Mostrando 19,161 - 19,180 Resultados de 26,561 Para Buscar '"performance"', tiempo de consulta: 0.18s Limitar resultados
  1. 19161
    Publicado 2023
    Tabla de Contenidos: “…Chapter 7: Implementing Your Gamification -- Decoding your gamification -- Building your implementation team -- Building a prototype -- Building your product -- Writing user stories -- Milestones and iteration testing -- Product and feature launch -- The full product launch -- New feature rollouts -- Setting up tools to track performance -- Making data-driven decisions -- User acquisition -- Activation -- Monetization -- Retention -- A/B testing -- Pivot or persevere -- Creating a process of continual improvement -- Implementing feedback loops -- Summary -- Chapter 8: Challenges and Limitations in Gamification -- Keeping gamification ethical -- Addiction by Design -- Balancing gamification and user privacy -- Anonymization and aggregation of data -- User control and consent -- Accessibility to all users -- Ensuring gamification doesn't harm the user experience -- Avoiding common pitfalls and mistakes -- Behavioral insights -- Another example of mistakes from prominent literature -- Summary -- Further reading -- Chapter 9: Selling Your Gamification Strategy -- Building your business case -- Use case - Kahoot -- Step-by-step guide for creating a compelling business case for gamification -- Leadership buy-in -- Example of utilizing the Pyramid Principle -- Relationship building -- Use case - Atlassian -- Cross-functional teams -- GTM strategy -- Case study - Apple Watch -- Case study - GuruShots -- Case study - Peloton -- Summary -- Further reading -- Chapter 10: Gamifying Your Product Development Processes -- The draft game -- Utilizing design thinking to create gamified activities for product development -- Empathize - understanding your team's needs and motivations -- Define - setting clear goals and objectives for gamified activities -- Ideate - brainstorming creative gamification strategies -- Prototype - designing and testing gamified activities…”
    Libro electrónico
  2. 19162
    Publicado 2024
    Tabla de Contenidos: “…-- The architecture and principles of Nuxt -- Built on top of Vue -- Universal rendering and static site generation -- Performance optimizations -- Installing and setting up the Nuxt 3 environment -- Prerequisites -- Creating your first "Hello Nuxt" app -- Initialization - the steps to create a new Nuxt project -- The default project structure -- Recommended extensions -- Vue - Official -- Nuxtr -- Summary -- Practice questions -- Further reading -- Chapter 2: Building a Simple Portfolio Using Tailwind CSS and a Dive into Nuxt 3's Project Structure -- Technical requirements -- Essential background - what is Tailwind CSS? …”
    Libro electrónico
  3. 19163
    por Pinto, Rohan
    Publicado 2024
    Tabla de Contenidos: “…Cryptographic techniques -- Public and private keys -- Digital signatures -- Verifiable credentials -- Blockchain and DLT in SSI -- Role of blockchain in SSI -- DLTs -- Data storage and decentralization -- DIDs -- Usage of DIDs in the SSI space -- DID methods -- DID resolution and resolution protocols -- The SSI ecosystem -- SSI stakeholders -- SSI interoperability -- Importance of interoperability -- SSI in a multi-SSI network -- SSI and regulatory compliance -- GDPR and data protection -- Compliance frameworks -- Legal challenges -- Future trends in SSI -- Emerging technologies -- Scalability and performance improvements -- SSI in a post-quantum world -- SSI and blockchain scalability -- Scalability challenges -- Layer-2 solutions -- Future scaling options -- Use of tokens in SSI -- Role of tokens -- Token standards -- SSI wallets and tokens -- SSI and identity in IoT -- IoT and identity -- SSI in the IoT -- Security challenges -- Ethical and philosophical