Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 267
- Application software 238
- Java (Computer program language) 185
- Big data 162
- Cloud computing 155
- Streaming video 152
- Engineering & Applied Sciences 129
- Management 128
- Data mining 126
- Electronic data processing 117
- Computer networks 111
- Database management 98
- Data processing 90
- Computer Science 86
- Machine learning 83
- Computer programming 82
- Computer programs 82
- Python (Computer program language) 75
- Computer software 70
- Examinations 68
- Artificial intelligence 67
- Distributed processing 64
- Security measures 61
- Computer security 58
- Information technology 58
- Operating systems (Computers) 57
- Programming 56
- Microsoft .NET Framework 55
- Design 54
- Software engineering 53
-
1361Publicado 2015Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Appreciating Node; Understanding Node's unique design; Concurrency; Parallelism and threads; Concurrency and processes; Events; The event loop; The implications of Node's design on system architects; Building large systems out of small systems; Streams; Using full-stack JavaScript to maximum effect; Hot code; Browserify; Summary; Chapter 2: Installing and Virtualizing Node Servers; Getting a basic Node server up and running; Hello world; Making HTTP requests…”
Libro electrónico -
1362por Edwards, Lewin A. R. W.Tabla de Contenidos: “…Encryption and Data Security Primer5.1 Introduction; 5.2 Classes of Algorithm; 5.3 Protecting One-Way Control Data Streams; 5.4 Protecting One-Way Telemetry; 5.5 Protecting Bidirectional Control/Data Streams; 5.6 Protecting Logged Data; 5.7 Where to Obtain Encryption Algorithms; Chapter 6. …”
Publicado 2005
Libro electrónico -
1363Publicado 2023Tabla de Contenidos: “…-- Data Loading via Internal Stages -- Data Ingestion Using the Named External Stage -- Loading Data via the Snowflake Web UI -- Basic Data Transformations While Ingesting -- External Tables -- Semi-Structured Data -- Unloading Data from Snowflake -- Load Near-Real-Time Streaming Data -- Optimizing Data Loading and Unloading -- Summary -- Exam Essentials -- Review Questions -- Chapter 5: Data Pipelines -- Introducing Tasks -- Introducing Streams -- Summary -- Exam Essentials -- Review Questions -- Chapter 6: Continuous Data Protection -- Components of Continuous Data Protection…”
Libro electrónico -
1364por Howard, Michael, 1965-Tabla de Contenidos: “…Cryptographic Foibles; Using Poor Random Numbers; Using Passwords to Derive Cryptographic Keys; Key Management Issues; Creating Your Own Cryptographic Functions; Using the Same Stream-Cipher Encryption Key; Bit-Flipping Attacks Against Stream Ciphers; Reusing a Buffer for Plaintext and Ciphertext; Using Crypto to Mitigate Threats; Document Your Use of Cryptography…”
Publicado 2004
Libro electrónico -
1365por Raggo, Michael T.Tabla de Contenidos: “…Mobile Device Data Hiding ApplicationsSpy Pix Analysis; Data Hiding Method Analysis; Stego Sec Analysis; Data Hiding Method Analysis; InvisiLetter Analysis; Data Hiding Method Analysis; Summary; References; 7 Operating System Data Hiding; Windows Data Hiding; Alternate Data Streams Reviewed; Stealth Alternate Data Streams; Volume Shadowing; Linux Data Hiding; Linux Filename Trickery; Extended Filesystem Data Hiding; TrueCrypt; References; 8 Virtual Data Hiding; Introduction; Hiding a Virtual Environment; Getting Started; A Review of Virtual Environments; VMware Files…”
Publicado 2013
Libro electrónico -
1366por Holman, TomlinsonTabla de Contenidos: “…Chapter 6: Production Sound III: Dealing with the Output of MicrophonesRecording Level Parallels to Early Cinematography; Cries; Whispers; Cries and Whispers; Multiple Level Controls in the Chain; Another Kind of Overload Distortion and How to Avoid It; Combining Features for Best Wind Performance; Chapter 7: Media Management; What Counts as a Backup?; Types of Media; Streaming Transfers and File Transfers; Streaming Transfers; File Transfers; Audio File Formats; Managing Double-System Recordings; Syncing Footage; Time code Autosync; PluralEyes and DualEyes to Autosync…”
Publicado 2013
Libro electrónico -
