Mostrando 1,861 - 1,880 Resultados de 2,749 Para Buscar '"Terminator"', tiempo de consulta: 0.10s Limitar resultados
  1. 1861
    por Robinson, Andrew
    Publicado 2014
    Tabla de Contenidos: “…; 1.3 Der Startvorgang; 1.3.1 Sprache, Ländereinstellungen und Tastaturbelegung anpassen; 1.4 Die grafische Benutzeroberfläche starten; 1.5 Terminal unter X starten; 1.6 Fehlerbehebung…”
    Libro electrónico
  2. 1862
    Publicado 2015
    Tabla de Contenidos: “…2.18.3 Compressed Archives (.tar.gz)2.18.4 zcat; 2.18.5 Other Compression Utilities; 2.19 Linux Directory Hierarchy Essentials; 2.19.1 Other Root Subdirectories; 2.19.2 The /usr Directory; 2.19.3 Kernel Location; 2.20 Running Commands as the Superuser; 2.20.1 sudo; 2.20.2 /etc/sudoers; 2.21 Looking Forward; Chapter 3: Devices; 3.1 Device Files; 3.2 The sysfs Device Path; 3.3 dd and Devices; 3.4 Device Name Summary; 3.4.1 Hard Disks: /dev/sd*; 3.4.2 CD and DVD Drives: /dev/sr*; 3.4.3 PATA Hard Disks: /dev/hd*; 3.4.4 Terminals: /dev/tty*, /dev/pts/*, /dev/tty; 3.4.5 Serial Ports: /dev/ttyS*…”
    Libro electrónico
  3. 1863
    Publicado 2015
    Tabla de Contenidos: “…-- Confidentiality breach -- Availability breach -- Integrity breach -- Impact -- Source -- External vs. internal -- Unintentional vs. intentional -- Manual vs. automatic -- Human vs. nature -- General treatment options -- Chapter 4: General Avoidance and Mitigation Strategies -- Introduction - general aspects, avoidance and related ISO27001 controls -- People -- A.7.1.1 - Screening -- Methods of screening -- A.7.1.2 - Terms and conditions of employment -- A.7.2.1 - Management responsibilities -- A.7.2.2 - Information security awareness, education and training -- A.7.2.3 - Disciplinary process -- A.7.3.1 - Termination or change of employment -- A.8.1.4 - Return of assets -- A.9.2.6 - Removal or adjustment of access rights -- Processes -- Technology -- ISO27001 Controls helpful for treatment of breaches -- A.6.1.3 - Contact with authorities -- A.7.2.2 - Information security awareness, education and training -- A.7.2.3 - Disciplinary process A.8.1.4 - Return of assets A.9.2.6 - Removal or adjustment of access rights -- A.12.2.1 - Controls against malware -- A.12.4.1 - Event logging and -- A.12.4.2 - Protection of log information…”
    Libro electrónico
  4. 1864
    por Barrett, Daniel J.
    Publicado 2005
    Tabla de Contenidos: “…1.4.4 Keys and Agents1.4.5 Access Control; 1.4.6 Port Forwarding; 1.5 History of SSH; 1.6 Related Technologies; 1.6.1 rsh Suite (r-Commands); 1.6.2 Pretty Good Privacy (PGP) and GNU Privacy Guard (GnuPG); 1.6.3 Kerberos; 1.6.4 IPSEC and Virtual Private Networks; 1.6.5 Secure Remote Password (SRP); 1.6.6 Secure Socket Layer (SSL) Protocol; 1.6.7 SSL-Enhanced Telnet and FTP; 1.6.8 stunnel; 1.6.9 Firewalls; 1.7 Summary; Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.2.1 File Transfer with scp; 2.3 Adding Complexity to the Example; 2.3.1 Known Hosts…”
    Libro electrónico
  5. 1865
    por Wessels, Duane
    Publicado 2004
    Tabla de Contenidos: “…Initializing Cache Directories5.4. Testing Squid in a Terminal Window; 5.5. Running Squid as a Daemon Process; 5.6. …”
    Libro electrónico
  6. 1866
    Publicado 2003
