Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 267
- Application software 238
- Java (Computer program language) 185
- Big data 162
- Cloud computing 155
- Streaming video 152
- Engineering & Applied Sciences 129
- Management 128
- Data mining 126
- Electronic data processing 117
- Computer networks 111
- Database management 98
- Data processing 90
- Computer Science 86
- Machine learning 83
- Computer programming 82
- Computer programs 82
- Python (Computer program language) 75
- Computer software 70
- Examinations 68
- Artificial intelligence 67
- Distributed processing 64
- Security measures 61
- Computer security 58
- Information technology 58
- Operating systems (Computers) 57
- Programming 56
- Microsoft .NET Framework 55
- Design 54
- Software engineering 53
-
1901por Fuller, Samuel H., 1946-Tabla de Contenidos: “…4.3 Response Class Transactions4.3.1 Field Definitions for Response Packet Formats; 4.4 A Sample Read Operation; 4.5 Write Operations; 4.6 Streaming Writes; 4.7 Atomic Operations; 4.8 Maintenance Operations; 4.9 Data Alignment; 5 Messaging Operations; 5.1 Introduction; 5.2 Message Transactions; 5.2.1 Type 10 Packet Format (Doorbell Class); 5.2.2 Type 11 Packet Format (Message Class); 5.2.3 Response Transactions; 5.3 Mailbox Structures; 5.3.1 A Simple Inbox; 5.3.2 An Extended Inbox; 5.3.3 Receiving Messages; 5.4 Outbound Mailbox Structures; 5.4.1 A Simple Outbox; 5.4.2 An Extended Outbox…”
Publicado 2005
Libro electrónico -
1902por Lascu, OctavianTabla de Contenidos: “…-- 1.2 IBM Digital Media Framework -- 1.3 Digital media environment examples -- 1.3.1 Closed-circuit television (CCTV) -- 1.3.2 Video on demand (VoD) -- 1.3.3 Broadcasting -- 1.3.4 Post-production environments -- 1.4 Broadcasting -- 1.4.1 IBM Digital Media Center (DMC) offering -- 1.5 Streaming data versus normal IT traffic -- 1.6 Complementary offerings -- 1.6.1 Advanced tape management with Enterprise Removable Media Manager -- 1.7 ADMIRA -- 1.7.1 Open Enterprise System Virtualization (OESV) -- Chapter 2. …”
Publicado 2005
Libro electrónico -
1903por Celko, JoeTabla de Contenidos: “…Database Architectures; 17.1 Parallelism; 17.2 Hashing; 17.3 Bit Vector Indexes; 17.4 Streaming Databases; 17.5 Further Reading; Chapter 18. …”
Publicado 2006
Libro electrónico -
1904Publicado 2015Tabla de Contenidos: “…General remarks; 2.4.2. Acoustic streaming and radiation force; 2.4.3. Medium heating due to absorption of acoustic waves; 2.4.4. …”
Libro electrónico -
1905Publicado 2015Tabla de Contenidos: “…2.2.3 Volume and flexibility problems2.2.4 The cost problem; 2.2.5 The value mining problem; 2.2.6 The security and privacy problem; 2.2.7 Interoperability and data sharing issues; 2.3 The dialectical relationship between Cloud computing and big data; 2.4 Big data technologies; 2.4.1 Infrastructure support; 2.4.2 Data acquisition; 2.4.3 Data storage; 2.4.4 Data computing; 2.4.4.1 Offline batch computing; 2.4.4.2 Real-time interactive computing; 2.4.4.3 Streaming computing; 2.4.5 Data presentation and interaction; 2.4.6 Related work; Summary; Acknowledgments; References…”
Libro electrónico -
1906Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: Common Apex Mistakes -- Null pointer exceptions -- Exceptions on object instances -- Exceptions when working with maps -- Safe navigation operator -- Retrieving configuration data in a bulkified way -- Hot and cold data -- Bulkification - querying within loops -- Bulkification - DML within loops -- Hardcoding -- Summary -- Chapter 2: Debugging Apex -- Technical requirements -- Debugging on Salesforce -- Prevention is better than cure -- Log levels -- SFDX and streaming logs -- Debugging using the Apex Replay Debugger -- Apex Interactive Debugger -- ISV Customer Debugger -- Which tool to use? …”
