Mostrando 5,061 - 5,080 Resultados de 5,616 Para Buscar '"hardware"', tiempo de consulta: 0.14s Limitar resultados
  1. 5061
    por Lewis, Ted G.
    Publicado 2023
    Tabla de Contenidos: “…9.2.9 Hacking the DNS -- 9.2.10 Hardware Flaws -- 9.2.11 Botnets -- 9.3 Cyber Risk Analysis -- 9.3.1 Kill Chain Approach -- 9.3.2 Machine-learning Approach -- 9.4 Analysis -- 9.5 Discussion -- References -- Chapter 10 Social Hacking -- 10.1 Web 2.0 and the Social Network -- 10.2 Social Networks Amplify Memes -- 10.3 Topology Matters -- 10.4 Computational Propaganda -- 10.5 Beware the Echo Chamber -- 10.6 Big Data Analytics -- 10.6.1 Algorithmic Bias -- 10.6.2 The Depths of Deep Learning -- 10.6.3 Data Brokers -- 10.7 GDPR -- 10.8 Social Network Resilience -- 10.9 The Sustainable Web -- 10.9.1 The Century of Regulation -- 10.9.2 The NetzDG -- 10.10 Discussion -- References -- Chapter 11 Banking and Finance -- CHAPTER MENU -- 11.1 The Financial System -- 11.1.1 Federal Reserve Versus US Treasury -- 11.1.2 Operating the System -- 11.1.3 Balancing the Balance Sheet -- 11.1.4 Paradox of Enrichment -- 11.2 Financial Networks -- 11.2.1 FedWire -- 11.2.2 TARGET -- 11.2.3 SWIFT -- 11.2.4 Credit Card Networks -- 11.2.5 3-D Secure Payment -- 11.3 Virtual Currency -- 11.3.1 Intermediary PayPal -- 11.3.2 ApplePay -- 11.3.3 Cryptocurrency -- 11.3.3.1 Nakamoto's Revenge -- 11.3.3.2 Double Spend Problem -- 11.3.3.3 Crypto Challenges -- 11.4 Hacking a Financial Network -- 11.5 Hot Money -- 11.5.1 Liquidity Traps -- 11.5.2 The Dutch Disease -- 11.6 The End of Stimulus? …”
    Libro electrónico
  2. 5062
    Publicado 2023
    “…Features: Focusses on important perspectives of the Internet of Drones (IoD) Emphasizes drone deployment in smart cities, smart agriculture, smart healthcare, and 3D mapping Covers challenges in drone design for applications with security and privacy issues Reviews diversified drone applications with real-use cases from modern drone players ranging from startup companies to big giants in the drone industry Includes different aspects of drone design such as hardware and software architecture, potential applications, and opportunities This book is aimed at researchers and professionals in computer sciences, electronics & communication engineering, and aeronautical engineering"--…”
    Libro electrónico
  3. 5063
    por Weigend, Michael
    Publicado 2024
    “…Nach dem Erlernen der Programmierkonzepte finden Sie besonders in der zweiten Hälfte des Buches eine Fülle von kleinen Projekten, die auf die besondere Hardware des Raspberry Pi und das Linux-Betriebssystem Raspberry Pi OS zugeschnitten sind. …”
    Libro electrónico
  4. 5064
    Publicado 2018
    Tabla de Contenidos: “…-- Maltego for network data gathering -- Step 1 - opening Maltego -- Step 2 - choosing a machine -- Step 3 - choosing a target -- Step 4 - results -- Using Maltego to collect data on an individual -- Step 1 - selecting the machine -- Step 2 - specifying a target -- Step 3 - results -- Google -- Hacking personal information -- Hacking servers -- Apache servers -- Microsoft servers -- Oracle servers -- IBM servers -- Netscape servers -- Red Hat servers -- System reports -- Error message queries -- Social engineer toolkit (SET) -- Spear phishing -- Web attack vector -- Infectious media generator -- SMS spoofing attack vector -- Wireless access point attack vector -- QRCode attack vector -- Third-party modules - fast track exploitation -- Create a payload and listener -- Mass mailer attack -- Phone tools -- Caller ID spoofing -- Scripts -- The way back machine -- Spokeo -- Metagoofil -- Fingerprinting Organizations with Collected Archives (FOCA) -- The credential harvester attack method -- Social engineering exercise -- Phishing with BeEF -- Zabasearch.com -- Job postings -- Shodan.io -- Default passwords -- Hardware keyloggers -- Toll-free number providers -- Netcraft website -- Netcraft toolbar -- Microsoft Edge SmartScreen -- Windows Defender application guard -- SmartScreen filter -- Windows Defender network protection -- Highly recommended -- Ask the experts -- Tips -- Summary -- Chapter 9: Prevention and Mitigation -- Learning to identify social engineering attacks…”