implications of SSI -- Ethical considerations -- Philosophical implications -- Individual empowerment -- Challenges and risks in SSI implementation -- Adoption challenges -- Regulatory risks -- Technological threats -- Summary -- Chapter 10: Privacy by Design in the SSI Space -- PbD in SSI -- The value of PbD -- PbD frameworks -- Safeguarding data in the digital age -- User-centric privacy controls -- Consent management -- Data reduction -- Selective dissemination -- Security best practices -- Threats and mitigations -- Summary -- Chapter 11: Relationship between DIDs and SSI -- DIDs as the backbone of SSI -- DIDs and SSI relationship basics -- Emerging DID methods and innovations -- Development of new DID methods -- Relevance of new DID methods -- Need for the standardization of DID methods -- Distributed identity issuers and verifiers -- Basics of verifiable credentials and digital identity…”
    Libro electrónico
  4. 19164
    Publicado 2024
    “…The final part covers frontend development using Svelte, guiding you through UI design, state management, and performance optimization. Each chapter has real-world examples and comparisons to other technologies, providing you with a comprehensive understanding of full-stack development. …”
    Libro electrónico
  5. 19165
    por Justus, Roy
    Publicado 2022
    Tabla de Contenidos: “…Regression framework -- Metrics for regression -- Input data quality -- Improving data quality -- Similarity framework -- Assessing the similarity framework's performance -- Clustering framework -- Creating a clustering solution -- Summary -- Chapter 11: Designing Exceptional Experiences -- Types of ServiceNow user interfaces -- Jelly -- Service Portal -- Next Experience -- Portals -- Types of portals -- The journey from department to enterprise portals -- Employee Center Pro -- Content taxonomy -- Custom app portals and portal customizations -- Application portals -- Workspaces -- Determining which workspaces to use -- Optimizing experiences with user-facing AI -- AI Search -- AI Search configurability -- Conversational interfaces -- Incorporating Virtual Agent into your user experience -- Advantages of Virtual Agent as a user interface -- Disadvantages of conversational interfaces -- Recommendations for Virtual Agent -- ServiceNow NLU -- Summary -- Conclusion -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  6. 19166
    Publicado 2022
    Tabla de Contenidos: “…VxRail Stretched Cluster with WTS -- VMware vCenter Server options -- A scenario using VxRail Stretched Cluster -- Network settings -- Storage settings -- Software licenses -- Failure scenarios of VxRail Stretched Cluster -- Failure scenario one -- Failure scenario two -- Failure scenario three -- Failure scenario four -- Failure scenario five -- Summary -- Questions -- Chapter 8: Design of VxRail with SRM -- Overview of VMware SRM -- VM replication -- Storage-based replication -- SRM licensing -- Overview of VxRail with VMware SRM -- Uni-directional protection -- Bi-directional protection -- The design of VxRail with VMware SRM -- The benefits of VxRail with VMware SRM -- Failover scenarios of VxRail with VMware SRM -- Failure scenario 1 -- Failure scenario 2 -- Failure scenario 3 -- Failure scenario 4 -- Failure scenario 5 -- Failure scenario 6 -- Summary -- Questions -- Chapter 9: Design of RecoverPoint for Virtual Machines on VxRail -- Overview of RP4VM -- vRPA adapters -- vRPA performance profiles -- CGs -- Journal volumes -- Overview of RP4VM on VxRail -- Local replication -- Remote replication -- Licensing -- Simple support matrix -- The benefits of RP4VM -- The design of RP4VM on VxRail -- Network settings -- Storage settings -- Software licenses -- Failover scenarios of RP4VM on VxRail -- Failure scenario 1 -- Failure scenario 2 -- Failure scenario 3 -- Failure scenario 4 -- Failure scenario 5 -- Summary -- Questions -- Chapter 10: Design of VxRail with Veeam Backup -- Overview of VBR -- Which platforms can be protected? …”
