Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,126
- Management 1,121
- Development 1,088
- Application software 917
- Computer Science 780
- Computer networks 617
- Database management 610
- Data processing 539
- Business & Economics 517
- Computer programs 516
- Education 487
- Python (Computer program language) 477
- Cloud computing 472
- Economic conditions 461
- Leadership 451
- Machine learning 414
- Economic policy 402
- Operating systems (Computers) 395
- Economics 373
- Examinations 367
- Artificial intelligence 364
- Web site development 345
- Security measures 341
- Electrical & Computer Engineering 317
- History 313
- Computer software 311
- Java (Computer program language) 309
- Information technology 308
- Computer programming 307
- Programming 303
-
19161Publicado 2023Tabla de Contenidos: “…Chapter 7: Implementing Your Gamification -- Decoding your gamification -- Building your implementation team -- Building a prototype -- Building your product -- Writing user stories -- Milestones and iteration testing -- Product and feature launch -- The full product launch -- New feature rollouts -- Setting up tools to track performance -- Making data-driven decisions -- User acquisition -- Activation -- Monetization -- Retention -- A/B testing -- Pivot or persevere -- Creating a process of continual improvement -- Implementing feedback loops -- Summary -- Chapter 8: Challenges and Limitations in Gamification -- Keeping gamification ethical -- Addiction by Design -- Balancing gamification and user privacy -- Anonymization and aggregation of data -- User control and consent -- Accessibility to all users -- Ensuring gamification doesn't harm the user experience -- Avoiding common pitfalls and mistakes -- Behavioral insights -- Another example of mistakes from prominent literature -- Summary -- Further reading -- Chapter 9: Selling Your Gamification Strategy -- Building your business case -- Use case - Kahoot -- Step-by-step guide for creating a compelling business case for gamification -- Leadership buy-in -- Example of utilizing the Pyramid Principle -- Relationship building -- Use case - Atlassian -- Cross-functional teams -- GTM strategy -- Case study - Apple Watch -- Case study - GuruShots -- Case study - Peloton -- Summary -- Further reading -- Chapter 10: Gamifying Your Product Development Processes -- The draft game -- Utilizing design thinking to create gamified activities for product development -- Empathize - understanding your team's needs and motivations -- Define - setting clear goals and objectives for gamified activities -- Ideate - brainstorming creative gamification strategies -- Prototype - designing and testing gamified activities…”
Libro electrónico -
19162Nuxt 3 Projects Build Scalable Applications with Nuxt 3 Using TypeScript, Pinia, and Composition APIPublicado 2024Tabla de Contenidos: “…-- The architecture and principles of Nuxt -- Built on top of Vue -- Universal rendering and static site generation -- Performance optimizations -- Installing and setting up the Nuxt 3 environment -- Prerequisites -- Creating your first "Hello Nuxt" app -- Initialization - the steps to create a new Nuxt project -- The default project structure -- Recommended extensions -- Vue - Official -- Nuxtr -- Summary -- Practice questions -- Further reading -- Chapter 2: Building a Simple Portfolio Using Tailwind CSS and a Dive into Nuxt 3's Project Structure -- Technical requirements -- Essential background - what is Tailwind CSS? …”
Libro electrónico -
