Mostrando 1,721 - 1,740 Resultados de 3,243 Para Buscar '"streaming"', tiempo de consulta: 0.09s Limitar resultados
  1. 1721
    Publicado 2024
    Tabla de Contenidos: “…-- Creating a test fixture -- Using the test fixture -- Writing tests for methods that change the database -- Parallelism of xUnit -- Using the repository pattern -- Testing the happy path and the sad path -- Summary -- Chapter 10: Testing in ASP.NET Core (Part 2 - Integration Testing) -- Technical requirements -- Writing integration tests -- Setting up the integration test project -- Writing basic integration tests with WebApplicationFactory -- Testing with a database context -- Testing with mock services -- Testing with authentication and authorization -- Preparing the sample application -- Creating a test fixture -- Creating the test class -- Testing the anonymous API endpoints -- Testing the authorized API endpoints -- Code coverage -- Using data collectors -- Generating a code coverage report -- Summary -- Chapter 11: Getting Started with gRPC -- Technical requirements -- Recap of gRPC -- Setting up a gRPC project -- Creating a new gRPC project -- Understanding the gRPC project structure -- Creating protobuf messages -- Defining a protobuf message -- Understanding field numbers -- Understanding the field types -- Other .NET types -- Creating a protobuf service -- Defining a unary service -- Creating a gRPC client -- Defining a server streaming service -- Defining a client streaming service -- Defining a bidirectional streaming service -- Consuming gRPC services in ASP.NET Core applications -- Updating proto files -- Summary -- Further reading -- Chapter 12: Getting Started with GraphQL -- Technical requirements -- Recap of GraphQL…”
    Libro electrónico
  2. 1722
    por Ashok, Kamthane
    Publicado 2015
    Tabla de Contenidos: “…12.13 The Predefined Macros in ANSI and Turbo-C -- 12.14 Standard I/O Predefined Streams in stdio.h -- 12.15 The Predefined Marcos in ctype.h -- 12.16 Assertions -- Summary -- Exercises -- 13 Structure and Union -- 13.1 Introduction -- 13.2 Features of Structures -- 13.3 Declaration and Initialization of Structures -- 13.4 Structure within Structure -- 13.5 Array of Structures -- 13.6 Pointer to Structure -- 13.7 Structure and Functions -- 13.8 typedef -- 13.9 Bit Fields -- 13.10 Enumerated Data Type -- 13.11 Union -- 13.12 Calling BIOS and DOS Services -- 13.13 Union of Structures -- Summary -- Exercises -- 14 Files -- 14.1 Introduction of a File -- 14.2 Definition of File -- 14.3 Streams and File Types -- 14.3.1 File Types -- 14.4 Steps for File Operations -- 14.4.1 Opening of File -- 14.4.2 Reading a File -- 14.4.3 Closing a File -- 14.4.4 Text Modes -- 14.4.5 Binary Modes -- 14.5 File I/O -- 14.6 Structures Read and Write -- 14.7 Other File Function -- 14.8 Searching Errors in Reading/Writing Files -- 14.9 Low-Level Disk I/O -- 14.10 Command Line Arguments -- 14.11 Application of Command Line Arguments -- 14.12 Environment Variables -- 14.13 I/O Redirection -- Summary -- Exercises -- 15 Graphics -- 15.1 Introduction -- 15.2 Initialization of Graphics -- 15.3 Few Graphics Functions -- 15.4 Programs Using Library Functions -- 15.4.1 Program on Moving Moon -- 15.5 Working with Text -- 15.5.1 Stylish Lines -- 15.6 Filling Patterns with Different Colours and Styles -- 15.7 Mouse Programming -- 15.8 Drawing Non-common Figures -- Summary -- Exercises -- 16 Dynamic Memory Allocation and Linked List -- 16.1 Dynamic Memory Allocation -- 16.2 Memory Models -- 16.3 Memory Allocation Functions -- 16.4 List -- 16.5 Traversal of a List -- 16.6 Searching and Retrieving an Element -- 16.7 Predecessor and Successor -- 16.8 Insertion -- 16.9 Linked Lists…”