1367por Cario, Jennifer EvansTabla de Contenidos: “…Both Big and Small Companies Have Equal Leverage Potential How Pins Get Fed into the Stream; Potential Benefit of More Traffic with Followers; Equality in Ultimate Pins Based on Size of Posting Account; Chapter 4: Week 1-Set Up a Pinterest Account; Monday: Create an Account; Registering for an Account; Setting Up Your Profile; Personal Name vs. …”
Publicado 2013
Libro electrónico -
1368por Tidwell, JeniferTabla de Contenidos: “…Contents; Introduction to the Second Edition; Preface; Chapter 1: What Users Do; A Means to an End; The Basics of User Research; Users' Motivation to Learn; The Patterns; Safe Exploration; Instant Gratification; Satisficing; Changes in Midstream; Deferred Choices; Incremental Construction; Habituation; Microbreaks; Spatial Memory; Prospective Memory; Streamlined Repetition; Keyboard Only; Other People's Advice; Personal Recommendations; Chapter 2: Organizing the Content: Information Architecture and Application Structure; The Big Picture; The Patterns; Feature, Search, and Browse; News Stream…”
Publicado 2011
Libro electrónico -
1369por Caputo, Tony C.Tabla de Contenidos: “…Analog Versus DigitalWorldwide Video Standards; Interlaced Lines; Progressive Scanning; Resolution; Digital Color Depth; The Wonderful World of Pixels; Step 1: Maximize Display Resolution; Step 2: Full Screen Display; Step 3: Screen Capture; Step 4: Save Image; Step 5: Convert for Print; Digital Video Surveillance Resolutions; Digital Video Formats; MPEG; Multiple Streams and Archiving; How MPEG Compression Works; Analog Camera and Digital Video Encoder Versus the IP Camera; Chapter Lessons; Chapter 3: Digital Video Hardware; The Evolution of Video Surveillance Hardware; How Cameras Work…”
Publicado 2010
Libro electrónico -
1370
-
1371por Kcholi, AbrahamTabla de Contenidos: “…Device Driver-Related System ComponentsWindows Embedded Compact 7 Memory Architecture; Kernel Space Virtual Memory; User Space Virtual Memory; Input/Output Handling; Interrupt Processing; ISRs and ISTs; Installable ISRs and Interrupt Sharing; Windows Embedded Compact Device Driver Model; Native Windows CE Device Drivers; Stream Interface Device Drivers in Windows Embedded Compact; Monolithic and Layered Device Drivers; Windows Embedded Compact Device Drivers in Kernel or User Mode; Kernel Mode Device Drivers; User Mode Device Drivers; Loading and Unloading Device Drivers…”
Publicado 2011
Libro electrónico -
1372Publicado 2015Tabla de Contenidos: “…Form-field helpersInternationalization; Supporting views in multiple languages; Understanding internationalization; Scala templating in Play; Understanding the working of Twirl; Troubleshooting; Summary; Chapter 5: Working with Data; Introducing models; JDBC; Anorm; Slick; ReactiveMongo; The Cache API; Troubleshooting; Summary; Chapter 6: Reactive Data Streams; Basics of handling data streams; Iteratee; Enumerator; Using the Concurrent object; Unicast; Broadcast; Enumeratee; Binding Enumeratee to an Enumerator; Binding an Enumeratee to an Iteratee; Summary; Chapter 7: Playing with Globals…”
Libro electrónico -
1373Publicado 2013Tabla de Contenidos: “…Chapter 16: Sharing and streaming digital media -- Xbox Music -- Streaming to the Xbox -- Stereos and TVs -- Smartphone -- Car -- Other computers -- Music services -- Video-streaming services -- Creating media -- CDs -- DVDs -- Chapter 17: Creating a Home Theater PC -- HTPC software -- Media Center -- Media Center settings -- Converting recorded shows -- Configuring HTPC software to start automatically -- Choosing the hardware -- Case -- Fan -- Video card -- Processor -- Memory -- Storage -- Sound card -- Network -- Cables -- Recording TV -- Encrypted digital cable with a CableCARD -- Using a cable box or other device that connects to a TV -- Analog and unencrypted digital cable -- Over-the-air broadcasts -- Using IR blasters -- Choosing a remote control -- Part 4: Security and privacy -- Chapter 18: Managing users and Family Safety -- Logon security -- Microsoft accounts -- Local accounts -- Configuring sign-on options -- Using a picture password -- Using a PIN -- Password best practices -- Password uniqueness -- Password complexity -- Regularly changing your password -- Using passphrases -- Managing accounts -- Creating accounts for guests -- Deleting a user -- Creating groups -- Changing group memberships -- Family Safety -- Turning on Family Safety -- Web filtering -- Activity reporting -- Time limits -- Curfew -- App restrictions -- Windows Store and game restrictions -- Chapter 19: Windows, application, and network security -- Malware protection -- User Account Control -- SmartScreen -- Windows Defender -- Protecting your privacy -- Privacy while browsing the web -- Privacy while using Windows -- Removing malware -- Step 1: Uninstall apps -- Step 2: Scan with Windows Defender -- Step 3: Scan with third-party antimalware -- Step 4: Perform a system restore -- Step 5: Restore from backup -- Step 6: Refresh your system -- Step 7: Removing rootkits…”
Libro electrónico -
1374Publicado 2013Tabla de Contenidos: “…-- Spotlight: global search -- Phone Calls & Face Time: -- Dialing from the phone app -- Favorites list -- Recents list -- Contacts -- Keypad -- Answering call -- Not answering call -- Do not disturb -- Fun with phone calls -- FaceTime video calls -- FaceTime audio calls -- Speech Recognition-And Siri: -- Speak to type -- Siri voice command -- Advanced Siri -- Voice control (iPhone 4) -- Voicemail, Texting & Other Phone Tricks: -- Visual voicemail -- Text messages (SMS) -- iMessages -- Text messages: details and misc -- Free text messages -- Chat programs -- Call waiting -- Call forwarding -- Caller ID -- Bluetooth accessories -- Custom ringtones -- Kiosk mode, large type & accessibility -- Part 2: iPhone As iPod: -- iPhone as iPod: -- List land -- iTunes radio -- Playlists -- Genius playlists -- Artists, songs -- Album mosaic -- Playback control: now playing -- Multi(music) tasking -- Speakers and headphones -- Familiar iPod features -- iTunes store -- Videos app -- Camera, Photos & Video: -- Camera app -- Still photos -- Square photos -- Filters -- Panoramas -- Photos app -- 14 ways to use photos and videos -- My photo stream -- Shared photo streams -- Editing photos -- Geotagging -- Recording video -- Capturing the screen -- All About Apps: -- Two ways to the app store -- Organizing your apps -- Folders -- App preferences -- App updates -- How to find good apps -- Multitasking -- App switcher -- AirPrint: printing from the phone -- Share sheet -- AirDrop -- Troubleshooting apps -- Built-In Apps: -- Calculator -- Calendar -- Clock -- Compass -- Game center -- iBooks -- Maps -- Newsstand -- Notes -- Passbook -- Reminders -- Stocks -- Voice memos -- Weather -- More standard apps -- iPhone Online: -- Getting online: -- Tale of two connections -- Part 3: iPhone Online: -- Getting online: -- Tale of two connections -- Sequence of connections -- List of hotspots -- Commercial hotspots -- Airplane mode and WiFi off mode -- Personal hotspot (tethering) -- Twitter and Facebook -- Web: -- Safari tour -- Zooming and scrolling -- Full-screen mode -- Typing a web address -- Bookmarks -- Reading list -- Shared links -- Web clips -- History list -- Tapping links -- Saving graphics -- Saved passwords & credit cards -- Manipulating multiple pages -- Favorites page -- Reader -- Web security -- Email: -- Setting up your account -- Downloading mail -- VIPs and flagged messages -- What to do with a message -- Writing messages -- Surviving email overload -- Part 4: Connections: -- Syncing with iTunes: -- Three faces of iTunes -- Library -- iTunes store -- Syncing the iPhone -- iTunes tabs -- Summary tab -- Info tab -- Apps tab -- Tones tab -- Music tab -- Movies and TV shows tabs -- Podcast tab -- Books tab -- Photo tab (computer-iPhone) -- On this phone -- On iPhone, multiple computers -- One computer, multiple iPhones -- One-way emergency sync -- Backing up the iPhone -- iCloud: -- What iCoud giveth -- iCoud sync -- Photo stream, photo sharing -- Find my iPhone -- Email -- Video, music, apps: locker in the sky -- iTunes match -- Price of free -- Corporate iPhone: -- Perks -- Setup -- Exchange + your stuff -- Word on troubleshooting -- Virtual private networking (VPN) -- Setting: -- Two new settings tricks -- Airplane