    Libro electrónico
  5. 5065
    Publicado 2018
    Tabla de Contenidos: “…Encrypt then sign -- Elliptic Curve Digital Signature Algorithm -- How to generate a digital signature using OpenSSL -- ECDSA using OpenSSL -- Homomorphic encryption -- Signcryption -- Zero-Knowledge Proofs -- Blind signatures -- Encoding schemes -- Financial markets and trading -- Trading -- Exchanges -- Orders and order properties -- Order management and routing systems -- Components of a trade -- The underlying instrument -- General attributes -- Economics -- Sales -- Counterparty -- Trade life cycle -- Order anticipators -- Market manipulation -- Summary -- Chapter 5: Introducing Bitcoin -- Bitcoin -- Bitcoin definition -- Bitcoin - a bird's-eye view -- Sending a payment to someone -- Digital keys and addresses -- Private keys in Bitcoin -- Public keys in Bitcoin -- Addresses in Bitcoin -- Base58Check encoding -- Vanity addresses -- Multisignature addresses -- Transactions -- The transaction life cycle -- Transaction fee -- Transaction pools -- The transaction data structure -- Metadata -- Inputs -- Outputs -- Verification -- The script language -- Commonly used opcodes -- Types of transactions -- Coinbase transactions -- Contracts -- Transaction veri cation -- Transaction malleability -- Blockchain -- The structure of a block -- The structure of a block header -- The genesis block -- Mining -- Tasks of the miners -- Mining rewards -- Proof of Work (PoW) -- The mining algorithm -- The hash rate -- Mining systems -- CPU -- GPU -- FPGA -- ASICs -- Mining pools -- Summary -- Chapter 6: Bitcoin Network and Payments -- The Bitcoin network -- Wallets -- Non-deterministic wallets -- Deterministic wallets -- Hierarchical Deterministic wallets -- Brain wallets -- Paper wallets -- Hardware wallets -- Online wallets -- Mobile wallets -- Bitcoin payments -- Innovation in Bitcoin -- Bitcoin Improvement Proposals (BIPs) -- Advanced protocols…”
    Libro electrónico
  6. 5066
    Publicado 2016
    Tabla de Contenidos: “…14.1 Processor Organization -- 14.2 Register Organization -- 14.3 Instruction Cycle -- 14.4 Instruction Pipelining -- 14.5 The x86 Processor Family -- 14.6 The ARM Processor -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Reduced Instruction Set Computers -- 15.1 Instruction Execution Characteristics -- 15.2 The Use of a Large Register File -- 15.3 Compiler-Based Register Optimization -- 15.4 Reduced Instruction Set Architecture -- 15.5 RISC Pipelining -- 15.6 MIPS R4000 -- 15.7 SPARC -- 15.8 RISC versus CISC Controversy -- 15.9 Key Terms, Review Questions, and Problems -- Chapter 16 Instruction-Level Parallelism and Superscalar Processors -- 16.1 Overview -- 16.2 Design Issues -- 16.3 Intel Core Microarchitecture -- 16.4 ARM Cortex-A8 -- 16.5 ARM Cortex-M3 -- 16.6 Key Terms, Review Questions, and Problems -- Part Five Parallel Organization -- Chapter 17 Parallel Processing -- 17.1 Multiple Processor Organizations -- 17.2 Symmetric Multiprocessors -- 17.3 Cache Coherence and the MESI Protocol -- 17.4 Multithreading and Chip Multiprocessors -- 17.5 Clusters -- 17.6 Nonuniform Memory Access -- 17.7 Cloud Computing -- 17.8 Key Terms, Review Questions, and Problems -- Chapter 18 Multicore Computers -- 18.1 Hardware Performance Issues -- 18.2 Software Performance Issues -- 18.3 Multicore Organization -- 18.4 Heterogeneous Multicore Organization -- 18.5 Intel Core i7-990X -- 18.6 ARM Cortex-A15 MPCore -- 18.7 IBM zEnterprise EC12 Mainframe -- 18.8 Key Terms, Review Questions, and Problems -- Chapter 19 General-Purpose Graphic Processing Units -- 19.1 Cuda Basics -- 19.2 GPU versus CPU -- 19.3 GPU Architecture Overview -- 19.4 Intel's Gen8 GPU -- 19.5 When to Use a GPU as a Coprocessor -- 19.6 Key Terms and Review Questions -- Part Six T he Control Unit -- Chapter 20 Control Unit Operation -- 20.1 Micro-Operations…”