    Libro electrónico
  7. 19167
    Publicado 2022
    “…Leverage the low-code/no-code approach in IBM Cloud Pak for business automation to accelerate your organization's digital transformation Purchase of the print or Kindle book includes a free eBook PDF Key Features Get a comprehensive understanding of IBM Cloud Pak for Business Automation Take a deep dive into insights on RPA, workflow automation, and automated decisions Deploy and manage production-grade automated solutions for scalability, stability, and performance Book Description COVID-19 has made many businesses change how they work, change how they engage their customers, and even change their products. …”
    Libro electrónico
  8. 19168
    Publicado 1996
    Tabla de Contenidos: “…Subpart G-Sources for Brachytherapy -- Subpart H-Sealed Sources for Diagnosis -- Subpart I-Teletherapy -- Subpart J-Training and Experience Requirements -- Subpart K-Enforcement -- PART 36-LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS -- Subpart A-General Provisions -- Subpart B-Specific Licensing Requirements -- Subpart C-Design and Performance Requirements for Irradiators -- Subpart D-Operation of Irradiators -- Subpart E-Records -- Subpart F-Enforcement -- E Nuclear Regulatory Commission Agreement and Non-agreement States -- AGREEMENT STATES -- NON-AGREEMENT STATES -- F Regulatory Chronology -- G History of Radiation Regulation in Medicine -- PROFESSIONAL SELF-REGULATION -- GOVERNMENT REGULATION -- NUCLEAR REGULATORY COMMISSION -- Atomic Energy Act -- Other Federal Agencies -- Federal Radiation Council -- Other Executive Agencies -- PHS Radiological Health Program -- Environmental Protection Agency -- STATE REGULATION -- REFERENCES -- H Public Meeting Documents -- ORGANIZATIONS FORMALLY CONTACTED FOR PUBLIC MEETING PARTICIPATION -- COMMITTEE FOR REVIEW AND EVALUATION OF THE MEDICAL USE PROGRAM OF THE NUCLEAR REGULATORY COMMISSION -- PUBLIC MEETING ANNOUNCEMENT AND REQUEST FOR WRITTEN TESTIMONY -- Background -- Providing Testimony -- Guide to Preparing Testimony -- TOPICS -- Regulation -- Data/Risk -- Quality Management/Quality Assurance -- Education -- Other -- PUBLIC HEARING OCTOBER 12, 1994 ORGANIZATIONS AND INDIVIDUALS SUBMITTING TESTIMONY -- QUESTION SUMMARIES -- I Quality Management Technical Panel -- LIST OF PARTICIPANTS, TUESDAY, OCTOBER 11, 1994 -- Speakers -- Observers -- Subcommitee Members -- J Commissioned Papers -- K The Linear, No-Threshold Model -- ADOPTION OF THE LINEAR, NO-THRESHOLD MODEL -- Divided Scientific Opinion, 1958-1966 -- Joint Committee on Atomic Energy Hearings, 1957-1960s…”
    Libro electrónico
  9. 19169
    Publicado 1990
    Tabla de Contenidos: “…-- CLOSING PANDORA'S BOX -- References -- Chemical Time Bombs: Environmental Causes of Neurodegenerative Diseases -- ESTABLISHING CRITERIA FOR CHEMICAL NEUROTOXICITY -- CLASSIFYING CHEMICALLY INDUCED HUMAN NEUROTOXIC DISORDERS -- THE MATURE NERVOUS SYSTEM AS CHEMICAL TARGET -- DEVELOPING NERVOUS SYSTEM AS CHEMICAL TARGET -- Scientific Basis for Neurobehavioral Toxicity Testing -- CONCLUSION -- Reference -- PART IV BEHAVIORAL ASPECTS OF NEUROTOXICITY: REGIONAL ISSUES -- Neurobehavioral Toxicity Testing in China -- INTRODUCTION -- OVERVIEW OF RESEARCH ACTIVITIES -- Carbon Disulfide -- Lead -- Simulated Video Display Terminal (VDT) Operation -- Static Magnetic Fields (SMF) -- NATIONAL AND INTERNATIONAL COOPERATION -- Mood States -- Performance Tests -- EXPECTED DIRECTIONS: BARRIERS AND RECOMMENDATIONS -- Developments in the Near Future -- Developing and Validating Test Methods -- Generating New Measuring Instruments -- Building a Computerized Evaluation System -- Limitations and