mode -- WiFi -- Carrier -- Bluetooth -- Cellular -- Personal hotspot -- Notification center -- Control center -- Do not disturb -- General -- Sounds -- Wallpapers & brightness -- Privacy -- iCloud -- Mail, contacts, calendars -- Notes -- Reminders -- Phone -- Messages -- FaceTime -- Maps -- Compass -- Safari -- iTunes & app store -- Music -- Videos -- Photos & camera -- iBooks -- Game center -- Twitter, Facebook, Flickr, Vimeo -- App preferences -- Part 5: Appendixes: -- Appendix A: Signup & setup: -- Buying a new iPhone -- Setting up a new phone -- Upgrading an older iPhone to iOS 7 -- Software updates -- Restrictions an parental controls -- Cases & accessories -- Appendix B: Troubleshooting & maintenance: -- First rule: Install the updates -- Seven ways to reset the phone -- iPhone doesn't turn on -- Battery life is terrible -- Out of space -- Phone and internet problems -- Email problems -- Warranty and repair -- Battery replacement program -- Where to go from here -- Index…”
Libro electrónico -
1375por Peterson, Steven P.Tabla de Contenidos: “…Machine generated contents note: Preface Acknowledgments Chapter 1: Discount Rates and Returns Estimating Returns Geometric and Arithmetic Averages Caveats to Return Extrapolation Discounting Present Values of Cash Flow Streams Internal Rate of Return and Yield to Maturity Real and Nominal Returns Summary Chapter 2: Fixed Income Securities Coupon Bearing Bonds Infinite Cash Flow Streams (Perpetuities) General Pricing Formulas for Finite Cash Flow Streams Interest Rate Risk Analysis of Duration Interest Rate Risk Dynamics Immunization and Duration Applications - Liability Discounting and Cash Matching Pension Logic Risky Coupons Inflation Risk and TIPS A Bond Portfolio Strategy (Optional) Summary Appendix 2.1: Solving Infinite and Finite Power Series References Chapter 3: Term Structure Discounting Using Spot Rates Forward Rates NPV revisited Short Rates The Bootstrap Method Duration Redux Summary Chapter 4: Equity The Determination of Stock Prices Discount Rates Redux Price and Dividend Multiples Extrapolating Multiples to Forecast Returns Pitfalls of Trend Analysis The Gordon Growth Model Sources of Return Summary References Chapter 5: Portfolio Construction Stochastic Returns and Risk Diversification The Efficient Frontier Markowitz Portfolio Selection Criteria Capital Market Line and the CAPM Performance Evaluation Summary Appendix 5.1: Statistical Review Appendix 5.2: Risk Adjusted Performance References Chapter 6: Optimal Portfolios Portfolio 1: Minimum Variance Portfolio (Fully Invested) Portfolio 2: Minimum Variance Portfolios with Targeted Return Portfolio 3: Minimum Variance Portfolios with No Short Sales Portfolio 4: Minimum Variance Portfolios with Capped Allocations Portfolio 5: Maximum Risk-Adjusted Return Performance Attribution The Efficient Frontier (Again) Summary Appendix 6.1: Matrix Operations Chapter 7: Data and Applications Analyzing Returns on a Ten Asset Portfolio Performance Attribution Changing the Investment Horizon Benchmarking to the Market Portfolio The Cost of Constraints A Bond Strategy Summary Chapter 8: Anomalies Deviations from the CAPM Behavioral Finance Summary References Chapter 9: Factor Models Arbitrage Pricing Theory (APT) Factor Selection Model Estimation Principal Components Applications and Examples Summary References Chapter 10: Active Portfolio Management Active Portfolio Construction and Attribution Analysis Performance Attribution Summary Appendix 10.1: Active Space Chapter 11: Risk The Failure of VaR Taxonomy of Risk Visualizing Risk Estimating Volatilities Maximum Likelihood Estimation (Optional) Credit Risk Adjusting for Leverage Adjusting for Illiquidity Other Risks Summary References Chapter 12: Monte Carlo Methods Example 1: Generating Random Numbers - Estimating pi Example 2: Confirming the Central Limit Theorem Example 3: Credit Default Risk Non-Normal Distributions The Gaussian Copula Summary References Chapter 13: Systemic Risk Extreme Value Theory Estimating the Hazards of Downside Risks A Systemic Risk Indicator Summary References Chapter 14: Incorporating Subjective Views Methodological