    Tabla de Contenidos: “…DFSMStvs experiences -- 8.1 Console log during normal start -- 8.2 Exceptions -- 8.2.1 Committing without DFSMStvs -- 8.2.2 DFSMStvs server not registered to RRS -- 8.2.3 Reestablish connection between SMSVSAM and RRS -- 8.3 Monitoring DFSMStvs -- 8.3.1 SMSVSAM server connected or not connected to RRS -- 8.3.2 Display jobs using DFSMStvs -- 8.3.3 Display a specific cluster and its users -- 8.3.4 Coupling facility structure utilization -- 8.3.5 VSAM RLS central locking structure full -- 8.3.6 Display forward recovery log data sets -- 8.3.7 RRS failure terminating DFSMStvs -- 8.3.8 Coupling Facility lock structure -- 8.4 IDCAMS SHCDS examples -- 8.4.1 Data set list -- 8.4.2 Subsystem summary -- 8.4.3 Data sets by subsystem -- Appendix A. …”
    Libro electrónico
  7. 1867
    por Toutain, Laurent
    Publicado 2011
    Tabla de Contenidos: “…Implementation of the TCP/IP protocols; 7.1.1. Terminal equipment…”
    Libro electrónico
  8. 1868
    por Albrecht, Karl, 1941-
    Publicado 2007
    Tabla de Contenidos: “…Accidental Intelligence:The Terminal Assumption. The Widening "Smart Gap". The Dumbing of America and the Culture of Amusement. …”
    Libro electrónico
  9. 1869
    Publicado 2013
    Tabla de Contenidos: “…5 Evolution of Mobile Devices and Operating Systems 241 -- 5.1 Introduction 241 -- 5.2 The System Architecture for Voice-Optimized Devices 246 -- 5.3 The System Architecture for Multimedia Devices 248 -- 5.4 Mobile Graphics Acceleration 253 -- 5.5 Hardware Evolution 256 -- 5.6 Multimode, Multifrequency Terminals 273 -- 5.7 Wireless Notebook Connectivity 276 -- 5.8 Impact of Hardware Evolution on Future Data Traffic 277 -- 5.9 Power Consumption and User Interface as the Dividing Line in Mobile Device Evolution 279 -- 5.10 Feature Phone Operating Systems 280 -- 5.11 Smartphone Operating Systems 282 -- 5.12 Operating System Tasks 288 -- 6 Mobile Web 2.0, Apps, and Owners 297 -- 6.1 Overview 297 -- 6.2 (Mobile) Web 1.0 - How Everything Started 298 -- 6.3 Web 2.0 - Empowering the User 299 -- 6.4 Web 2.0 from the User's Point of View 299 -- 6.5 The Ideas behind Web 2.0 306 -- 6.6 Discovering the Fabrics of Web 2.0 310 -- 6.7 Mobile Web 2.0 - Evolution and Revolution of Web 2.0 321 -- 6.8 (Mobile) Web 2.0 and Privacy and Security Considerations 334 -- 6.9 Mobile Apps 340 -- 6.10 Android App Programing Introduction 342 -- 6.11 Impact of Mobile Apps on Networks and Power Consumption 349 -- 6.12 Mobile Apps Security and Privacy Considerations 351 -- 6.13 Summary 354 -- 7 Conclusion 357 -- Index 361.…”
    Libro electrónico
  10. 1870
    Publicado 2024
    Tabla de Contenidos: “…Fetching, pulling, and pushing Git repositories -- Fetching repositories -- Pulling repositories -- Pushing to repositories -- Managing branches -- Viewing changes in repositories -- Linking GitHub issues -- Summary -- Chapter 10: Sharing Code with Live Share -- Technical requirements -- Understanding Live Share -- Using Live Share -- Performing live editing -- Sharing a terminal with other collaborators -- Summary -- Chapter 11: Working with Extensions in Visual Studio -- Technical requirements -- Working with the Extensions tool -- Searching for and installing extensions -- Reviewing VS Marketplace -- Setting up extensions -- Creating a simple VS 2022 extension -- Summary -- Chapter 12: Using Popular Extensions -- Technical requirements -- Using HTML Snippet Pack -- Cleaning up code with CodeMaid -- Compiling web libraries with Web Compiler -- Identifying white spaces with Indent Guides -- Optimizing images with Image Optimizer -- Highlighting messages in the Output window with VSColorOutput64 -- Managing .resx files easily with ResXManager -- Summary -- Chapter 13: Learning Keyboard Shortcuts -- Technical requirements -- Shortcuts for use in source code -- Shortcuts for searching and navigating source code -- Shortcuts for editing and refactoring -- Shortcuts for debugging and testing -- The most common shortcuts for use in the IDE -- Creating custom shortcuts -- Farewell -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  11. 1871