Barriers -- Variation of Test Sensitivity from Study to Study -- Bias of Learning Effect -- Controlling Confounding Factors -- Interpreting Results Obtained from Neurobehavioral Tests -- Comments and Recommendations -- Training and Education -- Exploring the Possibility of Combining Quantitative Biochemical Markers and Neurobehavioral Testing -- Development, Validation, and Characterization of Methods -- SUMMARY -- Status of Research and Development of Neurobehavioral Toxicity Tests in China -- Expected Directions in the Development of Behavioral Tests of Neurotoxicity -- Problems and Recommendations -- References…”
    Libro electrónico
  10. 19170
    por Pathak, Harsh
    Publicado 1900
    Tabla de Contenidos: “…-- Advantages/Disadvantages of Change Cycles -- Organisational Barriers to Change -- Performance-Driven Organisational Change -- Rate of Change -- Organisational Effectiveness -- Differents States of Change -- The Future State of Change -- The Current State of Change -- The Delta State of Change -- Creating Change -- Implementation of Change -- Practical tools to Understands Change -- General Guidelines for Effective Change -- Summary -- Case Study: A Semiconductor Solutions Company With an offshore Development Center in India -- Review Questions -- Organisational Resistance to Change -- Introduction -- Reactions to Change -- Core Facts of Resistance to Change -- Individual and Group Resistance to Change -- Individual Resistance -- Organisational Resistance -- Consequences of Resistance to Change -- Overcoming Resistance to Change -- Startegies for Introducing Planned Change -- Empirical-rational Strategy -- Normative-reductive Strategy -- Power-coercive Strategy -- Techniques to Manage Resistance During Change -- Education and Communication -- Sense of Participation and Invilvement -- Assistance and Support -- Incentives -- Negotiation -- Manipulation and Co-optation -- Coercion -- Othr Strategies for Introducing Change…”
    Libro electrónico
  11. 19171
    Publicado 2024
    Tabla de Contenidos: “…Disabling dynamics -- Lack of PO between clients and CFOC -- Less support for long-term CFOs and clients -- Unclear role of RD -- Organisational beliefs and Key Performance Indicators (KPIs) -- Heavy reliance on the RD for finding and winning clients -- Covid-19 -- Psychological ownership pathways -- Roots of PO -- Efficacy is important for clients and CFOs -- Self-identity -- Having a place -- Routes of PO -- Psychological safety matters -- Control -- Investing self -- Knowing intimately -- Other considerations -- Age, gender, introversion, and extroversion -- Retention skills -- Emotional intelligence -- References -- Part V: Strategy and Leadership as Service Framework: The Four Rs -- Chapter 10: The Roots -- Developing roots -- Efficacy -- Having needs met is a two-way street -- Understanding the needs of the C-suite team members -- Service -- Education -- Monitoring -- Relationship between the client and firm of C-suite providers -- Self-identity -- C-suite professionals focus on sector and functional experience to enhance their identity -- Matching identity of client and C-suite professional -- C-suite professionals and their C-suite firm -- Lack of identity of clients with the C-suite firm -- Having a place -- C-suite professionals feel at home at their C-suite firm and with their clients -- Clients' feelings of being at home with their C-suite firm -- References -- Chapter 11: The Routes -- Training and coaching the routes to build psychological ownership -- Psychological safety -- A natural part of the model -- C-suite skills for creating psychological safety -- Building interpersonal trust -- An escape clause -- Time and place -- Mediator roles -- Control -- Control versus influence -- Freedom and control within portfolio work -- Freedom is a beautiful system -- Day-to-day control -- Control for the client -- Accessibility and availability…”