Concepts An Example using Black-Litterman Active Space Risk Attribution Summary References Chapter 15: Futures, Forwards, and Swaps Institutional Detail and Futures Mechanics The Relationship between Spot Prices and Forward (Futures) Prices Hedging Basis Risk Hedging Portfolio Risk Futures Pricing Swaps Summary References Chapter 16: Introduction to Options Option Payoffs and Put-Call Parity Pricing European Call Options Pricing European Put Options Option Strategies Real Options Summary References Chapter 17: Models of Stock Price Dynamics Stock Price Dynamics Ito Processes Lognormal Stock Prices Deriving the Parameters of the Binomial Lattice Black-Scholes-Merton Model The Greek Letters Monte Carlo Methods Summary Appendix 17.1: Derivation of Ito's Lemma Chapter 18: Hedging Portfolio Risk Simple Hedging Strategies S&P 500 Index Puts Selling Volatility VIX Calls Liability Driven Investment Summary References Chapter 19: Private Equity The Private Equity Model Return and Risk Methodology Summary Appendix 19.1: CAPM References Chapter 20: Structured Credit Securitization Credit Enhancement Basics of Pricing Interest Rate Derivatives Interest Rate Dynamics CDO Valuation The Crash of the Housing Bubble Summary References Chapter 21: Optimal Rebalancing Trigger Strategies and No-trade Regions An Optimal Control Problem Implications Optimal Rebalancing in a Static Optimization Model The Comparative Statics of Transactions Costs References Chapter 22: Data Problems* Covariance Estimation An Example Empirical Results Overlapping Observations Conclusions Appendix 22.1: Covariance Matrix Estimation Removing the effects of smoothing References About the Author Index…”
Publicado 2012
Libro electrónico -
1376Publicado 2011Tabla de Contenidos: “…List of Figures -- List of Tables -- Preface -- Part I Standards for Mobile Networks -- 1 Global System for Mobile Communications -- 1.1 Introduction -- 1.2 System architecture -- 1.3 Time structure of the GSM system -- 1.4 Logical channels -- 1.5 High Speed Circuit Switched Data (HSCSD) -- 1.6 GPRS packet transmission -- 1.7 EDGE packet transmission -- 1.8 Traffic management mechanisms in cellular networks -- 2 Universal Mobile Telecommunications System -- 2.1 Introduction -- 2.2 Architecture of the system -- 2.3 Wideband access with WCDMA coding and multiplexing / essentials -- 2.4 Channels in the WCDMA radio interface -- 2.5 Modulation -- 2.6 Signal reception techniques -- 2.7 Radio resource management in the UMTS system -- 2.8 High-speed packet data transmission -- 2.9 Services -- 3 Long-Term Evolution -- 3.1 Introduction -- 3.2 System architecture -- 3.3 Transmission techniques in the LTE system -- 3.4 Channels in the radio interface of the LTE system -- 3.5 Radio resource management in LTE -- Part II Teletraffic Engineering for Mobile Networks -- 4 Basic Definitions and Terminology -- 4.1 Introduction -- 4.2 Call stream -- 4.3 Service stream -- 4.4 Markov processes -- 4.5 The concept of traffic -- 4.6 Quality of service in telecommunication systems -- 5 Basic Elements of Traffic Engineering used in Mobile Networks -- 5.1 Introduction -- 5.2 Erlang model -- 5.3 Engset model -- 5.4 Comments -- 6 Modeling of Systems with Single-Rate Overflow Traffic -- 6.1 Introduction -- 6.2 Basic information on overflow systems -- 6.3 Models of alternative groups -- 6.4 Equivalent groups -- 6.5 Modeling of overflow traffic in systems with finite number of traffic sources -- 6.6 Comments -- 7 Models of Links Carrying Multi-Service Traffic -- 7.1 Introduction -- 7.2 Multi-dimensional Erlang distribution -- 7.3 Full-availability group with multi-rate traffic -- 7.4 State-dependent systems -- 7.5 Systems with finite and infinite number of traffic sources -- 7.6 Limited-availability group…”
Libro electrónico -
1377Publicado 2012Tabla de Contenidos: “…Unbuffered Character and Token Streams -- 13.9. Altering ANTLR's Code Generation -- 14. …”
Libro electrónico -
