Mostrando 5,261 - 5,280 Resultados de 5,616 Para Buscar '"hardware"', tiempo de consulta: 0.09s Limitar resultados
  1. 5261
    por Ollam, Deviant
    Publicado 2012
    “…Excellent companion to Deviant Ollam’s Practical Lock Picking Understand the typical failings of common security hardware in order to avoid these weaknesses Learn advanced methods of physical attack in order to be more successful with penetration testing Detailed full-color photos in the book make learning easy, and companion website is filled with invalualble training videos from Dev!…”
    Libro electrónico
  2. 5262
    Publicado 2011
    “…The IBM Midrange System Storage helps to fulfill these requirements by offering three copy services premium features: IBM FlashCopy® VolumeCopy Enhanced Remote Mirroring (ERM) This publication specifically addresses the copy services premium features and can be used in conjunction with the following IBM DS System Storage books: IBM System Storage DS4000 and Storage Manager V10.30, SG24-7010 IBM System Storage DS3000: Introduction and Implementation Guide, SG24-7065 IBM System Storage DS3500: Introduction and Implementation Guide, SG24-7914 IBM Midrange System Storage Hardware Guide, SG24-7676 IBM Midrange System Storage Implementation and Best Practices Guide, SG24-6363…”
    Libro electrónico
  3. 5263
    Publicado 2012
    “…This guide helps you optimize your deduplication ratio, while reducing the hardware, power and cooling, and management costs…”
    Libro electrónico
  4. 5264
    Publicado 2015
    “…Review empirical data from actual attacks conducted by unsophisticated and elite APT hackers alike Learn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught Perform in-depth reconnaissance to build a comprehensive understanding of the target Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence Use social engineering to compromise a specific system, application, or workstation Identify and attack wireless networks and wireless client devices Spearphish with hardware-based Trojan devices Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads…”
    Libro electrónico
  5. 5265
    “…You’ll also learn how to account for H.264, WebM and Ogg Theora codecs as well as explore the emerging Web Audio API standard, which provides an extensive set of hardware-accelerated audio filters to achieve a level of audio signal manipulation in the browser previously only available to audio professionals…”
    Libro electrónico
  6. 5266
    Publicado 2015
    “…We assume that the reader is familiar with general concepts and terminology of System z hardware and software elements, and with basic PC Linux characteristics. …”
    Libro electrónico
  7. 5267
    Publicado 2015
    “…The reader is expected to have a good understanding of IBM z SystemsTM hardware, IBM z/VM, Linux on z Systems, and cloud concepts…”
    Libro electrónico
  8. 5268
    por Wang, Liang
    Publicado 2023
    “…You will: Optimize core operations based on N-dimensional arrays Design and implement an industry-level algorithmic differentiation module Implement mathematical optimization, regression, and deep neural network functionalities based on algorithmic differentiation Design and optimize a computation graph module, and understand the benefits it brings to the numerical computing library Accommodate the growing number of hardware accelerators (e.g. GPU, TPU) and execution backends (e.g. web browser, unikernel) of numerical computation Use the Zoo system for efficient scripting, code sharing, service deployment, and composition Design and implement a distributed computing engine to work with a numerical computing library, providing convenient APIs and high performance…”
    Libro electrónico
  9. 5269
    “…The goal of this workshop is to lay out the foundations of such framework for computation-aware algorithmic design of cyber-physical systems by bringing together experts (both practitioners and researchers) in cyber-physical systems and key areas in hardware design, real-time systems, optimization, control, safety, and verification…”
    Libro electrónico
  10. 5270
    Publicado 2006
    “…Coverage includes What User Mode Linux is, how it works, and its uses in Linux networks Key applications, including server consolidation, development, and disaster recovery Booting and exploration: logins, consoles, swap space, partitioned disks, and more Copy-On-Write (COW): UML's efficient approach to storing filesystem changes In-depth discussion of User Mode Linux networking and security Centrally managing User Mode Linux instances, and controlling their hardware resources Implementing clusters and other specialized configurations Setting up User Mode Linux servers, step-by-step: small-scale and large-scale examples The future of virtualization and User Mode Linux Whether you're a netadmin, sysadmin, teacher, student, or programmer, User Mode Linux® --the technology and this book--is indispensable…”
    Libro electrónico
  11. 5271
    Publicado 2019
    “…By the end, you’ll have learned the basics of coding in Python and know enough about working with hardware like servers, motors, and sensors to expand your creations beyond simple robots. …”
    Libro electrónico
  12. 5272
    Publicado 2019
    “…Topics in the second edition include: Configuration Management: config sessions, config replace, and config checkpoints CloudVision: Arista’s management, workload orchestration, workflow automation, and configuration tool VXLAN: Layer 2 overlay networking FlexRoute: two million routes in hardware Tap Aggregation: make your switch or blade into a Tap Aggregation device Advanced Mirroring: mirror to a port-channel or even the CPU eAPI: Arista’s fabulous extended Application Programmable Interface…”
    Libro electrónico
  13. 5273
    Publicado 2021
    “…This Special Issue provides an overview of the state of the art in GPR imaging, focusing on the latest advances from both hardware and software perspectives…”
    Libro electrónico
  14. 5274
    Publicado 2007
    “…c,advisory, and political levels to decide if Germany will install an even larger European supercomputer, where the hardware costs alone will be around 200 Million Euro for a ?…”
    Libro electrónico
  15. 5275
    por Laitinen, Saila
    Publicado 2007
    “…Complete quality assurance test procedures, and best practice The first book to market on S60 smartphone creation and QA is an indispensable resource for hardware and software designers, engineers, developers and manufacturers, as well as operators and service providers creating Series 60 and smartphone-specific services. …”
    Libro electrónico
  16. 5276
    Publicado 2001
    “…Enhancing all four key elements of availability: reliability, recoverability, serviceability, and manageability Understanding how your users define availability Planning achievable service level agreements-and delivering on them Strategies for multiple platforms, from the mainframe to the desktop Lowering administrative costs through standardization and other techniques Redundancy, backup, fault tolerance, partitioning, automation, and other high availability solutions Leveraging availability features built into your existing hardware and operating systems Discover how to create systems that will be easier to maintain, anticipate and prevent problems, and define ongoing availability strategies that account for business change. …”
    Libro electrónico
  17. 5277
    Publicado 2009
    “…Typical changes that often mean you need to move from the way you do things now to doing things differently include: · Process – following different steps or using different methods to complete a task or activity · Product – developing new or improved products or services · Technology – using new or upgraded software, hardware, systems or equipment · Money – staying competitive in the market; managing with less (or more!) …”
    Libro electrónico
  18. 5278
    Publicado 2020
    “…It covers all aspects related to TD measurements, including advances in hardware, methodology, the theory of light propagation, and clinical applications…”
    Libro electrónico
  19. 5279
    Publicado 2013
    “…Brandon is an iOS developer at Black Pixel, which is an interdisciplinary team of senior designers, developers, and artists working together to create beautiful and well-architected applications for Apple hardware. www.blackpixel.com …”
    Video
  20. 5280
    Publicado 2007
    “…It also benefits from a system-wide approach with security capabilities built into the hardware, operating systems, databases, key middleware and more. …”
    Libro electrónico