    Libro electrónico
  12. 19172
    por Konheim, Alan G., 1934-
    Publicado 2010
    Tabla de Contenidos: “…Hashing Functions: Examples and Evaluation -- 9.1: Overview: The Tradeoff of Randomization Versus Computational Simplicity -- 9.2: Some Examples of Hashing Functions -- 9.3: Performance of Hash Functions: Formulation -- 9.4: The X2-Test -- 9.5: Testing a Hash Function -- 9.6: The McKenzie et al. …”
    Libro electrónico
  13. 19173
    Publicado 2018
    Tabla de Contenidos: “…A continuum damage model for the simulation of concrete under cyclic loading -- From slender columns to branching structures -- Aging concrete: From very early ages to decades-long durability -- Assessing the flow characteristics of self-compacting concrete via numerical simulations of flow tests -- Mixing and extrusion of printing concrete -- Formulation, validation and application of a new shotcrete model -- Aging behavior of normal and high strength concretes -- A multiscale framework for the prediction of concrete self-desiccation -- Effect of drying on the mechanical performances of concrete -- Temperature and humidity-driven ageing of the VeRCoRs mock-up -- Reassessment of the very long term basic creep of concrete -- Interaction between damage and time-dependent deformation of mortar in concrete: 3D FE parametric study at meso-scale -- Prediction of air permeability in large RC structures using a stochastic FE THM modeling strategy -- Simplified modelling strategy for the thermos-mechanical analysis of massive reinforced structures at early age -- Multiscale quantification of thermal expansion of concrete and thermal stresses of concrete structures -- Translating environmentally-induced eigenstresses to risk of fracture for design of durable concrete pavements -- Simulation of permeable concrete to assess interrelationship between strength and permeability -- A coupled chemo-mechanical damage-healing model for cementitious materials -- Flow in fibrous composite materials: Numerical simulations -- Modeling water absorption in cement-based composites with SAP additions -- Full coupling between diffusion and mechanical analysis in a discrete computational framework -- Alternative parameter to characterize pore distribution in cement paste, and its relation to mechanical properties…”
    Libro electrónico
  14. 19174
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Title page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Section 1: Mastering Defensive Security Concepts -- Chapter 1: A Refresher on Defensive Security Concepts -- Technical requirements -- Deep dive into the core of cybersecurity -- The cybersecurity triad -- Types of attacks -- Managing cybersecurity's legendary pain point: Passwords -- Password breaches -- Social engineering attacks using compromised passwords -- Brute-force attacks -- Dictionary attacks -- Creating a secure password -- Managing passwords at the enterprise level -- Bonus track -- Mastering defense in depth -- Factors to consider when creating DiD models -- Asset identification -- Defense by layers -- Bonus track -- Comparing the blue and red teams -- Summary -- Further reading -- Chapter 2: Managing Threats, Vulnerabilities, and Risks -- Technical requirements -- Understanding cybersecurity vulnerabilities and threats -- Performing a vulnerability assessment -- The vulnerability assessment process -- When should you check for vulnerabilities? …”
    Libro electrónico
  15. 19175
    Tabla de Contenidos: “…Vasiliev -- Design and Performance Studies for Minor-Actinide Target Fuels by T. …”
    Libro electrónico
  16. 19176
    Publicado 2009