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1:Getting Started with OpenAI APIs -- Chapter 1: Beginning with the ChatGPT API for NLP Tasks -- Technical Requirements -- The ChatGPT Revolution -- Using ChatGPT from the Web -- Creating an OpenAI Account -- ChatGPT Web Interface -- Getting Started with the ChatGPT API -- Obtaining an API Key -- API Tokens and Pricing -- Setting Up Your Python Development Environment -- Installing Python and the PyCharm IDE -- Setting Up a Python Virtual Environment -- The pip Package Installer -- Building a Python Virtual Environment from the Terminal -- A Simple ChatGPT API Response -- Summary -- Chapter 2: Building a ChatGPT Clone -- Technical Requirements -- Creating a ChatGPT Clone with Flask -- Frontend HTML Generation -- Enhancing the ChatGPT Clone Design -- Intercepting ChatGPT API Endpoints -- Summary -- Part 2: Building Web Applications with the ChatGPT API -- Chapter 3: Creating and Deploying an AI Code Bug Fixing SaaS Application Using Flask -- Technical Requirements -- Performing Multiple ChatGPT API Requests -- Setting Up the Code Bug Fixer Project -- Implementing the Code Bug Fixer Backend -- Using Text Areas and Containers -- Testing the Code Bug Fixer App -- Deploying the ChatGPT App to the Azure Cloud -- Summary -- Chapter 4: Integrating the Code Bug Fixer Application with a Payment Service -- Technical Requirements -- Integrating Payments with Stripe -- Setting Up a SQL User Database -- Initializing a SQL Database -- Getting a Browser Fingerprint ID -- Tracking Application Users -- Implementing the Usage Counters -- Adding Payments to a ChatGPT Application -- Building the Payments Page -- Confirming User Payments -- Summary -- Chapter 5: Quiz Generation App with ChatGPT and Django -- Technical Requirements -- Building a Django Project…”
    Libro electrónico
  12. 1872
    Publicado 2022
    Tabla de Contenidos: “…Database links between autonomous databases -- Summary -- Questions -- Further reading -- Answers -- Chapter 6: Managing Autonomous Databases -- Technical requirements -- Autonomous database actions -- Starting or stopping an autonomous database -- Autonomous database connection -- Performance Hub -- ASH Analytics -- SQL monitoring -- Workload -- Blocking Sessions -- Scale Up/Down -- Cloning -- Updated Network Access -- Access control list -- Administrator password -- Updating the license type -- Renaming a database -- Move Resource -- The service console -- Changing the workload type -- Enabling Operations Insights -- Terminate -- Registering autonomous databases with Oracle Data Safe -- Security Assessment -- Summary -- Part 3 - Security and Compliance with Autonomous Database -- Chapter 7: Security Features in Autonomous Database -- Operating system access restriction -- Dedicated ADMIN users for the database -- Private endpoint -- NSG -- Data Safe -- Security Assessment -- User Assessment -- Data Discovery -- Data Masking -- Activity Auditing -- Data encryption -- Encryption of data at rest -- Encryption of data in transit -- Database backup encryption -- Access control lists -- SQL*Net Connection -- SQL command restrictions -- Automatic security patch update -- Summary -- FAQs -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  13. 1873