1378Publicado 2023Tabla de Contenidos: “…-- Queue-based technology -- Cache-based technology -- Stream-based technology -- Inspecting messaging protocols, schemas, and delivery patterns -- Messaging protocols -- Standard and custom schemas -- Message delivery patterns -- Implementing message broker technologies -- Reviewing essential Kafka components -- Enabling resiliency and scalability -- Summary -- Questions -- Further reading -- Chapter 4: Domain Model and Asynchronous Events -- Technical requirements -- Solution structure -- Core library review -- Reviewing domain structures and components -- Equipment -- Station -- Maintenance…”
Libro electrónico -
1379por Cameron, Brian H.Tabla de Contenidos: “…The Role of Strategic Business Architecture in Innovation Facilitation -- The Role of Strategic Business Architecture in Value Measurement -- Next Steps -- Chapter 3 The Strategic Business Architecture Toolkit -- Defining Qualities of Strategic Business Architecture -- The Scope of Strategic Business Architecture -- The Core Domains of Strategic Business Architecture -- The Extended Domains of Strategic Business Architecture -- Leveraging Strategic Business Architecture for Decision-Making -- The Strategic Business Architecture Knowledge Base and Views -- Key Strategic Business Architecture Views from Strategy to Execution -- A Closer Look at Key Strategic Business Architecture Views -- Value Network -- Value Chain -- Business Motivation Model -- Strategy Map -- Value Proposition Canvas -- Business Model Canvas -- Value Streams -- Capabilities -- Business Processes -- Putting the Ideas Together: Capabilities, Value Streams, and Business Processes -- Strategic Portfolio Management and Projects -- Bringing It All Together: Component Applicability across Strategy Execution -- Next Steps -- Chapter 4 Leveraging a Capability Perspective for Strategy Translation and Alignment -- The Capability Perspective Closes the Gap between Strategy and Execution -- The Role of Value Streams and Capabilities in Translating Strategy -- Enhancing Strategy Execution Techniques with Strategic Business Architecture -- Informing Strategic Options -- Benefits of the Enhanced Approach to Strategy Execution -- Articulating Strategic Direction -- Benefits of the Enhanced Approach to Strategy Execution -- Assessing the Impacts of Strategy -- Benefits of the Enhanced Approach to Strategy Execution -- Assessing Capabilities -- Capability Assessment Metrics -- Benefits of the Enhanced Approach to Strategy Execution -- Defining Coordinated Business Change…”
Publicado 2024
Libro electrónico -
1380Publicado 2017Tabla de Contenidos: “…Getting information -- Comparing containers -- Changing Items -- Finding Items -- Sorting items -- Using the numeric libraries -- Compile time arithmetic -- Complex numbers -- Using the Standard Library -- Summary -- Chapter 9: Using Strings -- Using the string class as a container -- Getting information about a string -- Altering strings -- Searching strings -- Internationalization -- Using facets -- Strings and numbers -- Converting strings to numbers -- Converting numbers to strings -- Using stream classes -- Outputting floating point numbers -- Outputting integers -- Outputting time and money -- Converting numbers to strings using streams -- Reading numbers from strings using streams -- Using regular expressions -- Defining regular expressions -- Standard Library classes -- Matching expressions -- Using iterators -- Replacing strings -- Using strings -- Creating the project -- Processing header subitems -- Summary -- Chapter 10: Diagnostics and Debugging -- Preparing your code -- Invariants and conditions -- Conditional compilation -- Using pragmas -- Adding informational messages -- Compiler switches for debugging -- Pre-processor symbols -- Producing diagnostic messages -- Trace messages with the C runtime -- Tracing messages with Windows -- Using asserts -- Application termination -- Error values -- Obtaining message descriptions -- Using the Message Compiler -- C++ exceptions -- Exception specifications -- C++ exception syntax -- Standard exception classes -- Catching exceptions by type -- Function try blocks -- System errors -- Nested exceptions -- Structured Exception Handling -- Compiler exception switches -- Mixing C++ and SEH exception handling -- Writing exception-safe classes -- Summary -- Index…”
Libro electrónico