    Libro electrónico
  3. 1723
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  4. 1724
    por Jiménez de Parga, Carlos
    Publicado 2014
    Tabla de Contenidos: “…10.7 sincronización -- 10.8 simplificación del diagrama -- 10.9 historial -- 10.10 caso de estudio -- 10.11 caso de estudio -- 11 diagramas de actividad -- 11.1 estructura -- 11.2 estructuras -- 11.3 eventos de -- 11.4 nodos objeto -- 11.5 nodos de dat -- 11.6 particiones -- 11.7 parametrización -- 11.8 r egiones -- 11.9 Manejo de excepciones -- 11.10 conectores -- 11.11 señales y eventos -- 11.12 múlt iples flujos -- 11.13 streaming -- 11.14 mult icasting -- 11.15 caso de estudio -- 11.16 caso de estudio -- 12 Diagramas de estructura compuesta -- 12.1 estructura -- 12.2 colaboraciones -- 12.3 uso de la colaboración -- 12.4 caso de estudio -- 12.5 caso de estudio -- 13 OCL (Object constraint language -- 13.1 estructura -- 13.2 t ipos y operadores -- 13.3 m odelo de referencia -- 13.4 expresiones de restricción -- 13.5 expresiones de definición -- 13.6 C olecciones -- 13.7 navegación -- 13.8 ocl en los diagramas -- 13.9 caso de estudio: -- 13.10 caso de estudio -- 14 ingeniería directa en jav -- 14.1 d iagramas de clases -- 14.2 d iagramas de secuencias -- 14.3 d iagramas de -- 14.4 caso de estudio -- 15 ingeniería directa en c++ -- 15.1 d iagramas -- 15.2 d iagramas de secuencias -- 15.3 d iagramas -- 15.4 caso de estudio -- Anexo A -- Anexo B -- Bibliografía -- Índice alafabético…”
    Libro electrónico
  5. 1725
    Publicado 2016
    “…Version 3.1, updated 10/8/2020 Whether you're considering an Apple TV, already own one, or have a smart TV or streaming device that supports AirPlay and/or the Apple TV app, you can more fully enjoy Apple’s ecosystem with this ultimate guide by TidBITS managing editor Josh Centers. …”
    Libro electrónico
  6. 1726
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title -- Copyright -- CONTENTS -- About the Author -- Overview -- 1 Music Industry Study and Facts -- Music Lifestyle -- Today's Celebrity Culture -- Mobile Music -- Downloading and Streaming -- Musical Merchandising -- Advertising Is OK -- Evaluating Your Fans, Artists and Overall Brand -- Current Trend Predictions in Today's Music Market -- TV Trends -- Longer Hours -- Airtime Availability -- Coverage -- New Trends/Platforms of Music Video Promotion -- YouTube (the Ultimate Video Promotion Platform) -- YouTube Statistics -- Promotional Strategies of Music Videos -- 2 Music Copyright, Publishing and Licensing -- Copyright -- Music Publishing -- What Music Publishers Do -- Performing Rights Organizations -- The Business of Music Licensing -- Music Licensing Company Listing -- 3 Manufacturing Processes, Systems, Product Platforms and Music Production -- Manufacturing Processes -- Press on Demand -- Digital Download Cards -- Product Platforms -- Music