    Publicado 2013
    Tabla de Contenidos: “…Conté "Símbolos cívicos": Oficinas para la Junta de Castilla y León en Zamora / Alberto Campo Baeza, Pablo Fernández Lorenzo, Pablo Redondo Díez, Alfonso González Gaisán y Francisco Blanco Velasco ; El "B", Auditorio y Centro de Congresos de Cartagena / Selgascano arquitectos ; Escuela infantil en Pamplona / Carlos Pereda y Óscar Pérez, Pereda Pérez arquitectos ; Concello de Lalín / Emilio Tuñón Álvarez y Luis Moreno García-Mansilla ; Centro de ocio de Azuqueca de Henares / Ábalos+Sentkiewicz Arquitectos ; Terminal de pasajeros, Aeropuerto Internacional Región de Murica / Josep Maria Casadevall, Carlos Ferrater, Ramón Sanabria, Dolors Sayeras ; Instituto Cartuja de Técnicas Avanzadas en Medicina, Sevilla / José Morales - Sara de Giles ; Edificio de servicios Plaza Mayor UAM / MTM Arquitectos (Javier Fresneda & Javier Sanjuan) ; MUCA, Casa de la Música y Auditorio en Algueña / Jesús Olivares Casado y Miguel Rodenas Mussons (COR Asociados) --- URV…”
    Libro
  14. 1874
    Publicado 2014
    Tabla de Contenidos: “…6 PUESTA EN MARCHA DEL SISTEMA -- 6.1 ADMINISTRACIÓN DE USUARIOS -- 6.1.1 Usuarios -- 6.1.2 El administrador de usuarios -- 6.1.3 Directivas de seguridad local -- 6.2 SISTEMA DE FICHEROS -- 6.2.1 Administrador de discos -- 6.2.2 Cuotas de disco -- 6.3 PERMISOS -- 7 ADMINISTRACIÓN BÁSICA DEL SISTEMA -- 7.1 ARRANQUE Y PARADA -- 7.1.1 Configuración del gestor de arranque del SO -- 7.1.2 Servicios del sistema -- 7.1.3 Procesos -- 7.1.4 Programación de tareas -- 7.1.5 Proceso de parada del sistema -- 7.2 MONITORIZACIÓN DEL SISTEMA -- 7.2.1 Monitor de confiabilidad y rendimiento -- 7.2.2 Visor de eventos -- 7.3 COPIAS DE SEGURIDAD -- 7.3.1 Realizar una copia de seguridad -- 7.3.2 Recuperar una copia de seguridad -- 7.3.3 Configurar opciones de rendimiento -- 8 ADMINISTRACIÓN DE LA RED -- 8.1 ESQUEMA BÁSICO DE RED -- 8.1.1 Configuración de la red -- 8.1.2 Enrutamiento -- 8.1.3 Firewall de Windows -- 8.1.4 DHCP -- 8.1.5 DNS -- 8.2 TERMINAL SERVER -- 8.2.1 Escritorio remoto -- 8.2.2 Servidor de aplicaciones -- 8.2.3 Cliente de Terminal Server -- 8.3 WINDOWS SERVER UPDATE SERVICES -- 8.3.1 Instalación -- 8.3.2 Cliente -- 8.3.3 Administración -- 9 SERVIDORES DE IMPRESIÓN Y DE ARCHIVOS -- 9.1 COMPARTIR ARCHIVOS E IMPRESORAS -- 9.1.1 Compartir una carpeta -- 9.1.2 Acceso a un recurso compartido -- 9.1.3 Administrar recursos compartidos -- 9.1.4 Instantáneas -- 9.1.5 Sistemas de archivos distribuidos -- 9.2 SERVIDORES DE IMPRESIÓN -- 9.2.1 Compartir impresora -- 9.2.2 Servidor de impresión y documentos -- 9.2.3 Cliente -- 10 SERVICIOS DE INTERNET -- 10.1 SERVIDOR WEB -- 10.1.1 Instalación -- 10.1.2 Administración -- 10.1.3 Creación de un nuevo sito web -- 10.1.4 Creación de un directorio virtual -- 10.1.5 Extensiones de servicio web -- 10.1.6 Seguridad -- 10.2 SERVIDOR FTP -- 10.2.1 Instalación -- 10.2.2 Creación de un nuevo sitio FTP…”
    Enlace del recurso
    Libro electrónico
  15. 1875
    Publicado 2021