19163por Pinto, RohanTabla de Contenidos: “…Cryptographic techniques -- Public and private keys -- Digital signatures -- Verifiable credentials -- Blockchain and DLT in SSI -- Role of blockchain in SSI -- DLTs -- Data storage and decentralization -- DIDs -- Usage of DIDs in the SSI space -- DID methods -- DID resolution and resolution protocols -- The SSI ecosystem -- SSI stakeholders -- SSI interoperability -- Importance of interoperability -- SSI in a multi-SSI network -- SSI and regulatory compliance -- GDPR and data protection -- Compliance frameworks -- Legal challenges -- Future trends in SSI -- Emerging technologies -- Scalability and performance improvements -- SSI in a post-quantum world -- SSI and blockchain scalability -- Scalability challenges -- Layer-2 solutions -- Future scaling options -- Use of tokens in SSI -- Role of tokens -- Token standards -- SSI wallets and tokens -- SSI and identity in IoT -- IoT and identity -- SSI in the IoT -- Security challenges -- Ethical and philosophical implications of SSI -- Ethical considerations -- Philosophical implications -- Individual empowerment -- Challenges and risks in SSI implementation -- Adoption challenges -- Regulatory risks -- Technological threats -- Summary -- Chapter 10: Privacy by Design in the SSI Space -- PbD in SSI -- The value of PbD -- PbD frameworks -- Safeguarding data in the digital age -- User-centric privacy controls -- Consent management -- Data reduction -- Selective dissemination -- Security best practices -- Threats and mitigations -- Summary -- Chapter 11: Relationship between DIDs and SSI -- DIDs as the backbone of SSI -- DIDs and SSI relationship basics -- Emerging DID methods and innovations -- Development of new DID methods -- Relevance of new DID methods -- Need for the standardization of DID methods -- Distributed identity issuers and verifiers -- Basics of verifiable credentials and digital identity…”
Publicado 2024
Libro electrónico -
19164Publicado 2024“…The final part covers frontend development using Svelte, guiding you through UI design, state management, and performance optimization. Each chapter has real-world examples and comparisons to other technologies, providing you with a comprehensive understanding of full-stack development. …”
Libro electrónico -
19165por Justus, RoyTabla de Contenidos: “…Regression framework -- Metrics for regression -- Input data quality -- Improving data quality -- Similarity framework -- Assessing the similarity framework's performance -- Clustering framework -- Creating a clustering solution -- Summary -- Chapter 11: Designing Exceptional Experiences -- Types of ServiceNow user interfaces -- Jelly -- Service Portal -- Next Experience -- Portals -- Types of portals -- The journey from department to enterprise portals -- Employee Center Pro -- Content taxonomy -- Custom app portals and portal customizations -- Application portals -- Workspaces -- Determining which workspaces to use -- Optimizing experiences with user-facing AI -- AI Search -- AI Search configurability -- Conversational interfaces -- Incorporating Virtual Agent into your user experience -- Advantages of Virtual Agent as a user interface -- Disadvantages of conversational interfaces -- Recommendations for Virtual Agent -- ServiceNow NLU -- Summary -- Conclusion -- Index -- Other Books You May Enjoy…”
Publicado 2022
Libro electrónico -
19166Publicado 2022Tabla de Contenidos: “…VxRail Stretched Cluster with WTS -- VMware vCenter Server options -- A scenario using VxRail Stretched Cluster -- Network settings -- Storage settings -- Software licenses -- Failure scenarios of VxRail Stretched Cluster -- Failure scenario one -- Failure scenario two -- Failure scenario three -- Failure scenario four -- Failure scenario five -- Summary -- Questions -- Chapter 8: Design of VxRail with SRM -- Overview of VMware SRM -- VM replication -- Storage-based replication -- SRM licensing -- Overview of VxRail with VMware SRM -- Uni-directional protection -- Bi-directional protection -- The design of VxRail with VMware SRM -- The benefits of VxRail with VMware SRM -- Failover scenarios of VxRail with VMware SRM -- Failure scenario 1 -- Failure scenario 2 -- Failure scenario 3 -- Failure scenario 4 -- Failure scenario 5 -- Failure scenario 6 -- Summary -- Questions -- Chapter 9: Design of RecoverPoint for Virtual Machines on VxRail -- Overview of RP4VM -- vRPA adapters -- vRPA performance profiles -- CGs -- Journal volumes -- Overview of RP4VM on VxRail -- Local replication -- Remote replication -- Licensing -- Simple support matrix -- The benefits of RP4VM -- The design of RP4VM on VxRail -- Network settings -- Storage settings -- Software licenses -- Failover scenarios of RP4VM on VxRail -- Failure scenario 1 -- Failure scenario 2 -- Failure scenario 3 -- Failure scenario 4 -- Failure scenario 5 -- Summary -- Questions -- Chapter 10: Design of VxRail with Veeam Backup -- Overview of VBR -- Which platforms can be protected? …”
Libro electrónico -
19167Publicado 2022“…Leverage the low-code/no-code approach in IBM Cloud Pak for business automation to accelerate your organization's digital transformation Purchase of the print or Kindle book includes a free eBook PDF Key Features Get a comprehensive understanding of IBM Cloud Pak for Business Automation Take a deep dive into insights on RPA, workflow automation, and automated decisions Deploy and manage production-grade automated solutions for scalability, stability, and performance Book Description COVID-19 has made many businesses change how they work, change how they engage their customers, and even change their products. …”
Libro electrónico -
19168Publicado 1996Tabla de Contenidos: “…Subpart G-Sources for Brachytherapy -- Subpart H-Sealed Sources for Diagnosis -- Subpart I-Teletherapy -- Subpart J-Training and Experience Requirements -- Subpart K-Enforcement -- PART 36-LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS -- Subpart A-General Provisions -- Subpart B-Specific Licensing Requirements -- Subpart C-Design and Performance Requirements for Irradiators -- Subpart D-Operation of Irradiators -- Subpart E-Records -- Subpart F-Enforcement -- E Nuclear Regulatory Commission Agreement and Non-agreement States -- AGREEMENT STATES -- NON-AGREEMENT STATES -- F Regulatory Chronology -- G History of Radiation Regulation in Medicine -- PROFESSIONAL SELF-REGULATION -- GOVERNMENT REGULATION -- NUCLEAR REGULATORY COMMISSION -- Atomic Energy Act -- Other Federal Agencies -- Federal Radiation Council -- Other Executive Agencies -- PHS Radiological Health Program -- Environmental Protection Agency -- STATE REGULATION -- REFERENCES -- H Public Meeting Documents -- ORGANIZATIONS FORMALLY CONTACTED FOR PUBLIC MEETING PARTICIPATION -- COMMITTEE FOR REVIEW AND EVALUATION OF THE MEDICAL USE PROGRAM OF THE NUCLEAR REGULATORY COMMISSION -- PUBLIC MEETING ANNOUNCEMENT AND REQUEST FOR WRITTEN TESTIMONY -- Background -- Providing Testimony -- Guide to Preparing Testimony -- TOPICS -- Regulation -- Data/Risk -- Quality Management/Quality Assurance -- Education -- Other -- PUBLIC HEARING OCTOBER 12, 1994 ORGANIZATIONS AND INDIVIDUALS SUBMITTING TESTIMONY -- QUESTION SUMMARIES -- I Quality Management Technical Panel -- LIST OF PARTICIPANTS, TUESDAY, OCTOBER 11, 1994 -- Speakers -- Observers -- Subcommitee Members -- J Commissioned Papers -- K The Linear, No-Threshold Model -- ADOPTION OF THE LINEAR, NO-THRESHOLD MODEL -- Divided Scientific Opinion, 1958-1966 -- Joint Committee on Atomic Energy Hearings, 1957-1960s…”
Libro electrónico -
19169Publicado 1990Tabla de Contenidos: “…-- CLOSING PANDORA'S BOX -- References -- Chemical Time Bombs: Environmental Causes of Neurodegenerative Diseases -- ESTABLISHING CRITERIA FOR CHEMICAL NEUROTOXICITY -- CLASSIFYING CHEMICALLY INDUCED HUMAN NEUROTOXIC DISORDERS -- THE MATURE NERVOUS SYSTEM AS CHEMICAL TARGET -- DEVELOPING NERVOUS SYSTEM AS CHEMICAL TARGET -- Scientific Basis for Neurobehavioral Toxicity Testing -- CONCLUSION -- Reference -- PART IV BEHAVIORAL ASPECTS OF NEUROTOXICITY: REGIONAL ISSUES -- Neurobehavioral Toxicity Testing in China -- INTRODUCTION -- OVERVIEW OF RESEARCH ACTIVITIES -- Carbon Disulfide -- Lead -- Simulated Video Display Terminal (VDT) Operation -- Static Magnetic Fields (SMF) -- NATIONAL AND INTERNATIONAL COOPERATION -- Mood States -- Performance Tests -- EXPECTED DIRECTIONS: BARRIERS AND RECOMMENDATIONS -- Developments in the Near Future -- Developing and Validating Test Methods -- Generating New Measuring Instruments -- Building a Computerized Evaluation System -- Limitations and Barriers -- Variation of Test Sensitivity from Study to Study -- Bias of Learning Effect -- Controlling Confounding Factors -- Interpreting Results Obtained from Neurobehavioral Tests -- Comments and Recommendations -- Training and Education -- Exploring the Possibility of Combining Quantitative Biochemical Markers and Neurobehavioral Testing -- Development, Validation, and Characterization of Methods -- SUMMARY -- Status of Research and Development of Neurobehavioral Toxicity Tests in China -- Expected Directions in the Development of Behavioral Tests of Neurotoxicity -- Problems and Recommendations -- References…”
Libro electrónico -
19170por Pathak, HarshTabla de Contenidos: “…-- Advantages/Disadvantages of Change Cycles -- Organisational Barriers to Change -- Performance-Driven Organisational Change -- Rate of Change -- Organisational Effectiveness -- Differents States of Change -- The Future State of Change -- The Current State of Change -- The Delta State of Change -- Creating Change -- Implementation of Change -- Practical tools to Understands Change -- General Guidelines for Effective Change -- Summary -- Case Study: A Semiconductor Solutions Company With an offshore Development Center in India -- Review Questions -- Organisational Resistance to Change -- Introduction -- Reactions to Change -- Core Facts of Resistance to Change -- Individual and Group Resistance to Change -- Individual Resistance -- Organisational Resistance -- Consequences of Resistance to Change -- Overcoming Resistance to Change -- Startegies for Introducing Planned Change -- Empirical-rational Strategy -- Normative-reductive Strategy -- Power-coercive Strategy -- Techniques to Manage Resistance During Change -- Education and Communication -- Sense of Participation and Invilvement -- Assistance and Support -- Incentives -- Negotiation -- Manipulation and Co-optation -- Coercion -- Othr Strategies for Introducing Change…”
Publicado 1900
Libro electrónico -
19171Publicado 2024Tabla de Contenidos: “…Disabling dynamics -- Lack of PO between clients and CFOC -- Less support for long-term CFOs and clients -- Unclear role of RD -- Organisational beliefs and Key Performance Indicators (KPIs) -- Heavy reliance on the RD for finding and winning clients -- Covid-19 -- Psychological ownership pathways -- Roots of PO -- Efficacy is important for clients and CFOs -- Self-identity -- Having a place -- Routes of PO -- Psychological safety matters -- Control -- Investing self -- Knowing intimately -- Other considerations -- Age, gender, introversion, and extroversion -- Retention skills -- Emotional intelligence -- References -- Part V: Strategy and Leadership as Service Framework: The Four Rs -- Chapter 10: The Roots -- Developing roots -- Efficacy -- Having needs met is a two-way street -- Understanding the needs of the C-suite team members -- Service -- Education -- Monitoring -- Relationship between the client and firm of C-suite providers -- Self-identity -- C-suite professionals focus on sector and functional experience to enhance their identity -- Matching identity of client and C-suite professional -- C-suite professionals and their C-suite firm -- Lack of identity of clients with the C-suite firm -- Having a place -- C-suite professionals feel at home at their C-suite firm and with their clients -- Clients' feelings of being at home with their C-suite firm -- References -- Chapter 11: The Routes -- Training and coaching the routes to build psychological ownership -- Psychological safety -- A natural part of the model -- C-suite skills for creating psychological safety -- Building interpersonal trust -- An escape clause -- Time and place -- Mediator roles -- Control -- Control versus influence -- Freedom and control within portfolio work -- Freedom is a beautiful system -- Day-to-day control -- Control for the client -- Accessibility and availability…”