Libro electrónico -
1907Publicado 2024Tabla de Contenidos: “…The Multi-Disciplinary approach with variable chairs -- Self-managed teams and self-organising systems -- The executive constellation -- The doughnut organisation -- Conclusion -- References -- Chapter 2: Future of Work Megatrends -- The megatrends -- Globalisation -- Digitalisation -- Automation (including AI) -- Sustainability and decarbonisation -- Demographic changes (including ageing) -- Responses to the megatrends -- Covid-19 and the new normal -- Remote and hybrid working -- The Great Resignation -- Quiet Quitting -- Meaning in and at work -- The three shifts -- Executive freedom -- The dark side of the gig economy -- Future-proofing our careers -- The nine paradoxes -- References -- Part II: Access to the C-Suite through Psychological Ownership -- Chapter 3: The Rise of the Access Economy -- The access economy -- Owning a vinyl record or streaming music -- Cars still provide status -- Development of an access economy ecosystem - Airbnb -- The Uber of the C-suite? …”
Libro electrónico -
1908Publicado 2018Tabla de Contenidos: “…. -- See also -- Creating a Dataflow pipeline to store streaming data -- Getting ready -- How to do it... -- Using the Vision API -- Getting ready -- How to do it... -- Using the Google Cloud Speech API -- Getting ready -- How to do it... -- Using the Cloud IoT Core -- Getting ready -- How to do it... -- Chapter 6: Management Tools -- Introduction -- Creating alerts on specific events -- Getting ready -- How to do it... -- Monitoring a webserver using Stackdriver Monitoring -- Getting ready -- How to do it... -- How it works... -- Creating tailor-made instances using Deployment Manager -- Getting ready -- How to do it... -- Error Reporting on a Python Flask application -- Getting ready -- How to do it... -- Viewing application state using Stackdriver Debugger -- Getting ready -- How to do it... -- Chapter 7: Best Practices -- Introduction -- Creating a custom VM using Terraform…”
Libro electrónico -
1909Publicado 2015Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Packet Analyzers -- Uses for packet analyzers -- Introducing Wireshark -- Wireshark features -- Wireshark's dumpcap and tshark -- The Wireshark packet capture process -- Other packet analyzer tools -- Mobile packet capture -- Summary -- Chapter 2: Capturing Packets -- Guide to capturing packets -- Capturing packets with Interface Lists -- Common interface names -- Capturing packets with Start options -- Capturing packets with Capture Options -- The capture filter options -- Auto-capturing a file periodically -- Troubleshooting -- Wireshark user interface -- The Filter toolbar -- Filtering techniques -- Filter examples -- The Packet List pane -- The Packet Details pane -- The Packet Bytes pane -- Wireshark features -- Decode-As -- Protocol preferences -- The IO graph -- Following the TCP stream -- Exporting the displayed packet -- Generating the firewall ACL rules -- Tcpdump and snoop -- References -- Summary -- Chapter 3: Analyzing the TCP Network -- Recapping TCP -- TCP header fields -- TCP states -- TCP connection establishment and clearing -- TCP three-way handshake -- Handshake message - first step [SYN] -- Handshake message - second step [SYN, ACK] -- Handshake message - third step [ACK] -- TCP data communication -- TCP close sequence -- Lab exercise -- TCP troubleshooting -- TCP reset sequence -- RST after SYN-ACK -- RST after SYN -- Lab exercise -- TCP CLOSE_WAIT -- Lab exercise -- TCP TIME_WAIT -- TCP latency issues -- Cause of latency -- Identifying latency -- Server latency example -- Wire latency -- Wireshark TCP sequence analysis -- TCP retransmission -- Lab exercise -- TCP ZeroWindow -- TCP Window Update -- TCP Dup-ACK -- References -- Summary -- Chapter 4: Analyzing SSL/TLS -- Introducing SSL/TLS…”