    Tabla de Contenidos: “…10.6 Division of Charitable Remainder Trusts -- 10.7 Basis in Disposition of Term Interest -- 10.8 Taxation of Charitable Remainder Trusts -- 10.9 Mandatory Provisions -- 10.10 Private Foundation Law -- 10.11 University Endowment Investment Sharing -- 10.12 Charitable Remainder Trusts as Partners or Shareholders in REITs -- 10.13 Wealth Replacement Trusts -- 10.14 Calculation of Charitable Contribution Deduction -- 10.15 Merger of Charitable Remainder Trusts -- 10.16 Early Terminations of Charitable Remainder Trusts -- 10.17 Regular Termination of Charitable Remainder Trusts -- Chapter 11 Pooled Income Funds -- 11.1 Definitions -- 11.2 Qualifying Pooled Income Funds -- 11.3 Allocation of Income -- 11.4 Recognition of Gain or Loss on Transfers -- 11.5 Mandatory Provisions -- 11.6 Private Foundation Law -- 11.7 Pass‐Through of Depreciation -- 11.8 Tax Status of Funds and Beneficiaries -- 11.9 Multiorganization Pooled Income Funds -- 11.10 Comparison with Charitable Remainder Trusts -- 11.11 Charitable Contribution Deduction -- Chapter 12 Charitable Gift Annuities -- 12.1 Contract as Vehicle Form -- 12.2 Tax Treatment to Donor -- 12.3 Deferred Payment Gift Annuities -- 12.4 Estate and Gift Tax Consequences -- 12.5 Unrelated Business Income Implications -- 12.6 Unrelated Debt‐Financed Income Implications -- 12.7 Contrast with Other Planned Gift Methods -- 12.8 Antitrust Laws -- 12.9 Securities Laws -- 12.10 Charitable Contribution Deduction -- Chapter 13 Other Types of Deductible Remainder Interests -- 13.1 Overview of Law -- 13.2 Qualifying Partial Interests -- 13.3 Remainder Interests in Personal Residences or Farms -- 13.4 Undivided Portions of Entire Interests in Property -- Chapter 14 Charitable Lead Trusts -- 14.1 Overview of Law -- 14.2 Income Interests…”
    Libro electrónico
  16. 1876
    Publicado 2012
    Tabla de Contenidos: “…Initial Phase -- 8.1.3. Terminal Phase -- 8.2. Group Cohesiveness -- 8.3. Group Size and Composition -- 8.4. …”
    Libro electrónico
  17. 1877
    por Stapleton, Jeff
    Publicado 2024
    Tabla de Contenidos: “…4.3.4 RFC 3647 Identification and Authentication for Revocation Requests -- 4.4 RFC 2527 Certificate Lifecycle Operational Requirements -- 4.4.1 RFC 3647 Certificate Application -- 4.4.2 RFC 3647 Certificate Application Processing -- 4.4.3 RFC 3647 Certificate Issuance -- 4.4.4 RFC 3647 Certificate Acceptance -- 4.4.5 RFC 3647 Key Pair and Certificate Usage -- 4.4.6 RFC 3647 Certificate Renewal -- 4.4.7 RFC 3647 Certificate Rekey -- 4.4.8 RFC 3647 Certificate Modification -- 4.4.9 RFC 3647 Certificate Revocation and Suspension -- 4.4.10 RFC 3647 Certificate Status Services -- 4.4.11 RFC 3647 End of Subscription -- 4.4.12 RFC 3647 Key Escrow and Recovery -- 4.5 RFC 3647 Facility, Management, and Operational and Physical Controls -- 4.5.1 RFC 3647 Physical Security Controls -- 4.5.2 RFC 3647 Procedural Controls -- 4.5.3 RFC 3647 5.3 Personnel Security Controls -- 4.5.4 RFC 3647 Audit Logging Procedures -- 4.5.5 RFC 3647 Records Archival -- 4.5.6 RFC 3647 Key Changeover -- 4.5.7 RFC 3647 Compromise and Disaster Recovery -- 4.5.8 RFC 3647 CA or RA Termination -- 4.6 RFC 2527 Technical Security Controls -- 4.6.1 RFC 3647 Key Pair Generation and Installation -- 4.6.2 RFC 3647 Private Key Protection and Cryptographic Module Controls -- 4.6.3 RFC 3647 Other Aspects of Key Pair Management -- 4.6.4 RFC 3647 Activation Data -- 4.6.5 RFC 3647 Computer Security Controls -- 4.6.6 RFC 3647 Life Cycle Security Controls -- 4.6.7 RFC 3647 Network Security Controls -- 4.6.8 RFC 3647 Time Stamping -- 4.7 RFC 2527 Certificate, CRL, and OCSP Profiles -- 4.7.1 RFC 3647 Certificate Profile -- 4.7.2 RFC 3647 CRL Profile -- 4.7.3 RFC 3647 OCSP Profile -- 4.7.4 Other PKI-Related Profiles -- 4.8 RFC 2527 Compliance Audits and Other Assessments -- 4.8.1 RFC 3647 Frequency or Circumstances -- 4.8.2 RFC 3647 Identity/Qualifications of Assessor…”