Libro electrónico -
19172por Konheim, Alan G., 1934-Tabla de Contenidos: “…Hashing Functions: Examples and Evaluation -- 9.1: Overview: The Tradeoff of Randomization Versus Computational Simplicity -- 9.2: Some Examples of Hashing Functions -- 9.3: Performance of Hash Functions: Formulation -- 9.4: The X2-Test -- 9.5: Testing a Hash Function -- 9.6: The McKenzie et al. …”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
19173Publicado 2018Tabla de Contenidos: “…A continuum damage model for the simulation of concrete under cyclic loading -- From slender columns to branching structures -- Aging concrete: From very early ages to decades-long durability -- Assessing the flow characteristics of self-compacting concrete via numerical simulations of flow tests -- Mixing and extrusion of printing concrete -- Formulation, validation and application of a new shotcrete model -- Aging behavior of normal and high strength concretes -- A multiscale framework for the prediction of concrete self-desiccation -- Effect of drying on the mechanical performances of concrete -- Temperature and humidity-driven ageing of the VeRCoRs mock-up -- Reassessment of the very long term basic creep of concrete -- Interaction between damage and time-dependent deformation of mortar in concrete: 3D FE parametric study at meso-scale -- Prediction of air permeability in large RC structures using a stochastic FE THM modeling strategy -- Simplified modelling strategy for the thermos-mechanical analysis of massive reinforced structures at early age -- Multiscale quantification of thermal expansion of concrete and thermal stresses of concrete structures -- Translating environmentally-induced eigenstresses to risk of fracture for design of durable concrete pavements -- Simulation of permeable concrete to assess interrelationship between strength and permeability -- A coupled chemo-mechanical damage-healing model for cementitious materials -- Flow in fibrous composite materials: Numerical simulations -- Modeling water absorption in cement-based composites with SAP additions -- Full coupling between diffusion and mechanical analysis in a discrete computational framework -- Alternative parameter to characterize pore distribution in cement paste, and its relation to mechanical properties…”
Libro electrónico -
19174Publicado 2021Tabla de Contenidos: “…Cover -- Title page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Section 1: Mastering Defensive Security Concepts -- Chapter 1: A Refresher on Defensive Security Concepts -- Technical requirements -- Deep dive into the core of cybersecurity -- The cybersecurity triad -- Types of attacks -- Managing cybersecurity's legendary pain point: Passwords -- Password breaches -- Social engineering attacks using compromised passwords -- Brute-force attacks -- Dictionary attacks -- Creating a secure password -- Managing passwords at the enterprise level -- Bonus track -- Mastering defense in depth -- Factors to consider when creating DiD models -- Asset identification -- Defense by layers -- Bonus track -- Comparing the blue and red teams -- Summary -- Further reading -- Chapter 2: Managing Threats, Vulnerabilities, and Risks -- Technical requirements -- Understanding cybersecurity vulnerabilities and threats -- Performing a vulnerability assessment -- The vulnerability assessment process -- When should you check for vulnerabilities? …”
Libro electrónico -
19175por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Vasiliev -- Design and Performance Studies for Minor-Actinide Target Fuels by T. …”