    Libro electrónico
  7. 5067
    Publicado 2021
    Tabla de Contenidos: “…-- Free IDS/IPS -- IPS versus IDS -- Summary -- Chapter 9: Deep Diving into Physical Security -- Technical requirements -- Understanding physical security and associated threats -- The powerful LAN Turtle -- The stealthy Plunder Bug LAN Tap -- The dangerous Packet Squirrel -- The portable Shark Jack -- The amazing Screen Crab -- The advanced Key Croc -- USB threats -- Equipment theft -- Environmental risks -- Physical security mechanisms -- Mastering physical security -- Clean desk policy -- Physical security audits -- Summary -- Further reading -- Chapter 10: Applying IoT Security -- Understanding the Internet of Things -- The risks -- The vulnerabilities -- Understanding IoT networking technologies -- LoRaWAN -- Zigbee -- Sigfox -- Bluetooth -- Security considerations -- Improving IoT security -- Creating cybersecurity hardware using IoT-enabled devices -- Raspberry Pi firewall and intrusion detection system -- Defensive security systems for industrial control systems (SCADA) -- Secure USB-to-USB copy machine -- Creating a 10 honeypot -- Advanced monitoring of web apps and networks -- Creating an internet ad blocker -- Access control and physical security systems -- Bonus track - Understanding the danger of unauthorized IoT devices -- Detecting unauthorized IoT devices -- Detecting a Raspberry Pi -- Disabling rogue Raspberry Pi devices -- Summary -- Further reading -- Chapter 11: Secure Development and Deployment on the Cloud -- Technical requirements -- Secure deployment and implementation of cloud applications…”
    Libro electrónico
  8. 5068
    por Clarke, Glen E.
    Publicado 2012
    Tabla de Contenidos: “…Circuit-Switching Networks -- Asynchronous Transfer Mode -- Synchronous Optical Network/Synchronous Digital Hierarchy -- Optical Carrier Level-X -- X.25 and Frame Relay -- Fiber Distributed Data Interface (FDDI) -- Tx/Ex-Carriers -- Internet Access Technologies -- Certification Summary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 12: Implementing a Network -- Installing a Network -- Exercise 12-1 Confirming Networking Components in Windows -- Creating User Accounts -- Exercise 12-2 Creating Users in Active Directory -- Exercise 12-3 Configuring a Password Policy -- Managing Groups -- Exercise 12-4 Creating Groups in Active Directory -- Securing Files and Folders -- Exercise 12-5 Configuring Permissions in Windows 2003 -- Installing Printers -- Exercise 12-6 Installing a Printer on Windows Server 2003 -- Working with Network Hardware -- Certification Summary -- Two-Minute Drill -- Self Test…”
    Libro electrónico
  9. 5069
    Publicado 2023
    Tabla de Contenidos: “…Validating the value of the solution -- Taking your audience into consideration -- Setting Your Solution Up For Success: Getting Clear Objectives -- Eliciting and articulating clear objectives -- Getting clear with SMART objectives -- Part 3 Selling the Plan and Keeping It on Track -- Chapter 9 Making the (Business) Case -- Before You Dive In: Breaking Down Business Case Basics -- Looking at the benefits of writing a business case -- Playing to the crowd: Knowing your audience -- Following basic business case structure -- Defining and Presenting the Opportunity -- Executive summary -- Mission statement -- Setting SMART objectives -- Using key performance indicators -- Description of the approach used -- Justifying the Recommendation -- Identifying and prioritizing alternative solutions -- Including a cost/benefit analysis -- Understanding financial terminology and metrics -- Estimating techniques -- Quantifying ongoing/operating costs and benefits -- Quantifying implementation costs -- The Devil Is in the Details: Providing Supporting Materials -- Addressing supporting documentation -- Noting your assumptions -- Documenting risk -- Presenting the Business Case -- Chapter 10 Creating and Maintaining Scope -- Making Sure You're Scoping the Right Solution -- Recognizing Relevant Stakeholders -- Uncovering stakeholders by asking project-specific questions -- Discovering key stakeholders in different parts of the organization -- Ensuring that the Scope Aligns with Key Business Drivers -- Identifying Interfaces that Are Part of the Project -- User interfaces -- System interfaces -- Hardware interfaces -- Defining Scope with a Data Flow Diagram -- Identifying parties and systems that will be impacted by the project -- Identifying information (data) flows among the parties or systems -- Gaining consensus on the scope for the project…”
    Libro electrónico
  10. 5070
    Publicado 2017
    Tabla de Contenidos: “…-- Installing the Hyper-V Role -- Configuring Virtual Machines -- Activating Machines in the Enterprise -- Networking Basics -- Active Directory-Based Activation -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 3 Configuring Devices and Drivers -- Configuring Hardware -- Understanding Device Stage -- Using Device Manager -- Installing and Updating Device Drivers -- Driver Signing -- Managing I/O Devices -- Configuring Removable Storage Devices -- Managing Printers -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 4 Configuring Storage -- Understanding File Systems…”
    Libro electrónico
  11. 5071
    Publicado 2018
    Tabla de Contenidos: “…-- State -- Execution duration -- Understanding cold start -- API gateway -- The benefits of serverless computing -- Reduced operational cost -- Rapid development -- Scaling costs -- Easier operational management -- Easier packaging and deployment -- Time to market -- What serverless computing is not -- Comparison with PaaS -- Comparison with containers -- #NoOps -- Limits to serverless computing -- Infrastructure control -- Long running application -- Vendor lock-in -- Cold start -- Shared infrastructure -- Server optimization is a thing of the past -- Security concerns -- Deployment of multiple functions -- Limited number of testing tools -- Summary -- Chapter 2: Development Environment, Tools, and SDKs -- Development environment and tools -- Visual Studio Code -- Setting up Visual Studio Code -- Hardware -- Platforms -- Additional Windows requirements -- Additional Linux requirements -- Installing on macOS -- Launching VS Code from the Command Line -- Manually adding Visual Studio Code to your path -- Touch Bar support -- Installing on Linux -- Debian and Ubuntu-based distributions -- RHEL, Fedora, and CentOS-based distributions -- openSUSE and SLE-based distributions -- AUR package for Arch Linux -- Nix package for NixOS (or any Linux distribution using Nix package manager) -- Installing the .rpm package manually -- Installing on Windows -- Icons are missing -- Why are some icons not appearing in the workbench and editor? …”
    Libro electrónico
  12. 5072
    Publicado 2010