    Tabla de Contenidos: “…-- Heuristic Methods -- Heuristics Problem-Solving Approaches -- Meta-Heuristics -- Choice of Heuristic Methods -- Evaluation of Heuristics -- Evaluation of Heuristics in Empirical Analysis -- Sources of Problem Instances -- Performance Measures/Measure of Effectiveness -- Examples of Heuristic Optimisation -- Advantages and Limitations of Heuristic Methods -- Simulation Modelling -- Meaning of Simulation -- What is Simulation? …”
    Libro electrónico
  17. 19177
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Current PowerShell Versions -- Technical requirements -- Historical background -- Overview of different versions of Powershell -- PowerShell Editions -- Windows PowerShell 5.1 -- PowerShell Core 6 -- PowerShell Open Source -- Downloading the source code -- Developing and contributing -- The goals of PowerShell Core 6 -- Dependencies and support -- Compatibility -- Cross-platform remoting -- Azure Cloud Shell -- Features of PowerShell in Cloud Shell -- Future of PowerShell -- Summary -- Questions -- Further reading -- Chapter 2: PowerShell ISE Versus VSCode -- Introduction to currently available tools -- Recap -- PowerShell ISE -- Visual Studio Code -- Introduction -- Download -- Installation -- First start -- Basics -- ISE versus VSCode -- Summary -- Questions -- Further reading -- Chapter 3: Basic Coding Techniques -- Comments -- Regions -- Types -- Variables -- Commands and parameters -- Approved verb list -- PSDrives and PSProviders -- PowerShell's scripting language -- Script blocks -- Operators -- Pipeline operator -- Type operators -- Arithmetic operators -- Assignment operators -- Comparison operators -- Logical operators -- Split and join operators -- Bitwise logical operators -- Replace operator -- Unary operators -- Language constructs -- Indentation -- If...ElseIf, and Else -- Switch -- Loops -- for loop -- do loop -- while loop -- foreach loop -- break and continue loops -- Error handling -- Non-terminating -- Terminating errors -- Remoting -- Types of remoting -- Summary -- Questions -- Further reading -- Chapter 4: Advanced Coding Techniques -- Technical requirements -- Working with credentials -- Working with external utilities -- Pipeline and performance -- Performance -- Parallel execution…”
    Libro electrónico
  18. 19178
    Publicado 2019
    Tabla de Contenidos: “…Titel -- Inhaltsverzeichnis -- Einleitung -- Kapitel 1 - Selbstführung -- 1.1 Das Agile Mindset -- 1.1.1 Der lageorientierte Erdulder -- 1.1.2 Handlungsorientierte Gestalter -- 1.2 Denk- und Handlungsmuster -- 1.3 Glück und Erfolg -- 1.3.1 PERMA in Verbindung mit Agilität -- 1.3.2 Entwicklung von Glück -- 1.4 Emotionsregulation -- 1.4.1 Karte der Emotionen in einer Retrospektive (Teamcoaching) -- 1.4.2 Emotionsregulation im Einzelcoaching -- 1.4.3 Emotionsregulation im Selbstcoaching -- 1.5 Innere Persönlichkeitsanteile -- 1.5.1 Schritt 1 - Das Problem -- 1.5.2 Schritt 2 - Persönlichkeiten entwerfen -- 1.5.3 Schritt 3 - Das Theaterstück beginnt -- 1.5.4 Schritt 4 - Das Theaterstück umschreiben -- 1.6 Mit Beispiel vorangehen -- 1.7 Agile Techniken -- 1.7.1 Das Planen -- 1.7.2 Die Umsetzung -- 1.7.3 Schritt 3 - Der Review -- 1.8 Literaturempfehlungen zum Kapitel -- Kapitel 2 - Selbstorganisation -- 2.1 Agiles Mindset und Werte im Team -- 2.2 Das Spielfeld und seine Regeln -- 2.2.1 Shared Vision -- 2.2.2 Kunden-Feedback -- 2.2.3 Co-Creation -- 2.2.4 Lieferprozess - Liefern in kleinen Chargen -- 2.2.5 Zyklische Lieferung -- 2.2.6 KISS - Keep it simple and small -- 2.2.7 KVP - kontinuierliche Verbesserung -- 2.2.8 Performance-Kennzahlen -- 2.2.9 Teamprozess und Teamverantwortung -- 2.2.10 Interdisziplinäre Teams -- 2.2.11 T-Shaped Profile -- 2.2.12 Moderierende Führung -- 2.2.13 Integrierte Reflexions- und Lernprozesse -- 2.2.14 Beispiel-Setup -- 2.2.15 Auftraggeber-Prozesse -- 2.2.16 Prozesse des Dienstleisters -- 2.3 Selbstorganisation -- 2.3.1 Managergeführt -- 2.3.2 Selbstgesteuert -- 2.3.3 Selbstgestaltet -- 2.3.4 Selbstständig -- 2.3.5 Dezentralisation -- 2.3.6 Zentrale Service-Teams -- 2.3.7 Redundanz -- 2.4 Agile Rollen -- 2.5 Das Serving-Leadership-Konzept -- 2.5.1 Coaching und Perspektivwechsel -- 2.5.2 Therapie -- 2.5.3 Mentoring…”