Libro electrónico -
1910por Gafter, NealTabla de Contenidos: “…-- Puzzle 21: What's My Class, Take 2 -- Puzzle 22: Dupe of URL -- Puzzle 23: No Pain, No Gain -- 4 Loopy Puzzlers -- Puzzle 24: A Big Delight in Every Byte -- Puzzle 25: Inclement Increment -- Puzzle 26: In the Loop -- Puzzle 27: Shifty i's -- Puzzle 28: Looper -- Puzzle 29: Bride of Looper -- Puzzle 30: Son of Looper -- Puzzle 31: Ghost of Looper -- Puzzle 32: Curse of Looper -- Puzzle 33: Looper Meets the Wolfman -- Puzzle 34: Down for the Count -- Puzzle 35: Minute by Minute -- 5 Exceptional Puzzlers -- Puzzle 36: Indecision -- Puzzle 37: Exceptionally Arcane -- Puzzle 38: The Unwelcome Guest -- Puzzle 39: Hello, Goodbye -- Puzzle 40: The Reluctant Constructor -- Puzzle 41: Field and Stream -- Puzzle 42: Thrown for a Loop -- Puzzle 43: Exceptionally Unsafe -- Puzzle 44: Cutting Class -- Puzzle 45: Exhausting Workout -- 6 Classy Puzzlers -- Puzzle 46: The Case of the Confusing Constructor -- Puzzle 47: Well, Dog My Cats! …”
Publicado 2005
Libro electrónico -
1911por Parker, MichaelTabla de Contenidos: “…15.2 H.264 Video Compression Standard15.3 Digital Cinema Applications; CHAPTER 16 - VIDEO NOISE AND COMPRESSION ARTIFACTS; 16.1 Salt-and-pepper Noise; 16.2 Mosquito Noise; 16.3 Block Artifacts; CHAPTER 17 - VIDEO MODULATION AND TRANSPORT; 17.1 Complex Modulation and Demodulation; 17.2 Modulated Signal Bandwidth; 17.3 Pulse Shaping Filter; 17.4 Raised Cosine Filter; 17.5 Signal Upconversion; 17.6 Digital Upconversion; CHAPTER 18 - VIDEO OVER IP; 18.1 Basics of Internet Protocol (IP); 18.2 Encapsulation; 18.3 Video Streams; 18.4 Transport Protocols; 18.5 IP Transport…”
Publicado 2013
Libro electrónico -
1912Publicado 2015Tabla de Contenidos: “…Chapter 42: Stakeholder management -- Part 5: Operations, supply chain management and procurement -- Chapter 43: Business process redesign -- Chapter 44: House of purchasing and supply -- Chapter 45: Kaizen/Gemba -- Chapter 46: Lean thinking/just-in-time -- Chapter 47: Purchasing model (Kraljic) -- Chapter 48: Root cause analysis/Pareto analysis -- Chapter 49: Six sigma -- Chapter 50: The EFQM model -- Chapter 51: Value stream mapping -- Part 6: Innovation, technology management and e-business -- Chapter 52: Diffusion model -- Chapter 53: Disruptive innovation -- Chapter 54: Hype cycle -- Chapter 55: Innovation circle -- Chapter 56: Information Technology Infrastructure Library (ITIL®) -- Chapter 57: Stage-Gate model -- Chapter 58: Strategic IT-alignment model -- Chapter 59: The Open Group Architecture Framework (TOGAF®) -- Part 7: Human resources (HR) and change management -- Chapter 60: Change quadrants -- Chapter 61: Compensation model -- Chapter 62: Eight phases of change (Kotter) -- Chapter 63: HR business roles -- Chapter 64: Motivational insights -- Chapter 65: Six thinking hats (De Bono) -- Chapter 66: Socially engineered change -- Chapter 67: Team roles (Belbin) -- Chapter 68: The Deming cycle: plan-do-check-act -- Part 8: Leadership and (inter)cultural management -- Chapter 69: Bottom of the pyramid -- Chapter 70: CAGE distance framework -- Chapter 71: Competing values -- Chapter 72: Core quadrants -- Chapter 73: Cultural dimensions (Hofstede) -- Chapter 74: Culture dimensions (Trompenaars) -- Chapter 75: Focus-energy matrix -- Chapter 76: Seven habits of highly effective people (Covey) -- Chapter 77: Situational leadership -- Appendix: Model matrix and categorisation -- Index…”
Libro electrónico -