    Tabla de Contenidos: “…-- Documentation Plans -- Documentation Set Plan -- Document Plan -- Abstracts -- Structure of Manuals -- Manuals With a Single Chapter -- Manuals With Multiple Chapters -- Descriptions of the Manual Parts -- Title Page -- Legal Notice -- Table of Contents -- List of Figures -- List of Tables -- List of Examples -- Preface -- Chapters -- Part Dividers -- Appendixes -- Glossary -- Bibliography -- Index -- Types of Hardware Manuals -- Types of Software Manuals -- Release Notes and Product Notes -- Other Product Documents -- Training Documentation -- Student Guides and Instructor Guides -- Other Training Documents -- 11 Working With an Editor -- Technical Editor's Role -- Editor's Role in Producing Online Documents -- Types of Editing -- Developmental Editing -- Developmental Editing Guidelines -- Copy Editing -- Copy Editing Guidelines -- Proofreading -- Proofreading Guidelines -- Planning Ahead for Editing -- Submitting a Document for Editing -- Editing Marks…”
    Libro electrónico
  13. 5073
    Publicado 2012
    Tabla de Contenidos: “…Detective -- Corrective -- Other Controls -- Comparing the Classes of Controls -- Management/Administrative -- Technical -- Operational/Physical -- Exploring Some Basic Controls -- System Hardening -- Policies, Standards, Procedures, and Guidelines -- Response Plans -- Change Control and Configuration Management -- Testing Patches, Fixes, and Updates -- Endpoint Device Security -- User Awareness and Training Programs -- Understanding Fault Tolerance -- Fault Tolerance for Disks -- Failover Clusters -- Redundant Connections -- Understanding Backups -- Full Backups -- Full/Incremental Backup Strategy -- Full/Differential Backup Strategy -- Questions -- Answers -- Chapter 10 Auditing -- Understanding Auditing and Accountability -- Accountability -- Auditing with Logs -- Clipping Levels -- Understanding Audit Trails -- Exploring Audit Logs -- Operating System Logs -- *Nix Logs -- Proxy Server Logs -- Firewall Logs -- The Review of Logs -- Logs Stored on Remote Systems -- Audit Log Management -- Performing Security Audits -- Password Audit -- Security Policy Audit -- ISACA -- Exploring PCI DSS Requirements -- Physical Access Audit -- Understanding Configuration Management -- Imaging -- Group Policy -- Understanding Change Management -- Questions -- Answers -- Chapter 11 Security Operations -- Managing Data -- Data Classification -- Identifying Classifications -- Cradle-to-Grave Protection -- Data at Rest and Data in Motion -- Data Management Policies -- Understanding Databases -- Data Inference -- Regulatory Requirements -- Training -- Asset Management -- Hardware -- Software -- Data -- Certification and Accreditation -- Certification, Accreditation, and Security Assessments -- Common Criteria -- Using a Risk Management Framework -- Understanding Security within the System Development Life Cycle -- Questions -- Answers…”
    Libro electrónico
  14. 5074
    Publicado 2017
    Tabla de Contenidos: “…Benefits -- Shortcomings -- Communication -- Microservice architectures -- Sharing data and technology in enterprises -- Shared-nothing architectures -- Interdependent systems -- 12-factor and cloud native applications -- When to use and when not to use microservices -- Implementing microservices with Java EE -- Zero-dependency applications -- Application servers -- Implementing application boundaries -- Implementing CQRS -- System interfaces -- Example scenario using Apache Kafka -- Integrating Java EE -- CDI events -- Event handlers -- State representation -- Consuming Kafka messages -- Producing Kafka messages -- Application boundaries -- Integrating further CQRS concepts -- Java EE in the age of distribution -- Discovering services -- Communicating resiliently -- Validating responses -- Breaking timeouts and circuits -- Bulkheads -- Shaking hands and pushing back -- More on being resilient -- Summary -- Chapter 9: Monitoring, Performance, and Logging -- Business metrics -- Collecting business metrics -- Emitting metrics -- Enter Prometheus -- Realization with Java EE -- Integrating the environment -- Meeting performance requirements in distributed systems -- Service level agreements -- Achieving