contenidos: “…Deploying a service to the flexible environment -- Pricing in the flexible environment -- App Engine resources and integrations -- Task queues -- Push and pull queues -- Push queues -- Named queues -- Pull queues -- Creating tasks -- Structuring tasks queues -- Scheduled tasks -- Deploying a cron definition -- Trying the App Engine cron service -- Scaling App Engine services -- Autoscaling -- Basic and manual scaling -- Externalizing configuration and managing secrets -- Application configuration files -- Compute Engine metadata server -- Runtime Configurator -- Cloud Key Management Service (KMS) -- General considerations -- Networking and security -- The App Engine firewall -- Cloud Endpoints -- Google Cloud IAP -- Virtual private networks -- Summary -- Chapter 5: Google Kubernetes Engine -- Google Kubernetes Engine -- When to choose GKE -- GKE or App Engine Flex -- Creating and maintaining a GKE cluster -- Node pools -- Multi-zonal and regional clusters -- Container Registry -- Deploying workloads to GKE -- Rolling updates -- Rolling back updates -- Scaling deployments -- Manually scaling deployments -- Automatically scaling deployments -- Exposing GKE Services -- Exposing services within a cluster -- Exposing services to external traffic -- Managing secrets with GKE -- Creating/Storing secrets -- Using secrets -- Billing -- Summary -- Chapter 6: Google Cloud Functions -- Functions as a Service -- Google Cloud Functions -- Advantages of Cloud Functions -- Price -- Scalability -- Developer velocity -- Considerations when using Cloud Functions -- Invoking Cloud Functions -- HTTP functions -- Processing HTTP requests -- Background functions -- Cloud Pub/Sub functions -- Cloud Storage functions -- Background function retries and termination -- Developing Cloud Functions -- Using the Cloud Console -- Local development -- Debugging functions…”
    Libro electrónico
  18. 2058
    Publicado 2017
    Tabla de Contenidos: “…. -- Visualizing memory usage in the Terminal -- See also -- Chapter 10: Building Microservice Systems -- Introduction…”
    Libro electrónico
  19. 2059
    Publicado 2017
    Tabla de Contenidos: “…Comparing the two versions -- The third example - the merge sort algorithm -- Shared classes -- The serial version -- The SerialMergeSort class -- The SerialMetaData class -- The concurrent version -- The MergeSortTask class -- The ConcurrentMergeSort class -- The ConcurrentMetaData class -- Comparing the two versions -- Other methods of the fork/join framework -- Summary -- Chapter 8: Processing Massive Datasets with Parallel Streams - The Map and Reduce Model -- An introduction to streams -- Basic characteristics of streams -- Sections of a stream -- Sources of a stream -- Intermediate operations -- Terminal operations -- MapReduce versus MapCollect -- The first example - a numerical summarization application -- The concurrent version -- The ConcurrentDataLoader class -- The ConcurrentStatistics class -- Customers from the United Kingdom -- Quantity from the United Kingdom -- Countries for product -- Quantity for product -- Multiple data filter -- Highest invoice amounts -- Products with a unit price between 1 and 10 -- The ConcurrentMain class -- The serial version -- Comparing the two versions -- The second example - an information retrieval search tool -- An introduction to the reduction operation -- The first approach - full document query -- The basicMapper() method -- The Token class -- The QueryResult class -- The second approach - reduced document query -- The limitedMapper() method -- The third approach - generating an HTML file with the results -- The ContentMapper class -- The fourth approach - preloading the inverted index -- The ConcurrentFileLoader class -- The fifth approach - using our own executor -- Getting data from the inverted index - the ConcurrentData class -- Getting the number of words in a file -- Getting the average tfxidf value in a file -- Getting the maximum and minimum tfxidf values in the index…”
    Libro electrónico
  20. 2060
    Publicado 2017
    Tabla de Contenidos: “…. -- Registering participants in Phaser -- Forcing the termination of Phaser -- See also -- Controlling phase change in concurrent-phased tasks -- Getting ready -- How to do it... -- How it works... -- See also -- Exchanging data between concurrent tasks -- Getting ready -- How to do it... -- How it works... -- There's more... -- Completing and linking tasks asynchronously -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also... -- Chapter 4: Thread Executors -- Introduction -- Creating a thread executor and controlling its rejected tasks -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Executing tasks in an executor that returns a result -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also…”
    Libro electrónico