1913Publicado 2010Tabla de Contenidos: “…An Introduction to Value Stream Mapping -- Selecting Metrics to Optimize the Whole -- Chapter 8 Plan for Change and Mass-Customize…”
Libro electrónico -
1914Publicado 2018Tabla de Contenidos: “…-- RDBMS and problems at scale -- Cassandra and the CAP theorem -- Cassandra's ring architecture -- Partitioners -- ByteOrderedPartitioner -- RandomPartitioner -- Murmur3Partitioner -- Single token range per node -- Vnodes -- Cassandra's write path -- Cassandra's read path -- On-disk storage -- SSTables -- How data was structured in prior versions -- How data is structured in newer versions -- Additional components of Cassandra -- Gossiper -- Snitch -- Phi failure-detector -- Tombstones -- Hinted handoff -- Compaction -- Repair -- Merkle tree calculation -- Streaming data -- Read repair -- Security -- Authentication -- Authorization -- Managing roles -- Client-to-node SSL -- Node-to-node SSL -- Summary -- Chapter 3: Effective CQL -- An overview of Cassandra data modeling -- [Cassandra storage model for versions 3.0 and beyond] -- Cassandra storage model for versions 3.0 and beyond -- Data cells -- cqlsh -- Logging into cqlsh -- Problems connecting to cqlsh -- Local cluster without security enabled -- Remote cluster with user security enabled -- Remote cluster with auth and SSL enabled -- Connecting with cqlsh over SSL -- Converting the Java keyStore into a PKCS12 keyStore -- Exporting the certificate from the PKCS12 keyStore -- Modifying your cqlshrc file -- Testing your connection via cqlsh…”
Libro electrónico -
1915Publicado 2024Tabla de Contenidos: “…Continuous integration stage -- Continuous delivery stage -- Continuous deployment stage -- Continuous operations stage -- Real-world use case for DevOps -- Use cases for DevSecOps -- Requirements stage -- Development stage -- Continuous integration stage -- Continuous delivery stage -- Continuous deployment stage -- Continuous operations stage -- Real-world use case for DevSecOps -- Use cases for SRE -- Requirements stage -- Development stage -- Continuous integration stage -- Continuous delivery stage -- Continuous deployment stage -- Continuous operations stage -- Real-world use case for SRE -- Sustaining integrations -- Summary -- Chapter 10: Building Roadmaps for Implementation -- Introduction to strategic roadmaps -- The difference between a roadmap and a plan -- The benefits of roadmaps -- The importance of a roadmap -- The perils of proceeding without a roadmap -- Best formats to represent the roadmap -- Creating a roadmap -- Steps to creating a roadmap -- Who should be involved -- Evaluating roadmap alternatives -- Determining an acceptable roadmap -- Creating a future state value stream map (FSVSM) -- The importance of FSVSMs in establishing transformation roadmaps -- FSVSM workshop -- Roadmap for continuous testing -- Roadmap for continuous quality -- Roadmap for continuous security -- Roadmap for continuous feedback -- Alignment on the roadmap -- Identifying risks and mitigation strategies -- Allocating budget and resources -- Defining success metrics and a change management plan -- Summary -- Chapter 11: Understanding Transformation Implementation Patterns -- What is a transformation implementation pattern? …”
Libro electrónico -