Video: Pre-and Post-Production -- Understanding the Entire Production Process -- MVPA -- 4 Types of Distributors and Indie Distribution Associations -- Distribution Platforms -- (Major) Independent Distributors -- Independent Distributors -- One-Stop Distributors -- Rack Jobbers -- Exporters -- Digital Distribution -- Independent Distribution Associations -- 5 Distribution Processes -- Music Distribution Process -- Returns -- Pricing -- Distribution Payment Terms -- Protect Yourself -- Invoicing -- Request for Return -- Getting Started -- Distributors and Promotion -- Doing Business With a Distributor -- Collection -- 6 Distribution Resources -- Catalogs and Databases -- Commercial Radio/College/Internet Tracking Services -- How to Get a UPC Number for Your Product -- ISRC -- 7 Alternative Selling and Total Exposure -- Cutouts, Repackaging -- Mail Order -- Placing Ads -- Branding the Music…”
    Libro electrónico
  7. 1727
    por Schwartz, Alan, 1970-
    Publicado 2004
    Tabla de Contenidos: “…Verifying the MIMEDefang processesCustomizing MIMEDefang; SpamAssassin Integration; Adding sitewide Bayesian filtering; Adding sitewide autowhitelisting; Adding per-domain or per-user streaming; Building a Spam-Checking Gateway; sendmail Configuration; SpamAssassin Configuration; MIMEDefang Configuration; Routing Email; Internal Server Configuration; Testing; Integrating SpamAssassin with Postfix; Postfix Architecture; Spam-Checking During Local Delivery; Spam-Checking All Incoming Mail; Using a Program as a Content Filter; Using a Daemon as a Content Filter…”
    Libro electrónico
  8. 1728
    por Rose, Jay
    Publicado 2002
    Tabla de Contenidos: “…Layback and Print MasteringKeep Lots of Copies; Testing the Track; Data Compression and Streaming; Release Formats; Afterword; CHAPTER 19 Help!…”
    Libro electrónico
  9. 1729
    por Shirazi, Jack
    Publicado 2007
    Tabla de Contenidos: “…; The Tuning Game; System Limitations and What to Tune; A Tuning Strategy; Perceived Performance; Threading to Appear Quicker; Streaming to Appear Quicker; Caching to Appear Quicker; Starting to Tune; User Agreements; Setting Benchmarks; The Benchmark Harness; Taking Measurements; What to Measure; Don't Tune What You Don't Need to Tune; Performance Checklist…”
    Libro electrónico
  10. 1730
    por Lobel, Leonard
    Publicado 2009
    “…Discover how to: Query complex data with powerful Transact-SQL enhancements Use new, non-relational features: hierarchical tables, native file streaming, and geospatial capabilitiesExploit…”
    Libro electrónico
  11. 1731
    Publicado 2008
    Tabla de Contenidos: “…Playing QuickTime Movies Saving QuickTime Movies from a Web Browser; Configuring and Updating QuickTime; Watching Streaming QuickTime Media; Interacting with QuickTime VR Images; Making a QuickTime Slide Show; Basic QuickTime Movie Editing; Adding a Sound Track to Your Movie; Adding QuickTime Text Tracks; Applying QuickTime Effects; Using iTunes; Using Shared Music Libraries; The iTunes Store; Album Covers and iTunes Views; Front Row; Summary; Part II: At Work with Mac OS X; Chapter 8: Getting Help; Using the Help Viewer Application; Displaying Help Tags; Getting Command-Line Help…”
    Libro electrónico
  12. 1732
    por Sosinsky, Barrie A.