Publicado 1999
Libro electrónico -
19176Publicado 2009Tabla de Contenidos: “…-- Heuristic Methods -- Heuristics Problem-Solving Approaches -- Meta-Heuristics -- Choice of Heuristic Methods -- Evaluation of Heuristics -- Evaluation of Heuristics in Empirical Analysis -- Sources of Problem Instances -- Performance Measures/Measure of Effectiveness -- Examples of Heuristic Optimisation -- Advantages and Limitations of Heuristic Methods -- Simulation Modelling -- Meaning of Simulation -- What is Simulation? …”
Libro electrónico -
19177Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Current PowerShell Versions -- Technical requirements -- Historical background -- Overview of different versions of Powershell -- PowerShell Editions -- Windows PowerShell 5.1 -- PowerShell Core 6 -- PowerShell Open Source -- Downloading the source code -- Developing and contributing -- The goals of PowerShell Core 6 -- Dependencies and support -- Compatibility -- Cross-platform remoting -- Azure Cloud Shell -- Features of PowerShell in Cloud Shell -- Future of PowerShell -- Summary -- Questions -- Further reading -- Chapter 2: PowerShell ISE Versus VSCode -- Introduction to currently available tools -- Recap -- PowerShell ISE -- Visual Studio Code -- Introduction -- Download -- Installation -- First start -- Basics -- ISE versus VSCode -- Summary -- Questions -- Further reading -- Chapter 3: Basic Coding Techniques -- Comments -- Regions -- Types -- Variables -- Commands and parameters -- Approved verb list -- PSDrives and PSProviders -- PowerShell's scripting language -- Script blocks -- Operators -- Pipeline operator -- Type operators -- Arithmetic operators -- Assignment operators -- Comparison operators -- Logical operators -- Split and join operators -- Bitwise logical operators -- Replace operator -- Unary operators -- Language constructs -- Indentation -- If...ElseIf, and Else -- Switch -- Loops -- for loop -- do loop -- while loop -- foreach loop -- break and continue loops -- Error handling -- Non-terminating -- Terminating errors -- Remoting -- Types of remoting -- Summary -- Questions -- Further reading -- Chapter 4: Advanced Coding Techniques -- Technical requirements -- Working with credentials -- Working with external utilities -- Pipeline and performance -- Performance -- Parallel execution…”
Libro electrónico -
19178Publicado 2019Tabla de Contenidos: “…Titel -- Inhaltsverzeichnis -- Einleitung -- Kapitel 1 - Selbstführung -- 1.1 Das Agile Mindset -- 1.1.1 Der lageorientierte Erdulder -- 1.1.2 Handlungsorientierte Gestalter -- 1.2 Denk- und Handlungsmuster -- 1.3 Glück und Erfolg -- 1.3.1 PERMA in Verbindung mit Agilität -- 1.3.2 Entwicklung von Glück -- 1.4 Emotionsregulation -- 1.4.1 Karte der Emotionen in einer Retrospektive (Teamcoaching) -- 1.4.2 Emotionsregulation im Einzelcoaching -- 1.4.3 Emotionsregulation im Selbstcoaching -- 1.5 Innere Persönlichkeitsanteile -- 1.5.1 Schritt 1 - Das Problem -- 1.5.2 Schritt 2 - Persönlichkeiten entwerfen -- 1.5.3 Schritt 3 - Das Theaterstück beginnt -- 1.5.4 Schritt 4 - Das Theaterstück umschreiben -- 1.6 Mit Beispiel vorangehen -- 1.7 Agile Techniken -- 1.7.1 Das Planen -- 1.7.2 Die Umsetzung -- 1.7.3 Schritt 3 - Der Review -- 1.8 Literaturempfehlungen zum Kapitel -- Kapitel 2 - Selbstorganisation -- 2.1 Agiles Mindset und Werte im Team -- 2.2 Das Spielfeld und seine Regeln -- 2.2.1 Shared Vision -- 2.2.2 Kunden-Feedback -- 2.2.3 Co-Creation -- 2.2.4 Lieferprozess - Liefern in kleinen Chargen -- 2.2.5 Zyklische Lieferung -- 2.2.6 KISS - Keep it simple and small -- 2.2.7 KVP - kontinuierliche Verbesserung -- 2.2.8 Performance-Kennzahlen -- 2.2.9 Teamprozess und Teamverantwortung -- 2.2.10 Interdisziplinäre Teams -- 2.2.11 T-Shaped Profile -- 2.2.12 Moderierende Führung -- 2.2.13 Integrierte Reflexions- und Lernprozesse -- 2.2.14 Beispiel-Setup -- 2.2.15 Auftraggeber-Prozesse -- 2.2.16 Prozesse des Dienstleisters -- 2.3 Selbstorganisation -- 2.3.1 Managergeführt -- 2.3.2 Selbstgesteuert -- 2.3.3 Selbstgestaltet -- 2.3.4 Selbstständig -- 2.3.5 Dezentralisation -- 2.3.6 Zentrale Service-Teams -- 2.3.7 Redundanz -- 2.4 Agile Rollen -- 2.5 Das Serving-Leadership-Konzept -- 2.5.1 Coaching und Perspektivwechsel -- 2.5.2 Therapie -- 2.5.3 Mentoring…”