SLAs in distributed systems -- Tackling performance issues -- Theory of constraints -- Identifying performance regression with jPDM -- Subsystems -- Actors -- Application -- JVM -- Operating system and hardware -- jPDM instances - production situations -- Analyzing the jPDM instances -- Dominating consumer - OS -- Dominating consumer - none -- Dominating consumer - JVM -- Dominating consumer - application -- Conclusion -- Technical metrics -- Types of technical metrics -- High frequency monitoring versus sampling -- Collecting technical metrics -- Boundary metrics -- Logging and tracing -- Shortcomings of traditional logging -- Performance -- Log levels…”
    Libro electrónico
  15. 5075
    Tabla de Contenidos: “…-- SharePoint Foundation versus SharePoint Server -- What You Will Learn in This Book -- Summary -- Chapter 2: What's New in PowerShell for SharePoint 2013 -- SharePoint 2013 Apps -- Service Applications -- User License Enforcements -- PowerShell Web Access -- Backups -- Bing Maps -- Search -- Tenants -- Office 365 -- Site Upgrade -- Summary -- Chapter 3: Configuring Your Environment for PowerShell -- Getting Started with the Integrated Scripting Environment (ISE) -- Windows Server 2008 R2 -- Windows Server 2012 -- Windows PowerShell ISE Essential Features -- IntelliSense -- Snippets -- Commands Explorer -- Execution Policy -- PowerShell Web Access (PWA) -- Requirements -- Installing PWA -- Configuring the Gateway -- Summary -- Chapter 4: PowerShell Basics -- Terminology -- Session -- Cmdlets -- Profile -- Snap-In -- Module -- PowerShell Operators and Common Operations -- Printing Values on Screen -- Console Colors -- Variables -- Comments -- Casting -- Conditional Logic -- Decisions -- Comparison -- Logical Operators -- Function -- Loops -- Piping -- Instance Referrer -- Error Handling -- Enumerations -- Arrays -- Environment Variables -- WhatIf Rollback -- Graphical User Interface -- Demo Project-Selective Deletion of Files in a Folder -- Customization -- My Profile -- Custom Modules -- Leaping Ahead -- Desired State Configuration -- Dynamic Method and Property Names -- Summary -- Chapter 5: Installing &amp -- Deploying SharePoint with PowerShell -- Requirements -- Hardware Requirements -- Software Requirements -- Roles and Features -- .NET Framework 3.5 -- Domain Controller -- Users and Groups -- Application Server Role…”
    Libro electrónico
  16. 5076
    Publicado 2024
    Tabla de Contenidos: “…Basics of shell scripting -- Creating a shell script file -- Variables in shell scripts -- Using mathematical expressions in shell scripts -- Using programming structures -- Using arrays in Bash -- Reading input data -- Formatting output data -- Understanding exit statuses and testing structures -- Using conditional if statements -- Using looping statements -- Working with functions -- Using sed and (g)awk commands -- Using scripts to showcase interprocess communication -- Shared storage -- Unnamed pipes -- Named pipes -- Sockets -- Scripting for administrative tasks -- Creating scripts for system administrative tasks -- Packaging scripts -- Summary -- Questions -- Further reading -- Chapter 9: Securing Linux -- Technical requirements -- Understanding Linux security -- Introducing SELinux -- Working with SELinux -- Introducing AppArmor -- Working with AppArmor -- Final considerations -- Working with firewalls -- Understanding the firewall chain -- Introducing Netfilter -- Working with iptables -- Introducing nftables -- Using firewall managers -- Summary -- Exercises -- Further reading -- Chapter 10: Disaster Recovery, Diagnostics, and Troubleshooting -- Technical requirements -- Planning for disaster recovery -- A brief introduction to risk management -- Risk calculation -- Designing a DRP -- Backing up and restoring the system -- Disk cloning solutions -- Introducing common Linux diagnostic tools for troubleshooting -- Tools for troubleshooting boot issues -- Tools for troubleshooting general system issues -- Tools for troubleshooting network issues -- Tools for troubleshooting hardware issues -- Summary -- Questions -- Further reading -- Part 3: Server Administration -- Chapter 11: Working with Virtual Machines -- Technical requirements -- Introduction to virtualization on Linux -- Efficiency in resource usage -- Introduction to hypervisors…”