    Libro electrónico
  18. 1878
    Publicado 2014
    Tabla de Contenidos: “…Modificaciones vinculadas al aspecto externo -- Modificaciones en las estructuras químicas -- 7 LOS TIPOS DE COCCIÓN -- CLASIFICACIÓN DE LAS COCCIONES SEGÚN EL MEDIO DE TRANSFERENCIA DE CALOR -- COCCIONES EN MEDIO NO LÍQUIDO -- GENERALIDADES, TIPOS Y DESCRIPCIÓN -- EQUIPOS Y CONDICIONES DE TRABAJO -- EFECTOS SOBRE LOS ALIMENTOS -- APLICACIONES CULINARIAS -- COCCIONES EN MEDIO GRASO -- GENERALIDADES, TIPOS Y DESCRIPCIÓN -- EQUIPOS Y CONDICIONES DE TRABAJO -- PROPIEDADES DE LAS GRASAS DE FRITURA -- EFECTOS SOBRE LOS ALIMENTOS -- APLICACIONES CULINARIAS -- COCCIONES EN MEDIO ACUOSO -- GENERALIDADES, TIPOS Y DESCRIPCIÓN -- EQUIPOS Y CONDICIONES DE TRABAJO -- EFECTOS SOBRE LOS ALIMENTOS -- APLICACIONES CULINARIAS -- COCCIONES MIXTAS -- GENERALIDADES, TIPOS Y DESCRIPCIÓN -- CONSIDERACIONES ESPECÍFICAS SOBRE ESTOFADOS A PARTIR DE INGREDIENTES CRUDOS -- CONSIDERACIONES ESPECÍFICAS SOBRE ESTOFADOS EN SU JUGO -- CONSIDERACIONES ESPECÍFICAS SOBRE BRASEADOS -- CONSIDERACIONES ESPECÍFICAS SOBRE GUISADOS -- COCCIONES ESPECIALES -- TIPOS DE COCCIONES ESPECIALES -- CONSIDERACIONES ESPECÍFICAS DE LA COCCIÓN A VACÍO -- CONSIDERACIONES ESPECÍFICAS SOBRE LAS COCCIONES CON MICROONDAS -- 8 LA RESTAURACIÓN DIFERIDA: SISTEMAS Y APLICACIONES -- CONCEPTO Y DESARROLLO DE LA RESTAURACIÓN DIFERIDA -- SISTEMA DE CONSERVACIÓN EN CALIENTE -- SISTEMA DE CONSERVACIÓN BAJO REFRIGERACIÓN -- SISTEMA DE CONSERVACIÓN BAJO ULTRACONGELACIÓN -- ACONDICIONAMIENTO DEL PLATO COCINADO EN LA COCINA TERMINAL -- LOS SERVICIOS DE OFERTA EN LA RESTAURACIÓN DIFERIDA -- PARTE TERCERA LA CALIDAD EN TECNOLOGÍA CULINARIA -- 9 TIPOS DE CALIDAD Y CRITERIOS EN TECNOLOGÍA CULINARIA -- LA CALIDAD EN LOS PLATOS COCINADOS -- ASPECTOS NUTRITIVOS DE LA CALIDAD -- ASPECTOS SENSORIALES DE LA CALIDAD -- ASPECTOS HIGIÉNICO-SANITARIOS DE LA CALIDAD -- ASPECTOS INTEGRADOS DE LA CALIDAD…”
    Libro electrónico
  19. 1879
    Publicado 2020
    Tabla de Contenidos: “…NUEVO PUERTO MARÍTIMO -- C. TERMINAL AEROPORTUARIA -- D. NUEVO SISTEMA DE PROVISIÓN DE AGUA POTABLE -- E. …”
    Libro electrónico
  20. 1880
    Publicado 2018
    Tabla de Contenidos: “…. -- Infinite iterators -- Combinatoric iterators -- Terminating iterators -- Using generator functions -- How to do it... -- How it works... -- There's more... -- Simulating multithreading with coroutines -- How to do it... -- There's more... -- When to use parallel processing -- How to do it... -- There's more... -- Forking processes -- How to do it... -- How it works... -- There's more... -- How to implement multithreading -- How to do it... -- There's more... -- Advantages -- Disadvantages -- How to implement multiprocessing -- How to do it... -- There's more... -- Chapter 6: Working with Python's Math Module -- Using the math module's functions and constants -- How to do it... -- Working with complex numbers -- How to do it... -- Improving decimal numbers -- How to do it... -- Increasing accuracy with fractions -- How to do it... -- Working with random numbers -- How to do it... -- Using the secrets module -- How to do it... -- Implementing basic statistics -- How to do it... -- Improving functionality with comath -- Getting ready -- How to do it... -- Chapter 7: Improving Python Performance with PyPy -- Introduction -- What is PyPy? …”
    Libro electrónico