Libro electrónico -
19179Publicado 2016Tabla de Contenidos: “…Linux and OSS in a Forensic Context -- Advantages of Linux and OSS in Forensics Labs -- Disadvantages of Linux and OSS in Forensics Labs -- Linux Kernel and Storage Devices -- Kernel Device Detection -- Storage Devices in /dev -- Other Special Devices -- Linux Kernel and Filesystems -- Kernel Filesystem Support -- Mounting Filesystems in Linux -- Accessing Filesystems with Forensic Tools -- Linux Distributions and Shells -- Linux Distributions -- The Shell -- Command Execution -- Piping and Redirection -- Closing Thoughts -- Chapter 3: Forensic Image Formats -- Raw Images -- Traditional dd -- Forensic dd Variants -- Data Recovery Tools -- Forensic Formats -- EnCase EWF -- FTK SMART -- AFF -- SquashFS as a Forensic Evidence Container -- SquashFS Background -- SquashFS Forensic Evidence Containers -- Closing Thoughts -- Chapter 4: Planning and Preparation -- Maintain an Audit Trail -- Task Management -- Shell History -- Terminal Recorders -- Linux Auditing -- Organize Collected Evidence and Command Output -- Naming Conventions for Files and Directories -- Scalable Examination Directory Structure -- Save Command Output with Redirection -- Assess Acquisition Infrastructure Logistics -- Image Sizes and Disk Space Requirements -- File Compression -- Sparse Files -- Reported File and Image Sizes -- Moving and Copying Forensic Images -- Estimate Task Completion Times -- Performance and Bottlenecks -- Heat and Environmental Factors -- Establish Forensic Write-Blocking Protection -- Hardware Write Blockers -- Software Write Blockers -- Linux Forensic Boot CDs -- Media with Physical Read-Only Modes -- Closing Thoughts -- Chapter 5: Attaching Subject Media to an Acquisition Host -- Examine Subject PC Hardware -- Physical PC Examination and Disk Removal -- Subject PC Hardware Review -- Attach Subject Disk to an Acquisition Host -- View Acquisition Host Hardware…”
Libro electrónico -
19180Publicado 2017Tabla de Contenidos: “…. -- Chapter 8: High Performance Programming Using Parallel and Multithreading in C# -- Introduction -- Creating and aborting a low-priority background thread -- Getting ready -- How to do it... -- How it works... -- Increasing the maximum thread pool size -- Getting ready -- How to do it... -- How it works... -- Creating multiple threads -- Getting ready -- How to do it... -- How it works... -- Locking one thread until the contended resources are available -- Getting ready -- How to do it... -- How it works... -- Invoking parallel calls to methods using Parallel.Invoke -- Getting ready -- How to do it... -- How it works... -- Using a parallel foreach loop -- Getting ready -- How to do it... -- How it works... -- Cancelling a parallel foreach loop -- Getting ready -- How to do it... -- How it works... -- Catching errors in parallel foreach loops -- Getting ready -- How to do it... -- How it works... -- Debugging multiple threads -- Getting ready -- How to do it... -- How it works... -- Chapter 9: Composing Event-Based Programs Using Reactive Extensions -- Introduction -- Installing Rx -- Getting ready -- How to do it... -- How it works... -- Events versus observables -- Getting ready -- How to do it... -- How it works... -- Using LINQ to perform queries -- Getting ready -- How to do it... -- How it works... -- Using schedulers in Rx -- Getting ready -- How to do it... -- How it works... -- Debugging lambda expressions -- Getting ready -- How to do it... -- How it works…”
Libro electrónico