1916Publicado 2005Tabla de Contenidos: “…18.6 Local Classes -- 18.7 Inherently Nonportable Features -- Chapter Summary -- Defined Terms -- Appendix A: The Library -- A.1 Library Names and Headers -- A.2 A Brief Tour of the Algorithms -- A.2.1 Algorithms to Find an Object -- A.2.2 Other Read-Only Algorithms -- A.2.3 Binary-Search Algorithms -- A.2.4 Algorithms that Write Container Elements -- A.2.5 Partitioning and Sorting Algorithms -- A.2.6 General Reordering Operations -- A.2.7 Permutation Algorithms -- A.2.8 Set Algorithms for Sorted Sequences -- A.2.9 Minimum and Maximum Values -- A.2.10 Numeric Algorithms -- A.3 The IO Library Revisited -- A.3.1 Format State -- A.3.2 Many Manipulators Change the Format State -- A.3.3 Controlling Output Formats -- A.3.4 Controlling Input Formatting -- A.3.5 Unformatted Input/Output Operations -- A.3.6 Single-Byte Operations -- A.3.7 Multi-Byte Operations -- A.3.8 Random Access to a Stream -- A.3.9 Reading and Writing to the Same File -- Index…”
Libro electrónico -
1917Publicado 2021Tabla de Contenidos: “…Going beyond next -- The yield from expression -- Generator expressions -- Some performance considerations -- Don't overdo comprehensions and generators -- Name localization -- Generation behavior in built-ins -- One last example -- Summary -- Chapter 6: OOP, Decorators, and Iterators -- Decorators -- A decorator factory -- Object-oriented programming (OOP) -- The simplest Python class -- Class and object namespaces -- Attribute shadowing -- The self argument -- Initializing an instance -- OOP is about code reuse -- Inheritance and composition -- Accessing a base class -- Multiple inheritance -- Method resolution order -- Class and static methods -- Static methods -- Class methods -- Private methods and name mangling -- The property decorator -- The cached_property decorator -- Operator overloading -- Polymorphism - a brief overview -- Data classes -- Writing a custom iterator -- Summary -- Chapter 7: Exceptions and Context Managers -- Exceptions -- Raising exceptions -- Defining your own exceptions -- Tracebacks -- Handling exceptions -- Not only for errors -- Context managers -- Class-based context managers -- Generator-based context managers -- Summary -- Chapter 8: Files and Data Persistence -- Working with files and directories -- Opening files -- Using a context manager to open a file -- Reading and writing to a file -- Reading and writing in binary mode -- Protecting against overwriting an existing file -- Checking for file and directory existence -- Manipulating files and directories -- Manipulating pathnames -- Temporary files and directories -- Directory content -- File and directory compression -- Data interchange formats -- Working with JSON -- Custom encoding/decoding with JSON -- I/O, streams, and requests -- Using an in-memory stream -- Making HTTP requests -- Persisting data on disk -- Serializing data with pickle…”
Libro electrónico -
1918Publicado 2023Tabla de Contenidos: “…-- Playtesting formats -- Sourcing candidates -- Running playtesting sessions -- Summary -- Chapter 14: Mastering Games as a Service -- Terms of engagement -- Basic stats -- Marketing and analytics -- Economy and balancing -- Live operations -- Staffing -- Efficient live ops -- Managing the content treadmill -- Live-game balancing -- Tools and setup -- Content management system (CMS) -- Customer relationship management (CRM) -- Dashboards -- Test environments -- Live ops tools -- Asset streaming -- Events -- Event classification -- Event components -- Event rewards -- Community and customer support -- Supporting players -- Official Discord servers, Reddit communities, and social media accounts -- Gathering feedback -- Newsletters -- Localized customer support -- Live streaming -- Introduction to season passes -- Designing a season pass -- Progression mechanics -- Accessing previous passes -- Premium rewards and perks -- Season pass tips -- Summary…”
Libro electrónico -