    Publicado 2009
    “… Everything you need to set up and maintain large or small networks Barrie Sosinsky Networking Bible Create a secure network for home or enterprise Learn basic building blocks and standards Set up for broadcasting, streaming, and more The book you need to succeed! Your A-Z guide to networking essentials Whether you're setting up a global infrastructure or just networking two computers at home, understanding of every part of the process is crucial to the ultimate success of your system. …”
    Libro electrónico
  13. 1733
    por Spotted Eagle, Douglas
    Publicado 2005
    Tabla de Contenidos: “…; Print to Tape (PTT); Render to a DV File on the Hard Drive; MPEG-2 Encoding Tips; Render to DVD (MPEG-2); Render for Web Streaming; Archiving Projects; Archiving Format; Chapter 10 Burn a DVD; Making Menus; Modifying Text; Hidden Highlights!…”
    Libro electrónico
  14. 1734
    Publicado 2010
    Tabla de Contenidos: “…User Profile DataNew Features in Windows 7; Connectivity; BranchCache; DirectAccess; HomeGroup; Internet Explorer 8; Offline Domain Join; VPN Reconnect; Windows Mobility Center; Windows Connect Now; Entertainment; DirectX 11; Gadgets; Games Explorer; Multiplayer Games; Play To; Remote Media Streaming; Windows Media Center; Windows Media Player 12; Performance; 64-bit Computing; Action Center; Audio and Video; Enhanced Driver and Device Support; Power Management; ReadyBoost; Startup Repair; System Restore; Windows Anytime Upgrade; Windows Easy Transfer; Windows Experience Index…”
    Libro electrónico
  15. 1735
    por Lublinsky, Boris
    Publicado 2013
    Tabla de Contenidos: “…Reading Data Your Way with Custom RecordReadersImplementing a Queue-Based RecordReader; Implementing RecordReader for XML Data; Organizing Output Data with Custom Output Formats; Implementing OutputFormat for Splitting MapReduce Job's Output into Multiple Directories; Writing Data Your Way with Custom RecordWriters; Implementing a RecordWriter to Produce Output tar Files; Optimizing Your MapReduce Execution with a Combiner; Controlling Reducer Execution with Partitioners; Implementing a Custom Partitioner for One-to-Many Joins; Using Non-Java Code with Hadoop; Pipes; Hadoop Streaming…”
    Libro electrónico
  16. 1736
    Publicado 2015
    Tabla de Contenidos: “…Description Advantages of Hadoop; Uses of Hadoop; Hadoop ecosystem; Apache Hadoop; Hadoop distributions; Pillars of Hadoop-HDFS, MapReduce, and YARN; Data access components - Hive and Pig; Data storage component - HBase; Data ingestion in Hadoop- Sqoop and Flume; Streaming and real-time analysis - Storm and Spark; Summary; Chapter 2: Hadoop Ecosystem; Traditional systems; Database trend; Hadoop use cases; Hadoop basic data flow; Hadoop integration; The Hadoop ecosystem; Distributed filesystem; HDFS; Distributed programming; NoSQL databases; Apache HBase; Data ingestion; Service Programming…”
    Libro electrónico
  17. 1737
    por Bolt, Steven
    Publicado 2011
    “…From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. …”
    Libro electrónico
  18. 1738
    por Dubrawsky, Ido
    Publicado 2009
    Tabla de Contenidos: “…Virtualization Technologies; Introduction; The Purpose of Virtualization; Benefits of Virtualization; Types of Virtualization; Designing a Virtual Environment; System Virtualization; Management of Virtual Servers; Application Virtualization; Terminal Services (Remote Desktop Services); XenApp; Application Streaming…”
    Libro electrónico
  19. 1739
    Publicado 2015
    Tabla de Contenidos: “…The graphics moduleQuerying delta time; Querying display size; Querying the frames per second (FPS) counter; The audio module; Sound playback; Music streaming; The input module; Reading the keyboard/touch/mouse input; Reading the accelerometer; Starting and canceling vibrator; Catching Android's soft keys; The files module; Getting an internal file handle; Getting an external file handle; The network module; HTTP requests; Client/server sockets; Opening a URI in a web browser; LibGDX's application life cycle and interface; Starter classes; Running the demo application on a desktop…”
    Libro electrónico
  20. 1740
    Publicado 2014
    Tabla de Contenidos: “…Detecting user input via event listeningManaging multiple listeners at once; Detecting more complex gestures; Introducing the controllers API; Input mapping for cross-platform development; Chapter 5: Audio and File I/O; Introduction; Playing short sound effects; Audio streaming for background music; Optimizing audio files to reduce download sizes; Procedural audio generators; Engine sounds with dynamic audio; The 2D space sound system; The first approach to file handling in Libgdx; Using preferences to store game states and options; The XML parsing primer…”
    Libro electrónico