    Libro electrónico
  17. 5077
    Publicado 2019
    Tabla de Contenidos: “…The Program Development Cycle (PDC) -- 2.1.2. The Hardware Development Cycle (HDC) -- 2.2. Program Development Tools -- 2.2.1. …”
    Libro electrónico
  18. 5078
    por Hofmann, Andreas
    Publicado 2022
    Tabla de Contenidos: “…-- Inhalt und Aufbau -- Hilfe, ich weiß nicht weiter -- Teil I: Grundlagen -- Kapitel 1: Die richtige Hardware für Ihre Anforderungen -- 1.1 Das richtige Synology-Gerät für Sie -- 1.1.1 Die Modellbezeichnungen verstehen -- 1.1.2 Die Serien -- 1.1.3 Viele Modelle, viele Aufgaben -- 1.2 Die Wahl der Festplatten -- 1.2.1 Spezielle NAS-Festplatten -- 1.2.2 Die Bauform -- 1.2.3 Die Geschwindigkeit -- 1.2.4 Die Hersteller -- 1.2.5 Die richtige Kapazität -- 1.3 Die Festplattenkonfiguration -- 1.3.1 Was ist Redundanz? …”
    Libro electrónico
  19. 5079
    por Tate, Jon
    Publicado 2005
    Tabla de Contenidos: “…-- 3.7.8 FC-PH-2 and speed -- 3.7.9 1, 2 and 4 Gbps and beyond -- 3.7.10 FC-PH, FC-PH-2, and FC-PH-3 -- 3.7.11 Layers -- 3.8 Zoning -- 3.8.1 Hardware zoning -- 3.8.2 Software zoning -- 3.9 Trunking -- 3.9.1 Frame filtering -- 3.9.2 Oversubscription -- 3.9.3 Congestion -- 3.9.4 Information units -- 3.9.5 The movement of data -- 3.9.6 Data encoding -- 3.10 Ordered set, frames, sequences, and exchanges -- 3.10.1 Ordered set -- 3.10.2 Frames -- 3.10.3 Sequences -- 3.10.4 Exchanges -- 3.10.5 Frames -- 3.10.6 In order and out of order -- 3.10.7 Latency -- 3.10.8 Heterogeneousness -- 3.10.9 Open Fiber Control -- 3.11 Fibre Channel Arbitrated Loop (FC-AL) -- 3.11.1 Loop protocols -- 3.11.2 Fairness algorithm -- 3.11.3 Loop addressing -- 3.11.4 Private devices on NL_Ports -- 3.12 Factors and considerations -- 3.12.1 Limits -- 3.12.2 Security -- 3.12.3 Interoperability -- 3.13 Standards -- 3.14 SAN industry associations and organizations -- 3.14.1 Storage Networking Industry Association -- 3.14.2 Fibre Channel Industry Association -- 3.14.3 SCSI Trade Association -- 3.14.4 International Committee for Information Technology Standards -- 3.14.5 INCITS technical committee T11…”
    Libro electrónico
  20. 5080
    Publicado 2005
    Tabla de Contenidos: “…DB2 - WebSphere performance aspects -- 10.1 Recommended hardware and software configuration -- 10.2 WebSphere Application Server connection pooling -- 10.2.1 What is new in Version 5 - What is in WebSphere Version 4 -- 10.2.2 How connection pooling works - How connection objects are structured -- 10.2.3 WebSphere data sources -- 10.2.4 Connection pooling - Best practices -- 10.3 DB2 and JDBC -- 10.3.1 Adjusting the number of DB2 threads and connections -- 10.3.2 Enabling DB2 dynamic statement cache -- 10.3.3 Choosing static SQL over dynamic SQL -- 10.3.4 Usage guidelines for JCC type 2 and type 4 connectivity -- 10.3.5 Enterprise JavaBeans (EJBs) and DB2 access -- 10.4 WLM classification of WAS and its impact on DB2 -- 10.4.1 How DB2 and WebSphere Servers are structured on z/OS -- 10.4.2 Enabling WLM dynamic application environments with WAS V5 -- 10.4.3 WebSphere classification and its impact on DB2 -- 10.5 Tuning the storage for z/OS and the Java Virtual Machine -- 10.6 Universal Driver tracing -- 10.6.1 Universal Driver tracing -- 10.6.2 DB2SystemMonitor class -- Chapter 11. …”
    Libro electrónico