1919Publicado 2017Tabla de Contenidos: “…Best practices to follow -- Conclusion -- Single sign-on -- Idea solution -- Advantages of an SSO solution -- Challenges in the classic method of authentication -- Security Assertion Markup Language -- The high-level overview of working -- Choosing the right identity provider -- Building an SSO from scratch -- Hosted Based Intrusion Detection System -- Exploring OSSEC -- File integrity monitoring -- Log monitoring and active response -- Conclusion -- The hardened image approach -- Implementing hardening standards in scalable environments -- Important to remember -- Conclusion -- Summary -- Chapter 5: Cryptography Network Security -- Introduction to cryptography -- Integrity -- Authenticity -- Real world scenario -- Non-repudiation -- Types of cryptography -- Symmetric key cryptography -- Stream cipher -- The encryption process -- The decryption process -- Advantages of stream ciphers -- Block cipher (AES) -- Padding -- Modes of block ciphers -- Message authentication codes -- The MAC approach -- The challenges with symmetric key storage -- Hardware security modules -- The challenges with HSM in on-premise -- A real-world scenario -- HSM on the cloud -- CloudHSM -- Key management service -- The basic working of AWS KMS -- Encrypting a function in KMS -- Decrypting a function in KMS -- Implementation -- Practical guide -- Configuring AWS CLI -- The decryption function -- Envelope encryption -- The encryption process -- The decryption process -- Implementation steps -- Practical implementation of envelope encryption -- Credential management system with KMS -- Implementation -- Best practices in key management -- Rotation life cycle for encryption keys -- Scenario 1-a single key for all data encryption -- Scenario 2-multiple keys for data encryption -- Protecting the access keys -- Audit trail is important -- Asymmetric key encryption…”
Libro electrónico -
1920Publicado 2007Tabla de Contenidos: “…13.2 Measuring Application Performance -- 13.3 Configuring for Multiple Page Sizes -- PART FIVE: File Systems -- Chapter 14 File System Framework -- 14.1 File System Framework -- 14.2 Process-Level File Abstractions -- 14.3 Solaris File System Framework -- 14.4 File System Modules -- 14.5 The Virtual File System (vfs) Interface -- 14.6 The Vnode -- 14.7 File System I/O -- 14.8 File Systems and Memory Allocation -- 14.9 Path-Name Management -- 14.10 The Directory Name Lookup Cache -- 14.11 The File System Flush Daemon -- 14.12 File System Conversion to Solaris 10 -- 14.13 MDB Reference -- Chapter 15 The UFS File System -- 15.1 UFS Development History -- 15.2 UFS On-Disk Format -- 15.3 The UFS Inode -- 15.4 Access Control in UFS -- 15.5 Extended Attributes in UFS -- 15.6 Locking in UFS -- 15.7 Logging -- 15.8 MDB Reference -- PART SIX: Platform Specifics -- Chapter 16 Support for NUMA and CMT Hardware -- 16.1 Memory Hierarchy Designs -- 16.2 Memory Placement Optimization Framework -- 16.3 Initial Thread Placement -- 16.4 Scheduling -- 16.5 Memory Allocation -- 16.6 Lgroup Implementation -- 16.7 MPO APIs -- 16.8 Locality Group Hierarchy -- 16.9 MPO Statistics -- 16.10 MDB Reference -- Chapter 17 Locking and Synchronization -- 17.1 Synchronization -- 17.2 Parallel Systems Architectures -- 17.3 Hardware Considerations for Locks and Synchronization -- 17.4 Introduction to Synchronization Objects -- 17.5 Mutex Locks -- 17.6 Reader/Writer Locks -- 17.7 Turnstiles and Priority Inheritance -- 17.8 Kernel Semaphores -- 17.9 DTrace Lockstat Provider -- PART SEVEN: Networking -- Chapter 18 The Solaris Network Stack -- 18.1 STREAMS and the Network Stack -- 18.2 Solaris 10 Stack: Design Goals -- 18.3 Solaris 10 Network Stack Framework -- 18.4 TCP as an Implementation of the New Framework -- 18.5 UDP -- 18.6 Synchronous STREAMS -- 18.7 IP…”
Libro electrónico