    Libro electrónico
  19. 19179
    Publicado 2016
    Tabla de Contenidos: “…Linux and OSS in a Forensic Context -- Advantages of Linux and OSS in Forensics Labs -- Disadvantages of Linux and OSS in Forensics Labs -- Linux Kernel and Storage Devices -- Kernel Device Detection -- Storage Devices in /dev -- Other Special Devices -- Linux Kernel and Filesystems -- Kernel Filesystem Support -- Mounting Filesystems in Linux -- Accessing Filesystems with Forensic Tools -- Linux Distributions and Shells -- Linux Distributions -- The Shell -- Command Execution -- Piping and Redirection -- Closing Thoughts -- Chapter 3: Forensic Image Formats -- Raw Images -- Traditional dd -- Forensic dd Variants -- Data Recovery Tools -- Forensic Formats -- EnCase EWF -- FTK SMART -- AFF -- SquashFS as a Forensic Evidence Container -- SquashFS Background -- SquashFS Forensic Evidence Containers -- Closing Thoughts -- Chapter 4: Planning and Preparation -- Maintain an Audit Trail -- Task Management -- Shell History -- Terminal Recorders -- Linux Auditing -- Organize Collected Evidence and Command Output -- Naming Conventions for Files and Directories -- Scalable Examination Directory Structure -- Save Command Output with Redirection -- Assess Acquisition Infrastructure Logistics -- Image Sizes and Disk Space Requirements -- File Compression -- Sparse Files -- Reported File and Image Sizes -- Moving and Copying Forensic Images -- Estimate Task Completion Times -- Performance and Bottlenecks -- Heat and Environmental Factors -- Establish Forensic Write-Blocking Protection -- Hardware Write Blockers -- Software Write Blockers -- Linux Forensic Boot CDs -- Media with Physical Read-Only Modes -- Closing Thoughts -- Chapter 5: Attaching Subject Media to an Acquisition Host -- Examine Subject PC Hardware -- Physical PC Examination and Disk Removal -- Subject PC Hardware Review -- Attach Subject Disk to an Acquisition Host -- View Acquisition Host Hardware…”
    Libro electrónico
  20. 19180
    Publicado 2017
    Tabla de Contenidos: “…. -- Chapter 8: High Performance Programming Using Parallel and Multithreading in C# -- Introduction -- Creating and aborting a low-priority background thread -- Getting ready -- How to do it... -- How it works... -- Increasing the maximum thread pool size -- Getting ready -- How to do it... -- How it works... -- Creating multiple threads -- Getting ready -- How to do it... -- How it works... -- Locking one thread until the contended resources are available -- Getting ready -- How to do it... -- How it works... -- Invoking parallel calls to methods using Parallel.Invoke -- Getting ready -- How to do it... -- How it works... -- Using a parallel foreach loop -- Getting ready -- How to do it... -- How it works... -- Cancelling a parallel foreach loop -- Getting ready -- How to do it... -- How it works... -- Catching errors in parallel foreach loops -- Getting ready -- How to do it... -- How it works... -- Debugging multiple threads -- Getting ready -- How to do it... -- How it works... -- Chapter 9: Composing Event-Based Programs Using Reactive Extensions -- Introduction -- Installing Rx -- Getting ready -- How to do it... -- How it works... -- Events versus observables -- Getting ready -- How to do it... -- How it works... -- Using LINQ to perform queries -- Getting ready -- How to do it... -- How it works... -- Using schedulers in Rx -- Getting ready -- How to do it... -- How it works... -- Debugging lambda expressions -- Getting ready -- How to do it... -- How it works…”
    Libro electrónico